query_id
stringlengths
32
32
query
stringlengths
7
4.32k
positive_passages
listlengths
1
1
negative_passages
listlengths
88
101
f54a1428105f5d7a165a7301b9e23a04
DeleteSnapshot creates a snapshot of a volume.
[ { "docid": "57485dfd63ae03537a026723c17f04d7", "score": "0.6971434", "text": "func (d *NASQtreeStorageDriver) DeleteSnapshot(snapConfig *storage.SnapshotConfig) error {\n\n\tif d.Config.DebugTraceFlags[\"method\"] {\n\t\tfields := log.Fields{\n\t\t\t\"Method\": \"DeleteSnapshot\",\n\t\t\t\"Type\": \"NASQtreeStorageDriver\",\n\t\t\t\"snapshotName\": snapConfig.InternalName,\n\t\t\t\"volumeName\": snapConfig.VolumeInternalName,\n\t\t}\n\t\tlog.WithFields(fields).Debug(\">>>> DeleteSnapshot\")\n\t\tdefer log.WithFields(fields).Debug(\"<<<< DeleteSnapshot\")\n\t}\n\n\treturn drivers.NewSnapshotsNotSupportedError(d.Name())\n}", "title": "" } ]
[ { "docid": "c5dfb6a638c1ea17fa62d7baf2976973", "score": "0.80163014", "text": "func (ks *KopiaSnapshotter) DeleteSnapshot(snapID string) (err error) {\n\t_, _, err = ks.Runner.Run(\"snapshot\", \"delete\", snapID, \"--delete\")\n\treturn err\n}", "title": "" }, { "docid": "ad46e2b89bee896dc50c7df042f32aaf", "score": "0.80034894", "text": "func (d Ploop) DeleteSnapshot(uuid string) error {\n\treturn ploop(\"snapshot-delete\", \"-u\", uuid, d.dd)\n}", "title": "" }, { "docid": "b1eada8106a49f53c8aa3b3b73ba3eb2", "score": "0.78693926", "text": "func (c *ClientIMPL) DeleteSnapshot(ctx context.Context,\n\tdeleteParams *VolumeDelete, id string) (resp EmptyResponse, err error) {\n\treturn c.DeleteVolume(ctx, deleteParams, id)\n}", "title": "" }, { "docid": "62d0d0e651523e1e65620a8d4f61cc0a", "score": "0.7813857", "text": "func DeleteSnapshot(ctx context.Context, in *v1alpha1.VolumeSnapDeleteRequest) (*v1alpha1.VolumeSnapDeleteResponse, error) {\n\tsockresp, err := APIUnixSockVar.SendCommand(fmt.Sprintf(\"%s %s %s %v %v\",\n\t\tCmdSnapDestroy, in.Volume, in.Snapname, IoWaitTime, TotalWaitTime))\n\trespstr := \"ERR\"\n\tif nil != sockresp && len(sockresp) > 1 {\n\t\trespstr = sockresp[1]\n\t}\n\tstatus := CommandStatus{\n\t\tResponse: respstr,\n\t}\n\tjsonresp, _ := json.Marshal(status)\n\tresp := &v1alpha1.VolumeSnapDeleteResponse{\n\t\tStatus: jsonresp,\n\t}\n\treturn resp, err\n}", "title": "" }, { "docid": "5e721c5c1987e733629f8cbe6a14b715", "score": "0.7737666", "text": "func (d *zfs) DeleteVolumeSnapshot(vol Volume, op *operations.Operation) error {\n\tparentName, _, _ := api.GetParentAndSnapshotName(vol.name)\n\n\t// Handle clones.\n\tclones, err := d.getClones(d.dataset(vol, false))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(clones) > 0 {\n\t\t// Move to the deleted path.\n\t\t_, err := shared.RunCommand(\"zfs\", \"rename\", d.dataset(vol, false), d.dataset(vol, true))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\t// Delete the snapshot.\n\t\t_, err := shared.RunCommand(\"zfs\", \"destroy\", d.dataset(vol, false))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Delete the mountpoint.\n\terr = os.Remove(vol.MountPath())\n\tif err != nil && !os.IsNotExist(err) {\n\t\treturn fmt.Errorf(\"Failed to remove '%s': %w\", vol.MountPath(), err)\n\t}\n\n\t// Remove the parent snapshot directory if this is the last snapshot being removed.\n\terr = deleteParentSnapshotDirIfEmpty(d.name, vol.volType, parentName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// For VM images, create a filesystem volume too.\n\tif vol.IsVMBlock() {\n\t\tfsVol := vol.NewVMBlockFilesystemVolume()\n\t\terr := d.DeleteVolumeSnapshot(fsVol, op)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c4ea0e7297491738644fff6bd66dd558", "score": "0.7726408", "text": "func (j *PVCTestJig) DeleteVolumeSnapshot(ns string, vsName string) error {\n\tif j.SnapClient != nil && len(vsName) > 0 {\n\t\tLogf(\"Deleting VolumeSnapshot %q\", vsName)\n\t\terr := j.SnapClient.SnapshotV1().VolumeSnapshots(ns).Delete(context.Background(), vsName, metav1.DeleteOptions{})\n\t\tif err != nil && !apierrors.IsNotFound(err) {\n\t\t\treturn fmt.Errorf(\"VolumeSnapshot delete API error: %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b0210a2218a9a14680c6db935ec215ca", "score": "0.76882285", "text": "func (r *RestartableVolumeSnapshotter) DeleteSnapshot(snapshotID string) error {\n\tdelegate, err := r.getDelegate()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn delegate.DeleteSnapshot(snapshotID)\n}", "title": "" }, { "docid": "0ae0de4a16d5cf4ed669ea10485a6b2a", "score": "0.7650916", "text": "func DeleteSnapshot(\n\tsnapConfig *storage.SnapshotConfig, config *drivers.OntapStorageDriverConfig, client *api.Client,\n) error {\n\n\tinternalSnapName := snapConfig.InternalName\n\tinternalVolName := snapConfig.VolumeInternalName\n\n\tif config.DebugTraceFlags[\"method\"] {\n\t\tfields := log.Fields{\n\t\t\t\"Method\": \"DeleteSnapshot\",\n\t\t\t\"Type\": \"ontap_common\",\n\t\t\t\"snapshotName\": internalSnapName,\n\t\t\t\"volumeName\": internalVolName,\n\t\t}\n\t\tlog.WithFields(fields).Debug(\">>>> DeleteSnapshot\")\n\t\tdefer log.WithFields(fields).Debug(\"<<<< DeleteSnapshot\")\n\t}\n\n\tsnapResponse, err := client.SnapshotDelete(internalSnapName, internalVolName)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting snapshot: %v\", err)\n\t}\n\tif zerr := api.NewZapiError(snapResponse); !zerr.IsPassed() {\n\t\tif zerr.Code() == azgo.ESNAPSHOTBUSY {\n\t\t\t// Start a split here before returning the error so a subsequent delete attempt may succeed.\n\t\t\t_ = SplitVolumeFromBusySnapshot(snapConfig, config, client)\n\t\t}\n\t\treturn fmt.Errorf(\"error deleting snapshot: %v\", zerr)\n\t}\n\n\tlog.WithField(\"snapshotName\", internalSnapName).Debug(\"Deleted snapshot.\")\n\treturn nil\n}", "title": "" }, { "docid": "5d0cc262e4bd5454fbe5aee1223b3fb6", "score": "0.7604678", "text": "func (fc *fakeClient) DeleteVolumeSnapshot(ctx context.Context, in *pb.DeleteVolumeSnapshotOpts, opts ...grpc.CallOption) (*pb.GenericResponse, error) {\n\treturn &pb.GenericResponse{\n\t\tReply: &pb.GenericResponse_Result_{\n\t\t\tResult: &pb.GenericResponse_Result{},\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "87207b99d7018883d3be7a17b3271b78", "score": "0.7592447", "text": "func (c Client) DeleteSnapshot(ctx context.Context, filesystem *FileSystem, snapshot *Snapshot) error {\n\tlogFields := LogFields{\n\t\t\"API\": \"SnapshotsClient.BeginDelete\",\n\t\t\"volume\": filesystem.FullName,\n\t\t\"snapshot\": snapshot.Name,\n\t}\n\n\tvar rawResponse *http.Response\n\tresponseCtx := runtime.WithCaptureResponse(ctx, &rawResponse)\n\n\t_, err := c.sdkClient.SnapshotsClient.BeginDelete(responseCtx,\n\t\tfilesystem.ResourceGroup, filesystem.NetAppAccount, filesystem.CapacityPool,\n\t\tfilesystem.Name, snapshot.Name, nil)\n\n\tlogFields[\"correlationID\"] = GetCorrelationID(rawResponse)\n\n\tif err != nil {\n\t\tif IsANFNotFoundError(err) {\n\t\t\tLogc(ctx).WithFields(logFields).Info(\"Snapshot already deleted.\")\n\t\t\treturn nil\n\t\t}\n\n\t\tLogc(ctx).WithFields(logFields).WithError(err).Error(\"Error deleting snapshot.\")\n\t\treturn err\n\t}\n\n\tLogc(ctx).WithFields(logFields).Debug(\"Snapshot deleted.\")\n\n\treturn nil\n}", "title": "" }, { "docid": "c58366fe4c5420926e3e8753b92f2d48", "score": "0.7585774", "text": "func (d *Driver) DeleteSnapshot(ctx context.Context, req *csi.DeleteSnapshotRequest) (*csi.DeleteSnapshotResponse, error) {\n\tsnapshotID := req.SnapshotId\n\tif len(snapshotID) == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"Snapshot ID must be provided\")\n\t}\n\n\tvar err error\n\tvar subsID string\n\tsnapshotName := snapshotID\n\tresourceGroup := d.cloud.ResourceGroup\n\n\tif azureutils.IsARMResourceID(snapshotID) {\n\t\tsnapshotName, resourceGroup, subsID, err = d.getSnapshotInfo(snapshotID)\n\t\tif err != nil {\n\t\t\treturn nil, status.Errorf(codes.Internal, err.Error())\n\t\t}\n\t}\n\n\tmc := metrics.NewMetricContext(consts.AzureDiskCSIDriverName, \"controller_delete_snapshot\", d.cloud.ResourceGroup, d.cloud.SubscriptionID, d.Name)\n\tisOperationSucceeded := false\n\tdefer func() {\n\t\tmc.ObserveOperationWithResult(isOperationSucceeded, consts.SnapshotID, snapshotID)\n\t}()\n\n\tklog.V(2).Infof(\"begin to delete snapshot(%s) under rg(%s)\", snapshotName, resourceGroup)\n\tif rerr := d.cloud.SnapshotsClient.Delete(ctx, subsID, resourceGroup, snapshotName); rerr != nil {\n\t\tazureutils.SleepIfThrottled(rerr.Error(), consts.SnapshotOpThrottlingSleepSec)\n\t\treturn nil, status.Error(codes.Internal, fmt.Sprintf(\"delete snapshot error: %v\", rerr.Error()))\n\t}\n\tklog.V(2).Infof(\"delete snapshot(%s) under rg(%s) successfully\", snapshotName, resourceGroup)\n\tisOperationSucceeded = true\n\treturn &csi.DeleteSnapshotResponse{}, nil\n}", "title": "" }, { "docid": "5cb39c8c04aa668f92fce08ad17cdab2", "score": "0.7557886", "text": "func (vm *VM) SnapshotDelete(snapID int) error {\n\t_, err := client.Call(\"one.vm.snapshotdelete\", vm.ID, snapID)\n\treturn err\n}", "title": "" }, { "docid": "245cf4547ba6d5ae32079976c4fd6a28", "score": "0.75570065", "text": "func (bm *BlobManipulator) DeleteSnapshot(snapshotID string) (string, error) {\n\terr := bm.ConnectOrCreateRepo(bm.DataRepoPath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tstdout, _, err := bm.KopiaCommandRunner.Run(\"snapshot\", \"delete\", snapshotID, \"--delete\")\n\tif err != nil {\n\t\treturn stdout, err\n\t}\n\n\treturn \"\", nil\n}", "title": "" }, { "docid": "00f3d2f7d0c162d4c22cc85ff7a87d01", "score": "0.75561446", "text": "func (d Ploop) DeleteSnapshot(uuid string) error {\n\tcuuid := C.CString(uuid)\n\tdefer cfree(cuuid)\n\n\tret := C.ploop_delete_snapshot(d.d, cuuid)\n\n\treturn mkerr(ret)\n}", "title": "" }, { "docid": "1d56c18767479c5d622bd2273aed31e3", "score": "0.75276166", "text": "func (s *EC2Service) DeleteSnapshot(req *DeleteSnapshotRequest) (result *DeleteSnapshotResponse, err error) {\n\n\tresult = new(DeleteSnapshotResponse)\n\terr = s.wrapperSignAndDo(\"DeleteSnapshot\", req, result)\n\treturn\n}", "title": "" }, { "docid": "dc7e6bef3810d1e51b8f7da82a2e65cf", "score": "0.74700636", "text": "func (d *BlockVolumeControllerDriver) DeleteSnapshot(ctx context.Context, req *csi.DeleteSnapshotRequest) (*csi.DeleteSnapshotResponse, error) {\n\treturn nil, status.Error(codes.Unimplemented, \"DeleteSnapshot is not supported yet\")\n}", "title": "" }, { "docid": "82573d33275ca80da04708dd34dad3d1", "score": "0.746743", "text": "func (c *Client) DeleteSnapshot(ctx context.Context, host, tag string) error {\n\tctx = customTimeout(ctx, snapshotTimeout)\n\n\t_, err := c.scyllaOps.StorageServiceSnapshotsDelete(&scyllaOperations.StorageServiceSnapshotsDeleteParams{ // nolint: errcheck\n\t\tContext: forceHost(ctx, host),\n\t\tTag: &tag,\n\t})\n\treturn err\n}", "title": "" }, { "docid": "3d79ee2ebf0309dd52b84af2164b8099", "score": "0.744554", "text": "func (client *Client) DeleteSnapshot(request *DeleteSnapshotRequest) (_result *DeleteSnapshotResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &DeleteSnapshotResponse{}\n\t_body, _err := client.DeleteSnapshotWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "bd9ed77acecc8f8e85e47365671815be", "score": "0.7442746", "text": "func (os *OpenStack) DeleteSnapshot(snapID string) error {\n\terr := snapshots.Delete(os.blockstorage, snapID).ExtractErr()\n\tif err != nil {\n\t\tklog.V(3).Infof(\"Failed to delete snapshot: %v\", err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "48e3250a755deab8022f7cedabf47e45", "score": "0.7424603", "text": "func DeleteSnapshot(id string, name string) error {\n\treturn xms.DeleteSnapshots(id, name)\n}", "title": "" }, { "docid": "1336675b1e8cbfc0ba3db4c484bcb3c9", "score": "0.7367689", "text": "func (is *ImageService) DeleteSnapshot(ctx context.Context, image resources.Image,\n\tsnapshot resources.ImageSnapshot) error {\n\timageID, err := image.ID()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = is.call(ctx, \"one.image.snapshotdelete\", imageID, snapshot.ID)\n\n\treturn err\n}", "title": "" }, { "docid": "a0fe60f71b2d54a99d96a5d39ec63028", "score": "0.7354642", "text": "func (s *API) DeleteSnapshot(req *DeleteSnapshotRequest, opts ...scw.RequestOption) error {\n\tvar err error\n\n\tif req.Zone == \"\" {\n\t\tdefaultZone, _ := s.client.GetDefaultZone()\n\t\treq.Zone = defaultZone\n\t}\n\n\tif fmt.Sprint(req.Zone) == \"\" {\n\t\treturn errors.New(\"field Zone cannot be empty in request\")\n\t}\n\n\tif fmt.Sprint(req.SnapshotID) == \"\" {\n\t\treturn errors.New(\"field SnapshotID cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"DELETE\",\n\t\tPath: \"/instance/v1/zones/\" + fmt.Sprint(req.Zone) + \"/snapshots/\" + fmt.Sprint(req.SnapshotID) + \"\",\n\t\tHeaders: http.Header{},\n\t}\n\n\terr = s.client.Do(scwReq, nil, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8db11bb77f9ce6f9ef22f77fbe4535b2", "score": "0.7342794", "text": "func (d *NVMeStorageDriver) DeleteSnapshot(\n\tctx context.Context, snapConfig *storage.SnapshotConfig, _ *storage.VolumeConfig,\n) error {\n\tfields := LogFields{\n\t\t\"method\": \"DeleteSnapshot\",\n\t\t\"type\": \"NVMeStorageDriver\",\n\t\t\"snapshotName\": snapConfig.InternalName,\n\t\t\"volumeName\": snapConfig.VolumeInternalName,\n\t}\n\tLogd(ctx, d.Name(), d.Config.DebugTraceFlags[\"method\"]).WithFields(fields).Trace(\">>>> DeleteSnapshot\")\n\tdefer Logd(ctx, d.Name(), d.Config.DebugTraceFlags[\"method\"]).WithFields(fields).Trace(\"<<<< DeleteSnapshot\")\n\n\terr := d.API.VolumeSnapshotDelete(ctx, snapConfig.InternalName, snapConfig.VolumeInternalName)\n\tif err != nil {\n\t\tif api.IsSnapshotBusyError(err) {\n\t\t\t// Start a split here before returning the error so a subsequent delete attempt may succeed.\n\t\t\t_ = SplitVolumeFromBusySnapshot(ctx, snapConfig, &d.Config, d.API, d.API.VolumeCloneSplitStart)\n\t\t}\n\t\t// we must return the err, even if we started a split, so the snapshot delete is retried\n\t\treturn err\n\t}\n\n\tLogc(ctx).WithField(\"snapshotName\", snapConfig.InternalName).Debug(\"Deleted snapshot.\")\n\treturn nil\n}", "title": "" }, { "docid": "a4e0d7bdf4659e9ec9adeedd76aae8bb", "score": "0.7291391", "text": "func (s *SnapshotService) DeleteSnapshot(p *DeleteSnapshotParams) (*DeleteSnapshotResponse, error) {\n\tresp, err := s.cs.newRequest(\"deleteSnapshot\", p.toURLValues())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar r DeleteSnapshotResponse\n\tif err := json.Unmarshal(resp, &r); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// If we have a async client, we need to wait for the async result\n\tif s.cs.async {\n\t\tb, err := s.cs.GetAsyncJobResult(r.JobID, s.cs.timeout)\n\t\tif err != nil {\n\t\t\tif err == AsyncTimeoutErr {\n\t\t\t\treturn &r, err\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif err := json.Unmarshal(b, &r); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &r, nil\n}", "title": "" }, { "docid": "5070a873355968e66a91341934450631", "score": "0.7243167", "text": "func (vs *VolumeSnapshotter) DeleteSnapshot(snapshotID string) error {\n\tvs.Log.Infof(\"DeleteSnapshot for snapshotID: %s\", snapshotID)\n\n\t// List all volumes to find the snapshotID belongs to which volume\n\treq, err := http.NewRequest(\n\t\thttp.MethodGet,\n\t\tfmt.Sprintf(\"%s/v1/volumes\", backendServiceURL),\n\t\tstrings.NewReader(\"\"))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn fmt.Errorf(\"Unexpected response code: %d\", resp.StatusCode)\n\t}\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttype Actions struct {\n\t\tSnapshotGet string `json:\"snapshotGet,omitempty\"`\n\t\tSnapshotList string `json:\"snapshotList,omitempty\"`\n\t}\n\ttype Data struct {\n\t\tActions Actions `json:\"actions,omitempty\"`\n\t\tID string `json:\"id,omitempty\"`\n\t\tName string `json:\"name,omitempty\"`\n\t}\n\ttype VolumeResponse struct {\n\t\tData []Data `json:\"data,omitempty\"`\n\t}\n\tvolumeResponse := &VolumeResponse{}\n\tif err := json.Unmarshal(body, volumeResponse); err != nil {\n\t\treturn err\n\t}\n\n\tvolumeID := \"\"\n\tfor _, data := range volumeResponse.Data {\n\t\tsnapshotGetURL := data.Actions.SnapshotGet\n\t\treq, err := http.NewRequest(\n\t\t\thttp.MethodGet,\n\t\t\tsnapshotGetURL,\n\t\t\tstrings.NewReader(fmt.Sprintf(\"{\\\"name\\\":\\\"%s\\\"}\", snapshotID)))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tresp, err := http.DefaultClient.Do(req)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer resp.Body.Close()\n\n\t\tif resp.StatusCode != http.StatusOK {\n\t\t\tcontinue\n\t\t}\n\t\tif data.ID != \"\" {\n\t\t\tvolumeID = data.ID\n\t\t} else if data.Name != \"\" {\n\t\t\tvolumeID = data.Name\n\t\t}\n\t\tbreak\n\t}\n\n\tif volumeID == \"\" {\n\t\treturn fmt.Errorf(\"Cannot find the volume for snapshotID: %s\", snapshotID)\n\t}\n\n\t// Find the volumeID for snapshotID, delete it\n\treq, err = http.NewRequest(\n\t\thttp.MethodPost,\n\t\tfmt.Sprintf(\"%s/v1/volumes/%s?action=snapshotDelete\", backendServiceURL, volumeID),\n\t\tstrings.NewReader(fmt.Sprintf(\"{\\\"name\\\":\\\"%s\\\"}\", snapshotID)))\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\n\tresp, err = http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn fmt.Errorf(\"Unexpected response code: %d\", resp.StatusCode)\n\t}\n\tvs.Log.Infof(\"DeleteSnapshot for snapshotID %s on volumeID %s\", snapshotID, volumeID)\n\treturn nil\n}", "title": "" }, { "docid": "fa071a1fed14bffa95a1a14e09e68cda", "score": "0.7236076", "text": "func (p *Provider) DeleteSnapshot(context.Context) error {\n\treturn p.err\n}", "title": "" }, { "docid": "9e180ae5a3ef53a499cec98a556c0c75", "score": "0.72161084", "text": "func (dfs *DistributedFilesystem) DeleteSnapshot(snapshotID string) error {\n\ttenantID, timestamp, err := parseLabel(snapshotID)\n\tif err != nil {\n\t\tglog.Errorf(\"Could not parse snapshot ID %s: %s\", snapshotID, err)\n\t\treturn err\n\t}\n\n\ttenant, err := dfs.facade.GetService(datastore.Get(), tenantID)\n\tif err != nil {\n\t\tglog.Errorf(\"Service not found %s: %s\", tenantID, err)\n\t\treturn err\n\t} else if tenant == nil {\n\t\tglog.Errorf(\"Service %s not found\", tenantID)\n\t\treturn fmt.Errorf(\"service not found\")\n\t}\n\n\tsnapshotVolume, err := dfs.GetVolume(tenant.ID)\n\tif err != nil {\n\t\tglog.Errorf(\"Could not find the volume for service %s (%s): %s\", tenant.Name, tenant.ID, err)\n\t\treturn err\n\t}\n\n\t// delete the snapshot\n\tif err := snapshotVolume.RemoveSnapshot(snapshotID); err != nil {\n\t\tglog.Errorf(\"Could not delete snapshot %s: %s\", snapshotID, err)\n\t\treturn err\n\t}\n\n\t// update the tags\n\timages, err := findImages(tenantID, timestamp)\n\tif err != nil {\n\t\tglog.Errorf(\"Could not find images for snapshot %s: %s\", snapshotID, err)\n\t\treturn err\n\t}\n\n\tfor _, image := range images {\n\t\timageID := image.ID\n\t\timageID.Tag = timestamp\n\t\timg, err := docker.FindImage(imageID.String(), false)\n\t\tif err != nil {\n\t\t\tglog.Errorf(\"Could not remove tag from image %s: %s\", imageID, err)\n\t\t\tcontinue\n\t\t}\n\t\timg.Delete()\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2a0519400fa50f3a23fcca000797eee0", "score": "0.72086835", "text": "func (c *Client) DeleteSnapshot(repository string, snapshot string) error {\n\tvar response acknowledgedResponse\n\n\terr := handleErrWithStruct(c.buildDeleteRequest(fmt.Sprintf(\"_snapshot/%s/%s\", repository, snapshot)).Timeout(10*time.Minute), &response)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !response.Acknowledged {\n\t\treturn fmt.Errorf(`Request to delete snapshot \"%s\" on repository \"%s\" was not acknowledged. %+v`, snapshot, repository, response)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c4adc59a4624b1312c43f47ec77cf733", "score": "0.7180633", "text": "func (image *Image) SnapshotDelete(snapID int) error {\n\t_, err := client.Call(\"one.image.snapshotdelete\", image.ID, snapID)\n\treturn err\n}", "title": "" }, { "docid": "7b747f8ed0924085211a66cb71997e48", "score": "0.7099413", "text": "func (client Client) DeleteSnapshot(ctx context.Context, accountName, containerName, blobName string, input DeleteSnapshotInput) (result autorest.Response, err error) {\n\tif accountName == \"\" {\n\t\treturn result, validation.NewError(\"blobs.Client\", \"DeleteSnapshot\", \"`accountName` cannot be an empty string.\")\n\t}\n\tif containerName == \"\" {\n\t\treturn result, validation.NewError(\"blobs.Client\", \"DeleteSnapshot\", \"`containerName` cannot be an empty string.\")\n\t}\n\tif strings.ToLower(containerName) != containerName {\n\t\treturn result, validation.NewError(\"blobs.Client\", \"DeleteSnapshot\", \"`containerName` must be a lower-cased string.\")\n\t}\n\tif blobName == \"\" {\n\t\treturn result, validation.NewError(\"blobs.Client\", \"DeleteSnapshot\", \"`blobName` cannot be an empty string.\")\n\t}\n\tif input.SnapshotDateTime == \"\" {\n\t\treturn result, validation.NewError(\"blobs.Client\", \"DeleteSnapshot\", \"`input.SnapshotDateTime` cannot be an empty string.\")\n\t}\n\n\treq, err := client.DeleteSnapshotPreparer(ctx, accountName, containerName, blobName, input)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"blobs.Client\", \"DeleteSnapshot\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.DeleteSnapshotSender(req)\n\tif err != nil {\n\t\tresult = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"blobs.Client\", \"DeleteSnapshot\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.DeleteSnapshotResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"blobs.Client\", \"DeleteSnapshot\", resp, \"Failure responding to request\")\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "dbcf21e4b5581945e8b9f411dde7dd68", "score": "0.70339614", "text": "func (vm *VM) DiskSnapshotDelete(diskID, snapID int) error {\n\t_, err := client.Call(\"one.vm.disksnapshotdelete\", vm.ID, diskID, snapID)\n\treturn err\n}", "title": "" }, { "docid": "01683486a8e245cabca728b45e6fe101", "score": "0.7012124", "text": "func DestroySnapshot(snap *apis.LVMSnapshot) error {\n\tsnapVolume := snap.Spec.VolGroup + \"/\" + getLVMSnapName(snap.Name)\n\n\tok, err := isSnapshotExists(snap.Spec.VolGroup, getLVMSnapName(snap.Name))\n\tif !ok {\n\t\tklog.Infof(\"lvm: snapshot %s does not exist, skipping deletion\", snapVolume)\n\t\treturn nil\n\t}\n\n\tif err != nil {\n\t\tklog.Errorf(\"lvm: error checking for snapshot %s, error: %v\", snapVolume, err)\n\t\treturn err\n\t}\n\n\targs := buildLVMSnapDestroyArgs(snap)\n\tcmd := exec.Command(LVRemove, args...)\n\tout, err := cmd.CombinedOutput()\n\n\tif err != nil {\n\t\tklog.Errorf(\"lvm: could not remove snapshot %s cmd %v error: %s\", snapVolume, args, string(out))\n\t\treturn err\n\t}\n\n\tklog.Infof(\"removed snapshot %s\", snapVolume)\n\treturn nil\n\n}", "title": "" }, { "docid": "5855ab892ab578df24bb77a6dbc4d6b7", "score": "0.70105106", "text": "func DeleteSnapshot(ctx context.Context, token *Token, href string) (\n\tbool, int, error) {\n\n\turl := fmt.Sprintf(zAppliance + href, token.Name)\n\n\t_, httpStatus, err := MakeRequest(ctx, token, \"DELETE\", url, nil, http.StatusNoContent, nil)\n\tif err != nil {\n\t\treturn false, httpStatus, err\n\t}\n\n\tif httpStatus != http.StatusNoContent {\n\t\tutils.GetLogREST(ctx, 5).Println(\"DeleteFilesystem\", \"http status\", httpStatus)\n\t\tif httpStatus >= 200 && httpStatus < 300 {\n\t\t\treturn false, httpStatus, nil\n\t\t}\n\t}\n\n\treturn true, httpStatus, nil\n}", "title": "" }, { "docid": "b4123b416ffc17fb95405412930a5adc", "score": "0.69656605", "text": "func (d *NASStorageDriver) DeleteSnapshot(snapConfig *storage.SnapshotConfig) error {\n\n\tif d.Config.DebugTraceFlags[\"method\"] {\n\t\tfields := log.Fields{\n\t\t\t\"Method\": \"DeleteSnapshot\",\n\t\t\t\"Type\": \"NASStorageDriver\",\n\t\t\t\"snapshotName\": snapConfig.InternalName,\n\t\t\t\"volumeName\": snapConfig.VolumeInternalName,\n\t\t}\n\t\tlog.WithFields(fields).Debug(\">>>> DeleteSnapshot\")\n\t\tdefer log.WithFields(fields).Debug(\"<<<< DeleteSnapshot\")\n\t}\n\n\treturn DeleteSnapshot(snapConfig, &d.Config, d.API)\n}", "title": "" }, { "docid": "d92736c9e93cf758bb33eb192d517565", "score": "0.6942997", "text": "func (s *SnapshotServiceHandler) Delete(ctx context.Context, snapshotID string) error {\n\turi := \"/v1/snapshot/destroy\"\n\n\tvalues := url.Values{\n\t\t\"SNAPSHOTID\": {snapshotID},\n\t}\n\n\treq, err := s.Client.NewRequest(ctx, http.MethodPost, uri, values)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = s.Client.DoWithContext(ctx, req, nil)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "410010450b0917b067db1c6580de4a72", "score": "0.69356346", "text": "func (p *BlockStore) DeleteSnapshot(snapshotID string) error {\n\treturn p.plugin.DeleteSnapshot(snapshotID)\n}", "title": "" }, { "docid": "f2efd78b31ce84b7073e7152670f2b29", "score": "0.68823487", "text": "func (fc *Client) SnapshotDelete(ctx context.Context, objID string) error {\n\tfc.InDSnapshotObj = objID\n\treturn fc.RetDSnapshotErr\n}", "title": "" }, { "docid": "9d149af0af9891b28eb3b9ea1224df62", "score": "0.6828223", "text": "func (c *ComputeStub) DeleteDiskSnapshot(_ context.Context, _, _ string) (*compute.Operation, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "10c95565028c9b15f6c8a872a1cc1f56", "score": "0.67522967", "text": "func (c *BtrfsConn) RemoveSnapshot(label string) error {\n\tc.Lock()\n\tdefer c.Unlock()\n\tif exists, err := c.snapshotExists(label); err != nil || !exists {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t} else {\n\t\t\treturn fmt.Errorf(\"snapshot %s does not exist\", label)\n\t\t}\n\t}\n\t_, err := runcmd(c.sudoer, \"subvolume\", \"delete\", c.SnapshotPath(label))\n\treturn err\n}", "title": "" }, { "docid": "83eb6d2556de1ec8300939c1e6547e07", "score": "0.66714424", "text": "func Delete(ctx context.Context, snapCli snapshotclient.Interface, name, namespace string) error {\n\treturn snapCli.VolumesnapshotV1alpha1().VolumeSnapshots(namespace).Delete(name, &metav1.DeleteOptions{})\n}", "title": "" }, { "docid": "52544226a0f425470b650beb0e7c4bc3", "score": "0.65021324", "text": "func (c *Client) DeleteVolumeSnapshotRestore(name, namespace string) error {\n\tif err := c.initClient(); err != nil {\n\t\treturn err\n\t}\n\treturn c.stork.StorkV1alpha1().VolumeSnapshotRestores(namespace).Delete(context.TODO(), name, metav1.DeleteOptions{})\n}", "title": "" }, { "docid": "1c3b3c4d7c8f12b9e769cf901cf4bb73", "score": "0.6485817", "text": "func (client *Client) DeleteSnapshotWithOptions(request *DeleteSnapshotRequest, runtime *util.RuntimeOptions) (_result *DeleteSnapshotResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.ClientId)) {\n\t\tquery[\"ClientId\"] = request.ClientId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Force)) {\n\t\tquery[\"Force\"] = request.Force\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.InstanceId)) {\n\t\tquery[\"InstanceId\"] = request.InstanceId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.SnapshotId)) {\n\t\tquery[\"SnapshotId\"] = request.SnapshotId\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.SourceType)) {\n\t\tquery[\"SourceType\"] = request.SourceType\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Token)) {\n\t\tquery[\"Token\"] = request.Token\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.VaultId)) {\n\t\tquery[\"VaultId\"] = request.VaultId\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"DeleteSnapshot\"),\n\t\tVersion: tea.String(\"2017-09-08\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &DeleteSnapshotResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "ddabd2721e4a5a0ff1e3fb214ca09bba", "score": "0.6473236", "text": "func (c *Driver) RemoveSnapshot(snapName string, do storage.DriverOptions) error {\n\tcmd := exec.Command(\"rbd\", \"snap\", \"rm\", do.Volume.Name, \"--snap\", snapName, \"--pool\", do.Volume.Params[\"pool\"])\n\ter, err := executor.NewWithTimeout(cmd, do.Timeout).Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif er.ExitStatus != 0 {\n\t\treturn fmt.Errorf(\"Removing snapshot %q (volume %q): %v\", snapName, do.Volume.Name, er)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "99a981da7e4d2ddfdd94cc0aa37192a6", "score": "0.6455076", "text": "func (c *Client) TimeflowSnapshotDelete(r string) error {\n\tvar err error\n\treturn err\n}", "title": "" }, { "docid": "8b13b1c2bdd9de9cb908664e771b3fab", "score": "0.6401535", "text": "func (m *MockClient) DeleteSnapshot(ctx context.Context, deleteParams *gopowerstore.VolumeDelete, id string) (gopowerstore.EmptyResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteSnapshot\", ctx, deleteParams, id)\n\tret0, _ := ret[0].(gopowerstore.EmptyResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "591171173e6a72a3ce797738863a85f8", "score": "0.6356221", "text": "func (client Client) DeleteSnapshotSender(req *http.Request) (*http.Response, error) {\n\treturn autorest.SendWithSender(client, req,\n\t\tazure.DoRetryWithRegistration(client.Client))\n}", "title": "" }, { "docid": "204683812f999e6ecb11c70c0805c7ad", "score": "0.63115585", "text": "func (j *PVCTestJig) DeleteVolumeSnapshotContent(vscontentName string) error {\n\tif j.SnapClient != nil && len(vscontentName) > 0 {\n\t\tLogf(\"Deleting VolumeSnapshotContent %q\", vscontentName)\n\t\terr := j.SnapClient.SnapshotV1().VolumeSnapshotContents().Delete(context.Background(), vscontentName, metav1.DeleteOptions{})\n\t\tif err != nil && !apierrors.IsNotFound(err) {\n\t\t\treturn fmt.Errorf(\"VolumeSnapshotContent delete API error: %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e38ae77acd638b9305fddc136f535e54", "score": "0.6261202", "text": "func (ctrl *CSISnapshotController) deleteSnapshotData(vsd *storage.VolumeSnapshotData) {\n\toperationName := fmt.Sprintf(\"delete-%s[%s]\", vsd.Name, string(vsd.UID))\n\tglog.V(4).Infof(\"Snapshotter is about to delete volume snapshot and the operation named %s\", operationName)\n\tctrl.scheduleOperation(operationName, func() error {\n\t\treturn ctrl.deleteSnapshotDataOperation(vsd)\n\t})\n}", "title": "" }, { "docid": "46ee949c86f422019887a9294e01f90b", "score": "0.6207201", "text": "func (cli *Client) SnapshotRemove(ctx context.Context, snapshotID string) error {\n\tresp, err := cli.delete(ctx, \"/snapshots/\"+snapshotID, nil, nil)\n\tensureReaderClosed(resp)\n\treturn err\n}", "title": "" }, { "docid": "8cabceb6b382b89ff8dbec3b5442b313", "score": "0.6199009", "text": "func (a *Client) DeleteBlockDeviceSnapshot(params *DeleteBlockDeviceSnapshotParams, opts ...ClientOption) (*DeleteBlockDeviceSnapshotAccepted, *DeleteBlockDeviceSnapshotNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteBlockDeviceSnapshotParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"deleteBlockDeviceSnapshot\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/iaas/api/block-devices/{id}/snapshots/{id1}\",\n\t\tProducesMediaTypes: []string{\"app/json\", \"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &DeleteBlockDeviceSnapshotReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *DeleteBlockDeviceSnapshotAccepted:\n\t\treturn value, nil, nil\n\tcase *DeleteBlockDeviceSnapshotNoContent:\n\t\treturn nil, value, nil\n\t}\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for disk: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "1bc9f95d3c2ae578fcd785d77c25401e", "score": "0.6166658", "text": "func (d *zfs) UnmountVolumeSnapshot(snapVol Volume, op *operations.Operation) (bool, error) {\n\tunlock := snapVol.MountLock()\n\tdefer unlock()\n\n\tvar err error\n\tourUnmount := false\n\tmountPath := snapVol.MountPath()\n\tsnapshotDataset := d.dataset(snapVol, false)\n\n\trefCount := snapVol.MountRefCountDecrement()\n\n\t// For block devices, we make them disappear.\n\tif snapVol.contentType == ContentTypeBlock || snapVol.contentType == ContentTypeFS && d.isBlockBacked(snapVol) {\n\t\t// For VMs, also mount the filesystem dataset.\n\t\tif snapVol.IsVMBlock() {\n\t\t\tfsSnapVol := snapVol.NewVMBlockFilesystemVolume()\n\t\t\tourUnmount, err = d.UnmountVolumeSnapshot(fsSnapVol, op)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t}\n\n\t\tif snapVol.contentType == ContentTypeFS && d.isBlockBacked(snapVol) && filesystem.IsMountPoint(mountPath) {\n\t\t\tif refCount > 0 {\n\t\t\t\td.logger.Debug(\"Skipping unmount as in use\", logger.Ctx{\"volName\": snapVol.name, \"refCount\": refCount})\n\t\t\t\treturn false, ErrInUse\n\t\t\t}\n\n\t\t\t_, err := forceUnmount(mountPath)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\td.logger.Debug(\"Unmounted ZFS snapshot dataset\", logger.Ctx{\"dev\": snapshotDataset, \"path\": mountPath})\n\t\t\tourUnmount = true\n\n\t\t\tparent, snapshotOnlyName, _ := api.GetParentAndSnapshotName(snapVol.Name())\n\t\t\tparentVol := NewVolume(d, d.Name(), snapVol.volType, snapVol.contentType, parent, snapVol.config, snapVol.poolConfig)\n\t\t\tparentDataset := d.dataset(parentVol, false)\n\t\t\tdataset := fmt.Sprintf(\"%s_%s%s\", parentDataset, snapshotOnlyName, tmpVolSuffix)\n\n\t\t\texists, err := d.datasetExists(dataset)\n\t\t\tif err != nil {\n\t\t\t\treturn true, fmt.Errorf(\"Failed to check existence of temporary ZFS snapshot volume %q: %w\", dataset, err)\n\t\t\t}\n\n\t\t\tif exists {\n\t\t\t\terr = d.deleteDatasetRecursive(dataset)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn true, err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tparent, _, _ := api.GetParentAndSnapshotName(snapVol.Name())\n\t\tparentVol := NewVolume(d, d.Name(), snapVol.volType, snapVol.contentType, parent, snapVol.config, snapVol.poolConfig)\n\t\tparentDataset := d.dataset(parentVol, false)\n\n\t\tcurrent, err := d.getDatasetProperty(parentDataset, \"snapdev\")\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\n\t\tif current == \"visible\" {\n\t\t\tif refCount > 0 {\n\t\t\t\td.logger.Debug(\"Skipping unmount as in use\", logger.Ctx{\"volName\": snapVol.name, \"refCount\": refCount})\n\t\t\t\treturn false, ErrInUse\n\t\t\t}\n\n\t\t\terr := d.setDatasetProperties(parentDataset, \"snapdev=hidden\")\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\td.logger.Debug(\"Deactivated ZFS snapshot volume\", logger.Ctx{\"dev\": snapshotDataset})\n\n\t\t\t// Ensure snap volume parent is deactivated in case we activated it when mounting snapshot.\n\t\t\t_, err = d.UnmountVolume(parentVol, false, op)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\tourUnmount = true\n\t\t}\n\t} else if snapVol.contentType == ContentTypeFS && filesystem.IsMountPoint(mountPath) {\n\t\tif refCount > 0 {\n\t\t\td.logger.Debug(\"Skipping unmount as in use\", logger.Ctx{\"volName\": snapVol.name, \"refCount\": refCount})\n\t\t\treturn false, ErrInUse\n\t\t}\n\n\t\t_, err := forceUnmount(mountPath)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\n\t\td.logger.Debug(\"Unmounted ZFS snapshot dataset\", logger.Ctx{\"dev\": snapshotDataset, \"path\": mountPath})\n\t\tourUnmount = true\n\t}\n\n\treturn ourUnmount, nil\n}", "title": "" }, { "docid": "eb223cb9b6de83019336a360002fed79", "score": "0.61489844", "text": "func (mr *MockAzureMockRecorder) DeleteSnapshot(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteSnapshot\", reflect.TypeOf((*MockAzure)(nil).DeleteSnapshot), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "5ebde74fc68a5a4cf00d7f0c6b35a5d6", "score": "0.61084604", "text": "func (client Client) DeleteSnapshotPreparer(ctx context.Context, accountName, containerName, blobName string, input DeleteSnapshotInput) (*http.Request, error) {\n\tpathParameters := map[string]interface{}{\n\t\t\"containerName\": autorest.Encode(\"path\", containerName),\n\t\t\"blobName\": autorest.Encode(\"path\", blobName),\n\t}\n\n\tqueryParameters := map[string]interface{}{\n\t\t\"snapshot\": autorest.Encode(\"query\", input.SnapshotDateTime),\n\t}\n\n\theaders := map[string]interface{}{\n\t\t\"x-ms-version\": APIVersion,\n\t}\n\n\tif input.LeaseID != nil {\n\t\theaders[\"x-ms-lease-id\"] = *input.LeaseID\n\t}\n\n\tpreparer := autorest.CreatePreparer(\n\t\tautorest.AsDelete(),\n\t\tautorest.WithBaseURL(endpoints.GetBlobEndpoint(client.BaseURI, accountName)),\n\t\tautorest.WithPathParameters(\"/{containerName}/{blobName}\", pathParameters),\n\t\tautorest.WithQueryParameters(queryParameters),\n\t\tautorest.WithHeaders(headers))\n\treturn preparer.Prepare((&http.Request{}).WithContext(ctx))\n}", "title": "" }, { "docid": "8346b1a0d82f9d6962bd9fccb20db35b", "score": "0.6095823", "text": "func (mr *MockBackendMockRecorder) DeleteSnapshot(arg0, arg1, arg2 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteSnapshot\", reflect.TypeOf((*MockBackend)(nil).DeleteSnapshot), arg0, arg1, arg2)\n}", "title": "" }, { "docid": "d9610b12ce2032d16de7e482941dbeb8", "score": "0.60878956", "text": "func (d *driver) SnapshotRemove(\n\tctx types.Context,\n\tsnapshotID string,\n\topts types.Store) error {\n\t// TODO Snapshots are not implemented yet\n\treturn types.ErrNotImplemented\n}", "title": "" }, { "docid": "c7532396eb7f53e6d64a5a313c95d6a3", "score": "0.6043814", "text": "func (o EcsDiskOutput) DeleteAutoSnapshot() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *EcsDisk) pulumi.BoolPtrOutput { return v.DeleteAutoSnapshot }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "d05a4248a09bc8ca631ad900806adc2d", "score": "0.6022762", "text": "func (c *Client) TimeflowSnapshotDelete(r string) ( error) {\nvar err error\nreturn err\n}", "title": "" }, { "docid": "f9be6b7e51395ea4d87077c5ea092b01", "score": "0.60085976", "text": "func (mr *MockStoreClientMockRecorder) DeleteSnapshot(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteSnapshot\", reflect.TypeOf((*MockStoreClient)(nil).DeleteSnapshot), arg0, arg1)\n}", "title": "" }, { "docid": "74369b869ab10d30c39eadf8582ad753", "score": "0.59118325", "text": "func (c *UHostClient) NewDeleteSnapshotRequest() *DeleteSnapshotRequest {\n\treq := &DeleteSnapshotRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(true)\n\treturn req\n}", "title": "" }, { "docid": "65bc1997fe172c61b5d4b4aadbdfe2f0", "score": "0.5897881", "text": "func (o GetEcsDisksDiskOutput) DeleteAutoSnapshot() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetEcsDisksDisk) bool { return v.DeleteAutoSnapshot }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "49366e1ec284d83843a292342a6e8917", "score": "0.5895358", "text": "func (s *Snapshot) Delete() error {\n\tobjects, err := s.Manager.Swift.Objects(s.Manager.Container, &swift.ObjectsOpts{\n\t\tPrefix: s.Name + \"/\",\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to read snapshot %q: %v\", s.Name, err)\n\t}\n\tif len(objects) == 0 {\n\t\treturn fmt.Errorf(\"snapshot or snapshot objects not found\")\n\t}\n\n\terrors := 0\n\tfor _, object := range objects {\n\t\tif object.PseudoDirectory {\n\t\t\tcontinue\n\t\t}\n\t\tlog.Printf(\"Deleting %q\", object.Name)\n\t\terr = s.Manager.Swift.ObjectDelete(s.Manager.Container, object.Name)\n\t\tif err != nil {\n\t\t\terrors += 1\n\t\t\tlog.Printf(\"Failed to delete %q: %v\", object.Name, err)\n\t\t}\n\t}\n\tif errors != 0 {\n\t\treturn fmt.Errorf(\"failed to delete %d objects\", errors)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3c559e842fc6f3373bc30736494fe479", "score": "0.5890614", "text": "func (a StorageSnapshotsApi) DeleteStorageSnapshot(name string, cookie string) (*APIResponse, error) {\n\n\tvar localVarHttpMethod = strings.ToUpper(\"Delete\")\n\t// create path and map variables\n\tlocalVarPath := a.Configuration.BasePath + \"/storage/snapshot/{name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", fmt.Sprintf(\"%v\", name), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := make(map[string]string)\n\tvar localVarPostBody interface{}\n\tvar localVarFileName string\n\tvar localVarFileBytes []byte\n\t// add default headers if any\n\tfor key := range a.Configuration.DefaultHeader {\n\t\tlocalVarHeaderParams[key] = a.Configuration.DefaultHeader[key]\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/oracle-compute-v3+json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := a.Configuration.APIClient.SelectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/oracle-compute-v3+json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := a.Configuration.APIClient.SelectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// header params \"Cookie\"\n\tlocalVarHeaderParams[\"Cookie\"] = a.Configuration.APIClient.ParameterToString(cookie, \"\")\n\tlocalVarHttpResponse, err := a.Configuration.APIClient.CallAPI(localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\n\tvar localVarURL, _ = url.Parse(localVarPath)\n\tlocalVarURL.RawQuery = localVarQueryParams.Encode()\n\tvar localVarAPIResponse = &APIResponse{Operation: \"DeleteStorageSnapshot\", Method: localVarHttpMethod, RequestURL: localVarURL.String()}\n\tif localVarHttpResponse != nil {\n\t\tlocalVarAPIResponse.Response = localVarHttpResponse.RawResponse\n\t\tlocalVarAPIResponse.Payload = localVarHttpResponse.Body()\n\t}\n\n\tif err != nil {\n\t\treturn localVarAPIResponse, err\n\t}\n\treturn localVarAPIResponse, err\n}", "title": "" }, { "docid": "70737ddfe20772d2f674d1c7f4663072", "score": "0.5872097", "text": "func (s *SwiftSnapStore) Delete(snap brtypes.Snapshot) error {\n\tresult := objects.Delete(s.client, s.bucket, path.Join(snap.Prefix, snap.SnapDir, snap.SnapName), nil)\n\treturn result.Err\n}", "title": "" }, { "docid": "4c3075cb8a0d2ea731d5bb2976948506", "score": "0.58697885", "text": "func (client Client) DeleteSnapshotResponder(resp *http.Response) (result autorest.Response, err error) {\n\terr = autorest.Respond(\n\t\tresp,\n\t\tclient.ByInspecting(),\n\t\tazure.WithErrorUnlessStatusCode(http.StatusAccepted),\n\t\tautorest.ByClosing())\n\tresult = autorest.Response{Response: resp}\n\treturn\n}", "title": "" }, { "docid": "5d239863402cb63ca123623363710bb5", "score": "0.5868016", "text": "func (cli *NopClient) SnapshotRemove(ctx context.Context, snapshotID string) error {\n\treturn errNoEngine\n}", "title": "" }, { "docid": "0396bccc337e9b8ed1f725d29d4f3a9c", "score": "0.5865122", "text": "func (mr *MockClientMockRecorder) DeleteSnapshot(ctx, deleteParams, id interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"DeleteSnapshot\", reflect.TypeOf((*MockClient)(nil).DeleteSnapshot), ctx, deleteParams, id)\n}", "title": "" }, { "docid": "5822b8a6f63e55cdd81c8cd95639e6ee", "score": "0.5850301", "text": "func NewCmdSnapshotDelete(out io.Writer) *cobra.Command {\n\tvar snapshotIds *[]string\n\treq := base.BizClient.NewDeleteSnapshotRequest()\n\tcmd := &cobra.Command{\n\t\tUse: \"delete-snapshot\",\n\t\tShort: \"Delete snapshots\",\n\t\tLong: \"Delete snapshots\",\n\t\tRun: func(c *cobra.Command, args []string) {\n\t\t\tfor _, snapshotID := range *snapshotIds {\n\t\t\t\treq.SnapshotId = sdk.String(base.PickResourceID(snapshotID))\n\t\t\t\tresp, err := base.BizClient.DeleteSnapshot(req)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbase.HandleError(err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tfmt.Fprintf(out, \"snapshot[%s] deleted\\n\", resp.SnapshotId)\n\t\t\t}\n\t\t},\n\t}\n\n\tflags := cmd.Flags()\n\tflags.SortFlags = false\n\n\treq.ProjectId = flags.String(\"project-id\", base.ConfigIns.ProjectID, \"Optional. Assign project-id\")\n\treq.Region = flags.String(\"region\", base.ConfigIns.Region, \"Optional. Assign region\")\n\treq.Zone = flags.String(\"zone\", base.ConfigIns.Zone, \"Optional. Assign availability zone\")\n\tsnapshotIds = flags.StringSlice(\"snaphost-id\", nil, \"Optional. Resource ID of snapshots to delete\")\n\tcmd.MarkFlagRequired(\"snapshot-id\")\n\treturn cmd\n}", "title": "" }, { "docid": "e72f9e00a3645fb242dc3cd976310540", "score": "0.58321697", "text": "func (c *Driver) CreateSnapshot(snapName string, do storage.DriverOptions) error {\n\tsnapName = strings.Replace(snapName, \" \", \"-\", -1)\n\tcmd := exec.Command(\"rbd\", \"snap\", \"create\", do.Volume.Name, \"--snap\", snapName, \"--pool\", do.Volume.Params[\"pool\"])\n\ter, err := executor.NewWithTimeout(cmd, do.Timeout).Run()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif er.ExitStatus != 0 {\n\t\treturn fmt.Errorf(\"Creating snapshot %q (volume %q): %v\", snapName, do.Volume.Name, er)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0461ae09fedc70998ee5e0679e8707df", "score": "0.582404", "text": "func (_m *Client) DeleteVolumeSnapshot(ctx *context.Context, snapshotID string) error {\n\tret := _m.Called(ctx, snapshotID)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*context.Context, string) error); ok {\n\t\tr0 = rf(ctx, snapshotID)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "71afe78e29bcbb619ef9e2c5c386045a", "score": "0.57865477", "text": "func (d *zfs) CreateVolumeSnapshot(vol Volume, op *operations.Operation) error {\n\tparentName, _, _ := api.GetParentAndSnapshotName(vol.name)\n\n\t// Revert handling.\n\trevert := revert.New()\n\tdefer revert.Fail()\n\n\t// Create the parent directory.\n\terr := createParentSnapshotDirIfMissing(d.name, vol.volType, parentName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Create snapshot directory.\n\terr = vol.EnsureMountPath()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Make the snapshot.\n\t_, err = shared.RunCommand(\"zfs\", \"snapshot\", d.dataset(vol, false))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trevert.Add(func() { _ = d.DeleteVolumeSnapshot(vol, op) })\n\n\t// For VM images, create a filesystem volume too.\n\tif vol.IsVMBlock() {\n\t\tfsVol := vol.NewVMBlockFilesystemVolume()\n\t\terr := d.CreateVolumeSnapshot(fsVol, op)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\trevert.Add(func() { _ = d.DeleteVolumeSnapshot(fsVol, op) })\n\t}\n\n\t// All done.\n\trevert.Success()\n\n\treturn nil\n}", "title": "" }, { "docid": "d0ddb42816be15eea49909d5a3452301", "score": "0.5782601", "text": "func (m *MockAzure) DeleteSnapshot(arg0 context.Context, arg1 *api.FileSystem, arg2 *api.Snapshot) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteSnapshot\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "bde187b035ead049dce4da6eeba3a332", "score": "0.5768296", "text": "func RunVolumeSnapshot(c *CmdConfig) error {\n\tvar err error\n\tif len(c.Args) == 0 {\n\t\treturn doctl.NewMissingArgsErr(c.NS)\n\t}\n\n\tid := c.Args[0]\n\n\tname, err := c.Doit.GetString(c.NS, doctl.ArgSnapshotName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdesc, err := c.Doit.GetString(c.NS, doctl.ArgSnapshotDesc)\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\ttags, err := c.Doit.GetStringSlice(c.NS, doctl.ArgTag)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treq := &godo.SnapshotCreateRequest{\n\t\tVolumeID: id,\n\t\tName: name,\n\t\tDescription: desc,\n\t\tTags: tags,\n\t}\n\n\t_, err = c.Volumes().CreateSnapshot(req)\n\treturn err\n}", "title": "" }, { "docid": "cc34b355f4368e0c6fc0ed7ac4c23173", "score": "0.5765004", "text": "func DeleteAndWaitSnapshot(dc dynamic.Interface, ns string, snapshotName string, poll, timeout time.Duration) error {\n\tvar err error\n\tginkgo.By(\"deleting the snapshot\")\n\terr = dc.Resource(SnapshotGVR).Namespace(ns).Delete(context.TODO(), snapshotName, metav1.DeleteOptions{})\n\tif err != nil && !apierrors.IsNotFound(err) {\n\t\treturn err\n\t}\n\n\tginkgo.By(\"checking the Snapshot has been deleted\")\n\terr = utils.WaitForNamespacedGVRDeletion(dc, SnapshotGVR, ns, snapshotName, poll, timeout)\n\n\treturn err\n}", "title": "" }, { "docid": "d77be6f0383be52b20637b462fc56dd0", "score": "0.5748342", "text": "func (d *Driver) CreateSnapshot(ctx context.Context, req *csi.CreateSnapshotRequest) (*csi.CreateSnapshotResponse, error) {\n\tsourceVolumeID := req.GetSourceVolumeId()\n\tif len(sourceVolumeID) == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"CreateSnapshot Source Volume ID must be provided\")\n\t}\n\tsnapshotName := req.Name\n\tif len(snapshotName) == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"snapshot name must be provided\")\n\t}\n\n\tsnapshotName = azureutils.CreateValidDiskName(snapshotName)\n\n\tvar customTags string\n\t// set incremental snapshot as true by default\n\tincremental := true\n\tvar subsID, resourceGroup, dataAccessAuthMode string\n\tvar err error\n\tlocalCloud := d.cloud\n\tlocation := d.cloud.Location\n\n\tparameters := req.GetParameters()\n\tfor k, v := range parameters {\n\t\tswitch strings.ToLower(k) {\n\t\tcase consts.TagsField:\n\t\t\tcustomTags = v\n\t\tcase consts.IncrementalField:\n\t\t\tif v == \"false\" {\n\t\t\t\tincremental = false\n\t\t\t}\n\t\tcase consts.ResourceGroupField:\n\t\t\tresourceGroup = v\n\t\tcase consts.LocationField:\n\t\t\tlocation = v\n\t\tcase consts.UserAgentField:\n\t\t\tnewUserAgent := v\n\t\t\tlocalCloud, err = azureutils.GetCloudProvider(ctx, d.kubeconfig, d.cloudConfigSecretName, d.cloudConfigSecretNamespace, newUserAgent,\n\t\t\t\td.allowEmptyCloudConfig, d.enableTrafficManager, d.trafficManagerPort)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, status.Errorf(codes.Internal, \"create cloud with UserAgent(%s) failed with: (%s)\", newUserAgent, err)\n\t\t\t}\n\t\tcase consts.SubscriptionIDField:\n\t\t\tsubsID = v\n\t\tcase consts.DataAccessAuthModeField:\n\t\t\tdataAccessAuthMode = v\n\t\tdefault:\n\t\t\treturn nil, status.Errorf(codes.Internal, \"AzureDisk - invalid option %s in VolumeSnapshotClass\", k)\n\t\t}\n\t}\n\n\tif azureutils.IsAzureStackCloud(localCloud.Config.Cloud, localCloud.Config.DisableAzureStackCloud) {\n\t\tklog.V(2).Info(\"Use full snapshot instead as Azure Stack does not support incremental snapshot.\")\n\t\tincremental = false\n\t}\n\n\tif resourceGroup == \"\" {\n\t\tresourceGroup, err = azureutils.GetResourceGroupFromURI(sourceVolumeID)\n\t\tif err != nil {\n\t\t\treturn nil, status.Errorf(codes.InvalidArgument, \"could not get resource group from diskURI(%s) with error(%v)\", sourceVolumeID, err)\n\t\t}\n\t}\n\n\tcustomTagsMap, err := volumehelper.ConvertTagsToMap(customTags)\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.InvalidArgument, err.Error())\n\t}\n\ttags := make(map[string]*string)\n\tfor k, v := range customTagsMap {\n\t\tvalue := v\n\t\ttags[k] = &value\n\t}\n\n\tsnapshot := compute.Snapshot{\n\t\tSnapshotProperties: &compute.SnapshotProperties{\n\t\t\tCreationData: &compute.CreationData{\n\t\t\t\tCreateOption: compute.Copy,\n\t\t\t\tSourceResourceID: &sourceVolumeID,\n\t\t\t},\n\t\t\tIncremental: &incremental,\n\t\t},\n\t\tLocation: &d.cloud.Location,\n\t\tTags: tags,\n\t}\n\n\tif dataAccessAuthMode != \"\" {\n\t\tif err := azureutils.ValidateDataAccessAuthMode(dataAccessAuthMode); err != nil {\n\t\t\treturn nil, status.Error(codes.InvalidArgument, err.Error())\n\t\t}\n\t\tsnapshot.SnapshotProperties.DataAccessAuthMode = compute.DataAccessAuthMode(dataAccessAuthMode)\n\t}\n\n\tif acquired := d.volumeLocks.TryAcquire(snapshotName); !acquired {\n\t\treturn nil, status.Errorf(codes.Aborted, volumeOperationAlreadyExistsFmt, snapshotName)\n\t}\n\tdefer d.volumeLocks.Release(snapshotName)\n\n\tvar crossRegionSnapshotName string\n\tif location != \"\" && location != d.cloud.Location {\n\t\tif incremental {\n\t\t\tcrossRegionSnapshotName = snapshotName\n\t\t\tsnapshotName = azureutils.CreateValidDiskName(\"local_\" + snapshotName)\n\t\t} else {\n\t\t\treturn nil, status.Errorf(codes.InvalidArgument, \"could not create snapshot cross region with incremental is false\")\n\t\t}\n\t}\n\n\tmc := metrics.NewMetricContext(consts.AzureDiskCSIDriverName, \"controller_create_snapshot\", d.cloud.ResourceGroup, d.cloud.SubscriptionID, d.Name)\n\tisOperationSucceeded := false\n\tdefer func() {\n\t\tmc.ObserveOperationWithResult(isOperationSucceeded, consts.SourceResourceID, sourceVolumeID, consts.SnapshotName, snapshotName)\n\t}()\n\n\tklog.V(2).Infof(\"begin to create snapshot(%s, incremental: %v) under rg(%s) region(%s)\", snapshotName, incremental, resourceGroup, d.cloud.Location)\n\tif rerr := d.cloud.SnapshotsClient.CreateOrUpdate(ctx, subsID, resourceGroup, snapshotName, snapshot); rerr != nil {\n\t\tif strings.Contains(rerr.Error().Error(), \"existing disk\") {\n\t\t\treturn nil, status.Error(codes.AlreadyExists, fmt.Sprintf(\"request snapshot(%s) under rg(%s) already exists, but the SourceVolumeId is different, error details: %v\", snapshotName, resourceGroup, rerr.Error()))\n\t\t}\n\n\t\tazureutils.SleepIfThrottled(rerr.Error(), consts.SnapshotOpThrottlingSleepSec)\n\t\treturn nil, status.Error(codes.Internal, fmt.Sprintf(\"create snapshot error: %v\", rerr.Error()))\n\t}\n\tklog.V(2).Infof(\"create snapshot(%s) under rg(%s) region(%s) successfully\", snapshotName, resourceGroup, d.cloud.Location)\n\n\tcsiSnapshot, err := d.getSnapshotByID(ctx, subsID, resourceGroup, snapshotName, sourceVolumeID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif crossRegionSnapshotName != \"\" {\n\t\tcopySnapshot := snapshot\n\t\tif copySnapshot.SnapshotProperties == nil {\n\t\t\tcopySnapshot.SnapshotProperties = &compute.SnapshotProperties{}\n\t\t}\n\t\tif copySnapshot.SnapshotProperties.CreationData == nil {\n\t\t\tcopySnapshot.SnapshotProperties.CreationData = &compute.CreationData{}\n\t\t}\n\t\tcopySnapshot.SnapshotProperties.CreationData.SourceResourceID = &csiSnapshot.SnapshotId\n\t\tcopySnapshot.SnapshotProperties.CreationData.CreateOption = compute.CopyStart\n\t\tcopySnapshot.Location = &location\n\n\t\tklog.V(2).Infof(\"begin to create snapshot(%s, incremental: %v) under rg(%s) region(%s)\", crossRegionSnapshotName, incremental, resourceGroup, location)\n\t\tif rerr := d.cloud.SnapshotsClient.CreateOrUpdate(ctx, subsID, resourceGroup, crossRegionSnapshotName, copySnapshot); rerr != nil {\n\t\t\tif strings.Contains(rerr.Error().Error(), \"existing disk\") {\n\t\t\t\treturn nil, status.Error(codes.AlreadyExists, fmt.Sprintf(\"request snapshot(%s) under rg(%s) already exists, but the SourceVolumeId is different, error details: %v\", crossRegionSnapshotName, resourceGroup, rerr.Error()))\n\t\t\t}\n\n\t\t\tazureutils.SleepIfThrottled(rerr.Error(), consts.SnapshotOpThrottlingSleepSec)\n\t\t\treturn nil, status.Error(codes.Internal, fmt.Sprintf(\"create snapshot error: %v\", rerr.Error()))\n\t\t}\n\t\tklog.V(2).Infof(\"create snapshot(%s) under rg(%s) region(%s) successfully\", crossRegionSnapshotName, resourceGroup, location)\n\n\t\tif err := d.waitForSnapshotCopy(ctx, subsID, resourceGroup, crossRegionSnapshotName, waitForSnapshotCopyInterval, waitForSnapshotCopyTimeout); err != nil {\n\t\t\treturn nil, status.Error(codes.Internal, fmt.Sprintf(\"failed to wait for snapshot copy cross region: %v\", err.Error()))\n\t\t}\n\n\t\tklog.V(2).Infof(\"begin to delete snapshot(%s) under rg(%s) region(%s)\", snapshotName, resourceGroup, d.cloud.Location)\n\t\tif rerr := d.cloud.SnapshotsClient.Delete(ctx, subsID, resourceGroup, snapshotName); rerr != nil {\n\t\t\tklog.Errorf(\"delete snapshot error: %v\", rerr.Error())\n\t\t\tazureutils.SleepIfThrottled(rerr.Error(), consts.SnapshotOpThrottlingSleepSec)\n\t\t} else {\n\t\t\tklog.V(2).Infof(\"delete snapshot(%s) under rg(%s) region(%s) successfully\", snapshotName, resourceGroup, d.cloud.Location)\n\t\t}\n\n\t\tcsiSnapshot, err = d.getSnapshotByID(ctx, subsID, resourceGroup, crossRegionSnapshotName, sourceVolumeID)\n\t\tif err != nil {\n\t\t\treturn nil, status.Error(codes.Internal, err.Error())\n\t\t}\n\t}\n\n\tcreateResp := &csi.CreateSnapshotResponse{\n\t\tSnapshot: csiSnapshot,\n\t}\n\tisOperationSucceeded = true\n\treturn createResp, nil\n}", "title": "" }, { "docid": "55c74501c4ee3e31831a758f437ca300", "score": "0.5744867", "text": "func (d *driver) VolumeSnapshot(\n\tctx types.Context,\n\tvolumeID, snapshotName string,\n\topts types.Store) (*types.Snapshot, error) {\n\t// TODO Snapshots are not implemented yet\n\treturn nil, types.ErrNotImplemented\n}", "title": "" }, { "docid": "ffb32bcbd62f55f15ce39240f094b059", "score": "0.57348806", "text": "func (m *MockBackend) DeleteSnapshot(arg0 context.Context, arg1 *storage.SnapshotConfig, arg2 *storage.VolumeConfig) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteSnapshot\", arg0, arg1, arg2)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "aa38b0051684a7d76c7481d9bd0bd0b0", "score": "0.5729156", "text": "func (ctrl *CSISnapshotController) deleteSnapshotDataOperation(vsd *storage.VolumeSnapshotData) error {\n\tglog.V(4).Infof(\"deleteSnapshotOperation [%s] started\", vsd.Name)\n\n\terr := ctrl.handler.deleteSnapshot(vsd)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete snapshot %#v, err: %v\", vsd.Name, err)\n\t}\n\n\terr = ctrl.client.StorageV1alpha1().VolumeSnapshotDatas().Delete(vsd.Name, &metav1.DeleteOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to delete VolumeSnapshotData %s from API server: %q\", vsd.Name, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9dd378fe414d0a1ee83128b1648f9049", "score": "0.57274103", "text": "func (c *Client) DeleteClusterSnapshot(ctx context.Context, params *DeleteClusterSnapshotInput, optFns ...func(*Options)) (*DeleteClusterSnapshotOutput, error) {\n\tif params == nil {\n\t\tparams = &DeleteClusterSnapshotInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"DeleteClusterSnapshot\", params, optFns, addOperationDeleteClusterSnapshotMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*DeleteClusterSnapshotOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "ea6378e1fc9fd4c132e0fdc43b31d2d7", "score": "0.5723952", "text": "func (a *SnapshotsApiService) SnapshotsDelete(ctx _context.Context, snapshotId string) ApiSnapshotsDeleteRequest {\n\treturn ApiSnapshotsDeleteRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tsnapshotId: snapshotId,\n\t}\n}", "title": "" }, { "docid": "a2249c82c7fd998c5df82f88e112c49d", "score": "0.5691039", "text": "func (c *Client) RemoveTakeSnapshot(name string) error {\n\t_, err := c.etcdClient.Delete(context.Background(), c.prefixed(rootSnapshots, name), nil)\n\treturn errors.EtcdToErrored(err)\n}", "title": "" }, { "docid": "bf4a13150340a48de491748b0f59d078", "score": "0.56907386", "text": "func (m *MockKinesisAnalyticsV2API) DeleteApplicationSnapshot(arg0 *kinesisanalyticsv2.DeleteApplicationSnapshotInput) (*kinesisanalyticsv2.DeleteApplicationSnapshotOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteApplicationSnapshot\", arg0)\n\tret0, _ := ret[0].(*kinesisanalyticsv2.DeleteApplicationSnapshotOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "cacd29ddc3840ba51f2d05ef745e4e04", "score": "0.5682351", "text": "func CreateVolumeSnapshot(clientSet *csiV1.Clientset, namespace string, pvc string) (string, error) {\n\tnow := time.Now().Unix()\n\tvar snapshot snapshotV1.VolumeSnapshot\n\n\tsnapshotValues := SnapshotValues{\n\t\tSnapshotName: fmt.Sprintf(\"%d-%s\", now, pvc),\n\t\tNamespace: namespace,\n\t\tPVCName: pvc,\n\t}\n\n\terr := ParseK8STemplate(\n\t\tSnapshotTemplate,\n\t\t\"volumeSnapshot\",\n\t\t&snapshotValues,\n\t\t&snapshot,\n\t)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t_, err = clientSet.SnapshotV1().VolumeSnapshots(namespace).Create(\n\t\tcontext.TODO(),\n\t\t&snapshot,\n\t\tmetaV1.CreateOptions{},\n\t)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn snapshot.Name, nil\n}", "title": "" }, { "docid": "542052a8046f9baf5a645de4971090ef", "score": "0.56754553", "text": "func (s *Server) RunVolumeSnapDeleteCommand(ctx context.Context, in *v1alpha1.VolumeSnapDeleteRequest) (*v1alpha1.VolumeSnapDeleteResponse, error) {\n\tklog.Infof(\"Received snapshot delete request. volname = %s, snapname = %s, version = %d\", in.Volume, in.Snapname, in.Version)\n\tvolcmd, err := DeleteSnapshot(ctx, in)\n\treturn volcmd, err\n}", "title": "" }, { "docid": "fe8beaff0368a170bf88337b48c51ba6", "score": "0.5640869", "text": "func (m *MockZapiClientInterface) SnapshotDelete(arg0, arg1 string) (*azgo.SnapshotDeleteResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SnapshotDelete\", arg0, arg1)\n\tret0, _ := ret[0].(*azgo.SnapshotDeleteResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "23e6d89c728ce7600a6684eee795afb6", "score": "0.5632775", "text": "func (s *storageBtrfs) subvolSnapshot(source string, dest string, readonly bool) error {\n\tvar out []byte\n\tvar err error\n\tif readonly {\n\t\tout, err = exec.Command(\n\t\t\t\"btrfs\",\n\t\t\t\"subvolume\",\n\t\t\t\"snapshot\",\n\t\t\t\"-r\",\n\t\t\tsource,\n\t\t\tdest).CombinedOutput()\n\t} else {\n\t\tout, err = exec.Command(\n\t\t\t\"btrfs\",\n\t\t\t\"subvolume\",\n\t\t\t\"snapshot\",\n\t\t\tsource,\n\t\t\tdest).CombinedOutput()\n\t}\n\tif err != nil {\n\t\ts.log.Error(\n\t\t\t\"subvolume snapshot failed\",\n\t\t\tlog.Ctx{\"source\": source, \"dest\": dest, \"output\": out},\n\t\t)\n\t\treturn fmt.Errorf(\n\t\t\t\"subvolume snapshot failed, source=%s, dest=%s, output=%s\",\n\t\t\tsource,\n\t\t\tdest,\n\t\t\tout,\n\t\t)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "b7d2455a463e524d6aeaa1c577280d43", "score": "0.56264496", "text": "func (d *zfs) RestoreVolume(vol Volume, snapshotName string, op *operations.Operation) error {\n\tsnapVol := NewVolume(d, d.name, vol.volType, vol.contentType, fmt.Sprintf(\"%s/%s\", vol.name, snapshotName), vol.config, vol.poolConfig)\n\n\t// Get the list of snapshots.\n\tentries, err := d.getDatasets(d.dataset(vol, false))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Check if more recent snapshots exist.\n\tidx := -1\n\tsnapshots := []string{}\n\tfor i, entry := range entries {\n\t\tif entry == fmt.Sprintf(\"@snapshot-%s\", snapshotName) {\n\t\t\t// Located the current snapshot.\n\t\t\tidx = i\n\t\t\tcontinue\n\t\t} else if idx < 0 {\n\t\t\t// Skip any previous snapshot.\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.HasPrefix(entry, \"@snapshot-\") {\n\t\t\t// Located a normal snapshot following ours.\n\t\t\tsnapshots = append(snapshots, strings.TrimPrefix(entry, \"@snapshot-\"))\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.HasPrefix(entry, \"@\") {\n\t\t\t// Located an internal snapshot.\n\t\t\treturn fmt.Errorf(\"Snapshot %q cannot be restored due to subsequent internal snapshot(s) (from a copy)\", snapshotName)\n\t\t}\n\t}\n\n\t// Check if snapshot removal is allowed.\n\tif len(snapshots) > 0 {\n\t\tif shared.IsFalseOrEmpty(vol.ExpandedConfig(\"zfs.remove_snapshots\")) {\n\t\t\treturn fmt.Errorf(\"Snapshot %q cannot be restored due to subsequent snapshot(s). Set zfs.remove_snapshots to override\", snapshotName)\n\t\t}\n\n\t\t// Setup custom error to tell the backend what to delete.\n\t\terr := ErrDeleteSnapshots{}\n\t\terr.Snapshots = snapshots\n\t\treturn err\n\t}\n\n\t// Restore the snapshot.\n\t_, err = shared.RunCommand(\"zfs\", \"rollback\", d.dataset(snapVol, false))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif vol.contentType == ContentTypeFS && d.isBlockBacked(vol) && renegerateFilesystemUUIDNeeded(vol.ConfigBlockFilesystem()) {\n\t\t_, err = d.activateVolume(vol)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tdefer func() { _, _ = d.deactivateVolume(vol) }()\n\n\t\tvolPath, err := d.GetVolumeDiskPath(vol)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\td.logger.Debug(\"Regenerating filesystem UUID\", logger.Ctx{\"dev\": volPath, \"fs\": vol.ConfigBlockFilesystem()})\n\t\terr = regenerateFilesystemUUID(vol.ConfigBlockFilesystem(), volPath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// For VM images, restore the associated filesystem dataset too.\n\tif vol.IsVMBlock() {\n\t\tfsVol := vol.NewVMBlockFilesystemVolume()\n\t\terr := d.RestoreVolume(fsVol, snapshotName, op)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b783ee92662b6606ff3c00f9ca426e58", "score": "0.56183416", "text": "func (c *containerdCAS) RemoveSnapshot(snapshotID string) error {\n\tif err := containerd.CtrRemoveSnapshot(snapshotID); err != nil && !isNotFoundError(err) {\n\t\treturn fmt.Errorf(\"RemoveSnapshot: Exception while removing snapshot: %s. %s\", snapshotID, err.Error())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8828c0c39de1c0efa8185381979c761d", "score": "0.5606646", "text": "func CreateSnapshot(\n\tsnapConfig *storage.SnapshotConfig, config *drivers.OntapStorageDriverConfig, client *api.Client,\n\tsizeGetter func(string) (int, error),\n) (*storage.Snapshot, error) {\n\n\tinternalSnapName := snapConfig.InternalName\n\tinternalVolName := snapConfig.VolumeInternalName\n\n\tif config.DebugTraceFlags[\"method\"] {\n\t\tfields := log.Fields{\n\t\t\t\"Method\": \"CreateSnapshot\",\n\t\t\t\"Type\": \"ontap_common\",\n\t\t\t\"snapshotName\": internalSnapName,\n\t\t\t\"volumeName\": internalVolName,\n\t\t}\n\t\tlog.WithFields(fields).Debug(\">>>> CreateSnapshot\")\n\t\tdefer log.WithFields(fields).Debug(\"<<<< CreateSnapshot\")\n\t}\n\n\t// If the specified volume doesn't exist, return error\n\tvolExists, err := client.VolumeExists(internalVolName)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error checking for existing volume: %v\", err)\n\t}\n\tif !volExists {\n\t\treturn nil, fmt.Errorf(\"volume %s does not exist\", internalVolName)\n\t}\n\n\tsize, err := sizeGetter(internalVolName)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error reading volume size: %v\", err)\n\t}\n\n\tsnapResponse, err := client.SnapshotCreate(internalSnapName, internalVolName)\n\tif err = api.GetError(snapResponse, err); err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create snapshot: %v\", err)\n\t}\n\n\t// Fetching list of snapshots to get snapshot access time\n\tsnapListResponse, err := client.SnapshotList(internalVolName)\n\tif err = api.GetError(snapListResponse, err); err != nil {\n\t\treturn nil, fmt.Errorf(\"error enumerating snapshots: %v\", err)\n\t}\n\tif snapListResponse.Result.AttributesListPtr != nil {\n\t\tfor _, snap := range snapListResponse.Result.AttributesListPtr.SnapshotInfoPtr {\n\t\t\tif snap.Name() == internalSnapName {\n\t\t\t\treturn &storage.Snapshot{\n\t\t\t\t\tConfig: snapConfig,\n\t\t\t\t\tCreated: time.Unix(int64(snap.AccessTime()), 0).UTC().Format(storage.SnapshotTimestampFormat),\n\t\t\t\t\tSizeBytes: int64(size),\n\t\t\t\t}, nil\n\t\t\t}\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"could not find snapshot %s for souce volume %s\", internalSnapName, internalVolName)\n}", "title": "" }, { "docid": "61e61387d347dc31e44cd8db512cc7a4", "score": "0.559232", "text": "func (rs *RocksDBStore) ReleaseSnapshot(snapshot *gorocksdb.Snapshot) {\n\trs.db.ReleaseSnapshot(snapshot)\n}", "title": "" }, { "docid": "0abf1fadf5171ac18ad0c647fdd0af00", "score": "0.55742776", "text": "func (ks *KopiaSnapshotter) RestoreSnapshot(snapID, restoreDir string) (err error) {\n\t_, _, err = ks.Runner.Run(\"snapshot\", \"restore\", snapID, restoreDir)\n\treturn err\n}", "title": "" }, { "docid": "5ff20cb9ae0c0262f02269a2935911e7", "score": "0.5571783", "text": "func (d *zfs) MountVolumeSnapshot(snapVol Volume, op *operations.Operation) error {\n\tunlock := snapVol.MountLock()\n\tdefer unlock()\n\n\t_, err := d.mountVolumeSnapshot(snapVol, d.dataset(snapVol, false), snapVol.MountPath(), op)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsnapVol.MountRefCountIncrement() // From here on it is up to caller to call UnmountVolumeSnapshot() when done.\n\treturn nil\n}", "title": "" }, { "docid": "f0ae6a61ec5e6085a95c3e4c09f923ea", "score": "0.55702275", "text": "func (mr *MockZapiClientInterfaceMockRecorder) SnapshotDelete(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SnapshotDelete\", reflect.TypeOf((*MockZapiClientInterface)(nil).SnapshotDelete), arg0, arg1)\n}", "title": "" }, { "docid": "dcdae063465259016447614d11ed8c40", "score": "0.55610186", "text": "func (dfs *DistributedFilesystem) DeleteSnapshots(tenantID string) error {\n\t// delete the snapshot subvolume\n\tsnapshotVolume, err := dfs.GetVolume(tenantID)\n\tif err != nil {\n\t\tglog.Errorf(\"Could not find the volume for service %s (%s): %s\")\n\t\treturn err\n\t}\n\tif err := snapshotVolume.Unmount(); err != nil {\n\t\tglog.Errorf(\"Could not unmount volume for service %s: %s\", tenantID, err)\n\t\treturn err\n\t}\n\n\t// delete images for that tenantID\n\timages, err := searchImagesByTenantID(tenantID)\n\tif err != nil {\n\t\tglog.Errorf(\"Error looking up images for %s: %s\", tenantID)\n\t\treturn err\n\t}\n\n\tfor _, image := range images {\n\t\tif err := image.Delete(); err != nil {\n\t\t\tglog.Warningf(\"Could not delete image %s (%s): %s\", image.ID, image.UUID, err)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "86625a40670cd40552fc4c47adb20c30", "score": "0.55377716", "text": "func (ctrl *csiSnapshotController) deleteSnapshotContent(content *crdv1.VolumeSnapshotContent) {\n\toperationName := fmt.Sprintf(\"delete-%s[%s]\", content.Name, string(content.UID))\n\tklog.V(5).Infof(\"Snapshotter is about to delete volume snapshot content and the operation named %s\", operationName)\n\tctrl.scheduleOperation(operationName, func() error {\n\t\treturn ctrl.deleteSnapshotContentOperation(content)\n\t})\n}", "title": "" }, { "docid": "4b8146a8a6b993780ba3ab2d381cc673", "score": "0.5528394", "text": "func (hp *hostPath) CreateSnapshot(ctx context.Context, req *csi.CreateSnapshotRequest) (*csi.CreateSnapshotResponse, error) {\n\tif err := hp.validateControllerServiceRequest(csi.ControllerServiceCapability_RPC_CREATE_DELETE_SNAPSHOT); err != nil {\n\t\tglog.V(3).Infof(\"invalid create snapshot req: %v\", req)\n\t\treturn nil, err\n\t}\n\n\tif len(req.GetName()) == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"Name missing in request\")\n\t}\n\t// Check arguments\n\tif len(req.GetSourceVolumeId()) == 0 {\n\t\treturn nil, status.Error(codes.InvalidArgument, \"SourceVolumeId missing in request\")\n\t}\n\n\t// Lock before acting on global state. A production-quality\n\t// driver might use more fine-grained locking.\n\thp.mutex.Lock()\n\tdefer hp.mutex.Unlock()\n\n\t// Need to check for already existing snapshot name, and if found check for the\n\t// requested sourceVolumeId and sourceVolumeId of snapshot that has been created.\n\tif exSnap, err := hp.state.GetSnapshotByName(req.GetName()); err == nil {\n\t\t// Since err is nil, it means the snapshot with the same name already exists need\n\t\t// to check if the sourceVolumeId of existing snapshot is the same as in new request.\n\t\tif exSnap.VolID == req.GetSourceVolumeId() {\n\t\t\t// same snapshot has been created.\n\t\t\treturn &csi.CreateSnapshotResponse{\n\t\t\t\tSnapshot: &csi.Snapshot{\n\t\t\t\t\tSnapshotId: exSnap.Id,\n\t\t\t\t\tSourceVolumeId: exSnap.VolID,\n\t\t\t\t\tCreationTime: exSnap.CreationTime,\n\t\t\t\t\tSizeBytes: exSnap.SizeBytes,\n\t\t\t\t\tReadyToUse: exSnap.ReadyToUse,\n\t\t\t\t},\n\t\t\t}, nil\n\t\t}\n\t\treturn nil, status.Errorf(codes.AlreadyExists, \"snapshot with the same name: %s but with different SourceVolumeId already exist\", req.GetName())\n\t}\n\n\tvolumeID := req.GetSourceVolumeId()\n\thostPathVolume, err := hp.state.GetVolumeByID(volumeID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsnapshotID := uuid.NewUUID().String()\n\tcreationTime := ptypes.TimestampNow()\n\tvolPath := hostPathVolume.VolPath\n\tfile := hp.getSnapshotPath(snapshotID)\n\n\tvar cmd []string\n\tif hostPathVolume.VolAccessType == state.BlockAccess {\n\t\tglog.V(4).Infof(\"Creating snapshot of Raw Block Mode Volume\")\n\t\tcmd = []string{\"cp\", volPath, file}\n\t} else {\n\t\tglog.V(4).Infof(\"Creating snapshot of Filsystem Mode Volume\")\n\t\tcmd = []string{\"tar\", \"czf\", file, \"-C\", volPath, \".\"}\n\t}\n\texecutor := utilexec.New()\n\tout, err := executor.Command(cmd[0], cmd[1:]...).CombinedOutput()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed create snapshot: %w: %s\", err, out)\n\t}\n\n\tglog.V(4).Infof(\"create volume snapshot %s\", file)\n\tsnapshot := state.Snapshot{}\n\tsnapshot.Name = req.GetName()\n\tsnapshot.Id = snapshotID\n\tsnapshot.VolID = volumeID\n\tsnapshot.Path = file\n\tsnapshot.CreationTime = creationTime\n\tsnapshot.SizeBytes = hostPathVolume.VolSize\n\tsnapshot.ReadyToUse = true\n\n\tif err := hp.state.UpdateSnapshot(snapshot); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &csi.CreateSnapshotResponse{\n\t\tSnapshot: &csi.Snapshot{\n\t\t\tSnapshotId: snapshot.Id,\n\t\t\tSourceVolumeId: snapshot.VolID,\n\t\t\tCreationTime: snapshot.CreationTime,\n\t\t\tSizeBytes: snapshot.SizeBytes,\n\t\t\tReadyToUse: snapshot.ReadyToUse,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "039c7fc9755b6f1d7c4de8696d7d6299", "score": "0.552655", "text": "func (s stack) DeleteVolume(ref string) fail.Error {\n\tif s.IsNull() {\n\t\treturn fail.InvalidInstanceError()\n\t}\n\tif ref == \"\" {\n\t\treturn fail.InvalidParameterCannotBeEmptyStringError(\"ref\")\n\t}\n\n\ttracer := debug.NewTracer(nil, tracing.ShouldTrace(\"stacks.volume\") || tracing.ShouldTrace(\"stack.gcp\"), \"(%s)\", ref).WithStopwatch().Entering()\n\tdefer tracer.Exiting()\n\n\treturn s.rpcDeleteDisk(ref)\n}", "title": "" }, { "docid": "9efdf604053bde2fc818b9ab741b2644", "score": "0.55028063", "text": "func (fc *fakeClient) CreateVolumeSnapshot(ctx context.Context, in *pb.CreateVolumeSnapshotOpts, opts ...grpc.CallOption) (*pb.GenericResponse, error) {\n\treturn &pb.GenericResponse{\n\t\tReply: &pb.GenericResponse_Result_{\n\t\t\tResult: &pb.GenericResponse_Result{\n\t\t\t\tMessage: ByteSnapshot,\n\t\t\t},\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "3c85b8961679b4b1f1d9ae19676a1312", "score": "0.5495109", "text": "func TestCmdSnapshot(t *testing.T) {\n\tassert := asrt.New(t)\n\n\tsite := TestSites[0]\n\tcleanup := site.Chdir()\n\n\tapp, err := ddevapp.NewApp(site.Dir, false)\n\tassert.NoError(err)\n\n\tt.Cleanup(func() {\n\t\t// Make sure all databases are back to default empty\n\t\t_ = app.Stop(true, false)\n\t\tcleanup()\n\t})\n\n\terr = app.Start()\n\trequire.NoError(t, err)\n\n\t// Ensure that there are no snapshots available before we create one\n\targs := []string{\"snapshot\", \"--cleanup\", \"--yes\"}\n\t_, err = exec.RunCommand(DdevBin, args)\n\tassert.NoError(err)\n\n\t// Ensure that a snapshot can be created\n\targs = []string{\"snapshot\", \"--name\", \"test-snapshot\"}\n\tout, err := exec.RunCommand(DdevBin, args)\n\tassert.NoError(err)\n\tassert.Contains(out, \"Created snapshot test-snapshot\")\n\n\t// Try to delete a not existing snapshot\n\targs = []string{\"snapshot\", \"--name\", \"not-existing-snapshot\", \"--cleanup\", \"--yes\"}\n\tout, err = exec.RunCommand(DdevBin, args)\n\tassert.Error(err)\n\tassert.Contains(out, \"Failed to delete snapshot\")\n\n\t// Ensure that an existing snapshot can be deleted\n\targs = []string{\"snapshot\", \"--name\", \"test-snapshot\", \"--cleanup\", \"--yes\"}\n\tout, err = exec.RunCommand(DdevBin, args)\n\tassert.NoError(err)\n\tassert.Contains(out, \"Deleted database snapshot test-snapshot\")\n}", "title": "" }, { "docid": "ef901d37cd27feab751be15b9d496c53", "score": "0.54926354", "text": "func (p *Plugin) deleteBackup(snapshotID string) error {\n\tpvname, _, snapname, err := utils.GetInfoFromSnapshotID(snapshotID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbkpname := utils.GenerateResourceName(pvname, snapname)\n\terr = bkpbuilder.NewKubeclient().WithNamespace(p.namespace).Delete(bkpname)\n\tif err != nil {\n\t\tp.Log.Errorf(\"zfs: Failed to delete the backup %s\", snapshotID)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "7e38d150d3cad01872ea67fee21edf60", "score": "0.5491179", "text": "func (SnapshotRepository) DeleteSagaSnapshots(\n\tctx context.Context,\n\tptx persistence.Tx,\n\tpk string,\n\tid saga.InstanceID,\n) error {\n\ttx := mysqlpersistence.ExtractTx(ptx)\n\n\t_, err := tx.ExecContext(\n\t\tctx,\n\t\t`DELETE FROM ax_saga_snapshot\n\t\tWHERE persistence_key = ?\n\t\tAND instance_id = ?`,\n\t\tpk,\n\t\tid,\n\t)\n\n\treturn err\n}", "title": "" } ]
291e8db7c407a9a60fa94e34f2e3251c
GetDefaultDecisionEnabled gets the defaultDecisionEnabled property value. Indicates whether the default decision is enabled or disabled when reviewers do not respond. Default value is false. CAUTION: If both autoApplyDecisionsEnabled and defaultDecisionEnabled are true, all access for the principals to the resource risks being revoked if the reviewers fail to respond.
[ { "docid": "d2fe24c4c7fb0546a406c00369f585dc", "score": "0.7703364", "text": "func (m *AccessReviewScheduleSettings) GetDefaultDecisionEnabled()(*bool) {\n val, err := m.GetBackingStore().Get(\"defaultDecisionEnabled\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" } ]
[ { "docid": "8b8e46f1ce68159d8fb425752f74679f", "score": "0.6739037", "text": "func (m *AccessReviewScheduleSettings) SetDefaultDecisionEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"defaultDecisionEnabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "752e03c1fda582293fbaaef1a8ac5d4c", "score": "0.60511374", "text": "func (m *AccessReviewScheduleSettings) GetAutoApplyDecisionsEnabled()(*bool) {\n val, err := m.GetBackingStore().Get(\"autoApplyDecisionsEnabled\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "fbc439bae68748eb63a75fd09740b99a", "score": "0.60127914", "text": "func (m *AccessReviewScheduleSettings) GetDefaultDecision()(*string) {\n val, err := m.GetBackingStore().Get(\"defaultDecision\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "27508c2a00ed2adbf7657e06f4919e81", "score": "0.55668026", "text": "func (o *DetectionRule) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "e3b30362d5b6dc567e389b8da5c90b41", "score": "0.54332155", "text": "func (o *CustconfOriginPullResumeDownload) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "56b9e71807495c6636d2195621d066d3", "score": "0.54057723", "text": "func (o VpcIpamResourceDiscoveryOutput) IsDefault() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *VpcIpamResourceDiscovery) pulumi.BoolOutput { return v.IsDefault }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "2d1f91d16cf003cd1ba3df1a3e8cf564", "score": "0.53954226", "text": "func (o *LoadDropDetectionConfig) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "7be85390d9678c4df33109d4506cc8ee", "score": "0.53168756", "text": "func (m *AccessReviewScheduleSettings) GetDecisionHistoriesForReviewersEnabled()(*bool) {\n val, err := m.GetBackingStore().Get(\"decisionHistoriesForReviewersEnabled\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "6ef7cea1967a6f1e324b8c02895867b3", "score": "0.5314512", "text": "func (m *GovernanceRoleSetting) GetIsDefault()(*bool) {\n val, err := m.GetBackingStore().Get(\"isDefault\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "ea53c440519b533c0603742a9559060a", "score": "0.5289599", "text": "func (m *IdentitySecurityDefaultsEnforcementPolicy) GetIsEnabled()(*bool) {\n return m.isEnabled\n}", "title": "" }, { "docid": "de566504362d29edc1900599e976f5ac", "score": "0.5245261", "text": "func (m *AccessReviewScheduleSettings) SetDefaultDecision(value *string)() {\n err := m.GetBackingStore().Set(\"defaultDecision\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "368061116f2e75be5a6fd778f3d41639", "score": "0.5136921", "text": "func (o *DashboardReport) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "eb7453ebe88037ef3299dde044ba28be", "score": "0.5107549", "text": "func (o *Currency) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "75c7dd17444d1be9bac2ed3ff5695cd9", "score": "0.5106395", "text": "func (o *CustconfOriginPullResumeDownload) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "b176eac9268a5aefc2e4bfded01efd5d", "score": "0.50467455", "text": "func (o *CustomService) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "0f36724f7ceadbb3f8e8ca27884fd755", "score": "0.5037275", "text": "func (o *LambdaHighErrorRateDetectionConfig) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "71265045224e5c6f735d6e5f4e6942d6", "score": "0.50287515", "text": "func (o *TelecomExpenseManagementPartner) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "bce4ba94c24ba57730226e170cbaa5d3", "score": "0.49951446", "text": "func (o *PolicyAllOfClientSettings) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "cc74d7cd362b65cc5be3735a895713f0", "score": "0.4946588", "text": "func (o *OpenIdConnectAuthProviderModelAuthProvider) GetEnabled() bool {\n\tif o == nil || IsNil(o.Enabled) {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "0fefd2a7dd284cb0a094a34134fc2e15", "score": "0.49343112", "text": "func (o *DetectionRule) GetEnabledOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Enabled, true\n}", "title": "" }, { "docid": "afffef086544d02482d802ab9a264cca", "score": "0.49307", "text": "func (o *ConsumableFeature) GetIsTierDefault() bool {\n\tif o == nil || o.IsTierDefault == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.IsTierDefault\n}", "title": "" }, { "docid": "cd279df560110909d9df9fdc3b2001d6", "score": "0.48542732", "text": "func (o *FullWebServiceRule) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "63393410332178d715bab7b5fa45e769", "score": "0.4849463", "text": "func (m *NodeConfig) GetEnabled() (x bool) {\n\tif m == nil {\n\t\treturn x\n\t}\n\treturn m.Enabled\n}", "title": "" }, { "docid": "bc7beaf4437b4856b614e50f1b2b68eb", "score": "0.48410273", "text": "func (m *AccessReviewScheduleSettings) SetAutoApplyDecisionsEnabled(value *bool)() {\n err := m.GetBackingStore().Set(\"autoApplyDecisionsEnabled\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "19c249cd9fb25449b5b3143b04b5831e", "score": "0.48375428", "text": "func (b *BoolRule) Default() ctypes.ConfigValue {\n\tif b.default_ != nil {\n\t\treturn ctypes.ConfigValueBool{Value: *b.default_}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b023471f2c30cb6479115c4ed7069f8", "score": "0.48277757", "text": "func (o *OrganizationSettingsSamlAutocreateUsersDomains) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "e36578d124d29abe509780243a3cfb9f", "score": "0.48262858", "text": "func (o *LoadDropDetectionConfig) GetEnabledOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Enabled, true\n}", "title": "" }, { "docid": "f3c32911a3effff6aa0cc047870a8157", "score": "0.48253053", "text": "func (m *IstiodConfig) GetEnabled() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Enabled\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f3c32911a3effff6aa0cc047870a8157", "score": "0.48253053", "text": "func (m *IstiodConfig) GetEnabled() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Enabled\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f3c32911a3effff6aa0cc047870a8157", "score": "0.48253053", "text": "func (m *IstiodConfig) GetEnabled() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Enabled\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f3c32911a3effff6aa0cc047870a8157", "score": "0.48253053", "text": "func (m *IstiodConfig) GetEnabled() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Enabled\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f8ab172e003754170bc2f381ce33f822", "score": "0.48248577", "text": "func (m *AccessReviewStageSettings) GetRecommendationsEnabled()(*bool) {\n return m.recommendationsEnabled\n}", "title": "" }, { "docid": "6760d2548663433f5c9469acfc2c41eb", "score": "0.4821412", "text": "func (o *CustconfAwsSignedS3PostV4) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "c3eb780767a89a078c802876875f009b", "score": "0.48206684", "text": "func (o *OrganizationSettingsSamlStrictMode) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "9e18bc143f90393a345b36d5c627a29e", "score": "0.47955084", "text": "func (o ClusterIpAllocationPolicyPodCidrOverprovisionConfigOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterIpAllocationPolicyPodCidrOverprovisionConfig) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "cc6f32c0140db164785e9aa7025979c1", "score": "0.47858572", "text": "func (c *AutoRollerConfig) DefaultStrategy() string {\n\trm, err := c.repoManagerConfig()\n\tif err != nil {\n\t\tsklog.Fatalf(\"Failed to obtain RepoManagerConfig; this should have been caught during validation! %s\", err)\n\t}\n\treturn rm.DefaultStrategy()\n}", "title": "" }, { "docid": "77e204c8eb9a48288e6cf6c947bd950f", "score": "0.47795638", "text": "func (o LookupIpamResourceDiscoveryAssociationResultOutput) IsDefault() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v LookupIpamResourceDiscoveryAssociationResult) *bool { return v.IsDefault }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "52229f4fd90b8b74096a8fa86de082da", "score": "0.47781897", "text": "func (c CertGenerationConfig) GetEnabled() bool {\n\treturn c.Enabled && len(c.CommonName) > 0\n}", "title": "" }, { "docid": "4174305e7d921b48e59f0e4801d451ab", "score": "0.47664633", "text": "func (o *ManagementZoneRule) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "ce775f2500e1ac5f464bf15e0db634bc", "score": "0.4761089", "text": "func (r *noCheckoutRepoManager) DefaultStrategy() string {\n\treturn \"NOT IMPLEMENTED\"\n}", "title": "" }, { "docid": "08da88bc33c0669e7330a3e81f2d8221", "score": "0.47470716", "text": "func (a *Addon) IsEnabledOrDefault(cc *config.ClusterConfig) bool {\n\tstatus, ok := cc.Addons[a.Name()]\n\tif ok {\n\t\treturn status\n\t}\n\n\t// Return the default unconfigured state of the addon\n\treturn a.enabled\n}", "title": "" }, { "docid": "99fab2e9a1cb0800a56b3a74cd716943", "score": "0.4739142", "text": "func (o *SecurityMonitoringRuleCreatePayload) GetEnabled() bool {\n\tif o == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\n\treturn o.Enabled\n}", "title": "" }, { "docid": "282a49e6abf25f5ca8ca772229ae9e33", "score": "0.4706267", "text": "func (o *V2Monitor) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "5230a77dc241ee29a9c998fb8fc9c538", "score": "0.46999142", "text": "func (t *ChannelsToggleForumRequest) GetEnabled() (value bool) {\n\tif t == nil {\n\t\treturn\n\t}\n\treturn t.Enabled\n}", "title": "" }, { "docid": "a6b9ff31c0ccd81d088743c251ecdef6", "score": "0.4695147", "text": "func (mc *ModuleConfig) GetEnabled() string {\n\tif mc == nil {\n\t\treturn \"\"\n\t}\n\tswitch {\n\tcase mc.IsEnabled == nil:\n\t\treturn \"n/d\"\n\tcase *mc.IsEnabled:\n\t\treturn \"true\"\n\tdefault:\n\t\treturn \"false\"\n\t}\n}", "title": "" }, { "docid": "b568b4485364a6df143501dbdc073b1a", "score": "0.46931565", "text": "func (o ClusterAddonsConfigNetworkPolicyConfigOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterAddonsConfigNetworkPolicyConfig) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "0a99c5a11b1a7aeb060ac8fee117f262", "score": "0.46915662", "text": "func (o GetApplicationScalingRulesRuleScalingRuleMetricScaleDownRuleOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetApplicationScalingRulesRuleScalingRuleMetricScaleDownRule) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "197ff212e3a191c77b73b140e5c5516d", "score": "0.46745977", "text": "func (m *CorsPolicy) GetEnabled() *wrappers.BoolValue {\n\tif x, ok := m.GetEnabledSpecifier().(*CorsPolicy_Enabled); ok {\n\t\treturn x.Enabled\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "61f732bbab369924de76e4680dad124c", "score": "0.46587035", "text": "func (o *FiltersDhcpOptions) GetDefault() bool {\n\tif o == nil || o.Default == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Default\n}", "title": "" }, { "docid": "61f732bbab369924de76e4680dad124c", "score": "0.46587035", "text": "func (o *FiltersDhcpOptions) GetDefault() bool {\n\tif o == nil || o.Default == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Default\n}", "title": "" }, { "docid": "e1a6a6650fb21e77e640b7b653b93aec", "score": "0.46543187", "text": "func (o *PolicyAllOfClientSettings) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "de6a8bcd9f91bb8faa3a571ccd167513", "score": "0.4653206", "text": "func (o ClusterNodePoolNetworkConfigPodCidrOverprovisionConfigOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterNodePoolNetworkConfigPodCidrOverprovisionConfig) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "7107cee40101796829329215ac203aca", "score": "0.46526644", "text": "func (o *Currency) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "0fee5fea9375a9ed810c00728e9aa4d8", "score": "0.4651351", "text": "func (m *AccessReviewScheduleSettings) GetRecommendationsEnabled()(*bool) {\n val, err := m.GetBackingStore().Get(\"recommendationsEnabled\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*bool)\n }\n return nil\n}", "title": "" }, { "docid": "f3dc54e6fe37dcf724837faee451d8bc", "score": "0.46478826", "text": "func HandleDefaultPolicy(o *v1.Namespace, l *KubeListener) {\n\tvar defaultDeny bool\n\tannotationKey := \"net.beta.kubernetes.io/networkpolicy\"\n\tif np, ok := o.ObjectMeta.Annotations[annotationKey]; ok {\n\t\tlog.Infof(\"Handling default policy on a namespace %s, policy is now %s \\n\", o.ObjectMeta.Name, np)\n\t\t// Annotations are stored in the Annotations map as raw JSON.\n\t\t// So we need to parse it.\n\t\tisolationPolicy := struct {\n\t\t\tIngress struct {\n\t\t\t\tIsolation string `json:\"isolation\"`\n\t\t\t} `json:\"ingress\"`\n\t\t}{}\n\t\t// TODO change to json.Unmarshal. Stas\n\t\terr := json.NewDecoder(strings.NewReader(np)).Decode(&isolationPolicy)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"In HandleDefaultPolicy :: Error decoding annotation %s: %s\", annotationKey, err)\n\t\t\treturn\n\t\t}\n\t\tlog.Debugf(\"Decoded to policy: %v\", isolationPolicy)\n\t\tdefaultDeny = isolationPolicy.Ingress.Isolation == \"DefaultDeny\"\n\t} else {\n\t\tlog.Debugf(\"Handling default policy on a namespace, no annotation detected assuming non isolated namespace\")\n\t\tdefaultDeny = false\n\t}\n\tif defaultDeny {\n\t\tdeleteDefaultPolicy(o, l)\n\t} else {\n\t\taddDefaultPolicy(o, l)\n\t}\n}", "title": "" }, { "docid": "2a33c81919094ce052023b16fd29e6f6", "score": "0.46446422", "text": "func (o *CreateCustomerFiscalEntitiesResponseAllOf) GetDefault() bool {\n\tif o == nil || IsNil(o.Default) {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Default\n}", "title": "" }, { "docid": "fbd4ee8b8e386c143badc1255f85dcf6", "score": "0.46376416", "text": "func (p *PolicyAuthorizer) IntentionDefaultAllow() bool {\n\t// We always go up, this can't be determined by a policy.\n\treturn p.parent.IntentionDefaultAllow()\n}", "title": "" }, { "docid": "5e1fcf2f3babd4244204a0b7cb1a263a", "score": "0.46308032", "text": "func (o ClusterIpAllocationPolicyPodCidrOverprovisionConfigPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterIpAllocationPolicyPodCidrOverprovisionConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "98860f20a12f25360f2ad0590014a0a5", "score": "0.46306893", "text": "func (o *VnicVmqSettings) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "a13ac0ae853a00df3379f38770bce3b3", "score": "0.46281192", "text": "func (c *PodCheck) IsEnabled() bool {\n\treturn false\n}", "title": "" }, { "docid": "a8a291456da8f1584d2ccd9ce759db7e", "score": "0.46228534", "text": "func (o ClusterAddonsConfigHorizontalPodAutoscalingOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterAddonsConfigHorizontalPodAutoscaling) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "708107f57430f1886e2d8eb0dbeb08eb", "score": "0.46215388", "text": "func (o ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfigOutput) Enabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig) bool { return v.Enabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "ba27a140f42f3fad028f90667cb73325", "score": "0.460496", "text": "func (m *BatchRecordDecisionsPostRequestBody) GetDecision()(*string) {\n return m.decision\n}", "title": "" }, { "docid": "398568439bab262548b28f7913712ed8", "score": "0.46035442", "text": "func (o ClusterAddonsConfigNetworkPolicyConfigPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterAddonsConfigNetworkPolicyConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "bdf69227988405a866772fdd6c816130", "score": "0.45970437", "text": "func (o ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfigPtrOutput) Enabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterNodePoolDefaultsNodeConfigDefaultsGcfsConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Enabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "a8ee3ffc92d2e61aa554c6128beae0c9", "score": "0.4596989", "text": "func (o EvaluationFormQuestionPtrOutput) NotApplicableEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *EvaluationFormQuestion) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.NotApplicableEnabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "727e7d789f9ffc1d66365fbdfd09a3a5", "score": "0.458201", "text": "func (o *DashboardReport) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "234635dba27665f8e1b08fbe866dc819", "score": "0.45661482", "text": "func (dt *ChannelDwellTime) GetEnabled() bool {\n\treturn dt != nil && dt.Enabled != nil && *dt.Enabled\n}", "title": "" }, { "docid": "90d010c1d977249eb69ba5646ee657ee", "score": "0.4562665", "text": "func (o ClusterAddonsConfigHttpLoadBalancingOutput) Disabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ClusterAddonsConfigHttpLoadBalancing) bool { return v.Disabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "0caa52fc10558c5e15a58488effb4e77", "score": "0.45619142", "text": "func (o *OrganizationSettingsSamlStrictMode) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "55c3b5e1916aceffd83d2c4513e1c889", "score": "0.45599142", "text": "func (t *MessagesToggleNoForwardsRequest) GetEnabled() (value bool) {\n\tif t == nil {\n\t\treturn\n\t}\n\treturn t.Enabled\n}", "title": "" }, { "docid": "7b6df38090a8d23c0c58a0e504934bbc", "score": "0.4556761", "text": "func BoolDefault(def bool) BoolOpt {\n\treturn defaultOpt(def)\n}", "title": "" }, { "docid": "90e8afc151530dd272e7f88b0eaba666", "score": "0.45521656", "text": "func (o EvaluationFormQuestionOutput) NotApplicableEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v EvaluationFormQuestion) *bool { return v.NotApplicableEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "c556458545493b87b9846dffda2da274", "score": "0.4550044", "text": "func (o *CustomService) GetEnabledOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Enabled, true\n}", "title": "" }, { "docid": "069af41037186d5640d8d727fe7d9622", "score": "0.4548786", "text": "func (o *CustconfAwsSignedS3PostV4) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "ae9c122677a3f46a8382cdd6c5f92097", "score": "0.45485145", "text": "func nvmlDeviceGetAutoBoostedClocksEnabled(Device Device, IsEnabled *EnableState, DefaultIsEnabled *EnableState) Return {\n\tcDevice, _ := *(*C.nvmlDevice_t)(unsafe.Pointer(&Device)), cgoAllocsUnknown\n\tcIsEnabled, _ := (*C.nvmlEnableState_t)(unsafe.Pointer(IsEnabled)), cgoAllocsUnknown\n\tcDefaultIsEnabled, _ := (*C.nvmlEnableState_t)(unsafe.Pointer(DefaultIsEnabled)), cgoAllocsUnknown\n\t__ret := C.nvmlDeviceGetAutoBoostedClocksEnabled(cDevice, cIsEnabled, cDefaultIsEnabled)\n\t__v := (Return)(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "00d48e65801d11d70cf3f34d9f01d08f", "score": "0.45454437", "text": "func IsEnabled(o OrgOptConfig, r RepoOptConfig, repo string) bool {\n\tvar enabled bool\n\tif o.OptOutStrategy {\n\t\tenabled = true\n\t\tif contains(o.OptOutRepos, repo) {\n\t\t\tenabled = false\n\t\t}\n\t\tif !o.DisableRepoOverride && r.OptOut {\n\t\t\tenabled = false\n\t\t}\n\t} else {\n\t\tenabled = false\n\t\tif contains(o.OptInRepos, repo) {\n\t\t\tenabled = true\n\t\t}\n\t\tif !o.DisableRepoOverride && r.OptIn {\n\t\t\tenabled = true\n\t\t}\n\t}\n\treturn enabled\n}", "title": "" }, { "docid": "6e09d0479f7e5f08da774aaefe8366e6", "score": "0.45262006", "text": "func (o *TelecomExpenseManagementPartner) GetEnabledOk() (bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret, false\n\t}\n\treturn *o.Enabled, true\n}", "title": "" }, { "docid": "c56f5c335c9acd82fdd1f4f2e76d661e", "score": "0.4525161", "text": "func (r Rules) DefaultRule() *Rule {\n\tfor _, rule := range r {\n\t\tif rule.rs.desired == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif *rule.rs.desired.IsDefault {\n\t\t\treturn rule\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "70fcb183f706c57ca5deb7415ffd4105", "score": "0.45236275", "text": "func (n NetworkMode) IsDefault() bool {\n\treturn n == \"default\"\n}", "title": "" }, { "docid": "d15c3e5a057a215344c777d9b3b916cc", "score": "0.45222077", "text": "func (m *TelecomExpenseManagementPartner) GetEnabled()(*bool) {\n return m.enabled\n}", "title": "" }, { "docid": "66bae81e114e04f3e078fc757d32c0d6", "score": "0.45173267", "text": "func (o ClusterAddonsConfigHttpLoadBalancingPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterAddonsConfigHttpLoadBalancing) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "a53e31b66f006c507782eaaa2d8984ff", "score": "0.45153376", "text": "func (o ClusterNodePoolNetworkConfigPodCidrOverprovisionConfigPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterNodePoolNetworkConfigPodCidrOverprovisionConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "ed6ac3c4c9485f409bee8b76d063c0cd", "score": "0.45141888", "text": "func (o ClusterDefaultSnatStatusPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterDefaultSnatStatus) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "9ed18b7ba5eb25c735702f7e9d74aa4a", "score": "0.4510585", "text": "func (o *OrganizationSettingsSamlAutocreateUsersDomains) GetEnabledOk() (*bool, bool) {\n\tif o == nil || o.Enabled == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "d9deef5ddd8185e3842cbe5969b2085e", "score": "0.45051628", "text": "func GetDecision(w http.ResponseWriter, r *http.Request) {\n\tid := mux.Vars(r)[\"id\"]\n\n\tdecision, err := service.GetDecision(id)\n\n\tif err != nil {\n\t\terrors.WriteError(w, r, errors.DatabaseError(err.Error(), \"Could not get decision for the specified user.\"))\n\t\treturn\n\t}\n\n\tjson.NewEncoder(w).Encode(decision)\n}", "title": "" }, { "docid": "511b222fc1861455c3bc68adb58a1136", "score": "0.44958484", "text": "func (o AutomationRuleTriggeringLogicOutput) IsEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v AutomationRuleTriggeringLogic) bool { return v.IsEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "c706bc549d28a66c0adbbaad98549d69", "score": "0.4495528", "text": "func (o *UpdateCustomerFiscalEntitiesResponseAllOf) GetDefault() bool {\n\tif o == nil || IsNil(o.Default) {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Default\n}", "title": "" }, { "docid": "8a568515ec422090c6f0a48d46c49e7c", "score": "0.44900423", "text": "func (o LoadBalancerPoolLoadSheddingOutput) DefaultPolicy() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v LoadBalancerPoolLoadShedding) *string { return v.DefaultPolicy }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "15a074f18efdb5b0965c52949afb2559", "score": "0.4487031", "text": "func (o *OpenIdConnectAuthProviderModelAuthProvider) GetEnabledOk() (*bool, bool) {\n\tif o == nil || IsNil(o.Enabled) {\n\t\treturn nil, false\n\t}\n\treturn o.Enabled, true\n}", "title": "" }, { "docid": "a3eaef8370fe19a96fb7ea8303b7953e", "score": "0.448436", "text": "func (o *LambdaHighErrorRateDetectionConfig) GetEnabledOk() (*bool, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Enabled, true\n}", "title": "" }, { "docid": "3a29fb80f7f780a038fd4c2ae1840db8", "score": "0.44838342", "text": "func (o *SessionReplaySetting) GetEnabled() bool {\n\tif o == nil || o.Enabled == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Enabled\n}", "title": "" }, { "docid": "d2bade239460089767f4a882acf19cc1", "score": "0.44826", "text": "func (o PodSecurityPolicySpecOutput) DefaultAllowPrivilegeEscalation() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PodSecurityPolicySpec) *bool { return v.DefaultAllowPrivilegeEscalation }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "d2bade239460089767f4a882acf19cc1", "score": "0.44826", "text": "func (o PodSecurityPolicySpecOutput) DefaultAllowPrivilegeEscalation() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v PodSecurityPolicySpec) *bool { return v.DefaultAllowPrivilegeEscalation }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "356134781fe87017b260b589385c9cc0", "score": "0.4481516", "text": "func (v *Action) GetEnabled() bool {\n\treturn gobool(C.g_action_get_enabled(v.native()))\n}", "title": "" }, { "docid": "01417a0a17f4d5af6d0284a61280cb31", "score": "0.44775558", "text": "func (o *PoliciesAndRulesToBeAppliedCollectionGetParams) SetEnabled(enabled *bool) {\n\to.Enabled = enabled\n}", "title": "" }, { "docid": "5d54804aad676a5497621d9a4176723b", "score": "0.4477419", "text": "func (o *DhcpOptionsSet) GetDefault() bool {\n\tif o == nil || o.Default == nil {\n\t\tvar ret bool\n\t\treturn ret\n\t}\n\treturn *o.Default\n}", "title": "" }, { "docid": "568d6712049a25fbef5751334ef1fc81", "score": "0.4470755", "text": "func (w *WallPaper) GetDefault() (value bool) {\n\tif w == nil {\n\t\treturn\n\t}\n\treturn w.Flags.Has(1)\n}", "title": "" }, { "docid": "d3cc1329b870211147711e517753d59e", "score": "0.44687167", "text": "func (o ClusterAddonsConfigHorizontalPodAutoscalingPtrOutput) Disabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *ClusterAddonsConfigHorizontalPodAutoscaling) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Disabled\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "7de2d5cf5f83c3b1943ef2bdd62a96b4", "score": "0.44678578", "text": "func (o AutomationRuleTriggeringLogicResponseOutput) IsEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v AutomationRuleTriggeringLogicResponse) bool { return v.IsEnabled }).(pulumi.BoolOutput)\n}", "title": "" } ]
455a6dc091a16171a1204533f6e6dc5b
In this test case, the context times out before any response is received. Therefore, we will return an error
[ { "docid": "36ad8f2523f38f3452b173ffd9f7c4dd", "score": "0.0", "text": "func TestGetInterfaceMACByIndexContextTimeout(t *testing.T) {\n\tmockCtrl := gomock.NewController(t)\n\tdefer mockCtrl.Finish()\n\n\tctx := context.TODO()\n\tmocknetwrapper := mock_netwrapper.NewMockNetWrapper(mockCtrl)\n\tnetUtils := &networkUtils{netWrapper: mocknetwrapper}\n\n\tmocknetwrapper.EXPECT().FindInterfaceByIndex(interfaceIndex).Return(\n\t\t&net.Interface{\n\t\t\tIndex: interfaceIndex,\n\t\t\tHardwareAddr: make([]byte, 0),\n\t\t}, nil).MinTimes(1)\n\n\tmac, err := netUtils.GetInterfaceMACByIndex(interfaceIndex, ctx, macAddressBackoffMin*2)\n\n\tassert.Error(t, err)\n\tassert.Empty(t, mac)\n}", "title": "" } ]
[ { "docid": "9c5c7919af1ceb6af4b4cc7fef94243f", "score": "0.64243776", "text": "func (c fakeContext) Err() (err error) { return }", "title": "" }, { "docid": "e679bd7169b7b90fffb25800f12101c1", "score": "0.6375869", "text": "func TestService_Serve_Timeout(t *testing.T) {\n\n\tsrv := NewService(func() (Response, error) {\n\t\ttime.Sleep(2000 * time.Millisecond)\n\t\treturn Response{Data: \"success\"}, nil\n\t})\n\n\tctx, cancel := context.WithTimeout(context.Background(), 1000*time.Millisecond)\n\tdefer cancel()\n\n\tresponse, err := srv.Serve(ctx, Request{})\n\n\tif err == nil {\n\t\tt.Errorf(\"Serve() got err %v, wanted %v\", err, context.DeadlineExceeded)\n\t}\n\n\twantResp := Response{}\n\tif !reflect.DeepEqual(response, wantResp) {\n\t\tt.Errorf(\"Serve() got response %v, wanted %v\", response, wantResp)\n\t}\n}", "title": "" }, { "docid": "3b11cf64d49d4a5ae8e01224873c1cc2", "score": "0.6093981", "text": "func TestService_Serve_Error(t *testing.T) {\n\twantErr := errors.New(\"error\")\n\tsrv := NewService(func() (Response, error) {\n\t\ttime.Sleep(500 * time.Millisecond)\n\t\treturn Response{}, wantErr\n\t})\n\n\tctx, cancel := context.WithTimeout(context.Background(), 1000*time.Millisecond)\n\tdefer cancel()\n\n\tresponse, err := srv.Serve(ctx, Request{})\n\n\tif err == nil {\n\t\tt.Errorf(\"Serve() got err %v, wanted %v\", err, wantErr)\n\t}\n\n\twantResp := Response{}\n\tif !reflect.DeepEqual(response, wantResp) {\n\t\tt.Errorf(\"Serve() got response %v, wanted %v\", response, wantResp)\n\t}\n}", "title": "" }, { "docid": "ca595a42ba6b2e1e427c390ba29ffe1f", "score": "0.60048914", "text": "func ContextTimeoutFailFast(ctx context.Context, w http.ResponseWriter, r *http.Request, next NextMiddlewareFn) error {\n\tsecs := 15 * time.Second\n\tif r.Header.Get(\"X-AppEngine-QueueName\") != \"\" || r.Header.Get(\"X-AppEngine-Cron\") != \"\" {\n\t\tsecs = (9*60 + 55) * time.Second\n\t}\n\n\tctx, cancel := context.WithDeadline(ctx, time.Now().Add(secs))\n\n\tdone := make(chan error, 1)\n\tgo func() {\n\t\tdone <- next(ctx)\n\t}()\n\n\tselect {\n\tcase err := <-done:\n\t\tcancel()\n\t\treturn err\n\n\tcase <-time.After(secs):\n\t\tcancel()\n\t\treturn errors.New(\"request timeout\")\n\t}\n\n\tpanic(\"should not reach here\")\n}", "title": "" }, { "docid": "a184fb0e6174bc97df4c61321ad59643", "score": "0.59856474", "text": "func TestHTTPTimeout(t *testing.T) {\n\tconst case1Empty = \"/\"\n\tvar jsonBlob = []byte(`\n\t\t{\"name\": \"Platypus\", \"order\": \"Monotremata\"}\n\t`)\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// check method is GET before going to check other features\n\t\tif r.Method != GET {\n\t\t\tt.Errorf(\"Expected method %q; got %q\", GET, r.Method)\n\t\t}\n\t\tswitch r.URL.Path {\n\t\tdefault:\n\t\t\tt.Errorf(\"No testing for this case yet : %q\", r.URL.Path)\n\t\tcase case1Empty:\n\t\t\ttime.Sleep(200 * time.Millisecond)\n\t\t\tw.WriteHeader(200)\n\t\t\tw.Write(jsonBlob)\n\t\t}\n\t}))\n\n\tdefer ts.Close()\n\tc := New().Timeout(100 * time.Millisecond)\n\tresp, body, errors := c.Request().Get(ts.URL + case1Empty).\n\t\tEnd()\n\n\t{\n\t\tif resp != nil {\n\t\t\tt.Error(\"Response returned with timeout\")\n\t\t}\n\t\tif len(body) != 0 {\n\t\t\tt.Error(\"Body returned with timeout\")\n\t\t}\n\t\tif len(errors) == 0 {\n\t\t\tt.Error(\"No timeout error returned\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aa78a1b2e6c95c7aa669d46a1ab9915a", "score": "0.5946778", "text": "func contextTests(client example.WorkerClient) {\n\n\t///////////////////////////////////////////////////////////////////\n\t// Timeout on the response by having the far-end delay too long\n\t{\n\t\ttimeout := time.Second\n\t\tdelay := 2 * time.Second\n\n\t\tctx, cancel := context.WithTimeout(context.Background(), timeout)\n\t\tdefer cancel()\n\n\t\t// Create request to send\n\t\tpayload := make([]byte, 32)\n\t\tnow := time.Now()\n\n\t\trequest := example.UnaryRequest{\n\t\t\tUtcTimestamp: now.UnixNano(),\n\t\t\tPonId: 0,\n\t\t\tOnuId: 127,\n\t\t\tPayload: payload,\n\t\t\tResponseDelay: uint32(delay),\n\t\t}\n\t\tlog.Printf(\"Unary Tx: %v\", request)\n\n\t\t// Send it and wait for response, that's about it\n\t\t_, err := client.RequestUnaryOperation(ctx, &request)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Expect a timeout (deadline exceeded):\")\n\t\t\tprintErrorInfo(err)\n\t\t\tlog.Println(\"\")\n\n\t\t}\n\t}\n\t///////////////////////////////////////////////////////////////////\n\t// Set a deadline of 2 seconds from now, but delay 5\n\t{\n\t\tdeadline := time.Now().Add(2 * time.Second)\n\t\tdelay := 2 * time.Second\n\n\t\tctx, cancel := context.WithDeadline(context.Background(), deadline)\n\t\tdefer cancel()\n\n\t\t// Create request to send\n\t\tpayload := make([]byte, 32)\n\t\tnow := time.Now()\n\n\t\trequest := example.UnaryRequest{\n\t\t\tUtcTimestamp: now.UnixNano(),\n\t\t\tPonId: 0,\n\t\t\tOnuId: 127,\n\t\t\tPayload: payload,\n\t\t\tResponseDelay: uint32(delay),\n\t\t}\n\t\tlog.Printf(\"Unary Tx: %v\", request)\n\n\t\t// Send it and wait for response, that's about it\n\t\t_, err := client.RequestUnaryOperation(ctx, &request)\n\t\tif err != nil {\n\t\t\tlog.Println(\"Expect a deadline exceeded error\")\n\t\t\tprintErrorInfo(err)\n\t\t\tlog.Println(\"\")\n\n\t\t}\n\t}\n\t///////////////////////////////////////////////////////////////////\n\t// Send over some context information via metadata\n\t{\n\t\tdelay := 0 * time.Second\n\t\tmd := metadata.Pairs(\n\t\t\t\"Key1\", \"hello\",\n\t\t\t\"Key2\", \"world\",\n\t\t)\n\t\tctx := metadata.NewOutgoingContext(context.Background(), md)\n\n\t\t// Create request to send\n\t\tpayload := make([]byte, 32)\n\t\tnow := time.Now()\n\n\t\trequest := example.UnaryRequest{\n\t\t\tUtcTimestamp: now.UnixNano(),\n\t\t\tPonId: 0,\n\t\t\tOnuId: 127,\n\t\t\tPayload: payload,\n\t\t\tResponseDelay: uint32(delay),\n\t\t}\n\t\tlog.Printf(\"Unary Tx with context %v\", request)\n\n\t\t// Send it and wait for response, that's about it\n\t\tresponse, err := client.RequestUnaryOperation(ctx, &request)\n\t\tif err != nil {\n\t\t\tlog.Println(\"We expected this to work\")\n\t\t\tprintErrorInfo(err)\n\t\t\tlog.Println(\"\")\n\n\t\t}\n\t\tlog.Printf(\"Unary Response: %v\", response)\n\t}\n}", "title": "" }, { "docid": "337dd094555d2dc6174f8b34a48c4a16", "score": "0.5932368", "text": "func (e *ResourceExhaustedError) Timeout() bool { return false }", "title": "" }, { "docid": "c5e4b71f6350393a24041806c60637c8", "score": "0.58924305", "text": "func ContextErr(err error) error {\n\tswitch err {\n\tcase context.DeadlineExceeded:\n\t\treturn status.Error(codes.DeadlineExceeded, err.Error())\n\tcase context.Canceled:\n\t\treturn status.Error(codes.Canceled, err.Error())\n\t}\n\treturn status.Errorf(codes.Internal, \"Unexpected error from context packet: %v\", err)\n}", "title": "" }, { "docid": "1df6f9a1252c4ebada1913b2ef12ec95", "score": "0.5792852", "text": "func ContextTimeout(ctx context.Context, w http.ResponseWriter, r *http.Request, next NextMiddlewareFn) error {\n\tsecs := 55 * time.Second\n\tif r.Header.Get(\"X-AppEngine-QueueName\") != \"\" || r.Header.Get(\"X-AppEngine-Cron\") != \"\" {\n\t\tsecs = (9*60 + 55) * time.Second\n\t}\n\n\tctx, cancel := context.WithDeadline(ctx, time.Now().Add(secs))\n\n\tdone := make(chan error, 1)\n\tgo func() {\n\t\tdone <- next(ctx)\n\t}()\n\n\tselect {\n\tcase err := <-done:\n\t\tcancel()\n\t\treturn err\n\n\tcase <-time.After(secs):\n\t\tlog.Criticalf(ctx, \"request timeout\")\n\t\tcancel()\n\t\treturn nil\n\t}\n\n\tpanic(\"should not reach here\")\n}", "title": "" }, { "docid": "6a1f0e3344d222dc537d443c0bca77c3", "score": "0.57374597", "text": "func TakesContextNoError(ctx context.Context) {\n\tdeadline, _ := ctx.Deadline()\n\tfmt.Printf(\"Context timeout: %v\\n\", deadline)\n}", "title": "" }, { "docid": "b632be8b1d308a8c31af8a0eadd652df", "score": "0.5710691", "text": "func TestClient_SendP2PTransactionStatusBadRequest(t *testing.T) {\r\n\t// t.Parallel() (Cannot run in parallel - issues with overriding the mock client)\r\n\r\n\t// Create a client with options\r\n\tclient, err := newTestClient()\r\n\tif err != nil {\r\n\t\tt.Fatalf(\"error loading client: %s\", err.Error())\r\n\t}\r\n\r\n\t// Create mock response\r\n\thttpmock.Reset()\r\n\thttpmock.RegisterResponder(http.MethodPost, testServerURL+\"receive-transaction/\"+testAlias+\"@\"+testDomain,\r\n\t\thttpmock.NewStringResponder(http.StatusBadRequest, `{\"message\": \"request failed\"}`))\r\n\r\n\t// Raw TX\r\n\trawTransaction := &P2PTransaction{Hex: \"some-raw-hex\", MetaData: &P2PMetaData{Note: \"test note\", Sender: \"someone@\" + testDomain}, Reference: \"1234567\"}\r\n\r\n\t// Fire the request\r\n\tvar transaction *P2PTransactionResponse\r\n\ttransaction, err = client.SendP2PTransaction(testServerURL+\"receive-transaction/{alias}@{domain.tld}\", testAlias, testDomain, rawTransaction)\r\n\tif err == nil {\r\n\t\tt.Fatalf(\"error should have occurred\")\r\n\t} else if transaction != nil && transaction.StatusCode != http.StatusBadRequest {\r\n\t\tt.Fatalf(\"StatusCode was: %d and not: %d\", transaction.StatusCode, http.StatusBadRequest)\r\n\t}\r\n}", "title": "" }, { "docid": "d98a0877c304a3b4b58e882eac6dcf89", "score": "0.56992334", "text": "func getApimStubError(t *testing.T) *httptest.Server {\n\tvar apimStub = httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusServiceUnavailable)\n\t}))\n\treturn apimStub\n}", "title": "" }, { "docid": "0d1e8bdb4428419b6507062e24de0729", "score": "0.56007916", "text": "func (h Handlers) Test(ctx context.Context, w http.ResponseWriter, r *http.Request) error {\n\tif n := rand.Intn(100); n%2 == 0 {\n\t\treturn webv1.NewRequestError(errors.New(\"trusted error\"), http.StatusBadRequest)\n\t}\n\n\tstatus := struct {\n\t\tStatus string\n\t}{\n\t\tStatus: \"OK\",\n\t}\n\n\treturn web.Respond(ctx, w, status, http.StatusOK)\n}", "title": "" }, { "docid": "5faf2f1db54360057ee47b3c785231f7", "score": "0.5534838", "text": "func (K *KWAPI) respError(resp *http.Response) (err error) {\n\tif resp == nil {\n\t\treturn\n\t}\n\n\tif resp.StatusCode >= 200 && resp.StatusCode < 300 {\n\t\treturn nil\n\t}\n\n\tvar (\n\t\tsnoop_buffer bytes.Buffer\n\t\tbody io.Reader\n\t)\n\n\tresp.Body = iotimeout.NewReadCloser(resp.Body, K.RequestTimeout)\n\n\tif K.Snoop {\n\t\tSnoop(\"<-- RESPONSE STATUS: %s\", resp.Status)\n\t\tbody = io.TeeReader(resp.Body, &snoop_buffer)\n\t} else {\n\t\tbody = resp.Body\n\t}\n\n\t// kiteworks API Error\n\ttype KiteErr struct {\n\t\tError string `json:\"error\"`\n\t\tErrorDesc string `json:\"error_description\"`\n\t\tErrors []struct {\n\t\t\tCode string `json:\"code\"`\n\t\t\tMessage string `json:\"message\"`\n\t\t} `json:\"errors\"`\n\t}\n\n\toutput, err := ioutil.ReadAll(body)\n\n\tif K.Snoop {\n\t\tsnoop_request(&snoop_buffer)\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar kite_err *KiteErr\n\tjson.Unmarshal(output, &kite_err)\n\tif kite_err != nil {\n\t\te := NewKWError()\n\t\tfor _, v := range kite_err.Errors {\n\t\t\te.AddError(v.Code, v.Message)\n\t\t}\n\t\tif kite_err.ErrorDesc != NONE {\n\t\t\te.AddError(kite_err.Error, kite_err.ErrorDesc)\n\t\t}\n\t\treturn e\n\t}\n\n\tif resp.Status == \"401 Unathorized\" {\n\t\te := NewKWError()\n\t\te.AddError(\"ERR_AUTH_UNAUTHORIZED\", \"Unathorized Access Token\")\n\t\treturn e\n\t}\n\n\treturn fmt.Errorf(\"%s says \\\"%s.\\\"\", resp.Request.Host, resp.Status)\n}", "title": "" }, { "docid": "34872fb47916dd6715b7c883c5d0da99", "score": "0.55261195", "text": "func TestCallRequestTimeout(t *testing.T) {\n\trunTest(t, func(s *res.Service) {\n\t\ts.Handle(\"model\", res.Call(\"method\", func(r res.CallRequest) {\n\t\t\tr.Timeout(time.Second * 42)\n\t\t\tr.NotFound()\n\t\t}))\n\t}, func(s *restest.Session) {\n\t\treq := s.Call(\"test.model\", \"method\", nil)\n\t\treq.Response().AssertRawPayload([]byte(`timeout:\"42000\"`))\n\t\treq.Response().AssertError(res.ErrNotFound)\n\t})\n}", "title": "" }, { "docid": "281cbbf6b3173ea576b11684a3218715", "score": "0.5511774", "text": "func (r request) fail(err error) {\n\tr.resp <- err\n}", "title": "" }, { "docid": "9f30860d2000818578b7d0fd7a6d4a6a", "score": "0.55042624", "text": "func TestDoBadResponse(t *testing.T) {\n\tassert := assert.New(t)\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Write([]byte(`{\"foo\":`))\n\t}))\n\tdefer ts.Close()\n\n\t_, err := do(http.DefaultClient, httpGet, ts.URL, nil, nil)\n\n\tassert.NotNil(err)\n}", "title": "" }, { "docid": "d9210e8f854a2542a58ab59df82ab71f", "score": "0.54656637", "text": "func TestCallRequestTimeoutWithDurationLessThanZero(t *testing.T) {\n\trunTest(t, func(s *res.Service) {\n\t\ts.Handle(\"model\", res.Call(\"method\", func(r res.CallRequest) {\n\t\t\tpanicked := true\n\t\t\tdefer func() {\n\t\t\t\tif !panicked {\n\t\t\t\t\tt.Errorf(\"expected Timeout to panic, but nothing happened\")\n\t\t\t\t}\n\t\t\t}()\n\t\t\tr.Timeout(-time.Millisecond * 10)\n\t\t\tr.NotFound()\n\t\t\tpanicked = false\n\t\t}))\n\t}, func(s *restest.Session) {\n\t\ts.Call(\"test.model\", \"method\", nil).\n\t\t\tResponse().\n\t\t\tAssertErrorCode(\"system.internalError\")\n\t})\n}", "title": "" }, { "docid": "49ce51a4a15901c32b041412753af5a1", "score": "0.54517645", "text": "func failed(c echo.Context, code int, err error) error {\n\tresponse := map[string]interface{}{\n\t\t\"data\": nil,\n\t\t\"error\": map[string]interface{}{\n\t\t\t\"code\": 0,\n\t\t\t\"status\": code,\n\t\t\t\"message\": err.Error(),\n\t\t},\n\t}\n\tc.Response().Header().Set(\"Content-Type\", \"application/json\")\n\treturn c.JSON(code, response)\n}", "title": "" }, { "docid": "c55f6b9ea1836ac43c6a4660d6921088", "score": "0.54474306", "text": "func TestNewRequestTimeoutWithDurationLessThanZero(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.New(func(r res.NewRequest) {\n\t\t\tpanicked := true\n\t\t\tdefer func() {\n\t\t\t\tif !panicked {\n\t\t\t\t\tt.Errorf(\"expected Timeout to panic, but nothing happened\")\n\t\t\t\t}\n\t\t\t}()\n\t\t\tr.Timeout(-time.Millisecond * 10)\n\t\t\tr.NotFound()\n\t\t\tpanicked = false\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"call.test.model.new\", nil)\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertErrorCode(t, \"system.internalError\")\n\t})\n}", "title": "" }, { "docid": "ae322b3e819808a0de917eeadc105192", "score": "0.54104406", "text": "func TestCallOnResourceAfterAccessError(t *testing.T) {\n\tparams := json.RawMessage(`{\"value\":42}`)\n\tsuccessResponse := json.RawMessage(`{\"foo\":\"bar\"}`)\n\tsuccessResult := json.RawMessage(`{\"payload\":{\"foo\":\"bar\"}}`)\n\t// Access responses\n\tfullCallAccess := json.RawMessage(`{\"get\":true,\"call\":\"*\"}`)\n\tnoCallAccess := json.RawMessage(`{\"get\":true}`)\n\n\ttbl := []struct {\n\t\tFirstAccessResponse interface{} // Response on first access request. nil means timeout\n\t\tFirstExpectCall bool // Flag if a first call request is expected\n\t\tFirstExpected interface{}\n\t\tSecondAccessResponse interface{} // Response on second access request. noRequest means no second access request is expected. nil means timeout.\n\t\tSecondExpectCall bool // Flag if a first call request is expected\n\t\tSecondExpected interface{}\n\t}{\n\t\t{fullCallAccess, true, successResult, noRequest, true, successResult},\n\t\t{noCallAccess, false, reserr.ErrAccessDenied, noRequest, false, reserr.ErrAccessDenied},\n\t\t{reserr.ErrAccessDenied, false, reserr.ErrAccessDenied, noRequest, false, reserr.ErrAccessDenied},\n\t\t{nil, false, reserr.ErrTimeout, fullCallAccess, true, successResult},\n\t\t{nil, false, reserr.ErrTimeout, nil, false, reserr.ErrTimeout},\n\t\t{nil, false, reserr.ErrTimeout, reserr.ErrAccessDenied, false, reserr.ErrAccessDenied},\n\t\t{reserr.ErrInternalError, false, reserr.ErrInternalError, fullCallAccess, true, successResult},\n\t\t{reserr.ErrInternalError, false, reserr.ErrInternalError, nil, false, reserr.ErrTimeout},\n\t\t{reserr.ErrInternalError, false, reserr.ErrInternalError, reserr.ErrAccessDenied, false, reserr.ErrAccessDenied},\n\t}\n\n\tfor i, l := range tbl {\n\t\tfor subscribe := true; subscribe; subscribe = false {\n\t\t\trunNamedTest(t, fmt.Sprintf(\"#%d where subscribe is %+v\", i+1, subscribe), func(s *Session) {\n\t\t\t\tc := s.Connect()\n\t\t\t\tvar creq *ClientRequest\n\n\t\t\t\tif subscribe {\n\t\t\t\t\t// Subscribe to parent model\n\t\t\t\t\tsubscribeToTestModelParent(t, s, c, false)\n\t\t\t\t}\n\n\t\t\t\taccessResponse := l.FirstAccessResponse\n\t\t\t\texpectCall := l.FirstExpectCall\n\t\t\t\texpected := l.FirstExpected\n\t\t\t\tfor round := 0; round < 2; round++ {\n\t\t\t\t\t// Send client call request\n\t\t\t\t\tcreq = c.Request(\"call.test.model.method\", params)\n\n\t\t\t\t\t// Handle access request if one is expected\n\t\t\t\t\tif accessResponse != noRequest {\n\t\t\t\t\t\treq := s.GetRequest(t)\n\t\t\t\t\t\treq.AssertSubject(t, \"access.test.model\")\n\t\t\t\t\t\tif accessResponse == nil {\n\t\t\t\t\t\t\treq.Timeout()\n\t\t\t\t\t\t} else if err, ok := accessResponse.(*reserr.Error); ok {\n\t\t\t\t\t\t\treq.RespondError(err)\n\t\t\t\t\t\t} else if raw, ok := accessResponse.([]byte); ok {\n\t\t\t\t\t\t\treq.RespondRaw(raw)\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\treq.RespondSuccess(accessResponse)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tif expectCall {\n\t\t\t\t\t\t// Get call request\n\t\t\t\t\t\treq := s.GetRequest(t)\n\t\t\t\t\t\treq.AssertSubject(t, \"call.test.model.method\")\n\t\t\t\t\t\treq.RespondSuccess(successResponse)\n\t\t\t\t\t}\n\n\t\t\t\t\t// Validate client response\n\t\t\t\t\tcresp := creq.GetResponse(t)\n\t\t\t\t\tif err, ok := expected.(*reserr.Error); ok {\n\t\t\t\t\t\tcresp.AssertError(t, err)\n\t\t\t\t\t} else if code, ok := expected.(string); ok {\n\t\t\t\t\t\tcresp.AssertErrorCode(t, code)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tcresp.AssertResult(t, expected)\n\t\t\t\t\t}\n\n\t\t\t\t\taccessResponse = l.SecondAccessResponse\n\t\t\t\t\texpectCall = l.SecondExpectCall\n\t\t\t\t\texpected = l.SecondExpected\n\t\t\t\t}\n\t\t\t})\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0f399dc3489110c10021d480d8a82f03", "score": "0.53881395", "text": "func TestFastestURLFailure(t *testing.T) {\n\tctx, done := context.WithCancel(context.Background())\n\tdefer done()\n\ta, b, check := server(t, http.StatusBadRequest, http.StatusOK)\n\n\tfurl := fastesturl.New(nil, nil, check, []*url.URL{a, b})\n\tresp := furl.Do(ctx)\n\tif resp == nil {\n\t\tt.Fatalf(\"resp should not be nil\")\n\t}\n\trespServer := resp.Header.Get(\"X-Test-Server\")\n\tif respServer != \"2\" {\n\t\tt.Fatalf(\"test server 2 should be returned\")\n\t}\n}", "title": "" }, { "docid": "b373247997477c8a81e5c9425b2cf99a", "score": "0.53721076", "text": "func ConnectionFailure(req *http.Request, err error) (*http.Response, error) {\n\treturn nil, err\n}", "title": "" }, { "docid": "e335f23ec174c14cb277901080b4faa6", "score": "0.53717154", "text": "func TestOutgoingMailHandler_ServeHTTP_Error_500Returned(t *testing.T) {\n\tmockedMailContext := new(MockedOutgoingMailContext)\n\tmockedMailContext.throwError = true\n\ttestee := OutgoingMailHandler{Logger: testhelpers.GetTestLogger(), MailContext: mockedMailContext}\n\n\treq, err := http.NewRequest(\"GET\", shared.ReceivePath, nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\trr := httptest.NewRecorder()\n\thandler := http.HandlerFunc(testee.ServeHTTP)\n\n\thandler.ServeHTTP(rr, req)\n\tassert.Equal(t, 500, rr.Code, \"Status code 500 should be returned\")\n}", "title": "" }, { "docid": "93bd7002d0cf065da162934dbfb87078", "score": "0.53667647", "text": "func (ed *EndpointsServer) failRequest(w http.ResponseWriter, origRequest *http.Request, message string) string {\n\tcorsHandler := newCheckCorsHeaders(origRequest)\n\treturn sendErrorResponse(message, w, corsHandler)\n}", "title": "" }, { "docid": "0bfba87fd2f0bca0e0174fb48029e81b", "score": "0.5355559", "text": "func (e TimeoutError) Temporary() {}", "title": "" }, { "docid": "78e21bac62d0298a71c9a6401b6ec73b", "score": "0.53544223", "text": "func (s *failingServer) maybeFailRequest() error {\r\n\ts.mu.Lock()\r\n\tdefer s.mu.Unlock()\r\n\ts.reqCounter++\r\n\tif (s.reqModulo > 0) && (s.reqCounter%s.reqModulo == 0) {\r\n\t\treturn nil\r\n\t}\r\n\r\n\treturn status.Errorf(codes.Unavailable, \"maybeFailRequest: failing it\")\r\n}", "title": "" }, { "docid": "d46b90eb3efbcb96f20e10b2c356b2d0", "score": "0.5330041", "text": "func TestNewRequestTimeout(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.New(func(r res.NewRequest) {\n\t\t\tr.Timeout(time.Second * 42)\n\t\t\tr.NotFound()\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"call.test.model.new\", nil)\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertRawPayload(t, []byte(`timeout:\"42000\"`))\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertError(t, res.ErrNotFound)\n\t})\n}", "title": "" }, { "docid": "cbf0659282be43ffaac8d809028c3fdd", "score": "0.531244", "text": "func TestDoBadRequest(t *testing.T) {\n\t_, err := do(http.DefaultClient, httpGet, \"blah\", nil, nil)\n\tassert.Error(t, err)\n}", "title": "" }, { "docid": "efb31e46926e62ba5f04da6e017fd0c8", "score": "0.530301", "text": "func contextDone(err error) error {\n\tif err == nil || errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "c8665448a05aac1ae7236d16ab68e6c2", "score": "0.5297011", "text": "func goRoutineContextFailure(t *testing.T, wg *sync.WaitGroup, ctx context.Context) {\n\tdefer wg.Done()\n\n\tval, ok := ctx.Get(\"brolly\")\n\tif !ok {\n\t\ttests.Failed(\"Should have found key %q in the context\", \"brolly\")\n\t}\n\ttests.Passed(\"Should have found key %q in the context\", \"brolly\")\n\n\trealVal, _ := val.(string)\n\tif realVal != \"benzine\" {\n\t\ttests.Failed(\"Should have matched context key %q with value %q\", \"brolly\", \"benzine\")\n\t}\n\ttests.Passed(\"Should have matched context key %q with value %q\", \"brolly\", \"benzine\")\n\n\tselect {\n\tcase <-time.After(2 * time.Millisecond):\n\t\ttests.Passed(\"Should have successfully died through parent's call\")\n\tcase <-ctx.Done():\n\t\ttests.Failed(\"Should have successfully died through parent's call\")\n\t}\n}", "title": "" }, { "docid": "17dc96947f973994b463f429b46a0542", "score": "0.52934605", "text": "func (c *Context) Fail(status int, msg interface{}) {\n\tc.StopChain()\n\tc.Status(status)\n\tc.SetBody(msg)\n}", "title": "" }, { "docid": "911501dcebcf9dc1fd326ee1b83a15f5", "score": "0.5276967", "text": "func check_http_status(url string) (int) {\n status := 408 // Something went wrong, default to 'ClientRequestTimeout'\n\n client := &http.Client{\n Transport: &httpcontrol.Transport{\n RequestTimeout: time.Duration(config.Timeout) * time.Second,\n MaxTries: 3,\n },\n }\n\n res, err := client.Head(url)\n if err != nil {\n fmt.Println(\"Unable to check\")\n fmt.Println(err)\n }\n if res != nil {\n defer res.Body.Close()\n status = res.StatusCode\n }\n return status\n}", "title": "" }, { "docid": "a7ace6c94f937696c65fc784b86d5253", "score": "0.52631176", "text": "func TestHardShutdown(t *testing.T) {\n\thttpScenarios(t, func(t *testing.T, url string, client *http.Client, server func(context.Context, *dhttp.ServerConfig) error) {\n\t\tctx, hardCancel := context.WithCancel(dlog.NewTestContext(t, false))\n\t\tdefer hardCancel()\n\t\tctx = dcontext.WithSoftness(ctx)\n\n\t\tsRequestReceived := make(chan struct{})\n\t\tsRequestCanceled := make(chan struct{})\n\t\tsRequestFinished := make(chan struct{})\n\t\tcRequestFinished := make(chan struct{})\n\t\tsExited := make(chan struct{})\n\n\t\tsc := &dhttp.ServerConfig{\n\t\t\tHandler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\t\tclose(sRequestReceived)\n\n\t\t\t\t<-r.Context().Done()\n\t\t\t\tclose(sRequestCanceled)\n\n\t\t\t\t// Waiting for <-cRequestFinished is important; we need to make sure\n\t\t\t\t// that a hard shutdown is triggerd when handlers hang.\n\t\t\t\t<-cRequestFinished\n\t\t\t\tclose(sRequestFinished)\n\t\t\t}),\n\t\t}\n\t\tgo func() {\n\t\t\tassert.Error(t, server(ctx, sc))\n\t\t\tclose(sExited)\n\t\t}()\n\t\tgo func() {\n\t\t\tresp, err := client.Get(url)\n\t\t\t// `err != nil` is important; if the request got interrupted then it's\n\t\t\t// important that it isn't just interpretted as a truncated response, and is\n\t\t\t// actually an error.\n\t\t\tassert.Error(t, err)\n\t\t\tassert.Nil(t, resp)\n\t\t\tclose(cRequestFinished)\n\t\t}()\n\n\t\t<-sRequestReceived\n\t\thardCancel()\n\t\t<-sRequestCanceled\n\t\t<-cRequestFinished\n\t\t<-sExited\n\t\t<-sRequestFinished\n\t})\n}", "title": "" }, { "docid": "d326c6abcbcced38e96b575c216e0c08", "score": "0.5262645", "text": "func TestApiImpl_Search_uat_http400(t *testing.T) {\n\t// define some test data\n\tsearchEngineID := \"aaa\"\n\tkey := \"bbb\"\n\tquery := \"ccc\"\n\n\t// build a test server to replace Google\n\ttestServerWasCalled := false\n\ttestServer := httptest.NewServer(http.HandlerFunc(func(resp http.ResponseWriter, req *http.Request) {\n\t\ttestServerWasCalled = true\n\n\t\t// return HTTP 400 error\n\t\tresp.WriteHeader(http.StatusBadRequest)\n\t}))\n\n\t// build a client and inject the test server URI\n\tapi := NewAPI(key, searchEngineID)\n\tapi.(*apiImpl).serviceURI = testServer.URL\n\n\t// send the request\n\tresult, resultErr := api.Search(query)\n\n\t// validate the error is handled as we expect\n\tassert.Equal(t, EmptyResults, result)\n\tassert.NotNil(t, resultErr)\n\tassert.True(t, testServerWasCalled)\n}", "title": "" }, { "docid": "3b4123456543fb7c171fa60133dc87f9", "score": "0.5250849", "text": "func Fail(w http.ResponseWriter, status int, err error) {\n\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n}", "title": "" }, { "docid": "b35110a6d7ecc0e38a8d2679d3a9a6fe", "score": "0.5245992", "text": "func TestClientRequestRegisterOnTimeout(t *testing.T) {\n\tvar connection wwrclt.Client\n\n\t// Initialize webwire server given only the request\n\tsetup := setupTestServer(\n\t\tt,\n\t\t&serverImpl{\n\t\t\tonRequest: func(\n\t\t\t\t_ context.Context,\n\t\t\t\t_ wwr.Connection,\n\t\t\t\t_ wwr.Message,\n\t\t\t) (wwr.Payload, error) {\n\t\t\t\t// Verify pending requests\n\t\t\t\tassert.Equal(t, 1, connection.PendingRequests())\n\n\t\t\t\t// Wait until the request times out\n\t\t\t\ttime.Sleep(300 * time.Millisecond)\n\t\t\t\treturn wwr.Payload{}, nil\n\t\t\t},\n\t\t},\n\t\twwr.ServerOptions{},\n\t\tnil, // Use the default transport implementation\n\t)\n\n\t// Initialize client\n\tclient := setup.newClient(\n\t\twwrclt.Options{\n\t\t\tDefaultRequestTimeout: 2 * time.Second,\n\t\t},\n\t\tnil, // Use the default transport implementation\n\t\ttestClientHooks{},\n\t)\n\tconnection = client.connection\n\n\t// Connect the client to the server\n\trequire.NoError(t, client.connection.Connect())\n\n\t// Verify pending requests\n\trequire.Equal(t, 0, client.connection.PendingRequests())\n\n\t// Send request and await reply\n\tcontextWithDeadline, cancel := context.WithTimeout(\n\t\tcontext.Background(),\n\t\t200*time.Millisecond,\n\t)\n\tdefer cancel()\n\t_, reqErr := client.connection.Request(\n\t\tcontextWithDeadline,\n\t\tnil,\n\t\twwr.Payload{Data: []byte(\"t\")},\n\t)\n\trequire.Error(t, reqErr)\n\trequire.IsType(t, wwr.DeadlineExceededErr{}, reqErr)\n\trequire.True(t, wwr.IsTimeoutErr(reqErr))\n\trequire.False(t, wwr.IsCanceledErr(reqErr))\n\n\t// Verify pending requests\n\trequire.Equal(t, 0, client.connection.PendingRequests())\n}", "title": "" }, { "docid": "ce7c1cad5ce7a230546d442f1a7bf109", "score": "0.52437454", "text": "func (c *requestContext) fail(code int, msg string, args ...interface{}) {\n\tbody := fmt.Sprintf(msg, args...)\n\tlogging.Errorf(c, \"HTTP %d: %s\", code, body)\n\thttp.Error(c.w, body, code)\n}", "title": "" }, { "docid": "09403d9ff48e3ffdcab1964dc7fc010d", "score": "0.5240009", "text": "func testWebhookTimeout(t *testing.T, watchCache bool) {\n\ttype testWebhook struct {\n\t\tpath string\n\t\ttimeoutSeconds int32\n\t\tpolicy admissionregistrationv1.FailurePolicyType\n\t\tobjectSelector *metav1.LabelSelector\n\t}\n\n\ttestCases := []struct {\n\t\tname string\n\t\ttimeoutSeconds int32\n\t\tmutatingWebhooks []testWebhook\n\t\tvalidatingWebhooks []testWebhook\n\t\texpectInvocations []invocation\n\t\texpectError bool\n\t\terrorContainsAnyOf []string\n\t}{\n\t\t{\n\t\t\tname: \"minimum of request timeout or webhook timeout propagated\",\n\t\t\ttimeoutSeconds: 10,\n\t\t\tmutatingWebhooks: []testWebhook{\n\t\t\t\t{path: \"/mutating/1/0s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 20},\n\t\t\t\t{path: \"/mutating/2/0s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 5},\n\t\t\t},\n\t\t\tvalidatingWebhooks: []testWebhook{\n\t\t\t\t{path: \"/validating/3/0s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 20},\n\t\t\t\t{path: \"/validating/4/0s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 5},\n\t\t\t},\n\t\t\texpectInvocations: []invocation{\n\t\t\t\t{path: \"/mutating/1/0s\", timeoutSeconds: 10}, // from request\n\t\t\t\t{path: \"/mutating/2/0s\", timeoutSeconds: 5}, // from webhook config\n\t\t\t\t{path: \"/validating/3/0s\", timeoutSeconds: 10}, // from request\n\t\t\t\t{path: \"/validating/4/0s\", timeoutSeconds: 5}, // from webhook config\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tname: \"webhooks consume client timeout available, not webhook timeout\",\n\t\t\ttimeoutSeconds: 10,\n\t\t\tmutatingWebhooks: []testWebhook{\n\t\t\t\t{path: \"/mutating/1/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 20},\n\t\t\t\t{path: \"/mutating/2/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 5},\n\t\t\t\t{path: \"/mutating/3/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 20},\n\t\t\t},\n\t\t\tvalidatingWebhooks: []testWebhook{\n\t\t\t\t{path: \"/validating/4/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 5},\n\t\t\t\t{path: \"/validating/5/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 10},\n\t\t\t\t{path: \"/validating/6/1s\", policy: admissionregistrationv1.Fail, timeoutSeconds: 20},\n\t\t\t},\n\t\t\texpectInvocations: []invocation{\n\t\t\t\t{path: \"/mutating/1/1s\", timeoutSeconds: 10}, // from request\n\t\t\t\t{path: \"/mutating/2/1s\", timeoutSeconds: 5}, // from webhook config (less than request - 1s consumed)\n\t\t\t\t{path: \"/mutating/3/1s\", timeoutSeconds: 8}, // from request - 2s consumed\n\t\t\t\t{path: \"/validating/4/1s\", timeoutSeconds: 5}, // from webhook config (less than request - 3s consumed by mutating)\n\t\t\t\t{path: \"/validating/5/1s\", timeoutSeconds: 7}, // from request - 3s consumed by mutating\n\t\t\t\t{path: \"/validating/6/1s\", timeoutSeconds: 7}, // from request - 3s consumed by mutating\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tname: \"timed out client requests skip later mutating webhooks (regardless of failure policy) and fail\",\n\t\t\ttimeoutSeconds: 3,\n\t\t\tmutatingWebhooks: []testWebhook{\n\t\t\t\t{path: \"/mutating/1/5s\", policy: admissionregistrationv1.Ignore, timeoutSeconds: 4},\n\t\t\t\t{path: \"/mutating/2/1s\", policy: admissionregistrationv1.Ignore, timeoutSeconds: 5},\n\t\t\t\t{path: \"/mutating/3/1s\", policy: admissionregistrationv1.Ignore, timeoutSeconds: 5},\n\t\t\t},\n\t\t\texpectInvocations: []invocation{\n\t\t\t\t{path: \"/mutating/1/5s\", timeoutSeconds: 3}, // from request\n\t\t\t},\n\t\t\texpectError: true,\n\t\t\terrorContainsAnyOf: []string{\n\t\t\t\t// refer to https://github.com/kubernetes/kubernetes/issues/98606#issuecomment-774832633\n\t\t\t\t// for the reason for triggering this scenario\n\t\t\t\t\"stream error\",\n\t\t\t\t\"the server was unable to return a response in the time allotted\",\n\t\t\t},\n\t\t},\n\t}\n\n\troots := x509.NewCertPool()\n\tif !roots.AppendCertsFromPEM(localhostCert) {\n\t\tt.Fatal(\"Failed to append Cert from PEM\")\n\t}\n\tcert, err := tls.X509KeyPair(localhostCert, localhostKey)\n\tif err != nil {\n\t\tt.Fatalf(\"Failed to build cert with error: %+v\", err)\n\t}\n\n\trecorder := &timeoutRecorder{invocations: []invocation{}, markers: sets.NewString()}\n\twebhookServer := httptest.NewUnstartedServer(newTimeoutWebhookHandler(recorder))\n\twebhookServer.TLS = &tls.Config{\n\n\t\tRootCAs: roots,\n\t\tCertificates: []tls.Certificate{cert},\n\t}\n\twebhookServer.StartTLS()\n\tdefer webhookServer.Close()\n\n\ts := kubeapiservertesting.StartTestServerOrDie(t, kubeapiservertesting.NewDefaultTestServerOptions(), []string{\n\t\t\"--disable-admission-plugins=ServiceAccount\",\n\t\tfmt.Sprintf(\"--watch-cache=%v\", watchCache),\n\t}, framework.SharedEtcd())\n\tdefer s.TearDownFn()\n\n\t// Configure a client with a distinct user name so that it is easy to distinguish requests\n\t// made by the client from requests made by controllers. We use this to filter out requests\n\t// before recording them to ensure we don't accidentally mistake requests from controllers\n\t// as requests made by the client.\n\tclientConfig := rest.CopyConfig(s.ClientConfig)\n\tclientConfig.Timeout = 0 // no timeout, we want to set this manually\n\tclientConfig.Impersonate.UserName = testTimeoutClientUsername\n\tclientConfig.Impersonate.Groups = []string{\"system:masters\", \"system:authenticated\"}\n\tclient, err := clientset.NewForConfig(clientConfig)\n\tif err != nil {\n\t\tt.Fatalf(\"unexpected error: %v\", err)\n\t}\n\n\t_, err = client.CoreV1().Pods(\"default\").Create(context.TODO(), timeoutMarkerFixture, metav1.CreateOptions{})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tfor i, tt := range testCases {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\trecorder.Reset()\n\t\t\tns := fmt.Sprintf(\"reinvoke-%d\", i)\n\t\t\t_, err = client.CoreV1().Namespaces().Create(context.TODO(), &corev1.Namespace{ObjectMeta: metav1.ObjectMeta{Name: ns}}, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tmutatingWebhooks := []admissionregistrationv1.MutatingWebhook{}\n\t\t\tfor j, webhook := range tt.mutatingWebhooks {\n\t\t\t\tname := fmt.Sprintf(\"admission.integration.test.%d.%s\", j, strings.Replace(strings.TrimPrefix(webhook.path, \"/\"), \"/\", \"-\", -1))\n\t\t\t\tendpoint := webhookServer.URL + webhook.path\n\t\t\t\tmutatingWebhooks = append(mutatingWebhooks, admissionregistrationv1.MutatingWebhook{\n\t\t\t\t\tName: name,\n\t\t\t\t\tClientConfig: admissionregistrationv1.WebhookClientConfig{\n\t\t\t\t\t\tURL: &endpoint,\n\t\t\t\t\t\tCABundle: localhostCert,\n\t\t\t\t\t},\n\t\t\t\t\tRules: []admissionregistrationv1.RuleWithOperations{{\n\t\t\t\t\t\tOperations: []admissionregistrationv1.OperationType{admissionregistrationv1.OperationAll},\n\t\t\t\t\t\tRule: admissionregistrationv1.Rule{APIGroups: []string{\"\"}, APIVersions: []string{\"v1\"}, Resources: []string{\"pods\"}},\n\t\t\t\t\t}},\n\t\t\t\t\tObjectSelector: webhook.objectSelector,\n\t\t\t\t\tFailurePolicy: &tt.mutatingWebhooks[j].policy,\n\t\t\t\t\tTimeoutSeconds: &tt.mutatingWebhooks[j].timeoutSeconds,\n\t\t\t\t\tAdmissionReviewVersions: []string{\"v1beta1\"},\n\t\t\t\t\tSideEffects: &noSideEffects,\n\t\t\t\t})\n\t\t\t}\n\t\t\tmutatingCfg, err := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Create(context.TODO(), &admissionregistrationv1.MutatingWebhookConfiguration{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{Name: fmt.Sprintf(\"admission.integration.test-%d\", i)},\n\t\t\t\tWebhooks: mutatingWebhooks,\n\t\t\t}, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\tdefer func() {\n\t\t\t\terr := client.AdmissionregistrationV1().MutatingWebhookConfigurations().Delete(context.TODO(), mutatingCfg.GetName(), metav1.DeleteOptions{})\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tvalidatingWebhooks := []admissionregistrationv1.ValidatingWebhook{}\n\t\t\tfor j, webhook := range tt.validatingWebhooks {\n\t\t\t\tname := fmt.Sprintf(\"admission.integration.test.%d.%s\", j, strings.Replace(strings.TrimPrefix(webhook.path, \"/\"), \"/\", \"-\", -1))\n\t\t\t\tendpoint := webhookServer.URL + webhook.path\n\t\t\t\tvalidatingWebhooks = append(validatingWebhooks, admissionregistrationv1.ValidatingWebhook{\n\t\t\t\t\tName: name,\n\t\t\t\t\tClientConfig: admissionregistrationv1.WebhookClientConfig{\n\t\t\t\t\t\tURL: &endpoint,\n\t\t\t\t\t\tCABundle: localhostCert,\n\t\t\t\t\t},\n\t\t\t\t\tRules: []admissionregistrationv1.RuleWithOperations{{\n\t\t\t\t\t\tOperations: []admissionregistrationv1.OperationType{admissionregistrationv1.OperationAll},\n\t\t\t\t\t\tRule: admissionregistrationv1.Rule{APIGroups: []string{\"\"}, APIVersions: []string{\"v1\"}, Resources: []string{\"pods\"}},\n\t\t\t\t\t}},\n\t\t\t\t\tObjectSelector: webhook.objectSelector,\n\t\t\t\t\tFailurePolicy: &tt.validatingWebhooks[j].policy,\n\t\t\t\t\tTimeoutSeconds: &tt.validatingWebhooks[j].timeoutSeconds,\n\t\t\t\t\tAdmissionReviewVersions: []string{\"v1beta1\"},\n\t\t\t\t\tSideEffects: &noSideEffects,\n\t\t\t\t})\n\t\t\t}\n\t\t\tvalidatingCfg, err := client.AdmissionregistrationV1().ValidatingWebhookConfigurations().Create(context.TODO(), &admissionregistrationv1.ValidatingWebhookConfiguration{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{Name: fmt.Sprintf(\"admission.integration.test-%d\", i)},\n\t\t\t\tWebhooks: validatingWebhooks,\n\t\t\t}, metav1.CreateOptions{})\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\t\t\tdefer func() {\n\t\t\t\terr := client.AdmissionregistrationV1().ValidatingWebhookConfigurations().Delete(context.TODO(), validatingCfg.GetName(), metav1.DeleteOptions{})\n\t\t\t\tif err != nil {\n\t\t\t\t\tt.Fatal(err)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\t// wait until new webhook is called the first time\n\t\t\tif err := wait.PollImmediate(time.Millisecond*5, wait.ForeverTestTimeout, func() (bool, error) {\n\t\t\t\t_, err = client.CoreV1().Pods(\"default\").Patch(context.TODO(), timeoutMarkerFixture.Name, types.JSONPatchType, []byte(\"[]\"), metav1.PatchOptions{})\n\t\t\t\treceived := recorder.MarkerReceived()\n\t\t\t\tif len(tt.mutatingWebhooks) > 0 && !received.Has(\"mutating\") {\n\t\t\t\t\tt.Logf(\"Waiting for mutating webhooks to become effective, getting marker object: %v\", err)\n\t\t\t\t\treturn false, nil\n\t\t\t\t}\n\t\t\t\tif len(tt.validatingWebhooks) > 0 && !received.Has(\"validating\") {\n\t\t\t\t\tt.Logf(\"Waiting for validating webhooks to become effective, getting marker object: %v\", err)\n\t\t\t\t\treturn false, nil\n\t\t\t\t}\n\t\t\t\treturn true, nil\n\t\t\t}); err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tpod := &corev1.Pod{\n\t\t\t\tTypeMeta: metav1.TypeMeta{APIVersion: \"v1\", Kind: \"Pod\"},\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tNamespace: ns,\n\t\t\t\t\tName: \"labeled\",\n\t\t\t\t\tLabels: map[string]string{\"x\": \"true\"},\n\t\t\t\t},\n\t\t\t\tSpec: corev1.PodSpec{\n\t\t\t\t\tContainers: []corev1.Container{{\n\t\t\t\t\t\tName: \"fake-name\",\n\t\t\t\t\t\tImage: \"fakeimage\",\n\t\t\t\t\t}},\n\t\t\t\t},\n\t\t\t}\n\n\t\t\tbody, err := json.Marshal(pod)\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\t// set the timeout parameter manually so we don't actually cut off the request client-side, and wait for the server response\n\t\t\terr = client.CoreV1().RESTClient().Post().Resource(\"pods\").Namespace(ns).Body(body).Param(\"timeout\", fmt.Sprintf(\"%ds\", tt.timeoutSeconds)).Do(context.TODO()).Error()\n\t\t\t// _, err = testClient.CoreV1().Pods(ns).Create(pod)\n\n\t\t\tif tt.expectError {\n\t\t\t\tif err == nil {\n\t\t\t\t\tt.Fatalf(\"expected error but got none\")\n\t\t\t\t}\n\n\t\t\t\texpected := false\n\t\t\t\tif len(tt.errorContainsAnyOf) != 0 {\n\t\t\t\t\tfor _, errStr := range tt.errorContainsAnyOf {\n\t\t\t\t\t\tif strings.Contains(err.Error(), errStr) {\n\t\t\t\t\t\t\texpected = true\n\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tif !expected {\n\t\t\t\t\tt.Errorf(\"expected the error to be any of %q, but got: %v\", tt.errorContainsAnyOf, err)\n\t\t\t\t}\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif err != nil {\n\t\t\t\tt.Fatal(err)\n\t\t\t}\n\n\t\t\tif tt.expectInvocations != nil {\n\t\t\t\tfor i, invocation := range tt.expectInvocations {\n\t\t\t\t\tif len(recorder.invocations) <= i {\n\t\t\t\t\t\tt.Errorf(\"expected invocation of %s, got none\", invocation.path)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tif recorder.invocations[i].path != invocation.path {\n\t\t\t\t\t\tt.Errorf(\"expected invocation of %s, got %s\", invocation.path, recorder.invocations[i].path)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif recorder.invocations[i].timeoutSeconds != invocation.timeoutSeconds {\n\t\t\t\t\t\tt.Errorf(\"expected invocation of %s with timeout %d, got %d\", invocation.path, invocation.timeoutSeconds, recorder.invocations[i].timeoutSeconds)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif len(recorder.invocations) > len(tt.expectInvocations) {\n\t\t\t\t\tfor _, invocation := range recorder.invocations[len(tt.expectInvocations):] {\n\t\t\t\t\t\tt.Errorf(\"unexpected invocation of %s\", invocation.path)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "e5ad5989ccaa463466ac3d51b79fb54f", "score": "0.5226153", "text": "func (tc *testClient) timeout(ctx context.Context) (context.Context, context.CancelFunc) {\n\tif tc.perOperationTimeout != nil {\n\t\treturn context.WithTimeout(ctx, tc.perOperationTimeout.AsDuration())\n\t}\n\treturn context.WithCancel(ctx)\n}", "title": "" }, { "docid": "4cf0f222bfc240d26508fd6771c94661", "score": "0.5225192", "text": "func (c *FakeContext) Err() error {\n\treturn c.Error\n}", "title": "" }, { "docid": "27b1f6dac0ceb4f1732c7783d01b2795", "score": "0.52177554", "text": "func TestShowLocationWeatherNotExpired(t *testing.T) {\n assumeLocationExists()\n assumeLocationWeatherNotExpired()\n prepareGetWeatherRequest()\n request, _ := http.NewRequest(\"GET\", url, nil)\n res, _ := http.DefaultClient.Do(request)\n\n if res.StatusCode != 200 {\n t.Errorf(\"Expected: %d, Got %d\", 200, res.StatusCode)\n }\n\n body, _ := ioutil.ReadAll(res.Body)\n bodyStr := string(body)\n\n if bodyStr != cachedWeatherStr {\n t.Errorf(\"Expected response weather: %s, Got %s\", cachedWeatherStr, bodyStr)\n }\n}", "title": "" }, { "docid": "c52f6e288cd0ce3758c923720f7fb4cb", "score": "0.5213504", "text": "func (ut *UserTests) getUser400(t *testing.T) {\n\tid := \"12345\"\n\n\tr := httptest.NewRequest(\"GET\", \"/v1/users/\"+id, nil)\n\tw := httptest.NewRecorder()\n\n\tr.Header.Set(\"Authorization\", \"Bearer \"+ut.adminToken)\n\n\tut.app.ServeHTTP(w, r)\n\n\tt.Log(\"Given the need to validate getting a user with a malformed userid.\")\n\t{\n\t\ttestID := 0\n\t\tt.Logf(\"\\tTest %d:\\tWhen using the new user %s.\", testID, id)\n\t\t{\n\t\t\tif w.Code != http.StatusBadRequest {\n\t\t\t\tt.Fatalf(\"\\t%s\\tTest %d:\\tShould receive a status code of 400 for the response : %v\", tests.Failed, testID, w.Code)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tTest %d:\\tShould receive a status code of 400 for the response.\", tests.Success, testID)\n\n\t\t\trecv := w.Body.String()\n\t\t\tresp := `{\"error\":\"ID is not in its proper form\"}`\n\t\t\tif resp != recv {\n\t\t\t\tt.Logf(\"\\t\\tTest %d:\\tGot : %v\", testID, recv)\n\t\t\t\tt.Logf(\"\\t\\tTest %d:\\tWant: %v\", testID, resp)\n\t\t\t\tt.Fatalf(\"\\t%s\\tTest %d:\\tShould get the expected result.\", tests.Failed, testID)\n\t\t\t}\n\t\t\tt.Logf(\"\\t%s\\tTest %d:\\tShould get the expected result.\", tests.Success, testID)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8c5f1ff7ea03a8f7906f0e9bbcabb9ae", "score": "0.51876956", "text": "func sendError(writer http.ResponseWriter, response *FailedResponse, statusCode int) {\n writer.Header().Set(\"Content-Type\", \"application/json\")\n writer.WriteHeader(statusCode)\n response.Success = false\n response.RequestedOn = time.Now().Unix()\n err := json.NewEncoder(writer).Encode(response)\n if err != nil {\n format.Println(\"Failed to encode response\")\n }\n}", "title": "" }, { "docid": "6360703707fba34f5c1a37b759673e98", "score": "0.5178792", "text": "func TestGetTokenNoError(t *testing.T) {\n\tpostRequestFunc = func(url string, data url.Values) (*http.Response, error) {\n\t\treturn &http.Response{\n\t\t\tStatusCode: http.StatusOK,\n\t\t\tBody: ioutil.NopCloser(strings.NewReader(`{\"access_token\":\"ephemeral_access_token\",\"not-before-policy\":0,\"session_state\":\"random-session-state\",\"scope\":\"openid offline_access\"}`)),\n\t\t}, nil\n\t}\n\trestclient.AuthHTTPClient = &postClientMock{} //without this line, the real api is fired\n\n\tresponse, err := AuthProvider.GetToken(auth_domain.AuthRequest{Token: \"this_is_my_token\"})\n\tassert.NotNil(t, response)\n\tassert.Nil(t, err)\n\tassert.EqualValues(t, \"ephemeral_access_token\", response.AccessToken)\n}", "title": "" }, { "docid": "b7270d397312d5b6cbcb2f82cefbe8cb", "score": "0.5175881", "text": "func TestH2H2InvalidResponseCL(t *testing.T) {\n\tst := newServerTester([]string{\"--http2-bridge\"}, t, func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Add(\"content-length\", \"\")\n\t})\n\tdefer st.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H2InvalidResponseCL\",\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\tif got, want := res.errCode, http2.ErrCodeInternal; got != want {\n\t\tt.Errorf(\"res.errCode: %v; want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "c98ecb4f3be008f3c86e945756e12402", "score": "0.5175111", "text": "func TestResponseWhenBackendFileNotFound(t *testing.T) {\n\tfritz := New()\n\tfritz.LoginChallengeResponse = \"../mock/does/not/exist.xml\"\n\tfritz.Start()\n\tdefer fritz.Close()\n\tr, _ := (&http.Client{}).Get(fritz.Server.URL + \"/login_sid.lua\")\n\tassert5xxResponse(t, r)\n}", "title": "" }, { "docid": "9685aefc5ff19407ee3c9e236ab3e773", "score": "0.51741105", "text": "func shouldRetry(ctx context.Context, resp *http.Response, err error) (bool, error) {\n\tif fserrors.ContextError(ctx, &err) {\n\t\treturn false, err\n\t}\n\tretry := false\n\tif resp != nil {\n\t\tswitch resp.StatusCode {\n\t\tcase 400:\n\t\t\tif apiErr, ok := err.(*api.Error); ok {\n\t\t\t\tif apiErr.ErrorInfo.InnerError.Code == \"pathIsTooLong\" {\n\t\t\t\t\treturn false, fserrors.NoRetryError(err)\n\t\t\t\t}\n\t\t\t}\n\t\tcase 401:\n\t\t\tif len(resp.Header[\"Www-Authenticate\"]) == 1 && strings.Contains(resp.Header[\"Www-Authenticate\"][0], \"expired_token\") {\n\t\t\t\tretry = true\n\t\t\t\tfs.Debugf(nil, \"Should retry: %v\", err)\n\t\t\t} else if err != nil && strings.Contains(err.Error(), \"Unable to initialize RPS\") {\n\t\t\t\tretry = true\n\t\t\t\tfs.Debugf(nil, \"HTTP 401: Unable to initialize RPS. Trying again.\")\n\t\t\t}\n\t\tcase 429: // Too Many Requests.\n\t\t\t// see https://docs.microsoft.com/en-us/sharepoint/dev/general-development/how-to-avoid-getting-throttled-or-blocked-in-sharepoint-online\n\t\t\tif values := resp.Header[\"Retry-After\"]; len(values) == 1 && values[0] != \"\" {\n\t\t\t\tretryAfter, parseErr := strconv.Atoi(values[0])\n\t\t\t\tif parseErr != nil {\n\t\t\t\t\tfs.Debugf(nil, \"Failed to parse Retry-After: %q: %v\", values[0], parseErr)\n\t\t\t\t} else {\n\t\t\t\t\tduration := time.Second * time.Duration(retryAfter)\n\t\t\t\t\tretry = true\n\t\t\t\t\terr = pacer.RetryAfterError(err, duration)\n\t\t\t\t\tfs.Debugf(nil, \"Too many requests. Trying again in %d seconds.\", retryAfter)\n\t\t\t\t}\n\t\t\t}\n\t\tcase 504: // Gateway timeout\n\t\t\tgatewayTimeoutError.Do(func() {\n\t\t\t\tfs.Errorf(nil, \"%v: upload chunks may be taking too long - try reducing --onedrive-chunk-size or decreasing --transfers\", err)\n\t\t\t})\n\t\tcase 507: // Insufficient Storage\n\t\t\treturn false, fserrors.FatalError(err)\n\t\t}\n\t}\n\treturn retry || fserrors.ShouldRetry(err) || fserrors.ShouldRetryHTTP(resp, retryErrorCodes), err\n}", "title": "" }, { "docid": "85324eb4e3effbfd055a338f41bc286b", "score": "0.5168331", "text": "func checkCtx(ctx context.Context) error {\n\tswitch ctx.Err() {\n\tcase context.Canceled:\n\t\treturn backend.ErrContextCancelled\n\tcase context.DeadlineExceeded:\n\t\treturn backend.ErrContextExpired\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "5acdf0afa1d5894ac3977f987d2b72ae", "score": "0.5167907", "text": "func TestGetModelRequestTimeoutWithDurationLessThanZero(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.GetModel(func(r res.ModelRequest) {\n\t\t\tpanicked := true\n\t\t\tdefer func() {\n\t\t\t\tif !panicked {\n\t\t\t\t\tt.Errorf(\"expected Timeout to panic, but nothing happened\")\n\t\t\t\t}\n\t\t\t}()\n\t\t\tr.Timeout(-time.Millisecond * 10)\n\t\t\tr.NotFound()\n\t\t\tpanicked = false\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"get.test.model\", nil)\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertErrorCode(t, \"system.internalError\")\n\t})\n}", "title": "" }, { "docid": "7043853158c3357ba1c19011130e401f", "score": "0.5167488", "text": "func createClient(ctx context.Context, t time.Duration) *http.Client {\n ctx, cancel := context.WithDeadline(context.Background(), time.Now().Add(60 * time.Second))\n defer cancel()\n //return &http.Client{Transport: &http.Transport{Context: ctx}}\n client := &http.Client{\n Timeout: 60 * time.Second,\n }\n return client\n}", "title": "" }, { "docid": "122e9d137e44d7df41182b202644778a", "score": "0.5155311", "text": "func httpFailure(w http.ResponseWriter, httpStatusCode int) {\n http.Error(w, http.StatusText(httpStatusCode), httpStatusCode)\n}", "title": "" }, { "docid": "3a4348cd66c2720c771f2337b889c4f2", "score": "0.5152623", "text": "func TestTimeoutErrorUnhandled(t *testing.T) {\n\tassert := assert.New(t)\n\tsConfig, cConfig := getConfigs()\n\tcConfig.Timeout = time.Nanosecond\n\tservice := NewService(sConfig)\n\n\terr := service.Run(testCommand, func() (error, error) {\n\t\t<-time.After(time.Millisecond)\n\t\treturn nil, nil\n\t}, nil)\n\n\t// Expect the unhandled error\n\tassert.NotNil(err)\n\t_, ok := err.(*TimeoutError)\n\tassert.True(ok)\n\n\terr = service.Run(testCommand, func() (error, error) {\n\t\t<-time.After(time.Millisecond)\n\t\treturn nil, nil\n\t}, &ErrorHandlers{Timeout: func(err error) (bool, error) {\n\t\treturn false, nil\n\t}})\n\n\t// Expect the unhandled error\n\tassert.NotNil(err)\n\t_, ok = err.(*TimeoutError)\n\tassert.True(ok)\n}", "title": "" }, { "docid": "584a8223fd1f253307af9d4e896808a8", "score": "0.5148082", "text": "func (s *LimiterSuite) TestFailure(c *C) {\n\tl, err := NewTokenLimiterWithOptions(\n\t\tMapClientIp, Rate{Units: 1, Period: time.Second}, Options{TimeProvider: s.tm})\n\tc.Assert(err, IsNil)\n\n\t_, err = l.ProcessRequest(makeRequest(\"\"))\n\tc.Assert(err, NotNil)\n}", "title": "" }, { "docid": "468d1c66989bcdec6058af1df90e8b56", "score": "0.51460063", "text": "func respondWithError(w http.ResponseWriter, code int, message string) {\r\n respondWithJSON(w, code, map[string]string{\"error\": message})\r\n}", "title": "" }, { "docid": "f99bc88dd271d485eb8ee06e1defa720", "score": "0.5144122", "text": "func (err *ResponseError) Timeout() bool {\n\treturn err.timeout\n}", "title": "" }, { "docid": "23a32a43694e9adbfc84024969dff7d8", "score": "0.51407063", "text": "func (mrf *mockRaftFuture) Error() error { return mrf.err }", "title": "" }, { "docid": "ff87573d0d4d8e435b7aa3f5fcc3ac49", "score": "0.5132878", "text": "func TestFastestURLAllFailure(t *testing.T) {\n\tctx, done := context.WithCancel(context.Background())\n\tdefer done()\n\ta, b, check := server(t, http.StatusBadRequest, http.StatusBadRequest)\n\n\tfurl := fastesturl.New(nil, nil, check, []*url.URL{a, b})\n\tresp := furl.Do(ctx)\n\tif resp != nil {\n\t\tt.Fatalf(\"resp should be nil\")\n\t}\n}", "title": "" }, { "docid": "c969ef7e6be49b4f3d173f906b94c8f4", "score": "0.5128701", "text": "func (this *Module) Failure() {\n\tthis.Res.res.Code(400)\n\tpanic(nil)\n\treturn\n}", "title": "" }, { "docid": "6d0a42f2861458b184b46a04ed1e1a8d", "score": "0.51282185", "text": "func testCtx(t *testing.T) func() context.Context {\n\tctx, cancel := context.WithCancel(context.Background())\n\tt.Cleanup(cancel)\n\treturn func() context.Context {\n\t\tif ctx.Err() != nil {\n\t\t\ttime.Sleep(time.Hour)\n\t\t}\n\t\treturn ctx\n\t}\n}", "title": "" }, { "docid": "69f8e8551eefcdc28835dd78dcb1fe95", "score": "0.5127516", "text": "func gtmOpenApiHealthCheck(clientSecret string, host string, accessToken string, clientToken string) (string, backend.HealthStatus) {\n\n\tto := time.Now() // now\n\tfrom := to.Add(-5 * time.Minute) // five minutes ago\n\tinterval := Interval(FIVE_MINUTES)\n\n\tfromRounded := roundupTimeForInterval(from, interval)\n\ttoRounded := roundupTimeForInterval(to, interval)\n\topenurl := createTestOpenUrl(fromRounded, toRounded, interval, \"-fake-\") // The URL\n\tlog.DefaultLogger.Info(\"gtmOpenApiHealthCheck\", \"openurl\", openurl)\n\n\tconfig := NewEdgegridConfig(clientSecret, host, accessToken, clientToken)\n\n\t// Send GET request to the OPEN API\n\tapireq, err := client.NewRequest(*config, \"GET\", openurl, nil)\n\tif err != nil {\n\t\tlog.DefaultLogger.Error(\"Error creating GET request\", \"err\", err)\n\t\treturn err.Error(), backend.HealthStatusError\n\t}\n\tapiresp, err := client.Do(*config, apireq)\n\tif err != nil {\n\t\tlog.DefaultLogger.Error(\"OPEN API communication error\", \"err\", err)\n\t\treturn err.Error(), backend.HealthStatusError\n\t}\n\n\tlog.DefaultLogger.Info(\"gtmOpenApiHealthCheck\", \"Status (403 expected)\", apiresp.Status)\n\n\t// 403 Forbidden is expected because -test- is not a valid zone name.\n\n\t// Not a 403 response: datasource failed.\n\tif apiresp.StatusCode != 403 {\n\t\tvar rspDto OpenApiErrorRspDto\n\t\terr := json.NewDecoder(apiresp.Body).Decode(&rspDto)\n\t\tmsg := \"Unexpected status code. Datasource failed: \"\n\t\tif err != nil { // A JSON decode error. Not the expected body. Use the response status for the error message.\n\t\t\tmsg += apiresp.Status\n\t\t} else {\n\t\t\tmsg += rspDto.Errors[0].Title\n\t\t}\n\t\tlog.DefaultLogger.Error(\"gtmOpenApiTest\", \"msg\", msg)\n\t\treturn msg, backend.HealthStatusError // RETURN\n\t}\n\n\t// 403 response\n\tvar rspDto OpenApiErrorRspDto\n\terr = json.NewDecoder(apiresp.Body).Decode(&rspDto)\n\n\t// 403 response but not the expected body: datasource failed.\n\tif err != nil {\n\t\tmsg := \"Unexpected response format. Datasource failed: \" + apiresp.Status\n\t\tlog.DefaultLogger.Error(\"gtmOpenApiTest\", \"msg\", msg)\n\t\treturn msg, backend.HealthStatusError // RETURN\n\t}\n\n\t// 403 response with the expected body\n\terrorTitle := rspDto.Errors[0].Title\n\n\t// 403 response but not the expected error: datasource failed.\n\tif errorTitle != \"Some of the requested objects are unauthorized: [-fake-]\" {\n\t\tmsg := \"Unexpected error type. Datasource failed: \" + errorTitle\n\t\tlog.DefaultLogger.Error(\"gtmOpenApiTest\", \"msg\", msg)\n\t\treturn msg, backend.HealthStatusError // RETURN\n\t}\n\n\treturn \"Data source is working\", backend.HealthStatusOk\n}", "title": "" }, { "docid": "b2210371f41b82e456475ddfa87d193a", "score": "0.51137567", "text": "func (r *Response) Err() error { return r.err }", "title": "" }, { "docid": "1894c933730c6df392a1ef32fff7f335", "score": "0.5096521", "text": "func serveError(c context.Context, w http.ResponseWriter, err error) {\n w.WriteHeader(http.StatusInternalServerError)\n w.Header().Set(\"Content-Type\", \"text/plain\")\n io.WriteString(w, \"Internal Server Error\")\n ////log.Panicf(\"%v\", err)\n}", "title": "" }, { "docid": "5843616071111914b3976ba7c416eae3", "score": "0.5088327", "text": "func mockHandler(resp queryrange.Response, err error) queryrange.Handler {\n\treturn queryrange.HandlerFunc(func(ctx context.Context, req queryrange.Request) (queryrange.Response, error) {\n\t\tif expired := ctx.Err(); expired != nil {\n\t\t\treturn nil, expired\n\t\t}\n\n\t\treturn resp, err\n\t})\n}", "title": "" }, { "docid": "c8d6e9ba0563cf0a24276647def0f731", "score": "0.5081277", "text": "func (he *HTTPError) Timeout() bool {\n\tswitch he.StatusCode {\n\tcase http.StatusRequestTimeout: // 408\n\t\treturn true\n\tcase http.StatusGatewayTimeout: // 504\n\t\treturn true\n\tdefault:\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "a4d45b02b514b254eed640e3754adfbf", "score": "0.5080547", "text": "func getHttpError(r *http.Response) (error, bool) {\n\tswitch {\n\tcase r.StatusCode < http.StatusBadRequest:\n\t\treturn nil, false\n\tcase r.StatusCode < http.StatusInternalServerError:\n\t\treturn fmt.Errorf(\"innkeeper request failed: %s\", r.Status), true\n\tcase r.StatusCode < 600:\n\t\treturn fmt.Errorf(\"innkeeper error: %s\", r.Status), true\n\tdefault:\n\t\treturn fmt.Errorf(\"unexpected error: %d - %s\", r.StatusCode, r.Status), true\n\t}\n}", "title": "" }, { "docid": "3d21bba0f8cf718d445f3338556fc6b1", "score": "0.5080288", "text": "func TestH2H1ConnectFailure(t *testing.T) {\n\tst := newServerTester(nil, t, noopHandler)\n\tdefer st.Close()\n\n\t// shutdown backend server to simulate backend connect failure\n\tst.ts.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H1ConnectFailure\",\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\twant := 503\n\tif got := res.status; got != want {\n\t\tt.Errorf(\"status: %v; want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "db38688d8a1d9f735767f5fcc7666382", "score": "0.5080106", "text": "func TestH2H1BadResponseCL(t *testing.T) {\n\tst := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {\n\t\t// we set content-length: 1024, but only send 3 bytes.\n\t\tw.Header().Add(\"Content-Length\", \"1024\")\n\t\tw.Write([]byte(\"foo\"))\n\t})\n\tdefer st.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H1BadResponseCL\",\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\n\twant := http2.ErrCodeProtocol\n\tif res.errCode != want {\n\t\tt.Errorf(\"res.errCode = %v; want %v\", res.errCode, want)\n\t}\n}", "title": "" }, { "docid": "99073703dab6e3dd1ed9d6035ea5af41", "score": "0.5075984", "text": "func TestGetIllegalId(t *testing.T) {\n\n\thandler := HandleGetResult\n\treq, err := http.NewRequest(\"GET\", \"http://example.com/reverse/abcd\", nil)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tw := httptest.NewRecorder()\n\thandler(w, req)\n\n\tfmt.Printf(\"%d - %s\", w.Code, w.Body.String())\n\tif w.Code != 400 {\n\t\tt.Errorf(\"Expected code 400, received code %d\\n\", w.Code)\n\t}\n}", "title": "" }, { "docid": "75c7946f962a58d838e23bdfaf4c2287", "score": "0.50683194", "text": "func TestRetryNetworkTimeout(t *testing.T) {\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\ttime.Sleep(1 * time.Second)\n\t\tw.WriteHeader(200)\n\t}))\n\tdefer ts.Close()\n\n\treq := gentleman.NewRequest()\n\treq.URL(ts.URL)\n\treq.Use(timeout.Request(100 * time.Millisecond))\n\treq.Use(New(nil, nil))\n\n\tres, err := req.Send()\n\tutils.NotEqual(t, err, nil)\n\tutils.Equal(t, strings.Contains(err.Error(), \"request canceled\"), true)\n\tutils.Equal(t, res.Ok, false)\n\tutils.Equal(t, res.StatusCode, 0)\n}", "title": "" }, { "docid": "77c7300177d9831afb2cfff7766a1f05", "score": "0.5054676", "text": "func TestQueueingTimeout(t *testing.T) {\n\tw := testSlowRequestProcessing(\"timeout\", 2, 1, 1, time.Microsecond)\n\n\tif w.Code != 503 {\n\t\tt.Fatal(\"QueueRequests should timeout queued request\")\n\t}\n}", "title": "" }, { "docid": "ce214854ee8a230f32be2545d086cd4b", "score": "0.5052056", "text": "func TestHttp404(t *testing.T) {\n\tjolokia := genJolokiaClientStub(invalidJSON, 404, Servers, []Metric{UsedHeapMetric})\n\n\tvar acc testutil.Accumulator\n\tacc.SetDebug(true)\n\terr := acc.GatherError(jolokia.Gather)\n\n\trequire.Error(t, err)\n\trequire.Equal(t, 0, len(acc.Metrics))\n\trequire.Contains(t, err.Error(), \"has status code 404\")\n}", "title": "" }, { "docid": "3a9943469c9638d53125decf9934c090", "score": "0.5036303", "text": "func (FailingMockHttpCaller) Do(req *http.Request) (*http.Response, error) {\n\treturn &http.Response{}, errors.New(\"testing error handling\")\n}", "title": "" }, { "docid": "a33ef69e7411bb2601179123e33e7ee8", "score": "0.5036141", "text": "func testHTTPResponse(t *testing.T, r *gin.Engine, req *http.Request, f func(w *httptest.ResponseRecorder) bool) {\n\t// Create a response recorder\n\tw := httptest.NewRecorder()\n\t// Create the service and process the above request.\n\tr.ServeHTTP(w, req)\n\n\tif !f(w) {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "fe3df37a8291910eabe5eaa01e13369c", "score": "0.5033216", "text": "func (he *HTTPError) Temporary() bool {\n\tif he.Timeout() {\n\t\treturn true\n\t}\n\tswitch he.StatusCode {\n\tcase http.StatusTooManyRequests: // 429\n\t\treturn true\n\tcase http.StatusInternalServerError: // 500\n\t\treturn true\n\tcase http.StatusBadGateway: // 502\n\t\treturn true\n\tcase http.StatusServiceUnavailable: // 503\n\t\treturn true\n\tdefault:\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "f920ad8cd12fcdc7ab042069824c1019", "score": "0.5032852", "text": "func TestShowLocationWeatherExpired(t *testing.T) {\n assumeLocationExists()\n assumeLocationWeatherExpired()\n prepareGetWeatherRequest()\n request, _ := http.NewRequest(\"GET\", url, nil)\n res, _ := http.DefaultClient.Do(request)\n\n // here it will request openweathermap.com API, maybe stub it?\n\n if res.StatusCode != 200 {\n t.Errorf(\"Expected: %d, Got %d\", 200, res.StatusCode)\n }\n\n body, _ := ioutil.ReadAll(res.Body)\n var m map[string]interface{}\n json.Unmarshal(body, &m)\n\n var found = false\n for k, _ := range m {\n if k == \"weather\" {\n found = true\n }\n }\n\n if !found {\n t.Errorf(\"Expected weather condition, Got nothing\")\n }\n\n if string(body) == cachedWeatherStr {\n t.Errorf(\"Expected new weather condition, Got cached\")\n }\n}", "title": "" }, { "docid": "d54ff89fe1bae066d2b5e6070a590e85", "score": "0.5031171", "text": "func TestReuseAPIKeyUntilExpired(t *testing.T) {\n\trequests := []struct {\n\t\tpath, apiKey string\n\t\treturnExpired bool\n\t}{\n\t\t{\n\t\t\t\"oauth2/\",\n\t\t\t\"apikey#0\",\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"/query\",\n\t\t\t\"apikey#0\",\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"/query\",\n\t\t\t\"apikey#0\",\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"/query\",\n\t\t\t\"apikey#0\",\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"oauth2/\",\n\t\t\t\"apikey#1\",\n\t\t\tfalse,\n\t\t},\n\t\t{\n\t\t\t\"/query\",\n\t\t\t\"apikey#1\",\n\t\t\tfalse,\n\t\t},\n\t}\n\n\t// State kept over executions of requests.\n\t// It is used to validate the current state by comparison with\n\t// the expected.\n\tcurrentIndex := 0\n\n\tconst (\n\t\tkeyExpired = `{\n\"err\":\"Invalid API key or user key\",\n\"@attributes\":{\"err_code\": 1}\n}`\n\t)\n\n\ttestClient := newTestHTTPClient(func(req *http.Request) *http.Response {\n\n\t\t// Index is incremented on exit.\n\t\tdefer func() { currentIndex++ }()\n\n\t\tu := req.URL.Path\n\t\tswitch {\n\t\tcase strings.Contains(u, `oauth2/`):\n\t\t\tif requests[currentIndex].path != `oauth2/` {\n\t\t\t\tt.Fatalf(\"request #%d expected to be oauth2\", currentIndex)\n\t\t\t}\n\t\t\tif got := req.PostFormValue(\"username\"); got != \"a@b.com\" {\n\t\t\t\tt.Fatalf(\"expected credential: username=%s, got: %s\", \"a@b.com\", got)\n\t\t\t}\n\t\t\tif got := req.PostFormValue(\"password\"); got != \"pass\" {\n\t\t\t\tt.Fatalf(\"expected credential: password=%s, got: %s\", \"pass\", got)\n\t\t\t}\n\t\t\tif got := req.PostFormValue(\"client_secret\"); got != \"clientsecret\" {\n\t\t\t\tt.Fatalf(\"expected credential: client_secret=%s, got: %s\", \"clientsecret\", got)\n\t\t\t}\n\t\t\tif got := req.PostFormValue(\"client_id\"); got != \"clientid\" {\n\t\t\t\tt.Fatalf(\"expected credential: client_id=%s, got: %s\", \"clientid\", got)\n\t\t\t}\n\t\t\tif got := req.PostFormValue(\"grant_type\"); got != \"password\" {\n\t\t\t\tt.Fatalf(\"expected credential: grant_type=%s, got: %s\", \"password\", got)\n\t\t\t}\n\t\t\treturn &http.Response{\n\t\t\t\tStatusCode: 200,\n\t\t\t\tBody: ioutil.NopCloser(bytes.NewBufferString(\n\t\t\t\t\tfmt.Sprintf(`{\"access_token\":\"%s\"}`, requests[currentIndex].apiKey))),\n\t\t\t\tHeader: make(http.Header)}\n\t\tcase strings.Contains(u, `/query`):\n\t\t\tif got := requests[currentIndex].path; got != `/query` {\n\t\t\t\tt.Fatalf(\"request #%d was expected to be a query; got %q\", currentIndex, got)\n\t\t\t}\n\t\t\texpected := fmt.Sprintf(\n\t\t\t\t\"Bearer %s\", requests[currentIndex].apiKey)\n\t\t\tif req.Header[\"Authorization\"] == nil {\n\t\t\t\tt.Fatal(\"Authorization header missing\")\n\t\t\t}\n\t\t\tif auth := req.Header[\"Authorization\"][0]; auth != expected {\n\t\t\t\tt.Fatalf(`expected Authorization header %q, got %q, index %d`,\n\t\t\t\t\texpected, auth, currentIndex)\n\t\t\t}\n\t\t\tvar jsonStr = `{\"result\":{}}`\n\t\t\tif requests[currentIndex].returnExpired {\n\t\t\t\tjsonStr = keyExpired\n\t\t\t}\n\t\t\treturn &http.Response{\n\t\t\t\tStatusCode: 200,\n\t\t\t\tBody: ioutil.NopCloser(bytes.NewBufferString(jsonStr)),\n\t\t\t\tHeader: make(http.Header)}\n\t\tdefault:\n\t\t\treturn nil\n\t\t}\n\t})\n\n\tclient := newTestClient(testClient)\n\n\tfor range []int{0, 1, 2} {\n\t\treq, err := client.NewRequest(\n\t\t\tmockEndpoint{PathFunc: func() string { return \"/query\" }},\n\t\t\tmake(http.Header))\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"no errors expected, got %s\", err)\n\t\t}\n\t\t_, err = client.Call(req)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"no errors expected, got %s\", err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "01f992598a9bcfc460f3bceb58df5d82", "score": "0.5025606", "text": "func (r *response) requestTooLarge() {\n\tr.closeAfterReply = true\n\tr.requestBodyLimitHit = true\n\tif !r.wroteHeader {\n\t\tr.Header().Set(hdr.Connection, DoClose)\n\t}\n}", "title": "" }, { "docid": "2c2d07af26620f5d51924f5c7d6efaf8", "score": "0.50232667", "text": "func TestHealthCheckHandler(t *testing.T) {\n\n\tt.Run(\"OK HealthCheck\", func(t *testing.T) {\n\t\tdb.DBconn = &db.MockDB{\n\t\t\tErr: nil,\n\t\t}\n\t\tdb.Etcd = &db.MockEtcdClient{\n\t\t\tErr: nil,\n\t\t}\n\t\trequest := httptest.NewRequest(\"GET\", \"/v1/healthcheck\", nil)\n\t\tresp := executeRequest(request, NewRouter(nil, nil, nil, nil, nil, nil, nil, nil, nil))\n\n\t\t//Check returned code\n\t\tif resp.StatusCode != http.StatusOK {\n\t\t\tt.Fatalf(\"Expected %d; Got: %d\", http.StatusOK, resp.StatusCode)\n\t\t}\n\t})\n\n\tt.Run(\"FAILED HealthCheck DB\", func(t *testing.T) {\n\t\tdb.DBconn = &db.MockDB{\n\t\t\tErr: pkgerrors.New(\"Runtime Error in DB\"),\n\t\t}\n\t\tdb.Etcd = &db.MockEtcdClient{\n\t\t\tErr: nil,\n\t\t}\n\t\trequest := httptest.NewRequest(\"GET\", \"/v1/healthcheck\", nil)\n\t\tresp := executeRequest(request, NewRouter(nil, nil, nil, nil, nil, nil, nil, nil, nil))\n\n\t\t//Check returned code\n\t\tif resp.StatusCode != http.StatusInternalServerError {\n\t\t\tt.Fatalf(\"Expected %d; Got: %d\", http.StatusInternalServerError, resp.StatusCode)\n\t\t}\n\t})\n\n\tt.Run(\"FAILED HealthCheck Etcd\", func(t *testing.T) {\n\t\tdb.DBconn = &db.MockDB{\n\t\t\tErr: nil,\n\t\t}\n\t\tdb.Etcd = &db.MockEtcdClient{\n\t\t\tErr: pkgerrors.New(\"Runtime Error in Etcd\"),\n\t\t}\n\t\trequest := httptest.NewRequest(\"GET\", \"/v1/healthcheck\", nil)\n\t\tresp := executeRequest(request, NewRouter(nil, nil, nil, nil, nil, nil, nil, nil, nil))\n\n\t\t//Check returned code\n\t\tif resp.StatusCode != http.StatusInternalServerError {\n\t\t\tt.Fatalf(\"Expected %d; Got: %d\", http.StatusInternalServerError, resp.StatusCode)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "2ead36bffe2e3a7d27bd4f658b4bb01c", "score": "0.5019658", "text": "func TestTimeoutErrorHandled(t *testing.T) {\n\tassert := assert.New(t)\n\tsConfig, cConfig := getConfigs()\n\tcConfig.Timeout = time.Nanosecond\n\tservice := NewService(sConfig)\n\thandled := make(chan error, 1)\n\n\terr := service.Run(testCommand, func() (error, error) {\n\t\t<-time.After(time.Millisecond)\n\t\treturn nil, nil\n\t}, &ErrorHandlers{Timeout: func(err error) (bool, error) {\n\t\thandled <- err\n\t\treturn true, nil\n\t}})\n\n\t// Expect the error to have been handled\n\tassert.Nil(err)\n\tselect {\n\tcase err = <-handled:\n\t\t_, ok := err.(*TimeoutError)\n\t\tassert.True(ok)\n\tcase <-time.After(time.Millisecond):\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "3021bc525773862e6e23f3a94fae3536", "score": "0.5016329", "text": "func Test_NegativePathDueToErrorCatchingEnemyInformation(t *testing.T) {\n\texecution := handler.Execution{MessageInterceptor: &services.GenericInterceptor{Calculator: &services.GenericCalculator{}}}\n\n\tinput := \"{\\\"satellites\\\": [\" +\n\t\t\"{\\\"name\\\": \\\"kenobi\\\", \" +\n\t\t\"\\\"distance\\\": 1.0,\" +\n\t\t\"\\\"message\\\": [\\\"este\\\", \\\"\\\", \\\"\\\", \\\"mensaje\\\", \\\"\\\"]},\" +\n\t\t\"{\\\"name\\\": \\\"skywalker\\\", \" +\n\t\t\"\\\"distance\\\": 1.5,\" +\n\t\t\"\\\"message\\\": [\\\"\\\", \\\"es\\\", \\\"\\\", \\\"\\\", \\\"secreto\\\"]},\" +\n\t\t\"{\\\"name\\\": \\\"sato\\\", \" +\n\t\t\"\\\"distance\\\": 1.7,\" +\n\t\t\"\\\"message\\\": [\\\"este\\\", \\\"\\\", \\\"un\\\", \\\"\\\", \\\"\\\"]} ]}\"\n\n\trequest := events.APIGatewayProxyRequest{Body: input, HTTPMethod: \"POST\"}\n\tmessage := \"It's not possible to get enemy information \"\n\texpected := events.APIGatewayProxyResponse{Body: fmt.Sprintf(\"message: %s\",message), StatusCode: http.StatusBadRequest}\n\n\tresponse, err := execution.HandlerRequest(nil, request)\n\tassert.Equal(t, expected, response)\n\tassert.Nil(t, err)\n}", "title": "" }, { "docid": "57c1ac75090e4b7f55bae00d6dda24b4", "score": "0.50107193", "text": "func TestHTTPRetry(t *testing.T) {\n\tconst case1Empty = \"/\"\n\tvar jsonBlob = []byte(`\n\t\t{\"name\": \"Platypus\", \"order\": \"Monotremata\"}\n\t`)\n\ttryTimes := 0\n\tmaxRetryTimes := 5\n\tbackoff := float64(1)\n\tts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// check method is GET before going to check other features\n\t\tif r.Method != GET {\n\t\t\tt.Errorf(\"Expected method %q; got %q\", GET, r.Method)\n\t\t}\n\t\tswitch r.URL.Path {\n\t\tdefault:\n\t\t\tt.Errorf(\"No testing for this case yet : %q\", r.URL.Path)\n\t\tcase case1Empty:\n\t\t\tt.Logf(\"case %v \", case1Empty)\n\t\t\ttryTimes++\n\t\t\tw.WriteHeader(500)\n\t\t\tw.Write(jsonBlob)\n\t\t}\n\t}))\n\n\tdefer ts.Close()\n\tc := New().Retry(maxRetryTimes, backoff)\n\tc.Request().Get(ts.URL + case1Empty).\n\t\tEnd()\n\n\t{\n\t\tif maxRetryTimes != tryTimes-1 {\n\t\t\tt.Errorf(\"Retry times dose not match setting, actual retryTimes is %v\", tryTimes)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8295dbe9611e0f279c2f53b2d219b236", "score": "0.50086707", "text": "func TestGetModelRequestTimeout(t *testing.T) {\n\trunTest(t, func(s *Session) {\n\t\ts.Handle(\"model\", res.GetModel(func(r res.ModelRequest) {\n\t\t\tr.Timeout(time.Second * 42)\n\t\t\tr.NotFound()\n\t\t}))\n\t}, func(s *Session) {\n\t\tinb := s.Request(\"get.test.model\", nil)\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertRawPayload(t, []byte(`timeout:\"42000\"`))\n\t\ts.GetMsg(t).AssertSubject(t, inb).AssertError(t, res.ErrNotFound)\n\t})\n}", "title": "" }, { "docid": "5d161a0359ec392923b8524c154a8076", "score": "0.5002928", "text": "func (client DictionaryClient) GetLongInvalidStringResponder(resp *http.Response) (result SetInt64, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result.Value),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "title": "" }, { "docid": "9033fed05d73cd10142120dab4d7aafa", "score": "0.5001789", "text": "func (client DictionaryClient) GetInvalidResponder(resp *http.Response) (result SetString, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result.Value),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "title": "" }, { "docid": "48cb95d72633c26c617b12cfc9ce1f3c", "score": "0.49977067", "text": "func (c *Context) Err() error {\n\treturn c.Request.Context().Err()\n}", "title": "" }, { "docid": "c919602fb02cfd78d9e5c6fb68862e38", "score": "0.49953565", "text": "func handleErr(hf func(c *gin.Context) error) func(c *gin.Context) {\n\treturn func(c *gin.Context) {\n\t\tif err := hf(c); err != nil {\n\t\t\tlog.Errorf(\"server error. %v\", err)\n\t\t\tc.AbortWithStatus(http.StatusInternalServerError)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e9f7745ca3ff9f91cedf1b83fcd96c23", "score": "0.4995318", "text": "func testHTTPResponse(t *testing.T, r *gin.Engine, req *http.Request, f func(w *httptest.ResponseRecorder) bool) {\n\n\t// Create a response recorder\n\tw := httptest.NewRecorder()\n\n\t// Create the service and process the above request.\n\tr.ServeHTTP(w, req)\n\n\tif !f(w) {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "2cc7d2e2c7a8a60d9a6432cbec3ab7b9", "score": "0.4992983", "text": "func (s *IntegrationTestSuite) testFailedMultihopIBCTokenTransfer() {\n\ttime.Sleep(30 * time.Second)\n\n\ts.Run(\"send_failed_multihop_uatom_to_chainA_from_chainA\", func() {\n\t\taddress := s.chainA.validators[0].keyInfo.GetAddress()\n\t\tsender := address.String()\n\n\t\taddress = s.chainB.validators[0].keyInfo.GetAddress()\n\t\tmiddlehop := address.String()\n\n\t\taddress = s.chainA.validators[1].keyInfo.GetAddress()\n\t\trecipient := strings.Replace(address.String(), \"cosmos\", \"foobar\", 1) // this should be an invalid recipient to force the tx to fail\n\n\t\tforwardPort := \"transfer\"\n\t\tforwardChannel := \"channel-0\"\n\n\t\ttokenAmt := 3300000000\n\n\t\tchainAAPIEndpoint := fmt.Sprintf(\"http://%s\", s.valResources[s.chainA.id][0].GetHostPort(\"1317/tcp\"))\n\n\t\tvar (\n\t\t\tbeforeSenderUAtomBalance sdk.Coin\n\t\t\terr error\n\t\t)\n\n\t\ts.Require().Eventually(\n\t\t\tfunc() bool {\n\t\t\t\tbeforeSenderUAtomBalance, err = getSpecificBalance(chainAAPIEndpoint, sender, uatomDenom)\n\t\t\t\ts.Require().NoError(err)\n\n\t\t\t\treturn beforeSenderUAtomBalance.IsValid()\n\t\t\t},\n\t\t\t1*time.Minute,\n\t\t\t5*time.Second,\n\t\t)\n\n\t\tfirstHopMetadata := &PacketMetadata{\n\t\t\tForward: &ForwardMetadata{\n\t\t\t\tReceiver: recipient,\n\t\t\t\tChannel: forwardChannel,\n\t\t\t\tPort: forwardPort,\n\t\t\t},\n\t\t}\n\n\t\tmemo, err := json.Marshal(firstHopMetadata)\n\t\ts.Require().NoError(err)\n\n\t\ts.sendIBC(s.chainA, 0, sender, middlehop, strconv.Itoa(tokenAmt)+uatomDenom, standardFees.String(), string(memo))\n\n\t\t// Sender account should be initially decremented the full amount\n\t\ts.Require().Eventually(\n\t\t\tfunc() bool {\n\t\t\t\tafterSenderUAtomBalance, err := getSpecificBalance(chainAAPIEndpoint, sender, uatomDenom)\n\t\t\t\ts.Require().NoError(err)\n\n\t\t\t\treturned := beforeSenderUAtomBalance.Sub(tokenAmount).Sub(standardFees).IsEqual(afterSenderUAtomBalance)\n\n\t\t\t\treturn returned\n\t\t\t},\n\t\t\t1*time.Minute,\n\t\t\t1*time.Second,\n\t\t)\n\n\t\t// since the forward receiving account is invalid, it should be refunded to the original sender (minus the original fee)\n\t\ts.Require().Eventually(\n\t\t\tfunc() bool {\n\t\t\t\tafterSenderUAtomBalance, err := getSpecificBalance(chainAAPIEndpoint, sender, uatomDenom)\n\t\t\t\ts.Require().NoError(err)\n\n\t\t\t\treturned := beforeSenderUAtomBalance.Sub(standardFees).IsEqual(afterSenderUAtomBalance)\n\n\t\t\t\treturn returned\n\t\t\t},\n\t\t\t5*time.Minute,\n\t\t\t5*time.Second,\n\t\t)\n\t})\n}", "title": "" }, { "docid": "6a1570c16f249e82fdd0f1bcd898894a", "score": "0.4982052", "text": "func Timeout(timeout time.Duration) func(next chi.Handler) chi.Handler {\n\treturn func(next chi.Handler) chi.Handler {\n\t\tfn := func(ctx context.Context, fctx *fasthttp.RequestCtx) {\n\t\t\tctx, cancel := context.WithTimeout(ctx, timeout)\n\t\t\tdefer func() {\n\t\t\t\tcancel()\n\t\t\t\tif ctx.Err() == context.DeadlineExceeded {\n\t\t\t\t\tfctx.SetStatusCode(fasthttp.StatusGatewayTimeout)\n\t\t\t\t}\n\t\t\t}()\n\n\t\t\tnext.ServeHTTPC(ctx, fctx)\n\t\t}\n\t\treturn chi.HandlerFunc(fn)\n\t}\n}", "title": "" }, { "docid": "1eeb2a2f9530e067a1255ea6e8426dca", "score": "0.49817777", "text": "func TestHTTPHardShutdown(t *testing.T) {\n\tctx, hardCancel := context.WithCancel(dlog.NewTestContext(t, false))\n\tdefer hardCancel()\n\tctx = dcontext.WithSoftness(ctx)\n\n\tlistener, err := net.Listen(\"tcp\", \"127.0.0.1:0\")\n\tif err != nil {\n\t\tif listener, err = net.Listen(\"tcp6\", \"[::1]:0\"); err != nil {\n\t\t\tt.Fatalf(\"httptest: failed to listen on a port: %v\", err)\n\t\t}\n\t}\n\n\turl := \"http://\" + listener.Addr().String()\n\tsRequestReceived := make(chan struct{})\n\tsRequestCanceled := make(chan struct{})\n\tsRequestFinished := make(chan struct{})\n\tcRequestFinished := make(chan struct{})\n\tsExited := make(chan struct{})\n\n\tsrv := &http.Server{\n\t\tHandler: http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tclose(sRequestReceived)\n\n\t\t\t<-r.Context().Done()\n\t\t\tclose(sRequestCanceled)\n\n\t\t\t// Waiting for <-cRequestFinished is important; we need to make sure that a\n\t\t\t// hard shutdown is triggerd when handlers hang.\n\t\t\t<-cRequestFinished\n\t\t\tclose(sRequestFinished)\n\t\t}),\n\t}\n\n\tgo func() {\n\t\tassert.Error(t, dutil.ServeHTTPWithContext(ctx, srv, listener))\n\t\tclose(sExited)\n\t}()\n\tgo func() {\n\t\tresp, err := http.Get(url)\n\t\t// `err != nil` is important; if the request got interrupted then it's important\n\t\t// that it isn't just interpretted as a truncated response, and is actually an\n\t\t// error.\n\t\tassert.Error(t, err)\n\t\tassert.Nil(t, resp)\n\t\tclose(cRequestFinished)\n\t}()\n\n\t<-sRequestReceived\n\thardCancel()\n\t<-sRequestCanceled\n\t<-cRequestFinished\n\t<-sExited\n\t<-sRequestFinished\n}", "title": "" }, { "docid": "0bc5e9a56dae77140cd44d3fcfa8f7c7", "score": "0.4978569", "text": "func badRequestResp( queryValue int, w http.ResponseWriter, r *http.Request, passingError error ){\n\n var err RestError;\n\n\terr.HttpErrorCode = BadRequestErrorCode;// 400 response code: Client Bad Request Error\n\tw.WriteHeader( err.HttpErrorCode );\n\n\tqueryForm, _ := url.ParseQuery( r.URL.RawQuery );\n\tfmt.Fprintf(os.Stderr, \"Bad Request: queryForm = %s\\n\",queryForm);\n\n err.ErrorMessage = \"invalid num value, should be unsigned number larger than 0. \"\n\n\tif( passingError == nil ){\n err.InternalErrorCode = 1001; // customized error code. should be in const...\n\t\terr.ErrorMessage += fmt.Sprintln( \"but input was \" , queryValue );\n\t}else{\n err.InternalErrorCode = 1002;\n\t\terr.ErrorMessage += fmt.Sprintln( \"input failure, error =\", passingError );\n\t}\n err.MoreInfo = \"Usage: $IP:$port/v1/fibonacci?num=33 \"\n\n\tio.WriteString(w, returnJson( err ) )\n}", "title": "" }, { "docid": "23872c1fb974bf589fc83c325452c6fa", "score": "0.497676", "text": "func TestH2H1InvalidMethod(t *testing.T) {\n\tst := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {\n\t\tt.Errorf(\"server should not forward this request\")\n\t})\n\tdefer st.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H1InvalidMethod\",\n\t\tmethod: \"get\",\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\tif got, want := res.status, 501; got != want {\n\t\tt.Errorf(\"status: %v; want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "bbe9101ac4b0f282c35162574e3ba954", "score": "0.4976433", "text": "func TestH2H2ConnectFailure(t *testing.T) {\n\tst := newServerTester([]string{\"--http2-bridge\"}, t, noopHandler)\n\tdefer st.Close()\n\n\t// simulate backend connect attempt failure\n\tst.ts.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H2ConnectFailure\",\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\twant := 503\n\tif got := res.status; got != want {\n\t\tt.Errorf(\"status: %v; want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "c2b28252c87d8df5f88328375bba6bdd", "score": "0.49755442", "text": "func GetResultBadRequest(t goatest.TInterface, ctx context.Context, service *goa.Service, ctrl app.ResultController, resultID string) (http.ResponseWriter, error) {\n\t// Setup service\n\tvar (\n\t\tlogBuf bytes.Buffer\n\t\tresp interface{}\n\n\t\trespSetter goatest.ResponseSetterFunc = func(r interface{}) { resp = r }\n\t)\n\tif service == nil {\n\t\tservice = goatest.Service(&logBuf, respSetter)\n\t} else {\n\t\tlogger := log.New(&logBuf, \"\", log.Ltime)\n\t\tservice.WithLogger(goa.NewLogger(logger))\n\t\tnewEncoder := func(io.Writer) goa.Encoder { return respSetter }\n\t\tservice.Encoder = goa.NewHTTPEncoder() // Make sure the code ends up using this decoder\n\t\tservice.Encoder.Register(newEncoder, \"*/*\")\n\t}\n\n\t// Setup request context\n\trw := httptest.NewRecorder()\n\tu := &url.URL{\n\t\tPath: fmt.Sprintf(\"/sao/v1/results/%v\", resultID),\n\t}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\tpanic(\"invalid test \" + err.Error()) // bug\n\t}\n\tprms := url.Values{}\n\tprms[\"resultID\"] = []string{fmt.Sprintf(\"%v\", resultID)}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tgoaCtx := goa.NewContext(goa.WithAction(ctx, \"ResultTest\"), rw, req, prms)\n\tgetCtx, _err := app.NewGetResultContext(goaCtx, req, service)\n\tif _err != nil {\n\t\te, ok := _err.(goa.ServiceError)\n\t\tif !ok {\n\t\t\tpanic(\"invalid test data \" + _err.Error()) // bug\n\t\t}\n\t\treturn nil, e\n\t}\n\n\t// Perform action\n\t_err = ctrl.Get(getCtx)\n\n\t// Validate response\n\tif _err != nil {\n\t\tt.Fatalf(\"controller returned %+v, logs:\\n%s\", _err, logBuf.String())\n\t}\n\tif rw.Code != 400 {\n\t\tt.Errorf(\"invalid response status code: got %+v, expected 400\", rw.Code)\n\t}\n\tvar mt error\n\tif resp != nil {\n\t\tvar _ok bool\n\t\tmt, _ok = resp.(error)\n\t\tif !_ok {\n\t\t\tt.Fatalf(\"invalid response media: got variable of type %T, value %+v, expected instance of error\", resp, resp)\n\t\t}\n\t}\n\n\t// Return results\n\treturn rw, mt\n}", "title": "" }, { "docid": "33947f33a4b1943e6d61d64b2a16b41b", "score": "0.49735552", "text": "func TestH2H1InvalidRequestCL(t *testing.T) {\n\tst := newServerTester(nil, t, func(w http.ResponseWriter, r *http.Request) {\n\t\tt.Errorf(\"server should not forward bad request\")\n\t})\n\tdefer st.Close()\n\n\tres, err := st.http2(requestParam{\n\t\tname: \"TestH2H1InvalidRequestCL\",\n\t\theader: []hpack.HeaderField{\n\t\t\tpair(\"content-length\", \"\"),\n\t\t},\n\t})\n\tif err != nil {\n\t\tt.Fatalf(\"Error st.http2() = %v\", err)\n\t}\n\tif got, want := res.errCode, http2.ErrCodeProtocol; got != want {\n\t\tt.Errorf(\"res.errCode: %v; want %v\", got, want)\n\t}\n}", "title": "" }, { "docid": "a8c71daccd602f912b6bdbb5c8ae26e0", "score": "0.4963852", "text": "func handleError(w http.ResponseWriter, r *http.Request, err error) {\n\tfmt.Printf(\"Error: %v\", err)\n\tweb.Respond(w, r, err, http.StatusInternalServerError)\n}", "title": "" }, { "docid": "fc848a2c586a1471416aeaa4050c8b1d", "score": "0.4961385", "text": "func (client DictionaryClient) GetLongValidResponder(resp *http.Response) (result SetInt64, err error) { \n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK),\n autorest.ByUnmarshallingJSON(&result.Value),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n}", "title": "" }, { "docid": "f78d1f7f2add367b9ca22eb01d208edf", "score": "0.49523008", "text": "func Fail(w http.ResponseWriter, status, code int, details string) {\n\tresponse := &Response{\n\t\tStatus: StatusNOk,\n\t\tError: &CustomError{\n\t\t\tCode: code,\n\t\t\tDetails: details,\n\t\t},\n\t}\n\tresult, err := json.Marshal(response)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 400)\n\t\treturn\n\t}\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(status)\n\tw.Write(result)\n}", "title": "" }, { "docid": "abde1aa7d95f24accc883003bc90160f", "score": "0.49521253", "text": "func (tc TestCases) expect() {\n\tif !reflect.DeepEqual(tc.resp, tc.respExp) {\n\t\ttc.t.Error(fmt.Sprintf(\"\\nRequested: \", tc.req, \"\\nExpected: \", tc.respExp, \"\\nFound: \", tc.resp))\n\t}\n}", "title": "" }, { "docid": "679df9b16f04f038804f7056924e08aa", "score": "0.49511576", "text": "func (api *API) readError(c echo.Context, err error) *echo.HTTPError {\n\tapi.systemMetrics.Inc(metrics.Error, 1)\n\tgm := c.Get(\"gm\") // DO NOT cast .(metrics.Metrics), only use maybeInc()\n\tswitch v := err.(type) {\n\tcase etre.Error:\n\t\tmaybeInc(metrics.ClientError, 1, gm)\n\t\treturn echo.NewHTTPError(v.HTTPStatus, err)\n\tcase entity.ValidationError:\n\t\tmaybeInc(metrics.ClientError, 1, gm)\n\t\tetreError := etre.Error{\n\t\t\tMessage: v.Err.Error(),\n\t\t\tType: v.Type,\n\t\t\tHTTPStatus: http.StatusBadRequest,\n\t\t}\n\t\treturn echo.NewHTTPError(etreError.HTTPStatus, etreError)\n\tcase auth.Error:\n\t\t// Metric incremented by caller\n\t\tetreError := etre.Error{\n\t\t\tMessage: v.Err.Error(),\n\t\t\tType: v.Type,\n\t\t\tHTTPStatus: v.HTTPStatus,\n\t\t}\n\t\treturn echo.NewHTTPError(etreError.HTTPStatus, etreError)\n\tcase entity.DbError:\n\t\tdbErr := err.(entity.DbError)\n\t\tif dbErr.Err == context.DeadlineExceeded {\n\t\t\tmaybeInc(metrics.QueryTimeout, 1, gm)\n\t\t} else {\n\t\t\tlog.Printf(\"DATABASE ERROR: %v\", dbErr)\n\t\t\tmaybeInc(metrics.DbError, 1, gm)\n\t\t}\n\t\tetreError := etre.Error{\n\t\t\tMessage: dbErr.Error(),\n\t\t\tType: dbErr.Type,\n\t\t\tHTTPStatus: http.StatusServiceUnavailable,\n\t\t\tEntityId: dbErr.EntityId,\n\t\t}\n\t\treturn echo.NewHTTPError(etreError.HTTPStatus, etreError)\n\tdefault:\n\t\tlog.Printf(\"API ERROR: %v\", err)\n\t\tmaybeInc(metrics.APIError, 1, gm)\n\t\treturn echo.NewHTTPError(http.StatusInternalServerError, err)\n\t}\n}", "title": "" } ]
f58948e303066e4ddfd35beb13072fbb
simulateInterrupt requests invoking the clean termination process by an internal component instead of a SIGINT.
[ { "docid": "a4e228f132756d25aeb705dbe90e1b0b", "score": "0.74596435", "text": "func simulateInterrupt() {\n\tselect {\n\tcase simulateInterruptChannel <- struct{}{}:\n\tdefault:\n\t}\n}", "title": "" } ]
[ { "docid": "b41211394f608b8b2677210659dc5288", "score": "0.7223089", "text": "func interrupt() {\n\tc := make(chan os.Signal, 2)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-c\n\t\tfmt.Println(\"Program exited with interrupt\")\n\t\tos.Exit(1)\n\t}()\n}", "title": "" }, { "docid": "609cb421d5c1029532adf378e6b0f5d1", "score": "0.7215941", "text": "func intelSignalHandler(ic *intel.Collection) {\n\tquit := make(chan os.Signal, 1)\n\n\tsignal.Notify(quit, os.Interrupt, syscall.SIGTERM)\n\t<-quit\n\tic.Done()\n}", "title": "" }, { "docid": "853b1ba3b89e0258c93f73a0eaab3385", "score": "0.71398634", "text": "func handleInterrupt(killSignal os.Signal, pChanExit chan bool, cChanExit chan bool) {\n\tfmt.Printf(\"[%s] INFO main got signal %s\\n\", Package, killSignal.String())\n\n\t// broadcast exit signal to stop routines\n\tpChanExit <- true\n\tcChanExit <- true\n}", "title": "" }, { "docid": "4377e1303608cbad4d2f84ff3a98c1f4", "score": "0.7060209", "text": "func (m MonitoredCmd) Interrupt() {\n\tm.signalChan <- syscall.SIGINT\n}", "title": "" }, { "docid": "172fb0405ba9d599e678c8666979169c", "score": "0.7054783", "text": "func interrupt(cancel <-chan struct{}) error {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, syscall.SIGINT, syscall.SIGTERM)\n\tselect {\n\tcase sig := <-c:\n\t\treturn fmt.Errorf(\"received signal %s\", sig)\n\tcase <-cancel:\n\t\treturn errors.New(\"canceled\")\n\t}\n}", "title": "" }, { "docid": "ec902ea9428efeaf58f8e0d09226a6f3", "score": "0.70306945", "text": "func SignalInterrupt() {\n\tclose(interrupted)\n}", "title": "" }, { "docid": "49c6a4dd313c23297ebcdc200e8653a8", "score": "0.67172056", "text": "func catchInterruptPanic() {\n\tsigchan := make(chan os.Signal, 1)\n\tsignal.Notify(sigchan, os.Interrupt)\n\t<-sigchan\n\tsignal.Stop(sigchan)\n\tprintProgramStatus()\n\tpanic(\"SIGINT\")\n}", "title": "" }, { "docid": "2f8c72f96edacff71a8a4ed9efe1d8eb", "score": "0.6676597", "text": "func handleInterrupt() {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt)\n\n\tgo func() {\n\t\tfor _ = range c {\n\t\t\tlog.Info(\"Received interrupt signal, terminating...\")\n\t\t\tos.Exit(0)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "722c40605fb1dac8e02489be331e5d4b", "score": "0.6657616", "text": "func cancelOnInterrupt(ctx context.Context, cancel context.CancelFunc) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\tcase <-c:\n\t\t\tcancel()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "722c40605fb1dac8e02489be331e5d4b", "score": "0.6657616", "text": "func cancelOnInterrupt(ctx context.Context, cancel context.CancelFunc) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\tcase <-c:\n\t\t\tcancel()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "56f07217d962d96ff6d8c8594da83a59", "score": "0.6581916", "text": "func onInterruptSignal(fn func()) {\n\tsignalChan := make(chan os.Signal, 1)\n\tsignal.Notify(signalChan, syscall.SIGINT, syscall.SIGTERM)\n\tgo func() {\n\t\t<-signalChan\n\t\tfn()\n\t}()\n}", "title": "" }, { "docid": "40853a68b27d1ac5c308eacec2eeebbe", "score": "0.6560348", "text": "func (p *Process) Interrupt() error {\n\tif p.verbose {\n\t\tfmt.Println(\"Send interrupt\")\n\t}\n\treturn syscall.Kill(-p.cmd.Process.Pid, syscall.SIGINT)\n}", "title": "" }, { "docid": "f9c5f18b7c77b538f36baf6180537111", "score": "0.65381235", "text": "func panic_on_interrupt(c chan os.Signal) {\n sig := <-c\n if sig != nil {\n ScrRestore()\n os.Exit(1)\n }\n}", "title": "" }, { "docid": "7095b8b7b266995b873be94a102cc436", "score": "0.6482521", "text": "func interrupted() {\n\tcloseClosers()\n\thandleInterrupt()\n}", "title": "" }, { "docid": "7037d1b78370df6535da15b697593069", "score": "0.64480054", "text": "func HandleInterruptSignal(fn func()) {\n\tsigChannel := make(chan os.Signal, 1)\n\tsignal.Notify(sigChannel, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-sigChannel\n\t\tlog.Printf(\"interrupt signal received\")\n\t\tfn()\n\t}()\n}", "title": "" }, { "docid": "b34b8a01d09c828e3bfc7224b7ad07fd", "score": "0.64351714", "text": "func intSignalHandler() {\n\tlog.Aux(\"Received INT signal, shutdown...\")\n\n\terr := morpher.Stop()\n\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t}\n\n\texit(0)\n}", "title": "" }, { "docid": "6d2c52cb2760ac2645b6e21885bfbab2", "score": "0.640887", "text": "func translateInterruptToCancel(ctx context.Context, wg *sync.WaitGroup, cancel context.CancelFunc) {\n\twg.Add(1)\n\tgo func() {\n\t\tdefer wg.Done()\n\n\t\tsignalStream := make(chan os.Signal, 1)\n\t\tdefer func() {\n\t\t\tsignal.Stop(signalStream)\n\t\t\tclose(signalStream)\n\t\t}()\n\t\tsignal.Notify(signalStream, os.Interrupt, syscall.SIGTERM)\n\t\tselect {\n\t\tcase <-signalStream:\n\t\t\tcancel()\n\t\t\treturn\n\t\tcase <-ctx.Done():\n\t\t\treturn\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "9bad8736dc8a57a4a4aa620e82745baa", "score": "0.6371826", "text": "func intSignalHandler() {\n\tlog.Aux(\"Received INT signal, shutdown…\")\n\tshutdown(0)\n}", "title": "" }, { "docid": "16fa9a3db0c8f3b49dba184a85391f1b", "score": "0.6370696", "text": "func catchSigInt() {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt)\n\tgo func() {\n\t\tdefer crash.HandleAll()\n\n\t\tselect {\n\t\tcase <-c:\n\t\t\tgo func() {\n\t\t\t\tdefer crash.HandleAll()\n\t\t\t\tSignalShutdown(0)\n\t\t\t}()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "fb2cdf1f2a5fadc1540903252a1ce2f9", "score": "0.63555473", "text": "func intSignalHandler() {\n\tspinner.Done(false)\n\tprintErrorAndExit(\"\\n\\nInstall process canceled by Ctrl+C\")\n}", "title": "" }, { "docid": "c46d216270168d89c6a019ce8375bdde", "score": "0.6350863", "text": "func mainInterruptHandler() {\n\t// interruptCallbacks is a list of callbacks to invoke when a\n\t// SIGINT (Ctrl+C) is received.\n\tvar interruptCallbacks []func()\n\tinvokeCallbacks := func() {\n\t\t// run handlers in LIFO order.\n\t\tfor i := range interruptCallbacks {\n\t\t\tidx := len(interruptCallbacks) - 1 - i\n\t\t\tinterruptCallbacks[idx]()\n\t\t}\n\t\tclose(interruptHandlersDone)\n\t}\n\n\tfor {\n\t\tselect {\n\t\tcase sig := <-interruptChannel:\n\t\t\tlog.Infof(\"Received signal (%s). Shutting down...\", sig)\n\t\t\tinvokeCallbacks()\n\t\t\treturn\n\t\tcase <-simulateInterruptChannel:\n\t\t\tlog.Info(\"Received shutdown request. Shutting down...\")\n\t\t\tinvokeCallbacks()\n\t\t\treturn\n\n\t\tcase handler := <-addHandlerChannel:\n\t\t\tinterruptCallbacks = append(interruptCallbacks, handler)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "05537f1953dd648685024fa4f73c3bea", "score": "0.6350108", "text": "func onInterrupt(interruptChannel chan os.Signal) {\n\t<-interruptChannel\n\tgoncurses.End()\n\tos.Exit(1)\n}", "title": "" }, { "docid": "54fa2d64da8de61cad4b1eb92e44fedc", "score": "0.6317142", "text": "func setupTerminateSignal(g *run.Group, cfg config.AppConfig) {\n\n\t// No point to wait for 0 containers\n\tif cfg.RequestedLiveContainers == 0 {\n\t\treturn\n\t}\n\n\tlog.Println()\n\tlog.Println()\n\tlog.Println(\"Press Ctrl-C at any point to exit.\")\n\tlog.Println(\"----------------------------------\")\n\tlog.Println()\n\n\tquit := make(chan os.Signal, 1)\n\t// Honor interrupt / kill signals\n\tsignal.Notify(quit, os.Interrupt, syscall.SIGKILL, syscall.SIGTERM, syscall.SIGQUIT)\n\tg.Add(func() error {\n\t\t<-quit\n\t\tlog.Println()\n\t\tlog.Println()\n\t\tlog.Println(\"Received Interrupt signal. Cleaning up and exiting\")\n\t\tlog.Println(\"--------------------------------------------------\")\n\t\tlog.Println()\n\n\t\treturn nil\n\n\t}, func(err error) {\n\t\tclose(quit)\n\t})\n}", "title": "" }, { "docid": "2d375f7cb6da19958eff6688b7b8a35e", "score": "0.62810045", "text": "func (machine *Machine) Interrupt(code, reason uint16) {\n\tmachine.irQueue <- asyncInterrupt{code, reason}\n}", "title": "" }, { "docid": "80191598c9b7c57dc069ec073db30cbd", "score": "0.62480617", "text": "func (p *Pipeline) InterruptHandler(stdout, stderr io.ReadCloser, contID string) {\n\tsigCh := make(chan os.Signal, 2)\n\tsignal.Notify(sigCh, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-sigCh\n\t\tlog.Printf(\"Received Interrupt signal, terminating...\")\n\t\tstderr.Close()\n\t\tstdout.Close()\n\t\tp.CleanUp(contID)\n\t\tos.Exit(0)\n\t}()\n}", "title": "" }, { "docid": "75560525588870c82576a2a5a58a2761", "score": "0.62257874", "text": "func CleanupOnInterrupt(t *testing.T, cleanup CleanupFunc) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt)\n\tgo func() {\n\t\tfor range c {\n\t\t\tt.Logf(\"Test interrupted, cleaning up.\")\n\t\t\tdoCleanup(t, cleanup)\n\t\t\tos.Exit(2)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "20c03b071b5f7010e95ccd53140686ba", "score": "0.6206516", "text": "func Sighandler(settings Settings) {\n\n sigc := make(chan os.Signal, 1)\n signal.Notify(sigc, os.Interrupt)\n go func(){\n for sig := range sigc {\n fmt.Printf(\"Caught %+v - cleaning up.\\n\", sig)\n Shutdown(settings)\n }\n }()\n}", "title": "" }, { "docid": "210a663e68466883f89fe0014baac678", "score": "0.6201258", "text": "func signalHandler(e *amass.Enumeration) {\n\tquit := make(chan os.Signal, 1)\n\n\tsignal.Notify(quit, os.Interrupt, syscall.SIGTERM)\n\n\t<-quit\n\t// Start final output operations\n\tclose(e.Done)\n\t<-finished\n\tos.Exit(1)\n}", "title": "" }, { "docid": "3bf8058f14ecda21f0dc2c371a46cd5a", "score": "0.61719716", "text": "func trap(s *Service, halt chan os.Signal) {\n\t<-halt\n\ts.cancel()\n\tfor sName := range s.serviceToken {\n\t\tfor i := range s.serviceToken[sName] {\n\t\t\tif err := s.Supervisor.Remove(s.serviceToken[sName][i]); err != nil {\n\t\t\t\ts.Log.Error().Err(err).Str(\"service\", \"runtime service\").Msgf(\"terminating with signal: %v\", s)\n\t\t\t}\n\t\t}\n\t}\n\ts.Log.Debug().Str(\"service\", \"runtime service\").Msgf(\"terminating with signal: %v\", s)\n\tos.Exit(0)\n}", "title": "" }, { "docid": "96d826ea54e46832eabaf64927ba6d8f", "score": "0.6163904", "text": "func (t *T) Interrupt() {\n\tt.state.Stop(func() {\n\t\tt.stack = done\n\t})\n}", "title": "" }, { "docid": "8220fbef83c25b64054176e7db622c53", "score": "0.61045754", "text": "func cancelOnChanInterrupt(ctx context.Context, ch chan<- struct{}, cancel context.CancelFunc) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tclose(ch)\n\t\tcase <-c:\n\t\t\tclose(ch)\n\t\t\tcancel()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "c8474a47b15ef807a13b452ee7d8e553", "score": "0.6085229", "text": "func addSignalInterruptCatch(action func()) {\n\tch := make(chan os.Signal)\n\tsignal.Notify(ch, syscall.SIGINT, syscall.SIGTERM)\n\tgo func() {\n\t\tfor range ch {\n\t\t\taction()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "b8c715d1019968e2c68518835987420a", "score": "0.6071271", "text": "func handleSIGINT(c chan os.Signal, gb *gameboy.GameBoy) {\n\t// Wait for signal, quit cleanly with potential extra debug info if needed.\n\t<-c\n\tfmt.Println(\"\\nTerminated...\")\n\n\tgb.Display.Close()\n\n\t// TODO: only dump RAM/VRAM/Other if requested in parameters.\n\tfmt.Print(gb.CPU)\n\tfmt.Print(gb.PPU)\n\tgb.CPU.DumpRAM()\n\n\t// Force stopping CPU profiling.\n\tpprof.StopCPUProfile()\n\n\tos.Exit(-1)\n}", "title": "" }, { "docid": "aa42b1ef36396605fe798410d3ecd08d", "score": "0.60681045", "text": "func TrapSignal(cb func()) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\tfor sig := range c {\n\t\t\tfmt.Printf(\"captured %v, exiting...\\n\", sig)\n\t\t\tif cb != nil {\n\t\t\t\tcb()\n\t\t\t}\n\t\t\ttime.Sleep(2333 * time.Millisecond)\n\t\t\tos.Exit(1)\n\t\t}\n\t}()\n\tselect {}\n}", "title": "" }, { "docid": "ac942d338f9b29fc5c9673e38a6c7608", "score": "0.6055714", "text": "func HandleInterrupts() chan os.Signal {\n\tc := make(chan os.Signal, 2)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\treturn c\n}", "title": "" }, { "docid": "66b06ee48f38fe3899a23866ebbfece8", "score": "0.6031193", "text": "func (s *CheckScheduler) Interrupt() {\n\ts.interrupt <- struct{}{}\n}", "title": "" }, { "docid": "315904dda6b00e9adae55e326bf8a01a", "score": "0.60203266", "text": "func (h *InterruptHandler) Signal(s os.Signal) {\n\th.once.Do(func() {\n\t\tfor _, fn := range h.notify {\n\t\t\tfn()\n\t\t}\n\t\tif h.final == nil {\n\t\t\tos.Exit(1)\n\t\t}\n\t\th.final(s)\n\t})\n}", "title": "" }, { "docid": "71766b365f3cb44a85d2af01c0eeaa7c", "score": "0.6011676", "text": "func interruptHandler() {\n\tinterruptNotifier := make(chan os.Signal, 1)\n\tsignal.Notify(interruptNotifier, os.Interrupt)\n\tgo func() {\n\t\tselect {\n\t\tcase sig := <-interruptNotifier:\n\t\t\tswitch sig {\n\t\t\tcase os.Interrupt:\n\t\t\t\tglog.Warning(\"Server received an interrupt: calling cleanup functions\")\n\t\t\t\tcleanupServer()\n\t\t\t\tos.Exit(0)\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "ddaf0b135948a4740013ab0cb990e9e3", "score": "0.59971565", "text": "func contextWithInterrupts(parent context.Context) context.Context {\n\tctx, cancel := context.WithCancel(parent)\n\n\tc := make(chan os.Signal, 2)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-c\n\t\tcancel()\n\t\t<-c\n\t\tlog.Error(nil, \"The build has been interrupted\")\n\t\t// Write the container termination message\n\t\twriteTerminationMessage(\"Pod terminated\")\n\t\tos.Exit(1)\n\t}()\n\n\treturn ctx\n}", "title": "" }, { "docid": "55392d1b8fa80ccd2ca6c148ce6dc1ba", "score": "0.5976838", "text": "func HandleInterrupts(ctx context.Context, cancel context.CancelFunc) {\n\n\tterm := make(chan os.Signal, 1)\n\tsignal.Notify(term, os.Interrupt)\n\tgo func() {\n\t\tselect {\n\t\tcase <-term:\n\t\t\tlog.C(ctx).Error(\"Received OS interrupt, exiting gracefully...\")\n\t\t\tcancel()\n\t\tcase <-ctx.Done():\n\t\t\treturn\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "1d6afc35176e74c69fb211e800d01dda", "score": "0.59735745", "text": "func (em *Emulator) Interrupt(i uint8) {\n\tif em.traceFile != nil {\n\t\tfmt.Fprintf(em.traceFile, \"Interrupt 0x%02X requested, \", i)\n\t}\n\n\taddr := em.InterruptRegistryLoad(i)\n\tif addr != 0 {\n\t\tif em.GetInterruptsEnabled() {\n\t\t\tif em.traceFile != nil {\n\t\t\t\tfmt.Fprintf(em.traceFile, \"executing now (calling 0x%04X)\\n\",\n\t\t\t\t\taddr)\n\t\t\t}\n\n\t\t\tem.SetInterruptsEnabled(false)\n\t\t\tem.PushWord(em.pc)\n\t\t\tem.pc = addr\n\n\t\t\tif i < 0x80 {\n\t\t\t\tem.SetUserMode(false)\n\t\t\t}\n\n\t\t} else {\n\t\t\tif em.traceFile != nil {\n\t\t\t\tfmt.Fprintf(em.traceFile, \"queueing\\n\")\n\t\t\t}\n\t\t\tem.interruptQueue <- i\n\t\t}\n\n\t} else {\n\t\tif em.traceFile != nil {\n\t\t\tfmt.Fprintf(em.traceFile,\n\t\t\t\t\"discarding (interrupt not registered)\\n\")\n\t\t}\n\n\t\tem.SetInterruptsEnabled(true)\t// This triggers the emulator to execute another interrupt\n\t\t// off the queue.\n\t}\n}", "title": "" }, { "docid": "e2e6e779bb22899ae7da361beba4173f", "score": "0.5963654", "text": "func (self *Cpu) Irq( ) {\n // can be ignored if the disable interrupt bit has been SET\n if self.getFlag( FLAG_CPU_I ) == 0 {\n // interrupt want to run a certain piece of code to service the interrupt \n self.performInterrupt( 0xFFFE, 7 )\n // log.Println(\"irq\")\n }\n}", "title": "" }, { "docid": "41ddbc93dfbf0893107aa8538fae5c36", "score": "0.5953921", "text": "func (c *CLIClient) Signal(id, sig string) error {\n\tcmd := append(c.ociBaseCmd, \"kill\", \"-s\", sig, id)\n\treturn run(cmd)\n}", "title": "" }, { "docid": "00628cff03b0f0a60598465605bfa891", "score": "0.5952286", "text": "func signalStop(c chan<- os.Signal) {\n\tsignal.Stop(c)\n}", "title": "" }, { "docid": "413ba589788e37e60583f9d762783b75", "score": "0.593718", "text": "func (i *image) ReleaseOnInterrupt() {\n\t//create a channel for interrupt handler\n\tinterrupt := make(chan os.Signal, 1)\n\t// create an interrupt handler\n\tsignal.Notify(interrupt, syscall.SIGHUP, syscall.SIGINT, syscall.SIGTERM)\n\t// run a seperate goroutine.\n\tgo func() {\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase <-interrupt:\n\t\t\t\ti.Cleanup()\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "01b92788e34666da2a8e3d21f69f3725", "score": "0.59177953", "text": "func (daemon *Daemon) killWithSignal(container *containerpkg.Container, stopSignal syscall.Signal) error {\n\tlog.G(context.TODO()).Debugf(\"Sending kill signal %d to container %s\", stopSignal, container.ID)\n\tcontainer.Lock()\n\tdefer container.Unlock()\n\n\ttask, err := container.GetRunningTask()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar unpause bool\n\tif container.Config.StopSignal != \"\" && stopSignal != syscall.SIGKILL {\n\t\tcontainerStopSignal, err := signal.ParseSignal(container.Config.StopSignal)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif containerStopSignal == stopSignal {\n\t\t\tcontainer.ExitOnNext()\n\t\t\tunpause = container.Paused\n\t\t}\n\t} else {\n\t\tcontainer.ExitOnNext()\n\t\tunpause = container.Paused\n\t}\n\n\tif !daemon.IsShuttingDown() {\n\t\tcontainer.HasBeenManuallyStopped = true\n\t\tif err := container.CheckpointTo(daemon.containersReplica); err != nil {\n\t\t\tlog.G(context.TODO()).WithFields(log.Fields{\n\t\t\t\t\"error\": err,\n\t\t\t\t\"container\": container.ID,\n\t\t\t}).Warn(\"error checkpointing container state\")\n\t\t}\n\t}\n\n\t// if the container is currently restarting we do not need to send the signal\n\t// to the process. Telling the monitor that it should exit on its next event\n\t// loop is enough\n\tif container.Restarting {\n\t\treturn nil\n\t}\n\n\tif err := task.Kill(context.Background(), stopSignal); err != nil {\n\t\tif errdefs.IsNotFound(err) {\n\t\t\tunpause = false\n\t\t\tlog.G(context.TODO()).WithError(err).WithField(\"container\", container.ID).WithField(\"action\", \"kill\").Debug(\"container kill failed because of 'container not found' or 'no such process'\")\n\t\t\tgo func() {\n\t\t\t\t// We need to clean up this container but it is possible there is a case where we hit here before the exit event is processed\n\t\t\t\t// but after it was fired off.\n\t\t\t\t// So let's wait the container's stop timeout amount of time to see if the event is eventually processed.\n\t\t\t\t// Doing this has the side effect that if no event was ever going to come we are waiting a a longer period of time uneccessarily.\n\t\t\t\t// But this prevents race conditions in processing the container.\n\t\t\t\tctx, cancel := context.WithTimeout(context.TODO(), time.Duration(container.StopTimeout())*time.Second)\n\t\t\t\tdefer cancel()\n\t\t\t\ts := <-container.Wait(ctx, containerpkg.WaitConditionNotRunning)\n\t\t\t\tif s.Err() != nil {\n\t\t\t\t\tif err := daemon.handleContainerExit(container, nil); err != nil {\n\t\t\t\t\t\tlog.G(context.TODO()).WithFields(log.Fields{\n\t\t\t\t\t\t\t\"error\": err,\n\t\t\t\t\t\t\t\"container\": container.ID,\n\t\t\t\t\t\t\t\"action\": \"kill\",\n\t\t\t\t\t\t}).Warn(\"error while handling container exit\")\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}()\n\t\t} else {\n\t\t\treturn errors.Wrapf(err, \"Cannot kill container %s\", container.ID)\n\t\t}\n\t}\n\n\tif unpause {\n\t\t// above kill signal will be sent once resume is finished\n\t\tif err := task.Resume(context.Background()); err != nil {\n\t\t\tlog.G(context.TODO()).Warnf(\"Cannot unpause container %s: %s\", container.ID, err)\n\t\t}\n\t}\n\n\tdaemon.LogContainerEventWithAttributes(container, \"kill\", map[string]string{\n\t\t\"signal\": strconv.Itoa(int(stopSignal)),\n\t})\n\treturn nil\n}", "title": "" }, { "docid": "d5fabaede20881a72546f2f44c1d386a", "score": "0.59158677", "text": "func main() {\n\t// First, Create a context to notify all goroutines.\n\tsignalctx := sigctx.WithSignals(context.Background(), syscall.SIGINT, syscall.SIGTERM)\n\t// Second, Wrap the signal context to cancel all goroutines.\n\tcancelctx := sigctx.WithCancelSignals(signalctx, syscall.SIGHUP)\n\n\tvar wg sync.WaitGroup\n\tfor i := 0; i < 10; i++ {\n\t\twg.Add(1)\n\t\tgo func() {\n\t\t\tdefer wg.Done()\n\t\t\tfor {\n\t\t\t\tselect {\n\t\t\t\t// Since it is the context to receive,\n\t\t\t\t// You should pass the signal context as an argument.\n\t\t\t\tcase <-sigctx.Recv(signalctx):\n\t\t\t\t\t// `sigctx.Signal(signalctx)` is also the same reason.\n\t\t\t\t\tsignal, err := sigctx.Signal(signalctx)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tfmt.Println(err.Error())\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Println(signal.String())\n\t\t\t\t\t}\n\t\t\t\t// `cancelctx.Done()` Because of the context to cancel by signal.\n\t\t\t\tcase <-cancelctx.Done():\n\t\t\t\t\tfmt.Println(cancelctx.Err())\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t}\n\twg.Wait()\n}", "title": "" }, { "docid": "3c1260a5d81c2a3dc0b767ecfed627b3", "score": "0.58990616", "text": "func handleSignals(serverlessDaemon *daemon.Daemon, stopCh chan struct{}) {\n\t// setup a channel to catch OS signals\n\tsignalCh := make(chan os.Signal, 1)\n\tsignal.Notify(signalCh, os.Interrupt, syscall.SIGTERM)\n\n\t// block here until we receive the interrupt signal\n\t// when received, shutdown the serverless agent.\n\tfor signo := range signalCh {\n\t\tswitch signo {\n\t\tdefault:\n\t\t\tlog.Infof(\"Received signal '%s', shutting down...\", signo)\n\t\t\tserverlessDaemon.Stop()\n\t\t\tstopCh <- struct{}{}\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "dae924b5711851557f17b6ad31ac449c", "score": "0.58962286", "text": "func (self *Cpu) performInterrupt( interrutp_entry uint16 , take_cycles int ) {\n // store current PC\n self.push2stackWord( self.PC )\n\n self.setFlag( FLAG_CPU_B , false )\n self.setFlag( FLAG_CPU_U , true )\n\n // store current status\n self.push2stackByte( uint8(self.Status) )\n\n // like reset, a hard-coded address is integrated to get the new value of PC.\n self.addr_abs = interrutp_entry\n lo := uint16(self.read(self.addr_abs + 0))\n hi := uint16(self.read(self.addr_abs + 1))\n // Set PC\n self.PC = (hi << 8) | lo\n\n // important\n self.setFlag( FLAG_CPU_I , true )\n // important\n // interrupt takes some time\n self.cycles = take_cycles\n\n}", "title": "" }, { "docid": "2e70114a67fa604f98eff7dff6165de5", "score": "0.58880955", "text": "func (app *App) WaitForInterrupt() {\n\tsignals := make(chan os.Signal, 1)\n\tsignal.Notify(signals, syscall.SIGINT, syscall.SIGTERM)\n\tfor _ = range signals {\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "b448c08a3d68191ddccc1b672059694a", "score": "0.5883671", "text": "func (m *Memory) Interrupt(ctx context.Context) {\n\tevent := m.EventLoggerEntry.GetEventHelper().Start(\n\t\t\"interrupt\",\n\t\trkquery.WithEntryName(m.EntryName),\n\t\trkquery.WithEntryType(m.EntryType))\n\tlogger := m.ZapLoggerEntry.GetLogger().With(zap.String(\"eventId\", event.GetEventId()))\n\n\tm.EventLoggerEntry.GetEventHelper().Finish(event)\n\tlogger.Info(\"Interrupting repository.\", event.ListPayloads()...)\n}", "title": "" }, { "docid": "4ad041bef3afac4f24353a81ba209e98", "score": "0.5877992", "text": "func sighandler() {\n\tsig := make(chan os.Signal, 1)\n\tsignal.Notify(sig, syscall.SIGTERM, syscall.SIGINT)\n\t<-sig\n\tquit = true\n}", "title": "" }, { "docid": "ce4c1c6fb7f32d9bf094cd2354efe74f", "score": "0.5847123", "text": "func InterruptHandler(ctx context.Context) error {\n\tinterruptHandler := make(chan os.Signal, 1)\n\tsignal.Notify(interruptHandler, syscall.SIGINT, syscall.SIGTERM)\n\tselect {\n\tcase sig := <-interruptHandler:\n\t\treturn fmt.Errorf(\"signal received: %v\", sig.String())\n\tcase <-ctx.Done():\n\t\treturn errors.New(\"signal listener: context canceled\")\n\t}\n}", "title": "" }, { "docid": "74779ef1037ad8ed92ca8904185289c5", "score": "0.5839157", "text": "func SigControl(handler func()) struct{} {\n\tdoneCh := make(chan struct{})\n\n\tsigterm := make(chan os.Signal, 1)\n\tsignal.Notify(sigterm, syscall.SIGINT, syscall.SIGTERM)\n\n\t// go routine to catch signal interrupt\n\tgo func() {\n\t\tselect {\n\t\tcase <-sigterm:\n\t\t\tfmt.Println(\"terminating: via signal\")\n\t\t\thandler()\n\t\t\tdoneCh <- struct{}{}\n\t\t}\n\t}()\n\n\treturn <-doneCh\n}", "title": "" }, { "docid": "664b440e946c185e98b37259370707b5", "score": "0.58276844", "text": "func initSignalHandler() {\n\tc := make(chan os.Signal)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-c\n\t\tcollect()\n\t\tos.Exit(0)\n\t}()\n}", "title": "" }, { "docid": "d87cf68a5f861162b08145ed760a0650", "score": "0.5810838", "text": "func checkSigTerm(cancel context.CancelFunc) {\n\tstop := make(chan os.Signal, 1)\n\tsignal.Notify(stop, os.Interrupt, syscall.SIGTERM)\n\t<-stop\n\tcmlog.Printf(\"[ERROR] service interrupted.\")\n\tcancel()\n}", "title": "" }, { "docid": "7e65617c9f51935aa15a5a65440ad159", "score": "0.5810175", "text": "func (s *ExecutorTestSuite) TestHandleStopSignals() {\n\tgo func() {\n\t\ts.executor.StopSignals <- syscall.SIGHUP\n\t}()\n\n\tassert.False(s.T(), s.executor.Shutdown)\n\ts.executor.handleStopSignals()\n\tassert.True(s.T(), s.executor.Shutdown)\n\ts.executor.Shutdown = false\n}", "title": "" }, { "docid": "048eaf257c917c0762a6c1296c2959df", "score": "0.58006996", "text": "func WaitForInterrupt() {\n\tvar signalChannel chan os.Signal\n\tsignalChannel = make(chan os.Signal, 1)\n\tsignal.Notify(signalChannel, os.Interrupt)\n\tdone := false\n\tfor !done {\n\t\tselect {\n\t\tcase <-signalChannel:\n\t\t\tdone = true\n\t\t\tlogging.InfoLog.Print(\"Got shutdown request.\")\n\t\t\tmessage := messages.NewInternalMessage(messages.TypeInternalExiting)\n\t\t\trouter.Router.RouteInternal(message)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc16bcbf0aeee176191a9a02c6a8991d", "score": "0.5799334", "text": "func abortOnSignal(ctx context.Context, onSignal func()) {\n\tsigs := make(chan os.Signal, 1)\n\tsignal.Notify(sigs, syscall.SIGINT, syscall.SIGTERM)\n\n\t// wait for both ctx.Done() and sigs\n\tselect {\n\tcase <-sigs:\n\tcase <-ctx.Done():\n\t}\n\n\tonSignal()\n\n}", "title": "" }, { "docid": "f2b2f12b9937e004d3de79a60cc17cf8", "score": "0.57962745", "text": "func TrapExit (handler func(os.Signal)) {\n sigs := make(chan os.Signal, 1)\n signal.Notify(sigs, sys.SIGINT, sys.SIGTERM)\n\n go func() {\n sig := <-sigs\n handler(sig)\n }()\n}", "title": "" }, { "docid": "11beaf14ec18359a36a722af3082ffa5", "score": "0.57815886", "text": "func GracefulStopSignals(server ServerGracefulStopableInterface) (done chan bool) {\n\tdone = make(chan bool, 1)\n\tsigs := make(chan os.Signal, 1)\n\tsignal.Notify(sigs, syscall.SIGINT, syscall.SIGTERM)\n\tdefer log.Println(\"[MAIN]: System is ready for catch exit's signals, To exit press CTRL+C\")\n\n\tgo func() {\n\t\tsig := <-sigs\n\t\tlog.Println(\"[SYSTEM]: Signal catch:\", sig)\n\t\terr := server.GracefulStop()\n\t\tif err != nil {\n\t\t\tlog.Println(\"Server can't GracefulStop\", err)\n\t\t}\n\t\tdone <- true\n\t}()\n\treturn\n}", "title": "" }, { "docid": "f0534481574bf5e61c5f37cc70d23061", "score": "0.576938", "text": "func waitInterrupt() {\n\tsig := make(chan os.Signal, 1)\n\tsignal.Notify(sig, os.Interrupt)\n\t<-sig\n}", "title": "" }, { "docid": "61cb808fd708e59cdd178f7d6df351fb", "score": "0.57680964", "text": "func setupCloseHandler() {\n\tc := make(chan os.Signal)\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\t<-c\n\t\tlog.Printf(\"Execution aborted - %v\", \"SIGTERM\")\n\t\tdefer sdkConfig.GlobalConfig.CleanupTmp()\n\t\t// TODO: Additional cleanup may be needed. For instance, any pods created during tests are not being dropped if aborted.\n\t\tos.Exit(0)\n\t}()\n}", "title": "" }, { "docid": "6547c7203576d2c078bfa98c3a638d27", "score": "0.5759794", "text": "func InstallSignalHandler() (stopCh <-chan struct{}) {\n\n // the next call will fail if the method gets called\n // a second time.\n close(enforceCalledOnlyOnce)\n\n stop := make(chan struct{})\n c := make(chan os.Signal, 2)\n signal.Notify(c, os.Interrupt)\n go func() {\n // wait for signal\n <-c\n // initiate graceful shutdown\n close(stop)\n // wait for next signal\n <-c\n // second signal, hard exit\n os.Exit(1)\n }()\n\n return stop\n}", "title": "" }, { "docid": "c69341a4f84439ee4a3ab6bc47d943d1", "score": "0.5745483", "text": "func WaitForInterrupt(interrupt func()) {\n\n\t// Set up channel on which to send signal notifications.\n\t// We must use a buffered channel or risk missing the signal\n\t// if we're not ready to receive when the signal is sent.\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, syscall.SIGTERM, os.Interrupt, syscall.SIGQUIT)\n\n\t// Block until a signal is received.\n\ts := <-c\n\n\tklog.Infof(\"Receiving signal: %v, stopping...\", s)\n\n\tinterrupt()\n}", "title": "" }, { "docid": "72a9e895fe05e50392a3874d65992515", "score": "0.5744959", "text": "func signalProcessor(c <-chan os.Signal) {\n\tfor {\n\t\tsig := <-c\n\t\tswitch sig {\n\t\tcase syscall.SIGHUP:\n\t\t\t// Rotate logs if configured\n\t\t\tif logf != nil {\n\t\t\t\tlog.LogInfo(\"Recieved SIGHUP, cycling logfile\")\n\t\t\t\tcloseLogFile()\n\t\t\t\topenLogFile()\n\t\t\t} else {\n\t\t\t\tlog.LogInfo(\"Ignoring SIGHUP, logfile not configured\")\n\t\t\t}\n\t\tcase syscall.SIGTERM:\n\t\t\t// Initiate shutdown\n\t\t\tlog.LogInfo(\"Received SIGTERM, shutting down\")\n\t\t\tgo timedExit()\n\t\t\tweb.Stop()\n\n\t\t\tif smtpServer != nil {\n\t\t\t\tsmtpServer.Stop()\n\t\t\t} else {\n\t\t\t\tlog.LogError(\"smtpServer was nil during shutdown\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "aceb20d261db0cd4388fdc57e086f5ec", "score": "0.57377076", "text": "func (c *cluster) handleSigTerm() {\n\t// Enable the capture of Ctrl-C, to cleanly close the application\n\tch := make(chan os.Signal, 1)\n\tsignal.Notify(ch, os.Interrupt, os.Kill)\n\n\tfor {\n\t\t// Wait for signal\n\t\tselect {\n\t\tcase <-ch:\n\t\t\tlogger.Debug().Msg(\"Signal received\")\n\t\t\tc.Stop()\n\t\t\tos.Exit(-1)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1932292e63b5456fd7ea8e82cfb24b56", "score": "0.5724427", "text": "func (cmr *Consumer) Signal() { cmr.sigCh <- syscall.SIGTERM }", "title": "" }, { "docid": "7d845119d673078453b8267e91ca844f", "score": "0.5711916", "text": "func (sys *System) processInterrupt(interrupt interrupts.Interrupt) {\n\tprev := sys.psw.Get()\n\tdefer func(prev uint16) {\n\t\tt := recover()\n\t\tswitch t := t.(type) {\n\t\tcase interrupts.Trap:\n\t\t\tsys.CPU.Trap(t)\n\t\tcase nil:\n\t\t\tbreak\n\t\tdefault:\n\t\t\tpanic(t)\n\t\t}\n\t\tsys.CPU.Registers[7] = sys.unibus.Mmu.ReadMemoryWord(interrupt.Vector)\n\t\tintPSW := sys.unibus.Mmu.ReadMemoryWord(interrupt.Vector + 2)\n\n\t\tif (prev & (1 << 14)) > 0 {\n\t\t\tintPSW |= (1 << 13) | (1 << 12)\n\t\t}\n\t\tsys.psw.Set(intPSW)\n\t}(prev)\n\n\tsys.CPU.SwitchMode(psw.KernelMode)\n\tsys.CPU.Push(prev)\n\tsys.CPU.Push(sys.CPU.Registers[7])\n}", "title": "" }, { "docid": "41d3b937f4401e7f86e6786d57c7a9d2", "score": "0.5668982", "text": "func signalHandler(nc *nats.Conn, s server.Server, m iomanager.IOManager) {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, syscall.SIGINT, syscall.SIGTERM)\n\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"signal\": (<-c).String(),\n\t}).Info(\"shutting down due to signal\")\n\n\tif err := s.Stop(context.Background()); err != nil {\n\t\tlogrus.WithError(err).Warning(\"server shutdown failed\")\n\t}\n\n\tif err := m.Stop(); err != nil {\n\t\tlogrus.WithError(err).Warning(\"IO manager shutdown failed\")\n\t}\n\n\t// Drain nats connection before closing.\n\tif err := nc.Drain(); err != nil {\n\t\tlogrus.WithError(err).Warning(\"starting nats connection draining failed\")\n\t}\n\n\t// Wait for connection to drain and close.\n\tfor nc.IsDraining() {\n\t}\n}", "title": "" }, { "docid": "72a214824b777f41e9937042c0d4bf22", "score": "0.56597155", "text": "func signalCatcher(liner *liner.State) {\n\tch := make(chan os.Signal)\n\tsignal.Notify(ch, syscall.SIGINT)\n\t<-ch\n\tliner.Close()\n\tos.Exit(0)\n}", "title": "" }, { "docid": "65776047ce50f683322e7c742665af15", "score": "0.56549877", "text": "func (w *Worker) Stop(ctx context.Context) {\n\tw.loop.exitCh <- os.Interrupt\n\tw.tasker.exitCh <- os.Interrupt\n\tw.handler.exitCh <- os.Interrupt\n\tw.running = false\n}", "title": "" }, { "docid": "6bf2075305487a0d281f294d14c44ad1", "score": "0.56518143", "text": "func (d DockerDriver) HandleSignal(mergedConfig Config, runID string) int {\n\td.Logger.Log(\"info\", \"Stopping on signal\")\n\tcontainerInfo, err := getContainerInfo(d.ShellService, runID)\n\tif err != nil {\n\t\td.Logger.Log(\"info\", fmt.Sprintf(\"Not cleaning. Unexpected error.\\n%s\", err))\n\t\tpanic(err)\n\t}\n\tif !containerInfo.Exists {\n\t\td.Logger.Log(\"info\", \"Container already removed or not created at all, will not react on this signal\")\n\t\treturn 0\n\t}\n\tcmd := fmt.Sprintf(\"docker stop %s\", runID)\n\td.Logger.Log(\"info\", fmt.Sprintf(\"Stopping container with command: \\n%v\", cmd))\n\texitStatus, _ := d.ShellService.RunInteractive(cmd, false)\n\td.Logger.Log(\"debug\", fmt.Sprintf(\"Exit status from command: %s, %v\", cmd, exitStatus))\n\td.Logger.Log(\"info\", \"Stopping on signal finished\")\n\treturn exitStatus\n}", "title": "" }, { "docid": "ddcd2ae31c1f66baad22f53440561254", "score": "0.56317556", "text": "func Interrupt(runner RunnerInterface) {\n\tif runner == nil {\n\t\tpanic(\"runner is nil\")\n\t}\n\tif modl == nil {\n\t\tpanic(\"model is nil\")\n\t}\n\tmodl.interrupt(runner)\n}", "title": "" }, { "docid": "38e8a6754024bf6fd9eff7820838d4d4", "score": "0.56312144", "text": "func (s *Scanner) handleSignals() {\n\tc := make(chan os.Signal, 1)\n\tsignal.Notify(c, os.Interrupt)\n\tgo func() {\n\t\tfor _ = range c {\n\t\t\ts.Stop()\n\t\t\tos.Exit(0)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "83a0ef021844ade8e163809e4e7ec46d", "score": "0.5619112", "text": "func opEI() int {\n\tinterrupt = true\n\treturn 1\n}", "title": "" }, { "docid": "d534ea1679dd00be78aa4bc704158b36", "score": "0.5602357", "text": "func (s *Service) onSignal(sig os.Signal) {\n\tswitch sig {\n\tcase syscall.SIGTERM:\n\t\tfallthrough\n\tcase syscall.SIGINT:\n\t\t//logging.LogAction(\"service\", fmt.Sprintf(\"received signal %s, exiting...\", sig.String()))\n\t\ts.Close()\n\t\tos.Exit(0)\n\t}\n}", "title": "" }, { "docid": "2ac7528b24d51712770184866c9cb025", "score": "0.5601438", "text": "func main() {\n\tsigChan := make(chan os.Signal, 1)\n\tsignal.Notify(sigChan, os.Interrupt)\n\n\tcomplete := make(chan struct{})\n\tgo LaunchProcessor(complete)\n\n\tfor {\n\t\tselect {\n\t\tcase whatSig := <-sigChan:\n\t\t\tShutdown = true\n\t\t\tcontinue\n\n\t\tcase <-time.After(time.Duration(TimeoutSeconds) * time.Second):\n\t\t\tfmt.Printf(\"******> TIMEOUT\\n\")\n\t\t\tos.Exit(1)\n\n\t\tcase <-complete:\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0189f48742c8a4fc637d8ef0d53b6b38", "score": "0.5592052", "text": "func OnInterrupt(cleanupFunc func()) {\n\tcleanup.once.Do(waitForInterrupt)\n\n\tcleanup.mutex.Lock()\n\tdefer cleanup.mutex.Unlock()\n\n\tcleanup.funcs = append(cleanup.funcs, cleanupFunc)\n}", "title": "" }, { "docid": "af335036cc4d7e2d896426c5f766874c", "score": "0.55803716", "text": "func SetupCloseHandler() {\r\n\tc := make(chan os.Signal, 2)\r\n\tsignal.Notify(c, os.Interrupt, syscall.SIGTERM)\r\n\r\n\tgo func() {\r\n\t\t<-c\r\n\t\tlog.Println(\"\\r Ctrl+C pressed in terminal\")\r\n\t\tlog.Println(\"I'll be back\")\r\n\t\tos.Exit(0)\r\n\t}()\r\n}", "title": "" }, { "docid": "95510d580f754530f41626863de84483", "score": "0.5579989", "text": "func (a *Handler) Quit() error {\n\terr := a.process.Signal(os.Interrupt)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc := make(chan error)\n\tgo func() {\n\t\t_, err := a.process.Wait()\n\t\tc <- err\n\t}()\n\tselect {\n\tcase err = <-c:\n\tcase <-time.After(5 * time.Second):\n\t\t// TODO Do we want to SIGKILL here or just leave the app alone?\n\t\terr = errProcessTookTooLong\n\t}\n\treturn err\n}", "title": "" }, { "docid": "e74fcd52e515ff472ba6f75d0779635e", "score": "0.5575365", "text": "func CatchSigterm() {\n\t// Catch a SIGTERM and stop\n\tsigs := make(chan os.Signal, 1)\n\tsignal.Notify(sigs, os.Interrupt, syscall.SIGTERM)\n\tgo func() {\n\t\tfor sig := range sigs {\n\t\t\tlog.Info(\"Shutting down from Signal\", \"signal\", sig)\n\t\t\tif service != nil {\n\t\t\t\tservice.Stop()\n\t\t\t}\n\t\t\tos.Exit(-1)\n\t\t}\n\t}()\n\n}", "title": "" }, { "docid": "99c7cd75de0b1907e80e3ce0555dbf1a", "score": "0.5573761", "text": "func HandleCtrlC() {\n\tsignals := make(chan os.Signal, 1)\n\tsignal.Notify(signals, os.Interrupt)\n\t<-signals\n\tfor _, process := range state.Processes {\n\t\tif process != nil {\n\t\t\tfmt.Println(\"Stopping process\", process.Pid)\n\t\t\tprocess.Kill()\n\t\t}\n\t}\n\tos.Exit(0)\n}", "title": "" }, { "docid": "d373adc33a9b58915ba5d2d8a16435d5", "score": "0.5569695", "text": "func (p *Protocol) Interrupt(ctx context.Context, request *Message, response *Message) error {\n\t// We need to take a lock since the dqlite server currently does not\n\t// support concurrent requests.\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\n\t// Honor the ctx deadline, if present, or use a default.\n\tdeadline, ok := ctx.Deadline()\n\tif !ok {\n\t\tdeadline = time.Now().Add(2 * time.Second)\n\t}\n\tp.conn.SetDeadline(deadline)\n\n\tdefer request.Reset()\n\n\tEncodeInterrupt(request, 0)\n\n\tif err := p.send(request); err != nil {\n\t\treturn errors.Wrap(err, \"failed to send interrupt request\")\n\t}\n\n\tfor {\n\t\tif err := p.recv(response); err != nil {\n\t\t\tresponse.Reset()\n\t\t\treturn errors.Wrap(err, \"failed to receive response\")\n\t\t}\n\n\t\tmtype, _ := response.getHeader()\n\t\tresponse.Reset()\n\n\t\tif mtype == ResponseEmpty {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4bea95fabae3bcdc64b651bf7462daa0", "score": "0.55419904", "text": "func termSignalHandler() {\n\tlog.Aux(\"Received TERM signal, shutdown…\")\n\tshutdown(0)\n}", "title": "" }, { "docid": "1baead7f713a820d8167fdd59288f01f", "score": "0.5529711", "text": "func signalCatcher() {\n\tch := make(chan os.Signal)\n\tsignal.Notify(ch, syscall.SIGINT)\n\tsig := <-ch\n\tlog.Printf(\"Signal received: %v\", sig)\n\tos.Exit(0)\n}", "title": "" }, { "docid": "670a5681f16cfdb4521e5d63cc245521", "score": "0.55228555", "text": "func WaitSignal(gctx context.Context) error {\n\n\t// Wait for interrupt signal to gracefully shutdown the server with\n\tsignalChannel := make(chan os.Signal, 2)\n\tsignal.Notify(signalChannel, os.Interrupt, syscall.SIGTERM)\n\tselect {\n\tcase <-signalChannel:\n\t\treturn ErrCancelled\n\n\tcase <-gctx.Done():\n\t\treturn gctx.Err()\n\t}\n}", "title": "" }, { "docid": "aba440b59bfd9e9990605582b1b9ba73", "score": "0.55210567", "text": "func (srv *Server) handleSignal(msg *Message) {\n\tsrv.opsLock.Lock()\n\t// Ignore incoming signals during shutdown\n\tif srv.shutdown {\n\t\tsrv.opsLock.Unlock()\n\t\treturn\n\t}\n\tsrv.currentOps++\n\tsrv.opsLock.Unlock()\n\n\tsrv.hooks.OnSignal(context.WithValue(context.Background(), Msg, *msg))\n\n\t// Mark signal as done and shutdown the server if scheduled and no ops are left\n\tsrv.opsLock.Lock()\n\tsrv.currentOps--\n\tif srv.shutdown && srv.currentOps < 1 {\n\t\tclose(srv.shutdownRdy)\n\t}\n\tsrv.opsLock.Unlock()\n}", "title": "" }, { "docid": "38ebb4a3ded94d66de3ed712c54346a3", "score": "0.55141264", "text": "func CreateInterrupt(div float64) {\n\tgo func() {\n\t\tlog.Println(\"Waiting for signal\")\n\t\tc := make(chan os.Signal, 1)\n\t\tsignal.Notify(c, syscall.SIGHUP, syscall.SIGINT, syscall.SIGQUIT)\n\t\t<-c\n\t\tgo func() {\n\t\t\t<-c\n\t\t\tos.Exit(1)\n\t\t}()\n\t\tlog.Println(\"Got SIG\")\n\t\tPrint(div)\n\t\tos.Exit(0)\n\t}()\n}", "title": "" }, { "docid": "70dccc916ed89f3c59427d53305496da", "score": "0.5506565", "text": "func shutdownTimer() {\n time.AfterFunc(10*time.Second, func() { \n raise(syscall.SIGTERM) \n })\n }", "title": "" }, { "docid": "06fc20920e8cd724ac859a1bd67ae54d", "score": "0.5501837", "text": "func (r *CloudRunner) registerInterruptOnSignal(jobID, suiteName string) chan os.Signal {\n\tsigChan := make(chan os.Signal)\n\tsignal.Notify(sigChan, os.Interrupt)\n\n\tgo func(c <-chan os.Signal, jobID, suiteName string) {\n\t\tsig := <-c\n\t\tif sig == nil {\n\t\t\treturn\n\t\t}\n\t\tlog.Info().Str(\"suite\", suiteName).Msg(\"Stopping suite\")\n\t\tr.stopSuiteExecution(jobID, suiteName)\n\t}(sigChan, jobID, suiteName)\n\treturn sigChan\n}", "title": "" }, { "docid": "567e83ab66a39a7f397f1fb1fd8546a8", "score": "0.54988754", "text": "func init() {\n\tlog.SetFlags(log.Lshortfile)\n go func() {\n \tsignalChan := make(chan os.Signal)\n \tsignal.Notify(signalChan, os.Interrupt, syscall.SIGINT, syscall.SIGTERM)\n <- signalChan\n log.Println(\"Received Interrupt. Exiting now.\")\n //ExitProtocol()\n os.Exit(1)\n }()\n verbose = flag.Bool(\"v\", false, \"enable verbose\")\n flag.Parse()\n}", "title": "" }, { "docid": "51e2308ed4c38025ac02c7956120e749", "score": "0.54928356", "text": "func SignalHandler(runCancel context.CancelFunc) {\n\n\t// make a signal handling channel for os signals\n\tch := make(chan os.Signal, 1)\n\t// stop listening for signals when we leave this function\n\tdefer func() { signal.Stop(ch) }()\n\t// catch SIGINT and SIGTERM\n\tsignal.Notify(ch, os.Interrupt, syscall.SIGTERM)\n\tsig := <-ch\n\tklog.Infof(\"Shutting down due to: %s\", sig)\n\t// if we're shutting down, cancel the context so everything else will stop\n\trunCancel()\n\tklog.Infof(\"Context cancelled\")\n\tsig = <-ch\n\tklog.Fatalf(\"Received shutdown signal twice, exiting: %s\", sig)\n\n}", "title": "" }, { "docid": "0a041c829cc5f3d097c04ab31ce533a6", "score": "0.5488038", "text": "func SetupSignalHandler(server *rpc.ServerRunner) {\n\tsigint := make(chan os.Signal, 1)\n\n\tsignal.Notify(sigint, syscall.SIGTERM)\n\n\t//Wait SIGTERM handler\n\t<-sigint\n\n\t// We received an interrupt signal, shut down.\n\tserver.StopServer()\n}", "title": "" }, { "docid": "898dcaa3c3a721869b3cae8a82c993d3", "score": "0.5487862", "text": "func (sp *SubProcess) SendIntr() error {\n\tif p := sp.cmd.Process; p != nil {\n\t\tp.Signal(syscall.SIGINT)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7a62e248a9e8763af00f2e1ed77cc318", "score": "0.5480918", "text": "func (p *TServerPipe) Interrupt() error {\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\n\tp.interrupted = true\n\tp.Close()\n\n\treturn nil\n}", "title": "" }, { "docid": "557c381ff2b37ea3f32f65e923bce35e", "score": "0.5478095", "text": "func InterruptGroup(cfg OperationConfig, pgid int, service *ServiceConfig) error {\n\treturn errors.WithStack(signalGroup(cfg, pgid, service, \"-2\"))\n}", "title": "" }, { "docid": "88f95a23863691b17b7ea380a96ab595", "score": "0.5467199", "text": "func (p *BasicPortForwarding) handleControlSignals(log log.T) {\n\tc := make(chan os.Signal)\n\tsignal.Notify(c, sessionutil.ControlSignals...)\n\tgo func() {\n\t\t<-c\n\t\tfmt.Println(\"Terminate signal received, exiting.\")\n\n\t\tif version.DoesAgentSupportTerminateSessionFlag(log, p.session.DataChannel.GetAgentVersion()) {\n\t\t\tif err := p.session.DataChannel.SendFlag(log, message.TerminateSession); err != nil {\n\t\t\t\tlog.Errorf(\"Failed to send TerminateSession flag: %v\", err)\n\t\t\t}\n\t\t\tfmt.Fprintf(os.Stdout, \"\\n\\nExiting session with sessionId: %s.\\n\\n\", p.sessionId)\n\t\t\tp.Stop()\n\t\t} else {\n\t\t\tp.session.TerminateSession(log)\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "8975f2368aae129ac5907de8c3c308a6", "score": "0.5462081", "text": "func atExit() {\n\tsigchan := make(chan os.Signal, 10)\n\tsignal.Notify(sigchan, os.Interrupt)\n\t<-sigchan\n\televio.SetMotorDirection(elevio.MD_Stop)\n\tlog.Println(\"Rebooting\", \"sh\", \"-c\", \"./main -init=false -port=\"+port+\" -id=\"+id)\n\terr := exec.Command(\"gnome-terminal\", \"-x\", \"sh\", \"-c\", \"./main -init=false -port=\"+port+\" -id=\"+id).Run()\n\tif err != nil {\n\t\tfmt.Println(\"Unable to reboot process, crashing...\")\n\t}\n\tlog.Println(\"Program killed !\")\n\tos.Exit(0)\n}", "title": "" }, { "docid": "3979546247589eb8f76aa2dc086ec661", "score": "0.54521286", "text": "func WorkerTrap() chan bool {\n\tsig := make(chan os.Signal, 1)\n\tdone := make(chan bool, 1)\n\tsignal.Notify(sig, syscall.SIGINT, syscall.SIGTERM)\n\tgo func() {\n\t\t<-sig\n\t\tlog.Printf(\"worker.trap\")\n\t\tdone <- true\n\t}()\n\treturn done\n}", "title": "" } ]
32635045a6b29e4ecf7a1f3b71d11428
If the WalkHandlers.XsdGoPkgHasElem_DSAKeyValue function is not nil (ie. was set by outside code), calls it with this XsdGoPkgHasElem_DSAKeyValue instance as the single argument. Then calls the Walk() method on 0/0 embed(s) and 1/1 field(s) belonging to this XsdGoPkgHasElem_DSAKeyValue instance.
[ { "docid": "6931b99ecab4a6c5542e8053cc028ed9", "score": "0.8701724", "text": "func (me *XsdGoPkgHasElem_DSAKeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_DSAKeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.DSAKeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "476254b4891147536c143f21716eed89", "score": "0.83459383", "text": "func (me *XsdGoPkgHasElems_DSAKeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_DSAKeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.DSAKeyValues {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "19feadd58f98d353d251c349e994d611", "score": "0.6462294", "text": "func (me *TDSAKeyValueType) Walk() (err error) {\n\tif fn := WalkHandlers.TDSAKeyValueType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_PgenCountersequencesequenceDSAKeyValueTypeschema_PgenCounter_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_GsequenceDSAKeyValueTypeschema_G_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_YsequenceDSAKeyValueTypeschema_Y_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_JsequenceDSAKeyValueTypeschema_J_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_PsequencesequenceDSAKeyValueTypeschema_P_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_QsequencesequenceDSAKeyValueTypeschema_Q_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_SeedsequencesequenceDSAKeyValueTypeschema_Seed_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "db5e3df0486e831398d078fb9fd7c4cc", "score": "0.6159722", "text": "func (me *XsdGoPkgHasElem_KeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.KeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "efda7978b8e72c7d8cb5ebf63aef95d5", "score": "0.6018739", "text": "func (me *XsdGoPkgHasElems_PsequencesequenceDSAKeyValueTypeschema_P_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PsequencesequenceDSAKeyValueTypeschema_P_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "23eac81e9b6339851ed03ed503851b57", "score": "0.5920053", "text": "func (me *XsdGoPkgHasElems_KeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_KeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.KeyValues {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "461d31df5cbd88a3ec68670d805ae31f", "score": "0.59124696", "text": "func (me *XsdGoPkgHasElems_GsequenceDSAKeyValueTypeschema_G_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_GsequenceDSAKeyValueTypeschema_G_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "28d4fa825da1f6a3eb0d4cd614194f30", "score": "0.5890688", "text": "func (me *XsdGoPkgHasElem_PsequencesequenceDSAKeyValueTypeschema_P_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_PsequencesequenceDSAKeyValueTypeschema_P_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "a804afae2a5d8e168177f514b7ea3e08", "score": "0.5852246", "text": "func (me *XsdGoPkgHasElem_GsequenceDSAKeyValueTypeschema_G_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_GsequenceDSAKeyValueTypeschema_G_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f689bf0d84fb7767da5ac90aa0e1ead1", "score": "0.57813925", "text": "func (me *XsdGoPkgHasElems_YsequenceDSAKeyValueTypeschema_Y_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_YsequenceDSAKeyValueTypeschema_Y_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "55ab9a1acfd5d6d01e99ba1c9b1c521e", "score": "0.5754811", "text": "func (me *XsdGoPkgHasElems_QsequencesequenceDSAKeyValueTypeschema_Q_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_QsequencesequenceDSAKeyValueTypeschema_Q_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "34f911e300363e901d1e294473f13b7f", "score": "0.57055086", "text": "func (me *XsdGoPkgHasElem_YsequenceDSAKeyValueTypeschema_Y_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_YsequenceDSAKeyValueTypeschema_Y_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "aa8326c12d878272a6260af84ffda903", "score": "0.5664043", "text": "func (me *XsdGoPkgHasElem_QsequencesequenceDSAKeyValueTypeschema_Q_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_QsequencesequenceDSAKeyValueTypeschema_Q_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "cabec16510dc58a53a5ce7f64ea9c430", "score": "0.55989814", "text": "func (me *XsdGoPkgHasElem_JsequenceDSAKeyValueTypeschema_J_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_JsequenceDSAKeyValueTypeschema_J_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "222a827f774db7857d876d96a49d6d69", "score": "0.5596803", "text": "func (me *XsdGoPkgHasElems_JsequenceDSAKeyValueTypeschema_J_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_JsequenceDSAKeyValueTypeschema_J_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "df1ebe0ceeb90db1e7faf11b19a172b2", "score": "0.53114307", "text": "func (me *XsdGoPkgHasElem_Key) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Key; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "060215f60df8d552888186c98f153335", "score": "0.52694744", "text": "func (me *XsdGoPkgHasElems_Key) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_Key; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "693d19ec7111f49881c439222d64e229", "score": "0.51878875", "text": "func (me *XsdGoPkgHasElems_SignatureValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SignatureValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.SignatureValues {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "bb626f72368d70bf75d83294e1cb86d1", "score": "0.5144562", "text": "func (me *XsdGoPkgHasElem_SignatureValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SignatureValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.SignatureValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "ee50a597e06166105cd61c835c629eb7", "score": "0.5134935", "text": "func (me *XsdGoPkgHasElems_PgenCountersequencesequenceDSAKeyValueTypeschema_PgenCounter_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PgenCountersequencesequenceDSAKeyValueTypeschema_PgenCounter_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5fa7d2d7a1174a69f2c92f4ef68bcb6f", "score": "0.49894735", "text": "func (me *XsdGoPkgHasElem_KeyInfo) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KeyInfo; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.KeyInfo.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "0f6cc0a89010797f3d95d0e53a048f42", "score": "0.49861184", "text": "func (me *XsdGoPkgHasElems_SeedsequencesequenceDSAKeyValueTypeschema_Seed_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SeedsequencesequenceDSAKeyValueTypeschema_Seed_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "92c81f6f134408c9d2fa85076a4545e1", "score": "0.49267465", "text": "func (me *XsdGoPkgHasElem_RSAKeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_RSAKeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.RSAKeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "992bb835052cfe7ae1c27be1ad65fd5b", "score": "0.49219996", "text": "func (me *XsdGoPkgHasElem_KeyName) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KeyName; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4d93adbc98fcf453fcbe47a59db80dc4", "score": "0.49110147", "text": "func (me *XsdGoPkgHasElems_KeyName) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_KeyName; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "47e7252d0695b6c45f730cbbdc5b5827", "score": "0.49075076", "text": "func (me *XsdGoPkgHasElem_PgenCountersequencesequenceDSAKeyValueTypeschema_PgenCounter_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_PgenCountersequencesequenceDSAKeyValueTypeschema_PgenCounter_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "6098a88ff24e2c901c472edf0e9d739f", "score": "0.48773897", "text": "func (me *XsdGoPkgHasElems_RSAKeyValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_RSAKeyValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.RSAKeyValues {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b080a509b275869d9af3ff9773640ae1", "score": "0.4866845", "text": "func (me *XsdGoPkgHasElem_Value) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Value; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "bb841b5b6c10190a34fcedc41a225ff0", "score": "0.48490354", "text": "func (me *XsdGoPkgHasElem_SeedsequencesequenceDSAKeyValueTypeschema_Seed_TCryptoBinary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SeedsequencesequenceDSAKeyValueTypeschema_Seed_TCryptoBinary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b8d9391439fa88262b710a6ab6b1c61f", "score": "0.48025972", "text": "func (me *TKeyValueType) Walk() (err error) {\n\tif fn := WalkHandlers.TKeyValueType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasCdata.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_DSAKeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_RSAKeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "92bab47ea08e258d533da692058f4cf5", "score": "0.48003435", "text": "func (me *XsdGoPkgHasElems_Value) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_Value; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "9805f393b009e95ed5fe83549d9c5f85", "score": "0.47993124", "text": "func (me *XsdGoPkgHasElems_KeyInfo) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_KeyInfo; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.KeyInfos {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "349a3131662a6d93df6d86c38fbfc6e5", "score": "0.47978082", "text": "func (me *XsdGoPkgHasElem_SPKIData) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SPKIData; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.SPKIData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "dab85a9686b8845200e02bd6ad9dcdd6", "score": "0.47095114", "text": "func (me *XElemKeyInfo) Walk() (err error) {\n\tif fn := WalkHandlers.XElemKeyInfo; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.KeyInfo.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "659f80c0002aa8855fdf28384de50039", "score": "0.47093958", "text": "func (me *TKeyValuePair) Walk() (err error) {\n\tif fn := WalkHandlers.TKeyValuePair; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_KeysequenceParameterMapEntryschema_Key_XsdtString_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_ValuesequenceHITLayoutParameterschema_Value_XsdtString_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "eda3ba7fe344394fb877e3a0142cd776", "score": "0.46853644", "text": "func (me *XsdGoPkgHasElems_DigestValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_DigestValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "3787c85c5a3520c167ddc5fb6efc045e", "score": "0.4649522", "text": "func (n *node) eachKeyValue(key Key, visitor func(key Key, value interface{})) {\n\tif n.isSet() {\n\t\tvisitor(key, n.value)\n\t\treturn\n\t}\n\tfor keyPart, childNode := range n.children {\n\t\tchildNode.eachKeyValue(append(NewKey(key...), keyPart), visitor)\n\t}\n}", "title": "" }, { "docid": "ac08a261b16097430e380d546287992c", "score": "0.46247727", "text": "func (me *XsdGoPkgHasElems_SPKIData) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SPKIData; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.SPKIDatas {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "2e39b5ce6716820330d55b56d15d317b", "score": "0.45492718", "text": "func (me *XsdGoPkgHasElem_Signature) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Signature; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.Signature.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f4f791a7cabd1d8d21c0a75904a41c8b", "score": "0.45489308", "text": "func (me *XsdGoPkgHasElem_DigestValue) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_DigestValue; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "fe2953b8f2a0d01f3a4fd1adefdea05c", "score": "0.44833064", "text": "func (me *TKeyInfoType) Walk() (err error) {\n\tif fn := WalkHandlers.TKeyInfoType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasCdata.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_KeyProperties.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\n\t\tif err = me.XsdGoPkgHasElems_KeyName.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_KeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_SPKIData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_RetrievalMethod.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_X509Data.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_PGPData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_MgmtData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5a15cd4c1ed510e9819a19cb5ccd814c", "score": "0.44781795", "text": "func (me *XsdGoPkgHasElem_PGPData) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_PGPData; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.PGPData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "0b624543bda84eafc5876df95a8726a4", "score": "0.44685394", "text": "func (me *XsdGoPkgHasElems_Signature) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_Signature; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.Signatures {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "eedde4efd4227713c9d8e6ed61b5f10b", "score": "0.44628733", "text": "func breakDSA(pub *dsa.PublicKey, sum []byte, r, s, k *big.Int) *dsa.PrivateKey {\n\tz1 := new(big.Int).Mul(s, k)\n\tz2 := new(big.Int).SetBytes(sum)\n\tz1.Sub(z1, z2)\n\tz2.ModInverse(r, pub.Q)\n\n\tx := z1.Mul(z1, z2)\n\tx.Mod(x, pub.Q)\n\n\ty := z2.Exp(pub.G, x, pub.P)\n\tif !equal(y, pub.Y) {\n\t\treturn nil\n\t}\n\treturn &dsa.PrivateKey{\n\t\tPublicKey: *pub,\n\t\tX: x,\n\t}\n}", "title": "" }, { "docid": "9d5cf53d6616be2b47d326c1cab42966", "score": "0.44330713", "text": "func (me *XsdGoPkgHasElem_Pair) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Pair; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif err = me.Pair.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "b565a0f53256aabc402fdb3bb8300c31", "score": "0.43857437", "text": "func (me *XsdGoPkgHasElems_PairSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PairSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "71c3b9ad6d3c649a8d2b3124c40bc3e7", "score": "0.43848246", "text": "func (b *DoubleArrayBuilder) Build(keys []string, values []uint32) error {\n\tkeySet, err := newSortedKeySet(keys, values)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"build key set, %v\", err)\n\t}\n\tif !keySet.hasValues() {\n\t\tif err := b.buildFromKeySetHeader(keySet); err != nil {\n\t\t\treturn fmt.Errorf(\"build from key set header, %v\", err)\n\t\t}\n\t\treturn nil\n\t}\n\tif b.progress != nil {\n\t\tb.progress.SetMaximum(keySet.Len())\n\t}\n\tg, err := b.buildDAWG(keySet)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"build DAWG, %v\", err)\n\t}\n\tif err := b.buildFromDAWGHeader(g); err != nil {\n\t\treturn fmt.Errorf(\"build from DAWG header, %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0002b8d1dd3fa3088f3cde22dc930e75", "score": "0.4342675", "text": "func (me *XsdGoPkgHasElems_Pair) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_Pair; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "0d92fa0fd32597214144055b772a4bf7", "score": "0.43195844", "text": "func (me *TRSAKeyValueType) Walk() (err error) {\n\tif fn := WalkHandlers.TRSAKeyValueType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_ModulussequenceRSAKeyValueTypeschema_Modulus_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XsdGoPkgHasElem_ExponentsequenceRSAKeyValueTypeschema_Exponent_TCryptoBinary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "cad01a78ae1d361b8116d8708794a341", "score": "0.42903283", "text": "func (me *XsdGoPkgHasElems_KmlSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_KmlSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "1a90a5f2e9232ac8a2009ce3be3455c3", "score": "0.4281306", "text": "func (me *XsdGoPkgHasElem_PairSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_PairSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "7a9cdd7bf333d098578c3af1105738d6", "score": "0.42591012", "text": "func (me *XsdGoPkgHasElem_KmlSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KmlSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "aede4aa6f2b264e69d15a855a2d9bed9", "score": "0.4255023", "text": "func (o VirtualDatabaseSpecBuildEnvValueFromPtrOutput) SecretKeyRef() VirtualDatabaseSpecBuildEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v *VirtualDatabaseSpecBuildEnvValueFrom) *VirtualDatabaseSpecBuildEnvValueFromSecretKeyRef {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecBuildEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "fea04157d6229637d0fe0d764c2ebfa3", "score": "0.42306593", "text": "func Key(value string) *SimpleElement { return newSEString(\"key\", value) }", "title": "" }, { "docid": "0044e8ecce1c19f439de630069508f52", "score": "0.4224048", "text": "func (me *XsdGoPkgHasElem_SignedInfo) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SignedInfo; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.SignedInfo.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7ddb367d417cc00944515ad80a1e0451", "score": "0.422188", "text": "func (me *XsdGoPkgHasElems_SPKISexpsequenceSPKIDataTypeschema_SPKISexp_XsdtBase64Binary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SPKISexpsequenceSPKIDataTypeschema_SPKISexp_XsdtBase64Binary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "252f849616db667c7bc648e743ab4e60", "score": "0.41978133", "text": "func (me *XsdGoPkgHasElems_PGPData) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PGPData; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.PGPDatas {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b7f8bd9ae603406c009270daa782a2d2", "score": "0.41934645", "text": "func (o BuildStrategySpecBuildStepsEnvValueFromPtrOutput) SecretKeyRef() BuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v *BuildStrategySpecBuildStepsEnvValueFrom) *BuildStrategySpecBuildStepsEnvValueFromSecretKeyRef {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecretKeyRef\n\t}).(BuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "003bcff2558c8ac094809df6645a06a2", "score": "0.41839787", "text": "func (o VirtualDatabaseSpecBuildEnvValueFromOutput) SecretKeyRef() VirtualDatabaseSpecBuildEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v VirtualDatabaseSpecBuildEnvValueFrom) *VirtualDatabaseSpecBuildEnvValueFromSecretKeyRef {\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecBuildEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "239cb19ecbf6ead9d9550423e2567fc0", "score": "0.4176991", "text": "func (me *XsdGoPkgHasElem_Kml) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Kml; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif err = me.Kml.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "4d4267b6babd7465b7f693352e02909d", "score": "0.41648623", "text": "func (me *XsdGoPkgHasElem_SPKISexpsequenceSPKIDataTypeschema_SPKISexp_XsdtBase64Binary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SPKISexpsequenceSPKIDataTypeschema_SPKISexp_XsdtBase64Binary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "42f6f5bf5c7635e0be6152aa7059a1c9", "score": "0.41527975", "text": "func (x *JSStaticValue) Deref() {\n\tif x.ref34655956 == nil {\n\t\treturn\n\t}\n\tx.Name = packPCharString(x.ref34655956.name)\n\tx.GetProperty = *NewJSObjectGetPropertyCallbackRef(unsafe.Pointer(&x.ref34655956.getProperty))\n\tx.SetProperty = *NewJSObjectSetPropertyCallbackRef(unsafe.Pointer(&x.ref34655956.setProperty))\n\tx.Attributes = (JSPropertyAttributes)(x.ref34655956.attributes)\n}", "title": "" }, { "docid": "39665e1ba623d5369ea23f940e643630", "score": "0.41447544", "text": "func init() {\n\tPackages[\"crypto/dsa\"] = Package{\n\tBinds: map[string]Value{\n\t\t\"ErrInvalidPublicKey\":\tValueOf(&dsa.ErrInvalidPublicKey).Elem(),\n\t\t\"GenerateKey\":\tValueOf(dsa.GenerateKey),\n\t\t\"GenerateParameters\":\tValueOf(dsa.GenerateParameters),\n\t\t\"L1024N160\":\tValueOf(dsa.L1024N160),\n\t\t\"L2048N224\":\tValueOf(dsa.L2048N224),\n\t\t\"L2048N256\":\tValueOf(dsa.L2048N256),\n\t\t\"L3072N256\":\tValueOf(dsa.L3072N256),\n\t\t\"Sign\":\tValueOf(dsa.Sign),\n\t\t\"Verify\":\tValueOf(dsa.Verify),\n\t}, Types: map[string]Type{\n\t\t\"ParameterSizes\":\tTypeOf((*dsa.ParameterSizes)(nil)).Elem(),\n\t\t\"Parameters\":\tTypeOf((*dsa.Parameters)(nil)).Elem(),\n\t\t\"PrivateKey\":\tTypeOf((*dsa.PrivateKey)(nil)).Elem(),\n\t\t\"PublicKey\":\tTypeOf((*dsa.PublicKey)(nil)).Elem(),\n\t}, \n\t}\n}", "title": "" }, { "docid": "00a1f8602d0aad73c61ec52705c45bf6", "score": "0.41259995", "text": "func (f genHelperEncoder) EncWriteMapElemKey() { f.e.mapElemKey() }", "title": "" }, { "docid": "a3b0018cf223b362bbf16cee79cc7654", "score": "0.41060063", "text": "func Kbd(props *KbdProps, children ...Element) *KbdElem {\n\trProps := &_KbdProps{\n\t\tBasicHTMLElement: newBasicHTMLElement(),\n\t}\n\n\tif props != nil {\n\t\tprops.assign(rProps)\n\t}\n\n\treturn &KbdElem{\n\t\tElement: createElement(\"kbd\", rProps, children...),\n\t}\n}", "title": "" }, { "docid": "c0d3ebcd129845a2637060f33ae68f18", "score": "0.41052926", "text": "func (o BuildStrategySpecBuildStepsEnvValueFromOutput) SecretKeyRef() BuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v BuildStrategySpecBuildStepsEnvValueFrom) *BuildStrategySpecBuildStepsEnvValueFromSecretKeyRef {\n\t\treturn v.SecretKeyRef\n\t}).(BuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "0b22395b90fee6fa12ba0bcfa0370871", "score": "0.4084202", "text": "func (me *XsdGoPkgHasElem_SearchHITs) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SearchHITs; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.SearchHITs.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7da0ff956eeca5d4eecfd36434e99056", "score": "0.40831426", "text": "func (me *XsdGoPkgHasElems_AliasSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElems_AliasSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "1a7ca9a70580501ca0bb2347e3132a1f", "score": "0.40830404", "text": "func (me *TKeyInfoType) Walk() (err error) {\n\tif fn := WalkHandlers.TKeyInfoType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XElemsKeyValue.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsX509Data.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsMgmtData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XCdata.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsKeyName.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsRetrievalMethod.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsPGPData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemsSPKIData.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif err = me.XElemEncryptedKey.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "3252ccc127195ffd5a7c7dea762663f6", "score": "0.40775397", "text": "func (me *XsdGoPkgHasElem_KeysequenceParameterMapEntryschema_Key_XsdtString_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KeysequenceParameterMapEntryschema_Key_XsdtString_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "2e5a10f5f7c024778026ff1be40fe7e7", "score": "0.4060533", "text": "func (me *XsdGoPkgHasElems_SignedInfo) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SignedInfo; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.SignedInfos {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f12ce99da46d0807f3ae791ed5c10ed9", "score": "0.40555418", "text": "func (h *Handler) HandleGetPrivateDataMultipleKeys(txID, ns string, config *pb.StaticCollectionConfig, keys []string) ([][]byte, bool, error) {\n\tswitch config.Type {\n\tcase pb.CollectionType_COL_TRANSIENT:\n\t\tlogger.Debugf(\"Collection [%s:%s] is of type TransientData. Returning transient data for keys [%s]\", ns, config.Name, keys)\n\t\tvalues, err := h.getTransientDataMultipleKeys(txID, ns, config.Name, keys)\n\t\tif err != nil {\n\t\t\treturn nil, true, err\n\t\t}\n\t\treturn values, true, nil\n\tcase pb.CollectionType_COL_DCAS:\n\t\tfallthrough\n\tcase pb.CollectionType_COL_OFFLEDGER:\n\t\tlogger.Debugf(\"Collection [%s:%s] is of an off-ledger store. Returning data for keys [%s]\", ns, config.Name, keys)\n\t\tvalues, err := h.getDataMultipleKeys(txID, ns, config.Name, keys)\n\t\tif err != nil {\n\t\t\treturn nil, true, err\n\t\t}\n\t\treturn values, true, nil\n\tdefault:\n\t\treturn nil, false, nil\n\t}\n}", "title": "" }, { "docid": "5cd1186be45d3c1183e4d790bb569ba6", "score": "0.40480685", "text": "func (me *TSPKIDataType) Walk() (err error) {\n\tif fn := WalkHandlers.TSPKIDataType; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.XsdGoPkgHasElems_SPKISexpsequenceSPKIDataTypeschema_SPKISexp_XsdtBase64Binary_.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "d2e3b3f108e1909b690963183d98eb0e", "score": "0.40467486", "text": "func (me *XHasElems_GeneSymbol) Walk() (err error) {\n\tif fn := WalkHandlers.XHasElems_GeneSymbol; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "58497e656d61ff6ab6c5e66a38d16227", "score": "0.4044549", "text": "func (o VirtualDatabaseSpecEnvValueFromPtrOutput) SecretKeyRef() VirtualDatabaseSpecEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v *VirtualDatabaseSpecEnvValueFrom) *VirtualDatabaseSpecEnvValueFromSecretKeyRef {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "2e499d25105d01ac2b5aadb34b42976e", "score": "0.40357924", "text": "func (me *XHasElem_GeneSymbol) Walk() (err error) {\n\tif fn := WalkHandlers.XHasElem_GeneSymbol; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7bf3aee1ff5f0e05162d0f035426902e", "score": "0.40304598", "text": "func (o VirtualDatabaseSpecDatasourcesPropertiesValueFromPtrOutput) SecretKeyRef() VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v *VirtualDatabaseSpecDatasourcesPropertiesValueFrom) *VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRef {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "50757d619e152c05166655902c913082", "score": "0.40247744", "text": "func (me *XsdGoPkgHasElems_PGPKeyIDsequencechoicePGPDataTypeschema_PGPKeyID_XsdtBase64Binary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PGPKeyIDsequencechoicePGPDataTypeschema_PGPKeyID_XsdtBase64Binary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5387ac2689e8d6594a850a0b3207e015", "score": "0.40212348", "text": "func (o VirtualDatabaseSpecBuildEnvValueFromSecretKeyRefPtrOutput) Key() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *VirtualDatabaseSpecBuildEnvValueFromSecretKeyRef) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Key\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9080679fdc4364be6199db4b14a2dd57", "score": "0.40179512", "text": "func Build(keys []string, values []int) (*DoubleArray, error) {\n\tif len(keys) == 0 {\n\t\treturn nil, fmt.Errorf(\"keys must not be empty\")\n\t}\n\tif len(keys) != len(values) {\n\t\treturn nil, fmt.Errorf(\"The size of keys must be equal to that of values\")\n\t}\n\n\tb := builder{keys: keys, values: values}\n\n\tb.init()\n\terr := b.arrange(0, len(keys), 0, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tb.finish()\n\n\tnumNodes := 1 // 1 is for the root\n\tfor i := 1; i < len(b.array); i++ {\n\t\tif b.array[i].check >= 0 {\n\t\t\tnumNodes++\n\t\t}\n\t}\n\n\treturn &DoubleArray{array: b.array, tail: b.tail, numKeys: len(keys), numNodes: numNodes}, nil\n}", "title": "" }, { "docid": "2a04b32316d7d6c640f00f15981aa658", "score": "0.40154928", "text": "func (me *XsdGoPkgHasElem_AliasSimpleExtensionGroup) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_AliasSimpleExtensionGroup; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "d1bd2447c62ecb514afb41feffd91a04", "score": "0.40090916", "text": "func (me *XsdGoPkgHasElems_SignatureProperty) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SignatureProperty; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.SignatureProperties {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "dada6a1141422d92acfc7f0eb378e832", "score": "0.4008871", "text": "func (o ClusterBuildStrategySpecBuildStepsEnvValueFromPtrOutput) SecretKeyRef() ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v *ClusterBuildStrategySpecBuildStepsEnvValueFrom) *ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRef {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.SecretKeyRef\n\t}).(ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "859794c8836690960bc693d31bebae0f", "score": "0.40079305", "text": "func (me *XsdGoPkgHasElem_KeyProperties) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_KeyProperties; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.KeyProperties {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "588c69b6c9ca1de600ac8d1c5b6191d2", "score": "0.40049645", "text": "func Keygen(attrs []htmlgo.Attribute, children ...HTML) HTML {\n\treturn &htmlgo.Tree{Tag: \"keygen\", Attributes: attrs, Children: children}\n}", "title": "" }, { "docid": "3147a09faa2a31e7ec7c6c861256a575", "score": "0.39986047", "text": "func buildKeyValueFields(field *surface_v1.Field) []*dpb.FieldDescriptorProto {\n\tk, v := \"key\", \"value\"\n\tvar n1, n2 int32 = 1, 2\n\tl := dpb.FieldDescriptorProto_LABEL_OPTIONAL\n\tt := dpb.FieldDescriptorProto_TYPE_STRING\n\tkeyField := &dpb.FieldDescriptorProto{\n\t\tName: &k,\n\t\tNumber: &n1,\n\t\tLabel: &l,\n\t\tType: &t,\n\t}\n\n\tvalueType := field.NativeType[11:] // This transforms a string like 'map[string]int32' to 'int32'. In other words: the type of the value from the map.\n\tvalueField := &dpb.FieldDescriptorProto{\n\t\tName: &v,\n\t\tNumber: &n2,\n\t\tLabel: &l,\n\t\tType: getFieldDescriptorType(valueType, field.EnumValues),\n\t\tTypeName: getTypeNameForMapValueType(valueType),\n\t}\n\treturn []*dpb.FieldDescriptorProto{keyField, valueField}\n}", "title": "" }, { "docid": "0fb5a5013fa161faa680e8af810aa129", "score": "0.397844", "text": "func (o VirtualDatabaseSpecEnvValueFromOutput) SecretKeyRef() VirtualDatabaseSpecEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v VirtualDatabaseSpecEnvValueFrom) *VirtualDatabaseSpecEnvValueFromSecretKeyRef {\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "478d67debcd64e8bf90461bcaee1f7f6", "score": "0.3969345", "text": "func (me *XsdGoPkgHasElems_SearchHITs) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_SearchHITs; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tfor _, x := range me.SearchHITses {\n\t\t\tif err = x.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4c234e1a6a915a37d363d3468b37641f", "score": "0.3955384", "text": "func dsaKeyPrinter(name string, val *big.Int, buf *bytes.Buffer) {\n buf.WriteString(fmt.Sprintf(\"%16s%s:\", \"\", name))\n for i, b := range val.Bytes() {\n if (i % 15) == 0 {\n buf.WriteString(fmt.Sprintf(\"\\n%20s\", \"\"))\n }\n buf.WriteString(fmt.Sprintf(\"%02x\", b)\n if i != len(val.Bytes())-1 { \n buf.WriteString(\":\")\n }\n }", "title": "" }, { "docid": "dd981dbe89055edc23172e01a58ce6b9", "score": "0.3946386", "text": "func getDsaKey(key string) (privateKey *dsa.PrivateKey, err error) {\n\tblock, _ := pem.Decode([]byte(key))\n\n\ttmpKey := tempDsaKey{}\n\t_, err = asn1.Unmarshal(block.Bytes, &tmpKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tprivateKey = &dsa.PrivateKey{}\n\tprivateKey.P = tmpKey.P\n\tprivateKey.Q = tmpKey.Q\n\tprivateKey.G = tmpKey.G\n\tprivateKey.Y = tmpKey.Y\n\tprivateKey.X = tmpKey.X\n\treturn\n}", "title": "" }, { "docid": "9884ee79cea6eddb60e90dbff77de77a", "score": "0.39396498", "text": "func (me *XsdGoPkgHasElems_PGPKeyPacketsequencechoicePGPDataTypeschema_PGPKeyPacket_XsdtBase64Binary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElems_PGPKeyPacketsequencechoicePGPDataTypeschema_PGPKeyPacket_XsdtBase64Binary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5dfd887af73df9386fce33e32e255bef", "score": "0.39390656", "text": "func Keygen_(children ...HTML) HTML {\n return Keygen(nil, children...)\n}", "title": "" }, { "docid": "966604ed7654d91979923c74acf6b7a9", "score": "0.39384186", "text": "func (o VirtualDatabaseSpecDatasourcesPropertiesValueFromOutput) SecretKeyRef() VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v VirtualDatabaseSpecDatasourcesPropertiesValueFrom) *VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRef {\n\t\treturn v.SecretKeyRef\n\t}).(VirtualDatabaseSpecDatasourcesPropertiesValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "a28d27293f175f4547f590a03e38801c", "score": "0.39327863", "text": "func (o ClusterBuildStrategySpecBuildStepsEnvValueFromOutput) SecretKeyRef() ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput {\n\treturn o.ApplyT(func(v ClusterBuildStrategySpecBuildStepsEnvValueFrom) *ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRef {\n\t\treturn v.SecretKeyRef\n\t}).(ClusterBuildStrategySpecBuildStepsEnvValueFromSecretKeyRefPtrOutput)\n}", "title": "" }, { "docid": "d6a4f183d7f8d613891eb224881552e0", "score": "0.39231786", "text": "func (me *XsdGoPkgHasElem_Assessment) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Assessment; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.Assessment.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "b0c2b3b385803fc88091235b3f4de100", "score": "0.39178443", "text": "func (m *ScopedRoutes_ScopeKeyBuilder_FragmentBuilder_HeaderValueExtractor_KvElement) Validate() error {\n\treturn m.validate(false)\n}", "title": "" }, { "docid": "1ee2e97b3bb5f26a6b683c849d00ece9", "score": "0.39155433", "text": "func (r *RSAKeyGenerator) GenerateKey() (DSAKey, error) {\n\tif r.bitSize == 0 {\n\t\tr.bitSize = RSADefaultSize\n\t}\n\n\tkey, err := rsa.GenerateKey(rand.Reader, r.bitSize)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn key, nil\n}", "title": "" }, { "docid": "1e70224e9e3aa2fad6980d0c03daaae2", "score": "0.39124298", "text": "func (g *Group) BuildKeyInfo() {\n\tif g.hasBuiltKeyInfo {\n\t\treturn\n\t}\n\tg.hasBuiltKeyInfo = true\n\n\te := g.Equivalents.Front().Value.(*GroupExpr)\n\tchildSchema := make([]*expression.Schema, len(e.Children))\n\tchildMaxOneRow := make([]bool, len(e.Children))\n\tfor i := range e.Children {\n\t\te.Children[i].BuildKeyInfo()\n\t\tchildSchema[i] = e.Children[i].Prop.Schema\n\t\tchildMaxOneRow[i] = e.Children[i].Prop.MaxOneRow\n\t}\n\tif len(childSchema) == 1 {\n\t\t// For UnaryPlan(such as Selection, Limit ...), we can set the child's unique key as its unique key.\n\t\t// If the GroupExpr is a schemaProducer, schema.Keys will be reset below in `BuildKeyInfo()`.\n\t\tg.Prop.Schema.Keys = childSchema[0].Keys\n\t}\n\te.ExprNode.BuildKeyInfo(g.Prop.Schema, childSchema)\n\tg.Prop.MaxOneRow = e.ExprNode.MaxOneRow() || plannercore.HasMaxOneRow(e.ExprNode, childMaxOneRow)\n}", "title": "" }, { "docid": "c02f352b5b5db8b8a8fd43985b1e608b", "score": "0.39110172", "text": "func (me *XsdGoPkgHasElem_PGPKeyIDsequencechoicePGPDataTypeschema_PGPKeyID_XsdtBase64Binary_) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_PGPKeyIDsequencechoicePGPDataTypeschema_PGPKeyID_XsdtBase64Binary_; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "4f4e9262e90da4fba883a1f080a78c40", "score": "0.3907293", "text": "func (me *XsdGoPkgHasElem_X509Data) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_X509Data; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.X509Data.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "38a26746d6714eef8ba8a7df5bb9c32b", "score": "0.3903696", "text": "func (me *XsdGoPkgHasElem_SignatureProperty) Walk() (err error) {\n\tif fn := WalkHandlers.XsdGoPkgHasElem_SignatureProperty; me != nil {\n\t\tif fn != nil {\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tif err = me.SignatureProperty.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\treturn\n\t\t}\n\t\tif fn != nil {\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\treturn\n}", "title": "" } ]
c1c5fb6d4c48981763dd21ad4cea5e6a
UpdateBlockConfirm update block confirmations
[ { "docid": "168317b3084fcea6eed34c23ef45c998", "score": "0.80064356", "text": "func UpdateBlockConfirm(block m.Blocks, updateNum int64) bool {\n\tblock.Confirmations += updateNum\n\tvar err error\n\tif block.Confirmations > confirmNum {\n\t\tblock.Confirm = true\n\t\terr = psqlDB.Model(&block).Update(\"confirmations\", block.Confirmations).Update(\"confirm\", block.Confirm).Error\n\t} else {\n\t\terr = psqlDB.Model(&block).Update(\"confirmations\", block.Confirmations).Error\n\t}\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" } ]
[ { "docid": "542c3a8a563bdfcfb4fcee3cd6c14a85", "score": "0.6862779", "text": "func (s *PCFSServer) smConfirmBlock(arg *[]byte, entry *rpb.LogEntry) []byte {\n\tgroup := entry.Command.Group\n\tcontract := &pb.ConfirmBlockContract{}\n\tif err := proto.Unmarshal(*arg, contract); err != nil {\n\t\tlog.Println(\"cannode decode confirm block contract:\", err)\n\t\treturn []byte{0}\n\t}\n\t// TODO: verify client signature\n\tcacheKey := fmt.Sprint(group, \"-\", contract.Index, \"-\", contract.File)\n\tlogI, cached := s.PendingBlocks.Get(cacheKey)\n\tif !cached {\n\t\tlogI = &map[uint64]bool{contract.NodeId: true}\n\t\ts.PendingBlocks.Set(cacheKey, logI, cache.DefaultExpiration)\n\t} else {\n\t\tl := logI.(*map[uint64]bool)\n\t\t(*l)[contract.NodeId] = true\n\t\ts.PendingBlocks.Set(cacheKey, l, cache.DefaultExpiration)\n\t}\n\treturn []byte{1}\n}", "title": "" }, { "docid": "fe9120b19e7858a4dfeee2fb2d55a3d5", "score": "0.6656795", "text": "func (xpoa *XPoa) ProcessConfirmBlock(block *pb.InternalBlock) error {\n\tif !xpoa.IsActive() {\n\t\txpoa.lg.Info(\"Xpoa ProcessConfirmBlock consensus instance not active\", \"state\", xpoa.state)\n\t\treturn errors.New(\"Xpoa ProcessConfirmBlock consensus not active\")\n\t}\n\t// send bft NewProposal if bft enable and it's the miner\n\tif xpoa.enableBFT && bytes.Compare(block.GetProposer(), []byte(xpoa.address)) == 0 {\n\t\tblockData := &pb.Block{\n\t\t\tBcname: xpoa.bcname,\n\t\t\tBlockid: block.Blockid,\n\t\t\tBlock: block,\n\t\t}\n\n\t\t// 如果是当前矿工,检测到下一轮需变更validates,且下一轮proposer并不在节点列表中,此时需在广播列表中新加入节点\n\t\tvalidates := xpoa.proposerInfos\n\t\tnextValidates, _, err := xpoa.getValidatesByBlockId(block.GetBlockid())\n\t\tif err == nil {\n\t\t\tnextTime := time.Now().UnixNano() + xpoa.xpoaConf.period\n\t\t\tnextProposer, err := xpoa.getProposer(nextTime, nextValidates)\n\t\t\txpoa.lg.Warn(\"Cal nextProposer:\", \"proposer\", nextProposer)\n\t\t\tif err == nil && !xpoa.isInValidateSets(nextProposer.Address) {\n\t\t\t\t// 更新发送节点\n\t\t\t\txpoa.lg.Info(\"Send Proposal to new Validates\")\n\t\t\t\tnextValidates := append(xpoa.proposerInfos, nextProposer)\n\t\t\t\tvalidates = nextValidates\n\t\t\t}\n\t\t}\n\n\t\terr = xpoa.bftPaceMaker.NextNewProposal(block.Blockid, blockData, validates)\n\t\tif err != nil {\n\t\t\txpoa.lg.Warn(\"ProcessConfirmBlock: bft next proposal failed\", \"error\", err)\n\t\t\treturn err\n\t\t}\n\t\txpoa.lg.Info(\"Now Confirm finish\", \"ledger height\", xpoa.ledger.GetMeta().TrunkHeight, \"viewNum\", xpoa.bftPaceMaker.CurrentView())\n\t\treturn nil\n\t}\n\t// update bft smr status\n\tif xpoa.enableBFT {\n\t\txpoa.bftPaceMaker.UpdateSmrState(block.GetJustify())\n\t}\n\txpoa.lg.Debug(\"Now Confirm finish\", \"ledger height\", xpoa.ledger.GetMeta().TrunkHeight, \"viewNum\", xpoa.bftPaceMaker.CurrentView())\n\treturn nil\n}", "title": "" }, { "docid": "5acdf7f08a45a94f17360944ca2e052e", "score": "0.62438446", "text": "func (c *Client) reConfirmTx() error {\n\tblockMetas, err := c.blockMetaAccessor.GetBlockMetas()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"fail to get block metas from local storage: %w\", err)\n\t}\n\n\tfor _, blockMeta := range blockMetas {\n\t\tvar errataTxs []types.ErrataTx\n\t\tfor _, utxo := range blockMeta.UnspentTransactionOutputs {\n\t\t\ttxID := utxo.TxID.String()\n\t\t\tif c.confirmTx(&utxo.TxID) {\n\t\t\t\tc.logger.Info().Msgf(\"block height: %d, tx: %s still exist\", blockMeta.Height, txID)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// this means the tx doesn't exist in chain ,thus should errata it\n\t\t\terrataTxs = append(errataTxs, types.ErrataTx{\n\t\t\t\tTxID: common.TxID(txID),\n\t\t\t\tChain: common.BTCChain,\n\t\t\t})\n\t\t\t// remove the UTXO from block meta , so signer will not spend it\n\t\t\tblockMeta.RemoveUTXO(utxo.GetKey())\n\t\t}\n\t\tif len(errataTxs) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tc.globalErrataQueue <- types.ErrataBlock{\n\t\t\tHeight: blockMeta.Height,\n\t\t\tTxs: errataTxs,\n\t\t}\n\t\t// Let's get the block again to fix the block hash\n\t\tr, err := c.getBlock(blockMeta.Height)\n\t\tif err != nil {\n\t\t\tc.logger.Err(err).Msgf(\"fail to get block verbose tx result: %d\", blockMeta.Height)\n\t\t}\n\t\tblockMeta.PreviousHash = r.PreviousHash\n\t\tblockMeta.BlockHash = r.Hash\n\t\tif err := c.blockMetaAccessor.SaveBlockMeta(blockMeta.Height, blockMeta); err != nil {\n\t\t\tc.logger.Err(err).Msgf(\"fail to save block meta of height: %d \", blockMeta.Height)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c38dc1c044ed525bb13ec87ad9bf94ac", "score": "0.6034252", "text": "func (c Raid) UpdateBlock(b *i3barjson.Block) {\n\tb.Color = c.Color\n\tfullTextFmt := fmt.Sprintf(\"%s%%s\", c.Label)\n\tmdstatPath := \"/proc/mdstat\"\n\tstats, err := ioutil.ReadFile(mdstatPath)\n\tif err != nil {\n\t\tb.Urgent = true\n\t\tb.FullText = fmt.Sprintf(fullTextFmt, err.Error())\n\t\treturn\n\t}\n\ti := strings.Index(string(stats), \"_\")\n\tif i != -1 {\n\t\tb.Urgent = true\n\t\tb.FullText = fmt.Sprintf(fullTextFmt, \"degraded\")\n\t\treturn\n\t}\n\tb.Urgent = false\n\tb.FullText = fmt.Sprintf(fullTextFmt, \"ok\")\n}", "title": "" }, { "docid": "425fac19f84f3828bce2673020eb840e", "score": "0.5855486", "text": "func (dao *UserContactsDAO) UpdateBlock(is_blocked int8, owner_user_id int32, contact_user_id int32) int64 {\n\tvar query = \"update user_contacts set is_blocked = ? where owner_user_id = ? and contact_user_id = ?\"\n\tr, err := dao.db.Exec(query, is_blocked, owner_user_id, contact_user_id)\n\n\tif err != nil {\n\t\terrDesc := fmt.Sprintf(\"Exec in UpdateBlock(_), error: %v\", err)\n\t\tglog.Error(errDesc)\n\t\tpanic(mtproto.NewRpcError(int32(mtproto.TLRpcErrorCodes_DBERR), errDesc))\n\t}\n\n\trows, err := r.RowsAffected()\n\tif err != nil {\n\t\terrDesc := fmt.Sprintf(\"RowsAffected in UpdateBlock(_), error: %v\", err)\n\t\tglog.Error(errDesc)\n\t\tpanic(mtproto.NewRpcError(int32(mtproto.TLRpcErrorCodes_DBERR), errDesc))\n\t}\n\n\treturn rows\n}", "title": "" }, { "docid": "1af6a6313b64d4977d06e390a6b17b52", "score": "0.5816903", "text": "func (s *Service) applyBlock(block *inter.Block, decidedFrame idx.Frame, cheaters inter.Cheaters) (newAppHash common.Hash, sealEpoch bool, skip bool) {\n\tif s.migration {\n\t\treturn common.Hash{}, false, true\n\t}\n\t// s.engineMu is locked here\n\n\ts.lastBlockProcessed = time.Now()\n\n\tconfirmBlocksMeter.Inc(1)\n\t// if cheater is confirmed, seal epoch right away to prune them from of BFT validators list\n\n\tepochStart := s.store.GetEpochStats(pendingEpoch).Start\n\tsealEpoch = decidedFrame >= s.config.Net.Dag.MaxEpochBlocks\n\tsealEpoch = sealEpoch || block.Time-epochStart >= inter.Timestamp(s.config.Net.Dag.MaxEpochDuration)\n\tsealEpoch = sealEpoch || cheaters.Len() > 0\n\n\tblock, evmBlock, receipts, txPositions, newAppHash := s.applyNewState(block, sealEpoch, cheaters)\n\n\ts.store.SetBlock(block)\n\ts.store.SetBlockIndex(block.Atropos, block.Index)\n\n\t// Build index for not skipped txs\n\tif s.config.TxIndex {\n\t\tfor _, tx := range evmBlock.Transactions {\n\t\t\t// not skipped txs only\n\t\t\tposition := txPositions[tx.Hash()]\n\t\t\ts.store.SetTxPosition(tx.Hash(), &position)\n\t\t}\n\n\t\tif receipts.Len() != 0 {\n\t\t\ts.app.SetReceipts(block.Index, receipts)\n\t\t}\n\t}\n\n\tvar logs []*types.Log\n\tfor _, r := range receipts {\n\t\tfor _, l := range r.Logs {\n\t\t\tlogs = append(logs, l)\n\t\t}\n\t}\n\n\t// Notify about new block and txs\n\ts.feed.newBlock.Send(evmcore.ChainHeadNotify{Block: evmBlock})\n\ts.feed.newTxs.Send(core.NewTxsEvent{Txs: evmBlock.Transactions})\n\ts.feed.newLogs.Send(logs)\n\n\t// Trace by which event this block was confirmed (only for API)\n\tif s.config.DecisiveEventsIndex {\n\t\ts.store.SetBlockDecidedBy(block.Index, s.currentEvent)\n\t}\n\n\t// trace confirmed transactions\n\tconfirmTxnsMeter.Inc(int64(evmBlock.Transactions.Len()))\n\tfor _, tx := range evmBlock.Transactions {\n\t\ttracing.FinishTx(tx.Hash(), \"Service.onNewBlock()\")\n\t\tif latency, err := txLatency.Finish(tx.Hash()); err == nil {\n\t\t\ttxTtfMeter.Update(latency.Milliseconds())\n\t\t}\n\t}\n\n\ts.blockParticipated = make(map[idx.StakerID]bool) // reset map of participated validators\n\n\treturn newAppHash, sealEpoch, false\n}", "title": "" }, { "docid": "c1205ec706e04b64e1214761cdf91c2c", "score": "0.57930934", "text": "func (h *Hub) getBlockConfirmations(ctx context.Context, hash *chainhash.Hash) (int64, error) {\n\tinfo, err := h.nodeConn.GetBlockVerbose(ctx, hash, false)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn info.Confirmations, nil\n}", "title": "" }, { "docid": "039e894c61c204a2c1f88e5febd45047", "score": "0.57598096", "text": "func (sr *Server) helperVerifyBlock(w http.ResponseWriter, r *http.Request) {\n\tnewBlock := blockmanager.Block{}\n\tjson.NewDecoder(r.Body).Decode(&newBlock)\n\n\tfollowsRules := sr.bm.BlockFollowsRules(newBlock, sr.bcServer)\n\tif followsRules {\n\t\tisValid := sr.bm.IsBlockValid(newBlock, sr.bcServer[len(sr.bcServer)-1])\n\t\tif isValid {\n\t\t\tsr.bcServer = append(sr.bcServer, newBlock)\n\n\t\t\t// show the receiver the Id of the item they just received\n\t\t\ttransaction := newBlock.BlockTransaction\n\t\t\tswitch transaction.TransactionType {\n\t\t\t// the receiver should see the item id of the item that they received\n\t\t\tcase \"Exchange\":\n\t\t\t\tfmt.Printf(\"Item %s with ItemId %s has been exchanged\\n\", transaction.Ex.ItemName, transaction.Ex.ItemId)\n\t\t\t\t// show the user a new cli prompt so they don't think it's frozen\n\t\t\t\tfmt.Printf(\"> \")\n\t\t\t}\n\n\t\t}\n\t}\n\n\tlog.Debug(\"server: \", sr.gr.Me)\n\tlog.Debug(\"bcserver\", sr.bcServer)\n}", "title": "" }, { "docid": "6ed8e00e2c5037f3fc32cfc7b21a2b76", "score": "0.5747568", "text": "func Confirmations(ctx context.Context, d *daemon) error {\n\n\t// the first 2 minutes we sleep for 10 sec for blocks to be collected\n\ttick++\n\n\td.sleepTime = 1 * time.Second\n\tif tick < 12 {\n\t\td.sleepTime = 10 * time.Second\n\t}\n\n\tvar startBlockID int64\n\n\t// check last blocks, but not more than 5\n\tconfirmations := &model.Confirmation{}\n\t_, err := confirmations.GetGoodBlock(consts.MIN_CONFIRMED_NODES)\n\tif err != nil {\n\t\td.logger.WithFields(log.Fields{\"type\": consts.DBError, \"error\": err}).Error(\"getting good block\")\n\t\treturn err\n\t}\n\n\tConfirmedBlockID := confirmations.BlockID\n\tinfoBlock := &model.InfoBlock{}\n\t_, err = infoBlock.Get()\n\tif err != nil {\n\t\td.logger.WithFields(log.Fields{\"type\": consts.DBError, \"error\": err}).Error(\"getting info block\")\n\t\treturn err\n\t}\n\tlastBlockID := infoBlock.BlockID\n\tif lastBlockID == 0 {\n\t\treturn nil\n\t}\n\n\tif lastBlockID-ConfirmedBlockID > 5 {\n\t\tstartBlockID = ConfirmedBlockID + 1\n\t\td.sleepTime = 10 * time.Second\n\t\ttick = 0 // reset the tick\n\t}\n\n\tif startBlockID == 0 {\n\t\tstartBlockID = lastBlockID\n\t}\n\n\treturn confirmationsBlocks(ctx, d, lastBlockID, startBlockID)\n}", "title": "" }, { "docid": "1485279aa11286e6009a5da91a2ff985", "score": "0.5743419", "text": "func (b *BlockInfo) Update() error {\n\treturn db.Default().Model(b).Where(\"symbol=? and height=?\", b.Symbol, b.Height).Update(\"hash\", b.Hash).Error\n}", "title": "" }, { "docid": "559e46da5ca895c46dcc16133c4e6f02", "score": "0.5731173", "text": "func (evpool *EvidencePool) Update(block *types.Block, status cs.NewStatus) {\n\n\t// sanity check\n\tif status.LastBlockHeight != block.Height {\n\t\tpanic(fmt.Sprintf(\"Failed EvidencePool.Update sanity check: got status.Height=%d with block.Height=%d\", status.LastBlockHeight, block.Height))\n\t}\n\n\t// update the status\n\tevpool.mtx.Lock()\n\tevpool.status = status\n\tevpool.mtx.Unlock()\n\n\t// remove evidence from pending and mark committed\n\tevpool.MarkEvidenceAsCommitted(block.Height, block.Evidence.Evidence)\n}", "title": "" }, { "docid": "1398cd51dec102487c6ae6a02168bea6", "score": "0.5697145", "text": "func (p2ps *P2P) NotifyNewBlock(blockNotice message.NotifyNewBlock) bool {\n\treq := &types.NewBlockNotice{\n\t\tBlockHash: blockNotice.Block.BlockHash(),\n\t\tBlockNo: blockNotice.BlockNo}\n\tmo := p2ps.mf.NewMsgBlkBroadcastOrder(req)\n\n\t// sending new block notice (relay inv message is not need to every nodes)\n\tpeers := p2ps.prm.FilterNewBlockNoticeReceiver(blockNotice.Block, p2ps.pm)\n\tsent, skipped := 0, 0\n\tfor _, neighbor := range peers {\n\t\tif neighbor != nil && neighbor.State() == types.RUNNING {\n\t\t\tsent++\n\t\t\tneighbor.SendMessage(mo)\n\t\t} else {\n\t\t\tskipped++\n\t\t}\n\t}\n\n\tp2ps.Debug().Int(\"skipped_cnt\", skipped).Int(\"sent_cnt\", sent).Str(\"hash\", enc.ToString(blockNotice.Block.BlockHash())).Msg(\"Notifying new block\")\n\treturn true\n}", "title": "" }, { "docid": "6f26b581147e496dec811fae1966d45a", "score": "0.56772184", "text": "func (am *AccountManager) BlockNotify(bs *keystore.BlockStamp) {\n\tfor _, a := range am.AllAccounts() {\n\t\t// TODO: need a flag or check that the utxo store was actually\n\t\t// modified, or this will notify even if there are no balance\n\t\t// changes, or sending these notifications as the utxos are added.\n\t\tconfirmed, err := a.CalculateBalance(1)\n\t\tvar unconfirmed btcutil.Amount\n\t\tif err == nil {\n\t\t\tunconfirmed, err = a.CalculateBalance(0)\n\t\t}\n\t\tif err == nil {\n\t\t\tunconfirmed -= confirmed\n\t\t\tserver.NotifyWalletBalance(a.name, confirmed)\n\t\t\tserver.NotifyWalletBalanceUnconfirmed(a.name, unconfirmed)\n\t\t}\n\n\t\t// If this is the default account, update the block all accounts\n\t\t// are synced with, and schedule a wallet write.\n\t\tif a.KeyStore.Name() == \"\" {\n\t\t\ta.KeyStore.SetSyncedWith(bs)\n\t\t\tam.ds.ScheduleWalletWrite(a)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0d32c0abde28d06e02cca44c7d91518d", "score": "0.567438", "text": "func UpdateBlock(block m.Blocks) bool {\n\terr := psqlDB.Create(&block).Error\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "9fde78f46295cef86ce75d385f8e027f", "score": "0.5620575", "text": "func (idx *Indexer) UpdateVoteToBlock(blk *block.Block, tx *sql.Tx) error {\n\tblockHash := blk.HashBlock()\n\tinsertQuery := \"INSERT vote_to_block SET node_address=?,vote_hash=?,block_hash=?\"\n\t_, votes, _ := action.ClassifyActions(blk.Actions)\n\tfor _, vote := range votes {\n\t\tvoteHash := vote.Hash()\n\t\tif _, err := tx.Exec(insertQuery, idx.hexEncodedNodeAddr, hex.EncodeToString(voteHash[:]), blockHash[:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e3cbd9c4ece4e0709cc451dded21cc6", "score": "0.5613416", "text": "func (h *handler) PartnerBusyTableConfirm(c *gin.Context) {\n\tif err := c.Request.ParseForm(); err != nil {\n\t\th.errors.ClientError(c, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\ttableID, _ := strconv.Atoi(c.Request.FormValue(\"table_id\"))\n\tadminID, _ := strconv.Atoi(c.Request.FormValue(\"userID\"))\n\n\tsession := sessions.Default(c)\n\tuserChoice := session.Get(\"userChoice\").(UserChoice)\n\tuserChoice.TableID = tableID\n\n\t_, err := h.reservationService.BookTableManually(userChoice, adminID)\n\tif err != nil {\n\t\th.errors.ServerError(c, err)\n\t\treturn\n\t}\n\n\tsession.Delete(\"userChoice\")\n\tsession.Set(\"flash\", \"Set as busy successfully!\")\n\tsession.Save()\n\n\thttp.Redirect(c.Writer, c.Request, fmt.Sprintf(\"/api/partner/busy/user/%d\", adminID), http.StatusSeeOther)\n}", "title": "" }, { "docid": "0e175e4cd717791cc9a4863d8f7d7490", "score": "0.5568237", "text": "func updatetemplateInformation(ctx context.Context, dcrdClient *rpcclient.Client, latestBlockHeader *wire.BlockHeader) {\n\tlog.Println(\"Updating vote information\")\n\n\thash := latestBlockHeader.BlockHash()\n\theight := int64(latestBlockHeader.Height)\n\n\tlog.Printf(\"Current best block height: %d\", height)\n\n\t// Set Current block height\n\ttemplateInformation.BlockHeight = height\n\n\t// Request GetStakeVersions to receive information about past block versions.\n\t//\n\t// Request twice as many, so we can populate the rolling block version window's first\n\tstakeVersionResults, err := dcrdClient.GetStakeVersions(ctx, hash.String(),\n\t\tint32(activeNetParams.BlockUpgradeNumToCheck*2))\n\tif err != nil {\n\t\tlog.Printf(\"GetStakeVersions error: %v\", err)\n\t\treturn\n\t}\n\tblockVersionsFound := make(map[int32]*blockVersions)\n\tblockVersionsHeights := make([]int64, activeNetParams.BlockUpgradeNumToCheck)\n\telementNum := 0\n\n\t// The algorithm starts at the middle of the GetStakeVersionResults and decrements backwards toward\n\t// the beginning of the list. This is due to GetStakeVersionResults.StakeVersions being ordered\n\t// from most recent blocks to oldest. (ie [0] == current, [len] == oldest). So by starting in the middle\n\t// we then can calculate that first blocks rolling window result then become one block 'more recent'\n\t// and calculate that blocks rolling window results.\n\tfor i := len(stakeVersionResults.StakeVersions)/2 - 1; i >= 0; i-- {\n\t\t// Calculate the last block element in the window\n\t\twindowEnd := i + int(activeNetParams.BlockUpgradeNumToCheck)\n\t\t// blockVersionsHeights lets us have a correctly ordered list of blockheights for xaxis label\n\t\tblockVersionsHeights[elementNum] = stakeVersionResults.StakeVersions[i].Height\n\t\t// Define rolling window range for this current block (i)\n\t\tstakeVersionsWindow := stakeVersionResults.StakeVersions[i:windowEnd]\n\t\tfor _, stakeVersion := range stakeVersionsWindow {\n\t\t\t// Try to get an existing blockVersions struct (pointer)\n\t\t\ttheseBlockVersions, ok := blockVersionsFound[stakeVersion.BlockVersion]\n\t\t\tif !ok {\n\t\t\t\t// Had not found this block version yet\n\t\t\t\ttheseBlockVersions = &blockVersions{}\n\t\t\t\tblockVersionsFound[stakeVersion.BlockVersion] = theseBlockVersions\n\t\t\t\ttheseBlockVersions.RollingWindowLookBacks =\n\t\t\t\t\tmake([]int, activeNetParams.BlockUpgradeNumToCheck)\n\t\t\t\t// Need to populate \"back\" to fill in values for previously missed window\n\t\t\t\tfor k := 0; k < elementNum; k++ {\n\t\t\t\t\ttheseBlockVersions.RollingWindowLookBacks[k] = 0\n\t\t\t\t}\n\t\t\t\ttheseBlockVersions.RollingWindowLookBacks[elementNum] = 1\n\t\t\t} else {\n\t\t\t\t// Already had that block version, so increment\n\t\t\t\ttheseBlockVersions.RollingWindowLookBacks[elementNum]++\n\t\t\t}\n\t\t}\n\t\telementNum++\n\t}\n\ttemplateInformation.BlockVersionsHeights = blockVersionsHeights\n\ttemplateInformation.BlockVersions = blockVersionsFound\n\n\tstakeVersionsWindow := stakeVersionResults.StakeVersions[:activeNetParams.BlockUpgradeNumToCheck]\n\tblockVersionsCounts := make(map[int32]int64)\n\tfor _, sv := range stakeVersionsWindow {\n\t\tblockVersionsCounts[sv.BlockVersion]++\n\t}\n\n\tvar mostPopularBlockVersion int32\n\tmostPopularBlockVersionCount := int64(0)\n\tfor v, count := range blockVersionsCounts {\n\t\tif count > mostPopularBlockVersionCount {\n\t\t\tmostPopularBlockVersion = v\n\t\t\tmostPopularBlockVersionCount = count\n\t\t}\n\t}\n\n\tlog.Printf(\"Most popular block version in the last %d blocks: v%d (%d blocks)\",\n\t\tlen(stakeVersionsWindow), mostPopularBlockVersion, blockVersionsCounts[mostPopularBlockVersion])\n\n\ttemplateInformation.BlockVersionCurrent = mostPopularBlockVersion\n\n\ttemplateInformation.BlockVersionNext = blockVersion\n\n\tblockCountPercentage := 100 * float64(blockVersionsCounts[blockVersion]) / float64(activeNetParams.BlockUpgradeNumToCheck)\n\ttemplateInformation.BlockVersionNextPercentage = blockCountPercentage\n\n\tif blockVersionsCounts[blockVersion] >= int64(activeNetParams.BlockRejectNumRequired) {\n\t\ttemplateInformation.BlockVersionSuccess = true\n\t}\n\n\t// Voting intervals ((height-4096) mod 2016)\n\tblocksIntoStakeVersionInterval := (height - activeNetParams.StakeValidationHeight) %\n\t\tactiveNetParams.StakeVersionInterval\n\t// Stake versions per block in current voting interval (getstakeversions hash blocksIntoInterval)\n\tintervalStakeVersions, err := dcrdClient.GetStakeVersions(ctx, hash.String(),\n\t\tint32(blocksIntoStakeVersionInterval))\n\tif err != nil {\n\t\tlog.Printf(\"GetStakeVersions error: %v\", err)\n\t\treturn\n\t}\n\t// Tally missed votes so far in this interval\n\tmissedVotesStakeInterval := 0\n\tfor _, stakeVersionResult := range intervalStakeVersions.StakeVersions {\n\t\tmissedVotesStakeInterval += int(activeNetParams.TicketsPerBlock) - len(stakeVersionResult.Votes)\n\t}\n\n\t// Vote tallies for previous intervals\n\tstakeVersionInfo, err := dcrdClient.GetStakeVersionInfo(ctx, numberOfIntervals)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\tnumIntervals := len(stakeVersionInfo.Intervals)\n\tif numIntervals == 0 {\n\t\tlog.Println(\"StakeVersion info did not return usable information, intervals empty\")\n\t\treturn\n\t}\n\ttemplateInformation.StakeVersionsIntervals = stakeVersionInfo.Intervals\n\n\tminimumNeededVoteVersions := uint32(100)\n\t// Hacky way of populating the Vote Version bar graph\n\t// Each element in each dataset needs counts for each interval\n\t// For example:\n\t// version 1: [100, 200, 0, 400]\n\tvar CurrentSVIEndHeightHeight = int64(0)\n\tvar stakeVersionIntervalResults []intervalVersionCounts\n\tstakeVersionLabels := make([]string, numIntervals)\n\t// Oldest to newest interval (charts are left to right)\n\tfor i := 0; i < numIntervals; i++ {\n\t\tinterval := &stakeVersionInfo.Intervals[numIntervals-1-i]\n\t\tstakeVersionLabels[i] = fmt.Sprintf(\"%v - %v\", interval.StartHeight, interval.EndHeight-1)\n\t\tif i == numIntervals-1 {\n\t\t\tCurrentSVIEndHeightHeight = interval.StartHeight + activeNetParams.StakeVersionInterval - 1\n\t\t\ttemplateInformation.CurrentSVIStartHeight = interval.StartHeight\n\t\t\ttemplateInformation.CurrentSVIEndHeight = CurrentSVIEndHeightHeight\n\t\t}\n\tversionloop:\n\t\tfor _, versionCount := range interval.VoteVersions {\n\t\t\t// Is this a vote version we've seen in a previous interval?\n\t\t\tfor k, result := range stakeVersionIntervalResults {\n\t\t\t\tif result.Version == versionCount.Version {\n\t\t\t\t\tstakeVersionIntervalResults[k].Count[i] = versionCount.Count\n\t\t\t\t\tcontinue versionloop\n\t\t\t\t}\n\t\t\t}\n\t\t\tif versionCount.Count > minimumNeededVoteVersions {\n\t\t\t\tstakeVersionIntervalResult := intervalVersionCounts{\n\t\t\t\t\tVersion: versionCount.Version,\n\t\t\t\t\tCount: make([]uint32, numIntervals),\n\t\t\t\t}\n\t\t\t\tstakeVersionIntervalResult.Count[i] = versionCount.Count\n\t\t\t\tstakeVersionIntervalResults = append(stakeVersionIntervalResults, stakeVersionIntervalResult)\n\t\t\t}\n\t\t}\n\t}\n\tblocksRemainingStakeInterval := CurrentSVIEndHeightHeight - height\n\ttimeLeftDuration := activeNetParams.TargetTimePerBlock * time.Duration(blocksRemainingStakeInterval)\n\ttemplateInformation.StakeVersionTimeRemaining = fmtDuration(timeLeftDuration)\n\tstakeVersionLabels[numIntervals-1] = \"Current Interval\"\n\tcurrentInterval := stakeVersionInfo.Intervals[0]\n\n\tmaxPossibleVotes := activeNetParams.StakeVersionInterval*int64(activeNetParams.TicketsPerBlock) -\n\t\tint64(missedVotesStakeInterval)\n\ttemplateInformation.StakeVersionIntervalResults = stakeVersionIntervalResults\n\ttemplateInformation.StakeVersionIntervalLabels = stakeVersionLabels\n\ttemplateInformation.StakeVersionCurrent = latestBlockHeader.StakeVersion\n\n\tvar mostPopularVersion, mostPopularVersionCount uint32\n\tfor _, stakeVersion := range currentInterval.VoteVersions {\n\t\tif stakeVersion.Version > latestBlockHeader.StakeVersion &&\n\t\t\tstakeVersion.Count > mostPopularVersionCount {\n\t\t\tmostPopularVersion = stakeVersion.Version\n\t\t\tmostPopularVersionCount = stakeVersion.Count\n\t\t}\n\t}\n\n\ttemplateInformation.StakeVersionMostPopularPercentage = float64(mostPopularVersionCount) / float64(maxPossibleVotes) * 100\n\ttemplateInformation.StakeVersionMostPopular = mostPopularVersion\n\n\tsvis, err := AllStakeVersionIntervals(ctx, dcrdClient, height)\n\tif err != nil {\n\t\tlog.Printf(\"Error stake version intervals: %v\", err)\n\t\treturn\n\t}\n\n\ttemplateInformation.PosUpgrade.Completed = false\n\n\t// Check if upgrade to the latest version occurred in a previous SVI\n\tupgradeOccurred, svi := svis.GetStakeVersionUpgradeSVI(svis.MaxVoteVersion)\n\tif upgradeOccurred {\n\t\ttemplateInformation.StakeVersionMostPopularPercentage = 100\n\t\ttemplateInformation.PosUpgrade.Completed = true\n\t\ttemplateInformation.PosUpgrade.UpgradeInterval = svi\n\t}\n\n\t// Check if Phase Upgrading or Voting\n\tif templateInformation.PosUpgrade.Completed && templateInformation.BlockVersionSuccess {\n\t\ttemplateInformation.IsUpgrading = false\n\t} else {\n\t\ttemplateInformation.IsUpgrading = true\n\t}\n\n\ttemplateInformation.Agendas, err = agendasForVersions(ctx, dcrdClient, height, svis)\n\tif err != nil {\n\t\tlog.Printf(\"Error getting agendas: %v\", err)\n\t\treturn\n\t}\n\n\t// Assume all agendas have been voted and are pending activation\n\ttemplateInformation.PendingActivation = true\n\n\ttemplateInformation.RulesActivated = true\n\n\tfor _, agenda := range templateInformation.Agendas {\n\t\t// Check to see if all agendas are pending activation\n\t\tif !agenda.IsLockedIn() {\n\t\t\ttemplateInformation.PendingActivation = false\n\t\t}\n\t\tif !agenda.IsActive() {\n\t\t\ttemplateInformation.RulesActivated = false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ce7445b73fdba7e2d4beebc8fd1706f9", "score": "0.5511454", "text": "func (evaluation *CourseEvaluationModel) Block() error {\n\tevaluation.IsValid = false\n\td := DB.Self.Update(evaluation)\n\tif d.Error != nil {\n\t\treturn d.Error\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6eafa29f7eb6423e7f83214c5c4e7375", "score": "0.55099934", "text": "func (p *peer) UpdateLastAnnouncedBlock(blkSha *wire.ShaHash) {\n\tp.StatsMtx.Lock()\n\tdefer p.StatsMtx.Unlock()\n\n\tpeerLog.Tracef(\"Updating last blk for peer %v, %v\", p.addr, blkSha)\n\tp.lastAnnouncedBlock = blkSha\n}", "title": "" }, { "docid": "5911af673aa4f07f1fc589ee64925d81", "score": "0.5486863", "text": "func confirmAppends() { // Helper to check if a file being created already exists in longest chain\n\thash := MinerInstance.LocalBlockchain.GetLongestChainHash()\n\tdepth := 0\n\tfor hash != MinerInstance.LocalBlockchain.GenesisBlockHash {\n\t\tcurrentBlock := MinerInstance.LocalBlockchain.Blocks[hash]\n\t\tif int(MinerInstance.MinerSettings.ConfirmsPerFileAppend) <= depth {\n\t\t\tfor i := 0; i < len(MinerInstance.OpsWaitingForConf); i++ {\n\t\t\t\telt := MinerInstance.OpsWaitingForConf[i]\n\t\t\t\tif elt.Counter == 0 && !opOnLongestChain(elt.OpAndCh.Op) {\n\t\t\t\t\tif len(MinerInstance.OpsWaitingForConf) == i+1 {\n\t\t\t\t\t\tMinerInstance.OpsBundle = append(MinerInstance.OpsBundle, elt.OpAndCh)\n\t\t\t\t\t\tMinerInstance.OpsWaitingForConf = []ConfirmationQueueElement{}\n\t\t\t\t\t\ti--\n\t\t\t\t\t} else {\n\t\t\t\t\t\tMinerInstance.OpsBundle = append(MinerInstance.OpsBundle, elt.OpAndCh)\n\t\t\t\t\t\tMinerInstance.OpsWaitingForConf = append(MinerInstance.OpsWaitingForConf[:i], MinerInstance.OpsWaitingForConf[i+1:]...)\n\t\t\t\t\t\ti--\n\t\t\t\t\t}\n\t\t\t\t} else if elt.BlockHash == hash && elt.OpAndCh.Op.OperationType() == bc.APPEND && len(MinerInstance.OpsWaitingForConf) == i+1 {\n\t\t\t\t\tfmt.Println(\"Confirm this append: \", elt.OpAndCh.Op.GetFileName())\n\t\t\t\t\t*elt.OpAndCh.ConfirmationChannel <- true\n\t\t\t\t\tMinerInstance.OpsWaitingForConf = []ConfirmationQueueElement{}\n\t\t\t\t\ti--\n\t\t\t\t} else if elt.BlockHash == hash && elt.OpAndCh.Op.OperationType() == bc.APPEND {\n\t\t\t\t\tfmt.Println(\"Confirm this append: \", elt.OpAndCh.Op.GetFileName())\n\t\t\t\t\t*elt.OpAndCh.ConfirmationChannel <- true\n\t\t\t\t\tMinerInstance.OpsWaitingForConf = append(MinerInstance.OpsWaitingForConf[:i], MinerInstance.OpsWaitingForConf[i+1:]...)\n\t\t\t\t\ti--\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tdepth++\n\t\thash = currentBlock.PrevHash\n\t}\n\tdecreaseCounterAppends()\n}", "title": "" }, { "docid": "2cfc61d97db96ada6707d092b1738a51", "score": "0.5437217", "text": "func (s *PCFSServer) smCommitBlockCreation(arg *[]byte, entry *rpb.LogEntry) []byte {\n\tgroup := entry.Command.Group\n\tcontract := &pb.CommitBlockContract{}\n\tif err := proto.Unmarshal(*arg, contract); err != nil {\n\t\tlog.Println(\"cannode decode confirm block creation contract:\", err)\n\t\treturn []byte{0}\n\t}\n\tcacheKey := fmt.Sprint(group, \"-\", contract.Index, \"-\", contract.File)\n\tlogI, cached := s.PendingBlocks.Get(cacheKey)\n\tif !cached {\n\t\tlog.Println(\"cannot found the block for commit\")\n\t\treturn []byte{0}\n\t}\n\tl := logI.(*map[uint64]bool)\n\thosts := []uint64{}\n\t// check all replication nodes confirmed\n\tfor _, nodeId := range contract.NodeIds {\n\t\t_, confirmed := (*l)[nodeId]\n\t\tif !confirmed {\n\t\t\tlog.Println(\"not all replication confirmed:\", nodeId)\n\t\t\treturn []byte{0}\n\t\t} else {\n\t\t\thosts = append(hosts, nodeId)\n\t\t}\n\t}\n\t// remove cached\n\ts.PendingBlocks.Delete(cacheKey)\n\t// update file meta\n\tnewBlock := &pb.Block{Index: contract.Index, Hosts: hosts}\n\tvar fileRes *pb.FileMeta\n\tif err := s.BFTRaft.DB.Update(func(txn *badger.Txn) error {\n\t\tif file, err := GetFile(txn, group, contract.File); err == nil {\n\t\t\tblocks := len(file.Blocks)\n\t\t\tif uint64(blocks) != contract.Index {\n\t\t\t\treturn errors.New(\"new block index not match next index\")\n\t\t\t}\n\t\t\tfile.Blocks = append(file.Blocks, newBlock)\n\t\t\tfile.LastModified = contract.ClientTime\n\t\t\tfile.Size = uint64(len(file.Blocks)) * uint64(file.BlockSize)\n\t\t\tSetFile(txn, group, file)\n\t\t\tfileRes = file\n\t\t\treturn nil\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}); err == nil {\n\t\tlog.Println(\"commit new block succeed\")\n\t\tresData, _ := proto.Marshal(fileRes)\n\t\treturn resData\n\t} else {\n\t\tlog.Println(\"failed to confirm new block\")\n\t\treturn []byte{0}\n\t}\n}", "title": "" }, { "docid": "9c9f7096e91d0870ed5692bff531834e", "score": "0.5362115", "text": "func (client Client) StatusAfterBlock(blockNum uint64) (response models.NodeStatus, err error) {\n\terr = client.get(&response, fmt.Sprintf(\"/status/wait-for-block-after/%d\", blockNum), nil)\n\treturn\n}", "title": "" }, { "docid": "f0a668b3ed27b1784b9854bc52efd794", "score": "0.5324543", "text": "func (b *Block) ValidateUpdate(tx *pop.Connection) (*validate.Errors, error) {\n\treturn validate.NewErrors(), nil\n}", "title": "" }, { "docid": "4cab2645e251345f9e06c4e608c6b921", "score": "0.5321935", "text": "func update_block_done(host string, id int) {\n\ttarget := fmt.Sprintf(\"http://%s/done/%d/\", host, id)\n\t_, err := http.Get(target)\n\tif err != nil {\n\t fmt.Println(\"Error setting worklist as done \", err)\n\t}\n}", "title": "" }, { "docid": "fad73c65b3ecac2bb0b44b3a8807688d", "score": "0.53209347", "text": "func (abc *appBlockChain) AcceptBlock(block *wire.MsgBlock) error {\n\tif block == nil {\n\t\tabc.log.Errorf(\"can't receive nil\")\n\t\treturn fmt.Errorf(\"block is nil\")\n\t}\n\n\tif abc.shardHeight+1 > block.Header.Height {\n\t\treturn fmt.Errorf(\"the block may have been accepted\")\n\t}\n\n\tabc.log.Debugf(\"Before accept block, height: %d, prevHeader: %v,prevHeader.Height: %v, reshardSeed: %v\",\n\t\tblock.Header.Height, abc.prevHeader.BlockHeaderHash(), abc.prevHeader.Height, abc.prevReshardHeader.ReshardSeed)\n\n\tif err := abc.blockChain.ReceiveHeader(&block.Header); !err {\n\t\tabc.log.Debugf(\"Failed to call blockChain.ReceiveHeader on block %v\", block)\n\t}\n\n\t// Verify if the block is correct\n\tif err := abc.VerifyBlock(block); err != nil {\n\t\tabc.log.Debugf(\"Cant't verify block: %v, abci will fetch new ledger at height %d\", err, block.Header.Height)\n\n\t\t// Try to fetch new ledger\n\t\tabc.fetchNewLedger()\n\t\t//abc.log.Errorf(\"Failed to accept block, fetch ledger continue,err: %v\", err)\n\t\tif !bytes.Equal(block.Header.ReshardSeed, abc.prevReshardHeader.ReshardSeed) {\n\t\t\tabc.log.Debugf(\"Update reshard seed at height %d\", block.Header.Height)\n\t\t\tabc.prevReshardHeader = block.Header\n\t\t}\n\t\treturn err\n\t}\n\tupdate, err := abc.state.GetUpdateWithFullBlock(block)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// Update deposit pool. It is same to update tx that in txPool.\n\terr = abc.dPool.Update(update, abc.shardIndex, wire.BlockHeight(block.Header.Height))\n\tif err != nil {\n\t\tabc.log.Errorf(\"Update deposit pool error: %v\", err)\n\t\tpanic(err)\n\t}\n\n\t// Update txpool\n\tabc.txPool.RefreshPool(update)\n\n\t// Update Datastore\n\tabc.smartContractDataStore.RefreshDataStore(update, block.Body.UpdateActions)\n\n\t// Update abci's ledger\n\terr = abc.state.ApplyUpdate(update)\n\tif err != nil {\n\t\tpanic(\"failed to apply update on abci\")\n\t}\n\n\tpreBlock := abc.prevBlock\n\t// Try to add deposit txs witch in last block to deposit pool\n\tif preBlock != nil {\n\t\terr := abc.updateLastBlockDeposit(update, preBlock)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\tabc.blockAccepted(block)\n\treturn nil\n}", "title": "" }, { "docid": "b59c9a03527049364ddf28995a24dbc7", "score": "0.53104806", "text": "func (b *Block) Verify() error {\n\taccepted, err := b.Block.Verify()\n\tif err != nil {\n\t\tb.VM.Ctx.Log.Error(\"Validating block: block validation: %v\", err)\n\t\treturn fmt.Errorf(\"block validation: %w\", err)\n\t}\n\tif accepted {\n\t\tb.VM.Ctx.Log.Error(\"Validating block: already accepted\")\n\t\treturn fmt.Errorf(\"block already accepted\")\n\t}\n\n\tif len(b.Txs) == 0 {\n\t\tb.VM.Ctx.Log.Error(\"Validating block: no transactions\")\n\t\treturn fmt.Errorf(\"block has no transactions\")\n\t}\n\tfor i, tx := range b.Txs {\n\t\tif err := tx.ValidateBasic(); err != nil {\n\t\t\tb.VM.Ctx.Log.Error(\"Validating block: validation: %v\", err)\n\t\t\treturn fmt.Errorf(\"tx [%d] (%T): validation: %w\", i, tx, err)\n\t\t}\n\t}\n\n\tfor txIdx, txRaw := range b.Txs {\n\t\tswitch tx := txRaw.(type) {\n\t\tcase types.TxDeployModule:\n\t\t\tif _, err := b.state.DeployContract(tx); err != nil {\n\t\t\t\tb.VM.Ctx.Log.Error(\"Validating block: DeployContract: %v\", err)\n\t\t\t\treturn fmt.Errorf(\"tx [%d] (%T): deploying contract: %w\", txIdx, txRaw, err)\n\t\t\t}\n\t\tcase types.TxExecuteScript:\n\t\t\tif _, err := b.state.ExecuteContract(tx, b.Height()); err != nil {\n\t\t\t\tb.VM.Ctx.Log.Error(\"Validating block: ExecuteContract: %v\", err)\n\t\t\t\treturn fmt.Errorf(\"tx [%d] (%T): executing script: %w\", txIdx, txRaw, err)\n\t\t\t}\n\t\tdefault:\n\t\t\tb.VM.Ctx.Log.Error(\"Validating block: unknown type: %T\", txRaw)\n\t\t\treturn fmt.Errorf(\"tx [%d] (%T): unknown type\", txIdx, txRaw)\n\t\t}\n\t}\n\n\tif err := b.VM.SaveBlock(b.VM.DB, b); err != nil {\n\t\tb.VM.Ctx.Log.Error(\"Validating block: SaveBlock: %v\", err)\n\t\treturn fmt.Errorf(\"saving block: %w\", err)\n\t}\n\n\tif err := b.VM.DB.Commit(); err != nil {\n\t\tb.VM.Ctx.Log.Error(\"Validating block: Commit: %v\", err)\n\t\treturn fmt.Errorf(\"commiting DB state: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7b61a4f014bcc5cadbddc8739ecdbd07", "score": "0.5298319", "text": "func (ws *WalletService) processIncomingBlock(block model.Block) {\n\tLog.Infof(\"received new %s block at height %d: %s\", ws.coinType.String(), block.Height, block.Hash)\n\tws.lock.RLock()\n\tcurrentBest := ws.bestBlock\n\tws.lock.RUnlock()\n\n\tws.lock.Lock()\n\terr := ws.saveHashAndHeight(block.Hash, uint32(block.Height))\n\tif err != nil {\n\t\tLog.Errorf(\"update %s blockchain height: %s\", ws.coinType.String(), err.Error())\n\t}\n\tws.lock.Unlock()\n\n\t// REORG! Rescan all transactions and utxos to see if anything changed\n\tif currentBest != block.PreviousBlockhash && currentBest != block.Hash {\n\t\tLog.Warningf(\"%s chain reorg detected: rescanning wallet\", ws.coinType.String())\n\t\tws.UpdateState()\n\t\treturn\n\t}\n\n\t// Query db for unconfirmed txs and utxos then query API to get current height\n\ttxs, err := ws.db.Txns().GetAll(true)\n\tif err != nil {\n\t\tLog.Errorf(\"error loading %s txs from db: %s\", ws.coinType.String(), err.Error())\n\t\treturn\n\t}\n\tutxos, err := ws.db.Utxos().GetAll()\n\tif err != nil {\n\t\tLog.Errorf(\"error loading %s txs from db: %s\", ws.coinType.String(), err.Error())\n\t\treturn\n\t}\n\taddrs := ws.getStoredAddresses()\n\tfor _, tx := range txs {\n\t\tif tx.Height == 0 {\n\t\t\tLog.Debugf(\"broadcasting unconfirmed txid %s\", tx.Txid)\n\t\t\tgo func(txn wallet.Txn) {\n\t\t\t\tret, err := ws.client.GetTransaction(txn.Txid)\n\t\t\t\tif err != nil {\n\t\t\t\t\tLog.Errorf(\"error fetching unconfirmed %s tx: %s\", ws.coinType.String(), err.Error())\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tif ret.Confirmations > 0 {\n\t\t\t\t\th := int32(block.Height) - int32(ret.Confirmations-1)\n\t\t\t\t\tws.saveSingleTxToDB(*ret, int32(block.Height), addrs)\n\t\t\t\t\tfor _, u := range utxos {\n\t\t\t\t\t\tif u.Op.Hash.String() == txn.Txid {\n\t\t\t\t\t\t\tu.AtHeight = h\n\t\t\t\t\t\t\tif err := ws.db.Utxos().Put(u); err != nil {\n\t\t\t\t\t\t\t\tLog.Errorf(\"updating utxo confirmation to %d: %s\", h, err.Error())\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Rebroadcast unconfirmed transactions\n\t\t\t\t_, err = ws.client.Broadcast(tx.Bytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\tLog.Errorf(\"broadcasting unconfirmed utxo: %s\", err.Error())\n\t\t\t\t}\n\t\t\t}(tx)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7adbf836df5020b6d5f589a4cbf7bc8f", "score": "0.528434", "text": "func sendUpdateToVerifiers(addresses []string) ([][]byte ,bool) {\n\n\tsignatureList := make([][]byte, 0)\n\tverified := false\n\tverifiersOnline := true\n\n\tif !VERIFY {\n\t\treturn signatureList, true\n\t}\n\n\t// outLog.Printf(\"My update sent for verification is %s\", client.update.NoisedDelta)\n\n\tensureRPC.Add(len(addresses))\n\n\tfor _, address := range addresses {\n\t\tgo sendUpdateToVerifier(address, &signatureList, &verifiersOnline)\n\t}\n\n\tensureRPC.Wait()\n\n\tif (len(signatureList) >= (len(verifierPortsToConnect)/2)) {\n\t\t\t\n\t\tverified = true\n\t\n\t}else {\n\n\t\toutLog.Printf(strconv.Itoa(client.id)+\":Couldn't get enough signatures. Iteration:%d\\n\", client.update.Iteration)\n\t}\n\t\n\t// Verification totally failed. Create empty block and send\n\tif !verifiersOnline {\n\t\ttime.Sleep(5000 * time.Millisecond)\n\t\toutLog.Printf(strconv.Itoa(client.id)+\":Will try and create an empty block\")\n\t\tblockChainLock.Lock()\n\t\tblockToSend, err := client.createBlock(iterationCount, stakeMap)\n\t\tblockChainLock.Unlock()\t\t\n\t\tprintError(\"Iteration: \" + strconv.Itoa(iterationCount), err)\n\t\tif(err==nil){\n\t\t\toutLog.Printf(strconv.Itoa(client.id)+\":Sending an empty block\")\n\t\t\tgo sendBlock(*blockToSend)\n\t\t}\n\t} \n\n\treturn signatureList, verified\n\n}", "title": "" }, { "docid": "421cd9217e070bcb76f62fa23af9fa73", "score": "0.52819854", "text": "func (c *Client) NotifyBlocks() error {\n\treturn c.NotifyBlocksAsync().Receive()\n}", "title": "" }, { "docid": "ddeb685cc507128c6b3c198e87f197ee", "score": "0.5266162", "text": "func (self *worker) commitFastBlocks(fastBlocks types.Blocks) error{\n\n\tif atomic.LoadInt32(&self.mining) == 0{\n\t\treturn nil\n\t}\n\n\tif fastBlocks == nil{\n\t\treturn core.ErrNoFastBlockToMiner\n\t}\n\t\n\t//log.Info(\"commitFastBlocks fast block list\",\"min fb\",fastBlocks[0].Number(),\"max fb\",fastBlocks[len(fastBlocks)-1].Number())\n\n\tvar fastBlock *types.Block\n\tfor _ , fb := range fastBlocks {\n\t\tif self.FastBlockNumber.Uint64() == 0{\n\t\t\t//log.Info(\"1\")\n\t\t\tself.FastBlockNumber = new(big.Int).Set(common.Big0)\n\t\t\t//self.FastBlockNumber.SetUint64(fb.NumberU64()) \n\t\t\tfastBlock = fb\n\t\t\tbreak\n\t\t}\n\n\t\t// this fast block has been minered but pending not update\n\t\t\n\t\tif self.FastBlockNumber.Uint64() == fb.NumberU64(){\n\t\t\tcontinue\n\t\t}\n\t\t//self.FastBlockNumber.SetUint64(fb.NumberU64())\n\t\tfastBlock = fb\n\t\tbreak\n\t}\n\tlog.Debug(\"commitFastBlocks fast block list\",\"min fb\",fastBlocks[0].Number(),\"max fb\",fastBlocks[len(fastBlocks)-1].Number())\n\n\tif fastBlock != nil{\n\t\tself.current.header.FastNumber = fastBlock.Number()\n\t\tself.current.header.FastHash = fastBlock.Hash()\n\t\tsigns := fastBlock.Signs()\n\t\tself.current.signs = make([]*types.PbftSign, len(signs))\n\t\tfor i := range signs {\n\t\t\tself.current.signs[i] = types.CopyPbftSign(signs[i])\n\t\t}\n\n\t\tlog.Debug(\"commitFastBlocks\",\"pre\", self.FastBlockNumber, \"fb\", fastBlock.Number())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5a922d71a68d8b00cc8a0aefb6baf640", "score": "0.5246393", "text": "func (b *BlockManager) addBlock(block *wire.MsgBlock, blockHash *chainhash.Hash) (*primitives.Block, error) {\n\t\n\t// Generate\tblock and add it to pending of confirmation block queue\n\tpBlock, err := b.buildBlock(blockHash, block, uint64(b.height+1))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !b.Sync {\n\t\tpBlock, err = b.getBlockInputs(pBlock)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tb.pendingBlocks.PushBack(pBlock)\n\n\t// Update current height\n\tb.height += 1\n\n\t// Add confirmed block and height to storage cache\n\tif b.pendingBlocks.Len() > int(b.Confirmations) {\n\t\tconfirmedBlock := b.pendingBlocks.PopFront()\n\t\tb.storageCache.AddBlock(confirmedBlock)\n\t}\n\n\tb.lastTime = time.Now()\n\n\treturn pBlock, nil\n}", "title": "" }, { "docid": "e014991c0ea7e48701b832619266f29c", "score": "0.52462745", "text": "func (n *Node) FinalizeBlocks() {\n\tfor {\n\t\tn.SnowballLock.RLock()\n\t\tpreferred := n.Snowball.Preferred\n\t\tlast := n.Snowball.Last\n\t\tdone := n.Snowball.Done\n\t\tn.SnowballLock.RUnlock()\n\n\t\tif preferred == nil {\n\t\t\t// If the node has no preferred block yet, propose a new block\n\t\t\tDelay(1)\n\n\t\t\t// 2^256 / 4\n\t\t\tmaxIndex := (&big.Int{}).Exp(big.NewInt(2), big.NewInt(256), nil)\n\t\t\tmaxIndex = maxIndex.Div(maxIndex, big.NewInt(3))\n\n\t\t\tproposing := make([][blake2b.Size256]byte, 0)\n\n\t\t\tn.MempoolLock.RLock()\n\t\t\tn.Mempool.AscendLessThan(MempoolItem{index: maxIndex}, func(i btree.Item) bool {\n\t\t\t\tproposing = append(proposing, i.(MempoolItem).id)\n\t\t\t\treturn true\n\t\t\t})\n\t\t\tn.MempoolLock.RUnlock()\n\n\t\t\tif len(proposing) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tproposed := NewBlock(n.LastBlockIndex()+1, proposing...)\n\n\t\t\tn.SnowballLock.Lock()\n\t\t\tn.Snowball.Preferred = &proposed\n\t\t\tn.SnowballLock.Unlock()\n\n\t\t\tfmt.Printf(\"Node %d is proposing %d transaction(s) to be finalized into Block %d.\\n\", n.ID, len(proposed.Transactions), proposed.Index)\n\n\t\t} else {\n\t\t\t// If there is a preferred block, wait until snowball is done\n\t\t\tif !done {\n\t\t\t\tn.query()\n\t\t\t} else {\n\t\t\t\tn.finalize(*last)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "dd46a9d8b8d559766e14da51cb7e4f9e", "score": "0.52227944", "text": "func (jbobject *StorageStorageStatus) UpdateBlock(a StorageBlockIdInterface, b StorageBlockStatusInterface) {\n\tconv_a := javabind.NewGoToJavaCallable()\n\tconv_b := javabind.NewGoToJavaCallable()\n\tif err := conv_a.Convert(a); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := conv_b.Convert(b); err != nil {\n\t\tpanic(err)\n\t}\n\t_, err := jbobject.CallMethod(javabind.GetEnv(), \"updateBlock\", javabind.Void, conv_a.Value().Cast(\"org/apache/spark/storage/BlockId\"), conv_b.Value().Cast(\"org/apache/spark/storage/BlockStatus\"))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tconv_a.CleanUp()\n\tconv_b.CleanUp()\n\n}", "title": "" }, { "docid": "6a1e91f724cd38b5eb553fb3ba7468f4", "score": "0.5210858", "text": "func (m *CPUMiner) solveBlock(msgBlock *wire.MsgBlock, blockHeight int32,\n\tticker *time.Ticker, quit chan struct{}) bool {\n\n\t// Choose a random extra nonce offset for this block template and\n\t// worker.\n\tenOffset, err := wire.RandomUint64()\n\tif err != nil {\n\t\tlog.Errorf(\"Unexpected error while generating random \"+\n\t\t\t\"extra nonce offset: %v\", err)\n\t\tenOffset = 0\n\t}\n\n\t// Create some convenience variables.\n\theader := &msgBlock.Header\n\ttargetDifficulty := blockchain.CompactToBig(header.Bits)\n\n\t// Initial state.\n\tlastGenerated := time.Now()\n\tlastTxUpdate := m.g.TxSource().LastUpdated()\n\thashesCompleted := uint64(0)\n\n\t// Note that the entire extra nonce range is iterated and the offset is\n\t// added relying on the fact that overflow will wrap around 0 as\n\t// provided by the Go spec.\n\tfor extraNonce := uint64(0); extraNonce < maxExtraNonce; extraNonce++ {\n\t\t// Update the extra nonce in the block template with the\n\t\t// new value by regenerating the coinbase script and\n\t\t// setting the merkle root to the new value.\n\t\tm.g.UpdateExtraNonce(msgBlock, blockHeight, extraNonce+enOffset)\n\n\t\t// Search through the entire nonce range for a solution while\n\t\t// periodically checking for early quit and stale block\n\t\t// conditions along with updates to the speed monitor.\n\t\tfor i := uint32(0); i <= maxNonce; i++ {\n\t\t\tselect {\n\t\t\tcase <-quit:\n\t\t\t\treturn false\n\n\t\t\tcase <-ticker.C:\n\t\t\t\tm.updateHashes <- hashesCompleted\n\t\t\t\thashesCompleted = 0\n\n\t\t\t\t// The current block is stale if the best block\n\t\t\t\t// has changed.\n\t\t\t\tbest := m.g.BestSnapshot()\n\t\t\t\tif !header.PrevBlock.IsEqual(&best.Hash) {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\n\t\t\t\t// The current block is stale if the memory pool\n\t\t\t\t// has been updated since the block template was\n\t\t\t\t// generated and it has been at least one\n\t\t\t\t// minute.\n\t\t\t\tif lastTxUpdate != m.g.TxSource().LastUpdated() &&\n\t\t\t\t\ttime.Now().After(lastGenerated.Add(time.Minute)) {\n\n\t\t\t\t\treturn false\n\t\t\t\t}\n\n\t\t\t\tm.g.UpdateBlockTime(msgBlock)\n\n\t\t\tdefault:\n\t\t\t\t// Non-blocking select to fall through\n\t\t\t}\n\n\t\t\t// Update the nonce and hash the block header. Each\n\t\t\t// hash is actually a double sha256 (two hashes), so\n\t\t\t// increment the number of hashes completed for each\n\t\t\t// attempt accordingly.\n\t\t\theader.Nonce = i\n\t\t\thash := header.BlockHash()\n\t\t\thashesCompleted += 2\n\n\t\t\t// The block is solved when the new block hash is less\n\t\t\t// than the target difficulty. Yay!\n\t\t\tif blockchain.HashToBig(&hash).Cmp(targetDifficulty) <= 0 {\n\t\t\t\tm.updateHashes <- hashesCompleted\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e86edf5242edfe8f06f7ca4b82bea9dc", "score": "0.52083135", "text": "func (m *UserModel) Confirm(id int64) error {\n\tu, err := m.Get(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif u.ConfirmedAt.Valid {\n\t\treturn nil\n\t}\n\n\tstmt := `UPDATE users SET confirmed_at = UTC_TIMESTAMP(), updated_at = UTC_TIMESTAMP() WHERE id = ?`\n\t_, err = m.DB.Exec(stmt, id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f11c79142f001e236a1df7a1b66058de", "score": "0.5193962", "text": "func (sr *Server) SendBlock(block blockmanager.Block, transaction blockmanager.Transaction) {\n\tnewBlock := sr.bm.GenerateBlock(block, transaction)\n\tfollowsRules := sr.bm.BlockFollowsRules(newBlock, sr.bcServer)\n\tif followsRules {\n\t\tisValid := sr.bm.IsBlockValid(newBlock, sr.bcServer[len(sr.bcServer)-1])\n\t\tif isValid {\n\t\t\tsr.bcServer = append(sr.bcServer, newBlock)\n\t\t\tfmt.Println(\"<< sending new block to others... >> \")\n\n\t\t\tvar wg sync.WaitGroup\n\t\t\tfor _, usr := range sr.gr.Them {\n\t\t\t\twg.Add(1)\n\t\t\t\tgo func(p grouper.Peer) {\n\t\t\t\t\tb := new(bytes.Buffer)\n\t\t\t\t\tjson.NewEncoder(b).Encode(newBlock)\n\t\t\t\t\tport := increment_port(p.Port)\n\t\t\t\t\thttp.Post(\"http://\"+p.Ip+\":\"+port+\"/verifyBlock\", \"application/json; charset=utf-8\", b)\n\t\t\t\t\twg.Done()\n\t\t\t\t}(usr)\n\t\t\t\twg.Wait()\n\t\t\t}\n\t\t\tfmt.Println(\"<< block has been broadcasted! >> \")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "08019e9d172e062a6d72c902af577759", "score": "0.5191481", "text": "func (cp *Controller) AbortBlock() {\n\tif cp.Pending != nil && cp.Pending.PendingBlockState != nil {\n\t\tfor _, v := range cp.Pending.PendingBlockState.Trxs {\n\t\t\tcp.UnAppliedTransaction[v.SignedID] = v\n\t\t}\n\n\t\tcp.Pending.Reset()\n\t}\n}", "title": "" }, { "docid": "35f05fbe2664d1ea2f076d90c88fc808", "score": "0.5188103", "text": "func (p *peer) UpdateLastBlockHeight(newHeight int32) {\n\tp.StatsMtx.Lock()\n\tdefer p.StatsMtx.Unlock()\n\n\tpeerLog.Tracef(\"Updating last block height of peer %v from %v to %v\",\n\t\tp.addr, p.lastBlock, newHeight)\n\tp.lastBlock = int32(newHeight)\n}", "title": "" }, { "docid": "ea086ca418a1a56911afd9b319a8901e", "score": "0.51822233", "text": "func (b *BlockManager) processBlockUpdate(update crawler.BlockUpdate) (BlockUpdate, error){\n\t\n\tswitch update.Class {\n\tcase crawler.OP_NEWBLOCK:\n\t\tblock, err := b.addBlock(update.Block, update.Hash)\n\t\treturn NewBlockUpdate(OP_NEWBLOCK, block), err\n\t\n\tcase crawler.OP_BACKTRACK:\n\t\tblock, err := b.backtrackBlock()\n\t\treturn NewBlockUpdate(OP_BACKTRACK, block), err\n\n\tdefault:\n\t\terr := errors.New(\"Unknown BlockUpdate Class\")\n\t\treturn NewBlockUpdate(OP_NEWBLOCK, nil), err\n\t}\n}", "title": "" }, { "docid": "dd6064cc7a7e73a462ae63a4d657aa59", "score": "0.51675385", "text": "func blockIsValid( newBlock, oldBlock Block) bool {\n\n if oldBlock.Index + 1 != newBlock.Index {\n\n return false\n }\n\n if oldBlock.Hash != newBlock.PrevHash {\n\n return false\n }\n\n if calculateHash(newBlock) != newBlock.Hash {\n\n return false\n }\n\n return true\n}", "title": "" }, { "docid": "a35d36354915c81c96479b496470eb23", "score": "0.51669407", "text": "func (c *FakeRolloutBlocks) Update(rolloutBlock *v1alpha1.RolloutBlock) (result *v1alpha1.RolloutBlock, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewUpdateAction(rolloutblocksResource, c.ns, rolloutBlock), &v1alpha1.RolloutBlock{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.RolloutBlock), err\n}", "title": "" }, { "docid": "c2f84934d50c7e7f12e1cc8769bf5350", "score": "0.5160397", "text": "func (scdb *HandlerSCDB) InitiateConfirm(address, password, txHash string, blockTimestamp big.Int) (string, error) {\n\tvar rawTxHash [32]byte\n\tcopy(rawTxHash[:], txHash)\n\n\trawTx, err := scdb.GenerateTransaction()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\ttx, err := scdb.Store.ConfirmInit(\n\t\trawTx,\n\t\tcommon.HexToAddress(address),\n\t\tpassword,\n\t\trawTxHash,\n\t\t&blockTimestamp,\n\t)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn tx.Hash().Hex(), nil\n}", "title": "" }, { "docid": "7b4d12830a1acac93e414a9a5fa19c5b", "score": "0.51564735", "text": "func doBlockPow(ctx context.Context, block *iotago.Block, nodeClient *nodeclient.Client) error {\n\tvar refreshTipsFunc inxpow.RefreshTipsFunc\n\n\t// only allow to update tips during proof of work if no parents were given\n\tif len(block.Parents) == 0 {\n\t\trefreshTipsFunc = func() (tips iotago.BlockIDs, err error) {\n\t\t\t// refresh tips if PoW takes longer than a configured duration.\n\t\t\tresp, err := nodeClient.Tips(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treturn resp.Tips()\n\t\t}\n\t}\n\n\t// DoPoW does the proof-of-work required to hit the target score configured on this Handler.\n\t// The given iota.Block's nonce is automatically updated.\n\t_, err := inxpow.DoPoW(ctx, block, serializer.DeSeriModePerformValidation|serializer.DeSeriModePerformLexicalOrdering, parameters.L1().Protocol, parallelism, refreshTipsInterval, refreshTipsFunc)\n\treturn err\n}", "title": "" }, { "docid": "1d73417f8c9e116b2393d4abaafbc11e", "score": "0.51448584", "text": "func (gui *Gui) update() {\n\treactor := gui.eth.Reactor()\n\n\tvar (\n\t\tblockChan = make(chan ethutil.React, 1)\n\t\ttxChan = make(chan ethutil.React, 1)\n\t\tobjectChan = make(chan ethutil.React, 1)\n\t\tpeerChan = make(chan ethutil.React, 1)\n\t\tchainSyncChan = make(chan ethutil.React, 1)\n\t\tminingChan = make(chan ethutil.React, 1)\n\t)\n\n\treactor.Subscribe(\"newBlock\", blockChan)\n\treactor.Subscribe(\"newTx:pre\", txChan)\n\treactor.Subscribe(\"newTx:post\", txChan)\n\treactor.Subscribe(\"chainSync\", chainSyncChan)\n\treactor.Subscribe(\"miner:start\", miningChan)\n\treactor.Subscribe(\"miner:stop\", miningChan)\n\n\tnameReg := ethpub.EthereumConfig(gui.eth.StateManager()).NameReg()\n\tif nameReg != nil {\n\t\treactor.Subscribe(\"object:\"+string(nameReg.Address()), objectChan)\n\t}\n\treactor.Subscribe(\"peerList\", peerChan)\n\n\tpeerUpdateTicker := time.NewTicker(5 * time.Second)\n\tgeneralUpdateTicker := time.NewTicker(1 * time.Second)\n\n\tstate := gui.eth.StateManager().TransState()\n\n\tunconfirmedFunds := new(big.Int)\n\tgui.win.Root().Call(\"setWalletValue\", fmt.Sprintf(\"%v\", ethutil.CurrencyToString(state.GetAccount(gui.address()).Amount)))\n\tgui.getObjectByName(\"syncProgressIndicator\").Set(\"visible\", !gui.eth.IsUpToDate())\n\n\tlastBlockLabel := gui.getObjectByName(\"lastBlockLabel\")\n\n\tfor {\n\t\tselect {\n\t\tcase b := <-blockChan:\n\t\t\tblock := b.Resource.(*ethchain.Block)\n\t\t\tgui.processBlock(block, false)\n\t\t\tif bytes.Compare(block.Coinbase, gui.address()) == 0 {\n\t\t\t\tgui.setWalletValue(gui.eth.StateManager().CurrentState().GetAccount(gui.address()).Amount, nil)\n\t\t\t}\n\n\t\tcase txMsg := <-txChan:\n\t\t\ttx := txMsg.Resource.(*ethchain.Transaction)\n\n\t\t\tif txMsg.Event == \"newTx:pre\" {\n\t\t\t\tobject := state.GetAccount(gui.address())\n\n\t\t\t\tif bytes.Compare(tx.Sender(), gui.address()) == 0 {\n\t\t\t\t\tgui.win.Root().Call(\"addTx\", ethpub.NewPTx(tx), \"send\")\n\t\t\t\t\tgui.txDb.Put(tx.Hash(), tx.RlpEncode())\n\n\t\t\t\t\tunconfirmedFunds.Sub(unconfirmedFunds, tx.Value)\n\t\t\t\t} else if bytes.Compare(tx.Recipient, gui.address()) == 0 {\n\t\t\t\t\tgui.win.Root().Call(\"addTx\", ethpub.NewPTx(tx), \"recv\")\n\t\t\t\t\tgui.txDb.Put(tx.Hash(), tx.RlpEncode())\n\n\t\t\t\t\tunconfirmedFunds.Add(unconfirmedFunds, tx.Value)\n\t\t\t\t}\n\n\t\t\t\tgui.setWalletValue(object.Amount, unconfirmedFunds)\n\t\t\t} else {\n\t\t\t\tobject := state.GetAccount(gui.address())\n\t\t\t\tif bytes.Compare(tx.Sender(), gui.address()) == 0 {\n\t\t\t\t\tobject.SubAmount(tx.Value)\n\t\t\t\t} else if bytes.Compare(tx.Recipient, gui.address()) == 0 {\n\t\t\t\t\tobject.AddAmount(tx.Value)\n\t\t\t\t}\n\n\t\t\t\tgui.setWalletValue(object.Amount, nil)\n\n\t\t\t\tstate.UpdateStateObject(object)\n\t\t\t}\n\t\tcase msg := <-chainSyncChan:\n\t\t\tsync := msg.Resource.(bool)\n\t\t\tgui.win.Root().ObjectByName(\"syncProgressIndicator\").Set(\"visible\", sync)\n\n\t\tcase <-objectChan:\n\t\t\tgui.loadAddressBook()\n\t\tcase <-peerChan:\n\t\t\tgui.setPeerInfo()\n\t\tcase <-peerUpdateTicker.C:\n\t\t\tgui.setPeerInfo()\n\t\tcase msg := <-miningChan:\n\t\t\tif msg.Event == \"miner:start\" {\n\t\t\t\tgui.miner = msg.Resource.(*ethminer.Miner)\n\t\t\t} else {\n\t\t\t\tgui.miner = nil\n\t\t\t}\n\n\t\tcase <-generalUpdateTicker.C:\n\t\t\tstatusText := \"#\" + gui.eth.BlockChain().CurrentBlock.Number.String()\n\t\t\tif gui.miner != nil {\n\t\t\t\tpow := gui.miner.GetPow()\n\t\t\t\tif pow.GetHashrate() != 0 {\n\t\t\t\t\tstatusText = \"Mining @ \" + strconv.FormatInt(pow.GetHashrate(), 10) + \"Khash - \" + statusText\n\t\t\t\t}\n\t\t\t}\n\t\t\tlastBlockLabel.Set(\"text\", statusText)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1d7234fdac339d87475f1184d0509e6b", "score": "0.51443934", "text": "func (idx *Indexer) UpdateActionToBlock(blk *block.Block, tx *sql.Tx) error {\n\tblockHash := blk.HashBlock()\n\tinsertQuery := \"INSERT action_to_block SET node_address=?,action_hash=?,block_hash=?\"\n\tfor _, selp := range blk.Actions {\n\t\tactionHash := selp.Hash()\n\t\tif _, err := tx.Exec(insertQuery, idx.hexEncodedNodeAddr, hex.EncodeToString(actionHash[:]), blockHash[:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a05ce54a896544e74c2c14e7915cb227", "score": "0.5141208", "text": "func (app *Blockchain) EndBlock(req abciTypes.RequestEndBlock) abciTypes.ResponseEndBlock {\n\tvar updates []abciTypes.ValidatorUpdate\n\n\tstateValidators := app.stateDeliver.GetStateValidators()\n\tvals := stateValidators.Data()\n\t// calculate total power of validators\n\ttotalPower := big.NewInt(0)\n\tfor _, val := range vals {\n\t\t// skip if candidate is not present\n\t\tif app.validatorsStatuses[val.GetAddress()] != ValidatorPresent {\n\t\t\tcontinue\n\t\t}\n\n\t\ttotalPower.Add(totalPower, val.TotalBipStake)\n\t}\n\n\t// accumulate rewards\n\tfor i, val := range vals {\n\t\t// skip if candidate is not present\n\t\tif app.validatorsStatuses[val.GetAddress()] != ValidatorPresent {\n\t\t\tcontinue\n\t\t}\n\n\t\treward := rewards.GetRewardForBlock(uint64(req.Height))\n\n\t\treward.Add(reward, app.rewards)\n\n\t\treward.Mul(reward, val.TotalBipStake)\n\t\treward.Div(reward, totalPower)\n\n\t\tvals[i].AccumReward.Add(vals[i].AccumReward, reward)\n\t}\n\n\tstateValidators.SetData(vals)\n\tapp.stateDeliver.SetStateValidators(stateValidators)\n\n\t// pay rewards\n\tif req.Height%12 == 0 {\n\t\tapp.stateDeliver.PayRewards(req.Height)\n\t}\n\n\thasDroppedValidators := false\n\tfor _, val := range vals {\n\t\tif val.IsToDrop() {\n\t\t\thasDroppedValidators = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// update validators\n\tif req.Height%120 == 0 || hasDroppedValidators {\n\t\tapp.stateDeliver.RecalculateTotalStakeValues()\n\n\t\tapp.stateDeliver.ClearCandidates(req.Height)\n\t\tapp.stateDeliver.ClearStakes(req.Height)\n\n\t\tvalsCount := validators.GetValidatorsCountForBlock(req.Height)\n\n\t\tnewCandidates := app.stateDeliver.GetCandidates(valsCount, req.Height)\n\n\t\tif len(newCandidates) < valsCount {\n\t\t\tvalsCount = len(newCandidates)\n\t\t}\n\n\t\tnewValidators := make([]abciTypes.ValidatorUpdate, valsCount)\n\n\t\t// calculate total power\n\t\ttotalPower := big.NewInt(0)\n\t\tfor _, candidate := range newCandidates {\n\t\t\ttotalPower.Add(totalPower, candidate.TotalBipStake)\n\t\t}\n\n\t\tfor i := range newCandidates {\n\t\t\tpower := big.NewInt(0).Div(big.NewInt(0).Mul(newCandidates[i].TotalBipStake, big.NewInt(100000000)), totalPower).Int64()\n\n\t\t\tif power == 0 {\n\t\t\t\tpower = 1\n\t\t\t}\n\n\t\t\tnewValidators[i] = abciTypes.Ed25519ValidatorUpdate(newCandidates[i].PubKey, power)\n\t\t}\n\n\t\t// update validators in state\n\t\tapp.stateDeliver.SetNewValidators(newCandidates)\n\n\t\tactiveValidators := app.getCurrentValidators()\n\n\t\tapp.saveCurrentValidators(newValidators)\n\n\t\tupdates = newValidators\n\n\t\tfor _, validator := range activeValidators {\n\t\t\tpersisted := false\n\t\t\tfor _, newValidator := range newValidators {\n\t\t\t\tif bytes.Equal(validator.PubKey.Data, newValidator.PubKey.Data) {\n\t\t\t\t\tpersisted = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// remove validator\n\t\t\tif !persisted {\n\t\t\t\tupdates = append(updates, abciTypes.ValidatorUpdate{\n\t\t\t\t\tPubKey: validator.PubKey,\n\t\t\t\t\tPower: 0,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\t_ = eventsdb.GetCurrent().FlushEvents(req.Height)\n\n\treturn abciTypes.ResponseEndBlock{\n\t\tValidatorUpdates: updates,\n\t\tConsensusParamUpdates: &abciTypes.ConsensusParams{\n\t\t\tBlockSize: &abciTypes.BlockSizeParams{\n\t\t\t\tMaxBytes: BlockMaxBytes,\n\t\t\t\tMaxGas: int64(app.stateDeliver.GetMaxGas()),\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "d6e8697516e6c7c9a7660a3992fea3db", "score": "0.51397747", "text": "func processBlock(block Block) {\n\n\tif (block.Data.Iteration < iterationCount || iterationCount < 0) {\n\t\treturn\n\t}\n\n\toutLog.Printf(strconv.Itoa(client.id)+\":Got block message, iteration %d\\n\", block.Data.Iteration)\n\n\tif (!updateSent && block.Data.Iteration == iterationCount) {\n\t\tupdateSent = true\n\t\toutLog.Printf(\"Releasing worker on iteration %d\", iterationCount)\n\t}\n\n\t// Lock to ensure that iteration count doesn't change until I have appended block\n\toutLog.Printf(\"Trying to acquire lock...\")\n\tboolLock.Lock()\n\n\toutLog.Printf(\"Got lock, processing block\")\n\n\thasBlock := client.hasBlock(block.Data.Iteration)\n\n\tif ((block.Data.Iteration < iterationCount) || hasBlock || iterationCount < 0) {\n\t\t\n\t\tif hasBlock {\n\t\t\toutLog.Printf(\"Already have block\")\n\t\t}\n\t\t\n\t\tboolLock.Unlock()\n\t\toutLog.Printf(\"Released bool lock\")\n\n\t\tif(iterationCount< 0){\n\t\t\treturn\n\t\t}\n\n\t\tbetter := client.evaluateBlockQuality(block) // check equality and some measure of \t\n\n\t\tif(better){\n\t\t\t\n\t\t\t// TODO: If I receive a better block than my current one. Then I replace my block with this one.\n\t\t\t// I request for all the next Blocks. I will also need to advertise new block or not?\n\t\t\t// go callRequestChainRPC(same conn) // returns whole chain. Is it longer than mine?\n\t\t\t// go evaluateReceivedChain() // if chain longer than mine and checks out replace mine with his\n\t\t\t\n\t\t\toutLog.Printf(\"Chain Length:\" + strconv.Itoa(len(client.bc.Blocks)))\n\t\t\tif(block.Data.Iteration == len(client.bc.Blocks) - 2){\n\t\t\t\tclient.replaceBlock(block, block.Data.Iteration)\n\t\t\t\toutLog.Printf(\"Chain Length:\" + strconv.Itoa(len(client.bc.Blocks)))\n\t\t\t\toutLog.Printf(strconv.Itoa(client.id)+\":Received better block\")\n\t\t\t}\n\t\t\treturn \n\t\t\n\t\t}else{\n\t\t\t\n\t\t\t// returnBlock = client.bc.getBlock(block.Data.Iteration)\t\t\t\t\t\t\n\t\t\toutLog.Printf(strconv.Itoa(client.id)+\":Equal block\")\n\t\t\treturn \n\t\t\n\t\t}\n\n\t\t// handleErrorFatal(\"Block of previous iteration received\", staleError)\n\t}\n\n\tif block.Data.Iteration > iterationCount {\n\t\t\n\t\tboolLock.Unlock()\n\t\toutLog.Printf(\"Released bool lock\")\n\n\t\tfor block.Data.Iteration > iterationCount {\n\t\t\toutLog.Printf(strconv.Itoa(client.id)+\":Blocking. Got block for %d, I am at %d\\n\", block.Data.Iteration, iterationCount)\n\t\t\ttime.Sleep(1000 * time.Millisecond)\n\t\t}\t\t\n\n\t\tif ((block.Data.Iteration == iterationCount) || client.evaluateBlockQuality(block)){\n\n\t\t\toutLog.Printf(\"Acquiring bool lock\")\n\t\t\tboolLock.Lock()\t\n\t\t\tgo addBlockToChain(block)\n\n\t\t}\n\n\t\treturn\n\t\n\t}\n\t\t\t\n\t// // if not empty and not verifier send signal to channel. Not verifier required because you are not waiting for a block if you are the verifier and if you receive an empty block and if you are currently busy bootstrapping yourself. \n\t// if(len(block.Data.Deltas) != 0 && !verifier && iterationCount >= 0) {\n\t// \tblockReceived <- true\n\t// }\n\n\t\n\tgo addBlockToChain(block)\n\n}", "title": "" }, { "docid": "e33ef60d340f47818e0589cf846f1605", "score": "0.5139352", "text": "func (node *storageNode) onHandleConfirmation(msg *wire.MsgBlockConfirmation) {\n\tmsgShard := msg.Header.ShardIndex\n\tnode.confirmedHeaders[msg.Header.BlockHeaderHash()] = true\n\n\tif node.lastConfirmation[msgShard] == nil ||\n\t\tnode.lastConfirmation[msgShard].Header.Height < msg.Header.Height {\n\t\tnode.lastConfirmation[msgShard] = msg\n\t}\n\n\tnode.logger.Infof(\"验证缓存的没有收到confirmation(shard: %d,hgt: %d)的slimBlock\",\n\t\tmsg.Header.ShardIndex, msg.Header.Height)\n\n\t// 验证缓存的没有收到confirmation信息的slimBlock\n\tnode.checkClearReceivedBlocks(msg.Header.PrevBlockHeader)\n\n\tslimblock, ok := node.receivedBlocks[msg.Header.BlockHeaderHash()]\n\tif ok {\n\t\tnode.onSlimBlockReceived(slimblock)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "ab8604cf5c066528037797052fc08577", "score": "0.5139303", "text": "func (bc *blockchain) commitBlock(blk *Block) (err error) {\n\t// post-commit actions\n\tdefer func() {\n\t\t// update tip hash and height\n\t\tif r := recover(); r != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// update tip hash/height\n\t\tbc.tip = blk.HashBlock()\n\t\tbc.height = blk.Header.height\n\n\t\t// update UTXO pool\n\t\tbc.Utk.UpdateUtxoPool(blk)\n\t}()\n\n\t// serialize the block\n\tserialized, err := blk.Serialize()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\thash := blk.HashBlock()\n\tif err = bc.blockDb.CheckInBlock(serialized, hash[:], blk.Header.height); err != nil {\n\t\tpanic(err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "7eccd0801f75e1135d92f968bdeb38a6", "score": "0.51336265", "text": "func (db *IndexerDb) CommitBlock(round uint64, timestamp int64, rewardslevel uint64, headerbytes []byte) error {\n\tf := func(ctx context.Context, tx *sql.Tx) error {\n\t\treturn db.commitBlock(tx, round, timestamp, rewardslevel, headerbytes)\n\t}\n\terr := db.txWithRetry(context.Background(), serializable, f)\n\n\tdb.txrows = nil\n\tdb.txprows = nil\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"CommitBlock(): %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fc6d63e4cad365e9b796af51ec84ef4d", "score": "0.5132259", "text": "func PoolConfirmedBlock(request []string) (uint32, error) {\n\tnompClient := nomp.NewNompClient(nil, request[0], userAgent)\n\tnompClient.SetDebug(debug)\n\tstatus, err := nompClient.GetPoolStatus()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tpool, ok := status.Pools[request[1]]\n\tif !ok {\n\t\treturn 0, ErrPoolNotFound\n\t}\n\treturn pool.Blocks.Confirmed, nil\n}", "title": "" }, { "docid": "c6f55df753310ef0f7d36f8411fa986a", "score": "0.51214695", "text": "func (bh *getMissingRequestHandler) notifyBranchBlock(peer RemotePeer, hash message.BlockHash, blockno types.BlockNo) bool {\n\tbh.logger.Debug().Str(LogPeerID, peer.ID().Pretty()).Msg(\"Notifying branch block\")\n\n\t// create message data\n\treq := &types.NewBlockNotice{\n\t\tBlockHash: hash,\n\t\tBlockNo: uint64(blockno)}\n\n\tpeer.sendMessage(peer.MF().newMsgRequestOrder(false, NewBlockNotice, req))\n\treturn true\n}", "title": "" }, { "docid": "72aeedc7adbb75408c5dec38b220c957", "score": "0.5100329", "text": "func processBlock(block *Block) {\n // SANITY CHECK\n existing := LoadBlock(block.Hash)\n if existing == nil || existing.Status != BLOCK_STATUS_PROCESSING {\n panic(NewError(\"Something is wrong, processBlock expected an exsting, processing block\"))\n }\n // END SANITY CHECK\n\n rpcPayments := rpc.PaymentsForBlock(block.Coin, block.Hash, true)\n\n // Filter to recognized payments.\n _, rpcPayments = RecognizedPayments(rpcPayments)\n\n // Process all the payments for this block.\n for _, rpcPayment := range rpcPayments {\n processPayment(rpcPayment, block)\n }\n // Set status to GOOD\n UpdateBlockStatus(block.Hash, BLOCK_STATUS_PROCESSING, BLOCK_STATUS_GOOD)\n}", "title": "" }, { "docid": "e64304ffcacc8d9cb634fd6d5c3bdd51", "score": "0.50996697", "text": "func (abc *appBlockChain) updateLastBlockDeposit(update *state.Update, block *wire.MsgBlock) error {\n\tfTree := getFullMerkleTreeByBlock(block)\n\t// Traverse all outs, add dout to the deposit pool\n\tfor _, out := range block.Body.Outs {\n\t\tmyAddress := abc.getAddress()\n\t\tif out.OutPoint.IsDepositOut() {\n\t\t\toutData, err := wire.OutToDepositData(&out.OutPoint)\n\t\t\tif err != nil {\n\t\t\t\tabc.log.Errorf(\"Failed to get data out deposit out: %v\", out.OutPoint)\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// The miner only cares about his own deposit\n\t\t\tif outData.BindingAddress.IsEqual(myAddress) {\n\t\t\t\tproof, err := getOutProofByUpdate(update, fTree, out)\n\t\t\t\tif err != nil {\n\t\t\t\t\tabc.log.Errorf(\"Failed to get proof of deposit out,%v\", err)\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\terr = abc.dPool.Add(&out.OutPoint, wire.BlockHeight(block.Header.Height), proof)\n\t\t\t\tif err != nil {\n\t\t\t\t\tabc.log.Errorf(\"Failed to add dout to pool: %s\", out.OutPoint.String())\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Traverse all transactions, If a dout was used, lock or remove\n\tfor _, tx := range block.Body.Transactions {\n\t\tswitch tx.Tx.API {\n\t\tcase isysapi.SysAPIWithdraw:\n\t\t\tfor _, txIn := range tx.Tx.TxIn {\n\t\t\t\tif txIn.PreviousOutPoint.IsDepositOut() {\n\t\t\t\t\terr := abc.dPool.Lock(&txIn.PreviousOutPoint)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tabc.log.Errorf(\"failed to lock previous outpoint,%v\", err)\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase isysapi.SysAPIBinding:\n\t\t\tfor _, txIn := range tx.Tx.TxIn {\n\t\t\t\tif txIn.PreviousOutPoint.IsDepositOut() {\n\t\t\t\t\terr := abc.dPool.Remove(&txIn.PreviousOutPoint)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tabc.log.Errorf(\"failed to remove previous outpoint,%v\", err)\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tcase isysapi.SysAPIDeposit, isysapi.SysAPITransfer:\n\t\t\tfor _, txIn := range tx.Tx.TxIn {\n\t\t\t\tif txIn.PreviousOutPoint.IsWithdrawOut() {\n\t\t\t\t\terr := abc.dPool.Remove(&txIn.PreviousOutPoint)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tabc.log.Errorf(\"failed to remove previous outpoint,%v\", err)\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eb8522ca70b6b7771975083713c909b3", "score": "0.5092109", "text": "func (s *Standard) OnBlock(hash string, height uint64) error {\n\n\tif height < s.height {\n\t\ts.log.Warn().\n\t\t\tUint64(\"old_height\", s.height).\n\t\t\tUint64(\"new_height\", height).\n\t\t\tMsg(\"block rollback\")\n\t}\n\n\tif height == s.height {\n\t\ts.log.Debug().\n\t\t\tUint64(\"height\", height).\n\t\t\tMsg(\"block fork\")\n\t}\n\n\ts.height = height\n\n\tphase, err := s.info.Phase()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not retrieve phase\")\n\t}\n\n\tif phase != s.phase {\n\t\ts.log.Info().\n\t\t\tStr(\"old_phase\", string(s.phase)).\n\t\t\tStr(\"new_phase\", string(phase)).\n\t\t\tMsg(\"tournament phase changed\")\n\t\ts.phase = phase\n\t}\n\n\twindow, err := s.info.Window()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"could not retrieve window\")\n\t}\n\n\tif window != s.window {\n\t\ts.log.Info().\n\t\t\tStr(\"old_window\", string(s.window)).\n\t\t\tStr(\"new_window\", string(window)).\n\t\t\tMsg(\"tournament window changed\")\n\t\ts.window = window\n\t}\n\n\ts.tick(height)\n\n\treturn nil\n}", "title": "" }, { "docid": "c531f76e3b3d567c58b004cca48c275d", "score": "0.5087868", "text": "func (b *Block) PrintBlock() {\n\tfmt.Printf(\"PrevHash: %x\\n\", b.PrevBlockHash)\n\tfmt.Printf(\"Hash: %x\\n\", b.Hash)\n\tfor _, tx := range b.Transactions {\n\t\tfmt.Printf(\"Input: %v\\n\", tx.Vin)\n\t\tfmt.Printf(\"Output: %v\\n\", tx.Vout)\n\t}\n\tfmt.Printf(\"PoW: %s\\n\", strconv.FormatBool(NewProofOfWork(b).Validate()))\n\tfmt.Println()\n}", "title": "" }, { "docid": "b26997925f4527b375478e6a58137884", "score": "0.5080201", "text": "func (app *Blockchain) BeginBlock(req abciTypes.RequestBeginBlock) abciTypes.ResponseBeginBlock {\n\tapp.wg.Add(1)\n\tif atomic.LoadUint32(&app.stopped) == 1 {\n\t\tpanic(\"Application stopped\")\n\t}\n\n\t// compute max gas\n\tapp.updateBlocksTimeDelta(req.Header.Height, 3)\n\tmaxGas := app.calcMaxGas(req.Header.Height)\n\tapp.stateDeliver.SetMaxGas(maxGas)\n\n\tatomic.StoreInt64(&app.height, req.Header.Height)\n\tapp.rewards = big.NewInt(0)\n\n\t// clear absent candidates\n\tapp.validatorsStatuses = map[[20]byte]int8{}\n\n\t// give penalty to absent validators\n\tfor _, v := range req.LastCommitInfo.Votes {\n\t\tvar address [20]byte\n\t\tcopy(address[:], v.Validator.Address)\n\n\t\tif v.SignedLastBlock {\n\t\t\tapp.stateDeliver.SetValidatorPresent(req.Header.Height, address)\n\t\t\tapp.validatorsStatuses[address] = ValidatorPresent\n\t\t} else {\n\t\t\tapp.stateDeliver.SetValidatorAbsent(req.Header.Height, address)\n\t\t\tapp.validatorsStatuses[address] = ValidatorAbsent\n\t\t}\n\t}\n\n\t// give penalty to Byzantine validators\n\tfor i := range req.ByzantineValidators {\n\t\tv := &req.ByzantineValidators[i]\n\t\tvar address [20]byte\n\t\tcopy(address[:], v.Validator.Address)\n\n\t\tapp.stateDeliver.PunishByzantineValidator(req.Header.Height, address)\n\t\tapp.stateDeliver.PunishFrozenFundsWithAddress(uint64(req.Header.Height), uint64(req.Header.Height+518400), address)\n\t}\n\n\t// apply frozen funds (used for unbond stakes)\n\tfrozenFunds := app.stateDeliver.GetStateFrozenFunds(uint64(req.Header.Height))\n\tif frozenFunds != nil {\n\t\tfor _, item := range frozenFunds.List() {\n\t\t\teventsdb.GetCurrent().AddEvent(req.Header.Height, eventsdb.UnbondEvent{\n\t\t\t\tAddress: item.Address,\n\t\t\t\tAmount: item.Value.Bytes(),\n\t\t\t\tCoin: item.Coin,\n\t\t\t\tValidatorPubKey: item.CandidateKey,\n\t\t\t})\n\t\t\tapp.stateDeliver.AddBalance(item.Address, item.Coin, item.Value)\n\t\t}\n\n\t\t// delete from db\n\t\tfrozenFunds.Delete()\n\t}\n\n\treturn abciTypes.ResponseBeginBlock{}\n}", "title": "" }, { "docid": "6e17b30207cd123ef5f047c7228e04af", "score": "0.5072566", "text": "func (b *Block) Update() *BlockUpdateOne {\n\treturn (&BlockClient{config: b.config}).UpdateOne(b)\n}", "title": "" }, { "docid": "42d20cc4ea5b82e2370f1ff1ccbfb3a5", "score": "0.5066334", "text": "func syncMempool(coin string, nextHeight uint32) {\n for {\n newHeight := rpc.GetCurrentHeight(coin)\n if nextHeight <= newHeight {\n // TODO: well, not all tx's will have been confirmed.\n mempoolTxHashes.Clear()\n return\n }\n syncMempoolOnce(coin)\n // Wait a bit\n time.Sleep(30 * time.Second)\n }\n}", "title": "" }, { "docid": "c65a88f193e193c13dba551af6f2d0be", "score": "0.50647014", "text": "func ApplyBlock(block block.Block) {\n\t//apply\n\tfor j := 0; j < len(block.Txs); j++ {\n\t\tapplyTx(block.Txs[j])\n\t\t//if success\n\t\t//assign id\n\t\t//block.Txs[j].Id = txHash(block.Txs[j])\n\t\t//og.Println(\"hash \", block.Txs[j].Id)\n\t}\n}", "title": "" }, { "docid": "d9f868f4327fe483089796764de6723b", "score": "0.50620043", "text": "func (blk *ValidateBlock) Execute() {\n\n\tfor {\n\n\t\t//verify if the app is stopped:\n\t\tif blk.stop {\n\t\t\tlog.Println(\"stopping...\")\n\t\t\treturn\n\t\t}\n\n\t\t//retrieve the new signed blocks:\n\t\tselect {\n\t\tcase oneSignedBlk := <-blk.newSignedBlks:\n\n\t\t\t//get the hash of the block:\n\t\t\thashAsString := oneSignedBlk.GetBlock().GetMetaData().GetHashTree().GetHash().String()\n\n\t\t\t//if the hash exists in the toRemove map:\n\t\t\tif _, ok := blk.toRemoveSignedBlks[hashAsString]; ok {\n\t\t\t\tlog.Printf(\"the block (hash: %s) already got processed successfully. Skipping.\\n\", hashAsString)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t//if the hash already exists in the map:\n\t\t\tif _, ok := blk.signedBlks[hashAsString]; ok {\n\t\t\t\t//writing the logs:\n\t\t\t\tuserID := oneSignedBlk.GetSignature().GetUser().GetMetaData().GetID().String()\n\t\t\t\tlog.Printf(\"Adding a new verification from userID (%s) to the block (hash: %s)\\n\", userID, hashAsString)\n\n\t\t\t\t//adding the signed block to the list:\n\t\t\t\tblk.signedBlks[hashAsString] = append(blk.signedBlks[hashAsString], oneSignedBlk)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t//writing the logs:\n\t\t\tlog.Printf(\"Adding a block (hash: %s) to the list of block to verify.\\n\", hashAsString)\n\n\t\t\t//the hash is not in our map yet, so add it:\n\t\t\tblk.signedBlks[hashAsString] = []blocks.SignedBlock{\n\t\t\t\toneSignedBlk,\n\t\t\t}\n\n\t\t\tbreak\n\t\t}\n\n\t\t//if there is signed blocks to remove:\n\t\tif len(blk.toRemoveSignedBlks) > 0 {\n\t\t\tcurrentTs := time.Now()\n\t\t\tfor oneHash, oneTs := range blk.toRemoveSignedBlks {\n\t\t\t\t//if we waited enough, delete the signed block:\n\t\t\t\tif oneTs.Add(blk.waitBeforeRemovalTs).After(currentTs) {\n\t\t\t\t\t//log:\n\t\t\t\t\tlog.Printf(\"Removing the block from the list (hash: %s)\", oneHash)\n\n\t\t\t\t\t//delete:\n\t\t\t\t\tdelete(blk.signedBlks, oneHash)\n\t\t\t\t\tdelete(blk.toRemoveSignedBlks, oneHash)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t//if there is no signed blocks, continue:\n\t\tif len(blk.signedBlks) <= 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\t//verify if signed blocks got validated by enough stake:\n\t\tfor signedBlkHash, signedBlks := range blk.signedBlks {\n\t\t\t//get the amount of stake:\n\t\t\treceivedStake := 0.0\n\t\t\tleaderSignatures := []users.Signature{}\n\t\t\tfor _, oneSignedBlk := range signedBlks {\n\n\t\t\t\t//retrieve the leader signature:\n\t\t\t\tleaderSig := oneSignedBlk.GetSignature()\n\n\t\t\t\t//add the received stake:\n\t\t\t\tuserIDAsString := leaderSig.GetUser().GetMetaData().GetID().String()\n\t\t\t\tif userKarma, ok := blk.usersStake[userIDAsString]; ok {\n\t\t\t\t\t//add the stake:\n\t\t\t\t\treceivedStake += userKarma\n\n\t\t\t\t\t//add the leader signature in the list, since the stake was verified:\n\t\t\t\t\tleaderSignatures = append(leaderSignatures, leaderSig)\n\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t//if we have enough stake, build the validated block and remove the signedBlks from the list:\n\t\t\tif receivedStake >= blk.neededStakerPerBlk {\n\n\t\t\t\tuserSigsID := uuid.NewV4()\n\t\t\t\tuserSigsCrOn := time.Now().UTC()\n\t\t\t\tuserSigs, userSigsErr := blk.userSigsBuilderFactory.Create().Create().WithID(&userSigsID).CreatedOn(userSigsCrOn).WithSignatures(leaderSignatures).Now()\n\t\t\t\tif userSigsErr != nil {\n\t\t\t\t\tlog.Printf(\"the user signatures instance could not be built: %s\", userSigsErr.Error())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tvalidatedBlkID := uuid.NewV4()\n\t\t\t\tvalidatedBlkTs := time.Now().UTC()\n\t\t\t\tvalidatedBlk, validatedBlkErr := blk.valBlkBuilderFactory.Create().Create().WithID(&validatedBlkID).CreatedOn(validatedBlkTs).WithBlock(signedBlks[0]).WithSignatures(userSigs).Now()\n\t\t\t\tif validatedBlkErr != nil {\n\t\t\t\t\tlog.Printf(\"there was an error while building a validated block: %s\", validatedBlkErr.Error())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\t//write to the logs:\n\t\t\t\tlog.Printf(\"the block (hash: %s) needed %f stake to be verified, received: %f\\n\", signedBlkHash, blk.neededStakerPerBlk, receivedStake)\n\n\t\t\t\t//sign the validated block:\n\t\t\t\tblkSigID := uuid.NewV4()\n\t\t\t\tblkSigCrOn := time.Now().UTC()\n\t\t\t\tblkSig, blkSigErr := blk.userSigBuilderFactory.Create().Create().WithID(&blkSigID).CreatedOn(blkSigCrOn).WithUser(blk.user).WithPrivateKey(blk.pk).WithInterface(validatedBlk).Now()\n\t\t\t\tif blkSigErr != nil {\n\t\t\t\t\tlog.Printf(\"there was an error while signing the validated block (ID: %s): %s\", validatedBlk.GetMetaData().GetID().String(), blkSigErr.Error())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tsignedValBlkID := uuid.NewV4()\n\t\t\t\tsignedValBlkCrOn := time.Now().UTC()\n\t\t\t\tsignedValBlk, signedValBlkErr := blk.signedValBlkBuilderFactory.Create().Create().WithID(&signedValBlkID).CreatedOn(signedValBlkCrOn).WithSignature(blkSig).WithBlock(validatedBlk).Now()\n\t\t\t\tif signedValBlkErr != nil {\n\t\t\t\t\tlog.Printf(\"there was an error while building a signed validated block: %s\", signedValBlkErr.Error())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\t//add the validated block to the channel:\n\t\t\t\tblk.newSignedValidatedBlk <- signedValBlk\n\n\t\t\t\t//add the hash to the list of element to remove:\n\t\t\t\tblk.toRemoveSignedBlks[signedBlkHash] = time.Now()\n\t\t\t}\n\n\t\t}\n\n\t}\n\n}", "title": "" }, { "docid": "5e6fd55e8db8b9e4256d3b66c35d9367", "score": "0.50619954", "text": "func sendBlock(block Block) {\t\n\n\toutLog.Printf(strconv.Itoa(client.id)+\":Sending block of iteration: %d\\n\", block.Data.Iteration)\n\n\t// create a thread for separate calling\n\tpeerLock.Lock()\n\n\tensureRPC.Add(len(peerAddresses))\n\t\n\tfor _, address := range peerAddresses {\n\t\tgo callRegisterBlockRPC(block, address)\n\t}\n\t\n\t//check for convergence, wait for RPC calls to return and move to the new iteration\n\n\tensureRPC.Wait()\n\n\t// ensureRPCCallsReturn()\n\tpeerLock.Unlock()\n\n\toutLog.Printf(strconv.Itoa(client.id)+\":RPC calls successfully returned. Iteration: %d\", iterationCount)\n\n\tconvergedLock.Lock()\n\tconverged = client.checkConvergence()\n\tconvergedLock.Unlock()\n\n\toutLog.Printf(strconv.Itoa(client.id)+\":Preparing for next Iteration. Current Iteration: %d\", iterationCount)\n\n\t// This seems to be the safest place to release all peers stuck in a verifier RPC.\n\tif (verifier && collectingUpdates) {\n\n\t\toutLog.Printf(\"Block Appended. Releasing peer requests for verification.\")\n\n\t\tfor i := 0; i < len(krum.UpdateList); i++ {\t\t\t\t\t\n\t\t\tkrumAccepted <- true\n\t\t}\n\n\t}\n\n\tprepareForNextIteration()\n\t\t\n}", "title": "" }, { "docid": "20ae57340bc407d9f20bc43dd3c6281c", "score": "0.50587827", "text": "func (client *Client) CreateBlock() {\n\tlastBlock := client.GetCurrentBlock()\n\tcfg := client.GetAPI().GetConfig()\n\ttxs := client.RequestTx(int(cfg.GetP(lastBlock.Height+1).MaxTxNumber), nil)\n\tif len(txs) == 0 {\n\t\tblock := client.GetCurrentBlock()\n\t\tif createEmptyBlocks {\n\t\t\temptyBlock := &types.Block{}\n\t\t\temptyBlock.StateHash = block.StateHash\n\t\t\temptyBlock.ParentHash = block.Hash(cfg)\n\t\t\temptyBlock.Height = block.Height + 1\n\t\t\temptyBlock.Txs = nil\n\t\t\temptyBlock.TxHash = zeroHash[:]\n\t\t\temptyBlock.BlockTime = client.blockTime\n\t\t\terr := client.WriteBlock(lastBlock.StateHash, emptyBlock)\n\t\t\t//判断有没有交易是被删除的,这类交易要从mempool 中删除\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tdposlog.Info(\"Ignore to create new Block for no tx in mempool\", \"Height\", block.Height+1)\n\t\t}\n\n\t\treturn\n\t}\n\t//check dup\n\ttxs = client.CheckTxDup(txs, client.GetCurrentHeight())\n\tvar newblock types.Block\n\tnewblock.ParentHash = lastBlock.Hash(cfg)\n\tnewblock.Height = lastBlock.Height + 1\n\tclient.AddTxsToBlock(&newblock, txs)\n\tnewblock.Difficulty = cfg.GetP(0).PowLimitBits\n\n\t//需要首先对交易进行排序然后再计算TxHash\n\tif cfg.IsFork(newblock.Height, \"ForkRootHash\") {\n\t\tnewblock.Txs = types.TransactionSort(newblock.Txs)\n\t}\n\tnewblock.TxHash = merkle.CalcMerkleRoot(cfg, newblock.Height, newblock.Txs)\n\tnewblock.BlockTime = client.blockTime\n\n\terr := client.WriteBlock(lastBlock.StateHash, &newblock)\n\t//判断有没有交易是被删除的,这类交易要从mempool 中删除\n\tif err != nil {\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "eb5fadfaec2d615460c3575ef7da9f70", "score": "0.50463814", "text": "func (t *TxWithBlockData) Confirmed() bool {\n\treturn t.BlockHeight > 0 && len(t.BlockHash) <= chainhash.MaxHashStringSize\n}", "title": "" }, { "docid": "527689c2fe15608b1e1c807c487efa37", "score": "0.5042734", "text": "func (w *Worker) addFoundBlock(b *types.Block) error {\n\tpool := w.Parent().Pool()\n\ttx, err := pool.sqldb.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer tx.Rollback()\n\n\tbh := pool.persist.GetBlockHeight()\n\tpool.blockCounter = uint64(bh) + 1\n\tw.log.Printf(\"New block to mine on %d\\n\", pool.blockCounter)\n\t// reward := b.CalculateSubsidy(bh).String()\n\tpool.mu.Lock()\n\tdefer pool.mu.Unlock()\n\ttimeStamp := time.Now().Unix()\n\t// TODO: maybe add difficulty_user\n\tstmt, err := tx.Prepare(`\n\t\tINSERT INTO blocks\n\t\t(height, blockhash, coin_id, userid, workerid, category, difficulty, time, algo)\n\t\tVALUES\n\t\t(?, ?, ?, ?, ?, ?, ?, ?, ?)\n\t\t`)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer stmt.Close()\n\n\tcurrentTarget, _ := pool.cs.ChildTarget(b.ID())\n\tdifficulty, _ := currentTarget.Difficulty().Uint64()\n\t// TODO: figure out right difficulty_user\n\t_, err = stmt.Exec(bh, b.ID().String(), SiaCoinID, w.Parent().cr.clientID,\n\t\tw.wr.workerID, \"new\", difficulty, timeStamp, SiaCoinAlgo)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = tx.Commit()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1fe86c11a0472a09d34492dcdef24f8e", "score": "0.5033341", "text": "func (v *Vault) AppendPendingTxBlockHeights(blockHeight int64, constAccessor constants.ConstantValues) {\n\theights := []int64{blockHeight}\n\tfor _, item := range v.PendingTxBlockHeights {\n\t\tif (blockHeight - item) <= constAccessor.GetInt64Value(constants.SigningTransactionPeriod) {\n\t\t\theights = append(heights, item)\n\t\t}\n\t}\n\tv.PendingTxBlockHeights = heights\n}", "title": "" }, { "docid": "62475ed9e4c7e88b186d5373c41b921c", "score": "0.50322", "text": "func (b *Block) Update() {\n\tb.now = time.Now()\n\tb.nextUpdate = b.now.Add(time.Minute).Truncate(time.Minute)\n}", "title": "" }, { "docid": "15f7d1326d5852f2c070562f825a6859", "score": "0.50248164", "text": "func (idx *Indexer) UpdateTransferToBlock(blk *block.Block, tx *sql.Tx) error {\n\tblockHash := blk.HashBlock()\n\tinsertQuery := \"INSERT transfer_to_block SET node_address=?,transfer_hash=?,block_hash=?\"\n\ttransfers, _, _ := action.ClassifyActions(blk.Actions)\n\tfor _, transfer := range transfers {\n\t\ttransferHash := transfer.Hash()\n\t\tif _, err := tx.Exec(insertQuery, idx.hexEncodedNodeAddr, hex.EncodeToString(transferHash[:]), blockHash[:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6d9bf45b9e9dabf72b1a64184e70748b", "score": "0.5024717", "text": "func TestBlock(t *testing.T) {\n\tdefer check(t)\n\tcontent := \"hello world!\"\n\treq := &showcasepb.BlockRequest{\n\t\tResponseDelay: &durationpb.Duration{Nanos: 1000},\n\t\tResponse: &showcasepb.BlockRequest_Success{\n\t\t\tSuccess: &showcasepb.BlockResponse{Content: content},\n\t\t},\n\t}\n\tresp, err := echo.Block(context.Background(), req)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tif resp.GetContent() != content {\n\t\tt.Errorf(\"Block() = %q, want %q\", resp.GetContent(), content)\n\t}\n}", "title": "" }, { "docid": "c3438a59b9a05ed644bd7930f0015e77", "score": "0.50232214", "text": "func (s *SPVCon) IngestBlock(m *wire.MsgBlock) {\n\tvar err error\n\n\t// hand block over via the RawBlockSender chan\n\t// hopefully this doesn't block\n\t// ... get it?\n\tif s.RawBlockActive {\n\t\ts.RawBlockSender <- m\n\t}\n\n\t// This takes care of the whole rawblockactive thing if we just\n\t// replace the current channel with this new one\n\tfor i := range s.RawBlockDistribute {\n\t\ts.RawBlockDistribute[i] <- m\n\t}\n\n\tok := BlockOK(*m) // check block self-consistency\n\tif !ok {\n\t\tlogging.Errorf(\"block %s not OK!!11\\n\", m.BlockHash().String())\n\t\treturn\n\t}\n\n\tvar hah HashAndHeight\n\tselect { // select here so we don't block on an unrequested mblock\n\tcase hah = <-s.blockQueue: // pop height off mblock queue\n\t\tbreak\n\tdefault:\n\t\tlogging.Errorf(\"Unrequested full block\")\n\t\treturn\n\t}\n\n\tnewBlockHash := m.Header.BlockHash()\n\tif !hah.blockhash.IsEqual(&newBlockHash) {\n\t\tlogging.Errorf(\"Full block out of order error\\n\")\n\t\treturn\n\t}\n\n\t// iterate through all txs in the block, looking for matches.\n\tfor _, tx := range m.Transactions {\n\t\tif s.MatchTx(tx) {\n\t\t\tlogging.Infof(\"found matching tx %s\\n\", tx.TxHash().String())\n\t\t\ts.TxUpToWallit <- lnutil.TxAndHeight{Tx: tx, Height: hah.height}\n\t\t}\n\t}\n\n\t// tell the channels listening for heights that the height has been reached\n\tfor i := range s.HeightDistribute {\n\t\ts.HeightDistribute[i] <- hah.height\n\t}\n\n\t// tell upper level height has been reached\n\ts.CurrentHeightChan <- hah.height\n\t// track our internal height\n\ts.syncHeight = hah.height\n\n\tif ckLogFullBlock() {\n\t\tlogging.Debugf(\"ingested full block %s height %d OK\\n\",\n\t\t\tm.Header.BlockHash().String(), hah.height)\n\t}\n\n\tif hah.final { // check sync end\n\t\t// don't set waitstate; instead, ask for headers again!\n\t\t// this way the only thing that triggers waitstate is asking for headers,\n\t\t// getting 0, calling AskForMerkBlocks(), and seeing you don't need any.\n\t\t// that way you are pretty sure you're synced up.\n\t\terr = s.AskForHeaders()\n\t\tif err != nil {\n\t\t\tlogging.Errorf(\"Merkle block error: %s\\n\", err.Error())\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "e7dc8dcfa1645dc75dbeb5c766129ffb", "score": "0.50227684", "text": "func (s *State) integrateBlock(b Block, bd *BlockDiff) (diffs []OutputDiff, err error) {\n\tbd.CatalystBlock = b.ID()\n\n\tvar appliedTransactions []Transaction\n\tminerSubsidy := Currency(0)\n\tfor _, txn := range b.Transactions {\n\t\terr = s.validTransaction(txn)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\t// Apply the transaction to the ConsensusState, adding it to the list of applied transactions.\n\t\ttransactionDiff := s.applyTransaction(txn)\n\t\tappliedTransactions = append(appliedTransactions, txn)\n\t\tdiffs = append(diffs, transactionDiff.OutputDiffs...)\n\t\tbd.TransactionDiffs = append(bd.TransactionDiffs, transactionDiff)\n\n\t\t// Add the miner fees to the miner subsidy.\n\t\tfor _, fee := range txn.MinerFees {\n\t\t\tminerSubsidy += fee\n\t\t}\n\t}\n\n\tif err != nil {\n\t\t// Rewind transactions added.\n\t\tfor i := len(appliedTransactions) - 1; i >= 0; i-- {\n\t\t\ts.invertTransaction(appliedTransactions[i])\n\t\t}\n\t\treturn\n\t}\n\n\t// Perform maintanence on all open contracts.\n\tdiffSet := s.applyContractMaintenance(&bd.BlockChanges)\n\tdiffs = append(diffs, diffSet...)\n\n\t// Update the current block and current path variables of the longest fork.\n\theight := s.blockMap[b.ID()].Height\n\ts.currentBlockID = b.ID()\n\ts.currentPath[height] = b.ID()\n\n\t// Add coin inflation to the miner subsidy.\n\tminerSubsidy += CalculateCoinbase(s.height())\n\n\t// Add output contianing miner fees + block subsidy.\n\t//\n\t// TODO: Add this to the list of future miner subsidies\n\tminerSubsidyOutput := Output{\n\t\tValue: minerSubsidy,\n\t\tSpendHash: b.MinerAddress,\n\t}\n\ts.unspentOutputs[b.SubsidyID()] = minerSubsidyOutput\n\tdiff := OutputDiff{New: true, ID: b.SubsidyID(), Output: minerSubsidyOutput}\n\tdiffs = append(diffs, diff)\n\tbd.BlockChanges.OutputDiffs = append(bd.BlockChanges.OutputDiffs, diffs...)\n\n\treturn\n}", "title": "" }, { "docid": "143d14afc3154f8ff5c068fdb8d894d9", "score": "0.5022471", "text": "func (api *API) SetBlockAppliedCallback(notice func(header *BlockHeader, error error)) (err error) {\n\terr = api.setCallback(\"condenser_api\", \"set_block_applied_callback\", func(raw json.RawMessage) {\n\t\tvar header []BlockHeader\n\t\tif err := json.Unmarshal(raw, &header); err != nil {\n\t\t\tnotice(nil, err)\n\t\t}\n\t\tfor _, b := range header {\n\t\t\tnotice(&b, nil)\n\t\t}\n\t})\n\treturn\n}", "title": "" }, { "docid": "f17e7357ef46395e0dce2c650574882f", "score": "0.50200397", "text": "func (p2ps *P2P) NotifyBlockProduced(blockNotice message.NotifyNewBlock) bool {\n\t// TODO fill producerID, but actually there is no way go find producer, for now.\n\treq := &types.BlockProducedNotice{ProducerID: nil, BlockNo: blockNotice.BlockNo, Block: blockNotice.Block}\n\tmo := p2ps.mf.NewMsgBPBroadcastOrder(req)\n\n\tpeers := p2ps.pm.GetPeers()\n\tsent, skipped := 0, 0\n\tfor _, neighbor := range peers {\n\t\tif neighbor.State() == types.RUNNING {\n\t\t\tsent++\n\t\t\tneighbor.SendMessage(mo)\n\t\t} else {\n\t\t\tskipped++\n\t\t}\n\t}\n\n\tp2ps.Debug().Int(\"skipped_cnt\", skipped).Int(\"sent_cnt\", sent).Str(\"hash\", enc.ToString(blockNotice.Block.BlockHash())).Uint64(\"block_no\", req.BlockNo).Msg(\"Notifying block produced\")\n\treturn true\n}", "title": "" }, { "docid": "bc3948e13499a768e4c8410b20afff7a", "score": "0.501948", "text": "func MarkBlockOrphaned(block *types.Block) error {\n\ttx, err := DB.Beginx()\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error starting db tx: %w\", err)\n\t}\n\tdefer tx.Rollback()\n\n\tvar canonical bool\n\terr = tx.Get(&canonical, \"SELECT canonical FROM blocks WHERE statehash = $1\", block.StateHash)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error retrieving canonical status from db: %w\", err)\n\t}\n\n\tif !canonical {\n\t\tlogger.Infof(\"block %v at height %v has already been marked as orphaned\", block.StateHash, block.Height)\n\t\treturn nil\n\t}\n\n\t_, err = tx.Exec(`UPDATE blocks SET canonical = false WHERE statehash = $1`, block.StateHash)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block canonical update db query: %w\", err)\n\t}\n\n\t_, err = tx.Exec(`UPDATE snarkjobs SET canonical = false WHERE blockstatehash = $1`, block.StateHash)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block snarkjobs canonical update db query: %w\", err)\n\t}\n\n\t_, err = tx.Exec(`UPDATE feetransfers SET canonical = false WHERE blockstatehash = $1`, block.StateHash)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block feetransfers canonical update db query: %w\", err)\n\t}\n\n\t_, err = tx.Exec(`UPDATE userjobs SET canonical = false WHERE blockstatehash = $1`, block.StateHash)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block userjobs canonical update db query: %w\", err)\n\t}\n\n\t_, err = tx.Exec(`UPDATE accounttransactions SET canonical = false WHERE blockstatehash = $1`, block.StateHash)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block accounttransactions canonical update db query: %w\", err)\n\t}\n\n\tlogger.Infof(\"updating snark jobs statistics\")\n\tfor _, sj := range block.SnarkJobs {\n\t\t_, err := tx.Exec(\"UPDATE accounts SET snarkjobs = snarkjobs - 1 WHERE publickey = $1\", sj.Prover)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error incrementing snarkjobs column of account table for pk %v: %w\", sj.Prover, err)\n\t\t}\n\t}\n\n\tlogger.Infof(\"updating user jobs statistics\")\n\tfor _, uj := range block.UserJobs {\n\t\t_, err = tx.Exec(\"UPDATE accounts SET txsent = txsent - 1 WHERE publickey = $1\", uj.Sender)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error incrementing txsent column of account table for pk %v: %w\", uj.Sender, err)\n\t\t}\n\n\t\t_, err = tx.Exec(\"UPDATE accounts SET txreceived = txreceived - 1 WHERE publickey = $1\", uj.Recipient)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error incrementing txreceived column of account table for pk %v: %w\", uj.Recipient, err)\n\t\t}\n\t}\n\n\tlogger.Infof(\"committing tx\")\n\n\terr = tx.Commit()\n\treturn err\n}", "title": "" }, { "docid": "5435ba34b0fac186db3da29c90f0834e", "score": "0.50117517", "text": "func (c Client) WaitForBlockHeight(h int64) error {\n\tticker := time.NewTicker(time.Second)\n\tdefer ticker.Stop()\n\ttimeout := time.After(10 * time.Second)\n\n\tfor {\n\t\tstatus, err := c.RPC.Status(context.Background())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif status.SyncInfo.LatestBlockHeight >= h {\n\t\t\treturn nil\n\t\t}\n\t\tselect {\n\t\tcase <-timeout:\n\t\t\treturn errors.New(\"timeout exceeded waiting for block\")\n\t\tcase <-ticker.C:\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a7a6b14ad03601be305eabc422206ad3", "score": "0.50063753", "text": "func (s *server) handleUpdatePeerHeights(state *peerState, umsg updatePeerHeightsMsg) {\n\tstate.forAllPeers(func(p *peer) {\n\t\t// The origin peer should already have the updated height.\n\t\tif p == umsg.originPeer {\n\t\t\treturn\n\t\t}\n\n\t\t// Skip this peer if it hasn't recently announced any new blocks.\n\t\tp.StatsMtx.Lock()\n\t\tif p.lastAnnouncedBlock == nil {\n\t\t\tp.StatsMtx.Unlock()\n\t\t\treturn\n\t\t}\n\n\t\t// This is a pointer to the underlying memory which doesn't\n\t\t// change.\n\t\tlatestBlkSha := p.lastAnnouncedBlock\n\t\tp.StatsMtx.Unlock()\n\n\t\t// If the peer has recently announced a block, and this block\n\t\t// matches our newly accepted block, then update their block\n\t\t// height.\n\t\tif *latestBlkSha == *umsg.newSha {\n\t\t\tp.UpdateLastBlockHeight(umsg.newHeight)\n\t\t\tp.UpdateLastAnnouncedBlock(nil)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "2e4e65bbf75ea09475be8988193eb0e7", "score": "0.5006291", "text": "func (shm *StorageHostManager) incrementBlockHeight() {\n\tshm.blockHeightLock.Lock()\n\tdefer shm.blockHeightLock.Unlock()\n\n\tshm.blockHeight++\n}", "title": "" }, { "docid": "e1615a8193cbfe3158530c136b0ae443", "score": "0.50001025", "text": "func (db *GormDB) TrackBlock(bestBlockHeight int64, isTracking bool, queryBlockResultCh <- chan common.QueryBlockResult) (bool, int64) {\n var (\n rawBlock *btcjson.GetBlockVerboseResult\n chain string\n dbBlock SimpleBitcoinBlock\n utxos []UTXO\n )\n\n b := <- queryBlockResultCh\n if b.Error != nil {\n configure.Sugar.Fatal(b.Error.Error())\n }\n rawBlock = b.Block.(*btcjson.GetBlockVerboseResult)\n chain = b.Chain\n trackHeight := rawBlock.Height\n\n if err := db.First(&dbBlock, \"height = ? AND re_org = ?\", rawBlock.Height, false).Related(&utxos).Error; err !=nil && err.Error() == \"record not found\" {\n dbBlock.Hash = rawBlock.Hash\n dbBlock.Height = rawBlock.Height\n blockCh := make(chan common.QueryBlockResult)\n go func (rawBlock *btcjson.GetBlockVerboseResult) {\n defer close(blockCh)\n blockCh <- common.QueryBlockResult{Block: rawBlock, Chain: chain}\n }(rawBlock)\n createBlockResul := <- db.CreateBitcoinBlockWithUTXOs(blockCh)\n if createBlockResul.Error != nil{\n configure.Sugar.Fatal(createBlockResul.Error.Error())\n }\n\n if createBlockResul.Error == nil{\n bestBlock := createBlockResul.Block.(SimpleBitcoinBlock)\n configure.Sugar.Info(\"create block successfully,\", \" height: \", bestBlock.Height, \" hash: \", bestBlock.Hash)\n }\n }else if err != nil {\n configure.Sugar.Fatal(\"query track block error:\", err.Error())\n }else {\n if dbBlock.Hash != rawBlock.Hash {\n ts := db.Begin()\n // update utxos related with the dbBlock\n ts.Model(&dbBlock).Update(\"re_org\", true)\n for _, utxo := range utxos {\n ts.Model(&utxo).Update(\"re_org\", true)\n }\n ts.Commit()\n\n blockCh := make(chan common.QueryBlockResult)\n blockCh <- common.QueryBlockResult{Block: rawBlock, Chain: chain}\n createBlockResul := <- db.CreateBitcoinBlockWithUTXOs(blockCh)\n close(blockCh)\n if createBlockResul.Error == nil{\n bestBlock := createBlockResul.Block.(SimpleBitcoinBlock)\n configure.Sugar.Info(\"create block successfully,\", \" height: \", bestBlock.Height, \" hash: \", bestBlock.Hash)\n }\n configure.Sugar.Info(\"reorg:\", dbBlock.Height, \" \", dbBlock.Hash)\n } else {\n configure.Sugar.Info(\"tracking the same block, nothing happen \", dbBlock.Height)\n }\n }\n\n if trackHeight < bestBlockHeight - 5 {\n isTracking = false\n }else {\n isTracking = true\n trackHeight --\n }\n return isTracking, trackHeight\n}", "title": "" }, { "docid": "f4f8144fc780f989331a0585ba270871", "score": "0.49953625", "text": "func WaitForConfirmation(c *algod.Client, txid string, waitRounds uint64, ctx context.Context, headers ...*common.Header) (txInfo models.PendingTransactionInfoResponse, err error) { //nolint:revive // Ignore Context order for backwards compatibility\n\tresponse, err := c.Status().Do(ctx, headers...)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tlastRound := response.LastRound\n\tcurrentRound := lastRound + 1\n\n\tfor {\n\t\t// Check that the `waitRounds` has not passed\n\t\tif currentRound > lastRound+waitRounds {\n\t\t\terr = fmt.Errorf(\"Wait for transaction id %s timed out\", txid)\n\t\t\treturn\n\t\t}\n\n\t\ttxInfo, _, err = c.PendingTransactionInformation(txid).Do(ctx, headers...)\n\t\tif err == nil {\n\t\t\tif len(txInfo.PoolError) != 0 {\n\t\t\t\t// The transaction has been rejected\n\t\t\t\terr = fmt.Errorf(\"Transaction rejected: %s\", txInfo.PoolError)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif txInfo.ConfirmedRound > 0 {\n\t\t\t\t// The transaction has been confirmed\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\t// Note that we intentionally ignore errors from PendingTransactionInformation, since it\n\t\t// may return 404 if the algod instance is behind a load balancer and the request goes\n\t\t// to a different algod than the one we submitted the transaction to\n\n\t\t// Wait until the block for the `currentRound` is confirmed\n\t\tresponse, err = c.StatusAfterBlock(currentRound).Do(ctx, headers...)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// Increment the `currentRound`\n\t\tcurrentRound++\n\t}\n}", "title": "" }, { "docid": "4fc17ccc09614181a69a04c0a20c97ee", "score": "0.49934185", "text": "func SaveBlock(block *types.Block) error {\n\n\texists, err := BlockExists(block.StateHash)\n\tif err == nil && exists {\n\t\treturn fmt.Errorf(\"error block %v has already been indexed\", block.StateHash)\n\t}\n\n\ttx, err := DB.Beginx()\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error starting db tx: %w\", err)\n\t}\n\tdefer tx.Rollback()\n\n\tlogger.Infof(\"saving block data\")\n\t_, err = tx.NamedExec(`INSERT INTO blocks (\n\t\t\t\t\t\t\t\t\tstatehash,\n \t\t\t\tcanonical,\n\t\t\t\t\t\t\t\t\tpreviousstatehash,\n\t\t\t\t\t\t\t\t\tsnarkedledgerhash,\n\t\t\t\t\t\t\t\t\tstagedledgerhash,\n\t\t\t\t\t\t\t\t\tcoinbase,\n\t\t\t\t\t\t\t\t\tcreator,\n\t\t\t\t\t\t\t\t\tslot,\n\t\t\t\t\t\t\t\t\theight,\n\t\t\t\t\t\t\t\t\tepoch,\n\t\t\t\t\t\t\t\t\tts,\n\t\t\t\t\t\t\t\t\ttotalcurrency,\n\t\t\t\t\t\t\t\t\tusercommandscount,\n\t\t\t\t\t\t\t\t\tsnarkjobscount,\n\t\t\t\t\t\t\t\t\tfeetransfercount\n\t\t\t\t\t\t\t\t) VALUES (\n\t\t\t\t\t\t\t\t\t:statehash,\n\t\t\t\t\t\t\t\t\t:canonical,\n\t\t\t\t\t\t\t\t\t:previousstatehash,\n\t\t\t\t\t\t\t\t\t:snarkedledgerhash,\n\t\t\t\t\t\t\t\t\t:stagedledgerhash,\n\t\t\t\t\t\t\t\t\t:coinbase,\n\t\t\t\t\t\t\t\t\t:creator,\n\t\t\t\t\t\t\t\t\t:slot,\n\t\t\t\t\t\t\t\t\t:height,\n\t\t\t\t\t\t\t\t\t:epoch,\n\t\t\t\t\t\t\t\t\t:ts,\n\t\t\t\t\t\t\t\t\t:totalcurrency,\n\t\t\t\t\t\t\t\t\t:usercommandscount,\n\t\t\t\t\t\t\t\t\t:snarkjobscount,\n\t\t\t\t\t\t\t\t\t:feetransfercount)\n\t\t\t\t\t\t\t\tON CONFLICT DO NOTHING`, block)\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error executing block insert db query: %w\", err)\n\t}\n\n\tlogger.Infof(\"saving snark job data\")\n\tfor _, sj := range block.SnarkJobs {\n\t\t_, err = tx.NamedExec(`INSERT INTO snarkjobs (blockstatehash, canonical, index, jobids, prover, fee) VALUES (:blockstatehash, :canonical, :index, :jobids, :prover, :fee) ON CONFLICT DO NOTHING`, sj)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error executing snark job insert db query: %w\", err)\n\t\t}\n\t}\n\n\tlogger.Infof(\"saving fee transfers data\")\n\tfor _, ft := range block.FeeTransfers {\n\t\t_, err := tx.NamedExec(`INSERT INTO feetransfers (blockstatehash, canonical, index, recipient, fee) VALUES (:blockstatehash, :canonical, :index, :recipient, :fee) ON CONFLICT DO NOTHING `, ft)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error executing fee transfer insert db query: %w\", err)\n\t\t}\n\t}\n\n\tlogger.Infof(\"saving user jobs data\")\n\tfor _, uj := range block.UserJobs {\n\t\t_, err := tx.NamedExec(`INSERT INTO userjobs (blockstatehash, canonical, index, id, sender, recipient, memo, fee, amount, nonce, delegation) VALUES (:blockstatehash, :canonical, :index, :id, :sender, :recipient, :memo, :fee, :amount, :nonce, :delegation) ON CONFLICT DO NOTHING`, uj)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error executing userjobs insert db query: %w\", err)\n\t\t}\n\n\t\t_, err = tx.Exec(\"INSERT INTO accounttransactions (publickey, blockstatehash, canonical, id, ts) VALUES ($1, $2, $3, $4, $5) ON CONFLICT DO NOTHING;\", uj.Sender, block.StateHash, false, uj.ID, block.Ts)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error executing accounttransactions userjob sender insert db query: %w\", err)\n\t\t}\n\n\t\t_, err = tx.Exec(\"INSERT INTO accounttransactions (publickey, blockstatehash, canonical, id, ts) VALUES ($1, $2, $3, $4, $5) ON CONFLICT DO NOTHING;\", uj.Recipient, block.StateHash, false, uj.ID, block.Ts)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error executing accounttransactions userjob recipient insert db query: %w\", err)\n\t\t}\n\t}\n\n\tlogger.Infof(\"updating proposed blocks statistics table\")\n\t_, err = tx.Exec(\"UPDATE accounts SET blocksproposed = blocksproposed + 1 WHERE publickey = $1\", block.Creator)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error incrementing blocksproposed column of accounts table: %w\", err)\n\t}\n\n\tlogger.Infof(\"committing tx\")\n\n\terr = tx.Commit()\n\treturn err\n}", "title": "" }, { "docid": "75bfaa788563e48d70ba98ff4292ca9c", "score": "0.49830845", "text": "func (c *Chain) AcceptBlock(blk block.Block) error {\n\n\tc.mu.Lock()\n\tdefer c.mu.Unlock()\n\n\tfield := logger.Fields{\"process\": \"accept block\"}\n\tl := log.WithFields(field)\n\n\tl.Trace(\"procedure started\")\n\n\t// 1. Check that stateless and stateful checks pass\n\tif err := verifiers.CheckBlock(c.db, c.prevBlock, blk); err != nil {\n\t\tl.Errorf(\"verification failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\t// 2. Check the certificate\n\t// This check should avoid a possible race condition between accepting two blocks\n\t// at the same height, as the probability of the committee creating two valid certificates\n\t// for the same round is negligible.\n\t// FIXME: make sure we actually have only one valid certificate per block (frontrunning consensus (please follow the fucking protocol already))\n\tif err := verifiers.CheckBlockCertificate(*c.p, blk); err != nil {\n\t\tl.Errorf(\"verifying the certificate failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\t// 3. Add provisioners and block generators\n\tc.addConsensusNodes(blk.Txs, blk.Header.Height)\n\n\t// 4. Store block in database\n\terr := c.db.Update(func(t database.Transaction) error {\n\t\treturn t.StoreBlock(&blk)\n\t})\n\n\tif err != nil {\n\t\tl.Errorf(\"block storing failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\tc.prevBlock = blk\n\n\t// 5. Gossip advertise block Hash\n\tif err := c.advertiseBlock(blk); err != nil {\n\t\tl.Errorf(\"block advertising failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\t// 6. Cleanup obsolete candidate blocks\n\tvar count uint32\n\terr = c.db.Update(func(t database.Transaction) error {\n\t\tcount, err = t.DeleteCandidateBlocks(blk.Header.Height)\n\t\treturn err\n\t})\n\n\tif err != nil {\n\t\t// Not critical enough to abort the accepting procedure\n\t\tlog.Warnf(\"DeleteCandidateBlocks failed with an error: %s\", err.Error())\n\t} else {\n\t\tlog.Infof(\"%d deleted candidate blocks\", count)\n\t}\n\n\t// 7. Remove expired provisioners and bids\n\t// We remove provisioners and bids from accepted block height + 1,\n\t// to set up our committee correctly for the next block.\n\tc.removeExpiredProvisioners(blk.Header.Height + 1)\n\tc.removeExpiredBids(blk.Header.Height + 1)\n\n\t// 8. Notify other subsystems for the accepted block\n\t// Subsystems listening for this topic:\n\t// mempool.Mempool\n\t// consensus.generation.broker\n\tbuf := new(bytes.Buffer)\n\tif err := marshalling.MarshalBlock(buf, &blk); err != nil {\n\t\tl.Errorf(\"block encoding failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\tc.eventBus.Publish(topics.AcceptedBlock, buf)\n\n\t// 9. Send round update\n\t// We send a round update after accepting a new block, which should include\n\t// a set of provisioners, and a bidlist. This allows the consensus components\n\t// to rehydrate their state properly for the next round.\n\tif err := c.sendRoundUpdate(blk.Header.Height+1, blk.Header.Seed, blk.Header.Hash); err != nil {\n\t\tl.Errorf(\"sending round update failed: %s\", err.Error())\n\t\treturn err\n\t}\n\n\tl.Trace(\"procedure ended\")\n\treturn nil\n}", "title": "" }, { "docid": "e355be29ae45b2700e97c39de10570d7", "score": "0.49727288", "text": "func (rw *readerWriter) updateBlocklist(tenantID string, add []*backend.BlockMeta, remove []*backend.BlockMeta, compactedAdd []*backend.CompactedBlockMeta) {\n\tif tenantID == \"\" {\n\t\treturn\n\t}\n\n\trw.blockListsMtx.Lock()\n\tdefer rw.blockListsMtx.Unlock()\n\n\t// ******** Regular blocks ********\n\tblocklist := rw.blockLists[tenantID]\n\n\tmatchedRemovals := make(map[uuid.UUID]struct{})\n\tfor _, b := range blocklist {\n\t\tfor _, rem := range remove {\n\t\t\tif b.BlockID == rem.BlockID {\n\t\t\t\tmatchedRemovals[rem.BlockID] = struct{}{}\n\t\t\t}\n\t\t}\n\t}\n\n\tnewblocklist := make([]*backend.BlockMeta, 0, len(blocklist)-len(matchedRemovals)+len(add))\n\tfor _, b := range blocklist {\n\t\tif _, ok := matchedRemovals[b.BlockID]; !ok {\n\t\t\tnewblocklist = append(newblocklist, b)\n\t\t}\n\t}\n\tnewblocklist = append(newblocklist, add...)\n\trw.blockLists[tenantID] = newblocklist\n\n\t// ******** Compacted blocks ********\n\trw.compactedBlockLists[tenantID] = append(rw.compactedBlockLists[tenantID], compactedAdd...)\n}", "title": "" }, { "docid": "1f685ea2dc16bef9aea9e7ffafe7cfc5", "score": "0.49725673", "text": "func (am AppModule) EndBlock(ctx sdk.Context, _ abci.RequestEndBlock) []abci.ValidatorUpdate {\n\t// Gas costs are handled within msg handler so costs should be ignored\n\tebCtx := ctx.WithBlockGasMeter(sdk.NewInfiniteGasMeter())\n\n\t// Update account balances before committing other parts of state\n\tam.keeper.csdb.UpdateAccounts()\n\n\t// Commit state objects to KV store\n\t_, err := am.keeper.csdb.WithContext(ebCtx).Commit(true)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Clear accounts cache after account data has been committed\n\tam.keeper.csdb.ClearStateObjects()\n\n\treturn []abci.ValidatorUpdate{}\n}", "title": "" }, { "docid": "bafa2872bb4a07e331114d8b568bcccf", "score": "0.49688265", "text": "func (s Server) MutateBalance(ctx context.Context, req *proto.RequestTransaction) (*proto.Block, error) {\n\tbid, err := uuid.FromString(req.Transaction.GetId())\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn nil, err\n\t}\n\n\tuserid, err := uuid.FromString(req.Transaction.GetUserId())\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn nil, err\n\t}\n\n\ttransaction := model.Transaction{\n\t\tID: bid,\n\t\tUserID: userid,\n\t\tAmount: req.Transaction.GetAmount(),\n\t}\n\n\tid, err := uuid.FromString(req.GetId())\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn nil, err\n\t}\n\n\tprevBlock, err := service.ServiceConnection.Repo.GetLastBlock()\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn nil, err\n\t}\n\n\tnewBlock, err := model.GenerateNewBlock(\n\t\tid,\n\t\treq.GetTimestamp(),\n\t\tproto.Block_MUTATE_BALANCE,\n\t\tprevBlock.Hash,\n\t\ttransaction,\n\t)\n\tif err != nil {\n\t\tlogrus.Error(err)\n\t\treturn nil, err\n\t}\n\n\treturn &proto.Block{\n\t\tId: newBlock.ID.String(),\n\t\tTimestamp: newBlock.Timestamp.Format(time.RFC3339),\n\t\tNonce: newBlock.Nonce,\n\t\tBlockType: newBlock.BlockType,\n\t\tPrevHash: newBlock.PrevHash,\n\t\tData: newBlock.Data,\n\t\tHash: newBlock.Hash,\n\t}, nil\n}", "title": "" }, { "docid": "2c8d01d1194ee744e0b942600bc98538", "score": "0.49577105", "text": "func processUpdate(update Update) {\n\n\toutLog.Printf(strconv.Itoa(client.id)+\":Got update for %d, I am at %d\\n\", update.Iteration, iterationCount)\n\n\tfor update.Iteration > iterationCount {\n\t\toutLog.Printf(strconv.Itoa(client.id)+\":Blocking for stale update. Update for %d, I am at %d\\n\", update.Iteration, iterationCount)\n\t\ttime.Sleep(2000 * time.Millisecond)\n\t}\n\n\t// Might get an update while I am in the announceToNetwork phase and when I come out of it the update becomes redundant\n\tif ((iterationCount == update.Iteration)) {\n\n\t\tupdateLock.Lock()\n\t\tnumberOfUpdates := client.addBlockUpdate(update)\n\t\tupdateLock.Unlock()\n\n\t\toutLog.Printf(\"As miner, I expect %d updates, I have gotten %d\", (NUM_SAMPLES / 2), numberOfUpdates)\n\n\t\t//send signal to start sending Block if all updates Received. Changed this from numVanilla stuff\n\t\tif numberOfUpdates == (NUM_SAMPLES/2) {\t\t\n\t\t\n\t\t// if numberOfUpdates == (numberOfNodes / 8) {\t\t\t\n\t\t\toutLog.Printf(strconv.Itoa(client.id)+\":Half updates for iteration %d received. Notifying channel.\", iterationCount)\t\n\t\t\tallUpdatesReceived <- true \t\t \n\t\t}\t\n\t\n\t}\n\n}", "title": "" }, { "docid": "b6651cee0fd4864ad2660681612d4f33", "score": "0.49566144", "text": "func (keyS *keyService) procKeyBlockDone(keyblock *types.KeyBlock) { //callback by key insertchain\n\tkeyS.s.updateCommittee(keyblock)\n\tlog.Info(\"@procKeyBlockDone\", \"number\", keyblock.NumberU64(), \"T_number\", keyblock.T_Number())\n\tkeyS.saveCommittee(keyblock)\n\t//log.Trace(\"@procKeyBlockDone.updateCurrentView\")\n\tkeyS.s.updateCurrentView(true)\n\t//log.Trace(\"@procKeyBlockDone.clearCandidate\")\n\tkeyS.clearCandidate()\n\t//log.Trace(\"@procKeyBlockDone..pace\")\n\tkeyS.s.procBlockDone(nil, keyblock)\n\t//log.Trace(\"@procKeyBlockDone..end\")\n}", "title": "" }, { "docid": "c06afba1bc59d1ede1b06c073f46dade", "score": "0.49530503", "text": "func (x *blockIndexer) DeleteTipBlock(ctx context.Context, blk *block.Block) error {\n\tx.mutex.Lock()\n\tdefer x.mutex.Unlock()\n\n\t// the block to be deleted must be exactly current top, otherwise counting index would not work correctly\n\theight := blk.Height()\n\tif height != x.tbk.Size()-1 {\n\t\treturn errors.Wrapf(db.ErrInvalid, \"wrong block height %d, expecting %d\", height, x.tbk.Size()-1)\n\t}\n\t// delete hash --> height\n\thash := blk.HashBlock()\n\tx.batch.Delete(_blockHashToHeightNS, hash[_hashOffset:], fmt.Sprintf(\"failed to delete block at height %d\", height))\n\t// delete from total block index\n\tif err := x.tbk.Revert(1); err != nil {\n\t\treturn err\n\t}\n\n\t// delete action index\n\tfCtx := protocol.MustGetFeatureCtx(protocol.WithFeatureCtx(protocol.WithBlockCtx(ctx, protocol.BlockCtx{\n\t\tBlockHeight: blk.Height(),\n\t})))\n\tfor _, selp := range blk.Actions {\n\t\tactHash, err := selp.Hash()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tx.batch.Delete(_actionToBlockHashNS, actHash[_hashOffset:], fmt.Sprintf(\"failed to delete action hash %x\", actHash))\n\t\tif err := x.indexAction(actHash, selp, false, fCtx.TolerateLegacyAddress); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\t// delete from total action index\n\tif err := x.tac.Revert(uint64(len(blk.Actions))); err != nil {\n\t\treturn err\n\t}\n\tif err := x.kvStore.WriteBatch(x.batch); err != nil {\n\t\treturn err\n\t}\n\tx.batch.Clear()\n\treturn nil\n}", "title": "" }, { "docid": "f8f798b72e179707a1c5509533109a52", "score": "0.49447697", "text": "func (b *blockManager) blockHandler() {\nout:\n\tfor {\n\t\tselect {\n\t\tcase m := <-b.msgChan:\n\t\t\tswitch msg := m.(type) {\n\t\t\tcase *newPeerMsg:\n\t\t\t\tb.handleNewPeerMsg(msg.peer)\n\n\t\t\tcase *txMsg:\n\t\t\t\tb.handleTxMsg(msg)\n\t\t\t\tmsg.reply <- struct{}{}\n\n\t\t\tcase *blockMsg:\n\t\t\t\tb.handleBlockMsg(msg)\n\t\t\t\tmsg.reply <- struct{}{}\n\n\t\t\tcase *invMsg:\n\t\t\t\tb.handleInvMsg(msg)\n\n\t\t\tcase *headersMsg:\n\t\t\t\tb.handleHeadersMsg(msg)\n\n\t\t\tcase *notFoundMsg:\n\t\t\t\tb.handleNotFoundMsg(msg)\n\n\t\t\tcase *donePeerMsg:\n\t\t\t\tb.handleDonePeerMsg(msg.peer)\n\n\t\t\tcase getSyncPeerMsg:\n\t\t\t\tvar peerID int32\n\t\t\t\tif b.syncPeer != nil {\n\t\t\t\t\tpeerID = b.syncPeer.ID()\n\t\t\t\t}\n\t\t\t\tmsg.reply <- peerID\n\n\t\t\tcase requestFromPeerMsg:\n\t\t\t\terr := b.requestFromPeer(msg.peer, msg.blocks, msg.txs)\n\t\t\t\tmsg.reply <- requestFromPeerResponse{\n\t\t\t\t\terr: err,\n\t\t\t\t}\n\n\t\t\tcase forceReorganizationMsg:\n\t\t\t\terr := b.cfg.Chain.ForceHeadReorganization(\n\t\t\t\t\tmsg.formerBest, msg.newBest)\n\n\t\t\t\tif err == nil {\n\t\t\t\t\t// Notify stake difficulty subscribers and prune\n\t\t\t\t\t// invalidated transactions.\n\t\t\t\t\tbest := b.cfg.Chain.BestSnapshot()\n\t\t\t\t\tif r := b.cfg.RpcServer(); r != nil {\n\t\t\t\t\t\tr.NotifyStakeDifficulty(\n\t\t\t\t\t\t\t&rpcserver.StakeDifficultyNtfnData{\n\t\t\t\t\t\t\t\tBlockHash: best.Hash,\n\t\t\t\t\t\t\t\tBlockHeight: best.Height,\n\t\t\t\t\t\t\t\tStakeDifficulty: best.NextStakeDiff,\n\t\t\t\t\t\t\t})\n\t\t\t\t\t}\n\t\t\t\t\tb.cfg.TxMemPool.PruneStakeTx(best.NextStakeDiff,\n\t\t\t\t\t\tbest.Height)\n\t\t\t\t\tb.cfg.TxMemPool.PruneExpiredTx()\n\t\t\t\t}\n\n\t\t\t\tmsg.reply <- forceReorganizationResponse{\n\t\t\t\t\terr: err,\n\t\t\t\t}\n\n\t\t\tcase tipGenerationMsg:\n\t\t\t\tg, err := b.cfg.Chain.TipGeneration()\n\t\t\t\tmsg.reply <- tipGenerationResponse{\n\t\t\t\t\thashes: g,\n\t\t\t\t\terr: err,\n\t\t\t\t}\n\n\t\t\tcase processBlockMsg:\n\t\t\t\tforkLen, isOrphan, err := b.processBlockAndOrphans(msg.block,\n\t\t\t\t\tmsg.flags)\n\t\t\t\tif err != nil {\n\t\t\t\t\tmsg.reply <- processBlockResponse{\n\t\t\t\t\t\tforkLen: forkLen,\n\t\t\t\t\t\tisOrphan: isOrphan,\n\t\t\t\t\t\terr: err,\n\t\t\t\t\t}\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tonMainChain := !isOrphan && forkLen == 0\n\t\t\t\tif onMainChain {\n\t\t\t\t\t// Notify stake difficulty subscribers and prune\n\t\t\t\t\t// invalidated transactions.\n\t\t\t\t\tbest := b.cfg.Chain.BestSnapshot()\n\t\t\t\t\tif r := b.cfg.RpcServer(); r != nil {\n\t\t\t\t\t\tr.NotifyStakeDifficulty(\n\t\t\t\t\t\t\t&rpcserver.StakeDifficultyNtfnData{\n\t\t\t\t\t\t\t\tBlockHash: best.Hash,\n\t\t\t\t\t\t\t\tBlockHeight: best.Height,\n\t\t\t\t\t\t\t\tStakeDifficulty: best.NextStakeDiff,\n\t\t\t\t\t\t\t})\n\t\t\t\t\t}\n\t\t\t\t\tb.cfg.TxMemPool.PruneStakeTx(best.NextStakeDiff,\n\t\t\t\t\t\tbest.Height)\n\t\t\t\t\tb.cfg.TxMemPool.PruneExpiredTx()\n\t\t\t\t}\n\n\t\t\t\tmsg.reply <- processBlockResponse{\n\t\t\t\t\tisOrphan: isOrphan,\n\t\t\t\t\terr: nil,\n\t\t\t\t}\n\n\t\t\tcase processTransactionMsg:\n\t\t\t\tacceptedTxs, err := b.cfg.TxMemPool.ProcessTransaction(msg.tx,\n\t\t\t\t\tmsg.allowOrphans, msg.rateLimit, msg.allowHighFees, msg.tag)\n\t\t\t\tmsg.reply <- processTransactionResponse{\n\t\t\t\t\tacceptedTxs: acceptedTxs,\n\t\t\t\t\terr: err,\n\t\t\t\t}\n\n\t\t\tdefault:\n\t\t\t\tbmgrLog.Warnf(\"Invalid message type in block handler: %T\", msg)\n\t\t\t}\n\n\t\tcase <-b.quit:\n\t\t\tbreak out\n\t\t}\n\t}\n\n\tb.wg.Done()\n\tbmgrLog.Trace(\"Block handler done\")\n}", "title": "" }, { "docid": "b78782cee2899597a04cea95194758c8", "score": "0.49394152", "text": "func (b *BlockChain) checkConnectBlock(node *blockNode, block *massutil.Block) error {\n\tif node.hash.IsEqual(config.ChainParams.GenesisHash) && b.bestChain == nil {\n\t\treturn nil\n\t}\n\n\terr := b.checkDupTx(node, block)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttxInputStore, err := b.fetchInputTransactions(node, block)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttransactions := block.Transactions()\n\ttotalSigOps := 0\n\tfor _, tx := range transactions {\n\t\tnumsigOps := CountSigOps(tx)\n\t\tlastSigops := totalSigOps\n\t\ttotalSigOps += numsigOps\n\t\tif totalSigOps < lastSigops || totalSigOps > MaxSigOpsPerBlock {\n\t\t\tstr := fmt.Sprintf(\"block contains too many \"+\n\t\t\t\t\"signature operations - got %v, max %v\",\n\t\t\t\ttotalSigOps, MaxSigOpsPerBlock)\n\t\t\treturn ruleError(ErrTooManySigOps, str)\n\t\t}\n\t}\n\n\tvar totalFees int64\n\tfor _, tx := range transactions {\n\t\ttxFee, err := CheckTransactionInputs(tx, node.height, txInputStore)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tlastTotalFees := totalFees\n\t\ttotalFees += txFee\n\t\tif totalFees < lastTotalFees {\n\t\t\treturn ruleError(ErrBadFees, \"total fees for block \"+\n\t\t\t\t\"overflows accumulator\")\n\t\t}\n\t}\n\n\tvar totalMaxwellOut int64\n\tfor _, txOut := range transactions[0].MsgTx().TxOut {\n\t\ttotalMaxwellOut += txOut.Value\n\t}\n\n\theadPubkey := block.MsgBlock().Header.PubKey\n\tif headPubkey != nil && !reflect.DeepEqual(headPubkey, wire.NewEmptyPoCPublicKey()) {\n\t\tcoinbaseValidate, reward, err := checkCoinbase(transactions[0], b.db, headPubkey, node.height, &config.ChainParams)\n\t\tif coinbaseValidate != true || err != nil {\n\t\t\treturn err\n\t\t}\n\t\texpectedMaxwellOut := reward + totalFees\n\n\t\tif totalMaxwellOut > expectedMaxwellOut {\n\t\t\tstr := fmt.Sprintf(\"coinbase transaction for block pays %v \"+\n\t\t\t\t\"which is more than expected value of %v\",\n\t\t\t\ttotalMaxwellOut, expectedMaxwellOut)\n\t\t\treturn ruleError(ErrBadCoinbaseValue, str)\n\t\t}\n\t}\n\n\tcheckpoint := b.LatestCheckpoint()\n\trunScripts := !b.noVerify\n\tif checkpoint != nil && uint64(node.height) <= checkpoint.Height {\n\t\trunScripts = false\n\t}\n\n\tprevNode, err := b.getPrevNodeFromNode(node)\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"getPrevNodeFromNode\", logging.LogFormat{\n\t\t\t\"err\": err,\n\t\t})\n\t\treturn err\n\t}\n\n\tvar scriptFlags txscript.ScriptFlags\n\n\tblockHeader := &block.MsgBlock().Header\n\tif blockHeader.Version >= 3 && b.isMajorityVersion(3, prevNode,\n\t\tconfig.ChainParams.BlockEnforceNumRequired) {\n\n\t\tscriptFlags |= txscript.ScriptVerifyDERSignatures\n\t}\n\n\tif blockHeader.Version >= 4 && b.isMajorityVersion(4, prevNode,\n\t\tconfig.ChainParams.BlockEnforceNumRequired) {\n\n\t\tscriptFlags |= txscript.ScriptVerifyCheckLockTimeVerify\n\t}\n\n\tscriptFlags |= txscript.ScriptVerifyCheckSequenceVerify\n\n\tmedianTime, err := b.CalcPastMedianTime()\n\n\tfor _, tx := range block.Transactions() {\n\t\tsequenceLock, err := b.calcSequenceLock(node, tx, txInputStore)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif !SequenceLockActive(sequenceLock, node.height,\n\t\t\tmedianTime) {\n\t\t\tstr := fmt.Sprintf(\"block contains \" +\n\t\t\t\t\"transaction whose input sequence \" +\n\t\t\t\t\"locks are not met\")\n\t\t\treturn ruleError(ErrUnfinalizedTx, str)\n\t\t}\n\t}\n\n\tif runScripts {\n\t\terr := checkBlockScripts(block, txInputStore, scriptFlags, b.sigCache, b.hashCache)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "79f13235b26528d5dd50285a5d7810ed", "score": "0.49383986", "text": "func (m *PoCMiner) submitBlock(block *massutil.Block, minerReward massutil.Amount) bool {\n\t// wait for proper time\n\tfor {\n\t\tif time.Now().After(block.MsgBlock().Header.Timestamp) {\n\t\t\tbreak\n\t\t}\n\t\ttime.Sleep(time.Second * pocSlot / 4)\n\t}\n\n\t// Process this block using the same rules as blocks coming from other\n\t// nodes. This will in turn relay it to the network like normal.\n\tisOrphan, err := m.chain.ProcessBlock(block)\n\tif err != nil {\n\t\tlogging.CPrint(logging.ERROR, \"block submitted via PoC miner rejected\",\n\t\t\tlogging.LogFormat{\"err\": err, \"hash\": block.Hash(), \"height\": block.Height()})\n\t\treturn false\n\t}\n\tif isOrphan {\n\t\tlogging.CPrint(logging.ERROR, \"block submitted via PoC miner is an orphan\",\n\t\t\tlogging.LogFormat{\"hash\": block.Hash(), \"height\": block.Height()})\n\t\treturn false\n\t}\n\n\t// The block was accepted.\n\tlogging.CPrint(logging.INFO, \"block submitted via PoC miner accepted\",\n\t\tlogging.LogFormat{\"hash\": block.Hash(), \"height\": block.Height(), \"amount\": minerReward})\n\n\t// send block to NetSync to broadcast it\n\tm.newBlockCh <- block.Hash()\n\n\t// prevent double-mining\n\tm.minedHeight[block.Height()] = struct{}{}\n\n\treturn true\n}", "title": "" }, { "docid": "74e2c68adc448146ec9c85494830447f", "score": "0.49350658", "text": "func (mp *TxPool) revealUpdate(key [32]byte) (unincludedTransactionCount int) {\n\tmp.mtx.Lock()\n\tdefer mp.mtx.Unlock()\n\n\tif v, ok := mp.votingMap[key]; ok {\n\t\tunincludedTransactionCount = len(v.votesMap)\n\t\tdelete(mp.votingMap, key)\n\t}\n\n\treturn 0\n\n}", "title": "" }, { "docid": "0a31c32f679058285f849694a0765cc1", "score": "0.4934148", "text": "func (btc *Backend) run(ctx context.Context) {\n\tdefer btc.shutdown()\n\n\tblockPoll := time.NewTicker(blockPollInterval)\n\tdefer blockPoll.Stop()\n\taddBlock := func(block *btcjson.GetBlockVerboseResult, reorg bool) {\n\t\t_, err := btc.blockCache.add(block)\n\t\tif err != nil {\n\t\t\tbtc.log.Errorf(\"error adding new best block to cache: %v\", err)\n\t\t}\n\t\tbtc.signalMtx.RLock()\n\t\tbtc.log.Tracef(\"Notifying %d %s asset consumers of new block at height %d\",\n\t\t\tlen(btc.blockChans), btc.name, block.Height)\n\t\tfor c := range btc.blockChans {\n\t\t\tselect {\n\t\t\tcase c <- &asset.BlockUpdate{\n\t\t\t\tErr: nil,\n\t\t\t\tReorg: reorg,\n\t\t\t}:\n\t\t\tdefault:\n\t\t\t\tbtc.log.Errorf(\"failed to send block update on blocking channel\")\n\t\t\t\t// Commented to try sends on future blocks.\n\t\t\t\t// close(c)\n\t\t\t\t// delete(btc.blockChans, c)\n\t\t\t\t//\n\t\t\t\t// TODO: Allow the receiver (e.g. Swapper.Run) to inform done\n\t\t\t\t// status so the channels can be retired cleanly rather than\n\t\t\t\t// trying them forever.\n\t\t\t}\n\t\t}\n\t\tbtc.signalMtx.RUnlock()\n\t}\n\n\tsendErr := func(err error) {\n\t\tbtc.log.Error(err)\n\t\tfor c := range btc.blockChans {\n\t\t\tselect {\n\t\t\tcase c <- &asset.BlockUpdate{\n\t\t\t\tErr: err,\n\t\t\t}:\n\t\t\tdefault:\n\t\t\t\tbtc.log.Errorf(\"failed to send sending block update on blocking channel\")\n\t\t\t\t// close(c)\n\t\t\t\t// delete(btc.blockChans, c)\n\t\t\t}\n\t\t}\n\t}\n\n\tsendErrFmt := func(s string, a ...interface{}) {\n\t\tsendErr(fmt.Errorf(s, a...))\n\t}\n\nout:\n\tfor {\n\t\tselect {\n\t\tcase <-blockPoll.C:\n\t\t\ttip := btc.blockCache.tip()\n\t\t\tbestHash, err := btc.node.GetBestBlockHash()\n\t\t\tif err != nil {\n\t\t\t\tsendErr(asset.NewConnectionError(\"error retrieving best block: %v\", err))\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif *bestHash == tip.hash {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tbest := bestHash.String()\n\t\t\tblock, err := btc.node.GetBlockVerbose(bestHash)\n\t\t\tif err != nil {\n\t\t\t\tsendErrFmt(\"error retrieving block %s: %v\", best, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// If this doesn't build on the best known block, look for a reorg.\n\t\t\tprevHash, err := chainhash.NewHashFromStr(block.PreviousHash)\n\t\t\tif err != nil {\n\t\t\t\tsendErrFmt(\"error parsing previous hash %s: %v\", block.PreviousHash, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// If it builds on the best block or the cache is empty, it's good to add.\n\t\t\tif *prevHash == tip.hash || tip.height == 0 {\n\t\t\t\tbtc.log.Debugf(\"New block %s (%d)\", bestHash, block.Height)\n\t\t\t\taddBlock(block, false)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// It is either a reorg, or the previous block is not the cached\n\t\t\t// best block. Crawl blocks backwards until finding a mainchain\n\t\t\t// block, flagging blocks from the cache as orphans along the way.\n\t\t\tiHash := &tip.hash\n\t\t\treorgHeight := int64(0)\n\t\t\tfor {\n\t\t\t\tif *iHash == zeroHash {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tiBlock, err := btc.node.GetBlockVerbose(iHash)\n\t\t\t\tif err != nil {\n\t\t\t\t\tsendErrFmt(\"error retrieving block %s: %v\", iHash, err)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tif iBlock.Confirmations > -1 {\n\t\t\t\t\t// This is a mainchain block, nothing to do.\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tif iBlock.Height == 0 {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\treorgHeight = iBlock.Height\n\t\t\t\tiHash, err = chainhash.NewHashFromStr(iBlock.PreviousHash)\n\t\t\t\tif err != nil {\n\t\t\t\t\tsendErrFmt(\"error decoding previous hash %s for block %s: %v\",\n\t\t\t\t\t\tiBlock.PreviousHash, iHash.String(), err)\n\t\t\t\t\t// Some blocks on the side chain may not be flagged as\n\t\t\t\t\t// orphaned, but still proceed, flagging the ones we have\n\t\t\t\t\t// identified and adding the new best block to the cache and\n\t\t\t\t\t// setting it to the best block in the cache.\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tvar reorg bool\n\t\t\tif reorgHeight > 0 {\n\t\t\t\treorg = true\n\t\t\t\tbtc.log.Infof(\"Reorg from %s (%d) to %s (%d) detected.\",\n\t\t\t\t\ttip.hash, tip.height, bestHash, block.Height)\n\t\t\t\tbtc.blockCache.reorg(reorgHeight)\n\t\t\t}\n\t\t\t// Now add the new block.\n\t\t\taddBlock(block, reorg)\n\t\tcase <-ctx.Done():\n\t\t\tbreak out\n\t\t}\n\t}\n}", "title": "" }, { "docid": "23f476b70090c1a94c0294a8252e0e12", "score": "0.4920002", "text": "func insertBlock() {\n\tpingP2P := getPingP2P()\n\tif pingP2P == okC {\n\t\tenabledAmount := false\n\t\trealAmount := 0\n\t\tfor enabledAmount == false {\n\t\t\tfmt.Println(options3Title11)\n\t\t\tfmt.Print(\"> \")\n\t\t\tstdReader := bufio.NewReader(os.Stdin)\n\t\t\tsendData, err := stdReader.ReadString('\\n')\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(exceptionReader)\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tsendData = strings.Replace(sendData, \"\\n\", \"\", -1)\n\t\t\t//check if is a number\n\t\t\tamount, err := strconv.Atoi(sendData)\n\t\t\tif err == nil && amount > 0 {\n\t\t\t\tif amount <= account.Amount {\n\t\t\t\t\tenabledAmount = true\n\t\t\t\t\trealAmount = amount\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Println(options3Title12)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfmt.Println(badFormatNumber)\n\t\t\t}\n\t\t}\n\t\tisUser := false\n\t\tvar userTarget Account\n\t\tfor isUser == false {\n\t\t\tfmt.Println(options3Title21)\n\t\t\tfmt.Print(\"> \")\n\t\t\tstdReader := bufio.NewReader(os.Stdin)\n\t\t\tsendData, err := stdReader.ReadString('\\n')\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(exceptionReader)\n\t\t\t\tlog.Fatal(err)\n\t\t\t}\n\t\t\tidUser := strings.Replace(sendData, \"\\n\", \"\", -1)\n\t\t\tif err == nil {\n\t\t\t\t//check if target user exists\n\t\t\t\tisUser = isUserInBank(idUser)\n\t\t\t\tif !isUser {\n\t\t\t\t\tfmt.Println(options3Title22)\n\t\t\t\t} else {\n\t\t\t\t\tuserTarget = getUserByID(idUser)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfmt.Println(badFormatNumber)\n\t\t\t}\n\t\t}\n\t\tfmt.Println(options3Title3 + userTarget.Name)\n\t\t//do transfer\n\t\tvar t Transaction\n\t\tt.Amount = realAmount\n\t\tt.SourceID = account.PublicID\n\t\tt.TargetID = userTarget.PublicID\n\t\taccount.Amount = account.Amount - t.Amount\n\t\tBlockchain = insertBlc(t, Blockchain, 2)\n\t\tlogEntry(account.Name, userTarget.Name, 2)\n\t\t//send to upload\n\t\tprepareUpload(0)\n\t} else {\n\t\tfmt.Println(koPingP2P)\n\t\tfmt.Println(reconnectingP2P)\n\t\tgeneralMain(true)\n\t}\n}", "title": "" }, { "docid": "9fe142bcab8d7d49e5352a6156ef28d0", "score": "0.49175137", "text": "func (abc *appBlockChain) VerifyBlock(block *wire.MsgBlock) error {\n\tif err := abc.verifyBlockHeader(&block.Header); err != nil {\n\t\treturn err\n\t}\n\n\tif err := abc.verifyBlockBody(block); err != nil {\n\t\treturn err\n\t}\n\n\terr := abc.verifyReduceActionsInBlock(block)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Verify the new ledger root is correct.\n\tupdate, err := abc.state.NewUpdate()\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Block body has been verified, so it's guaranteed that each transaction has same amount\n\t// txin and proofs.\n\tfor _, tx := range block.Body.Transactions {\n\t\tfor index := range tx.Tx.TxIn {\n\t\t\tif !tx.Tx.IsReduceTx() {\n\t\t\t\terr := update.MarkSpentOuts(&tx.Tx.TxIn[index].PreviousOutPoint, &tx.Proofs[index])\n\t\t\t\tif err != nil {\n\t\t\t\t\tabc.log.Errorf(\"failed to mark spent out, %v\", err)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tvar headers []*wire.BlockHeader\n\theaders, err = abc.state.GetBlockHeadersToAppend(&block.Body.LedgerInfo)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// verify headers that can be mounted\n\tfor _, header := range headers {\n\t\t// generateReduceTxsByHeader is used solely to identify whether the header can be mounted.\n\t\t_, err := abc.generateReduceTxsByHeader(header)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif err := update.AddHeaders(headers...); err != nil {\n\t\treturn err\n\t}\n\tnewShardLedgerRoot := update.DeltaTree.GetMerkleRoot()\n\tif block.Header.ShardLedgerMerkleRoot != *newShardLedgerRoot {\n\t\treturn fmt.Errorf(\"Wrong ledger merkle root\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dfa8bed65dfc3053195dae444543382f", "score": "0.4911065", "text": "func (idx *Indexer) UpdateExecutionToBlock(blk *block.Block, tx *sql.Tx) error {\n\tblockHash := blk.HashBlock()\n\tinsertQuery := \"INSERT execution_to_block SET node_address=?,execution_hash=?,block_hash=?\"\n\t_, _, executions := action.ClassifyActions(blk.Actions)\n\tfor _, execution := range executions {\n\t\texecutionHash := execution.Hash()\n\t\tif _, err := tx.Exec(insertQuery, idx.hexEncodedNodeAddr, hex.EncodeToString(executionHash[:]), blockHash[:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d15c698a79505622e45c444f837b316d", "score": "0.49076208", "text": "func (ns *Indexer) SyncBlock(block *types.Block) {\n\tnewHash := base58.Encode(block.Hash)\n\tnewHeight := block.Header.BlockNo\n\n\t// Check out-of-sync cases\n\tif ns.lastBlockHeight == 0 && newHeight > 0 { // Initial sync\n\t\t// Add missing blocks asynchronously\n\t\tgo ns.IndexBlocksInRange(0, newHeight-1)\n\t} else if newHeight > ns.lastBlockHeight+1 { // Skipped 1 or more blocks\n\t\t// Add missing blocks asynchronously\n\t\tgo ns.IndexBlocksInRange(ns.lastBlockHeight+1, newHeight-1)\n\t} else if newHeight <= ns.lastBlockHeight { // Rewound 1 or more blocks\n\t\t// This needs to be syncronous, otherwise it may\n\t\t// delete the block we are just about to add\n\t\tns.DeleteBlocksInRange(newHeight, ns.lastBlockHeight)\n\t}\n\n\t// Update state\n\tns.lastBlockHash = newHash\n\tns.lastBlockHeight = newHeight\n\n\t// Check specified sync range\n\tif newHeight < uint64(ns.startFrom) {\n\t\tns.log.Info().Uint64(\"blockNumber\", newHeight).Int64(\"startFrom\", ns.startFrom).Msg(\"Skipping block before specified sync range\")\n\t\treturn\n\t}\n\tif ns.stopAt != -1 && newHeight > uint64(ns.stopAt) {\n\t\tns.log.Info().Uint64(\"blockNumber\", newHeight).Int64(\"stopAt\", ns.stopAt).Msg(\"Reached end of specified sync range\")\n\t\tns.Stop()\n\t\treturn\n\t}\n\n\t// Index new block\n\tns.IndexBlock(block)\n}", "title": "" }, { "docid": "fc24629dc1627bc5e419f6e93bdc421f", "score": "0.49060297", "text": "func (s *Swapper) processBlock(block *blockNotification) {\n\tcompletions := make([]*matchTracker, 0)\n\ts.matchMtx.Lock()\n\tdefer s.matchMtx.Unlock()\n\tfor _, match := range s.matches {\n\t\t// If it's neither of the match assets, nothing to do.\n\t\tif match.makerStatus.swapAsset != block.assetID && match.takerStatus.swapAsset != block.assetID {\n\t\t\tcontinue\n\t\t}\n\t\tswitch match.Status {\n\t\tcase order.NewlyMatched:\n\t\tcase order.MakerSwapCast:\n\t\t\tif match.makerStatus.swapAsset != block.assetID {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// If the maker has broadcast their transaction, the taker's broadcast\n\t\t\t// timeout starts once the maker's swap has SwapConf confs.\n\t\t\ts.tryConfirmSwap(match.makerStatus)\n\t\tcase order.TakerSwapCast:\n\t\t\tif match.takerStatus.swapAsset != block.assetID {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\t// If the taker has broadcast their transaction, the maker's broadcast\n\t\t\t// timeout (for redemption) starts once the maker's swap has SwapConf\n\t\t\t// confs.\n\t\t\ts.tryConfirmSwap(match.takerStatus)\n\t\tcase order.MakerRedeemed:\n\t\t\t// It's the taker's turn to redeem. Nothing to do here.\n\t\t\tcontinue\n\t\tcase order.MatchComplete:\n\t\t\t// Once both redemption transactions have SwapConf confirmations, the\n\t\t\t// order is complete.\n\t\t\tmakerRedeemed, takerRedeemed := s.redeemStatus(match)\n\t\t\t// TODO: Can coins be unlocked now regardless of redemption?\n\t\t\tif makerRedeemed && takerRedeemed {\n\t\t\t\tcompletions = append(completions, match)\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, match := range completions {\n\t\ts.unlockOrderCoins(match.Taker)\n\t\ts.unlockOrderCoins(match.Maker)\n\t\t// Remove the completed match. Note that checkInaction may also remove\n\t\t// matches, so this entire function must lock even if there are no\n\t\t// completions.\n\t\tdelete(s.matches, match.ID().String())\n\t}\n}", "title": "" }, { "docid": "6d5a836c2286be953b641ff15a921e0e", "score": "0.48996863", "text": "func RollbackBlock(block *types.Block) error {\n\ttx, err := DB.Begin()\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error starting db tx: %w\", err)\n\t}\n\tdefer tx.Rollback()\n\n\t_, err = tx.Exec(\"UPDATE accounts SET blocksproposed = blocksproposed - 1 WHERE publickey = $1\", block.Creator)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error decrementing blocksporposed column of account table for pk %v: %w\", block.Creator, err)\n\t}\n\n\tfor _, snarkJob := range block.SnarkJobs {\n\t\t_, err := tx.Exec(\"UPDATE accounts SET snarkjobs = snarkjobs - 1 WHERE publickey = $1\", snarkJob.Prover)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error decrementing snarkjobs column of account table for pk %v: %w\", snarkJob.Prover, err)\n\t\t}\n\t}\n\tfor _, userJob := range block.UserJobs {\n\t\t_, err := tx.Exec(\"UPDATE accounts SET txsent = txsent - 1 WHERE publickey = $1\", userJob.Sender)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error decrementing txsent column of account table for pk %v: %w\", userJob.Sender, err)\n\t\t}\n\n\t\t_, err = tx.Exec(\"UPDATE accounts SET txreceived = txreceived - 1 WHERE publickey = $1\", userJob.Recipient)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error decrementing txreceived column of account table for pk %v: %w\", userJob.Recipient, err)\n\t\t}\n\n\t\t_, err = tx.Exec(\"DELETE FROM accounttransactions WHERE id = $1\", userJob.ID)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error deleting job %v from accounttransactions table: %w\", userJob.ID, err)\n\t\t}\n\t}\n\n\t_, err = tx.Exec(\"DELETE FROM snarkjobs WHERE blockstatehash = $1\", block.StateHash)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error block %v from snarkjobs table: %w\", block.StateHash, err)\n\t}\n\n\t_, err = tx.Exec(\"DELETE FROM feetransfers WHERE blockstatehash = $1\", block.StateHash)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error block %v from feetransfers table: %w\", block.StateHash, err)\n\t}\n\n\t_, err = tx.Exec(\"DELETE FROM userjobs WHERE blockstatehash = $1\", block.StateHash)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error block %v from userjobs table: %w\", block.StateHash, err)\n\t}\n\n\t_, err = tx.Exec(\"DELETE FROM blocks WHERE statehash = $1\", block.StateHash)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error deleting block %v from blocks table: %w\", block.StateHash, err)\n\t}\n\n\terr = tx.Commit()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error committing block %v rollback transaction: %w\", block.StateHash, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8a1727dc2d1d8efedd371cbef3f6fb69", "score": "0.48968875", "text": "func isBlockValid(newBlock, oldBlock network.Block) bool {\n\tif oldBlock.Index+1 != newBlock.Index {\n\t\treturn false\n\t}\n\n\tif oldBlock.Hash != newBlock.PrevHash {\n\t\treturn false\n\t}\n\n\tif calculateHash(newBlock) != newBlock.Hash {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "aed4da6c6d59898b8a049f92e955530e", "score": "0.48950264", "text": "func BlockOK(blk wire.MsgBlock) bool {\n\tvar txids, wtxids []*chainhash.Hash // txids and wtxids\n\t// witMode true if any tx has a wintess OR coinbase has wit commit\n\twitMode := false\n\n\tfor _, tx := range blk.Transactions { // make slice of (w)/txids\n\t\ttxid := tx.TxHash()\n\t\ttxids = append(txids, &txid)\n\t\tif !witMode && tx.HasWitness() {\n\t\t\twitMode = true\n\t\t}\n\t}\n\tif witMode {\n\t\tfor _, wtx := range blk.Transactions {\n\t\t\twtxid := wtx.WitnessHash()\n\t\t\twtxids = append(wtxids, &wtxid)\n\t\t}\n\t}\n\n\t// block minus witnesses should be < 1M\n\tif blk.SerializeSizeStripped() > 1000000 {\n\t\treturn false\n\t}\n\n\tvar commitBytes []byte\n\t// try to extract coinbase witness commitment (even if !witMode)\n\tcb := blk.Transactions[0] // get coinbase tx\n\tfor i := len(cb.TxOut) - 1; i >= 0; i-- { // start at the last txout\n\t\tif bytes.HasPrefix(cb.TxOut[i].PkScript, WitMagicBytes) &&\n\t\t\tlen(cb.TxOut[i].PkScript) > 37 {\n\t\t\t// 38 bytes or more, and starts with WitMagicBytes is a hit\n\t\t\tcommitBytes = cb.TxOut[i].PkScript[6:38]\n\t\t\twitMode = true // it there is a wit commit it must be valid\n\t\t}\n\t}\n\n\tif witMode { // witmode, so check witness tree\n\t\t// first find ways witMode can be disqualified\n\t\tif len(commitBytes) != 32 {\n\t\t\t// witness in block but didn't find a wintess commitment; fail\n\t\t\tlogging.Errorf(\"block %s has witness but no witcommit\",\n\t\t\t\tblk.BlockHash().String())\n\t\t\treturn false\n\t\t}\n\t\tif len(cb.TxIn) != 1 {\n\t\t\tlogging.Errorf(\"block %s coinbase tx has %d txins (must be 1)\",\n\t\t\t\tblk.BlockHash().String(), len(cb.TxIn))\n\t\t\treturn false\n\t\t}\n\t\t// something weird here with regtest, disable for now\n\t\t// The op_return is there but I'm not getting the 0000 witness.\n\t\t// maybe because I'm not getting a witness block..?\n\t\t/*\n\t\t\tif len(cb.TxIn[0].Witness) != 1 {\n\t\t\t\tlogging.Errorf(\"block %s coinbase has %d witnesses (must be 1)\",\n\t\t\t\t\tblk.BlockHash().String(), len(cb.TxIn[0].Witness))\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tif len(cb.TxIn[0].Witness[0]) != 32 {\n\t\t\t\tlogging.Errorf(\"block %s coinbase has %d byte witness nonce (not 32)\",\n\t\t\t\t\tblk.BlockHash().String(), len(cb.TxIn[0].Witness[0]))\n\t\t\t\treturn false\n\t\t\t}\n\t\t\t// witness nonce is the cb's witness, subject to above constraints\n\t\t\twitNonce, err := chainhash.NewHash(cb.TxIn[0].Witness[0])\n\t\t\tif err != nil {\n\t\t\t\tlogging.Errorf(\"Witness nonce error: %s\", err.Error())\n\t\t\t\treturn false // not sure why that'd happen but fail\n\t\t\t}\n\n\t\t\tvar empty [32]byte\n\t\t\twtxids[0].SetBytes(empty[:]) // coinbase wtxid is 0x00...00\n\n\t\t\t// witness root calculated from wtixds\n\t\t\twitRoot := calcRoot(wtxids)\n\n\t\t\tcalcWitCommit := chainhash.DoubleHashH(\n\t\t\t\tappend(witRoot.CloneBytes(), witNonce.CloneBytes()...))\n\n\t\t\t// witness root given in coinbase op_return\n\t\t\tgivenWitCommit, err := chainhash.NewHash(commitBytes)\n\t\t\tif err != nil {\n\t\t\t\tlogging.Errorf(\"Witness root error: %s\", err.Error())\n\t\t\t\treturn false // not sure why that'd happen but fail\n\t\t\t}\n\t\t\t// they should be the same. If not, fail.\n\t\t\tif !calcWitCommit.IsEqual(givenWitCommit) {\n\t\t\t\tlogging.Errorf(\"Block %s witRoot error: calc %s given %s\",\n\t\t\t\t\tblk.BlockHash().String(),\n\t\t\t\t\tcalcWitCommit.String(), givenWitCommit.String())\n\t\t\t\treturn false\n\t\t\t}\n\t\t*/\n\t}\n\n\t// got through witMode check so that should be OK;\n\t// check regular txid merkleroot. Which is, like, trivial.\n\treturn blk.Header.MerkleRoot.IsEqual(calcRoot(txids))\n}", "title": "" } ]
d0d50b038e6b4361e16e0b70d126223c
AreEqual determines if two users are equal
[ { "docid": "cc2bd2e16f48fa4ee359f8ccea543870", "score": "0.7357568", "text": "func AreEqual(left *ent.User, right *ent.User) bool {\n\tswitch {\n\tcase left.ID != right.ID:\n\t\treturn false\n\tcase left.Age != right.Age:\n\t\treturn false\n\tcase left.Name != right.Name:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "title": "" } ]
[ { "docid": "3ee84b42e48500a0949d513099b30504", "score": "0.7549333", "text": "func compareUsers(a, b User) bool {\n\tif &a == &b || (a.Email == b.Email && a.Password == b.Password) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f4c1bd15994dad10b6d4c8fabce5c92b", "score": "0.69358504", "text": "func (m1 *User) IsEqual(m2 interface{}) bool {\n\tconvertedM2 := m2.(*User)\n\tisNil, resolve := helpers.CheckNil(m1, m2)\n\tif resolve {\n\t\treturn isNil\n\t}\n\n\tif (m1.CreatedAt == nil) != (convertedM2.CreatedAt == nil) ||\n\t\t(m1.UpdatedAt == nil) != (convertedM2.UpdatedAt == nil) ||\n\t\t(m1.DeletedAt == nil) != (convertedM2.DeletedAt == nil) {\n\t\treturn false\n\t}\n\n\tif m1.AuthID != convertedM2.AuthID ||\n\t\tm1.FirstName != convertedM2.FirstName ||\n\t\tm1.LastName != convertedM2.LastName ||\n\t\tm1.Email != convertedM2.Email ||\n\t\tm1.ContactNumber != convertedM2.ContactNumber ||\n\t\tm1.Picture != convertedM2.Picture ||\n\t\tm1.Gender != convertedM2.Gender ||\n\t\thelpers.IsStringSliceEqual(m1.Roles, convertedM2.Roles) ||\n\t\tm1.CandidateID != convertedM2.CandidateID ||\n\t\tm1.JobCompanyID != convertedM2.JobCompanyID ||\n\t\t*m1.CreatedAt != *convertedM2.CreatedAt ||\n\t\t*m1.UpdatedAt != *convertedM2.UpdatedAt ||\n\t\t*m1.DeletedAt != *convertedM2.DeletedAt {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "5c58068831cd6fb77861494b2e44a53c", "score": "0.686538", "text": "func (u *User) Equal(other *User) bool {\n\tif other == nil {\n\t\treturn false\n\t}\n\n\treturn u.ID == other.ID &&\n\t\tu.Name == other.Name &&\n\t\tu.Username == other.Username\n}", "title": "" }, { "docid": "389c309117ebf65eca2842fb857b662c", "score": "0.67550766", "text": "func (u *User) Equals(b *User) bool {\n\tswitch {\n\tcase u == nil || b == nil:\n\t\treturn false\n\tcase u == b:\n\t\treturn true\n\tcase u.ID != b.ID:\n\t\treturn false\n\tcase u.User != b.User:\n\t\treturn false\n\tcase u.Pass != b.Pass:\n\t\treturn false\n\tcase u.Name != b.Name:\n\t\treturn false\n\tcase u.Email != b.Email:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "d81ba928d3211dc5b2a532deece1453e", "score": "0.67510724", "text": "func (user User) IsEqual(otherUser User) bool {\n\treturn user.FullName == otherUser.FullName &&\n\t\tuser.LoginName == otherUser.LoginName &&\n\t\tstrset.New(user.Groups...).IsEqual(strset.New(otherUser.Groups...))\n}", "title": "" }, { "docid": "5a3e345a4ce494cc4f0e4d27754b9e0d", "score": "0.6723262", "text": "func UsersEquals(u types.User, other types.User) bool {\n\treturn cmp.Equal(u, other,\n\t\tignoreProtoXXXFields(),\n\t\tcmpopts.IgnoreFields(types.Metadata{}, \"ID\"),\n\t\tcmpopts.SortSlices(func(a, b *types.MFADevice) bool {\n\t\t\treturn a.Metadata.Name < b.Metadata.Name\n\t\t}),\n\t)\n}", "title": "" }, { "docid": "314e5b4928b6882afe77de95fedc6fb4", "score": "0.64864117", "text": "func (a Person) Equal(b PersonWithPasswords) bool {\n\tif !a.State.Equal(b.State) { // this is most likely to not be equal so we check it first\n\t\treturn false\n\t}\n\tif a.Name != b.Name {\n\t\treturn false\n\t}\n\tif a.Username != b.Username {\n\t\treturn false\n\t}\n\tif a.Email != b.Email {\n\t\treturn false\n\t}\n\tif b.Password != \"\" {\n\t\treturn false\n\t}\n\tif a.LastSeen != b.LastSeen {\n\t\treturn false\n\t}\n\tif a.AllowLogin != b.AllowLogin {\n\t\treturn false\n\t}\n\tif a.IsAdmin != b.IsAdmin {\n\t\treturn false\n\t}\n\tif b.NewPassword != \"\" {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "c4685ff6490c0dedce559c29f2c99527", "score": "0.63411653", "text": "func (us *CsUsers) IsEqual(specObj interface{}, parentSpecObj interface{}) (bool, error) {\n\tspec, ok := specObj.(csv3.UserSpec)\n\tif !ok {\n\t\treturn false, fmt.Errorf(\"The object is not of type UserSpec\")\n\t}\n\n\tuser, ok := parentSpecObj.(*csv3.User)\n\tif !ok {\n\t\treturn false, fmt.Errorf(\"The object is not of type User\")\n\t}\n\n\tif user.Spec.Name != spec.Name || user.Spec.AvatarURL != spec.AvatarURL {\n\t\treturn false, nil\n\t}\n\n\tif len(user.Spec.SSHKeys) != len(spec.SSHKeys) {\n\t\treturn false, nil\n\t}\n\n\tbyID := make(map[string]csv3.SSHKeySpec, 0)\n\tfor _, key := range user.Spec.SSHKeys {\n\t\tbyID[key.ID] = key\n\t}\n\n\treturn sshKeysEqualCompare(spec.SSHKeys, byID), nil\n}", "title": "" }, { "docid": "254c8fb46ee3a5a46241ea0c8363d176", "score": "0.62617636", "text": "func UserDataEqual(o1, o2 *UserDataOption) bool {\n\treturn o1.Equal(o2)\n}", "title": "" }, { "docid": "dcd0df974598fa8cabe85af1219b6820", "score": "0.6212173", "text": "func (auth1 *Auth) Equal(auth2 *Auth) bool {\n\treturn auth1.Username == auth2.Username && auth1.Password == auth2.Password\n}", "title": "" }, { "docid": "b7f1b011368e63fbdd513f70b9928374", "score": "0.6132617", "text": "func TestAddUser2(t *testing.T) {\n\n\tusername := \"Jazzyjazz0713\"\n\n\tfoundUser := AddUser(username)\n\n\tif foundUser == username {\n\t\tt.Errorf(\"The username did not change\")\n\t}\n\n}", "title": "" }, { "docid": "38c76f948781114ecce169f35fcfb7df", "score": "0.6046361", "text": "func (utxo *UTXO) Equal(other *UTXO) bool {\n\tif (utxo.Index == other.Index) && (utxo.TxHash == other.TxHash) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "6ca55a7e67c3f45d35ee73a984197590", "score": "0.6002967", "text": "func TestUsersToUser(t *testing.T) {\n\tinvalidNew := NewUser{Email: \"invalid\", Password: \"pass123\", PasswordConf: \"pass123\", UserName: \"userName\", FirstName: \"user\", LastName: \"name\"}\n\tvalidNew := NewUser{Email: \"email@uw.edu\", Password: \"pass123\", PasswordConf: \"pass123\", UserName: \"userName\", FirstName: \"user\", LastName: \"name\"}\n\n\tcases := []struct {\n\t\tname string\n\t\thint string\n\t\tUser NewUser\n\t\texpectError bool\n\t}{\n\t\t{\"Invalid User\", \"Make sure you are validating user properly\", invalidNew, true},\n\t\t{\"Valid User\", \"Make sure no error is returned if valid user\", validNew, false},\n\t}\n\tfor _, c := range cases {\n\t\t//test saving user\n\t\tu, err := c.User.ToUser()\n\t\t// identical user for checking photoURL when spaces added to email\n\t\tc.User.Email = c.User.Email + \" \"\n\t\tuSpaceAdded, err := c.User.ToUser()\n\t\t// identical user for checking photoURL when spaces added to email\n\t\tc.User.Email = strings.ToUpper(c.User.Email)\n\t\tuAllCaps, err := c.User.ToUser()\n\t\tif err != nil && !c.expectError {\n\t\t\tt.Errorf(\"case %s: unexpected error: %v\\nHINT: %s\", c.name, err, c.hint)\n\t\t\t// verify that user has correct field names\n\t\t\tif c.User.Email != u.Email {\n\t\t\t\tt.Errorf(\"case %s: Email field set incorrectly\", c.name)\n\t\t\t}\n\t\t\tif c.User.UserName != u.UserName {\n\t\t\t\tt.Errorf(\"case %s: Email field set incorrectly\", c.name)\n\t\t\t}\n\t\t\tif c.User.FirstName != u.FirstName {\n\t\t\t\tt.Errorf(\"case %s: Email field set incorrectly\", c.name)\n\t\t\t}\n\t\t\tif c.User.LastName != u.LastName {\n\t\t\t\tt.Errorf(\"case %s: Email field set incorrectly\", c.name)\n\t\t\t}\n\t\t\t// check passHash\n\t\t\tif err := bcrypt.CompareHashAndPassword(u.PassHash, []byte(c.User.Password)); err != nil {\n\t\t\t\tt.Errorf(\"case %s: Password hash was set incorrectly\", c.name)\n\t\t\t}\n\t\t\tif uSpaceAdded.PhotoURL != u.PhotoURL {\n\t\t\t\tt.Errorf(\"case %s: photoURL was not set correctly\", c.name)\n\t\t\t}\n\t\t\tif uAllCaps.PhotoURL != u.PhotoURL {\n\t\t\t\tt.Errorf(\"case %s: photoURL was not set correctly\", c.name)\n\t\t\t}\n\t\t}\n\t\tif c.expectError && err == nil {\n\t\t\tt.Errorf(\"case %s: expected error but didn't get one\\nHINT: %s\", c.name, c.hint)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "de8db7f95032cf50a2f1ca9ecb7bbcaf", "score": "0.5957151", "text": "func CompareUserMatch(m1, m2 *order.UserMatch) error {\n\tif !bytes.Equal(m1.OrderID[:], m2.OrderID[:]) {\n\t\treturn fmt.Errorf(\"OrderID mismatch. %s != %s\", m1.OrderID, m2.OrderID)\n\t}\n\tif !bytes.Equal(m1.MatchID[:], m2.MatchID[:]) {\n\t\treturn fmt.Errorf(\"MatchID mismatch. %s != %s\", m1.MatchID, m2.MatchID)\n\t}\n\tif m1.Quantity != m2.Quantity {\n\t\treturn fmt.Errorf(\"Quantity mismatch. %d != %d\", m1.Quantity, m2.Quantity)\n\t}\n\tif m1.Rate != m2.Rate {\n\t\treturn fmt.Errorf(\"Rate mismatch. %d != %d\", m1.Rate, m2.Rate)\n\t}\n\tif m1.Address != m2.Address {\n\t\treturn fmt.Errorf(\"Address mismatch. %s != %s\", m1.Address, m2.Address)\n\t}\n\tif m1.Status != m2.Status {\n\t\treturn fmt.Errorf(\"Status mismatch. %d != %d\", m1.Status, m2.Status)\n\t}\n\tif m1.Side != m2.Side {\n\t\treturn fmt.Errorf(\"Side mismatch. %d != %d\", m1.Side, m2.Side)\n\t}\n\tif m1.FeeRateSwap != m2.FeeRateSwap {\n\t\treturn fmt.Errorf(\"FeeRateSwap mismatch. %d != %d\", m1.FeeRateSwap, m2.FeeRateSwap)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f4eab956805882e1b5235a345af850ac", "score": "0.59177667", "text": "func TestUserComparePassword(t *testing.T) {\n\tusr := &User{Password: \"asdfasdf\"}\n\tusr.HashPassword(testBcryptCost)\n\n\tif !usr.ComparePassword(\"asdfasdf\") {\n\t\tt.Error(\"ComparePassword() should work\")\n\t}\n}", "title": "" }, { "docid": "cd69ce12c71a0ccddc2e0dbddb34752c", "score": "0.5871538", "text": "func (up *UserPerm) Equals(b *UserPerm) bool {\n\tswitch {\n\tcase up == nil || b == nil:\n\t\treturn false\n\tcase *up != *b:\n\t\treturn false\n\tdefault:\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "52e053c361fd59bc8624b5729c36627b", "score": "0.58636117", "text": "func (u *UsersProduct) Equals(secondProduct *UsersProduct) bool {\n\tif u.ID != secondProduct.ID {\n\t\treturn false\n\t}\n\tif u.UserID != secondProduct.UserID {\n\t\treturn false\n\t}\n\tif u.ProductID != secondProduct.ProductID {\n\t\treturn false\n\t}\n\tif u.Amount != secondProduct.Amount {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "4b4cc451e7e808187c66468b244669ff", "score": "0.5849645", "text": "func TestEquals(t *testing.T) {\n\ttype User struct {\n\t\tname string\n\t\tage int\n\t}\n\n\tu1 := User{\"u1\", 18}\n\tu11 := User{\"u1\", 18}\n\tu12 := User{\"u1\", 20}\n\n\tassert.True(t, u1 == u11)\n\tassert.True(t, u1 != u12)\n\n\tuser2 := User{\"u2\", 18}\n\tu2 := &user2\n\tu21 := &User{\"u2\", 18}\n\tu22 := u2\n\tassert.True(t, u2 != u21)\n\tassert.True(t, *u2 == *u21)\n\tassert.True(t, u2 == u22)\n\n\tarr1 := &[]User{u1, u11}\n\tarr11 := &[]User{u1, u11}\n\tarr12 := arr1\n\tassert.True(t, arr1 != arr11)\n\tassert.True(t, arr1 == arr12)\n\n\tm1 := &map[string]User{\"1\": u1, \"2\": u11}\n\tm11 := &map[string]User{\"1\": u1, \"2\": u11}\n\tm12 := m1\n\tassert.True(t, m1 != m11)\n\tassert.True(t, m1 == m12)\n\n\tv1 := reflect.ValueOf(u1)\n\tv11 := reflect.ValueOf(u1)\n\tassert.True(t, v1.Interface() == v11.Interface())\n\tassert.False(t, v1.CanAddr())\n\n\tv2 := reflect.ValueOf(u2)\n\tv21 := reflect.ValueOf(u2)\n\tp2 := v2.Pointer()\n\tp21 := v21.Pointer()\n\tassert.True(t, p2 == p21)\n\n\taddr2 := v2.Elem().UnsafeAddr()\n\taddr21 := v21.Elem().UnsafeAddr()\n\tassert.True(t, addr2 == addr21)\n\tassert.True(t, p2 == addr2)\n\n\tuserType := reflect.TypeOf(user2)\n\tuserPtrType := reflect.PtrTo(userType)\n\tt.Logf(\"user type: %v , ptr type: %v\", userType, userPtrType)\n\n\tv22 := reflect.NewAt(userPtrType, unsafe.Pointer(u2))\n\tp22 := v22.Pointer()\n\tassert.True(t, p2 == p22)\n\n\tuser3 := reflect.New(userType)\n\tp3 := reflect.New(userPtrType)\n\tp3.Elem().Set(user3)\n\tt.Logf(\"user3 type: %v , p3 type: %v\", user3.Type(), p3.Type())\n\n\tassert.True(t, user3.Interface() == p3.Elem().Interface())\n\tassert.True(t, p3.Pointer() == p3.Elem().UnsafeAddr())\n\tassert.True(t, p3.Elem().Pointer() == user3.Elem().UnsafeAddr())\n}", "title": "" }, { "docid": "a35f7224debbb3b1e2a3c6061665b7c6", "score": "0.5836227", "text": "func (u UTCTimestamp) Equal(other UTCTimestamp) bool {\n\treturn u == other\n}", "title": "" }, { "docid": "6e6203096bf49253b008bfd52280dd8a", "score": "0.5797211", "text": "func StorageUnicityValid(u1 User, u2 User) (error, bool) {\n\n if u1.Id == u2.Id {\n return fmt.Errorf(\"Id already exist\"), false\n }\n\n if u1.Email == u2.Email {\n return fmt.Errorf(\"Email already exist\"), false\n }\n\n return nil, true\n}", "title": "" }, { "docid": "fb752c89441741fe7edf1372e674c2f4", "score": "0.5747385", "text": "func (u *UserData) CheckIfSameUsernameWithOtherUser(sr *RestfullServer) (bool,error){\n\tvar adaUsernameYgSama = false\n\n\tdb := sr.Db.connect()\n\tdefer db.Close()\n\n\terrUserQuery := db.QueryRow(\"select IF(COUNT(*),'true','false') from User where Username=? and IdUser !=?\",u.UserName,u.IdUser).Scan(&adaUsernameYgSama)\n\tif errUserQuery != nil {\n\t\treturn adaUsernameYgSama,errUserQuery\n\t}\n\n\treturn adaUsernameYgSama,nil\n}", "title": "" }, { "docid": "ea64899767586992b51705ca32d56b11", "score": "0.56869185", "text": "func objectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\tif reflect.DeepEqual(expected, actual) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "901a45df77aa669e46c6a0bb9ef38528", "score": "0.5616723", "text": "func (m1 *UserSkill) IsEqual(m2 interface{}) bool {\n\tconvertedM2 := m2.(*UserSkill)\n\tisNil, resolve := helpers.CheckNil(m1, m2)\n\tif resolve {\n\t\treturn isNil\n\t}\n\n\tif m1.CandidateID != convertedM2.CandidateID ||\n\t\tm1.SkillID != convertedM2.SkillID ||\n\t\t*m1.CreatedAt != *convertedM2.CreatedAt ||\n\t\t*m1.UpdatedAt != *convertedM2.UpdatedAt {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "2510684f3e2409fad76853fb1e6ee655", "score": "0.559532", "text": "func (a Account) Equal(b Account) (bool, error) {\n\tif a.ID != b.ID {\n\t\treturn false, nil\n\t}\n\tif !a.Account.Equal(b.Account) {\n\t\treturn false, nil\n\t}\n\tif !a.deletedAt.Equal(b.deletedAt) {\n\t\treturn false, errors.New(\"accounts are equal but one has been deleted\")\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "9d58a27854936857fe1d4038b809c8f6", "score": "0.5593645", "text": "func TestRegisterUser(t *testing.T) {\n\tdb := startUpDatabase()\n\tdefer db.Close()\n\tuserRepository := repository.NewUserRepository(db)\n\n\tvar cases = []struct {\n\t\tname string\n\t\temail string\n\t\tpassword string\n\t\timage string\n\t}{\n\t\t{\"user9\", \"user9@example.com\", \"password\", \"test\"},\n\t\t{\"user10\", \"user10@example.com\", \"hoge\", \"test\"},\n\t}\n\tfor _, c := range cases {\n\t\tsalt := helper.Salt(Rand)\n\t\tsalted := helper.Stretch(c.password, salt)\n\t\tact, err := userRepository.RegisterUser(c.name, c.email, salt, salted, c.image)\n\t\tif err != nil {\n\t\t\tt.Errorf(err.Error())\n\t\t}\n\t\tif act.Name != c.name && act.Email != c.email && act.Salt != salt && act.Salted != salted && act.IconImage != c.image {\n\t\t\tt.Errorf(\"Cannot create correct user data\")\n\n\t\t\tif act.Name != c.name {\n\t\t\t\tt.Errorf(\"input name is %v, but actual return data is %v\", c.name, act.Name)\n\t\t\t}\n\t\t\tif act.Email != c.email {\n\t\t\t\tt.Errorf(\"input email is %v, but actual return data is %v\", c.email, act.Email)\n\t\t\t}\n\t\t\tif act.Salt != salt {\n\t\t\t\tt.Errorf(\"salt is %v, but actual return data is %v\", salt, act.Salt)\n\t\t\t}\n\t\t\tif act.Salted != salted {\n\t\t\t\tt.Errorf(\"salted is %v, but actual return data is %v\", salted, act.Salted)\n\t\t\t}\n\t\t\tif act.IconImage != c.image {\n\t\t\t\tt.Errorf(\"input image is %v, but actual return data is %v\", c.image, act.IconImage)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f06a27e41ddff5465af7e1c4eacf4790", "score": "0.5569181", "text": "func TestCreateUser(t *testing.T) {\n\tdefer BeforeAndAfter()()\n\tuser := Users{\n\t\tFirstname: uniuri.New(),\n\t\tLastname: uniuri.New()}\n\n\trepository.CreateUser(user)\n\n\tvar createdUser Users\n\ttransaction.First(&createdUser, 1)\n\n\tif createdUser.Firstname != user.Firstname && createdUser.Lastname != createdUser.Lastname {\n\t\tt.Error(\"User was not created.\")\n\t}\n}", "title": "" }, { "docid": "984b1419eed96e41d4100a9665137f37", "score": "0.55589944", "text": "func objectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\treturn reflect.DeepEqual(expected, actual)\n}", "title": "" }, { "docid": "6c19d0deca8e6b75a9518a64b4a95c34", "score": "0.55133724", "text": "func IsItTheSameUser(tokenString string, userName string, ipAddr string, verifyKey []byte) (bool, error) {\n\ttokenData, err := ParseToken(tokenString, ipAddr, verifyKey)\n\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif tokenData.UserName == userName {\n\t\treturn true, nil\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "70e9aa11a7ff306e1c698c823f699a83", "score": "0.54912055", "text": "func (c *ClientChat) Equal(cl *ClientChat) bool {\n if bytes.Equal(strings.Bytes(c.Name), strings.Bytes(cl.Name)) {\n if c.Con == cl.Con {\n return true;\n }\n }\n return false;\n}", "title": "" }, { "docid": "37edfdaea5eb609dd5deb5821ac66b86", "score": "0.5467128", "text": "func Equal(u1 UUID, u2 UUID) bool {\r\n\treturn bytes.Equal(u1[:], u2[:])\r\n}", "title": "" }, { "docid": "c760797a4e5d0ccb5f629285f42bb2ff", "score": "0.54612774", "text": "func (inst *User) Staled(onlyFields ...string) bool {\n\tif inst.original == nil {\n\t\tinst.original = &userOriginal{}\n\t}\n\n\tif len(onlyFields) == 0 {\n\n\t\tif inst.Id != inst.original.Id {\n\t\t\treturn true\n\t\t}\n\t\tif inst.Uuid != inst.original.Uuid {\n\t\t\treturn true\n\t\t}\n\t\tif inst.Name != inst.original.Name {\n\t\t\treturn true\n\t\t}\n\t\tif inst.Account != inst.original.Account {\n\t\t\treturn true\n\t\t}\n\t\tif inst.Status != inst.original.Status {\n\t\t\treturn true\n\t\t}\n\t\tif inst.Password != inst.original.Password {\n\t\t\treturn true\n\t\t}\n\t\tif inst.CreatedAt != inst.original.CreatedAt {\n\t\t\treturn true\n\t\t}\n\t\tif inst.UpdatedAt != inst.original.UpdatedAt {\n\t\t\treturn true\n\t\t}\n\t} else {\n\t\tfor _, f := range onlyFields {\n\t\t\tswitch strcase.ToSnake(f) {\n\n\t\t\tcase \"id\":\n\t\t\t\tif inst.Id != inst.original.Id {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"uuid\":\n\t\t\t\tif inst.Uuid != inst.original.Uuid {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"name\":\n\t\t\t\tif inst.Name != inst.original.Name {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"account\":\n\t\t\t\tif inst.Account != inst.original.Account {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"status\":\n\t\t\t\tif inst.Status != inst.original.Status {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"password\":\n\t\t\t\tif inst.Password != inst.original.Password {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"created_at\":\n\t\t\t\tif inst.CreatedAt != inst.original.CreatedAt {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tcase \"updated_at\":\n\t\t\t\tif inst.UpdatedAt != inst.original.UpdatedAt {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t}\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4e358b49faaf89317e09b9e42c98b8f2", "score": "0.54586524", "text": "func (a *Access) equal(b *Access) bool {\n\tif a.parsed.Compare(b.parsed) != 0 {\n\t\treturn false\n\t}\n\tif len(a.list) != len(b.list) {\n\t\treturn false\n\t}\n\tfor i, al := range a.list {\n\t\tbl := b.list[i]\n\t\tif len(al) != len(bl) {\n\t\t\treturn false\n\t\t}\n\t\tfor j, ar := range al {\n\t\t\tif ar.Compare(bl[j]) != 0 {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d71201fcafe4e79e2f4d8afb3fbdaa6d", "score": "0.54514647", "text": "func (o *UserDataOption) Equal(o2 *UserDataOption) bool {\n\tif o == nil {\n\t\treturn o2 == nil || reflect.DeepEqual(o2.itf, map[string]interface{}{})\n\t}\n\tif o2 == nil {\n\t\treturn o == nil || reflect.DeepEqual(o.itf, map[string]interface{}{})\n\t}\n\tdata, err := json.Marshal(o.itf)\n\tdata2, err2 := json.Marshal(o2.itf)\n\treturn err == nil && err2 == nil && bytes.Equal(data, data2)\n}", "title": "" }, { "docid": "dcb646b364874aec167425ee81e5d521", "score": "0.54504853", "text": "func (a *Assertions) Equal(expected interface{}, actual interface{}, userMessageComponents ...interface{}) {\n\ta.assertion()\n\tif didFail, message := shouldBeEqual(expected, actual); didFail {\n\t\tfailNow(a.t, message, userMessageComponents...)\n\t}\n}", "title": "" }, { "docid": "f857092bea30d04a0e6cd59a31a43c8c", "score": "0.5414042", "text": "func TestAddUser1(t *testing.T) {\n\n\tusername := \"Jazzyjazz0713\"\n\n\tfoundUser := AddUser(username)\n\n\tif foundUser != username {\n\t\tt.Errorf(\"Got username %s but expected %s\", foundUser, username)\n\t}\n\n}", "title": "" }, { "docid": "c4082ea6a3464c421e55c15ea1ab3a28", "score": "0.5408629", "text": "func (r RawUnified) Equal(other RawUnified) bool {\n\treturn r.Site == other.Site && r.Critical == other.Critical && reflect.DeepEqual(r.ServiceConnections, other.ServiceConnections)\n}", "title": "" }, { "docid": "7e410e5a1933ae3e4584e10db379e28d", "score": "0.54061496", "text": "func equal(t *testing.T, expected, actual interface{}, msgAndArgs ...interface{}) bool {\n\tif !objectsAreEqual(expected, actual) {\n\t\tt.Errorf(\"%s\\n%s\", messageFromMsgAndArgs(msgAndArgs),\n\t\t\tSprintExpectActual(expected, actual))\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "68caa5e09b37e11acff6a3e913aa3a02", "score": "0.5378835", "text": "func isExportAuthEqual(a, b *exportAuth) bool {\n\tif a.tokenReq != b.tokenReq {\n\t\treturn false\n\t}\n\tif a.accountPos != b.accountPos {\n\t\treturn false\n\t}\n\tif len(a.approved) != len(b.approved) {\n\t\treturn false\n\t}\n\tfor ak, av := range a.approved {\n\t\tif bv, ok := b.approved[ak]; !ok || av.Name != bv.Name {\n\t\t\treturn false\n\t\t}\n\t}\n\tif len(a.actsRevoked) != len(b.actsRevoked) {\n\t\treturn false\n\t}\n\tfor ak, av := range a.actsRevoked {\n\t\tif bv, ok := b.actsRevoked[ak]; !ok || av != bv {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "c369d6fe1de13c79c8ae541e5fd58567", "score": "0.53774285", "text": "func (u UTXOSet) Equal(utxos UTXOSet) bool {\n\tif len(u) != len(utxos) {\n\t\treturn false\n\t}\n\n\tfor txid, outputs := range u {\n\t\to, ok := utxos[txid]\n\n\t\tif !ok || len(outputs) != len(o) {\n\t\t\treturn false\n\t\t}\n\n\t\tfor i, out := range outputs {\n\t\t\tif out.Value != o[i].Value || !bytes.Equal(out.PubKeyHash, o[i].PubKeyHash) {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "3df42bd78a11f9974133bf75e4ed3303", "score": "0.5354632", "text": "func (u *User) Compare(pwd string) (err error) {\n\treturn\n}", "title": "" }, { "docid": "549fd30aec6e69736e02c02eaa89b579", "score": "0.5350844", "text": "func (v *Profile) Equals(rhs *Profile) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !v.Recur1.Equals(rhs.Recur1) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "549fd30aec6e69736e02c02eaa89b579", "score": "0.5350844", "text": "func (v *Profile) Equals(rhs *Profile) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !v.Recur1.Equals(rhs.Recur1) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "549fd30aec6e69736e02c02eaa89b579", "score": "0.5350844", "text": "func (v *Profile) Equals(rhs *Profile) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !v.Recur1.Equals(rhs.Recur1) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "05eb7d0bb26bc452678952fc944534b8", "score": "0.53447014", "text": "func TestAccountUsers(t *testing.T) {\n\twithDB(func(db *DB) {\n\t\t// Create two accounts.\n\t\tdb.Do(func(tx *Tx) error {\n\t\t\ta1 := &Account{}\n\t\t\tassert.NoError(t, tx.CreateAccount(a1))\n\t\t\ta2 := &Account{}\n\t\t\tassert.NoError(t, tx.CreateAccount(a2))\n\t\t\treturn nil\n\t\t})\n\n\t\t// Add users to first account.\n\t\tdb.Do(func(tx *Tx) error {\n\t\t\ta1, _ := tx.Account(1)\n\t\t\tassert.NoError(t, a1.CreateUser(&User{Email: \"susyque@gmail.com\", Password: \"password\"}))\n\t\t\tassert.NoError(t, a1.CreateUser(&User{Email: \"johndoe@gmail.com\", Password: \"password\"}))\n\t\t\treturn nil\n\t\t})\n\n\t\t// Add users to second account.\n\t\tdb.Do(func(tx *Tx) error {\n\t\t\ta2, _ := tx.Account(2)\n\t\t\tassert.NoError(t, a2.CreateUser(&User{Email: \"billybob@gmail.com\", Password: \"password\"}))\n\t\t\treturn nil\n\t\t})\n\n\t\t// Check first account users.\n\t\tdb.With(func(tx *Tx) error {\n\t\t\ta1, _ := tx.Account(1)\n\t\t\tusers, err := a1.Users()\n\t\t\tif assert.NoError(t, err) && assert.Equal(t, len(users), 2) {\n\t\t\t\tassert.Equal(t, users[0].Tx, tx)\n\t\t\t\tassert.Equal(t, users[0].ID(), 2)\n\t\t\t\tassert.Equal(t, users[0].AccountID, 1)\n\t\t\t\tassert.Equal(t, users[0].Email, \"johndoe@gmail.com\")\n\n\t\t\t\tassert.Equal(t, users[1].Tx, tx)\n\t\t\t\tassert.Equal(t, users[1].ID(), 1)\n\t\t\t\tassert.Equal(t, users[1].AccountID, 1)\n\t\t\t\tassert.Equal(t, users[1].Email, \"susyque@gmail.com\")\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\n\t\t// Check second account users.\n\t\tdb.With(func(tx *Tx) error {\n\t\t\ta2, _ := tx.Account(2)\n\t\t\tusers, err := a2.Users()\n\t\t\tif assert.NoError(t, err) && assert.Equal(t, len(users), 1) {\n\t\t\t\tassert.Equal(t, users[0].Tx, tx)\n\t\t\t\tassert.Equal(t, users[0].ID(), 3)\n\t\t\t\tassert.Equal(t, users[0].AccountID, 2)\n\t\t\t\tassert.Equal(t, users[0].Email, \"billybob@gmail.com\")\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t})\n}", "title": "" }, { "docid": "fcf8c003e32eec7b06e41085d389e574", "score": "0.5313616", "text": "func ObjectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\tif exp, ok := expected.([]byte); ok {\n\t\tact, ok := actual.([]byte)\n\t\tif !ok {\n\t\t\treturn false\n\t\t} else if exp == nil || act == nil {\n\t\t\treturn exp == nil && act == nil\n\t\t}\n\t\treturn bytes.Equal(exp, act)\n\t}\n\treturn reflect.DeepEqual(expected, actual)\n\n}", "title": "" }, { "docid": "4edce124bbe7c57be6c44c5eac2653af", "score": "0.53074825", "text": "func compareUserList(got, want []*models.User) (bool, string) {\n\tfor key, PostGot := range got {\n\t\tif PostGot.ID != want[key].ID {\n\t\t\tgw := fmt.Sprintf(\"handler returned wrong User ID:\\ngot: %v\\nwant: %v\", PostGot.ID, want[key].ID)\n\t\t\treturn false, gw\n\t\t}\n\t\tif PostGot.Name != want[key].Name {\n\t\t\tgw := fmt.Sprintf(\"handler returned wrong User Name:\\ngot: %v\\nwant: %v\", PostGot.Name, want[key].Name)\n\t\t\treturn false, gw\n\t\t}\n\t\tif PostGot.Avatar != want[key].Avatar {\n\t\t\tgw := fmt.Sprintf(\"handler returned wrong User Avatar:\\ngot: %v\\nwant: %v\", PostGot.Avatar, want[key].Avatar)\n\t\t\treturn false, gw\n\t\t}\n\t}\n\treturn true, \"\"\n}", "title": "" }, { "docid": "302c406b93f03438cf4a2b5555e20ff3", "score": "0.530089", "text": "func equal(a, b interface{}) bool {\n\treturn reflect.DeepEqual(a, b)\n}", "title": "" }, { "docid": "ed6fefb728ae8624e4aa2ef423bdcfab", "score": "0.5298704", "text": "func checkForMemberListEquality(a, b []*admin.Member) bool {\n\tif len(a) != len(b) {\n\t\treturn false\n\t}\n\n\taMap := make(map[string]*admin.Member)\n\tbMap := make(map[string]*admin.Member)\n\tfor i := 0; i < len(b); i++ {\n\t\taMap[a[i].Email] = a[i]\n\t\tbMap[b[i].Email] = b[i]\n\t}\n\n\tfor aEmail, aMember := range aMap {\n\t\tinB, ok := bMap[aEmail]\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\t\tif inB.Role != aMember.Role {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "f445457511ad0124dff76d4ee0151c08", "score": "0.52985686", "text": "func ObjectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\texp, ok := expected.([]byte)\n\tif !ok {\n\t\treturn reflect.DeepEqual(expected, actual)\n\t}\n\n\tact, ok := actual.([]byte)\n\tif !ok {\n\t\treturn false\n\t}\n\tif exp == nil || act == nil {\n\t\treturn exp == nil && act == nil\n\t}\n\treturn bytes.Equal(exp, act)\n}", "title": "" }, { "docid": "f445457511ad0124dff76d4ee0151c08", "score": "0.52985686", "text": "func ObjectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\texp, ok := expected.([]byte)\n\tif !ok {\n\t\treturn reflect.DeepEqual(expected, actual)\n\t}\n\n\tact, ok := actual.([]byte)\n\tif !ok {\n\t\treturn false\n\t}\n\tif exp == nil || act == nil {\n\t\treturn exp == nil && act == nil\n\t}\n\treturn bytes.Equal(exp, act)\n}", "title": "" }, { "docid": "f445457511ad0124dff76d4ee0151c08", "score": "0.52985686", "text": "func ObjectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\texp, ok := expected.([]byte)\n\tif !ok {\n\t\treturn reflect.DeepEqual(expected, actual)\n\t}\n\n\tact, ok := actual.([]byte)\n\tif !ok {\n\t\treturn false\n\t}\n\tif exp == nil || act == nil {\n\t\treturn exp == nil && act == nil\n\t}\n\treturn bytes.Equal(exp, act)\n}", "title": "" }, { "docid": "f445457511ad0124dff76d4ee0151c08", "score": "0.52985686", "text": "func ObjectsAreEqual(expected, actual interface{}) bool {\n\tif expected == nil || actual == nil {\n\t\treturn expected == actual\n\t}\n\n\texp, ok := expected.([]byte)\n\tif !ok {\n\t\treturn reflect.DeepEqual(expected, actual)\n\t}\n\n\tact, ok := actual.([]byte)\n\tif !ok {\n\t\treturn false\n\t}\n\tif exp == nil || act == nil {\n\t\treturn exp == nil && act == nil\n\t}\n\treturn bytes.Equal(exp, act)\n}", "title": "" }, { "docid": "9b3830b7aee159780c8a979b982887d8", "score": "0.52859986", "text": "func userMatchesSpec(log *zap.SugaredLogger, atlasSpec *mongodbatlas.DatabaseUser, operatorSpec mdbv1.AtlasDatabaseUserSpec) (bool, error) {\n\tuserMerged := mongodbatlas.DatabaseUser{}\n\tif err := compat.JSONCopy(&userMerged, atlasSpec); err != nil {\n\t\treturn false, err\n\t}\n\n\tif err := compat.JSONCopy(&userMerged, operatorSpec); err != nil {\n\t\treturn false, err\n\t}\n\n\t// performing some normalization of dates\n\tif atlasSpec.DeleteAfterDate != \"\" {\n\t\tatlasDeleteDate, err := timeutil.ParseISO8601(atlasSpec.DeleteAfterDate)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tatlasSpec.DeleteAfterDate = timeutil.FormatISO8601(atlasDeleteDate)\n\t}\n\tif operatorSpec.DeleteAfterDate != \"\" {\n\t\toperatorDeleteDate, err := timeutil.ParseISO8601(operatorSpec.DeleteAfterDate)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tuserMerged.DeleteAfterDate = timeutil.FormatISO8601(operatorDeleteDate)\n\t}\n\td := cmp.Diff(*atlasSpec, userMerged, cmpopts.EquateEmpty())\n\tif d != \"\" {\n\t\tlog.Debugf(\"Users differs from spec: %s\", d)\n\t}\n\n\treturn d == \"\", nil\n}", "title": "" }, { "docid": "d981f8e212e0acb47690ed6d9c1dd3d3", "score": "0.52815425", "text": "func deepEqual(v1, v2 interface{}) (err error) {\n\tif !reflect.DeepEqual(v1, v2) {\n\t\terr = errors.New(\"Not Match\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "03365ddc1c26b06796c7af59748506e4", "score": "0.5260081", "text": "func (al accessList) equal(other accessList) bool {\n\t// Cross reference the accounts first\n\tif len(al) != len(other) {\n\t\treturn false\n\t}\n\t// Given that len(al) == len(other), we only need to check that\n\t// all the items from al are in other.\n\tfor addr := range al {\n\t\tif _, ok := other[addr]; !ok {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// Accounts match, cross reference the storage slots too\n\tfor addr, slots := range al {\n\t\totherslots := other[addr]\n\n\t\tif len(slots) != len(otherslots) {\n\t\t\treturn false\n\t\t}\n\t\t// Given that len(slots) == len(otherslots), we only need to check that\n\t\t// all the items from slots are in otherslots.\n\t\tfor hash := range slots {\n\t\t\tif _, ok := otherslots[hash]; !ok {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "4ac27efececc9a70d7eae5cc08e34f32", "score": "0.5239993", "text": "func TestServer_Users(t *testing.T) {\n\ts := OpenServer(NewMessagingClient())\n\tdefer s.Close()\n\n\t// Create some users.\n\ts.CreateUser(\"susy\", \"pass\", false)\n\ts.CreateUser(\"john\", \"pass\", false)\n\ts.Restart()\n\n\t// Return the users.\n\tif a := s.Users(); len(a) != 2 {\n\t\tt.Fatalf(\"unexpected user count: %d\", len(a))\n\t} else if a[0].Name != \"john\" {\n\t\tt.Fatalf(\"unexpected user(0): %s\", a[0].Name)\n\t} else if a[1].Name != \"susy\" {\n\t\tt.Fatalf(\"unexpected user(1): %s\", a[1].Name)\n\t}\n}", "title": "" }, { "docid": "5a6b63193cca09cd77c4301e07f1bbff", "score": "0.5234977", "text": "func ExampleTritsEqual() {}", "title": "" }, { "docid": "e68b8853f4a5add789dc9f37b2693605", "score": "0.52332175", "text": "func Equal(p1 UUID, p2 UUID) bool {\n\treturn p1.String() == p2.String()\n}", "title": "" }, { "docid": "81881e16cc464e6ba9da9d8a0edd5667", "score": "0.52270967", "text": "func Equal(p1 UUID, p2 UUID) bool {\n\treturn \tbytes.Equal(p1.Bytes(), p2.Bytes())\n}", "title": "" }, { "docid": "f7c497b0b2b2be65f90c7f32401aecc6", "score": "0.52240634", "text": "func DeepEqual(t *testing.T, got, expected interface{}) {\n\tt.Helper()\n\n\tif !reflect.DeepEqual(got, expected) {\n\t\tt.Fatalf(\"\\n\"+\n\t\t\t\"got: [%+v]\\n\"+\n\t\t\t\"expected: [%+v]\", got, expected)\n\t}\n}", "title": "" }, { "docid": "4969ccc3779d0bc9d96b25d1907da84b", "score": "0.5222095", "text": "func (v *SimpleService_GetProfile_Result) Equals(rhs *SimpleService_GetProfile_Result) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !((v.Success == nil && rhs.Success == nil) || (v.Success != nil && rhs.Success != nil && v.Success.Equals(rhs.Success))) {\n\t\treturn false\n\t}\n\tif !((v.AuthErr == nil && rhs.AuthErr == nil) || (v.AuthErr != nil && rhs.AuthErr != nil && v.AuthErr.Equals(rhs.AuthErr))) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "4969ccc3779d0bc9d96b25d1907da84b", "score": "0.5222095", "text": "func (v *SimpleService_GetProfile_Result) Equals(rhs *SimpleService_GetProfile_Result) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !((v.Success == nil && rhs.Success == nil) || (v.Success != nil && rhs.Success != nil && v.Success.Equals(rhs.Success))) {\n\t\treturn false\n\t}\n\tif !((v.AuthErr == nil && rhs.AuthErr == nil) || (v.AuthErr != nil && rhs.AuthErr != nil && v.AuthErr.Equals(rhs.AuthErr))) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "4969ccc3779d0bc9d96b25d1907da84b", "score": "0.5222095", "text": "func (v *SimpleService_GetProfile_Result) Equals(rhs *SimpleService_GetProfile_Result) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\tif !((v.Success == nil && rhs.Success == nil) || (v.Success != nil && rhs.Success != nil && v.Success.Equals(rhs.Success))) {\n\t\treturn false\n\t}\n\tif !((v.AuthErr == nil && rhs.AuthErr == nil) || (v.AuthErr != nil && rhs.AuthErr != nil && v.AuthErr.Equals(rhs.AuthErr))) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "fbcaf00d754614e95056550636bb8a45", "score": "0.5220391", "text": "func (user *User) IsEqualRole(role string) bool {\n\tfmt.Println(role, user.Getrole())\n\tif user.Getrole() == role {\n\t\tfmt.Println(user.Getrole())\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c62b190f5058aefe3af7bf9c876f0ccc", "score": "0.52131945", "text": "func Equal(p1, p2 UUID) bool {\n\treturn bytes.Equal(p1.Bytes(), p2.Bytes())\n}", "title": "" }, { "docid": "640e4bd834cd06540c125292b9c21f0f", "score": "0.5208804", "text": "func (u Login) ComparePasswords(uF User) error {\n\t// make sure userFound is not empty first\n\tif len(uF.Email) == 0 {\n\t\treturn errors.New(\"user not found\")\n\t}\n\tif err := bcrypt.CompareHashAndPassword([]byte(uF.Password), []byte(u.Password)); err != nil {\n\t\treturn errors.New(\"invalid password\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a1176e996537630edf6b945d81191bc1", "score": "0.5200257", "text": "func (user *User)Is(aUser *User) bool{\n\tif user == nil|| aUser ==nil{\n\t\treturn false\n\t}\n\tif user.Id == aUser.Id{\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "5097bdf00e63f8c45f5b8468db1aca2d", "score": "0.51991796", "text": "func (v *SimpleService_TestUuid_Result) Equals(rhs *SimpleService_TestUuid_Result) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5097bdf00e63f8c45f5b8468db1aca2d", "score": "0.51991796", "text": "func (v *SimpleService_TestUuid_Result) Equals(rhs *SimpleService_TestUuid_Result) bool {\n\tif v == nil {\n\t\treturn rhs == nil\n\t} else if rhs == nil {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "e05a74eb43244fda1a939f9f10e7fb61", "score": "0.51891613", "text": "func TestChangeEquivIfSameFields(t *testing.T) {\r\n\tchange1 := NewChange(\"insert\", 0, \"a\")\r\n\tchange2 := NewChange(\"insert\", 0, \"a\")\r\n\r\n\tif change1.Equals(change2) == false {\r\n\t\tt.Errorf(\"Change %v and Change %v should be considered equal.\", change1, change2)\r\n\t}\r\n}", "title": "" }, { "docid": "2acb0a3ed161323a00946011d050ff86", "score": "0.51881796", "text": "func (coords Coords) Equals(other Coords) bool {\n return coords.U == other.U && coords.V == other.V\n}", "title": "" }, { "docid": "ea12df4b0cd7948158fa90282c67f037", "score": "0.51865435", "text": "func TestCheckOwnAccount(t *testing.T) {\n\tnum := 1\n\tusername := \"bobt\"\n\tusername2 := \"bobt\"\n\n\tcheck, uname, uname2 := CheckOwnAccount(num)\n\tif check && (username == uname || username2 == uname2) {\n\t\tlog.Printf(\"TestCheckOwnAccount Passed\")\n\t} else {\n\t\tlog.Fatal(\"Input does not match. Username input:\", username, \" Actual Username:\", uname,\n\t\t\t\" Username2:\", username2, \" Actual username2:\", uname2, \" Check:\", check)\n\t}\n}", "title": "" }, { "docid": "d905d51d7b89fe4afc2ed6e7bf08c3c0", "score": "0.5176566", "text": "func ObjectsAreEqualValues(expected, actual interface{}) bool {\n\tif ObjectsAreEqual(expected, actual) {\n\t\treturn true\n\t}\n\n\tactualType := reflect.TypeOf(actual)\n\tif actualType == nil {\n\t\treturn false\n\t}\n\texpectedValue := reflect.ValueOf(expected)\n\tif expectedValue.IsValid() && expectedValue.Type().ConvertibleTo(actualType) {\n\t\t// Attempt comparison after type conversion\n\t\treturn reflect.DeepEqual(expectedValue.Convert(actualType).Interface(), actual)\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "103a56ef1caf5a24ed762e6fb7a7db15", "score": "0.5171603", "text": "func (u *URN) Equal(x *URN) bool {\n\treturn *u.Normalize() == *x.Normalize()\n}", "title": "" }, { "docid": "7748b43964bc38d5f63ba9c6526135fd", "score": "0.5169082", "text": "func (o *UserMatcher) Matches(x interface{}) bool {\n\tassert := assert.New(o.t)\n\tswitch p := x.(type) {\n\tcase *user.UserCreateParams:\n\t\t// avoid matching the context\n\t\to.CreateParam.Context = p.Context\n\t\treturn assert.EqualValues(o.CreateParam, p)\n\tcase *user.UserDeleteParams:\n\t\t// avoid matching the context\n\t\to.DeleteParam.Context = p.Context\n\t\treturn assert.EqualValues(o.DeleteParam, p)\n\tcase *user.UserFetchParams:\n\t\t// avoid matching the context\n\t\to.FetchParam.Context = p.Context\n\t\treturn assert.EqualValues(o.FetchParam, p)\n\tcase *user.UserListParams:\n\t\t// avoid matching the context\n\t\to.ListParam.Context = p.Context\n\t\treturn assert.EqualValues(o.ListParam, p)\n\tcase *user.UserUpdateParams:\n\t\t// avoid matching the context\n\t\to.UpdateParam.Context = p.Context\n\t\tsort.Strings(p.Set)\n\t\tsort.Strings(p.Append)\n\t\tsort.Strings(p.Remove)\n\t\tuSet := o.UpdateParam.Set\n\t\tuAppend := o.UpdateParam.Append\n\t\tuRemove := o.UpdateParam.Remove\n\t\tsort.Strings(uSet)\n\t\tsort.Strings(uAppend)\n\t\tsort.Strings(uRemove)\n\t\treturn assert.EqualValues(uSet, p.Set) &&\n\t\t\tassert.EqualValues(uRemove, p.Remove) &&\n\t\t\tassert.EqualValues(uAppend, p.Append) &&\n\t\t\tassert.EqualValues(o.UpdateParam.ID, p.ID) &&\n\t\t\tassert.EqualValues(o.UpdateParam.Version, p.Version) &&\n\t\t\tassert.EqualValues(o.UpdateParam.Payload, p.Payload)\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d2aa3affcc55e13c1bfd980e59f7f8a4", "score": "0.5161545", "text": "func (u User) Compare(hash, password string) (bool, error) {\n\terr := bcrypt.CompareHashAndPassword([]byte(hash), []byte(password))\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "3593122c04b39aaa194a9619e2e9b1cb", "score": "0.51592016", "text": "func TestSalting(t *testing.T) {\n hash1, _ := HashAndSalt(\"terrapukka\")\n hash2, _ := HashAndSalt(\"terrapukka\")\n\n if hash1 == hash2 {\n t.Errorf(\"Hashing the same password twice yields the same result: %v and %v, expected 2 different results\", hash1, hash2)\n }\n}", "title": "" }, { "docid": "3fc473eed3eb2d338fd6171f96847a44", "score": "0.51589084", "text": "func (u User) comparePasswords(p string) error {\n\treturn bcrypt.CompareHashAndPassword([]byte(u.EncryptedPassword), []byte(p))\n}", "title": "" }, { "docid": "9901945d1720b53725b1e50cb081ac3b", "score": "0.51563835", "text": "func equal(typeVal string, x interface{}, y interface{}) bool {\n\tif !isNil(x) && !isNil(y) {\n\t\tswitch typeVal {\n\t\tcase typeUUID:\n\t\t\treturn x.(*uuid.UUID).String() == y.(*uuid.UUID).String()\n\t\tcase typeString:\n\t\t\tif x.(string) == \"\" || y.(string) == \"\" {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\treturn x.(string) == y.(string)\n\t\tcase typeZeroUUID:\n\t\t\tif reflect.TypeOf(x).String() == \"models.ZeroUUID\" && reflect.TypeOf(y).String() == \"models.ZeroUUID\" {\n\t\t\t\tif x.(models.ZeroUUID) == (models.ZeroUUID{}) || y.(models.ZeroUUID) == (models.ZeroUUID{}) {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\treturn x.(models.ZeroUUID).String() == y.(models.ZeroUUID).String()\n\t\t\t} else if reflect.TypeOf(x).String() == \"models.ZeroUUID\" && reflect.TypeOf(y).String() == \"*uuid.UUID\" {\n\t\t\t\tif x.(models.ZeroUUID) == (models.ZeroUUID{}) || y == nil {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\treturn x.(models.ZeroUUID).String() == y.(*uuid.UUID).String()\n\t\t\t} else if reflect.TypeOf(x).String() == \"*uuid.UUID\" && reflect.TypeOf(y).String() == \"models.ZeroUUID\" {\n\t\t\t\tif x == nil || y.(models.ZeroUUID) == (models.ZeroUUID{}) {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t\treturn y.(models.ZeroUUID).String() == x.(*uuid.UUID).String()\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a4c99bb849ba396390dc3b44fd04bbf6", "score": "0.5147127", "text": "func ObjectsAreEqualValues(expected, actual interface{}) bool {\n\tif objectsAreEqual(expected, actual) {\n\t\treturn true\n\t}\n\n\tactualType := reflect.TypeOf(actual)\n\tif actualType == nil {\n\t\treturn false\n\t}\n\texpectedValue := reflect.ValueOf(expected)\n\tif expectedValue.IsValid() && expectedValue.Type().ConvertibleTo(actualType) {\n\t\t// Attempt comparison after type conversion\n\t\treturn reflect.DeepEqual(expectedValue.Convert(actualType).Interface(), actual)\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "9c36ea15f5dde020a5bd4a3f69c61454", "score": "0.5146916", "text": "func EqualAccessTokens(ctx context.Context, expectedToken, actualToken string) error {\n\texpectedParsed, err := TokenManager.ParseToken(ctx, expectedToken)\n\tif err != nil {\n\t\treturn err\n\t}\n\texpectedClaims, err := TokenManager.ParseTokenWithMapClaims(ctx, expectedToken)\n\tif err != nil {\n\t\treturn err\n\t}\n\tactualClaims, err := TokenManager.ParseTokenWithMapClaims(ctx, actualToken)\n\tif err != nil {\n\t\treturn err\n\t}\n\tactualParsed, err := TokenManager.ParseToken(ctx, actualToken)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = equalTokenClaim(\"typ\", expectedClaims, actualClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif expectedParsed.Approved != actualParsed.Approved {\n\t\treturn errors.Errorf(\"'approved' claims are not equal. Expected: %v. Actual: %v\", expectedParsed.Approved, actualParsed.Approved)\n\t}\n\terr = equalTokenClaim(\"email\", expectedClaims, actualClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = equalTokenClaim(\"email_verified\", expectedClaims, actualClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = equalTokenClaim(\"preferred_username\", expectedClaims, actualClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = equalTokenClaim(\"name\", expectedClaims, actualClaims)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn equalTokenClaim(\"sub\", expectedClaims, actualClaims)\n}", "title": "" }, { "docid": "ff921abe627f922a4cfc0ebe33ba4a94", "score": "0.51426435", "text": "func Equal(a, b UUID) bool {\n\treturn bytes.Equal([]byte(a[:]), []byte(b[:]))\n}", "title": "" }, { "docid": "fbe79cfd97ea83048ee47fa9620dc66c", "score": "0.5142226", "text": "func eq(x, y interface{}) bool {\n\treturn x == y\n\t// reflect.DeepEqual(x, y)\n}", "title": "" }, { "docid": "11c1c279d9505ffc2e684caf8bf02cc6", "score": "0.51413727", "text": "func (t *UserTest) TestUserAccountActivation(){\n\tnewUser := models.User{\n\t\tFullName: \"Nguyen Xuan Tuong\",\n\t\tEmail: \"nguy0066@e.ntu.edu.sg\",\n\t\tUserName: \"nguy0066\",\n\t\tPassword: utils.GetMD5Hash(\"111111\"),\n\t}\n\n\t//register user\n\t_, body, _ := gorequest.New().Post(endpoint + \"/api/user/register\").Send(newUser).End()\n\n\t\n\t//then login using the same credential\n\t_, body, _ = gorequest.New().Post(endpoint + \"/api/user/login\").\n\tSend(`{\"Email\":\"nguy0066@e.ntu.edu.sg\"}`).\n\tSend(`{\"Password\":\"` + newUser.Password +`\"}`).\n\tEnd()\n\n\ttype UserResponse struct{\n\t\tStatus string `json:\"status\"`\n\t\tData *models.User `json:\"data\"`\n\t\tErrors\tinterface {} `json:\"errors\"`\n\t}\n\n\t//unable to login\n\t//error due to inactive user\n\tjsonResponse := UserResponse{}\n\tjson.Unmarshal([]byte(body), &jsonResponse)\n\tt.AssertEqual(jsonResponse.Status, \"error\")\n\n\tvar users []models.User\n\tcontrollers.Gdb.Where(\"email= ?\", newUser.Email).Or(\"user_name= ?\", newUser.UserName).Find(&users)\n\tt.AssertEqual(len(users), 1)\n\t\n\tactivateAccount(t, &users[0])\n\t\n\t//then try to login again\n\t_, body, _ = gorequest.New().Post(endpoint + \"/api/user/login\").\n\tSend(`{\"Email\":\"nguy0066@e.ntu.edu.sg\"}`).\n\tSend(`{\"Password\":\"` + newUser.Password +`\"}`).\n\tEnd()\n\n\t//unmarshal the response\n\tjson.Unmarshal([]byte(body), &jsonResponse)\n\tt.AssertEqual(jsonResponse.Data.FullName, newUser.FullName)\n\n\t//reset user to be empty array\n\tusers = []models.User{}\n\tcontrollers.Gdb.Where(\"email= ?\", newUser.Email).Or(\"user_name= ?\", newUser.UserName).Find(&users)\n\tt.AssertEqual(users[0].Status, models.USER_ACTIVE)\n\t//TODO: also make sure that redis session has been set\n}", "title": "" }, { "docid": "e976009d4df3a9a7c6f902ac57dba0aa", "score": "0.5140959", "text": "func ObjectsAreEqualValues(expected, actual interface{}) bool {\n\tif ObjectsAreEqual(expected, actual) {\n\t\treturn true\n\t}\n\n\tactualType := reflect.TypeOf(actual)\n\texpectedValue := reflect.ValueOf(expected)\n\tif expectedValue.Type().ConvertibleTo(actualType) {\n\t\t// Attempt comparison after type conversion\n\t\tif reflect.DeepEqual(actual, expectedValue.Convert(actualType).Interface()) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ea0b5965846f516e5bda2e4891d286f9", "score": "0.5137116", "text": "func equal(t *testing.T, a interface{}, b interface{}) {\n\tresult := reflect.DeepEqual(a, b)\n\tif !result {\n\t\t_, file, line, _ := runtime.Caller(1)\n\t\tt.Errorf(\"Failed equals in %s:%d\", file, line)\n\t}\n}", "title": "" }, { "docid": "f71d1eebc0cd0b00cb3747287e2571a6", "score": "0.51363254", "text": "func equal(isWholeMatch bool, lhsV, rhsV Object) bool {\n\tif lhsV == nil && rhsV == nil {\n\t\treturn true\n\t}\n\tif (lhsV == nil && rhsV != nil) || (lhsV != nil && rhsV == nil) {\n\t\treturn false\n\t}\n\n\tif lhsV.Type() != rhsV.Type() {\n\t\treturn false\n\t}\n\n\tif lhsV.Type() == NIL_OBJ {\n\t\tif rhsV.Type() == NIL_OBJ {\n\t\t\treturn true\n\t\t}\n\t}\n\n\tif isGoObj(lhsV) || isGoObj(rhsV) { // if it's GoObject\n\t\treturn compareGoObj(lhsV, rhsV)\n\t}\n\n\tif lhsV.Type() == STRING_OBJ && rhsV.Type() == STRING_OBJ {\n\t\tleftStr := lhsV.(*String).String\n\t\trightStr := rhsV.(*String).String\n\n\t\tif isWholeMatch {\n\t\t\tr := reflect.DeepEqual(lhsV, rhsV)\n\t\t\tif r {\n\t\t\t\treturn true\n\t\t\t} else {\n\t\t\t\treturn false\n\t\t\t}\n\t\t} else {\n\t\t\tmatched, _ := regexp.MatchString(rightStr, leftStr)\n\t\t\treturn matched\n\t\t}\n\t} else if lhsV.Type() == TIME_OBJ && rhsV.Type() == TIME_OBJ {\n\t\treturn lhsV.(*TimeObj).Tm.Equal(rhsV.(*TimeObj).Tm)\n\t} else {\n\t\tr := reflect.DeepEqual(lhsV, rhsV)\n\t\tif r {\n\t\t\treturn true\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n}", "title": "" }, { "docid": "794a477dca02b3708ef3c855c25fc2fb", "score": "0.51296467", "text": "func (h ConcatenatedSM) Equal(b UserDataHdr) bool {\n\ta, ok := b.(ConcatenatedSM)\n\tif !ok {\n\t\treturn false\n\t}\n\tif a.RefNum != h.RefNum {\n\t\treturn false\n\t}\n\tif a.MaxNum != h.MaxNum {\n\t\treturn false\n\t}\n\tif a.SeqNum != h.SeqNum {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "54fd5fce9ec9d83130348ffef7e7c50b", "score": "0.51235217", "text": "func TestNewUserValidate(t *testing.T) {\n\t// test cases\n\tcases := []struct {\n\t\tname string\n\t\tnu *NewUser\n\t\tvalid bool\n\t}{\n\t\t{\n\t\t\t\"valid user\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"stevieG@gmail.com\",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"thegoat\",\n\t\t\t\tFirstName: \"Steven\",\n\t\t\t\tLastName: \"Gerrard\",\n\t\t\t},\n\t\t\ttrue,\n\t\t},\n\t\t// valid user 2\n\t\t{\n\t\t\t\"valid user 2\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \" A@m.com \",\n\t\t\t\tPassword: \"antherone\",\n\t\t\t\tPasswordConf: \"antherone\",\n\t\t\t\tUserName: \"bigshaq\",\n\t\t\t\tFirstName: \"Big\",\n\t\t\t\tLastName: \"Shaq\",\n\t\t\t},\n\t\t\ttrue,\n\t\t},\n\t\t// invalid email\n\t\t{\n\t\t\t\"invalid email\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"ohnobademail@\",\n\t\t\t\tPassword: \"antherone\",\n\t\t\t\tPasswordConf: \"antherone\",\n\t\t\t\tUserName: \"bigshaq\",\n\t\t\t\tFirstName: \"Big\",\n\t\t\t\tLastName: \"Shaq\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// no email\n\t\t{\n\t\t\t\"no email\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"\",\n\t\t\t\tPassword: \"antherone\",\n\t\t\t\tPasswordConf: \"antherone\",\n\t\t\t\tUserName: \"bigshaq\",\n\t\t\t\tFirstName: \"Big\",\n\t\t\t\tLastName: \"Shaq\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// short pass word\n\t\t{\n\t\t\t\"too short pass word\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"okay@email.com\",\n\t\t\t\tPassword: \"short\",\n\t\t\t\tPasswordConf: \"short\",\n\t\t\t\tUserName: \"bigshaq\",\n\t\t\t\tFirstName: \"Big\",\n\t\t\t\tLastName: \"Shaq\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// password mismatch\n\t\t{\n\t\t\t\"password mismatch\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"okay@email.com\",\n\t\t\t\tPassword: \"mismatch\",\n\t\t\t\tPasswordConf: \"matchmis\",\n\t\t\t\tUserName: \"bigshaq\",\n\t\t\t\tFirstName: \"Big\",\n\t\t\t\tLastName: \"Shaq\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// empty username\n\t\t{\n\t\t\t\"empty username\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"okay@email.com\",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"\",\n\t\t\t\tFirstName: \"Who\",\n\t\t\t\tLastName: \"Dis\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// space in username\n\t\t{\n\t\t\t\"space in username\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"okay@email.com\",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"sike its the wrong number\",\n\t\t\t\tFirstName: \"Who\",\n\t\t\t\tLastName: \"Dis\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// space in email\n\t\t{\n\t\t\t\"space in email\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \"ok ay@email.com\",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"Username\",\n\t\t\t\tFirstName: \"Who\",\n\t\t\t\tLastName: \"Dis\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t\t// space before/after email\n\t\t{\n\t\t\t\"space before/after email\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \" okay@email.com \",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"SpaceBeforeAfterEmail\",\n\t\t\t\tFirstName: \"Who\",\n\t\t\t\tLastName: \"Dis\",\n\t\t\t},\n\t\t\ttrue,\n\t\t},\n\t\t// White space in username\n\t\t{\n\t\t\t\"White space in username\",\n\t\t\t&NewUser{\n\t\t\t\tEmail: \" okay@email.com \",\n\t\t\t\tPassword: \"validpassword\",\n\t\t\t\tPasswordConf: \"validpassword\",\n\t\t\t\tUserName: \"SpaceBefo\treAfterEmail\",\n\t\t\t\tFirstName: \"Who\",\n\t\t\t\tLastName: \"Dis\",\n\t\t\t},\n\t\t\tfalse,\n\t\t},\n\t}\n\tfor _, c := range cases {\n\t\tresult := c.nu.Validate()\n\t\tif result == nil && c.valid == true {\n\t\t\tcontinue\n\t\t} else if result != nil && c.valid == false {\n\t\t\tcontinue\n\t\t}\n\t\t// bad\n\t\tt.Errorf(\"case %s -> New user valid = %t but evaluated as valid = %t\", c.name, c.valid, !c.valid)\n\t}\n}", "title": "" }, { "docid": "9b9a80dbe8ad0563fdc384aa07f56dca", "score": "0.51228714", "text": "func DeepEqual(t TestingT, x, y interface{}, opts ...gocmp.Option) {\n\tif ht, ok := t.(helperT); ok {\n\t\tht.Helper()\n\t}\n\tif !assert.Eval(t, assert.ArgsAfterT, cmp.DeepEqual(x, y, opts...)) {\n\t\tt.FailNow()\n\t}\n}", "title": "" }, { "docid": "ca945fc90b514782c245962f10b83a92", "score": "0.5120828", "text": "func (p PayloadAuthKeyboardInteractiveFailed) Equals(other Payload) bool {\n\tp2, ok := other.(PayloadAuthKeyboardInteractiveFailed)\n\tif !ok {\n\t\treturn false\n\t}\n\treturn p.Username == p2.Username\n}", "title": "" }, { "docid": "d1928b604cd8146982134f3c55735727", "score": "0.5115479", "text": "func (usersList *UsersList) Verify(nationalId string) (User, bool) {\n\t//verify the national ID\n\tusersList.mux.Lock()\n\tdefer usersList.mux.Unlock()\n\t_, err := usersList.UserMap[nationalId]\n\n\tnewUser := User{}\n\tif err == true {\n\t\tfmt.Println(\"User already exists returning error!!!!\")\n\t\t//\tusersList.mux.Unlock()\n\t\treturn newUser, false\n\t}\n\tfmt.Println(\"User does not exists returning a new user\")\n\n\tprivateKey := GenerateKeyPair()\n\tpriv := privateKey\n\tpub := &privateKey.PublicKey\n\n\tnewUser = User{\n\t\tNationalId: nationalId,\n\t\tPrivateKey: priv,\n\t\tPublicKey: pub,\n\t}\n\tusersList.UserMap[nationalId] = newUser\n\tusersList.PKMap[pub.N.String()] = nationalId\n\t//usersList.mux.Unlock()\n\treturn newUser, true\n}", "title": "" }, { "docid": "6456fc7357f848904c92b1af421510fe", "score": "0.5115247", "text": "func (proxies Proxies) Equal(other []services.Server) bool {\n\tif len(proxies) != len(other) {\n\t\treturn false\n\t}\n\tproxiesMap, otherMap := make(map[string]bool), make(map[string]bool)\n\tfor i := range proxies {\n\t\tproxiesMap[proxies[i].GetName()] = true\n\t}\n\tfor i := range other {\n\t\totherMap[other[i].GetName()] = true\n\t}\n\tfor key := range otherMap {\n\t\tif !proxiesMap[key] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "8945de49cbed7619ca6466b1fef223ba", "score": "0.5113772", "text": "func (a *Secret) Equal(b *Secret) bool {\n\tif a == nil || b == nil {\n\t\treturn false\n\t}\n\tif a.Name != b.Name {\n\t\treturn false\n\t}\n\tif len(a.Data) != len(b.Data) {\n\t\treturn false\n\t}\n\tfor key, value := range a.Data {\n\t\tvalue2, ok := b.Data[key]\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\t\tif !bytes.Equal(value, value2) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "4da3d58c463ecc1d566a60dda684e1a2", "score": "0.5111987", "text": "func assertThreeAccountsEqual(t *testing.T, a, b, c *storage.Account) {\n\tfor _, as := range []struct {\n\t\tA, B *storage.Account\n\t}{\n\t\t{\n\t\t\tA: a, B: b,\n\t\t},\n\t\t{\n\t\t\tA: a, B: c,\n\t\t},\n\t\t{\n\t\t\tA: b, B: c,\n\t\t},\n\t} {\n\t\tequal, err := as.A.Equal(*as.B)\n\t\tcommon.FatalIfErrorf(t, err, \"equalling accounts %+v\", as)\n\t\tif !equal {\n\t\t\tt.Fatal(\"not equal\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "70c5f440ed676e3a89fe9b98e60824e9", "score": "0.5098871", "text": "func getStoriedUser(username string, users []dto.UserStored) (bool, dto.UserStored) {\n\tfor i := len(users) - 1; i >= 0; i-- {\n\t\tif users[i].Username == username {\n\t\t\treturn true, users[i]\n\t\t}\n\t}\n\tuser := dto.UserStored{}\n\treturn false, user\n}", "title": "" }, { "docid": "bf51b40e4d44dfa2ee9d4b399112600c", "score": "0.5095285", "text": "func (p PayloadHandshakeSuccessful) Equals(other Payload) bool {\n\tp2, ok := other.(PayloadHandshakeSuccessful)\n\tif !ok {\n\t\treturn false\n\t}\n\treturn p.Username == p2.Username\n}", "title": "" }, { "docid": "fbcdef5c4989c43bbf4a4eccc3dbf60d", "score": "0.5082426", "text": "func (u *Unit) Equals(b *Unit) bool {\n\t// nil Unit's do not equal anything\n\tif u == nil || b == nil {\n\t\treturn false\n\t}\n\t// Either they are the same instance or their IDs are the same\n\treturn u == b || strings.ToLower(u.id) == strings.ToLower(b.id)\n}", "title": "" }, { "docid": "c5294397931fc5fd1fb05c4c56fe92e4", "score": "0.50749075", "text": "func equalEmails(a []Email, b []Email) bool {\n\tif len(a) != len(b) {\n\t\treturn false\n\t}\n\tfor i := range a {\n\t\tif a[i] != b[i] {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "3e8f839a688021548840d0ebee8b94e7", "score": "0.507393", "text": "func (v *Store_CompareAndSwap_Result) Equals(rhs *Store_CompareAndSwap_Result) bool {\n\tif !((v.Mismatch == nil && rhs.Mismatch == nil) || (v.Mismatch != nil && rhs.Mismatch != nil && v.Mismatch.Equals(rhs.Mismatch))) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" } ]
937b6c680388e0bc89ff2c85ac93c3d4
GetACLPrefix returns the prefix to look up the ACL policy for this request, and a boolean noting whether the prefix is valid to check or not. You must check the ok value before using the prefix.
[ { "docid": "14db4dea7d59ec98d91408684c6ba717", "score": "0.7739535", "text": "func (q *IntentionQueryCheck) GetACLPrefix() (string, bool) {\n\treturn q.DestinationName, q.DestinationName != \"\"\n}", "title": "" } ]
[ { "docid": "0cba932814f4a0201e9a5083243e4e82", "score": "0.74986774", "text": "func (x *Intention) GetACLPrefix() (string, bool) {\n\treturn x.DestinationName, x.DestinationName != \"\"\n}", "title": "" }, { "docid": "306b9ff2797f1e536e974ca4b3b27959", "score": "0.6305764", "text": "func (o *UuidpoolBlock) GetPrefixOk() (*string, bool) {\n\tif o == nil || o.Prefix == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Prefix, true\n}", "title": "" }, { "docid": "09ff14a4045b1bcadb316e06fea00313", "score": "0.61496556", "text": "func GetPrefix() string {\n\treturn prefix\n}", "title": "" }, { "docid": "2c4b5ae7820fe35e37532375e58ebd5f", "score": "0.61317027", "text": "func (v *CheckSchemaStatusRequest) GetNamePrefix() (o string) {\n\tif v.NamePrefix != nil {\n\t\treturn *v.NamePrefix\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ee9a98b3a45d9b86a69ec48d0a56c1c1", "score": "0.6055291", "text": "func (v *CheckSchemaRequest) GetNamePrefix() (o string) {\n\tif v.NamePrefix != nil {\n\t\treturn *v.NamePrefix\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c86f98761adb4c7048f30f52e1416685", "score": "0.6022332", "text": "func (c Counterparty) GetPrefix() commitmentexported.Prefix {\n\treturn &c.Prefix\n}", "title": "" }, { "docid": "b54b3b8a7b0b06946a4c4c6f165cfb16", "score": "0.601602", "text": "func (o *XmlParams) GetAttributePrefixOk() (*string, bool) {\n\tif o == nil || IsNil(o.AttributePrefix) {\n\t\treturn nil, false\n\t}\n\treturn o.AttributePrefix, true\n}", "title": "" }, { "docid": "ee8d4103cfd1aa78e0239852f42aea8c", "score": "0.5973366", "text": "func GetPrefix(s string, validPrefixes []string, defaultPrefix string) string {\n\tfor _, p := range validPrefixes {\n\t\tif strings.HasPrefix(s, p) {\n\t\t\treturn p\n\t\t}\n\t}\n\treturn defaultPrefix\n}", "title": "" }, { "docid": "358cb17c2a5e7ec5162bbccc80825580", "score": "0.5956144", "text": "func (c *Cmds) GetPrefix() rune {\n\treturn c.prefix\n}", "title": "" }, { "docid": "cc3a263261c2a3171e8d3bd077712dbe", "score": "0.5943813", "text": "func (this *Route) GetPrefix() string {\n\treturn this.Action.Prefix\n}", "title": "" }, { "docid": "bcae30d42a7df074ab13cc56c0b23852", "score": "0.59226215", "text": "func (o SpacesBucketLifecycleRuleOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v SpacesBucketLifecycleRule) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ec73109e975bfb39a4c4edab87ff2561", "score": "0.5892375", "text": "func (v *CanUpsertSchemaRequest) GetNamePrefix() (o string) {\n\tif v.NamePrefix != nil {\n\t\treturn *v.NamePrefix\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a034c36e1b3057cb1ba542bfe14bf3da", "score": "0.58781344", "text": "func (r Rule) Prefix() string {\n\tif r.Filter.Prefix != \"\" {\n\t\treturn r.Filter.Prefix\n\t}\n\tif r.Filter.And.Prefix != \"\" {\n\t\treturn r.Filter.And.Prefix\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "21e9fdb03c0dcf5459f4b34c052fe8ca", "score": "0.5867295", "text": "func isValidPrefix(prefix string) bool {\n\t\treturn hasSingleCase(prefix) && funk.IndexOf(VALID_PREFIXES,strings.ToLower(prefix)) != -1\n\t}", "title": "" }, { "docid": "81f48a8c9c21d42f1ff0fbda2ec0ae6d", "score": "0.58666265", "text": "func (b *BMBranchType) GetPrefix() string {\n\tif b == nil || b.Prefix == nil {\n\t\treturn \"\"\n\t}\n\treturn *b.Prefix\n}", "title": "" }, { "docid": "e625c2a127662e07b7e41ff5e9fd69de", "score": "0.5841599", "text": "func (o GetAppSpecFunctionCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetAppSpecFunctionCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "28c851708becde98f337675090f52fcc", "score": "0.5840489", "text": "func IsPrefixed() bool {\n\treturn !(prefix == \"\" || prefix == \"/\")\n}", "title": "" }, { "docid": "7e5b45965abbfa9e1f3324b8d19652b8", "score": "0.5818407", "text": "func (o GetAppSpecFunctionCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GetAppSpecFunctionCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3a3cc897dffd3129a936807871e0fbca", "score": "0.58125895", "text": "func (o GetAppSpecServiceCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetAppSpecServiceCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0f44aaabddc6a96572381c7c2aca0d83", "score": "0.58111125", "text": "func (o GetAppSpecServiceCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GetAppSpecServiceCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4abfbd7312b5421a28ed73c730e4ad5f", "score": "0.5809237", "text": "func GetPrefix() string {\n return prefix\n}", "title": "" }, { "docid": "2fd8c754681c6484e49011d661e9c507", "score": "0.57796377", "text": "func (a *Client) GetLocalprefix(params *GetLocalprefixParams, authInfo runtime.ClientAuthInfoWriter) (*GetLocalprefixOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewGetLocalprefixParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"getLocalprefix\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/devices/{deviceId}/localprefix\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &GetLocalprefixReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*GetLocalprefixOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for getLocalprefix: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "0ab9f05e237d83833b498dc097f81b9e", "score": "0.57526755", "text": "func (trie *Trie) ValidatePrefix(prefix string) bool {\n\tif trie.root == nil {\n\t\treturn false\n\t}\n\tcurrentNode := trie.root\n\tletterArray := strings.Split(prefix, \"\")\n\tfor _, letter := range letterArray {\n\t\tletterPosition := -1\n\t\tfor index, child := range currentNode.children {\n\t\t\tif child.value == letter {\n\t\t\t\tletterPosition = index\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif letterPosition == -1 {\n\t\t\treturn false\n\t\t}\n\t\tcurrentNode = currentNode.children[letterPosition]\n\t}\n\treturn true\n}", "title": "" }, { "docid": "345572c837a4420318e4c9d103ce7504", "score": "0.57433057", "text": "func (o AppSpecServiceCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AppSpecServiceCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d7dc173a25d794d96e9bd14734822bfb", "score": "0.57402563", "text": "func (o AlertmanagerSpecOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AlertmanagerSpec) *string { return v.RoutePrefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "365b44e2f3b9678d560552e4aa9d81f2", "score": "0.5717687", "text": "func (o AppSpecServiceCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AppSpecServiceCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "75cb29233f2f7a595998488391ba96a3", "score": "0.57162666", "text": "func (o AlertmanagerSpecPtrOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AlertmanagerSpec) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RoutePrefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a0f3a71db1a0a6cb7b09e09ea1ff0f72", "score": "0.5712604", "text": "func (o AppSpecFunctionCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AppSpecFunctionCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9d8725cbd4caf451e3cc91597afd2dd6", "score": "0.5684741", "text": "func (server *APIServer) GetPrefix() string {\n\treturn server.Prefix\n}", "title": "" }, { "docid": "ee928cc1befa3d5ce9bb129d04812f6e", "score": "0.5679861", "text": "func (o AppSpecFunctionCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AppSpecFunctionCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4ddb65c5b17d90a2f340459a985388b2", "score": "0.5673493", "text": "func (n *Navigator) IsPrefix() bool {\n\treturn n.lastNode().IsPrefix()\n}", "title": "" }, { "docid": "fa15bd1358f73737db05fc12dbfd1214", "score": "0.56668395", "text": "func (o GetAppSpecStaticSiteCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GetAppSpecStaticSiteCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "69770be5a3b7972ef5cf77758892899b", "score": "0.564443", "text": "func (o GetAppSpecStaticSiteCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GetAppSpecStaticSiteCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "9e4adb316fcd1d579a87d1e178394c0d", "score": "0.56077784", "text": "func (v *UpsertSchemaRequest) GetNamePrefix() (o string) {\n\tif v.NamePrefix != nil {\n\t\treturn *v.NamePrefix\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6488a92bdf771f3ce4155a6bd973a3fa", "score": "0.5601078", "text": "func (o *RecoveryAbstractBackupConfigAllOf) GetFileNamePrefixOk() (*string, bool) {\n\tif o == nil || o.FileNamePrefix == nil {\n\t\treturn nil, false\n\t}\n\treturn o.FileNamePrefix, true\n}", "title": "" }, { "docid": "d55ae86ab6251d214a3717f3b3dc90a3", "score": "0.55792105", "text": "func (a Account) GetCommandPrefix() string {\n\tif len(a.CommandPrefix) == 0 {\n\t\treturn \"!pb\"\n\t}\n\treturn a.CommandPrefix\n}", "title": "" }, { "docid": "f30fa845bb9b7aecf9d5c2436e17c7cf", "score": "0.55723363", "text": "func DetectARNPrefix() (string, error) {\n\tinstanceArn, err := instanceProfileARN()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn BaseArn(instanceArn)\n}", "title": "" }, { "docid": "bab3c2ccd073d44c8f28d938cbe5f176", "score": "0.5569638", "text": "func (o AppSpecStaticSiteCorsAllowOriginsOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AppSpecStaticSiteCorsAllowOrigins) *string { return v.Prefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b5ad4d8128ca6c6c206e354d5fed7f6b", "score": "0.5541186", "text": "func (o AppSpecStaticSiteCorsAllowOriginsPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AppSpecStaticSiteCorsAllowOrigins) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "db6c39c01d1708b5beddf903047b95be", "score": "0.55223614", "text": "func (kf *KeyFormat) Prefix() string {\n\treturn string([]byte{kf.prefix})\n}", "title": "" }, { "docid": "f8a05fe777f50745949a19e7f4bb8fab", "score": "0.5516023", "text": "func (c ConsoleWriter) GetPrefix() string {\n\treturn c.prefix\n}", "title": "" }, { "docid": "99b129ab00a9809c3c09d30b125462a0", "score": "0.5511067", "text": "func KeyPrefix() string {\n\treturn \"vpp/config/v1/acl/\"\n}", "title": "" }, { "docid": "25b02cd5cd17d4cf4cbe5620185efd6a", "score": "0.5446371", "text": "func (g *RouterGroup) getPrefix() string {\n\tprefix := g.prefix\n\tparent := g.parent\n\tfor parent != nil {\n\t\tprefix = parent.prefix + prefix\n\t\tparent = parent.parent\n\t}\n\treturn prefix\n}", "title": "" }, { "docid": "add77ac72e7f4fe2d83e6fe4ccd23986", "score": "0.5442461", "text": "func (backend Backend) Prefix() (string, error) {\n\tif backend.Local != nil {\n\t\treturn \"\", nil\n\t} else if backend.S3 != nil {\n\t\treturn backend.S3.Prefix, nil\n\t} else if backend.GCS != nil {\n\t\treturn backend.GCS.Prefix, nil\n\t} else if backend.Azure != nil {\n\t\treturn backend.Azure.Prefix, nil\n\t} else if backend.Swift != nil {\n\t\treturn backend.Swift.Prefix, nil\n\t} else if backend.Rest != nil {\n\t\tu, err := url.Parse(backend.Rest.URL)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn u.Path, nil\n\t}\n\treturn \"\", errors.New(\"failed to get prefix. Reason: Unknown backend type.\")\n}", "title": "" }, { "docid": "b76154946e22fc5af808771cafa2922d", "score": "0.543099", "text": "func GetAddrPrefixCfg() *AddrPrefixCfg {\n\treturn prefixCfg\n}", "title": "" }, { "docid": "38b16dd524aa44360550b1f6a90172be", "score": "0.5425021", "text": "func (o ThanosRulerSpecOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ThanosRulerSpec) *string { return v.RoutePrefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3dcb8dded07fa7e4ddfd00a494032bdd", "score": "0.54243666", "text": "func (v *SchemaRef) GetNamePrefix() (o string) {\n\tif v.NamePrefix != nil {\n\t\treturn *v.NamePrefix\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "9ffc635e8e1ae2cfa27468ad1f3598b3", "score": "0.542196", "text": "func (o PrometheusSpecAlertingAlertmanagersOutput) PathPrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpecAlertingAlertmanagers) *string { return v.PathPrefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "7373a689d2c4f7164da344d71b3e7e5d", "score": "0.5418037", "text": "func (s *Server) GetPrefix(path string, fn http.HandlerFunc) {\n\ts.router.PathPrefix(path).Handler(fn)\n}", "title": "" }, { "docid": "f92412e3f15c1f9a229cc993220f49d7", "score": "0.5407447", "text": "func (f *Framework) GetAutomanagedNamespacePrefix() string {\n\treturn f.automanagedNamespacePrefix\n}", "title": "" }, { "docid": "d6f0ed84d662b373ee801cf3a798c1dc", "score": "0.5392207", "text": "func (o *VolumeSnapshotAutodeleteAttributesType) SetPrefix(newValue string) *VolumeSnapshotAutodeleteAttributesType {\n\to.PrefixPtr = &newValue\n\treturn o\n}", "title": "" }, { "docid": "9ceb8c59fc43d21da568245c99e3b978", "score": "0.53878736", "text": "func (o ThanosRulerSpecPtrOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ThanosRulerSpec) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RoutePrefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d14df0e2bbb2ff8a930959ec4aa5f5fe", "score": "0.53836083", "text": "func (s *RoutingPolicy_DefinedSets_PrefixSet_Prefix) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"RoutingPolicy_DefinedSets_PrefixSet_Prefix\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8313470d7d661d5fa73076df1f1d52c8", "score": "0.5373541", "text": "func (o *VolumeSnapshotAutodeleteAttributesType) Prefix() string {\n\tvar r string\n\tif o.PrefixPtr == nil {\n\t\treturn r\n\t}\n\tr = *o.PrefixPtr\n\treturn r\n}", "title": "" }, { "docid": "cd921bbeecd744ed72e4de25d50144f0", "score": "0.537029", "text": "func (o RolePolicyOutput) NamePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RolePolicy) pulumi.StringPtrOutput { return v.NamePrefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0a994caa8c571b2c00189022c9360759", "score": "0.5360019", "text": "func (*NokiaConf_Configure_Groups_Group_PolicyOptions_PrefixList_Prefix_Type_Union_String) Is_NokiaConf_Configure_Groups_Group_PolicyOptions_PrefixList_Prefix_Type_Union() {\n}", "title": "" }, { "docid": "39bd5b2061a519bc9a72a88d43a34c04", "score": "0.53583694", "text": "func Prefix(long, prefix string) bool {\n\treturn strings.HasPrefix(long, prefix)\n}", "title": "" }, { "docid": "51130b593850bc0ba3aa8e4abe1dded1", "score": "0.53412515", "text": "func (p *RestrictPrefix) Validate() error {\n\tif p.Prefix == \"\" {\n\t\tp.Prefix = \".\"\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "89fb48867c45bad80a564d2484f6d873", "score": "0.532616", "text": "func (o *UuidpoolBlock) GetPrefix() string {\n\tif o == nil || o.Prefix == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Prefix\n}", "title": "" }, { "docid": "57fa66ef8bf011b00b224fc48286a98c", "score": "0.53260297", "text": "func (o PrometheusSpecOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PrometheusSpec) *string { return v.RoutePrefix }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "93621ac85518077efa0a47af1d641a14", "score": "0.53118885", "text": "func (t *Token) HasPrefix(prefix ...string) bool {\n\tif t.caseInsensitive {\n\t\tt.modified = strings.ToLower(t.modified)\n\t}\n\tfor _, p := range prefix {\n\t\tif t.caseInsensitive {\n\t\t\tp = strings.ToLower(p)\n\t\t}\n\t\tif strings.HasPrefix(t.modified, p) {\n\t\t\tt.modified = t.modified[len(p):]\n\t\t\tif strings.HasPrefix(t.modified, \" \") {\n\t\t\t\tt.modified = t.modified[1:]\n\t\t\t}\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "8c3e2971ce4653d042aa9287e5b23c2b", "score": "0.5310291", "text": "func HasPrefix(expected string) TestDeep {\n\treturn &tdHasPrefix{\n\t\ttdStringBase: newStringBase(expected),\n\t}\n}", "title": "" }, { "docid": "2120e759e8b1c2cb1b3f427fd55b2e8f", "score": "0.5303911", "text": "func (n Name) GetPrefix(count int) Name {\n\treturn n.GetSubName(0, n.positiveIndex(count))\n}", "title": "" }, { "docid": "61e83edc1f899dcdea3c82fbf6a8a6b7", "score": "0.5298766", "text": "func (o *OsuExport) GetOsuPrefixOk() (string, bool) {\n\tif o == nil || o.OsuPrefix == nil {\n\t\tvar ret string\n\t\treturn ret, false\n\t}\n\treturn *o.OsuPrefix, true\n}", "title": "" }, { "docid": "e32478ab7abc1db91f5daa23a6eb05b2", "score": "0.52955556", "text": "func (o PrometheusSpecPtrOutput) RoutePrefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *PrometheusSpec) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.RoutePrefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3a6b09d4e931a879809fe1b6c7b98ab7", "score": "0.5285157", "text": "func (o URLMapPathMatcherRouteRuleMatchRuleHeaderMatchOutput) PrefixMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v URLMapPathMatcherRouteRuleMatchRuleHeaderMatch) *string { return v.PrefixMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "731bbad093fbd0aee80f37a8d10c2a6d", "score": "0.52793187", "text": "func GetPrefix(channelID string) string {\n\tif channelID == \"global\" {\n\t\tprefix, err := Get(false, \"config\", \"global\", \"prefix\")\n\t\tif prefix != nil && err == nil {\n\t\t\tp, _ := prefix.(string)\n\t\t\treturn p\n\t\t}\n\t}\n\n\tcurrChannel, err := marvin.Session().Channel(channelID)\n\n\tif err != nil || currChannel.Type != discordgo.ChannelTypeGuildText {\n\t\treturn marvin.Session().State.User.Mention() + \" \"\n\t}\n\n\tprefix, _ := Get(false, \"config\", currChannel.GuildID, \"prefix\")\n\n\tif prefix == nil {\n\t\tprefix, _ = Get(false, \"config\", \"global\", \"prefix\")\n\t}\n\n\tif prefix == nil {\n\t\tprefix = marvin.Session().State.User.Mention() + \" \"\n\t}\n\n\tp, _ := prefix.(string)\n\treturn p\n}", "title": "" }, { "docid": "63e5d836ca8af00a331708c1d4382d01", "score": "0.5278201", "text": "func (r resourceHandler) Prefix() string { return r.prefix }", "title": "" }, { "docid": "dc71986540c97312c443a684b6b655e6", "score": "0.52762806", "text": "func (s *RoutingPolicy_DefinedSets_PrefixSet_Prefix) Validate() error {\n\tif err := ytypes.Validate(SchemaTree[\"RoutingPolicy_DefinedSets_PrefixSet_Prefix\"], s); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a0d5c0cf94ce3d5d1fdd11628fcc9f6a", "score": "0.5273936", "text": "func (u User) NamespacePrefix() string {\n\tborkPrefix := envy.Get(\"BORK_NAMESPACE_PREFIX\", \"bork\")\n\n\tusername := strings.Split(strings.ToLower(u.Username), \" \")\n\n\tprefix := append([]string{borkPrefix}, username...)\n\n\treturn strings.Join(prefix, \"-\")\n}", "title": "" }, { "docid": "222c08446a56c1a2e50e470ee9a83d45", "score": "0.5269319", "text": "func (o URLMapPathMatcherRouteRuleMatchRuleOutput) PrefixMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v URLMapPathMatcherRouteRuleMatchRule) *string { return v.PrefixMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "02ea09fa70804c20641e752c54eb473c", "score": "0.5262627", "text": "func (s *NetworkInstance_Protocol_Isis_Interface_Level_Af_SegmentRouting_PrefixSid) Validate() error {\n\tif err := ytypes.Validate(SchemaTree[\"NetworkInstance_Protocol_Isis_Interface_Level_Af_SegmentRouting_PrefixSid\"], s); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "887c0597d0bf435f1f72d5d26a9c94f3", "score": "0.52577853", "text": "func (t *Trie) GetPrefix(v string) (string, bool) {\n\troot := t\n\tif root.wordTail {\n\t\treturn root.word, true\n\t}\n\tfor _, b := range []byte(v) {\n\t\tchild, exists := root.children[b]\n\t\tif !exists {\n\t\t\treturn \"\", false\n\t\t}\n\t\tif child.wordTail {\n\t\t\treturn child.word, true\n\t\t}\n\t\troot = child\n\t}\n\treturn \"\", false\n}", "title": "" }, { "docid": "0bf00c23c30bce21239ba9e791012244", "score": "0.5248", "text": "func (ma MetadataAddress) Prefix() (string, error) {\n\tprefix, err := VerifyMetadataAddressFormat(ma)\n\tif len(prefix) == 0 {\n\t\treturn prefix, err\n\t}\n\treturn prefix, nil\n}", "title": "" }, { "docid": "3046ab11ee574f7ce9e6e83def23bb1c", "score": "0.5237438", "text": "func (*NokiaConf_Configure_Groups_Group_PolicyOptions_PrefixList_Prefix_Type_Union_E_NokiaConf_Configure_Groups_Group_PolicyOptions_PrefixList_Prefix_Type) Is_NokiaConf_Configure_Groups_Group_PolicyOptions_PrefixList_Prefix_Type_Union() {\n}", "title": "" }, { "docid": "6844e17397dc386b56d5b3369404fbde", "score": "0.52353215", "text": "func (a *AppService) GetPrefix() string {\n\treturn \"azure.appservice\"\n}", "title": "" }, { "docid": "63c70da5bab8b81b31c093b4812631d6", "score": "0.52254987", "text": "func GetAddressKeyPrefixAmino(address sdk.AccAddress) (key []byte, err error) {\n\terr = sdk.VerifyAddressFormat(address.Bytes())\n\tif err == nil {\n\t\tkey = nametypes.AddressKeyPrefixAmino\n\t\tkey = append(key, address.Bytes()...)\n\t}\n\treturn\n}", "title": "" }, { "docid": "fcaf987b6019886ac858f88ba6da8de0", "score": "0.52015686", "text": "func (m *PrefixMutation) Prefix() (r string, exists bool) {\n\tv := m.prefix\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "edf470eacec68e1fff8cbfa4e3a8254c", "score": "0.5196243", "text": "func (o RegionUrlMapPathMatcherRouteRuleMatchRuleOutput) PrefixMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RegionUrlMapPathMatcherRouteRuleMatchRule) *string { return v.PrefixMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f4df041a444a54ad5854c98a1882b05d", "score": "0.51892716", "text": "func (info AllowedInfo) PossiblePrefix() bool {\n\tfor _, c := range info.Constraints {\n\t\tif c == \".\" {\n\t\t\tcontinue\n\t\t}\n\t\treturn !strings.ContainsRune(c, '~')\n\t}\n\treturn true\n}", "title": "" }, { "docid": "97247c7171cb247320d93ab884da906d", "score": "0.51860046", "text": "func (s *NetworkInstance_Protocol_Isis_Interface_Level_Af_SegmentRouting_PrefixSid) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"NetworkInstance_Protocol_Isis_Interface_Level_Af_SegmentRouting_PrefixSid\"], s, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7e87b598554a749f6777b371944519c6", "score": "0.5184706", "text": "func (c *Catalog) routePrefix(dbId, tId uint64) []byte {\n\treturn codec.EncodeKey(cPrefix, defaultCatalogId, cRoutePrefix, dbId, tId)\n}", "title": "" }, { "docid": "ecca08c8090a89e286694fffc4456b82", "score": "0.5183424", "text": "func (o *XmlParams) GetAttributePrefix() string {\n\tif o == nil || IsNil(o.AttributePrefix) {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.AttributePrefix\n}", "title": "" }, { "docid": "71f6d7b7d729d5ac24c4019f04ea5030", "score": "0.518261", "text": "func GetAddressPrefix(address string) (string, error) {\n\tprefix, _, err := bech32.DecodeAndConvert(address)\n\treturn prefix, err\n}", "title": "" }, { "docid": "25ac8caa03b8ccc3372f3338dc55d431", "score": "0.5176269", "text": "func (g *Grammars) GetTablePrefix() string {\n\treturn g.Prefix\n}", "title": "" }, { "docid": "91dfedce945092717d6fe26b419c5e4a", "score": "0.51723886", "text": "func (e *Client) PrefixGet(ctx context.Context, prefix string) (map[string][]byte, error) {\n\tkey := e.KeyWithRootPath(prefix)\n\tkv := clientv3.NewKV(e.client)\n\tresp, err := kv.Get(ctx, key, clientv3.WithPrefix())\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\tr := make(map[string][]byte)\n\tfor _, kv := range resp.Kvs {\n\t\tprefix := e.rootPath\n\t\tif !strings.HasSuffix(prefix, \"/\") {\n\t\t\tprefix = prefix + \"/\"\n\t\t}\n\t\tk := strings.TrimPrefix(string(kv.Key), prefix)\n\t\tr[k] = kv.Value\n\t}\n\treturn r, nil\n}", "title": "" }, { "docid": "c4623bd8383380f363134e4001e1b078", "score": "0.51721704", "text": "func isAllowedBucketPrefix(ctx context.Context, bucket string, object string, globalRealms []string) (isAllowed bool, err error) {\n\n\t// A single realm is passed in most cases (e.g. GetArtifact and\n\t// ListArtifacts). When multiple realms are passed (e.g. QueryArtifacts),\n\t// check that the access is allowed in all realms.\n\tfor _, globalRealm := range globalRealms {\n\t\tproject, realm := realms.Split(globalRealm)\n\t\tcfg, err := config.Project(ctx, project)\n\t\tif err != nil {\n\t\t\tif errors.Is(err, config.ErrNotFoundProjectConfig) {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\treturn false, err\n\t\t}\n\n\t\tvar allowList *configpb.RealmGcsAllowList\n\t\tfor _, list := range cfg.RealmGcsAllowlist {\n\t\t\tif list.Realm == realm {\n\t\t\t\tallowList = list\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif allowList == nil {\n\t\t\treturn false, nil\n\t\t}\n\n\t\tvar allowedPrefixes *configpb.GcsBucketPrefixes\n\t\tfor _, prefixes := range allowList.GcsBucketPrefixes {\n\t\t\tif prefixes.Bucket == bucket {\n\t\t\t\tallowedPrefixes = prefixes\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif allowedPrefixes == nil {\n\t\t\treturn false, nil\n\t\t}\n\n\t\tvar isAllowed bool\n\t\tfor _, prefix := range allowedPrefixes.AllowedPrefixes {\n\t\t\tif prefix == \"*\" {\n\t\t\t\tisAllowed = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif ok := strings.HasPrefix(object, prefix); ok {\n\t\t\t\tisAllowed = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif !isAllowed {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "000868fa803635290e29b4a2cee36d85", "score": "0.51697254", "text": "func (c *Client) Prefix() string {\n\treturn c.prefix\n}", "title": "" }, { "docid": "6fbb3a1aadb78ab61de0b6f85d8ef99a", "score": "0.516645", "text": "func (s SerializedPath) HasPrefix(prefix SerializedPath) bool {\n\tprefixValue := prefix.Value\n\tprefixLength := len(prefix.Value)\n\tif s.NibbleLength < prefix.NibbleLength || len(s.Value) < prefixLength {\n\t\treturn false\n\t}\n\tif !prefix.hasOddLength() {\n\t\treturn bytes.HasPrefix(s.Value, prefixValue)\n\t}\n\treducedSize := prefixLength - 1\n\n\t// the input was invalid so just return false\n\tif reducedSize < 0 {\n\t\treturn false\n\t}\n\n\t// grab the last nibble in the prefix and serialized path\n\tprefixRemainder := prefixValue[reducedSize] >> 4\n\tvalueRemainder := s.Value[reducedSize] >> 4\n\t// s has prefix if the last nibbles are equal and s has every byte but the last of prefix as a prefix\n\treturn valueRemainder == prefixRemainder && bytes.HasPrefix(s.Value, prefixValue[:reducedSize])\n}", "title": "" }, { "docid": "f9bb77775f5b5d1f5046175d906c5ef1", "score": "0.5164285", "text": "func (re *Regexp) LiteralPrefix() (prefix string, complete bool) {\n\tpanic(\"function not implemented\")\n\treturn \"\", false\n}", "title": "" }, { "docid": "849b92537086313799a0c8464128e195", "score": "0.51560926", "text": "func (o RegionUrlMapPathMatcherRouteRuleMatchRuleHeaderMatchOutput) PrefixMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v RegionUrlMapPathMatcherRouteRuleMatchRuleHeaderMatch) *string { return v.PrefixMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "94876816c4f094c8eddaec06cdd49f6b", "score": "0.5149976", "text": "func (e *KubectlCmdBuilder) GetCommandPrefix(args []string) string {\n\tswitch len(args) {\n\tcase 0:\n\t\treturn \"\"\n\n\tcase 1:\n\t\t// check if it's only a kubectl command without arguments\n\t\tif args[0] == kubectlCommandName {\n\t\t\treturn args[0]\n\t\t}\n\t\t// it is a single arg which cannot start the kubectl command builder\n\t\treturn \"\"\n\n\tdefault:\n\t\t// check if request comes from command builder message\n\t\tgotCmd := fmt.Sprintf(\"%s %s\", args[0], args[1])\n\t\tif _, found := knownCmdPrefix[gotCmd]; found {\n\t\t\treturn gotCmd\n\t\t}\n\t\treturn \"\"\n\t}\n}", "title": "" }, { "docid": "a3f5670c9ba994839137dcb4b62f64c2", "score": "0.51393545", "text": "func checkAndTrimPrefix(s, prefix string) (string, bool) {\n\tif strings.HasPrefix(s, prefix) {\n\t\treturn s[len(prefix):], true\n\t} else {\n\t\treturn s, false\n\t}\n}", "title": "" }, { "docid": "1791e788d5b366a75765bb5c2246401b", "score": "0.51337934", "text": "func (h *Handler) CrdKeyPrefix() (prefix string, underKsrPrefix bool) {\n\treturn \"/vnf-agent/\", false\n}", "title": "" }, { "docid": "8eb7f1f38797e44807d34ed68a8ebc23", "score": "0.5133207", "text": "func (c *Client) WatchPrefix(prefix string, waitIndex uint64, stopChan chan bool) (uint64, error) {\n\t<-stopChan\n\treturn 0, nil\n}", "title": "" }, { "docid": "de0ca28db61b345599b2312c53c110be", "score": "0.5110753", "text": "func (cdc *KeyCodec) Prefix() []byte {\n\treturn cdc.prefix\n}", "title": "" }, { "docid": "83e227f5852c307a905880764b5841bd", "score": "0.5108503", "text": "func (o ConnectorS3LogDeliveryPtrOutput) Prefix() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ConnectorS3LogDelivery) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Prefix\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f25cb081736e52e5732d1455f419e23f", "score": "0.5107034", "text": "func (tp *TestPrint) CheckPrefix(t *testing.T, want []string) {\n\tif want == nil {\n\t\twant = []string{}\n\t}\n\n\tif len(want) != len(tp.Prints) {\n\t\tt.Errorf(\"%s want %d prints, got %d: %v\", tp.Name, len(want), len(tp.Prints), tp.Prints)\n\t}\n\n\tfor i, got := range tp.Prints {\n\t\tw := want[i]\n\t\tif !strings.HasPrefix(got, w) {\n\t\t\tt.Errorf(\"%s want[%d] to start with:\\n'%s', got: \\n'%s'\", tp.Name, i, w, got)\n\t\t}\n\t}\n\n\ttp.Prints = nil\n}", "title": "" }, { "docid": "fae1323e480c4d9a7a92e9b878a0f9f3", "score": "0.5098044", "text": "func (r *RouterPrefix) Prefix(prefix string) *RouterPrefix {\n\tif prefix == \"\" {\n\t\tpanic(\"prefix must begin with '/', '\" + prefix + \"'\")\n\t}\n\n\tif prefix[0] != '/' {\n\t\tpanic(\"prefix must start with '/', '\" + prefix + \"'\")\n\t}\n\n\treturn &RouterPrefix{\n\t\tbasePath: prefix,\n\t\trouter: r.router,\n\t}\n}", "title": "" }, { "docid": "9a8bbce7e574442cb93d8438c73e2bed", "score": "0.50975245", "text": "func (s *AnalysisSecurityGroupRule) SetPrefixListId(v string) *AnalysisSecurityGroupRule {\n\ts.PrefixListId = &v\n\treturn s\n}", "title": "" } ]
97ee4eb1d980cef60d0b96d57fbade8b
ContextValidate validate this tape device reference inline links based on the context it is used
[ { "docid": "2db4cd52c8c0a455c9660fd603a542dd", "score": "0.76347446", "text": "func (m *TapeDeviceReferenceInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "827648d3f006a59b38f6ffebdb8c99fc", "score": "0.76340544", "text": "func (m *TapeDeviceReferenceInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ea9a9054df1f1149c9ef000e4d0874b2", "score": "0.75796807", "text": "func (m *TapeDeviceReferenceInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1fd0a2f7e85df11e88966932a90ade18", "score": "0.73360604", "text": "func (m *CoredumpInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6c14db3722b47d1974cdea322f46144e", "score": "0.73231196", "text": "func (m *VolumeEfficiencyPolicyInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0a4df24b4bb0181a689b145dd466449b", "score": "0.72847474", "text": "func (m *CoredumpInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "687a24a0027a59ac07b1208e1743da95", "score": "0.7278612", "text": "func (m *CoredumpResponseInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateNext(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "047f9104edef6aa030c6fc865170db93", "score": "0.72565705", "text": "func (m *PerformanceMetricSvmReferenceInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b2c8c639478690a0bf514bfb43ffa324", "score": "0.7254428", "text": "func (m *VolumeEfficiencyPolicyInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0aff139b2bea47f620e7ba96d9f5c46e", "score": "0.7207401", "text": "func (m *PerformanceNvmeMetricInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ef7f8117f44847f4293e37840d323369", "score": "0.72030413", "text": "func (m *AzureKeyVaultKeyInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "465ca5fe14913858b4fa9596603f3464", "score": "0.7177675", "text": "func (m *CoredumpInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "34b1f0ec5ee51b956b3b5cc839d17961", "score": "0.715273", "text": "func (m *SnapshotPolicyInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e08e6ee24788edae5ac3ab9ddff36b63", "score": "0.71424156", "text": "func (m *IPInterfaceSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a63e0697675624ec4d18138044731e1d", "score": "0.7119305", "text": "func (m *CifsServiceInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4997a513c36a5e466efc370904dece01", "score": "0.7104851", "text": "func (m *SoftwareReferenceInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "54afe6c9b30a21cdbb2687e89647a38b", "score": "0.7098818", "text": "func (m *IscsiServiceInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "76018ebbb78649f1970c9cc1fc28f782", "score": "0.70939165", "text": "func (m *LunAttributeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b33fc01a0a0ff76b942b485991df9d4a", "score": "0.7090432", "text": "func (m *SnapshotPolicyInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9d851b006333ce536ef3d28805b53329", "score": "0.7075197", "text": "func (m *StoragePoolInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "13d5d3da698cd53b7f5f310f3083df54", "score": "0.70693654", "text": "func (m *ApplicationComponentSnapshotInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "347db89b815d60de62a755daca5901e1", "score": "0.7056689", "text": "func (m *SwitchPortInlineRemotePortInlineDeviceInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0a71b262c00e1b747c8248342a7f6a24", "score": "0.7053722", "text": "func (m *GcpKmsInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6e44ef72e490bb57fc86b67263b8e5a2", "score": "0.7043077", "text": "func (m *IscsiServiceInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7323ed1f894b6e7f16581164203f6b2c", "score": "0.7031281", "text": "func (m *PerformanceLunMetricInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dd81728fdfb7f1d9ad4804fd2a2c6e2d", "score": "0.7021422", "text": "func (m *CifsServiceInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "979217ab1d8ae431f56b06dc89002c9b", "score": "0.7014091", "text": "func (m *FileMoveFileInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4fc780b12c13a04f9a56c5b22958d78a", "score": "0.7003676", "text": "func (m *NdmpNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dabf59d9bb17b4912c63135c787a9e12", "score": "0.7001201", "text": "func (m *ApplicationComponentSnapshotInlineComponentInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d1548ab67d017412834a427a811d10cf", "score": "0.69940716", "text": "func (m *VolumeEfficiencyPolicyInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6a818a7a4c3b799d0784593e42d37643", "score": "0.69833314", "text": "func (m *FileMoveFileInlineVolumeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aa3272b31a2083ac74342e64834ecf4b", "score": "0.69728106", "text": "func (m *GcpKmsInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf39e624b7a214fe9e986bb3f9a4db47", "score": "0.6971384", "text": "func (m *NdmpNodeInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ff7683f22b870b8978f3d2935007e3fd", "score": "0.6969782", "text": "func (m *ApplicationComponentSnapshotInlineApplicationInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bd523179f3095745cd40f31eb4098829", "score": "0.69672686", "text": "func (m *TapeDeviceReference) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateNode(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "762f8b10ab94dfcdb3a47b5089124e6c", "score": "0.6960595", "text": "func (m *SnapshotPolicyInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a98db372d9380d5be42d001bbecde053", "score": "0.6950287", "text": "func (m *IscsiServiceInlineMetricInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ea1922cd0fa0f0644c23c1828f92d64b", "score": "0.6948015", "text": "func (m *TopMetricsSvmClientInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aaeefcaf5faacd4ed1ce3590f5845d50", "score": "0.6943074", "text": "func (m *LogInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "887e96da5a8a57725c5c8d185bdc6495", "score": "0.6942253", "text": "func (m *SoftwareHistoryInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a5a6d35ec87e455eb4736fcb2817bfcb", "score": "0.69400555", "text": "func (m *FileMoveFileInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7b2885d52945418590ded75d3d2411a0", "score": "0.693217", "text": "func (m *LunAttributeInlineLunInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ed1c0783cc8582d95d155dde5b0043c2", "score": "0.6931874", "text": "func (m *AzureKeyVaultKeyInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "94d9b526f481b6af5fe0ace5294e5f86", "score": "0.6920972", "text": "func (m *KibanaDeeplink) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "079ea275fff3ad1cfaa08a93282ea9ba", "score": "0.6913306", "text": "func (m *AutoUpdateConfigurationInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ad4d86e14cab58059d76399a9588e35c", "score": "0.6911278", "text": "func (m *PortMetricsResponseInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateNext(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d47a695083e8146911d12f8e024a8514", "score": "0.69085777", "text": "func (m *CifsServiceInlineMetricInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4543ef359f08eb71cbb9992e7cf79e9c", "score": "0.6899164", "text": "func (m *CifsServiceInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3be327715ad75e472917c06f59d27d0c", "score": "0.6877877", "text": "func (m *SwitchPortInlineRemotePortInlineDeviceInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47b630d78e30ec8cc481e114a5ef731f", "score": "0.68320364", "text": "func (m *SwitchPortInlineRemotePortInlineDeviceInlineShelfInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "85f6d09aee11a9d771cf4fc7d94b5951", "score": "0.6793457", "text": "func (m *NdmpNodeInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1306d7531f6e282ad2e65b8f1736caad", "score": "0.6791542", "text": "func (m *FileMoveFileInlineVolume) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "042fda518c37cb3e6def348b94b69de0", "score": "0.6789199", "text": "func (m *IscsiServiceInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e3a35e5357cd5d0ae573afcb55b46eff", "score": "0.67836744", "text": "func (m *MetroclusterInlineDrPairsInlineArrayItemInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "af74450e26b3803fce50aae89d2fb8bb", "score": "0.6776339", "text": "func (m *GroupPolicyObjectCentralAccessPolicyInlineSvmInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "21c34c4336f1ec1fa1c6c9f7d54fadb5", "score": "0.6774728", "text": "func (m *GcpKmsInlineEkmipReachabilityInlineArrayItemInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0f6d8e07b344da0ef104fef585cf6db4", "score": "0.6762984", "text": "func (m *KeyServerNoRecordsInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5a345fc5ea0c0bcc1a5414c4de3c6c22", "score": "0.6740484", "text": "func (m *TopMetricsSvmClientInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "835571afdcd28dc3df5128f592d77850", "score": "0.6736747", "text": "func (m *GcpKmsInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11a45aaa2f98cd497fe35b729e6d6907", "score": "0.67049026", "text": "func (m *MetroclusterInlineDrPairsInlineArrayItemInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cef6d628b20cea6fa5a594cca3bb616b", "score": "0.668362", "text": "func (m *MetroclusterInlineRemoteInlineClusterInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8e8b8f46e13e77a19ceaedc1be0345a8", "score": "0.6663076", "text": "func (m *PortMetricsResponseInlineRecordsInlineArrayItemInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e50d284bc76cfa5722d7c7f781dc696", "score": "0.6617452", "text": "func (m *GroupPolicyObjectCentralAccessPolicyInlineSvm) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8c233b9816e625a843473cf21e7733de", "score": "0.6609498", "text": "func (m *SoftwareHistoryInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f84913611b2f9efc9b1bad0f9a1845bd", "score": "0.6602895", "text": "func (m *SwitchPortInlineRemotePortInlineDeviceInlineShelf) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1bf2f78ed1c3c662961ef0af4bf82bd8", "score": "0.6532432", "text": "func (m *MetroclusterInlineMediatorInlinePeerClusterInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4a05d64efd368607df195e7b51e85040", "score": "0.65112066", "text": "func (m *GcpKmsInlineEkmipReachabilityInlineArrayItemInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c7f1ac91efcf4c63c39d79f422628209", "score": "0.6488225", "text": "func (m *MetroclusterInlineDrPairsInlineArrayItemInlinePartnerInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "37f57957e502da1239928c84129a5dcb", "score": "0.64701605", "text": "func (m *IPInterfaceSvmInlineLocationInlineBroadcastDomainInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "58d83dfd63defef6ac98992c32bd22bb", "score": "0.645673", "text": "func (m *SearchIngredientsResponseLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "b6dd993691b688221674c8fb442df8ba", "score": "0.6448555", "text": "func (m *MetroclusterInlinePartnerClusterInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c1ffd1d0d3a9bf32f1cf0bbfb9cb42d7", "score": "0.64226615", "text": "func (m *IgroupInitiatorInlineIgroupInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a6117ed1a5a54c31747911cdcdec40ce", "score": "0.64064807", "text": "func (o *StartPlaidLinkV1Body) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "4f0603dccb8d25a4612665d9a93659ec", "score": "0.640302", "text": "func (m *IgroupInitiatorInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d11dda35f0dc8dad7355ee876405e154", "score": "0.640297", "text": "func (m InlineTypes) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "89d0b94dba16fbf4c6aba70f4aa91d17", "score": "0.6398842", "text": "func (m *TopMetricsSvmDirectoryExcludedVolumeInlineVolumeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9ee2b24bf3e6949ae8414528733cb84d", "score": "0.63950354", "text": "func (m *SwitchPortInlineRemotePortInlineDevice) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateNode(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateShelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "561c3ff8bbdd87c45a61ca58bb3695fd", "score": "0.6393988", "text": "func (m *MetroclusterInlineMccipPortsInlineArrayItemInlineNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dedee44263e33ce5489c25849a3b229c", "score": "0.6367968", "text": "func (m *SwitchPortInlineSwitch) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e10a605575ed85b0513085292460341a", "score": "0.6319634", "text": "func (m *IgroupInitiatorInlineRecordsInlineArrayItemInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "15e317f7b75adf5e0f65772c8b94572c", "score": "0.6315841", "text": "func (m *MultiAdminVerifyApprovalGroupInlineOwnerInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2c31a50edf75fd5d55558d08a426797a", "score": "0.6306032", "text": "func (o *SecurityKeyManagerMigrateParamsBodyLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a6141d31a42caf5b7f5c56d2566752cf", "score": "0.62865174", "text": "func (m *ApplicationComponentSnapshotInlineComponent) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateName(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateUUID(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f24f9f90a612afd6c48bcb1320a8063c", "score": "0.62662476", "text": "func (m *MetroclusterInlineLocalInlineClusterInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "99b7d174e10f17e4760913f10e434bea", "score": "0.62577605", "text": "func (m *IPInterfaceSvmInlineLocationInlineHomeNodeInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5cfa0509146c5c09251a7057ef73b08d", "score": "0.62413687", "text": "func (m *LunAttributeInlineLun) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateUUID(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "239a8f4d37da8d706510db97de329c9e", "score": "0.62312037", "text": "func (m *MetroclusterInlineMccipPortsInlineArrayItemInlineNode) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2b3e774c459a24d37423efeed1de7268", "score": "0.6230866", "text": "func (m *IngredientVersionRevisionAllOf2LinksAllOf1) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "e810e8422fa25a1d022c0f6fffcf73b6", "score": "0.6220612", "text": "func (m *SoftwareReference) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateElapsedDuration(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateEstimatedDuration(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateMetrocluster(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidatePendingVersion(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSoftwareReferenceInlineNodes(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSoftwareReferenceInlinePostUpdateChecks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSoftwareReferenceInlineStatusDetails(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSoftwareReferenceInlineUpdateDetails(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSoftwareReferenceInlineValidationResults(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateState(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6eb13671d1618fd57d1fed7f770c83e9", "score": "0.6213921", "text": "func (m *MetroclusterInlineRemoteInlineCluster) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8492270cf11312f3fff15cb6999be06f", "score": "0.618101", "text": "func (m *PerformanceMetricSvmReferenceInlineIops) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c559b7470d6ddb3baef3937a92ebce5b", "score": "0.6151936", "text": "func (m *PerformanceNvmeMetricInlineFc) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateDuration(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateIops(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateLatency(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateStatus(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateThroughput(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0f8c0a9f4a900ff9e258d09621fce8d8", "score": "0.6136149", "text": "func (m *LogInlineRetention) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "9e174c5c11a62a977befc839c05f75e4", "score": "0.611808", "text": "func (m *IgroupParentInlineLinks) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateSelf(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "df8bbc3b0ca6083493ad21c96e49627b", "score": "0.61072606", "text": "func (m *IscsiServiceInlineTarget) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateName(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "75a347ace5d5cf2d7c00a67e1222c8ab", "score": "0.61032337", "text": "func (m *PerformanceMetricSvmReferenceInlineLatency) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c7060cbed1763a7439049d64f4f7bf47", "score": "0.6080281", "text": "func (m *TopMetricsSvmDirectoryExcludedVolumeInlineVolume) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11afa6c8b69ef18cafd198c763fb5123", "score": "0.60616857", "text": "func (m *IgroupInitiatorInlineRecordsInlineArrayItem) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "66a712b795f1cb7faffad47fb8d80972", "score": "0.60598105", "text": "func (m *TapeDeviceReferenceInlineNode) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateLinks(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7be9301ff3aa87342f5d0f1ff6a04ebd", "score": "0.60221756", "text": "func (m *CifsServiceInlineMetric) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLinks(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateDuration(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateIops(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateLatency(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateStatus(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateThroughput(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateTimestamp(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "78aae37561a6ceba6ffd63d05526d2a6", "score": "0.6019315", "text": "func (m *TrafficDefinition) ContextValidate(ctx context.Context, formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.contextValidateLength(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidatePacket(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.contextValidateSignature(ctx, formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" } ]
ed9e9e487f0c77689e94e8b63e70fbaf
Dhcpv6RebindReceived returns from RelayAgent_Dhcpv6_Interface_CountersPath the path struct for its child "dhcpv6rebindreceived".
[ { "docid": "dcd54d645bc45fbaff428fc347bbc255", "score": "0.8819462", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6RebindReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RebindReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RebindReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-rebind-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" } ]
[ { "docid": "f8a2f1c3ef1c5f38ef1f7960133897f5", "score": "0.8577329", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6RebindReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RebindReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RebindReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-rebind-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "bad9281b14ccff7e210949910f345188", "score": "0.69812804", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6RelayReplyReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayReplyReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayReplyReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-relay-reply-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "601f53410ffec15070317e8ff1d90a86", "score": "0.6780889", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6RequestReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RequestReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RequestReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "476f3ef4b4d6b5c96c8e1279d70d7c3f", "score": "0.66278946", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6RelayReplyReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayReplyReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayReplyReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-relay-reply-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8fae3c385683867981bac471d8eddd36", "score": "0.6509395", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6RequestReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RequestReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RequestReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5f7df6da391f7de3ef952318e4b7ed2f", "score": "0.6495467", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6ConfirmReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ConfirmReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ConfirmReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-confirm-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e3ef2b7f7e153dd32cb907855b9dd33c", "score": "0.6430352", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6ReconfigureSent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReconfigureSentPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReconfigureSentPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-reconfigure-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "51b70edf7892043662ac6cb96084a6a2", "score": "0.6411236", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6ReleaseReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReleaseReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReleaseReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-release-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b6efab38451ffe8d208e7b8dfa0122ef", "score": "0.63497305", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6DeclineReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6DeclineReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6DeclineReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-decline-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0f8de289d87daa52eb2760c53c1cd97e", "score": "0.6215428", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6SolicitReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6SolicitReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6SolicitReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-solicit-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "bf6bbec7a995eb998c4e507f7614131c", "score": "0.61655176", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6ConfirmReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ConfirmReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ConfirmReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-confirm-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "ea18535b7104583cf9b215e15b75254c", "score": "0.614401", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6ReconfigureSent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReconfigureSentPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReconfigureSentPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-reconfigure-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0f162117e4f3c4b926d32966b4ed0ba0", "score": "0.6129249", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6InfoRequestReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6InfoRequestReceivedPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6InfoRequestReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-info-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "15e5600329c5c951c85b0409a31183c9", "score": "0.6121666", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6ReleaseReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReleaseReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReleaseReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-release-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c41237b7655c817f009bb17484a742cb", "score": "0.6101427", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6DeclineReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6DeclineReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6DeclineReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-decline-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "13affcd1ebd67d24e84dd472c3920cec", "score": "0.58945394", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6SolicitReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6SolicitReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6SolicitReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-solicit-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7a6b6a769da561d11a5ec631779e74d4", "score": "0.5853011", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6InfoRequestReceived() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6InfoRequestReceivedPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6InfoRequestReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-info-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "68e0a9bfbca6bd9285dc21c5a0d0d193", "score": "0.5579307", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6ReplySent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReplySentPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReplySentPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-reply-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "55ab426bd07af6c7b3aa7bec5be37a12", "score": "0.5540305", "text": "func GetDhcpRelay6Status(client sophos.ClientInterface, options ...sophos.Option) (val bool, err error) {\n\terr = get(client, \"/api/nodes/dhcp.relay6.status\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "df976da5b5b946adb4a1b5efb063a6e0", "score": "0.5341593", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPath) DhcpDiscoverReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpDiscoverReceivedPath {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpDiscoverReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-discover-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e5a877ed16c6a72f074a23bc1f336d04", "score": "0.53234726", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPath) DhcpReleaseReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpReleaseReceivedPath {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpReleaseReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-release-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "14294d116f4bcef18169a2ad9a94336b", "score": "0.52715683", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPath) DhcpRequestReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpRequestReceivedPath {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpRequestReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "f7d153a94e5df28e06eff59008e5dc83", "score": "0.5262411", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6ReplySent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReplySentPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6ReplySentPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-reply-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "543486a48b40751a7d69548ed62357fb", "score": "0.521225", "text": "func RecvfromInet6(fd int, p []byte, flags int, from *syscall.SockaddrInet6) (n int, err error)", "title": "" }, { "docid": "2462ddfe77e5a553fe89aa0c4b525443", "score": "0.51598346", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPathAny) DhcpDiscoverReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpDiscoverReceivedPathAny {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpDiscoverReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-discover-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "9073d4d9d121dbaf3fb93ae28f5f783f", "score": "0.51590145", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPathAny) DhcpReleaseReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpReleaseReceivedPathAny {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpReleaseReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-release-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "81d51ffd5c74096490dcdd8020ab3f89", "score": "0.5120047", "text": "func RecvmsgInet6(fd int, p, oob []byte, flags int, from *syscall.SockaddrInet6) (n, oobn int, recvflags int, err error)", "title": "" }, { "docid": "7fc56c0df19626a26cafcc55caecb1ad", "score": "0.5084444", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPath) DhcpInformReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpInformReceivedPath {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpInformReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-inform-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8e065543a90ef4d691a09b6a60b7212e", "score": "0.50732696", "text": "func (n *RelayAgentPath) Dhcpv6() *RelayAgent_Dhcpv6Path {\n\treturn &RelayAgent_Dhcpv6Path{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "f5c2e345de27406545d921f5a753d9ff", "score": "0.50471175", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPathAny) DhcpRequestReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpRequestReceivedPathAny {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpRequestReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-request-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "bf6486b5c74de87b9781d87a092bef24", "score": "0.50145197", "text": "func (n *NetworkInstance_Protocol_Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_SegmentPath) RemoteIpv6Address() *NetworkInstance_Protocol_Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_Segment_RemoteIpv6AddressPath {\n\treturn &NetworkInstance_Protocol_Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_Segment_RemoteIpv6AddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"remote-ipv6-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "f2ff3d1465b5a52c50f5ba890188b627", "score": "0.4973296", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6RelayForwSent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayForwSentPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayForwSentPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-relay-forw-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "77b0e50a025e96902dd7ea74096aa91e", "score": "0.49593607", "text": "func Handler6(req, resp dhcpv6.DHCPv6) (dhcpv6.DHCPv6, bool) {\n\tif v6ServerID == nil {\n\t\tlog.Fatal(\"BUG: Plugin is running uninitialized!\")\n\t\treturn nil, true\n\t}\n\n\tmsg, err := req.GetInnerMessage()\n\tif err != nil {\n\t\t// BUG: this should already have failed in the main handler. Abort\n\t\tlog.Error(err)\n\t\treturn nil, true\n\t}\n\n\tif sid := msg.Options.ServerID(); sid != nil {\n\t\t// RFC8415 §16.{2,5,7}\n\t\t// These message types MUST be discarded if they contain *any* ServerID option\n\t\tif msg.MessageType == dhcpv6.MessageTypeSolicit ||\n\t\t\tmsg.MessageType == dhcpv6.MessageTypeConfirm ||\n\t\t\tmsg.MessageType == dhcpv6.MessageTypeRebind {\n\t\t\treturn nil, true\n\t\t}\n\n\t\t// Approximately all others MUST be discarded if the ServerID doesn't match\n\t\tif !sid.Equal(v6ServerID) {\n\t\t\tlog.Infof(\"requested server ID does not match this server's ID. Got %v, want %v\", sid, v6ServerID)\n\t\t\treturn nil, true\n\t\t}\n\t} else if msg.MessageType == dhcpv6.MessageTypeRequest ||\n\t\tmsg.MessageType == dhcpv6.MessageTypeRenew ||\n\t\tmsg.MessageType == dhcpv6.MessageTypeDecline ||\n\t\tmsg.MessageType == dhcpv6.MessageTypeRelease {\n\t\t// RFC8415 §16.{6,8,10,11}\n\t\t// These message types MUST be discarded if they *don't* contain a ServerID option\n\t\treturn nil, true\n\t}\n\tdhcpv6.WithServerID(v6ServerID)(resp)\n\treturn resp, false\n}", "title": "" }, { "docid": "a0fd1af9f8b684b098e3100b832f4020", "score": "0.49459738", "text": "func (n *RelayAgentPathAny) Dhcpv6() *RelayAgent_Dhcpv6PathAny {\n\treturn &RelayAgent_Dhcpv6PathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b7b4e8abc8229d99cea6a2d30d4e1fa6", "score": "0.49012333", "text": "func Handler6(req, resp dhcpv6.DHCPv6) (dhcpv6.DHCPv6, bool) {\n\t// TODO add IPv6 netmask to the response\n\treturn resp, false\n}", "title": "" }, { "docid": "27ff3a2bc52eb8cb67c173e455708f3b", "score": "0.4863562", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPath) DhcpDeclineReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpDeclineReceivedPath {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpDeclineReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-decline-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "d1670f557ac89d58912160b6bd22926f", "score": "0.48619756", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_IshPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Ish_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Ish_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a3b0d91449e727a66f6ac918df0ddf47", "score": "0.48558658", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_EshPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Esh_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Esh_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b19bf3199b80d840ae4e3b4377dba164", "score": "0.48555762", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPathAny) DhcpInformReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpInformReceivedPathAny {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpInformReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-inform-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "6edd7d66711acdbc8e48e46edc82b238", "score": "0.48262918", "text": "func (n *Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_SegmentPath) RemoteIpv6Address() *Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_Segment_RemoteIpv6AddressPath {\n\treturn &Bgp_Rib_AttrSet_TunnelEncapsulation_Tunnel_Subtlv_SegmentList_Segment_RemoteIpv6AddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"remote-ipv6-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8f1b7b85de1c1b535d75c3e9d781984d", "score": "0.4810466", "text": "func (n *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_GracefulRestartPath) Received() *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_GracefulRestart_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_GracefulRestart_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b2ea38efa2ab4110be224f33273d2968", "score": "0.48074716", "text": "func (v *VRF) IPv6UnicastRIB() *locRIB.LocRIB {\n\treturn v.ribForAddressFamily(addressFamily{afi: afiIPv6, safi: safiUnicast})\n}", "title": "" }, { "docid": "3085e5c40c89ac3bba3ddc49b6abf6e6", "score": "0.48055157", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_IihPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Iih_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Iih_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "21b2ccc47bc58e688b5f6a65f92c11f2", "score": "0.47825196", "text": "func (n *Stp_Mstp_MstInstance_Interface_CountersPath) BpduReceived() *Stp_Mstp_MstInstance_Interface_Counters_BpduReceivedPath {\n\treturn &Stp_Mstp_MstInstance_Interface_Counters_BpduReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"bpdu-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b67752f007ddec3f23d50020231e17a0", "score": "0.4738967", "text": "func (n *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_PrefixesPath) Received() *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Prefixes_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Prefixes_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2b977ef23066071a7a997cb88407f465", "score": "0.47336128", "text": "func GetDhcpRelay6ItfsFacingServer6(client sophos.ClientInterface, options ...sophos.Option) (val []interface{}, err error) {\n\terr = get(client, \"/api/nodes/dhcp.relay6.itfs_facing_server6\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "80f1bc2e48ffababab3c8a79718df9de", "score": "0.47208923", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_PrefixPath) UpDown() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_Prefix_UpDownPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_Prefix_UpDownPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"up-down\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "636e90f9af3a699e49dd6ae9f0406f58", "score": "0.47116968", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPathAny) Dhcpv6RelayForwSent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayForwSentPathAny {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6RelayForwSentPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-relay-forw-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c426df5e6b1d266d9aef033122078fd3", "score": "0.46715483", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_PrefixPath) UpDown() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_Prefix_UpDownPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_Prefix_UpDownPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"up-down\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "99031b74704987642c97a8289843162f", "score": "0.4667913", "text": "func (n *RelayAgent_Dhcp_Interface_CountersPathAny) DhcpDeclineReceived() *RelayAgent_Dhcp_Interface_Counters_DhcpDeclineReceivedPathAny {\n\treturn &RelayAgent_Dhcp_Interface_Counters_DhcpDeclineReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcp-decline-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b09b1973174041b0611b0a148a2c7dbb", "score": "0.46376082", "text": "func (n *Stp_Rstp_Interface_CountersPath) BpduReceived() *Stp_Rstp_Interface_Counters_BpduReceivedPath {\n\treturn &Stp_Rstp_Interface_Counters_BpduReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"bpdu-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "847899274580a899a4ddf897e609d376", "score": "0.4635886", "text": "func GetIpv6AdvancedRetransTime(client sophos.ClientInterface, options ...sophos.Option) (val map[string]interface{}, err error) {\n\terr = get(client, \"/api/nodes/ipv6.advanced.retrans_time\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "8485333ea91e0b3a262aba635b995249", "score": "0.46251142", "text": "func (n *Stp_Vlan_Interface_CountersPath) BpduReceived() *Stp_Vlan_Interface_Counters_BpduReceivedPath {\n\treturn &Stp_Vlan_Interface_Counters_BpduReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"bpdu-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "68d9481e0d2510744d55ce8d2b873ad4", "score": "0.46247414", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_CsnpPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Csnp_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Csnp_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a5ed24404c4b391dd5166151bcfd6326", "score": "0.46145386", "text": "func quaggaProtocolsBgpNeighborAddressFamilyIpv6UnicastRouteReflectorClient(Cmd int, Args cmd.Args) int {\n\t//protocols bgp WORD neighbor WORD address-family ipv6-unicast route-reflector-client\n\tif bgpConfigState == nil {\n\t\treturn cmd.Success\n\t}\n\tif _, _, ok := quaggaBgpNeighborLookup(Args[1]); !ok {\n\t\treturn cmd.Success\n\t}\n\tswitch Cmd {\n\tcase cmd.Set:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"neighbor \", Args[1], \" route-reflector-client\"))\n\tcase cmd.Delete:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"no neighbor \", Args[1], \" route-reflector-client\"))\n\t}\n\treturn cmd.Success\n}", "title": "" }, { "docid": "fd2022db1b513e4a8168f3bc29c50cfc", "score": "0.4592831", "text": "func (n *Bgp_Neighbor_AfiSafi_GracefulRestartPath) Received() *Bgp_Neighbor_AfiSafi_GracefulRestart_ReceivedPath {\n\treturn &Bgp_Neighbor_AfiSafi_GracefulRestart_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "14d2a77bc0a32df80c434e754fcb4271", "score": "0.45815656", "text": "func (s *RelayAgent) GetDhcpv6() *RelayAgent_Dhcpv6 {\n\tif s != nil && s.Dhcpv6 != nil {\n\t\treturn s.Dhcpv6\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1d8fe02a1703f6249e0663214846499d", "score": "0.45802388", "text": "func (n *NetworkInstance_Protocol_Bgp_Rib_AfiSafiPath) Ipv6Unicast() *NetworkInstance_Protocol_Bgp_Rib_AfiSafi_Ipv6UnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_Rib_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "d89ef6c7f00f55fcf2d4d65ba031f428", "score": "0.4565676", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6SrlgPath) Ipv6NeighborAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Srlg_Ipv6NeighborAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Srlg_Ipv6NeighborAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"ipv6-neighbor-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e7af23e0080b9b0bd2367b9ae5cb49cc", "score": "0.4557691", "text": "func (n *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafiPath) Ipv6Unicast() *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Ipv6UnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "de8471319ceeca61dd3bd518ea6597a2", "score": "0.45474237", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_UnknownPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Unknown_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Unknown_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5f663e93bdf57376b3fd1ec1a7ae0b7a", "score": "0.45249993", "text": "func GetIpv6Renumbering(client sophos.ClientInterface, options ...sophos.Option) (val bool, err error) {\n\terr = get(client, \"/api/nodes/ipv6.renumbering\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "6f917a47a89ccc42fc1e895803300f10", "score": "0.45202586", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_SubtlvPath) Ipv6NeighborAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-neighbor-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2369ab22b2eb3515c52fbc203b2a2fba", "score": "0.4518036", "text": "func GetIpv6BrokerStatus(client sophos.ClientInterface, options ...sophos.Option) (val bool, err error) {\n\terr = get(client, \"/api/nodes/ipv6.broker.status\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "8d35693946b60b95b3f0e2d52139f1de", "score": "0.45154753", "text": "func (i *isisLSP) processIPv6ReachabilityTLV(r *rawTLV) error {\n\ttlv, err := i.getTLVAndInit(oc.OpenconfigIsisLsdbTypes_ISIS_TLV_TYPE_IPV6_REACHABILITY, ipv6ReachabilityContainer)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Encoding of this TLV is:\n\t// 4-bytes of metric\n\t// 1-byte of control:\n\t//\tBit 7 - up/down\n\t//\tBit 6 - external origin\n\t//\tBit 5 - subtlv present\n\t// 1 octet of prefix length\n\t// N octets of prefix\n\t// 1 octet of subTLV length\n\t// N octets of subTLV\n\t//\n\t// This structure can be repeated.\n\n\t// Used to track the size of the TLV instance.\n\tvar s int\n\tvar pErr errlist.List\n\tfor x := 0; x < len(r.Value); x = s {\n\t\tif len(r.Value) < x+6 {\n\t\t\t// Must have at least metric, control, pfxlen\n\t\t\treturn fmt.Errorf(\"invalid IPv6 Reachability TLV, insufficient data: %d < %d\", len(r.Value), x+6)\n\t\t}\n\n\t\tmetric, err := binaryToUint32(r.Value[x+0 : x+4])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvar upDown, extOrigin, subTLVPresent bool\n\t\tif ubit := r.Value[x+4] & bit0; ubit != 0 {\n\t\t\tupDown = true\n\t\t}\n\n\t\tif ebit := r.Value[x+4] & bit1; ebit != 0 {\n\t\t\textOrigin = true\n\t\t}\n\n\t\tif sbit := r.Value[x+4] & bit2; sbit != 0 {\n\t\t\tsubTLVPresent = true\n\t\t}\n\n\t\t// The prefix length specifies both the mask and then the number of\n\t\t// octets that are packed into the TLV - such tha the encoding does\n\t\t// not always specify all 128b of the IPv6 address.\n\t\tpfxlen := int(r.Value[x+5])\n\t\tipBytes := make([]byte, 16)\n\t\tipL := int((pfxlen + 7) / 8)\n\n\t\tif len(r.Value) < x+6+ipL {\n\t\t\t//lint:ignore ST1005 error strings should not be capitalized\n\t\t\treturn fmt.Errorf(\"Invalid prefix length, %d, overflows length of TLV %d\", ipL, len(r.Value))\n\t\t}\n\n\t\tfor j := 0; j < ipL; j++ {\n\t\t\tipBytes[j] = r.Value[x+6+j]\n\t\t}\n\n\t\taddr, err := ip6BytesToString(ipBytes)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpfx := fmt.Sprintf(\"%s/%d\", addr, pfxlen)\n\n\t\t// Track the current size of this TLV\n\t\ts = x + 6 + ipL\n\n\t\tif _, ok := tlv.Ipv6Reachability.Prefix[pfx]; ok {\n\t\t\treturn err\n\t\t}\n\n\t\tpfxTLV := &oc.Lsp_Tlv_Ipv6Reachability_Prefix{\n\t\t\tPrefix: ygot.String(pfx),\n\t\t\tUpDown: ygot.Bool(upDown),\n\t\t\tSBit: ygot.Bool(subTLVPresent),\n\t\t\tXBit: ygot.Bool(extOrigin),\n\t\t\tMetric: ygot.Uint32(metric),\n\t\t}\n\n\t\tif subTLVPresent {\n\t\t\tif len(r.Value) < s+1 {\n\t\t\t\treturn errors.New(\"invalid length IPv6 Reachability TLV, subTLVs present but no length byte present\")\n\t\t\t}\n\n\t\t\tsubTLVLen := int(r.Value[s])\n\n\t\t\tif len(r.Value) < s+1+subTLVLen {\n\t\t\t\t// Underflow of the TLV is fatal.\n\t\t\t\treturn fmt.Errorf(\"invalid length IPv6 Reachability subTLVs, subTLV length %d, but byte length %d\", s+subTLVLen, len(r.Value))\n\t\t\t}\n\n\t\t\tsubTLVs, err := TLVBytesToTLVs(r.Value[s+1 : s+1+subTLVLen])\n\t\t\tif err != nil {\n\t\t\t\t// Inability to parse TLVs is fatal.\n\t\t\t\treturn fmt.Errorf(\"invalid subTLVs in IPv6 Reachability TLV: %v\", err)\n\t\t\t}\n\n\t\t\tfor _, st := range subTLVs {\n\t\t\t\tswitch st.Type {\n\t\t\t\tcase 3:\n\t\t\t\t\tpfxseg, err := parsePrefixSIDSubTLV(st)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tpErr.Add(err)\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tif err := addIPv6ReachabilityPrefixSID(pfxTLV, pfxseg); err != nil {\n\t\t\t\t\t\tpErr.Add(err)\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\t// TODO(robjs): Add this subTLV to the unknown subTLV list.\n\t\t\t\t\tpErr.Add(fmt.Errorf(\"unimplemented sub-TLV parsing for type %d in IPv6 Reachability TLV\", st.Type))\n\t\t\t\t}\n\t\t\t}\n\t\t\ts += 1 + subTLVLen\n\t\t}\n\n\t\tif err := tlv.Ipv6Reachability.AppendPrefix(pfxTLV); err != nil {\n\t\t\treturn fmt.Errorf(\"cannot append IPv6 Reachability TLV, %v\", err)\n\t\t}\n\t}\n\n\tif s != len(r.Value) {\n\t\treturn fmt.Errorf(\"invalid IPv6 Reachability TLV, does not have correct length: %d != %d, remaining bytes: %v\", s, len(r.Value), r.Value[s:])\n\t}\n\n\treturn pErr.Err()\n}", "title": "" }, { "docid": "5c637a25d84667828d9a419f99b2474e", "score": "0.45111242", "text": "func (n *NetworkInstance_Protocol_Bgp_Global_AfiSafiPath) Ipv6Unicast() *NetworkInstance_Protocol_Bgp_Global_AfiSafi_Ipv6UnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_Global_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "980ef4d86ba9f0dbb3f13d68497e40bc", "score": "0.45105824", "text": "func (n *NetworkInstance_Protocol_Bgp_Neighbor_MessagesPath) Received() *NetworkInstance_Protocol_Bgp_Neighbor_Messages_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Bgp_Neighbor_Messages_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2c4b6fb207022e864f2886ff195f43dc", "score": "0.45035392", "text": "func (n *Bgp_Rib_AfiSafiPath) Ipv6Unicast() *Bgp_Rib_AfiSafi_Ipv6UnicastPath {\n\treturn &Bgp_Rib_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "30b68ba98a576514929dddf7fbc5d5e8", "score": "0.44981855", "text": "func (n *NetworkInstance_Protocol_Bgp_PeerGroup_AfiSafiPath) Ipv6Unicast() *NetworkInstance_Protocol_Bgp_PeerGroup_AfiSafi_Ipv6UnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_PeerGroup_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5583106ca6bdf2c55e88b1bda2699e76", "score": "0.4487686", "text": "func (s *ClientRW) RecvCh() chan []byte {\n\treturn s.r.RecvFromDownCh()\n}", "title": "" }, { "docid": "9f79811239e12f7174607e573862c1f1", "score": "0.44740528", "text": "func (n *Bgp_Neighbor_AfiSafi_PrefixesPath) Received() *Bgp_Neighbor_AfiSafi_Prefixes_ReceivedPath {\n\treturn &Bgp_Neighbor_AfiSafi_Prefixes_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "128525ff6c1058427d0c0fa7b3594bb6", "score": "0.44638753", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_PsnpPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Psnp_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Psnp_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "01437aa0a014b589f81c0ffe49e716c0", "score": "0.44635764", "text": "func quaggaProtocolsBgpPeerGroupAddressFamilyIpv6UnicastRouteReflectorClient(Cmd int, Args cmd.Args) int {\n\t//protocols bgp WORD peer-group WORD address-family ipv6-unicast route-reflector-client\n\tif bgpConfigState == nil {\n\t\treturn cmd.Success\n\t}\n\tif _, _, ok := quaggaBgpPeerGroupLookup(Args[1]); !ok {\n\t\treturn cmd.Success\n\t}\n\tswitch Cmd {\n\tcase cmd.Set:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"neighbor \", Args[1], \" route-reflector-client\"))\n\tcase cmd.Delete:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"no neighbor \", Args[1], \" route-reflector-client\"))\n\t}\n\treturn cmd.Success\n}", "title": "" }, { "docid": "93f2b86a5b1dbb9ca59138d9771637e0", "score": "0.44632968", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_SubtlvPath) Ipv6NeighborAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-neighbor-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "48cc652447226db1565ceb8f8a992624", "score": "0.4454841", "text": "func quaggaProtocolsBgpNeighborAddressFamilyIpv6UnicastCapabilityOrfPrefixListReceive(Cmd int, Args cmd.Args) int {\n\t//protocols bgp WORD neighbor WORD address-family ipv6-unicast capability orf prefix-list receive\n\tif bgpConfigState == nil {\n\t\treturn cmd.Success\n\t}\n\tif _, _, ok := quaggaBgpNeighborLookup(Args[1]); !ok {\n\t\treturn cmd.Success\n\t}\n\tswitch Cmd {\n\tcase cmd.Set:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"neighbor \", Args[1], \" capability orf prefix-list receive\"))\n\tcase cmd.Delete:\n\t\tquaggaVtysh(\"configure terminal\",\n\t\t\tfmt.Sprint(\"router bgp \", Args[0]),\n\t\t\t\"address-family ipv6\",\n\t\t\tfmt.Sprint(\"no neighbor \", Args[1], \" capability orf prefix-list receive\"))\n\t}\n\treturn cmd.Success\n}", "title": "" }, { "docid": "4de86f2f608cb60d890f6bc704daa566", "score": "0.44538066", "text": "func (n *Bgp_Neighbor_AfiSafiPath) Ipv6Unicast() *Bgp_Neighbor_AfiSafi_Ipv6UnicastPath {\n\treturn &Bgp_Neighbor_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "4e51244b48b84eb2beff55a4c5fb87a0", "score": "0.44521686", "text": "func (*IPv6AddressObject) Descriptor() ([]byte, []int) {\n\treturn file_mitre_stix_v2_observable_proto_rawDescGZIP(), []int{10}\n}", "title": "" }, { "docid": "e7c91b98c350253dfd144fdf957fe926", "score": "0.445118", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_PrefixPathAny) UpDown() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_Prefix_UpDownPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIpv6Reachability_Prefix_UpDownPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"up-down\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a8c0ba3d7754f0b8b20b28f6ebe94617", "score": "0.4449977", "text": "func (t *SrlNokiaInterfaces_Interface_Subinterface_Ipv6_DhcpRelay) Validate(opts ...ygot.ValidationOption) error {\n\tif err := ytypes.Validate(SchemaTree[\"SrlNokiaInterfaces_Interface_Subinterface_Ipv6_DhcpRelay\"], t, opts...); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5f76c7cd6dbbd2c0fd9f80070e9cf56c", "score": "0.44333178", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_SubtlvPath) Ipv6NeighborAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-neighbor-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "9a4098863ddb83ba7bb5e0447ebc518c", "score": "0.44321772", "text": "func (n *Bgp_Global_AfiSafiPath) Ipv6Unicast() *Bgp_Global_AfiSafi_Ipv6UnicastPath {\n\treturn &Bgp_Global_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8873f8f2c719a8beba0f0cc40de48a7c", "score": "0.44296587", "text": "func (a *AdjRIBIn) RefreshRoute(*net.Prefix, []*route.Path) {\n\n}", "title": "" }, { "docid": "02e9143fdf55be1986ef0bebe5629031", "score": "0.44257382", "text": "func (n *Bgp_PeerGroup_AfiSafiPath) Ipv6Unicast() *Bgp_PeerGroup_AfiSafi_Ipv6UnicastPath {\n\treturn &Bgp_PeerGroup_AfiSafi_Ipv6UnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "1ad30c5e17821cd138270a946f571f91", "score": "0.44203946", "text": "func (cd *connectionData) AcknowlegedBytes() uint32 {\n\treturn cd.bytesReceived\n}", "title": "" }, { "docid": "bb2d7ed6cf104633bfadd60d38093965", "score": "0.44139722", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_PrefixPathAny) UpDown() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_Prefix_UpDownPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6Reachability_Prefix_UpDownPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"up-down\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "06cdb1d677da34db91c4a0493af1d6b1", "score": "0.44107544", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_SubtlvPath) Ipv6InterfaceAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_Ipv6InterfaceAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_Ipv6InterfaceAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-interface-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "235f05495f2ce5e1eac5ff767e88dd92", "score": "0.44085863", "text": "func (n *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafiPath) Ipv6LabeledUnicast() *NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Ipv6LabeledUnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_Neighbor_AfiSafi_Ipv6LabeledUnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-labeled-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a316d63f2241af12438817777e530232", "score": "0.44080368", "text": "func (*Afts_Ipv6Entry) Descriptor() ([]byte, []int) {\n\treturn file_protomap_integration_tests_testdata_gribi_aft_gribi_aft_proto_rawDescGZIP(), []int{1, 2}\n}", "title": "" }, { "docid": "857a05cdec08d240ef17a203109641c0", "score": "0.4406232", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_SubtlvPath) Ipv6NeighborAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_Ipv6NeighborAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-neighbor-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "65143c7055ec73c201be9060fc3e86b8", "score": "0.44029582", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_TlvPath) Ipv6Reachability() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6ReachabilityPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_Ipv6ReachabilityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-reachability\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0f302c8ab3739d54c915fbd174873803", "score": "0.44024262", "text": "func (s *Server) ReleaseIPv6Prefix(context.Context, *pb.ReleaseIPv6PrefixRequest) (*pb.GenericResponse, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "c57051e0da6234f2f0c7ac4af233ed3a", "score": "0.43967098", "text": "func GetIpv6AdvancedReachableTime(client sophos.ClientInterface, options ...sophos.Option) (val map[string]interface{}, err error) {\n\terr = get(client, \"/api/nodes/ipv6.advanced.reachable_time\", &val, options...)\n\treturn\n}", "title": "" }, { "docid": "9a453ad6472de831a967a1c9fce77551", "score": "0.43961123", "text": "func (n *Stp_Mstp_MstInstance_Interface_CountersPathAny) BpduReceived() *Stp_Mstp_MstInstance_Interface_Counters_BpduReceivedPathAny {\n\treturn &Stp_Mstp_MstInstance_Interface_Counters_BpduReceivedPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"bpdu-received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8e5ea2798e57da248b883ea114cca62f", "score": "0.43954638", "text": "func UpdateDhcpRelay6Status(client sophos.ClientInterface, val bool, options ...sophos.Option) (err error) {\n\treturn put(client, \"/api/nodes/dhcp.relay6.status\", val, options...)\n}", "title": "" }, { "docid": "562453bcf980c97804ba6e8e3789faa5", "score": "0.43908358", "text": "func (*CGCToGCMsgRoutedReply) Descriptor() ([]byte, []int) {\n\treturn file_gcsdk_gcmessages_proto_rawDescGZIP(), []int{15}\n}", "title": "" }, { "docid": "dbaad9ce08e79ca5884bcdff6e723d98", "score": "0.4380674", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_LspPath) Received() *NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Lsp_ReceivedPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PacketCounters_Lsp_ReceivedPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"received\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a87a127cddc3ce44fa6dbf85746ef065", "score": "0.43659508", "text": "func (n *NetworkInstance_Protocol_Bgp_Global_AfiSafiPath) Ipv6LabeledUnicast() *NetworkInstance_Protocol_Bgp_Global_AfiSafi_Ipv6LabeledUnicastPath {\n\treturn &NetworkInstance_Protocol_Bgp_Global_AfiSafi_Ipv6LabeledUnicastPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-labeled-unicast\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "b5502d3828d33a3241abb10179e66e14", "score": "0.4362045", "text": "func (a *LocRIB) RefreshRoute(*net.Prefix, []*route.Path) {}", "title": "" }, { "docid": "3efd6e4f62b0d680a04b462cbab1c8c0", "score": "0.43618992", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_SubtlvPath) Ipv6InterfaceAddress() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6InterfaceAddressPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_Ipv6InterfaceAddressPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"ipv6-interface-address\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "672edd5c920c0eea40bcd834e8173ddb", "score": "0.43491834", "text": "func (n *RelayAgent_Dhcpv6_Interface_CountersPath) Dhcpv6AdverstiseSent() *RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6AdverstiseSentPath {\n\treturn &RelayAgent_Dhcpv6_Interface_Counters_Dhcpv6AdverstiseSentPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"dhcpv6-adverstise-sent\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" } ]
9c888d9da6fe68bf18c8a10b1aaafc5c
SetTimeArg sets the TimeArg field's value.
[ { "docid": "7f0dcaac8382257031ee9a870cf5c2f7", "score": "0.815151", "text": "func (s *OutputService16TestShapeOutputService16TestCaseOperation1Output) SetTimeArg(v time.Time) *OutputService16TestShapeOutputService16TestCaseOperation1Output {\n\ts.TimeArg = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "7ef551d9a1fc6d6a8f49e4308ed507bc", "score": "0.71245474", "text": "func Time(t uint32) Option {\n\treturn func(a *Argon2id) {\n\t\ta.time = t\n\t}\n}", "title": "" }, { "docid": "8412fb5002c600614a843533e15841c4", "score": "0.70206356", "text": "func (o *PcloudEventsGetqueryParams) SetTime(time *string) {\n\to.Time = time\n}", "title": "" }, { "docid": "4528a3d14d488107a284046fb939b05b", "score": "0.69774216", "text": "func SetTime(t time.Time) {\n\tup := time.Duration(rtos.Nanosec())\n\tt = t.Add(-up)\n\tsetStartTime(t)\n}", "title": "" }, { "docid": "af77b7e6966cd5991b6961d72d4e0bca", "score": "0.6926261", "text": "func (t *Time) SetTime(time time.Time) {\n\tt.time = time\n}", "title": "" }, { "docid": "b73a9ac15d31b9a2faded9c9dfb755a6", "score": "0.6883993", "text": "func (o *UpdateAlarmsParams) SetTime(time string) {\n\to.Time = time\n}", "title": "" }, { "docid": "438409e3cc62938f0f9d958fa4989e6b", "score": "0.6855208", "text": "func SetTime(t time.Time, ns int64) {\n\ttime.Set(t, ns)\n\tsetStartTime(t.Add(time.Duration(-ns)))\n}", "title": "" }, { "docid": "9f6a59de2592fbc1beba85340a1a6060", "score": "0.68421257", "text": "func (this *Player) SetTime(v int64) {\n\tif this.ptr != nil {\n\t\tC.libvlc_media_player_set_time(this.ptr, C.libvlc_time_t(v))\n\t}\n}", "title": "" }, { "docid": "4abe1e6e2118eb713b04402501554e87", "score": "0.6840337", "text": "func (c *rtc) SetTime(t time.Time) (err error) {\n\n\treturn nil\n}", "title": "" }, { "docid": "c11e0adf59183efef97fc6667990522e", "score": "0.6769702", "text": "func (m *DeviceHealthScriptTimeSchedule) SetTime(value *i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.TimeOnly)() {\n err := m.GetBackingStore().Set(\"time\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "130dcc28cfa664641fd3621fd0247fba", "score": "0.66443676", "text": "func (a *CalibeurRF104DataPoint) SetTime(t time.Time) {\n\ta.Time = t\n}", "title": "" }, { "docid": "06885240b9c38a0a342336e370d3282f", "score": "0.66372454", "text": "func (cl *MockClock) SetTime(t time.Time) {\n\tcl.mutex.Lock()\n\tcl.currentTime = t\n\tcl.mutex.Unlock()\n\tcl.broadcast()\n}", "title": "" }, { "docid": "3787c8180b3cd62593bc077e89f21d86", "score": "0.6621773", "text": "func (o *QueryCandleStickParams) SetTime(time int64) {\n\to.Time = time\n}", "title": "" }, { "docid": "fe0cf0e8ff21adeae613f69079591ac0", "score": "0.66215885", "text": "func (o *MetricsDatapoint) SetTime(v time.Time) {\n\to.Time = v\n}", "title": "" }, { "docid": "dd7e3c9c1de9017ef9f340576c69ef1c", "score": "0.66067594", "text": "func (t *Timestamp) SetTime(pt time.Time) error {\n\tts, err := types.TimestampProto(pt)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt.Timestamp = *ts\n\treturn nil\n}", "title": "" }, { "docid": "5de5ed9e693f464473cb14510b88b305", "score": "0.64847434", "text": "func (p *DataPoint) SetTime(t time.Time) {\n\tp.Timestamp = proto.Int64(t.UnixNano() / int64(time.Millisecond))\n}", "title": "" }, { "docid": "11531ed905a10e42eff26accb13fdde6", "score": "0.64205754", "text": "func (o *TreeMapWidgetDefinition) SetTime(v WidgetTime) {\n\to.Time = &v\n}", "title": "" }, { "docid": "2d8ad2915b4223cc690ee8a47c5b325d", "score": "0.64168054", "text": "func (o *StreamSet) SetTime(v TimeStream) {\n\to.Time = &v\n}", "title": "" }, { "docid": "971d0f9cedc65ae3822ad36fe9299652", "score": "0.63592774", "text": "func (guo *GaugeUpdateOne) SetTime(i int64) *GaugeUpdateOne {\n\tguo.mutation.ResetTime()\n\tguo.mutation.SetTime(i)\n\treturn guo\n}", "title": "" }, { "docid": "8128ea67ca0bf8d8d0ad91bfac7250bd", "score": "0.6332437", "text": "func (xu *XUtil) TimeSet(t xproto.Timestamp) {\n\txu.eventTime = t\n}", "title": "" }, { "docid": "029187c4cab15e1124e6554c0fc8d960", "score": "0.6311619", "text": "func (o *EarningsCallTranscripts) SetTime(v string) {\n\to.Time = &v\n}", "title": "" }, { "docid": "310e32dc620fd434d35ec2a54c372d03", "score": "0.6295642", "text": "func (o *DistributionWidgetDefinition) SetTime(v WidgetTime) {\n\to.Time = &v\n}", "title": "" }, { "docid": "9400933010683f64c3269b0ef314a1fa", "score": "0.62754464", "text": "func (m *StandardTimeZoneOffset) SetTime(value *i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.TimeOnly)() {\n err := m.GetBackingStore().Set(\"time\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "912e6dfd7af0b4d1ea4e2d741129f8e1", "score": "0.6271784", "text": "func (ent *Mutex) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar ok bool\n\tswitch argIndex {\n\tcase 0:\n\t\t// arg 0 is the mutex name\n\t\tent.name, ok = arg.(string)\n\tcase 1:\n\t\t// arg1 is the sync level (bits 0:3)\n\t\tvar syncLevel uint64\n\t\tsyncLevel, ok = arg.(uint64)\n\t\tent.SyncLevel = uint8(syncLevel) & 0xf\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "7e0ccbddc49dfbf5f583e133cb265611", "score": "0.62707675", "text": "func (i *Inverter) SetTime(t time.Time) error {\n\tvalue := uint32(t.Unix() - InverterEpochOffset)\n\tbuf := new(bytes.Buffer)\n\tbinary.Write(buf, binary.BigEndian, value)\n\tbvalue := buf.Bytes()\n\t_, err := i.Communicate(SetTime, Byte(bvalue[0]), Byte(bvalue[1]), Byte(bvalue[2]), Byte(bvalue[3]))\n\treturn err\n}", "title": "" }, { "docid": "168aea1c9e68c8a60232fc1569a0ca38", "score": "0.62158966", "text": "func (o *LogsAggregateBucketValueTimeseriesPoint) SetTime(v string) {\n\to.Time = &v\n}", "title": "" }, { "docid": "53553890c056ea417a1eb2e0cf1b5308", "score": "0.62117845", "text": "func (gu *GaugeUpdate) SetTime(i int64) *GaugeUpdate {\n\tgu.mutation.ResetTime()\n\tgu.mutation.SetTime(i)\n\treturn gu\n}", "title": "" }, { "docid": "a9a525ff72c2735a7b2198e4d3409dfe", "score": "0.6188147", "text": "func (t *Time) Set(value time.Time) {\n\t*t = Time(value)\n}", "title": "" }, { "docid": "d28d69de2d19f1a51579b770e2e02043", "score": "0.6182208", "text": "func (a *FineOffsetWH24DataPoint) SetTime(t time.Time) {\n\ta.Time = t\n}", "title": "" }, { "docid": "ac3aa846598a1d3a7c33fb2eb5388767", "score": "0.61667925", "text": "func (t *TimerOperations) SetTime(s ktime.Setting) (ktime.Time, ktime.Setting) {\n\treturn t.timer.SwapAnd(s, func() { atomic.StoreUint64(&t.val, 0) })\n}", "title": "" }, { "docid": "4285655a67e40155fd018f5e3a4b6b23", "score": "0.6127467", "text": "func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {\n\treturn fs.ErrorCantSetModTime\n}", "title": "" }, { "docid": "53a6589d5f6ceb3945e211098038ec39", "score": "0.61021996", "text": "func (o *Object) SetModTime(ctx context.Context, mtime time.Time) error {\n\treturn fs.ErrorCantSetModTimeWithoutDelete\n}", "title": "" }, { "docid": "63c2e714df745b7e9943e24b203ba7ec", "score": "0.61020774", "text": "func (ent *Field) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\tent.RegionName, ok = arg.(string)\n\tcase 1:\n\t\tuintVal, ok = arg.(uint64)\n\n\t\tent.AccessType = FieldAccessType(uintVal & 0xf) // access type; bits[0:3]\n\t\tent.LockRule = FieldLockRule((uintVal >> 4) & 0x1) // lock; bit 4\n\t\tent.UpdateRule = FieldUpdateRule((uintVal >> 5) & 0x3) // update rule; bits[5:6]\n\t}\n\n\treturn ok\n}", "title": "" }, { "docid": "56439316e815914726cb68f37cb0cdde", "score": "0.60957265", "text": "func (ent *Generic) SetArg(_ uint8, arg interface{}) bool {\n\tent.args = append(ent.args, arg)\n\treturn true\n}", "title": "" }, { "docid": "5cbfaa3716a3156e714f8156b02912cc", "score": "0.60871416", "text": "func (o *Object) SetModTime(ctx context.Context, t time.Time) error {\n\tif err := o.refreshFromSource(ctx, false); err != nil {\n\t\treturn err\n\t}\n\n\terr := o.Object.SetModTime(ctx, t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\to.CacheModTime = t.UnixNano()\n\to.persist()\n\tfs.Debugf(o, \"updated ModTime: %v\", t)\n\n\treturn nil\n}", "title": "" }, { "docid": "54515f733274f392910c9188534ebd7e", "score": "0.6085827", "text": "func (s *PipeTargetEventBridgeEventBusParameters) SetTime(v string) *PipeTargetEventBridgeEventBusParameters {\n\ts.Time = &v\n\treturn s\n}", "title": "" }, { "docid": "c6725d70b8197fd0beddd9de52ba2217", "score": "0.60748446", "text": "func SetModTime(filepath string, time time.Time) error {\n\t_, err := exec.LookPath(\"SetFile\")\n\tif err != nil {\n\t\treturn errors.New(\"current OS / textbundler implementation does not support setting file modification times\")\n\t}\n\n\tcmd := exec.Command(\"SetFile\", \"-m\", time.Format(\"01/02/2006 03:04:05 PM\"), filepath)\n\tif err := cmd.Run(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0d14136f9d69530d6dbd487324de074d", "score": "0.60511744", "text": "func (ent *GenericNamed) SetArg(argIndex uint8, arg interface{}) bool {\n\t// arg 0 is the entity name\n\tif argIndex == 0 {\n\t\tvar ok bool\n\t\tent.name, ok = arg.(string)\n\t\treturn ok\n\t}\n\n\tent.args = append(ent.args, arg)\n\treturn true\n}", "title": "" }, { "docid": "9124f7fd0373c5d20159b43beea7ae0f", "score": "0.60425735", "text": "func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {\n\tif o.fs.opt.NoSetModTime {\n\t\treturn nil\n\t}\n\terr := o.setTimes(modTime, modTime)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Re-read metadata\n\treturn o.lstat()\n}", "title": "" }, { "docid": "847ae5b6e91993c806c4970effea517e", "score": "0.6030051", "text": "func (c *context) SetArg(name string, value interface{}) {\n\tc.SetParam(name, value)\n}", "title": "" }, { "docid": "553e5f8fc0a851bfe9d7a1e9048bbe8f", "score": "0.6024646", "text": "func (doc *Document) SetTime(fieldPath string, value *OTime) *Document {\n\tif arrRgx.MatchString(fieldPath) {\n\t\tdoc.setArrayValue(fieldPath, value)\n\t} else {\n\t\tdoc.documentMap = mergeMaps(doc.documentMap, doc.newValue(fieldPath, value)).(map[string]interface{})\n\t}\n\treturn doc\n}", "title": "" }, { "docid": "c884c2543afe0e2dedef0a1a40dd394d", "score": "0.6017267", "text": "func (self *Mem) SetTimed(val Timed) {\n\tself.lock.Lock()\n\tdefer self.lock.Unlock()\n\tself.val = val\n}", "title": "" }, { "docid": "1211d7e0bc79a6f985bfb6467762d1c8", "score": "0.59840804", "text": "func (o *Object) SetModTime(ctx context.Context, t time.Time) (err error) {\n\tshare, reqDir := o.split()\n\tif share == \"\" || reqDir == \"\" {\n\t\treturn fs.ErrorCantSetModTime\n\t}\n\treqDir = o.fs.toSambaPath(reqDir)\n\n\tcn, err := o.fs.getConnection(ctx, share)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer o.fs.putConnection(&cn)\n\n\terr = cn.smbShare.Chtimes(reqDir, t, t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfi, err := cn.smbShare.Stat(reqDir)\n\tif err == nil {\n\t\to.statResult = fi\n\t}\n\treturn err\n}", "title": "" }, { "docid": "89908877da1b4bbc07ef5e8fedc97d84", "score": "0.59840244", "text": "func (e *Encoder) SetTime(seconds string) int {\n\te.config.Time, _ = strconv.Atoi(seconds)\n\n\te.fixValues()\n\n\treturn e.config.Time\n}", "title": "" }, { "docid": "99d550fd09b283be6be7d31cc7191b3b", "score": "0.5974152", "text": "func (ent *IndexField) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\tent.IndexRegName, ok = arg.(string)\n\tcase 1:\n\t\tent.DataRegName, ok = arg.(string)\n\tcase 2:\n\t\tuintVal, ok = arg.(uint64)\n\n\t\tent.AccessType = FieldAccessType(uintVal & 0xf) // access type; bits[0:3]\n\t\tent.LockRule = FieldLockRule((uintVal >> 4) & 0x1) // lock; bit 4\n\t\tent.UpdateRule = FieldUpdateRule((uintVal >> 5) & 0x3) // update rule; bits[5:6]\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "0aa97335463f3440b4dde66973c4017d", "score": "0.5967539", "text": "func (ent *PowerResource) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\t// Arg0 is the name but it is actually defined when creating the entity\n\t\tok = true\n\tcase 1:\n\t\t// arg1 is the system level (ByteData)\n\t\tuintVal, ok = arg.(uint64)\n\t\tent.SystemLevel = uint8(uintVal)\n\tcase 2:\n\t\t// arg2 is the resource order (WordData)\n\t\tuintVal, ok = arg.(uint64)\n\t\tent.ResourceOrder = uint16(uintVal)\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "f559c562c7ea467e98f89933ceb88ed6", "score": "0.5963385", "text": "func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {\n\terr := o.readMetaData(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\to.meta[metaMtime] = swift.TimeToFloatString(modTime)\n\t_, err = o.fs.Copy(ctx, o, o.remote)\n\treturn err\n}", "title": "" }, { "docid": "f39d6402a421f284a80773c42b701294", "score": "0.5947581", "text": "func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {\n if titre_fonction == true{\n fmt.Println(\"Using the object setModtime function \")\n }\n\n client,path,err :=o.fs.xrdremote(o.path(),ctx)\n if err != nil{\n return errors.Wrap(err, \"SetModTime\")\n }\n defer client.Close()\n\n err = os.Chtimes(path, modTime, modTime)\n if err != nil {\n\t\treturn errors.Wrap(err, \"SetModTime failed\")\n\t}\n err = o.stat(ctx)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"SetModTime stat failed\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b9f67e0949c12ed7b022cbd7ae82f1bf", "score": "0.59262896", "text": "func (ent *Region) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar ok bool\n\tswitch argIndex {\n\tcase 0:\n\t\tok = ent.GenericNamed.SetArg(argIndex, arg)\n\tcase 1:\n\t\t// the parser will convert ByteData types to uint64\n\t\tvar space uint64\n\t\tspace, ok = arg.(uint64)\n\t\tent.Space = RegionSpace(space)\n\tcase 2:\n\t\tent.Offset = arg\n\t\tok = true\n\tcase 3:\n\t\tent.Len = arg\n\t\tok = true\n\t}\n\n\treturn ok\n}", "title": "" }, { "docid": "b9e15c99c2c7f47f14f9b74ea0ca7e21", "score": "0.5864984", "text": "func (when *NTPLong) SetTime(t time.Time) {\n\tntpTime := t.Add(unixEpoch.Sub(ntpEpoch))\n\t// whole seconds\n\ts := ntpTime.Unix()\n\t// fractional nanoseconds\n\tns := ntpTime.UnixNano() - s*1e9\n\twhen.Seconds = uint32(s)\n\twhen.SetNanos(int(ns))\n}", "title": "" }, { "docid": "b73dc01919743645d41622362c49dddb", "score": "0.58496034", "text": "func (ent *BankField) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\tent.RegionName, ok = arg.(string)\n\tcase 1:\n\t\tent.BankFieldUnitName, ok = arg.(string)\n\tcase 2:\n\t\tent.BankFieldUnitValue, ok = arg, true\n\tcase 3:\n\t\tuintVal, ok = arg.(uint64)\n\n\t\tent.AccessType = FieldAccessType(uintVal & 0xf) // access type; bits[0:3]\n\t\tent.LockRule = FieldLockRule((uintVal >> 4) & 0x1) // lock; bit 4\n\t\tent.UpdateRule = FieldUpdateRule((uintVal >> 5) & 0x3) // update rule; bits[5:6]\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "1a2457e235e9f4465b91c3158f46a7c3", "score": "0.58469284", "text": "func (s *TimeSeriesDataPoint) SetTime(v string) *TimeSeriesDataPoint {\n\ts.Time = &v\n\treturn s\n}", "title": "" }, { "docid": "edb70e5026ecf9b972a6df5662dbe7a5", "score": "0.58273315", "text": "func (ent *Method) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\t// Arg0 is the name but it is actually defined when creating the entity\n\t\tok = true\n\tcase 1:\n\t\t// arg1 is the method flags\n\t\tuintVal, ok = arg.(uint64)\n\n\t\tent.ArgCount = (uint8(uintVal) & 0x7) // bits[0:2]\n\t\tent.Serialized = (uint8(uintVal)>>3)&0x1 == 0x1 // bit 3\n\t\tent.SyncLevel = (uint8(uintVal) >> 4) & 0xf // bits[4:7]\n\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "aea707464a0726fc3b2c46fa8a5b340f", "score": "0.58207345", "text": "func (o *Object) SetModTime(ctx context.Context, t time.Time) error {\n\tentries, err := o.fs.actionEntries(o.candidates()...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar wg sync.WaitGroup\n\terrs := Errors(make([]error, len(entries)))\n\tmultithread(len(entries), func(i int) {\n\t\tif o, ok := entries[i].(*upstream.Object); ok {\n\t\t\terr := o.SetModTime(ctx, t)\n\t\t\tif err != nil {\n\t\t\t\terrs[i] = fmt.Errorf(\"%s: %w\", o.UpstreamFs().Name(), err)\n\t\t\t}\n\t\t} else {\n\t\t\terrs[i] = fs.ErrorNotAFile\n\t\t}\n\t})\n\twg.Wait()\n\treturn errs.Err()\n}", "title": "" }, { "docid": "f4582d393414718aa687d77523b5d3c3", "score": "0.57880884", "text": "func SetTime(servers []string, config string, fallback string, setRTC bool) (string, float64, error) {\n\treturn setTime(servers, config, fallback, setRTC, &realGetterSetter{})\n}", "title": "" }, { "docid": "93c9a3e137830049ee62722d8c05b84c", "score": "0.57514805", "text": "func (term *Termios) SetVTime(v uint8) {\n\tterm.c_cc[C.VTIME] = C.cc_t(v)\n}", "title": "" }, { "docid": "c167879ad6de59c064a629e53941a5d5", "score": "0.5746625", "text": "func (self *Timer) SetTimeCapA(member int) {\n self.Object.Set(\"timeCap\", member)\n}", "title": "" }, { "docid": "bf4e382a6dab809e19089cdb51a70799", "score": "0.57440895", "text": "func (ent *Buffer) SetArg(argIndex uint8, arg interface{}) bool {\n\tswitch argIndex {\n\tcase 0: // size\n\t\tent.size = arg\n\t\treturn true\n\tcase 1: // data\n\t\tif byteSlice, ok := arg.([]byte); ok {\n\t\t\tent.data = byteSlice\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2f63e7ed74c578ce84453d93642de8d8", "score": "0.57405233", "text": "func (tds *MiTDSensor) SetTime(t time.Time) error {\n\tc := getCharacteristicByValueHandle(tds.profile, 0x23)\n\tif c == nil {\n\t\treturn fmt.Errorf(\"characteristic 0x23 not found\")\n\t}\n\n\tdata := make([]byte, 4)\n\tbinary.LittleEndian.PutUint32(data, uint32(t.Unix()))\n\n\terr := tds.client.WriteCharacteristic(c, data, true)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1fa30a1598cc07f0b5837e1e2a39bca2", "score": "0.57279617", "text": "func Time() parameter.Parameter {\n\treturn parameter.Single(VALUE, \"TIME\")\n}", "title": "" }, { "docid": "5858b42792e2f5044ecb541c72c81164", "score": "0.5722121", "text": "func (l *logger) SetTimeFormat(format string) {\n\tl.timeFormat = format\n}", "title": "" }, { "docid": "e09dcf0f52c7bcd2630953940750a0d1", "score": "0.5696461", "text": "func (s *ScalingLogType) SetTime(v time.Time) *ScalingLogType {\n\ts.Time = &v\n\treturn s\n}", "title": "" }, { "docid": "b1dd03307825e565b17fe694f8f7f480", "score": "0.56629944", "text": "func (s *Event) SetTime(v time.Time) *Event {\n\ts.Time = &v\n\treturn s\n}", "title": "" }, { "docid": "b6bb26e77c8d573205996f1f148f093c", "score": "0.566091", "text": "func (c *SystemHMU2300) SetTimeServer(timeserver string) (*HMUSystemResp, error) {\n\tvar req = &HMUSystemReq{}\n\treq.Type = SystemCommandTypeTime\n\treq.IsSet = 1\n\treq.TimeServer = timeserver\n\n\treturn c.Request(req)\n}", "title": "" }, { "docid": "66dd91856535cd8b00572762e6bffedf", "score": "0.56560814", "text": "func (ent *BufferField) SetArg(argIndex uint8, arg interface{}) bool {\n\tswitch argIndex {\n\tcase 0:\n\t\tent.SourceBuf = arg\n\tcase 1:\n\t\tent.Index = arg\n\tcase 2, 3:\n\t\t// opCreateField specifies the name using the arg at index 3\n\t\t// while opCreateXXXField (byte, word e.t.c) specifies the name\n\t\t// using the arg at index 2\n\t\tvar ok bool\n\t\tif ent.name, ok = arg.(string); !ok {\n\t\t\tent.NumBits = arg\n\t\t}\n\t}\n\treturn argIndex <= 3\n}", "title": "" }, { "docid": "e25f816cc50ab8f772cc1a821d118a08", "score": "0.5654325", "text": "func (db *DB) SetTimeValue(key string, t time.Time) error {\n\tbin, err := t.MarshalBinary()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn db.setValue(key, bin)\n}", "title": "" }, { "docid": "dff03f2df565ca4cd8bd279ac6ed13db", "score": "0.56512135", "text": "func (ent *Const) SetArg(argIndex uint8, arg interface{}) bool {\n\t// Const entities accept at most one arg\n\tent.Value = arg\n\treturn argIndex == 0\n}", "title": "" }, { "docid": "a98ae45861eefea9bee6a6c2362226d0", "score": "0.56421554", "text": "func (ent *Package) SetArg(argIndex uint8, arg interface{}) bool {\n\t// Package entities define the number of elements as the first arg.\n\tif argIndex == 0 {\n\t\tent.NumElements = arg\n\t\treturn true\n\t}\n\n\treturn ent.Generic.SetArg(argIndex, arg)\n}", "title": "" }, { "docid": "78fc3992aaa5d94cd63cc1623357bd1e", "score": "0.5638473", "text": "func (term *Termios) SetVTime(v uint8) {\n\tterm.Cc[unix.VTIME] = v\n}", "title": "" }, { "docid": "26f42a9f3670696bf638ea88f2f452b0", "score": "0.56310356", "text": "func (b *Base) SetTimeInfo(i amboy.JobTimeInfo) {\n\tb.mutex.Lock()\n\tdefer b.mutex.Unlock()\n\n\tb.timeInfo = i\n}", "title": "" }, { "docid": "20a801b3e35ee5ea18527913d8af6910", "score": "0.56251144", "text": "func (o *Object) SetModTime(modTime time.Time) error {\n\t// FIXME not implemented\n\treturn fs.ErrorCantSetModTime\n}", "title": "" }, { "docid": "ec795eb34a28d3a811143582895a05c7", "score": "0.560585", "text": "func (bb *Builder) SetModTime(t time.Time) *Builder {\n\tbb.m[\"unixMtime\"] = RFC3339FromTime(t)\n\treturn bb\n}", "title": "" }, { "docid": "5b82bd939ae2209b5fbc0bbe6fc8a004", "score": "0.55970895", "text": "func Time(v ...interface{}) { Default.Time(v...) }", "title": "" }, { "docid": "2f3dab86e0befb863c7eee07311b4111", "score": "0.55760145", "text": "func (s *Settings) SetAllowedTime(allowedTime time.Duration) error {\n\tif allowedTime <= s.interval {\n\t\treturn &InvalidSettingsErr{Message: \"allowedTime must be greater than interval\"}\n\t}\n\ts.allowedTime = allowedTime\n\treturn nil\n}", "title": "" }, { "docid": "371b5a7e50dcf112bfdea47eff163093", "score": "0.55669504", "text": "func CacheTime(time int) interface {\n\tcacheTimeOptionSetter\n} {\n\treturn &cacheTimeOption{time}\n}", "title": "" }, { "docid": "b2a7ca8dd160c69750e2be9fe8ec63f5", "score": "0.5560851", "text": "func (in *ActionDatasetCreateInput) SetAtime(value bool) *ActionDatasetCreateInput {\n\tin.Atime = value\n\n\tif in._selectedParameters == nil {\n\t\tin._selectedParameters = make(map[string]interface{})\n\t}\n\n\tin._selectedParameters[\"Atime\"] = nil\n\treturn in\n}", "title": "" }, { "docid": "e19ec09f33f6474751c9c4e3790e320e", "score": "0.55432713", "text": "func (c *Cache) SetByTime(key, value interface{}, expire time.Time) {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\n\tc.data[key] = value\n\tc.access[key] = expire\n}", "title": "" }, { "docid": "e9ed3bd2dcaeed7f113005871fb36423", "score": "0.55329955", "text": "func (ms *MemStore) SetTimeNow(timeNow func() time.Time) {\n\tms.timeNow = timeNow\n}", "title": "" }, { "docid": "89561bd9acbb48a6b7d4d6d9965be60d", "score": "0.55298835", "text": "func SetLastTime(newLastTime int) (err error) {\n\terr = models.SetUsedLastTime(newLastTime)\n\tif err != nil {\n\t\treturn\n\t}\n\tlastTime = newLastTime\n\treturn\n}", "title": "" }, { "docid": "b28a88036365be9ebcb954441d1893d8", "score": "0.55212325", "text": "func (w *Log) Time(v ...interface{}) {\n\tw.l.Printf(\"[TIME] %s\", expand(v))\n}", "title": "" }, { "docid": "32cb44fc1b633f8352897521f6bf2aa1", "score": "0.5506127", "text": "func SetTime(fieldPath string, value *OTime) DocumentOperations {\n\treturn func(doc *Document) (*Document, error) {\n\t\tif arrRgx.MatchString(fieldPath) {\n\t\t\tdoc.setArrayValue(fieldPath, value)\n\t\t} else {\n\t\t\tdoc.documentMap = mergeMaps(doc.documentMap, doc.newValue(fieldPath, value)).(map[string]interface{})\n\t\t}\n\t\treturn doc, nil\n\t}\n}", "title": "" }, { "docid": "bb27200e632f61d9e1170f1008705dfb", "score": "0.54962254", "text": "func (c *SystemNone) SetTimeServer(timeserver string) (*HMUSystemResp, error) {\n\t// 默认未实现,总是返回不通\n\treturn nil, errors.New(\"UnImplements\")\n}", "title": "" }, { "docid": "e866fd4bff28981d0cad455c9ce1f2ea", "score": "0.54887307", "text": "func setCTime(path string, ctime time.Time) error {\n\treturn nil\n}", "title": "" }, { "docid": "2f3e9e22298da99e10c2973b36e81579", "score": "0.54751235", "text": "func (o OptionsAnswerCallbackQuery) SetCacheTime(cacheTime int) OptionsAnswerCallbackQuery {\n\to[\"cache_time\"] = cacheTime\n\treturn o\n}", "title": "" }, { "docid": "64055f2650b5b0f300834dfc4f8701e3", "score": "0.54685134", "text": "func (ent *Processor) SetArg(argIndex uint8, arg interface{}) bool {\n\tvar (\n\t\tok bool\n\t\tuintVal uint64\n\t)\n\n\tswitch argIndex {\n\tcase 0:\n\t\t// Arg0 is the name but it is actually defined when creating the entity\n\t\tok = true\n\tcase 1:\n\t\t// arg1 is the processor ID (ByteData)\n\t\tuintVal, ok = arg.(uint64)\n\t\tent.ID = uint8(uintVal)\n\tcase 2:\n\t\t// arg2 is the processor I/O reg block address (Dword)\n\t\tuintVal, ok = arg.(uint64)\n\t\tent.RegBlockAddr = uint32(uintVal)\n\tcase 3:\n\t\t// arg3 is the processor I/O reg block address len (ByteData)\n\t\tuintVal, ok = arg.(uint64)\n\t\tent.RegBlockLen = uint8(uintVal)\n\t}\n\treturn ok\n}", "title": "" }, { "docid": "fe9d15ebfe07331b2a25ebfe95294998", "score": "0.54568416", "text": "func Time(callback func(), name string) {\n\tTimeFull(callback, name, time.Now(), make(map[string]interface{}))\n}", "title": "" }, { "docid": "4bbc1812e5c27db94e48e725a817920f", "score": "0.5428728", "text": "func SetTime(keys ...string) error {\n\tfor _, k := range keys {\n\t\tval, err := strconv.Atoi(os.Getenv(k))\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ttimeBox[k] = time.Duration(val)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b844034678239a9caafbe155b9402773", "score": "0.54259396", "text": "func SetEndOfTime(t time.Time) {\n\tendOfTimeMtx.Lock()\n\tendOfTime = t\n\tendOfTimeMtx.Unlock()\n}", "title": "" }, { "docid": "ea192fabcf97bca9612aacbb652cc213", "score": "0.5419254", "text": "func setTime(hour, min, sec int) error {\n\tif err := rpi.AnalogWrite(dial1Pin, hour*10); err != nil {\n\t\treturn fmt.Errorf(\"Error setting hour: %v\", err)\n\t}\n\tif err := rpi.AnalogWrite(dial2Pin, min*4); err != nil {\n\t\treturn fmt.Errorf(\"Error setting minute: %v\", err)\n\t}\n\tif err := rpi.AnalogWrite(dial3Pin, sec*4); err != nil {\n\t\treturn fmt.Errorf(\"Error setting second: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9e02a62e40d2ee30e743e09c7e7a7e96", "score": "0.54176074", "text": "func (o *Object) SetModTime(ctx context.Context, modTime time.Time) error {\n\terr := o.readMetaData(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmeta := o.headers.ObjectMetadata()\n\tmeta.SetModTime(modTime)\n\tnewHeaders := meta.ObjectHeaders()\n\tfor k, v := range newHeaders {\n\t\to.headers[k] = v\n\t}\n\t// Include any other metadata from request\n\tfor k, v := range o.headers {\n\t\tif strings.HasPrefix(k, \"X-Object-\") {\n\t\t\tnewHeaders[k] = v\n\t\t}\n\t}\n\tcontainer, containerPath := o.split()\n\treturn o.fs.pacer.Call(func() (bool, error) {\n\t\terr = o.fs.c.ObjectUpdate(ctx, container, containerPath, newHeaders)\n\t\treturn shouldRetry(ctx, err)\n\t})\n}", "title": "" }, { "docid": "d80caa21dbd5f36f8ddda704cefdffe9", "score": "0.5393606", "text": "func (o *OnTime) Set(t time.Time, threshold float64) {\n\tindex := t.Truncate(time.Duration(o.unit)).Unix() % int64(o.Entire.Seconds())\n\to.m[index] = threshold\n}", "title": "" }, { "docid": "0e0a02dabc772fd447ce6641d45abae9", "score": "0.53931636", "text": "func (b *WrapTx) SetTimeRange(timeRange uint64) {\n\tb.tx.TimeRange = timeRange\n}", "title": "" }, { "docid": "5d01587b268f0101fb626b3317c78ec8", "score": "0.53912514", "text": "func (iuo *ItemUpdateOne) SetMtime(t time.Time) *ItemUpdateOne {\n\tiuo.mutation.SetMtime(t)\n\treturn iuo\n}", "title": "" }, { "docid": "552822539b42b17d292c70792338f1a6", "score": "0.53798485", "text": "func SetBirthTime(filepath string, time time.Time) error {\n\t_, err := exec.LookPath(\"SetFile\")\n\tif err != nil {\n\t\treturn errors.New(\"current OS / textbundler implementation does not support setting file birth times\")\n\t}\n\n\tcmd := exec.Command(\"SetFile\", \"-d\", time.Format(\"01/02/2006 03:04:05 PM\"), filepath)\n\tif err := cmd.Run(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e591d283819482b6006c55815baf61e2", "score": "0.5372566", "text": "func (m *BookingWorkTimeSlot) SetStartTime(value *i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.TimeOnly)() {\n m.startTime = value\n}", "title": "" }, { "docid": "10d5956ddad5bd18ab479022f0674696", "score": "0.53652203", "text": "func (check *Check) SetObservedTime(duration time.Duration) {\n\tcheck.ObservedValue = duration.Nanoseconds()\n\tcheck.ObservedUnit = \"ns\"\n}", "title": "" }, { "docid": "1655601e087e1a7202eafa9b04467882", "score": "0.5361427", "text": "func Set(t time.Time) {\n\tl.Lock()\n\tinstall()\n\tcurrent = t\n\tl.Unlock()\n}", "title": "" }, { "docid": "54637adeaa2230733b174830787f27f2", "score": "0.533983", "text": "func (self *Timer) SetMINUTEA(member int) {\n self.Object.Set(\"MINUTE\", member)\n}", "title": "" }, { "docid": "86ded1126d7578447d4299e40e128647", "score": "0.5323345", "text": "func (o *SoftwarerepositoryCachedImage) SetCachedTime(v time.Time) {\n\to.CachedTime = &v\n}", "title": "" }, { "docid": "13fff07bea39c0173944afff16c7425b", "score": "0.5317886", "text": "func (node *Node) SetModTime(modTime time.Time) {\n\tnode.modTime = modTime\n}", "title": "" }, { "docid": "db3df1254cacdb494b9c61909bc80789", "score": "0.5313193", "text": "func (m *Mock) Set(t time.Time) {\n\tm.mu.Lock()\n\tm.now = t\n\tm.mu.Unlock()\n\tm.tick(t)\n\tsched()\n}", "title": "" } ]
bd6d2ae145df0c82b812fa8c2a12f464
SearchByDomain lists companies by filtering for their domain
[ { "docid": "463e4dc1da540963aac12c7df48bec87", "score": "0.7458872", "text": "func (api *Companies) SearchByDomain(domain string, page *Page, props ...string) (*PageResponse, error) {\n\tvar request map[string]interface{} = make(map[string]interface{})\n\tif page != nil {\n\t\tif page.Count > 0 {\n\t\t\trequest[\"limit\"] = page.Count\n\t\t}\n\n\t\tif page.Offset > 0 {\n\t\t\trequest[\"offset\"] = map[string]interface{}{\n\t\t\t\t\"isPrimary\": true,\n\t\t\t\t\"companyId\": page.Offset}\n\t\t}\n\t}\n\n\tif len(props) > 0 {\n\t\trequest[\"properties\"] = props\n\t}\n\n\tresponse, err := api.rest.Post(fmt.Sprintf(\"companies/v2/domains/%s/companies\", domain), request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpr := new(PageResponse)\n\tpr.HasMore = cast.ToBool(response[\"hasMore\"])\n\tif pr.HasMore {\n\t\toffsetobj, ok := response[\"offset\"].(map[string]interface{})\n\t\tif ok {\n\t\t\tpr.Offset = cast.ToInt64(offsetobj[\"companyId\"])\n\t\t}\n\t}\n\n\tcompanies, ok := response[\"results\"].([]map[string]interface{})\n\tif ok {\n\t\tfor _, company := range companies {\n\t\t\tpr.Data = append(pr.Data, api.toEntity(company))\n\t\t}\n\t}\n\n\treturn pr, nil\n}", "title": "" } ]
[ { "docid": "5bb8ddad583a6fda1dfb776cd3dd9e7b", "score": "0.6013581", "text": "func SearchBusinessCompanyRepository(ctx context.Context, request *pb.SearchBusinessCompanyRequest) (*pb.SearchBusinessCompanyResponse, error) {\n\tconn, err := pgx.Connect(ctx, config.PostgresConnection)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer conn.Close(ctx)\n\n\trequest.BusinessCompanyName = request.BusinessCompanyName + \"%\"\n\tsqlQuery := `SELECT id, name, category_id, address \n\t\t\t\t\tFROM business_company\n\t\t\t\t WHERE LOWER(name) LIKE LOWER($1) AND category_id=$2;`\n\n\trows, err := conn.Query(\n\t\tctx,\n\t\tsqlQuery,\n\t\trequest.BusinessCompanyName,\n\t\trequest.BusinessCategoryID,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar companies pb.SearchBusinessCompanyResponse\n\n\tfor rows.Next() {\n\t\tvar company pb.BusinessCompany\n\n\t\terr = rows.Scan(\n\t\t\t&company.BusinessCompanyID,\n\t\t\t&company.BusinessCompanyName,\n\t\t\t&company.BusinessCompanyCategoryID,\n\t\t\t&company.BusinessCompanyAddress,\n\t\t)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcompanies.BusinessCompanies = append(companies.BusinessCompanies, &company)\n\t}\n\n\treturn &companies, nil\n}", "title": "" }, { "docid": "ff6cbc76f2b5be1c981727a9097455c1", "score": "0.60050255", "text": "func (t *TMDB) SearchCompany(query string, params ...option) (*SearchCompany, error) {\n\ts := new(SearchCompany)\n\tif err := t.get(s, \"/3/search/company\", url.Values{\"query\": []string{query}}, params...); err != nil {\n\t\treturn nil, err\n\t}\n\treturn s, nil\n}", "title": "" }, { "docid": "af19c066f320aa294964ecfa3b2fdc3c", "score": "0.5855256", "text": "func SearchOrganizationsByDomainName(APIstub shim.ChaincodeStubInterface, name string) ([]org.Organization, int) {\n\n\t/*\n\t Arguments:\n\t * Name\n\t*/\n\n\ttype SearchResult struct {\n\t\tKey string `json:\"key\"`\n\t\tRecord org.Organization `json:\"record\"`\n\t}\n\torganizations := []org.Organization{}\n\tlength := 0\n\tqueryString := \"{\\\"selector\\\": {\\\"$and\\\" : [{\\\"name\\\": {\\\"$regex\\\": \\\"(?i)\" + name + \"\\\"},\\\"class\\\": \\\"Organization\\\", \\\"type\\\":\\\"Hospital\\\"}]}}\"\n\tsearchResultsBytes, err := utils.GetQueryResultForQueryString(APIstub, queryString)\n\tif err != nil {\n\t\treturn organizations, length\n\t}\n\n\tsearchResults := []SearchResult{}\n\tjson.Unmarshal([]byte(searchResultsBytes), &searchResults)\n\n\tif len(searchResults) < 1 {\n\t\treturn organizations, length\n\t}\n\tfor i := 0; i < len(searchResults); i++ {\n\t\torganizations = append(organizations, searchResults[i].Record)\n\t\tlength++\n\t}\n\n\treturn organizations, length\n}", "title": "" }, { "docid": "f28652b79e967f1bb06413d9fb447ff0", "score": "0.57747227", "text": "func GetDomains(c *gin.Context) {\n var domains []Domain\n _, err := dbmap.Select(&domains, \"SELECT * FROM domain\")\n if err == nil {\n c.JSON(200, domains)\n } else {\n c.JSON(404, gin.H{\"error\": \"no domain(s) into the table\"})\n }\n // curl -i http://localhost:8080/api/rules/domains\n}", "title": "" }, { "docid": "ce845b643190c4021c401cc49c24bb9b", "score": "0.5763679", "text": "func companyDisplayNameSearch(service *talent.Service, parent string, companyName string, companyDisplayNames []string) (*talent.SearchJobsResponse, error) {\n\t// Make sure to set the requestMetadata the same as the associated search request\n\trequestMetadata := &talent.RequestMetadata{\n\t\t// Make sure to hash your userID\n\t\tUserId: \"HashedUsrId\",\n\t\t// Make sure to hash the sessionID\n\t\tSessionId: \"HashedSessionId\",\n\t\t// Domain of the website where the search is conducted\n\t\tDomain: \"www.googlesample.com\",\n\t}\n\tjobQuery := &talent.JobQuery{\n\t\tCompanyDisplayNames: companyDisplayNames,\n\t}\n\tif companyName != \"\" {\n\t\tjobQuery.CompanyNames = []string{companyName}\n\t}\n\n\tsearchJobsRequest := &talent.SearchJobsRequest{\n\t\tRequestMetadata: requestMetadata,\n\t\t// Set the actual search term as defined in the jobQurey\n\t\tJobQuery: jobQuery,\n\t\t// Set the search mode to a regular search\n\t\tSearchMode: \"JOB_SEARCH\",\n\t}\n\tresp, err := service.Projects.Jobs.Search(parent, searchJobsRequest).Do()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to search for jobs with company display names %v: %v\", companyDisplayNames, err)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "eb0d0bf9ef987c81f7f2db160535ecea", "score": "0.56702894", "text": "func GetCompaniesByBranchID(w http.ResponseWriter, r *http.Request) {\n\n\t// Grab the parameter for the company\n\tbranchID := mux.Vars(r)[\"id\"]\n\n\t// New query, a really generic one with high selectivity\n\tqueryString := fmt.Sprintf(`SELECT company.*,META().id FROM company WHERE META().id = \"%s\"`, branchID)\n\tquery := gocb.NewN1qlQuery(queryString)\n\trows, _ := bucket.ExecuteN1qlQuery(query, []interface{}{})\n\n\t// Interfaces for handling streaming return values\n\tvar row models.Company\n\tvar retValues []models.Company\n\n\t// Stream the values returned from the query into a typed array\n\t// of structs\n\tfor rows.Next(&row) {\n\t\tretValues = append(retValues, row)\n\t\t// Set the row to an empty struct, to prevent current values\n\t\t// being added to the next row in the results collection\n\t\t// returned by the query\n\t\trow = models.Company{}\n\t}\n\n\t// Marshal array of structs to JSON\n\tbytes, err := json.Marshal(retValues)\n\tif err != nil {\n\t\tfmt.Println(\"ERROR PROCESSING STREAMING OUTPUT:\", err)\n\t}\n\n\t// Return the JSON\n\tw.Write(bytes)\n}", "title": "" }, { "docid": "0c2bcbbdcfe4bf0b8ee82a517cb17733", "score": "0.56323886", "text": "func GetDomainComputers(conn *ldap.Conn, baseDN string) {\n\n\tattributes := []string{\n\t\t\"sAMAccountName\",\n\t\t\"dNSHostName\",\n\t\t\"operatingSystem\",\n\t\t\"operatingSystemServicePack\",\n\t\t\"description\"}\n\tfilter := \"(&(objectCategory=Computer)(SamAccountName=*))\"\n\tcsv := [][]string{}\n\tcsv = append(csv, attributes)\n\n\tsr := ldapSearch(baseDN, filter, attributes, conn)\n\n\tfmt.Printf(\"[i] Domain Computers: %d found\\n\", len(sr.Entries))\n\tfor _, entry := range sr.Entries {\n\t\tdata := []string{\n\t\t\tentry.GetAttributeValue(\"sAMAccountName\"),\n\t\t\tentry.GetAttributeValue(\"dNSHostName\"),\n\t\t\tentry.GetAttributeValue(\"operatingSystem\"),\n\t\t\tentry.GetAttributeValue(\"operatingSystemServicePack\"),\n\t\t\tentry.GetAttributeValue(\"description\")}\n\t\tcsv = append(csv, data)\n\t}\n\twriteCSV(\"Domain_Computers_All\", csv)\n}", "title": "" }, { "docid": "70dddd12c22b40a4a4fa4a47ff4a3ef8", "score": "0.5575221", "text": "func Query(args ...interface{}) interface{} {\n\n\tdomain := args[0].(string)\n\tstate := args[1].(*helper.State)\n\n\t// Make a http request to Threatcrowd\n\tresp, err := helper.GetHTTPResponse(\"https://www.threatcrowd.org/searchApi/v2/domain/report/?domain=\"+domain, state.Timeout)\n\tif err != nil {\n\t\tfmt.Printf(\"\\nthreatcrowd: %v\\n\", err)\n\t\treturn subdomains\n\t}\n\n\t// Get the response body\n\tresp_body, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tfmt.Printf(\"\\nthreatcrowd: %v\\n\", err)\n\t\treturn subdomains\n\t}\n\n\t// Decode the json format\n\terr = json.Unmarshal([]byte(resp_body), &threatcrowd_data)\n\tif err != nil {\n\t\tfmt.Printf(\"\\nthreatcrowd: %v\\n\", err)\n\t\treturn subdomains\n\t}\n\n\t// Append each subdomain found to subdomains array\n\tfor _, subdomain := range threatcrowd_data.Subdomains {\n\n\t\t// Fix Wildcard subdomains containg asterisk before them\n\t\tif strings.Contains(subdomain, \"*.\") {\n\t\t\tsubdomain = strings.Split(subdomain, \"*.\")[1]\n\t\t}\n\n\t\tif state.Verbose == true {\n\t\t\tif state.Color == true {\n\t\t\t\tfmt.Printf(\"\\n[%sTHREATCROWD%s] %s\", helper.Red, helper.Reset, subdomain)\n\t\t\t} else {\n\t\t\t\tfmt.Printf(\"\\n[THREATCROWD] %s\", subdomain)\n\t\t\t}\n\t\t}\n\n\t\tsubdomains = append(subdomains, subdomain)\n\t}\n\n\treturn subdomains\n}", "title": "" }, { "docid": "340798082f602b6084b7d9f6e4131967", "score": "0.5480168", "text": "func (c *Client) listDomainsByName(ctx context.Context, domain string) (*ZoneSearchResponse, error) {\n\tendpoint := c.baseURL.JoinPath(\"domains\")\n\n\tquery := endpoint.Query()\n\tquery.Set(\"name\", domain)\n\tendpoint.RawQuery = query.Encode()\n\n\treq, err := newJSONRequest(ctx, http.MethodGet, endpoint, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar zoneSearchResponse ZoneSearchResponse\n\terr = c.do(req, &zoneSearchResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &zoneSearchResponse, nil\n}", "title": "" }, { "docid": "57c9115015a3ce6770791b410ccfbdd2", "score": "0.54649574", "text": "func (c *CertDB) Query(domain, sub string) []string {\n\tvar unique []string\n\n\tif domain != sub {\n\t\treturn unique\n\t}\n\n\tu := c.getURL(domain)\n\tpage, err := utils.GetWebPage(u, nil)\n\tif err != nil {\n\t\tc.Service.Config().Log.Printf(\"%s: %v\", u, err)\n\t\treturn unique\n\t}\n\n\tc.Service.SetActive()\n\tvar names []string\n\tif err := json.Unmarshal([]byte(page), &names); err != nil {\n\t\tc.Service.Config().Log.Printf(\"Failed to unmarshal JSON: %v\", err)\n\t\treturn unique\n\t}\n\n\tre := utils.SubdomainRegex(domain)\n\tfor _, name := range names {\n\t\tif n := re.FindString(name); n != \"\" {\n\t\t\tunique = utils.UniqueAppend(unique, n)\n\t\t}\n\t}\n\treturn unique\n}", "title": "" }, { "docid": "c40e14e4c0e831f62dfdf1d4623a5218", "score": "0.5458758", "text": "func BreachesByDomain(domain string) ([]Breach, error) {\n\tvar param map[string]string\n\tif domain != \"\" {\n\t\tparam = map[string]string{\n\t\t\t\"domain\": domain,\n\t\t}\n\t}\n\treq := buildRequest(\"breaches\", \"\", param, false)\n\tres, err := makeRequest(req)\n\tif err != nil {\n\t\tif err == errNotFound {\n\t\t\treturn nil, nil\n\t\t}\n\t\treturn nil, err\n\t}\n\tp := make([]Breach, 0)\n\tif err := json.Unmarshal(res, &p); err != nil {\n\t\treturn nil, err\n\t}\n\treturn p, nil\n}", "title": "" }, { "docid": "d5ed90c769c18e4c34f14f7836aa1dc9", "score": "0.5454342", "text": "func listDomains(c *godo.Client) ([]godo.Domain, error) {\n\t// TODO (andrewsykim): pagination in ListOptions\n\tdomains, _, err := c.Domains.List(context.TODO(), &godo.ListOptions{})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to list domains: %v\", err)\n\t}\n\n\treturn domains, err\n}", "title": "" }, { "docid": "c09913fe6e371f132f75408e987e6f6a", "score": "0.545022", "text": "func DomainFilter(name string) FilterOption {\n\treturn func(filterMap map[Filter]interface{}) {\n\t\tfilterMap[DomainName] = name\n\t}\n}", "title": "" }, { "docid": "6948fa1551bf3e382fbd1c43e8bcc68b", "score": "0.5424558", "text": "func FilterByCategory(filters ...string) []models.Domain {\n\t// storing filter in to a map to make the search faster\n\tfiltersMap := make(map[string]bool, 0)\n\tfor _, filter := range filters {\n\t\tfiltersMap[filter] = true\n\t}\n\n\t// creating the result set\n\tresults := make([]models.Domain, 0)\n\n\t// iterating over all stored domains\n\tfor _, domain := range domains {\n\t\t// adding current domain as a record to the result set\n\t\trecord := models.Domain{Cname: domain.Cname}\n\t\t// iterating over domain categories to find the match.\n\t\tfor _, category := range domain.Categories {\n\t\t\tif filtersMap[category] == true {\n\t\t\t\t// adding the found category match to the record\n\t\t\t\trecord.Categories = append(record.Categories, category)\n\t\t\t}\n\t\t}\n\t\t// adding the processed records to the results\n\t\tresults = append(results, record)\n\t}\n\treturn results\n}", "title": "" }, { "docid": "06c34a777419000ae14f76afc78c20f9", "score": "0.5415274", "text": "func GetDomainControllers(conn *ldap.Conn, baseDN string) {\n\n\tattributes := []string{\n\t\t\"sAMAccountName\",\n\t\t\"dNSHostName\",\n\t\t\"operatingSystem\",\n\t\t\"operatingSystemServicePack\",\n\t\t\"description\"}\n\tfilter := \"(&(objectCategory=computer)(userAccountControl:1.2.840.113556.1.4.803:=8192))\"\n\tcsv := [][]string{}\n\tcsv = append(csv, attributes)\n\n\tsr := ldapSearch(baseDN, filter, attributes, conn)\n\n\tfmt.Printf(\"[i] Domain Controllers: %d found\\n\", len(sr.Entries))\n\tfor _, entry := range sr.Entries {\n\t\tdata := []string{\n\t\t\tentry.GetAttributeValue(\"sAMAccountName\"),\n\t\t\tentry.GetAttributeValue(\"dNSHostName\"),\n\t\t\tentry.GetAttributeValue(\"operatingSystem\"),\n\t\t\tentry.GetAttributeValue(\"operatingSystemServicePack\"),\n\t\t\tentry.GetAttributeValue(\"description\")}\n\t\tcsv = append(csv, data)\n\t}\n\twriteCSV(\"Domain_Controllers\", csv)\n}", "title": "" }, { "docid": "2b233c3cf0837dc15e2ee401fb342bd6", "score": "0.5365801", "text": "func (s *Stream) FilterByDomain(filter string) error {\n\tre, retval := regexp.Compile(\"^\" + strings.Replace(strings.Replace(filter, \".\", \"\\\\.\", -1), \"*\", \".*\", -1) + \"$\")\n\ts.domainRegexp = re\n\treturn retval\n}", "title": "" }, { "docid": "df1c8bd9f9b983fdc409d0ec2875400a", "score": "0.5343012", "text": "func CompanyListGet() ([]CompanyList, error) {\n\tvar companies []CompanyList\n\trows, err := pool.Query(context.Background(), `\n\t\tSELECT\n\t\t\tc.id,\n\t\t\tc.name,\n\t\t\tc.address,\n\t\t\ts.name AS scope_name,\n\t\t\tarray_agg(DISTINCT e.email) AS emails,\n\t\t\tarray_agg(DISTINCT p.phone) AS phones,\n\t\t\tarray_agg(DISTINCT f.phone) AS faxes,\n\t\t\tarray_agg(DISTINCT pr.date_of_practice) AS practices\n FROM\n\t\t\tcompanies AS c\n\t\tLEFT JOIN\n\t\t\tscopes AS s ON c.scope_id = s.id\n\t\tLEFT JOIN\n\t\t\temails AS e ON c.id = e.company_id\n\t\tLEFT JOIN\n\t\t\tphones AS p ON c.id = p.company_id AND p.fax = false\n\t\tLEFT JOIN\n\t\t\tphones AS f ON c.id = f.company_id AND f.fax = true\n\t\tLEFT JOIN\n\t\t\tpractices AS pr ON c.id = pr.company_id\n\t\tGROUP BY\n\t\t\tc.id,\n\t\t\ts.name\n\t\tORDER BY\n\t\t\tc.name ASC\n\t`)\n\tif err != nil {\n\t\terrmsg(\"GetCompanyList Query\", err)\n\t}\n\tfor rows.Next() {\n\t\tvar company CompanyList\n\t\terr := rows.Scan(&company.ID, &company.Name, &company.Address, &company.ScopeName,\n\t\t\t&company.Emails, &company.Phones, &company.Faxes, &company.Practices)\n\t\tif err != nil {\n\t\t\terrmsg(\"GetCompanyList Scan\", err)\n\t\t\treturn companies, err\n\t\t}\n\t\tcompanies = append(companies, company)\n\t}\n\treturn companies, rows.Err()\n}", "title": "" }, { "docid": "d5497e1a8d026b83b97465231c61f5f6", "score": "0.53365326", "text": "func (p *CompanyServ) List(params param.Param) (data map[string]interface{}, err error) {\n\n\tdata = make(map[string]interface{})\n\n\tp.Engine.Debug(params)\n\n\tif data[\"list\"], err = p.Repo.List(params); err != nil {\n\t\tp.Engine.CheckError(err, \"companies list\", params)\n\t\treturn\n\t}\n\n\tdata[\"count\"], err = p.Repo.Count(params)\n\tp.Engine.CheckError(err, \"companies count\", params)\n\n\treturn\n}", "title": "" }, { "docid": "f2d068fab3ffe188f7361d95fd1fb167", "score": "0.5323714", "text": "func (d *DomainHnd) Fetch(w http.ResponseWriter, r *http.Request) {\n\tenableCors(&w)\n\tpayload := d.repo.SearchDomains()\n\tdomains := GetDomainsResponse(payload)\n\trespondwithJSON(w, http.StatusOK, domains)\n}", "title": "" }, { "docid": "808df39386755e94bdef89b72c31321a", "score": "0.5317519", "text": "func GetCompaniesByBranchIDs(w http.ResponseWriter, r *http.Request) {\n\t// Grab the branch_id's for the company\n\tresponseIds := r.FormValue(\"ids\")\n\n\t// New query, a really generic one with high selectivity\n\tqueryString := fmt.Sprintf(`SELECT company.*,META().id FROM company WHERE META().id IN %s`, responseIds)\n\tquery := gocb.NewN1qlQuery(queryString)\n\trows, _ := bucket.ExecuteN1qlQuery(query, []interface{}{})\n\n\t// Interfaces for handling streaming return values\n\tvar row models.Company\n\tvar retValues []models.Company\n\n\t// Stream the values returned from the query into a typed array\n\t// of structs\n\tfor rows.Next(&row) {\n\t\tretValues = append(retValues, row)\n\t\trow = models.Company{}\n\t}\n\n\t// Marshal array of structs to JSON\n\tbytes, err := json.Marshal(retValues)\n\tif err != nil {\n\t\tfmt.Println(\"ERROR PROCESSING STREAMING OUTPUT:\", err)\n\t}\n\n\t// Return the JSON\n\tw.Write(bytes)\n}", "title": "" }, { "docid": "f8fb4fef8949e847f48c696d1a0f032f", "score": "0.5312881", "text": "func (p *DomainAPI) List(opt ...DomainListOpt) (list []Domain, err error) {\n\tparams := url.Values{}\n\tparams.Set(\"login_token\", p.loginToken)\n\tparams.Set(\"format\", \"json\")\n\tvar o DomainListOpt\n\tif len(opt) > 0 {\n\t\to = opt[0]\n\t}\n\tif o.GroupID != 0 {\n\t\tparams.Set(\"group_id\", strconv.Itoa(o.GroupID))\n\t}\n\tif o.Keyword != \"\" {\n\t\tparams.Set(\"keyword\", o.Keyword)\n\t}\n\tif o.Length != 0 {\n\t\tparams.Set(\"length\", strconv.Itoa(o.Length))\n\t}\n\tif o.Offset != 0 {\n\t\tparams.Set(\"offset\", strconv.Itoa(o.Offset))\n\t}\n\tif o.Type != \"\" {\n\t\tparams.Set(\"type\", string(o.Type))\n\t}\n\n\tres, err := simpleHTTP(p.client, \"POST\", \"https://dnsapi.cn/Domain.List\", params)\n\tif err != nil {\n\t\treturn\n\t}\n\tvar jsonRes struct {\n\t\tStatus Status `json:\"status\"`\n\t\tDomains []Domain `json:\"domains\"`\n\t}\n\tif err = json.Unmarshal(res, &jsonRes); err != nil {\n\t\treturn\n\t}\n\tif jsonRes.Status.Code != 1 {\n\t\treturn list, errors.New(jsonRes.Status.Message)\n\t}\n\treturn jsonRes.Domains, nil\n}", "title": "" }, { "docid": "8cd3d6480a6811afd969edbe3ce3911a", "score": "0.52993846", "text": "func ListCompanies() (err error) {\n\tdb, err := openDatabase()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"fail to open db\")\n\t}\n\n\tcom, err := reports.ListCompanies(db)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"erro ao listar empresas\")\n\t}\n\tfor _, c := range com {\n\t\tfmt.Println(c)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a734983380d46310bb3e77751f670f0d", "score": "0.5291413", "text": "func (api *Companies) List(page *Page, props ...string) (*PageResponse, error) {\n\tresponse, err := api.rest.Get(\"companies/v2/companies/paged\", api.getListParameters(page, \"limit\", props)...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpr := new(PageResponse)\n\tpr.HasMore = cast.ToBool(response[\"has-more\"])\n\tif pr.HasMore {\n\t\tpr.Offset = cast.ToInt64(response[\"offset\"])\n\t}\n\n\tcontacts, ok := response[\"companies\"].([]interface{})\n\tif ok {\n\t\tfor _, contactobj := range contacts {\n\t\t\tcontact, ok := contactobj.(map[string]interface{})\n\t\t\tif !ok {\n\t\t\t\treturn nil, errors.Errorf(\"Unexpected response structure from hubspot\")\n\t\t\t}\n\n\t\t\tpr.Data = append(pr.Data, api.toEntity(contact))\n\t\t}\n\t}\n\n\treturn pr, nil\n}", "title": "" }, { "docid": "9e2efed37559c510a91f28e91cc72187", "score": "0.5284975", "text": "func companySearchValidator(data *requests.CompanySearch) error {\n\terr := length100ValidatorForArrays(data.SubIndustry, data.BusinessHours, data.CityID, data.CityID, data.FoundersID, data.Name, data.Rating)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = length100ValidatorForArrays(data.Keyword)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = isCountry(data.Country)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = isCity(data.CityID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "35116469f9057e54fc5e1df135432091", "score": "0.52690136", "text": "func (s *API) ListDomains(req *ListDomainsRequest, opts ...scw.RequestOption) (*ListDomainsResponse, error) {\n\tvar err error\n\n\tif req.Region == \"\" {\n\t\tdefaultRegion, _ := s.client.GetDefaultRegion()\n\t\treq.Region = defaultRegion\n\t}\n\n\tdefaultPageSize, exist := s.client.GetDefaultPageSize()\n\tif (req.PageSize == nil || *req.PageSize == 0) && exist {\n\t\treq.PageSize = &defaultPageSize\n\t}\n\n\tquery := url.Values{}\n\tparameter.AddToQuery(query, \"page\", req.Page)\n\tparameter.AddToQuery(query, \"page_size\", req.PageSize)\n\tparameter.AddToQuery(query, \"project_id\", req.ProjectID)\n\tparameter.AddToQuery(query, \"status\", req.Status)\n\tparameter.AddToQuery(query, \"organization_id\", req.OrganizationID)\n\tparameter.AddToQuery(query, \"name\", req.Name)\n\n\tif fmt.Sprint(req.Region) == \"\" {\n\t\treturn nil, errors.New(\"field Region cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/transactional-email/v1alpha1/regions/\" + fmt.Sprint(req.Region) + \"/domains\",\n\t\tQuery: query,\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp ListDomainsResponse\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "3fa797b1a0d30687cc584de50fff8555", "score": "0.5260615", "text": "func (r a) GetByCompany(company string, params map[string]string) (*http.Response, []byte) {\n return r.getByType(company, \"\", \"\", params, false)\n}", "title": "" }, { "docid": "7e369d8c500baef20dd004b3dc5e8907", "score": "0.5250768", "text": "func (s Service) domains() string {\n\tif strings.HasPrefix(s.Domain, wwwPrefix) {\n\t\tshortDomain := strings.Replace(s.Domain, wwwPrefix, \"\", 1)\n\t\treturn fmt.Sprintf(\"%s %s\", shortDomain, s.Domain)\n\t}\n\treturn fmt.Sprintf(\"%s %s\", s.Domain, wwwPrefix+s.Domain)\n}", "title": "" }, { "docid": "cbc8c8e7ba9d76164017cbfb4b329abc", "score": "0.5249656", "text": "func WithDomain(domain string) QueryOption {\n\treturn func(gq *GetQuery) {\n\t\tgq.domain = domain\n\t}\n}", "title": "" }, { "docid": "ff088c1c99809442c350c0f16aaffe2c", "score": "0.52346975", "text": "func GetAllCompany() []Company {\n\tcompany := Company{}\n\tcompanies := []Company{}\n\trows, _ := DB.Queryx(\"SELECT id, name, color, created, modified FROM companies ORDER BY id DESC\")\n\tfor rows.Next() {\n\t\terr := rows.StructScan(&company)\n\t\tif err != nil {\n\t\t\tLogger.Error(err.Error())\n\t\t}\n\t\tcompanies = append(companies, company)\n\t}\n\n\treturn companies\n}", "title": "" }, { "docid": "5606fbe4e2f974eca8625a821679027f", "score": "0.5231807", "text": "func GetCompanyList(c *gin.Context) {\n companyList := db.GetAllCompanies(database)\n c.JSON(http.StatusOK, companyList)\n}", "title": "" }, { "docid": "e0ddd5e1f226ba2b0eb8ed8c94237791", "score": "0.5231633", "text": "func (g *Google) Query(domain, sub string) []string {\n\tvar unique []string\n\n\tif domain != sub {\n\t\treturn unique\n\t}\n\n\tre := utils.SubdomainRegex(sub)\n\tnum := g.limit / g.quantity\n\tt := time.NewTicker(time.Second)\n\tdefer t.Stop()\nloop:\n\tfor i := 0; i < num; i++ {\n\t\tg.Service.SetActive()\n\n\t\tselect {\n\t\tcase <-g.Service.Quit():\n\t\t\tbreak loop\n\t\tcase <-t.C:\n\t\t\tu := g.urlByPageNum(sub, i)\n\t\t\tpage, err := utils.GetWebPage(u, nil)\n\t\t\tif err != nil {\n\t\t\t\tg.Service.Config().Log.Printf(\"%s: %v\", u, err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tfor _, sd := range re.FindAllString(page, -1) {\n\t\t\t\tif u := utils.NewUniqueElements(unique, sd); len(u) > 0 {\n\t\t\t\t\tunique = append(unique, u...)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn unique\n}", "title": "" }, { "docid": "6b793c85bad1974dea8369b8994d8919", "score": "0.52040935", "text": "func getDomains(ctx context.Context) []identity.AvailabilityDomain {\n\tcl, err := identity.NewIdentityClientWithConfigurationProvider(\n\t\tcommon.DefaultConfigProvider())\n\thelpers.FatalIfError(err)\n\n\trequest := identity.ListAvailabilityDomainsRequest{\n\t\tCompartmentId: common.String(getTenancyId()),\n\t}\n\tresponse, err := cl.ListAvailabilityDomains(\n\t\tcontext.Background(), request)\n\thelpers.FatalIfError(err)\n\t\n\tfor i, avail_domain := range response.Items {\n\t\tfmt.Printf(\"Available domain %d: %v\\n\", i + 1, avail_domain)\n\t}\n\tfmt.Printf(\"\\n\");\n\n\treturn response.Items\n}", "title": "" }, { "docid": "5eebd46f58080c8ddef3459f44bd461b", "score": "0.5199477", "text": "func Query(args ...interface{}) interface{} {\n\n\tdomain := args[0].(string)\n\tstate := args[1].(*helper.State)\n\n\tshodanAPIKey := state.ConfigState.ShodanAPIKey\n\n\tif shodanAPIKey == \"\" {\n\t\treturn subdomains\n\t}\n\n\tmaxPages, _ := strconv.Atoi(state.CurrentSettings.ShodanPages)\n\tfor currentPage := 0; currentPage <= maxPages; currentPage++ {\n\t\tresp, err := helper.GetHTTPResponse(\"https://api.shodan.io/shodan/host/search?query=hostname:\"+domain+\"&page=\"+strconv.Itoa(currentPage)+\"&key=\"+shodanAPIKey, state.Timeout)\n\t\tif err != nil {\n\t\t\tif !state.Silent {\n\t\t\t\tfmt.Printf(\"\\nshodan: %v\\n\", err)\n\t\t\t}\n\t\t\treturn subdomains\n\t\t}\n\n\t\t// Get the response body\n\t\trespBody, err := ioutil.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\tif !state.Silent {\n\t\t\t\tfmt.Printf(\"\\nshodan: %v\\n\", err)\n\t\t\t}\n\t\t\treturn subdomains\n\t\t}\n\n\t\t// Decode the json format\n\t\terr = json.Unmarshal([]byte(respBody), &shodanResult)\n\t\tif err != nil {\n\t\t\tif !state.Silent {\n\t\t\t\tfmt.Printf(\"\\nshodan: %v\\n\", err)\n\t\t\t}\n\t\t\treturn subdomains\n\t\t}\n\n\t\tif shodanResult.Error != \"\" {\n\t\t\treturn subdomains\n\t\t}\n\n\t\t// Append each subdomain found to subdomains array\n\t\tfor _, block := range shodanResult.Matches {\n\t\t\tfor _, hostname := range block.Hostnames {\n\n\t\t\t\t// Fix Wildcard subdomains containg asterisk before them\n\t\t\t\tif strings.Contains(hostname, \"*.\") {\n\t\t\t\t\thostname = strings.Split(hostname, \"*.\")[1]\n\t\t\t\t}\n\n\t\t\t\tif state.Verbose {\n\t\t\t\t\tif state.Color {\n\t\t\t\t\t\tfmt.Printf(\"\\n[%sSHODAN%s] %s\", helper.Red, helper.Reset, hostname)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tfmt.Printf(\"\\n[SHODAN] %s\", hostname)\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tsubdomains = append(subdomains, hostname)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn subdomains\n}", "title": "" }, { "docid": "72400821d2ccb38fec96b02801788f08", "score": "0.5178927", "text": "func crawl(service core.Service, base, domain, sub string) ([]string, error) {\n\tvar results []string\n\tvar filterMutex sync.Mutex\n\tfilter := make(map[string]struct{})\n\n\tyear := strconv.Itoa(time.Now().Year())\n\tmux := fetchbot.NewMux()\n\tlinks := make(chan string, 50)\n\tnames := make(chan string, 50)\n\tlinksFilter := make(map[string]struct{})\n\n\tmux.HandleErrors(fetchbot.HandlerFunc(func(ctx *fetchbot.Context, res *http.Response, err error) {\n\t\t//service.Config.Log.Printf(\"Crawler error: %s %s - %v\", ctx.Cmd.Method(), ctx.Cmd.URL(), err)\n\t}))\n\n\tmux.Response().Method(\"GET\").ContentType(\"text/html\").Handler(fetchbot.HandlerFunc(\n\t\tfunc(ctx *fetchbot.Context, res *http.Response, err error) {\n\t\t\tfilterMutex.Lock()\n\t\t\tdefer filterMutex.Unlock()\n\n\t\t\tu := res.Request.URL.String()\n\t\t\tif _, found := filter[u]; found {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfilter[u] = struct{}{}\n\n\t\t\tlinksAndNames(domain, ctx, res, links, names)\n\t\t}))\n\n\tf := fetchbot.New(fetchbot.HandlerFunc(func(ctx *fetchbot.Context, res *http.Response, err error) {\n\t\tmux.Handle(ctx, res, err)\n\t}))\n\tsetFetcherConfig(f)\n\n\tq := f.Start()\n\tu := fmt.Sprintf(\"%s/%s/%s\", base, year, sub)\n\tif _, err := q.SendStringGet(u); err != nil {\n\t\treturn results, fmt.Errorf(\"Crawler error: GET %s - %v\", u, err)\n\t}\n\n\tt := time.NewTimer(10 * time.Second)\nloop:\n\tfor {\n\t\tselect {\n\t\tcase l := <-links:\n\t\t\tif _, ok := linksFilter[l]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tlinksFilter[l] = struct{}{}\n\t\t\tq.SendStringGet(l)\n\t\tcase n := <-names:\n\t\t\tresults = utils.UniqueAppend(results, n)\n\t\tcase <-t.C:\n\t\t\tgo func() {\n\t\t\t\tq.Cancel()\n\t\t\t}()\n\t\tcase <-q.Done():\n\t\t\tbreak loop\n\t\tcase <-service.Quit():\n\t\t\tbreak loop\n\t\t}\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "ce337e5211e9b5c221e53dd35007d185", "score": "0.51743597", "text": "func saveCompanySearchFilterValidatorForCompany(data *requests.CompanySearchFilter) error {\n\terr := emptyValidator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = length100Validator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = companySearchValidator(&data.CompanySearch)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0a780583f6ab1c240518d1cfd9071b71", "score": "0.51720923", "text": "func (db *Database) Company() ([]*Company, error) {\n\trows, err := db.Query(queryCompanies)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer rows.Close()\n\n\tvar companies = make([]*Company, 0)\n\tfor rows.Next() {\n\t\tc := new(Company)\n\t\tif err = rows.Scan(&c.Name, &c.WorkersCount); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tcompanies = append(companies, c)\n\t}\n\n\tif err = rows.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn companies, nil\n}", "title": "" }, { "docid": "4e22a59b4b998ff19dcdcbfc122a39c7", "score": "0.5163656", "text": "func categoryFilterSearch(service *talent.Service, parent string, companyName string, categories []string) (*talent.SearchJobsResponse, error) {\n\t// Make sure to set the requestMetadata the same as the associated search request\n\trequestMetadata := &talent.RequestMetadata{\n\t\t// Make sure to hash your userID\n\t\tUserId: \"HashedUsrId\",\n\t\t// Make sure to hash the sessionID\n\t\tSessionId: \"HashedSessionId\",\n\t\t// Domain of the website where the search is conducted\n\t\tDomain: \"www.googlesample.com\",\n\t}\n\tjobQuery := &talent.JobQuery{\n\t\tJobCategories: categories,\n\t}\n\tif companyName != \"\" {\n\t\tjobQuery.CompanyNames = []string{companyName}\n\t}\n\n\tsearchJobsRequest := &talent.SearchJobsRequest{\n\t\tRequestMetadata: requestMetadata,\n\t\t// Set the actual search term as defined in the jobQurey\n\t\tJobQuery: jobQuery,\n\t\t// Set the search mode to a regular search\n\t\tSearchMode: \"JOB_SEARCH\",\n\t}\n\tresp, err := service.Projects.Jobs.Search(parent, searchJobsRequest).Do()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to search for jobs with categories %v: %v\", categories, err)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "83bfbc10dcf33e6b755483f760fd5dfb", "score": "0.5140117", "text": "func (v *Version) ListDomains() ([]*Domain, error) {\n\turl := v.baseURL(\"domain\")\n\tresp, err := v.service.ghastly.Get(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdData, err := ParseJsonArray(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdomains := make([]*Domain, len(dData))\n\tfor i, dc := range dData {\n\t\td, err := v.populateDomain(dc.(map[string]interface{}))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdomains[i] = d\n\t}\n\treturn domains, nil\n}", "title": "" }, { "docid": "26b7577bae7e8e5e637ea89de10f3115", "score": "0.5137279", "text": "func Listalldomainwhitelabels() {\n\tapiKey := os.Getenv(\"YOUR_SENDGRID_APIKEY\")\n\thost := \"https://api.sendgrid.com\"\n\trequest := sendgrid.GetRequest(apiKey, \"/v3/whitelabel/domains\", host)\n\trequest.Method = \"GET\"\n\tqueryParams := make(map[string]string)\n\tqueryParams[\"username\"] = \"test_string\"\n\tqueryParams[\"domain\"] = \"test_string\"\n\tqueryParams[\"exclude_subusers\"] = \"true\"\n\tqueryParams[\"limit\"] = \"1\"\n\tqueryParams[\"offset\"] = \"1\"\n\trequest.QueryParams = queryParams\n\tresponse, err := sendgrid.API(request)\n\tif err != nil {\n\t\tlog.Println(err)\n\t} else {\n\t\tfmt.Println(response.StatusCode)\n\t\tfmt.Println(response.Body)\n\t\tfmt.Println(response.Headers)\n\t}\n}", "title": "" }, { "docid": "e1452e59555f9d37011cdac63d9fc8f1", "score": "0.51299167", "text": "func (o NDPDNSSearchList) DomainNames() ([]string, error) {\n\tvar domainNames []string\n\treturn domainNames, o.iterDomainNames(func(domainName string) { domainNames = append(domainNames, domainName) })\n}", "title": "" }, { "docid": "35db52fe9dec60365e932d84b6c30515", "score": "0.51172054", "text": "func Domains(accountID int) (d []DomainsResponse, err error) {\n\tu := BaseURL()\n\tu.Path += fmt.Sprintf(\"/account/%d/domains\", accountID)\n\n\tctx, cancel := context.WithTimeout(context.Background(), Timeout)\n\tdefer cancel()\n\n\tresp, err := request(ctx, http.MethodGet, u, nil)\n\tif err != nil {\n\t\treturn d, err\n\t}\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tswitch resp.StatusCode {\n\t\tcase 401:\n\t\t\treturn d, ErrStatusUnauthorized\n\t\tcase 403:\n\t\t\treturn d, ErrStatusForbidden\n\t\tdefault:\n\t\t\treturn d, prettyTxIDError(resp)\n\t\t}\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn d, err\n\t}\n\n\terr = json.Unmarshal(body, &d)\n\tif err != nil {\n\t\treturn d, err\n\t}\n\n\treturn d, err\n}", "title": "" }, { "docid": "ee81a7f07dc6a11e96910784d0140445", "score": "0.51134104", "text": "func (a *DomainsApiService) ListDomains(ctx context.Context) ([]DomainResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []DomainResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v2/domain\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"ApiKey\"] = key\n\t\t\t\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil { \n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v []DomainResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 401 {\n\t\t\tvar v Error401\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 403 {\n\t\t\tvar v Error403\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v Error500\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "title": "" }, { "docid": "5a58b3fe5821a9bbe3170303348f75c0", "score": "0.51127094", "text": "func GetDomains(db *sql.DB) fasthttp.RequestHandler {\n\treturn func(ctx *fasthttp.RequestCtx) {\n\t\taction := ctx.QueryArgs().Peek(\"action\")\n\t\tcursor := ctx.QueryArgs().Peek(\"cursor\")\n\t\tdomains, err := models.GetDomains(db, string(action), string(cursor))\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\tctx.Error(\"The domains can't be consulted\", 500)\n\t\t}\n\t\tif err := json.NewEncoder(ctx).Encode(domains); err != nil {\n\t\t\tlog.Println(err)\n\t\t\tctx.Error(\"The domains can't be consulted\", 500)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "ae5683fd2d3d3f7a14dec9df06a20ddd", "score": "0.5084037", "text": "func (s *DomainService) List() ([]Domain, error) {\n\treq, err := s.client.NewRequest(http.MethodGet, domainsURL, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar domains []Domain\n\tif _, err := s.client.Do(req, &domains); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn domains, err\n}", "title": "" }, { "docid": "de12bf9b7a1381c1e5e64b880dcbee2a", "score": "0.5074213", "text": "func (m *DomainResource) ListDomains(ctx context.Context) (*DomainListResponse, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/domains\")\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar domainListResponse *DomainListResponse\n\n\tresp, err := rq.Do(ctx, req, &domainListResponse)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn domainListResponse, resp, nil\n}", "title": "" }, { "docid": "ec46eb22acaa3de717bdfe1240119817", "score": "0.5049147", "text": "func CompanyGet(id int64) (Company, error) {\n\tvar company Company\n\tif id == 0 {\n\t\treturn company, nil\n\t}\n\tvar (\n\t\temails []string\n\t\tphones []int64\n\t\tfaxes []int64\n\t\tpractices []PracticeList\n\t\tcontacts []ContactShort\n\t)\n\tcompany.ID = id\n\terr := pool.QueryRow(context.Background(), `\n\t\tSELECT\n\t\t\tc.name,\n\t\t\tc.address,\n\t\t\tc.scope_id,\n\t\t\tc.note,\n\t\t\tc.created_at,\n\t\t\tc.updated_at,\n\t\t\tarray_agg(DISTINCT e.email) AS emails,\n\t\t\tarray_agg(DISTINCT ph.phone) AS phones,\n\t\t\tarray_agg(DISTINCT f.phone) AS faxes\n\t\tFROM\n\t\t\tcompanies AS c\n\t\tLEFT JOIN\n\t\t\temails AS e ON c.id = e.company_id\n\t\tLEFT JOIN\n\t\t\tphones AS ph ON c.id = ph.company_id AND ph.fax = false\n\t\tLEFT JOIN\n\t\t\tphones AS f ON c.id = f.company_id AND f.fax = true\n\t\tWHERE\n\t\t\tc.id = $1\n\t\tGROUP BY\n\t\t\tc.id\n\t`, id).Scan(&company.Name, &company.Address, &company.ScopeID, &company.Note, &company.CreatedAt, &company.UpdatedAt, &emails,\n\t\t&phones,\n\t\t&faxes,\n\t\t&practices,\n\t\t&contacts)\n\tif err != nil {\n\t\terrmsg(\"GetCompany QueryRow\", err)\n\t\treturn company, err\n\t}\n\tpractices, err = PracticeCompanyGet(id)\n\tif err != nil {\n\t\terrmsg(\"PracticeCompanyGet\", err)\n\t\treturn company, err\n\t}\n\tcompany.Practices = practices\n\tcontacts, err = ContactCompanyGet(id)\n\tif err != nil {\n\t\terrmsg(\"ContactCompanyGet\", err)\n\t\treturn company, err\n\t}\n\tcompany.Contacts = contacts\n\treturn company, err\n}", "title": "" }, { "docid": "9663b97783a180a0db25a8333d5923f8", "score": "0.50477535", "text": "func Domains() []string {\n\treturn global.Domains()\n}", "title": "" }, { "docid": "d6012b6fe5b77452555110a8f0a401fa", "score": "0.50472033", "text": "func (v v1) ListDomains(ctx context.Context) ([]DomainSummary, error) {\n\turl := \"/domains\"\n\tresponse, err := makeDo(ctx, v.config, http.MethodGet, url, nil, 200)\n\tif err != nil {\n\t\treturn nil, exception.ListingDomains(err)\n\t}\n\treturn readListDomainsResponse(response)\n}", "title": "" }, { "docid": "5abb9b723f400c01246b7492b8e1dc51", "score": "0.50459766", "text": "func (c *CloudflareApi) fetchDomainList() error {\n\tc.domainIndex = map[string]string{}\n\tc.nameservers = map[string][]string{}\n\tpage := 1\n\tfor {\n\t\tzr := &zoneResponse{}\n\t\turl := fmt.Sprintf(\"%s?page=%d&per_page=50\", zonesURL, page)\n\t\tif err := c.get(url, zr); err != nil {\n\t\t\treturn fmt.Errorf(\"Error fetching domain list from cloudflare: %s\", err)\n\t\t}\n\t\tif !zr.Success {\n\t\t\treturn fmt.Errorf(\"Error fetching domain list from cloudflare: %s\", stringifyErrors(zr.Errors))\n\t\t}\n\t\tfor _, zone := range zr.Result {\n\t\t\tc.domainIndex[zone.Name] = zone.ID\n\t\t\tfor _, ns := range zone.Nameservers {\n\t\t\t\tc.nameservers[zone.Name] = append(c.nameservers[zone.Name], ns)\n\t\t\t}\n\t\t}\n\t\tri := zr.ResultInfo\n\t\tif len(zr.Result) == 0 || ri.Page*ri.PerPage >= ri.TotalCount {\n\t\t\tbreak\n\t\t}\n\t\tpage++\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5abb9b723f400c01246b7492b8e1dc51", "score": "0.50459766", "text": "func (c *CloudflareApi) fetchDomainList() error {\n\tc.domainIndex = map[string]string{}\n\tc.nameservers = map[string][]string{}\n\tpage := 1\n\tfor {\n\t\tzr := &zoneResponse{}\n\t\turl := fmt.Sprintf(\"%s?page=%d&per_page=50\", zonesURL, page)\n\t\tif err := c.get(url, zr); err != nil {\n\t\t\treturn fmt.Errorf(\"Error fetching domain list from cloudflare: %s\", err)\n\t\t}\n\t\tif !zr.Success {\n\t\t\treturn fmt.Errorf(\"Error fetching domain list from cloudflare: %s\", stringifyErrors(zr.Errors))\n\t\t}\n\t\tfor _, zone := range zr.Result {\n\t\t\tc.domainIndex[zone.Name] = zone.ID\n\t\t\tfor _, ns := range zone.Nameservers {\n\t\t\t\tc.nameservers[zone.Name] = append(c.nameservers[zone.Name], ns)\n\t\t\t}\n\t\t}\n\t\tri := zr.ResultInfo\n\t\tif len(zr.Result) == 0 || ri.Page*ri.PerPage >= ri.TotalCount {\n\t\t\tbreak\n\t\t}\n\t\tpage++\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5883c93b9ce2d499c6287590d9afd6b6", "score": "0.5034914", "text": "func (r *Resolver) Company() generated.CompanyResolver { return &companyResolver{r} }", "title": "" }, { "docid": "59c56695d97539470c2c691f1c104c2e", "score": "0.502021", "text": "func NewQueryForCompany() *datastore.Query {\n\treturn datastore.NewQuery(CompanyKind)\n}", "title": "" }, { "docid": "052840484c651a25abf8727f836b2da1", "score": "0.5017823", "text": "func (model *Model) ListDomains() ([]string, error) {\n\tdomains := []string{}\n\n\tmodel.DomainsX.RLock()\n\tfor domain := range model.Domains {\n\t\tdomains = append(domains, domain)\n\t}\n \tmodel.DomainsX.RUnlock()\n\n\t// success\n\treturn domains, nil\n}", "title": "" }, { "docid": "485a6c129558d4a75beb02c58ea85a8f", "score": "0.50154114", "text": "func employmentTypesSearch(service *talent.Service, parent string, companyName string, employmentTypes []string) (*talent.SearchJobsResponse, error) {\n\t// Make sure to set the requestMetadata the same as the associated search request\n\trequestMetadata := &talent.RequestMetadata{\n\t\t// Make sure to hash your userID\n\t\tUserId: \"HashedUsrId\",\n\t\t// Make sure to hash the sessionID\n\t\tSessionId: \"HashedSessionId\",\n\t\t// Domain of the website where the search is conducted\n\t\tDomain: \"www.googlesample.com\",\n\t}\n\tjobQuery := &talent.JobQuery{\n\t\tEmploymentTypes: employmentTypes,\n\t}\n\tif companyName != \"\" {\n\t\tjobQuery.CompanyNames = []string{companyName}\n\t}\n\n\tsearchJobsRequest := &talent.SearchJobsRequest{\n\t\tRequestMetadata: requestMetadata,\n\t\t// Set the actual search term as defined in the jobQurey\n\t\tJobQuery: jobQuery,\n\t\t// Set the search mode to a regular search\n\t\tSearchMode: \"JOB_SEARCH\",\n\t}\n\tresp, err := service.Projects.Jobs.Search(parent, searchJobsRequest).Do()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to search for jobs with employment types %v: %v\", employmentTypes, err)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "92277064a98419073d2686bf0a448467", "score": "0.500539", "text": "func (s *DomainsService) List(statuses []string, statusGroups []string, limit int,\n\tmarker string, includes []string, modifiedDate string) ([]DomainSummary, error) {\n\tvar res []DomainSummary\n\n\turi, err := BuildQuery(\"/v1/domains\", map[string]interface{}{\n\t\t\"statuses\": statuses,\n\t\t\"statusGroups\": statusGroups,\n\t\t\"limit\": limit,\n\t\t\"marker\": marker,\n\t\t\"includes\": includes,\n\t\t\"modifiedDate\": modifiedDate,\n\t})\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\tdata, err := s.client.Get(uri)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\terr = json.Unmarshal(data, &res)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "9f34002440e471a7f7b2c7932b61d42f", "score": "0.50021464", "text": "func (res *HTTPResolution) Domains() (domains []string) {\n\tfor _, header := range res.Headers {\n\t\tdomains = append(domains, dissectDomainsFromStrings(header.Value)...)\n\t}\n\treturn domains\n}", "title": "" }, { "docid": "9e47ea529f7f2f077d55a0578d5b246a", "score": "0.50018144", "text": "func (api *Companies) Query() IQuery {\n\treturn &Query{\n\t\tmodel: api.model,\n\t\turl: \"crm/v3/objects/companies/search\",\n\t\trest: api.rest}\n}", "title": "" }, { "docid": "3d042b03f4e14869e64737eb60f7928f", "score": "0.49947047", "text": "func (r CommonResult) ExtractDomains() ([]limes.DomainReport, error) {\n\tvar s struct {\n\t\tDomains []limes.DomainReport `json:\"domains\"`\n\t}\n\n\terr := r.ExtractInto(&s)\n\treturn s.Domains, err\n}", "title": "" }, { "docid": "214244a0782c5fd34188e1ff25ebd75e", "score": "0.49830753", "text": "func GetDomains(w http.ResponseWriter, r *http.Request) {\n\tvar domains = business.GetDomains()\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(&domains)\n}", "title": "" }, { "docid": "100fbe1c2869c1e486125357e11beb23", "score": "0.49685442", "text": "func GetCompanies() ([]models.Company, error) {\n\ttempSession := GetDBSession()\n\tdefer CloseDBSession(tempSession)\n\tcoll := tempSession.DB(MongoDatabase).C(CompanyCollection)\n\tvar companies []models.Company\n\terr := coll.Find(bson.M{\"isSuspended\": false}).All(&companies)\n\treturn companies, err\n}", "title": "" }, { "docid": "7640578432d4fc631cbe78375af6dcfa", "score": "0.49540406", "text": "func (r *Robtex) Query(domain, sub string) []string {\n\tvar ips []string\n\tvar unique []string\n\n\tif domain != sub {\n\t\treturn unique\n\t}\n\n\turl := \"https://freeapi.robtex.com/pdns/forward/\" + domain\n\tpage, err := utils.GetWebPage(url, nil)\n\tif err != nil {\n\t\tr.Service.Config().Log.Printf(\"%s: %v\", url, err)\n\t\treturn unique\n\t}\n\tr.Service.SetActive()\n\n\tfor _, line := range r.parseJSON(page) {\n\t\tif line.Type == \"A\" {\n\t\t\tips = utils.UniqueAppend(ips, line.Data)\n\t\t}\n\t}\n\n\tvar list string\n\tt := time.NewTicker(500 * time.Millisecond)\n\tdefer t.Stop()\nloop:\n\tfor _, ip := range ips {\n\t\tr.Service.SetActive()\n\n\t\tselect {\n\t\tcase <-r.Service.Quit():\n\t\t\tbreak loop\n\t\tcase <-t.C:\n\t\t\turl = \"https://freeapi.robtex.com/pdns/reverse/\" + ip\n\t\t\tpdns, err := utils.GetWebPage(url, nil)\n\t\t\tif err != nil {\n\t\t\t\tr.Service.Config().Log.Printf(\"%s: %v\", url, err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tfor _, line := range r.parseJSON(pdns) {\n\t\t\t\tlist += line.Name + \" \"\n\t\t\t}\n\t\t}\n\t}\n\n\tre := utils.SubdomainRegex(domain)\n\tfor _, sd := range re.FindAllString(list, -1) {\n\t\tif u := utils.NewUniqueElements(unique, sd); len(u) > 0 {\n\t\t\tunique = append(unique, u...)\n\t\t}\n\t}\n\treturn unique\n}", "title": "" }, { "docid": "5c56b40854514c6d56ce47ec314472bb", "score": "0.49539247", "text": "func (c *_Crawler) AllowedDomains() []string {\n\treturn []string{\"*.laroche-posay.us\"}\n}", "title": "" }, { "docid": "06369b72d2c8b5cca6a2e3d28d75e687", "score": "0.49439445", "text": "func GetDomains() ([]string, error) {\n\treturn genshinAPIGetDataList(DomainsDType)\n}", "title": "" }, { "docid": "95b3a4367950f97ce7db2f4ed372489a", "score": "0.4943389", "text": "func (me *ACTIVEDIRECTORY_IMPL) SearchActiveDirectoryPrincipals (\r\n domain *string,\r\n objectClass models.ObjectClass4Enum,\r\n search *string,\r\n sids []string,\r\n includeComputers *bool) ([]*models.ActiveDirectoryPrincipal, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/public/activeDirectory/principals\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //the base uri for api requests\r\n _queryBuilder := configuration.GetBaseURI(configuration.DEFAULT_HOST,me.config);\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //process optional query parameters\r\n _queryBuilder, err = apihelper.AppendUrlWithQueryParameters(_queryBuilder, map[string]interface{} {\r\n \"domain\" : domain,\r\n \"objectClass\" : models.ObjectClass4EnumToValue(objectClass),\r\n \"search\" : search,\r\n \"sids\" : sids,\r\n \"includeComputers\" : includeComputers,\r\n })\r\n if err != nil {\r\n //error in query param handling\r\n return nil, err\r\n }\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n if me.config.AccessToken() == nil {\r\n return nil, errors.New(\"Access Token not set. Please authorize the client using client.Authorize()\");\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"cohesity-Go-sdk-6.2.0\",\r\n \"accept\" : \"application/json\",\r\n \"Authorization\" : fmt.Sprintf(\"%s %s\",*me.config.AccessToken().TokenType, *me.config.AccessToken().AccessToken),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.Get(_queryBuilder, headers)\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,me.config.SkipSSL());\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 0) {\r\n err = apihelper.NewAPIError(\"Error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal []*models.ActiveDirectoryPrincipal\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "4d37d34b19dcfc2faec4460159025501", "score": "0.49257132", "text": "func (u *UKGovArchive) Query(domain, sub string) []string {\n\tif sub == \"\" {\n\t\treturn []string{}\n\t}\n\n\tnames, err := u.crawl(u.baseURL, domain, sub)\n\tif err != nil {\n\t\tu.Service.Config().Log.Printf(\"%v\", err)\n\t}\n\treturn names\n}", "title": "" }, { "docid": "f549a7d912d8f797720b1bbee841cd8f", "score": "0.4922632", "text": "func List(c *client.Client, appID string, results int) ([]api.Domain, int, error) {\n\tu := fmt.Sprintf(\"/v1/apps/%s/domains/\", appID)\n\tbody, count, err := c.LimitedRequest(u, results)\n\n\tif err != nil {\n\t\treturn []api.Domain{}, -1, err\n\t}\n\n\tvar domains []api.Domain\n\tif err = json.Unmarshal([]byte(body), &domains); err != nil {\n\t\treturn []api.Domain{}, -1, err\n\t}\n\n\treturn domains, count, nil\n}", "title": "" }, { "docid": "9cfc349728d92f40a126b6f255758ffe", "score": "0.49112773", "text": "func ReturnCompaniesAndContacts(w http.ResponseWriter, r *http.Request) {\n\n\t// Retrieve JSON data containing user inputs.\n\t// Cannot use r.PostFormValue here\n\t//(https://golang.org/pkg/net/http/#Request.PostFormValue)\n\t// because expects form encoded data while Axios can only\n\t// send json encoded data (impossible to change it in Axios for\n\t// the moment.)\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\terr = CustErr(err, \"Cannot read request body.\\nStopping here.\")\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tlog.Println(string(body))\n\n\t// Store JSON data in a userInput struct\n\tvar userInput UserInput\n\terr = json.Unmarshal(body, &userInput)\n\tif err != nil {\n\t\terr = CustErr(err, \"Cannot unmarshall json.\\nStopping here.\")\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\t// Apply cleaning and validation rules to all the user inputs.\n\t// userInput is not passed by value but by pointer because heavy struct in memory\n\t// http://goinbigdata.com/golang-pass-by-pointer-vs-pass-by-value/\n\terr = validateUserInput(&userInput)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\tcleanUserInput(&userInput)\n\n\tvar returnedJson []byte\n\n\t// If user only ask a count we launch a special count sql request and only return the nb of rows.\n\t// If user ask for the full results we return everything either in json or by compressed csv by email\n\t// depending on the size.\n\tswitch userInput.Step {\n\n\tcase \"count\":\n\n\t\t// Initialize the count SQL statement that will be created incrementally\n\t\tvar sqlStmtCnt strings.Builder\n\n\t\t// Build the SQL request\n\t\t// sqlStmt is not passed by value but by pointer because compulsory for a strings.Builder\n\t\tsqlArgs := buildSQLReq(&sqlStmtCnt, true, userInput)\n\t\t// Convert SQL statement to string\n\t\tsqlStmtCntStr := sqlStmtCnt.String()\n\n\t\tlog.Println(sqlStmtCntStr)\n\n\t\t// Run the SQL query\n\t\tvar countRes CountRes\n\t\tcountRes.rowsNb, err = runCountSQLReq(sqlStmtCntStr, sqlArgs, w)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// Turn struct into a proper JSON response:\n\t\treturnedJson, err = json.Marshal(countRes.rowsNb)\n\t\tif err != nil {\n\t\t\terr = CustErr(err, \"Could not not marshall to JSON.\\nStopping here.\")\n\t\t\tlog.Println(err)\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\tcase \"full\":\n\n\t\t// Initialize the full SQL statement that will be created incrementally\n\t\tvar sqlStmtFull strings.Builder\n\n\t\tsqlArgs := buildSQLReq(&sqlStmtFull, false, userInput)\n\t\tsqlStmtFullStr := sqlStmtFull.String()\n\n\t\tlog.Println(sqlStmtFullStr)\n\n\t\tcompAndContRows, err := runFullSQLReq(sqlStmtFullStr, sqlArgs, w)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// Get nb of rows returned by query\n\t\trowsNb := len(compAndContRows)\n\n\t\t// If no result found, stop here\n\t\tif rowsNb == 0 {\n\t\t\tlog.Println(\"No result found\\nStopping here.\")\n\t\t\thttp.Error(w, \"No result found\", http.StatusNotFound)\n\t\t\treturn\n\t\t}\n\n\t\tif rowsNb > 5000 { // Send results in a compressed csv by email because too big\n\n\t\t\t// Send results by email asynchronously\n\t\t\tgo returnCSVByEmail(compAndContRows, w)\n\n\t\t\t// Tell frontend that not returning a json but sent by email.\n\t\t\thttp.Error(w, \"The request returned too many lines so results have been sent by email.\", http.StatusNoContent)\n\n\t\t} else { // Send results in json\n\n\t\t\t// Turn struct into a proper JSON response:\n\t\t\treturnedJson, err = json.Marshal(compAndContRows)\n\t\t\tif err != nil {\n\t\t\t\terr = CustErr(err, \"Could not not marshall to JSON.\\nStopping here.\")\n\t\t\t\tlog.Println(err)\n\t\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t}\n\t}\n\n\t// Set a custom JSON header and send response to client:\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tfmt.Fprintf(w, \"%s\", returnedJson)\n\n}", "title": "" }, { "docid": "9a976863f525f963c6a46fdc480a9b14", "score": "0.49076954", "text": "func (rs CampaignHandler) CampaignDomains(w http.ResponseWriter, r *http.Request) {\n\t// Handle query params\n\tpaginationInput := r.Context().Value(httpin.Input).(*PaginationInput)\n\tif paginationInput.Limit > 100 {\n\t\tpaginationInput.Limit = 100\n\t}\n\n\t// Get campaign UUID from path\n\tcampaignUUID := chi.URLParam(r, \"uuid\")\n\n\t// Convert campaignUUID to uuid.UUID\n\tparsedUUID, err := uuid.Parse(campaignUUID)\n\tif err != nil {\n\t\trender.Status(r, http.StatusBadRequest)\n\t\trender.JSON(w, r, render.M{\"error\": \"Invalid UUID\"})\n\t\treturn\n\t}\n\n\t// Retrieve campaign details from the repository\n\tcampaignDetails, err := rs.Repo.GetCampaign(r.Context(), parsedUUID)\n\tif err != nil {\n\t\trender.Status(r, http.StatusNotFound)\n\t\trender.JSON(w, r, render.M{\"error\": \"Campaign not found\"})\n\t\treturn\n\t}\n\n\t// Retrieve domains associated with the campaign\n\tdomains, err := rs.Repo.ListCampaignDomain(r.Context(), parsedUUID, int32(paginationInput.Offset), int32(paginationInput.Limit))\n\tif err != nil {\n\t\trender.Status(r, http.StatusInternalServerError)\n\t\trender.JSON(w, r, render.M{\"error\": \"Internal server error\"})\n\t\treturn\n\t}\n\tif len(domains) == 0 {\n\t\trender.Status(r, http.StatusNotFound)\n\t\trender.JSON(w, r, render.M{\"error\": \"Campaign not found\"})\n\t\treturn\n\t}\n\n\tvar domainList []CampaignResponse\n\tfor _, domain := range domains {\n\t\tdomainList = append(domainList, CampaignResponse{\n\t\t\tDomain: domain.Site,\n\t\t\tCheckAAAA: domain.CheckAAAA,\n\t\t\tCheckWWW: domain.CheckWWW,\n\t\t\tCheckNS: domain.CheckNS,\n\t\t\tCheckCurl: domain.CheckCurl,\n\t\t\tAsName: domain.AsName,\n\t\t\tCountry: domain.Country,\n\t\t\tTsAAAA: domain.TsAAAA,\n\t\t\tTsWWW: domain.TsWWW,\n\t\t\tTsNS: domain.TsNS,\n\t\t\tTsCurl: domain.TsCurl,\n\t\t\tTsCheck: domain.TsCheck,\n\t\t\tTsUpdated: domain.TsUpdated,\n\t\t})\n\t}\n\n\t// Connect campaign details with domain list\n\tcampaignList := struct {\n\t\tCampaign CampaignListResponse `json:\"campaign\"`\n\t\tDomains []CampaignResponse `json:\"domains\"`\n\t}{\n\t\tCampaign: CampaignListResponse{\n\t\t\tID: campaignDetails.ID,\n\t\t\tUUID: campaignDetails.UUID,\n\t\t\tName: campaignDetails.Name,\n\t\t\tDescription: campaignDetails.Description,\n\t\t\tCount: campaignDetails.Count,\n\t\t},\n\t\tDomains: domainList,\n\t}\n\n\trender.JSON(w, r, campaignList)\n}", "title": "" }, { "docid": "b5376bc4c40c6cb4a5d479315c6b4cc4", "score": "0.4894191", "text": "func Domain(domain string) string {\n\tdomain = strings.ToLower(domain)\n\tif strings.HasPrefix(strings.ToLower(domain), \"dc=\") {\n\t\treturn domain\n\t}\n\treturn Make(\"dc\", strings.Split(domain, \".\")...)\n}", "title": "" }, { "docid": "e454e62b94dc749290ac698ddd6cecfd", "score": "0.48874128", "text": "func (o BucketOutput) WebsiteDomain() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Bucket) pulumi.StringOutput { return v.WebsiteDomain }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b6fc0a9ae777bcabc34e7a8c10bd1bfc", "score": "0.48809448", "text": "func Search(term string, maxPageNumbers int64, maxCategories int) (map[string][]string, error) {\n\t//var urlsToScrape []string\n\turlsToScrape := make(map[string][]string)\n\n\tfor i, v := range categories {\n\t\tfmt.Println(\"fetching urls for category \", v)\n\t\tif maxCategories != 0 && i > maxCategories {\n\t\t\tbreak\n\t\t}\n\t\t// construct our query and generate a channel to receive data one\n\t\tresponseChannel, cancel, err := arxiv.Search(\n\t\t\tcontext.Background(),\n\t\t\t&arxiv.Query{\n\t\t\t\t//Terms: term,\n\t\t\t\tMaxPageNumber: maxPageNumbers,\n\t\t\t\tFilters: []*arxiv.Filter{\n\t\t\t\t\t{Op: arxiv.OpOR,\n\t\t\t\t\t\tFields: []*arxiv.Field{\n\t\t\t\t\t\t\t{Category: v},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor page := range responseChannel {\n\t\t\t// if this page had an error, skip it\n\t\t\tif err = page.Err; err != nil {\n\t\t\t\tfmt.Printf(\"error occured: %s\\n\", err)\n\t\t\t\tcancel()\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tfor _, entry := range page.Feed.Entry {\n\t\t\t\turlsToScrape[fmt.Sprintf(\"%s\", v)] = append(urlsToScrape[fmt.Sprintf(\"%s\", v)], entry.ID)\n\t\t\t}\n\t\t}\n\t\tcancel()\n\t}\n\treturn urlsToScrape, nil\n}", "title": "" }, { "docid": "ae376d0716e938e63ad8e7910a405ee3", "score": "0.48539302", "text": "func saveJobSearchFilterValidatorForCompany(data *requests.JobSearchFilter) error {\n\terr := emptyValidator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = length100Validator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = jobSearchValidator(&data.JobSearch)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f057c2d599cc11377ebecc12fe8d610b", "score": "0.48439217", "text": "func (s *Source) Run(ctx context.Context, domain string, session *subscraping.Session) <-chan subscraping.Result {\n\tresults := make(chan subscraping.Result)\n\n\tgo func() {\n\t\tresp, err := session.NormalGetWithContext(ctx, indexURL)\n\t\tif err != nil {\n\t\t\tresults <- subscraping.Result{Source: s.Name(), Type: subscraping.Error, Error: err}\n\t\t\tsession.DiscardHttpResponse(resp)\n\t\t\tclose(results)\n\t\t\treturn\n\t\t}\n\n\t\tindexes := []indexResponse{}\n\t\terr = jsoniter.NewDecoder(resp.Body).Decode(&indexes)\n\t\tif err != nil {\n\t\t\tresults <- subscraping.Result{Source: s.Name(), Type: subscraping.Error, Error: err}\n\t\t\tresp.Body.Close()\n\t\t\tclose(results)\n\t\t\treturn\n\t\t}\n\t\tresp.Body.Close()\n\n\t\tsearchIndexes := make(map[string]string)\n\t\tfor _, year := range years {\n\t\t\tfor _, index := range indexes {\n\t\t\t\tif strings.Contains(index.ID, year) {\n\t\t\t\t\tif _, ok := searchIndexes[year]; !ok {\n\t\t\t\t\t\tsearchIndexes[year] = index.APIURL\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor _, apiURL := range searchIndexes {\n\t\t\tfurther := s.getSubdomains(ctx, apiURL, domain, session, results)\n\t\t\tif !further {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tclose(results)\n\t}()\n\n\treturn results\n}", "title": "" }, { "docid": "2e5053983ee0012d4567f196841d1c98", "score": "0.48425034", "text": "func getAllCompaniesTypes(w http.ResponseWriter) ([]CompSocProfRow2, error) {\n\n\tvar compSocProfRows2 []CompSocProfRow2\n\tvar err error\n\n\tdbinfo := fmt.Sprintf(`host=%s port=%d user=%s password=%s dbname=%s\n sslmode=disable`, localHost, localPort, localUser, localPassword, localDbname)\n\tdb, err := sql.Open(\"postgres\", dbinfo)\n\tif err != nil {\n\t\terr = CustErr(err, \"DB connection failed\\nStopping here.\")\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\treturn compSocProfRows2, err\n\t}\n\tdefer db.Close()\n\n\tsqlStmt := \"SELECT DISTINCT(type) FROM companysocialprofile WHERE type <> ''\"\n\n\trows, err := db.Query(sqlStmt)\n\tif err != nil {\n\t\terr = CustErr(err, \"SQL query failed.\\nStopping here.\")\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\treturn compSocProfRows2, err\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar compSocProfRow2 CompSocProfRow2\n\t\tif err := rows.Scan(&compSocProfRow2.Type); err != nil {\n\t\t\terr = CustErr(err, \"A row could not be read from SQL query results.\\nNOT stopping here.\")\n\t\t\tlog.Println(err)\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn compSocProfRows2, err\n\t\t}\n\t\tcompSocProfRows2 = append(compSocProfRows2, compSocProfRow2)\n\t}\n\n\treturn compSocProfRows2, err\n}", "title": "" }, { "docid": "4edc6fff10d529eb84b6e20fe92f7dfb", "score": "0.4836041", "text": "func RunDomain(domain string, db *database.Database) {\n\t// Set the target\n\tdb.SetDomain(domain)\n\t// Initialize the channels\n\txsubdomains := make(chan []string, 1)\n\txsitecheck := make(chan map[string]interface{}, 1)\n\txwhois := make(chan *whois, 1)\n\t// Close the channels\n\tdefer close(xsubdomains)\n\tdefer close(xsitecheck)\n\tdefer close(xwhois)\n\t// Run the concurrent methods\n\tgo moduleSubdomains(domain, &xsubdomains)\n\tgo moduleSiteCheck(domain, &xsitecheck)\n\tgo moduleWhois(domain, &xwhois)\n\t// Receive the data\n\ti := 3 // FIXME Better implementation using arrays or maps?\n\tfor i > 0 {\n\t\tselect {\n\t\tcase s := <-xsubdomains:\n\t\t\tdb.SetDomainSubdomains(s)\n\t\tcase sc := <-xsitecheck:\n\t\t\tif sc != nil {\n\t\t\t\tif value, ok := sc[\"ipv4\"].(string); ok {\n\t\t\t\t\tdb.SetDomainIPv4(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"ipv6\"].(string); ok {\n\t\t\t\t\tdb.SetDomainIPv6(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"url\"].(string); ok {\n\t\t\t\t\tdb.SetDomainWebUrl(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"rating\"].(string); ok {\n\t\t\t\t\tdb.SetDomainWebRating(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"server\"].(string); ok {\n\t\t\t\t\tdb.SetDomainWebServer(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"redirects\"].([]string); ok {\n\t\t\t\t\tdb.SetDomainWebRedirects(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"links\"].([]string); ok {\n\t\t\t\t\tdb.SetDomainWebLinks(value)\n\t\t\t\t}\n\t\t\t\tif value, ok := sc[\"js\"].([]string); ok {\n\t\t\t\t\tdb.SetDomainWebJS(value)\n\t\t\t\t}\n\t\t\t}\n\t\tcase w := <-xwhois:\n\t\t\tdb.SetDomainWhoisTLD(w.tld)\n\t\t\tdb.SetDomainWhoisStatus(w.status)\n\t\t\tdb.SetDomainWhoisCreated(w.created)\n\t\t\tdb.SetDomainWhoisChanged(w.changed)\n\t\t\tdb.SetDomainWhoisPhones(w.phone)\n\t\t\tdb.SetDomainWhoisEmails(w.email)\n\t\t}\n\t\ti--\n\t}\n}", "title": "" }, { "docid": "1aad7eda1b29e364a75bdf2796343236", "score": "0.48263055", "text": "func getTopLevelDomains(backend backend.Backend) []string {\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\n\trequest := types.NewFindRequest(\"*\")\n\tmatches, err := backend.Find(ctx, request)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tvar paths []string\n\tfor _, m := range matches.Matches {\n\t\tpaths = append(paths, m.Path)\n\t}\n\treturn paths\n}", "title": "" }, { "docid": "ec3bb8432006803edb301cf07408ed45", "score": "0.48206276", "text": "func (l List) ContainsDomain(domain string) bool {\n\tfor _, addr := range l {\n\t\tif strings.EqualFold(addr.Domain(), domain) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "fc32e5ca0264bde3e7e4ed5c8d7eea3b", "score": "0.4818701", "text": "func dlSearch(reqCtx common.RequestContext, term string, limit int64) ([]model.EmployeeStatus, error) {\n\tdata := []model.EmployeeStatus{}\n\n\t// searchCols := []string{\"es.source\", \"es.status\"}\n\t// searchTerm := search.GetSearchCondition(searchCols, term)\n\t// isActiveWhere := ` es.isactive=1 `\n\t// qry := getQuery + ` where ` + isActiveWhere\n\t// if len(searchTerm) > 0 && len(isActiveWhere) > 0 {\n\t// \tqry += ` and `\n\t// }\n\t// qry += searchTerm\n\n\t// if limit > 0 {\n\t// \tqry = qry + fmt.Sprintf(` limit %d`, limit)\n\t// }\n\n\t// stmt, err := reqCtx.Tx().Preparex(qry)\n\t// if err != nil {\n\t// \treturn data, err\n\t// }\n\n\t// err = stmt.Select(&data)\n\treturn data, nil\n}", "title": "" }, { "docid": "bed3b10fe0863418c60ec88635fe4699", "score": "0.4812942", "text": "func (c *GTMClient) Domains() ([]DomainSummary, error) {\n\tdomains := &Domains{}\n\terr := resourceRequest(c, \"GET\", domainsEndpoint(c.GetCredentials()), nil, domains)\n\tif err != nil {\n\t\treturn []DomainSummary{}, err\n\t}\n\treturn domains.Domains, err\n}", "title": "" }, { "docid": "94dadc95f3482b5ecfcbba88120727c8", "score": "0.48077092", "text": "func (s Spider) DomainsAlwaysInScope() (map[string]interface{}, error) {\n\treturn s.c.Request(\"spider/view/domainsAlwaysInScope/\", nil)\n}", "title": "" }, { "docid": "d48016f66ac02fb2d65bfbcb055a4f3f", "score": "0.47948", "text": "func (g *Domain) ListDomains() (domains []ListResponse, err error) {\n\t_, elements, err := g.client.GetCollection(\"domains\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, element := range elements {\n\t\tvar key ListResponse\n\t\terr := json.Unmarshal(element, &key)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdomains = append(domains, key)\n\t}\n\treturn domains, nil\n}", "title": "" }, { "docid": "2e669b53f3551fe57520dbb4085ba4c5", "score": "0.47901148", "text": "func (o ApplicationOutput) Domains() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *Application) pulumi.StringArrayOutput { return v.Domains }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "27351574cf8585ea6f623ed54774afd5", "score": "0.47885635", "text": "func saveUserSearchFilterValidatorForCompany(data *requests.UserSearchFilter) error {\n\terr := emptyValidator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = length100Validator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = userSearchValidator(&data.UserSearch)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "903cf6566d99734cee02139f4f8831d7", "score": "0.4785457", "text": "func Status(client *Client, domains []string) ([]Domain, error) {\n\tstatusResponse, err := client.Status(domains)\n\treturn statusResponse.Domains, err\n}", "title": "" }, { "docid": "54285a8e53258ac3522e60a4d81e64e1", "score": "0.47829735", "text": "func Listthedomainwhitelabelassociatedwiththegivenuser() {\n\tapiKey := os.Getenv(\"YOUR_SENDGRID_APIKEY\")\n\thost := \"https://api.sendgrid.com\"\n\trequest := sendgrid.GetRequest(apiKey, \"/v3/whitelabel/domains/subuser\", host)\n\trequest.Method = \"GET\"\n\tresponse, err := sendgrid.API(request)\n\tif err != nil {\n\t\tlog.Println(err)\n\t} else {\n\t\tfmt.Println(response.StatusCode)\n\t\tfmt.Println(response.Body)\n\t\tfmt.Println(response.Headers)\n\t}\n}", "title": "" }, { "docid": "5ae33edc7220784253ac241987045158", "score": "0.47808316", "text": "func ExampleDomain() {\n\tfmt.Println(Domain(\"https://www.Example.COM/?param=value\", false, false))\n\t// Output: www.example.com <nil>\n}", "title": "" }, { "docid": "2a20b5f26fb93b7bd526033dc10eeab9", "score": "0.4778927", "text": "func DomainsFromLibvirt(l *libvirt.Libvirt) ([]domainMeta, error) {\n\tdomains, _, err := l.ConnectListAllDomains(1, 0)\n\tif err != nil {\n\t\tlogger.Error(\"failed to load domain\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\n\tlvDomains := make([]domainMeta, len(domains))\n\tfor idx, domain := range domains {\n\t\txmlDesc, err := l.DomainGetXMLDesc(domain, 0)\n\t\tif err != nil {\n\t\t\tlogger.Error(\"failed to DomainGetXMLDesc\", zap.Error(err))\n\t\t\treturn nil, err\n\t\t}\n\t\tvar libvirtSchema libvirt_schema.Domain\n\t\tif err = xml.Unmarshal([]byte(xmlDesc), &libvirtSchema); err != nil {\n\t\t\tlogger.Error(\"failed to Unmarshal domains\", zap.Error(err))\n\t\t\treturn nil, err\n\t\t}\n\n\t\tlvDomains[idx].libvirtDomain = domain\n\t\tlvDomains[idx].libvirtSchema = libvirtSchema\n\n\t\tlvDomains[idx].domainName = domain.Name\n\t\tlvDomains[idx].instanceName = libvirtSchema.Metadata.NovaInstance.Name\n\t\tlvDomains[idx].instanceId = libvirtSchema.UUID\n\t\tlvDomains[idx].flavorName = libvirtSchema.Metadata.NovaInstance.Flavor.FlavorName\n\n\t\tlvDomains[idx].userName = libvirtSchema.Metadata.NovaInstance.Owner.User.UserName\n\t\tlvDomains[idx].userId = libvirtSchema.Metadata.NovaInstance.Owner.User.UserId\n\n\t\tlvDomains[idx].projectName = libvirtSchema.Metadata.NovaInstance.Owner.Project.ProjectName\n\t\tlvDomains[idx].projectId = libvirtSchema.Metadata.NovaInstance.Owner.Project.ProjectId\n\t}\n\n\treturn lvDomains, nil\n}", "title": "" }, { "docid": "0d9ed98e20c0b1281cb32ed22cb4f311", "score": "0.477348", "text": "func (c *Client) BuildCompanyListRequest(ctx context.Context, v interface{}) (*http.Request, error) {\n\tu := &url.URL{Scheme: c.scheme, Host: c.host, Path: CompanyListHyCompanyPath()}\n\treq, err := http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, goahttp.ErrInvalidURL(\"hy_company\", \"companyList\", u.String(), err)\n\t}\n\tif ctx != nil {\n\t\treq = req.WithContext(ctx)\n\t}\n\n\treturn req, nil\n}", "title": "" }, { "docid": "d3672a10972c13fe3e71cd9cb87c9d61", "score": "0.4765076", "text": "func GetCompanies(accountid uint) []*Company {\n\tcompanies := make([]*Company, 0)\n\terr := GetDB().Set(\"gorm:auto_preload\", true).Where(\"account_id = ?\", accountid).Find(&companies).Error\n\n\tfor i := range companies {\n\t\tcompanies[i].Account.Password = \"\"\n\t}\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn nil\n\t}\n\treturn companies\n}", "title": "" }, { "docid": "6e9f09ca31bde70155befab4c5c7fb3d", "score": "0.47647932", "text": "func (c *ListDomainClient) GetListDomain(verbose bool) (*resty.Response, error) {\n\tif verbose {\n\t\tlog.Printf(\"> GetListDomain\\n\")\n\t}\n\treq := resty.R().\n\t\tSetHeader(\"Ocp-Apim-Subscription-Key\", *c.APIToken).\n\t\tSetHeader(\"User-Agent\", UserAgent)\n\treturn req.Get(ListDomainAPIURLBase)\n}", "title": "" }, { "docid": "4b5c80d6621a21d56c2911093eef3a10", "score": "0.4764422", "text": "func saveCompanySearchFilterValidator(data *requests.CompanySearchFilter) error {\n\terr := emptyValidator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = length100Validator(data.Name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = companySearchValidator(&data.CompanySearch)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "90ce86a7a16075fa1018a94bb8c950bc", "score": "0.47620058", "text": "func GetAllCompaniesMongo() (results []model.Company, err error) {\n\tcollection, err := conf.GetMongoCollection(\"company\")\n\tif err != nil {\n\t\tfmt.Print(\"[company] Error to get All Companies collection in MONGO\", err.Error())\n\t}\n\terr = collection.Find(nil).All(&results)\n\tif err != nil {\n\t\tfmt.Printf(\"[repo.GetAllCompanyMongo] Erro ao retornar Todos as companies no MongoDB\")\n\t}\n\tfmt.Print(&results)\n\treturn\n}", "title": "" }, { "docid": "c0732fcd8d05d9e3c5e7ee6067572e91", "score": "0.4759448", "text": "func CompaniesByUser(db XODB, user sql.NullString) ([]*Company, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`auto_id, user, money, time ` +\n\t\t`FROM homework.company ` +\n\t\t`WHERE user = ?`\n\n\t// run query\n\tXOLog(sqlstr, user)\n\tq, err := db.Query(sqlstr, user)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results\n\tres := []*Company{}\n\tfor q.Next() {\n\t\tc := Company{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = q.Scan(&c.AutoID, &c.User, &c.Money, &c.Time)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &c)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "ab589b5916bb48af443e58eb29d411b1", "score": "0.47569725", "text": "func (o BucketOutput) WebsiteDomain() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Bucket) *string { return v.WebsiteDomain }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0ce7cce9cfc952dd329af23a79b28439", "score": "0.47421458", "text": "func (cgp *CGP) Domains() ([]*Domain, error) {\n\tvar vl valueList\n\terr := cgp.request(listDomains{}, &vl)\n\tif err != nil {\n\t\treturn []*Domain{}, err\n\t}\n\tvals := vl.SubValues\n\tds := make([]*Domain, len(vals))\n\tfor i, d := range vals {\n\t\tds[i] = cgp.Domain(d)\n\t}\n\treturn ds, nil\n}", "title": "" }, { "docid": "2e5bc6fdd5725dd108c2f8938cc3ae8a", "score": "0.47353497", "text": "func ParseDomain(dom Domain) *Condition {\n\tres := parseDomain(&dom)\n\tif res == nil {\n\t\treturn nil\n\t}\n\tfor len(dom) > 0 {\n\t\tres = NewCondition().AndCond(res).AndCond(parseDomain(&dom))\n\t}\n\treturn res\n}", "title": "" }, { "docid": "6361df55c5ba57470c62ea450d0268f0", "score": "0.47309104", "text": "func (o StackStorageConnectorOutput) Domains() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v StackStorageConnector) []string { return v.Domains }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "75bba7a066e9ec640336f0a84b74abea", "score": "0.47294262", "text": "func GetDomains() ([]string, error) {\n\treturn GetModel().ListDomains()\n}", "title": "" }, { "docid": "1cb78f920fdb3bd8034cd4a361dbfbd7", "score": "0.47233784", "text": "func BenchmarkDomain(b *testing.B) {\n\tfor i := 0; i < b.N; i++ {\n\t\t_, _ = Domain(\"https://Example.COM/?param=value\", false, false)\n\t}\n}", "title": "" }, { "docid": "eeba73410ed69ce85461d68a0e9f0bd4", "score": "0.47115186", "text": "func (e *Enumeration) Domains() []string {\n\treturn e.domains\n}", "title": "" } ]
e7fa10777a32d9b899b1ca8503d41609
AsLocalUserNotAllowed is the BasicCustomAlertRule implementation for ListCustomAlertRule.
[ { "docid": "20cfb156233cc4b505de8bf2010dd2e3", "score": "0.8710588", "text": "func (lcar ListCustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" } ]
[ { "docid": "342e261872bfa015004d9656f25158c7", "score": "0.85327625", "text": "func (dcar DenylistCustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "39d9ad961afd5ae4c2e5a8afba12e730", "score": "0.841785", "text": "func (acar AllowlistCustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "94599803f5d65ab80fd03784bee750be", "score": "0.8367386", "text": "func (car CustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eb2c5533131dba2dfcab3b0436c0a69f", "score": "0.8079749", "text": "func (tcar ThresholdCustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eb964f535812352a08395f365994d3e3", "score": "0.8048498", "text": "func (luna LocalUserNotAllowed) AsCustomAlertRule() (*CustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "17c57662bc14d3ac4ba3ce4d0047804b", "score": "0.79818636", "text": "func (twcar TimeWindowCustomAlertRule) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f5bbde08d5643fe4549220616d043b7b", "score": "0.7960068", "text": "func (luna LocalUserNotAllowed) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8b1c296dc1d713eb931352f1cf3cdcff", "score": "0.7933546", "text": "func (luna LocalUserNotAllowed) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn &luna, true\n}", "title": "" }, { "docid": "a79f2178df940285e23ffcca2e932e05", "score": "0.7907551", "text": "func (luna LocalUserNotAllowed) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c4522f453fa58553270099812badd6e5", "score": "0.7759483", "text": "func (luna LocalUserNotAllowed) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "233aba0cdba5784771273295e02b739b", "score": "0.7722805", "text": "func (luna LocalUserNotAllowed) AsBasicAllowlistCustomAlertRule() (BasicAllowlistCustomAlertRule, bool) {\n\treturn &luna, true\n}", "title": "" }, { "docid": "099299781d603fb393090390ca74d1f9", "score": "0.76454043", "text": "func (luna LocalUserNotAllowed) AsBasicCustomAlertRule() (BasicCustomAlertRule, bool) {\n\treturn &luna, true\n}", "title": "" }, { "docid": "ce07810a552182e1b1d29b8535eaecfd", "score": "0.73165816", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f2bc55e7b89ca3852f4a6aa8db098d86", "score": "0.72564423", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2012cb58241cd4aef976b447fbc37eda", "score": "0.72544384", "text": "func (mcrmniar MqttC2DRejectedMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8bf2bb82b8939559ebf19af544effcd5", "score": "0.7218781", "text": "func (tuniar TwinUpdatesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "99756e7dd13c44533cd4e3bc9d1fa4d1", "score": "0.7193076", "text": "func (admniar AmqpD2CMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "291db72d0d481c5d50361d2dc3745302", "score": "0.7192448", "text": "func (mdmniar MqttD2CMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0ae70f78cef754ac2fc0c50f410e23dd", "score": "0.7190815", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b4b62aac368eed7b2710d881322cf42c", "score": "0.7151093", "text": "func (luna LocalUserNotAllowed) AsThresholdCustomAlertRule() (*ThresholdCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8e20c3a6beb09eacd20d13d12a485e5a", "score": "0.7150361", "text": "func (hdmniar HTTPD2CMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b55699524c9e101019391c566691890a", "score": "0.71356577", "text": "func (mcmniar MqttC2DMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "623928995f5f67cd50b69af1f42907c0", "score": "0.711483", "text": "func (acrmniar AmqpC2DRejectedMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8066695fff87f281ff3b6995a41d1f55", "score": "0.70758235", "text": "func (hcmniar HTTPC2DMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "757f5fc69c5b9fcccc404766b7b253e8", "score": "0.70685416", "text": "func (acniar ActiveConnectionsNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8644bc4cdcd70083b59a4cae78b9832d", "score": "0.7042128", "text": "func (luna LocalUserNotAllowed) AsTimeWindowCustomAlertRule() (*TimeWindowCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "111f1e61186133675b8193d0fdd212b0", "score": "0.70362234", "text": "func (funiar FileUploadsNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "455e0d6514f6b8f496c5b1e0aa0f5267", "score": "0.70248175", "text": "func (luna LocalUserNotAllowed) AsBasicTimeWindowCustomAlertRule() (BasicTimeWindowCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c828ef271665e3442c5ff713a307ccc5", "score": "0.7010119", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ad5ab85b6b1f2867e0509ba9215d8569", "score": "0.697175", "text": "func (dminiar DirectMethodInvokesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f033aa5a4a7c14f6da139c90bc93442e", "score": "0.6949397", "text": "func (acmniar AmqpC2DMessagesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "20dba9986ccef419b1b9eceed8cea72c", "score": "0.69105923", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "56ca7db0f306644e3a7a1ca8deb1dd67", "score": "0.67746377", "text": "func (luna LocalUserNotAllowed) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn &luna, true\n}", "title": "" }, { "docid": "33905bfa71b3a782b986701c12a72bdc", "score": "0.67596924", "text": "func (luna LocalUserNotAllowed) AsBasicThresholdCustomAlertRule() (BasicThresholdCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "54a9c2309c4f8cce4c6a30a7e2c69105", "score": "0.6742025", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsCustomAlertRule() (*CustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "47c25e31f72a31b3b4925e197d611c88", "score": "0.6652814", "text": "func (qpniar QueuePurgesNotInAllowedRange) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "387f4d43a4560ffb5d5b45007cca632f", "score": "0.6602617", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c22f0262f3227f343595a3cfad0d4568", "score": "0.65963936", "text": "func (ctina ConnectionToIPNotAllowed) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "82c2f1db64e9c659198191ffd8e71105", "score": "0.65478396", "text": "func (lcar ListCustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "08fcc1234b1735d0a2b95b946cca3ed5", "score": "0.648267", "text": "func (pna ProcessNotAllowed) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b87028620a136ab542026e16e3875d9b", "score": "0.6472481", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f35c1d4d2535fcdbe55ccb76724b3df5", "score": "0.64574546", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsBasicAllowlistCustomAlertRule() (BasicAllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "eeb20011841b82c0b524b9224f9e5000", "score": "0.6457261", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1852ea91da7993468eeb5dd117cdb531", "score": "0.6429462", "text": "func (ctina ConnectionToIPNotAllowed) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7e150ca2b580b6da80c897adc460523f", "score": "0.64158994", "text": "func (ctina ConnectionToIPNotAllowed) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1e4712b5eaaa318f6a6cf39a5d1bb711", "score": "0.64079475", "text": "func (dcar DenylistCustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fd6deac895ff70f32192b2a435aee954", "score": "0.64057857", "text": "func (funiar FileUploadsNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "df1d98f7a8ee8da3d351094b096c6584", "score": "0.6396324", "text": "func (cfina ConnectionFromIPNotAllowed) AsLocalUserNotAllowed() (*LocalUserNotAllowed, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "119bcfbc8d90d408d12c4cd0de687b3e", "score": "0.6359475", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6c8866d172bb1e7655d1152ebac8e4d9", "score": "0.63079035", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsBasicTimeWindowCustomAlertRule() (BasicTimeWindowCustomAlertRule, bool) {\n\treturn &fllniar, true\n}", "title": "" }, { "docid": "0a10085a99801452e446f81599b0108d", "score": "0.62850356", "text": "func (acar AllowlistCustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "016e33bbb0aef7aa8b8fd4627a70eb3e", "score": "0.6262018", "text": "func (pna ProcessNotAllowed) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "86ceca6f3b0fda4f685910b430ebd8c7", "score": "0.62578315", "text": "func (pna ProcessNotAllowed) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d4b595f3ae28341d86d88ca249b7fb4d", "score": "0.6253321", "text": "func (twcar TimeWindowCustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "aaed70c3c4c585c69223407defa32acc", "score": "0.62495494", "text": "func (funiar FileUploadsNotInAllowedRange) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "28f9508ca05ae06f6dc055d085384379", "score": "0.6232579", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsBasicCustomAlertRule() (BasicCustomAlertRule, bool) {\n\treturn &fllniar, true\n}", "title": "" }, { "docid": "74a69c069bfb90ad0acd61224950b689", "score": "0.62194717", "text": "func (tuniar TwinUpdatesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9fc372ae9cbed000805c0c5deca5b8fd", "score": "0.620984", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsTimeWindowCustomAlertRule() (*TimeWindowCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4572c37adacc8e680e9dfd2a39867c16", "score": "0.6197954", "text": "func (car CustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5f7d044084268d8479c41317f57fdd02", "score": "0.61966544", "text": "func (luna LocalUserNotAllowed) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f81b8fb506f79d3f61476d01d7c93aa3", "score": "0.6192967", "text": "func (ctina ConnectionToIPNotAllowed) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f6c63b61685fc64fd3e5d98bc1e1d0a6", "score": "0.61889124", "text": "func (hcmniar HTTPC2DMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "94ebe80939d7e9301b0c1da55f2cca9d", "score": "0.61866695", "text": "func (hdmniar HTTPD2CMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3a363db32177a32f49db27003db9d81d", "score": "0.6178548", "text": "func (cfina ConnectionFromIPNotAllowed) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8d7b0b5430ad3d7b1f9bf1e83727da7d", "score": "0.6177944", "text": "func (mcrmniar MqttC2DRejectedMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "39361f8d599a937ba158b5f131d54569", "score": "0.61487234", "text": "func (cfina ConnectionFromIPNotAllowed) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3305c60fc07fd8042fd93a6c55275978", "score": "0.6127048", "text": "func (funiar FileUploadsNotInAllowedRange) AsCustomAlertRule() (*CustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a1f4461b0bf75503f01be4c9a948a5b4", "score": "0.61246735", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "11fb1bc1ca7978cf3efc4ece0f827748", "score": "0.61088234", "text": "func (pna ProcessNotAllowed) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7c448aa49de14394533e48b407b508b0", "score": "0.60972375", "text": "func (tcar ThresholdCustomAlertRule) AsFailedLocalLoginsNotInAllowedRange() (*FailedLocalLoginsNotInAllowedRange, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9153358cfeade673c98deb30a2057d8a", "score": "0.60950536", "text": "func (mdmniar MqttD2CMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cdbc929aafb1260ccd4473840da4bd27", "score": "0.6092672", "text": "func (funiar FileUploadsNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9db1eec3d78c6291447d03bf5ca539bb", "score": "0.6079164", "text": "func (acrmniar AmqpC2DRejectedMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "180253f127f78194c22b9d0ada8c2de8", "score": "0.6075222", "text": "func (ctina ConnectionToIPNotAllowed) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn &ctina, true\n}", "title": "" }, { "docid": "615009bb03a272e3cb9ddc13b3e12abd", "score": "0.6061643", "text": "func (cfina ConnectionFromIPNotAllowed) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "3c16ce86d8a4a95fef849e333437248f", "score": "0.6060443", "text": "func (admniar AmqpD2CMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4641c32ada8574a7d76ee1ec350b6322", "score": "0.6059315", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "87ab4c04ecfa82c4d428ff49f7a6c316", "score": "0.60333544", "text": "func (mcmniar MqttC2DMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7320b54eea591a23c80f8af0a78ae4f4", "score": "0.6008168", "text": "func (dminiar DirectMethodInvokesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bbefd1bc3a5af1603ef3bdd541d0dbfe", "score": "0.6004923", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5edd84f3dd4fd8b67d2d748cfe7e993c", "score": "0.5966166", "text": "func (acniar ActiveConnectionsNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bbc948f23f4687bccc192436c0b4d0fd", "score": "0.5957757", "text": "func (pna ProcessNotAllowed) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn &pna, true\n}", "title": "" }, { "docid": "0a2434c4d4dbc6ce8cbe761f55fc9efd", "score": "0.59529966", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsThresholdCustomAlertRule() (*ThresholdCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a09908de6baeb4716850095c645e2a73", "score": "0.5919498", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "8376a621aea870f7fae9de19de4b974a", "score": "0.5905763", "text": "func (fllniar FailedLocalLoginsNotInAllowedRange) AsBasicThresholdCustomAlertRule() (BasicThresholdCustomAlertRule, bool) {\n\treturn &fllniar, true\n}", "title": "" }, { "docid": "646b9173ca3441c8e9586259b771e75b", "score": "0.59022105", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7e5f9c334fd99140d70498a3815d79cb", "score": "0.5881778", "text": "func (acmniar AmqpC2DMessagesNotInAllowedRange) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4316ef3dcc9d2417142ac21d89068338", "score": "0.5876725", "text": "func (tuniar TwinUpdatesNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "961e84769fe333fcc351d75166e89e4c", "score": "0.587442", "text": "func (tuniar TwinUpdatesNotInAllowedRange) AsDenylistCustomAlertRule() (*DenylistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "826508a7fa671393019c4be4c5cb2be9", "score": "0.58699787", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsBasicAllowlistCustomAlertRule() (BasicAllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7ef47703ed19ea1b579bfc29ed957574", "score": "0.58651245", "text": "func (mcrmniar MqttC2DRejectedMessagesNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d3715a2d24a0283d07e602ce965b4fc5", "score": "0.58589894", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsCustomAlertRule() (*CustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "df2f7045720cbdde50163580eb2c7369", "score": "0.58506", "text": "func (uoniar UnauthorizedOperationsNotInAllowedRange) AsBasicAllowlistCustomAlertRule() (BasicAllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "edac2d825b9d45d856dcd7da9642881f", "score": "0.5845994", "text": "func (funiar FileUploadsNotInAllowedRange) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a838e135084f5fa0decf2a86411ba1fe", "score": "0.5840831", "text": "func (lcar ListCustomAlertRule) AsAllowlistCustomAlertRule() (*AllowlistCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ae7ee1dfac2148048121c225835eb080", "score": "0.5840278", "text": "func (ctina ConnectionToIPNotAllowed) AsCustomAlertRule() (*CustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a6e7fc89ce2c55715fd1085bd7872092", "score": "0.5838745", "text": "func (luna LocalUserNotAllowed) MarshalJSON() ([]byte, error) {\n\tluna.RuleType = RuleTypeLocalUserNotAllowed\n\tobjectMap := make(map[string]interface{})\n\tif luna.AllowlistValues != nil {\n\t\tobjectMap[\"allowlistValues\"] = luna.AllowlistValues\n\t}\n\tif luna.IsEnabled != nil {\n\t\tobjectMap[\"isEnabled\"] = luna.IsEnabled\n\t}\n\tif luna.RuleType != \"\" {\n\t\tobjectMap[\"ruleType\"] = luna.RuleType\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "d439b962f33a3b24393efdf516c3f7f9", "score": "0.5834737", "text": "func (hdmniar HTTPD2CMessagesNotInAllowedRange) AsListCustomAlertRule() (*ListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0f5975b5f9227337b7281837e7292e75", "score": "0.58332646", "text": "func (hcrmniar HTTPC2DRejectedMessagesNotInAllowedRange) AsBasicListCustomAlertRule() (BasicListCustomAlertRule, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "49fcdf84bbb7ef89e2f6828e04543187", "score": "0.58270025", "text": "func (ctina ConnectionToIPNotAllowed) AsBasicAllowlistCustomAlertRule() (BasicAllowlistCustomAlertRule, bool) {\n\treturn &ctina, true\n}", "title": "" } ]
8a48421245528c7c1267f899e6269055
MarshalJSON implements the json.Marshaller interface for type GuestCredential.
[ { "docid": "59f78434b8a56d0e7437c5000ad85b76", "score": "0.8590055", "text": "func (g GuestCredential) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"password\", g.Password)\n\tpopulate(objectMap, \"username\", g.Username)\n\treturn json.Marshal(objectMap)\n}", "title": "" } ]
[ { "docid": "66cd0db5faa3668643d039568fe1987c", "score": "0.7305573", "text": "func (vc *Credential) MarshalJSON() ([]byte, error) {\n\tbyteCred, err := json.Marshal(vc.raw())\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"JSON marshalling of verifiable credential failed: %w\", err)\n\t}\n\n\treturn byteCred, nil\n}", "title": "" }, { "docid": "3e6d574260a2a0e974e712389a0e5c42", "score": "0.73035383", "text": "func (v VICredential) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"password\", v.Password)\n\tpopulate(objectMap, \"username\", v.Username)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "4a4abf197c592c024961787e6483f3eb", "score": "0.6930142", "text": "func (sac StorageAccountCredential) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif sac.StorageAccountCredentialProperties != nil {\n\t\tobjectMap[\"properties\"] = sac.StorageAccountCredentialProperties\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "ccbe2addc00a4c07b7b48133c3079be3", "score": "0.6889562", "text": "func (c *Credential) MarshalJSON() ([]byte, error) {\n\tif c.TokenCredential != nil {\n\t\t// Override the access token with the decoded JWT claims\n\t\taccessToken := interface{}(c.TokenCredential.AccessToken)\n\t\tif DecodeJWT {\n\t\t\tmc := jwt.MapClaims{}\n\t\t\tif _, _, err := new(jwt.Parser).ParseUnverified(c.TokenCredential.AccessToken, mc); err == nil {\n\t\t\t\taccessToken = mc\n\t\t\t}\n\t\t}\n\n\t\t// Override the expiry with the UTC formatted time or \"0\"\n\t\texpiry := \"0\"\n\t\tif !c.TokenCredential.Expiry.IsZero() {\n\t\t\texpiry = c.TokenCredential.Expiry.UTC().Format(time.RFC3339)\n\t\t}\n\n\t\t// http://choly.ca/post/go-json-marshalling/\n\t\ttype TC TokenCredential\n\t\treturn json.Marshal(&struct {\n\t\t\t*TC\n\t\t\tAccessToken interface{} `json:\"access_token,omitempty\"`\n\t\t\tExpiry string `json:\"expiry,omitempty\"`\n\t\t}{TC: (*TC)(c.TokenCredential), AccessToken: accessToken, Expiry: expiry})\n\t} else if c.ClientCredential != nil {\n\t\treturn json.Marshal(c.ClientCredential)\n\t}\n\treturn []byte(\"{}\"), nil\n}", "title": "" }, { "docid": "48c7a2a4ad5ffb5fbaf7906cef22dfcd", "score": "0.6867557", "text": "func (credentials Credentials) MarshalJSON() ([]byte, error) {\n\treturn credentials.AdditionalProperties.MarshalJSON(map[string]interface{}{\"end_points\": credentials.Endpoints})\n}", "title": "" }, { "docid": "996ddcd6b7c2ed343d063b1a90fed94a", "score": "0.6794548", "text": "func (b BackendCredentialsContract) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"authorization\", b.Authorization)\n\tpopulate(objectMap, \"certificate\", b.Certificate)\n\tpopulate(objectMap, \"certificateIds\", b.CertificateIDs)\n\tpopulate(objectMap, \"header\", b.Header)\n\tpopulate(objectMap, \"query\", b.Query)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "b433bfcb7ee7ce018226232ed5631727", "score": "0.6763774", "text": "func (s ShareCredentialDetails) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"password\", s.Password)\n\tpopulate(objectMap, \"shareName\", s.ShareName)\n\tpopulate(objectMap, \"shareType\", s.ShareType)\n\tpopulate(objectMap, \"supportedAccessProtocols\", s.SupportedAccessProtocols)\n\tpopulate(objectMap, \"userName\", s.UserName)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a19abd6779c8ccf824e5abe0c8611c7b", "score": "0.6609615", "text": "func (a AccountCredentialDetails) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"accountConnectionString\", a.AccountConnectionString)\n\tpopulate(objectMap, \"accountName\", a.AccountName)\n\tpopulate(objectMap, \"dataAccountType\", a.DataAccountType)\n\tpopulate(objectMap, \"shareCredentialDetails\", a.ShareCredentialDetails)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9cea7006633e4097b4a6ee08a531d2ae", "score": "0.65141207", "text": "func (g GuestAgentProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"credentials\", g.Credentials)\n\tpopulate(objectMap, \"customResourceName\", g.CustomResourceName)\n\tpopulate(objectMap, \"httpProxyConfig\", g.HTTPProxyConfig)\n\tpopulate(objectMap, \"provisioningAction\", g.ProvisioningAction)\n\tpopulate(objectMap, \"provisioningState\", g.ProvisioningState)\n\tpopulate(objectMap, \"status\", g.Status)\n\tpopulate(objectMap, \"statuses\", g.Statuses)\n\tpopulate(objectMap, \"uuid\", g.UUID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "0261f3bce14996a5672a52c4b8548ac6", "score": "0.63398314", "text": "func (g GuestAgent) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", g.ID)\n\tpopulate(objectMap, \"name\", g.Name)\n\tpopulate(objectMap, \"properties\", g.Properties)\n\tpopulate(objectMap, \"systemData\", g.SystemData)\n\tpopulate(objectMap, \"type\", g.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a46ea24ec736f4c60c84079edbaabd06", "score": "0.6324626", "text": "func (p Password) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(nil)\n}", "title": "" }, { "docid": "4faa452267a37e65b7eebd9dfb61c96a", "score": "0.6306569", "text": "func (t ICECredentialType) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal(t.String())\n}", "title": "" }, { "docid": "ba7803d96fca5847d549bb5ba9d5b1eb", "score": "0.62973946", "text": "func (m OAuthCredentialCreateResponse) MarshalJSON() ([]byte, error) {\n\tvar _parts [][]byte\n\n\tvar data struct {\n\t\tSecret OAuthClientSecret `json:\"secret\"`\n\t}\n\n\tdata.Secret = m.Secret\n\n\tjsonData, err := swag.WriteJSON(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, jsonData)\n\n\taO1, err := swag.WriteJSON(m.OAuthCredentialGetResponse)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, aO1)\n\n\treturn swag.ConcatJSON(_parts...), nil\n}", "title": "" }, { "docid": "53ffa8d13022acf8052c99c755b74cc4", "score": "0.626975", "text": "func (v VirtualMachineIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", v.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", v.TenantID)\n\tpopulate(objectMap, \"type\", v.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", v.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "f370b32bb5924361ae1ae3ac14c91428", "score": "0.6233071", "text": "func (s Secret) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"accountCredentialDetails\", s.AccountCredentialDetails)\n\tpopulate(objectMap, \"devicePassword\", s.DevicePassword)\n\tpopulate(objectMap, \"deviceSerialNumber\", s.DeviceSerialNumber)\n\tpopulate(objectMap, \"encodedValidationCertPubKey\", s.EncodedValidationCertPubKey)\n\tpopulate(objectMap, \"networkConfigurations\", s.NetworkConfigurations)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a5a532aee646dbf5a7fd0744e29febc7", "score": "0.6203894", "text": "func (i IdentityProviderContractProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ti.IdentityProviderBaseParameters.marshalInternal(objectMap)\n\tpopulate(objectMap, \"clientId\", i.ClientID)\n\tpopulate(objectMap, \"clientSecret\", i.ClientSecret)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "97f04a32b9033e38a6a2a3b57007e415", "score": "0.6200622", "text": "func (u UnencryptedCredentials) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"jobName\", u.JobName)\n\tpopulate(objectMap, \"jobSecrets\", u.JobSecrets)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "5879b29c4456a3d1d872a3a56e5c2ce6", "score": "0.61895496", "text": "func (i IdentityProviderCreateContractProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ti.IdentityProviderBaseParameters.marshalInternal(objectMap)\n\tpopulate(objectMap, \"clientId\", i.ClientID)\n\tpopulate(objectMap, \"clientSecret\", i.ClientSecret)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "60d442f553e8006e677bf0940596758c", "score": "0.6189051", "text": "func (a APIManagementServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", a.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", a.TenantID)\n\tpopulate(objectMap, \"type\", a.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", a.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "815a8d70429a5b3db55e7e5556bc7304", "score": "0.6174048", "text": "func (r ResourceProviderManifestPropertiesProviderAuthentication) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"allowedAudiences\", r.AllowedAudiences)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "bcd31f0addffb2baaa4667934aff6f77", "score": "0.61656445", "text": "func (g GuestAgentProfile) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"agentVersion\", g.AgentVersion)\n\tpopulate(objectMap, \"errorDetails\", g.ErrorDetails)\n\tpopulateTimeRFC3339(objectMap, \"lastStatusChange\", g.LastStatusChange)\n\tpopulate(objectMap, \"status\", g.Status)\n\tpopulate(objectMap, \"vmUuid\", g.VMUUID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "4a5069a4c24790dacb12b64b587eab37", "score": "0.61616325", "text": "func (s SessionHost) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", s.ID)\n\tpopulate(objectMap, \"name\", s.Name)\n\tpopulate(objectMap, \"properties\", s.Properties)\n\tpopulate(objectMap, \"systemData\", s.SystemData)\n\tpopulate(objectMap, \"type\", s.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "6f99ea903dda439412c101effca4622f", "score": "0.61469936", "text": "func (g GrantDetails) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", g.ID)\n\tpopulate(objectMap, \"name\", g.Name)\n\tpopulate(objectMap, \"properties\", g.Properties)\n\tpopulate(objectMap, \"systemData\", g.SystemData)\n\tpopulate(objectMap, \"type\", g.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "440ac96de3450902bec6a4fcebbeb300", "score": "0.6142336", "text": "func (m MetadataProviderAuthentication) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"allowedAudiences\", m.AllowedAudiences)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "b8ac6d44f8638105d2859c3ea948aa6d", "score": "0.61306995", "text": "func (v UserInputPassword) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjson9e1087fdEncodeGithubComGoParkMailRu20202ExtraSafeInternalModels6(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "6a7c48a07b625965bd12be3bb0d0ef09", "score": "0.6125129", "text": "func (u User) MarshalJSON() ([]byte, error) {\n\ttype PublicUser User\n\tp := PublicUser(u)\n\tp.Password = \"\"\n\n\tif !p.Details {\n\t\tp.Memo = \"\"\n\t}\n\n\treturn json.Marshal(p)\n}", "title": "" }, { "docid": "7c44747ca5c1e8e2d80107dc79ee08a7", "score": "0.6102748", "text": "func (c CloudServiceOsProfile) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"secrets\", c.Secrets)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "df5debd50183b348006f7394f1978492", "score": "0.60922587", "text": "func (h HeavySecret) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"accountCredentialDetails\", h.AccountCredentialDetails)\n\tpopulate(objectMap, \"devicePassword\", h.DevicePassword)\n\tpopulate(objectMap, \"deviceSerialNumber\", h.DeviceSerialNumber)\n\tpopulate(objectMap, \"encodedValidationCertPubKey\", h.EncodedValidationCertPubKey)\n\tpopulate(objectMap, \"networkConfigurations\", h.NetworkConfigurations)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "72df6bda2daa595ce7d2ebbed0f0997e", "score": "0.6091469", "text": "func (r ResourceProviderManifestProviderAuthentication) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"allowedAudiences\", r.AllowedAudiences)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "619474adc7860a90b096ae80e79b5e70", "score": "0.6082981", "text": "func (self *secretAgent) MarshalJSON() ([]byte, error) {\n\tpublicInfo := struct {\n\t\tName string\n\t\tFakeName string\n\t\tNationality string\n\t}{self.FakeName, self.Name, randomPick()}\n\treturn json.Marshal(&publicInfo)\n}", "title": "" }, { "docid": "d66bb90dd998b17f5ee331081428f0aa", "score": "0.6078608", "text": "func (u UserIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"clientId\", u.ClientID)\n\tpopulate(objectMap, \"principalId\", u.PrincipalID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "db9f46e27491f65e502d7ee8b6d80bed", "score": "0.6039157", "text": "func (u *User) MarshalJSON() ([]byte, error) {\n\tvar bob = strings.Builder{}\n\tbob.WriteString(`{`)\n\tbob.WriteString(fmt.Sprintf(`\"username\": \"%s\",`, u.UserName))\n\tbob.WriteString(fmt.Sprintf(`\"realname\": \"%s\",`, u.RealName))\n\tbob.WriteString(fmt.Sprintf(`\"password\": \"%s\",`, base64.StdEncoding.EncodeToString(u.Password[:])))\n\tbob.WriteString(fmt.Sprintf(`\"privileges\": \"%s\"`, u.Privileges.String()))\n\n\tbob.WriteString(`}`)\n\treturn []byte(bob.String()), nil\n}", "title": "" }, { "docid": "4c91d92a8ddeb5eaf243c4f46cca797a", "score": "0.6038203", "text": "func (s SessionHostPatchProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"allowNewSession\", s.AllowNewSession)\n\tpopulate(objectMap, \"assignedUser\", s.AssignedUser)\n\tpopulate(objectMap, \"friendlyName\", s.FriendlyName)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "ad6c00ae886b42c8c2d183c3531672a1", "score": "0.601287", "text": "func (u UserContractProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tu.UserEntityBaseParameters.marshalInternal(objectMap)\n\tpopulate(objectMap, \"email\", u.Email)\n\tpopulate(objectMap, \"firstName\", u.FirstName)\n\tpopulate(objectMap, \"groups\", u.Groups)\n\tpopulate(objectMap, \"lastName\", u.LastName)\n\tpopulateTimeRFC3339(objectMap, \"registrationDate\", u.RegistrationDate)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "f6e4c67ee3d3059c138ac30d3fe26a1b", "score": "0.60117036", "text": "func (a AuthorizationServerContractProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ta.AuthorizationServerContractBaseProperties.marshalInternal(objectMap)\n\tpopulate(objectMap, \"authorizationEndpoint\", a.AuthorizationEndpoint)\n\tpopulate(objectMap, \"clientId\", a.ClientID)\n\tpopulate(objectMap, \"clientRegistrationEndpoint\", a.ClientRegistrationEndpoint)\n\tpopulate(objectMap, \"clientSecret\", a.ClientSecret)\n\tpopulate(objectMap, \"displayName\", a.DisplayName)\n\tpopulate(objectMap, \"grantTypes\", a.GrantTypes)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "519f82a5bb026cbc537808a5fb80221f", "score": "0.6006961", "text": "func (r AWSIAMUser) MarshalJSON() ([]byte, error) {\n\ttype Properties AWSIAMUser\n\treturn json.Marshal(&struct {\n\t\tType string\n\t\tProperties Properties\n\t\tDependsOn []string `json:\"DependsOn,omitempty\"`\n\t\tMetadata map[string]interface{} `json:\"Metadata,omitempty\"`\n\t\tDeletionPolicy DeletionPolicy `json:\"DeletionPolicy,omitempty\"`\n\t}{\n\t\tType: r.AWSCloudFormationType(),\n\t\tProperties: (Properties)(r),\n\t\tDependsOn: r._dependsOn,\n\t\tMetadata: r._metadata,\n\t\tDeletionPolicy: r._deletionPolicy,\n\t})\n}", "title": "" }, { "docid": "231a8119ec96e1812c8a8d33c7196f21", "score": "0.59841996", "text": "func (m CredentialV4Request) MarshalJSON() ([]byte, error) {\n\t_parts := make([][]byte, 0, 2)\n\n\taO0, err := swag.WriteJSON(m.CredentialV4Base)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t_parts = append(_parts, aO0)\n\n\tvar dataAO1 struct {\n\t\tAzure *AzureCredentialV4RequestParameters `json:\"azure,omitempty\"`\n\t}\n\n\tdataAO1.Azure = m.Azure\n\n\tjsonDataAO1, errAO1 := swag.WriteJSON(dataAO1)\n\tif errAO1 != nil {\n\t\treturn nil, errAO1\n\t}\n\t_parts = append(_parts, jsonDataAO1)\n\n\treturn swag.ConcatJSON(_parts...), nil\n}", "title": "" }, { "docid": "1507352636728002a1b6fb0e96b1072a", "score": "0.59719926", "text": "func (s SessionHostPatch) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", s.ID)\n\tpopulate(objectMap, \"name\", s.Name)\n\tpopulate(objectMap, \"properties\", s.Properties)\n\tpopulate(objectMap, \"type\", s.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c180c82d38f57191f7d1bbc58da3c3fa", "score": "0.597054", "text": "func (m ManagedServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "dbbf68b6a2d3ad4fb9288b103de9e03a", "score": "0.59654456", "text": "func (f FunctionSecrets) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", f.ID)\n\tpopulate(objectMap, \"kind\", f.Kind)\n\tpopulate(objectMap, \"name\", f.Name)\n\tpopulate(objectMap, \"properties\", f.Properties)\n\tpopulate(objectMap, \"type\", f.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a4b178eac6b4317dc5200b6570ee8692", "score": "0.59645015", "text": "func (c Ciphertext) MarshalJSON() ([]byte, error) {\n\treturn json.Marshal([]byte(c))\n}", "title": "" }, { "docid": "c7a9859abf6331b51c8795c61ab29ff1", "score": "0.5958071", "text": "func (o *InstanceSecretsLocks) MarshalJSON() (buffer []byte, err error) {\n\tm := make(map[string]interface{})\n\tif len(o.additionalProperties) > 0 {\n\t\tfor k, v := range o.additionalProperties {\n\t\t\tm[k] = v\n\t\t}\n\t}\n\tif o.SecretID != nil {\n\t\tm[\"secret_id\"] = o.SecretID\n\t}\n\tif o.SecretGroupID != nil {\n\t\tm[\"secret_group_id\"] = o.SecretGroupID\n\t}\n\tif o.SecretType != nil {\n\t\tm[\"secret_type\"] = o.SecretType\n\t}\n\tif o.Versions != nil {\n\t\tm[\"versions\"] = o.Versions\n\t}\n\tbuffer, err = json.Marshal(m)\n\treturn\n}", "title": "" }, { "docid": "2e5fd4109b38f296dfb46e446e5abf6b", "score": "0.59548324", "text": "func (m ManagedServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", m.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2e5fd4109b38f296dfb46e446e5abf6b", "score": "0.59548324", "text": "func (m ManagedServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", m.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9a35741574b8c1c31fddecdaefe9b826", "score": "0.5943645", "text": "func (m ManagedServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", m.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9a35741574b8c1c31fddecdaefe9b826", "score": "0.5943645", "text": "func (m ManagedServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", m.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "6b93e16fd98c86d3b4064d08af4e62e1", "score": "0.5931922", "text": "func (a Secrets) MarshalJSON() ([]byte, error) {\n\tvar err error\n\tobject := make(map[string]json.RawMessage)\n\n\tfor fieldName, field := range a.AdditionalProperties {\n\t\tobject[fieldName], err = json.Marshal(field)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"error marshaling '%s'\", fieldName))\n\t\t}\n\t}\n\treturn json.Marshal(object)\n}", "title": "" }, { "docid": "6845919cd79831047d85683a845ec740", "score": "0.5930161", "text": "func (o *SecretLockVersion) MarshalJSON() (buffer []byte, err error) {\n\tm := make(map[string]interface{})\n\tif len(o.additionalProperties) > 0 {\n\t\tfor k, v := range o.additionalProperties {\n\t\t\tm[k] = v\n\t\t}\n\t}\n\tif o.ID != nil {\n\t\tm[\"id\"] = o.ID\n\t}\n\tif o.Alias != nil {\n\t\tm[\"alias\"] = o.Alias\n\t}\n\tif o.Locks != nil {\n\t\tm[\"locks\"] = o.Locks\n\t}\n\tif o.PayloadAvailable != nil {\n\t\tm[\"payload_available\"] = o.PayloadAvailable\n\t}\n\tbuffer, err = json.Marshal(m)\n\treturn\n}", "title": "" }, { "docid": "f250df3d8d186f5c47a3ffefab0b97d1", "score": "0.5928756", "text": "func (r ResourceProviderAuthentication) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"allowedAudiences\", r.AllowedAudiences)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c8c25f18024c8f8e4bdd95a0d8778f6d", "score": "0.5928748", "text": "func (d DataEncryption) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"geoBackupKeyURI\", d.GeoBackupKeyURI)\n\tpopulate(objectMap, \"geoBackupUserAssignedIdentityId\", d.GeoBackupUserAssignedIdentityID)\n\tpopulate(objectMap, \"primaryKeyURI\", d.PrimaryKeyURI)\n\tpopulate(objectMap, \"primaryUserAssignedIdentityId\", d.PrimaryUserAssignedIdentityID)\n\tpopulate(objectMap, \"type\", d.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "4dde9216f234f2d842eefe34079dc300", "score": "0.59160155", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tpopulate(objectMap, \"type\", i.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "4040c4eb407e6e0b1e676d7d3b20ae56", "score": "0.59152627", "text": "func (h Hidden) MarshalJSON() ([]byte, error) {\n\ttype hidden Hidden\n\thh := hidden(h)\n\thh.Password = \"hidden\"\n\treturn json.Marshal(((*hidden)(&hh)))\n}", "title": "" }, { "docid": "b331d0279c040fc88f629836b1bc1709", "score": "0.59097326", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tobjectMap[\"type\"] = \"SystemAssigned\"\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "b331d0279c040fc88f629836b1bc1709", "score": "0.59097326", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tobjectMap[\"type\"] = \"SystemAssigned\"\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "b331d0279c040fc88f629836b1bc1709", "score": "0.59097326", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tobjectMap[\"type\"] = \"SystemAssigned\"\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "12c381fad15e45beaa43043c3f857c6c", "score": "0.59047896", "text": "func (k KeyVaultProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"identityClientId\", k.IdentityClientID)\n\tpopulate(objectMap, \"keyIdentifier\", k.KeyIdentifier)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "d24b9185691792c35013b38f8fa37ae1", "score": "0.59045255", "text": "func (l LightHouseAuthorization) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", l.PrincipalID)\n\tpopulate(objectMap, \"roleDefinitionId\", l.RoleDefinitionID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "a0c364ac4207ffb1f07ada1f734dcd48", "score": "0.58951956", "text": "func (s Secret) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"id\", s.ID)\n\tpopulate(objectMap, \"location\", s.Location)\n\tpopulate(objectMap, \"name\", s.Name)\n\tpopulate(objectMap, \"properties\", s.Properties)\n\tpopulate(objectMap, \"tags\", s.Tags)\n\tpopulate(objectMap, \"type\", s.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "08e725291b84594fff8446aad0a969a8", "score": "0.58948344", "text": "func (o MicrosoftGraphPasswordProfile) MarshalJSON() ([]byte, error) {\n\ttoSerialize := map[string]interface{}{}\n\tif o.Password == nil {\n\t\tif o.isExplicitNullPassword {\n\t\t\ttoSerialize[\"password\"] = o.Password\n\t\t}\n\t} else {\n\t\ttoSerialize[\"password\"] = o.Password\n\t}\n\tif o.ForceChangePasswordNextSignIn == nil {\n\t\tif o.isExplicitNullForceChangePasswordNextSignIn {\n\t\t\ttoSerialize[\"forceChangePasswordNextSignIn\"] = o.ForceChangePasswordNextSignIn\n\t\t}\n\t} else {\n\t\ttoSerialize[\"forceChangePasswordNextSignIn\"] = o.ForceChangePasswordNextSignIn\n\t}\n\tif o.ForceChangePasswordNextSignInWithMfa == nil {\n\t\tif o.isExplicitNullForceChangePasswordNextSignInWithMfa {\n\t\t\ttoSerialize[\"forceChangePasswordNextSignInWithMfa\"] = o.ForceChangePasswordNextSignInWithMfa\n\t\t}\n\t} else {\n\t\ttoSerialize[\"forceChangePasswordNextSignInWithMfa\"] = o.ForceChangePasswordNextSignInWithMfa\n\t}\n\treturn json.Marshal(toSerialize)\n}", "title": "" }, { "docid": "ee1278cd3b1eaf28831f32e6e0fc064a", "score": "0.58634144", "text": "func (e EncryptionScopeKeyVaultProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"keyUri\", e.KeyURI)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "0a399b92a99d419096276577aba88806", "score": "0.5862308", "text": "func (ss SecureString) MarshalJSON() ([]byte, error) {\n\tss.Type = TypeSecureString\n\ttype Alias SecureString\n\treturn json.Marshal(&struct {\n\t\tAlias\n\t}{\n\t\tAlias: (Alias)(ss),\n\t})\n}", "title": "" }, { "docid": "a4f280a9f2c9b4823bbba92a8921a082", "score": "0.5857294", "text": "func (o *SecretsLocks) MarshalJSON() (buffer []byte, err error) {\n\tm := make(map[string]interface{})\n\tif len(o.additionalProperties) > 0 {\n\t\tfor k, v := range o.additionalProperties {\n\t\t\tm[k] = v\n\t\t}\n\t}\n\tif o.SecretID != nil {\n\t\tm[\"secret_id\"] = o.SecretID\n\t}\n\tif o.SecretGroupID != nil {\n\t\tm[\"secret_group_id\"] = o.SecretGroupID\n\t}\n\tif o.Versions != nil {\n\t\tm[\"versions\"] = o.Versions\n\t}\n\tbuffer, err = json.Marshal(m)\n\treturn\n}", "title": "" }, { "docid": "1cbcb1b2469090527d936bea46a6e85f", "score": "0.5848917", "text": "func (i IdentityProviderContract) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ti.Resource.marshalInternal(objectMap)\n\tpopulate(objectMap, \"properties\", i.Properties)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "3644691b135ca71a8d95b547da92b348", "score": "0.5837749", "text": "func (g GuestAgentList) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", g.NextLink)\n\tpopulate(objectMap, \"value\", g.Value)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "e03a7dc389e1c43a7e911d8cf96f8db5", "score": "0.58312625", "text": "func (f FunctionSecretsProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"key\", f.Key)\n\tpopulate(objectMap, \"trigger_url\", f.TriggerURL)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "3f5b46d50a560a699ea59df47a101bd2", "score": "0.58279413", "text": "func (a PkgApply_Secrets) MarshalJSON() ([]byte, error) {\n\tvar err error\n\tobject := make(map[string]json.RawMessage)\n\n\tfor fieldName, field := range a.AdditionalProperties {\n\t\tobject[fieldName], err = json.Marshal(field)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\"error marshaling '%s'\", fieldName))\n\t\t}\n\t}\n\treturn json.Marshal(object)\n}", "title": "" }, { "docid": "2b4ea6d7da5b8d60df1d42eac3127937", "score": "0.58249706", "text": "func (m MediaServiceIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", m.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", m.TenantID)\n\tpopulate(objectMap, \"type\", m.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", m.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "33ce2e8f13dd73378b0e6544e4736292", "score": "0.582449", "text": "func (v VirtualMachineScaleSetIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", v.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", v.TenantID)\n\tpopulate(objectMap, \"type\", v.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", v.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2e419fa3ca71eda1b582f4ec6f30c9de", "score": "0.5823244", "text": "func (e EncryptionProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"keyVaultProperties\", e.KeyVaultProperties)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "410199a19856e65db6c3202900577915", "score": "0.58210415", "text": "func (i IdentityProviderCreateContract) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ti.Resource.marshalInternal(objectMap)\n\tpopulate(objectMap, \"properties\", i.Properties)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "7ca645682ed6eb4524901d59728c5c76", "score": "0.58197504", "text": "func (g *GuestCredential) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", g, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"password\":\n\t\t\terr = unpopulate(val, \"Password\", &g.Password)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"username\":\n\t\t\terr = unpopulate(val, \"Username\", &g.Username)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", g, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3c6d3ee2218edd11f44bd8202740130b", "score": "0.581655", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tpopulate(objectMap, \"type\", i.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", i.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9c9c107a21adcccf58d2e6e4a2692413", "score": "0.581115", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tpopulate(objectMap, \"type\", i.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", i.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "9c9c107a21adcccf58d2e6e4a2692413", "score": "0.581115", "text": "func (i Identity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"principalId\", i.PrincipalID)\n\tpopulate(objectMap, \"tenantId\", i.TenantID)\n\tpopulate(objectMap, \"type\", i.Type)\n\tpopulate(objectMap, \"userAssignedIdentities\", i.UserAssignedIdentities)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "29b5b2f08af1dacbff9e579015be84d5", "score": "0.58015054", "text": "func (a AuthorizationServerContract) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\ta.Resource.marshalInternal(objectMap)\n\tpopulate(objectMap, \"properties\", a.Properties)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2ca53707638e2fad9e855cbe109efe69", "score": "0.57994586", "text": "func (digest Digest) MarshalJSON() ([]byte, error) {\n\tsize := 2 + base64.StdEncoding.EncodedLen(len(digest))\n\tbuffer := make([]byte, size)\n\tbuffer[0] = '\"'\n\tbuffer[size-1] = '\"'\n\tbase64.StdEncoding.Encode(buffer[1:], digest[:])\n\treturn buffer, nil\n}", "title": "" }, { "docid": "18bb0104c61862e8afd80b7fab69f54a", "score": "0.57976437", "text": "func (n NamedValueCreateContractProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tn.NamedValueEntityBaseParameters.marshalInternal(objectMap)\n\tpopulate(objectMap, \"displayName\", n.DisplayName)\n\tpopulate(objectMap, \"keyVault\", n.KeyVault)\n\tpopulate(objectMap, \"value\", n.Value)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "b885223c4fe80a215322394273adf1ee", "score": "0.579055", "text": "func (p Protected) MarshalJSON() ([]byte, error) {\n\tb, err := json.Marshal(map[string]interface{}(p))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn EncodeEscape(b), nil\n}", "title": "" }, { "docid": "b242050cb3c9bc709884c88c29ba4c4b", "score": "0.57858074", "text": "func (miep ManagedInstanceEncryptionProtector) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif miep.Kind != nil {\n\t\tobjectMap[\"kind\"] = miep.Kind\n\t}\n\tif miep.ManagedInstanceEncryptionProtectorProperties != nil {\n\t\tobjectMap[\"properties\"] = miep.ManagedInstanceEncryptionProtectorProperties\n\t}\n\tif miep.ID != nil {\n\t\tobjectMap[\"id\"] = miep.ID\n\t}\n\tif miep.Name != nil {\n\t\tobjectMap[\"name\"] = miep.Name\n\t}\n\tif miep.Type != nil {\n\t\tobjectMap[\"type\"] = miep.Type\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2cb6d890ed1d4e907a5ad10612d92c90", "score": "0.5785579", "text": "func (c CreateDataLakeStoreAccountParameters) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"identity\", c.Identity)\n\tpopulate(objectMap, \"location\", c.Location)\n\tpopulate(objectMap, \"properties\", c.Properties)\n\tpopulate(objectMap, \"tags\", c.Tags)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "8ac45509c4a8fbe0df2b241d3c1921e3", "score": "0.57837594", "text": "func (c *ClientAuthLogin) JSON() ([]byte, error) {\n\treturn json.Marshal(c)\n}", "title": "" }, { "docid": "99c7aab74845c63e440a6402af3d3bb6", "score": "0.57820493", "text": "func (r RecipientUserContract) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tr.Resource.marshalInternal(objectMap)\n\tpopulate(objectMap, \"properties\", r.Properties)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "ec1b1ed70df7cc060e8003db2a438ae1", "score": "0.5775153", "text": "func (p ProviderRegistration) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", p.ID)\n\tpopulate(objectMap, \"name\", p.Name)\n\tpopulate(objectMap, \"properties\", p.Properties)\n\tpopulate(objectMap, \"type\", p.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "6a61ed948b512aefc0b657ec1cabfca2", "score": "0.57751393", "text": "func (h HostKeys) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"functionKeys\", h.FunctionKeys)\n\tpopulate(objectMap, \"masterKey\", h.MasterKey)\n\tpopulate(objectMap, \"systemKeys\", h.SystemKeys)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "60ce6bc8013f0fbd28737586f4ac5768", "score": "0.57677656", "text": "func (h HostingEnvironmentProfile) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"id\", h.ID)\n\tpopulate(objectMap, \"name\", h.Name)\n\tpopulate(objectMap, \"type\", h.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "01d16baff9b36de978f9c768748827e9", "score": "0.5767554", "text": "func (u UserCreateParameterProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tu.UserEntityBaseParameters.marshalInternal(objectMap)\n\tpopulate(objectMap, \"appType\", u.AppType)\n\tpopulate(objectMap, \"confirmation\", u.Confirmation)\n\tpopulate(objectMap, \"email\", u.Email)\n\tpopulate(objectMap, \"firstName\", u.FirstName)\n\tpopulate(objectMap, \"lastName\", u.LastName)\n\tpopulate(objectMap, \"password\", u.Password)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2a514149308a55b06f6a936e3437a1f7", "score": "0.5761094", "text": "func (cs *CryptString) MarshalJSON() ([]byte, error) {\n\tencString, err := Encrypt(cs.String)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn json.Marshal(encString)\n}", "title": "" }, { "docid": "089d0e20e2e637354b0ce498aa1c898c", "score": "0.5757005", "text": "func (s SessionHostProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"agentVersion\", s.AgentVersion)\n\tpopulate(objectMap, \"allowNewSession\", s.AllowNewSession)\n\tpopulate(objectMap, \"assignedUser\", s.AssignedUser)\n\tpopulate(objectMap, \"friendlyName\", s.FriendlyName)\n\tpopulateTimeRFC3339(objectMap, \"lastHeartBeat\", s.LastHeartBeat)\n\tpopulateTimeRFC3339(objectMap, \"lastUpdateTime\", s.LastUpdateTime)\n\tpopulate(objectMap, \"osVersion\", s.OSVersion)\n\tpopulate(objectMap, \"objectId\", s.ObjectID)\n\tpopulate(objectMap, \"resourceId\", s.ResourceID)\n\tpopulate(objectMap, \"sessionHostHealthCheckResults\", s.SessionHostHealthCheckResults)\n\tpopulate(objectMap, \"sessions\", s.Sessions)\n\tpopulate(objectMap, \"status\", s.Status)\n\tpopulateTimeRFC3339(objectMap, \"statusTimestamp\", s.StatusTimestamp)\n\tpopulate(objectMap, \"sxSStackVersion\", s.SxSStackVersion)\n\tpopulate(objectMap, \"updateErrorMessage\", s.UpdateErrorMessage)\n\tpopulate(objectMap, \"updateState\", s.UpdateState)\n\tpopulate(objectMap, \"virtualMachineId\", s.VirtualMachineID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "7d9d0e52bff5954d1533a4215d5e8e9a", "score": "0.57550126", "text": "func (u UserAssignedIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"clientId\", u.ClientID)\n\tpopulate(objectMap, \"principalId\", u.PrincipalID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "7d9d0e52bff5954d1533a4215d5e8e9a", "score": "0.57550126", "text": "func (u UserAssignedIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"clientId\", u.ClientID)\n\tpopulate(objectMap, \"principalId\", u.PrincipalID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "7d9d0e52bff5954d1533a4215d5e8e9a", "score": "0.57550126", "text": "func (u UserAssignedIdentity) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"clientId\", u.ClientID)\n\tpopulate(objectMap, \"principalId\", u.PrincipalID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "64a3f469118ffdb38277a1ac34354448", "score": "0.57537913", "text": "func (e Encryption) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"keySource\", e.KeySource)\n\tpopulate(objectMap, \"keyvaultproperties\", e.KeyVaultProperties)\n\tpopulate(objectMap, \"requireInfrastructureEncryption\", e.RequireInfrastructureEncryption)\n\tpopulate(objectMap, \"services\", e.Services)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c151643deaab28d67e4c01f85980f320", "score": "0.57517", "text": "func (v Login) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjsonD2b7633eEncodeGithubComArkadiycheHttpRestApiInternalPkgModels11(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "57a4ea582607b802b7f876443b9e7632", "score": "0.5750546", "text": "func (epp EncryptionProtectorProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tif epp.ServerKeyName != nil {\n\t\tobjectMap[\"serverKeyName\"] = epp.ServerKeyName\n\t}\n\tif epp.ServerKeyType != \"\" {\n\t\tobjectMap[\"serverKeyType\"] = epp.ServerKeyType\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "e9425cad7f7d52bc955e6dac03ba15a2", "score": "0.5747169", "text": "func (this *MeshServiceSpec_Federation) MarshalJSON() ([]byte, error) {\n\tstr, err := MeshServiceMarshaler.MarshalToString(this)\n\treturn []byte(str), err\n}", "title": "" }, { "docid": "338cd13340aab096a2e6f5741fe87cd8", "score": "0.5730107", "text": "func (m MetadataThirdPartyProviderAuthorization) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"authorizations\", m.Authorizations)\n\tpopulate(objectMap, \"managedByTenantId\", m.ManagedByTenantID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "138fa270b5fa274feb936acb72f8f52c", "score": "0.5727655", "text": "func (ss SecureString) MarshalJSON() ([]byte, error) {\n\tss.Type = TypeBasicSecretBaseTypeSecureString\n\tobjectMap := make(map[string]interface{})\n\tif ss.Value != nil {\n\t\tobjectMap[\"value\"] = ss.Value\n\t}\n\tif ss.Type != \"\" {\n\t\tobjectMap[\"type\"] = ss.Type\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "94f8a1717788925baa5dd600710527dd", "score": "0.5722795", "text": "func (h HybridIdentityMetadataProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"identity\", h.Identity)\n\tpopulate(objectMap, \"provisioningState\", h.ProvisioningState)\n\tpopulate(objectMap, \"publicKey\", h.PublicKey)\n\tpopulate(objectMap, \"vmId\", h.VMID)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c7efcaef461b00579e669dcaaf6f67a0", "score": "0.57211953", "text": "func (v GoogleNow_CheckCredentials_Args) MarshalJSON() ([]byte, error) {\n\tw := jwriter.Writer{}\n\teasyjson50713e80EncodeGithubComUberZanzibarExamplesExampleGatewayBuildGenCodeEndpointsGooglenowGooglenowGoogleNowCheckCredentials1(&w, v)\n\treturn w.Buffer.BuildBytes(), w.Error\n}", "title": "" }, { "docid": "0783bd9ac3e17fe091e1d882668771ea", "score": "0.5720272", "text": "func (s SessionHostList) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]any)\n\tpopulate(objectMap, \"nextLink\", s.NextLink)\n\tpopulate(objectMap, \"value\", s.Value)\n\treturn json.Marshal(objectMap)\n}", "title": "" } ]
d3bd5e3b6af2d29dbd7681aa44079b05
AddLikedUserIDs adds the "liked_users" edge to the User entity by ids.
[ { "docid": "de19fa1ca22a43b6d936a850421b4aaf", "score": "0.82983845", "text": "func (m *TweetMutation) AddLikedUserIDs(ids ...int) {\n\tif m.liked_users == nil {\n\t\tm.liked_users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.liked_users[ids[i]] = struct{}{}\n\t}\n}", "title": "" } ]
[ { "docid": "d864b00a055253a7ab958aeefc995499", "score": "0.7368691", "text": "func (m *UserMutation) AddLikedTweetIDs(ids ...int) {\n\tif m.liked_tweets == nil {\n\t\tm.liked_tweets = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.liked_tweets[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "a28108ad655f00b9ca732f835e83980b", "score": "0.69492036", "text": "func (m *TweetMutation) LikedUsersIDs() (ids []int) {\n\tfor id := range m.liked_users {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "785de5c0bb8c791a3bddf873907dbaaa", "score": "0.69307053", "text": "func (pu *PostUpdate) AddLikes(u ...*User) *PostUpdate {\n\tids := make([]int, len(u))\n\tfor i := range u {\n\t\tids[i] = u[i].ID\n\t}\n\treturn pu.AddLikeIDs(ids...)\n}", "title": "" }, { "docid": "066fffd6ff15b6f1902332eed268ba65", "score": "0.6727575", "text": "func (puo *PostUpdateOne) AddLikes(u ...*User) *PostUpdateOne {\n\tids := make([]int, len(u))\n\tfor i := range u {\n\t\tids[i] = u[i].ID\n\t}\n\treturn puo.AddLikeIDs(ids...)\n}", "title": "" }, { "docid": "b1effd47083c7c28b344effd66d594f5", "score": "0.64816254", "text": "func (m *TweetMutation) RemoveLikedUserIDs(ids ...int) {\n\tif m.removedliked_users == nil {\n\t\tm.removedliked_users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.liked_users, ids[i])\n\t\tm.removedliked_users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "8221ed2b796ce4b71a89bb31cb510bd8", "score": "0.6305266", "text": "func (m *GroupMutation) AddJoinedUserIDs(ids ...int) {\n\tif m.joined_users == nil {\n\t\tm.joined_users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.joined_users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "da0d9fbdf1073a6b66fdac6232831f7d", "score": "0.6194317", "text": "func (c *TweetClient) QueryLikedUsers(t *Tweet) *UserQuery {\n\tquery := (&UserClient{config: c.config}).Query()\n\tquery.path = func(context.Context) (fromV *sql.Selector, _ error) {\n\t\tid := t.ID\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(tweet.Table, tweet.FieldID, id),\n\t\t\tsqlgraph.To(user.Table, user.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2M, true, tweet.LikedUsersTable, tweet.LikedUsersPrimaryKey...),\n\t\t)\n\t\tfromV = sqlgraph.Neighbors(t.driver.Dialect(), step)\n\t\treturn fromV, nil\n\t}\n\treturn query\n}", "title": "" }, { "docid": "28e2d42825fe8c838a80b030069756d5", "score": "0.607777", "text": "func (m *TweetMutation) AddUserIDs(ids ...int) {\n\tif m.user == nil {\n\t\tm.user = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.user[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "2525dc71d3bf3b180c022460bc35ee75", "score": "0.6012491", "text": "func (m *TweetMutation) RemovedLikedUsersIDs() (ids []int) {\n\tfor id := range m.removedliked_users {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "8ca153cfa90c4edd671b5d5892d34761", "score": "0.60060173", "text": "func (m *GenderMutation) AddUserIDs(ids ...int) {\n\tif m.users == nil {\n\t\tm.users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "82c171cab972176caca072ccde94bd20", "score": "0.5997731", "text": "func (m *RoleMutation) AddUserIDs(ids ...int) {\n\tif m.user == nil {\n\t\tm.user = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.user[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "22ebf1276a19f82612f9cb7d41dc5a58", "score": "0.59013045", "text": "func (m *TeamMutation) AddUserIDs(ids ...int) {\n\tif m.users == nil {\n\t\tm.users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "d275d7a30c1f28b58c3956635021cd40", "score": "0.58402973", "text": "func (m *GroupMutation) AddUserIDs(ids ...int) {\n\tif m.users == nil {\n\t\tm.users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "fb9acd78d417011155a350efc5e9cfbb", "score": "0.57855546", "text": "func (m *UserstatusMutation) AddUserIDs(ids ...int) {\n\tif m.user == nil {\n\t\tm.user = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.user[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "4d7577e70208753a7e4361f8a66aefce", "score": "0.5738341", "text": "func (m *ProjectMutation) AddUserIDs(ids ...int) {\n\tif m.users == nil {\n\t\tm.users = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.users[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "0a652ff2ffb30ad170058f8ab6f57b41", "score": "0.5713616", "text": "func (m *UserMutation) AddUserTweetIDs(ids ...int) {\n\tif m.user_tweets == nil {\n\t\tm.user_tweets = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.user_tweets[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "de945c8d8b9cadf7ebc922d29002320d", "score": "0.57013273", "text": "func (mu *MachineUpdate) AddUserIDs(ids ...int) *MachineUpdate {\n\tmu.mutation.AddUserIDs(ids...)\n\treturn mu\n}", "title": "" }, { "docid": "d5c93d12778c5aecbc89ade608df585f", "score": "0.5699019", "text": "func (m *TweetMutation) AddTweetUserIDs(ids ...int) {\n\tif m.tweet_user == nil {\n\t\tm.tweet_user = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.tweet_user[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "0510424bfa01b7e510d9797577592a6c", "score": "0.5688865", "text": "func (m *GroupMutation) JoinedUsersIDs() (ids []int) {\n\tfor id := range m.joined_users {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "67cbefecfd852101872ec6dd0207f9e6", "score": "0.5682342", "text": "func (m *UserMutation) LikedTweetsIDs() (ids []int) {\n\tfor id := range m.liked_tweets {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "503e00e8f7a2138b374f1ee79eb50f87", "score": "0.5664484", "text": "func (b *UserMutationBuilder) AddFriendIDs(userIDs ...string) *UserMutationBuilder {\n\tfor _, userID := range userIDs {\n\t\tb.AddFriendID(userID)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "3aa3b5ad17a7c8faa03b1849df80789e", "score": "0.56371284", "text": "func (m *RoleMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase role.EdgeUser:\n\t\tids := make([]ent.Value, 0, len(m.user))\n\t\tfor id := range m.user {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "18721c533fc62ef747268629a32f397b", "score": "0.56340337", "text": "func (m *UserstatusMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase userstatus.EdgeUser:\n\t\tids := make([]ent.Value, 0, len(m.user))\n\t\tfor id := range m.user {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "afe5c7becf51a1cb76a3db2a76db146e", "score": "0.56285685", "text": "func (m *ProfileMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase profile.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0f976e2c4dfba7b54e198fd4d897e5a1", "score": "0.56190467", "text": "func (rc *RoleCreate) AddUserIDs(ids ...string) *RoleCreate {\n\trc.mutation.AddUserIDs(ids...)\n\treturn rc\n}", "title": "" }, { "docid": "1e24eac5506d60e1e13e770e354471c6", "score": "0.56152666", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeBooks:\n\t\tids := make([]ent.Value, 0, len(m.books))\n\t\tfor id := range m.books {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f82d83ce6a5afc8df75637a5df6cbe7", "score": "0.55607486", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeFollowers:\n\t\tids := make([]ent.Value, 0, len(m.followers))\n\t\tfor id := range m.followers {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeFollowing:\n\t\tids := make([]ent.Value, 0, len(m.following))\n\t\tfor id := range m.following {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgePrograms:\n\t\tids := make([]ent.Value, 0, len(m.programs))\n\t\tfor id := range m.programs {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeTweets:\n\t\tids := make([]ent.Value, 0, len(m.tweets))\n\t\tfor id := range m.tweets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "06b668b1609e681c55d16deee6761e16", "score": "0.5556314", "text": "func (pu *PostUpdate) RemoveLikes(u ...*User) *PostUpdate {\n\tids := make([]int, len(u))\n\tfor i := range u {\n\t\tids[i] = u[i].ID\n\t}\n\treturn pu.RemoveLikeIDs(ids...)\n}", "title": "" }, { "docid": "3ae7a8c021aea5049cc7375ab74a2ef1", "score": "0.5547795", "text": "func (m *UserMutation) AddFollowingIDs(ids ...int) {\n\tif m.following == nil {\n\t\tm.following = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.following[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "dde7aa74312ac4b3f8585e12949d681d", "score": "0.5547319", "text": "func (m *UserMutation) AddFollowerIDs(ids ...int) {\n\tif m.followers == nil {\n\t\tm.followers = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.followers[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "249e447f0e50fccb2ba20a67a631b9e7", "score": "0.554708", "text": "func (uc *UserCreate) AddFriendIDs(ids ...int) *UserCreate {\n\tuc.mutation.AddFriendIDs(ids...)\n\treturn uc\n}", "title": "" }, { "docid": "d4805e8fc7180f418cb7823c3384438b", "score": "0.5546446", "text": "func (pu *PostUpdate) AddLikeIDs(ids ...int) *PostUpdate {\n\tpu.mutation.AddLikeIDs(ids...)\n\treturn pu\n}", "title": "" }, { "docid": "a34fabe4e44eff6ca2847df6eaa0af15", "score": "0.5512446", "text": "func (m *TweetLikeMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase tweetlike.EdgeTweet:\n\t\tif id := m.tweet; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase tweetlike.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0e1c5f3f33bf62c63d0cce429c215308", "score": "0.55066556", "text": "func (m *UserMutation) RemoveLikedTweetIDs(ids ...int) {\n\tif m.removedliked_tweets == nil {\n\t\tm.removedliked_tweets = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tdelete(m.liked_tweets, ids[i])\n\t\tm.removedliked_tweets[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "b8e30d976a04ee6b97b6b7a4a3bb011b", "score": "0.54946995", "text": "func (m *UserMutation) AddFriendIDs(ids ...int) {\n\tif m.friends == nil {\n\t\tm.friends = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.friends[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "b4b108fda71ef872080a1fa0b28bdf50", "score": "0.5487203", "text": "func (m *UserTweetMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase usertweet.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase usertweet.EdgeTweet:\n\t\tif id := m.tweet; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "68cf7885cb2d5114b4c214a56b01ceb7", "score": "0.54868144", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeGroups:\n\t\tids := make([]ent.Value, 0, len(m.groups))\n\t\tfor id := range m.groups {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeFriends:\n\t\tids := make([]ent.Value, 0, len(m.friends))\n\t\tfor id := range m.friends {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeRelatives:\n\t\tids := make([]ent.Value, 0, len(m.relatives))\n\t\tfor id := range m.relatives {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeLikedTweets:\n\t\tids := make([]ent.Value, 0, len(m.liked_tweets))\n\t\tfor id := range m.liked_tweets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeTweets:\n\t\tids := make([]ent.Value, 0, len(m.tweets))\n\t\tfor id := range m.tweets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeRoles:\n\t\tids := make([]ent.Value, 0, len(m.roles))\n\t\tfor id := range m.roles {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeJoinedGroups:\n\t\tids := make([]ent.Value, 0, len(m.joined_groups))\n\t\tfor id := range m.joined_groups {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeFriendships:\n\t\tids := make([]ent.Value, 0, len(m.friendships))\n\t\tfor id := range m.friendships {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeUserTweets:\n\t\tids := make([]ent.Value, 0, len(m.user_tweets))\n\t\tfor id := range m.user_tweets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e91d50ff719f29821728fd54f8b73644", "score": "0.54853326", "text": "func (m *TweetMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase tweet.EdgeLikedUsers:\n\t\tids := make([]ent.Value, 0, len(m.liked_users))\n\t\tfor id := range m.liked_users {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase tweet.EdgeUser:\n\t\tids := make([]ent.Value, 0, len(m.user))\n\t\tfor id := range m.user {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase tweet.EdgeTags:\n\t\tids := make([]ent.Value, 0, len(m.tags))\n\t\tfor id := range m.tags {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase tweet.EdgeTweetUser:\n\t\tids := make([]ent.Value, 0, len(m.tweet_user))\n\t\tfor id := range m.tweet_user {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase tweet.EdgeTweetTags:\n\t\tids := make([]ent.Value, 0, len(m.tweet_tags))\n\t\tfor id := range m.tweet_tags {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "342bf32f74408824a838535928598ebf", "score": "0.54838383", "text": "func (muo *MachineUpdateOne) AddUserIDs(ids ...int) *MachineUpdateOne {\n\tmuo.mutation.AddUserIDs(ids...)\n\treturn muo\n}", "title": "" }, { "docid": "50d48c24a35fd29502e0c05e4caee51e", "score": "0.54717857", "text": "func (m *RoleUserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase roleuser.EdgeRole:\n\t\tif id := m.role; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase roleuser.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5754c730f60cd58807d5d2a83b4127c0", "score": "0.54479164", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeProfilePhoto:\n\t\tif id := m.profile_photo; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeGroups:\n\t\tids := make([]ent.Value, 0, len(m.groups))\n\t\tfor id := range m.groups {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "14791987ff67e58304e8729b1239cfda", "score": "0.54468286", "text": "func (puo *PostUpdateOne) AddLikeIDs(ids ...int) *PostUpdateOne {\n\tpuo.mutation.AddLikeIDs(ids...)\n\treturn puo\n}", "title": "" }, { "docid": "2b590fdabc299c4255cd48091b58a1be", "score": "0.5421783", "text": "func (m *GenderMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase gender.EdgeUsers:\n\t\tids := make([]ent.Value, 0, len(m.users))\n\t\tfor id := range m.users {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7c8859cc564f1a460ff112a0c08fbe77", "score": "0.54170376", "text": "func (obj *hasLikes) LikedBy(userID UserID) bool {\n\tfor _, id := range obj.Likes {\n\t\tif id == userID {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d234fd618dac0fe88ff462bc4694fa67", "score": "0.5395274", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeProfile:\n\t\tif id := m.profile; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1c96cddbd0322ae80597272e0999648f", "score": "0.53747845", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeProjects:\n\t\tids := make([]ent.Value, 0, len(m.projects))\n\t\tfor id := range m.projects {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeReportedTickets:\n\t\tids := make([]ent.Value, 0, len(m.reported_tickets))\n\t\tfor id := range m.reported_tickets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeAssignedTickets:\n\t\tids := make([]ent.Value, 0, len(m.assigned_tickets))\n\t\tfor id := range m.assigned_tickets {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ade7e0879beb9edfcfae42400082c46", "score": "0.53714013", "text": "func (m *UserTypeMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase usertype.EdgeUserTypeID:\n\t\tids := make([]ent.Value, 0, len(m._UserType_ID))\n\t\tfor id := range m._UserType_ID {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5adf406a48d07acb2b5abed00ae29cf2", "score": "0.53584737", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeGenderID:\n\t\tif id := m._Gender_ID; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeUserTypeID:\n\t\tif id := m._UserType_ID; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeProvinceID:\n\t\tif id := m._Province_ID; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c33d56d991d60ebe8ce4edc2e6ab1d52", "score": "0.5330037", "text": "func (puo *PostUpdateOne) RemoveLikes(u ...*User) *PostUpdateOne {\n\tids := make([]int, len(u))\n\tfor i := range u {\n\t\tids[i] = u[i].ID\n\t}\n\treturn puo.RemoveLikeIDs(ids...)\n}", "title": "" }, { "docid": "038e0cded4cba624dd042bc2de6bd4f2", "score": "0.5323865", "text": "func (c *UserClient) QueryLikedTweets(u *User) *TweetQuery {\n\tquery := (&TweetClient{config: c.config}).Query()\n\tquery.path = func(context.Context) (fromV *sql.Selector, _ error) {\n\t\tid := u.ID\n\t\tstep := sqlgraph.NewStep(\n\t\t\tsqlgraph.From(user.Table, user.FieldID, id),\n\t\t\tsqlgraph.To(tweet.Table, tweet.FieldID),\n\t\t\tsqlgraph.Edge(sqlgraph.M2M, false, user.LikedTweetsTable, user.LikedTweetsPrimaryKey...),\n\t\t)\n\t\tfromV = sqlgraph.Neighbors(u.driver.Dialect(), step)\n\t\treturn fromV, nil\n\t}\n\treturn query\n}", "title": "" }, { "docid": "61d803209446d996f914fa5b98036b0e", "score": "0.53164494", "text": "func (m *UserGroupMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase usergroup.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase usergroup.EdgeGroup:\n\t\tif id := m.group; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9198a5946327fcbaf6b3a636b099b5ef", "score": "0.5311793", "text": "func (obj *hasLikes) Like(userID UserID) {\n\tfor _, id := range obj.Likes {\n\t\tif id == userID {\n\t\t\treturn\n\t\t}\n\t}\n\n\tobj.Likes = append(obj.Likes, userID)\n}", "title": "" }, { "docid": "d66c7ae6b5ca6913f3d10683b90e5b88", "score": "0.5287407", "text": "func (oc *OrderCreate) AddUserIDs(ids ...uuid.UUID) *OrderCreate {\n\toc.mutation.AddUserIDs(ids...)\n\treturn oc\n}", "title": "" }, { "docid": "fdcc20e6d975eadb167ad56352bcffa3", "score": "0.52865213", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeTeams:\n\t\tids := make([]ent.Value, 0, len(m.teams))\n\t\tfor id := range m.teams {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase user.EdgeTasks:\n\t\tids := make([]ent.Value, 0, len(m.tasks))\n\t\tfor id := range m.tasks {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ff36cbb0b6bac3613a7a03839300ce68", "score": "0.52374", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeVeterinarian:\n\t\tif id := m.veterinarian; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeCustomer:\n\t\tif id := m.customer; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c6561ea57165e4db78ce1d3182660f9a", "score": "0.5231815", "text": "func (m *UserMutation) AddJoinedGroupIDs(ids ...int) {\n\tif m.joined_groups == nil {\n\t\tm.joined_groups = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.joined_groups[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "3c94724cc7f59815f239ca56839d34ab", "score": "0.5216267", "text": "func (m *UserSessionMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase usersession.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "050a00e3f3770733b878f48bb1b4bf93", "score": "0.51945806", "text": "func AddLikes(c *gin.Context) {\n\tuserID, ok := c.MustGet(\"user_id\").(int64)\n\tif !ok {\n\t\tlog.Printf(\"invalid userid in token, userid: %v\", c.MustGet(\"user_id\"))\n\t\tc.JSON(http.StatusForbidden, &model.ErrResp{Error: \"Invalid token\"})\n\t\treturn\n\t}\n\n\tparamScoreID, err := strconv.ParseInt(c.Param(\"score_id\"), 10, 64)\n\tif err != nil {\n\t\tlog.Printf(\"path parm user_id err: %v\", err)\n\t\tc.JSON(http.StatusBadRequest, &model.ErrResp{Error: \"Invalid path param\", Fields: &[]string{\"user_id\"}})\n\t\treturn\n\t}\n\n\tm := make(map[string]interface{})\n\tif err := c.BindJSON(&m); err != nil {\n\t\tlog.Printf(\"add exp struct JSON bind error: %v\", err)\n\t\tc.JSON(http.StatusBadRequest, &model.ErrResp{Error: \"Invalid payload\"})\n\t\treturn\n\t}\n\n\terrSlice := []string{}\n\tfor key := range m {\n\t\tif key != \"amount\" {\n\t\t\terrSlice = append(errSlice, key)\n\t\t}\n\t}\n\n\tif len(errSlice) > 0 {\n\t\tc.JSON(http.StatusBadRequest, &model.ErrResp{Error: \"Some fields are not allowed\", Fields: &errSlice})\n\t\treturn\n\t}\n\n\tjsonString, err := json.Marshal(m)\n\tif err != nil {\n\t\tlog.Printf(\"add likes struct JSON bind error: %v\", err)\n\t\tc.JSON(http.StatusBadRequest, &model.ErrResp{Error: \"Invalid payload\"})\n\t\treturn\n\t}\n\tamount := model.Amount{}\n\tjson.Unmarshal(jsonString, &amount)\n\n\tif amount.Amount == 0 {\n\t\tlog.Printf(\"add likes struct JSON bind error: %v\", err)\n\t\tc.JSON(http.StatusBadRequest, &model.ErrResp{Error: \"Missing or invalid payload field\", Fields: &[]string{\"amount\"}})\n\t\treturn\n\t}\n\n\tif status, err := (&model.Score{ID: paramScoreID, UserID: userID}).AddLikes(amount.Amount); err != nil {\n\t\tlog.Printf(\"add likes db error: %v\", err)\n\t\tc.JSON(status, &model.ErrResp{Error: err.Error()})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, &model.SuccessResp{Message: \"Likes successfully added\", Status: http.StatusOK})\n}", "title": "" }, { "docid": "16390ce83433d34d975ee687691aae29", "score": "0.5193313", "text": "func (m *UserMutation) AddFriendshipIDs(ids ...int) {\n\tif m.friendships == nil {\n\t\tm.friendships = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.friendships[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "a386e02ddb7b9d2e98860679aaabd2ed", "score": "0.5179364", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeFinancier:\n\t\tif id := m.financier; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeNurse:\n\t\tif id := m._Nurse; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeUserPatientrights:\n\t\tif id := m._UserPatientrights; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeMedicalrecordstaff:\n\t\tif id := m.medicalrecordstaff; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeUser2registrar:\n\t\tif id := m.user2registrar; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeDoctor:\n\t\tif id := m.doctor; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase user.EdgeUserstatus:\n\t\tif id := m.userstatus; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b9cf1e1399a48602766a07acc65fcc93", "score": "0.51645565", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeAccounts:\n\t\tids := make([]ent.Value, 0, len(m.accounts))\n\t\tfor id := range m.accounts {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bc79f865bd917370549795fd31cdf503", "score": "0.51508707", "text": "func (m *WorkOrderMutation) AddLinkIDs(ids ...int) {\n\tif m.links == nil {\n\t\tm.links = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.links[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "5a86424239f1afcb2ff3fa3141b59046", "score": "0.51139295", "text": "func (m *TweetLikeMutation) UserIDs() (ids []int) {\n\tif id := m.user; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "6ed1fd9b94546edc3a4e55eb80c2a91d", "score": "0.5102904", "text": "func (m *UserTypeMutation) AddUserTypeIDIDs(ids ...int) {\n\tif m._UserType_ID == nil {\n\t\tm._UserType_ID = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm._UserType_ID[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "827d0df2692b7a1514b06c2827aadc35", "score": "0.5093247", "text": "func (s *UsersService) ListLikedVideo(uid string, opt ...CallOption) ([]*Video, *Response, error) {\n\tvar u string\n\tif uid == \"\" {\n\t\tu = \"me/likes\"\n\t} else {\n\t\tu = fmt.Sprintf(\"users/%s/likes\", uid)\n\t}\n\n\tvideos, resp, err := listVideo(s.client, u, opt...)\n\n\treturn videos, resp, err\n}", "title": "" }, { "docid": "4b01a34330b6e5bad6378721dd2d84ed", "score": "0.50895774", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\treturn nil\n}", "title": "" }, { "docid": "4b01a34330b6e5bad6378721dd2d84ed", "score": "0.50895774", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\treturn nil\n}", "title": "" }, { "docid": "4b01a34330b6e5bad6378721dd2d84ed", "score": "0.50895774", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\treturn nil\n}", "title": "" }, { "docid": "4b01a34330b6e5bad6378721dd2d84ed", "score": "0.50895774", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\treturn nil\n}", "title": "" }, { "docid": "141586856d1ec687219de8c93cdf7a31", "score": "0.5088583", "text": "func (m *UserMutation) RemovedLikedTweetsIDs() (ids []int) {\n\tfor id := range m.removedliked_tweets {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "89b3e5ae62c175e5bf018a51314e9356", "score": "0.5081162", "text": "func (m *UserMutation) AddRelativeIDs(ids ...int) {\n\tif m.relatives == nil {\n\t\tm.relatives = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.relatives[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "cfca83ad9046b2a4238acf4635dc5f36", "score": "0.50641084", "text": "func (m *UserMutation) AddBookIDs(ids ...int) {\n\tif m.books == nil {\n\t\tm.books = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.books[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "7fbfa77b0fd44c7d62ad22567ba40dfe", "score": "0.50620365", "text": "func (uu *UserUpdate) AddOrderIDs(ids ...int) *UserUpdate {\n\tuu.mutation.AddOrderIDs(ids...)\n\treturn uu\n}", "title": "" }, { "docid": "f98b50f52aae3c3c9a526d3a8c24309a", "score": "0.5059221", "text": "func (m *WorkOrderMutation) AddHyperlinkIDs(ids ...int) {\n\tif m.hyperlinks == nil {\n\t\tm.hyperlinks = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.hyperlinks[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "2638354f240d4c491a53e4fcf51c4af4", "score": "0.5058791", "text": "func (m *PetMutation) AddFriendIDs(ids ...int) {\n\tif m.friends == nil {\n\t\tm.friends = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.friends[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "810cd1dd3b85a7439723cdf8cf3a1f47", "score": "0.5055235", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeGender:\n\t\tif id := m.gender; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "67814fb3da59989a1739db70a544a38b", "score": "0.5053363", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeOwner:\n\t\tif id := m.owner; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d370be5cc3e86d6f20ded87c75abebc", "score": "0.50425494", "text": "func (m *UsersGroupMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase usersgroup.EdgeMembers:\n\t\tids := make([]ent.Value, 0, len(m.members))\n\t\tfor id := range m.members {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\tcase usersgroup.EdgePolicies:\n\t\tids := make([]ent.Value, 0, len(m.policies))\n\t\tfor id := range m.policies {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b80dd55b6c2a9e527daf88a2bd5748a5", "score": "0.5042337", "text": "func (m *FriendshipMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase friendship.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\tcase friendship.EdgeFriend:\n\t\tif id := m.friend; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "67c04756faef9710ae5a46a91716b9c9", "score": "0.50401783", "text": "func (ru *RoomUpdate) AddUserInformationIDs(ids ...int) *RoomUpdate {\n\tru.mutation.AddUserInformationIDs(ids...)\n\treturn ru\n}", "title": "" }, { "docid": "f44efaca53d39dfbb86b1d82f3c97813", "score": "0.50376886", "text": "func (db *Db) Likes(user bson.ObjectId, fid string) (bool, os.Error) {\n\tid, err := db.GetOrMakeForeignID(fid)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn db.kp.IsEdge(\"like_foreign\", user, id)\n}", "title": "" }, { "docid": "76e60a77f5c67389c1b34b6fc6f04f0d", "score": "0.50205654", "text": "func ReadUserLikedTweetDetails(userID bson.ObjectId, loginUserID bson.ObjectId, limit int, maxID bson.ObjectId) (tds []*entity.TweetDetail, err error) {\n\tif limit == 0 {\n\t\treturn\n\t}\n\n\tm := bson.M{\"userId\": userID}\n\n\t// if maxID is set:\n\tif maxID.Valid() {\n\t\tm[\"tweetId\"] = bson.M{\"$lte\": maxID}\n\t}\n\n\tlikes, err := collection.Likes()\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer likes.Close()\n\n\titer := likes.Find(m).Sort(\"-_id\").Iter()\n\n\tts := []entity.Tweet{}\n\n\tvar l entity.Like\n\tvar t *entity.Tweet\n\tfor iter.Next(&l) {\n\t\tt, err = ReadTweetByID(l.TweetID)\n\t\tif err != nil {\n\t\t\tif err == mgo.ErrNotFound { // The tweet corresponding to \"l.TweetID\" is not found if the tweet is removed.\n\t\t\t\tlogger.Debug(l.TweetID, \" is not found.\")\n\t\t\t\terr = nil\n\t\t\t\tcontinue\n\t\t\t} else {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tts = append(ts, *t)\n\t\tif limit > 0 && len(ts) == limit {\n\t\t\tbreak\n\t\t}\n\t}\n\n\terr = iter.Close()\n\tif err != nil {\n\t\treturn\n\t}\n\n\ttds, err = readTweetDetailsByTweets(ts, loginUserID)\n\n\treturn\n}", "title": "" }, { "docid": "22d1b8b413a22f867ce452b485f97f2b", "score": "0.501085", "text": "func (m *RegistrarMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase registrar.EdgeUser:\n\t\tif id := m.user; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5c82baa1743c850066ecfad1e717a8dc", "score": "0.5002326", "text": "func (es List) UserIDs() []uint64 {\n\tids := []uint64{}\n\n\tfor _, e := range es {\n\t\tids = append(ids, e.UserID)\n\n\t\t// Extract user ids from target as well.\n\t\tif e.Target != nil && e.Target.Type == TargetUser {\n\t\t\tid, err := strconv.ParseUint(e.Target.ID, 10, 64)\n\t\t\tif err != nil {\n\t\t\t\t// We fail silently here for now until we find a way to log this. As the\n\t\t\t\t// only effect is that we don't add a potential user to the map\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tids = append(ids, id)\n\t\t}\n\t}\n\n\treturn ids\n}", "title": "" }, { "docid": "9ac459348f70fc552e3f28470658ec82", "score": "0.49870783", "text": "func UserIDIn(vs ...int) predicate.Relationship {\n\treturn predicate.Relationship(sql.FieldIn(FieldUserID, vs...))\n}", "title": "" }, { "docid": "cfd1ed764d796459ba07d5539168c283", "score": "0.49798042", "text": "func (m *EquipmentMutation) AddHyperlinkIDs(ids ...int) {\n\tif m.hyperlinks == nil {\n\t\tm.hyperlinks = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.hyperlinks[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "2c97245feee26917a139830d95f1cb27", "score": "0.49707586", "text": "func (m *UserMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase user.EdgeRequisitions:\n\t\tids := make([]ent.Value, 0, len(m.requisitions))\n\t\tfor id := range m.requisitions {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0dd2b7dbcb51ba17a9a07e24a5ec517b", "score": "0.49680454", "text": "func (ps *PGStore) CreateLikesList(user *User) (*UserLikesList, error) {\n\tvar ulList = &UserLikesList{}\n\tulList.UserID = user.ID\n\t//start a transaction\n\ttx, err := ps.DB.Begin()\n\t//err if transaction could not start\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsql := `INSERT INTO user_like_list (UserID) VALUES ($1) RETURNING id`\n\t//Receives ONE row from the database\n\trow := tx.QueryRow(sql, user.ID)\n\t//scans the value of ID returned from query INTO the user\n\terr = row.Scan(&ulList.ID)\n\t//err if cant scan -- rollback transaction\n\tif err != nil {\n\t\ttx.Rollback()\n\t\treturn nil, err\n\t}\n\t//commits the transaction-- connection no longer reserved\n\ttx.Commit()\n\treturn ulList, nil\n}", "title": "" }, { "docid": "92f18e98e0ddd3ab4fbddb4136391b60", "score": "0.4950862", "text": "func (m *AdultMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase adult.EdgeBooks:\n\t\tids := make([]ent.Value, 0, len(m.books))\n\t\tfor id := range m.books {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a4776f39dd704fc97f37ece3a68f79e3", "score": "0.49489802", "text": "func (m *LocationMutation) AddHyperlinkIDs(ids ...int) {\n\tif m.hyperlinks == nil {\n\t\tm.hyperlinks = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.hyperlinks[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "d499c62a43449b00b67b0db0e0e16c8a", "score": "0.4941374", "text": "func (m *TweetLikeMutation) SetLikedAt(t time.Time) {\n\tm.liked_at = &t\n}", "title": "" }, { "docid": "ee38523454cbecf44cf04cb39106e5cb", "score": "0.49352184", "text": "func (m *UserMutation) AddTweetIDs(ids ...int) {\n\tif m.tweets == nil {\n\t\tm.tweets = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.tweets[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "ee38523454cbecf44cf04cb39106e5cb", "score": "0.49352184", "text": "func (m *UserMutation) AddTweetIDs(ids ...int) {\n\tif m.tweets == nil {\n\t\tm.tweets = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.tweets[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "94ce68c517ac63a6ef94190f6d4cece3", "score": "0.4906429", "text": "func (m *TweetMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase tweet.EdgeCreator:\n\t\tif id := m.creator; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5d04e7dd6cb3547a1899b864bc8a90c1", "score": "0.4888886", "text": "func (m *BadgeMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase badge.EdgeWearer:\n\t\tif id := m.wearer; id != nil {\n\t\t\treturn []ent.Value{*id}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e42b1b8c7426b5ead64011fbab5189bf", "score": "0.48852825", "text": "func (m *UserMutation) AddRoleIDs(ids ...int) {\n\tif m.roles == nil {\n\t\tm.roles = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.roles[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "6d13c9302cf04b0d76c1c10ea8d654b4", "score": "0.48663092", "text": "func (uc *UserCreate) AddArticleIDs(ids ...int) *UserCreate {\n\tif uc.articles == nil {\n\t\tuc.articles = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tuc.articles[ids[i]] = struct{}{}\n\t}\n\treturn uc\n}", "title": "" }, { "docid": "dc572115ca43ee76bec8161901a81e06", "score": "0.48577747", "text": "func (m *ServiceMutation) AddLinkIDs(ids ...int) {\n\tif m.links == nil {\n\t\tm.links = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.links[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "aa444812a77b70409097e33fe42074d2", "score": "0.48560223", "text": "func (gru *GithubRepositoryUpdate) AddLabelIDs(ids ...int) *GithubRepositoryUpdate {\n\tgru.mutation.AddLabelIDs(ids...)\n\treturn gru\n}", "title": "" }, { "docid": "de28694538397395ae4299b73715ba62", "score": "0.48547706", "text": "func (m *EducationlevelMutation) AddedIDs(name string) []ent.Value {\n\tswitch name {\n\tcase educationlevel.EdgeEducationlevel2doctorinfo:\n\t\tids := make([]ent.Value, 0, len(m.educationlevel2doctorinfo))\n\t\tfor id := range m.educationlevel2doctorinfo {\n\t\t\tids = append(ids, id)\n\t\t}\n\t\treturn ids\n\t}\n\treturn nil\n}", "title": "" } ]
8e3e3925844ab63095b6bcf9741bb04f
Pessoas get all pessoas on the BD
[ { "docid": "9a6cbd1e593c142774519cef30c86b72", "score": "0.72469115", "text": "func (Pessoa) Pessoas() ([]db.Pessoa, error) {\n\tvar ret []db.Pessoa\n\terr := db.DB.Find(&ret).Error\n\treturn ret, err\n}", "title": "" } ]
[ { "docid": "b4128841ef8572a7108ae5841679392a", "score": "0.69775254", "text": "func GetAllPizzas() ([]types.Pizza, error) {\n\tlog.Println(\"All getting pizzas\")\n\tpizzas := make([]types.Pizza, 0)\n\tvar pizza types.Pizza\n\tvar rows *sql.Rows\n\n\tquerySQL := `SELECT p.id, p.name, p.size, p.description, p.img_url, p.accepted, p.created_date,\n p.updated_date, p.deleted, p.price, c.id, c.name, c.description, u.id, u.username, u.created_date\n FROM pizza p\n LEFT JOIN pizza_category c ON c.id = p.category_id\n LEFT JOIN person u ON u.id = p.user_id\n WHERE p.deleted = 0 AND p.accepted = 0\n ORDER BY p.created_date ASC`\n\n\trows = database.query(querySQL)\n\n\tif err != nil {\n\t\tlog.Println(\"Failed to get all pizzas from db\")\n\t}\n\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tpizza = types.Pizza{}\n\t\tvar deleted int\n\t\tvar accepted int\n\t\terr = rows.Scan(\n\t\t\t&pizza.ID, &pizza.Name, &pizza.Size, &pizza.Description,\n\t\t\t&pizza.ImgURL, &accepted, &pizza.Created, &pizza.Updated, &deleted, &pizza.Price,\n\t\t\t&pizza.Category.ID, &pizza.Category.Name, &pizza.Category.Description,\n\t\t\t&pizza.Author.ID, &pizza.Author.Name, &pizza.Author.Created)\n\n\t\tpizza.Deleted = utils.Itob(deleted)\n\t\tpizza.Accepted = utils.Itob(accepted)\n\n\t\tingridients, err := GetIngridientsOfPizza(pizza.ID)\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Failed to get ingredients for pizza with ID %d\", pizza.ID)\n\t\t}\n\n\t\tpizza.Ingredients = ingridients\n\n\t\tpizzas = append(pizzas, pizza)\n\t}\n\treturn pizzas, nil\n}", "title": "" }, { "docid": "362a4b1f7b1a2eb1902f1b64b3f86b59", "score": "0.6608447", "text": "func (p *Penjualan) GetAll(query RequestGet) ([]Penjualan, error) {\n\tvar brKeluar []Penjualan\n\to := orm.NewOrm()\n\tlike := \"%\" + query.Query + \"%\"\n\tqb := []string{\n\t\t\"SELECT *\",\n\t\t\"FROM\",\n\t\tp.TableName(),\n\t\t\"WHERE (waktu >= ? AND waktu <= ?)\",\n\t\t\"AND nama_item LIKE ?\",\n\t}\n\tsql := strings.Join(qb, \" \")\n\n\tcount, err := o.Raw(sql, query.FromDate, query.ToDate,\n\t\tlike).QueryRows(&brKeluar)\n\tif err != nil {\n\t\tbeego.Warning(\"Failed get all data product\", err)\n\t\treturn []Penjualan{}, err\n\t}\n\tbeego.Debug(\"jumlah data = \", count)\n\treturn brKeluar, nil\n}", "title": "" }, { "docid": "db2424891d7bab9cc6c6f642cbd2d7c3", "score": "0.6586548", "text": "func ProdutoFindAll() []Produto {\n\n\tdb := db.Connect()\n\tdefer db.Close()\n\n\trsProdutos, err := db.Query(\"select * from produto order by id asc\")\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\n\tp := Produto{}\n\tprodutos := []Produto{}\n\n\tfor rsProdutos.Next() {\n\n\t\tvar id, quantidade int\n\t\tvar nome, descricao string\n\t\tvar preco float64\n\n\t\terr := rsProdutos.Scan(&id, &nome, &descricao, &preco, &quantidade)\n\n\t\tif err != nil {\n\t\t\tpanic(err.Error())\n\t\t}\n\n\t\tp.ID = id\n\t\tp.Nome = nome\n\t\tp.Descricao = descricao\n\t\tp.Preco = preco\n\t\tp.Quantidade = quantidade\n\n\t\tprodutos = append(produtos, p)\n\t}\n\n\treturn produtos\n}", "title": "" }, { "docid": "0f1aedc9870b134f8d5c0401a4cd084b", "score": "0.64394367", "text": "func (pts *Petugass) GetAllPetugas(c *gin.Context) {\n\tvar err error\n\t//Check if the user is authenticated first\n\tmetadata, err := pts.tk.ExtractTokenMetadata(c.Request)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"Unauthorized\")\n\t\treturn\n\t}\n\t//lookup the metadata in redis:\n\tuserID, err := pts.rd.FetchAuth(metadata.TokenUuid)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"unauthorized\")\n\t\treturn\n\t}\n\t//Get user profile by user Login\n\tpetugas, err := pts.pt.GetPetugas()\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tfmt.Printf(\"userID :%+v\\n\", userID)\n\trb := &response.ResponseBuilder{}\n\n\tc.JSON(http.StatusOK, rb.SetResponse(\"010101\").SetData(petugas).Build(c))\n}", "title": "" }, { "docid": "c70fa86b1391a4fbf6533cc61ff90f61", "score": "0.6319568", "text": "func BuscarTodosProdutos() []Produto {\n\n\t//Conectando com o banco de dados\n\tdb := db.ConectarComBancoDeDados(db.ObterCredenciaisDeAcessoAoBancoDeDados(db.NomeArquivoCredencialBancoDeDados))\n\n\t//Criando uma slice de produtos\n\tlistaDeProdutos := []Produto{}\n\n\t//Obtendo todos os produtos do banco de dados\n\ttodosProdutos, erro := db.Query(\"select * from produtos\")\n\n\t//Adicionando produto por produto\n\tfor todosProdutos.Next() {\n\n\t\t//Criando as variaveis que irao receber os valores do banco de dados\n\t\tvar id, quantidade int\n\t\tvar nome, descricao string\n\t\tvar preco float64\n\n\t\t//Lendo os dados do banco de dados\n\t\terro = todosProdutos.Scan(&id, &nome, &descricao, &preco, &quantidade)\n\n\t\t//Caso algum erro acontecer o erro sera exibido\n\t\tif erro != nil {\n\t\t\tpanic(erro.Error())\n\t\t}\n\n\t\t//Criando uma instancia de produto\n\t\tproduto := Produto{}\n\n\t\t//Adicionando os dados lidos do banco de dados a instancia da struct Produto\n\t\tsucesso, mensagemDeErro := produto.SetID(id)\n\t\t//Caso algum erro ocorra ao adicionar o id do produto, sera impresso uma mensagem de erro\n\t\tif !sucesso {\n\t\t\tfmt.Println(mensagemDeErro)\n\t\t}\n\n\t\tproduto.SetNome(nome)\n\t\tproduto.SetDescricao(descricao)\n\n\t\tsucesso, mensagemDeErro = produto.SetPreco(preco)\n\t\t//Caso algum erro ocorra ao adicionar o preco do produto, sera impresso a mensagem de erro\n\t\tif !sucesso {\n\t\t\tfmt.Println(mensagemDeErro)\n\t\t}\n\n\t\tsucesso, mensagemDeErro = produto.SetQuantidade(quantidade)\n\t\t//Caso algum erro ocorra ao adicionar a quantidade do produto, sera impresso a mensagem de erro\n\t\tif !sucesso {\n\t\t\tfmt.Println(mensagemDeErro)\n\t\t}\n\n\t\t//Adicionando a instancia da struct Produto a slice de produtos\n\t\tlistaDeProdutos = append(listaDeProdutos, produto)\n\t}\n\n\t//Fechando a conexao com o banco de dados\n\terro = db.Close()\n\n\t//Caso algum erro ocorra ao fechar a conexao, o erro sera exibido\n\tif erro != nil {\n\t\tpanic(erro.Error())\n\t}\n\n\treturn listaDeProdutos\n}", "title": "" }, { "docid": "2835c0aee6111f597bb44abf0ecd0618", "score": "0.61982363", "text": "func getAsientos(c *gin.Context) {\n\t\n\n\t//Encuentra el evento con el id que se envió como parámetro\n\tvar evento EventoModel\n \teventoID := c.Param(\"evento_id\")\n\tdb.First(&evento, eventoID)\n\n\tif evento.ID == 0 {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusNotFound, \"message\": \"¡Evento no encontrado!\"})\n\t\treturn\n\t}\n\n\t//Encuentra los asientos del evento\n\tvar asientos []AsientoModel\n\tdb.Model(&evento).Related(&asientos);\n\t\n\tif len(asientos) <= 0 {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusNotFound, \"message\": \"¡No hay asientos!\"})\n\t\treturn\n\t}\n\n\tc.HTML(http.StatusOK,\"elegir_asiento.html\",gin.H{\"status\": http.StatusOK, \"data\": asientos})\n\t//c.JSON(http.StatusOK, gin.H{\"status\": http.StatusOK, \"data\": asientos})\n}", "title": "" }, { "docid": "083259488667f8fe2cf2b59badde7cd3", "score": "0.5859794", "text": "func GetAll(db *OfficerRepository) []models.Officer { // modelOfficer ==> nama file di folder model\n\tfmt.Println(db.DB)\n\n\tresult, err := db.DB.Query(\"Select OfficerCode, OfficerName, OfficerPassword, OfficerStatus FROM tblOfficer\")\n\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tdefer result.Close()\n\tfmt.Println(result)\n\tofficer := []models.Officer{}\n\tfor result.Next() {\n\t\tvar p models.Officer\n\t\tif err := result.Scan(&p.OfficerCode, &p.OfficerName, &p.OfficerPassword, &p.OfficerStatus); err != nil {\n\t\t\tfmt.Println(\"officerCanceError\")\n\t\t\tfmt.Println(err)\n\t\t\treturn nil\n\t\t}\n\t\tofficer = append(officer, p)\n\t}\n\treturn officer\n}", "title": "" }, { "docid": "54d2b3e51bf953ade103e149416a9661", "score": "0.5776826", "text": "func GetPoems(c *gin.Context) {\n\tvar poems []models.Poem\n\tmodels.DB.Find(&poems)\n\n\tc.JSON(http.StatusOK, gin.H{\"data\": poems})\n}", "title": "" }, { "docid": "888b61d0695b02e369cbf3bef90bea24", "score": "0.57609767", "text": "func GetPertanyaanById(c echo.Context) (err error) {\n\t\n\tquis := new(Pertanyaan)\n\tif err = c.Bind(quis); err != nil {\n\t\treturn\n\t}\n\n\tid := c.Param(\"id\")\n\n\tdb, err := connect()\n if err != nil {\n fmt.Println(err.Error())\n return\n\t}\n\t\n defer db.Close()\n\n\trows, err := db.Query(\"SELECT tanya.id_tanya, tanya.id_user, tanya.pertanyaan FROM tanya, kursus_konten WHERE tanya.id_user = kursus_konten.user_id AND tanya.id_user = ?\", id)\n\n\tdefer rows.Close()\n\n\tvar result Pertanyaan\n\t\n\tfor rows.Next() {\n\t\tvar each = Pertanyaan{}\n\t\tvar err = rows.Scan(&each.ID, &each.UserID, &each.Tanya)\n\t\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\n\t\tresult = each\n\t}\n\t\n\tif err = rows.Err(); err != nil {\n\t\tfmt.Println(err.Error())\n\t\treturn\n\t}\n\t\t\t\n\treturn c.JSON(http.StatusOK, map[string]interface{}{\n\t\t\"status\": \"berhasil\",\n\t\t\"dataQuis\": result,\n\t})\n}", "title": "" }, { "docid": "925cc59fd8b0c4de978b8044136cd2a0", "score": "0.5756028", "text": "func LeoParlasSeguidores(ID string, pagina int) ([]models.DevuelvoParlasSeguidores, bool) {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*15)\n\tdefer cancel()\n\n\tdb := MongoCN.Database(\"parcha\")\n\tcol := db.Collection(\"relacion\")\n\t//De la tabla relacion se va a sacar la info basica de con quien estoy relacionado y luego vamos a unir esta tabla con las parlas\n\tskip := (pagina - 1) * 20 //vamos solo a traer 20 tweets\n\n\tcondiciones := make([]bson.M, 0)\n\tcondiciones = append(condiciones, bson.M{\"$match\": bson.M{\"usuarioid\": ID}}) //que haga un match y la condiciones es que usuarioid sa igual al ID q vino por parametro\n\tcondiciones = append(condiciones, bson.M{ // la instruccion lookup permite unir 2 tablas, una vez q encontre y filtre mi tabla relacion por mi userid, va a atraer todos esos registros, y voy hacer q ese resultado este unido a la tabla parlas\n\t\t\"$lookup\": bson.M{\n\t\t\t\"from\": \"parla\", //voy a unir relacion con mi tabla parla\n\t\t\t\"localField\": \"usuariorelacionid\", // este es el campopor el cual vamos a unir. usuarioid es el nuestro ahora vamos aunir la tabla parla en base a nuestros usuarios con los q estamos relacionados porque tenemos q traer las parlas de ellos\n\t\t\t\"foreignField\": \"userid\",\n\t\t\t\"as\": \"parla\", //un alias de como queremos llamar esa nueva tabla, pues le llamamos parla, igual q la madre\n\t\t}})\n\tcondiciones = append(condiciones, bson.M{\"$unwind\": \"$parla\"}) //por ejemplo si estoy unido a pepe,y no usaramos unwind apareceria un doc inicial con los datos de pepe y por debajo un array de docs con todos las parlas de el. El unwind permite es q todos los docs vengan exactamente iguales, entonces los datos de pepe se van a repetir en todos las parlas y va a aestar su tweet en el mismo doc\n\tcondiciones = append(condiciones, bson.M{\"$sort\": bson.M{\"parla.fecha\": -1}}) //El ordenado de menor a mayor es 1, pero si es de ultimo a primer el mas antiguo al final es -1\n\tcondiciones = append(condiciones, bson.M{\"$skip\": skip})\n\tcondiciones = append(condiciones, bson.M{\"$limit\": 20})\n\n\tcursor, err := col.Aggregate(ctx, condiciones) //esto se ejecuta en la bd con todas las condiciones y crea un curus\n\tvar result []models.DevuelvoParlasSeguidores\n\terr = cursor.All(ctx, &result) //decodifica todo en result\n\tif err != nil {\n\t\treturn result, false\n\t}\n\treturn result, true\n}", "title": "" }, { "docid": "38ad8fe22fa6abf080e19c2594c35165", "score": "0.56931484", "text": "func (app *application) profesionalesLista(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar profesionales []models.Profesionales\n\tresult, err := app.profesional.DB.Query(\"SELECT * FROM kinetur.Profesional \")\n\tif err != nil {\n\t\tapp.serverError(w, err)\n\t}\n\tdefer result.Close()\n\tfor result.Next() {\n\t\tvar prof models.Profesionales\n\t\terr := result.Scan(&prof.Id, &prof.DNI, &prof.Nombres, &prof.Apellidos, &prof.Especialidad)\n\t\tif err != nil {\n\t\t\tapp.serverError(w, err)\n\t\t}\n\t\tprofesionales = append(profesionales, prof)\n\t}\n\tjson.NewEncoder(w).Encode(profesionales)\n}", "title": "" }, { "docid": "7d22b7a47d57abdcaa17d68d894d4908", "score": "0.5673386", "text": "func (q competitorQuery) AllP() CompetitorSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "976798a46ece4bd6528e3104808e00fa", "score": "0.56499964", "text": "func GetAll(db *ItemRepository) []models.Item { // modelItem ==> nama file di folder model\n\tfmt.Println(db.DB)\n\n\tresult, err := db.DB.Query(\"Select ItemCode, ItemName, BuyingPrice, SellingPrice, ItemAmount, Pieces FROM tblItem\")\n\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tdefer result.Close()\n\tfmt.Println(result)\n\titem := []models.Item{}\n\tfor result.Next() {\n\t\tvar p models.Item\n\t\tif err := result.Scan(&p.ItemCode, &p.ItemName, &p.BuyingPrice, &p.SellingPrice, &p.ItemAmount, &p.Pieces); err != nil {\n\t\t\tfmt.Println(\"petugasCanceError\")\n\t\t\tfmt.Println(err)\n\t\t\treturn nil\n\t\t}\n\t\titem = append(item, p)\n\t}\n\treturn item\n}", "title": "" }, { "docid": "b073e977caab0ded4ce14ad317ffba3b", "score": "0.5645865", "text": "func GetProswpikoList(label int) []models.Proswpiko {\n\tdb, _ := datastorage.GetDataRouter().GetDb(\"common\")\n\tdbc := db.GetMysqlClient()\n\tvar res *sql.Rows\n\tif label == 1 {\n\t\tres, _ = dbc.Query(\"SELECT id,surname,pname,rank,perigrafi FROM proswpiko_sorted\")\n\t} else {\n\t\tres, _ = dbc.Query(\"SELECT id,surname,pname,rank,perigrafi FROM proswpiko_sorted where iid=? || pid=?\", label, label)\n\t}\n\n\tvar proswpikoArray []models.Proswpiko\n\tvar proswpiko models.Proswpiko\n\tfor res.Next() {\n\t\t_ = res.Scan(\n\t\t\t&proswpiko.ID,\n\t\t\t&proswpiko.Surname,\n\t\t\t&proswpiko.Name,\n\t\t\t&proswpiko.Rank,\n\t\t\t&proswpiko.Label,\n\t\t)\n\t\tproswpikoArray = append(proswpikoArray, proswpiko)\n\t}\n\tres.Close()\n\treturn proswpikoArray\n}", "title": "" }, { "docid": "9ba49f19772ddc3743e3a6bad2c6898e", "score": "0.56184125", "text": "func IApts() (apartas []Aparta, err error) {\n var apt Aparta\n stq := \"SELECT id, codigo FROM apartas order by codigo\"\n\trows, err := Db.Query(stq)\n\tif err != nil {\n\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&apt.Id, &apt.Codigo) ; err != nil {\n\t\treturn\n\t\t}\n\t\tapartas = append(apartas, apt)\n\t}\n\treturn\n }", "title": "" }, { "docid": "2ca34bd3bc5ae1df8926f4f812aff514", "score": "0.55956435", "text": "func ObtenerTodosLosProductos(c *gin.Context) {\n\tvar producto []Producto\n\tdb:=cx.Connection()\n\t//db.Close()\n\tif err := db.Find(&producto).Error; err != nil {\n\t\tc.AbortWithStatus(404)\n\t\tfmt.Println(err)\n\t\treturn\n\t}else {\n\t\tc.JSON(200, producto)\n\t}\n\n}", "title": "" }, { "docid": "5437c003ecc337e66fc0fdee02bfacf6", "score": "0.5586609", "text": "func (dao *PlanetasDAO) FindAll() ([]model.Planeta, error) {\n\tvar planetas []model.Planeta\n\terr := banco.C(COLLECTION).Find(bson.M{}).All(&planetas)\n\treturn planetas, err\n}", "title": "" }, { "docid": "6216c45f7640272da036ac4bafdc2451", "score": "0.5583791", "text": "func (q userQuery) AllP() UserSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "add50b18bfb3efccae99d652fdfa5337", "score": "0.5556785", "text": "func (store MunicipioStore) GetAll(page_num int, page_size int) []models.MunicipiosResponse {\n\t// calcular a paginacao\n\tskips := page_size * (page_num - 1)\n\n\t// fazer a busca no banco de dados\n\tvar b []models.MunicipiosResponse\n\titer := store.C.Find(nil).Skip(skips).Limit(page_size).Sort(\"codigo\").Iter()\n\n\tresult := models.MunicipioResponse{}\n\t// municipio adaptado para listar somente os campos a serem exibidos\n\tmunicipio := models.MunicipiosResponse{}\n\tfor iter.Next(&result) {\n\t\t// adiciona os links\n\t\tlinks := []commons.Link{commons.Link{Name:\"self\",Method:\"GET\",Href:\"/ibge/v3/municipios/\"+strconv.FormatInt(result.Codigo,10)}}\n\t\tmunicipio.ID = result.ID\n\t\tmunicipio.Codigo = result.Codigo\n\t\tmunicipio.Nome = result.Nome\n\t\tmunicipio.Uf = result.Uf.Sigla\n\t\tmunicipio.Links = links\n\t\t// anexa o documento a lista\n\t\tb = append(b, municipio)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "56f6e0f8d8fca5cd84ca0f194f4441af", "score": "0.5537765", "text": "func (svc *ideaSvcImpl) GetAll() (Ideas, *Error) {\n\tres, err := r.Table(\"Ideas\").Run(svc.session)\n\tif err != nil {\n\t\treturn nil, NewError(ErrDB, err)\n\t}\n\n\tideas := []*Idea{}\n\terr = res.All(&ideas)\n\tif err != nil {\n\t\treturn nil, NewError(ErrDB, err)\n\t}\n\n\treturn ideas, nil\n}", "title": "" }, { "docid": "a394704116a405d168f8dafae5e725cf", "score": "0.55296814", "text": "func (q chadopropQuery) AllP() ChadopropSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "1f8d6d36e6fd44eed5b81d4d0139f6bf", "score": "0.5527806", "text": "func GetAll() []ConexionMgo {\n\tvar result []ConexionMgo\n\ts, Conexions, err := MoConexion.GetColectionMgo(MoVar.ColeccionConexion)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\terr = Conexions.Find(nil).All(&result)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\ts.Close()\n\treturn result\n}", "title": "" }, { "docid": "093a1f4cc91867060236e8a03419ef9c", "score": "0.5500271", "text": "func (u scrumProjectRepo) GetAll(autoPreload bool) (*[]model.ScrumProject, error) {\n\tvar dataList []model.ScrumProject\n\n\tdb := u.conn\n\t//preload check\n\tif autoPreload {\n\t\tdb = db.Preload(clause.Associations)\n\t}\n\n\tdb = db.Find(&dataList)\n\treturn &dataList, db.Error\n}", "title": "" }, { "docid": "03c818716b36e1a5e31f9d03c0476d04", "score": "0.5455013", "text": "func Index(w http.ResponseWriter, r *http.Request) {\n\t// Aqui hacemos el query a la base de dato\n db := dbConn()\n selDB, err := db.Query(\"SELECT * FROM Tipo ORDER BY id DESC\")\n if err != nil {\n panic(err.Error())\n\t}\n\t//Creamos estas variables donde se van a introducir los valores que nos de la base de dato para mostrar al usuario despues\n tipo := Tipo{}\n res := []Tipo{}\n for selDB.Next() {\n var id, capacidad int\n var nombre, descripcion string\n err = selDB.Scan(&id, &nombre, &capacidad, &descripcion)\n if err != nil {\n panic(err.Error())\n\t\t}\n tipo.Id = id\n tipo.Nombre = nombre\n tipo.Capacidad = capacidad\n tipo.Descripcion = descripcion\n res = append(res, tipo)\n }\n tmpl.ExecuteTemplate(w, \"Index\", res)\n defer db.Close()\n}", "title": "" }, { "docid": "61c4a7e2dcca1843aae6aacd058e59d7", "score": "0.5453508", "text": "func GetPizzaByID(id int) (types.Pizza, error) {\n\tlog.Println(\"All getting pizzas\")\n\tvar pizza types.Pizza\n\tvar rows *sql.Rows\n\n\tquerySQL := `SELECT p.id, p.name, p.size, p.description, p.img_url, p.accepted, p.created_date,\n p.updated_date, p.deleted, p.price, c.id, c.name, c.description, u.id, u.username, u.created_date\n FROM pizza p\n LEFT JOIN pizza_category c ON c.id = p.category_id\n LEFT JOIN person u ON u.id = p.user_id\n WHERE p.id = $1 AND p.deleted = 0 AND p.accepted = 0;`\n\n\trows = database.query(querySQL, id)\n\n\tif err != nil {\n\t\tlog.Println(\"Failed to get pizza by id\")\n\t}\n\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar deleted int\n\t\tvar accepted int\n\t\terr = rows.Scan(\n\t\t\t&pizza.ID, &pizza.Name, &pizza.Size, &pizza.Description,\n\t\t\t&pizza.ImgURL, &accepted, &pizza.Created, &pizza.Updated, &deleted, &pizza.Price,\n\t\t\t&pizza.Category.ID, &pizza.Category.Name, &pizza.Category.Description,\n\t\t\t&pizza.Author.ID, &pizza.Author.Name, &pizza.Author.Created)\n\n\t\tpizza.Deleted = utils.Itob(deleted)\n\t\tpizza.Accepted = utils.Itob(accepted)\n\n\t\tingridients, err := GetIngridientsOfPizza(pizza.ID)\n\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Failed to get ingredients for pizza with ID %d\", pizza.ID)\n\t\t}\n\n\t\tpizza.Ingredients = ingridients\n\t}\n\treturn pizza, nil\n}", "title": "" }, { "docid": "9ea7871f9b937a3b3bc10a8a2bb88b40", "score": "0.5431821", "text": "func ReadPublicaciones(ID string, pagina int64) ([]*models.GraboPublicacion, bool) {\n\tcontt, cancel := context.WithTimeout(context.Background(), 15*time.Second)\n\tdefer cancel()\n\tdb := MongoC.Database(\"RedSocial\")\n\tcol := db.Collection(\"publicacion\")\n\n\tvar respuesta []*models.GraboPublicacion\n\tquery := bson.M{\n\t\t\"userid\": ID,\n\t}\n\tOptions := options.Find()\n\tOptions.SetLimit(20)\n\tOptions.SetSort(bson.D{{Key: \"fechaPublicacion\", Value: -1}})\n\tOptions.SetSkip((pagina - 1) * 20)\n\n\tmarcador, err := col.Find(contt, query, Options)\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t\treturn respuesta, false\n\t}\n\tfor marcador.Next(context.TODO()) {\n\t\tvar register models.GraboPublicacion\n\t\terr := marcador.Decode(&register)\n\t\tif err != nil {\n\t\t\treturn respuesta, false\n\t\t}\n\t\trespuesta = append(respuesta, &register)\n\t}\n\treturn respuesta, true\n}", "title": "" }, { "docid": "56a9fee2aee32e4af13fd11924cbe943", "score": "0.5414828", "text": "func GetAllEmployees(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\temployees := []models.Empleado{}\n\tdb.Where(\"empleado_estado = ?\", true).Find(&employees)\n\trespondJSON(w, http.StatusOK, JSONResponse{Payload: employees, Message: \"Empleados encontrados!!\"})\n}", "title": "" }, { "docid": "bcb27a1e583a217ef37b2948cf1f702b", "score": "0.5405042", "text": "func (f *SearchStore) GetAllPets(userID int) (pets []*DispPet, err error) {\n\trows, err := f.DB.Query(\"select name, description,user_id from pets where user_id!=$1 order by name\", userID)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Can't read pets from db: %v\", err)\n\t\treturn\n\t}\n\tdefer rows.Close()\n\terr = sqlx.StructScan(rows, &pets)\n\tif err != nil {\n\t\terr = fmt.Errorf(\"Can't scan topics-rows from db: %v\", err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "db3d4ac8f3ba55d8511d0355b9fe5b2e", "score": "0.5396541", "text": "func ClientesPorPresupuestosByPresupuestoID(db XODB, presupuestoID int) ([]*ClientesPorPresupuesto, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`cliente_id, presupuesto_id ` +\n\t\t`FROM v1wq1ics1m037sn6.clientes_por_presupuesto ` +\n\t\t`WHERE presupuesto_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, presupuestoID)\n\tq, err := db.Query(sqlstr, presupuestoID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results\n\tres := []*ClientesPorPresupuesto{}\n\tfor q.Next() {\n\t\tcpp := ClientesPorPresupuesto{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = q.Scan(&cpp.ClienteID, &cpp.PresupuestoID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &cpp)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "6017d3a2c79c96cb2ec66c18ff99eb5e", "score": "0.5376088", "text": "func (pts *Petugass) GetProfilePetugas(c *gin.Context) {\n\tvar err error\n\t//Check if the user is authenticated first\n\tmetadata, err := pts.tk.ExtractTokenMetadata(c.Request)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"Unauthorized\")\n\t\treturn\n\t}\n\t//lookup the metadata in redis:\n\tuserID, err := pts.rd.FetchAuth(metadata.TokenUuid)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"unauthorized\")\n\t\treturn\n\t}\n\t//Get user profile by user Login\n\tpetugas, err := pts.pt.GetProfilePetugas(userID)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tfmt.Printf(\"userID :%+v\\n\", petugas)\n\n\tvar petugasalldata = make(map[string]interface{})\n\tpetugasalldata[\"profile_petugas\"] = petugas\n\trb := &response.ResponseBuilder{}\n\n\tc.JSON(http.StatusOK, rb.SetResponse(\"010101\").SetData(petugasalldata).Build(c))\n}", "title": "" }, { "docid": "5ae06e411e1d7ac150f630c3b01f34d1", "score": "0.535608", "text": "func ClientesPorPresupuestosByClienteID(db XODB, clienteID int) ([]*ClientesPorPresupuesto, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`cliente_id, presupuesto_id ` +\n\t\t`FROM v1wq1ics1m037sn6.clientes_por_presupuesto ` +\n\t\t`WHERE cliente_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, clienteID)\n\tq, err := db.Query(sqlstr, clienteID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results\n\tres := []*ClientesPorPresupuesto{}\n\tfor q.Next() {\n\t\tcpp := ClientesPorPresupuesto{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = q.Scan(&cpp.ClienteID, &cpp.PresupuestoID)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &cpp)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "e4d9b2e6956925488844b28cdf69b94d", "score": "0.5352377", "text": "func (q reputationUserQuery) AllP() ReputationUserSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "59dc1d0b0f263e8dfeadd00c8a715bcf", "score": "0.5352223", "text": "func (c *Departments) GetAll(db *sql.DB) (err error) {\n\trows, err := db.Query(`SELECT id,code,name FROM department`)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"select %v\", err)\n\t}\n\tvar row Department\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&row.ID, &row.Code, &row.Name); err != nil {\n\t\t\treturn fmt.Errorf(\"scan %v\", err)\n\t\t}\n\t\tc.Departments = append(c.Departments, row)\n\t}\n\terr = rows.Err()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"rows err %v\", err)\n\t}\n\tif len(c.Departments) == 0 {\n\t\tc.Departments = []Department{}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "9bddd5b3220912ba89eb7b985346bfde", "score": "0.5345097", "text": "func (pts *Petugass) FindPelanggan(c *gin.Context) {\n\tvar paramFilter *entity.PelangganParams\n\tif err := c.ShouldBindQuery(&paramFilter); err != nil {\n\t\tc.JSON(http.StatusUnprocessableEntity, gin.H{\n\t\t\t\"invalid_filter\": \"invalid param filter\",\n\t\t})\n\t\treturn\n\t}\n\tvar err error\n\t//Check if the user is authenticated first\n\tmetadata, err := pts.tk.ExtractTokenMetadata(c.Request)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"Unauthorized\")\n\t\treturn\n\t}\n\t//lookup the metadata in redis:\n\tuserID, err := pts.rd.FetchAuth(metadata.TokenUuid)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, \"unauthorized\")\n\t\treturn\n\t}\n\n\tfmt.Printf(\"userID :%+v\\n\", userID)\n\n\tvar petugasalldata = make(map[string]interface{})\n\tpetugasalldata[\"profile_petugas\"] = paramFilter\n\trb := &response.ResponseBuilder{}\n\n\tc.JSON(http.StatusOK, rb.SetResponse(\"010101\").SetData(petugasalldata).Build(c))\n}", "title": "" }, { "docid": "074320bd4f5bb27a52ab3360fccbd684", "score": "0.5340658", "text": "func (r *Repository) GetAll() []*phone.Phone {\n\tdb, err := gorm.Open(\"postgres\", r.dbURL)\n\tif err != nil {\n\t\tlog.WithField(\"err\", err).Fatal(\"Could not open db\")\n\t}\n\tdefer db.Close()\n\tvar phones []*phone.Phone\n\tif err := db.Table(phoneNumberTable).Find(&phones).Error; err != nil {\n\t\tlog.WithField(\"err\", err).Fatal(\"Could not fetch phones from db\")\n\t}\n\treturn phones\n}", "title": "" }, { "docid": "90a1e5bbbb766b07ab300dd3f2f9073d", "score": "0.53398293", "text": "func GetProducts() ([]models.Product,error){\n\n\tfunction := \"GetProducts\"\n\n\tvar pg_conection PG_CONECTION\n\tproducts := make([]models.Product,0)\n\n\t//Nos conectamos a la base\n\terr := pg_conection.Connect()\n\n\t//Si obtuvimos un error\n\tif err != nil {\n\t\ttext := fmt.Sprintf(\"Error al conectarse a la base de datos\")\n\t\tlogger.Log(\"products.go\", function, text)\n\t\treturn nil,err\n\t} \n\n\t//Al finalizar la ejecucion se cierra la coneccion\n\tdefer pg_conection.Close()\n\n\t//Formamos la consulta a la base\n\tquery := \"select id, id_category,name,description,price,stock,image from products;\"\n\ttext := fmt.Sprintf(\"query = %s\", query)\n\tlogger.Log(\"products.go\", function, text)\n\n\t//Realizamos la query\n\trows, err := pg_conection.conection_pool.Query(context.Background(), query)\n\n\t//Si obtuvimos un error\n\tif err != nil {\n\n\t\ttext := fmt.Sprintf(\"Error al obtener los productos\")\n\t\tlogger.Log(\"products.go\", function, text)\n\t\treturn nil,err\n\t}\n\n\t//Se recorren los resultados\n\tdefer rows.Close()\n\tfor rows.Next() {\n\n\n\n\t\tvar product models.Product\n\t\terr := rows.Scan(&product.Id, &product.Id_category, &product.Name, &product.Description, &product.Price, &product.Stock, &product.Image)\n\n\t\tif err != nil {\n\t\t\ttext := fmt.Sprintf(\"Error al obtener los productos err = %s\", err.Error())\n\t\t\tlogger.Log(\"products.go\", function, text)\n\t\t\tbreak\n\t\t}\n\t\t\n\t\tproducts=append(products, product)\n\t}\n\n\treturn products,nil\n\n}", "title": "" }, { "docid": "97e5a7b89cd552867d5b4541f1aa336b", "score": "0.531701", "text": "func GetAll() []Post {\n\tdb := Open()\n\tvar posts []Post\n\tdb.Find(&posts)\n\treturn posts\n}", "title": "" }, { "docid": "68171db7552d61672c38e411ff8afb3c", "score": "0.5314789", "text": "func Apts() (apartas []Aparta, err error) {\n var apt Aparta\n stq := \"SELECT id, codigo, descripcion, created_at, updated_at FROM apartas order by codigo\"\n\trows, err := Db.Query(stq)\n\tif err != nil {\n\n\t\treturn\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&apt.Id, &apt.Codigo, &apt.Descripcion, &apt.CreatedAt, &apt.UpdatedAt); err != nil {\n\t\treturn\n\t\t}\n\t\tapartas = append(apartas, apt)\n\t}\n\treturn\n }", "title": "" }, { "docid": "68f1ddd053792961543865ef81a66d4d", "score": "0.53146315", "text": "func (s *Server) PedirPropuesta(ctx context.Context, message *Chunk) (*PropuestaRespuesta, error) {\n\t//aca falta agregar el richard\n\tflag1 := false\n\tflag2 := false\n\tflag3 := false\n\ti := 0\n\tvar dn1 []int\n\tvar dn2 []int\n\tvar dn3 []int\n\tconn, err := grpc.Dial(\":9090\", grpc.WithInsecure())\n\tif err != nil {\n\t\tlog.Println(\"Nodo 1 caido\")\n\t} else {\n\t\tflag1 = true\n\t}\n\tconn.Close()\n\n\tconn, err = grpc.Dial(\":8080\", grpc.WithInsecure())\n\tif err != nil {\n\t\tlog.Println(\"Nodo 2 caido\")\n\t} else {\n\t\tflag2 = true\n\t}\n\n\tconn.Close()\n\tconn, err = grpc.Dial(\":8000\", grpc.WithInsecure())\n\tif err != nil {\n\t\tlog.Println(\"Nodo 3 caido\")\n\t} else {\n\t\tflag3 = true\n\t}\n\tlargo, err := strconv.Atoi(message.Partestotales)\n\tconn.Close()\n\tfor i = 0; i < largo; i += 0 {\n\t\tif flag1 == false && flag2 == false && flag3 == false {\n\t\t\tlog.Println(\"Todos los nodos caidos\")\n\t\t\tbreak\n\t\t}\n\t\tif flag1 == true {\n\t\t\tif i == largo {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tdn1 = append(dn1, i)\n\t\t\ti++\n\t\t}\n\t\tif flag2 == true {\n\t\t\tif i == largo {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tdn2 = append(dn2, i)\n\t\t\ti++\n\t\t}\n\t\tif flag3 == true {\n\t\t\tif i == largo {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tdn3 = append(dn3, i)\n\t\t\ti++\n\t\t}\n\t}\n\tst1 := transformarArregloS(dn1)\n\tst2 := transformarArregloS(dn2)\n\tst3 := transformarArregloS(dn3)\n\trespuesta := PropuestaRespuesta{\n\t\tNombre: message.Nombre,\n\t\tTotal: message.Partestotales,\n\t\tNd1: st1,\n\t\tNd2: st2,\n\t\tNd3: st3,\n\t\tIntn1: strconv.Itoa(len(st1)),\n\t\tIntn2: strconv.Itoa(len(st2)),\n\t\tIntn3: strconv.Itoa(len(st3)),\n\t}\n\t//aca falta que la acepten y escribirla.\n\treturn &respuesta, nil\n}", "title": "" }, { "docid": "f83cfdc4f8495a86a28b1fd524454744", "score": "0.5304692", "text": "func (db *Database) GetAll(slice interface{}) *gorm.DB {\n return db.Connector.Find(slice)\n}", "title": "" }, { "docid": "4a565d864938507168d995464a1a1086", "score": "0.5293924", "text": "func FindAll() []P {\n\tconst concurrencyLimit = 10 // max number of concurrent workers\n\tpss, err := process.Processes()\n\tif err != nil {\n\t\treturn nil\n\t}\n\treturn findAll(pss, isGo, concurrencyLimit)\n}", "title": "" }, { "docid": "ca1334fe54d6036ca619b4548f7de340", "score": "0.5288426", "text": "func (q analyticQuery) AllP() AnalyticSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "bf150463ad3e98fe808a5e04643d8fe9", "score": "0.5284807", "text": "func GetAllUseres() []*UserDAL {\n\tuseres := []*UserDAL{}\n\tdb.DB().Find(&useres)\n\treturn useres\n}", "title": "" }, { "docid": "1e51e299b54addcf105203c34b840dbf", "score": "0.5274867", "text": "func (dao *TaskDAOSQL) GetAll() ([]model.Task, error) {\n\tvar tasks []model.Task\n\n\t// Collect all tasks identifiers\n\trows, err := dao.sqlSession.Query(\"SELECT * FROM task\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar task model.Task\n\n\t\terr = rows.Scan(&task.Id, &task.Title, &task.Description, &task.Status, &task.CreationDate, &task.ModificationDate)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\ttasks = append(tasks, task)\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "170e52b00ee50193deaa416f86e4c52e", "score": "0.52747875", "text": "func (q chartDatumQuery) AllP() ChartDatumSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "ce44a3a13e2b55b8fc151386a3103092", "score": "0.5270779", "text": "func APIProjetos(c echo.Context) error {\n\n\tquadros := acelerato.GerarDadosQuadros()\n\n\treturn c.JSON(http.StatusOK, quadros)\n}", "title": "" }, { "docid": "78159d325512f63d386fad94d1052c7a", "score": "0.52663195", "text": "func GetOffers() ([]models.Product,error){\n\n\tfunction := \"GetOffers\"\n\n\tvar pg_conection PG_CONECTION\n\tproducts := make([]models.Product,0)\n\n\t//Nos conectamos a la base\n\terr := pg_conection.Connect()\n\n\t//Si obtuvimos un error\n\tif err != nil {\n\t\ttext := fmt.Sprintf(\"Error al conectarse a la base de datos\")\n\t\tlogger.Log(\"products.go\", function, text)\n\t\treturn nil,err\n\t} \n\n\t//Al finalizar la ejecucion se cierra la coneccion\n\tdefer pg_conection.Close()\n\n\t//Formamos la consulta a la base\n\tquery := \"select p.id, p.id_category,p.name,p.description,p.price,p.stock,p.image from products as p inner join offers as o on o.id_product = p.id ;\"\n\ttext := fmt.Sprintf(\"query = %s\", query)\n\tlogger.Log(\"products.go\", function, text)\n\n\t//Realizamos la query\n\trows, err := pg_conection.conection_pool.Query(context.Background(), query)\n\n\t//Si obtuvimos un error\n\tif err != nil {\n\n\t\ttext := fmt.Sprintf(\"Error al obtener los productos\")\n\t\tlogger.Log(\"products.go\", function, text)\n\t\treturn nil,err\n\t}\n\n\t//Se recorren los resultados\n\tdefer rows.Close()\n\tfor rows.Next() {\n\n\n\n\t\tvar product models.Product\n\t\terr := rows.Scan(&product.Id, &product.Id_category, &product.Name, &product.Description, &product.Price, &product.Stock, &product.Image)\n\n\t\tif err != nil {\n\t\t\ttext := fmt.Sprintf(\"Error al obtener los productos err = %s\", err.Error())\n\t\t\tlogger.Log(\"products.go\", function, text)\n\t\t\tbreak\n\t\t}\n\t\t\n\t\tproducts=append(products, product)\n\t}\n\n\treturn products,nil\n\n}", "title": "" }, { "docid": "fcd43a38d23acca597d90cdb35190ba0", "score": "0.5248979", "text": "func (q platformQuery) AllP() PlatformSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "ea86e1f501b3ef8da69132f34f360beb", "score": "0.52386516", "text": "func (pg postgresProjectRepository) FindAll() ([]*pkgmodel.Project, error) {\n\trows, err := pg.connection.Query(\"SELECT id, title, uuid, creation_date, network FROM projects\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"no projects found: %s\", err)\n\t}\n\n\tvar projects []*pkgmodel.Project\n\tfor rows.Next() {\n\t\tcursor := pkgmodel.Project{}\n\t\terr := rows.Scan(&cursor.ID, &cursor.Title, &cursor.UUID, &cursor.CreationDate, &cursor.Network)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not map projects: %s\", err)\n\t\t}\n\t\tprojects = append(projects, &cursor)\n\t}\n\n\treturn projects, nil\n}", "title": "" }, { "docid": "1e40fc0558fa2d1232b38cbd013f09fe", "score": "0.5227408", "text": "func (m *Message) AllPEO() ([]*PEO, error) {\n\tpss, err := m.ParseAll(\"PEO\")\n\treturn pss.([]*PEO), err\n}", "title": "" }, { "docid": "7673282823ca976ce1a3b069f7a4005a", "score": "0.5226392", "text": "func (userRepository *UserRepository) GetUsers() []Pengguna {\n\tvar users []Pengguna\n\tvar user Pengguna\n\tsqlQuery := \"select id, email, nama_depan, nama_belakang, umur from pengguna\"\n\trows, err := userRepository.Database.Query(sqlQuery)\n\n\tif err != nil {\n\t\tfmt.Println(\"error when fetch users\")\n\t}\n\n\tfor rows.Next() {\n\t\terr = rows.Scan(\n\t\t\t&user.ID,\n\t\t\t&user.Email,\n\t\t\t&user.NamaDepan,\n\t\t\t&user.NamaBelakang,\n\t\t\t&user.Umur)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(\"error when scan users\")\n\t\t}\n\n\t\tusers = append(users, user)\n\t}\n\n\treturn users\n}", "title": "" }, { "docid": "091dfbd502a73f503d63562355172f40", "score": "0.5226296", "text": "func (user *User) GetAll() ([]User, *errors.ErrorRespond) {\n\t// ใช้ Prepare เพื่อตรวจสอบความถูกต้องของข้อมูลก่อนที่จะส่งไปทำการ process ที่ server เพื่อลดการทำงาน process ที่ฝั่ง server\n\tstmt, err := mysql_db.Client.Prepare(queryGetAllUsers)\n\tif err != nil {\n\t\tlogger.Error(\"Error on preparing get user statment\", err)\n\t\treturn nil, mysql_utils.PareError(err)\n\t}\n\tdefer stmt.Close()\n\n\trows, err := stmt.Query()\n\tif err != nil {\n\t\tlogger.Error(\"Error on query user statment\", err)\n\t\treturn nil, mysql_utils.PareError(err)\n\t}\n\tdefer rows.Close()\n\t// fmt.Println(results)\n\n\tresults := []User{}\n\tfor rows.Next() {\n\t\tvar user User\n\t\terr := rows.Scan(&user.Id, &user.FirstName, &user.LastName, &user.Email, &user.Avatar, &user.Status, &user.DateCreated)\n\t\tif err != nil {\n\t\t\tlogger.Error(\"Error on scan rows to user struct\", err)\n\t\t\treturn nil, mysql_utils.PareError(err)\n\t\t}\n\t\tresults = append(results, user)\n\t}\n\n\t// if results == 0 then return err not found\n\tif len(results) == 0 {\n\t\treturn nil, errors.NewNotFoundError(\"No user found\")\n\t}\n\t// Retrun results to request\n\treturn results, nil\n}", "title": "" }, { "docid": "ae62c53290d393f0085b6fd57e45d6fd", "score": "0.52126193", "text": "func (r *MediaRepo) GetAllP(MediasPerPage int, offset int) ([]entity.Media, error) {\n\tvar Medias []entity.Media\n\tvar err error\n\terr = r.db.Debug().Limit(MediasPerPage).Offset(offset).Order(\"created_at desc\").Find(&Medias).Error\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif gorm.IsRecordNotFoundError(err) {\n\t\treturn nil, errors.New(\"Media not found\")\n\t}\n\treturn Medias, nil\n}", "title": "" }, { "docid": "0db1388e18960e672760467e7c91f894", "score": "0.51990795", "text": "func (s *Postgres) GetAll() ([]Config, error) {\n\tconfigs := make([]Config, 0)\n\terr := s.db.Model(&configs).Select()\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"failed to get all configs\")\n\t}\n\treturn configs, err\n}", "title": "" }, { "docid": "e55cb2b38f221aa205995f887dc69281", "score": "0.51872283", "text": "func (client *GslbApplicationPersistenceProfileClient) GetAll() ([]*models.GslbApplicationPersistenceProfile, error) {\n\tvar plist []*models.GslbApplicationPersistenceProfile\n\terr := client.aviSession.GetCollection(client.getAPIPath(\"\"), &plist)\n\treturn plist, err\n}", "title": "" }, { "docid": "4d017347d4e679611bf10ef9110d1389", "score": "0.5184465", "text": "func GetAll(conn *gorm.DB) ([]Service, error) {\n\tresult := []Service{}\n\terr := conn.Find(&result).Error\n\treturn result, err\n}", "title": "" }, { "docid": "874b8a856da7538bb70331b4fbb3d323", "score": "0.5182359", "text": "func (p *Person) findAll(c *gin.Context) {\n\tpeople, err := p.Controller.FindAll()\n\tif err != nil {\n\t\tc.JSON(\n\t\t\thttp.StatusInternalServerError,\n\t\t\tgin.H{\n\t\t\t\t\"message\": \"Failed to find all people\",\n\t\t\t\t\"error\": err,\n\t\t\t})\n\t\treturn\n\t}\n\n\tif people == nil {\n\t\tc.JSON(\n\t\t\thttp.StatusNoContent,\n\t\t\tgin.H{\n\t\t\t\t\"message\": \"No people were found\",\n\t\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(\n\t\thttp.StatusOK,\n\t\tpeople,\n\t)\n}", "title": "" }, { "docid": "b29690ad86bee3497ef87c986cf6307a", "score": "0.5170834", "text": "func (s *PairService) GetAll() ([]types.Pair, error) {\n\treturn s.pairDao.GetAll()\n}", "title": "" }, { "docid": "0dc2d7dbcfea766394d6230a16e18ced", "score": "0.51688516", "text": "func (m *UsuarioDao) FindAll() ([]models.UsuarioEmpresa, error) {\n\tvar usuarios []models.UsuarioEmpresa\n\terr := usuariodb.C(UsuarioCOLLECTION).Find(bson.M{}).All(&usuarios)\n\treturn usuarios, err\n}", "title": "" }, { "docid": "0d8aa10e9d531e3afbb6f2b156822bb9", "score": "0.5156736", "text": "func getAllEventos(c *gin.Context) {\n\t//Encuentra todos los eventos\n\tvar eventos []EventoModel\n\tdb.Find(&eventos)\n\n\tif len(eventos) <= 0 {\n\t\tc.JSON(http.StatusNotFound, gin.H{\"status\": http.StatusNotFound, \"message\": \"¡Eventos no encontrados!\"})\n\t\treturn\n\t}\n\n\t//c.HTML(http.StatusOK,\"eventos.html\",gin.H{\"status\": http.StatusOK, \"data\": eventos})\n\t//c.JSON(http.StatusOK, gin.H{\"status\": http.StatusOK, \"data\": eventos})\n}", "title": "" }, { "docid": "e2408bb3eb8782e144ea43b1b44494c3", "score": "0.5144709", "text": "func (en Endpoints) GetByCreteria(ctx context.Context, creteria string) (e []io.Employee, error error) {\n\trequest := GetByCreteriaRequest{Creteria: creteria}\n\tresponse, err := en.GetByCreteriaEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(GetByCreteriaResponse).E, response.(GetByCreteriaResponse).Error\n}", "title": "" }, { "docid": "5ff0f6c67572a722ec5bee7775bf4bc4", "score": "0.5138292", "text": "func GetAllPolls(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\t// array of pointers so the loop modifies instead of clones\n\tpolls := []*model.Poll{}\n\tdb.Find(&polls)\n\n\tfor _, poll := range polls {\n\t\t// unmarshall each poll content\n\t\tif err := poll.UnmarshalContent(); err != nil {\n\t\t\trespondError(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\t}\n\trespondJSON(w, http.StatusOK, polls)\n}", "title": "" }, { "docid": "1c19f782f8c201cbbe0a5d30c510f1f3", "score": "0.51329166", "text": "func ListViaPostgres(w http.ResponseWriter, r *http.Request) {\n\tif r.Method == \"POST\" {\n\t\tvar rows []Model\n\t\tvar err error\n\t\tvar req builder.RequestAgGrid\n\n\t\terr = json.NewDecoder(r.Body).Decode(&req)\n\t\tif err != nil {\n\t\t\tlog.Println(err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t\t// buildSQL\n\t\tSQL := builder.PostgreSQL.Select(req, `\"public\".\"olympic_winners\"`)\n\t\tlog.Println(\"\\n\\n======= POSTGRE SQL =======\")\n\t\tlog.Println(SQL)\n\t\tlog.Println(\"======= END POSTGRE SQL ======\")\n\n\t\terr = dbPgsql.Select(&rows, SQL)\n\t\tif err != nil {\n\t\t\tlog.Println(err.Error())\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\trowsLength := len(rows)\n\t\trowCount := builder.MySQL.GetRowCount(req, rowsLength)\n\n\t\tresponse := ResponseAgGrid{\n\t\t\tLastRow: rowCount,\n\t\t\tRows: rows,\n\t\t}\n\n\t\tresult, err := json.Marshal(response)\n\t\tif err != nil {\n\t\t\tlog.Println(err.Error())\n\t\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tw.Write(result)\n\t\treturn\n\t}\n\n\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n}", "title": "" }, { "docid": "0d5c8d98c990d55237a4638297945d21", "score": "0.51295376", "text": "func AllEpics(c *gin.Context) {\n\tvar epics []model.Epic\n\tdatabase.DB.Order(\"title asc\").Find(&epics)\n\tc.JSON(http.StatusOK, epics)\n}", "title": "" }, { "docid": "2c0fb667edc7b5712304be212e482d4f", "score": "0.51286656", "text": "func (p *Point) Query() ([]*Point, error) {\n\tengineDb := db\n\tpoints := make([]*Point, 0, 10)\n\tp.Status = DataValidStatus\n\terr := engineDb.Find(&points, p).Error\n\treturn points, err\n}", "title": "" }, { "docid": "d7479de8b7f459187229b899cbead36d", "score": "0.5117598", "text": "func (c *CoproDocs) GetAll(CoproID int64, db *sql.DB) error {\n\trows, err := db.Query(`SELECT id,name,link FROM copro_doc WHERE copro_id=$1`, CoproID)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"select %v\", err)\n\t}\n\tdefer rows.Close()\n\tvar line CoproDoc\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&line.ID, &line.Name, &line.Link); err != nil {\n\t\t\treturn fmt.Errorf(\"scan %v\", err)\n\t\t}\n\t\tc.Lines = append(c.Lines, line)\n\t}\n\tif err = rows.Err(); err != nil {\n\t\treturn fmt.Errorf(\"Err %v\", err)\n\t}\n\tif len(c.Lines) == 0 {\n\t\tc.Lines = []CoproDoc{}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7204a50b408bde82a36f4fe7c7b5ca16", "score": "0.5099388", "text": "func (q productQuery) AllP() ProductSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "95bc8be5351dc0ace3b0c986c13a4ad4", "score": "0.50973964", "text": "func (db *DbResultRepo) FindAllByPlayerID(ctx context.Context, id int) ([]domain.Result, error) {\n\tvar results []domain.Result\n\t// TODO we are not using category and year\n\tq := `SELECT R.tempo, R.esercizi, R.punteggio, G.anno, G.categoria\n\t\t\tFROM Giocatore U\n\t\t\tJOIN Partecipazione P ON P.giocatore = U.id\n\t\t\tJOIN Risultato R ON R.id = P.risultato\n\t\t\tJOIN Giochi G ON G.id = P.giochi\n\t\t\tWHERE U.id = ?\n\t\t\t`\n\trows, err := db.dbHandler.Query(ctx, q, id)\n\tif err != nil {\n\t\treturn results, fmt.Errorf(\"Error getting results: %v\", err)\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tvar r domain.Result\n\t\terr := rows.Scan(r.Time, r.Exercises, r.Score)\n\t\tif err != nil {\n\t\t\treturn results, fmt.Errorf(\"Error getting results: %v\", err)\n\t\t}\n\t\tresults = append(results, r)\n\t}\n\treturn results, nil\n\n}", "title": "" }, { "docid": "5409675f6acb6d982d283e97339e95db", "score": "0.509736", "text": "func GetAllPsicologiaComposicionFamiliar(query map[string]string, fields []string, sortby []string, order []string,\n\toffset int64, limit int64) (ml []interface{}, err error) {\n\to := orm.NewOrm()\n\tqs := o.QueryTable(new(PsicologiaComposicionFamiliar))\n\tfor k, v := range query {\n\t\tk = strings.Replace(k, \".\", \"__\", -1)\n\t\tif strings.Contains(k, \"isnull\") {\n\t\t\tqs = qs.Filter(k, (v == \"true\" || v == \"1\"))\n\t\t} else {\n\t\t\tqs = qs.Filter(k, v)\n\t\t}\n\t}\n\tvar sortFields []string\n\tif len(sortby) != 0 {\n\t\tif len(sortby) == len(order) {\n\t\t\tfor i, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[i] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[i] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"error: Orden inválido, debe ser del tipo [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t\tqs = qs.OrderBy(sortFields...)\n\t\t} else if len(sortby) != len(order) && len(order) == 1 {\n\t\t\tfor _, v := range sortby {\n\t\t\t\torderby := \"\"\n\t\t\t\tif order[0] == \"desc\" {\n\t\t\t\t\torderby = \"-\" + v\n\t\t\t\t} else if order[0] == \"asc\" {\n\t\t\t\t\torderby = v\n\t\t\t\t} else {\n\t\t\t\t\treturn nil, errors.New(\"error: Orden inválido, debe ser del tipo [asc|desc]\")\n\t\t\t\t}\n\t\t\t\tsortFields = append(sortFields, orderby)\n\t\t\t}\n\t\t} else if len(sortby) != len(order) && len(order) != 1 {\n\t\t\treturn nil, errors.New(\"error: los tamaños de 'sortby', 'order' no coinciden o el tamaño de 'order' no es 1\")\n\t\t}\n\t} else {\n\t\tif len(order) != 0 {\n\t\t\treturn nil, errors.New(\"error: campos de 'order' no utilizados\")\n\t\t}\n\t}\n\tvar l []PsicologiaComposicionFamiliar\n\tqs = qs.OrderBy(sortFields...)\n\tif _, err = qs.Limit(limit, offset).All(&l, fields...); err == nil {\n\t\tif len(fields) == 0 {\n\t\t\tfor _, v := range l {\n\t\t\t\tml = append(ml, v)\n\t\t\t}\n\t\t} else {\n\t\t\tfor _, v := range l {\n\t\t\t\tm := make(map[string]interface{})\n\t\t\t\tval := reflect.ValueOf(v)\n\t\t\t\tfor _, fname := range fields {\n\t\t\t\t\tm[fname] = val.FieldByName(fname).Interface()\n\t\t\t\t}\n\t\t\t\tml = append(ml, m)\n\t\t\t}\n\t\t}\n\t\treturn ml, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "98a4ebc71a5557db386cb2726285ebb9", "score": "0.5096108", "text": "func ObtenerUsuarios() (Personas, error) {\n\tquery := `SELECT idpersona,nombre,paterno,materno,carnetidentidad,telefono,celular FROM persona`\n\n\trows, err := EjecutarQuery(query)\n\tdefer rows.Close()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tpersonas := Personas{}\n\tfor rows.Next() {\n\t\tpersona := Persona{}\n\t\trows.Scan(&persona.IDPersona, &persona.Nombre, &persona.Paterno, &persona.Materno, &persona.CarnetIdentidad, &persona.Telefono, &persona.Celular)\n\t\tpersonas = append(personas, persona)\n\t}\n\treturn personas, nil\n\n}", "title": "" }, { "docid": "8b9904218010aec70bfb581175b2171b", "score": "0.507409", "text": "func (pq *PetQuery) All(ctx context.Context) ([]*Pet, error) {\n\tctx = setContextOp(ctx, pq.ctx, \"All\")\n\tif err := pq.prepareQuery(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tqr := querierAll[[]*Pet, *PetQuery]()\n\treturn withInterceptors[[]*Pet](ctx, pq, qr, pq.inters)\n}", "title": "" }, { "docid": "bf7617d4f1507d38e31f0ca2ad6ca8ef", "score": "0.5070635", "text": "func GetsMahasiswa(db *sql.DB, limit, offset int, sort string) ([]*Mahasiswa, error) {\n\t// log.Println(\"limit and offset:\", limit, offset)\n\n\tquery := \"SELECT * FROM mahasiswa\"\n\n\tif sort != \"\" {\n\t\tquery = fmt.Sprintf(\"%s ORDER BY nama %s\", query, sort)\n\t}\n\n\tif limit > 0 || offset > 0 {\n\t\tquery = fmt.Sprintf(\"%s LIMIT %d OFFSET %d\", query, limit, offset)\n\t}\n\n\tresult := []*Mahasiswa{}\n\trows, err := db.Query(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor rows.Next() {\n\t\tmahasiswa := &Mahasiswa{}\n\t\tif err := rows.Scan(&mahasiswa.NPM, &mahasiswa.Nama, &mahasiswa.Kelas); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult = append(result, mahasiswa)\n\t}\n\treturn result, err\n}", "title": "" }, { "docid": "f4ede899007801cc51f8881704b20ba5", "score": "0.5066743", "text": "func ClientesPorPresupuestoByPresupuestoID(db XODB, presupuestoID int) (*ClientesPorPresupuesto, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`cliente_id, presupuesto_id ` +\n\t\t`FROM v1wq1ics1m037sn6.clientes_por_presupuesto ` +\n\t\t`WHERE presupuesto_id = ?`\n\n\t// run query\n\tXOLog(sqlstr, presupuestoID)\n\tcpp := ClientesPorPresupuesto{\n\t\t_exists: true,\n\t}\n\n\terr = db.QueryRow(sqlstr, presupuestoID).Scan(&cpp.ClienteID, &cpp.PresupuestoID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &cpp, nil\n}", "title": "" }, { "docid": "7342d297ee450f6901dbf720c1fd603c", "score": "0.50662524", "text": "func (db *DBORM) GetPromos() (products []models.Product, err error) {\n\n\tproducts = make([]models.Product, 0)\n\terr = db.conn.Where(\"promotion IS NOT NULL\").Find(&products).Error\n\treturn products, err\n}", "title": "" }, { "docid": "42762b81c22e27d409a4f803a8ab315f", "score": "0.50597006", "text": "func (s *service) List(ctx context.Context, e *empty.Empty) (*postgrescrud.ListPeopleResponse, error) {\n\t// initialize slice of pointers to person\n\tvar people []*postgrescrud.Person\n\t// pass this to gorm.Find() to fill it with results\n\terr := s.DB.Find(&people).Error\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn &postgrescrud.ListPeopleResponse{Peoples: people}, nil\n}", "title": "" }, { "docid": "ae35b71587a5cfc160abc8b37e881318", "score": "0.50568646", "text": "func QueryToFullExposicion(result *sql.Rows) ([]map[string]interface{}, error) {\n\tvar exposicionAux models.Exposicion\n\tvar tipoExpAux models.TiposExposiciones\n\tvar recipents []map[string]interface{}\n\tfor result.Next() {\n\t\terr := result.Scan(\n\t\t\t&exposicionAux.ID,\n\t\t\t&exposicionAux.Duracion,\n\t\t\t&exposicionAux.Titulo,\n\t\t\t&exposicionAux.Presentador,\n\t\t\t&tipoExpAux.Descripcion)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trecipents = append(recipents, map[string]interface{}{\n\t\t\t\"id\": exposicionAux.ID,\n\t\t\t\"duracion\": exposicionAux.Duracion,\n\t\t\t\"titulo\": exposicionAux.Titulo,\n\t\t\t\"presentador\": exposicionAux.Presentador,\n\t\t\t\"descripcion\": tipoExpAux.Descripcion,\n\t\t})\n\t}\n\treturn recipents, nil\n}", "title": "" }, { "docid": "a9c7750a11c835261a3a5125a6bb1da4", "score": "0.5049983", "text": "func returnAllUsers(w http.ResponseWriter, r *http.Request) {\n\tvar users Users\n\tvar arrUser []Users\n\tvar response Response\n\n\t// konek ke db\n\tdb := connect()\n\tdefer db.Close()\n\n\t// query untuk get data\n\trows, err := db.Query(\"Select id, nama, npm, jk from students\")\n\t// jika error\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\n\t// looping data\n\tfor rows.Next() {\n\t\tif err := rows.Scan(&users.Id, &users.Npm, &users.Nama, &users.Jk); err != nil {\n\t\t\tlog.Fatal(err.Error())\n\n\t\t} else {\n\t\t\tarrUser = append(arrUser, users)\n\t\t}\n\t}\n\n\t// tampilkan responnya\n\tresponse.Status = 1\n\tresponse.Message = \"Success\"\n\tresponse.Data = arrUser\n\n\t// tampilkan sebagai json\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(response)\n\n}", "title": "" }, { "docid": "44b6c0a7a2fee7c2edaf04ee7150381c", "score": "0.504084", "text": "func (s petService) List() ([]Pet, error) {\n\tdb := db.GetDB()\n\tvar u []Pet\n\tdb.Find(&u)\n\treturn u, nil\n}", "title": "" }, { "docid": "24201ef25f91e931360b529321c172ec", "score": "0.50316155", "text": "func ApartaByUserId(id uint32)(p Person, a Aparta, err error){\n\n stq := \"SELECT a.id, a.codigo, a.descripcion, p.fname, p.lname, p.email, p.mobil, p.tipo,p.photo from users u join persons p on u.person_id = p.id join apartas a on p.aparta_id = a.id where u.id = $1\"\n\n\trow := Db.QueryRow(stq, id)\n err = row.Scan(&a.Id, &a.Codigo, &a.Descripcion, &p.Fname, &p.Lname, &p.Email,&p.Mobil, &p.Tipo, &p.Photo)\n\tif err != nil {\n if err == sql.ErrNoRows {\n log.Println(\"No rows were returned!\")\n\t\t }else{\n log.Println(err)\n\t\t }\n }\n return\n }", "title": "" }, { "docid": "da0c4d1faaf4f009e600bd17190c0cae", "score": "0.50207067", "text": "func ConsultarRegistroDiario(w http.ResponseWriter, r *http.Request) {\n\tv := r.URL.Query()\n\tlog.Print(v)\n\n\tcondiciones := \"\"\n\n\tqueries := v.Get(\"query\")\n\tif queries != \"\" {\n\t\tparametos := strings.Split(queries, \",\")\n\t\tfor _, param := range parametos {\n\t\t\tval := strings.Split(param, \":\")\n\t\t\tif len(val) == 2 {\n\t\t\t\tif condiciones != \"\" {\n\t\t\t\t\tcondiciones = condiciones + \" AND \"\n\t\t\t\t} else {\n\t\t\t\t\tcondiciones = condiciones + \"WHERE \"\n\t\t\t\t}\n\t\t\t\tcondiciones = condiciones + \"registro_apoyo.\" + val[0] + \"=\" + val[1]\n\t\t\t}\n\t\t}\n\t}\n\tlog.Print(condiciones)\n\n\tsortBy := v.Get(\"sortby\")\n\torder := v.Get(\"order\")\n\tif sortBy != \"\" && (order == \"asc\" || order == \"desc\") {\n\t\tcondiciones += \" ORDER BY \" + sortBy + \" \" + order\n\t}\n\n\tlimite := v.Get(\"limit\")\n\tif limite != \"\" {\n\n\t\tif limite == \"-1\" {\n\t\t\tlimite = \"ALL\"\n\t\t}\n\t\tcondiciones += \" LIMIT \" + limite\n\t}\n\n\toffset := v.Get(\"offset\")\n\tif offset != \"\" {\n\t\tcondiciones += \" OFFSET \" + offset\n\t}\n\n\tlog.Print(condiciones)\n\n\ttickets, err := bd.ConsultarRegistroApoyo(condiciones)\n\tif err != nil {\n\t\thttp.Error(w, \"Ocurrio un error al intentar realziar el registro del periodo \"+err.Error(), 400)\n\t\treturn\n\t}\n\tw.Header().Set(\"content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(tickets)\n}", "title": "" }, { "docid": "98421006368559ba4af2654c7f00d0b5", "score": "0.50125974", "text": "func GetAll() []PermisosUriMgo {\n\tvar result []PermisosUriMgo\n\ts, PermisosUris, err := MoConexion.GetColectionMgo(MoVar.ColeccionPermisosUri)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\terr = PermisosUris.Find(nil).All(&result)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\ts.Close()\n\treturn result\n}", "title": "" }, { "docid": "4079ba44af321aeff59b542bad4abf6a", "score": "0.501136", "text": "func GetAll(tx *gorm.DB) []domain.User {\n\tvar rows []model\n\terr := tx.Table(table).\n\t\tDebug().\n\t\tScan(&rows).Error\n\n\tif gorm.IsRecordNotFoundError(err) {\n\t\treturn nil\n\t}\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar result []domain.User\n\tfor _, row := range rows {\n\t\ttemp := mapping(tx, &row)\n\t\tresult = append(result, *temp)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "e1d7240f4850d12ca4ef1abc6dfd72dc", "score": "0.5011088", "text": "func (ps PageStore) GetAll() ([]models.Page, error) {\n\tvar id uint\n\tvar title string\n\tvar body []byte\n\n\trows, err := ps.db.Query(GetAllPages)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar pages []models.Page\n\tfor rows.Next() {\n\t\terr := rows.Scan(&id, &title, &body)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err) // too severe\n\t\t}\n\t\t// p, err := models.NewPage(id, title, body)\n\t\tp := models.NewPage(id, title, body)\n\t\t// if err != nil {\n\t\t// \tlog.Printf(\"Error loading page id=%d: %s\", id, err)\n\t\t// }\n\t\tpages = append(pages, *p)\n\t}\n\treturn pages, nil\n}", "title": "" }, { "docid": "9ac06b3a156acaf8015506e87a1b88c1", "score": "0.50036293", "text": "func apiListPets(ctx *itineris.ApiContext, auth *itineris.ApiAuth, params *itineris.ApiParams) *itineris.ApiResult {\n pets, err := daoPet.GetAll()\n if err != nil {\n return itineris.NewApiResult(itineris.StatusErrorServer).SetMessage(err.Error())\n }\n result := make([]map[string]interface{}, 0)\n for _, p := range pets {\n result = append(result, p.ToMapHumanReadable())\n }\n return itineris.NewApiResult(itineris.StatusOk).SetData(result)\n}", "title": "" }, { "docid": "bd3d2f115e52df7cd246fbe3add5dbf4", "score": "0.50026906", "text": "func (q lengthClassQuery) AllP() LengthClassSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "d1505e901c0217682101243ed28daaa1", "score": "0.49993992", "text": "func (q organizationQuery) AllP() OrganizationSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "071dc74e8c17e06a6b39e1cef02c4dc6", "score": "0.49889818", "text": "func (p *PaymentRatios) GetAll(db *sql.DB) (err error) {\n\trows, err := db.Query(`SELECT id,payment_types_id,ratio,index FROM payment_ratios`)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar r PaymentRatio\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tif err = rows.Scan(&r.ID, &r.PaymentTypeID, &r.Ratio, &r.Index); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tp.PaymentRatios = append(p.PaymentRatios, r)\n\t}\n\terr = rows.Err()\n\tif len(p.PaymentRatios) == 0 {\n\t\tp.PaymentRatios = []PaymentRatio{}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "9621b18b1a232dde8d8ceabac4995981", "score": "0.49888763", "text": "func (q chargeQuery) AllP() ChargeSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "f117a9e2690b064dbc418feaa64f4581", "score": "0.4985711", "text": "func GetAllHackathon() []Hackathon {\n\to := orm.NewOrm()\n\tvar hackathons []Hackathon\n\n\t_, err := o.Raw(\"SELECT * FROM hackathon\").QueryRows(&hackathons)\n\tif err == nil {\n\t}\n\treturn hackathons\n}", "title": "" }, { "docid": "df8658fc3abd7be9b8cf7e5a560dabb3", "score": "0.4983928", "text": "func GetAll(db *database.DB) ([]User, error) {\n\tquery := `SELECT id, password, email FROM users`\n\n\ttarget := []User{}\n\n\terr := db.Select(&target, query)\n\tif err != nil {\n\t\treturn target, err\n\t}\n\n\tif len(target) == 0 {\n\t\treturn target, sql.ErrNoRows\n\t}\n\n\treturn target, nil\n}", "title": "" }, { "docid": "847922fbaae53e9b2ab35780dd2e0337", "score": "0.49791303", "text": "func (*service) FindAll() ([]entity.Post, error) {\n\n\treturn repo.FindAll()\n\n}", "title": "" }, { "docid": "f494fb3feb42202f652cf51f3b7bdd81", "score": "0.49774837", "text": "func GetPersonAitiseis(idint int, c chan []models.Aitisi) {\n\tvar aitisi models.Aitisi\n\tvar aitiseis []models.Aitisi\n\tdb, _ := datastorage.GetDataRouter().GetDb(\"common\")\n\tdbc := db.GetMysqlClient()\n\tres, err := dbc.Query(\"SELECT * FROM aitiseis where idperson = ? ORDER BY id DESC LIMIT 5\", idint)\n\tdefer res.Close()\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc <- nil\n\t}\n\tfor res.Next() {\n\t\t_ = res.Scan(\n\t\t\t&aitisi.ID,\n\t\t\t&aitisi.Perigrafi,\n\t\t\t&aitisi.IDPerson,\n\t\t\t&aitisi.Date,\n\t\t)\n\t\taitisi.Date = models.DateBuilder(aitisi.Date)\n\t\taitiseis = append(aitiseis, aitisi)\n\t}\n\tc <- aitiseis\n}", "title": "" }, { "docid": "ce029d35f7a3057615a2006d25ac75fd", "score": "0.49684155", "text": "func (playersService *PlayersService) GetAll(sport string) (*ObjectResponse, error) {\n\tpath := fmt.Sprintf(\"players/%s\", sport)\n\treq, err := playersService.client.newRequest(\"GET\", path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := playersService.client.doWithObjectResponse(req)\n\treturn resp, err\n}", "title": "" }, { "docid": "476a6a5344e5672cab5ccb0c283b30c5", "score": "0.49634355", "text": "func (ms *MongoStore) Veiculos() (veiculos model.Veiculos, err error) {\n\n\tcur, err := ms.db.Collection(\"veiculos\").Find(ms.ctx, bson.D{})\n\tif err != nil {\n\t\treturn\n\t}\n\tfor cur.Next(ms.ctx) {\n\t\tvar veiculo model.Veiculo\n\t\terr = cur.Decode(&veiculo)\n\t\tif err != nil {\n\t\t\tveiculos = model.Veiculos{}\n\t\t\treturn\n\t\t}\n\t\tveiculos = append(veiculos, veiculo)\n\t}\n\treturn\n}", "title": "" }, { "docid": "bbb33b05363f3924fd14813e0f368499", "score": "0.49633455", "text": "func getAllSongs() ([]Song, error) {\n // create the postgres db connection\n db := createConnection()\n\n // close the db connection\n defer db.Close()\n\n var songs []Song\n\n // create the select sql query\n sqlStatement := `SELECT * FROM songs`\n\n // execute the sql statement\n rows, err := db.Query(sqlStatement)\n\n if err != nil {\n log.Fatalf(\"Unable to execute the query. %v\", err)\n }\n\n // close the statement\n defer rows.Close()\n\n // iterate over the rows\n for rows.Next() {\n var song Song\n\n // unmarshal the row object to user\n err = rows.Scan(&song.ID, &song.Name, &song.Singer, &song.Genre)\n\n if err != nil {\n log.Fatalf(\"Unable to scan the row. %v\", err)\n }\n\n // append the user in the users slice\n songs = append(songs, song)\n\n }\n\n // return empty user on error\n return songs, err\n}", "title": "" }, { "docid": "078d965b4b473810a5073cb12f0c4c3f", "score": "0.49614847", "text": "func (m MgoMan) GetAll(database string, table string, filter bson.M, opts *options.FindOptions) ([]bson.Raw, error) { //([]interface{}, error)\n\tclient, err := mongo.NewClient(options.Client().ApplyURI(m.mongoDBHost))\n\tif err != nil {\n\t\tlog.Errorln(\"[0211cgo.002] \", err)\n\t}\n\tctx, cancel := context.WithTimeout(context.Background(), 20*time.Second)\n\tdefer cancel()\n\terr = client.Connect(ctx)\n\n\tif err != nil {\n\t\tlog.Errorln(\"[124121] \", err)\n\t\treturn nil, err\n\t}\n\n\tdefer client.Disconnect(ctx)\n\tctx, cancel = context.WithTimeout(context.Background(), 20*time.Second)\n\tdefer cancel()\n\terr = client.Ping(ctx, readpref.Primary())\n\n\tif err != nil {\n\t\tlog.Errorln(\"[124122] \", err)\n\t\treturn nil, err\n\t}\n\n\t//findOptions := options.Find()\n\t//findOptions.SetLimit(limit)\n\n\tvar results []bson.Raw\n\n\tctx, cancel = context.WithTimeout(context.Background(), 20*time.Second)\n\tdefer cancel()\n\tcollection := client.Database(database).Collection(table)\n\n\tcur, err := collection.Find(ctx, filter, opts)\n\tif err != nil {\n\t\tlog.Errorln(\"[12413] \", err)\n\t\treturn nil, err\n\t}\n\n\tctx, cancel = context.WithTimeout(context.Background(), 30*time.Second)\n\tdefer cancel()\n\tfor cur.Next(ctx) {\n\t\tleItem := cur.Current\n\t\tresults = append(results, leItem)\n\t}\n\n\tif err := cur.Err(); err != nil {\n\t\tlog.Errorln(\"[124124] \", err)\n\t\treturn nil, err\n\t}\n\n\tcur.Close(ctx)\n\n\treturn results, nil\n}", "title": "" }, { "docid": "b5658624f0528aa54057f9a63a74f538", "score": "0.4960773", "text": "func GetAll() []model.Patient {\n\t//initialize a slice model to get data\n\tvar Patients []model.Patient\n\t//gets the cursos with data\n\tcursor, err := patientC.Find(nil, bson.D{})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer cursor.Close(nil)\n\t// loop throght the cursor decoding the data and append it to the slice model\n\tfor cursor.Next(nil) {\n\t\tvar patient model.Patient\n\t\terr = cursor.Decode(&patient)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tPatients = append(Patients, patient)\n\t}\n\tif err := cursor.Err(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t//returns the slice model\n\treturn Patients\n}", "title": "" }, { "docid": "917eeaf2aefe4a629d2efc15f3c983e2", "score": "0.49576777", "text": "func (s *server) SeguirPaquete(ctx context.Context, in *pb.RespuestaPedido) (*pb.RespuestaPedido, error) {\n\tlog.Printf(\"Pedido %s solicita seguimiento\\n\", in.GetSeguimiento())\n\treturn &pb.RespuestaPedido{Seguimiento: pedidos[in.GetSeguimiento()][1]}, nil\n}", "title": "" }, { "docid": "dc6302e966286cf61bfdcc0bb0ee0728", "score": "0.49457818", "text": "func (q tagUseQuery) AllP() TagUseSlice {\n\to, err := q.All()\n\tif err != nil {\n\t\tpanic(boil.WrapErr(err))\n\t}\n\n\treturn o\n}", "title": "" }, { "docid": "9d7d347cd08c409a1166eb9c7e164775", "score": "0.49386016", "text": "func (testApp *TestApp) GetAll(out interface{}, preloads []string, whereClause string, whereParams []interface{}, orderBy string) error {\n\tdb := testApp.application.DB\n\tfor _, preload := range preloads {\n\t\tdb = db.Preload(preload)\n\t}\n\tif strings.TrimSpace(whereClause) != \"\" {\n\t\tdb = db.Where(whereClause, whereParams...)\n\t}\n\tif strings.TrimSpace(orderBy) != \"\" {\n\t\tdb = db.Order(orderBy)\n\t}\n\treturn db.Find(out).Error\n}", "title": "" } ]
9626dbf61220724f9a19ffd14d7d7bd3
UnmarshalBinary uses the data passed byte array to set all the internal properties of the AssetSetRange type
[ { "docid": "d79a8820bc62f8801f5d0629803010bc", "score": "0.8087035", "text": "func (target *AssetSetRange) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AssetSetRange. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.assets = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]*AssetSet) ---\n\t\tb := buff.ReadInt() // array len\n\t\ta := make([]*AssetSet, b)\n\t\tfor i := 0; i < b; i++ {\n\t\t\tvar c *AssetSet\n\t\t\tif buff.ReadUInt8() == uint8(0) {\n\t\t\t\tc = nil\n\t\t\t} else {\n\t\t\t\t// --- [begin][read][struct](AssetSet) ---\n\t\t\t\td := &AssetSet{}\n\t\t\t\te := buff.ReadInt() // byte array length\n\t\t\t\tf := buff.ReadBytes(e) // byte array\n\t\t\t\terrA := d.UnmarshalBinary(f)\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn errA\n\t\t\t\t}\n\t\t\t\tc = d\n\t\t\t\t// --- [end][read][struct](AssetSet) ---\n\n\t\t\t}\n\t\t\ta[i] = c\n\t\t}\n\t\ttarget.assets = a\n\t\t// --- [end][read][slice]([]*AssetSet) ---\n\n\t}\n\tg := buff.ReadString() // read string\n\ttarget.FromStore = g\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "e836426d597b014217328cdf90b01036", "score": "0.74303967", "text": "func (target *AllocationSetRange) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AllocationSetRange. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.allocations = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]*AllocationSet) ---\n\t\tb := buff.ReadInt() // array len\n\t\ta := make([]*AllocationSet, b)\n\t\tfor i := 0; i < b; i++ {\n\t\t\tvar c *AllocationSet\n\t\t\tif buff.ReadUInt8() == uint8(0) {\n\t\t\t\tc = nil\n\t\t\t} else {\n\t\t\t\t// --- [begin][read][struct](AllocationSet) ---\n\t\t\t\td := &AllocationSet{}\n\t\t\t\te := buff.ReadInt() // byte array length\n\t\t\t\tf := buff.ReadBytes(e) // byte array\n\t\t\t\terrA := d.UnmarshalBinary(f)\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn errA\n\t\t\t\t}\n\t\t\t\tc = d\n\t\t\t\t// --- [end][read][struct](AllocationSet) ---\n\n\t\t\t}\n\t\t\ta[i] = c\n\t\t}\n\t\ttarget.allocations = a\n\t\t// --- [end][read][slice]([]*AllocationSet) ---\n\n\t}\n\tg := buff.ReadString() // read string\n\ttarget.FromStore = g\n\n\treturn nil\n}", "title": "" }, { "docid": "83fcdfa7c3d557e151066f66f5910c31", "score": "0.71228224", "text": "func (target *AssetSet) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AssetSet. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.aggregateBy = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\tb := buff.ReadInt() // array len\n\t\ta := make([]string, b)\n\t\tfor i := 0; i < b; i++ {\n\t\t\tvar c string\n\t\t\td := buff.ReadString() // read string\n\t\t\tc = d\n\n\t\t\ta[i] = c\n\t\t}\n\t\ttarget.aggregateBy = a\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.assets = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]Asset) ---\n\t\tf := buff.ReadInt() // map len\n\t\te := make(map[string]Asset, f)\n\t\tfor j := 0; j < f; j++ {\n\t\t\tvar v string\n\t\t\tg := buff.ReadString() // read string\n\t\t\tv = g\n\n\t\t\tvar z Asset\n\t\t\tif buff.ReadUInt8() == uint8(0) {\n\t\t\t\tz = nil\n\t\t\t} else {\n\t\t\t\t// --- [begin][read][interface](Asset) ---\n\t\t\t\th := buff.ReadString()\n\t\t\t\t_, k, _ := resolveType(h)\n\t\t\t\tif _, ok := typeMap[k]; !ok {\n\t\t\t\t\treturn fmt.Errorf(\"Unknown Type: %s\", k)\n\t\t\t\t}\n\t\t\t\tl, okA := reflect.New(typeMap[k]).Interface().(interface{ UnmarshalBinary([]byte) error })\n\t\t\t\tif !okA {\n\t\t\t\t\treturn fmt.Errorf(\"Type: %s does not implement UnmarshalBinary([]byte) error\", k)\n\t\t\t\t}\n\t\t\t\tm := buff.ReadInt() // byte array length\n\t\t\t\tn := buff.ReadBytes(m) // byte array\n\t\t\t\terrA := l.UnmarshalBinary(n)\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn errA\n\t\t\t\t}\n\t\t\t\tz = l.(Asset)\n\t\t\t\t// --- [end][read][interface](Asset) ---\n\n\t\t\t}\n\t\t\te[v] = z\n\t\t}\n\t\ttarget.assets = e\n\t\t// --- [end][read][map](map[string]Asset) ---\n\n\t}\n\to := buff.ReadString() // read string\n\ttarget.FromSource = o\n\n\t// --- [begin][read][struct](Window) ---\n\tp := &Window{}\n\tq := buff.ReadInt() // byte array length\n\tr := buff.ReadBytes(q) // byte array\n\terrB := p.UnmarshalBinary(r)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.Window = *p\n\t// --- [end][read][struct](Window) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Warnings = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\tt := buff.ReadInt() // array len\n\t\ts := make([]string, t)\n\t\tfor ii := 0; ii < t; ii++ {\n\t\t\tvar u string\n\t\t\tw := buff.ReadString() // read string\n\t\t\tu = w\n\n\t\t\ts[ii] = u\n\t\t}\n\t\ttarget.Warnings = s\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Errors = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\ty := buff.ReadInt() // array len\n\t\tx := make([]string, y)\n\t\tfor jj := 0; jj < y; jj++ {\n\t\t\tvar aa string\n\t\t\tbb := buff.ReadString() // read string\n\t\t\taa = bb\n\n\t\t\tx[jj] = aa\n\t\t}\n\t\ttarget.Errors = x\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5aee7a3fc1064b1c05bd466e0d00e668", "score": "0.66649437", "text": "func (target *AllocationSet) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AllocationSet. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.allocations = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]*Allocation) ---\n\t\tb := buff.ReadInt() // map len\n\t\ta := make(map[string]*Allocation, b)\n\t\tfor i := 0; i < b; i++ {\n\t\t\tvar v string\n\t\t\tc := buff.ReadString() // read string\n\t\t\tv = c\n\n\t\t\tvar z *Allocation\n\t\t\tif buff.ReadUInt8() == uint8(0) {\n\t\t\t\tz = nil\n\t\t\t} else {\n\t\t\t\t// --- [begin][read][struct](Allocation) ---\n\t\t\t\td := &Allocation{}\n\t\t\t\te := buff.ReadInt() // byte array length\n\t\t\t\tf := buff.ReadBytes(e) // byte array\n\t\t\t\terrA := d.UnmarshalBinary(f)\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn errA\n\t\t\t\t}\n\t\t\t\tz = d\n\t\t\t\t// --- [end][read][struct](Allocation) ---\n\n\t\t\t}\n\t\t\ta[v] = z\n\t\t}\n\t\ttarget.allocations = a\n\t\t// --- [end][read][map](map[string]*Allocation) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.externalKeys = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]bool) ---\n\t\th := buff.ReadInt() // map len\n\t\tg := make(map[string]bool, h)\n\t\tfor j := 0; j < h; j++ {\n\t\t\tvar vv string\n\t\t\tk := buff.ReadString() // read string\n\t\t\tvv = k\n\n\t\t\tvar zz bool\n\t\t\tl := buff.ReadBool() // read bool\n\t\t\tzz = l\n\n\t\t\tg[vv] = zz\n\t\t}\n\t\ttarget.externalKeys = g\n\t\t// --- [end][read][map](map[string]bool) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.idleKeys = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]bool) ---\n\t\tn := buff.ReadInt() // map len\n\t\tm := make(map[string]bool, n)\n\t\tfor ii := 0; ii < n; ii++ {\n\t\t\tvar vvv string\n\t\t\to := buff.ReadString() // read string\n\t\t\tvvv = o\n\n\t\t\tvar zzz bool\n\t\t\tp := buff.ReadBool() // read bool\n\t\t\tzzz = p\n\n\t\t\tm[vvv] = zzz\n\t\t}\n\t\ttarget.idleKeys = m\n\t\t// --- [end][read][map](map[string]bool) ---\n\n\t}\n\tq := buff.ReadString() // read string\n\ttarget.FromSource = q\n\n\t// --- [begin][read][struct](Window) ---\n\tr := &Window{}\n\ts := buff.ReadInt() // byte array length\n\tt := buff.ReadBytes(s) // byte array\n\terrB := r.UnmarshalBinary(t)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.Window = *r\n\t// --- [end][read][struct](Window) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Warnings = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\tw := buff.ReadInt() // array len\n\t\tu := make([]string, w)\n\t\tfor jj := 0; jj < w; jj++ {\n\t\t\tvar x string\n\t\t\ty := buff.ReadString() // read string\n\t\t\tx = y\n\n\t\t\tu[jj] = x\n\t\t}\n\t\ttarget.Warnings = u\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Errors = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\tbb := buff.ReadInt() // array len\n\t\taa := make([]string, bb)\n\t\tfor iii := 0; iii < bb; iii++ {\n\t\t\tvar cc string\n\t\t\tdd := buff.ReadString() // read string\n\t\t\tcc = dd\n\n\t\t\taa[iii] = cc\n\t\t}\n\t\ttarget.Errors = aa\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a5297e15fffceca76a08edacdecaf6af", "score": "0.60740256", "text": "func (target *ClusterManagement) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling ClusterManagement. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar a map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ta = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tc := buff.ReadInt() // map len\n\t\tb := make(map[string]string, c)\n\t\tfor i := 0; i < c; i++ {\n\t\t\tvar v string\n\t\t\td := buff.ReadString() // read string\n\t\t\tv = d\n\n\t\t\tvar z string\n\t\t\te := buff.ReadString() // read string\n\t\t\tz = e\n\n\t\t\tb[v] = z\n\t\t}\n\t\ta = b\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(a)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\tf := &AssetProperties{}\n\t\tg := buff.ReadInt() // byte array length\n\t\th := buff.ReadBytes(g) // byte array\n\t\terrA := f.UnmarshalBinary(h)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = f\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][struct](Window) ---\n\tk := &Window{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.window = *k\n\t// --- [end][read][struct](Window) ---\n\n\tn := buff.ReadFloat64() // read float64\n\ttarget.Cost = n\n\n\treturn nil\n}", "title": "" }, { "docid": "dad54d9514b68025647cb3d8cb3067ab", "score": "0.60636055", "text": "func (target *Cloud) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Cloud. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar a map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ta = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tc := buff.ReadInt() // map len\n\t\tb := make(map[string]string, c)\n\t\tfor i := 0; i < c; i++ {\n\t\t\tvar v string\n\t\t\td := buff.ReadString() // read string\n\t\t\tv = d\n\n\t\t\tvar z string\n\t\t\te := buff.ReadString() // read string\n\t\t\tz = e\n\n\t\t\tb[v] = z\n\t\t}\n\t\ta = b\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(a)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\tf := &AssetProperties{}\n\t\tg := buff.ReadInt() // byte array length\n\t\th := buff.ReadBytes(g) // byte array\n\t\terrA := f.UnmarshalBinary(h)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = f\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.Cost = u\n\n\tw := buff.ReadFloat64() // read float64\n\ttarget.Credit = w\n\n\treturn nil\n}", "title": "" }, { "docid": "a8a20742af67c620c55331566b87a23a", "score": "0.59299177", "text": "func (target *AssetSetRange) MarshalBinary() (data []byte, err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBuffer()\n\tbuff.WriteUInt8(CodecVersion) // version\n\n\tif target.assets == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][slice]([]*AssetSet) ---\n\t\tbuff.WriteInt(len(target.assets)) // array length\n\t\tfor i := 0; i < len(target.assets); i++ {\n\t\t\tif target.assets[i] == nil {\n\t\t\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t\t\t} else {\n\t\t\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t\t\t// --- [begin][write][struct](AssetSet) ---\n\t\t\t\ta, errA := target.assets[i].MarshalBinary()\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn nil, errA\n\t\t\t\t}\n\t\t\t\tbuff.WriteInt(len(a))\n\t\t\t\tbuff.WriteBytes(a)\n\t\t\t\t// --- [end][write][struct](AssetSet) ---\n\n\t\t\t}\n\t\t}\n\t\t// --- [end][write][slice]([]*AssetSet) ---\n\n\t}\n\tbuff.WriteString(target.FromStore) // write string\n\treturn buff.Bytes(), nil\n}", "title": "" }, { "docid": "7697ddd90486dca9d520b93ae39656ac", "score": "0.5787134", "text": "func (target *Disk) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Disk. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar a map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ta = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tc := buff.ReadInt() // map len\n\t\tb := make(map[string]string, c)\n\t\tfor i := 0; i < c; i++ {\n\t\t\tvar v string\n\t\t\td := buff.ReadString() // read string\n\t\t\tv = d\n\n\t\t\tvar z string\n\t\t\te := buff.ReadString() // read string\n\t\t\tz = e\n\n\t\t\tb[v] = z\n\t\t}\n\t\ta = b\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(a)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\tf := &AssetProperties{}\n\t\tg := buff.ReadInt() // byte array length\n\t\th := buff.ReadBytes(g) // byte array\n\t\terrA := f.UnmarshalBinary(h)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = f\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.Cost = u\n\n\tw := buff.ReadFloat64() // read float64\n\ttarget.ByteHours = w\n\n\tx := buff.ReadFloat64() // read float64\n\ttarget.Local = x\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Breakdown = nil\n\t} else {\n\t\t// --- [begin][read][struct](Breakdown) ---\n\t\ty := &Breakdown{}\n\t\taa := buff.ReadInt() // byte array length\n\t\tbb := buff.ReadBytes(aa) // byte array\n\t\terrE := y.UnmarshalBinary(bb)\n\t\tif errE != nil {\n\t\t\treturn errE\n\t\t}\n\t\ttarget.Breakdown = y\n\t\t// --- [end][read][struct](Breakdown) ---\n\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a6d036e67bc8e6288351f9e4ca59264a", "score": "0.5660534", "text": "func (target *SharedAsset) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling SharedAsset. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\ta := &AssetProperties{}\n\t\tb := buff.ReadInt() // byte array length\n\t\tc := buff.ReadBytes(b) // byte array\n\t\terrA := a.UnmarshalBinary(c)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = a\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar d map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\td = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tf := buff.ReadInt() // map len\n\t\te := make(map[string]string, f)\n\t\tfor i := 0; i < f; i++ {\n\t\t\tvar v string\n\t\t\tg := buff.ReadString() // read string\n\t\t\tv = g\n\n\t\t\tvar z string\n\t\t\th := buff.ReadString() // read string\n\t\t\tz = h\n\n\t\t\te[v] = z\n\t\t}\n\t\td = e\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(d)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tk := &Window{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.window = *k\n\t// --- [end][read][struct](Window) ---\n\n\tn := buff.ReadFloat64() // read float64\n\ttarget.Cost = n\n\n\treturn nil\n}", "title": "" }, { "docid": "2d468543659bd8a5c4b220e82513a4c1", "score": "0.56579065", "text": "func (target *LoadBalancer) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling LoadBalancer. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\ta := &AssetProperties{}\n\t\tb := buff.ReadInt() // byte array length\n\t\tc := buff.ReadBytes(b) // byte array\n\t\terrA := a.UnmarshalBinary(c)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = a\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar d map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\td = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tf := buff.ReadInt() // map len\n\t\te := make(map[string]string, f)\n\t\tfor i := 0; i < f; i++ {\n\t\t\tvar v string\n\t\t\tg := buff.ReadString() // read string\n\t\t\tv = g\n\n\t\t\tvar z string\n\t\t\th := buff.ReadString() // read string\n\t\t\tz = h\n\n\t\t\te[v] = z\n\t\t}\n\t\td = e\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(d)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.Cost = u\n\n\treturn nil\n}", "title": "" }, { "docid": "8191cc80e3478ff35ef98b815b679e73", "score": "0.5651869", "text": "func (target *AssetProperties) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AssetProperties. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\ta := buff.ReadString() // read string\n\ttarget.Category = a\n\n\tb := buff.ReadString() // read string\n\ttarget.Provider = b\n\n\tc := buff.ReadString() // read string\n\ttarget.Account = c\n\n\td := buff.ReadString() // read string\n\ttarget.Project = d\n\n\te := buff.ReadString() // read string\n\ttarget.Service = e\n\n\tf := buff.ReadString() // read string\n\ttarget.Cluster = f\n\n\tg := buff.ReadString() // read string\n\ttarget.Name = g\n\n\th := buff.ReadString() // read string\n\ttarget.ProviderID = h\n\n\treturn nil\n}", "title": "" }, { "docid": "464d3986c89b7a6acd8c01e3920e649b", "score": "0.55724525", "text": "func (target *Any) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Any. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar a map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ta = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tc := buff.ReadInt() // map len\n\t\tb := make(map[string]string, c)\n\t\tfor i := 0; i < c; i++ {\n\t\t\tvar v string\n\t\t\td := buff.ReadString() // read string\n\t\t\tv = d\n\n\t\t\tvar z string\n\t\t\te := buff.ReadString() // read string\n\t\t\tz = e\n\n\t\t\tb[v] = z\n\t\t}\n\t\ta = b\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(a)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\tf := &AssetProperties{}\n\t\tg := buff.ReadInt() // byte array length\n\t\th := buff.ReadBytes(g) // byte array\n\t\terrA := f.UnmarshalBinary(h)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = f\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.Cost = u\n\n\treturn nil\n}", "title": "" }, { "docid": "4dc04448da353345f024188aafab27f3", "score": "0.55026275", "text": "func DecodeBinarySet(attr dynamodb.AttributeValue) [][]byte {\n\treturn attr.BS\n}", "title": "" }, { "docid": "38f6e0d104d0751a8183be5b2cb39b3e", "score": "0.5455959", "text": "func (family *AssetFamily) Unmarshal(data []byte) error {\n\t*family = AssetFamily(data[0])\n\treturn nil\n}", "title": "" }, { "docid": "455901ec42123a4d2ed3d6cc8692070e", "score": "0.5421682", "text": "func (share *RKGShare) UnmarshalBinary(data []byte) (err error) {\n\tshare.Value = make([][2]rlwe.PolyQP, data[0])\n\tptr := 1\n\tvar inc int\n\tfor i := range share.Value {\n\t\tif inc, err = share.Value[i][0].DecodePolyNew(data[ptr:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tptr += inc\n\n\t\tif inc, err = share.Value[i][1].DecodePolyNew(data[ptr:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tptr += inc\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "46777d44c2800796f47581bde5e3c56e", "score": "0.54208535", "text": "func (target *Network) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Network. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\ta := &AssetProperties{}\n\t\tb := buff.ReadInt() // byte array length\n\t\tc := buff.ReadBytes(b) // byte array\n\t\terrA := a.UnmarshalBinary(c)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = a\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar d map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\td = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tf := buff.ReadInt() // map len\n\t\te := make(map[string]string, f)\n\t\tfor i := 0; i < f; i++ {\n\t\t\tvar v string\n\t\t\tg := buff.ReadString() // read string\n\t\t\tv = g\n\n\t\t\tvar z string\n\t\t\th := buff.ReadString() // read string\n\t\t\tz = h\n\n\t\t\te[v] = z\n\t\t}\n\t\td = e\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(d)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.Cost = u\n\n\treturn nil\n}", "title": "" }, { "docid": "33d80aae4176e4e3cb39d029fc1d2b1f", "score": "0.53466326", "text": "func (target *AllocationSetRange) MarshalBinary() (data []byte, err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBuffer()\n\tbuff.WriteUInt8(CodecVersion) // version\n\n\tif target.allocations == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][slice]([]*AllocationSet) ---\n\t\tbuff.WriteInt(len(target.allocations)) // array length\n\t\tfor i := 0; i < len(target.allocations); i++ {\n\t\t\tif target.allocations[i] == nil {\n\t\t\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t\t\t} else {\n\t\t\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t\t\t// --- [begin][write][struct](AllocationSet) ---\n\t\t\t\ta, errA := target.allocations[i].MarshalBinary()\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn nil, errA\n\t\t\t\t}\n\t\t\t\tbuff.WriteInt(len(a))\n\t\t\t\tbuff.WriteBytes(a)\n\t\t\t\t// --- [end][write][struct](AllocationSet) ---\n\n\t\t\t}\n\t\t}\n\t\t// --- [end][write][slice]([]*AllocationSet) ---\n\n\t}\n\tbuff.WriteString(target.FromStore) // write string\n\treturn buff.Bytes(), nil\n}", "title": "" }, { "docid": "cae8abe8a02b5c9e6206664020be3ef9", "score": "0.5335908", "text": "func (target *Node) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Node. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AssetProperties) ---\n\t\ta := &AssetProperties{}\n\t\tb := buff.ReadInt() // byte array length\n\t\tc := buff.ReadBytes(b) // byte array\n\t\terrA := a.UnmarshalBinary(c)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.properties = a\n\t\t// --- [end][read][struct](AssetProperties) ---\n\n\t}\n\t// --- [begin][read][alias](AssetLabels) ---\n\tvar d map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\td = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tf := buff.ReadInt() // map len\n\t\te := make(map[string]string, f)\n\t\tfor i := 0; i < f; i++ {\n\t\t\tvar v string\n\t\t\tg := buff.ReadString() // read string\n\t\t\tv = g\n\n\t\t\tvar z string\n\t\t\th := buff.ReadString() // read string\n\t\t\tz = h\n\n\t\t\te[v] = z\n\t\t}\n\t\td = e\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.labels = AssetLabels(d)\n\t// --- [end][read][alias](AssetLabels) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tk := &time.Time{}\n\tl := buff.ReadInt() // byte array length\n\tm := buff.ReadBytes(l) // byte array\n\terrB := k.UnmarshalBinary(m)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.start = *k\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tn := &time.Time{}\n\to := buff.ReadInt() // byte array length\n\tp := buff.ReadBytes(o) // byte array\n\terrC := n.UnmarshalBinary(p)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.end = *n\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][struct](Window) ---\n\tq := &Window{}\n\tr := buff.ReadInt() // byte array length\n\ts := buff.ReadBytes(r) // byte array\n\terrD := q.UnmarshalBinary(s)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.window = *q\n\t// --- [end][read][struct](Window) ---\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.adjustment = t\n\n\tu := buff.ReadString() // read string\n\ttarget.NodeType = u\n\n\tw := buff.ReadFloat64() // read float64\n\ttarget.CPUCoreHours = w\n\n\tx := buff.ReadFloat64() // read float64\n\ttarget.RAMByteHours = x\n\n\ty := buff.ReadFloat64() // read float64\n\ttarget.GPUHours = y\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.CPUBreakdown = nil\n\t} else {\n\t\t// --- [begin][read][struct](Breakdown) ---\n\t\taa := &Breakdown{}\n\t\tbb := buff.ReadInt() // byte array length\n\t\tcc := buff.ReadBytes(bb) // byte array\n\t\terrE := aa.UnmarshalBinary(cc)\n\t\tif errE != nil {\n\t\t\treturn errE\n\t\t}\n\t\ttarget.CPUBreakdown = aa\n\t\t// --- [end][read][struct](Breakdown) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.RAMBreakdown = nil\n\t} else {\n\t\t// --- [begin][read][struct](Breakdown) ---\n\t\tdd := &Breakdown{}\n\t\tee := buff.ReadInt() // byte array length\n\t\tff := buff.ReadBytes(ee) // byte array\n\t\terrF := dd.UnmarshalBinary(ff)\n\t\tif errF != nil {\n\t\t\treturn errF\n\t\t}\n\t\ttarget.RAMBreakdown = dd\n\t\t// --- [end][read][struct](Breakdown) ---\n\n\t}\n\tgg := buff.ReadFloat64() // read float64\n\ttarget.CPUCost = gg\n\n\thh := buff.ReadFloat64() // read float64\n\ttarget.GPUCost = hh\n\n\tkk := buff.ReadFloat64() // read float64\n\ttarget.GPUCount = kk\n\n\tll := buff.ReadFloat64() // read float64\n\ttarget.RAMCost = ll\n\n\tmm := buff.ReadFloat64() // read float64\n\ttarget.Discount = mm\n\n\tnn := buff.ReadFloat64() // read float64\n\ttarget.Preemptible = nn\n\n\treturn nil\n}", "title": "" }, { "docid": "cead9dfc6718d44810c9ad7e86ed9b83", "score": "0.5296945", "text": "func (ts *TimeSeries) UnmarshalBinary(data []byte) error {\n\tb := make([]byte, len(data))\n\tcopy(b, data)\n\tts.b = b\n\titr := ts.Iter()\n\tfor itr.Next() {\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c8e59ba3f0baf2c5cfd7dd54569b76b1", "score": "0.52857953", "text": "func (target *RawAllocationOnlyData) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling RawAllocationOnlyData. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\ta := buff.ReadFloat64() // read float64\n\ttarget.CPUCoreUsageMax = a\n\n\tb := buff.ReadFloat64() // read float64\n\ttarget.RAMBytesUsageMax = b\n\n\treturn nil\n}", "title": "" }, { "docid": "eba3e1b4abd98787ae6c7a9d453b9ca2", "score": "0.5256591", "text": "func (target *AllocationProperties) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling AllocationProperties. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\ta := buff.ReadString() // read string\n\ttarget.Cluster = a\n\n\tb := buff.ReadString() // read string\n\ttarget.Node = b\n\n\tc := buff.ReadString() // read string\n\ttarget.Container = c\n\n\td := buff.ReadString() // read string\n\ttarget.Controller = d\n\n\te := buff.ReadString() // read string\n\ttarget.ControllerKind = e\n\n\tf := buff.ReadString() // read string\n\ttarget.Namespace = f\n\n\tg := buff.ReadString() // read string\n\ttarget.Pod = g\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Services = nil\n\t} else {\n\t\t// --- [begin][read][slice]([]string) ---\n\t\tk := buff.ReadInt() // array len\n\t\th := make([]string, k)\n\t\tfor i := 0; i < k; i++ {\n\t\t\tvar l string\n\t\t\tm := buff.ReadString() // read string\n\t\t\tl = m\n\n\t\t\th[i] = l\n\t\t}\n\t\ttarget.Services = h\n\t\t// --- [end][read][slice]([]string) ---\n\n\t}\n\tn := buff.ReadString() // read string\n\ttarget.ProviderID = n\n\n\t// --- [begin][read][alias](AllocationLabels) ---\n\tvar o map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\to = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tq := buff.ReadInt() // map len\n\t\tp := make(map[string]string, q)\n\t\tfor j := 0; j < q; j++ {\n\t\t\tvar v string\n\t\t\tr := buff.ReadString() // read string\n\t\t\tv = r\n\n\t\t\tvar z string\n\t\t\ts := buff.ReadString() // read string\n\t\t\tz = s\n\n\t\t\tp[v] = z\n\t\t}\n\t\to = p\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.Labels = AllocationLabels(o)\n\t// --- [end][read][alias](AllocationLabels) ---\n\n\t// --- [begin][read][alias](AllocationAnnotations) ---\n\tvar t map[string]string\n\tif buff.ReadUInt8() == uint8(0) {\n\t\tt = nil\n\t} else {\n\t\t// --- [begin][read][map](map[string]string) ---\n\t\tw := buff.ReadInt() // map len\n\t\tu := make(map[string]string, w)\n\t\tfor ii := 0; ii < w; ii++ {\n\t\t\tvar vv string\n\t\t\tx := buff.ReadString() // read string\n\t\t\tvv = x\n\n\t\t\tvar zz string\n\t\t\ty := buff.ReadString() // read string\n\t\t\tzz = y\n\n\t\t\tu[vv] = zz\n\t\t}\n\t\tt = u\n\t\t// --- [end][read][map](map[string]string) ---\n\n\t}\n\ttarget.Annotations = AllocationAnnotations(t)\n\t// --- [end][read][alias](AllocationAnnotations) ---\n\n\treturn nil\n}", "title": "" }, { "docid": "f90e4902297beb1ae4460a58673908f7", "score": "0.52289337", "text": "func (rtks *RotationKeySet) UnmarshalBinary(data []byte) (err error) {\n\n\trtks.Keys = make(map[uint64]*SwitchingKey)\n\n\tfor len(data) > 0 {\n\n\t\tgalEl := uint64(binary.BigEndian.Uint32(data))\n\t\tdata = data[4:]\n\n\t\tswk := new(SwitchingKey)\n\t\tvar inc int\n\t\tif inc, err = swk.decode(data); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdata = data[inc:]\n\t\trtks.Keys[galEl] = swk\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e502d5398f67f3878276c69dfd2282b4", "score": "0.5203344", "text": "func (target *Allocation) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Allocation. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\ta := buff.ReadString() // read string\n\ttarget.Name = a\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.Properties = nil\n\t} else {\n\t\t// --- [begin][read][struct](AllocationProperties) ---\n\t\tb := &AllocationProperties{}\n\t\tc := buff.ReadInt() // byte array length\n\t\td := buff.ReadBytes(c) // byte array\n\t\terrA := b.UnmarshalBinary(d)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.Properties = b\n\t\t// --- [end][read][struct](AllocationProperties) ---\n\n\t}\n\t// --- [begin][read][struct](Window) ---\n\te := &Window{}\n\tf := buff.ReadInt() // byte array length\n\tg := buff.ReadBytes(f) // byte array\n\terrB := e.UnmarshalBinary(g)\n\tif errB != nil {\n\t\treturn errB\n\t}\n\ttarget.Window = *e\n\t// --- [end][read][struct](Window) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\th := &time.Time{}\n\tk := buff.ReadInt() // byte array length\n\tl := buff.ReadBytes(k) // byte array\n\terrC := h.UnmarshalBinary(l)\n\tif errC != nil {\n\t\treturn errC\n\t}\n\ttarget.Start = *h\n\t// --- [end][read][reference](time.Time) ---\n\n\t// --- [begin][read][reference](time.Time) ---\n\tm := &time.Time{}\n\tn := buff.ReadInt() // byte array length\n\to := buff.ReadBytes(n) // byte array\n\terrD := m.UnmarshalBinary(o)\n\tif errD != nil {\n\t\treturn errD\n\t}\n\ttarget.End = *m\n\t// --- [end][read][reference](time.Time) ---\n\n\tp := buff.ReadFloat64() // read float64\n\ttarget.CPUCoreHours = p\n\n\tq := buff.ReadFloat64() // read float64\n\ttarget.CPUCoreRequestAverage = q\n\n\tr := buff.ReadFloat64() // read float64\n\ttarget.CPUCoreUsageAverage = r\n\n\ts := buff.ReadFloat64() // read float64\n\ttarget.CPUCost = s\n\n\tt := buff.ReadFloat64() // read float64\n\ttarget.CPUCostAdjustment = t\n\n\tu := buff.ReadFloat64() // read float64\n\ttarget.GPUHours = u\n\n\tw := buff.ReadFloat64() // read float64\n\ttarget.GPUCost = w\n\n\tx := buff.ReadFloat64() // read float64\n\ttarget.GPUCostAdjustment = x\n\n\ty := buff.ReadFloat64() // read float64\n\ttarget.NetworkTransferBytes = y\n\n\taa := buff.ReadFloat64() // read float64\n\ttarget.NetworkReceiveBytes = aa\n\n\tbb := buff.ReadFloat64() // read float64\n\ttarget.NetworkCost = bb\n\n\tcc := buff.ReadFloat64() // read float64\n\ttarget.NetworkCostAdjustment = cc\n\n\tdd := buff.ReadFloat64() // read float64\n\ttarget.LoadBalancerCost = dd\n\n\tee := buff.ReadFloat64() // read float64\n\ttarget.LoadBalancerCostAdjustment = ee\n\n\t// --- [begin][read][alias](PVAllocations) ---\n\tvar ff map[PVKey]*PVAllocation\n\tif buff.ReadUInt8() == uint8(0) {\n\t\tff = nil\n\t} else {\n\t\t// --- [begin][read][map](map[PVKey]*PVAllocation) ---\n\t\thh := buff.ReadInt() // map len\n\t\tgg := make(map[PVKey]*PVAllocation, hh)\n\t\tfor i := 0; i < hh; i++ {\n\t\t\t// --- [begin][read][struct](PVKey) ---\n\t\t\tkk := &PVKey{}\n\t\t\tll := buff.ReadInt() // byte array length\n\t\t\tmm := buff.ReadBytes(ll) // byte array\n\t\t\terrE := kk.UnmarshalBinary(mm)\n\t\t\tif errE != nil {\n\t\t\t\treturn errE\n\t\t\t}\n\t\t\tv := *kk\n\t\t\t// --- [end][read][struct](PVKey) ---\n\n\t\t\tvar z *PVAllocation\n\t\t\tif buff.ReadUInt8() == uint8(0) {\n\t\t\t\tz = nil\n\t\t\t} else {\n\t\t\t\t// --- [begin][read][struct](PVAllocation) ---\n\t\t\t\tnn := &PVAllocation{}\n\t\t\t\too := buff.ReadInt() // byte array length\n\t\t\t\tpp := buff.ReadBytes(oo) // byte array\n\t\t\t\terrF := nn.UnmarshalBinary(pp)\n\t\t\t\tif errF != nil {\n\t\t\t\t\treturn errF\n\t\t\t\t}\n\t\t\t\tz = nn\n\t\t\t\t// --- [end][read][struct](PVAllocation) ---\n\n\t\t\t}\n\t\t\tgg[v] = z\n\t\t}\n\t\tff = gg\n\t\t// --- [end][read][map](map[PVKey]*PVAllocation) ---\n\n\t}\n\ttarget.PVs = PVAllocations(ff)\n\t// --- [end][read][alias](PVAllocations) ---\n\n\tqq := buff.ReadFloat64() // read float64\n\ttarget.PVCostAdjustment = qq\n\n\trr := buff.ReadFloat64() // read float64\n\ttarget.RAMByteHours = rr\n\n\tss := buff.ReadFloat64() // read float64\n\ttarget.RAMBytesRequestAverage = ss\n\n\ttt := buff.ReadFloat64() // read float64\n\ttarget.RAMBytesUsageAverage = tt\n\n\tuu := buff.ReadFloat64() // read float64\n\ttarget.RAMCost = uu\n\n\tww := buff.ReadFloat64() // read float64\n\ttarget.RAMCostAdjustment = ww\n\n\txx := buff.ReadFloat64() // read float64\n\ttarget.SharedCost = xx\n\n\tyy := buff.ReadFloat64() // read float64\n\ttarget.ExternalCost = yy\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.RawAllocationOnly = nil\n\t} else {\n\t\t// --- [begin][read][struct](RawAllocationOnlyData) ---\n\t\taaa := &RawAllocationOnlyData{}\n\t\tbbb := buff.ReadInt() // byte array length\n\t\tccc := buff.ReadBytes(bbb) // byte array\n\t\terrG := aaa.UnmarshalBinary(ccc)\n\t\tif errG != nil {\n\t\t\treturn errG\n\t\t}\n\t\ttarget.RawAllocationOnly = aaa\n\t\t// --- [end][read][struct](RawAllocationOnlyData) ---\n\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6055d727517c89b3cbbe7051b33daff1", "score": "0.51861244", "text": "func (o *Shard) UnmarshalBinary(data []byte) error {\n\treturn json.Unmarshal(data, o)\n}", "title": "" }, { "docid": "81de087af13c81337826b80f532c6e45", "score": "0.51478785", "text": "func (target *PVAllocation) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling PVAllocation. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\ta := buff.ReadFloat64() // read float64\n\ttarget.ByteHours = a\n\n\tb := buff.ReadFloat64() // read float64\n\ttarget.Cost = b\n\n\treturn nil\n}", "title": "" }, { "docid": "84911007b8ffad69d73d3d56d23fd755", "score": "0.5116313", "text": "func (bz *Bytes) Unmarshal(data []byte) error {\n\t*bz = data\n\treturn nil\n}", "title": "" }, { "docid": "72684b989e22a4b675277966cc162fb6", "score": "0.5086032", "text": "func (m *MichelineSeq) UnmarshalBinary([]byte) error {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "a893b33df85856c388c1eb2d17aa3002", "score": "0.5057379", "text": "func (t *temperature) UnmarshalBinary(in byte) {\n\t*t = temperature(in/2) - 20\n}", "title": "" }, { "docid": "27739f01a861ba86088cbd3fd81f397b", "score": "0.50468993", "text": "func (m *MichelineBytes) UnmarshalBinary([]byte) error {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "3b2e64b91d571fa0e2486d8fac450ad8", "score": "0.50235176", "text": "func (t *Base) UnmarshalBinary(data []byte) error {\n\tfields := bytes.Split(data, []byte{'-'})\n\tl := len(fields)\n\tif l < 3 {\n\t\treturn errors.New(\"invalid token\")\n\t}\n\n\tversion, err := strconv.ParseInt(string(fields[l-1]), 10, 64)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt.Version = int8(version)\n\n\tcreateAt, err := strconv.ParseInt(string(fields[l-2]), 10, 64)\n\tif err != nil {\n\t\treturn err\n\t}\n\tt.CreateAt = createAt\n\n\tt.Namespace = bytes.Join(fields[:l-2], []byte(\"\"))\n\n\treturn nil\n}", "title": "" }, { "docid": "fa0d3ba9a63d7eb0d52f9ba1ce2935cf", "score": "0.50189406", "text": "func (r *DescriptorRange) UnmarshalJSON(data []byte) error {\n\tvar unmarshalled interface{}\n\tif err := json.Unmarshal(data, &unmarshalled); err != nil {\n\t\treturn err\n\t}\n\n\tswitch v := unmarshalled.(type) {\n\tcase float64:\n\t\tr.Value = int(v)\n\tcase []interface{}:\n\t\tif len(v) != 2 {\n\t\t\treturn fmt.Errorf(\"expected [begin,end] integer range, got: %v\", unmarshalled)\n\t\t}\n\t\tr.Value = []int{\n\t\t\tint(v[0].(float64)),\n\t\t\tint(v[1].(float64)),\n\t\t}\n\tdefault:\n\t\treturn fmt.Errorf(\"invalid descriptor range value: %v\", unmarshalled)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4c6fe16fc95da39542117297d1cfe67b", "score": "0.50127935", "text": "func (avsc *APIVersionSetContract) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"properties\":\n\t\t\tif v != nil {\n\t\t\t\tvar APIVersionSetContractProperties APIVersionSetContractProperties\n\t\t\t\terr = json.Unmarshal(*v, &APIVersionSetContractProperties)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tavsc.APIVersionSetContractProperties = &APIVersionSetContractProperties\n\t\t\t}\n\t\tcase \"id\":\n\t\t\tif v != nil {\n\t\t\t\tvar ID string\n\t\t\t\terr = json.Unmarshal(*v, &ID)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tavsc.ID = &ID\n\t\t\t}\n\t\tcase \"name\":\n\t\t\tif v != nil {\n\t\t\t\tvar name string\n\t\t\t\terr = json.Unmarshal(*v, &name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tavsc.Name = &name\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tif v != nil {\n\t\t\t\tvar typeVar string\n\t\t\t\terr = json.Unmarshal(*v, &typeVar)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tavsc.Type = &typeVar\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e27c72db877a452e0ffea6395a0c8bfd", "score": "0.49868846", "text": "func (s *Source) UnmarshalBinary(data []byte) error {\n\tswitch {\n\tcase len(data) != marshalSize:\n\t\treturn errors.New(\"unmarshal xoshiro256: incorrect data length\")\n\tcase string(data[:len(header)]) != header:\n\t\treturn errors.New(\"unmarshal xoshiro256: incorrect header\")\n\t}\n\n\tdata = data[len(header):]\n\tfor i := range s.S {\n\t\ts.S[i] = binary.LittleEndian.Uint64(data)\n\t\tdata = data[8:]\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3a18b342498a339436860f805655ff72", "score": "0.49814546", "text": "func (bz *HexBytes) Unmarshal(data []byte) error {\n\t*bz = data\n\treturn nil\n}", "title": "" }, { "docid": "c82d375c1974cb718f67a6988247d2c0", "score": "0.49680626", "text": "func (v *SourceRange) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjsonC5a4559bDecodeGithubComKnqChromedpCdpCss9(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "a188309f7631b8452229c6daf274349a", "score": "0.49553743", "text": "func (obj *BlobAttribute) UnmarshalBinary(data []byte) error {\n\t// A simple encoding: plain text.\n\tb := bytes.NewBuffer(data)\n\t_, err := fmt.Fscanln(b, &obj.owner, &obj.AttrDesc, &obj.AttrValue, &obj.IsModified, &obj.entityId, &obj.isCached)\n\tif err != nil {\n\t\tlogger.Error(fmt.Sprintf(\"ERROR: Returning BlobAttribute:UnmarshalBinary w/ Error: '%+v'\", err.Error()))\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ebc825b835a0bb0143b3715d02fbd308", "score": "0.49541843", "text": "func (tag *Tag) UnmarshalBinary(data []byte) (err error) {\n\tdec := gob.NewDecoder(bytes.NewReader(data))\n\tif err = dec.Decode(&tag.PCBits); err != nil {\n\t\treturn\n\t}\n\tif err = dec.Decode(&tag.EPC); err != nil {\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "dc57da45991bbeee874166109fbddef4", "score": "0.49491236", "text": "func (a *Sources) UnmarshalBinary(buf []byte) error {\n\tvar pb internal.Measurements\n\tif err := proto.Unmarshal(buf, &pb); err != nil {\n\t\treturn err\n\t}\n\t*a = make(Sources, len(pb.GetItems()))\n\tfor i := range pb.GetItems() {\n\t\tmm, err := decodeMeasurement(pb.GetItems()[i])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t(*a)[i] = mm\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "91f2ec25ff6ae31137b468c93469b4c2", "score": "0.49325317", "text": "func (o *Object) UnmarshalBinary(b []byte) error {\n\tif l := len(b); l < objLenMin {\n\t\treturn ErrTooShortToParse\n\t}\n\to.TagNumber = b[0] >> 4\n\to.TagClass = IntToBool(int(b[0]) & 0x8 >> 3)\n\to.Length = b[0] & 0x7\n\n\tif l := len(b); l < int(o.Length) {\n\t\treturn ErrTooShortToParse\n\t}\n\n\to.Data = b[1:o.Length]\n\n\treturn nil\n}", "title": "" }, { "docid": "febf1306544ec6d16607971e9f1f3596", "score": "0.493113", "text": "func (target *AssetSet) MarshalBinary() (data []byte, err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBuffer()\n\tbuff.WriteUInt8(CodecVersion) // version\n\n\tif target.aggregateBy == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][slice]([]string) ---\n\t\tbuff.WriteInt(len(target.aggregateBy)) // array length\n\t\tfor i := 0; i < len(target.aggregateBy); i++ {\n\t\t\tbuff.WriteString(target.aggregateBy[i]) // write string\n\t\t}\n\t\t// --- [end][write][slice]([]string) ---\n\n\t}\n\tif target.assets == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][map](map[string]Asset) ---\n\t\tbuff.WriteInt(len(target.assets)) // map length\n\t\tfor v, z := range target.assets {\n\t\t\tbuff.WriteString(v) // write string\n\t\t\tif z == nil {\n\t\t\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t\t\t} else {\n\t\t\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t\t\t// --- [begin][write][interface](Asset) ---\n\t\t\t\ta := reflect.ValueOf(z).Interface()\n\t\t\t\tb, okA := a.(encoding.BinaryMarshaler)\n\t\t\t\tif !okA {\n\t\t\t\t\treturn nil, fmt.Errorf(\"Type: %s does not implement encoding.BinaryMarshaler\", typeToString(z))\n\t\t\t\t}\n\t\t\t\tc, errA := b.MarshalBinary()\n\t\t\t\tif errA != nil {\n\t\t\t\t\treturn nil, errA\n\t\t\t\t}\n\t\t\t\tbuff.WriteString(typeToString(z))\n\t\t\t\tbuff.WriteInt(len(c))\n\t\t\t\tbuff.WriteBytes(c)\n\t\t\t\t// --- [end][write][interface](Asset) ---\n\n\t\t\t}\n\t\t}\n\t\t// --- [end][write][map](map[string]Asset) ---\n\n\t}\n\tbuff.WriteString(target.FromSource) // write string\n\t// --- [begin][write][struct](Window) ---\n\td, errB := target.Window.MarshalBinary()\n\tif errB != nil {\n\t\treturn nil, errB\n\t}\n\tbuff.WriteInt(len(d))\n\tbuff.WriteBytes(d)\n\t// --- [end][write][struct](Window) ---\n\n\tif target.Warnings == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][slice]([]string) ---\n\t\tbuff.WriteInt(len(target.Warnings)) // array length\n\t\tfor j := 0; j < len(target.Warnings); j++ {\n\t\t\tbuff.WriteString(target.Warnings[j]) // write string\n\t\t}\n\t\t// --- [end][write][slice]([]string) ---\n\n\t}\n\tif target.Errors == nil {\n\t\tbuff.WriteUInt8(uint8(0)) // write nil byte\n\t} else {\n\t\tbuff.WriteUInt8(uint8(1)) // write non-nil byte\n\n\t\t// --- [begin][write][slice]([]string) ---\n\t\tbuff.WriteInt(len(target.Errors)) // array length\n\t\tfor ii := 0; ii < len(target.Errors); ii++ {\n\t\t\tbuff.WriteString(target.Errors[ii]) // write string\n\t\t}\n\t\t// --- [end][write][slice]([]string) ---\n\n\t}\n\treturn buff.Bytes(), nil\n}", "title": "" }, { "docid": "065a14bfeb5a3e40327a67596e7da5a4", "score": "0.49265966", "text": "func Unmarshal(b []byte, val interface{}) ([]byte, error)", "title": "" }, { "docid": "a20e35ae68b56bca4266829d8c4cb307", "score": "0.4906549", "text": "func (b *ABlockHeader) UnmarshalBinary(data []byte) (err error) {\n\t_, err = b.UnmarshalBinaryData(data)\n\treturn\n}", "title": "" }, { "docid": "0792c5560328bfbb758003c0e7e4c3c9", "score": "0.49032107", "text": "func (e *brkEntry) UnmarshalBinary(data []byte) error {\n\trw := readwriter.New(data)\n\trw.Read(func(data []byte) { e.BrokerIndex = binary.BigEndian.Uint16(data) })\n\trw.Read(func(data []byte) {\n\t\te.DevAddr = make([]byte, len(data))\n\t\tcopy(e.DevAddr, data)\n\t})\n\trw.TryRead(func(data []byte) error { return e.until.UnmarshalBinary(data) })\n\treturn rw.Err()\n}", "title": "" }, { "docid": "f871760736513fcc67a14a346736af69", "score": "0.48936856", "text": "func (i *Int) UnmarshalBinary(data []byte) error {\n\tif len(data) == 0 {\n\t\treturn errors.New(\"data must contain a sign byte\")\n\t}\n\ti.abs.SetBytes(data[1:])\n\ti.sign = Choice(data[0] & 1)\n\treturn nil\n}", "title": "" }, { "docid": "0297c55958af7429962b8976f47be545", "score": "0.48731118", "text": "func (omci *SetTableRequest) DecodeFromBytes(data []byte, p gopacket.PacketBuilder) error {\n\t// Only supported in the Extended message set\n\tif !omci.Extended {\n\t\treturn me.NewNotSupportedError(\"baseline message set not supported by SetTable Message-Type\")\n\t}\n\t// Common ClassID/EntityID decode in msgBase\n\thdrSize := 6 + 2\n\n\tif len(data) < hdrSize {\n\t\tp.SetTruncated()\n\t\treturn errors.New(\"frame too small\")\n\t} // Common ClassID/EntityID decode in msgBase\n\terr := omci.MeBasePacket.DecodeFromBytes(data, p, 6+2)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmeDefinition, omciErr := me.LoadManagedEntityDefinition(omci.EntityClass,\n\t\tme.ParamData{EntityID: omci.EntityInstance})\n\tif omciErr.StatusCode() != me.Success {\n\t\treturn omciErr.GetError()\n\t}\n\t// ME needs to support SetTable\n\tif !me.SupportsMsgType(meDefinition, me.SetTable) {\n\t\treturn me.NewProcessingError(\"managed entity does not support SetTable Message-Type\")\n\t}\n\toffset := hdrSize - 2\n\tomci.AttributeMask = binary.BigEndian.Uint16(data[offset:])\n\n\t// Only a single attribute bit can be set\n\tif bits.OnesCount16(omci.AttributeMask) != 1 {\n\t\treturn me.NewProcessingError(\"only a single attribute can be specified for the SetTable Message-Type\")\n\t}\n\t// Attribute decode\n\tomci.Attributes, err = meDefinition.DecodeAttributes(omci.AttributeMask, data[hdrSize:], p, byte(SetTableRequestType))\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Validate that the selected attribute support write and is a table\n\tfor attrName := range omci.Attributes {\n\t\tattr, err := me.GetAttributeDefinitionByName(meDefinition.GetAttributeDefinitions(), attrName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif attr.Index != 0 && attr.Mask == omci.AttributeMask {\n\t\t\tif !me.SupportsAttributeAccess(*attr, me.Write) {\n\t\t\t\tmsg := fmt.Sprintf(\"attribute '%v' does not support write access\", attrName)\n\t\t\t\treturn me.NewProcessingError(msg)\n\t\t\t}\n\t\t\tif !attr.IsTableAttribute() {\n\t\t\t\tmsg := fmt.Sprintf(\"attribute '%v' must be a table attribute for a SetTable Message-Type\", attrName)\n\t\t\t\treturn me.NewProcessingError(msg)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tif eidDef, eidDefOK := meDefinition.GetAttributeDefinitions()[0]; eidDefOK {\n\t\tomci.Attributes[eidDef.GetName()] = omci.EntityInstance\n\t\treturn nil\n\t}\n\treturn me.NewProcessingError(\"All Managed Entities have an EntityID attribute\")\n}", "title": "" }, { "docid": "9a726fbcb9e3edf28859981089708ce2", "score": "0.48656425", "text": "func (m *ObjectLocation) Unmarshal(data []byte) error {\n\tif len(data) < m.ProtoSize() {\n\t\tpanic(\"invalid byte slice\")\n\t}\n\tcopy(m[:], data)\n\treturn nil\n}", "title": "" }, { "docid": "1ce92f0321b6b71bf45fefa4231f1f3a", "score": "0.48585573", "text": "func (m *KeyGen2) UnmarshalBinary(data []byte) error {\n\tif len(data) != sizeKeygen2 {\n\t\treturn fmt.Errorf(\"msg2: %w\", ErrInvalidMessage)\n\t}\n\n\t_, err := m.Share.SetCanonicalBytes(data)\n\treturn err\n}", "title": "" }, { "docid": "05cdd69ed090028b57578393b3e45c2b", "score": "0.48520094", "text": "func (o *IPRanges) UnmarshalJSON(bytes []byte) (err error) {\n\traw := map[string]interface{}{}\n\tall := struct {\n\t\tAgents *IPPrefixesAgents `json:\"agents,omitempty\"`\n\t\tApi *IPPrefixesAPI `json:\"api,omitempty\"`\n\t\tApm *IPPrefixesAPM `json:\"apm,omitempty\"`\n\t\tLogs *IPPrefixesLogs `json:\"logs,omitempty\"`\n\t\tModified *string `json:\"modified,omitempty\"`\n\t\tProcess *IPPrefixesProcess `json:\"process,omitempty\"`\n\t\tSynthetics *IPPrefixesSynthetics `json:\"synthetics,omitempty\"`\n\t\tSyntheticsPrivateLocations *IPPrefixesSyntheticsPrivateLocations `json:\"synthetics-private-locations,omitempty\"`\n\t\tVersion *int64 `json:\"version,omitempty\"`\n\t\tWebhooks *IPPrefixesWebhooks `json:\"webhooks,omitempty\"`\n\t}{}\n\terr = json.Unmarshal(bytes, &all)\n\tif err != nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t\treturn nil\n\t}\n\tif all.Agents != nil && all.Agents.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Agents = all.Agents\n\tif all.Api != nil && all.Api.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Api = all.Api\n\tif all.Apm != nil && all.Apm.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Apm = all.Apm\n\tif all.Logs != nil && all.Logs.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Logs = all.Logs\n\to.Modified = all.Modified\n\tif all.Process != nil && all.Process.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Process = all.Process\n\tif all.Synthetics != nil && all.Synthetics.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Synthetics = all.Synthetics\n\tif all.SyntheticsPrivateLocations != nil && all.SyntheticsPrivateLocations.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.SyntheticsPrivateLocations = all.SyntheticsPrivateLocations\n\to.Version = all.Version\n\tif all.Webhooks != nil && all.Webhooks.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Webhooks = all.Webhooks\n\treturn nil\n}", "title": "" }, { "docid": "09f6b52f1b298abfeb03919426d14f35", "score": "0.4845371", "text": "func (m *MichelineInt) UnmarshalBinary([]byte) error {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "974b9240e05be88ab9514b33befa8759", "score": "0.48244962", "text": "func (m *metadataTracker) Unmarshal(bs []byte) error {\n\tif err := m.counts.Unmarshal(bs); err != nil {\n\t\treturn err\n\t}\n\n\t// Initialize the index map\n\tfor i, c := range m.counts.Counts {\n\t\tm.indexes[metaKey{protocol.DeviceIDFromBytes(c.DeviceID), c.LocalFlags}] = i\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0036e98729d48a8ecf481b7dc638e69b", "score": "0.47885793", "text": "func (s *S2SData) Unmarshal(source []byte) error {\n\tb := bytes.Buffer{}\n\tb.Write(source)\n\td := gob.NewDecoder(&b)\n\terr := d.Decode(s)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e255e7c28d18b0521696594bb31be225", "score": "0.47866875", "text": "func DecodeIntSet(attr dynamodb.AttributeValue) []int {\n\tasStrings := attr.NS\n\tval := make([]int, len(asStrings))\n\tvar err error\n\tfor i, s := range asStrings {\n\t\tval[i], err = strconv.Atoi(s)\n\t\tif err != nil { // not an int, give up\n\t\t\treturn []int{}\n\t\t}\n\t}\n\treturn val\n}", "title": "" }, { "docid": "4000a5f464b86424a7aeb049fa12a7ea", "score": "0.4780799", "text": "func (x *BlockRecordType) UnmarshalJSON(b []byte) error {\n\tnum, err := protoimpl.X.UnmarshalJSONEnum(x.Descriptor(), b)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*x = BlockRecordType(num)\n\treturn nil\n}", "title": "" }, { "docid": "0a20aeac24c854cf6acb15d80e3ec53c", "score": "0.47703236", "text": "func (rate *DashUSDRate) UnmarshalBinary(data []byte) error {\n\treturn json.Unmarshal(data, rate)\n}", "title": "" }, { "docid": "9665682a634407ae2b9d407343cf2419", "score": "0.4763454", "text": "func (r *CreateIteratorRequest) UnmarshalBinary(data []byte) error {\n\tvar pb internal.CreateIteratorRequest\n\tif err := proto.Unmarshal(data, &pb); err != nil {\n\t\treturn err\n\t}\n\n\tr.ShardIDs = pb.GetShardIDs()\n\tif err := r.Opt.UnmarshalBinary(pb.GetOpt()); err != nil {\n\t\treturn err\n\t}\n\tvar mm internal.Measurement\n\tif err := proto.Unmarshal(pb.Measurement, &mm); err != nil {\n\t\treturn err\n\t}\n\tr.Measurement,_ = UnMarchalBinayMeasurement(&mm)\n\n\treturn nil\n}", "title": "" }, { "docid": "200fc5c696f8af6dccef59548f491dcc", "score": "0.47611263", "text": "func UnmarshalRegionCollection(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(RegionCollection)\n\terr = core.UnmarshalModel(m, \"regions\", &obj.Regions, UnmarshalRegion)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "61961085c30388cc23e248b8a6380c07", "score": "0.4760299", "text": "func (s *Share) Unmarshal(buf []byte, rem int) ([]byte, int, error) {\n\tbuf, rem, err := s.Index.Unmarshal(buf, rem)\n\tif err != nil {\n\t\treturn buf, rem, err\n\t}\n\n\treturn s.Value.Unmarshal(buf, rem)\n}", "title": "" }, { "docid": "2e4feab6b739941498095dc95480765b", "score": "0.47513026", "text": "func (entity *LegalTechnologyManipulating) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thasManipulating, err := entity.PayloadHasManipulating.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.HasManipulating = hasManipulating.(*Branch)\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "0b13685a967560c08201ad24ea74b463", "score": "0.47453415", "text": "func (e *EBlock) unmarshalBodyBinaryData(data []byte) (newData []byte, err error) {\n\tbuf := bytes.NewBuffer(data)\n\thash := make([]byte, 32)\n\n\tfor i := uint32(0); i < e.Header.EntryCount; i++ {\n\t\tif _, err = buf.Read(hash); err != nil {\n\t\t\treturn buf.Bytes(), err\n\t\t}\n\n\t\th := NewHash()\n\t\th.SetBytes(hash)\n\t\te.Body.EBEntries = append(e.Body.EBEntries, h)\n\t}\n\n\tnewData = buf.Bytes()\n\treturn\n}", "title": "" }, { "docid": "06e35f6c31643f0b02fdb6603e604b21", "score": "0.47398165", "text": "func (a *AuctionID) UnmarshalBinary(data []byte) (err error) {\n\tcopy(a[:], data)\n\treturn\n}", "title": "" }, { "docid": "15740216e586872a0afe16270301994c", "score": "0.47318476", "text": "func (shares *Shares) Unmarshal(buf []byte, rem int) ([]byte, int, error) {\n\tvar l uint32\n\tbuf, rem, err := surge.UnmarshalLen(&l, ShareSize, buf, rem)\n\tif err != nil {\n\t\treturn buf, rem, err\n\t}\n\n\tif *shares == nil {\n\t\t*shares = make(Shares, 0, l)\n\t}\n\n\t*shares = (*shares)[:0]\n\tfor i := uint32(0); i < l; i++ {\n\t\t*shares = append(*shares, Share{})\n\t\tbuf, rem, err = (*shares)[i].Unmarshal(buf, rem)\n\t\tif err != nil {\n\t\t\treturn buf, rem, err\n\t\t}\n\t}\n\treturn buf, rem, nil\n}", "title": "" }, { "docid": "546f55c82489eac30127a6a690fbb548", "score": "0.47304466", "text": "func (obj *ByteAttribute) UnmarshalBinary(data []byte) error {\n\t// A simple encoding: plain text.\n\tb := bytes.NewBuffer(data)\n\t_, err := fmt.Fscanln(b, &obj.owner, &obj.AttrDesc, &obj.AttrValue, &obj.IsModified)\n\tif err != nil {\n\t\tlogger.Error(fmt.Sprintf(\"ERROR: Returning ByteAttribute:UnmarshalBinary w/ Error: '%+v'\", err.Error()))\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "702ae4fd49f446b7832fc1118ec177f5", "score": "0.47074035", "text": "func (e *gtwEntry) UnmarshalBinary(data []byte) error {\n\trw := readwriter.New(data)\n\trw.Read(func(data []byte) {\n\t\te.GatewayID = make([]byte, len(data))\n\t\tcopy(e.GatewayID, data)\n\t})\n\trw.TryRead(func(data []byte) error { return e.Metadata.UnmarshalBinary(data) })\n\treturn rw.Err()\n}", "title": "" }, { "docid": "56fbbc2f8b811e3999f0ed8d112960de", "score": "0.4704796", "text": "func (bz *HexByteArray32) Unmarshal(data []byte) error {\n\tif l := len(data); l != 32 {\n\t\treturn fmt.Errorf(\"%v != %v\", l, 32)\n\t}\n\tcopy(bz[:], data)\n\treturn nil\n}", "title": "" }, { "docid": "6b2a0f3fb6b1aead1182fecd08190ddd", "score": "0.47002685", "text": "func (e *entry) UnmarshalBinary(data []byte) error {\n\te.Value = nil\n\tsz := int(binary.LittleEndian.Uint32(data))\n\tif sz > 0 {\n\t\te.Value = append(e.Value, data[4:4+sz]...)\n\t}\n\te.TTLMillis = int64(binary.LittleEndian.Uint64(data[4+sz:]))\n\treturn nil\n}", "title": "" }, { "docid": "ef5ab7e510eabfa5cd9b2e3533e896d3", "score": "0.46871465", "text": "func (cl *ActorListPacket) UnmarshalBinary(data []byte) error {\n\tvar bOffset int\n\tvar equipOffset int\n\tvar cell int\n\tvar name string\n\n\tcl.SlotsTaken = readBytesAsUint64(data[8 : 8+8])\n\tfor slot := 0; slot < int(cl.SlotsTaken); slot++ {\n\t\tname = \"\"\n\t\tbOffset = 24 + (slot * 112)\n\t\tcell = int(readBytesAsUint8(data[8+bOffset : 8+bOffset+2]))\n\t\tequipOffset = 24 + int(cl.SlotsTaken)*112\n\n\t\t// This is beacause name can contain some trash\n\t\t// We should split them till first \\x00 symbol\n\t\t// And took the first part\n\t\tname = string(bytes.Runes(bytes.Split(data[bOffset+10:bOffset+22], []byte{0x00})[0]))\n\n\t\tcl.List[cell] = &resource.ActorShort{\n\t\t\tID: readBytesAsUint32(data[bOffset : bOffset+4]),\n\t\t\tUniqueID: 1, //TODO from C++\n\t\t\tName: name,\n\t\t\tClass: readBytesAsUint16(data[bOffset+22 : bOffset+24]),\n\t\t\tLevel: readBytesAsUint16(data[bOffset+24 : bOffset+26]),\n\t\t\tAppearance: resource.Appearance{\n\t\t\t\tSex: readBytesAsUint8(data[bOffset+40 : bOffset+41]),\n\t\t\t\tHair: readBytesAsUint8(data[bOffset+41 : bOffset+42]),\n\t\t\t\tFace: readBytesAsUint8(data[bOffset+42 : bOffset+43]),\n\t\t\t},\n\t\t\tStats: resource.Stats{\n\t\t\t\tStr: readBytesAsUint16(data[bOffset+44 : bOffset+46]),\n\t\t\t\tDex: readBytesAsUint16(data[bOffset+46 : bOffset+48]),\n\t\t\t\tInt: readBytesAsUint16(data[bOffset+48 : bOffset+50]),\n\t\t\t\tReputation: readBytesAsInt32(data[bOffset+60 : bOffset+64]),\n\t\t\t},\n\t\t\tPosition: resource.Position{\n\t\t\t\tX: readBytesAsFloat32(data[bOffset+64 : bOffset+68]),\n\t\t\t\tY: readBytesAsFloat32(data[bOffset+68 : bOffset+72]),\n\t\t\t\tZ: readBytesAsFloat32(data[bOffset+72 : bOffset+76]),\n\t\t\t},\n\t\t\tEquipment: resource.Equipment{\n\t\t\t\tData: data[(slot+1)*equipOffset : (slot+1)*equipOffset+(16*20)],\n\t\t\t},\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4b86121896d95b32ecace8576ec3e670", "score": "0.46773246", "text": "func (r *Rating) UnmarshalBinary(data []byte) error {\n\tbuf := data\n\tif len(buf) == 0 {\n\t\treturn errors.New(\"Rating.UnmarshalBinary: no data\")\n\t}\n\n\tif buf[0] != ratingBinaryVersion {\n\t\treturn errors.New(\"Rating.UnmarshalBinary: unsupported version\")\n\t}\n\n\tif len(buf) != 25 {\n\t\treturn errors.New(\"Rating.UnmarshalBinary: invalid length\")\n\t}\n\n\tr.mu = byteToFloat64(buf[1:9])\n\tr.phi = byteToFloat64(buf[9:17])\n\tr.sigma = byteToFloat64(buf[17:25])\n\treturn nil\n}", "title": "" }, { "docid": "5f1383d47a1a289f37ceefcc3513b6b0", "score": "0.46763897", "text": "func (rlk *RelinearizationKey) UnmarshalBinary(data []byte) (err error) {\n\n\tdeg := int(data[0])\n\n\trlk.Keys = make([]*SwitchingKey, deg)\n\n\tpointer := 1\n\tvar inc int\n\tfor i := 0; i < deg; i++ {\n\t\trlk.Keys[i] = new(SwitchingKey)\n\t\tif inc, err = rlk.Keys[i].decode(data[pointer:]); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tpointer += inc\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c0537c85c5a05d6c0b03adfc6806eb93", "score": "0.46761173", "text": "func (e *EBlock) UnmarshalBinaryData(data []byte) (newData []byte, err error) {\n\tnewData = data\n\n\tnewData, err = e.unmarshalHeaderBinaryData(newData)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tnewData, err = e.unmarshalBodyBinaryData(newData)\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "b0b8c8e00c2ee1fccc2ba517171f64c0", "score": "0.465046", "text": "func (entity *LegalPoliceAdditionalOffenses) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "878259dedf41a5c570f2a5e6bc5188c4", "score": "0.4649022", "text": "func (c *Config) SetFromBytes(data []byte) error {\n\tvar rawConfig interface{}\n\tif err := yaml.Unmarshal(data, &rawConfig); err != nil {\n\t\treturn err\n\t}\n\n\tunassertedConfig, ok := rawConfig.(map[interface{}]interface{})\n\tif !ok {\n\t\treturn fmt.Errorf(\"rawConfig is not a map[interface{}].interface\")\n\t}\n\n\tconfig, err := convertKeysToStrings(unassertedConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.config = config\n\n\treturn nil\n}", "title": "" }, { "docid": "63a275d5ca6fc83d7503baa4ccd42dad", "score": "0.46475932", "text": "func (v *SourceRange) UnmarshalEasyJSON(l *jlexer.Lexer) {\n\teasyjsonC5a4559bDecodeGithubComKnqChromedpCdpCss9(l, v)\n}", "title": "" }, { "docid": "5321a7254c7893afbe58f7913d052763", "score": "0.46454057", "text": "func (obj *IntegerAttribute) UnmarshalBinary(data []byte) error {\n\t// A simple encoding: plain text.\n\tb := bytes.NewBuffer(data)\n\t_, err := fmt.Fscanln(b, &obj.owner, &obj.AttrDesc, &obj.AttrValue, &obj.IsModified)\n\tif err != nil {\n\t\tlogger.Error(fmt.Sprintf(\"ERROR: Returning IntegerAttribute:UnmarshalBinary w/ Error: '%+v'\", err.Error()))\n\t\treturn err\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ed7ff85b3fff2e694515647c7b33ac72", "score": "0.46450448", "text": "func (v *ParamSet) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjsonFa90ddaeDecodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsUalberta49(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "2c30e9650dad7db19f34cf6de4b7d7dd", "score": "0.46426535", "text": "func (f *Filter) UnmarshalBinary(data []byte) (err error) {\n\tf.lock.Lock()\n\tdefer f.lock.Unlock()\n\n\tvar k uint64\n\n\tbuf := bytes.NewBuffer(data)\n\terr = binary.Read(buf, binary.LittleEndian, &k)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif k < KMin {\n\t\treturn errK\n\t}\n\n\terr = binary.Read(buf, binary.LittleEndian, &(f.n))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = binary.Read(buf, binary.LittleEndian, &(f.m))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif f.m < MMin {\n\t\treturn errM\n\t}\n\n\tdebug(\"read bf k=%d n=%d m=%d\\n\", k, f.n, f.m)\n\n\tf.keys = make([]uint64, k)\n\terr = binary.Read(buf, binary.LittleEndian, f.keys)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tf.bits = make([]uint64, f.n)\n\terr = binary.Read(buf, binary.LittleEndian, f.bits)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\texpectedHash := make([]byte, sha512.Size384)\n\terr = binary.Read(buf, binary.LittleEndian, expectedHash)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tactualHash := sha512.Sum384(data[:len(data)-sha512.Size384])\n\n\tif !hmac.Equal(expectedHash, actualHash[:]) {\n\t\tdebug(\"bloomfilter.UnmarshalBinary() sha384 hash failed:\",\n\t\t\t\" actual %v expected %v\", actualHash, expectedHash)\n\t\treturn errHash\n\t}\n\n\tdebug(\"bloomfilter.UnmarshalBinary() successfully read\",\n\t\t\" %d byte(s), sha384 %v\", len(data), actualHash)\n\treturn nil\n}", "title": "" }, { "docid": "fe87fbdb67277d7b24f22b5cd8f68583", "score": "0.46407166", "text": "func (rt *MarkerStatus) Unmarshal(data []byte) error {\n\t*rt = MarkerStatus(data[0])\n\treturn nil\n}", "title": "" }, { "docid": "e28e9fad887efcd60d40c156f787771e", "score": "0.463681", "text": "func (bf *filter) Unmarshal(data []byte) error {\n\tvar err error\n\tvar r = bytes.NewBuffer(data)\n\tif bf.hashFuncs, err = util.ReadUint32(r); err != nil {\n\t\treturn err\n\t}\n\tif bf.tweak, err = util.ReadUint32(r); err != nil {\n\t\treturn err\n\t}\n\tbf.filter, err = util.ReadVarBytes(r)\n\treturn err\n}", "title": "" }, { "docid": "b367bb393f74a15317c97df52da00aad", "score": "0.46337524", "text": "func UnmarshalRegionReference(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(RegionReference)\n\terr = core.UnmarshalPrimitive(m, \"href\", &obj.Href)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "35e93f9cb2a3c906b24bffa82b43795c", "score": "0.46243593", "text": "func (ri *RemoveItemPacket) UnmarshalBinary(data []byte) error {\n\tri.UniqueID = readBytesAsUint32(data[0:4])\n\tri.Amount = readBytesAsInt32(data[8:12])\n\treturn nil\n}", "title": "" }, { "docid": "8da6f300f1d0fc9528320d50f51f4da9", "score": "0.46217152", "text": "func (mr *StorageRow) Unmarshal(data []byte) {\n\tmr.m.Init(data, flatbuffers.GetUOffsetT(data))\n\tmr.MetricID = 0\n\tmr.SeriesID = 0\n\tmr.SlotIndex = 0\n\tmr.FieldIDs = mr.FieldIDs[:0]\n\tmr.Writable = false\n}", "title": "" }, { "docid": "7daa82e8a916f66dfa61ff4a73d3dc38", "score": "0.4613165", "text": "func (s *SpanID) Unmarshal(data []byte) error {\n\tvar err error\n\t*s, err = SpanIDFromBytes(data)\n\treturn err\n}", "title": "" }, { "docid": "8b71fa0226d4c04d7e4de0c995ad6882", "score": "0.46119833", "text": "func (entity *LegalCourt) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thasCourtActions, err := entity.PayloadHasCourtActions.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.HasCourtActions = hasCourtActions.(*Branch)\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "724b5717bc2694c117bf8f538d210a41", "score": "0.46102887", "text": "func (um *binaryUnmarshaler) Unmarshal(data []byte, v interface{}) error {\n\trv := reflect.ValueOf(v)\n\tif rv.Kind() != reflect.Ptr {\n\t\treturn errors.New(\"v must be a pointer\")\n\t}\n\tif rv.IsNil() {\n\t\treturn errors.New(\"v is nil\")\n\t}\n\trv = rv.Elem()\n\tif !rv.CanSet() {\n\t\treturn errors.New(\"v is not settable\")\n\t}\n\trv.Set(reflect.ValueOf(data))\n\treturn nil\n}", "title": "" }, { "docid": "e7f615ab42a90a4adb6096bf1dd2cf16", "score": "0.4609052", "text": "func (obj *GlobalConfigTransaction) UnmarshalFrom(data []byte) (int, error) {\n\tvar n int\n\n\tif len(data[n:]) < 1 {\n\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.ActivationBlockHeight\")\n\t}\n\t{\n\t\tiL, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.ActivationBlockHeight\")\n\t\t}\n\t\tif iL&math.MaxUint64 != iL {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooLarge, \"GlobalConfigTransaction.ActivationBlockHeight\")\n\t\t}\n\t\tobj.ActivationBlockHeight = uint64(iL)\n\t\tn += ni\n\t}\n\n\t{\n\t\tiLen, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigTransaction.ScalarUpdates\")\n\t\t}\n\t\tn += ni\n\t\tif iLen > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.ScalarUpdates\")\n\t\t}\n\t\tobj.ScalarUpdates = make([]*GlobalConfigScalarUpdate, iLen)\n\t\tfor i := uint64(0); i < iLen; i++ {\n\t\t\tobj.ScalarUpdates[i] = &GlobalConfigScalarUpdate{}\n\n\t\t\tif len(data[n:]) < 2 {\n\t\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.ScalarUpdates\")\n\t\t\t}\n\t\t\t{\n\t\t\t\tni, err := obj.ScalarUpdates[i].UnmarshalFrom(data[n:])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, errors.Wrap(err, \"GlobalConfigTransaction.ScalarUpdates\")\n\t\t\t\t}\n\t\t\t\tn += ni\n\t\t\t}\n\t\t}\n\t}\n\n\t{\n\t\tiLen, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigTransaction.ListUpdates\")\n\t\t}\n\t\tn += ni\n\t\tif iLen > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.ListUpdates\")\n\t\t}\n\t\tobj.ListUpdates = make([]*GlobalConfigListUpdate, iLen)\n\t\tfor i := uint64(0); i < iLen; i++ {\n\t\t\tobj.ListUpdates[i] = &GlobalConfigListUpdate{}\n\n\t\t\tif len(data[n:]) < 3 {\n\t\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.ListUpdates\")\n\t\t\t}\n\t\t\t{\n\t\t\t\tni, err := obj.ListUpdates[i].UnmarshalFrom(data[n:])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, errors.Wrap(err, \"GlobalConfigTransaction.ListUpdates\")\n\t\t\t\t}\n\t\t\t\tn += ni\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(obj.SigPublicKey) > 20 {\n\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.SigPublicKey\")\n\t}\n\n\tif len(data[n:]) < 1 {\n\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.SigPublicKey\")\n\t}\n\t{\n\t\tiL, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigTransaction.SigPublicKey\")\n\t\t}\n\t\tn += ni\n\t\tif iL > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.SigPublicKey\")\n\t\t}\n\n\t\tif iL > uint64(len(data[n:])) {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.SigPublicKey\")\n\t\t}\n\t\tbyt := make([]byte, iL)\n\t\tn += copy(byt, data[n:uint64(n)+iL])\n\t\tobj.SigPublicKey = (byt)\n\t}\n\n\tif len(obj.Signature) > 20 {\n\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.Signature\")\n\t}\n\n\tif len(data[n:]) < 1 {\n\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.Signature\")\n\t}\n\t{\n\t\tiL, ni := binary.Uvarint(data[n:])\n\t\tif ni <= 0 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"Obtaining length of GlobalConfigTransaction.Signature\")\n\t\t}\n\t\tn += ni\n\t\tif iL > 20 {\n\t\t\treturn 0, errors.Wrap(ranger.ErrTooMany, \"GlobalConfigTransaction.Signature\")\n\t\t}\n\n\t\tif iL > uint64(len(data[n:])) {\n\t\t\treturn 0, errors.Wrap(ranger.ErrShortRead, \"GlobalConfigTransaction.Signature\")\n\t\t}\n\t\tbyt := make([]byte, iL)\n\t\tn += copy(byt, data[n:uint64(n)+iL])\n\t\tobj.Signature = (byt)\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "6e6f12fea9c742c2c5ef6d32503ba547", "score": "0.4607038", "text": "func (s *UntrustedRekorSET) UnmarshalJSON(data []byte) error {\n\terr := s.strictUnmarshalJSON(data)\n\tif err != nil {\n\t\tif formatErr, ok := err.(JSONFormatError); ok {\n\t\t\terr = NewInvalidSignatureError(formatErr.Error())\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ef4b6f056cf95b05a58169abbf8002b3", "score": "0.46032137", "text": "func (bnss *BotNameSortedSet) BinaryDecode(r io.Reader, length int) error {\n\tvar (\n\t\terr error\n\t\tdecoder = rivbin.NewDecoder(r)\n\t)\n\t// allocate suffecient memory (and erase) our internal slice\n\tbnss.slice = make(botNameSlice, 0, length)\n\t// add the elements on by one, guaranteeing the names are in order and unique\n\tfor i := 0; i < length; i++ {\n\t\tvar name BotName\n\t\terr = decoder.Decode(&name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\terr = bnss.AddName(name)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error while unmarshaling name %v: %v\", name, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "043a05c4511bceee92e28e3b94a2c6da", "score": "0.46028438", "text": "func (t *ElapsedTime) UnmarshalBinary(p []byte) error {\n\tb := buffer.New(p)\n\tif b.Len() != 2 {\n\t\treturn io.ErrUnexpectedEOF\n\t}\n\n\t// Time is reported in hundredths of seconds, so we convert it to a more\n\t// manageable milliseconds\n\t*t = ElapsedTime(time.Duration(b.Read16()) * 10 * time.Millisecond)\n\treturn nil\n}", "title": "" }, { "docid": "57ccdfb74557fc5137f4e2c66a9da010", "score": "0.46027786", "text": "func (entity *LegalAssociationsTerroristOrganization) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thasTerrorist, err := entity.PayloadHasTerrorist.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.HasTerrorist = hasTerrorist.(*Branch)\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "f02150632570f5cdba3ae781a1eda84c", "score": "0.4598315", "text": "func (entity *LegalPoliceOffenses) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "fa02a005e5e2decaac4e73f7aa4b5295", "score": "0.4597115", "text": "func (id *ID) UnmarshalBinary(data []byte) error {\n\tif len(data) != idByteLen {\n\t\treturn errors.WithStack(InvalidIDError{hex.EncodeToString(data)})\n\t}\n\tsuffix := data[idByteLen-1]\n\tif suffix != idSuffix {\n\t\treturn errors.WithStack(InvalidIDError{hex.EncodeToString(data)})\n\t}\n\tcopy(id.id[:], data)\n\treturn nil\n}", "title": "" }, { "docid": "e14ebba390ffaba97fcba591df8d20de", "score": "0.4592336", "text": "func (w *WriteShardRequest) UnmarshalBinary(buf []byte) error {\n\tif err := proto.Unmarshal(buf, &w.pb); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "870a2ac184e2fbf8102591bd345f62ac", "score": "0.4581482", "text": "func (v *CommitSet) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjson6efd7357DecodeGithubComGoParkMailRu20201GitBreakersInternalPkgModelsGit(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "dd02ee3af5e1bef6361f67bd5f685579", "score": "0.458003", "text": "func (e *EBlock) unmarshalHeaderBinaryData(data []byte) (newData []byte, err error) {\n\tbuf := bytes.NewBuffer(data)\n\thash := make([]byte, 32)\n\tnewData = data\n\n\tif _, err = buf.Read(hash); err != nil {\n\t\treturn\n\t} else {\n\t\te.Header.ChainID.SetBytes(hash)\n\t}\n\n\tif _, err = buf.Read(hash); err != nil {\n\t\treturn\n\t} else {\n\t\te.Header.BodyMR.SetBytes(hash)\n\t}\n\n\tif _, err = buf.Read(hash); err != nil {\n\t\treturn\n\t} else {\n\t\te.Header.PrevKeyMR.SetBytes(hash)\n\t}\n\n\tif _, err = buf.Read(hash); err != nil {\n\t\treturn\n\t} else {\n\t\te.Header.PrevLedgerKeyMR.SetBytes(hash)\n\t}\n\n\tif err = binary.Read(buf, binary.BigEndian, &e.Header.EBSequence); err != nil {\n\t\treturn\n\t}\n\n\tif err = binary.Read(buf, binary.BigEndian, &e.Header.EBHeight); err != nil {\n\t\treturn\n\t}\n\n\tif err = binary.Read(buf, binary.BigEndian, &e.Header.EntryCount); err != nil {\n\t\treturn\n\t}\n\n\tnewData = buf.Bytes()\n\n\treturn\n}", "title": "" }, { "docid": "37dc12991cb6abcc105f894df1d94a3f", "score": "0.45776388", "text": "func (bhm *BlockMetadata) UnmarshalJSON(data []byte) error {\n\ttype suppressJSONUnmarshaller BlockMetadata\n\tif err := json.Unmarshal(data, (*suppressJSONUnmarshaller)(bhm)); err != nil {\n\t\treturn err\n\t}\n\n\tvar tmp struct {\n\t\tTestChainStatus json.RawMessage `json:\"test_chain_status\"`\n\t}\n\n\tif err := json.Unmarshal(data, &tmp); err != nil {\n\t\treturn err\n\t}\n\n\ttcs, err := unmarshalTestChainStatus(tmp.TestChainStatus)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbhm.TestChainStatus = tcs\n\n\treturn nil\n}", "title": "" }, { "docid": "45aba8c66ba54b8a60088f82ac7f1ebb", "score": "0.45718962", "text": "func (bhm *BlockHeaderMetadata) UnmarshalJSON(data []byte) error {\n\ttype suppressJSONUnmarshaller BlockHeaderMetadata\n\tif err := json.Unmarshal(data, (*suppressJSONUnmarshaller)(bhm)); err != nil {\n\t\treturn err\n\t}\n\n\tvar tmp struct {\n\t\tTestChainStatus json.RawMessage `json:\"test_chain_status\" yaml:\"test_chain_status\"`\n\t}\n\n\tif err := json.Unmarshal(data, &tmp); err != nil {\n\t\treturn err\n\t}\n\n\ttcs, err := unmarshalTestChainStatus(tmp.TestChainStatus)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbhm.TestChainStatus = tcs\n\n\treturn nil\n}", "title": "" }, { "docid": "f8ea8081d899cbdaa34c09067087a00a", "score": "0.4570947", "text": "func (entity *LegalAssociationsMembershipViolence) Unmarshal(raw []byte) error {\n\terr := json.Unmarshal(raw, entity)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\thasViolence, err := entity.PayloadHasViolence.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.HasViolence = hasViolence.(*Branch)\n\n\tlist, err := entity.PayloadList.Entity()\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity.List = list.(*Collection)\n\n\treturn err\n}", "title": "" }, { "docid": "3310785b69dc11a51506ba3a23d8d1d9", "score": "0.45691776", "text": "func (omci *SetTableResponse) DecodeFromBytes(data []byte, p gopacket.PacketBuilder) error {\n\t// Common ClassID/EntityID decode in msgBase\n\terr := omci.MeBasePacket.DecodeFromBytes(data, p, 6+1)\n\tif err != nil {\n\t\treturn err\n\t}\n\tentity, omciErr := me.LoadManagedEntityDefinition(omci.EntityClass,\n\t\tme.ParamData{EntityID: omci.EntityInstance})\n\tif omciErr.StatusCode() != me.Success {\n\t\treturn omciErr.GetError()\n\t}\n\t// ME needs to support SetTable\n\tif !me.SupportsMsgType(entity, me.SetTable) {\n\t\treturn me.NewProcessingError(\"managed entity does not support the SetTable Message-Type\")\n\t}\n\tomci.Result = me.Results(data[6])\n\tif omci.Result == 7 || omci.Result == 8 || omci.Result >= 9 {\n\t\tmsg := fmt.Sprintf(\"invalid SetTable results code: %v, must be 0..6, 9\", omci.Result)\n\t\treturn errors.New(msg)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "81c04e31f1f0d2af160244b569337583", "score": "0.45572394", "text": "func (v *ManualSetpoint) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjsonFa90ddaeDecodeGithubComAsmyasnikovGoMavlinkMavlinkDialectsUalberta76(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "58dc0827b150af91eb2aadd942d07261", "score": "0.4556503", "text": "func UnmarshalInstanceProfileVolumeBandwidthRange(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(InstanceProfileVolumeBandwidthRange)\n\terr = core.UnmarshalPrimitive(m, \"default\", &obj.Default)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"max\", &obj.Max)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"min\", &obj.Min)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"step\", &obj.Step)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"type\", &obj.Type)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "4637b29a80cf08edb5c2b3d7e4ad855d", "score": "0.45545363", "text": "func (w *WriteShardResponse) UnmarshalBinary(buf []byte) error {\n\tif err := proto.Unmarshal(buf, &w.pb); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8fb3009e27ebf2fa1a6e0c01fb20918b", "score": "0.4552138", "text": "func (target *Window) UnmarshalBinary(data []byte) (err error) {\n\t// panics are recovered and propagated as errors\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t} else if s, ok := r.(string); ok {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %s\", s)\n\t\t\t} else {\n\t\t\t\terr = fmt.Errorf(\"Unexpected panic: %+v\", r)\n\t\t\t}\n\t\t}\n\t}()\n\n\tbuff := util.NewBufferFromBytes(data)\n\n\t// Codec Version Check\n\tversion := buff.ReadUInt8()\n\tif version != CodecVersion {\n\t\treturn fmt.Errorf(\"Invalid Version Unmarshaling Window. Expected %d, got %d\", CodecVersion, version)\n\t}\n\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.start = nil\n\t} else {\n\t\t// --- [begin][read][reference](time.Time) ---\n\t\ta := &time.Time{}\n\t\tb := buff.ReadInt() // byte array length\n\t\tc := buff.ReadBytes(b) // byte array\n\t\terrA := a.UnmarshalBinary(c)\n\t\tif errA != nil {\n\t\t\treturn errA\n\t\t}\n\t\ttarget.start = a\n\t\t// --- [end][read][reference](time.Time) ---\n\n\t}\n\tif buff.ReadUInt8() == uint8(0) {\n\t\ttarget.end = nil\n\t} else {\n\t\t// --- [begin][read][reference](time.Time) ---\n\t\td := &time.Time{}\n\t\te := buff.ReadInt() // byte array length\n\t\tf := buff.ReadBytes(e) // byte array\n\t\terrB := d.UnmarshalBinary(f)\n\t\tif errB != nil {\n\t\t\treturn errB\n\t\t}\n\t\ttarget.end = d\n\t\t// --- [end][read][reference](time.Time) ---\n\n\t}\n\treturn nil\n}", "title": "" } ]
5f584b67ef766274f8b56af5992ea976
SSHCommands returns the SSH commands.
[ { "docid": "4b2ca89f8f419890af740caab381a1ec", "score": "0.7211136", "text": "func (cfg *Config) SSHCommands() (s string) {\n\tif len(cfg.Status.ManagedNodeGroups) == 0 {\n\t\treturn \"\"\n\t}\n\tbuf := bytes.NewBuffer(nil)\n\tfor name, ng := range cfg.Status.ManagedNodeGroups {\n\t\tbuf.WriteString(fmt.Sprintf(\"ASG %q instance:\\n\", name))\n\t\tec := &ec2config.Config{\n\t\t\tUserName: cfg.Parameters.ManagedNodeGroupRemoteAccessUserName,\n\t\t\tKeyPath: cfg.Parameters.ManagedNodeGroupRemoteAccessPrivateKeyPath,\n\t\t\tInstances: ng.Instances,\n\t\t}\n\t\tbuf.WriteString(ec.SSHCommands())\n\t\tbuf.WriteString(\"\\n\")\n\t}\n\treturn buf.String()\n}", "title": "" } ]
[ { "docid": "683d375d460fc103f55e062d2801b308", "score": "0.60194916", "text": "func ExecSSH(userName, ip string, cmds []string) {\n\t// sshCommander := SSHCommander{userName, ip, sshKeyPath}\n\t// sshOpt := fmt.Sprintf(\"-o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i %s\", sshKeyPath)\n\tsshKeyPath := GetSSHKeyPath()\n\t// cmds := []string{\n\t// \t\"apt-get upgrade\",\n\t// }\n\targ := append(\n\t\t[]string{\n\t\t\t\"-o\",\n\t\t\t\"UserKnownHostsFile=/dev/null\",\n\t\t\t\"-o\",\n\t\t\t\"StrictHostKeyChecking=no\",\n\t\t\t\"-i\",\n\t\t\tsshKeyPath,\n\t\t\tfmt.Sprintf(\"%s@%s\", userName, ip),\n\t\t},\n\t\tcmds...,\n\t)\n\n\t// cmdOut, err := exec.Command(\"ssh\", arg...).Output()\n\tcmd := exec.Command(\"ssh\", arg...)\n\tcmd.Stdout = os.Stdout\n\tcmd.Stdin = os.Stdin\n\tcmd.Stderr = os.Stderr\n\terr := cmd.Run()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// cmdReader, err := cmd.StdoutPipe()\n\t// if err != nil {\n\t// \tfmt.Fprintln(os.Stderr, \"Error creating StdoutPipe for Cmd\", err)\n\t// \tos.Exit(1)\n\t// }\n\t// scanner := bufio.NewScanner(cmdReader)\n\t// go func() {\n\t// \tfor scanner.Scan() {\n\t// \t\tfmt.Printf(\"ssh output | %s\\n\", scanner.Text())\n\t// \t}\n\t// }()\n\t// err = cmd.Start()\n\t// if err != nil {\n\t// \tfmt.Fprintln(os.Stderr, \"Error starting Cmd\", err)\n\t// \tos.Exit(1)\n\t// }\n\n\t// err = cmd.Wait()\n\t// if err != nil {\n\t// \tfmt.Fprintln(os.Stderr, \"Error waiting for Cmd\", err)\n\t// \tos.Exit(1)\n\t// }\n}", "title": "" }, { "docid": "ecf92b2f082c3b78b5b244551f62fd67", "score": "0.58405656", "text": "func (c *Client) ListSSHKeys() ([]SSHKey, error) {\n\tresp, err := c.SendGetRequest(\"/v2/sshkeys\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsshKeys := make([]SSHKey, 0)\n\tif err := json.NewDecoder(bytes.NewReader(resp)).Decode(&sshKeys); err != nil {\n\t\treturn nil, decodeError(err)\n\t}\n\n\treturn sshKeys, nil\n}", "title": "" }, { "docid": "8e68af97236b77a4df074d79a3896e1e", "score": "0.5707675", "text": "func (e Environment) SSHKeys() []EnvironmentKey {\n\tkeys := []EnvironmentKey{}\n\tfor _, k := range e.Keys {\n\t\tif k.Type == KeyTypeSSH {\n\t\t\tkeys = append(keys, k)\n\t\t}\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "a71e24146d68d6c31f4e138a22fd51d2", "score": "0.5673419", "text": "func (s *SimpleDB) GetSSHHostPrincipals() ([]string, error) {\n\treturn nil, ErrNotImplemented\n}", "title": "" }, { "docid": "3a8ec3e3141f01cae60b9b7b70957750", "score": "0.5661987", "text": "func (c *Client) GetSSHKeys() (keys []SSHKey, err error) {\n\tvar keyMap map[string]SSHKey\n\tif err := c.get(`sshkey/list`, &keyMap); err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, key := range keyMap {\n\t\tkeys = append(keys, key)\n\t}\n\tsort.Sort(sshkeys(keys))\n\treturn keys, nil\n}", "title": "" }, { "docid": "a696ce1e72e47d706b50a127e9da2c51", "score": "0.5592476", "text": "func GetSSHOutput(userName, ip string, sshCmds []string) string {\n\tcmdArgs := append(\n\t\t[]string{\n\t\t\t\"-o\",\n\t\t\t\"UserKnownHostsFile=/dev/null\",\n\t\t\t\"-o\",\n\t\t\t\"StrictHostKeyChecking=no\",\n\t\t\tfmt.Sprintf(\"%s@%s\", userName, ip),\n\t\t},\n\t\tsshCmds...,\n\t)\n\t// str := strings.Join(cmdArgs[:], \" \")\n\t// fmt.Printf(\"str = %+v\\n\", str)\n\t// os.Exit(0)\n\tvar (\n\t\tcmdOut []byte\n\t\terr error\n\t)\n\tcmdName := \"ssh\"\n\tif cmdOut, err = exec.Command(cmdName, cmdArgs...).Output(); err != nil {\n\t\tRedLn(\"There was an error running ssh command: \", err)\n\t\tos.Exit(1)\n\t}\n\treturn string(cmdOut)\n}", "title": "" }, { "docid": "227746ee8e874f1e65200fd31899c3b4", "score": "0.55660206", "text": "func (c *Cluster) SSH(cmd string) (stdout, stderr []byte, err error) {\n\tclient, err := c.Masters[0].SSHClient()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tdefer client.Close()\n\n\tsession, err := client.NewSession()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tdefer session.Close()\n\n\toutBuf := bytes.NewBuffer(nil)\n\terrBuf := bytes.NewBuffer(nil)\n\tsession.Stdout = outBuf\n\tsession.Stderr = errBuf\n\n\terr = session.Run(cmd)\n\n\tstdout = bytes.TrimSpace(outBuf.Bytes())\n\tstderr = bytes.TrimSpace(errBuf.Bytes())\n\n\treturn stdout, stderr, err\n}", "title": "" }, { "docid": "cf9a871e0f8ed9068797522796cc4821", "score": "0.55493504", "text": "func Commands() []cli.Command {\n\tcommands := make([]cli.Command, len(methods))\n\ti := 0\n\tfor _, m := range methods {\n\t\tcommands[i] = m.Command()\n\t\ti++\n\t}\n\treturn commands\n}", "title": "" }, { "docid": "3e39dfa3795ab56b88735bed41fcb0f6", "score": "0.5511563", "text": "func (a *TestCommandsAction) Commands() []string {\n\treturn a.commands\n}", "title": "" }, { "docid": "5e9a1d5f7e0241bca0977ad452213377", "score": "0.54205", "text": "func (h *CommandHost) ListCommands() {\n\tos.Stderr.WriteString(\"Available commands:\\n\")\n\n\tmax := 0\n\tfor cmd := range h.commands {\n\t\tl := len(cmd)\n\t\tif l > max {\n\t\t\tmax = l\n\t\t}\n\t}\n\n\tvar keys []string\n\tfor k := range h.commands {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\n\tfor i := range keys {\n\t\tcmd := keys[i]\n\t\thandler := h.commands[cmd]\n\t\tos.Stderr.WriteString(fmt.Sprintf(\n\t\t\t\" %s%s %s\\n\",\n\t\t\tcmd,\n\t\t\tstrings.Repeat(\" \", max-len(cmd)),\n\t\t\thandler.GetDescription(),\n\t\t))\n\t}\n}", "title": "" }, { "docid": "078863ddfd5ac4bd68185b4bf3701a74", "score": "0.5400752", "text": "func executeSSH(ip, username, password string, commands []string) error {\n\tclient, err := newSSH(ip, username, password)\n\tif err != nil {\n\t\treturn err\n\t}\n\tsession, err := client.NewSession()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer session.Close()\n\n\t// get input stream + bind outputs\n\tstdin, err := session.StdinPipe()\n\tif err != nil {\n\t\treturn err\n\t}\n\tsession.Stdout = os.Stdout\n\tsession.Stderr = os.Stderr\n\terr = session.Shell()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// send the commands\n\tfor _, cmd := range commands {\n\t\t_, err = fmt.Fprintf(stdin, \"%s\\n\", cmd)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Wait for sess to finish\n\terr = session.Wait()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e4d8978d0fa09d38a699552d3f88cade", "score": "0.53629214", "text": "func sshCommand(cfg *config.Config) (*cobra.Command, error) {\n\tsshC := &cobra.Command{\n\t\tUse: \"ssh\",\n\t\tShort: \"Access an environment using ssh\",\n\t}\n\n\tsshOpts := ssh.SSHOpts{\n\t\tPortArgs: sshC.PersistentFlags().StringSliceP(\"port\", \"p\", nil, \"Optional port forwarding rule[s] of the form `[<local>:[<host>:]]<remote>` e.g. '15900', '8080:15900', '15900,8080:15900', '1234:hostX:4321'\"),\n\t\tVerboseCount: sshC.PersistentFlags().CountP(\"verbose\", \"v\", \"verbose - increase ssh verbosity\"),\n\t\tQuietFlag: sshC.PersistentFlags().BoolP(\"quiet\", \"q\", false, \"quiet\"),\n\t\tInstanceNumMax: sshC.PersistentFlags().IntP(\"to\", \"t\", -1, \"max instance number to run against (0 for highest)\"),\n\t}\n\n\tenvironmentCommands, err := createEnvironmentSubCommands(cfg, sshOpts)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(environmentCommands) == 0 {\n\t\tout.Warn(\"Warning: No subcommands found for envs - missing envs in config?\")\n\t}\n\n\tsshC.AddCommand(environmentCommands...)\n\treturn sshC, nil\n}", "title": "" }, { "docid": "4745d2bc12ea17b7e15449ea6f45102a", "score": "0.53439426", "text": "func (ctl *VppAgentCtlImpl) GetCommands() []string {\n\treturn ctl.commands\n}", "title": "" }, { "docid": "4c79ac25d385f39582a357ac4bd3bca6", "score": "0.53303283", "text": "func GetCommands() []string {\n\treturn []string{}\n}", "title": "" }, { "docid": "09d1bc1cfce55459a1830ec1b89ba125", "score": "0.53286916", "text": "func (o GetUsersUserOutput) SshKeys() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetUsersUser) []string { return v.SshKeys }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "e27e74266978afee8b0a73b2d9746d11", "score": "0.53265136", "text": "func (r *Runner) SSHHandlers(path string) []fakesshserver.Handler {\n\treturn []fakesshserver.Handler{\n\t\tfakesshserver.ExactMatchHandler(fmt.Sprintf(\"exec env %s -rpc\", path), r.RunGRPC),\n\t}\n}", "title": "" }, { "docid": "65f713d5ebff9a14d0906c3db3118195", "score": "0.53259975", "text": "func (node Node) SSHCommand(args ...string) Command {\n\ttarget := []string{node.Remote()}\n\treturn Command{\n\t\tMain: \"ssh\",\n\t\tArgs: append(target, args...),\n\t}\n}", "title": "" }, { "docid": "1cd5d14c803f54609868a14fd268652c", "score": "0.526351", "text": "func (hosts *Hosts) ExecuteSSH(cfg *config.Config, cmd string) {\n\tvar wg sync.WaitGroup\n\twg.Add(len(hosts.HostSlice))\n\n\tgo func() {\n\t\twg.Wait()\n\t\tclose(hosts.HostCh)\n\t}()\n\n\tfor _, h := range hosts.HostSlice {\n\t\tgo func(h *Host, cmd string) {\n\t\t\tstart := time.Now()\n\t\t\th.exec(cfg, cmd)\n\t\t\th.ExecDuration = math.Ceil(time.Since(start).Seconds()*1000) / 1000\n\t\t\thosts.HostCh <- h\n\t\t\twg.Done()\n\t\t}(h, cmd)\n\t}\n}", "title": "" }, { "docid": "e51c9ac790851f04bdacee460fc97430", "score": "0.52632856", "text": "func XListSshKeys(params *viper.Viper) (*gentleman.Response, map[string]interface{}, error) {\n\thandlerPath := \"list-ssh-keys\"\n\tif xSubcommand {\n\t\thandlerPath = \"x \" + handlerPath\n\t}\n\n\tserver := viper.GetString(\"server\")\n\tif server == \"\" {\n\t\tserver = xServers()[viper.GetInt(\"server-index\")][\"url\"]\n\t}\n\n\turl := server + \"/ssh-key\"\n\n\treq := cli.Client.Get().URL(url)\n\n\tcli.HandleBefore(handlerPath, params, req)\n\n\tresp, err := req.Do()\n\tif err != nil {\n\t\treturn nil, nil, errors.Wrap(err, \"Request failed\")\n\t}\n\n\tvar decoded map[string]interface{}\n\n\tif resp.StatusCode < 400 {\n\t\tif err := cli.UnmarshalResponse(resp, &decoded); err != nil {\n\t\t\treturn nil, nil, errors.Wrap(err, \"Unmarshalling response failed\")\n\t\t}\n\t} else {\n\t\treturn nil, nil, errors.Errorf(\"HTTP %d: %s\", resp.StatusCode, resp.String())\n\t}\n\n\tafter := cli.HandleAfter(handlerPath, params, resp, decoded)\n\tif after != nil {\n\t\tdecoded = after.(map[string]interface{})\n\t}\n\n\treturn resp, decoded, nil\n}", "title": "" }, { "docid": "f7236413ca099ed5bb4a0e30dfa2b2e1", "score": "0.52626437", "text": "func RunCmds(client *ssh.Client, cmds string) (string, string) {\n\tcmdlist := strings.Split(cmds, \";\")\n\tvar stdoutBuff bytes.Buffer\n\tvar stderrBuff bytes.Buffer\n\tfor _, command := range cmdlist {\n\t\tsession, err := client.NewSession()\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tdefer session.Close()\n\t\tsession.Stdout = &stdoutBuff\n\t\tsession.Stderr = &stderrBuff\n\t\tsession.Run(command)\n\t}\n\treturn stdoutBuff.String(), stderrBuff.String()\n}", "title": "" }, { "docid": "db4fcb48fa85f8b7a15f048dda2767b7", "score": "0.5252551", "text": "func GetCommands() []cli.Command {\n\treturn []cli.Command{\n\t\tauthPingCommand(),\n\t\tnoAuthPingCommand(),\n\t\tentityPingCommand(),\n\t}\n}", "title": "" }, { "docid": "cad13c52f180a7342e2bce77077dd080", "score": "0.52367693", "text": "func getSshCommand(sep string, args ...string) string {\n\treturn fmt.Sprintf(\"'%s'\", strings.Join(args, sep))\n}", "title": "" }, { "docid": "23146780d01b814fd6d70d4e8485ad07", "score": "0.5236154", "text": "func SSHAgentKeys() ([]string, error) {\n\tsocket := os.Getenv(\"SSH_AUTH_SOCK\")\n\tif len(socket) == 0 {\n\t\treturn nil, fmt.Errorf(\"SSH_AUTH_SOCK not set, skipping pubkey fetching\")\n\t}\n\tconn, err := net.Dial(\"unix\", socket)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to open SSH_AUTH_SOCK: %w\", err)\n\t}\n\n\tagentClient := agent.NewClient(conn)\n\tkeys, err := agentClient.List()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error listing agent's pub keys %w\", err)\n\t}\n\n\tvar pubKeys []string\n\tfor _, key := range keys {\n\t\tpubKeys = append(pubKeys, key.String())\n\t}\n\n\treturn pubKeys, nil\n}", "title": "" }, { "docid": "c3561c5af7da6a9dfc90bd08a16d6845", "score": "0.52158546", "text": "func (c *Controller) Commands() <-chan *Command {\n\tif c.commands == nil {\n\t\tc.commands = make(chan *Command)\n\t}\n\n\treturn c.commands\n}", "title": "" }, { "docid": "883ca0665d40c283476c2ea071499c6f", "score": "0.52068734", "text": "func (task *Task) GetCommands() []string {\n\tcommands := make([]string, len(task.Processes))\n\tfor i, process := range task.Processes {\n\t\tcommands[i] = process.Command\n\t}\n\treturn commands\n}", "title": "" }, { "docid": "5dda2faa8cad97a94e9589f3bc8f3b16", "score": "0.5161403", "text": "func GetSSHKeys(dirs string, sleep int) []SshPrivateKey {\n\tpkeys := []SshPrivateKey{}\n\tfor _, dir := range strings.Split(dirs, \",\") {\n\t\tfilepath.Walk(dir, func(path string, info os.FileInfo, err error) error {\n\t\t\tif sleep != 0 {\n\t\t\t\ttime.Sleep(time.Duration(sleep) * time.Millisecond)\n\t\t\t}\n\t\t\tif info == nil || !info.Mode().IsRegular() {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tpkey := getPrivateKey(path)\n\t\t\tif pkey != (SshPrivateKey{}) {\n\t\t\t\tpkeys = append(pkeys, pkey)\n\t\t\t}\n\t\t\treturn nil\n\t\t})\n\t}\n\treturn pkeys\n}", "title": "" }, { "docid": "7639df7e1af9b109c6dc241323105594", "score": "0.5136723", "text": "func (n *PipeNode) Commands() []*CommandNode {\n\treturn n.cmds\n}", "title": "" }, { "docid": "e32c0e914f67ace10f4765730043299d", "score": "0.5125265", "text": "func GetCommands() map[string]Command {\n\treturn commands\n}", "title": "" }, { "docid": "1454b3bd3aa6877d36923e5599102448", "score": "0.51017183", "text": "func SSHCommand(host string, username string, authMethod ssh.AuthMethod, cmd string, port int) (bytes.Buffer, bytes.Buffer, error) {\n\tvar stdoutBuf, stderrBuf bytes.Buffer\n\n\tsshConfig := &ssh.ClientConfig{\n\t\tUser: username,\n\t\tAuth: []ssh.AuthMethod{\n\t\t\tauthMethod,\n\t\t},\n\t\tHostKeyCallback: ssh.InsecureIgnoreHostKey(),\n\t}\n\tconnection, err := ssh.Dial(\"tcp\", fmt.Sprintf(\"%s:%d\", host, port), sshConfig)\n\tif err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"failed to create connection: %s\", err)\n\t}\n\tsession, err := connection.NewSession()\n\tif err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"failed to get new session: %s\", err)\n\t}\n\tdefer session.Close()\n\n\tstdoutIn, err := session.StdoutPipe()\n\tif err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"Unable to setup stdout for session: %s\", err)\n\t}\n\n\tstderrIn, err := session.StderrPipe()\n\tif err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"Unable to setup stderr for session: %s\", err)\n\t}\n\n\tif err := session.Start(cmd); err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"failed to start the command: %s\", err)\n\t}\n\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\n\tvar errStdout, errStderr error\n\tgo func() {\n\t\t_, errStdout = io.Copy(&stdoutBuf, stdoutIn)\n\t\twg.Done()\n\t}()\n\n\t_, errStderr = io.Copy(&stderrBuf, stderrIn)\n\twg.Wait()\n\n\tif err := session.Wait(); err != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"cmd.Run failed with %s\", err)\n\t}\n\n\tif errStdout != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"failed to capture stdout: %s\", errStdout)\n\t}\n\n\tif errStderr != nil {\n\t\treturn stdoutBuf, stderrBuf, fmt.Errorf(\"failed to capture stderr: %s\", errStderr)\n\t}\n\n\treturn stdoutBuf, stderrBuf, nil\n}", "title": "" }, { "docid": "247ad3c1a63468e859e9b2708d4d23e7", "score": "0.50913334", "text": "func (c *Connection) Commands() Commands {\n\treturn c\n}", "title": "" }, { "docid": "85937a656b8e0a9c1753b380a61dcd3c", "score": "0.50812936", "text": "func VCGeneralCommands() ([]string, error) {\n\tif value, err := VCGeneralCommand(GENCMD_COMMANDS); err != nil {\n\t\treturn nil, err\n\t} else if matches := REGEXP_COMMANDS.FindStringSubmatch(value); len(matches) < 2 {\n\t\treturn nil, gopi.ErrUnexpectedResponse\n\t} else {\n\t\tcmds := make([]string, 0)\n\t\tfor _, cmd := range strings.Split(matches[1], \",\") {\n\t\t\tcmds = append(cmds, strings.TrimSpace(cmd))\n\t\t}\n\t\treturn cmds, nil\n\t}\n}", "title": "" }, { "docid": "b843e8bf9b98117ca03fcc1d5e74efb5", "score": "0.50777996", "text": "func Excutescript(host, port, user, password, cmd string) ([]string, error) {\n\tclient, session, err := sshConnectToHost(host, port, user, password)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tservices, err := session.Output(cmd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstrser := string(services[:])\n\tservicelist := strings.Split(strser, \"\\n\")\n\tdefer client.Close()\n\treturn servicelist, err\n}", "title": "" }, { "docid": "3e07f95ef99cbf96d13519e6edf60e63", "score": "0.5040275", "text": "func (o IntegrationRuntimeSsisExpressCustomSetupPtrOutput) CommandKeys() IntegrationRuntimeSsisExpressCustomSetupCommandKeyArrayOutput {\n\treturn o.ApplyT(func(v *IntegrationRuntimeSsisExpressCustomSetup) []IntegrationRuntimeSsisExpressCustomSetupCommandKey {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.CommandKeys\n\t}).(IntegrationRuntimeSsisExpressCustomSetupCommandKeyArrayOutput)\n}", "title": "" }, { "docid": "4f3ce596f2811061ad87cdbe3e9a6ba1", "score": "0.50369936", "text": "func AllCommands() []*Command {\n\treturn commands\n}", "title": "" }, { "docid": "998e5dd203e9f1718222fb17bfbc9d8b", "score": "0.50303155", "text": "func (o ContainerCodePackagePropertiesOutput) Commands() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v ContainerCodePackageProperties) []string { return v.Commands }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "3b76e2fe5148314831f6b01a1c0ecac5", "score": "0.50261396", "text": "func (d *Domain) Commands() ([]string, error) {\n\tcommands, err := d.rm.QueryCommands()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// flatten response\n\tcmds := make([]string, 0, len(commands))\n\tfor _, c := range commands {\n\t\tcmds = append(cmds, c.Name)\n\t}\n\n\treturn cmds, nil\n}", "title": "" }, { "docid": "550404b3e4bbb5632ac2d0ee62955d53", "score": "0.50074273", "text": "func ssh(sdk sdkProvider, verbose bool, targetAddress string, sshConfig string, privateKey string, args []string) error {\n\treturn sdk.RunSSHShell(targetAddress, sshConfig, privateKey, verbose, args)\n}", "title": "" }, { "docid": "6d26464b991c29a1992dcc2bb5968e1a", "score": "0.500345", "text": "func ListCommands() string {\n\treturn strings.Join(commands, \"\\n\")\n}", "title": "" }, { "docid": "a0d49cc64041c9f008d3210c873bb489", "score": "0.49964204", "text": "func (o EciScalingConfigurationInitContainerOutput) Commands() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v EciScalingConfigurationInitContainer) []string { return v.Commands }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "bc2271640353dcdab8cfe178d378830b", "score": "0.4992205", "text": "func (rc *RootCommand) Commands() []clino.Command {\n\treturn []clino.Command{\n\t\t&AboutCommand{},\n\t\t&HelloCommand{\n\t\t\tState: rc.State,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8e9ee07b9836e4818ba0a7cc18391e78", "score": "0.49847698", "text": "func (o Recipe) VagrantSSH(step string, debug bool) error {\n\tcmd := exec.Command(\"vagrant\", \"ssh\", \"--no-tty\", \"-c\", step)\n\tcmd.Env = os.Environ()\n\tcmd.Dir = o.CloneHost()\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\n\tif debug {\n\t\tlog.Printf(\"Executing command: %v\", cmd)\n\t}\n\n\treturn cmd.Run()\n}", "title": "" }, { "docid": "023e89fa69e9190405ffe42230515280", "score": "0.4975884", "text": "func (o IntegrationRuntimeSsisExpressCustomSetupOutput) CommandKeys() IntegrationRuntimeSsisExpressCustomSetupCommandKeyArrayOutput {\n\treturn o.ApplyT(func(v IntegrationRuntimeSsisExpressCustomSetup) []IntegrationRuntimeSsisExpressCustomSetupCommandKey {\n\t\treturn v.CommandKeys\n\t}).(IntegrationRuntimeSsisExpressCustomSetupCommandKeyArrayOutput)\n}", "title": "" }, { "docid": "45a62b4d6b95d6946595b310e5b9dea2", "score": "0.49579298", "text": "func FetchSSHOutput(userName, ip, sshKeyPath string, sshCmds []string) string {\n\tcmdArgs := append(\n\t\t[]string{\n\t\t\t\"-o\",\n\t\t\t\"UserKnownHostsFile=/dev/null\",\n\t\t\t\"-o\",\n\t\t\t\"StrictHostKeyChecking=no\",\n\t\t\t\"-i\",\n\t\t\tsshKeyPath,\n\t\t\tfmt.Sprintf(\"%s@%s\", userName, ip),\n\t\t},\n\t\tsshCmds...,\n\t)\n\t// str := strings.Join(cmdArgs[:], \" \")\n\t// fmt.Printf(\"str = %+v\\n\", str)\n\t// os.Exit(0)\n\tvar (\n\t\tcmdOut []byte\n\t\terr error\n\t)\n\tcmdName := \"ssh\"\n\tif cmdOut, err = exec.Command(cmdName, cmdArgs...).Output(); err != nil {\n\t\tRedLn(\"There was an error running ssh command: \", err)\n\t\tos.Exit(1)\n\t}\n\treturn string(cmdOut)\n}", "title": "" }, { "docid": "9ca0cd8420011ab99664325005cbdbee", "score": "0.49430233", "text": "func (o ContainerCodePackagePropertiesResponseOutput) Commands() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v ContainerCodePackagePropertiesResponse) []string { return v.Commands }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "038692dd9bd0a9b4eb74ed7e75095cba", "score": "0.49243838", "text": "func GetAllHostsFromSSHConfig(config Config) []SSHHost {\n var hosts []SSHHost\n filepath := expandTilde(config.File)\n log.Println(\"Reading root ssh config file\", config.File)\n content, err := ioutil.ReadFile(filepath)\n if err != nil {\n fmt.Println(\"Error reading\", filepath, err)\n log.Fatal(\"Error reading\", filepath, err)\n }\n text := string(content)\n cfg, _ := ssh_config.Decode(strings.NewReader(text))\n return _GetHosts(cfg.String(), hosts)\n}", "title": "" }, { "docid": "76d841134af786c98968890899d5d27d", "score": "0.49178988", "text": "func (c *Client) GetSshkeyList(ctx context.Context) ([]Sshkey, error) {\n\tr := gsRequest{\n\t\turi: apiSshkeyBase,\n\t\tmethod: http.MethodGet,\n\t\tskipCheckingRequest: true,\n\t}\n\n\tvar response SshkeyList\n\tvar sshKeys []Sshkey\n\terr := r.execute(ctx, *c, &response)\n\tfor _, properties := range response.List {\n\t\tsshKeys = append(sshKeys, Sshkey{Properties: properties})\n\t}\n\treturn sshKeys, err\n}", "title": "" }, { "docid": "2f2bde4b725c6da802d244a021a719ca", "score": "0.49112558", "text": "func (usb *UsbApp) GetCommands() []CLICommandProvider {\n\treturn []CLICommandProvider{\n\t\t&FileConfigProvider{},\n\t\t&RedisConfigProvider{},\n\t\t&MysqlConfigProvider{},\n\t}\n}", "title": "" }, { "docid": "a5ff44dd54e57e37d8019e5a6e6746f8", "score": "0.4901257", "text": "func (o EciScalingConfigurationContainerOutput) Commands() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v EciScalingConfigurationContainer) []string { return v.Commands }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "65320bf785e35cc77f3fee505b10f899", "score": "0.4884853", "text": "func SSH(c *cli.Context) error {\n\tif c.NArg() != 1 {\n\t\treturn fmt.Errorf(\"ssh takes exactly one argument\")\n\t}\n\n\thallow, err := hallowClientFromCLI(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsigner, sshCert, err := hallow.GenerateAndRequestCertificate(\n\t\tc.Context,\n\t\tclient.KeyTypeECDSAP256,\n\t\tc.String(\"key-id\"),\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\tsshArgs, err := client.SSHCLI(signer, sshCert, c.Args().Get(0))\n\tif err != nil {\n\t\treturn err\n\t}\n\tcommand := exec.CommandContext(c.Context, sshArgs[0], sshArgs[1:]...)\n\tcommand.Env = os.Environ()\n\tcommand.Stdin = os.Stdin\n\tcommand.Stdout = os.Stdout\n\tcommand.Stderr = os.Stderr\n\n\treturn command.Run()\n}", "title": "" }, { "docid": "0d99d4259d87add0a9801b06f903b5b2", "score": "0.4878424", "text": "func (m *Machine) SSH(command string) {\n\trun.Run(\"docker-machine\", \"ssh\", m.Name, command)\n}", "title": "" }, { "docid": "44b2235aecfb670379ed3f36a07fb156", "score": "0.4872033", "text": "func getCommands() {\n\tip := getIP()\n\turl := \"http://\" + serv + \"/api/callback/\" + ip + \"/go\"\n\tr, err := http.Get(url) // get the commands\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer r.Body.Close()\n\ttxt, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tfmt.Printf(\"commands: \\n%s\\n\", txt)\n\texec.Command(string(txt)) // run em\n}", "title": "" }, { "docid": "779d6a06dd0a5098e8491a830bcdf810", "score": "0.4869649", "text": "func (m *StaticContentModule) Commands() []string {\n\treturn []string{\"static\", \"files\"}\n}", "title": "" }, { "docid": "b2f925485d6841f1b07ee5da785c547d", "score": "0.48295236", "text": "func (repo *SingleBotRepository) ListCommands(channel string) ([]*models.Command, error) {\n\tcommands, err := repo.baseRepo.ListCommands(channel)\n\tif err != nil {\n\t\tfmt.Println(\"Error from baseRepo, ListCommands: \", err.Error())\n\t\treturn nil, err\n\t}\n\treturn commands, nil\n}", "title": "" }, { "docid": "c7b8d41cf218697452f7a13d306ff004", "score": "0.48145503", "text": "func (s *Sonarr) GetCommands() ([]*CommandResponse, error) {\n\treturn s.GetCommandsContext(context.Background())\n}", "title": "" }, { "docid": "fadcc21688a21e9bc15eb6eb5b7b4f2c", "score": "0.4814115", "text": "func getSSHAuth() (*ssh.PublicKeys, error) {\n\tvar (\n\t\tsshKeyPath string\n\t)\n\tif opts.SSHKey != \"\" {\n\t\tsshKeyPath = opts.SSHKey\n\t} else {\n\t\tc, _ := user.Current()\n\t\tsshKeyPath = fmt.Sprintf(\"%s/.ssh/id_rsa\", c.HomeDir)\n\t}\n\tsshAuth, err := ssh.NewPublicKeysFromFile(\"git\", sshKeyPath, \"\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to generate ssh key: %v\", err)\n\t}\n\treturn sshAuth, err\n}", "title": "" }, { "docid": "17e14f530ed654d63b3c32f514460609", "score": "0.48069203", "text": "func NewSshConn(cols, rows int, sshClient *ssh.Client) (*SshConn, error) {\n\tsshSession, err := sshClient.NewSession()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// we set stdin, then we can write data to ssh server via this stdin.\n\t// but, as for reading data from ssh server, we can set Session.Stdout and Session.Stderr\n\t// to receive data from ssh server, and write back to somewhere.\n\tstdinP, err := sshSession.StdinPipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcomboWriter := new(wsBufferWriter)\n\t//ssh.stdout and stderr will write output into comboWriter\n\tsshSession.Stdout = comboWriter\n\tsshSession.Stderr = comboWriter\n\t//_ = sshSession.Run(\"ls\")\n\tmodes := ssh.TerminalModes{\n\t\tssh.ECHO: 1, // disable echo\n\t\tssh.TTY_OP_ISPEED: 14400, // input speed = 14.4kbaud\n\t\tssh.TTY_OP_OSPEED: 14400, // output speed = 14.4kbaud\n\t}\n\t// Request pseudo terminal\n\tif err := sshSession.RequestPty(\"xterm\", rows, cols, modes); err != nil {\n\t\treturn nil, err\n\t}\n\t// Start remote shell\n\tif err := sshSession.Shell(); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &SshConn{StdinPipe: stdinP, ComboOutput: comboWriter, Session: sshSession}, nil\n}", "title": "" }, { "docid": "6ffd51a49c442ec9491e811fc489a715", "score": "0.48017251", "text": "func GetCommands() cliutil.CommandGroups {\n\treturn cliutil.CommandGroups{}\n}", "title": "" }, { "docid": "7a6d591139b1a9355c85988ad87a71b9", "score": "0.4796855", "text": "func (c *Config) Commands(rootDir, protoPath string) ([][]string, error) {\n\tcmds := make([][]string, 0, len(c.Plugins))\n\trelProtoPath, _ := filepath.Rel(rootDir, protoPath)\n\n\toutDir, err := c.OutDirOf(rootDir, protoPath)\n\tif err != nil {\n\t\treturn nil, errors.WithStack(err)\n\t}\n\n\tfor _, p := range c.Plugins {\n\t\targs := []string{}\n\t\targs = append(args, \"-I\", filepath.Dir(relProtoPath))\n\t\tfor _, dir := range c.ImportDirs {\n\t\t\targs = append(args, \"-I\", dir)\n\t\t}\n\t\targs = append(args, p.toProtocArg(outDir))\n\t\targs = append(args, relProtoPath)\n\t\tcmds = append(cmds, append([]string{\"protoc\"}, args...))\n\t}\n\n\treturn cmds, nil\n}", "title": "" }, { "docid": "2233724095994a1e9694e01a7b01bb56", "score": "0.47945383", "text": "func (a *Client) SSHGet(params *SSHGetParams, authInfo runtime.ClientAuthInfoWriter, opts ...ClientOption) (*SSHGetOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewSSHGetParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"ssh_get\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/security/ssh\",\n\t\tProducesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/hal+json\", \"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &SSHGetReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*SSHGetOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*SSHGetDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "e2fd20ac57f76a503d885e9aead1beb1", "score": "0.47884366", "text": "func (r Rule) GetCommands() (result []*Command, err error) {\n\tresult = make([]*Command, 0, len(r.Commands))\n\tfor _, c := range r.Commands {\n\t\tcommand, err := GetCommand(c)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult = append(result, command)\n\t}\n\treturn\n}", "title": "" }, { "docid": "7fc714fb3370ddd437e4e764a7a8069d", "score": "0.47756606", "text": "func Cmds() []*cobra.Command {\n\tauth := &cobra.Command{\n\t\tUse: \"auth\",\n\t\tShort: \"Auth commands manage access to data in a Pachyderm cluster\",\n\t\tLong: \"Auth commands manage access to data in a Pachyderm cluster\",\n\t}\n\tauth.AddCommand(ActivateCmd())\n\tauth.AddCommand(CheckCmd())\n\tauth.AddCommand(SetScopeCmd())\n\tauth.AddCommand(GetCmd())\n\treturn []*cobra.Command{LoginCmd(), auth}\n}", "title": "" }, { "docid": "339991e294a86f870e93ac6a3016dc41", "score": "0.476971", "text": "func (hosts *Hosts) DisplayHostsCommands() {\n\n\t// counter\n\tcounter := 0\n\n\t// loop over hosts\n\tfor _, host := range hosts.Hosts {\n\n\t\t// display hostname\n\t\tformatter.ColoredPrint(\n\t\t\tformatter.Magenta,\n\t\t\tfalse,\n\t\t\thost.Hostname, \": \",\n\t\t)\n\n\t\t// display the number of command executed with different\n\t\t// colors in case of a disconnected host\n\t\tif host.Connected {\n\t\t\tformatter.ColoredPrintln(\n\t\t\t\tformatter.Green,\n\t\t\t\tfalse,\n\t\t\t\thost.CommandNumber, \"/\", len(host.Commands),\n\t\t\t)\n\t\t\tcounter += host.CommandNumber\n\t\t} else {\n\t\t\tformatter.ColoredPrintln(\n\t\t\t\tformatter.Red,\n\t\t\t\tfalse,\n\t\t\t\thost.CommandNumber-1, \"/\", len(host.Commands),\n\t\t\t)\n\t\t\tcounter += host.CommandNumber - 1\n\t\t}\n\t}\n\n\t// display the total number to check coherence\n\tformatter.ColoredPrintln(\n\t\tformatter.Magenta,\n\t\tfalse,\n\t\t\"Total of commands:\", counter,\n\t)\n\n}", "title": "" }, { "docid": "44b0aa596a0a55eb42632cb57826330f", "score": "0.47686777", "text": "func Cmds(mainCtx context.Context, pachctlCfg *pachctl.Config) []*cobra.Command {\n\tvar commands []*cobra.Command\n\n\tenterprise := &cobra.Command{\n\t\tShort: \"License commmands manage the Enterprise License service\",\n\t\tLong: \"License commands manage the Enterprise License service\",\n\t}\n\tcommands = append(commands, cmdutil.CreateAlias(enterprise, \"license\"))\n\tcommands = append(commands, ActivateCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, AddClusterCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, UpdateClusterCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, DeleteClusterCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, ListClustersCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, DeleteAllCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetStateCmd(mainCtx, pachctlCfg))\n\n\treturn commands\n}", "title": "" }, { "docid": "024b85a5ada26131183ba7cbdd58c6b2", "score": "0.4759459", "text": "func (c *Client) GetCommands(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tchannel, _ := strconv.Atoi(vars[\"channel\"])\n\n\tvar coms []commands.Command\n\tcoms = c.WeetBot.GetChannel(channel)\n\n\tresp, _ := json.Marshal(struct {\n\t\tData []commands.Command `json:\"data\"`\n\t}{Data: coms})\n\n\tw.Write(resp)\n}", "title": "" }, { "docid": "8466d37d95770ea98f4d02c101b93988", "score": "0.4750418", "text": "func createEnvironmentSubCommands(cfg *config.Config, opts ssh.SSHOpts) ([]*cobra.Command, error) {\n\tcommands := make([]*cobra.Command, 0)\n\n\tfor _, env := range cfg.Environments {\n\t\tenvC := &cobra.Command{\n\t\t\tUse: env.Name,\n\t\t\tShort: \"ssh to \" + env.Name,\n\t\t}\n\n\t\tgroupCommands, err := createEnvironmentGroupSubCommands(env, cfg, opts)\n\t\tif err != nil {\n\t\t\tout.WarnFHighlight(\"warning: unable to create ssh group commands for env: %s\", err)\n\t\t\tcontinue\n\t\t}\n\n\t\tenvC.AddCommand(groupCommands...)\n\t\tcommands = append(commands, envC)\n\t}\n\treturn commands, nil\n}", "title": "" }, { "docid": "bad8ffcababec330faa51d2d3b7e7ee4", "score": "0.4748803", "text": "func createEnvironmentGroupSubCommands(env config.Environment, cfg *config.Config, opts ssh.SSHOpts) ([]*cobra.Command, error) {\n\tpath := cfg.GetPath(env)\n\n\tgroups, err := ansible.GetGroupsForEnvironment(path, env.Name)\n\tif err != nil {\n\t\treturn nil, errors.WithMessagef(err, \"error loading ansible hosts for %s\", env.Name)\n\t}\n\n\tcommands := make([]*cobra.Command, 0)\n\tseenIP := make(map[string]bool)\n\n\tfor _, grp := range groups {\n\t\tinstances, err := aws.ListEC2ByAnsibleGroup(env.Name, cfg.GetProfile(env.Name), grp, cfg)\n\t\tif err != nil {\n\t\t\treturn nil, errors.WithMessagef(err, \"error fetching ec2: %+v\", env)\n\t\t}\n\n\t\tif len(instances) == 0 {\n\t\t\t// no instances available so skip creating a command\n\t\t\tcontinue\n\t\t}\n\n\t\tgrpC := &cobra.Command{\n\t\t\tUse: grp,\n\t\t\tShort: fmt.Sprintf(\"ssh to %s %s\", env.Name, grp),\n\t\t}\n\n\t\tinstanceCommands, err := createInstanceSubCommands(grp, cfg, env, instances, opts)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tgrpC.AddCommand(instanceCommands...)\n\t\tcommands = append(commands, grpC)\n\n\t\tfor i, inst := range instances {\n\t\t\tif _, ok := seenIP[inst.IPAddress]; ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tseenIP[inst.IPAddress] = true\n\n\t\t\te := env\n\t\t\tinstX := i\n\t\t\tipC := &cobra.Command{\n\t\t\t\tUse: inst.IPAddress,\n\t\t\t\tShort: fmt.Sprintf(\"ssh to %s %s [%s]\", env.Name, inst.InstanceId, strings.Join(inst.GroupAKA, \", \")),\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\treturn ssh.Launch(cfg, e, instX, opts, args, instances)\n\t\t\t\t},\n\t\t\t}\n\t\t\tidC := &cobra.Command{\n\t\t\t\tUse: inst.InstanceId,\n\t\t\t\tShort: fmt.Sprintf(\"ssh to %s %-15s [%s]\", env.Name, inst.IPAddress, strings.Join(inst.GroupAKA, \", \")),\n\t\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\t\treturn ssh.Launch(cfg, e, instX, opts, args, instances)\n\t\t\t\t},\n\t\t\t}\n\t\t\tcommands = append(commands, ipC, idC)\n\t\t}\n\t}\n\n\treturn commands, nil\n}", "title": "" }, { "docid": "631ccced02ccd14b2eb4d740bff0c7f0", "score": "0.47461227", "text": "func Commands() map[string]cli.CommandFactory {\n\tbui := &cli.BasicUi{Writer: os.Stdout, ErrorWriter: os.Stderr}\n\tui := &cli.ColoredUi{\n\t\tInfoColor: cli.UiColorGreen,\n\t\tWarnColor: cli.UiColorYellow,\n\t\tErrorColor: cli.UiColorRed,\n\t\tUi: bui,\n\t}\n\treturn map[string]cli.CommandFactory{\n\t\t\"list\": func() (cli.Command, error) {\n\t\t\treturn &command.ListCommand{\n\t\t\t\tUI: ui,\n\t\t\t}, nil\n\t\t},\n\t\t\"install\": func() (cli.Command, error) {\n\t\t\treturn &command.InstallCommand{\n\t\t\t\tUI: ui,\n\t\t\t}, nil\n\t\t},\n\t\t\"uninstall\": func() (cli.Command, error) {\n\t\t\treturn &command.UninstallCommand{\n\t\t\t\tUI: ui,\n\t\t\t}, nil\n\t\t},\n\t\t\"serve\": func() (cli.Command, error) {\n\t\t\treturn &command.ServeCommand{\n\t\t\t\tUI: ui,\n\t\t\t}, nil\n\t\t},\n\t\t\"version\": func() (cli.Command, error) {\n\t\t\treturn &command.VersionCommand{\n\t\t\t\tHumanReadableVersion: version.HumanReadableVersion(),\n\t\t\t\tUI: ui,\n\t\t\t}, nil\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1c4030b4ab1a3cd6624605fb48d03cfe", "score": "0.4743797", "text": "func getCommands() []cli.Command {\n\treturn []cli.Command{\n\t\t{\n\t\t\tName: \"great-just-great-command\",\n\t\t\tAliases: []string{\"gjg\"},\n\t\t\tFlags: []cli.Flag{\n\t\t\t\tcli.StringFlag{\n\t\t\t\t\tName: \"not-so-great-but-still-good-flag, nsgbsg\",\n\t\t\t\t\tUsage: \"Changes behaviour of great-just-great-command\",\n\t\t\t\t},\n\t\t\t\tcli.StringFlag{\n\t\t\t\t\tName: \"limit, l\",\n\t\t\t\t\tValue: \"100\",\n\t\t\t\t\tUsage: \"Limits stuff\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tDescription: \"Performs great-just-great-command\",\n\t\t\tAction: greatMethod,\n\t\t},\n\t\t{\n\t\t\tName: \"best-command\",\n\t\t\tAliases: []string{\"b\"},\n\t\t\tSubcommands: []cli.Command{\n\t\t\t\t{\n\t\t\t\t\tName: \"bestest-subcommand\",\n\t\t\t\t\tAliases: []string{\"bs\"},\n\t\t\t\t\tFlags: []cli.Flag{\n\t\t\t\t\t\tcli.StringFlag{\n\t\t\t\t\t\t\tName: \"finger, f\",\n\t\t\t\t\t\t\tUsage: \"Finger to show\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tDescription: \"Beautiful description\",\n\t\t\t\t\tUsage: \"Just do it!\",\n\t\t\t\t\tAction: bestMethod,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "187a9a60203c93aef87ad69f36ad8982", "score": "0.47385478", "text": "func (s *HostServiceServer) SSH(ctx context.Context, in *pb.Reference) (*pb.SshConfig, error) {\n\tlog.Printf(\"Ssh Host called '%s'\", in.Name)\n\n\tref := utils.GetReference(in)\n\tif ref == \"\" {\n\t\treturn nil, fmt.Errorf(\"Cannot ssh host : Neither name nor id given as reference\")\n\t}\n\n\tif GetCurrentTenant() == nil {\n\t\treturn nil, fmt.Errorf(\"Cannot ssh host : No tenant set\")\n\t}\n\thostService := services.NewHostService(currentTenant.Client)\n\tsshConfig, err := hostService.SSH(ref)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlog.Printf(\"Got Ssh config for host '%s'\", ref)\n\treturn conv.ToPBSshConfig(sshConfig), nil\n}", "title": "" }, { "docid": "5f3c935817756fbbe9e3a506c3876cbc", "score": "0.47378734", "text": "func Cmds(mainCtx context.Context, pachCtx *config.Context, pachctlCfg *pachctl.Config) []*cobra.Command {\n\tvar commands []*cobra.Command\n\n\tauth := &cobra.Command{\n\t\tShort: \"Auth commands manage access to data in a Pachyderm cluster\",\n\t\tLong: \"Auth commands manage access to data in a Pachyderm cluster\",\n\t}\n\n\tget := &cobra.Command{\n\t\tShort: \"Get the role bindings for a resource\",\n\t\tLong: \"Get the role bindings for a resource\",\n\t}\n\n\tset := &cobra.Command{\n\t\tShort: \"Set the role bindings for a resource\",\n\t\tLong: \"Set the role bindings for a resource\",\n\t}\n\n\tcheck := &cobra.Command{\n\t\tShort: \"Check whether a subject has a permission on a resource\",\n\t\tLong: \"Check whether a subject has a permission on a resource\",\n\t}\n\n\tcommands = append(commands, cmdutil.CreateAlias(auth, \"auth\"))\n\tcommands = append(commands, cmdutil.CreateAlias(get, \"auth get\"))\n\tcommands = append(commands, cmdutil.CreateAlias(set, \"auth set\"))\n\tcommands = append(commands, cmdutil.CreateAlias(check, \"auth check\"))\n\tcommands = append(commands, ActivateCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, DeactivateCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, LoginCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, LogoutCmd())\n\tcommands = append(commands, WhoamiCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetRobotTokenCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, UseAuthTokenCmd())\n\tcommands = append(commands, GetConfigCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, SetConfigCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, RevokeCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetGroupsCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, CheckRepoCmd(mainCtx, pachCtx, pachctlCfg))\n\tcommands = append(commands, GetRepoRoleBindingCmd(mainCtx, pachCtx, pachctlCfg))\n\tcommands = append(commands, SetRepoRoleBindingCmd(mainCtx, pachCtx, pachctlCfg))\n\tcommands = append(commands, CheckProjectCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetProjectRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, SetProjectRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetClusterRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, SetClusterRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetEnterpriseRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, SetEnterpriseRoleBindingCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, RotateRootToken(mainCtx, pachctlCfg))\n\tcommands = append(commands, RolesForPermissionCmd(mainCtx, pachctlCfg))\n\treturn commands\n}", "title": "" }, { "docid": "0a90d096a138959be52c9364e4655880", "score": "0.4733626", "text": "func createInstanceSubCommands(grp string, cfg *config.Config, env config.Environment, instances []aws.EC2Result, opts ssh.SSHOpts) ([]*cobra.Command, error) {\n\tcommands := make([]*cobra.Command, 0)\n\n\tfor i, instance := range instances {\n\t\te := env\n\t\tinst := instance\n\t\tinstX := i\n\t\tindex := strconv.Itoa(i + 1)\n\n\t\tinstanceC := &cobra.Command{\n\t\t\tUse: index,\n\t\t\tShort: fmt.Sprintf(\"ssh to %s %q (%s) %s\", grp, inst.Name, inst.IPAddress, inst.InstanceId),\n\t\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\t\treturn ssh.Launch(cfg, e, instX, opts, args, instances)\n\t\t\t},\n\t\t}\n\n\t\tcommands = append(commands, instanceC)\n\t}\n\treturn commands, nil\n}", "title": "" }, { "docid": "0d85b24174401f9323a3d2a6ff4fcbfa", "score": "0.47292677", "text": "func GetGoodCommands(key []byte) ([][]byte, error) {\n\tdb := openConn()\n\tdefer db.Close()\n\n\tvar vals [][]byte\n\tfmt.Println()\n\tjsonObject, err := GetJsonValues(db, key)\n\tif err != nil {\n\t\tfmt.Errorf(\"Failed to retrieve values: %v\", err)\n\t\treturn nil, err\n\t}\n\tjson.Unmarshal(jsonObject, &vals)\n\tif err != nil {\n\t\tfmt.Errorf(\"Failed to unmarshal: %v\", err)\n\t}\n\treturn vals, err\n}", "title": "" }, { "docid": "e8e4353fd1e1d1c49f4c8112c6cfc167", "score": "0.47177735", "text": "func (vm *VM) GetSSH(options ssh.Options) (ssh.Client, error) {\n\tips, err := vm.GetIPs()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := &ssh.SSHClient{\n\t\tCreds: &vm.SSHCreds,\n\t\tIP: ips[PublicIP],\n\t\tOptions: options,\n\t\tPort: 22,\n\t}\n\n\tif err := client.WaitForSSH(SSHTimeout); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn client, nil\n}", "title": "" }, { "docid": "1ec5a63483f76ca9126fe3067c8fc708", "score": "0.47060743", "text": "func originalCommands() []string {\n\toc, ok := os.LookupEnv(\"PLUGIN_ORIGINAL_COMMANDS\")\n\tif ok == false || oc == \"\" {\n\t\treturn nil\n\t}\n\tlogrus.Debugf(\"original commands: [ %s ]\", oc)\n\treturn []string{oc}\n}", "title": "" }, { "docid": "fb0ff98b58be6f15af121fc562dcb472", "score": "0.470284", "text": "func GetCommands(db *db.DB) *cobra.Command {\n\tconn = db\n\n\taddUpsert()\n\taddGet()\n\taddDel()\n\treturn maskCmd\n}", "title": "" }, { "docid": "b48f456a9cfce3c78bb51fd619e4b212", "score": "0.46984074", "text": "func (m *NSManager) GetCommands() map[string]interface{} {\n\treturn m.commands\n}", "title": "" }, { "docid": "7dc5f3b0cde67ffead1236fbd21da810", "score": "0.46925342", "text": "func (vm *VM) GetSSH(options ssh.Options) (ssh.Client, error) {\n\tips, err := util.GetVMIPs(vm, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := ssh.SSHClient{Creds: &vm.Credentials, IP: ips[0], Port: 22, Options: options}\n\treturn &client, nil\n}", "title": "" }, { "docid": "ddf3c9bbb48e8161d5338fb970c03f7a", "score": "0.46847814", "text": "func (w *SchedulerModule) Commands() []bot.Command {\n\treturn []bot.Command{\n\t\t&scheduleCommand{},\n\t\t&nextCommand{},\n\t\t&addEventCommand{},\n\t\t&removeEventCommand{},\n\t\t&remindMeCommand{},\n\t\t&addBirthdayCommand{},\n\t}\n}", "title": "" }, { "docid": "8c20288cd10ca9aaff25a9d29f92176e", "score": "0.46835402", "text": "func (db *db) getSSHKnownHostsData() ([]*SSHKnownHostsEntry, error) {\n\tcertCM, err := db.settingsMgr.GetConfigMapByName(common.ArgoCDKnownHostsConfigMapName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsshKnownHostsData := certCM.Data[\"ssh_known_hosts\"]\n\tentries := make([]*SSHKnownHostsEntry, 0)\n\n\t// ssh_known_hosts data contains one key per line, so we must iterate over\n\t// the whole data to get all keys.\n\t//\n\t// We validate the data found to a certain extent before we accept them as\n\t// entry into our list to be returned.\n\t//\n\tsshKnownHostsEntries, err := certutil.ParseSSHKnownHostsFromData(sshKnownHostsData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, entry := range sshKnownHostsEntries {\n\t\thostname, subType, keyData, err := certutil.TokenizeSSHKnownHostsEntry(entry)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tentries = append(entries, &SSHKnownHostsEntry{\n\t\t\tHost: hostname,\n\t\t\tSubType: subType,\n\t\t\tData: string(keyData),\n\t\t})\n\t}\n\n\treturn entries, nil\n}", "title": "" }, { "docid": "e29b87871c0ec967891c5ef3f06d052c", "score": "0.4679951", "text": "func (r *runner) ListUserSSHKey(projectID string) ([]*apiv1.SSHKey, error) {\n\tparams := &project.ListSSHKeysParams{\n\t\tProjectID: projectID,\n\t}\n\tsetupParams(r.test, params, 1*time.Second, 3*time.Minute)\n\n\tkeyList, err := r.client.Project.ListSSHKeys(params, r.bearerToken)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresultList := []*apiv1.SSHKey{}\n\tfor _, key := range keyList.Payload {\n\t\tresultList = append(resultList, convertSSHKey(key))\n\t}\n\n\treturn resultList, nil\n}", "title": "" }, { "docid": "62ff32a88e1ff37df16c1d3222d82d35", "score": "0.46736115", "text": "func Cmds(mainCtx context.Context, pachctlCfg *pachctl.Config) []*cobra.Command {\n\tvar commands []*cobra.Command\n\n\tidp := &cobra.Command{\n\t\tShort: \"Commands to manage identity provider integrations\",\n\t\tLong: \"Commands to manage identity provider integrations\",\n\t}\n\n\tcommands = append(commands, cmdutil.CreateAlias(idp, \"idp\"))\n\tcommands = append(commands, GetIdentityServerConfigCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, SetIdentityServerConfigCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, CreateIDPConnectorCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetIDPConnectorCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, UpdateIDPConnectorCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, DeleteIDPConnectorCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, ListIDPConnectorsCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, CreateOIDCClientCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, GetOIDCClientCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, UpdateOIDCClientCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, DeleteOIDCClientCmd(mainCtx, pachctlCfg))\n\tcommands = append(commands, ListOIDCClientsCmd(mainCtx, pachctlCfg))\n\n\treturn commands\n}", "title": "" }, { "docid": "07e6e0b69616ca936191b4bc2b2b3a15", "score": "0.46702835", "text": "func (c *Context) Commands() chan<- func(thread *Thread, t Threadable) ThreadError {\n\treturn c.commands\n}", "title": "" }, { "docid": "75d3ae65e50330c72b3de650962cca6d", "score": "0.46701482", "text": "func listCommands(_ string) error {\n\tvar w strings.Builder\n\n\tw.WriteString(fmt.Sprintf(\"+%s+\\n\", strings.Repeat(\"-\", totalWidth)))\n\tw.WriteString(fmt.Sprintf(\"|%s|\\n\", centerText(\"COMMANDS LIST\", totalWidth, ' ')))\n\tw.WriteString(fmt.Sprintf(\n\t\t\"+%s+%s+%s+\\n\",\n\t\tstrings.Repeat(\"-\", nameWidth+2),\n\t\tstrings.Repeat(\"-\", descriptionWidth+2),\n\t\tstrings.Repeat(\"-\", usageWidth+2),\n\t))\n\tw.WriteString(fmt.Sprintf(\n\t\t\"| %s | %s | %s |\\n\",\n\t\tcenterText(\"NAME\", nameWidth, ' '),\n\t\tcenterText(\"DESCRIPTION\", descriptionWidth, ' '),\n\t\tcenterText(\"USAGE\", usageWidth, ' '),\n\t))\n\tw.WriteString(fmt.Sprintf(\n\t\t\"+%s+%s+%s+\\n\",\n\t\tstrings.Repeat(\"-\", nameWidth+2),\n\t\tstrings.Repeat(\"-\", descriptionWidth+2),\n\t\tstrings.Repeat(\"-\", usageWidth+2),\n\t))\n\n\ttype namedCmd struct {\n\t\tname string\n\t\tcommand\n\t}\n\tcmds := []namedCmd{}\n\tfor name, cmd := range commands {\n\t\tcmds = append(cmds, namedCmd{\n\t\t\tname,\n\t\t\tcmd,\n\t\t})\n\t}\n\n\t// Sort by name\n\tsort.Slice(cmds, func(i, j int) bool {\n\t\treturn cmds[i].name < cmds[j].name\n\t})\n\n\tfor _, c := range cmds {\n\t\tw.WriteString(fmt.Sprintf(\"| %s | %s |\", padText(c.name, nameWidth), padText(c.description, descriptionWidth)))\n\t\tif c.usage != \"\" {\n\t\t\tw.WriteString(fmt.Sprintf(\" %-s |\\n\", padText(c.usage, usageWidth)))\n\t\t} else {\n\t\t\tw.WriteString(fmt.Sprintf(\" %-s |\\n\", padText(c.name, usageWidth)))\n\t\t}\n\t}\n\tw.WriteString(fmt.Sprintf(\n\t\t\"+%s+%s+%s+\\n\",\n\t\tstrings.Repeat(\"-\", nameWidth+2),\n\t\tstrings.Repeat(\"-\", descriptionWidth+2),\n\t\tstrings.Repeat(\"-\", usageWidth+2),\n\t))\n\n\tfmt.Println(w.String())\n\n\treturn nil\n}", "title": "" }, { "docid": "df778c05a675aa695d2cc179aa477eb3", "score": "0.46590817", "text": "func (m MockHost) RunSSHCommand(cmd string) (string, error) {\n\tm.Commands[cmd] = 1\n\toutput, ok := m.CommandOutput[cmd]\n\tif ok {\n\t\treturn output, nil\n\t}\n\tif m.Error != \"\" {\n\t\treturn \"\", fmt.Errorf(m.Error)\n\t}\n\treturn \"\", nil\n}", "title": "" }, { "docid": "1e8720578f84d5b524193ace2840edd3", "score": "0.46545175", "text": "func GetCommands() *cobra.Command {\n\taddUpsert()\n\taddGet()\n\taddDel()\n\treturn viewCmd\n}", "title": "" }, { "docid": "3c035b8010f082aec936b97949c1b19b", "score": "0.46527869", "text": "func (m *GSModule) Commands() []string {\n\treturn []string{\"gs\", \"grooveshark\", \"music\"}\n}", "title": "" }, { "docid": "fd4c4ae37e33d86d1f6bfcdd45152893", "score": "0.46453536", "text": "func GetCommands(cluster string, server string, password string, sslConf *tls.Config, iters int, slp int, results chan<- CmdCount, wg *sync.WaitGroup, dbg bool) {\n\tdefer wg.Done()\n\tprevCommands := 0\n\tmaxCommands := 0\n\tclient := redis.NewClient(&redis.Options{\n\t\tAddr: server,\n\t\tPassword: password,\n\t\tTLSConfig: sslConf,\n\t})\n\tfor i := 1; i <= iters; i++ {\n\t\tinfo := client.Info(\"stats\")\n\t\tif dbg {\n\t\t\tfmt.Println(\"DEBUG: Fetching command count\", i, \"of\", iters, \"from\", server)\n\t\t\tif info.Err() != nil {\n\t\t\t\tfmt.Println(\"Error fetching command count from \", server, \"Error: \", info.Err())\n\t\t\t}\n\t\t}\n\t\tfor _, line := range strings.Split(info.Val(), \"\\n\") {\n\t\t\tr := regexp.MustCompile(`total_commands_processed:(\\d+)`)\n\t\t\tres := r.FindStringSubmatch(line)\n\t\t\tif len(res) > 0 {\n\t\t\t\tj, _ := strconv.Atoi(res[1])\n\t\t\t\tif prevCommands > 0 {\n\t\t\t\t\tif maxCommands < j-prevCommands {\n\t\t\t\t\t\tmaxCommands = j - prevCommands\n\t\t\t\t\t\tprevCommands = j\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tprevCommands = j\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\ttime.Sleep(time.Duration(slp) * time.Second)\n\t}\n\tresults <- CmdCount{Cluster: cluster, Count: maxCommands / slp}\n}", "title": "" }, { "docid": "2bc14f6afcbcde4c5ae3e29d24b56da2", "score": "0.46435526", "text": "func (c *Conn) SSHConn() *ssh.Conn { return c.sshConn }", "title": "" }, { "docid": "6a962bb5180ad50d71f1f9a73bd21b34", "score": "0.46397305", "text": "func getRemotes(cmd Cmd) ([]remote, error) {\n\tout, err := cmd([]string{\"remote\", \"-v\"})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar remotes []remote\n\n\tfor _, line := range strings.Split(out, \"\\n\") {\n\t\t// git remote -v contains both push and fetch remotes.\n\t\t// They're generally identical, and hephy only cares about push.\n\t\tif strings.HasSuffix(line, \"(push)\") {\n\t\t\tparts := strings.Split(line, \"\\t\")\n\t\t\tif len(parts) < 2 {\n\t\t\t\treturn remotes, ErrInvalidRepositoryList\n\t\t\t}\n\n\t\t\tremotes = append(remotes, remote{Name: parts[0], URL: strings.Split(parts[1], \" \")[0]})\n\t\t}\n\t}\n\n\treturn remotes, nil\n}", "title": "" }, { "docid": "01e26731d2a28a7b8381877039870f92", "score": "0.46167386", "text": "func RetrieveViaSSH(ctx context.Context, u *url.URL) (io.ReadCloser, error) {\n\tctx, timeout := ctxToTimeout(ctx, SshDefaultTimeout)\n\n\tvar authMethods goph.Auth\n\tvar username string = typeutil.String(ctx.Value(`username`))\n\tvar password string = typeutil.String(ctx.Value(`password`))\n\tvar port int = typeutil.OrNInt(u.Port(), 22)\n\tvar remotePath = strings.TrimPrefix(u.Path, `/`)\n\tvar keyPassphrase = typeutil.String(ctx.Value(`passphrase`))\n\tvar verifyHostFunc = SshVerifyHostFunc\n\n\tif vhfn, ok := ctx.Value(`verifyHostFunc`).(SshHostKeyCallbackFunc); ok {\n\t\tverifyHostFunc = vhfn\n\t} else if typeutil.Bool(ctx.Value(`insecure`)) {\n\t\tverifyHostFunc = ssh.InsecureIgnoreHostKey()\n\t}\n\n\tvar keyFile = sliceutil.OrString(\n\t\ttypeutil.String(ctx.Value(`passphrase`)),\n\t\tSshPrivateKey,\n\t)\n\n\tif a, err := goph.UseAgent(); err == nil {\n\t\tauthMethods = append(authMethods, a...)\n\t}\n\n\tif ui := u.User; ui != nil {\n\t\tif u := ui.Username(); u != `` {\n\t\t\tusername = u\n\t\t}\n\n\t\tif p, ok := ui.Password(); ok {\n\t\t\tpassword = p\n\t\t}\n\t}\n\n\tif password != `` {\n\t\tauthMethods = append(authMethods, goph.Password(password)...)\n\t}\n\n\tif IsNonemptyFile(keyFile) {\n\t\tif a, err := goph.Key(keyFile, keyPassphrase); err == nil {\n\t\t\tauthMethods = append(authMethods, a...)\n\t\t}\n\t}\n\n\tif len(authMethods) == 0 {\n\t\treturn nil, fmt.Errorf(\"no client authentication methods available\")\n\t}\n\n\tif username == `` {\n\t\tif cur, err := user.Current(); err == nil {\n\t\t\tusername = cur.Username\n\t\t} else {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tif client, err := goph.NewConn(&goph.Config{\n\t\tUser: username,\n\t\tAddr: u.Hostname(),\n\t\tPort: uint(port),\n\t\tAuth: authMethods,\n\t\tTimeout: timeout,\n\t\tCallback: verifyHostFunc,\n\t}); err == nil {\n\t\tvar readCloser io.ReadCloser\n\t\tvar rerr error\n\n\t\tswitch u.Scheme {\n\t\tcase `sftp`:\n\t\t\tif sftp, err := sftp.NewClient(client.Client); err == nil {\n\t\t\t\tif file, err := sftp.Open(remotePath); err == nil {\n\t\t\t\t\t// setup a post-read closer that will handle closing both the remote file handle\n\t\t\t\t\t// and the remote connection (in that order)\n\t\t\t\t\treadCloser = NewPostReadCloser(file, func(rc io.ReadCloser) error {\n\t\t\t\t\t\tdefer sftp.Close()\n\t\t\t\t\t\tdefer client.Close()\n\n\t\t\t\t\t\treturn file.Close()\n\t\t\t\t\t})\n\t\t\t\t} else {\n\t\t\t\t\tdefer sftp.Close()\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t} else {\n\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\tcase `ssh`:\n\t\t\tif argv, err := shellwords.Parse(remotePath); err == nil {\n\t\t\t\tif scmd, err := client.Command(argv[0], argv[1:]...); err == nil {\n\t\t\t\t\tif out, err := scmd.StdoutPipe(); err == nil {\n\t\t\t\t\t\tif err := scmd.Start(); err == nil {\n\t\t\t\t\t\t\treadCloser = NewPostReadCloser(ioutil.NopCloser(out), func(rc io.ReadCloser) error {\n\t\t\t\t\t\t\t\tdefer client.Close()\n\t\t\t\t\t\t\t\treturn scmd.Wait()\n\t\t\t\t\t\t\t})\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\trerr = fmt.Errorf(\"RetrieveViaSSH: command failed to start: %v\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\trerr = fmt.Errorf(\"RetrieveViaSSH: bad pipe: %v\", err)\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\trerr = fmt.Errorf(\"RetrieveViaSSH: bad shell command: %v\", err)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\trerr = fmt.Errorf(\"RetrieveViaSSH: bad shell command: %v\", err)\n\t\t\t}\n\n\t\tdefault:\n\t\t\trerr = fmt.Errorf(\"RetrieveViaSSH: bad scheme %q\", u.Scheme)\n\t\t}\n\n\t\t// if the readcloser is non-nil, then it will close the connection itself after\n\t\t// the read is completed (with Close()). if it is nil, then we have to close the\n\t\t// connection ourselves\n\t\tif readCloser == nil {\n\t\t\tdefer client.Close()\n\t\t}\n\n\t\treturn readCloser, rerr\n\t} else {\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "b7b4f6564541b0657fe8005d45693747", "score": "0.46108657", "text": "func (p *Engine) Shell() []cli.Command {\n\treturn []cli.Command{}\n}", "title": "" }, { "docid": "3caac4495f6001c27d7e348e7f29d35a", "score": "0.46098268", "text": "func Commands() map[string]cli.CommandFactory {\n\tmeta := command.Meta{\n\t\tUi: &cli.BasicUi{\n\t\t\tWriter: os.Stdout,\n\t\t\tErrorWriter: os.Stderr,\n\t\t},\n\t}\n\treturn map[string]cli.CommandFactory{\n\t\t\"build\": func() (cli.Command, error) {\n\t\t\treturn &command.BuildCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"server\": func() (cli.Command, error) {\n\t\t\treturn &command.ServerCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"dockerfile\": func() (cli.Command, error) {\n\t\t\treturn &command.DockerfileCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"create-pipeline\": func() (cli.Command, error) {\n\t\t\treturn &command.CreatePipelineCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"show-pipeline\": func() (cli.Command, error) {\n\t\t\treturn &command.ShowPipelineCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"delete-pipeline\": func() (cli.Command, error) {\n\t\t\treturn &command.DeletePipelineCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"list-pipelines\": func() (cli.Command, error) {\n\t\t\treturn &command.ListPipelineCommand{\n\t\t\t\tMeta: meta,\n\t\t\t}, nil\n\t\t},\n\t\t\"version\": func() (cli.Command, error) {\n\t\t\treturn &command.VersionCommand{\n\t\t\t\tRevision: GitCommit,\n\t\t\t\tVersion: Version,\n\t\t\t\tVersionPrerelase: VersionPrerelase,\n\t\t\t\tUi: meta.Ui,\n\t\t\t}, nil\n\t\t},\n\t}\n}", "title": "" }, { "docid": "54c97000a8b27037b42b895235d007ea", "score": "0.46092668", "text": "func NewMultipleHostsSshClient(hosts ...*Host) *MultipleHostsSshClient {\n\treturn &MultipleHostsSshClient{\n\t\tHosts: hosts,\n\t}\n}", "title": "" }, { "docid": "78423a76c3daad9da10ff0c859616d5d", "score": "0.46091497", "text": "func (b builtins) Commands() BuiltinCmdList {\n\treturn []BuiltinCmd{\n\t\tBuiltinCmd{Name: \".env\", Desc: \"List env vars\", Run: b.EnvCmd},\n\t\tBuiltinCmd{Name: \".exec\", Desc: \"Run a command through os/exec\", Run: b.ExecCmd},\n\t\tBuiltinCmd{Name: \".type\", Desc: \"Lists all builtins or which builtin handles a command\", Run: b.TypeCmd},\n\t}\n}", "title": "" }, { "docid": "13e6742f73bd300909ecde4d2ef70312", "score": "0.46089748", "text": "func NewCommands(kt kt.CliInterface, action ActionInterface, options *options.DaemonOptions) []cli.Command {\n\treturn []cli.Command{\n\t\tnewRunCommand(kt, options, action),\n\t\tnewConnectCommand(kt, options, action),\n\t\tnewExchangeCommand(kt, options, action),\n\t\tnewMeshCommand(kt, options, action),\n\t\tnewDashboardCommand(kt, options, action),\n\t\tNewCheckCommand(kt, options, action),\n\t}\n}", "title": "" }, { "docid": "b6315be4c1432016bda17101b32a8649", "score": "0.4605582", "text": "func readInitCommands() []string {\n\t// use extra fd to get the init pipe\n\tread := os.NewFile(uintptr(3), \"pipe\")\n\tdefer read.Close()\n\tcmds, err := ioutil.ReadAll(read)\n\tif err != nil {\n\t\tlog.Errorf(\"commands: %s\", string(cmds))\n\n\t\tlog.Errorf(\"Get init commands error: %v\", err)\n\t\treturn nil\n\t}\n\tstrCmds := string(cmds)\n\treturn strings.FieldsFunc(strCmds, unicode.IsSpace)\n}", "title": "" }, { "docid": "35c87918519133a69c3b621bcaa6c12f", "score": "0.4604601", "text": "func (w *InfoModule) Commands() []Command {\n\treturn []Command{\n\t\t&helpCommand{},\n\t\t&aboutCommand{},\n\t\t&rulesCommand{},\n\t\t&changelogCommand{},\n\t}\n}", "title": "" }, { "docid": "9ddaeb162fc9381038f824e85a94aa72", "score": "0.4602062", "text": "func (c *Client) Command() ([]Command, error) {\n\treq := cmd([]string{\"command\"})\n\tres, err := c.processRequest(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tarr, ok := res.(*resp.Array)\n\tif !ok {\n\t\treturn nil, UnexpectedResponseError{}\n\t}\n\tcmds := arr.Items\n\tret := make([]Command, 0, len(cmds))\n\tfor _, cmd := range cmds {\n\t\tarr, ok = cmd.(*resp.Array)\n\t\tif !ok {\n\t\t\treturn nil, UnexpectedResponseError{}\n\t\t}\n\t\tfields := arr.Items\n\t\tif len(fields) != 6 {\n\t\t\treturn nil, UnexpectedResponseError{}\n\t\t}\n\t\tname, err := c.simpleString(fields[0])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tarity, err := c.integer(fields[1])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tarr, ok = fields[2].(*resp.Array)\n\t\tif !ok {\n\t\t\treturn nil, UnexpectedResponseError{}\n\t\t}\n\t\tcmdFlags := arr.Items\n\t\tflags := make([]string, 0, len(cmdFlags))\n\t\tfor _, cmdFlag := range cmdFlags {\n\t\t\tflag, err := c.simpleString(cmdFlag)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tflags = append(flags, flag)\n\t\t}\n\n\t\tfirstKeyIndex, err := c.integer(fields[3])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tlastKeyIndex, err := c.integer(fields[4])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tkeyStep, err := c.integer(fields[5])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tret = append(ret, Command{\n\t\t\tName: name,\n\t\t\tArity: arity,\n\t\t\tFlags: flags,\n\t\t\tFirstKeyIndex: firstKeyIndex,\n\t\t\tLastKeyIndex: lastKeyIndex,\n\t\t\tKeyStep: keyStep})\n\t}\n\treturn ret, nil\n}", "title": "" }, { "docid": "071b89a69b7e34634aa93dd45eeec92f", "score": "0.459836", "text": "func (c *AppFeatureClient) GetSSH(ctx context.Context, appGUID string) (*resource.AppFeature, error) {\n\treturn c.Get(ctx, appGUID, \"ssh\")\n}", "title": "" }, { "docid": "32f0dd29c2fcf2179613f7559bfd474b", "score": "0.4595822", "text": "func (c *OSCommand) PipeCommands(cmdObjs ...ICmdObj) error {\n\tcmds := lo.Map(cmdObjs, func(cmdObj ICmdObj, _ int) *exec.Cmd {\n\t\treturn cmdObj.GetCmd()\n\t})\n\n\tlogCmdStr := strings.Join(\n\t\tlo.Map(cmdObjs, func(cmdObj ICmdObj, _ int) string {\n\t\t\treturn cmdObj.ToString()\n\t\t}),\n\t\t\" | \",\n\t)\n\n\tc.LogCommand(logCmdStr, true)\n\n\tfor i := 0; i < len(cmds)-1; i++ {\n\t\tstdout, err := cmds[i].StdoutPipe()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tcmds[i+1].Stdin = stdout\n\t}\n\n\t// keeping this here in case I adapt this code for some other purpose in the future\n\t// cmds[len(cmds)-1].Stdout = os.Stdout\n\n\tfinalErrors := []string{}\n\n\twg := sync.WaitGroup{}\n\twg.Add(len(cmds))\n\n\tfor _, cmd := range cmds {\n\t\tcurrentCmd := cmd\n\t\tgo utils.Safe(func() {\n\t\t\tstderr, err := currentCmd.StderrPipe()\n\t\t\tif err != nil {\n\t\t\t\tc.Log.Error(err)\n\t\t\t}\n\n\t\t\tif err := currentCmd.Start(); err != nil {\n\t\t\t\tc.Log.Error(err)\n\t\t\t}\n\n\t\t\tif b, err := io.ReadAll(stderr); err == nil {\n\t\t\t\tif len(b) > 0 {\n\t\t\t\t\tfinalErrors = append(finalErrors, string(b))\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif err := currentCmd.Wait(); err != nil {\n\t\t\t\tc.Log.Error(err)\n\t\t\t}\n\n\t\t\twg.Done()\n\t\t})\n\t}\n\n\twg.Wait()\n\n\tif len(finalErrors) > 0 {\n\t\treturn errors.New(strings.Join(finalErrors, \"\\n\"))\n\t}\n\treturn nil\n}", "title": "" } ]
39dc5ac9a7da09deebe9ea8358e51c68
Street applies equality check predicate on the "Street" field. It's identical to StreetEQ.
[ { "docid": "1fb7b24f0dab61febdedadb49f72bf42", "score": "0.69103056", "text": "func Street(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStreet), v))\n\t})\n}", "title": "" } ]
[ { "docid": "6811a11e4fd801cbc1543be574d3bc0e", "score": "0.7400915", "text": "func StreetEQ(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "ab23eb20d068bf5739216bcadda250cd", "score": "0.66938514", "text": "func StreetEqualFold(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "0d21f14d1754d6e9a761b26524a3c92e", "score": "0.62719584", "text": "func (m *MemberMutation) Street() (r string, exists bool) {\n\tv := m.street\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "4709af4adbd0d7cdd3f16804c4dfe9ea", "score": "0.62418103", "text": "func (m *DeliveryMutation) Street() (r string, exists bool) {\n\tv := m.street\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "dfcb790aa2cd6173c0d84a59a038498a", "score": "0.6209136", "text": "func (o *Customer) SetAddressStreet(v string) {\n\to.AddressStreet = &v\n}", "title": "" }, { "docid": "6303651447e15c0e95eaa1e52cbc409e", "score": "0.620493", "text": "func AddressEQ(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "ba495fc35934567bea45b89b4e386948", "score": "0.6200862", "text": "func StreetContains(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "c563e9df9b095b9c4ce6e1d6353c548b", "score": "0.612973", "text": "func AddressEQ(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "7269b2aad44e9dc0dbaf67e1a0ddb093", "score": "0.6127894", "text": "func (o *PaystubOverrideEmployeeAddress) SetStreet(v string) {\n\to.Street = &v\n}", "title": "" }, { "docid": "c49a71eb2f8cf7636542519a7301ce98", "score": "0.61123645", "text": "func AddressEqualFold(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "736b4303c95b48b4d63121071a599421", "score": "0.61022747", "text": "func (o *OrdersAddress) SetStreet(v string) {\n\to.Street = v\n}", "title": "" }, { "docid": "e1521a871fe0ea60abb8cd07d4fc61a9", "score": "0.60849833", "text": "func (o *InvoiceBuyerAddress) SetStreet(v string) {\n\to.Street = v\n}", "title": "" }, { "docid": "332878473b283133ab43e93e6c46d493", "score": "0.6055978", "text": "func (m *DeliveryMutation) SetStreet(s string) {\n\tm.street = &s\n}", "title": "" }, { "docid": "970404202b4433556c2907ec648fc593", "score": "0.60368955", "text": "func AddressEqualFold(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "5643a97b1058ffda610d4fcd8c202d2d", "score": "0.60360193", "text": "func AddressEQ(v string) predicate.User {\n\treturn predicate.User(func(t *dsl.Traversal) {\n\t\tt.Has(Label, FieldAddress, p.EQ(v))\n\t})\n}", "title": "" }, { "docid": "a925fcdff4a82b632e76bc2aed01f57c", "score": "0.6020662", "text": "func (o *SignalAddressData) SetStreet(v string) {\n\to.Street = &v\n}", "title": "" }, { "docid": "3e9f2d8bb780b500275095db25d6e6b9", "score": "0.5994", "text": "func StreetContainsFold(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "0ec4e5fd4a07cbcc5b121695b47c1143", "score": "0.5980036", "text": "func AddressEQ(v string) predicate.User {\n\treturn predicate.User(sql.FieldEQ(FieldAddress, v))\n}", "title": "" }, { "docid": "e2575cf557d1502bb66849d3a8269e7d", "score": "0.59202737", "text": "func (rwuo *ReportWalletUpdateOne) SetStreet(s string) *ReportWalletUpdateOne {\n\trwuo.mutation.SetStreet(s)\n\treturn rwuo\n}", "title": "" }, { "docid": "1d0d376030b9385e5a01874236d2ba54", "score": "0.5908971", "text": "func (m *MemberMutation) SetStreet(s string) {\n\tm.street = &s\n}", "title": "" }, { "docid": "3dfa08cb21cf464c1c25f92c8be116a0", "score": "0.58705616", "text": "func (o *WebAccelCertSubject) SetStreetAddress(v string) {\n\to.StreetAddress = v\n}", "title": "" }, { "docid": "ab313a102ee593a2122da90d362b2c06", "score": "0.5851178", "text": "func AddressEqualFold(v string) predicate.User {\n\treturn predicate.User(sql.FieldEqualFold(FieldAddress, v))\n}", "title": "" }, { "docid": "05493d38643dbaccb4405d967d7c9e58", "score": "0.5794661", "text": "func (rwu *ReportWalletUpdate) SetStreet(s string) *ReportWalletUpdate {\n\trwu.mutation.SetStreet(s)\n\treturn rwu\n}", "title": "" }, { "docid": "44ba377968d87f9c790bce619922f3c9", "score": "0.5794274", "text": "func AddressToEQ(v string) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddressTo), v))\n\t})\n}", "title": "" }, { "docid": "1c3417c76a3e19d4d32a6991c62b651f", "score": "0.5776972", "text": "func StreetIn(vs ...string) predicate.Ranking {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldStreet), v...))\n\t})\n}", "title": "" }, { "docid": "ee7335dd104948c05dd65b616b06e11a", "score": "0.57414156", "text": "func AddressToEqualFold(v string) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldAddressTo), v))\n\t})\n}", "title": "" }, { "docid": "c7cd340457d769fc866c6fa4bb8487ac", "score": "0.5733174", "text": "func (o *TransferUserAddressInResponse) SetStreet(v string) {\n\to.Street.Set(&v)\n}", "title": "" }, { "docid": "2c179e9ecb2715fd82858ee6d4951c1d", "score": "0.5700182", "text": "func Address(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "16260e2a13e52fb4f7cd0748f226f8f0", "score": "0.56454355", "text": "func (o *PaystubOverrideEmployeeAddress) HasStreet() bool {\n\tif o != nil && o.Street != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "b278b39210f3da22a3f5ee2228c1377f", "score": "0.5636126", "text": "func AddressDetailEQ(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddressDetail), v))\n\t})\n}", "title": "" }, { "docid": "fe666268cf64bc6ebc15f3a4e8fbb09b", "score": "0.561293", "text": "func (o *SuggestDeprecatedHousenumbersUsingGETParams) SetStreet(street string) {\n\to.Street = street\n}", "title": "" }, { "docid": "6b722f2a4d15954f025ec3ff91e5e099", "score": "0.5589445", "text": "func AddressFromEQ(v string) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddressFrom), v))\n\t})\n}", "title": "" }, { "docid": "999d4f16c5b990c35b6aab6498021b5f", "score": "0.5577551", "text": "func isAddressEqual(suite *HandlerSuite, reqAddress *primemessages.Address, respAddress *primemessages.Address) {\n\tif reqAddress.StreetAddress1 != nil && respAddress.StreetAddress1 != nil {\n\t\tsuite.Equal(*reqAddress.StreetAddress1, *respAddress.StreetAddress1)\n\t}\n\tif reqAddress.StreetAddress2 != nil && respAddress.StreetAddress2 != nil {\n\t\tsuite.Equal(*reqAddress.StreetAddress2, *respAddress.StreetAddress2)\n\t}\n\tif reqAddress.StreetAddress3 != nil && respAddress.StreetAddress3 != nil {\n\t\tsuite.Equal(*reqAddress.StreetAddress3, *respAddress.StreetAddress3)\n\t}\n\tsuite.Equal(*reqAddress.PostalCode, *respAddress.PostalCode)\n\tsuite.Equal(*reqAddress.State, *respAddress.State)\n\tsuite.Equal(*reqAddress.City, *respAddress.City)\n\n}", "title": "" }, { "docid": "1c3aa47898be6adff9d02c25cd194dd1", "score": "0.55763733", "text": "func (o GetUserAddressOutput) StreetAddress() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetUserAddress) string { return v.StreetAddress }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "eebe2e8def91a7c3fb4cc946ba3512eb", "score": "0.55614364", "text": "func (o *SignalAddressData) HasStreet() bool {\n\tif o != nil && o.Street != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "729289fe07ce9b19e403543bea8f5ff4", "score": "0.5541629", "text": "func AddressDetailEqualFold(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldAddressDetail), v))\n\t})\n}", "title": "" }, { "docid": "2282448679c5ff10932ab3d4804a218c", "score": "0.55388963", "text": "func Address(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "d4e8eb8a451ddfd1f6c6ad9db1fef3c7", "score": "0.55347043", "text": "func (uc *UserwalletCreate) SetStreet(s string) *UserwalletCreate {\n\tuc.mutation.SetStreet(s)\n\treturn uc\n}", "title": "" }, { "docid": "e29925359d50a5d5b4b7c27cee9f67bf", "score": "0.55333316", "text": "func (o *Customer) HasAddressStreet() bool {\n\tif o != nil && o.AddressStreet != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d00ebe425153540d57e4e88d9abff1ee", "score": "0.5501917", "text": "func AddressFromEqualFold(v string) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldAddressFrom), v))\n\t})\n}", "title": "" }, { "docid": "f904f1e6f7861d5e6685a5eeb21f5d04", "score": "0.54814434", "text": "func Address(v string) predicate.User {\n\treturn predicate.User(func(t *dsl.Traversal) {\n\t\tt.Has(Label, FieldAddress, p.EQ(v))\n\t})\n}", "title": "" }, { "docid": "33adc960bce7ec4cf3d2e11b0bff86b7", "score": "0.5420204", "text": "func Address(v string) predicate.User {\n\treturn predicate.User(sql.FieldEQ(FieldAddress, v))\n}", "title": "" }, { "docid": "989344bebf69c573164a84595417cb21", "score": "0.5409121", "text": "func (o *OrdersAddress) GetStreet() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Street\n}", "title": "" }, { "docid": "9eafce9c7c54a5f2735a722fb82759c5", "score": "0.53937536", "text": "func StreetLTE(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "9261ac58fcf3b2a725aa743c10da7fd4", "score": "0.53929234", "text": "func (o *OrdersAddress) GetStreetOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Street, true\n}", "title": "" }, { "docid": "28c9cf244cebf69feb4a6efe7fb24e90", "score": "0.53915495", "text": "func (o UserAddressesOutput) StreetAddress() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v UserAddresses) *string { return v.StreetAddress }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "89116282efa5c75dda50802b97075289", "score": "0.5384353", "text": "func (o *Customer) GetAddressStreet() string {\n\tif o == nil || o.AddressStreet == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.AddressStreet\n}", "title": "" }, { "docid": "f78921ad9675b0af8ffc9b31e3f78b13", "score": "0.534918", "text": "func AddressContainsFold(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "eb1a4558ba17ee55a0b99ee9310fc4a2", "score": "0.5337143", "text": "func (m *MemberMutation) StreetCleared() bool {\n\t_, ok := m.clearedFields[member.FieldStreet]\n\treturn ok\n}", "title": "" }, { "docid": "157f4162ac6f323249cf886ca7aae919", "score": "0.5319803", "text": "func StreetGTE(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "5c14faeee08cc997b1ba7cf05da52c60", "score": "0.5314998", "text": "func (o *Customer) GetAddressStreetOk() (*string, bool) {\n\tif o == nil || o.AddressStreet == nil {\n\t\treturn nil, false\n\t}\n\treturn o.AddressStreet, true\n}", "title": "" }, { "docid": "33147f57f3ee1ed659c885ac61a88005", "score": "0.5312582", "text": "func (o *CustomerShippingContactsResponseAddress) SetStreet1(v string) {\n\to.Street1 = &v\n}", "title": "" }, { "docid": "fe5f3bc995d8d4c1ffae21d141ef7768", "score": "0.5308304", "text": "func AddressContainsFold(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "924f4f891f67c0506dd2668f121b1e82", "score": "0.52513623", "text": "func ConsigneePhoneEQ(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldConsigneePhone), v))\n\t})\n}", "title": "" }, { "docid": "c3eccbd4f3ca8e4159260ee3b063a7b1", "score": "0.5247251", "text": "func (o *SignalAddressData) GetStreet() string {\n\tif o == nil || o.Street == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Street\n}", "title": "" }, { "docid": "f8db8bd3ad99e4054bde267d7a799e95", "score": "0.52464634", "text": "func AddressContainsFold(v string) predicate.User {\n\treturn predicate.User(sql.FieldContainsFold(FieldAddress, v))\n}", "title": "" }, { "docid": "7c65c7ae86aa796a5635465fd2c3d683", "score": "0.52369153", "text": "func (o *CustomerShippingContactsResponseAddress) HasStreet1() bool {\n\tif o != nil && !IsNil(o.Street1) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "e3f21c7c12803ef7e59cfeec5562d3bd", "score": "0.52315265", "text": "func (o *SignalAddressData) GetStreetOk() (*string, bool) {\n\tif o == nil || o.Street == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Street, true\n}", "title": "" }, { "docid": "342fc6a371e2a101a710478d1e1c89ad", "score": "0.5221338", "text": "func (o *PaystubOverrideEmployeeAddress) GetStreet() string {\n\tif o == nil || o.Street == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Street\n}", "title": "" }, { "docid": "67f9aca691e93b6166d87056118641b7", "score": "0.5220658", "text": "func ConsigneePhoneEqualFold(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldConsigneePhone), v))\n\t})\n}", "title": "" }, { "docid": "881bcf9d942a7949f2b26c4ba9314840", "score": "0.5218798", "text": "func (o ShippingAddressOutput) StreetAddress1() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ShippingAddress) string { return v.StreetAddress1 }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b1b660612caa446d9d2aef2f0bac0de8", "score": "0.5217862", "text": "func StreetLT(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.LT(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "74b42ce61cc0498280c9e04a24ede6a9", "score": "0.52084816", "text": "func (o *WebAccelCertSubject) GetStreetAddress() string {\n\treturn o.StreetAddress\n}", "title": "" }, { "docid": "67ff8d4469b31aaa9e995f752c864c2d", "score": "0.5201533", "text": "func (o UserAddressesPtrOutput) StreetAddress() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *UserAddresses) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.StreetAddress\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cc8f6e54102a0869ea2f2d0a454c085a", "score": "0.5192425", "text": "func (ac *AddressCreate) SetStreetLine(s string) *AddressCreate {\n\tac.mutation.SetStreetLine(s)\n\treturn ac\n}", "title": "" }, { "docid": "6e464a8f5b9cfe5897b5b8232126e0ee", "score": "0.5188953", "text": "func (o *PaystubOverrideEmployeeAddress) GetStreetOk() (*string, bool) {\n\tif o == nil || o.Street == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Street, true\n}", "title": "" }, { "docid": "edc74f71be1b34b7deafcdc2a8064638", "score": "0.5188845", "text": "func (m *DeliveryMutation) StreetCleared() bool {\n\t_, ok := m.clearedFields[delivery.FieldStreet]\n\treturn ok\n}", "title": "" }, { "docid": "053f1397bc88a759b3fff54bf319569b", "score": "0.5156", "text": "func AddressContains(v string) predicate.OutboundShipping {\n\treturn predicate.OutboundShipping(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "52f101cf6a1fa10d28e568a40be4f2c1", "score": "0.5155786", "text": "func (o *InvoiceBuyerAddress) GetStreet() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Street\n}", "title": "" }, { "docid": "dba955c92ba37bb6ca6bfb5b9dd15f08", "score": "0.5149942", "text": "func (m *MemberMutation) OldStreet(ctx context.Context) (v string, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldStreet is allowed only on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldStreet requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldStreet: %w\", err)\n\t}\n\treturn oldValue.Street, nil\n}", "title": "" }, { "docid": "7cbb9f12d4aba1c17e2680e70049be21", "score": "0.5136728", "text": "func (o *InvoiceBuyerAddress) GetStreetOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Street, true\n}", "title": "" }, { "docid": "fb16fba6e867c7e059da5512f4c3a9d3", "score": "0.5133581", "text": "func (b *BLSAddress) Equals(other Address) bool {\n\treturn b.Type() == other.Type() && bytes.Equal(b.digest, other.Digest())\n}", "title": "" }, { "docid": "75672b9f109fcc29b0ee8752e774100e", "score": "0.5079725", "text": "func PhoneEQ(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldPhone), v))\n\t})\n}", "title": "" }, { "docid": "533f4acc7121674d78d4c0ffbdc78b4c", "score": "0.5071759", "text": "func StreetHasSuffix(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.HasSuffix(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "a7f3f59cc133ea76cb9e37a0b63e533d", "score": "0.50700593", "text": "func PhoneEqualFold(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldPhone), v))\n\t})\n}", "title": "" }, { "docid": "21896239e27a370636c0b3f204dd2a26", "score": "0.50604904", "text": "func StreetGT(v string) predicate.Ranking {\n\treturn predicate.Ranking(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldStreet), v))\n\t})\n}", "title": "" }, { "docid": "7ae9ebb49373d308adcb05758e7698d3", "score": "0.5043002", "text": "func (m *DeliveryMutation) OldStreet(ctx context.Context) (v string, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldStreet is allowed only on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldStreet requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldStreet: %w\", err)\n\t}\n\treturn oldValue.Street, nil\n}", "title": "" }, { "docid": "1d68aa8977314b122e4411cc54335569", "score": "0.5031084", "text": "func (f *Faker) Street() string { return street(f.Rand) }", "title": "" }, { "docid": "cd255a58579e7b2d826e08fed58f132f", "score": "0.50083554", "text": "func PhoneEQ(v string) predicate.User {\n\treturn predicate.User(sql.FieldEQ(FieldPhone, v))\n}", "title": "" }, { "docid": "e0392775749ba7c25480d2a5f1c7978d", "score": "0.50070757", "text": "func (m *MemberMutation) ClearStreet() {\n\tm.street = nil\n\tm.clearedFields[member.FieldStreet] = struct{}{}\n}", "title": "" }, { "docid": "c337d9f6148c3e1c646a58f34223cef0", "score": "0.50068235", "text": "func (a Address) Equals(address Address) bool {\n\treturn a.firstName == address.firstName &&\n\t\ta.lastName == address.lastName &&\n\t\ta.address == address.address &&\n\t\ta.city == address.city &&\n\t\ta.postcode == address.postcode &&\n\t\ta.state == address.state &&\n\t\ta.phoneNumber == address.phoneNumber\n}", "title": "" }, { "docid": "1c798ebd46e1639a7dd07ef032860bba", "score": "0.49936938", "text": "func (m *MemberMutation) ResetStreet() {\n\tm.street = nil\n\tdelete(m.clearedFields, member.FieldStreet)\n}", "title": "" }, { "docid": "5d06764debfee7ea65f620fdc6bbd623", "score": "0.49898562", "text": "func (m *DeliveryMutation) ResetStreet() {\n\tm.street = nil\n\tdelete(m.clearedFields, delivery.FieldStreet)\n}", "title": "" }, { "docid": "a2dfff948df2313e8758b24d51ec6fa7", "score": "0.49881145", "text": "func (s ServiceAddress) Equal(o ServiceAddress) bool {\n\tif s.Name != o.Name {\n\t\treturn false\n\t}\n\n\tif s.Port != o.Port {\n\t\treturn false\n\t}\n\n\tif s.Priority != o.Priority {\n\t\treturn false\n\t}\n\n\tif s.Weight != o.Weight {\n\t\treturn false\n\t}\n\n\tif !s.IP.Equal(o.IP) {\n\t\treturn false\n\t}\n\n\tif s.isStatic != o.isStatic {\n\t\treturn false\n\t}\n\n\tif !s.isStatic {\n\t\tif !s.expiresAt.Equal(o.expiresAt) {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "5411fed32314474c8ae1daf9cb0e458b", "score": "0.49837124", "text": "func (o ShippingAddressPtrOutput) StreetAddress1() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ShippingAddress) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.StreetAddress1\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "23185199f26931b3d5a798ddf529ffc7", "score": "0.4975482", "text": "func (a Address) StreetAddress() string {\n\tstreetAddress := a.Faker.RandomStringElement(streetAddressFormats)\n\n\t// {{buildingNumber}}\n\tstreetAddress = strings.Replace(streetAddress, \"{{buildingNumber}}\", a.BuildingNumber(), 1)\n\n\t// {{streetName}}\n\tstreetAddress = strings.Replace(streetAddress, \"{{streetName}}\", a.StreetName(), 1)\n\n\t// {{secondaryAddress}}\n\tstreetAddress = strings.Replace(streetAddress, \"{{secondaryAddress}}\", a.SecondaryAddress(), 1)\n\n\treturn streetAddress\n}", "title": "" }, { "docid": "c332b8ce5f42a16d57f56608d9b6da4c", "score": "0.49549258", "text": "func (o CertificateSpecSubjectOutput) StreetAddresses() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v CertificateSpecSubject) []string { return v.StreetAddresses }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "ef363d71fce919b452ad564a9592795b", "score": "0.4954338", "text": "func AddressContains(v string) predicate.Doctor {\n\treturn predicate.Doctor(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldAddress), v))\n\t})\n}", "title": "" }, { "docid": "f421fd2dbe5971a36493ad804005f8b0", "score": "0.49537644", "text": "func AddressToContainsFold(v string) predicate.Transaction {\n\treturn predicate.Transaction(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldAddressTo), v))\n\t})\n}", "title": "" }, { "docid": "0da5138bdb9714c7ec3bbcadf1c12412", "score": "0.49504718", "text": "func PhoneEqualFold(v string) predicate.User {\n\treturn predicate.User(sql.FieldEqualFold(FieldPhone, v))\n}", "title": "" }, { "docid": "a9e255412f49374d1ca79d304d60d22d", "score": "0.495006", "text": "func (o ShippingAddressResponseOutput) StreetAddress1() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ShippingAddressResponse) string { return v.StreetAddress1 }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "08824abebd6dfb224ead51ef81a7ad36", "score": "0.49481618", "text": "func (rwuo *ReportWalletUpdateOne) ClearStreet() *ReportWalletUpdateOne {\n\trwuo.mutation.ClearStreet()\n\treturn rwuo\n}", "title": "" }, { "docid": "b096cc603a6317068b6f285df5a42530", "score": "0.4946976", "text": "func Street() string { return street(globalFaker.Rand) }", "title": "" }, { "docid": "974368811dfbd0aad063962a239fd3c1", "score": "0.4943521", "text": "func (o *Customer) HasAddressStreet2() bool {\n\tif o != nil && o.AddressStreet2 != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "1e00b708a4189a5ad020e297978ff96e", "score": "0.49396574", "text": "func TestGetRandomStreetName(t *testing.T) {\n\tstreet, err := getRandomStreetName()\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\n\tvar found = false\n\tfor _, s := range streets {\n\t\tif s == street {\n\t\t\tfound = true\n\t\t\tbreak\n\t\t}\n\t}\n\tif !found {\n\t\tt.Errorf(\"Street not found: %s in slice: %v\", street, streets)\n\t}\n}", "title": "" }, { "docid": "9db3166a03fea45dafdaf64377ceea7b", "score": "0.49253753", "text": "func (o *Customer) SetAddressStreet2(v string) {\n\to.AddressStreet2 = &v\n}", "title": "" }, { "docid": "e7848a86539ea954de7b78cd71de5088", "score": "0.49189213", "text": "func (rwu *ReportWalletUpdate) ClearStreet() *ReportWalletUpdate {\n\trwu.mutation.ClearStreet()\n\treturn rwu\n}", "title": "" }, { "docid": "1741ca0da4aa5c97edcb25cc56947bfa", "score": "0.49129415", "text": "func (o *TransferUserAddressInResponse) GetStreetOk() (*string, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Street.Get(), o.Street.IsSet()\n}", "title": "" }, { "docid": "f9ae59944a4c49f44936eb94c309c715", "score": "0.49037978", "text": "func (m *DeliveryMutation) ClearStreet() {\n\tm.street = nil\n\tm.clearedFields[delivery.FieldStreet] = struct{}{}\n}", "title": "" }, { "docid": "4299b0333c432c589612dd2fd431bf6e", "score": "0.4890065", "text": "func (id *Address) Equal(b Address) bool {\n\treturn bytes.Equal(id[:], b[:])\n}", "title": "" } ]
6423da3308d1892262af366243d08346
NewGetMyUsersUnauthorized creates GetMyUsersUnauthorized with default headers values
[ { "docid": "d5c1b267fd282ccb3d141dea4d0aeca8", "score": "0.6942578", "text": "func NewGetMyUsersUnauthorized() *GetMyUsersUnauthorized {\n\n\treturn &GetMyUsersUnauthorized{}\n}", "title": "" } ]
[ { "docid": "5850a840aafabcd2bfe2e66a9f7064db", "score": "0.60163254", "text": "func NewGetUsersThisUnauthorized() *GetUsersThisUnauthorized {\n\treturn &GetUsersThisUnauthorized{}\n}", "title": "" }, { "docid": "4d63107db2c9b9de91c47e4e0d7273c8", "score": "0.564651", "text": "func NewGetAllUsersUsingGETUnauthorized() *GetAllUsersUsingGETUnauthorized {\n\treturn &GetAllUsersUsingGETUnauthorized{}\n}", "title": "" }, { "docid": "dc71c4a7bd7069eb833075164d05759f", "score": "0.55846685", "text": "func NewHttpUnauthorized(format string, fmtArgs ...interface{}) HttpErr {\n\treturn NewHttpError(http.StatusUnauthorized, format, fmtArgs...)\n}", "title": "" }, { "docid": "4eacde4335f22170f8f46a0ab272e2ef", "score": "0.5477418", "text": "func Unauthorized() *Generic {\n\treturn &Generic{http.StatusUnauthorized, http.StatusText(http.StatusUnauthorized)}\n}", "title": "" }, { "docid": "cb9620cee19b07367730673fca35baa9", "score": "0.5384019", "text": "func TestUser_IsAuthorized_MissingParts(t *testing.T) {\n\tuser := User{username: \"edward\", password: \"p0nyta1l\"}\n\tauthentication := base64.StdEncoding.EncodeToString([]byte(\"edward:p0nytail\"))\n\n\tr := new(http.Request)\n\tr.Header = make(http.Header)\n\tr.Header.Set(\"Authorization\", authentication)\n\tif _, err := user.IsAuthorized(r); err != errMalformedHeader {\n\t\tt.Errorf(\"wanted %v, but got %v\", errMalformedHeader, err)\n\t}\n}", "title": "" }, { "docid": "9e3e15781a6a0c63a2f2c5612f414ef7", "score": "0.5370441", "text": "func removeAuthHeaders(req *http.Request) {\n\treq.Header.Del(\"Authorization\")\n}", "title": "" }, { "docid": "d8f88e787a298dc98400953b827458e0", "score": "0.53568584", "text": "func unauthorized() (interface{}, int) {\n return errors.New(\"Not authorized\"), 401\n}", "title": "" }, { "docid": "a13363d8595fd929c04a4fd112aea031", "score": "0.533405", "text": "func TestUser_IsAuthorized_Empty(t *testing.T) {\n\tuser := User{username: \"edward\", password: \"p0nyta1l\"}\n\n\tr := new(http.Request)\n\tr.Header = make(http.Header)\n\tr.Header.Set(\"Authorization\", \"\")\n\tif _, err := user.IsAuthorized(r); err != errMalformedHeader {\n\t\tt.Errorf(\"wanted %v, but got %v\", errMalformedHeader, err)\n\t}\n}", "title": "" }, { "docid": "0c4fdf1ef5ecf5c32b6909a6c8c89727", "score": "0.53061646", "text": "func NewGetResourceTypesUnauthorized() *GetResourceTypesUnauthorized {\n\treturn &GetResourceTypesUnauthorized{}\n}", "title": "" }, { "docid": "6fd8ef6e0934a556c63315501bd0d518", "score": "0.5264481", "text": "func defaultUnauthorizedHandler(w http.ResponseWriter, r *http.Request) {\n\thttp.Error(w, http.StatusText(http.StatusUnauthorized), http.StatusUnauthorized)\n}", "title": "" }, { "docid": "130829520d31818c7e64002c13b10d55", "score": "0.52565163", "text": "func (ctx *Context) Unauthorized() {\n ctx.ResponseWriter.WriteHeader(401)\n}", "title": "" }, { "docid": "970a3fab9bec5365b234dc0cc7f09b2b", "score": "0.5242661", "text": "func noAuthHeaders(c context.Context, opts *rpcOptions) (map[string]string, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "a6e244dab1916803638299a480e7137c", "score": "0.5239453", "text": "func NewGetSuppliersUnauthorized() *GetSuppliersUnauthorized {\n\treturn &GetSuppliersUnauthorized{}\n}", "title": "" }, { "docid": "bb19e1797a69f0d12e8fb6e4e2b4fe65", "score": "0.52340066", "text": "func TestGetOtherUserUnauthorized(t *testing.T) {\n\t//Stubbed query to get username from UUID\n\ttestdb.SetQueryWithArgsFunc(func(query string, args []driver.Value) (result driver.Rows, err error) {\n\t\tcolumns := []string{\"username\"}\n\t\trows := \"\"\n\t\tif query == GET_USERNAME_QUERY {\n\t\t\trows = \"TestUser\"\n\t\t}\n\t\treturn testdb.RowsFromCSVString(columns, rows), nil\n\t})\n\n\trouter := mux.NewRouter()\n\trouter.HandleFunc(\"/user/{username}\", func(w http.ResponseWriter, r *http.Request) {\n\t\t//Add authentication for a different user to the request and pass on to handler\n\t\tAuthenticateRequest(w, r, TEST_UUID)\n\t\thandlers.UserHandler(w, r)\n\t}).Methods(\"GET\", \"PUT\", \"DELETE\")\n\n\ttestServer := httptest.NewServer(router)\n\turl := testServer.URL + \"/user/bhperry\"\n\n\tresponse, err := http.Get(url)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tbody, _ := ioutil.ReadAll(response.Body)\n\tresponseText := strings.TrimRight(fmt.Sprintf(\"%s\", body), \"\\n\")\n\tt.Log(responseText)\n\n\tif response.StatusCode != http.StatusUnauthorized {\n\t\tt.Error(\"Should be unauthorized to access this endpoint\\n code: \", response.StatusCode, \"\\n response: \", responseText)\n\t}\n\tif responseText != \"Unauthorized to access requested user's data\" {\n\t\tt.Error(\"Incorrect response for authenticated but unauthorized user:\\n \", responseText)\n\t}\n}", "title": "" }, { "docid": "1569a1487b40b6a05222af83530ad70b", "score": "0.52322626", "text": "func TestUser_IsAuthorized_BadCredentials(t *testing.T) {\n\tuser := User{username: \"edward\", password: \"p0nyta1l\"}\n\tauthentication := \"Basic \" + base64.StdEncoding.EncodeToString([]byte(\"al:m3t@l\"))\n\n\tr := new(http.Request)\n\tr.Header = make(http.Header)\n\tr.Header.Set(\"Authorization\", authentication)\n\tif _, err := user.IsAuthorized(r); err != errFailedAuth {\n\t\tt.Errorf(\"wanted %v, but got %v\", errFailedAuth, err)\n\t}\n}", "title": "" }, { "docid": "3a6d612f7ba8ff8051c981e403a3c5d2", "score": "0.5229368", "text": "func NewGetUsersByPrincipalNameUsingGETUnauthorized() *GetUsersByPrincipalNameUsingGETUnauthorized {\n\treturn &GetUsersByPrincipalNameUsingGETUnauthorized{}\n}", "title": "" }, { "docid": "2662c01a75cc886692b090b3ba6d0697", "score": "0.51782787", "text": "func NewGetMyUsersNotFound() *GetMyUsersNotFound {\n\n\treturn &GetMyUsersNotFound{}\n}", "title": "" }, { "docid": "f36eb71bf08b64ea5a95f052c98eb921", "score": "0.5148217", "text": "func TestUnknownUserIsUnauthorized(t *testing.T) {\n\t_, ctx := ktesting.NewTestContext(t)\n\tctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\tkubeClient, kubeConfig, tearDownFn := framework.StartTestServer(ctx, t, framework.TestServerSetup{\n\t\tModifyServerRunOptions: func(opts *options.ServerRunOptions) {\n\t\t\t// Disable ServiceAccount admission plugin as we don't have serviceaccount controller running.\n\t\t\topts.Admission.GenericAdmission.DisablePlugins = []string{\"ServiceAccount\"}\n\t\t\topts.Authentication.TokenFile.TokenFile = \"testdata/tokens.csv\"\n\t\t\topts.Authorization.Modes = []string{\"ABAC\"}\n\t\t\topts.Authorization.PolicyFile = \"testdata/allowalice.jsonl\"\n\t\t},\n\t})\n\tdefer tearDownFn()\n\n\tns := framework.CreateNamespaceOrDie(kubeClient, \"auth-unknown-unauthorized\", t)\n\tdefer framework.DeleteNamespaceOrDie(kubeClient, ns, t)\n\n\ttransport, err := rest.TransportFor(kubeConfig)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tfor _, r := range getTestRequests(ns.Name) {\n\t\ttoken := UnknownToken\n\t\tbodyBytes := bytes.NewReader([]byte(r.body))\n\t\treq, err := http.NewRequest(r.verb, kubeConfig.Host+r.URL, bodyBytes)\n\t\tif err != nil {\n\t\t\tt.Fatalf(\"unexpected error: %v\", err)\n\t\t}\n\t\treq.Header.Set(\"Authorization\", fmt.Sprintf(\"Bearer %s\", token))\n\t\tfunc() {\n\t\t\tresp, err := transport.RoundTrip(req)\n\t\t\tif err != nil {\n\t\t\t\tt.Logf(\"case %v\", r)\n\t\t\t\tt.Fatalf(\"unexpected error: %v\", err)\n\t\t\t}\n\t\t\tdefer resp.Body.Close()\n\t\t\t// Expect all of unauthenticated user's request to be \"Unauthorized\"\n\t\t\tif resp.StatusCode != http.StatusUnauthorized {\n\t\t\t\tt.Logf(\"case %v\", r)\n\t\t\t\tt.Errorf(\"Expected status %v, but got %v\", http.StatusUnauthorized, resp.StatusCode)\n\t\t\t\tb, _ := io.ReadAll(resp.Body)\n\t\t\t\tt.Errorf(\"Body: %v\", string(b))\n\t\t\t}\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "65fca6177de32671e3e6a2f837161c0c", "score": "0.51465636", "text": "func NewGetTemplatesUnauthorized() *GetTemplatesUnauthorized {\n\treturn &GetTemplatesUnauthorized{}\n}", "title": "" }, { "docid": "51454da135a2dd4489193f6b043cef6a", "score": "0.5132007", "text": "func restUnauthorized(w *rest.ResponseWriter) {\n\twriteJSON(w, &simpleResponse{\"Not authorized\", loginLink()}, http.StatusUnauthorized)\n\treturn\n}", "title": "" }, { "docid": "dadb4d4683195a12afbb64f5888a51dd", "score": "0.5114119", "text": "func (ctx *ListUserContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "4225209fa3d90b4d0d5f7ec7083e658f", "score": "0.50932723", "text": "func addAuthHeaders(req *http.Request, clientConfig *restclient.Config) {\n\tif clientConfig.BearerToken != \"\" {\n\t\treq.Header.Set(\"Authorization\", \"Bearer \"+clientConfig.BearerToken)\n\t} else if clientConfig.Username != \"\" || clientConfig.Password != \"\" {\n\t\treq.SetBasicAuth(clientConfig.Username, clientConfig.Password)\n\t}\n}", "title": "" }, { "docid": "0a4f239e564df91466fbf6b0ab8f81d4", "score": "0.50924236", "text": "func Unauthorized(w http.ResponseWriter, resp []byte) {\n\twriteCommonHeaders(w, len(resp))\n\tw.WriteHeader(http.StatusUnauthorized)\n\tw.Write(resp)\n}", "title": "" }, { "docid": "2c8a22c3cf0e8a96d09002286fb86864", "score": "0.5091128", "text": "func NewGetUserInformationUnauthorized() *GetUserInformationUnauthorized {\n\treturn &GetUserInformationUnauthorized{}\n}", "title": "" }, { "docid": "3a34e3f1b7901c67af17ed156a99dc23", "score": "0.50785375", "text": "func NewListUsersUnauthorized() *ListUsersUnauthorized {\n\treturn &ListUsersUnauthorized{}\n}", "title": "" }, { "docid": "e15a6fe4a6b03a9d70f27f6c7575a99b", "score": "0.50757176", "text": "func GetUser(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tauthToken := r.Header.Get(\"Authorization\")\n\tauthArr := strings.Split(authToken, \" \")\n\n\tif len(authArr) != 2 {\n\t\tlog.Println(\"Authentication header is invalid: \" + authToken)\n\t\thttp.Error(w, \"Request failed!\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tjwtToken := authArr[1]\n\n\tclaims, err := jwt.ParseWithClaims(jwtToken, &types.JWTData{}, func(token *jwt.Token) (interface{}, error) {\n\t\tif jwt.SigningMethodHS256 != token.Method {\n\t\t\treturn nil, errors.New(\"Invalid signing algorithm\")\n\t\t}\n\t\treturn []byte(SECRET), nil\n\t})\n\n\tif err != nil {\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Request failed!\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tdata := claims.Claims.(*types.JWTData)\n\n\tuserID := data.CustomClaims[\"userid\"]\n\n\t// fetch some data based on the userID and then send that data back to the user in JSON format\n\tjsonData, err := GetAccountData(userID)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\thttp.Error(w, \"Request failed!\", http.StatusUnauthorized)\n\t}\n\n\tw.Write(jsonData)\n}", "title": "" }, { "docid": "a9363d44636e0b5ff00d90e5825e7917", "score": "0.5070719", "text": "func (ctx *CreateListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "40d7ccf492033294014d4220af649eb2", "score": "0.5070051", "text": "func NewGetLdapUsersSearchUnauthorized() *GetLdapUsersSearchUnauthorized {\n\treturn &GetLdapUsersSearchUnauthorized{}\n}", "title": "" }, { "docid": "c98b4af106031ca52f140f3d650d5673", "score": "0.5063237", "text": "func Unauthorized(format string, v ...interface{}) *Error {\n\treturn New(http.StatusUnauthorized, fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "6270d6f72a2776ae034708bca08d0811", "score": "0.50631106", "text": "func NewGetAllVCentersUsingGETUnauthorized() *GetAllVCentersUsingGETUnauthorized {\n\treturn &GetAllVCentersUsingGETUnauthorized{}\n}", "title": "" }, { "docid": "c39bc0623b40cf3b52788558c90384fd", "score": "0.5061992", "text": "func TestCreateTodo_Unauthorized_User(t *testing.T) {\n\ttodo := model.Todo{\n\t\tTitle: \"the title\",\n\t}\n\tbyteSlice, err := json.Marshal(&todo)\n\tif err != nil {\n\t\tt.Error(\"Cannot marshal to json\")\n\t}\n\tr := gin.Default()\n\treq, err := http.NewRequest(http.MethodPost, \"/todo\", bytes.NewReader(byteSlice))\n\tif err != nil {\n\t\tt.Errorf(\"this is the error: %v\\n\", err)\n\t}\n\t//It is an authenticated user can create a todo, so, lets pass a token to our request headers\n\ttk := \"eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJhdXRoX3V1aWQiOiJjMmUxYjBjMy00ZGRjLTQ0NjUtYWVkNC1iNGE2NDM5NzI4M2MiLCJhdXRob3JpemVkIjp0cnVlLCJ1c2VyX2lkIjoxfQ.FWbfdhEJeK7mjZ-lWvs9scuyUrSKPrC4xafUoEqkducxx\"\n\ttokenString := fmt.Sprintf(\"Bearer %v\", tk)\n\treq.Header.Set(\"Authorization\", tokenString)\n\n\trr := httptest.NewRecorder()\n\tr.POST(\"/todo\", CreateTodo)\n\tr.ServeHTTP(rr, req)\n\n\tvar errMsg string\n\terr = json.Unmarshal(rr.Body.Bytes(), &errMsg)\n\tassert.Nil(t, err)\n\tassert.EqualValues(t, http.StatusUnauthorized, rr.Code)\n\tassert.EqualValues(t, \"unauthorized\", errMsg)\n}", "title": "" }, { "docid": "50e19c2de4ce099c48a4c0bc2c5039e0", "score": "0.5060371", "text": "func (ctx *ReindexMultilistContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "06c196bce51964eeee403a3587a20e24", "score": "0.50568163", "text": "func getuser(from int) []Response {\n\t//url is a base url for GET api\n\turl := \"https://api.github.com/users?since=\"\n\tadd := strconv.Itoa(from) + \">\"\n\tfinalURL := url + add\n\n\tr, err := http.Get(finalURL)\n\tif err != nil {\n\t\tlog.Fatal(\"error occured \", err)\n\t}\n\tr.Header.Add(\"Bearer\", Token)\n\n\tresponse, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tlog.Fatal(\"error occured \", err)\n\t}\n\tfmt.Println(r.StatusCode)\n\tres := []Response{}\n\tjson.Unmarshal(response, &res)\n\treturn res\n\n}", "title": "" }, { "docid": "ea4135afa610991eb8af6443487d88da", "score": "0.50268495", "text": "func Unauthorized(format string, msg ...interface{}) *Boom {\r\n\treturn CreateError(http.StatusUnauthorized, format, msg...)\r\n}", "title": "" }, { "docid": "4ddeb944ddc0a3c6f86d6563883b9e7e", "score": "0.5023844", "text": "func jsonAuthFail(w http.ResponseWriter) {\n\tw.Header().Add(\"WWW-Authenticate\", `Basic realm=\"btcd RPC\"`)\n\thttp.Error(w, \"401 Unauthorized.\", http.StatusUnauthorized)\n}", "title": "" }, { "docid": "2e559961b9ed6ec1f2898a3d8ca97b73", "score": "0.50008374", "text": "func (ctx *GetAllListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "cf7afb1b2698a289d1320477aeb82f96", "score": "0.49965096", "text": "func (ctx *ReindexListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "407815fa66cef8f9c09d6bf48ae343b6", "score": "0.49914283", "text": "func GetUser(db *gorm.DB, w http.ResponseWriter, r *http.Request) {\n\tvars := r.URL.Query()\n\tid, ok := strconv.Atoi(vars[\"u_id\"][0])\n\tif ok != nil {\n\t\trespondWithError(w, http.StatusBadRequest, \"Invalid user id\")\n\t\treturn\n\t}\n\tp := models.User{ID: id}\n\tif GetUserByID(db, &p, w) == 0 {\n\t\treturn\n\t}\n\n\treqToken := r.Header.Get(\"Authorization\")\n\tsplitToken := strings.Split(reqToken, \"Bearer\")\n\tif len(splitToken) != 2 {\n\t\trespondWithError(w, http.StatusBadRequest, \"Invalid token format\")\n\t\treturn\n\t}\n\n\treqToken = strings.TrimSpace(splitToken[1])\n\tfullToken := models.Token{AccessToken: reqToken}\n\tif err := fullToken.GetTokenByAccess(db); err != nil {\n\t\trespondWithError(w, http.StatusNotFound, \"Invalid Token\")\n\t\treturn\n\t}\n\n\tvar cr UserResponse\n\tpopulateResponse(&p, &cr)\n\n\tif err := p.GetCourses(db, &cr.Courses); err != nil {\n\t\tswitch err {\n\t\tdefault:\n\t\t\trespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\t}\n\t}\n\tif err := p.GetGroups(db, &cr.Groups); err != nil {\n\t\tswitch err {\n\t\tdefault:\n\t\t\trespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\t}\n\t}\n\tif err := p.GetListings(db, &cr.Listings); err != nil {\n\t\tswitch err {\n\t\tdefault:\n\t\t\trespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\t}\n\t}\n\tif err := p.GetInvitations(db, &cr.Invitations); err != nil {\n\t\tswitch err {\n\t\tdefault:\n\t\t\trespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\t}\n\t}\n\n\trespondWithJSON(w, http.StatusOK, cr)\n}", "title": "" }, { "docid": "44599ed9ee39082138540e20566b7d16", "score": "0.49888468", "text": "func requireAuth(ctx context.Context) {\n\tctx.Header(\"WWW-Authenticate\", \"Basic realm=\\\"Authorization Required\\\"\")\n\tctx.StatusCode(401)\n\tctx.WriteString(\"Not Authorized\")\n}", "title": "" }, { "docid": "e10dd5d28f4a62b272bbecd1a6d361bf", "score": "0.4982681", "text": "func (ctx *GetListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "d085fc78ebff42456e220f17abe70024", "score": "0.4971937", "text": "func (ctx *CreateUserContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "0e9aa1b7cc04b92bf3229fb9c8c5464d", "score": "0.49707672", "text": "func Unauthorized(format string, a ...interface{}) *Error {\n\treturn newError(ErrUnauthorized, format, a, nil)\n}", "title": "" }, { "docid": "6b77ed84613c49d6c14306b9d62afa1d", "score": "0.49663308", "text": "func NewGetAllUsingGET11Unauthorized() *GetAllUsingGET11Unauthorized {\n\treturn &GetAllUsingGET11Unauthorized{}\n}", "title": "" }, { "docid": "01d018e53f711820fc65a96f22526b40", "score": "0.49637803", "text": "func Get(db *sqlx.DB) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-type\", \"application/json\")\n\n\t\tc := r.Header.Get(\"Authorization\")\n\t\tif c == \"\" {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tc = strings.Fields(c)[1]\n\n\t\ttknStr := c\n\t\tclaims := &Claims{}\n\t\ttkn, err := jwt.ParseWithClaims(tknStr, claims, func(token *jwt.Token) (interface{}, error) {\n\t\t\treturn JwtKey, nil\n\t\t})\n\n\t\tif !tkn.Valid {\n\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\treturn\n\t\t}\n\n\t\tif err != nil {\n\t\t\tif err == jwt.ErrSignatureInvalid {\n\t\t\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\tusers := []User{}\n\t\tpage, byPage, sort_by, sort_order, filter_field, filter_value := r.URL.Query()[\"page\"][0], r.URL.Query()[\"byPage\"][0], r.URL.Query()[\"sort_by\"][0], r.URL.Query()[\"sort_order\"][0],\n\t\t\tr.URL.Query()[\"filter_field\"][0], r.URL.Query()[\"filter_value\"][0]\n\t\tquery := \"SELECT * FROM user\"\n\n\t\tif filter_value != \"\" && filter_field != \"\" {\n\t\t\tquery += \" WHERE \" + filter_field + \" LIKE '%\" + filter_value + \"%' \"\n\t\t}\n\t\tif sort_by != \"\" {\n\t\t\tquery += \" ORDER BY \" + sort_by\n\t\t}\n\n\t\tif sort_order != \"\" {\n\t\t\tquery += \" \" + sort_order\n\t\t}\n\t\tif page != \"\" && byPage != \"\" {\n\t\t\tpageInt, _ := strconv.Atoi(page)\n\t\t\tbyPageInt, _ := strconv.Atoi(byPage)\n\t\t\toffset := pageInt * byPageInt\n\t\t\tquery += \" LIMIT \" + strconv.Itoa(byPageInt) + \" OFFSET \" + strconv.Itoa(offset)\n\t\t}\n\n\t\terr = db.Select(&users, query)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tjson.NewEncoder(w).Encode(users)\n\t}\n}", "title": "" }, { "docid": "05ba92dd70785b6c3864ef2da0cb08c1", "score": "0.49446815", "text": "func (o *OneLogin) Get_Users(filter map[string]string) (*[]OneLoginUser, error) {\n oauth_token, err := o.Get_Token(); if err != nil {\n return nil, ErrorOcurred(err)\n }\n\n url := o.GetUrl(USER_GET_USERS)\n headers := Headers(fmt.Sprintf(\"bearer:%s\", oauth_token.Access_token))\n\n get_user_response := GetUserResponse{}\n\n client := HttpClient{Url: url, Headers: headers, Params: filter}\n _, err = client.Request(\"GET\", nil, &get_user_response) ; if err != nil {\n logger.Errorf(\"An error occurred, %v\", err)\n return nil, ErrorOcurred(err)\n }\n\n user_data := make([]OneLoginUser, 0)\n user_data = append(user_data, get_user_response.Data...)\n\n logger.Infof(\"Pagination link: %s\", get_user_response.Pagination.After_cursor)\n\n next_cursor := get_user_response.Pagination.After_cursor\n for next_cursor != \"\" {\n\n filter[\"after_cursor\"] = next_cursor\n client := HttpClient{Url: url, Headers: headers, Params: filter}\n\n get_user_response := GetUserResponse{}\n _, err = client.Request(\"GET\", nil, &get_user_response) ; if err != nil {\n logger.Errorf(\"An error occurred, %v\", err)\n return nil, ErrorOcurred(err)\n }\n next_cursor = get_user_response.Pagination.After_cursor\n\n logger.Infof(\"Pagination link: %s\", next_cursor)\n user_data = append(user_data, get_user_response.Data...)\n }\n\n return &user_data, nil\n}", "title": "" }, { "docid": "6ba39bc13e2038de50782b3c47c05210", "score": "0.4929742", "text": "func NewGetUserByIDUsingGETUnauthorized() *GetUserByIDUsingGETUnauthorized {\n\treturn &GetUserByIDUsingGETUnauthorized{}\n}", "title": "" }, { "docid": "0d3a9f808f66e16e0d89dbca452998d4", "score": "0.49142215", "text": "func NewGetMyUsersOK() *GetMyUsersOK {\n\n\treturn &GetMyUsersOK{}\n}", "title": "" }, { "docid": "432789e08fdaacec7758aa51644ccab1", "score": "0.49070475", "text": "func (ctx *GetRangeListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "0d85bb00c2708917f2d63b01e4b7a6f2", "score": "0.49045655", "text": "func (ctx *GetUserLikeTechHyUsertechContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "1f66010a1e46998020e41e85c2b03fc7", "score": "0.4900267", "text": "func (ctx *CreateMultilistContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "fb57b5535a108eb9a81bac1c097f2044", "score": "0.48958316", "text": "func (auth *APIClient) defaultHeaders(req *http.Request) {\n\treq.Header.Add(\"X-API-Key\", auth.ApiKey)\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treq.Header.Add(\"Accept\", \"application/json\")\n}", "title": "" }, { "docid": "d324d34fe7daedb365ee830749eab61d", "score": "0.48957554", "text": "func SetDefaultHeaders(req *http.Request) {\n\treq.Header.Add(\"Private-Token\", viper.GetString(\"Token\"))\n\treq.Header.Add(\"accept\", \"application/json, text/plain, */*\")\n}", "title": "" }, { "docid": "2f1c34ce0e085a4f6b27b06e15a2dc83", "score": "0.48948658", "text": "func (ctx *GetUserWorkHistoryHyUserWorkHistoryContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "c26faef2c74b1fd222a7116209feeed9", "score": "0.48906827", "text": "func (ctx *GetMultilistContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "ea56f1dcc5e2f5c657df41176a73f200", "score": "0.4876665", "text": "func (ctx *RefreshUserContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "19f41f2370cde8f8239be50c77a5f97a", "score": "0.48717177", "text": "func UnauthorizedWith(err error) error {\n\treturn Merge(emptyUnauthorized, err)\n}", "title": "" }, { "docid": "fd5a238bf24c2cf3f7c20f083d29efeb", "score": "0.48621193", "text": "func GetUserInfoFromToken(next http.Handler) http.Handler {\n\tfn := func(w http.ResponseWriter, r *http.Request) {\n\t\ttokenValue := r.Header.Get(\"authorization\")\n\t\tclient := &http.Client{}\n\t\tlog.Println(\"get user info from token\")\n\t\tparam := make(map[string]string)\n\t\tparam[\"id_token\"] = strings.Split(tokenValue, \" \")[1]\n\n\t\tb := new(bytes.Buffer)\n\t\terr := json.NewEncoder(b).Encode(param)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tconf := config.Get()\n\n\t\treq, err := http.NewRequest(\"POST\", conf.Auth0Endpoint, b)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\treq.Header.Set(\"Content-type\", \"application/json\")\n\t\tres, err := client.Do(req)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tjsonDecoder := json.NewDecoder(res.Body)\n\t\tresponseObject, err := gabs.ParseJSONDecoder(jsonDecoder)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tusername := responseObject.Path(\"username\").Data().(string)\n\n\t\tdb := config.Get().Database\n\t\tusers, _ := db.GetAllUsers()\n\n\t\tuser, err := db.GetUser(username)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\t//User doesnt exist, so create the user in the local store\n\t\t\tuser.Username = responseObject.Path(\"username\").Data().(string)\n\t\t\tuser.Email = responseObject.Path(\"email\").Data().(string)\n\t\t\tuser.Name = responseObject.Path(\"name\").Data().(string)\n\t\t\tuser.ProviderUserID = responseObject.Path(\"user_id\").Data().(string)\n\t\t\tif responseObject.ExistsP(\"app_metadata.roles\") {\n\t\t\t\tfor _, role := range responseObject.Path(\"app_metadata.roles\").Data().([]interface{}) {\n\t\t\t\t\tuser.Roles = append(user.Roles, role.(string))\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.Printf(\"%#v\", user)\n\t\t\terr = db.CreateUser(user)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\n\t\tif len(users) < 1 {\n\t\t\terr := actions.SetupSuperAdmin(user.Username)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\t\tr = r.WithContext(context.WithValue(r.Context(), \"user\", user))\n\t\tr = r.WithContext(context.WithValue(r.Context(), \"username\", user.Username))\n\n\t\tnext.ServeHTTP(w, r)\n\t}\n\n\treturn http.HandlerFunc(fn)\n}", "title": "" }, { "docid": "1ffcdbc271d41a4b9dbe2ddf217b15f6", "score": "0.4853204", "text": "func GetUser(w http.ResponseWriter, r *http.Request) {\n\ttype Response struct {\n\t\tStatus string `json:\"status\"`\n\t\tPage int `json:\"page\"`\n\t\tLimit int `json:\"limit\"`\n\t\tTotal int `json:\"total\"`\n\t\tData []User `json:\"data\"`\n\t}\n\n\tauthToken := strings.Split(r.Header.Get(\"Authorization\"), \" \")[1]\n\terr, _ := Authenticate(authToken)\n\tif err.Description == \"200 OK\" {\n\t\tparams := r.URL.Query()\n\t\tpage, _ := strconv.Atoi(params[\"page\"][0])\n\t\tlimit, _ := strconv.Atoi(params[\"limit\"][0])\n\t\tvar total int\n\t\tvar data []User\n\t\tif len(users) <= limit || limit == 0 {\n\t\t\tdata = users\n\t\t\ttotal = 1\n\t\t} else {\n\t\t\ttotal = len(users) / limit\n\t\t\tif (limit*page)-1 == 0 {\n\t\t\t\tdata = users[0 : (limit*page)-1]\n\t\t\t} else {\n\t\t\t\tdata = users[(limit*(page-1))-1 : (limit*page)-1]\n\t\t\t}\n\t\t}\n\n\t\tresponse := Response{\n\t\t\tStatus: \"OK\",\n\t\t\tPage: page,\n\t\t\tLimit: limit,\n\t\t\tTotal: total,\n\t\t\tData: data,\n\t\t}\n\t\tjson.NewEncoder(w).Encode(response)\n\t} else {\n\t\tHeaderWriter(w, err)\n\t\tjson.NewEncoder(w).Encode(err)\n\t}\n}", "title": "" }, { "docid": "28d76216d362e7846d74876174d65fae", "score": "0.48502755", "text": "func NewGetAdminsUnauthorized() *GetAdminsUnauthorized {\n\treturn &GetAdminsUnauthorized{}\n}", "title": "" }, { "docid": "ecce3736e16a3c783f7e3261d8d3e191", "score": "0.48490173", "text": "func (ctx *CreateMemosContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "c4420f4d4cf0f23884206af41d0eaa32", "score": "0.48440552", "text": "func TestGet_Token_Header(t *testing.T) {\n\tcontroller := gomock.NewController(t)\n\tdefer controller.Finish()\n\n\tmockUser := &core.User{\n\t\tLogin: \"octocat\",\n\t\tHash: \"ulSxuA0FKjNiOFIchk18NNvC6ygSxdtKjiOAS\",\n\t}\n\n\tusers := mock.NewMockUserStore(controller)\n\tusers.EXPECT().FindToken(gomock.Any(), mockUser.Hash).Return(mockUser, nil)\n\n\tsession := New(users, NewConfig(\"correct-horse-battery-staple\", time.Hour, false))\n\tr := httptest.NewRequest(\"GET\", \"/\", nil)\n\tr.Header.Set(\"Authorization\", \"Bearer ulSxuA0FKjNiOFIchk18NNvC6ygSxdtKjiOAS\")\n\tuser, _ := session.Get(r)\n\tif user != mockUser {\n\t\tt.Errorf(\"Want authenticated user\")\n\t}\n}", "title": "" }, { "docid": "3ac895aaa2191e2ab9ba69162b25832c", "score": "0.48374116", "text": "func NewGetCustomImageUnauthorized() *GetCustomImageUnauthorized {\n\treturn &GetCustomImageUnauthorized{}\n}", "title": "" }, { "docid": "dc1eb25f8d4d430120f64cee56ed81e5", "score": "0.48360017", "text": "func NewGetUnauthorized(body *GetUnauthorizedResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "405a5f8b20a7d7504727358392ae4116", "score": "0.48341796", "text": "func (ctx *CloneListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "22e2abfae9a73fed3835e8d746aaf83b", "score": "0.48338085", "text": "func NewGetAllUsingGET4Unauthorized() *GetAllUsingGET4Unauthorized {\n\treturn &GetAllUsingGET4Unauthorized{}\n}", "title": "" }, { "docid": "b502a5c095695ee55d459cee6ed77184", "score": "0.4831123", "text": "func GiveApiResponse(statusCode int, message []byte, rw http.ResponseWriter) {\n if statusCode == http.StatusUnauthorized {\n if rw.Header().Get(\"WWW-Authenticate\") == \"\" {\n rw.Header().Add(\"WWW-Authenticate\", \"Basic realm=\\\"private\\\"\")\n } else {\n rw.Header().Set(\"WWW-Authenticate\", \"Basic realm=\\\"private\\\"\")\n }\n }\n\n if filter.CheckNotNull(message) {\n rw.WriteHeader(statusCode)\n rw.Write(message)\n } else {\n rw.WriteHeader(http.StatusNoContent)\n }\n}", "title": "" }, { "docid": "5dfa9160386c9987ee2d19fb379846a5", "score": "0.4827443", "text": "func NewGetMandatesUnauthorized() *GetMandatesUnauthorized {\n\treturn &GetMandatesUnauthorized{}\n}", "title": "" }, { "docid": "40903cfb3e0803a3090cb24023951b39", "score": "0.48256156", "text": "func NewListMineUnauthorized(body *ListMineUnauthorizedResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "433c805c10453f09741902681d597bcd", "score": "0.482264", "text": "func (ctx *ListMemosContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "27028d1cbf04d3a27bdd46c7202f4ceb", "score": "0.48182073", "text": "func (ctx *AddUserContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "7c56139ad6dd94301722e363a7a14ad7", "score": "0.4813885", "text": "func NewUserInfoUnauthorized() *UserInfoUnauthorized {\n\treturn &UserInfoUnauthorized{}\n}", "title": "" }, { "docid": "0f4a960c7b6a54d73a45313430863d6e", "score": "0.48121017", "text": "func AuthentifyRequest(t *testing.T, req *http.Request, u *sdk.User, pass string) {\n\tauth := \"Basic \" + base64.StdEncoding.EncodeToString([]byte(u.Username+\":\"+pass))\n\treq.Header.Add(\"Authorization\", auth)\n}", "title": "" }, { "docid": "fff461b29fcf777b90d083db04656823", "score": "0.4808565", "text": "func NewGetDevicesUnauthorized() *GetDevicesUnauthorized {\n\treturn &GetDevicesUnauthorized{}\n}", "title": "" }, { "docid": "700049b12d56a089c6e3724dfabe0218", "score": "0.48082015", "text": "func (self *BaseHandler) ListUser(writer http.ResponseWriter, request *http.Request) {\n resp := httputil.Response{}\n tokenStr := request.Header.Get(\"token\")\n if len(tokenStr) == 0 {\n resp.Code = http.StatusUnauthorized\n resp.Err = \"no authentication info provided\"\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n user, err := self.getUserInfo(writer, request)\n if err != nil {\n resp.Code = http.StatusUnauthorized\n resp.Err = \"authentication failed\"\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n if !user.Sysadmin {\n resp.Code = http.StatusForbidden\n resp.Err = \"user list need administrator privilidge\"\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n // return the total users.\n // TODO: get all the user info from database\n // should be use Pagination\n users, err := dao.ListUsers()\n if err != nil {\n log.Errorf(\"cannot list users: %v\", err)\n resp.Code = http.StatusInternalServerError\n resp.Err = \"cannot list users\"\n httputil.WriteJSONResponse(writer, resp)\n return\n }\n\n resp.Code = http.StatusOK\n resp.Results = users\n httputil.WriteJSONResponse(writer, resp)\n}", "title": "" }, { "docid": "fea5512b8b36c3cb2d66afee98141307", "score": "0.4806749", "text": "func NewGetUsersThisDefault(code int) *GetUsersThisDefault {\n\treturn &GetUsersThisDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "ed31b65c57e3a07701b05b43fe656da4", "score": "0.48047844", "text": "func TestUnauthorized(t *testing.T) {\n\tinstance := &http.HTTP{}\n\thttpError := instance.Unauthorized()\n\tif httpError == nil {\n\t\tt.Error(\"Util HTTP Error TestUnauthorized method error\")\n\t}\n}", "title": "" }, { "docid": "cc2f28bf6b6db9b28534713d75aa9b07", "score": "0.48047256", "text": "func NewListAllUnauthorized(body *ListAllUnauthorizedResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "2c1e29e1a4285e776dee901d3610fa4e", "score": "0.4796862", "text": "func applyUserHeader(sendUserHeader bool, req *http.Request, user *models.SignedInUser) {\n\treq.Header.Del(\"X-Grafinsight-User\")\n\tif sendUserHeader && !user.IsAnonymous {\n\t\treq.Header.Set(\"X-Grafinsight-User\", user.Login)\n\t}\n}", "title": "" }, { "docid": "ec736188d049c3bfa25f67951d17bc16", "score": "0.4795711", "text": "func GetUsers(w http.ResponseWriter, r *http.Request, params denco.Params) {\n\t// some actual stuff should happen in here\n}", "title": "" }, { "docid": "ff4f8fbdfeb1abd9b9c9fbb0e3df2e65", "score": "0.47939572", "text": "func Unauthorized(w http.ResponseWriter) {\n\tcode(w, http.StatusUnauthorized)\n}", "title": "" }, { "docid": "9393745428c357b32874fd712162ee46", "score": "0.47898224", "text": "func NewGetSitesUnauthorized() *GetSitesUnauthorized {\n\treturn &GetSitesUnauthorized{}\n}", "title": "" }, { "docid": "d449e60bf06d8bc20c2b70adb365ebd6", "score": "0.47867286", "text": "func NewGetNodesUnauthorized() *GetNodesUnauthorized {\n\treturn &GetNodesUnauthorized{}\n}", "title": "" }, { "docid": "d25d855f5098d5c36b7f422f603699c4", "score": "0.47773868", "text": "func Unauthorized(message ...string) *APIError {\n\tvar msg string\n\tif len(message) > 0 {\n\t\tmsg = message[0]\n\t} else {\n\t\tmsg = http.StatusText(http.StatusUnauthorized)\n\t}\n\treturn NewAPIError(http.StatusUnauthorized, msg, \"\")\n}", "title": "" }, { "docid": "52800b18d728488cc4355cbe1357f25d", "score": "0.47764763", "text": "func newHandler(h http.Handler, authRequired bool, notAuthorizedStatus int) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n if authRequired {\n\t\t\tip := r.Header.Get(\"X-Forwarded-For\")\n\t\t\tif ip == \"\" {\n\t\t\t\tip = r.RemoteAddr\n\t\t\t}\n\t\t\tua := r.Header.Get(\"User-Agent\")\n\t\t\tmsg := fmt.Sprintf(\"unauthorized access attempt for %v (%s) from UA %s @ IP %s\", r.URL, r.Host, ua, ip)\n\t\t\tif authRequired {\n\t\t\t\tlog.Error(msg)\n\t\t\t\thttp.Error(w, fmt.Sprintf(\"Not Authorized\"), notAuthorizedStatus)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tlog.Warning(msg)\n\t\t}\n\t\th.ServeHTTP(w, r.WithContext(r.Context()))\n\t})\n}", "title": "" }, { "docid": "68596e90ab0d82d5a3a861633f781d70", "score": "0.47724402", "text": "func RequestUnAuthorized(ctx *fiber.Ctx, err error) error {\n\treturn ctx.Status(http.StatusUnauthorized).JSON(fiber.Map{\"message\": \"The request you made is unauthorized\", \"error\": err.Error(), \"status\": http.StatusUnauthorized, \"data\": nil})\n}", "title": "" }, { "docid": "5bf0c5970f2fdfc52e82ed397ccee359", "score": "0.47711152", "text": "func (o *OneLogin) Get_UsersWithRole(role string)([]OneLoginUser, error) {\n\n oauth_token, err := o.Get_Token(); if err != nil {\n return nil, ErrorOcurred(err)\n }\n\n url := o.GetUrl(USER_GET_USERS)\n headers := Headers(fmt.Sprintf(\"bearer:%s\", oauth_token.Access_token))\n\n params := map[string]string{}\n\n // if role is specified, add the query parameter for it.\n if role != \"\" {\n logger.Debugf(\"Requesting all users in role %s\", role)\n\n role_id, err := o.Get_Role_Id(role) ; if err != nil {\n return nil, ErrorOcurred(err)\n }\n\n params = map[string]string{ \"role_id\": fmt.Sprintf(\"%d\", role_id) }\n }\n\n get_user_response := GetUserResponse{}\n\n client := HttpClient{Url: url, Headers: headers, Params: params}\n _, err = client.Request(\"GET\", nil, &get_user_response) ; if err != nil {\n return nil, ErrorOcurred(err)\n }\n\n return get_user_response.Data, nil\n}", "title": "" }, { "docid": "3e078ddfb16a891693b1bbed51175544", "score": "0.47706106", "text": "func (ch challenge) SetHeaders(r *http.Request, w http.ResponseWriter) {\n\theader := fmt.Sprintf(\"Bearer realm=%q,service=%q\", ch.realm, ch.service)\n\n\tif ch.scope != \"\" {\n\t\theader = fmt.Sprintf(\"%s,scope=%q\", header, ch.scope)\n\t}\n\n\tw.Header().Set(\"WWW-Authenticate\", header)\n}", "title": "" }, { "docid": "6bb90a056a1189e2d60f3244f67e0ac6", "score": "0.47666538", "text": "func NewGetAuthenticatedUserUnauthorized() *GetAuthenticatedUserUnauthorized {\n\n\treturn &GetAuthenticatedUserUnauthorized{}\n}", "title": "" }, { "docid": "1ccf254af12e4a16711a3855dbceabb4", "score": "0.47629854", "text": "func NewNodesGetUnauthorized() *NodesGetUnauthorized {\n\n\treturn &NodesGetUnauthorized{}\n}", "title": "" }, { "docid": "92cbba36f148a22aa781a02c9e3cd0cd", "score": "0.47595227", "text": "func (ctx *CreateElementsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "dc38d5c9d09b144d88a52af09edd03ec", "score": "0.47572282", "text": "func UnauthorizedHandler(w http.ResponseWriter, r *http.Request) {\n\tmsg := &models.SimpleMessage{Message: \"401 unauthorized\"}\n\tw.WriteHeader(401)\n\tjson.NewEncoder(w).Encode(msg)\n}", "title": "" }, { "docid": "b363c55a878f158f4cec3b74cea89bee", "score": "0.47568756", "text": "func (ctx *GetUserDislikeTechHyUsertechContext) Unauthorized() error {\n\tctx.ResponseData.WriteHeader(401)\n\treturn nil\n}", "title": "" }, { "docid": "3b96a6770e91e2408a1018259b87d7d5", "score": "0.4751344", "text": "func removeChallengeHeaders(resp *http.Response) {\n\tresp.Header.Del(\"WWW-Authenticate\")\n}", "title": "" }, { "docid": "2043a34ebdfe43e565932703b19e2ebd", "score": "0.47500747", "text": "func NewGetUserDetailsUnauthorized() *GetUserDetailsUnauthorized {\n\treturn &GetUserDetailsUnauthorized{}\n}", "title": "" }, { "docid": "d0d0c4e4d17b404b8a8895af3969eefb", "score": "0.474853", "text": "func (ctx *GetMultiElementsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "2578f32ac1c158204043ca69efd24bfc", "score": "0.47451854", "text": "func (ctx *GetPercentileListsContext) Unauthorized(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 401, r)\n}", "title": "" }, { "docid": "f34d71cc1848881e0a7ee455fe3a253d", "score": "0.47427675", "text": "func NewListUnauthorized() *ListUnauthorized {\n\treturn &ListUnauthorized{}\n}", "title": "" }, { "docid": "d885765ac804a3504299779b549b14bc", "score": "0.47418034", "text": "func NewWeaviateThingsCreateUnauthorized() *WeaviateThingsCreateUnauthorized {\n\n\treturn &WeaviateThingsCreateUnauthorized{}\n}", "title": "" }, { "docid": "10ee22efe6d2cebc6da747fb55164fa4", "score": "0.47411352", "text": "func NewGetMachinesUnauthorized() *GetMachinesUnauthorized {\n\treturn &GetMachinesUnauthorized{}\n}", "title": "" }, { "docid": "05dd477a5e1d21a9245c329c315a92b7", "score": "0.4738899", "text": "func NewGetPeopleAnalyticsUnauthorized() *GetPeopleAnalyticsUnauthorized {\n\treturn &GetPeopleAnalyticsUnauthorized{}\n}", "title": "" } ]
17025d91aea98f4b890e42c3570ed36d
Apply sets the values of this ManagerConfig in the given manager.Options.
[ { "docid": "abda6c4af2f121ee9f097bc807630390", "score": "0.7431736", "text": "func (c *ManagerConfig) Apply(opts *manager.Options) {\n\tc.ManagerConfig.Apply(opts)\n\topts.Namespace = c.Namespace\n\topts.MetricsBindAddress = c.MetricsBindAddress\n}", "title": "" } ]
[ { "docid": "1cdd8831894ce02373a63a1b33846201", "score": "0.6760381", "text": "func (c *SourceClientConfig) ApplyManagerOptions(opts *manager.Options) {\n\topts.Scheme = c.Scheme\n\topts.SyncPeriod = c.CacheResyncPeriod\n\topts.Namespace = c.Namespace\n}", "title": "" }, { "docid": "eaaf413b863bf847985ac07e70db0745", "score": "0.6113703", "text": "func WithManagerOptions(m manager.Options) Option {\n\treturn func(c *Config) {\n\t\tc.ManagerOptions = m\n\t}\n}", "title": "" }, { "docid": "fffa19df6a2f6caba345d6893a865649", "score": "0.5908083", "text": "func (c *ManagerConfig) Options() manager.Options {\n\tvar opts manager.Options\n\tc.Apply(&opts)\n\treturn opts\n}", "title": "" }, { "docid": "c860183044f7c6eeb398a0359af25caf", "score": "0.59003067", "text": "func (o *Options) ApplyTo(c *server.Config) error {\n\treturn nil\n}", "title": "" }, { "docid": "a026d5bcb6470c3c0a9a35f7e10e9461", "score": "0.5717652", "text": "func (o *GenericControllerManagerConfigurationOptions) ApplyTo(cfg *cmconfig.GenericControllerManagerConfiguration, allControllers []string, disabledByDefaultControllers []string, controllerAliases map[string]string) error {\n\tif o == nil {\n\t\treturn nil\n\t}\n\n\tif err := o.Debugging.ApplyTo(&cfg.Debugging); err != nil {\n\t\treturn err\n\t}\n\tif err := o.LeaderMigration.ApplyTo(cfg); err != nil {\n\t\treturn err\n\t}\n\tcfg.Port = o.Port\n\tcfg.Address = o.Address\n\tcfg.MinResyncPeriod = o.MinResyncPeriod\n\tcfg.ClientConnection = o.ClientConnection\n\tcfg.ControllerStartInterval = o.ControllerStartInterval\n\tcfg.LeaderElection = o.LeaderElection\n\n\t// copy controller names and replace aliases with canonical names\n\tcfg.Controllers = make([]string, len(o.Controllers))\n\tfor i, initialName := range o.Controllers {\n\t\tinitialNameWithoutPrefix := strings.TrimPrefix(initialName, \"-\")\n\t\tcontrollerName := initialNameWithoutPrefix\n\t\tif canonicalName, ok := controllerAliases[controllerName]; ok {\n\t\t\tcontrollerName = canonicalName\n\t\t}\n\t\tif strings.HasPrefix(initialName, \"-\") {\n\t\t\tcontrollerName = fmt.Sprintf(\"-%s\", controllerName)\n\t\t}\n\t\tcfg.Controllers[i] = controllerName\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "187ef114ff9885b77374f926675f67fe", "score": "0.5617756", "text": "func (sa *Appender) SetOptions(args ...interface{}) *Appender {\n\tops, idx, _ := driver.ArgsToMap(args...)\n\tfor _, k := range idx {\n\t\tsa.Set(k, ops[k])\n\t}\n\treturn sa\n}", "title": "" }, { "docid": "a1a5dd4da2d2a5a4bd8abb072f41de7a", "score": "0.55574334", "text": "func (a *Authorize) UpdateOptions(opts config.Options) error {\n\tif a == nil {\n\t\treturn nil\n\t}\n\n\tlog.Info().Str(\"checksum\", fmt.Sprintf(\"%x\", opts.Checksum())).Msg(\"authorize: updating options\")\n\ta.currentOptions.Store(opts)\n\n\tvar err error\n\tif a.pe, err = newPolicyEvaluator(&opts); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60b05efaa81d10f7df942dd128048a3d", "score": "0.5532704", "text": "func (o *encOpts) ApplyOptions(options ...EncOptsOption) *encOpts {\n\tfor _, opt := range options {\n\t\tif opt == nil {\n\t\t\tcontinue\n\t\t}\n\t\topt.apply(o)\n\t}\n\treturn o\n}", "title": "" }, { "docid": "bc0054e64ddafcf1dd0dca063189be7e", "score": "0.54598147", "text": "func (o *SaveOptions) ApplyOptions(opts ...SaveOption) *SaveOptions {\n\tfor _, opt := range opts {\n\t\topt.ApplyToSave(o)\n\t}\n\treturn o\n}", "title": "" }, { "docid": "1d87ddd77511ba69a62ec1613b2abe64", "score": "0.5445944", "text": "func (o *Marshaler) ApplyOptions(options ...MarshalerOption) *Marshaler {\n\tfor _, opt := range options {\n\t\tif opt == nil {\n\t\t\tcontinue\n\t\t}\n\t\topt.apply(o)\n\t}\n\treturn o\n}", "title": "" }, { "docid": "ead4508cf0d9826c82c0f0432470f8fc", "score": "0.5404996", "text": "func (p *protocol) ConfigureOptions(mgr *manager.Manager, opts *manager.Options) {\n\topts.MapSpecEditors[inFlightMap] = manager.MapSpecEditor{\n\t\tMaxEntries: p.cfg.MaxTrackedConnections,\n\t\tEditorFlag: manager.EditMaxEntries,\n\t}\n\n\t// Taking the max between fourth of p.cfg.MaxTrackedConnections to the default lower limit (1024), as it can\n\t// introduce a major memory bump if we're using p.cfg.MaxTrackedConnections.\n\tmapSize := uint32(math.Max(float64(p.cfg.MaxTrackedConnections)/4, mapSizeMinValue))\n\topts.MapSpecEditors[dynamicTable] = manager.MapSpecEditor{\n\t\tMaxEntries: mapSize,\n\t\tEditorFlag: manager.EditMaxEntries,\n\t}\n\topts.MapSpecEditors[dynamicTableCounter] = manager.MapSpecEditor{\n\t\tMaxEntries: mapSize,\n\t\tEditorFlag: manager.EditMaxEntries,\n\t}\n\topts.MapSpecEditors[http2IterationsTable] = manager.MapSpecEditor{\n\t\tMaxEntries: mapSize,\n\t\tEditorFlag: manager.EditMaxEntries,\n\t}\n\n\tutils.EnableOption(opts, \"http2_monitoring_enabled\")\n\t// Configure event stream\n\tevents.Configure(eventStream, mgr, opts)\n}", "title": "" }, { "docid": "6888c24918e89113425776991935dc11", "score": "0.5359618", "text": "func (o *Options) Apply(opts ...Option) error {\n\tfor i, opt := range opts {\n\t\tif err := opt(o); err != nil {\n\t\t\treturn fmt.Errorf(\"hook datastore option %d failed: %s\", i, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "896a8e4350dd88dcb99d70152f13fd46", "score": "0.53320473", "text": "func (cm *configManager) Apply(configtx *cb.ConfigUpdateEnvelope) error {\n\tconfigMap, err := cm.processConfig(configtx)\n\tif err != nil {\n\t\tcm.rollbackHandlers()\n\t\treturn err\n\t}\n\tcm.config = configMap\n\tcm.sequence++\n\tcm.commitHandlers()\n\tchannelGroup, err := configMapToConfig(configMap)\n\tif err != nil {\n\t\tlogger.Panicf(\"Config was validated and applied, but could not be transformed back into proto form: %s\", err)\n\t}\n\n\tcm.configEnv = &cb.ConfigEnvelope{\n\t\tConfig: &cb.Config{\n\t\t\t// XXX add header\n\t\t\tChannel: channelGroup,\n\t\t},\n\t\tLastUpdate: configtx,\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f80bc067e7fc0a0f4199072b58b40b4a", "score": "0.53171086", "text": "func (o *RequestOptions) ApplyOptions(opts ...Option) *RequestOptions {\n\tcOpts := o.clone()\n\tfor _, opt := range opts {\n\t\topt(cOpts)\n\t}\n\treturn cOpts\n}", "title": "" }, { "docid": "b16943d226c4a56fd1aa73a62de8c4d7", "score": "0.53020847", "text": "func (r *Info) Set(options ...Option) {\n\tfor _, o := range options {\n\t\to(r)\n\t}\n}", "title": "" }, { "docid": "f227cc257708f080aa15d47d2f277ccb", "score": "0.5295724", "text": "func (sc *Schedule) ApplyOptions(options ...OptionFunc) error {\n\tfor _, fn := range options {\n\t\tif fn == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif err := fn(sc); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4dbf446207ba8757329bc2ad37857b08", "score": "0.52902794", "text": "func (o *Options) Apply(opts ...Option) error {\n\tfor i, opt := range opts {\n\t\tif err := opt(o); err != nil {\n\t\t\treturn fmt.Errorf(\"hydra node option %d failed: %s\", i, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "64c70a97b53f1f7b997727c615786d51", "score": "0.52578837", "text": "func (b *AddOnParameterBuilder) Options(values ...*AddOnParameterOptionBuilder) *AddOnParameterBuilder {\n\tb.options = make([]*AddOnParameterOptionBuilder, len(values))\n\tcopy(b.options, values)\n\tb.bitmap_ |= 512\n\treturn b\n}", "title": "" }, { "docid": "a155807d10d1b7eb51ee04fa15528041", "score": "0.52351576", "text": "func (opts options) apply(wf *Workflow) Option {\n\tprevious := make(options, len(opts))\n\tfor i, opt := range opts {\n\t\tprevious[i] = wf.Configure(opt)\n\t}\n\treturn previous.apply\n}", "title": "" }, { "docid": "fbe114ec7f8f0ce7ab8b5207b9b75e69", "score": "0.52234846", "text": "func (o *Options) Set(optFns ...func(*Options)) {\n\tfor _, fn := range optFns {\n\t\tfn(o)\n\t}\n}", "title": "" }, { "docid": "457ddcadbfc6ed686d1b59a60af14dfb", "score": "0.5203283", "text": "func (o *Options) Apply() error {\n\tif err := o.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\tif o.LogFormat == jsonLogFormat {\n\t\tlogger, _ := json.Factory{}.Create(config.FormatOptions{})\n\t\tklog.SetLogger(logger)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7ad49304c89400b40abe6594f8eb3651", "score": "0.51931936", "text": "func Options(os ...Option) Config {\n\tvar op Config\n\tfor _, f := range os {\n\t\tf(&op)\n\t}\n\treturn op\n}", "title": "" }, { "docid": "b8afea3e698a823c0952ad9e3255d129", "score": "0.51882595", "text": "func (o *HTTPBodyPb) ApplyOptions(options ...HTTPBodyPbOption) *HTTPBodyPb {\n\tfor _, opt := range options {\n\t\tif opt == nil {\n\t\t\tcontinue\n\t\t}\n\t\topt.apply(o)\n\t}\n\treturn o\n}", "title": "" }, { "docid": "5a47ef0335f288e91e2873cf49a06f48", "score": "0.51824605", "text": "func (o *Options) Configure(opts ...OptFunc) {\n\tif o.opts == nil {\n\t\to.opts = make(map[Opt]interface{})\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(o)\n\t}\n}", "title": "" }, { "docid": "7e02cf7ca0c3b10a154240be0db724b1", "score": "0.5175005", "text": "func (c Config) Apply(o *InitializationOptions) Config {\n\tif o == nil {\n\t\treturn c\n\t}\n\tif o.FuncSnippetEnabled != nil {\n\t\tc.FuncSnippetEnabled = *o.FuncSnippetEnabled\n\t}\n\n\tif o.DiagnosticsDisabled != nil {\n\t\tc.DiagnosticsDisabled = *o.DiagnosticsDisabled\n\t}\n\n\tif o.UseGlobalCache != nil {\n\t\tc.UseGlobalCache = *o.UseGlobalCache\n\t}\n\n\tif o.MaxParallelism != nil {\n\t\tc.MaxParallelism = *o.MaxParallelism\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "430001cf3a484e343331caebe3d80ae2", "score": "0.5145655", "text": "func ApplyMeasureOptions(opts *Options, mos ...MeasureOptionApplier) {\n\tfor _, o := range mos {\n\t\to.ApplyMeasureOption(opts)\n\t}\n}", "title": "" }, { "docid": "0c285ce6aa257582ca931069fed45a1b", "score": "0.5135776", "text": "func (m *Manager) SetOptions(opts types.PruningOptions) {\n\tm.opts = opts\n}", "title": "" }, { "docid": "44d0802672fe0eb96979fd30727f336a", "score": "0.5119427", "text": "func (o *CreateOptions) ApplyOptions(options ...CreateOption) error {\n\tfor _, obj := range options {\n\t\tif err := obj.ApplyOption(o); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c83d7e50d5402a7a2cf85c2fcb49b091", "score": "0.51182973", "text": "func (m *manager) Configure(ml map[string]interface{}) error {\n\tc, err := parseConfig(ml)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif c.Nobody == 0 {\n\t\tc.Nobody = 99\n\t}\n\n\tif err = c.LDAPIdentity.Setup(); err != nil {\n\t\treturn fmt.Errorf(\"error setting up Identity config: %w\", err)\n\t}\n\tm.c = c\n\treturn nil\n}", "title": "" }, { "docid": "f47c64030beb6b1acd2d0de7d390773f", "score": "0.5115919", "text": "func ApplyOptions[O, C any](options O, callOptions []C) error {\n\tfor _, o := range callOptions {\n\t\tif t, ok := any(o).(CallOption); !ok {\n\t\t\treturn fmt.Errorf(\"unexpected option type %T\", o)\n\t\t} else if err := t.Do(options); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "14769ad77862f83e476e298747a7928d", "score": "0.50823474", "text": "func (opts *SubnetsResolveOptions) ApplyOptions(options []SubnetsResolveOption) {\n\tfor _, option := range options {\n\t\toption(opts)\n\t}\n}", "title": "" }, { "docid": "f2a703188fde4962f4545c2c40c91a4c", "score": "0.508072", "text": "func ApplyOptions(opt ...Option) Options {\n\tvar opts Options\n\tfor _, o := range opt {\n\t\to(&opts)\n\t}\n\t// Set defaults for zero valued fields.\n\tif opts.IndexCodec == 0 {\n\t\topts.IndexCodec = multicodec.CarMultihashIndexSorted\n\t}\n\tif opts.MaxIndexCidSize == 0 {\n\t\topts.MaxIndexCidSize = DefaultMaxIndexCidSize\n\t}\n\treturn opts\n}", "title": "" }, { "docid": "bb0dc3dd5b68db0fb3bc0ac05c271532", "score": "0.50736165", "text": "func (s *Info) Set(options ...Option) {\n\tfor _, o := range options {\n\t\to(s)\n\t}\n}", "title": "" }, { "docid": "de3299e86eff56094c6dcf056cb47a0d", "score": "0.50358397", "text": "func (o NodeOptions) Apply(spec *adagio.Node_Spec) {\n\tfor _, opt := range o {\n\t\topt(spec)\n\t}\n}", "title": "" }, { "docid": "831a3738fd26f1867052face35f210f0", "score": "0.5027412", "text": "func (o *RemoveOptions) ApplyOptions(opts ...RemoveOption) *RemoveOptions {\n\tfor _, opt := range opts {\n\t\topt.ApplyToRemove(o)\n\t}\n\treturn o\n}", "title": "" }, { "docid": "95910f7d7b96a6c04f24a10d7ab81ab8", "score": "0.50267464", "text": "func (t *HTTPTargetHandler) SetOptions(method, url string, body io.Reader, headers map[string]string) *HTTPTargetHandler {\n\tt.method = method\n\tt.url = url\n\tt.body = body\n\tt.headers = headers\n\n\treturn t\n}", "title": "" }, { "docid": "3d38434815685f2f042308c71289c565", "score": "0.49882698", "text": "func (e *EtcdProxyControllerOptions) ApplyTo(c *etcdproxy.EtcdProxyControllerConfig) error {\n\tvar err error\n\n\tc.CoreEtcd = &etcdproxy.CoreEtcdConfig{}\n\tc.CoreEtcd.URLs = append([]string{}, e.CoreEtcd.URLs...)\n\tc.CoreEtcd.CAConfigMapName = e.CoreEtcd.CAConfigMapName\n\tc.CoreEtcd.CertSecretName = e.CoreEtcd.CertSecretName\n\n\tc.ControllerNamespace = e.ControllerNamespace\n\tc.ProxyImage = e.ProxyImage\n\n\tc.Kubeconfig, err = clientcmd.BuildConfigFromFlags(\"\", e.KubeconfigPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "060de85f598688814ffe1ab781d9e443", "score": "0.49832788", "text": "func AddToManagerWithOptions(mgr manager.Manager, conf ControllerConfig) error {\n\tif conf.RootCAPath == \"\" || conf.MaxConcurrentWorkers == 0 {\n\t\treturn nil\n\t}\n\n\trootCA, err := os.ReadFile(conf.RootCAPath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"file for root ca could not be read: %w\", err)\n\t}\n\n\trootCAController, err := controller.New(ControllerName, mgr, controller.Options{\n\t\tMaxConcurrentReconciles: conf.MaxConcurrentWorkers,\n\t\tReconciler: &reconciler{\n\t\t\trootCA: string(rootCA),\n\t\t\ttargetClient: conf.TargetCluster.GetClient(),\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to set up root ca controller: %w\", err)\n\t}\n\n\tif err := rootCAController.Watch(\n\t\tsource.NewKindWithCache(&corev1.Namespace{}, conf.TargetCluster.GetCache()),\n\t\t&handler.EnqueueRequestForObject{},\n\t\tpredicate.Funcs{\n\t\t\tCreateFunc: func(e event.CreateEvent) bool { return true },\n\t\t\tUpdateFunc: func(e event.UpdateEvent) bool { return isNamespaceActive(e.ObjectNew) },\n\t\t\tDeleteFunc: func(e event.DeleteEvent) bool { return false },\n\t\t\tGenericFunc: func(e event.GenericEvent) bool { return false },\n\t\t},\n\t); err != nil {\n\t\treturn fmt.Errorf(\"unable to watch Namespaces: %w\", err)\n\t}\n\n\tconfigMap := &metav1.PartialObjectMetadata{}\n\tconfigMap.SetGroupVersionKind(corev1.SchemeGroupVersion.WithKind(\"ConfigMap\"))\n\n\tif err := rootCAController.Watch(\n\t\tsource.NewKindWithCache(configMap, conf.TargetCluster.GetCache()),\n\t\t&handler.EnqueueRequestForOwner{OwnerType: &corev1.Namespace{}},\n\t\tpredicate.Funcs{\n\t\t\tCreateFunc: func(e event.CreateEvent) bool { return false },\n\t\t\tUpdateFunc: func(e event.UpdateEvent) bool { return isRelevantConfigMap(e.ObjectNew) },\n\t\t\tDeleteFunc: func(e event.DeleteEvent) bool { return isRelevantConfigMap(e.Object) },\n\t\t\tGenericFunc: func(e event.GenericEvent) bool { return false },\n\t\t},\n\t); err != nil {\n\t\treturn fmt.Errorf(\"unable to watch ConfigMaps: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6c7210dd252fa522fcfaf47fd772884e", "score": "0.49364054", "text": "func (m *AuthenticationAttributeCollectionInputConfiguration) SetOptions(value []AuthenticationAttributeCollectionOptionConfigurationable)() {\n err := m.GetBackingStore().Set(\"options\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "cbd656aab05d5d9b5316c9a2b7804ade", "score": "0.49286786", "text": "func (m *Manager) applyConfig(conf *config.AppConfig) {\n\tm.populateProviders(conf.ProviderConfigs)\n\tm.populateWorkers(conf.WorkerConfigs)\n\tm.populateFailureHandlers(conf.FailureHanldlerConfigs)\n}", "title": "" }, { "docid": "133a7b5af00a7e723abeb3d250b10d0e", "score": "0.48901233", "text": "func (c *VaultClient) applyOptions(req *http.Request, options ...Option) {\n\tfor _, opt := range options {\n\t\topt(req)\n\t}\n}", "title": "" }, { "docid": "709fae9dc3cd697e35a656ddc752b5bd", "score": "0.4861223", "text": "func (m *Manager) ApplyDefaults(ss Sectioner) *Manager {\n\tfor k, v := range ss.Defaults() {\n\t\tif log.IsDebug() {\n\t\t\tlog.Debug(\"config.Manager.ApplyDefaults\", k, v)\n\t\t}\n\t\tm.v.Set(k, v)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "354dc886ed443564a2fe4e74a9abb98e", "score": "0.48375574", "text": "func (vol *Volume) applyOptions(volOpt VolOpts) error {\n\t// copy options to override later\n\tmntOpt := &vol.mnt.MountOpt\n\tvfsOpt := &vol.mnt.VFSOpt\n\t*mntOpt = vol.drv.mntOpt\n\t*vfsOpt = vol.drv.vfsOpt\n\n\t// vol.Options has all options except \"remote\" and \"type\"\n\tvol.Options = VolOpts{}\n\tvol.fsString = \"\"\n\n\tvar fsName, fsPath, fsType string\n\tvar explicitPath string\n\tvar fsOpt configmap.Simple\n\n\t// parse \"remote\" or \"type\"\n\tfor key, str := range volOpt {\n\t\tswitch key {\n\t\tcase \"\":\n\t\t\tcontinue\n\t\tcase \"remote\", \"fs\":\n\t\t\tif str != \"\" {\n\t\t\t\tp, err := fspath.Parse(str)\n\t\t\t\tif err != nil || p.Name == \":\" {\n\t\t\t\t\treturn fmt.Errorf(\"cannot parse path %q: %w\", str, err)\n\t\t\t\t}\n\t\t\t\tfsName, fsPath, fsOpt = p.Name, p.Path, p.Config\n\t\t\t\tvol.Fs = str\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tfsType = str\n\t\t\tvol.Type = str\n\t\tcase \"path\":\n\t\t\texplicitPath = str\n\t\t\tvol.Path = str\n\t\tdefault:\n\t\t\tvol.Options[key] = str\n\t\t}\n\t}\n\n\t// find options supported by backend\n\tif strings.HasPrefix(fsName, \":\") {\n\t\tfsType = fsName[1:]\n\t\tfsName = \"\"\n\t}\n\tif fsType == \"\" {\n\t\tfsType = \"local\"\n\t\tif fsName != \"\" {\n\t\t\tvar ok bool\n\t\t\tfsType, ok = fs.ConfigMap(nil, fsName, nil).Get(\"type\")\n\t\t\tif !ok {\n\t\t\t\treturn fs.ErrorNotFoundInConfigFile\n\t\t\t}\n\t\t}\n\t}\n\tif explicitPath != \"\" {\n\t\tif fsPath != \"\" {\n\t\t\tfs.Logf(nil, \"Explicit path will override connection string\")\n\t\t}\n\t\tfsPath = explicitPath\n\t}\n\tfsInfo, err := fs.Find(fsType)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unknown filesystem type %q\", fsType)\n\t}\n\n\t// handle remaining options, override fsOpt\n\tif fsOpt == nil {\n\t\tfsOpt = configmap.Simple{}\n\t}\n\topt := rc.Params{}\n\tfor key, val := range vol.Options {\n\t\topt[key] = val\n\t}\n\tfor key := range opt {\n\t\tvar ok bool\n\t\tvar err error\n\n\t\tswitch normalOptName(key) {\n\t\tcase \"persist\":\n\t\t\tvol.persist, err = opt.GetBool(key)\n\t\t\tok = true\n\t\tcase \"mount-type\":\n\t\t\tvol.mountType, err = opt.GetString(key)\n\t\t\tok = true\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"cannot parse option %q: %w\", key, err)\n\t\t}\n\n\t\tif !ok {\n\t\t\t// try to use as a mount option in mntOpt\n\t\t\tok, err = getMountOption(mntOpt, opt, key)\n\t\t\tif ok && err != nil {\n\t\t\t\treturn fmt.Errorf(\"cannot parse mount option %q: %w\", key, err)\n\t\t\t}\n\t\t}\n\t\tif !ok {\n\t\t\t// try as a vfs option in vfsOpt\n\t\t\tok, err = getVFSOption(vfsOpt, opt, key)\n\t\t\tif ok && err != nil {\n\t\t\t\treturn fmt.Errorf(\"cannot parse vfs option %q: %w\", key, err)\n\t\t\t}\n\t\t}\n\n\t\tif !ok {\n\t\t\t// try as a backend option in fsOpt (backends use \"_\" instead of \"-\")\n\t\t\toptWithPrefix := strings.ReplaceAll(normalOptName(key), \"-\", \"_\")\n\t\t\tfsOptName := strings.TrimPrefix(optWithPrefix, fsType+\"_\")\n\t\t\thasFsPrefix := optWithPrefix != fsOptName\n\t\t\tif !hasFsPrefix || fsInfo.Options.Get(fsOptName) == nil {\n\t\t\t\tfs.Logf(nil, \"Option %q is not supported by backend %q\", key, fsType)\n\t\t\t\treturn fmt.Errorf(\"unsupported backend option %q\", key)\n\t\t\t}\n\t\t\tfsOpt[fsOptName], err = opt.GetString(key)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"cannot parse backend option %q: %w\", key, err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// build remote string from fsName, fsType, fsOpt, fsPath\n\tcolon := \":\"\n\tcomma := \",\"\n\tif fsName == \"\" {\n\t\tfsName = \":\" + fsType\n\t}\n\tconnString := fsOpt.String()\n\tif fsName == \"\" && fsType == \"\" {\n\t\tcolon = \"\"\n\t\tconnString = \"\"\n\t}\n\tif connString == \"\" {\n\t\tcomma = \"\"\n\t}\n\tvol.fsString = fsName + comma + connString + colon + fsPath\n\n\treturn vol.validate()\n}", "title": "" }, { "docid": "42a47e022e064da025e5184bf4f94f08", "score": "0.48274744", "text": "func (c Configuration) Set(main *Configuration) {\n\tif err := mergo.MergeWithOverwrite(main, c); err != nil {\n\t\tpanic(\"FATAL ERROR .Configuration as OptionSetter: \" + err.Error())\n\t}\n}", "title": "" }, { "docid": "1591084b34a4e2d648cdd49b88f0f281", "score": "0.4819361", "text": "func (p *GoTLSProgram) ConfigureOptions(options *manager.Options) {\n\toptions.MapSpecEditors[connectionTupleByGoTLSMap] = manager.MapSpecEditor{\n\t\tMaxEntries: p.cfg.MaxTrackedConnections,\n\t\tEditorFlag: manager.EditMaxEntries,\n\t}\n\n\tif options.MapEditors == nil {\n\t\toptions.MapEditors = make(map[string]*ebpf.Map)\n\t}\n\n\toptions.MapEditors[probes.SockByPidFDMap] = p.sockFDMap\n}", "title": "" }, { "docid": "4c699fe9d51a2477a0c811791b4a7c58", "score": "0.48123008", "text": "func (c *serverConfig) apply(opts ...ServerOption) error {\n\tfor i, opt := range opts {\n\t\tif err := opt(c); err != nil {\n\t\t\treturn fmt.Errorf(\"smart record server option %d failed: %s\", i, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4c699fe9d51a2477a0c811791b4a7c58", "score": "0.48123008", "text": "func (c *serverConfig) apply(opts ...ServerOption) error {\n\tfor i, opt := range opts {\n\t\tif err := opt(c); err != nil {\n\t\t\treturn fmt.Errorf(\"smart record server option %d failed: %s\", i, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "62830851b0c258cbc7882e2da8c2f71d", "score": "0.4812254", "text": "func (_m *HadolintClient) SetOptions(options pkghttp.ClientOptions) {\n\t_m.Called(options)\n}", "title": "" }, { "docid": "2af1ed85ae99cc7e591cfa1676dba6d5", "score": "0.48086202", "text": "func (_options *ActionOnConfigElementOptions) SetConfig(config ConfigActionIntf) *ActionOnConfigElementOptions {\n\t_options.Config = config\n\treturn _options\n}", "title": "" }, { "docid": "5ff7e34f4342fa74bbd7a79048b02a3e", "score": "0.47886738", "text": "func (this *HttpClient) WithOptions(m Map) *HttpClient {\n\toptions, _ := parseMap(m)\n\tfor k, v := range options {\n\t\tthis.WithOption(k, v)\n\t}\n\n\treturn this\n}", "title": "" }, { "docid": "92768f2260b5d31ba6169ccb004dcf59", "score": "0.47857836", "text": "func (_options *UpdateConfigElementOptions) SetConfig(config map[string]interface{}) *UpdateConfigElementOptions {\n\t_options.Config = config\n\treturn _options\n}", "title": "" }, { "docid": "acdbfad133f49a6028b86a433c35e2f2", "score": "0.4774869", "text": "func (s Config) Apply(mgr interop.Manager, conf *sarama.Config) error {\n\tswitch s.Mechanism {\n\tcase sarama.SASLTypeOAuth:\n\t\tvar tp sarama.AccessTokenProvider\n\t\tvar err error\n\n\t\tif s.TokenCache != \"\" {\n\t\t\ttp, err = newCacheAccessTokenProvider(mgr, s.TokenCache, s.TokenKey)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\ttp, err = newStaticAccessTokenProvider(s.AccessToken)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tconf.Net.SASL.TokenProvider = tp\n\tcase sarama.SASLTypeSCRAMSHA256:\n\t\tconf.Net.SASL.SCRAMClientGeneratorFunc = func() sarama.SCRAMClient {\n\t\t\treturn &XDGSCRAMClient{HashGeneratorFcn: SHA256}\n\t\t}\n\t\tconf.Net.SASL.User = s.User\n\t\tconf.Net.SASL.Password = s.Password\n\tcase sarama.SASLTypeSCRAMSHA512:\n\t\tconf.Net.SASL.SCRAMClientGeneratorFunc = func() sarama.SCRAMClient {\n\t\t\treturn &XDGSCRAMClient{HashGeneratorFcn: SHA512}\n\t\t}\n\t\tconf.Net.SASL.User = s.User\n\t\tconf.Net.SASL.Password = s.Password\n\tcase sarama.SASLTypePlaintext:\n\t\tconf.Net.SASL.User = s.User\n\t\tconf.Net.SASL.Password = s.Password\n\tcase \"\", \"none\":\n\t\treturn nil\n\tdefault:\n\t\treturn ErrUnsupportedSASLMechanism\n\t}\n\n\tconf.Net.SASL.Enable = true\n\tconf.Net.SASL.Mechanism = sarama.SASLMechanism(s.Mechanism)\n\n\treturn nil\n}", "title": "" }, { "docid": "03641486010404b07dd5564551fefd2a", "score": "0.47710443", "text": "func (pm *PinchMgr) SetAdditionalOptions(options []string) *PinchMgr {\n\tpm.packageManagerExtraOptions = append(pm.packageManagerExtraOptions, options...)\n\treturn pm\n}", "title": "" }, { "docid": "1937991426df3c7656e9e02bfb4aba51", "score": "0.47640672", "text": "func SetOptions(opts ...optionFn) {\n\tfor _, opt := range opts {\n\t\topt()\n\t}\n}", "title": "" }, { "docid": "72074771aa46059f8436ece03ed28fc8", "score": "0.47562397", "text": "func (p *GoTLSProgram) ConfigureManager(m *errtelemetry.Manager) {\n\tp.manager = m\n\tp.manager.Maps = append(p.manager.Maps, []*manager.Map{\n\t\t{Name: offsetsDataMap},\n\t\t{Name: goTLSReadArgsMap},\n\t\t{Name: goTLSWriteArgsMap},\n\t}...)\n\t// Hooks will be added in runtime for each binary\n}", "title": "" }, { "docid": "fa95a9676257ec4198045cbdc6c58087", "score": "0.4754313", "text": "func (opt *connectorOptions) ApplyFlags(cfg *config.Config) {\n\tcfg.VolumeUseMultiPath = opt.volumeUseMultiPath\n\tcfg.ScsiMultiPathType = opt.scsiMultiPathType\n\tcfg.NvmeMultiPathType = opt.nvmeMultiPathType\n\tcfg.DeviceCleanupTimeout = opt.deviceCleanupTimeout\n\tcfg.ScanVolumeTimeout = opt.scanVolumeTimeout\n\tcfg.ConnectorThreads = opt.connectorThreads\n\tcfg.AllPathOnline = opt.allPathOnline\n}", "title": "" }, { "docid": "4fa7151b01c0a7c3df08f72fc7c76153", "score": "0.47357103", "text": "func (o OptionFunc) Apply(c *config) {\n\to(c)\n}", "title": "" }, { "docid": "20dd70a1ab8896c20ee8710e4b4af56a", "score": "0.47289303", "text": "func ApplyGaugeOptions(opts *Options, gos ...GaugeOptionApplier) {\n\tfor _, o := range gos {\n\t\to.ApplyGaugeOption(opts)\n\t}\n}", "title": "" }, { "docid": "65ad8405b0ed6bb7584b24e72dc7c602", "score": "0.47164348", "text": "func (o *PostManagementCiliumIoV2CiliumEndpointsParams) SetOptions(options *models.Options) {\n\to.Options = options\n}", "title": "" }, { "docid": "c03316376d9cd878ad7357c884ba169a", "score": "0.47128323", "text": "func MergeWith(m map[string]interface{}) (err error) {\n\terr = currentOptions().MergeWith(m)\n\treturn\n}", "title": "" }, { "docid": "0d89cd70e1f5f7f5d033b0ada0aeb399", "score": "0.47031164", "text": "func applyOptions(opts ...Option) options {\n\toptions := options{\n\t\tlogger: zap.NewNop(),\n\t\ttmpl: _defaultTmpl,\n\t}\n\tfor _, opt := range opts {\n\t\topt.apply(&options)\n\t}\n\treturn options\n}", "title": "" }, { "docid": "3d691d7e2b8d1e1eff7b7e67265dceeb", "score": "0.4702708", "text": "func (o Options) Apply(ns string, dst interface{}) error {\n\tv := reflect.ValueOf(dst).Elem()\n\n\tfields := make(map[string]reflect.StructField)\n\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tf := v.Type().Field(i)\n\t\ttag := f.Tag.Get(\"option\")\n\n\t\tif tag == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tif _, ok := fields[tag]; ok {\n\t\t\tpanic(\"option tag \" + tag + \" is not unique in \" + v.Type().Name())\n\t\t}\n\n\t\tfields[tag] = f\n\t}\n\n\tfor key, value := range o {\n\t\tfield, ok := fields[key]\n\t\tif !ok {\n\t\t\tif ns != \"\" {\n\t\t\t\tkey = ns + \".\" + key\n\t\t\t}\n\t\t\treturn errors.Fatalf(\"option %v is not known\", key)\n\t\t}\n\n\t\ti := field.Index[0]\n\t\tswitch v.Type().Field(i).Type.Name() {\n\t\tcase \"string\":\n\t\t\tv.Field(i).SetString(value)\n\n\t\tcase \"int\":\n\t\t\tvi, err := strconv.ParseInt(value, 0, 32)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tv.Field(i).SetInt(vi)\n\n\t\tcase \"uint\":\n\t\t\tvi, err := strconv.ParseUint(value, 0, 32)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tv.Field(i).SetUint(vi)\n\n\t\tcase \"Duration\":\n\t\t\td, err := time.ParseDuration(value)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tv.Field(i).SetInt(int64(d))\n\n\t\tdefault:\n\t\t\tpanic(\"type \" + v.Type().Field(i).Type.Name() + \" not handled\")\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "42003aa5b5e70926babad6860ad3bbc8", "score": "0.46911085", "text": "func (o *OptionCommon) ApplyTo(r *Renderer) error {\n\tr.engine = o.Engine\n\tr.engine.SetViewRoot(o.ViewRoot)\n\treturn nil\n}", "title": "" }, { "docid": "249ab8ca1d927ae1e517ef3d73639510", "score": "0.4688655", "text": "func Configure(cmds map[string]CommandConfig) {\n\tfor k, v := range cmds {\n\t\tConfigureCommand(k, v)\n\t}\n}", "title": "" }, { "docid": "b80462f25cb7cca0eda3c219f2696c87", "score": "0.46856904", "text": "func (o *FeatureOptions) ApplyTo(c *server.Config) error {\n\tc.EnableProfiling = o.EnableProfiling\n\tc.EnableMetrics = o.EnableMetrics\n\n\treturn nil\n}", "title": "" }, { "docid": "d9417b72f8b1920d10a99cde5c6f7376", "score": "0.46831423", "text": "func (c *Config) Set(name string, value interface{}) (err error) {\n\tname = c.fixOptionName(name)\n\t_, _, err = c.updateOpt(name, value, true)\n\tif err == ErrNoOpt && c.ignore {\n\t\terr = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "dd1520789fc919a229929ac970887b16", "score": "0.46827295", "text": "func WithLogger(logger *log.Logger) ManagerOption {\n\treturn func(o *managerOptions) {\n\t\to.logger = logger\n\t}\n}", "title": "" }, { "docid": "dd1520789fc919a229929ac970887b16", "score": "0.46827295", "text": "func WithLogger(logger *log.Logger) ManagerOption {\n\treturn func(o *managerOptions) {\n\t\to.logger = logger\n\t}\n}", "title": "" }, { "docid": "dd1520789fc919a229929ac970887b16", "score": "0.46827295", "text": "func WithLogger(logger *log.Logger) ManagerOption {\n\treturn func(o *managerOptions) {\n\t\to.logger = logger\n\t}\n}", "title": "" }, { "docid": "d3cc934e9511b20ef2b283656a578c09", "score": "0.46611807", "text": "func (c *Controller) ManagerOptions() manager.Options {\n\treturn controllers.DefaultManagerOptions(c)\n}", "title": "" }, { "docid": "ce9dca596e3d6ca946a9a723272a1839", "score": "0.4654973", "text": "func (mh *MethodHandler) Options(options *sparta.LambdaFunctionOptions) *MethodHandler {\n\tmh.options = options\n\treturn mh\n}", "title": "" }, { "docid": "6425975c4cc085c95c65c0a4dd5f6350", "score": "0.46437344", "text": "func (cm *InstanceManager) ApplyConfig(c instance.Config) error {\n\tif cm.validate != nil {\n\t\terr := cm.validate(&c)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to validate instance %s: %w\", c.Name, err)\n\t\t}\n\t}\n\n\tcm.mut.Lock()\n\tdefer cm.mut.Unlock()\n\n\t// If the config already exists, we need to \"restart\" it. We do this by\n\t// stopping the old process and spawning a new one with the updated config.\n\tif proc, ok := cm.processes[c.Name]; ok {\n\t\tproc.Stop()\n\t}\n\n\t// Spawn a new process for the new config.\n\tcm.spawnProcess(c)\n\tcurrentActiveConfigs.Inc()\n\treturn nil\n}", "title": "" }, { "docid": "8f2baf56804f6ba88d7eed1540a429bc", "score": "0.46431157", "text": "func (cfo *ClientFactoryOpts) Apply(target *ClientFactoryOpts) {\n\tif cfo.Host != \"\" {\n\t\ttarget.Host = cfo.Host\n\t}\n\tif cfo.UseSSH != nil {\n\t\ttarget.UseSSH = cfo.UseSSH\n\t}\n\tif cfo.CacheDirBase != nil {\n\t\ttarget.CacheDirBase = cfo.CacheDirBase\n\t}\n\tif cfo.Token != nil {\n\t\ttarget.Token = cfo.Token\n\t}\n\tif cfo.GitUser != nil {\n\t\ttarget.GitUser = cfo.GitUser\n\t}\n\tif cfo.Censor != nil {\n\t\ttarget.Censor = cfo.Censor\n\t}\n\tif cfo.Username != nil {\n\t\ttarget.Username = cfo.Username\n\t}\n\tif cfo.CookieFilePath != \"\" {\n\t\ttarget.CookieFilePath = cfo.CookieFilePath\n\t}\n\tif cfo.Persist != nil {\n\t\ttarget.Persist = cfo.Persist\n\t}\n}", "title": "" }, { "docid": "9250d7c15d061aa424363df60de037c9", "score": "0.46323264", "text": "func (lm *LayoutManager) Apply(components []LayoutHintedComponent) {\n\tlm.Manager(components, lm.Consraint)\n}", "title": "" }, { "docid": "4b00be2929e67251632b36630462731d", "score": "0.46283227", "text": "func (am *Alertmanager) ApplyConfig(dbCfg *ngmodels.AlertConfiguration) error {\n\tvar err error\n\tcfg, err := Load([]byte(dbCfg.AlertmanagerConfiguration))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse Alertmanager config: %w\", err)\n\t}\n\n\tvar outerErr error\n\tam.Base.WithLock(func() {\n\t\tif err = am.applyConfig(cfg, nil); err != nil {\n\t\t\touterErr = fmt.Errorf(\"unable to apply configuration: %w\", err)\n\t\t\treturn\n\t\t}\n\t})\n\n\treturn outerErr\n}", "title": "" }, { "docid": "51750d509f988fc532e5452000a702c2", "score": "0.46261325", "text": "func (p *Provider) ApplyConfig(cfg Config) {\n\tp.mu.Lock()\n\tdefer p.mu.Unlock()\n\tc := *p.config.Load().(*Config)\n\tif cfg.DefaultSampler != nil {\n\t\tc.DefaultSampler = cfg.DefaultSampler\n\t}\n\tif cfg.IDGenerator != nil {\n\t\tc.IDGenerator = cfg.IDGenerator\n\t}\n\tif cfg.MaxEventsPerSpan > 0 {\n\t\tc.MaxEventsPerSpan = cfg.MaxEventsPerSpan\n\t}\n\tif cfg.MaxAttributesPerSpan > 0 {\n\t\tc.MaxAttributesPerSpan = cfg.MaxAttributesPerSpan\n\t}\n\tif cfg.MaxLinksPerSpan > 0 {\n\t\tc.MaxLinksPerSpan = cfg.MaxLinksPerSpan\n\t}\n\tif cfg.Resource != nil {\n\t\tc.Resource = cfg.Resource\n\t}\n\tp.config.Store(&c)\n}", "title": "" }, { "docid": "65db16faa3b73ac28773fa2abf470bf4", "score": "0.462548", "text": "func (c *Config) Set(path string, o Config) {\n\tvar last string\n\tpath, last = filepath.Split(path)\n\tif path == \"\" {\n\t\tif last == \"\" {\n\t\t\t*c = o\n\t\t\treturn\n\t\t}\n\t\tif c.Options == nil {\n\t\t\tc.Options = make(map[string]Config, 1)\n\t\t}\n\t\tc.Options[last] = o\n\t\treturn\n\t}\n\tpath = path[:len(path)-1] // trim suffix separator\n\tvar (\n\t\tkeys = strings.Split(path, string(filepath.Separator))\n\t\too Config\n\t\tok bool\n\t)\n\tfor _, k := range keys {\n\t\tif oo, ok = c.Options[k]; !ok {\n\t\t\treturn\n\t\t}\n\t\tif oo.Options == nil {\n\t\t\too = Config{\n\t\t\t\tBaseDir: oo.BaseDir,\n\t\t\t\tLink: oo.Link,\n\t\t\t\tTargets: oo.Targets,\n\t\t\t\tOptions: make(map[string]Config, 1),\n\t\t\t}\n\t\t\tc.Options[k] = oo\n\t\t}\n\t}\n\too.Options[last] = o\n}", "title": "" }, { "docid": "39def2f89f22b3dd94d66cd8eae13895", "score": "0.46250346", "text": "func (o *Options) Update(option Option) {\n\tfor idx, opt := range *o {\n\t\tif opt.Code() == option.Code() {\n\t\t\t(*o)[idx] = option\n\t\t\t// don't look further\n\t\t\treturn\n\t\t}\n\t}\n\t// if not found, add it\n\to.Add(option)\n}", "title": "" }, { "docid": "c6aeb690cad205a7074a663b6d6658fe", "score": "0.46200275", "text": "func (ci *ChainInfo) Configure(cfg *AppConfig, tmcfg *tmcfg.Config) {\n\tci.Configurer(cfg, tmcfg)\n}", "title": "" }, { "docid": "eeb4a2a8c3a2c2d4329590a28f996d75", "score": "0.4618905", "text": "func (co *ColumnOptions) Set(options ...columnOption) {\n\tfor _, o := range options {\n\t\to(co)\n\t}\n}", "title": "" }, { "docid": "22358c239395ec3a63fce46f9fd0afb7", "score": "0.46162313", "text": "func (client *Client) SetConfig(c *ClientOptions) {\n\tclient.mu.Lock()\n\tif c.Timeout > 0 {\n\t\tclient.opts.Timeout = c.Timeout\n\t}\n\tif c.KeepAlive > 0 {\n\t\tclient.dialer.KeepAlive = c.KeepAlive\n\t\tclient.opts.KeepAlive = c.KeepAlive\n\t}\n\tif c.DialTimeout > 0 {\n\t\tclient.dialer.Timeout = c.DialTimeout\n\t\tclient.opts.Timeout = c.DialTimeout\n\t}\n\tif c.Breaker != nil {\n\t\tclient.opts.Breaker = c.Breaker\n\t\tclient.breaker.Reload(c.Breaker)\n\t}\n\tfor uri, cfg := range c.URL {\n\t\tclient.urlConf[uri] = cfg\n\t}\n\tfor host, cfg := range c.Host {\n\t\tclient.hostConf[host] = cfg\n\t}\n\tclient.mu.Unlock()\n}", "title": "" }, { "docid": "4b15a436e049ddba9507432bf38448bd", "score": "0.4610469", "text": "func (e *Entry) SetRuntimeOptions(opts runtime.Options) {\n\te.mtx.Lock()\n\tif e.closed {\n\t\te.mtx.Unlock()\n\t\treturn\n\t}\n\te.resetRateLimiterWithLock(opts)\n\te.mtx.Unlock()\n}", "title": "" }, { "docid": "2225ba263d74c3306e7f106263bb7a42", "score": "0.4604789", "text": "func (o *PostManagementCiliumIoV2CiliumNodesParams) SetOptions(options *models.Options) {\n\to.Options = options\n}", "title": "" }, { "docid": "b1c93d7416c09437a9d6669957f02ad2", "score": "0.46012348", "text": "func (grid *Grid) Set(options ...GridOption) error {\n\ttempGrid := *grid\n\tfor i := range options {\n\t\tif err := options[i].applyTo(&tempGrid); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\t*grid = tempGrid\n\treturn nil\n}", "title": "" }, { "docid": "566bab940815f5fe868fa9358e201e0c", "score": "0.45994234", "text": "func WithSelfAddr(addr string) ManagerOption {\n\treturn func(o *managerOptions) {\n\t\to.selfAddr = addr\n\t}\n}", "title": "" }, { "docid": "41510de50e28ec7007bd812a0377f0f5", "score": "0.45972753", "text": "func (d *Disco) SetOptions(options ...Option) error {\n\tfor _, option := range options {\n\t\tif err := option(d); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a50d0320624529a7045cb849b3c71b17", "score": "0.45930493", "text": "func (v *Config) Apply() error {\n\tif v == nil {\n\t\treturn nil\n\t}\n\tif err := internet.ApplyGlobalNetworkSettings(v.NetworkSettings); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "23adad30878759b1b964988f01f08188", "score": "0.4589985", "text": "func (r *Runner) Configure(opts ...RunnerOpt) *Runner {\n\tif r == nil {\n\t\treturn nil\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(r)\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "efeb463b53c3b0ed4f62a89ede18c0cb", "score": "0.45853567", "text": "func (this *Config) Apply() error {\n\tif this.ConnectionReuse {\n\t\tconnectionReuse = true\n\t}\n\tenableKcp = this.enableKcp\n\tif enableKcp {\n\t\tKcpConfig = this.kcpConfig\n\t\t/*\n\t\t\tKCP do not support connectionReuse,\n\t\t\tit is mandatory to set connectionReuse to false\n\t\t\tSince KCP have no handshake and\n\t\t\tdoes not SlowStart, there isn't benefit to\n\t\t\tuse that anyway.\n\t\t*/\n\t\tconnectionReuse = false\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eb96379da5d82c92e82e96b9e24c88ea", "score": "0.45825443", "text": "func AddToManagerWithOptions(mgr manager.Manager, conf ControllerConfig) error {\n\t// setup main health reconciler\n\thealthController, err := controller.New(ControllerName, mgr, controller.Options{\n\t\tMaxConcurrentReconciles: conf.MaxConcurrentWorkers,\n\t\tReconciler: &reconciler{\n\t\t\tsyncPeriod: conf.SyncPeriod,\n\t\t\tclassFilter: &conf.ClassFilter,\n\t\t\ttargetClient: conf.TargetCluster.GetClient(),\n\t\t\ttargetScheme: conf.TargetCluster.GetScheme(),\n\t\t},\n\t\tRecoverPanic: true,\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to setup health reconciler: %w\", err)\n\t}\n\n\tif err := healthController.Watch(\n\t\t&source.Kind{Type: &resourcesv1alpha1.ManagedResource{}},\n\t\tenqueueCreateAndUpdate,\n\t\tappend(healthControllerPredicates, &conf.ClassFilter)...,\n\t); err != nil {\n\t\treturn fmt.Errorf(\"unable to watch ManagedResources: %w\", err)\n\t}\n\n\t// setup reconciler for progressing condition\n\tlog := mgr.GetLogger().WithName(\"controller\").WithName(progressingReconcilerName)\n\n\tb := builder.ControllerManagedBy(mgr).Named(progressingReconcilerName).\n\t\tWithOptions(controller.Options{\n\t\t\tMaxConcurrentReconciles: conf.MaxConcurrentWorkers,\n\t\t\tRecoverPanic: true,\n\t\t}).\n\t\tFor(&resourcesv1alpha1.ManagedResource{}, builder.WithPredicates(append(healthControllerPredicates, &conf.ClassFilter)...))\n\n\tif !conf.TargetCacheDisabled {\n\t\t// Watch relevant objects for Progressing condition in order to immediately update the condition as soon as there is\n\t\t// a change on managed resources.\n\t\t// If the target cache is disabled (e.g. for Shoots), we don't want to watch workload objects (Deployment, DaemonSet,\n\t\t// StatefulSet) because this would cache all of them in the entire cluster. This can potentially be a lot of objects\n\t\t// in Shoot clusters, because they are controlled by the end user. In this case, we rely on periodic syncs only.\n\t\t// If we want to have immediate updates for managed resources in Shoots in the future as well, we could consider\n\t\t// adding labels to managed resources and watch them explicitly.\n\t\tb.Watches(\n\t\t\t&source.Kind{Type: &appsv1.Deployment{}}, handler.EnqueueRequestsFromMapFunc(mapToOriginManagedResource(log, conf.ClusterID)),\n\t\t\tbuilder.WithPredicates(progressingStatusChanged),\n\t\t).Watches(\n\t\t\t&source.Kind{Type: &appsv1.StatefulSet{}}, handler.EnqueueRequestsFromMapFunc(mapToOriginManagedResource(log, conf.ClusterID)),\n\t\t\tbuilder.WithPredicates(progressingStatusChanged),\n\t\t).Watches(\n\t\t\t&source.Kind{Type: &appsv1.DaemonSet{}}, handler.EnqueueRequestsFromMapFunc(mapToOriginManagedResource(log, conf.ClusterID)),\n\t\t\tbuilder.WithPredicates(progressingStatusChanged),\n\t\t)\n\t}\n\n\tif err := b.Complete(&progressingReconciler{\n\t\tclient: mgr.GetClient(),\n\t\ttargetClient: conf.TargetCluster.GetClient(),\n\t\ttargetScheme: conf.TargetCluster.GetScheme(),\n\t\tclassFilter: &conf.ClassFilter,\n\t\tsyncPeriod: conf.SyncPeriod,\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"unable to setup progressing reconciler: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c8ae209ef1732f4ec418466d3349ea1d", "score": "0.45657519", "text": "func (s *Manager) ApplyConfig(cfg *prom.ConfigInfo) error {\n\tret := map[string]*JobInfo{}\n\tfor _, cfg := range cfg.Config.ScrapeConfigs {\n\t\tinfo, err := newJobInfo(*cfg, s.keeAliveDisable)\n\t\tif err != nil {\n\t\t\ts.lg.Error(err.Error())\n\t\t\tcontinue\n\t\t}\n\t\tret[cfg.JobName] = info\n\t}\n\ts.jobs = ret\n\treturn nil\n}", "title": "" }, { "docid": "42b3b3522e99aa78bdd38572ade04c61", "score": "0.45637345", "text": "func Apply(params Params, opts []Opt) {\n\tfor _, opt := range opts {\n\t\topt(params)\n\t}\n}", "title": "" }, { "docid": "91f7cca472ddd25e4a1bd3227fbcd645", "score": "0.4544105", "text": "func (o optionFunc) apply(c *config) {\n\to(c)\n}", "title": "" }, { "docid": "eb988bc8d92daae5b1a2c2a2bedbac78", "score": "0.4536734", "text": "func Configure(opts ...Option) error {\n\tfor _, opt := range opts {\n\t\terr := opt(executor)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "845a1a473919b978e517a9485363e6d7", "score": "0.45365223", "text": "func Set(a *AppConfigODS) error {\n\tc := &AppConfig{AppConfigODS: *a}\n\tfor _, l := range loaders {\n\t\terr := l.parseConfig(c)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\terr := parseConfig(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcfg.Store(c)\n\treturn nil\n}", "title": "" }, { "docid": "723c02b2fb2482701de83c0eea07e218", "score": "0.4531065", "text": "func (p *ProxyStorage) ApplyConfig(c *proxyconfig.Config) error {\n\toldState := p.GetState() // Fetch the old state\n\n\tfailed := false\n\n\tapis := make([]promclient.API, len(c.ServerGroups))\n\tnewState := &proxyStorageState{\n\t\tsgs: make([]*servergroup.ServerGroup, len(c.ServerGroups)),\n\t\tcfg: &c.PromxyConfig,\n\t}\n\tfor i, sgCfg := range c.ServerGroups {\n\t\ttmp := servergroup.New()\n\t\tif err := tmp.ApplyConfig(sgCfg); err != nil {\n\t\t\tfailed = true\n\t\t\tlogrus.Errorf(\"Error applying config to server group: %s\", err)\n\t\t}\n\t\tnewState.sgs[i] = tmp\n\t\tapis[i] = tmp\n\t}\n\tnewState.client = promclient.NewTimeTruncate(promclient.NewMultiAPI(apis, model.TimeFromUnix(0), nil, len(apis)))\n\n\tif failed {\n\t\tnewState.Cancel(nil)\n\t\treturn fmt.Errorf(\"error applying config to one or more server group(s)\")\n\t}\n\n\t// Check for remote_write (for appender)\n\tif c.PromConfig.RemoteWriteConfigs != nil {\n\t\tif oldState.remoteStorage != nil {\n\t\t\tif err := oldState.remoteStorage.ApplyConfig(&c.PromConfig); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tnewState.remoteStorage = oldState.remoteStorage\n\t\t} else {\n\t\t\t// TODO: configure path?\n\t\t\tremote := remote.NewStorage(kitloglogrus.NewLogrusLogger(logrus.WithField(\"component\", \"k8s_client_runtime\").Logger), func() (int64, error) { return 0, nil }, 1*time.Second)\n\t\t\tif err := remote.ApplyConfig(&c.PromConfig); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tnewState.remoteStorage = remote\n\t\t\tnewState.appenderCloser = remote.Close\n\t\t}\n\n\t\t// Whether old or new, update the appender\n\t\tvar err error\n\t\tnewState.appender, err = newState.remoteStorage.Appender()\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"unable to create remote_write appender\")\n\t\t}\n\n\t} else {\n\t\tnewState.appender = &appenderStub{}\n\t}\n\n\tnewState.Ready() // Wait for the newstate to be ready\n\tp.state.Store(newState) // Store the new state\n\tif oldState != nil && oldState.appender != newState.appender {\n\t\toldState.Cancel(newState) // Cancel the old one\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9b971e64e9dce6ffc17ff376b4fc7f80", "score": "0.45286447", "text": "func (req *ItemChoiceRequirement) SetOptions(options []UserInput) error {\n\treq.choices = options\n\tif req.GetCondition() != nil {\n\t\tcond := req.GetCondition()\n\n\t\t//\tfmt.Printf(\"Giving condition targets %v\\n\", options)\n\t\terr := cond.SetTargets(req.ID(), options)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1470052f5ade71d34c9fd86f2ccb46a1", "score": "0.4522452", "text": "func (c *Config) Update(o *Config) error {\n\tif o == nil {\n\t\treturn nil\n\t}\n\n\tconf := structs.New(c)\n\n\t// Then update the current config with values from the other config\n\tfor _, field := range structs.Fields(o) {\n\t\tif !field.IsZero() {\n\t\t\tupdateField := conf.Field(field.Name())\n\t\t\tupdateField.Set(field.Value())\n\t\t}\n\t}\n\n\treturn c.Validate()\n}", "title": "" }, { "docid": "2c06b965efbff97469109ab64d2601a6", "score": "0.4522356", "text": "func (_class VMMetricsClass) SetOtherConfig(sessionID SessionRef, self VMMetricsRef, value map[string]string) (_err error) {\n\t_method := \"VM_metrics.set_other_config\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertVMMetricsRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_valueArg, _err := convertStringToStringMapToXen(fmt.Sprintf(\"%s(%s)\", _method, \"value\"), value)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_, _err = _class.client.APICall(_method, _sessionIDArg, _selfArg, _valueArg)\n\treturn\n}", "title": "" }, { "docid": "7abed326d731aee742a47187f274d340", "score": "0.45095414", "text": "func (d *HandlingRule) injectOptions(packet *dhcpPacket, requestedParameters []uint8) {\n\tfor option, value := range d.options {\n\t\tshouldSet := false\n\t\tfor _, param := range requestedParameters {\n\t\t\tif option.number() == param {\n\t\t\t\tshouldSet = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !shouldSet {\n\t\t\tfor _, replyOption := range d.forceReplyOptions {\n\t\t\t\tif option == replyOption {\n\t\t\t\t\tshouldSet = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif shouldSet {\n\t\t\tpacket.setOption(option, value)\n\t\t}\n\t}\n}", "title": "" } ]
006920ff2dff340509ef9344ef9992f1
SetAddedToClusterTime sets the AddedToClusterTime field's value.
[ { "docid": "f77a25d747dc0c26e277276abb7726fb", "score": "0.8704105", "text": "func (s *NodeInfo) SetAddedToClusterTime(v string) *NodeInfo {\n\ts.AddedToClusterTime = &v\n\treturn s\n}", "title": "" } ]
[ { "docid": "fe47d1b4aa229fe8ecd24d1fe5474a12", "score": "0.64373684", "text": "func (ac *AntenatalCreate) SetAddedTime(t time.Time) *AntenatalCreate {\n\tac.mutation.SetAddedTime(t)\n\treturn ac\n}", "title": "" }, { "docid": "3095251420cf751aff343f2aac2851ae", "score": "0.62207764", "text": "func (m *EatinghistoryMutation) SetAddedTime(t time.Time) {\n\tm.added_time = &t\n}", "title": "" }, { "docid": "2a33a5ecf294f0277dc02968b32475e0", "score": "0.60525995", "text": "func (pc *PredicamentCreate) SetAddedTime(t time.Time) *PredicamentCreate {\n\tpc.mutation.SetAddedTime(t)\n\treturn pc\n}", "title": "" }, { "docid": "1872c075e1fcf3a42a0404ff81493f51", "score": "0.58075315", "text": "func (wu *WorkingUpdate) SetAddedTime(t time.Time) *WorkingUpdate {\n\twu.mutation.SetAddedTime(t)\n\treturn wu\n}", "title": "" }, { "docid": "2ebbd713cdcde309dc370dc87d3c6d4d", "score": "0.5701044", "text": "func (dc *DepositCreate) SetAddedtime(t time.Time) *DepositCreate {\n\tdc.mutation.SetAddedtime(t)\n\treturn dc\n}", "title": "" }, { "docid": "74f5e66d9b72d71b2a14242210c51e10", "score": "0.5607068", "text": "func (wuo *WorkingUpdateOne) SetAddedTime(t time.Time) *WorkingUpdateOne {\n\twuo.mutation.SetAddedTime(t)\n\treturn wuo\n}", "title": "" }, { "docid": "51d72cbe9ee43fc78b4caca57732d22d", "score": "0.55331516", "text": "func (lc *LeaseCreate) SetAddedtime(t time.Time) *LeaseCreate {\n\tlc.mutation.SetAddedtime(t)\n\treturn lc\n}", "title": "" }, { "docid": "59489a7352d04f773d75ff464ba5f91f", "score": "0.54053223", "text": "func (du *DepositUpdate) SetAddedtime(t time.Time) *DepositUpdate {\n\tdu.mutation.SetAddedtime(t)\n\treturn du\n}", "title": "" }, { "docid": "9ec57e22175991a42b96281248128faa", "score": "0.52762145", "text": "func (duo *DepositUpdateOne) SetAddedtime(t time.Time) *DepositUpdateOne {\n\tduo.mutation.SetAddedtime(t)\n\treturn duo\n}", "title": "" }, { "docid": "63c1cc462d07dcbe2c3eb7d7b61982ce", "score": "0.5179771", "text": "func (m *AntenatalMutation) SetADDEDTIME(t time.Time) {\n\tm._ADDED_TIME = &t\n}", "title": "" }, { "docid": "e1398584961d6a9e5f177f5958350e1b", "score": "0.4902213", "text": "func (ru *ReturninvoiceUpdate) SetAddedtime(t time.Time) *ReturninvoiceUpdate {\n\tru.mutation.SetAddedtime(t)\n\treturn ru\n}", "title": "" }, { "docid": "cd75d0cd438359fcc1d13a11a3645665", "score": "0.48621234", "text": "func (ruo *ReturninvoiceUpdateOne) SetAddedtime(t time.Time) *ReturninvoiceUpdateOne {\n\truo.mutation.SetAddedtime(t)\n\treturn ruo\n}", "title": "" }, { "docid": "4bf657fd0269e4134f9292f299d8b9c6", "score": "0.4816204", "text": "func (pc *PredicamentCreate) SetNillableAddedTime(t *time.Time) *PredicamentCreate {\n\tif t != nil {\n\t\tpc.SetAddedTime(*t)\n\t}\n\treturn pc\n}", "title": "" }, { "docid": "d51135c9054873579d020deb82629665", "score": "0.4794381", "text": "func (c *Client) AdvanceClusterTime(clusterTime bson.Raw) error {\n\tif c.Terminated {\n\t\treturn ErrSessionEnded\n\t}\n\tc.ClusterTime = MaxClusterTime(c.ClusterTime, clusterTime)\n\treturn nil\n}", "title": "" }, { "docid": "230e69a0aa9736c7e6c0a25c54b232a1", "score": "0.4710776", "text": "func (o GetClustersClusterOutput) CreateTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetClustersCluster) string { return v.CreateTime }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b5113925bc5881567ecfb326d22fb9c1", "score": "0.46837273", "text": "func (mr *MockInstallerAPIMockRecorder) TransformClusterToAddingHosts(arg0, arg1 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"TransformClusterToAddingHosts\", reflect.TypeOf((*MockInstallerAPI)(nil).TransformClusterToAddingHosts), arg0, arg1)\n}", "title": "" }, { "docid": "976aa1a59cb0f4bbe81b2a8989e59c84", "score": "0.46610507", "text": "func (s *ExternalModel) SetCreatedTime(v string) *ExternalModel {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "52281165acd5de14c75890b7c9971984", "score": "0.46468535", "text": "func (s *FolderSummary) SetCreatedTime(v time.Time) *FolderSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "673012d816030a8fb6abaf4a1e20a148", "score": "0.46393406", "text": "func AddedTime(v time.Time) predicate.Dentalexpense {\n\treturn predicate.Dentalexpense(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddedTime), v))\n\t})\n}", "title": "" }, { "docid": "93f3650029c32a30d9ffe5fda17498e5", "score": "0.46317405", "text": "func WithClusterTimeout(cTo int) Option {\n\treturn func(options *options) {\n\t\toptions.clusterTimeout = time.Duration(cTo) * time.Second\n\t}\n}", "title": "" }, { "docid": "cd9f8c113265c430074e9d4ae75514b1", "score": "0.4624739", "text": "func (s *Folder) SetCreatedTime(v time.Time) *Folder {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "330a4dab024e5ef85ff34cb466a724d9", "score": "0.46220037", "text": "func AddedTime(v time.Time) predicate.Eatinghistory {\n\treturn predicate.Eatinghistory(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldAddedTime), v))\n\t})\n}", "title": "" }, { "docid": "33f615bec6a8cc6946e444552d91263b", "score": "0.4585725", "text": "func (s *CreateServiceOutput) SetCreatedTime(v time.Time) *CreateServiceOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "34820b630b80458929e7c12afdbb80b6", "score": "0.4576212", "text": "func (s *Ingestion) SetCreatedTime(v time.Time) *Ingestion {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "6f0ff1f8acb28db7219ae931a797cac2", "score": "0.45679775", "text": "func (s *GetServiceOutput) SetCreatedTime(v time.Time) *GetServiceOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "bfef440812653e0c9837b176bbfff59d", "score": "0.45613727", "text": "func (s *DataSet) SetCreatedTime(v time.Time) *DataSet {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "45860beca08ed53880407bb3d06ec2ab", "score": "0.45505235", "text": "func (s *Label) SetCreatedTime(v string) *Label {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "625116cd43f09a025c26a8a0d8068afa", "score": "0.45481828", "text": "func (s *CreateEnvironmentOutput) SetCreatedTime(v time.Time) *CreateEnvironmentOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "8a9e5b81ee6d801413c7351a1b52b850", "score": "0.4543965", "text": "func (s *EventType) SetCreatedTime(v string) *EventType {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "3ec1c6f3749529c718e9a25220c308eb", "score": "0.45343792", "text": "func (s *DataSetSummary) SetCreatedTime(v time.Time) *DataSetSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "167e3c6832722e01f60fe457f4510b66", "score": "0.45277438", "text": "func (s *CreateApplicationOutput) SetCreatedTime(v time.Time) *CreateApplicationOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "c8a660fdfb97d6535a66e2308d67b211", "score": "0.45252448", "text": "func (mr *MockSenderMockRecorder) SendClusterEventAtTime(ctx, event, eventTime interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SendClusterEventAtTime\", reflect.TypeOf((*MockSender)(nil).SendClusterEventAtTime), ctx, event, eventTime)\n}", "title": "" }, { "docid": "7dd373d56eb33c1416d678dea4fbb455", "score": "0.45249164", "text": "func (s *Analysis) SetCreatedTime(v time.Time) *Analysis {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "a9f01a7f85c0b86326775ce4299e148d", "score": "0.45184675", "text": "func (s *GetEnvironmentOutput) SetCreatedTime(v time.Time) *GetEnvironmentOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "67453ba8aafb91e231853bfe7f0c0b43", "score": "0.45158836", "text": "func (s *EntityType) SetCreatedTime(v string) *EntityType {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "b63c9c66b39a17ffd529368fd6b028cd", "score": "0.45131028", "text": "func (s *AnalysisSummary) SetCreatedTime(v time.Time) *AnalysisSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "99a656ec637d5dc7bb0081a34e6ca3b1", "score": "0.4505069", "text": "func (s *GetDetectorVersionOutput) SetCreatedTime(v string) *GetDetectorVersionOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "d4943b0574a23973bcd7b31ab7d78559", "score": "0.44974014", "text": "func (s *CreateRouteOutput) SetCreatedTime(v time.Time) *CreateRouteOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "18ccc1db2b87c05bd6f1ae0d85899633", "score": "0.44970778", "text": "func (s *DataSource) SetCreatedTime(v time.Time) *DataSource {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "8723e11adcffdc011a9886c135058acd", "score": "0.44968", "text": "func (s *EnvironmentSummary) SetCreatedTime(v time.Time) *EnvironmentSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "501525e903d410c94775c53ad0d85c61", "score": "0.4493869", "text": "func (s *ApplicationSummary) SetCreatedTime(v time.Time) *ApplicationSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "d93cb944d99d963c7612ca73893e3dc3", "score": "0.44910255", "text": "func AddClusterRoleToUser(rancherClient *rancher.Client, cluster *management.Cluster, user *management.User, clusterRole string) error {\n\trole := &management.ClusterRoleTemplateBinding{\n\t\tClusterID: cluster.Resource.ID,\n\t\tUserPrincipalID: user.PrincipalIDs[0],\n\t\tRoleTemplateID: clusterRole,\n\t}\n\n\topts := metav1.ListOptions{\n\t\tFieldSelector: \"metadata.name=\" + cluster.ID,\n\t\tTimeoutSeconds: &timeout,\n\t}\n\n\tadminClient, err := rancher.NewClient(rancherClient.RancherConfig.AdminToken, rancherClient.Session)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\twatchInterface, err := adminClient.GetManagementWatchInterface(management.ClusterType, opts)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcheckFunc := func(event watch.Event) (ready bool, err error) {\n\t\tclusterUnstructured := event.Object.(*unstructured.Unstructured)\n\t\tcluster := &v3.Cluster{}\n\n\t\terr = scheme.Scheme.Convert(clusterUnstructured, cluster, clusterUnstructured.GroupVersionKind())\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tif cluster.Annotations == nil || cluster.Annotations[\"field.cattle.io/creatorId\"] == \"\" {\n\t\t\t// no cluster creator, no roles to populate. This will be the case for the \"local\" cluster.\n\t\t\treturn true, nil\n\t\t}\n\n\t\tv3.ClusterConditionInitialRolesPopulated.CreateUnknownIfNotExists(cluster)\n\t\tif v3.ClusterConditionInitialRolesPopulated.IsUnknown(cluster) || v3.ClusterConditionInitialRolesPopulated.IsTrue(cluster) {\n\t\t\treturn true, nil\n\t\t}\n\t\treturn false, nil\n\t}\n\n\terr = wait.WatchWait(watchInterface, checkFunc)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\troleTemplateResp, err := rancherClient.Management.ClusterRoleTemplateBinding.Create(role)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = kwait.Poll(600*time.Millisecond, 3*time.Minute, func() (done bool, err error) {\n\t\tclusterRoleTemplate, err := rancherClient.Management.ClusterRoleTemplateBinding.ByID(roleTemplateResp.ID)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tif clusterRoleTemplate != nil {\n\t\t\treturn true, nil\n\t\t}\n\n\t\treturn false, nil\n\t})\n\n\treturn err\n\n}", "title": "" }, { "docid": "1cc47cf431001eea262b2514fe0e5413", "score": "0.4490901", "text": "func (m *EatinghistoryMutation) AddedTime() (r time.Time, exists bool) {\n\tv := m.added_time\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "a67e5ee57aba9575e4d49693b22d535a", "score": "0.44864446", "text": "func (o ClusterOutput) CreateTime() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Cluster) pulumi.StringOutput { return v.CreateTime }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0a40899b9bd100cf8942586bfca8a860", "score": "0.44864246", "text": "func (s *Outcome) SetCreatedTime(v string) *Outcome {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "ff017ae039f39343f1a6fadeb8e82f56", "score": "0.4477977", "text": "func (c *Chunk) AppendTime(colIdx int, t types.Time) {\n\tc.columns[colIdx].appendTime(t)\n}", "title": "" }, { "docid": "451d7563c33247c6cffdca4c3d048838", "score": "0.44690728", "text": "func (s *GetApplicationOutput) SetCreatedTime(v time.Time) *GetApplicationOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "24e05066cfd758b47b5b6022cc2813c8", "score": "0.44683403", "text": "func (s *RuleDetail) SetCreatedTime(v string) *RuleDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "8803b90f9c6c30e38be2739ae1fdd679", "score": "0.44495264", "text": "func (s *LifeCycle) SetAddedToServiceDateTime(v string) *LifeCycle {\n\ts.AddedToServiceDateTime = &v\n\treturn s\n}", "title": "" }, { "docid": "736a83d5b4187176454c0610a20d8ba2", "score": "0.44437096", "text": "func (s *ProvisioningArtifact) SetCreatedTime(v time.Time) *ProvisioningArtifact {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "2f3a704c2034aab8aa2ec60a6a174c55", "score": "0.44413877", "text": "func (s *ServiceSummary) SetCreatedTime(v time.Time) *ServiceSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "e5062a7064f87d2e0e18e89f09071ad1", "score": "0.44412556", "text": "func (mr *MockHandlerMockRecorder) SendClusterEventAtTime(ctx, event, eventTime interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"SendClusterEventAtTime\", reflect.TypeOf((*MockHandler)(nil).SendClusterEventAtTime), ctx, event, eventTime)\n}", "title": "" }, { "docid": "365d0751dea98ba092ef3266088f5ed0", "score": "0.44361663", "text": "func (s *DashboardSummary) SetCreatedTime(v time.Time) *DashboardSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "0b4aebcbd8b5ddf1ad7013cd51c403d0", "score": "0.443593", "text": "func (o NodePoolNodeTaintOutput) TimeAdded() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NodePoolNodeTaint) *string { return v.TimeAdded }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c85c289b2792059fda61305760dbbfc6", "score": "0.4432984", "text": "func (s *GetRouteOutput) SetCreatedTime(v time.Time) *GetRouteOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "4d55fcb8e8e26366b56d315b4f6ace25", "score": "0.4428125", "text": "func (s *ModelVersionDetail) SetCreatedTime(v string) *ModelVersionDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "3974b170686086c5b79e72af99922461", "score": "0.4424165", "text": "func (s *ProvisioningArtifactSummary) SetCreatedTime(v time.Time) *ProvisioningArtifactSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "3ce4d4dcdf1554c5f99b1c0791aefa82", "score": "0.44135562", "text": "func (s *DashboardVersion) SetCreatedTime(v time.Time) *DashboardVersion {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "b52d12e36367da14bb45500ab48b8c16", "score": "0.4407686", "text": "func (bbu *BookBorrowUpdate) SetADDEDTIME(t time.Time) *BookBorrowUpdate {\n\tbbu.mutation.SetADDEDTIME(t)\n\treturn bbu\n}", "title": "" }, { "docid": "6cbdc54dcf0c4de71e7b2c474a88327e", "score": "0.44046006", "text": "func (s *EnvironmentVpc) SetCreatedTime(v time.Time) *EnvironmentVpc {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "bd70ea6e110040a4d138ba3e1069086d", "score": "0.44010976", "text": "func (s *DashboardVersionSummary) SetCreatedTime(v time.Time) *DashboardVersionSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "0055d92abf50bbd519481458e68a370e", "score": "0.43957126", "text": "func (o *ActivityTotal) SetElapsedTime(v int32) {\n\to.ElapsedTime = &v\n}", "title": "" }, { "docid": "b48cf3757770d761738223be425058d5", "score": "0.4395473", "text": "func (s *ProvisioningArtifactDetail) SetCreatedTime(v time.Time) *ProvisioningArtifactDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "5c2298966796efd6402c1b800d375ff7", "score": "0.43944305", "text": "func (s *ThemeSummary) SetCreatedTime(v time.Time) *ThemeSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "d4426e638d4ef96f93a722ef6b71fa86", "score": "0.4381019", "text": "func (s *Model) SetCreatedTime(v string) *Model {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "dfdf236a3ba76c81683e28bcc7a828e2", "score": "0.4379971", "text": "func (s *Dashboard) SetCreatedTime(v time.Time) *Dashboard {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "7e5369849df112a23ac7959252f53e37", "score": "0.4353458", "text": "func (s *Detector) SetCreatedTime(v string) *Detector {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "d36d1cc5de2b39fdc6ec382e79022945", "score": "0.43492123", "text": "func (s *ThemeVersionSummary) SetCreatedTime(v time.Time) *ThemeVersionSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "4ae9675f7a7e778679a2a5a5f869765e", "score": "0.4346381", "text": "func (bbuo *BookBorrowUpdateOne) SetADDEDTIME(t time.Time) *BookBorrowUpdateOne {\n\tbbuo.mutation.SetADDEDTIME(t)\n\treturn bbuo\n}", "title": "" }, { "docid": "147dcafa51f38a88707ad39002ba0df6", "score": "0.43455008", "text": "func (s *RouteSummary) SetCreatedTime(v time.Time) *RouteSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "4f2f66deccd20d38161c55f18128a8cb", "score": "0.43454263", "text": "func (o *CreateHostOutAllOf) SetCulledTimestamp(v string) {\n\to.CulledTimestamp.Set(&v)\n}", "title": "" }, { "docid": "1504a9b7abfcfe7e9eeca480ea364930", "score": "0.4343132", "text": "func (s *Variable) SetCreatedTime(v string) *Variable {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "c93c5ded90735dd5151a6bc85c5056c4", "score": "0.43388927", "text": "func (s *StatusManager) AddClusterToStatus(ctx context.Context, reaper *api.Reaper, cassdc *cassdcapi.CassandraDatacenter) error {\n\tif contains(reaper.Status.Clusters, cassdc.Spec.ClusterName) {\n\t\treturn nil\n\t}\n\n\tpatch := client.MergeFrom(reaper.DeepCopy())\n\tclusters := append(reaper.Status.Clusters, cassdc.Spec.ClusterName)\n\treaper.Status.Clusters = clusters\n\n\treturn s.Status().Patch(ctx, reaper, patch)\n}", "title": "" }, { "docid": "b2007900da7d107dc3234034c576cc39", "score": "0.4331733", "text": "func (s *ProvisionedProductAttribute) SetCreatedTime(v time.Time) *ProvisionedProductAttribute {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "97d8c88086921f350218f10ef8f9e2c7", "score": "0.43292722", "text": "func (o *SummaryActivity) SetElapsedTime(v int32) {\n\to.ElapsedTime = &v\n}", "title": "" }, { "docid": "e2930710049f1133216a8cfe2089f199", "score": "0.4321796", "text": "func (s *GetDomainOutput) SetCreatedTime(v time.Time) *GetDomainOutput {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "b05e5443b6d0ebf9fbf0f80f6f2786e2", "score": "0.4313697", "text": "func (s *Theme) SetCreatedTime(v time.Time) *Theme {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "ff1485c0ab3fa75b0c42b5a48bfb715a", "score": "0.43132693", "text": "func (s *ThemeVersion) SetCreatedTime(v time.Time) *ThemeVersion {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "bf3151e0e0e70c11829da1345c2510df", "score": "0.43072638", "text": "func (s *TemplateSummary) SetCreatedTime(v time.Time) *TemplateSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "4907a214c7c92da9fdd71a1acf8dc21a", "score": "0.43066254", "text": "func (o NodeTemplateNodeTaintOutput) TimeAdded() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v NodeTemplateNodeTaint) *string { return v.TimeAdded }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "38764a0d91697403c31c504ea73c4d63", "score": "0.42898712", "text": "func (s *TemplateVersionSummary) SetCreatedTime(v time.Time) *TemplateVersionSummary {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "24bdc74ba6f466b1e09452af9fa5a530", "score": "0.4282897", "text": "func (s *ProvisionedProductDetail) SetCreatedTime(v time.Time) *ProvisionedProductDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "a973516630eeefd1c2fed1e35f5e36dc", "score": "0.42818767", "text": "func (m *Message) SetClusterLevel(level int) {\n\tlvl := int32(level)\n\tm.ClusterLevelRaw = lvl + 1\n}", "title": "" }, { "docid": "fe2cf4dc6e01e2241f98eedfe0b552f7", "score": "0.4280606", "text": "func (s *ProvisionedProductPlanDetails) SetCreatedTime(v time.Time) *ProvisionedProductPlanDetails {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "8c1c6185f58bd94cd3d42230440c97db", "score": "0.42755884", "text": "func (state *State) AddCluster(name string, c Cluster) {\n\tstate.clusters[name] = c\n\tstate.ResetCache()\n}", "title": "" }, { "docid": "086061545cc404567592baf895a83451", "score": "0.42699546", "text": "func (s *PortfolioDetail) SetCreatedTime(v time.Time) *PortfolioDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "0eef342cfe5d6212804ce5362d66e0ad", "score": "0.42659366", "text": "func (s *ResourceDetail) SetCreatedTime(v time.Time) *ResourceDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "6f61ed4fd10d8e5ee72356d2fc2bd9a1", "score": "0.4265664", "text": "func (m *WalletNodeMutation) AddedCreatetimeUtc() (r int, exists bool) {\n\tv := m.addcreatetime_utc\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "f2e003d527781f7ebf6ea35924453aa5", "score": "0.42573702", "text": "func (c *Cluster) AttachToContainer(opts docker.AttachToContainerOptions) error {\n\tnode, err := c.getNodeForContainer(opts.Container)\n\tif err != nil {\n\t\treturn err\n\t}\n\tnode.setPersistentClient()\n\treturn wrapError(node, node.AttachToContainer(opts))\n}", "title": "" }, { "docid": "8534c52e8b9f2dcb8d4c59dc28aea42f", "score": "0.42570907", "text": "func (s *AllowDenyList) SetCreatedTime(v string) *AllowDenyList {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "979a957bfc58bb2c7701e15d347af127", "score": "0.42530492", "text": "func (s *ProductViewDetail) SetCreatedTime(v time.Time) *ProductViewDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "768dd2f3fc94ebb6414962158fc45647", "score": "0.42477208", "text": "func (s *ContactContent) SetConnectedToSystemTime(v time.Time) *ContactContent {\n\ts.ConnectedToSystemTime = &v\n\treturn s\n}", "title": "" }, { "docid": "0050e65712ff35f0d84d15dba955e2e2", "score": "0.42385566", "text": "func (s *RecordDetail) SetCreatedTime(v time.Time) *RecordDetail {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "1c43d61db1b2ac7facbd48db062a7d8c", "score": "0.42333266", "text": "func (s *TemplateVersion) SetCreatedTime(v time.Time) *TemplateVersion {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" }, { "docid": "91348db138f3d5cd6e62fe7828c6ba4c", "score": "0.42175078", "text": "func (o *DetailedActivity) SetElapsedTime(v int32) {\n\to.ElapsedTime = &v\n}", "title": "" }, { "docid": "74b4f52fbaec763d20fe63130ff8eec6", "score": "0.41976804", "text": "func (m *ReviewMutation) AddedCreatetimeUtc() (r int, exists bool) {\n\tv := m.addcreatetime_utc\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "719c75900acd87ce27a8e29c5379e1c9", "score": "0.41721538", "text": "func (o *AddClusterCreated) WithPayload(payload *models.APIResponse) *AddClusterCreated {\n\to.Payload = payload\n\treturn o\n}", "title": "" }, { "docid": "4a39d79e3434ffe478882c54b2e43921", "score": "0.41455457", "text": "func (m *TransactionMutation) AddedCreatetimeUtc() (r int, exists bool) {\n\tv := m.addcreatetime_utc\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "b626e1c86840d83c632c007f17f9f70b", "score": "0.41446182", "text": "func (s *Template) SetCreatedTime(v time.Time) *Template {\n\ts.CreatedTime = &v\n\treturn s\n}", "title": "" } ]
2309b5781bc7cdc81c9f20b856e2f3cb
DeleteEvent provides a mock function with given fields: _a0
[ { "docid": "df6894b5c6ca3575c763f4f6f6d5546d", "score": "0.76278865", "text": "func (_m *EventRepo) DeleteEvent(_a0 string) (*string, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *string\n\tif rf, ok := ret.Get(0).(func(string) *string); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*string)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" } ]
[ { "docid": "a84ec8bb14dffe00469507fc42d821ff", "score": "0.6392863", "text": "func (_m *TaskIDMapper) Delete(_a0 scheduler.TaskID) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(scheduler.TaskID) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "80d9384301a73b5b51f2a3e2966cecb3", "score": "0.62722117", "text": "func (_m *Db) Delete(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4aa18ab0105747e0fd17e829b3a48640", "score": "0.62690455", "text": "func (_m *IAttackStore) Delete(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4dbd8f32282fd5a7e649ed9d71261427", "score": "0.6247773", "text": "func (_m *Store) Delete(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "16fa87ccad562dad081cdf4d8d9f350c", "score": "0.6193885", "text": "func (_m *MockProvider) ObjectDelete(app string, key string) error {\n\tret := _m.Called(app, key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string) error); ok {\n\t\tr0 = rf(app, key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "16966cb69f6cf642deea562d8547a16d", "score": "0.61676735", "text": "func (_m *DirectorClient) DeleteEventDefinition(ctx context.Context, eventID string) error {\n\tret := _m.Called(ctx, eventID)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string) error); ok {\n\t\tr0 = rf(ctx, eventID)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f9f5dcc0571970fd8852ec62ef8ad76c", "score": "0.6142051", "text": "func (_m *RoasterI) Delete(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e929d267889db253ae808d5547786044", "score": "0.6135111", "text": "func (suite *archiverEngineTestSuite) TestDeletePodEvents() {\n\te := &engine{\n\t\tjobClient: suite.mockJobClient,\n\t\ttaskClient: suite.mockTaskClient,\n\t\tconfig: config.Config{\n\t\t\tArchiver: config.ArchiverConfig{\n\t\t\t\tEnable: false,\n\t\t\t\tPodEventsCleanup: true,\n\t\t\t\tArchiveInterval: 10 * time.Millisecond,\n\t\t\t\tBootstrapDelay: 10 * time.Millisecond,\n\t\t\t},\n\t\t},\n\t\tmetrics: NewMetrics(tally.NoopScope),\n\t\tdispatcher: yarpc.NewDispatcher(yarpc.Config{Name: config.PelotonArchiver}),\n\t\tretryPolicy: suite.retryPolicy,\n\t}\n\n\tjobID := &peloton.JobID{Value: \"7ac74273-4ef0-4ca4-8fd2-34bc52aeac06\"}\n\ttaskID := \"7ac74273-4ef0-4ca4-8fd2-34bc52aeac06-0-101\"\n\tmesosTaskID := &mesos.TaskID{Value: &taskID}\n\tqueryResp := &job.QueryResponse{\n\t\tResults: []*job.JobSummary{\n\t\t\t{\n\t\t\t\tId: jobID,\n\t\t\t\tInstanceCount: 1,\n\t\t\t\tType: job.JobType_SERVICE,\n\t\t\t},\n\t\t},\n\t}\n\n\tgetPodEventRequest := &task.GetPodEventsRequest{\n\t\tJobId: jobID,\n\t\tInstanceId: uint32(0),\n\t\tLimit: uint64(1),\n\t}\n\n\tdeletePodEventsRequest := &task.DeletePodEventsRequest{\n\t\tJobId: jobID,\n\t\tInstanceId: uint32(0),\n\t\tRunId: uint64(1),\n\t}\n\n\tvar events []*task.PodEvent\n\tevent := &task.PodEvent{\n\t\tTaskId: mesosTaskID,\n\t}\n\tevents = append(events, event)\n\n\tgetPodEventsResponse := &task.GetPodEventsResponse{\n\t\tResult: events,\n\t}\n\n\tgomock.InOrder(\n\t\tsuite.mockJobClient.EXPECT().Query(gomock.Any(), gomock.Any()).\n\t\t\tReturn(queryResp, nil),\n\t\tsuite.mockTaskClient.EXPECT().GetPodEvents(gomock.Any(), getPodEventRequest).\n\t\t\tReturn(getPodEventsResponse, nil),\n\t\tsuite.mockTaskClient.EXPECT().DeletePodEvents(gomock.Any(), deletePodEventsRequest).\n\t\t\tReturn(nil, nil),\n\n\t\t// Job Query fails on all three retries. At this point we will send error to errChan\n\t\tsuite.mockJobClient.EXPECT().Query(gomock.Any(), gomock.Any()).\n\t\t\tReturn(nil, fmt.Errorf(\"Job Query failed\")),\n\t\tsuite.mockJobClient.EXPECT().Query(gomock.Any(), gomock.Any()).\n\t\t\tReturn(nil, fmt.Errorf(\"Job Query failed\")),\n\t\tsuite.mockJobClient.EXPECT().Query(gomock.Any(), gomock.Any()).\n\t\t\tReturn(nil, fmt.Errorf(\"Job Query failed\")),\n\t)\n\n\tif err := e.Start(); err != nil {\n\t\te.Cleanup()\n\t}\n}", "title": "" }, { "docid": "3ac15d737886cc18b20ccbba2d096130", "score": "0.6125708", "text": "func (_m *CodeBuildModelAPI) DeleteCodeBuildJob(event types.Event) error {\n\tret := _m.Called(event)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(types.Event) error); ok {\n\t\tr0 = rf(event)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "10c506775fd4e64e36ece568cd6870f8", "score": "0.60745984", "text": "func (_m *EventRepo) UpdateEvent(_a0 domains.Event) (*domains.Event, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *domains.Event\n\tif rf, ok := ret.Get(0).(func(domains.Event) *domains.Event); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domains.Event)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(domains.Event) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "d84af32608299ec0c1b820727d69cd1d", "score": "0.60158294", "text": "func (_m *Mailbox) Delete(key *ari.Key) error {\n\tret := _m.Called(key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*ari.Key) error); ok {\n\t\tr0 = rf(key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "1342d1c0dcfe0735035d85f02375981b", "score": "0.6011686", "text": "func (_m *DomainsService) Delete(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "90dbf644dcd72b1a1212aac713e8a23d", "score": "0.598608", "text": "func (_m *Bridge) Delete(key *ari.Key) error {\n\tret := _m.Called(key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*ari.Key) error); ok {\n\t\tr0 = rf(key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "d2efa5735d5123f24e36c894857ffd18", "score": "0.59650093", "text": "func (_e *MilvusServiceServer_Expecter) Delete(_a0 interface{}, _a1 interface{}) *MilvusServiceServer_Delete_Call {\n\treturn &MilvusServiceServer_Delete_Call{Call: _e.mock.On(\"Delete\", _a0, _a1)}\n}", "title": "" }, { "docid": "f4b94a6fb67af7a637882d25f133e7fb", "score": "0.58384854", "text": "func (_m *DynamoDBModelAPI) DeleteEnvironment(event types.Event) error {\n\tret := _m.Called(event)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(types.Event) error); ok {\n\t\tr0 = rf(event)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "0568863308e6d1b26ae0ca14ee797d7b", "score": "0.5832838", "text": "func (_m *ClientInterface) Event(e *statsd.Event) error {\n\tret := _m.Called(e)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*statsd.Event) error); ok {\n\t\tr0 = rf(e)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e6286f664fc79971263ebad4195acbc4", "score": "0.5814142", "text": "func (_m *EventRepo) GetEvent(_a0 string) (*domains.Event, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *domains.Event\n\tif rf, ok := ret.Get(0).(func(string) *domains.Event); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domains.Event)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "77d41fb9d23c0ea93c5d0cf1535e20e7", "score": "0.5795346", "text": "func (_m *ParentDirectoryRepository) Delete(_a0 model.ParentDirectory) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(model.ParentDirectory) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "b40deb405f0bce1edf63b66a0507bdc3", "score": "0.5754543", "text": "func (_m *Blobs) Delete(_a0 ...types.Blob) error {\n\t_va := make([]interface{}, len(_a0))\n\tfor _i := range _a0 {\n\t\t_va[_i] = _a0[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(...types.Blob) error); ok {\n\t\tr0 = rf(_a0...)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "777758224caa534a443b115be75cee6d", "score": "0.5735214", "text": "func (_m *CodeBuildModelAPI) AdaptCodeBildJobForDelete(event types.Event) error {\n\tret := _m.Called(event)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(types.Event) error); ok {\n\t\tr0 = rf(event)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7136677080c3672bc0243e60725da44b", "score": "0.5722421", "text": "func (_m *MockProvider) AppDelete(name string) error {\n\tret := _m.Called(name)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(name)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "22ff7b0d610a08dd11007d9808b7d85e", "score": "0.5707697", "text": "func (_m *Bus) DispatchEvent(_a0 context.Context, _a1 bus.Event) error {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, bus.Event) error); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7c778742d9d539be142ef49c509ac487", "score": "0.56921774", "text": "func (_m *EventHandler) Deserialize(_a0 *bytes.Buffer) (wire.Event, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 wire.Event\n\tif rf, ok := ret.Get(0).(func(*bytes.Buffer) wire.Event); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(wire.Event)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(*bytes.Buffer) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "2a8fcf76e43c56051dc273051a43351e", "score": "0.5681711", "text": "func (_m *MockClient) Delete(_param0 *hrpc.Mutate) (*hrpc.Result, error) {\r\n\tret := _m.ctrl.Call(_m, \"Delete\", _param0)\r\n\tret0, _ := ret[0].(*hrpc.Result)\r\n\tret1, _ := ret[1].(error)\r\n\treturn ret0, ret1\r\n}", "title": "" }, { "docid": "66b16bd1a9deeb5c158d448dbf1a97b3", "score": "0.56602955", "text": "func (_m *MockStore) Delete(id uint64) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(uint64) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a9f9bb98b09f4dacae9fd471b938fa23", "score": "0.56374997", "text": "func TestMockEOperationUnsetEExceptions(t *testing.T) {\n\to := &MockEOperation{}\n\to.On(\"UnsetEExceptions\").Once()\n\to.UnsetEExceptions()\n\to.AssertExpectations(t)\n}", "title": "" }, { "docid": "3761de4f5687337f073a2e9da651d608", "score": "0.5625586", "text": "func (_m *APIKeysHandler) Delete() echo.HandlerFunc {\n\tret := _m.Called()\n\n\tvar r0 echo.HandlerFunc\n\tif rf, ok := ret.Get(0).(func() echo.HandlerFunc); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(echo.HandlerFunc)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "53d005bc610fdcb236e39fcc0b2990b8", "score": "0.5611435", "text": "func (_e *Client_Expecter) Del(ctx interface{}, keys ...interface{}) *Client_Del_Call {\n\treturn &Client_Del_Call{Call: _e.mock.On(\"Del\",\n\t\tappend([]interface{}{ctx}, keys...)...)}\n}", "title": "" }, { "docid": "c1cdb9f7edafad528fb254bf17ba7329", "score": "0.5596153", "text": "func (_m *MockSegment) Delete(primaryKeys []storage.PrimaryKey, timestamps []uint64) error {\n\tret := _m.Called(primaryKeys, timestamps)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func([]storage.PrimaryKey, []uint64) error); ok {\n\t\tr0 = rf(primaryKeys, timestamps)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4edc6707aeb53a1411450f5ab359f52d", "score": "0.55910784", "text": "func (_m *IExperimentStore) Delete(id string) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "426bfc0c10f9015e8a76c68060327709", "score": "0.55859256", "text": "func (_m *DomainsService) DeleteRecord(_a0 string, _a1 int) error {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, int) error); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5701b910263e306baf32cde50e44f3dd", "score": "0.5582949", "text": "func (_m *MockEventStore) WriteEvent(_a0 string, _a1 ...Event) error {\n\t_va := make([]interface{}, len(_a1))\n\tfor _i := range _a1 {\n\t\t_va[_i] = _a1[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, _a0)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, ...Event) error); ok {\n\t\tr0 = rf(_a0, _a1...)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "0de4815f7fbd6dcfab699f212c81e4ef", "score": "0.5579905", "text": "func (suite *EventHandlerTestSuite) TestQueryEvent() {\n\n\t// Create Query\n\tquery := serf.Query{\n\t\tLTime: serf.LamportTime(0),\n\t\tName: \"Event\",\n\t\tPayload: make([]byte, 0),\n\t}\n\n\t// Process event\n\tsuite.Mocker.On(\"HandleQueryEvent\", query).Return()\n\tsuite.Mocker.On(\"Reconcile\", query).Return()\n\tsuite.Handler.HandleEvent(&query)\n\tsuite.Mocker.AssertCalled(suite.T(), \"HandleQueryEvent\", query)\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"Reconcile\", query)\n}", "title": "" }, { "docid": "a0c509bfd2f6662339d32b0ca128e7c0", "score": "0.5577029", "text": "func (_m *UserRepository) Delete(_a0 string) (*domain.User, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *domain.User\n\tif rf, ok := ret.Get(0).(func(string) *domain.User); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domain.User)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "7541813debc922676fba3030c87d5df6", "score": "0.5550327", "text": "func (m *MockDbConnector) Delete(arg0 string, arg1 ...interface{}) error {\n\tvarargs := []interface{}{arg0}\n\tfor _, a := range arg1 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"Delete\", varargs...)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a321725b9da6eb0d2dc4182cc7f5f7da", "score": "0.5526201", "text": "func (_m *MockCommandClient) Delete(id string) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f7203719dd5e7afe3c26a12e6e924516", "score": "0.5521684", "text": "func (_m *EventRepo) CreateEvent(_a0 domains.Event) (*domains.Event, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *domains.Event\n\tif rf, ok := ret.Get(0).(func(domains.Event) *domains.Event); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*domains.Event)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(domains.Event) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9c2d343c3e73cd6daeec593d82b8fc4b", "score": "0.5517058", "text": "func (_m *mockDaemoner) recordMessageEvent(m asyncMessage, c *gnet.MessageContext) error {\n\tret := _m.Called(m, c)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(asyncMessage, *gnet.MessageContext) error); ok {\n\t\tr0 = rf(m, c)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a950fd6af48282818fb8ac3f4de9f79c", "score": "0.54872286", "text": "func (_m *Cacher) Delete(key string) error {\n\tret := _m.Called(key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "beb7814bb09fcbd9f85cc1d360868d18", "score": "0.5481775", "text": "func (_m *ECSAPI) DeleteAttributesRequest(_a0 *ecs.DeleteAttributesInput) (*request.Request, *ecs.DeleteAttributesOutput) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *request.Request\n\tif rf, ok := ret.Get(0).(func(*ecs.DeleteAttributesInput) *request.Request); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*request.Request)\n\t\t}\n\t}\n\n\tvar r1 *ecs.DeleteAttributesOutput\n\tif rf, ok := ret.Get(1).(func(*ecs.DeleteAttributesInput) *ecs.DeleteAttributesOutput); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*ecs.DeleteAttributesOutput)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "310b1240d7f9d83b28d2d50e85963d25", "score": "0.54800016", "text": "func (m *MockHandle) remove(arg0 []byte) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"remove\", arg0)\n}", "title": "" }, { "docid": "b02241e177fb09a0af1efe718ec01151", "score": "0.5478246", "text": "func (_e *Client_Expecter) HDel(ctx interface{}, key interface{}, fields ...interface{}) *Client_HDel_Call {\n\treturn &Client_HDel_Call{Call: _e.mock.On(\"HDel\",\n\t\tappend([]interface{}{ctx, key}, fields...)...)}\n}", "title": "" }, { "docid": "ea5f319f7630d5b63cf3a3ab627ca7ea", "score": "0.5465987", "text": "func (m *MockRepo) DeleteTrackedLikeByMatchUUID(arg0 *string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteTrackedLikeByMatchUUID\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "0bbf5f4fde2b9802a487cf0281bcae45", "score": "0.5465174", "text": "func (_m *HeroesRepository) Delete(id int64) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(int64) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4051f0e89727c38e18a0ddfdd6ea835a", "score": "0.5460003", "text": "func Test_DeviceAuthService_Remove_Success(t *testing.T) {\n\th := TestHelper{}\n\trep := new(mocks.IDeviceAuthRepository)\n\ts := h.CreateTestDeviceAuthService(rep)\n\n\tlogin := \"admin\"\n\trep.On(\"Remove\", login).Return(nil)\n\n\terr := s.Remove(login)\n\tassert.NoError(t, err)\n}", "title": "" }, { "docid": "7572c2a781e5017401572270123ead5e", "score": "0.5457694", "text": "func (_m *RecipeTagStore) DeleteAllByRecipeID(_a0 uint64, _a1 sqlx.Execer) (int64, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 int64\n\tif rf, ok := ret.Get(0).(func(uint64, sqlx.Execer) int64); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Get(0).(int64)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(uint64, sqlx.Execer) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "391f88c1dd9ead6303b6ff4d555e1ffc", "score": "0.5456111", "text": "func (_m *ECSAPI) DeleteServiceRequest(_a0 *ecs.DeleteServiceInput) (*request.Request, *ecs.DeleteServiceOutput) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *request.Request\n\tif rf, ok := ret.Get(0).(func(*ecs.DeleteServiceInput) *request.Request); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*request.Request)\n\t\t}\n\t}\n\n\tvar r1 *ecs.DeleteServiceOutput\n\tif rf, ok := ret.Get(1).(func(*ecs.DeleteServiceInput) *ecs.DeleteServiceOutput); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*ecs.DeleteServiceOutput)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "9d60f5bff752523b1ae2dac6ba7e9343", "score": "0.545096", "text": "func (_m *RoomService) Delete(id int64) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(int64) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "12dce538aaaab9af87b2cd5ab987094d", "score": "0.54481435", "text": "func (_m *Client) HDel(ctx context.Context, key string, fields ...string) (int64, error) {\n\t_va := make([]interface{}, len(fields))\n\tfor _i := range fields {\n\t\t_va[_i] = fields[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx, key)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 int64\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, ...string) (int64, error)); ok {\n\t\treturn rf(ctx, key, fields...)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, string, ...string) int64); ok {\n\t\tr0 = rf(ctx, key, fields...)\n\t} else {\n\t\tr0 = ret.Get(0).(int64)\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, string, ...string) error); ok {\n\t\tr1 = rf(ctx, key, fields...)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "e8f3c9ddf15e1f6f68012000a36c5af1", "score": "0.54410636", "text": "func (mock *mockK8sListWatch) Delete(obj interface{}) {\n\tmock.resourceHandler.OnDelete(obj)\n}", "title": "" }, { "docid": "3101c319fa26ce47a84f743416b413c1", "score": "0.543935", "text": "func (_m *Usecase) Delete(id int) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(int) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9998d12c3b0ea3da268ccd14f6bd05cb", "score": "0.5437774", "text": "func (_m *ECSAPI) DeleteAttributes(_a0 *ecs.DeleteAttributesInput) (*ecs.DeleteAttributesOutput, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *ecs.DeleteAttributesOutput\n\tif rf, ok := ret.Get(0).(func(*ecs.DeleteAttributesInput) *ecs.DeleteAttributesOutput); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*ecs.DeleteAttributesOutput)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(*ecs.DeleteAttributesInput) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "2419097f5a394ed0ebbac26c70369d4d", "score": "0.54348505", "text": "func (_m *Repository) Delete(key string) error {\n\tret := _m.Called(key)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(key)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "4ff73d0555e586187a40433741a63db7", "score": "0.54345185", "text": "func (m *MockTxHandler) UnRegisterEvent(channel, ccName, event string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"UnRegisterEvent\", channel, ccName, event)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a0b9a2f7cf5ec4b8a46d1048f409238c", "score": "0.5421803", "text": "func (_m *Model) DeleteSearchIndexRecord(ctx context.Context, name string, path string, bucketSlug string, dbId string) error {\n\tret := _m.Called(ctx, name, path, bucketSlug, dbId)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string, string, string) error); ok {\n\t\tr0 = rf(ctx, name, path, bucketSlug, dbId)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7065d1f7b3647f23fce2615f73a1bbeb", "score": "0.539781", "text": "func (suite *EventHandlerTestSuite) TestNilEvent() {\n\n\t// Process event\n\tsuite.Handler.HandleEvent(nil)\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleMemberJoin\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleMemberLeave\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleMemberFailure\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleMemberUpdate\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleMemberReap\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleUknownEvent\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleUserEvent\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"HandleQueryEvent\")\n\tsuite.Mocker.AssertNotCalled(suite.T(), \"Reconcile\")\n}", "title": "" }, { "docid": "4daf553dcc1712b6fb3bde8f4d152cce", "score": "0.53842413", "text": "func (_m *BucketHandler) Delete(bucketName string) error {\n\tret := _m.Called(bucketName)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(bucketName)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "d5d30dc2a9005c452e821e5f28eac3f3", "score": "0.53817075", "text": "func (_m *MockProvider) Delete(table string, id string) error {\n\tret := _m.Called(table, id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string) error); ok {\n\t\tr0 = rf(table, id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e02c5037f9898910aa3d65d0acd86e85", "score": "0.53809637", "text": "func (_m *DeploymentsStorage) Delete(id string) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "695e77468523aba6a5f023121d9eec3c", "score": "0.53779346", "text": "func (_m *RoomUsecase) Delete(roomId string) error {\n\tret := _m.Called(roomId)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(roomId)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "77085d1d080ba951bb9ca763f1b0b724", "score": "0.5372969", "text": "func (m *MockLambdaAPI) DeleteEventSourceMapping(arg0 *lambda.DeleteEventSourceMappingInput) (*lambda.EventSourceMappingConfiguration, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteEventSourceMapping\", arg0)\n\tret0, _ := ret[0].(*lambda.EventSourceMappingConfiguration)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "763157b296b7900d1db40717690c5dff", "score": "0.5366136", "text": "func TestMockEOperationSetOperationID(t *testing.T) {\n\to := &MockEOperation{}\n\tv := int(45)\n\to.On(\"SetOperationID\", v).Once()\n\to.SetOperationID(v)\n\to.AssertExpectations(t)\n}", "title": "" }, { "docid": "e2e16be11f9ad4fc75669f581cceafac", "score": "0.53653926", "text": "func (m *MockLambdaAPI) DeleteEventSourceMapping(arg0 *lambda.DeleteEventSourceMappingInput) (*lambda.EventSourceMappingConfiguration, error) {\n\tret := m.ctrl.Call(m, \"DeleteEventSourceMapping\", arg0)\n\tret0, _ := ret[0].(*lambda.EventSourceMappingConfiguration)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "cf7d728037448f0fa36980ae0f732864", "score": "0.53617424", "text": "func (_m *PaymentStore) Delete(paymentUID string) error {\n\tret := _m.Called(paymentUID)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(paymentUID)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "37bb994fe14aa63cc36a8d2b1590154c", "score": "0.5361596", "text": "func (_m *Handler) Delete(accountID string, ID string) (int, error) {\n\tret := _m.Called(accountID, ID)\n\n\tvar r0 int\n\tif rf, ok := ret.Get(0).(func(string, string) int); ok {\n\t\tr0 = rf(accountID, ID)\n\t} else {\n\t\tr0 = ret.Get(0).(int)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(accountID, ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "c16f0c782d3d25962806076a8ef37787", "score": "0.5360162", "text": "func (_m *ParentDirectoryRepository) DeleteByPath(_a0 string) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9bb1bb1e140c08cfc54d1d9fbca88d4a", "score": "0.53590596", "text": "func (_m *WebhookService) Delete(ctx context.Context, id string, objectType model.WebhookReferenceObjectType) error {\n\tret := _m.Called(ctx, id, objectType)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, model.WebhookReferenceObjectType) error); ok {\n\t\tr0 = rf(ctx, id, objectType)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9bb1bb1e140c08cfc54d1d9fbca88d4a", "score": "0.53590596", "text": "func (_m *WebhookService) Delete(ctx context.Context, id string, objectType model.WebhookReferenceObjectType) error {\n\tret := _m.Called(ctx, id, objectType)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, model.WebhookReferenceObjectType) error); ok {\n\t\tr0 = rf(ctx, id, objectType)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "aa1e85c6b3ee8088b284dd6f2f6d94cc", "score": "0.5347974", "text": "func ini_event_delete(event *ini_event_t) {\n\t*event = ini_event_t{}\n}", "title": "" }, { "docid": "66b8412fb28c2b6243fb712972d0da61", "score": "0.5347387", "text": "func TestChangedDecoratorDelete(t *testing.T) {\n\tts := &MockTimeSource{}\n\tf := decorator.NewChangedDecoratorFactory(\n\t\t&MockCache{},\n\t\tts.Time,\n\t\tfunc(cache.Key, time.Time) bool { return false })\n\tDecoratorDeleteTest(t, f)\n}", "title": "" }, { "docid": "4f1576675d39a19be627d2225dce4b98", "score": "0.5343375", "text": "func (_m *MilvusServiceServer) Delete(_a0 context.Context, _a1 *milvuspb.DeleteRequest) (*milvuspb.MutationResult, error) {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 *milvuspb.MutationResult\n\tvar r1 error\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.DeleteRequest) (*milvuspb.MutationResult, error)); ok {\n\t\treturn rf(_a0, _a1)\n\t}\n\tif rf, ok := ret.Get(0).(func(context.Context, *milvuspb.DeleteRequest) *milvuspb.MutationResult); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*milvuspb.MutationResult)\n\t\t}\n\t}\n\n\tif rf, ok := ret.Get(1).(func(context.Context, *milvuspb.DeleteRequest) error); ok {\n\t\tr1 = rf(_a0, _a1)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "f27be74ddb902a6f1c85bc4532e79668", "score": "0.53411645", "text": "func (_m *apiSvc) Delete(name string, namespace string) error {\n\tret := _m.Called(name, namespace)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string) error); ok {\n\t\tr0 = rf(name, namespace)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "f8a5aeb591cfaaa89590f7afac7c3ead", "score": "0.5332493", "text": "func (t *EventTestUtil) DidStore(mockEvent model.Event, aggVersion int64) error {\n\t// Try fetching the MockEvent from Database, we should have a matching event\n\tstmt, columns := qb.Select(t.EventTableName).Where(\n\t\tqb.Eq(\"year_bucket\"),\n\t\tqb.Eq(\"aggregate_id\"),\n\t\tqb.Eq(\"version\"),\n\t\tqb.Eq(\"nano_time\"),\n\t\tqb.Eq(\"uuid\"),\n\t).ToCql()\n\n\tmockEvent.Version = aggVersion\n\tq := t.CQLSession.Query(stmt)\n\tq = cqlx.Query(q, columns).BindStruct(mockEvent).Query\n\n\titer := cqlx.Iter(q)\n\tevents := make([]model.Event, 0)\n\terr := iter.Select(&events)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"Error in Select\")\n\t\treturn err\n\t}\n\n\tif len(events) == 0 {\n\t\treturn errors.New(\"no events found\")\n\t}\n\n\tactualEvent := events[0]\n\tif actualEvent.YearBucket != mockEvent.YearBucket {\n\t\treturn errors.New(\"YearBucket mismatch\")\n\t}\n\tif actualEvent.AggregateID != mockEvent.AggregateID {\n\t\treturn errors.New(\"AggregateID mismatch\")\n\t}\n\tif actualEvent.Action != mockEvent.Action {\n\t\treturn errors.New(\"Action mismatch\")\n\t}\n\tif actualEvent.NanoTime != mockEvent.NanoTime {\n\t\treturn errors.New(\"NanoTime mismatch\")\n\t}\n\tif actualEvent.UUID != mockEvent.UUID {\n\t\treturn errors.New(\"UUID mismatch\")\n\t}\n\tif actualEvent.Version != aggVersion {\n\t\treturn errors.New(\"Version mismatch\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f1c31357652364baae8f7689a92af3df", "score": "0.5330846", "text": "func (_m *BindingUsage) Delete(name string, options *v1.DeleteOptions) error {\n\tret := _m.Called(name, options)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, *v1.DeleteOptions) error); ok {\n\t\tr0 = rf(name, options)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "d55d110ae80a775aacabd0159bb89ecc", "score": "0.53195566", "text": "func (_m *secretSvc) Delete(name string, namespace string) error {\n\tret := _m.Called(name, namespace)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string) error); ok {\n\t\tr0 = rf(name, namespace)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e3ff0f907500e5b52b444bda5f93b92b", "score": "0.5313698", "text": "func (_m *BindingUsageInterface) Delete(name string, options *v1.DeleteOptions) error {\n\tret := _m.Called(name, options)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, *v1.DeleteOptions) error); ok {\n\t\tr0 = rf(name, options)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "7779b3d34b8d081e33f34e4eb6c2d490", "score": "0.5291368", "text": "func (_m *Client) DeleteLike(_a0 context.Context, _a1 git.DeleteLikeArgs) error {\n\tret := _m.Called(_a0, _a1)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, git.DeleteLikeArgs) error); ok {\n\t\tr0 = rf(_a0, _a1)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "e31911ca0a6ec58174a9d0133e608124", "score": "0.527671", "text": "func (m *MockRoleHandler) Delete(c *gin.Context) {\n\tm.ctrl.Call(m, \"Delete\", c)\n}", "title": "" }, { "docid": "b571757d938e7151fec6a43c1aa59c93", "score": "0.5274709", "text": "func (_m *Client) Delete(object sdk.Object, opts ...sdk.DeleteOption) error {\n\t_va := make([]interface{}, len(opts))\n\tfor _i := range opts {\n\t\t_va[_i] = opts[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, object)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(sdk.Object, ...sdk.DeleteOption) error); ok {\n\t\tr0 = rf(object, opts...)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "432cc3c6441ea0c5378365cf48949010", "score": "0.52692443", "text": "func (_m *MockProvider) FilesDelete(app string, pid string, files []string) error {\n\tret := _m.Called(app, pid, files)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, string, []string) error); ok {\n\t\tr0 = rf(app, pid, files)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "6ea6db538f8192c7d8807e5eb070d74f", "score": "0.52691954", "text": "func TestEventsDispatcherDeleteExporter(t *testing.T) {\n\tlogger := logger.WithContext(\"t_name\", t.Name())\n\teventsStorePath := filepath.Join(eventsDir, t.Name())\n\tdefer os.RemoveAll(eventsStorePath) // cleanup\n\n\t// create dispatcher; all the events should be expired after a second\n\tdispatcher, err := NewDispatcher(t.Name(), 500*time.Millisecond, 10*time.Millisecond,\n\t\t&events.StoreConfig{Dir: eventsStorePath}, nil, logger)\n\tAssertOk(t, err, \"failed to create dispatcher\")\n\tdispatcher.Start()\n\tdefer dispatcher.Shutdown()\n\n\t// create mock exporter\n\tmockExporter := exporters.NewMockExporter(fmt.Sprintf(\"mock.%s\", t.Name()), exporterChLen, logger)\n\texporterEventCh, offsetTracker, dErr := dispatcher.RegisterExporter(mockExporter)\n\tAssertOk(t, dErr, \"failed to register mock exporter with the dispatcher\")\n\tmockExporter.Start(exporterEventCh, offsetTracker)\n\tdefer mockExporter.Stop()\n\n\toffsetTrackerFilepath := path.Join(eventsStorePath, \"offset\", mockExporter.Name())\n\t_, err = os.Stat(offsetTrackerFilepath)\n\tAssertOk(t, err, \"offset tracker file does not exists, err: %v\", err) // make sure the offset tracker file exists\n\n\t// delete the exporter\n\tdispatcher.DeleteExporter(mockExporter.Name())\n\t_, err = os.Stat(offsetTrackerFilepath)\n\tAssert(t, err != nil && os.IsNotExist(err), \"offset tracker file should have been deleted, but still exists. err: %v\", err)\n}", "title": "" }, { "docid": "755d8e22b39a099e1935ef22e25d9e48", "score": "0.52671427", "text": "func (m *MockKV) Delete(key string, w *api.WriteOptions) (*api.WriteMeta, error) {\n\targs := m.Called(key)\n\treturn nil, args.Error(1)\n}", "title": "" }, { "docid": "7cb236e78aaeee284e4ee1bfb25a0e0c", "score": "0.5262745", "text": "func TestClientDelete(t *testing.T) {\n\tassert := assert.New(t)\n\thttpClient := http.DefaultClient\n\tclient := &Client{httpClient}\n\theader := http.Header{}\n\turl := \"http://localhost\"\n\tmockResponse := &Response{}\n\tmockDo := func(c *http.Client, m, u string, b interface{}, h http.Header) (*Response, error) {\n\t\tassert.Equal(httpClient, c)\n\t\tassert.Equal(httpDelete, m)\n\t\tassert.Nil(b)\n\t\tassert.Equal(header, h)\n\t\tassert.Equal(url, u)\n\t\treturn mockResponse, nil\n\t}\n\n\tbefore := do\n\tdo = mockDo\n\n\tresp, err := client.Delete(url, header)\n\n\tassert.Equal(mockResponse, resp)\n\tassert.Nil(err)\n\n\tdo = before\n}", "title": "" }, { "docid": "80c23db24231a79e499f518836aa1890", "score": "0.5262324", "text": "func (_m *AuthorPostgresRepository) Delete(id string) error {\n\tret := _m.Called(id)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(id)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "40e140696fec2c1e5c8f8ef6c3c8e4e8", "score": "0.5261092", "text": "func (_e *MockSegment_Expecter) Delete(primaryKeys interface{}, timestamps interface{}) *MockSegment_Delete_Call {\n\treturn &MockSegment_Delete_Call{Call: _e.mock.On(\"Delete\", primaryKeys, timestamps)}\n}", "title": "" }, { "docid": "3676511cc898d13f43ed582f8ed196ff", "score": "0.52584255", "text": "func (m *MockForwarderClient) CacheDelete(forwarderAddress string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CacheDelete\", forwarderAddress)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "90b9e6600b5ae692310a734f4c844072", "score": "0.5255856", "text": "func (_m *MockVault) Delete(engineDetails Engine, secretDetails Secret) error {\n\tret := _m.Called(engineDetails, secretDetails)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(Engine, Secret) error); ok {\n\t\tr0 = rf(engineDetails, secretDetails)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "8aaf215f647898db1245c4c97456dac8", "score": "0.5250673", "text": "func (m *MockRegistrationClient) DeleteEntry(arg0 context.Context, arg1 *registration.RegistrationEntryID, arg2 ...grpc.CallOption) (*common.RegistrationEntry, error) {\n\tvarargs := []interface{}{arg0, arg1}\n\tfor _, a := range arg2 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"DeleteEntry\", varargs...)\n\tret0, _ := ret[0].(*common.RegistrationEntry)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "cce7cd95ee6a8682f8603a0012bca08e", "score": "0.5241055", "text": "func (_m *GuildRepository) Delete(guildId string) error {\n\tret := _m.Called(guildId)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(guildId)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "690a0b82438aaf83560a18801080d1b3", "score": "0.5237841", "text": "func (_m *ApplicationReleaseManager) DeleteReleaseIfExists(name string) error {\n\tret := _m.Called(name)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string) error); ok {\n\t\tr0 = rf(name)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "53bd999e5a656c9b0712da218c90eef0", "score": "0.523479", "text": "func TestChaosHubService_DeleteChaosHub(t *testing.T) {\n\tt.Run(\"cannot find same project_id hub\", func(t *testing.T) {\n\t\t// given\n\t\tmongoOperator.On(\"Get\", mock.Anything, mongodb.ChaosHubCollection, mock.Anything).Return(&mongo.SingleResult{}, errors.New(\"\")).Once()\n\n\t\t// when\n\t\t_, err := mockService.DeleteChaosHub(context.Background(), \"1\", \"1\")\n\n\t\t// then\n\t\tassert.Error(t, err)\n\t})\n\n\tt.Run(\"success\", func(t *testing.T) {\n\t\t// given\n\t\tfindResult := bson.D{{\"project_id\", \"1\"}, {\"hub_name\", \"hub1\"}, {\"hub_id\", \"1\"}}\n\t\tsingleResult := mongo.NewSingleResultFromDocument(findResult, nil, nil)\n\t\tmongoOperator.On(\"Get\", mock.Anything, mongodb.ChaosHubCollection, mock.Anything).Return(singleResult, nil).Once()\n\t\tmongoOperator.On(\"Update\", mock.Anything, mongodb.ChaosHubCollection, mock.Anything, mock.Anything, mock.Anything).Return(&mongo.UpdateResult{MatchedCount: 1}, nil).Once()\n\n\t\t// when\n\t\t_, err := mockService.DeleteChaosHub(context.Background(), \"1\", \"1\")\n\n\t\t// then\n\t\tassert.NoError(t, err)\n\t})\n}", "title": "" }, { "docid": "5ed3e5344a803c29fa3104c8d267d57f", "score": "0.52303207", "text": "func (t *EventTestUtil) DidNotStore(mockEvent model.Event, aggVersion int64) error {\n\t// Try fetching the MockEvent from Database, we should have a matching event\n\tstmt, columns := qb.Select(t.EventTableName).Where(\n\t\tqb.Eq(\"year_bucket\"),\n\t\tqb.Eq(\"aggregate_id\"),\n\t\tqb.Eq(\"version\"),\n\t\tqb.Eq(\"nano_time\"),\n\t\tqb.Eq(\"uuid\"),\n\t).ToCql()\n\n\tmockEvent.Version = aggVersion\n\tq := t.CQLSession.Query(stmt)\n\tq = cqlx.Query(q, columns).BindStruct(mockEvent).Query\n\n\titer := cqlx.Iter(q)\n\tevents := make([]model.Event, 0)\n\terr := iter.Select(&events)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"Error in Select\")\n\t\treturn err\n\t}\n\n\tif len(events) != 0 {\n\t\treturn errors.New(\"no events found\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e0b44f2ba1b97fd7047291ea75ec590b", "score": "0.52214146", "text": "func TestRemoveByIDCorrectData(t *testing.T) {\n\tclient, req, res, cMock := initServer()\n\n\tquestionToRemove := model.Question{\n\t\tID: 1,\n\t}\n\tquestionToRemoveJSON, _ := json.Marshal(&questionToRemove)\n\n\treq.SetRequestURI(HOST + \"/delete\")\n\treq.Header.SetMethod(\"DELETE\")\n\treq.SetBody(questionToRemoveJSON)\n\n\tcMock.On(\"DeleteQuestionByID\", questionToRemove).Return(nil)\n\n\terr := client.Do(req, res)\n\tif assert.Nil(t, err) {\n\t\tcMock.AssertExpectations(t)\n\t\tassert.Equal(t, 200, res.Header.StatusCode())\n\n\t\tvar response ui.Response\n\t\tjson.Unmarshal(res.Body(), &response)\n\t\tassert.Equal(t, 200, response.Status)\n\t\tassert.Equal(t, \"\", response.Error)\n\t\tassert.Equal(t, nil, response.Data)\n\t}\n}", "title": "" }, { "docid": "52826bfef1f46143d7b5668338e653b9", "score": "0.52212507", "text": "func yaml_event_delete(event *yaml_event_t) {\n\t*event = yaml_event_t{}\n}", "title": "" }, { "docid": "06c69a2f6cde34ee889a09f51683b33c", "score": "0.5220739", "text": "func (_m *DB) Delete(accountID string, ID string) (int, error) {\n\tret := _m.Called(accountID, ID)\n\n\tvar r0 int\n\tif rf, ok := ret.Get(0).(func(string, string) int); ok {\n\t\tr0 = rf(accountID, ID)\n\t} else {\n\t\tr0 = ret.Get(0).(int)\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(string, string) error); ok {\n\t\tr1 = rf(accountID, ID)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "87f6c30b31a2fe6383b13ada7d21b43e", "score": "0.5216453", "text": "func (_m *ECSAPI) DeregisterTaskDefinitionRequest(_a0 *ecs.DeregisterTaskDefinitionInput) (*request.Request, *ecs.DeregisterTaskDefinitionOutput) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *request.Request\n\tif rf, ok := ret.Get(0).(func(*ecs.DeregisterTaskDefinitionInput) *request.Request); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*request.Request)\n\t\t}\n\t}\n\n\tvar r1 *ecs.DeregisterTaskDefinitionOutput\n\tif rf, ok := ret.Get(1).(func(*ecs.DeregisterTaskDefinitionInput) *ecs.DeregisterTaskDefinitionOutput); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tif ret.Get(1) != nil {\n\t\t\tr1 = ret.Get(1).(*ecs.DeregisterTaskDefinitionOutput)\n\t\t}\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "7b6284c1e4d44748c6ac01d8ccf18c17", "score": "0.5215792", "text": "func (m *MockLambdaAPI) DeleteEventSourceMappingRequest(arg0 *lambda.DeleteEventSourceMappingInput) (*request.Request, *lambda.EventSourceMappingConfiguration) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteEventSourceMappingRequest\", arg0)\n\tret0, _ := ret[0].(*request.Request)\n\tret1, _ := ret[1].(*lambda.EventSourceMappingConfiguration)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5b501c431d758b43b8f8c8390c27158c", "score": "0.52142805", "text": "func (_m *ECSAPI) DeleteService(_a0 *ecs.DeleteServiceInput) (*ecs.DeleteServiceOutput, error) {\n\tret := _m.Called(_a0)\n\n\tvar r0 *ecs.DeleteServiceOutput\n\tif rf, ok := ret.Get(0).(func(*ecs.DeleteServiceInput) *ecs.DeleteServiceOutput); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*ecs.DeleteServiceOutput)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(*ecs.DeleteServiceInput) error); ok {\n\t\tr1 = rf(_a0)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "82676578525d30b955f17b0a74d4a43b", "score": "0.52133787", "text": "func TestMockEOperationGetOperationID(t *testing.T) {\n\to := &MockEOperation{}\n\tr := int(45)\n\to.On(\"GetOperationID\").Once().Return(r)\n\to.On(\"GetOperationID\").Once().Return(func() int {\n\t\treturn r\n\t})\n\tassert.Equal(t, r, o.GetOperationID())\n\tassert.Equal(t, r, o.GetOperationID())\n\to.AssertExpectations(t)\n}", "title": "" }, { "docid": "9b2c745d3739383c80aa0faae06a00ed", "score": "0.52084404", "text": "func (_m *DynamoDBModelAPI) SetStatusAfterDeletion(event types.Event) error {\n\tret := _m.Called(event)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(types.Event) error); ok {\n\t\tr0 = rf(event)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" } ]
f3f58f04ee76e521e11dfbe0802e8b25
/ RequestPasswordResetGet requests reset Request password reset
[ { "docid": "19cc729e03ade70c617ed0ec24810f85", "score": "0.7395731", "text": "func (a *Client) RequestPasswordResetGet(params *RequestPasswordResetGetParams) (*RequestPasswordResetGetNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewRequestPasswordResetGetParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"RequestPasswordResetGet\",\n\t\tMethod: \"GET\",\n\t\tPathPattern: \"/request_password_reset\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &RequestPasswordResetGetReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*RequestPasswordResetGetNoContent), nil\n\n}", "title": "" } ]
[ { "docid": "d9e9ba2111043784ce9cdb6a4d0c7b16", "score": "0.7645327", "text": "func requestResetPassword(email string) api.Response {\n\tvar resetLink, err = auth.RequestResetPassword(email)\n\tif err != nil {\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.PlainTextResponse(http.StatusOK, resetLink)\n}", "title": "" }, { "docid": "e37e6a76d3c085534b80207f9fa478c9", "score": "0.74076474", "text": "func RequestResetPassword(userRepo storage.UserRepo, email string) error {\n\tuser, err := userRepo.GetUserByEmail(email)\n\tif err != nil {\n\t\treturn errors.New(\"user with email does not exist\")\n\t}\n\n\tif err := TriggerPasswordResetEmail(userRepo, user); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "624bb39e3cd061bc1d9692a0db839481", "score": "0.72818655", "text": "func resetPasswordRequest(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tvar body otpRequest\n\n\terr := json.NewDecoder(r.Body).Decode(&body)\n\tlog.ErrorHandler(err)\n\n\t// Verify email\n\temailStatus := emailValidator(body.Email)\n\tif !emailStatus {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\terr = json.NewEncoder(w).Encode(core.FourHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 400)\n\t\treturn\n\t}\n\n\tvar count int64\n\tvar user User\n\tdb.Find(&user, \"email = ?\", body.Email).Count(&count)\n\n\tif count <= 0 {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// generate token\n\tvar data otp\n\tdata = otp{\n\t\tEmail: body.Email,\n\t\tPin: generateOTP(),\n\t}\n\n\t// save token to redis\n\terr = redisClient.Set(ctx, \"password_reset_\"+data.Email, data.Pin, 30*time.Minute).Err()\n\tif err != nil {\n\t\tlog.ErrorHandler(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\terr := json.NewEncoder(w).Encode(core.FiveHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 500)\n\t\treturn\n\t}\n\n\t// Send token to email\n\tpayload := struct {\n\t\tToken string\n\t}{\n\t\tToken: data.Pin,\n\t}\n\n\tstatus, err := core.SendEmailNoAttachment(data.Email, \"Reset Password\", payload, \"password_reset.txt\")\n\tif !status {\n\t\tlog.ErrorHandler(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\terr = json.NewEncoder(w).Encode(core.FiveHundred)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 500)\n\t\treturn\n\t}\n\n\t// respond okay\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(core.TwoHundred)\n\tlog.ErrorHandler(err)\n\tlog.AccessHandler(r, 200)\n\treturn\n}", "title": "" }, { "docid": "58f6db348622dc77e065b751116a050d", "score": "0.71200603", "text": "func ForgetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\tlogobj := logpkg.LogStruct{\"_\", now, userIP, \"macAdress\", \"ForgetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\n\tRandomCode := encodeToString(globalPkg.GlobalObj.MaxConfirmcode)\n\tcurrent := globalPkg.UTCtime()\n\tConfirmationCode := RandomCode\n\tcontact := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&contact)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"please enter your correct request\", \"failed\")\n\t\treturn\n\t}\n\t// ForgetPassword email is lowercase and trim\n\tcontact.Email = convertStringTolowerCaseAndtrimspace(contact.Email)\n\tRP := ResetPasswordData{}\n\tRP.Code = ConfirmationCode\n\tRP.CurrentTime = current\n\taccountObjbyEmail := getAccountByEmail(contact.Email)\n\taccountObjByPhone := getAccountByPhone(contact.Phonnum)\n\tforgetObj := ForgetPasswordReturn{}\n\tif accountObjbyEmail.AccountPublicKey != \"\" && contact.Email != \"\" {\n\n\t\tRP.Email = contact.Email\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\t//body email for forget password\n\t\tbody := \"Dear \" + accountObjbyEmail.AccountName + `,\n\t\tYou recently requested to reset your password for your Inovation Corporation account.\n\t\tYour confirmation code is: ` + RP.Code + `.\n\t\tif you did not request a password reset, please ignore this email or reply to let us know.\n\t\t\n\t\tRegards,\n\t\tInovatian Team`\n\n\t\tsendEmail(body, contact.Email)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\t//globalPkg.SendResponseMessage(w, Confirmation_code)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\n\tif accountObjByPhone.AccountPublicKey != \"\" && contact.Phonnum != \"\" {\n\n\t\tRP.Phonnum = contact.Phonnum\n\t\tRP.PathAPI = globalPkg.RandomPath()\n\t\tbroadcastTcp.BoardcastingTCP(RP, \"addRestPassword\", \"account module\")\n\t\t//addResetpassObjInTemp(RP)\n\t\tsendSMS(contact.Phonnum, RP.Code)\n\t\tforgetObj.Code = RP.Code\n\t\tforgetObj.PathAPI = RP.PathAPI\n\n\t\tjsonObj, _ := json.Marshal(forgetObj)\n\t\tglobalPkg.SendResponse(w, jsonObj)\n\t\tglobalPkg.WriteLog(logobj, \"success send confirmation code\"+RP.Code, \"success\")\n\t\treturn\n\t}\n\tresponseObj := responses.FindResponseByID(\"11\")\n\tglobalPkg.SendError(w, responseObj.EngResponse)\n\tglobalPkg.WriteLog(logobj, \"invalid Email Or Phone\"+RP.Code, \"failed\")\n\n}", "title": "" }, { "docid": "374229a32a46ed324e3e640d0f087fd1", "score": "0.7046392", "text": "func (au *AuthHandler) RequestResetPasswordCode(w http.ResponseWriter, r *http.Request){\n\tw.Header().Add(\"content-type\", \"application/json\")\n\temail := struct {Email\tstring\t`json:\"email\" validate:\"email,required\"`}{}\n\n\tif err := utils.ParseJsonFromRequest(r, &email); err != nil {\n\t\tutils.GetError(err, http.StatusUnprocessableEntity, w)\n\t\treturn\n\t}\n\n\tif err := validate.Struct(email); err != nil {\n\t\tutils.GetError(err, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\tuser, err := FetchUserByEmail(bson.M{\"email\": strings.ToLower(email.Email)})\n\tif err != nil {\n\t\tutils.GetError(UserNotFound, http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\t// check if user already requested for password\n\tif user.PasswordResets != nil {\n\t\tx2x := map[string]interface{}{ \"password_reset_code\" : user.PasswordResets.Token }\n\t\tutils.GetSuccess(\"Password reset code already sent, check your email\", x2x, w)\n\t\treturn\n\t}\n\n\t// Update user collection with UserPasswordReset - WIP\n\t_, token := utils.RandomGen(6, \"d\")\n\n\tuserPasswordReset := map[string]interface{}{\n\t\t\"ip_address\": strings.Split(r.RemoteAddr, \":\")[0],\n\t\t\"token\": token,\n\t\t\"expired_at\": time.Now(),\n\t\t\"updated_at\": time.Now(),\n\t\t\"created_at\": time.Now(),\n\t}\n\n\tid, _ := primitive.ObjectIDFromHex(user.ID)\n\tfilter := bson.M{\"_id\": id}\n\tupdate := bson.M{\"$set\": bson.M{\"password_resets\": userPasswordReset }}\n\n\t// update db;\n\tif _, err := utils.GetCollection(user_collection).UpdateOne(context.Background(), filter, update); err != nil {\n\t\tutils.GetError(err, http.StatusInternalServerError, w)\n\t\treturn\t\t\n\t}\n\n\tmsger := au.mailService.NewMail(\n\t\t[]string{user.Email}, \n\t\t\"Reset Password Code\", service.PasswordReset, \n\t\t&service.MailData{ \n\t\t\tUsername: user.Email, \n\t\t\tCode: userPasswordReset[\"token\"].(string),\n\t\t})\n\n\tif err := au.mailService.SendMail(msger); err != nil {\n\t\tfmt.Printf(\"Error occured while sending mail: %s\", err.Error())\n\t}\n\n\tutils.GetSuccess(\"Password reset code sent\", nil, w)\n}", "title": "" }, { "docid": "b7be395714b246ee029077aa205048bd", "score": "0.702798", "text": "func ResetPassword(c *fiber.Ctx) error {\n\tvar req dto.PasswordReset\n\tevpw := c.Params(\"evpw\")\n\turl_email := c.Params(\"email\")\n\n\tif err := c.BodyParser(&req); err != nil {\n\t\tgetStatus(c, 422, err)\n\t} else {\n\t\tappErr := service.ResetPassword(req, evpw, url_email)\n\t\tif appErr.Status != true {\n\t\t\tgetStatus(c, 500, appErr)\n\t\t} else {\n\t\t\tgetStatus(c, 200, appErr)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d86175f64678cb12a50f34b1ef1d395d", "score": "0.6982631", "text": "func requestResetHandler(w http.ResponseWriter, r *http.Request) {\n\tctx := context.Background()\n\tif b.authenticator == nil {\n\t\tvar err error\n\t\tb.authenticator, err = initAuth(ctx)\n\t\tif err != nil {\n\t\t\tlog.Print(\"requestResetHandler authenticator could not be initialized\")\n\t\t\thttp.Error(w, \"Server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\t}\n\temail := r.PostFormValue(\"Email\")\n\tresult := b.authenticator.RequestPasswordReset(ctx, email)\n\tif result.RequestResetSuccess {\n\t\terr := identity.SendPasswordReset(result.User, result.Token, b.webConfig)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"requestResetHandler: could not send password reset: %v\", err)\n\t\t\tresult.RequestResetSuccess = false\n\t\t}\n\t}\n\tif strings.Contains(r.Header.Get(\"Accept\"), \"application/json\") {\n\t\tsendJSON(w, result)\n\t} else {\n\t\ttitle := b.webConfig.GetVarWithDefault(\"Title\", defTitle)\n\t\tcontent := htmlContent{\n\t\t\tTitle: title,\n\t\t\tErrorMsg: \"\",\n\t\t\tTMResults: nil,\n\t\t\tData: result,\n\t\t}\n\t\tb.pageDisplayer.DisplayPage(w, \"request_reset_form.html\", content)\n\t}\n}", "title": "" }, { "docid": "be4713e63e1226513359fb6675aaf2e3", "score": "0.69765985", "text": "func (h *UserRepos) ResetPassword(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tctxValues, err := webcontext.ContextValues(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//\n\treq := new(user.UserResetPasswordRequest)\n\tdata := make(map[string]interface{})\n\tf := func() error {\n\n\t\tif r.Method == http.MethodPost {\n\t\t\terr := r.ParseForm()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tdecoder := schema.NewDecoder()\n\t\t\tif err := decoder.Decode(req, r.PostForm); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\t_, err = h.UserRepo.ResetPassword(ctx, *req, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tswitch errors.Cause(err) {\n\t\t\t\tdefault:\n\t\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Display a success message to the user to check their email.\n\t\t\twebcontext.SessionFlashSuccess(ctx,\n\t\t\t\t\"Check your email\",\n\t\t\t\tfmt.Sprintf(\"An email was sent to '%s'. Click on the link in the email to finish resetting your password.\", req.Email))\n\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif err := f(); err != nil {\n\t\treturn web.RenderError(ctx, w, r, err, h.Renderer, TmplLayoutBase, TmplContentErrorGeneric, web.MIMETextHTMLCharsetUTF8)\n\t}\n\n\tdata[\"form\"] = req\n\n\tif verr, ok := weberror.NewValidationError(ctx, webcontext.Validator().Struct(user.UserResetPasswordRequest{})); ok {\n\t\tdata[\"validationDefaults\"] = verr.(*weberror.Error)\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"user-reset-password.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "title": "" }, { "docid": "afe7e36a593f031f152fb51481f4dbb0", "score": "0.6860963", "text": "func (w *ServerInterfaceWrapper) Passwordresetrequest(ctx echo.Context) error {\n\tvar err error\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.Passwordresetrequest(ctx)\n\treturn err\n}", "title": "" }, { "docid": "84d0c84091fd7103389cfe7b72878746", "score": "0.6847813", "text": "func (handler *Handler) handlePasswordResetGet(w http.ResponseWriter, r *http.Request) {\n\n\t//Now get the email that was passed in\n\tkeys, ok := r.URL.Query()[\"email\"]\n\n\t//Only take the first one\n\tif !ok || len(keys[0]) < 1 {\n\t\tutils.ReturnJsonStatus(w, http.StatusUnprocessableEntity, false, \"password_change_missing_email\")\n\t}\n\n\t//Get the email\n\temail := keys[0]\n\n\t//Look up the user\n\tuser, err := handler.userHelper.GetUserByEmail(email)\n\n\t//If there is an error just return, we don't want people to know if there was an email here\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusOK, true, \"password_change_request_received\")\n\t\treturn\n\t}\n\n\t//Now issue a request\n\terr = handler.userHelper.IssueResetRequest(handler.userHelper.passwordHelper.TokenGenerator(), user.Id(), user.Email())\n\n\t//There was a real error return\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusNotFound, err)\n\t\treturn\n\t}\n\n\t//Now just return\n\tutils.ReturnJsonStatus(w, http.StatusOK, true, \"password_change_request_received\")\n\n}", "title": "" }, { "docid": "ff065ce0ff1791b329faa2f5a1e516d5", "score": "0.68190914", "text": "func (ah *AuthHandler) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tpassResetReq := &PasswordResetReq{}\n\terr := data.FromJSON(passResetReq, r.Body)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to decode password reset request json\", \"error\", err.Error())\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: err.Error()}, w)\n\t\treturn\n\t}\n\n\tuserID := r.Context().Value(UserIDKey{}).(string)\n\tuser, err := ah.repo.GetUserByID(context.Background(), userID)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the user from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tverificationData, err := ah.repo.GetVerificationData(context.Background(), user.Email, data.PassReset)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to retrieve the verification data from db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif verificationData.Code != passResetReq.Code {\n\t\t// we should never be here.\n\t\tah.logger.Error(\"verification code did not match even after verifying PassReset\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Unable to reset password. Please try again later\"}, w)\n\t\treturn\n\t}\n\n\tif passResetReq.Password != passResetReq.PasswordRe {\n\t\tah.logger.Error(\"password and password re-enter did not match\")\n\t\tw.WriteHeader(http.StatusNotAcceptable)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\thashedPass, err := ah.hashPassword(passResetReq.Password)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: UserCreationFailed}, w)\n\t\treturn\n\t}\n\n\ttokenHash := utils.GenerateRandomString(15)\n\terr = ah.repo.UpdatePassword(context.Background(), userID, hashedPass, tokenHash)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to update user password in db\", \"error\", err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password and re-entered Password are not same\"}, w)\n\t\treturn\n\t}\n\n\t// delete the VerificationData from db\n\terr = ah.repo.DeleteVerificationData(context.Background(), verificationData.Email, verificationData.Type)\n\tif err != nil {\n\t\tah.logger.Error(\"unable to delete the verification data\", \"error\", err)\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tdata.ToJSON(&GenericResponse{Status: false, Message: \"Password Reset Successfully\"}, w)\n}", "title": "" }, { "docid": "b75a2e34f7425e7d14cbb94c427b07ba", "score": "0.6809283", "text": "func ResetPassword(w http.ResponseWriter, req *http.Request) {\n\t//log\n\tnow, userIP := globalPkg.GetIP(req)\n\n\tfound, logobj := logpkg.CheckIfLogFound(userIP)\n\n\tif found && now.Sub(logobj.Currenttime).Seconds() > globalPkg.GlobalObj.DeleteAccountTimeInseacond {\n\n\t\tlogobj.Count = 0\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t}\n\tif found && logobj.Count >= 10 {\n\t\tresponseObj := responses.FindResponseByID(\"6\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\treturn\n\t}\n\n\tif !found {\n\n\t\tLogindex := userIP.String() + \"_\" + logfunc.NewLogIndex()\n\n\t\tlogobj = logpkg.LogStruct{Logindex, now, userIP, \"macAdress\", \"ResetPassword\", \"AccountModule\", \"_\", \"_\", \"_\", 0}\n\t} else {\n\t\tlogobj = logfunc.ReplaceLog(logobj, \"ResetPassword\", \"AccountModule\")\n\t}\n\tResetPasswordDataObj := ResetPasswordData{}\n\n\t// check on path url\n\texisturl := false\n\tfor _, resetObj := range resetPassReq {\n\t\tp := \"/\" + resetObj.PathAPI\n\n\t\tif req.URL.Path == p {\n\t\t\texisturl = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif existurl == false {\n\t\tresponseObj := responses.FindResponseByID(\"12\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"this page is not found\"\n\t\tlogobj.Process = \"faild\"\n\t\tlogpkg.WriteOnlogFile(logobj)\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\n\tData := ResetPasswordData{}\n\tdecoder := json.NewDecoder(req.Body)\n\tdecoder.DisallowUnknownFields()\n\terr := decoder.Decode(&ResetPasswordDataObj)\n\tif err != nil {\n\t\tresponseObj := responses.FindResponseByID(\"1\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, responseObj.EngResponse, \"failed\")\n\n\t\treturn\n\t}\n\tInputData := Data.Email\n\tlogobj.InputData = InputData\n\t//email is lowercase\n\tResetPasswordDataObj.Email = convertStringTolowerCaseAndtrimspace(ResetPasswordDataObj.Email)\n\tvar AccountObj accountdb.AccountStruct\n\ti, found := findInResetPassPool(ResetPasswordDataObj)\n\n\tif found == false {\n\t\tresponseObj := responses.FindResponseByID(\"104\")\n\t\tglobalPkg.SendNotFound(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid data\", \"failed\")\n\t\tlogobj.OutputData = \"Invalid Data\"\n\t\tlogobj.Process = \"failed\"\n\t\tlogobj.Count = logobj.Count + 1\n\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\n\t\treturn\n\n\t}\n\t//Data should be removed from list\n\tData = resetPassReq[i]\n\n\tif len(ResetPasswordDataObj.Newpassword) != 64 {\n\t\tresponseObj := responses.FindResponseByID(\"7\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"invalid password length \", \"failed\")\n\t\treturn\n\t}\n\tsub := now.Sub(Data.CurrentTime).Seconds()\n\tif sub > 3000 {\n\t\tresponseObj := responses.FindResponseByID(\"8\")\n\t\tglobalPkg.SendError(w, responseObj.EngResponse)\n\t\tlogobj.OutputData = \"Time out \"\n\t\tlogobj.Process = \"faild\"\n\t\tglobalPkg.WriteLog(logobj, \"time out\", \"failed\")\n\t\tlogobj.Count = logobj.Count + 1\n\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\treturn\n\t}\n\tif ResetPasswordDataObj.Email != \"\" {\n\t\tAccountObj = getAccountByEmail(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\")\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n\tif ResetPasswordDataObj.Phonnum != \"\" {\n\t\tAccountObj = getAccountByPhone(ResetPasswordDataObj.Email)\n\t\tAccountObj.AccountPassword = ResetPasswordDataObj.Newpassword\n\t\tAccountObj.AccountLastUpdatedTime = now\n\t\tbroadcastTcp.BoardcastingTCP(AccountObj, \"Resetpass\", \"account\") //\tupdateAccount(AccountObj)\n\t\tresponseObj := responses.FindResponseByID(\"9\")\n\t\tglobalPkg.SendResponseMessage(w, responseObj.EngResponse)\n\t\tglobalPkg.WriteLog(logobj, \"your password successfully changed\", \"success\")\n\t\tif logobj.Count > 0 {\n\t\t\tlogobj.OutputData = \"your password successfully changed\"\n\t\t\tlogobj.Process = \"success\"\n\t\t\tlogobj.Count = 0\n\n\t\t\tbroadcastTcp.BoardcastingTCP(logobj, \"\", \"AddAndUpdateLog\")\n\t\t}\n\t\treturn\n\t}\n\n}", "title": "" }, { "docid": "a8fba64012e6f184237c814c17f2a6ec", "score": "0.6769393", "text": "func Reset(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif data[\"password\"] != data[\"password_confirm\"] {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Passwords do not match\",\n\t\t})\n\t}\n\n\tvar passwordReset = models.PasswordReset{}\n\n\tif err := database.DB.Where(\"token = ?\", data[\"token\"]).Last(&passwordReset); err.Error != nil {\n\t\tc.Status(400)\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"messgae\": \"Invalid Token!\",\n\t\t})\n\t}\n\n\tpassword, _ := bcrypt.GenerateFromPassword([]byte(data[\"password\"]), 14)\n\n\tdatabase.DB.Model(&models.User{}).Where(\"email = ?\", passwordReset.Email).Update(\"password\", password)\n\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"Password reset successful\",\n\t})\n\n}", "title": "" }, { "docid": "15bfc02e166b3bc4ceba51e5e38b5366", "score": "0.67127115", "text": "func (a *Client) RequestPasswordResetPost(params *RequestPasswordResetPostParams) (*RequestPasswordResetPostNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewRequestPasswordResetPostParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"RequestPasswordResetPost\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/request_password_reset\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &RequestPasswordResetPostReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*RequestPasswordResetPostNoContent), nil\n\n}", "title": "" }, { "docid": "0c7d5b24613bf3e31c2ae5a3f3ee9b2d", "score": "0.65957284", "text": "func ResetPasswordGetHandler(w http.ResponseWriter, req *http.Request) {\n\ttype data struct {\n\t\tFlashMessage string\n\t\tToken string\n\t}\n\n\ttoken := req.FormValue(\"token\")\n\tif token == \"\" {\n\t\ttemplates.ResetPassword.Execute(w, data{FlashMessage: \"Invalid reset token.\"})\n\t\treturn\n\t}\n\n\tvalid, _ := pwreset.ValidateToken(token)\n\n\tif !valid {\n\t\ttemplates.ResetPassword.Execute(w, data{FlashMessage: \"Reset is expired or doesn't exist.\"})\n\t\treturn\n\t}\n\n\ttemplates.ResetPassword.Execute(w, data{Token: token})\n}", "title": "" }, { "docid": "1ea8446288c91a625c3651fc71f2051e", "score": "0.6585105", "text": "func (u *UserController) PasswordReset(c *gin.Context) {\n\tvar data forms.PasswordResetCommand\n\n\tif c.BindJSON(&data) != nil {\n\t\tc.JSON(406, gin.H{\"message\": \"Provide relevant fields\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif data.Password != data.Confirm {\n\t\tc.JSON(400, gin.H{\"message\": \"Passwords do not match\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresetToken, _ := c.GetQuery(\"reset_token\")\n\n\tuserID, _ := services.DecodeNonAuthToken(resetToken)\n\n\tresult, err := userModel.GetUserByEmail(userID)\n\n\tif err != nil {\n\t\t// Return response when we get an error while fetching user\n\t\tc.JSON(500, gin.H{\"message\": \"Something wrong happened, try again later\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif result.Email == \"\" {\n\t\tc.JSON(404, gin.H{\"message\": \"User accoun was not found\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\t// Hash the new password\n\tnewHashedPassword := helpers.GeneratePasswordHash([]byte(data.Password))\n\n\t// Update user account\n\t_err := userModel.UpdateUserPass(userID, newHashedPassword)\n\n\tif _err != nil {\n\t\t// Return response if we are not able to update user password\n\t\tc.JSON(500, gin.H{\"message\": \"Somehting happened while updating your password try again\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tc.JSON(201, gin.H{\"message\": \"Password has been updated, log in\"})\n\tc.Abort()\n\treturn\n}", "title": "" }, { "docid": "d1d31d94781214b95ca84842739c5ea4", "score": "0.6486013", "text": "func SendResetLink() echo.HandlerFunc {\n\treturn emailRequired(\n\t\tfunc(context echo.Context) error {\n\t\t\temail := context.FormValue(\"email\")\n\t\t\tuser, err := FindByEmail(email)\n\t\t\tif err != nil || user == nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusNotFound, errors.New(\"Cannot find user for email \"+email))\n\t\t\t}\n\t\t\tuser.ResetToken = auth.GetResetToken(email)\n\t\t\terr = Save(user)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Cannot save password reset token for user \"+email))\n\t\t\t}\n\n\t\t\tdata := passwordResetData{config.NoReplyAddress, email, config.HostName, config.HostPort, user.ResetToken, time.Now().String(), randomString(16)}\n\t\t\temailTemplateTree := template.New(\"resetEmailTemplate\")\n\t\t\temailTemplateCollection := template.Must(emailTemplateTree.ParseFiles(\"src/bleuvanille/templates/PasswordReset.email\"))\n\n\t\t\tvar emailBody = new(bytes.Buffer)\n\n\t\t\tt := emailTemplateCollection.Templates()[0]\n\n\t\t\terr = t.Execute(emailBody, data)\n\n\t\t\terr = mail.Send(email, emailBody.Bytes())\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Cannot send password reset email to user \"+email))\n\t\t\t}\n\n\t\t\treturn context.JSON(http.StatusOK, \"Password reset email sent to \"+email)\n\t\t})\n}", "title": "" }, { "docid": "7d7a15f781f8c26fe9a6129dd30b7354", "score": "0.6477701", "text": "func (a *ManagementApiService) ResetPassword(ctx _context.Context) apiResetPasswordRequest {\n\treturn apiResetPasswordRequest{\n\t\tapiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "57ba3e5381c6f9bb252d817d6c39c18b", "score": "0.6475561", "text": "func resetPassword(model *ResetPasswordModel) api.Response {\n\tif model.Password != model.PasswordConfirmation {\n\t\treturn api.BadRequest(ErrPasswordsDoNotMatch)\n\t}\n\n\tvar err = auth.ResetPassword(model.Token, model.Password)\n\tif err != nil {\n\t\tif err == auth.ErrResetPasswordTokenExpired {\n\t\t\treturn api.BadRequest(err)\n\t\t}\n\n\t\treturn api.InternalServerError(err)\n\t}\n\n\treturn api.StatusResponse(http.StatusNoContent)\n}", "title": "" }, { "docid": "5d2c6e0f4ef6671151d9c8728b1ea0bd", "score": "0.64632523", "text": "func (self *Apn) ResetPassword(rw web.ResponseWriter, req *web.Request) {\n\tif req.Method != \"POST\" {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tokPacket := &packet.OkPacket{}\n\n\tbody, err := ioutil.ReadAll(req.Body)\n\tif err != nil {\n\t\tlog.Error(\"read request error\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tmodifyPacket := &SignInUp{}\n\terr = json.Unmarshal(body, &modifyPacket)\n\tif err != nil {\n\t\tlog.Error(\"decode the json packet error:\", err)\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\tif !modifyPacket.IsValid() {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"request parms is invalid\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tif registered := user.IsUsernameRegistered(modifyPacket.UserName); !registered {\n\t\tokPacket.Code = 0\n\t\tokPacket.Message = \"username has not registered\"\n\t\trw.Write(xjson.Encode(okPacket))\n\t\treturn\n\t}\n\n\tuser.ModifyPassword(modifyPacket.Phone, modifyPacket.Password)\n\n\tuserId := user.GetUserIdByUserName(modifyPacket.UserName)\n\tif userId == 0 {\n\t\tFail(rw)\n\t\treturn\n\t}\n\n\t//delete the session, because user change the password\n\tsession.DeleteSessionByUserId(userId)\n\n\tokPacket.Code = 1\n\tSuccess(rw)\n\trw.Write(xjson.Encode(okPacket))\n\n}", "title": "" }, { "docid": "a9c8addb1bfd4e405493edf053f7d32b", "score": "0.6426592", "text": "func ResetPassword(c echo.Context) error {\n\t// Read the json body\n\tb, err := ioutil.ReadAll(c.Request().Body)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusBadRequest, err.Error())\n\t}\n\n\t// Verify length\n\tif len(b) == 0 {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"You have sent an empty json\"})\n\t}\n\n\t// Validate JSON\n\tl := gojsonschema.NewBytesLoader(b)\n\tresult, err := app.EmailSchema.Validate(l)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusBadRequest, err.Error())\n\t}\n\tif !result.Valid() {\n\t\tmsg := \"\"\n\t\tfor _, desc := range result.Errors() {\n\t\t\tmsg += fmt.Sprintf(\"%s, \", desc.Description())\n\t\t}\n\t\tmsg = strings.TrimSuffix(msg, \", \")\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": msg})\n\t}\n\n\t// Bind it to our User instance.\n\tvar jsonEmail map[string]interface{}\n\terr = json.Unmarshal(b, &jsonEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\tresetEmail := jsonEmail[\"email\"].(string)\n\n\t// check if email already exists in DB.\n\tEmailExist, _ := user.CheckEmailExist(resetEmail)\n\tif !EmailExist {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]string{\n\t\t\t\"verbose_msg\": \"Email does not exists !\"})\n\t}\n\n\tu, err := user.GetUserByEmail(resetEmail)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\ttoken, err := u.GenerateResetPasswordToken()\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, err.Error())\n\t}\n\n\t// Generate the email confirmation url\n\tlink := viper.GetString(\"ui.address\") + \"/reset-password\" + \"?token=\" + token\n\tgo email.Send(u.Username, link, u.Email, \"reset\")\n\n\treturn c.JSON(http.StatusOK, map[string]string{\n\t\t\"verbose_msg\": \"ok\",\n\t})\n}", "title": "" }, { "docid": "7a04560bad1b5995733254bc64444b5c", "score": "0.634502", "text": "func PasswordResetGetHandler(ctx *enliven.Context) {\n\tcode, ok := ctx.Vars[\"code\"]\n\tif !ok || code == \"\" {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tdb := database.GetDatabase()\n\tu := User{}\n\tdb.Where(\"Verification_Code = ?\", code).First(&u)\n\n\tif u.ID == 0 {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_password_reset\")\n}", "title": "" }, { "docid": "fc4df1ec98487914ab1439410228e8eb", "score": "0.63396543", "text": "func (s *UserService) ResetPasswordInit(req *requests.ResetPasswordInit) *response.Base {\n\t//validate user input\n\tif err := req.Validate(); err != nil {\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tError: err,\n\t\t\tMessage: \"\",\n\t\t}\n\t}\n\t//check if user exists\n\tuser, err := s.dao.Find(req.Identifier)\n\tif err != nil {\n\t\tlog.Printf(\"user %s not found\\n\", req.Identifier)\n\t\treturn &response.Base{\n\t\t\tCode: http.StatusNotFound,\n\t\t\tError: errors.New(\"user_not_found\"),\n\t\t}\n\t}\n\t//generate reset password code\n\tvar code string\n\tif requests.ValidateEmailAddress(req.Identifier) {\n\t\tcode, tries := \"\", 0\n\t\tfor len(code) < 6 && tries < 3 {\n\t\t\t//generate 6 digits code\n\t\t\tcode = fmt.Sprintf(\"%d\", rand.New(rand.NewSource(time.Now().UnixNano())).Intn(999999))\n\t\t\ttries++\n\t\t}\n\t\tif len(code) != 6 {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusInternalServerError,\n\t\t\t\tError: errors.New(\"unknown_error\"),\n\t\t\t}\n\t\t}\n\t\t//send the code to user in email\n\t\tmailer := mails.ResetPasswordEmail{\n\t\t\tTo: user.Email,\n\t\t\tName: user.Name,\n\t\t\tCode: code,\n\t\t}\n\t\tmailer.Send()\n\t} else {\n\t\terr := auth.Get(req.Identifier).Err()\n\t\tif err == nil {\n\t\t\treturn &response.Base{\n\t\t\t\tCode: http.StatusTooManyRequests,\n\t\t\t\tError: errors.New(\"too_many_requests\"),\n\t\t\t}\n\t\t}\n\t\tcode, err = helpers.SendOTP(req.Identifier)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\t\tauth.Set(req.Identifier, code, time.Second*60)\n\t}\n\n\tif err := auth.Set(fmt.Sprintf(\"%d\", user.ID), code, time.Hour); err != nil {\n\t\tlog.Println(err)\n\t}\n\n\treturn &response.Base{\n\t\tCode: http.StatusOK,\n\t\tError: nil,\n\t\tMessage: \"reset_instructions_sent\",\n\t}\n}", "title": "" }, { "docid": "da11b1f8cc8e081a782733dfce086cf7", "score": "0.63264066", "text": "func (c *RegistrationController) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\n\t// parse the form value\n\tif err := r.ParseForm(); err != nil {\n\t\tlog.Println(err)\n\t\tc.Error500(w, err, \"Parsing form values failed.\")\n\t\treturn\n\t}\n\n\tdisplayedError := \"Error resetting password\"\n\n\tuserEmail := r.FormValue(\"userEmail\")\n\tu, err := models.FindUserByEmail(userEmail)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\tif err = u.ResetUUID(); err != nil {\n\t\tlog.Printf(\"Error resetting UUID for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tif err = u.UpdatePassword(\"\"); err != nil {\n\t\tlog.Printf(\"Error resetting password for user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\tdata := email.MailData{\n\t\tFirstName: u.FirstName,\n\t\tLastName: u.LastName,\n\t\tHostAddress: config.HTTPHostAddress,\n\t\tVerificationUUID: u.VerificationUUID,\n\t}\n\tif err = email.ConstructFromTemplateAndSend(\n\t\t\"password_reset.html\",\n\t\t\"[SCIONLab] Password reset\",\n\t\tdata,\n\t\t\"password-reset\",\n\t\tuserEmail,\n\t\tfalse); err != nil {\n\t\tlog.Printf(\"Error sending password-reset email to user %v: %v\", u.Email, err)\n\t\tc.BadRequest(w, err, displayedError)\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "2a736244c3998b21b1d78a7fb6b66d91", "score": "0.632269", "text": "func (a *UserApiService) ResetPassword(ctx context.Context) UserApiResetPasswordRequest {\n\treturn UserApiResetPasswordRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "2efff251d6a2bfa295b6830b7d6a26c4", "score": "0.6312904", "text": "func (f *Firebase) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "6fab78953578fb6276e68d1097257e2c", "score": "0.63120604", "text": "func resetPassword(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\t// take email, token and new password\n\tbody := struct {\n\t\tEmail string `json:\"email\"`\n\t\tOTP string `json:\"otp\"`\n\t\tPassword string `json:\"password\"`\n\t}{}\n\n\terr := json.NewDecoder(r.Body).Decode(&body)\n\tlog.ErrorHandler(err)\n\n\t// check email for existence\n\tvar user User\n\terr = db.Find(&user, \"email = ?\", body.Email).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tlog.ErrorHandler(err)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// check if token exists\n\tstoredOtp, err := redisClient.Get(ctx, \"password_reset_\"+body.Email).Result()\n\tlog.ErrorHandler(err)\n\n\tif storedOtp != body.OTP {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\terr = json.NewEncoder(w).Encode(core.FourOOne)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 401)\n\t\treturn\n\t}\n\n\t// validate password\n\tsafePassword := passwordValidator(body.Password)\n\tif !safePassword {\n\t\tw.WriteHeader(http.StatusUnprocessableEntity)\n\t\terr = json.NewEncoder(w).Encode(core.FourTwoTwo)\n\t\tlog.ErrorHandler(err)\n\t\tlog.AccessHandler(r, 422)\n\t\treturn\n\t}\n\n\t// Generate password hash and save\n\thashedPassword, err := generatePasswordHash(body.Password)\n\tlog.ErrorHandler(err)\n\n\tuser.Password = hashedPassword\n\tdb.Save(&user)\n\n\tw.WriteHeader(http.StatusOK)\n\terr = json.NewEncoder(w).Encode(core.TwoHundred)\n\tlog.ErrorHandler(err)\n\tlog.AccessHandler(r, 200)\n\n\t// Delete from redis\n\tredisClient.Del(ctx, \"password_reset_\"+body.Email)\n\n\treturn\n}", "title": "" }, { "docid": "47cfdca0f8479eb2c685f411932fe050", "score": "0.6299522", "text": "func ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tauth := service.GetSessionMember(r)\n\tvars := mux.Vars(r)\n\tid := vars[\"id\"]\n\n\tmemberID, _ := strconv.Atoi(id)\n\tmember := model.GetMemberByID(memberID)\n\n\tif err := r.ParseMultipartForm(setting.FileMaxSize); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n\n\tnewPassword := r.FormValue(\"newPassword\")\n\tconfirmPassword := r.FormValue(\"confirmPassword\")\n\n\tpasswordData := map[string]string{\n\t\t\"password\": newPassword,\n\t\t\"confirmPassword\": confirmPassword,\n\t}\n\n\tvalidateError := model.ValidatePassword(passwordData)\n\n\tif len(validateError) == 0 {\n\t\tmodel.UpdatePassword(newPassword, member)\n\t\thttp.Redirect(w, r, \"/admin/members/\"+id, 301)\n\t}\n\n\ttemplateData := map[string]interface{}{\n\t\t\"title\": \"Reset Password\",\n\t\t\"validateError\": validateError,\n\t\t\"id\": id,\n\t\t\"auth\": auth,\n\t\t\"tab\": setting.MembersTab,\n\t}\n\n\ttmpl := template.Must(template.ParseFiles(\"template/admin_members/reset_password.tmpl\", setting.AdminTemplate))\n\tif err := tmpl.ExecuteTemplate(w, \"base\", templateData); err != nil {\n\t\tLogger.Error(err.Error())\n\t}\n}", "title": "" }, { "docid": "33821405df73c6ce99bf8bf3e4c0380a", "score": "0.6294025", "text": "func (a *Account) ResetPassword() (*Account, *http.Response, []error) {\n\tk := kumoru.New()\n\n\tk.Get(fmt.Sprintf(\"%v/v1/accounts/%v/password/resets/\", k.EndPoint.Authorization, a.Email))\n\tresp, _, errs := k.End()\n\n\treturn a, resp, errs\n}", "title": "" }, { "docid": "a7f1eb8149080a058dbe6a93723d1ff9", "score": "0.6252506", "text": "func (app *application) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tvar payload struct {\n\t\tEmail string `json:\"email\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\terr := app.readJSON(w, r, &payload)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// decrypt email\n\tencryptor := encryption.Encryption {\n\t\tKey: []byte(app.config.secretkey),\n\t}\n\n\trealEmail, err := encryptor.Decrypt(payload.Email)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tuser, err := app.DB.GetUserByEmail(realEmail)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\t// create hash using new password\n\tnewHash, err := bcrypt.GenerateFromPassword([]byte(payload.Password), 12)\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\terr = app.DB.UpdatePasswordForUser(user, string(newHash))\n\tif err != nil {\n\t\tapp.badRequest(w, r, err)\n\t\treturn\n\t}\n\n\tvar resp struct {\n\t\tError bool `json:\"error\"`\n\t\tMessage string \t`json:\"message\"`\n\t}\n\tresp.Error = false\n\tresp.Message = \"password changed\"\n\n\tapp.writeJSON(w, http.StatusCreated, resp)\n}", "title": "" }, { "docid": "5daf4ca1bf9e283b6c9b86ffe0ff72a6", "score": "0.6223882", "text": "func resetpassword(email, newpass string) error {\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", mailfrom)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"Changement de mot de passe\")\n\tm.SetBody(\"text/plain\", \"Ton nouveau mot de passe est: \"+newpass)\n\n\td := gomail.NewDialer(smtpserver, smtpport, \"\", \"\")\n\n\tif err := d.DialAndSend(m); err != nil {\n\t\treturn errors.New(\"Connexion impossible avec le serveur smtp\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "62fe3dcfded28ef92d688bed9d836b5b", "score": "0.61645144", "text": "func (orm *ORM) ForgotPasswordRequest(ctx context.Context, email string) (*models.Admin, error) {\n\tvar _Admin models.Admin\n\n\t// check if admin exists\n\terr := orm.DB.DB.First(&_Admin, \"email = ?\", email).Error\n\tif errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn nil, errors.New(\"AdminNotFound\")\n\t}\n\n\t//generate code\n\tcode := generatecode.GenerateCode(6)\n\n\t//save in redis and expire in an hours time\n\tredisErr := orm.rdb.Set(ctx, fmt.Sprintf(\"%s\", _Admin.ID), code, 1*time.Hour).Err()\n\tif redisErr != nil {\n\t\treturn nil, redisErr\n\t}\n\n\t// send code to email\n\tmailErr := mail.SendMail(_Admin.Email, fmt.Sprintf(\"Your code is %s\", code))\n\tif mailErr != nil {\n\t\treturn nil, mailErr\n\t}\n\n\treturn &_Admin, nil\n}", "title": "" }, { "docid": "e3cf02039a3d237d5a293decc9098272", "score": "0.6144242", "text": "func ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tvar data struct {\n\t\tEmail string `json:\"email\"`\n\t}\n\n\t// Decode request body into data.\n\tif err := json.NewDecoder(r.Body).Decode(&data); err != nil {\n\t\tfmt.Printf(\"json decode failed: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"json decode failed\"})\n\t\treturn\n\t}\n\n\t// Validate user provided email.\n\tif len(data.Email) == 0 {\n\t\terr := fmt.Errorf(\"email can not be empty\")\n\t\tfmt.Printf(\"validation failed: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"validation failed\"})\n\t\treturn\n\t}\n\n\t// Fetch user by email address provided.\n\tvar person model.Person\n\n\tvar db = database.DB()\n\n\tq := db.Where(model.Person{Email: data.Email}).First(&person)\n\n\tif q.RecordNotFound() {\n\t\tfmt.Printf(\"record not found\\n\")\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"invalid email or password\"})\n\t\treturn\n\t} else if q.Error != nil {\n\t\tfmt.Printf(\"unknown database error: %v\\n\", q.Error)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"unknown database error\"})\n\t\treturn\n\t}\n\n\tfrom := \"codeestacks@gmail.com\"\n\tpass := \"Neareastuniversity\"\n\tto := data.Email\n\tbody := \"Your password is \" + person.Password\n\tmsg := \"From: \" + from + \"\\n\" + \"To: \" + to + \"\\n\" + \"Subject: Reset Password from CodeStack\\n\\n\" + body\n\n\tif err := smtp.SendMail(\"smtp.gmail.com:587\", smtp.PlainAuth(\"\", from, pass, \"smtp.gmail.com\"), from, []string{to}, []byte(msg)); err != nil {\n\t\tfmt.Printf(\"smtp error: %v\\n\", err)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tjson.NewEncoder(w).Encode(errors.ErrorMsg{\"smtp error\"})\n\t\treturn\n\t}\n\n\t// Success\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "49c1cb169c469686ab392480a83413f5", "score": "0.61343557", "text": "func (a *Client) PasswordResetPost(params *PasswordResetPostParams) (*PasswordResetPostNoContent, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewPasswordResetPostParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"PasswordResetPost\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/password_reset\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &PasswordResetPostReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*PasswordResetPostNoContent), nil\n\n}", "title": "" }, { "docid": "41950c064b1e1c64dd546189d8ef4a94", "score": "0.61113906", "text": "func (uc UsersController) ResetPassword(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\tfmt.Fprint(w, \"User.ResetPassword\")\n}", "title": "" }, { "docid": "1ae4ea8a59a10d559877b0982c2d53ac", "score": "0.609392", "text": "func (UserSvc *UserSvc) ResetPassword(ctx context.Context, req *pb.ResetPasswordReq) (*pb.ResetPasswordRes, error) {\n\tconn, err := grpc.Dial(UserSvc.serverURL, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn nil, errs.GRPCDialError(err)\n\t}\n\tdefer conn.Close()\n\tclient := pb.NewUserSvcClient(conn)\n\tres, err := client.ResetPassword(ctx, req)\n\tif err != nil {\n\t\treturn nil, errs.WithMessage(err, \"client.CheckAuthenticationCode\")\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "7971aed528584346ed2c9a3e08636511", "score": "0.60613966", "text": "func (u *UsersController) Reset(ctx *gin.Context) {\n\tvar userJSON userResetJSON\n\tctx.Bind(&userJSON)\n\tvar userIn tat.User\n\tuserIn.Username = strings.TrimSpace(userJSON.Username)\n\tuserIn.Email = strings.TrimSpace(userJSON.Email)\n\tcallback := strings.TrimSpace(userJSON.Callback)\n\n\tif len(userIn.Username) < 3 || len(userIn.Email) < 7 {\n\t\terr := fmt.Errorf(\"Invalid username (%s) or email (%s)\", userIn.Username, userIn.Email)\n\t\tAbortWithReturnError(ctx, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\ttokenVerify, err := userDB.AskReset(&userIn)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while AskReset %s\", err)\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": err.Error()})\n\t\treturn\n\t}\n\n\tgo userDB.SendAskResetEmail(userIn.Username, userIn.Email, tokenVerify, callback)\n\tctx.JSON(http.StatusCreated, gin.H{\"info\": \"please check your mail to validate your account\"})\n}", "title": "" }, { "docid": "6f3f201266e54b7c0d02791ff52172d4", "score": "0.60586065", "text": "func resetPwdAPI(w http.ResponseWriter, r *http.Request) handler.JSON {\n\tresp := appHandler.JSONResponse(w, r)\n\tparams := resp.Params()\n\tpwd := clib.MustGetMinMaxStringFromDict(params, \"pwd\", appDef.LenMinUserPwd, appDef.LenMaxUserPwd)\n\tkey := clib.MustGetStringFromDict(params, \"key\", -1)\n\n\tuidStr, err := appService.Get().ResetPwdVerifier.Verify(key)\n\tappcm.PanicOn(err, \"failed to verify reset password key\")\n\n\tlang := appcm.ContextLanguage(r.Context())\n\tls := appHandler.MainPage().Dictionary(lang)\n\tif uidStr == \"\" {\n\t\treturn resp.MustFail(ls.ResetPwdSessionExpiredErr)\n\t}\n\n\ttargetUID, err := strconvx.ParseUint64(uidStr)\n\tappcm.PanicOn(err, \"failed to parse UID\")\n\n\tif targetUID == 0 {\n\t\treturn resp.MustFail(\"unexpected 0 UID\")\n\t}\n\n\tpwdHash, err := appService.Get().HashingAlg.CreateHash(pwd)\n\tappcm.PanicOn(err, \"failed to create hash\")\n\n\tdb := appDB.DB()\n\thasPwd, err := da.UserPwd.HasUser(db, targetUID)\n\tappcm.PanicOn(err, \"failed to check if user has password\")\n\n\tif !hasPwd {\n\t\treturn resp.MustFail(\"user has no password\")\n\t}\n\n\t// Update password.\n\terr = da.UserPwd.UpdateHashByID(db, targetUID, pwdHash)\n\tappcm.PanicOn(err, \"failed to update password\")\n\n\t// TODO: force logout all sessions!\n\treturn resp.MustComplete(nil)\n}", "title": "" }, { "docid": "b94922f0136d7e5db8c7b2234a8c3d87", "score": "0.60519767", "text": "func (ar *Router) RequestTFAReset() http.HandlerFunc {\n\ttype requestBody struct {\n\t\tEmail string `json:\"email,omitempty\"`\n\t}\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\td := requestBody{}\n\t\tif ar.MustParseJSON(w, r, &d) != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif !model.EmailRegexp.MatchString(d.Email) {\n\t\t\tar.Error(w, ErrorAPIRequestBodyInvalid, http.StatusBadRequest, \"\", \"RequestTFAReset.emailRegexp_MatchString\")\n\t\t\treturn\n\t\t}\n\n\t\tif userExists := ar.userStorage.UserExists(d.Email); !userExists {\n\t\t\tar.Error(w, ErrorAPIUserNotFound, http.StatusBadRequest, \"User with this email does not exist\", \"RequestTFAReset.UserExists\")\n\t\t\treturn\n\t\t}\n\n\t\tuserID, err := ar.userStorage.IDByName(d.Email)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIUserNotFound, http.StatusBadRequest, err.Error(), \"RequestTFAReset.IDByName\")\n\t\t\treturn\n\t\t}\n\n\t\tapp := middleware.AppFromContext(r.Context())\n\t\tif app == nil {\n\t\t\tar.Error(w, ErrorAPIRequestAppIDInvalid, http.StatusBadRequest, \"App is not in context.\", \"RequestDisabledTFA.AppFromContext\")\n\t\t\treturn\n\t\t}\n\n\t\tif app.TFAStatus() == model.TFAStatusDisabled {\n\t\t\tar.Error(w, ErrorAPIRequestDisabledTFA, http.StatusForbidden, \"Two-factor authentication is disabled for this app\", \"RequestTFAReset.TFAStatusDisabled\")\n\t\t\treturn\n\t\t}\n\n\t\tresetToken, err := ar.tokenService.NewResetToken(userID)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIAppResetTokenNotCreated, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.NewResetToken\")\n\t\t\treturn\n\t\t}\n\n\t\tresetTokenString, err := ar.tokenService.String(resetToken)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIAppResetTokenNotCreated, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.tokenService_String\")\n\t\t\treturn\n\t\t}\n\n\t\thost, err := url.Parse(ar.Host)\n\t\tif err != nil {\n\t\t\tar.Error(w, ErrorAPIInternalServerError, http.StatusInternalServerError, err.Error(), \"RequestTFAReset.URL_parse\")\n\t\t\treturn\n\t\t}\n\n\t\tquery := fmt.Sprintf(\"token=%s\", resetTokenString)\n\n\t\tu := &url.URL{\n\t\t\tScheme: host.Scheme,\n\t\t\tHost: host.Host,\n\t\t\tPath: path.Join(ar.WebRouterPrefix, \"tfa/reset\"),\n\t\t\tRawQuery: query,\n\t\t}\n\n\t\tif err = ar.emailService.SendResetEmail(\"Reset Two-Factor Authentication\", d.Email, u.String()); err != nil {\n\t\t\tar.Error(w, ErrorAPIEmailNotSent, http.StatusInternalServerError, \"Email sending error: \"+err.Error(), \"RequestTFAReset.SendResetEmail\")\n\t\t\treturn\n\t\t}\n\n\t\tresult := map[string]string{\"result\": \"ok\"}\n\t\tar.ServeJSON(w, http.StatusOK, result)\n\t}\n}", "title": "" }, { "docid": "40603c9cae77691ed19e0abcf733519b", "score": "0.60414517", "text": "func (as *AdminServer) ResetPassword(w http.ResponseWriter, r *http.Request) {\n\tu := ctx.Get(r, \"user\").(models.User)\n\tsession := ctx.Get(r, \"session\").(*sessions.Session)\n\tif !u.PasswordChangeRequired {\n\t\tFlash(w, r, \"info\", \"Please reset your password through the settings page\")\n\t\tsession.Save(r, w)\n\t\thttp.Redirect(w, r, \"/settings\", http.StatusTemporaryRedirect)\n\t\treturn\n\t}\n\tparams := newTemplateParams(r)\n\tparams.Title = \"Reset Password\"\n\tswitch {\n\tcase r.Method == http.MethodGet:\n\t\tparams.Flashes = session.Flashes()\n\t\tsession.Save(r, w)\n\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\treturn\n\tcase r.Method == http.MethodPost:\n\t\tnewPassword := r.FormValue(\"password\")\n\t\tconfirmPassword := r.FormValue(\"confirm_password\")\n\t\tnewHash, err := auth.ValidatePasswordChange(u.Hash, newPassword, confirmPassword)\n\t\tif err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\tu.PasswordChangeRequired = false\n\t\tu.Hash = newHash\n\t\tif err = models.PutUser(&u); err != nil {\n\t\t\tFlash(w, r, \"danger\", err.Error())\n\t\t\tparams.Flashes = session.Flashes()\n\t\t\tsession.Save(r, w)\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tgetTemplate(w, \"reset_password\").ExecuteTemplate(w, \"base\", params)\n\t\t\treturn\n\t\t}\n\t\t// TODO: We probably want to flash a message here that the password was\n\t\t// changed successfully. The problem is that when the user resets their\n\t\t// password on first use, they will see two flashes on the dashboard-\n\t\t// one for their password reset, and one for the \"no campaigns created\".\n\t\t//\n\t\t// The solution to this is to revamp the empty page to be more useful,\n\t\t// like a wizard or something.\n\t\tas.nextOrIndex(w, r)\n\t}\n}", "title": "" }, { "docid": "ac623f530c331fdc56f034d8280703c4", "score": "0.60379523", "text": "func (s *Supervisor) passwordReset(token *auth.Token, mr *msg.Result) bool {\n\n\t// decrypt e2e encrypted request\n\t// token.UserName is the username\n\t// token.Password is the _NEW_ password that should be set\n\t// token.Token is the ldap password or mailtoken\n\n\t// validate external credentials\n\tswitch s.activation {\n\tcase `ldap`:\n\t\tif ok, err := validateLdapCredentials(token.UserName, token.Token); err != nil {\n\t\t\tmr.ServerError(err, mr.Section)\n\t\t\tmr.Super.Audit.WithField(`Code`, mr.Code).Warningln(err)\n\t\t\treturn false\n\t\t} else if !ok {\n\t\t\tmr.Forbidden(fmt.Errorf(`Invalid LDAP credentials`))\n\t\t\tmr.Super.Audit.\n\t\t\t\tWithField(`Code`, mr.Code).\n\t\t\t\tWarningln(mr.Error)\n\t\t\treturn false\n\t\t}\n\tcase `token`:\n\t\tmr.NotImplemented(fmt.Errorf(`Mail-Token not supported yet`),\n\t\t\tmr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\tdefault:\n\t\tmr.ServerError(fmt.Errorf(\"Unknown activation method: %s\",\n\t\t\ts.conf.Auth.Activation), mr.Section)\n\t\tmr.Super.Audit.\n\t\t\tWithField(`Code`, mr.Code).\n\t\t\tWarningln(mr.Error)\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "ca3b5f9cb1360591461fb970243c1fa3", "score": "0.60368335", "text": "func (m *UserResource) ResetPassword(ctx context.Context, userId string, qp *query.Params) (*ResetPasswordToken, *Response, error) {\n\turl := fmt.Sprintf(\"/api/v1/users/%v/lifecycle/reset_password\", userId)\n\tif qp != nil {\n\t\turl = url + qp.String()\n\t}\n\n\trq := m.client.CloneRequestExecutor()\n\n\treq, err := rq.WithAccept(\"application/json\").WithContentType(\"application/json\").NewRequest(\"POST\", url, nil)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar resetPasswordToken *ResetPasswordToken\n\n\tresp, err := rq.Do(ctx, req, &resetPasswordToken)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn resetPasswordToken, resp, nil\n}", "title": "" }, { "docid": "42e17dcbdb86c1c041faaca4823608d9", "score": "0.6034366", "text": "func requestResetFormHandler(w http.ResponseWriter, r *http.Request) {\n\tdata := identity.RequestResetResult{\n\t\tEmailValid: true,\n\t\tRequestResetSuccess: false,\n\t\tShowNewForm: true,\n\t\tUser: identity.InvalidUser(),\n\t\tToken: \"\",\n\t}\n\ttitle := b.webConfig.GetVarWithDefault(\"Title\", defTitle)\n\tcontent := htmlContent{\n\t\tTitle: title,\n\t\tErrorMsg: \"\",\n\t\tTMResults: nil,\n\t\tData: data,\n\t}\n\tb.pageDisplayer.DisplayPage(w, \"request_reset_form.html\", content)\n}", "title": "" }, { "docid": "fad66cbafe2c95119244c047bba2c120", "score": "0.60000306", "text": "func GetResetPasswordData() []ResetPasswordData {\n\treturn resetPassReq\n}", "title": "" }, { "docid": "a04d4b205647b0cfd64ac4d6ad9bb7fa", "score": "0.5982731", "text": "func (c *Config) ForgotPassword(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tvar payload forgotPasswordPayload\n\tif err := bjson.ReadJSON(&payload, r); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tif err := valid.Raw(&payload); err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t}\n\n\tu, found, err := c.UserStore.GetUserByEmail(ctx, payload.Email)\n\tif err != nil {\n\t\tbjson.HandleError(w, err)\n\t\treturn\n\t} else if found {\n\t\tif err := c.Mail.SendPasswordResetEmail(u,\n\t\t\tu.GetPasswordResetMagicLink(c.Magic)); err != nil {\n\t\t\tlog.Alarm(err)\n\t\t}\n\t}\n\n\tbjson.WriteJSON(w, map[string]string{\n\t\t\"message\": \"Check your email for a link to reset your password\",\n\t}, http.StatusOK)\n}", "title": "" }, { "docid": "9af7ec1fda3d76ab9cb602b0f0638986", "score": "0.5957119", "text": "func ResetPasswordCheck(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tw.Header().Add(\"Content-Type\", \"application/json\")\n\tresetToken := ps.ByName(\"reset-token\")\n\n\t// check if user with such token exists and if it has expired\n\tuser := &models.User{}\n\terr := models.DB().Table(\"users\").Where(\"token_reset = ? AND token_reset_expires > ?\", resetToken, time.Now()).First(user).Error\n\tif err != nil {\n\t\tif err == gorm.ErrRecordNotFound {\n\t\t\tresp := map[string]interface{}{\n\t\t\t\t\"status\": false,\n\t\t\t\t\"message\": \"Either your reset token doesn't exist or it has expired\",\n\t\t\t}\n\t\t\tjson.NewEncoder(w).Encode(resp)\n\t\t\treturn\n\t\t}\n\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"DB error\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\t// check if token is valid\n\tjwtT := &models.JwtToken{}\n\ttoken, err := jwt.ParseWithClaims(resetToken, jwtT, func(token *jwt.Token) (interface{}, error) {\n\t\treturn []byte(os.Getenv(\"jwt_secret\")), nil\n\t})\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Malformed token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\n\tif !token.Valid {\n\t\tw.WriteHeader(http.StatusForbidden)\n\t\tresp := map[string]interface{}{\n\t\t\t\"status\": false,\n\t\t\t\"message\": \"Invalid token\",\n\t\t}\n\t\tjson.NewEncoder(w).Encode(resp)\n\t\treturn\n\t}\n\tuser.Password = \"\"\n\tresp := map[string]interface{}{\n\t\t\"status\": true,\n\t\t\"message\": \"Token is valid, you can change your password!\",\n\t\t\"user\": user,\n\t}\n\tjson.NewEncoder(w).Encode(resp)\n}", "title": "" }, { "docid": "8e136359ab177feb93c16c1ec32bbed5", "score": "0.595559", "text": "func (context *DbContext) ResetPassword(username string, recoveryToken string, newPassword string) ConnectUserResponse {\n\n\tid := context.IDFromUsername(username)\n\tif id == 0 {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tif !ValidatePassword(newPassword) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tstmt, err := context.Db.Prepare(\"SELECT Expiration FROM UserRecoveryTokens WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\tvar expiration time.Time\n\terr = stmt.QueryRow(id, recoveryToken).Scan(&expiration)\n\n\tif err == sql.ErrNoRows {\n\t\treturn invalidConnectUserResponse()\n\t}\n\tcheckErr(err)\n\n\tif time.Now().After(expiration) {\n\t\treturn invalidConnectUserResponse()\n\t}\n\n\tnewExpiration := time.Now()\n\n\tstmt2, err := context.Db.Prepare(\"UPDATE UserRecoveryTokens SET Expiration = ? WHERE IdUser = ? AND Token = ?\")\n\tcheckErr(err)\n\tdefer stmt2.Close()\n\n\t_, err = stmt2.Exec(newExpiration, id, recoveryToken)\n\n\t// Hashing the password with the default cost of 10\n\thashedPassword, err := bcrypt.GenerateFromPassword([]byte(context.saltPassword(newPassword)), bcrypt.DefaultCost)\n\tcheckErr(err)\n\n\tstmt3, err := context.Db.Prepare(\"UPDATE UserAuthentications SET Password = ? WHERE IdUser = ?\")\n\tcheckErr(err)\n\tdefer stmt.Close()\n\n\t_, err = stmt3.Exec(hashedPassword, id)\n\tcheckErr(err)\n\n\treturn context.ValidateCredentials(username, newPassword)\n}", "title": "" }, { "docid": "766ed356a00bb5c2ad33a05a20110b01", "score": "0.5936413", "text": "func DoRecoverPassword(_ http.ResponseWriter, r *http.Request) {\n\tr.ParseForm()\n\n}", "title": "" }, { "docid": "8fffe91824a3d4846e1aa031069fc4d4", "score": "0.59244007", "text": "func (c *Client) ResetPassword(rp *www.ResetPassword) (*www.ResetPasswordReply, error) {\n\tresponseBody, err := c.makeRequest(http.MethodPost,\n\t\twww.PoliteiaWWWAPIRoute, www.RouteResetPassword, rp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar rpr www.ResetPasswordReply\n\terr = json.Unmarshal(responseBody, &rpr)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal ResetPasswordReply: %v\", err)\n\t}\n\n\tif c.cfg.Verbose {\n\t\terr := prettyPrintJSON(rpr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &rpr, nil\n}", "title": "" }, { "docid": "d1e1e92b02c3f9bb41bb8a2e7b6faec9", "score": "0.58966607", "text": "func PasswordResetPostHandler(ctx *enliven.Context) {\n\tcode, ok := ctx.Vars[\"code\"]\n\tif !ok || code == \"\" {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tdb := database.GetDatabase()\n\tu := User{}\n\tdb.Where(\"Verification_Code = ?\", code).First(&u)\n\n\tif u.ID == 0 {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.Request.ParseForm()\n\t// TODO: Reset the user's password to the posted values here.\n\n\tu.Status = 1\n\tu.VerificationCode = \"\"\n\tdb.Save(&u)\n\n\tctx.ExecuteBaseTemplate(\"user_password_reset\")\n}", "title": "" }, { "docid": "2c65abec9c541589ce332870412464de", "score": "0.5894195", "text": "func (db *MyConfigurations) performResetPasswordByEmail(c echo.Context) error {\n\temail := c.QueryParam(\"email\")\n\thash := c.QueryParam(\"hash\")\n\turl := \"/email-reset-password?email=\" + email + \"&hash=\" + hash\n\tvar otp models.OTP\n\n\tpassword := strings.TrimSpace(c.FormValue(\"password\"))\n\tpasswordVerify := strings.TrimSpace(c.FormValue(\"passwordVerify\"))\n\n\tif len(password) == 0 {\n\t\treturn redirectWithFlashMessage(\"failure\", \"يجب تحديد كيمه السر الجديده\", url, &c)\n\t}\n\tif password != passwordVerify { // checks that the password is equal to the password verification\n\t\t// if not, redirect to /reset-password-by-email with failure flash message\n\t\treturn redirectWithFlashMessage(\"failure\", \"كلمه السر ليست متطابقه\", url, &c)\n\t}\n\n\tdb.GormDB.Table(\"otps\").First(&otp, \"email = ? AND verification_code = ?\", email, hash)\n\totp.Used = true\n\tdb.GormDB.Save(&otp)\n\tdb.GormDB.Where(\"email = ? AND user_id = ?\", email, otp.UserID).Delete(models.OTP{})\n\thashedPassword, _ := bcrypt.GenerateFromPassword([]byte(password), 10) // hash the password that the user entered\n\tdb.GormDB.Model(&models.User{}).Where(\"id = ?\", otp.UserID).Update(\"password\", string(hashedPassword))\n\n\treturn redirectWithFlashMessage(\"success\", \"تم تغيير كلمه السر\", \"/login\", &c)\n}", "title": "" }, { "docid": "0b5d001799bcc6758537278a3888f85e", "score": "0.5877591", "text": "func (u *userService) ResetPassword(data dto.UserChangePasswordRequest) resterr.APIError {\n\tnewPasswordHash, err := u.crypto.GenerateHash(data.NewPassword)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.NewPassword = newPasswordHash\n\n\terr = u.dao.ChangePassword(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b1e9167f84d55c9bd2ee94350f8d3394", "score": "0.5852416", "text": "func (c *Client) ResetPassword(token, password, passwordConfirm string) (err error) {\n\n\t// Basic requirements\n\tif len(token) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s\", fieldToken), http.StatusBadRequest)\n\t\treturn\n\t} else if len(token) <= 10 {\n\t\terr = c.createError(fmt.Sprintf(\"invalid token: %s\", token), http.StatusBadRequest)\n\t\treturn\n\t} else if len(password) == 0 || len(passwordConfirm) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s or %s\", fieldPassword, fieldPasswordConfirm), http.StatusBadRequest)\n\t\treturn\n\t} else if password != passwordConfirm {\n\t\terr = c.createError(\"given passwords don't match\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Start the post data\n\tdata := map[string]string{fieldToken: token, fieldPassword: password, fieldPasswordConfirm: passwordConfirm}\n\n\t// Fire the Request\n\tvar response string\n\tif response, err = c.Request(fmt.Sprintf(\"%s/password/reset\", modelUser), http.MethodPut, data); err != nil {\n\t\treturn\n\t}\n\n\t// Only a 200 is treated as a success\n\terr = c.Error(http.StatusOK, response)\n\treturn\n}", "title": "" }, { "docid": "c51f1d78ce01cba1612c55eddd2493ba", "score": "0.58426356", "text": "func (h *AuthHandlers) Forgot(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading refresh data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tforgotDetails := &authz.ResetDetails{}\n\tif err := json.Unmarshal(data, forgotDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading forgot password data\", 500)\n\t\treturn\n\t}\n\n\tif err := h.validate.Struct(forgotDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tforgotDetails.OrgName = strings.ToLower(forgotDetails.OrgName)\n\tforgotDetails.Username = strings.ToLower(forgotDetails.Username)\n\n\tlog.Info().Str(\"user\", forgotDetails.Username).Str(\"org\", forgotDetails.OrgName).Msg(\"failed to get organization from name\")\n\torgData, err := h.getOrgByName(req.Context(), systemContext, forgotDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password failed\", 403)\n\t\treturn\n\t}\n\n\tlog.Info().Msg(\"calling authenticator.Forgot\")\n\tif err := h.authenticator.Forgot(req.Context(), orgData, forgotDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"forgot password failed\")\n\t\tmiddleware.ReturnError(w, \"forgot password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "title": "" }, { "docid": "6e1a24b145bf1d419dedf3936710897e", "score": "0.58319706", "text": "func resetPassword(w http.ResponseWriter, req *http.Request) {\n\n\tuserData, _ := getUserAndSession(w, req)\n\n\tif !userData.LoggedIn {\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\tif req.Method == http.MethodPost {\n\n\t\t// Get posted password\n\t\tnewPassword := req.FormValue(\"password\")\n\n\t\t// Ecrypt password before storing it. If the encryption errs, respond with\n\t\t// an Internal Server Error.\n\t\tencryptedPassword, err := getEncryptedPassword(newPassword)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Internal server error\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\t// Update user in dbUsers map\n\t\tuserData.Password = encryptedPassword\n\t\tdbUsers[userData.UserID] = userData\n\n\t\t// Redirect to Home page after changing password\n\t\thttp.Redirect(w, req, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\n\ttpl.ExecuteTemplate(w, \"resetPassword.gohtml\", userData)\n}", "title": "" }, { "docid": "8925a50f107a407e5bf71c38980bff0d", "score": "0.58293855", "text": "func SendResetEmail(to string, code string) error {\n\tsubject := \"TrekNext Password Reset\"\n\thtml := fmt.Sprintf(\"<h4>We have received a request to reset the password associated with your email.</h4><p>Here is your reset password link: %s/reset/%s </p>\", environment.CLIENT_URL, code)\n\tfrom := \"noreply@treknext.com\"\n\treturn send(to, subject, html, from)\n}", "title": "" }, { "docid": "80ceadb278dc70ca3440885b97725c1a", "score": "0.5827578", "text": "func ResetPassword() echo.HandlerFunc {\n\treturn func(context echo.Context) error {\n\t\tnewPassword := context.FormValue(\"password\")\n\t\tvar email string\n\t\tvar ok bool\n\t\tif email, ok = context.Get(\"email\").(string); !ok {\n\t\t\tlog.Println(\"Missing email in password reset request\")\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Missing email in password reset request\"))\n\t\t}\n\t\tuser, err := FindByEmail(email)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Cannot find user during password reset: %v\\n\", err)\n\t\t\treturn context.JSON(http.StatusUnauthorized, errors.New(\"Wrong email in password reset request\"))\n\t\t}\n\n\t\thash, bcryptErr := bcrypt.GenerateFromPassword([]byte(newPassword), bcrypt.DefaultCost)\n\t\tif bcryptErr != nil {\n\t\t\tlog.Println(bcryptErr)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\tuser.Hash = string(hash)\n\t\terr = Save(user)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t\treturn context.JSON(http.StatusInternalServerError, errors.New(\"Server error. The password was not changed.\"))\n\t\t}\n\n\t\treturn context.JSON(http.StatusOK, nil)\n\t}\n}", "title": "" }, { "docid": "aa616a140ade75f6672432e3832015c4", "score": "0.58189434", "text": "func (handler *Handler) handlePasswordResetPut(w http.ResponseWriter, r *http.Request) {\n\n\t//Define a local struct to get the email out of the request\n\ttype ResetGet struct {\n\t\tEmail string `json:\"email\"`\n\t\tResetToken string `json:\"reset_token\"`\n\t\tPassword string `json:\"password\"`\n\t}\n\n\t//Create a new password change object\n\tinfo := ResetGet{}\n\n\t//Now get the json info\n\terr := json.NewDecoder(r.Body).Decode(&info)\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\n\t}\n\n\t//Lookup the user id\n\tuser, err := handler.userHelper.GetUserByEmail(info.Email)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Try to use the token\n\trequestId, err := handler.userHelper.CheckForResetToken(user.Id(), info.ResetToken)\n\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusForbidden, false, \"password_change_forbidden\")\n\t\treturn\n\t}\n\n\t//Now update the password\n\terr = handler.userHelper.passwordChangeForced(user.Id(), user.Email(), info.Password)\n\t//Return the error\n\tif err != nil {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t\treturn\n\t}\n\t//Mark the request as used\n\terr = handler.userHelper.UseToken(requestId)\n\n\t//Check to see if the user was created\n\tif err == nil {\n\t\tutils.ReturnJsonStatus(w, http.StatusAccepted, true, \"password_change_success\")\n\t} else {\n\t\tutils.ReturnJsonError(w, http.StatusForbidden, err)\n\t}\n}", "title": "" }, { "docid": "8f951cd35a475d9732c0a5f266bf535c", "score": "0.5813895", "text": "func (h *UserRepos) ResetConfirm(ctx context.Context, w http.ResponseWriter, r *http.Request, params map[string]string) error {\n\n\tresetHash := params[\"hash\"]\n\n\tctxValues, err := webcontext.ContextValues(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t//\n\treq := new(user.UserResetConfirmRequest)\n\tdata := make(map[string]interface{})\n\tf := func() (bool, error) {\n\n\t\tif r.Method == http.MethodPost {\n\t\t\terr := r.ParseForm()\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\tdecoder := schema.NewDecoder()\n\t\t\tif err := decoder.Decode(req, r.PostForm); err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\t// Append the query param value to the request.\n\t\t\treq.ResetHash = resetHash\n\n\t\t\tu, err := h.UserRepo.ResetConfirm(ctx, *req, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tswitch errors.Cause(err) {\n\t\t\t\tcase user.ErrResetExpired:\n\t\t\t\t\twebcontext.SessionFlashError(ctx,\n\t\t\t\t\t\t\"Reset Expired\",\n\t\t\t\t\t\t\"The reset has expired.\")\n\t\t\t\t\treturn false, nil\n\t\t\t\tdefault:\n\t\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\t\treturn false, nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn false, err\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Authenticated the user. Probably should use the default session TTL from UserLogin.\n\t\t\ttoken, err := h.AuthRepo.Authenticate(ctx, user_auth.AuthenticateRequest{\n\t\t\t\tEmail: u.Email,\n\t\t\t\tPassword: req.Password,\n\t\t\t}, time.Hour, ctxValues.Now)\n\t\t\tif err != nil {\n\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\treturn false, nil\n\t\t\t\t} else {\n\t\t\t\t\treturn false, err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Add the token to the users session.\n\t\t\terr = handleSessionToken(ctx, w, r, token)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\n\t\t\t// Redirect the user to the dashboard.\n\t\t\treturn true, web.Redirect(ctx, w, r, \"/\", http.StatusFound)\n\t\t}\n\n\t\t_, err = user.ParseResetHash(ctx, h.SecretKey, resetHash, ctxValues.Now)\n\t\tif err != nil {\n\t\t\tswitch errors.Cause(err) {\n\t\t\tcase user.ErrResetExpired:\n\t\t\t\twebcontext.SessionFlashError(ctx,\n\t\t\t\t\t\"Reset Expired\",\n\t\t\t\t\t\"The reset has expired.\")\n\t\t\t\treturn false, nil\n\t\t\tdefault:\n\t\t\t\tif verr, ok := weberror.NewValidationError(ctx, err); ok {\n\t\t\t\t\tdata[\"validationErrors\"] = verr.(*weberror.Error)\n\t\t\t\t\treturn false, nil\n\t\t\t\t} else {\n\t\t\t\t\treturn false, err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn false, nil\n\t}\n\n\tend, err := f()\n\tif err != nil {\n\t\treturn web.RenderError(ctx, w, r, err, h.Renderer, TmplLayoutBase, TmplContentErrorGeneric, web.MIMETextHTMLCharsetUTF8)\n\t} else if end {\n\t\treturn nil\n\t}\n\n\tdata[\"form\"] = req\n\n\tif verr, ok := weberror.NewValidationError(ctx, webcontext.Validator().Struct(user.UserResetConfirmRequest{})); ok {\n\t\tdata[\"validationDefaults\"] = verr.(*weberror.Error)\n\t}\n\n\treturn h.Renderer.Render(ctx, w, r, TmplLayoutBase, \"user-reset-confirm.gohtml\", web.MIMETextHTMLCharsetUTF8, http.StatusOK, data)\n}", "title": "" }, { "docid": "7b748c8028d6a1a86de7f774cb9c0f5b", "score": "0.5805956", "text": "func (a *UserApiService) V1UsersForgotPasswordPost(ctx _context.Context, localVarOptionals *V1UsersForgotPasswordPostOpts) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v1/users/forgot-password\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"text/json\", \"application/_*+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tif localVarOptionals != nil && localVarOptionals.ResetUserPasswordRequestDto.IsSet() {\n\t\tlocalVarOptionalResetUserPasswordRequestDto, localVarOptionalResetUserPasswordRequestDtook := localVarOptionals.ResetUserPasswordRequestDto.Value().(ResetUserPasswordRequestDto)\n\t\tif !localVarOptionalResetUserPasswordRequestDtook {\n\t\t\treturn nil, reportError(\"resetUserPasswordRequestDto should be ResetUserPasswordRequestDto\")\n\t\t}\n\t\tlocalVarPostBody = &localVarOptionalResetUserPasswordRequestDto\n\t}\n\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "201c4fde8abe069d89cb9cdf5a6b0381", "score": "0.57956994", "text": "func (UserService) ResetPassword(gDto dto.GeneralGetDto) string {\n\tsalt, _ := account.MakeSalt()\n\t//pwd, _ := account.HashPassword(dto.Password, salt)\n\tu := userDao.Get(gDto.Id, false)\n\tautoPwd := utils.RandomPwd(10)\n\tpwd, _ := account.HashPassword(autoPwd, salt)\n\t//u.Password = pwd\n\t//u.Salt = salt\n\tuserDao.Update(&u, map[string]interface{}{\n\t\t\"password\": pwd,\n\t\t\"salt\": salt,\n\t})\n\treturn autoPwd\n}", "title": "" }, { "docid": "b0f4795d683497c872a84322142847fe", "score": "0.5794113", "text": "func (h *AuthHandlers) ForgotConfirm(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading refresh data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tresetDetails := &authz.ResetDetails{}\n\tif err := json.Unmarshal(data, resetDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading forgot_confirm data\", 500)\n\t\treturn\n\t}\n\n\tif err := h.validate.Struct(resetDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tresetDetails.OrgName = strings.ToLower(resetDetails.OrgName)\n\tresetDetails.Username = strings.ToLower(resetDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, resetDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif err := h.authenticator.Reset(req.Context(), orgData, resetDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"forgot password confirm failed\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "title": "" }, { "docid": "1097ae200018b232462a414ae7c13d11", "score": "0.5777921", "text": "func ResetPassword(c *eclcloud.ServiceClient, id string, opts ResetPasswordOpts) (r ResetPasswordResult) {\n\tb, err := opts.ToLoadBalancerActionResetPasswordMap()\n\tif err != nil {\n\t\tr.Err = err\n\t\treturn\n\t}\n\t_, r.Err = c.Post(resetPasswordURL(c, id), b, &r.Body, &eclcloud.RequestOpts{\n\t\tOkCodes: []int{200},\n\t})\n\treturn\n}", "title": "" }, { "docid": "6cb4631442744abfc213ec04af06638e", "score": "0.5770918", "text": "func (w *ServerInterfaceWrapper) Passwordresetverify(ctx echo.Context) error {\n\tvar err error\n\n\t// Invoke the callback with all the unmarshalled arguments\n\terr = w.Handler.Passwordresetverify(ctx)\n\treturn err\n}", "title": "" }, { "docid": "0cce16cf4bc22c68b9a936630165bcfb", "score": "0.57545096", "text": "func (f *Factory) GetResetPasswordMail(token string) *Mail {\n\treturn &Mail{Subject: \"MyInventory: Reset Password\", Body: fmt.Sprintf(fmtResetPasswordBody, f.url, token)}\n}", "title": "" }, { "docid": "ee106f3c165b7b667a2d5fa45a77e7a5", "score": "0.5740196", "text": "func ResetPassword(u datastore.User) {\n\n\tbody := `<h3>Hi, %s!</h3>\n\t\t\t <p>The link below will allow you to reset your password.</p>\n <p>If you didn't ask for this you can ignore this email.</p>\n\t\t\t <p><a href=\"%s\" target=\"_blank\">Reset my password</a></p>\n\t\t\t <p>Happy RTCL-ing</p>`\n\tlink := os.Getenv(\"API_URL\") + \"/users/\" + u.ID.Hex() + \"/reset/\" + u.KeyGen()\n\tbody = fmt.Sprintf(body, u.FirstName, link)\n\n\te := New()\n\te.FromEmail = \"notifier@rtcl.io\"\n\te.FromName = \"RTCL Notifier\"\n\te.Subject = \"RTCL password reset\"\n\te.ToEmail = u.Email\n\te.ToName = u.FirstName + \" \" + u.LastName\n\te.PlainContent = \"Password reset link: \" + link\n\te.HTMLContent = body\n\te.Send()\n}", "title": "" }, { "docid": "828ea906a3ce81d8d71df81e55bc38c5", "score": "0.5714489", "text": "func (a *UserApiService) V1UsersChangeForgottenPasswordPost(ctx _context.Context, localVarOptionals *V1UsersChangeForgottenPasswordPostOpts) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/v1/users/change-forgotten-password\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\", \"text/json\", \"application/_*+json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tif localVarOptionals != nil && localVarOptionals.ResetForgottenUserPasswordRequestDto.IsSet() {\n\t\tlocalVarOptionalResetForgottenUserPasswordRequestDto, localVarOptionalResetForgottenUserPasswordRequestDtook := localVarOptionals.ResetForgottenUserPasswordRequestDto.Value().(ResetForgottenUserPasswordRequestDto)\n\t\tif !localVarOptionalResetForgottenUserPasswordRequestDtook {\n\t\t\treturn nil, reportError(\"resetForgottenUserPasswordRequestDto should be ResetForgottenUserPasswordRequestDto\")\n\t\t}\n\t\tlocalVarPostBody = &localVarOptionalResetForgottenUserPasswordRequestDto\n\t}\n\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "21854299071672c7239cc353d4309ec7", "score": "0.5662505", "text": "func SendResetPasswordMail(c *macaron.Context, u *models.User) {\n\tSendUserMail(c, u, AUTH_RESET_PASSWORD, u.GenerateActivateCode(), c.Tr(\"mail.reset_password\"), \"reset password\")\n}", "title": "" }, { "docid": "20c6d2d04afba5fa056b1df9dce1fad6", "score": "0.5661803", "text": "func PostManageForgotPasswordToken(body interface{}) (AccountTokens, error) {\n\tdata := new(AccountTokens)\n\treq, reqErr := CreateRequest(\"POST\", os.Getenv(\"DOMAIN\")+\"/identity/v2/manage/account/forgot/token\", body)\n\tif reqErr != nil {\n\t\treturn *data, reqErr\n\t}\n\n\treq.Header.Add(\"content-Type\", \"application/json\")\n\treq.Header.Add(\"X-LoginRadius-ApiKey\", os.Getenv(\"APIKEY\"))\n\treq.Header.Add(\"X-LoginRadius-ApiSecret\", os.Getenv(\"APISECRET\"))\n\n\terr := RunRequest(req, data)\n\treturn *data, err\n}", "title": "" }, { "docid": "15212c909c1d571c91793c88cb1951f9", "score": "0.56596047", "text": "func (m *ManagedDeviceItemRequestBuilder) ResetPasscode()(*i15a1a10a0c024f930afef3b930ac6a0a48505b8f50dc765c9208ba2816bfb8fb.ResetPasscodeRequestBuilder) {\n return i15a1a10a0c024f930afef3b930ac6a0a48505b8f50dc765c9208ba2816bfb8fb.NewResetPasscodeRequestBuilderInternal(m.pathParameters, m.requestAdapter);\n}", "title": "" }, { "docid": "d133232fa35092b7892905ce9ee66e41", "score": "0.56592166", "text": "func ForgotPasswordGetHandler(ctx *enliven.Context) {\n\tif !ctx.Enliven.Core.Email.Enabled() {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_forgot_password\")\n}", "title": "" }, { "docid": "294f4da941967806cfc828738491b0e3", "score": "0.56314224", "text": "func (env *Env) ResetUserPassword(c *gin.Context) {\n\n\ttype resetUserPasswordRequest struct {\n\t\tResetCode string `json:\"reset_code\"`\n\t}\n\n\t//decode request body\n\tjsonData, err := ioutil.ReadAll(c.Request.Body)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar request resetUserPasswordRequest\n\terr = json.Unmarshal(jsonData, &request)\n\tif err != nil {\n\t\tLog.WithField(\"module\", \"handler\").WithError(err)\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, errs.RQST001)\n\t\treturn\n\t}\n\n\tvar user mysql.User\n\tuser.Username = c.Param(\"username\")\n\tuser.ResetCode = request.ResetCode\n\n\tvar exists int64\n\n\t//Check if Username exists in Database\n\tresult := env.db.Model(&user).Where(\"upper(username) = upper(?)\", user.Username).Count(&exists)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\treturn\n\t}\n\n\tif exists == 0 {\n\t\tLog.WithField(\"module\", \"handler\").Error(\"Username not found in Database\")\n\t\tc.AbortWithStatusJSON(http.StatusNotFound, errs.AUTH006)\n\t\treturn\n\t}\n\n\t//Check Database if ResetCode is correct\n\tresult = env.db.Where(\"upper(username) = upper(?) and reset_code = ?\", user.Username, user.ResetCode).First(&user)\n\tif result.Error != nil {\n\t\tif errors.Is(result.Error, gorm.ErrRecordNotFound) {\n\t\t\tLog.WithField(\"module\", \"handler\").Error(\"ResetCode Username combination not found (incorrect)\")\n\t\t\tc.AbortWithStatusJSON(http.StatusUnauthorized, errs.AUTH007)\n\t\t\treturn\n\t\t} else {\n\t\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ001)\n\t\t\treturn\n\t\t}\n\t}\n\n\t//Reset Password in Database\n\tuser.Password = \"RESET\"\n\tuser.PasswordReset = true\n\tresult = env.db.Save(&user)\n\tif result.Error != nil {\n\t\tLog.WithField(\"module\", \"sql\").WithError(result.Error)\n\t\tc.AbortWithStatusJSON(http.StatusInternalServerError, errs.DBSQ004)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "20c80839317c0007d90f78707f3c4675", "score": "0.5630693", "text": "func SendResetToken(qr db.Queryer, email, resetURL string) error {\n\tt, err := genResetToken(qr, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttok := encodeResetToken(t)\n\n\trurl := fmt.Sprintf(\"%s?t=%s\", resetURL, tok)\n\tmailer := smtp.SMTP{}\n\n\tfname := fmt.Sprintf(\"%v/%v\", defTemplatePath, \"resetpass.html\")\n\ttmp, err := template.ParseFiles(fname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tp := struct {\n\t\tLink string\n\t}{Link: rurl}\n\tvar b bytes.Buffer\n\terr = tmp.Execute(&b, p)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn mailer.Send(\"Password Reset\", b.String(), nil, email)\n}", "title": "" }, { "docid": "f338f3ac44cb97d554238c07c4e13a4e", "score": "0.56277597", "text": "func (c *Client) VerifyResetPassword(vrp www.VerifyResetPassword) (*www.VerifyResetPasswordReply, error) {\n\trespBody, err := c.makeRequest(http.MethodPost, www.PoliteiaWWWAPIRoute,\n\t\twww.RouteVerifyResetPassword, vrp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar reply www.VerifyResetPasswordReply\n\terr = json.Unmarshal(respBody, &reply)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unmarshal VerifyResetPasswordReply: %v\", err)\n\t}\n\n\tif c.cfg.Verbose {\n\t\terr := prettyPrintJSON(reply)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn &reply, nil\n}", "title": "" }, { "docid": "0c2c80e54560959d732d5fee51f0afff", "score": "0.5626569", "text": "func (u *UserTest) ResetPassword(password string) error {\n\treturn nil\n}", "title": "" }, { "docid": "6cc3a960aeb23ff22b4b8193cc4da57c", "score": "0.56231815", "text": "func (UserSvc *UserSvc) ForgotPassword(ctx context.Context, req *pb.ForgotPasswordReq) (*pb.ForgotPasswordRes, error) {\n\tconn, err := grpc.Dial(UserSvc.serverURL, grpc.WithInsecure())\n\tif err != nil {\n\t\treturn nil, errs.GRPCDialError(err)\n\t}\n\tdefer conn.Close()\n\tclient := pb.NewUserSvcClient(conn)\n\tres, err := client.ForgotPassword(ctx, req)\n\tif err != nil {\n\t\treturn nil, errs.WithMessage(err, \"client.ForgotPassword\")\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "07ad814d052122d3c93025604311978e", "score": "0.5619339", "text": "func (u *UserController) ResetLink(c *gin.Context) {\n\tvar data forms.ResendCommand\n\n\tif (c.BindJSON(&data)) != nil {\n\t\tc.JSON(400, gin.H{\"message\": \"Provided all fields\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresult, err := userModel.GetUserByEmail(data.Email)\n\n\tif result.Email == \"\" {\n\t\tc.JSON(404, gin.H{\"message\": \"User account was not found\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\tc.JSON(500, gin.H{\"message\": \"Something wrong happened, try again later\"})\n\t\tc.Abort()\n\t\treturn\n\t}\n\n\tresetToken, _ := services.GenerateNonAuthToken(result.Email)\n\n\tlink := \"http://localhost:5000/api/v1/password-reset?reset_token=\" + resetToken\n\tbody := \"Here is your reset <a href='\" + link + \"'>link</a>\"\n\thtml := \"<strong>\" + body + \"</strong>\"\n\n\temail := services.SendMail(\"Reset Password\", body, result.Email, html, result.Name)\n\n\tif email == true {\n\t\tc.JSON(200, gin.H{\"messsage\": \"Check mail\"})\n\t\tc.Abort()\n\t} else {\n\t\tc.JSON(500, gin.H{\"message\": \"An issue occured sending you an email\"})\n\t\tc.Abort()\n\t}\n}", "title": "" }, { "docid": "b3543d2059cbdfd244d0ce569bb9eb5b", "score": "0.5615918", "text": "func (c *Client) ResetFailed() error {\n\turi := c.formURI(\"/api/v1/reset/failed\")\n\treturn c.getBasicResponse(uri, &Response{})\n}", "title": "" }, { "docid": "d1c38a6dd928ecaaae5bef03f56c6838", "score": "0.56156015", "text": "func RecycleToken(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"Received a PATCH. Will recycle token if request is valid.\")\n\n}", "title": "" }, { "docid": "e8ecfba0bbd9172fa12f9a460a0e6e07", "score": "0.5612836", "text": "func (a *UserApiService) ResetPasswordExecute(r UserApiResetPasswordRequest) (*User, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *User\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"UserApiService.ResetPassword\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/password\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.resetPasswordRequest == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"resetPasswordRequest is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.resetPasswordRequest\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v Error\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tvar v Error\n\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\tif err != nil {\n\t\t\tnewErr.error = err.Error()\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\tnewErr.model = v\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "12984655b08ba4fa2187736c596db0c4", "score": "0.5607127", "text": "func ForgotPasswordHandler(repo UpdatePasswordOrganizationRepository, mailer mail.Mailer, jm *JWTManager) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tvar handlerForm map[string]string\n\n\t\terr := requestToJSONObject(r, &handlerForm)\n\t\tif err != nil {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, err)\n\t\t\treturn\n\t\t}\n\n\t\torganization, err := repo.GetByEmail(handlerForm[\"email\"])\n\t\tif organization == nil {\n\t\t\tHandleHTTPError(w, http.StatusUnauthorized, errors.New(\"Não há organização com este email\"))\n\t\t\treturn\n\t\t}\n\n\t\tp := []string{model.PasswordResetPermission}\n\t\ttoken, err := jm.CreateToken(organization.User, &p)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\temailParams := mail.EmailParams{\n\t\t\tTo: organization.User.Email,\n\t\t\tSubject: \"Esqueci minha senha\",\n\t\t\tTemplate: mail.ForgotPasswordTemplate,\n\t\t\tVariables: map[string]string{\n\t\t\t\t\"name\": organization.Name,\n\t\t\t\t\"link\": os.Getenv(\"FRONTEND_URL\") + \"/recover-password/\" + token,\n\t\t\t},\n\t\t}\n\n\t\tif err := mailer.SendEmail(emailParams); err != nil {\n\t\t\tHandleHTTPError(w, http.StatusBadRequest, errors.New(\"Falha ao enviar o email\"))\n\t\t\treturn\n\t\t}\n\n\t\tHandleHTTPSuccessNoContent(w)\n\t}\n}", "title": "" }, { "docid": "2d6697a8e8587305cb7b542326590fdf", "score": "0.5603485", "text": "func Forgot(c *fiber.Ctx) error {\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttoken := RunesRandString(12)\n\n\tpasswordReset := models.PasswordReset{\n\t\tEmail: data[\"email\"],\n\t\tToken: token,\n\t}\n\n\tdatabase.DB.Create(&passwordReset)\n\n\tvar creds credentials.AuthCreds\n\tcreds.GetCreds()\n\n\tfrom := creds.Email\n\tpassword := creds.Password\n\n\tto := []string{\n\t\tdata[\"email\"],\n\t}\n\n\turl := string(\"http://localhost:3000/reset/\" + token)\n\n\tmessage := `Subject: Password Reset for Notes App!\n\n\t\t\t\tClick on the link below to reset the password: \n\t\t\t\t<a href=\"` + url + `\"></a>\n\t\t\t\t`\n\n\tsmtpServer := models.SMTPServer{\n\t\tHost: \"smtp.gmail.com\",\n\t\tPort: \"587\",\n\t}\n\n\tauth := smtp.PlainAuth(\"\", from, password, smtpServer.Host)\n\n\terr = smtp.SendMail(smtpServer.AddressUpdate(), auth, from, to, []byte(message))\n\n\tif err != nil {\n\t\treturn c.JSON(fiber.Map{\n\t\t\t\"message\": \"Unable to reset password.\",\n\t\t})\n\t}\n\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"An email has been sent for resetting the password. \\n Please check your spam folder if you do not see the email in your inbox!\",\n\t})\n}", "title": "" }, { "docid": "fb1c36d0e633db512c9fc7bee6b3370d", "score": "0.5600329", "text": "func (s *UsersService) ResetPassword(ctx context.Context, realm, userID string, credential *Credential) (*http.Response, error) {\n\tu := fmt.Sprintf(\"admin/realms/%s/users/%s/reset-password\", realm, userID)\n\treq, err := s.keycloak.NewRequest(http.MethodPut, u, credential)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.keycloak.Do(ctx, req, nil)\n}", "title": "" }, { "docid": "bfd74387d526615d3fe9e189821f34f5", "score": "0.5574485", "text": "func (c *Client) Reset() (*http.Response, error) {\n\treturn c.post(\"/reset\", nil)\n}", "title": "" }, { "docid": "8eb07b4aabbaecd1532b805b3e26dd0d", "score": "0.5548934", "text": "func (c *Client) ForgotPassword(emailAddress string) (err error) {\n\n\t// Basic requirements\n\tif len(emailAddress) == 0 {\n\t\terr = c.createError(fmt.Sprintf(\"missing required attribute: %s\", fieldEmail), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Start the post data\n\tdata := map[string]string{fieldEmail: emailAddress}\n\n\t// Fire the Request\n\tvar response string\n\tif response, err = c.Request(fmt.Sprintf(\"%s/password/forgot\", modelUser), http.MethodPost, data); err != nil {\n\t\treturn\n\t}\n\n\t// Only a 200 is treated as a success\n\terr = c.Error(http.StatusOK, response)\n\treturn\n}", "title": "" }, { "docid": "c1071faa84a108624132de3ca055b260", "score": "0.5548156", "text": "func (c *Client) ResetPassword(uid string) (string, error) {\n\n\toptions := map[string]interface{}{\n\t\t\"no_members\": false,\n\t\t\"random\": true,\n\t\t\"all\": true}\n\n\tres, err := c.rpc(\"user_mod\", []string{uid}, options)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar userRec UserRecord\n\terr = json.Unmarshal(res.Result.Data, &userRec)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(userRec.Randompassword) == 0 {\n\t\treturn \"\", errors.New(\"ipa: failed to reset user password. empty random password returned\")\n\t}\n\n\treturn userRec.Randompassword, nil\n}", "title": "" }, { "docid": "1cc1581329578f394eeea899300f9fb8", "score": "0.5535111", "text": "func ResetPassword(db db.Storer, email, tok, newpass string) error {\n\tvalid, err := verifyResetToken(db, email, tok)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !valid {\n\t\treturn fmt.Errorf(\"Invalid reset token\")\n\t}\n\n\tuser, err := GetUserWithEmail(db, email)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif Ispasswordmatchwithprevfivepass(db, user.UserID, newpass) {\n\t\treturn errors.New(\"History says that you have used this new password in the past\")\n\t}\n\n\treturn UpdatePassword(db, user.UserID, newpass)\n}", "title": "" }, { "docid": "87ef366426b6776c97c46e5f5217cff2", "score": "0.5499651", "text": "func SendResetLink(ctx context.Context, email, link string) error {\n\tif utils.IsDev(ctx) {\n\t\treturn nil\n\t}\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", config.GetConfig().Mail.Username)\n\tm.SetHeader(\"To\", email)\n\tm.SetHeader(\"Subject\", \"来自AirBox的重置密码申请!\")\n\tcontent := \"<!DOCTYPE html PUBLIC \\\"-//W3C//DTD XHTML 1.0 Strict//EN\\\" \\\"http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd\\\">\\n\" +\n\t\t\"<html lang=\\\"en\\\">\\n\" +\n\t\t\"<head>\\n\" +\n\t\t\" <meta charset=\\\"UTF-8\\\">\\n\" +\n\t\t\" <title>来自<a href=\\\"\\\">AirBox</a>的重置密码申请</title>\\n\" +\n\t\t\" <meta name=\\\"viewport\\\" content=\\\"width=device-width, initial-scale=1.0\\\"/>\\n\" +\n\t\t\"</head>\\n\" +\n\t\t\"<body style=\\\"padding: 0;\\\">\\n\" +\n\t\t\"<table width=\\\"700\\\" border=\\\"0\\\" align=\\\"center\\\" cellspacing=\\\"0\\\" style=\\\"width:700px;\\\">\\n\" +\n\t\t\" <tbody>\\n\" +\n\t\t\" <tr>\\n\" +\n\t\t\" <td>\\n\" +\n\t\t\" <div style=\\\"width:680px;padding:0 10px;margin:0 auto;\\\">\\n\" +\n\t\t\" <div style=\\\"line-height:1.5;font-size:14px;margin-bottom:25px;color:#4d4d4d;\\\">\\n\" +\n\t\t\" <strong style=\\\"display:block;margin-bottom:15px;\\\">\\n\" +\n\t\t\" 亲爱的用户:\\n\" +\n\t\t\" <span style=\\\"color:rgb(129, 65, 134);font-size: 16px;\\\">\" + email + \"</span>\\n\" +\n\t\t\" </strong>\\n\" +\n\t\t\" <strong style=\\\"display:block;margin-bottom:15px;\\\">\\n\" +\n\t\t\" 您重置密码的链接是:\\n\" +\n\t\t\" <span style=\\\"font-size: 12px\\\"><br>\" +\n\t\t\" <a style=\\\"color: #ff0000\\\" href=\\\"\" + link + \"\\\">\" + link + \"</a>\" +\n\t\t\" </span>\\n\" +\n\t\t\" </strong>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" <div style=\\\"margin-bottom:30px;\\\">\\n\" +\n\t\t\" <small style=\\\"display:block;margin-bottom:20px;font-size:12px;\\\">\\n\" +\n\t\t\" <p style=\\\"color:#747474;\\\">\\n\" +\n\t\t\" 注意:此操作会泄露您的密码。如非本人操作,请及时登录并修改密码以保证帐户安全\\n\" +\n\t\t\" </p>\\n\" +\n\t\t\" </small>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" </div>\\n\" +\n\t\t\" </td>\\n\" +\n\t\t\" </tr>\\n\" +\n\t\t\" </tbody>\\n\" +\n\t\t\"</table>\\n\" +\n\t\t\"</body>\\n\" +\n\t\t\"</html>\"\n\tm.SetBody(\"text/html\", content)\n\treturn pkg.GetMail().DialAndSend(m)\n}", "title": "" }, { "docid": "407fb3c42ae1c2d29cfef66caf378c60", "score": "0.5499584", "text": "func (u *Users) ResetPw(w http.ResponseWriter, r *http.Request) {\n\tvar vd views.Data\n\tvar form ResetPwForm\n\tvd.Yield = &form\n\tif err := parseURLParams(r, &form); err != nil {\n\t\tvd.SetAlert(err)\n\t}\n\tu.ResetPwView.Render(w, r, vd)\n}", "title": "" }, { "docid": "3efb992a73e5321981c164edb657cf69", "score": "0.54614645", "text": "func SetResetPasswordData(resetPasswordDataObj []ResetPasswordData) {\n\tresetPassReq = resetPasswordDataObj\n}", "title": "" }, { "docid": "ef037762e67a5758a75789bb94116ee7", "score": "0.54605085", "text": "func ForgotPassword(w http.ResponseWriter, r *http.Request) {\n\tbody, err := ioutil.ReadAll(r.Body)\n\tvar fPass models.Password\n\terr = json.Unmarshal(body, &fPass)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\tuser := auth.EmailPassword(fPass.Email)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\t// VErify Email in db\n\tvar otp string\n\tif user == true {\n\t\tfmt.Println(\"user exist\")\n\t\totp, err = security.GenerateCode(\"sakldgofsagofiusahf\", time.Now())\n\t\t// otp = security.GenerateOTP()\n\t\temail.SendEmail2(fPass.Email, otp)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t}\n\t\tfmt.Println(otp)\n\t}\n\tif user == false {\n\t\tfmt.Println(\"user dose not exist !!\")\n\t\tresponses.JSON(w, http.StatusBadRequest, nil)\n\t}\n\t// Generate OTP and send email'\n\n\tresponses.JSON(w, http.StatusOK, otp)\n}", "title": "" }, { "docid": "dace03f572b12ab5acd3e0076f7506fb", "score": "0.5430055", "text": "func (r apiResetPasswordRequest) Execute() (NewPassword, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue NewPassword\n\t)\n\n\tlocalBasePath, err := r.apiService.client.cfg.ServerURLWithContext(r.ctx, \"ManagementApiService.ResetPassword\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/reset_password\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\tif r.ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := r.ctx.Value(ContextAPIKeys).(map[string]APIKey); ok {\n\t\t\tif auth, ok := auth[\"Authorization\"]; ok {\n\t\t\t\tvar key string\n\t\t\t\tif auth.Prefix != \"\" {\n\t\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t\t} else {\n\t\t\t\t\tkey = auth.Key\n\t\t\t\t}\n\t\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t\t}\n\t\t}\n\t}\n\treq, err := r.apiService.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := r.apiService.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 204 {\n\t\t\tvar v NewPassword\n\t\t\terr = r.apiService.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = r.apiService.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "2319ac3b1895abab474772795577147e", "score": "0.54285085", "text": "func ForgotPasswordPostHandler(ctx *enliven.Context) {\n\tif !ctx.Enliven.Core.Email.Enabled() {\n\t\tctx.Forbidden()\n\t\treturn\n\t}\n\n\tctx.Request.ParseForm()\n\tvar errors []FormError\n\temail := strings.TrimSpace(ctx.Request.Form.Get(\"email\"))\n\n\tif !govalidator.IsEmail(email) {\n\t\terrors = append(errors, FormError{\n\t\t\tMessage: \"The provided email address is invalid.\",\n\t\t\tField: \"email\",\n\t\t})\n\t}\n\n\tif len(errors) > 0 {\n\t\tjsonResponse, _ := json.Marshal(errors)\n\t\tctx.Strings[\"FormErrors\"] = string(jsonResponse[:])\n\t} else {\n\t\t// Even if we can't find the requested email, we will pretend we found it for security purposes.\n\t\tctx.Strings[\"EmailAddress\"] = email\n\t\tdb := database.GetDatabase()\n\t\tconf := config.GetConfig()\n\n\t\tu := User{}\n\t\tdb.Where(\"Email = ?\", email).First(&u)\n\t\tif u.ID != 0 {\n\t\t\t// Setting a verification code for this user.\n\t\t\tverificationCode, _ := randutil.AlphaString(32)\n\t\t\tu.VerificationCode = verificationCode\n\t\t\tdb.Save(&u)\n\n\t\t\t// Rendering the email that we're going to send to the user.\n\t\t\ttemplateData := map[string]interface{}{\n\t\t\t\t\"User\": u,\n\t\t\t\t\"Context\": ctx,\n\t\t\t\t\"Config\": conf,\n\t\t\t}\n\t\t\tvar bMessage bytes.Buffer\n\t\t\teerr := ctx.Enliven.Core.TemplateManager.BaseTemplate.ExecuteTemplate(&bMessage, \"user_forgot_password_email\", templateData)\n\t\t\tif eerr != nil {\n\t\t\t\tfmt.Println(eerr.Error())\n\t\t\t}\n\n\t\t\t// Sending the email.\n\t\t\temail := ctx.Enliven.Core.Email.New()\n\t\t\temail.AddRecipient(u.Email)\n\t\t\temail.Subject = conf[\"site_name\"] + \": Password Reset Request\"\n\t\t\temail.Message = bMessage.String()\n\t\t\terr := email.Send()\n\t\t\tif err != nil {\n\t\t\t\tfmt.Println(err.Error())\n\t\t\t}\n\t\t}\n\t}\n\n\tctx.ExecuteBaseTemplate(\"user_forgot_password\")\n}", "title": "" }, { "docid": "585c4639dc35c97e286304c06c9f3796", "score": "0.5422148", "text": "func (p *politeiawww) processVerifyResetPassword(vrp www.VerifyResetPassword) (*www.VerifyResetPasswordReply, error) {\n\tlog.Tracef(\"processVerifyResetPassword: %v %v\",\n\t\tvrp.Username, vrp.VerificationToken)\n\n\t// Lookup user\n\tu, err := p.db.UserGetByUsername(vrp.Username)\n\tif err != nil {\n\t\tif err == user.ErrUserNotFound {\n\t\t\terr = www.UserError{\n\t\t\t\tErrorCode: www.ErrorStatusUserNotFound,\n\t\t\t}\n\t\t}\n\t\treturn nil, err\n\t}\n\n\t// Validate verification token\n\ttoken, err := hex.DecodeString(vrp.VerificationToken)\n\tif err != nil {\n\t\tlog.Debugf(\"processVerifyResetPassword: decode hex '%v': %v\",\n\t\t\tvrp.VerificationToken, err)\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenInvalid,\n\t\t}\n\t}\n\tif !bytes.Equal(token, u.ResetPasswordVerificationToken) {\n\t\tlog.Debugf(\"processVerifyResetPassword: wrong token: %v %v\",\n\t\t\thex.EncodeToString(token),\n\t\t\thex.EncodeToString(u.ResetPasswordVerificationToken))\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenInvalid,\n\t\t}\n\t}\n\tif u.ResetPasswordVerificationExpiry < time.Now().Unix() {\n\t\tlog.Debugf(\"processVerifyResetPassword: token expired: %v %v\",\n\t\t\tu.ResetPasswordVerificationExpiry, time.Now().Unix())\n\t\treturn nil, www.UserError{\n\t\t\tErrorCode: www.ErrorStatusVerificationTokenExpired,\n\t\t}\n\t}\n\n\t// The client should be hashing the password before sending\n\t// it to politeiawww. This validation is only relevant if the\n\t// client failed to hash the password or does not include a\n\t// password in the request.\n\terr = validatePassword(vrp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Hash the new password\n\thashedPassword, err := p.hashPassword(vrp.NewPassword)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Update the user\n\tu.ResetPasswordVerificationToken = nil\n\tu.ResetPasswordVerificationExpiry = 0\n\tu.HashedPassword = hashedPassword\n\tu.FailedLoginAttempts = 0\n\n\terr = p.db.UserUpdate(*u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &www.VerifyResetPasswordReply{}, nil\n}", "title": "" }, { "docid": "c9757639d4e68bab449f48c1c5f38b98", "score": "0.54144037", "text": "func (*ResetPasswordRequest) Descriptor() ([]byte, []int) {\n\treturn file_management_proto_rawDescGZIP(), []int{33}\n}", "title": "" }, { "docid": "714899c5cb879d4c02345911670c7d76", "score": "0.5371037", "text": "func (as *Server) Reset(w http.ResponseWriter, r *http.Request) {\n\tswitch {\n\tcase r.Method == \"POST\":\n\t\tu := ctx.Get(r, \"user\").(models.User)\n\t\tu.ApiKey = auth.GenerateSecureKey(auth.APIKeyLength)\n\t\terr := models.PutUser(&u)\n\t\tif err != nil {\n\t\t\thttp.Error(w, \"Error setting API Key\", http.StatusInternalServerError)\n\t\t} else {\n\t\t\tJSONResponse(w, models.Response{Success: true, Message: \"API Key successfully reset!\", Data: u.ApiKey}, http.StatusOK)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "7513a7504cb435fd1610d36332fd87d0", "score": "0.5370714", "text": "func ResetPassword(ticket *Task) {\n\n\tprintln(\"Login: \", ticket.User)\n\tpassword := newPassword(20)\n\tprintln(\"Password :\", password)\n\tcommand := exec.Command(\"PowerShell\", \"-Command\", \"Set-ADAccountPassword\", \"-Identity \"+ticket.User, \"-Reset\", \"-NewPassword (ConvertTo-SecureString -AsPlainText \"+password+\" -Force)\")\n\terr := run(command, ticket)\n\tif err != nil {\n\t\tprintln(\"Error\")\n\t\tchangeStatus(ticket, \"error\")\n\t\tsend(err.Error(), \"Error detected \"+\"For support\", \"governorandclerk@gmail.com\")\n\t\t//log.Fatal(err)\n\t} else {\n\t\tsend(\"Password has been reset\\n\"+\"New password is :\"+password+\"\\n Verify your connection: RDP 35.231.245.199\", \"Reset password for account \"+ticket.User, ticket.Email)\n\t\tchangeStatus(ticket, \"done\")\n\t\tprintln(\"Action: password has been reset\")\n\t\tfmt.Println(\"Done\")\n\t}\n}", "title": "" }, { "docid": "1e30347b6b42f32c223a1d276106a2a7", "score": "0.53671986", "text": "func TestDvLIRClient_AllowResetWithPwd(t *testing.T) {\n\tip := viper.GetString(\"IPAddress\")\n\tpw := viper.GetString(\"Password\")\n\n\tdvlirClient, err := NewDvLIRClient(ip, pw)\n\tif !assert.NoError(t, err, \"Error while creating Api client\") {\n\t\treturn\n\t}\n\n\terr = dvlirClient.Login()\n\tif !assert.NoError(t, err, \"Error during Login\") {\n\t\treturn\n\t}\n\n\tres, err := dvlirClient.AllowResetWithPwd(\"Yes\")\n\tif !assert.NoError(t, err, \"Error while while changing saving interval\") {\n\t\treturn\n\t}\n\n\tfmt.Println(res)\n\n\tdefer func() {\n\t\terr = dvlirClient.Logout()\n\t\tif !assert.NoError(t, err, \"Error during Logout\") {\n\t\t\treturn\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "64230646cca6cdeae1a5ca50c87b3165", "score": "0.53371364", "text": "func (ibmAnalyticsEngineApi *IbmAnalyticsEngineApiV2) ResetClusterPassword(resetClusterPasswordOptions *ResetClusterPasswordOptions) (result *AnalyticsEngineResetClusterPasswordResponse, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(resetClusterPasswordOptions, \"resetClusterPasswordOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(resetClusterPasswordOptions, \"resetClusterPasswordOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpathSegments := []string{\"v2/analytics_engines\", \"reset_password\"}\n\tpathParameters := []string{*resetClusterPasswordOptions.InstanceGuid}\n\n\tbuilder := core.NewRequestBuilder(core.POST)\n\t_, err = builder.ConstructHTTPURL(ibmAnalyticsEngineApi.Service.Options.URL, pathSegments, pathParameters)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range resetClusterPasswordOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"ibm_analytics_engine_api\", \"V2\", \"ResetClusterPassword\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tresponse, err = ibmAnalyticsEngineApi.Service.Request(request, make(map[string]interface{}))\n\tif err == nil {\n\t\tm, ok := response.Result.(map[string]interface{})\n\t\tif !ok {\n\t\t\terr = fmt.Errorf(\"an error occurred while processing the operation response\")\n\t\t\treturn\n\t\t}\n\t\tresult, err = UnmarshalAnalyticsEngineResetClusterPasswordResponse(m)\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "fd217415cff5eac448e01bb03e850af0", "score": "0.5323957", "text": "func (h *AuthHandlers) ChangePwd(w http.ResponseWriter, req *http.Request) {\n\tvar err error\n\tvar data []byte\n\n\tsystemContext, err := h.getSystemContext(req)\n\tif err != nil {\n\t\tlog.Error().Err(err).Msg(\"request context retrevial failure\")\n\t\tmiddleware.ReturnError(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tif data, err = ioutil.ReadAll(req.Body); err != nil {\n\t\tlog.Error().Err(err).Msg(\"read body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tdefer req.Body.Close()\n\n\tloginDetails := &authz.LoginDetails{}\n\tif err := json.Unmarshal(data, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Msg(\"marshal body error\")\n\t\tmiddleware.ReturnError(w, \"error reading changepwd data\", 500)\n\t\treturn\n\t}\n\tlog.Info().Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"changepwd called\")\n\tif err := h.validate.Struct(loginDetails); err != nil {\n\t\tmiddleware.ReturnError(w, \"validation failure \"+err.Error(), 500)\n\t\treturn\n\t}\n\n\tloginDetails.OrgName = strings.ToLower(loginDetails.OrgName)\n\tloginDetails.Username = strings.ToLower(loginDetails.Username)\n\n\torgData, err := h.getOrgByName(req.Context(), systemContext, loginDetails.OrgName)\n\tif err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"failed to get organization from name\")\n\t\tmiddleware.ReturnError(w, \"forgot password confirm failed\", 403)\n\t\treturn\n\t}\n\n\tif _, err := h.authenticator.SetNewPassword(req.Context(), orgData, loginDetails); err != nil {\n\t\tlog.Error().Err(err).Str(\"org\", loginDetails.OrgName).Str(\"user\", loginDetails.Username).Msg(\"set new password failed\")\n\t\tmiddleware.ReturnError(w, \"set new password failed\", 403)\n\t\treturn\n\t}\n\n\tresp := make(map[string]string, 0)\n\tresp[\"status\"] = \"ok\"\n\n\trespData, _ := json.Marshal(resp)\n\tw.WriteHeader(200)\n\tfmt.Fprint(w, string(respData))\n}", "title": "" } ]
1ea7ddb47ea7914fb967dfd9988c0224
Validate inspects the fields of the type to determine if they are valid.
[ { "docid": "2ec1b954e6e93bddb6f1f881035043f8", "score": "0.0", "text": "func (s *UpdateUserInput) Validate() error {\n\tinvalidParams := aws.ErrInvalidParams{Context: \"UpdateUserInput\"}\n\n\tif s.AccountId == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"AccountId\"))\n\t}\n\n\tif s.UserId == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"UserId\"))\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "688d7853ed3208baf26b81a87e38b975", "score": "0.6708204", "text": "func (m *FieldsToEvaluate) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "26912e70bc3feaebb03a8bba7eb3ae48", "score": "0.65051866", "text": "func Validate(o interface{}) (bool, []error) {\n\tvar err []error\n\tv := reflect.ValueOf(o)\n\n\tif v.Kind() == reflect.Ptr {\n\t\tv = v.Elem()\n\t}\n\n\tif v.Kind() != reflect.Struct {\n\t\tfmt.Println(v.Kind().String())\n\t\terr = append(err, fmt.Errorf(\"Type %#q is not a struct\", v.Type().Name()))\n\t\treturn false, err\n\t}\n\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tf := v.Type().Field(i)\n\t\tfv := v.FieldByName(f.Name)\n\n\t\tswitch fv.Kind() {\n\t\tcase reflect.Array:\n\t\tcase reflect.Interface:\n\t\tcase reflect.Slice:\n\t\tcase reflect.Struct:\n\t\t\tif reflect.DeepEqual(v.Interface(), fv.Interface()) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif len(f.Tag) > 0 {\n\t\t\terr = append(err, validateField(f, v.FieldByName(f.Name))...)\n\t\t}\n\t}\n\n\treturn len(err) == 0, err\n}", "title": "" }, { "docid": "bc730beb9b72cffd28a1e47f71015a37", "score": "0.64170355", "text": "func Validate(obj interface{}) error {\n\n\ttyp := reflect.TypeOf(obj)\n\tvalue := reflect.ValueOf(obj)\n\n\t// Check to ensure we are getting a valid\n\t// pointer for manipulation.\n\tif typ.Kind() == reflect.Ptr {\n\t\ttyp = typ.Elem()\n\t\tvalue = value.Elem()\n\t}\n\n\t// Kill process if obj did not pass in a scruct.\n\t// This happens when a pointer passed in.\n\tif value.Kind() != reflect.Struct {\n\t\treturn nil\n\t}\n\n\tfor i := 0; i < typ.NumField(); i++ {\n\n\t\tfield := typ.Field(i)\n\t\tfieldValue := value.Field(i).Interface()\n\t\tzero := reflect.Zero(field.Type).Interface()\n\n\t\t// Validate nested and embedded structs (if pointer, only do so if not nil)\n\t\tif field.Type.Kind() == reflect.Struct ||\n\t\t\t(field.Type.Kind() == reflect.Ptr && !reflect.DeepEqual(zero, fieldValue)) {\n\t\t\tif err := Validate(fieldValue); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tif field.Tag.Get(\"validate\") != \"\" || field.Tag.Get(\"binding\") != \"\" {\n\t\t\t// Break validate field into array\n\t\t\tarray := strings.Split(field.Tag.Get(\"validate\"), \"|\")\n\n\t\t\t// Legacy Support for binding.\n\t\t\tif array[0] == \"\" {\n\t\t\t\tarray = strings.Split(field.Tag.Get(\"binding\"), \"|\")\n\t\t\t}\n\n\t\t\t// Do the hard work of checking all assertions\n\t\t\tfor setting := range array {\n\n\t\t\t\tmatch := array[setting]\n\n\t\t\t\t//Check that value was passed in and is not required.\n\t\t\t\tif match != \"required\" && null(fieldValue) == true {\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\tswitch {\n\t\t\t\tcase \"required\" == match:\n\t\t\t\t\tif err := required(field, fieldValue, zero); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"email\" == match:\n\t\t\t\t\tif err := regex(`regex:^[a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\\.[a-zA-Z0-9-.]+$`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"url\" == match:\n\t\t\t\t\tif err := regex(`regex:/^(https?:\\/\\/)?([\\da-z\\.-]+)\\.([a-z\\.]{2,6})([\\/\\w \\.-]*)*\\/?$/`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alpha\" == match:\n\t\t\t\t\tif err := regex(`regex:\\p{L}`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alphadash\" == match:\n\t\t\t\t\tif err := regex(`regex:^[a-zA-Z0-9_]*$`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase \"alphanumeric\" == match:\n\t\t\t\t\tif err := regex(`regex:/[0-9a-zA-Z]/`, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"min:\"):\n\t\t\t\t\tif err := min(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"max:\"):\n\t\t\t\t\tif err := max(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"in:\"):\n\t\t\t\t\tif err := in(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"regex:\"):\n\t\t\t\t\tif err := regex(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"length:\"):\n\t\t\t\t\tif err := length(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tcase strings.HasPrefix(match, \"length_between:\"):\n\t\t\t\t\tif err := length_between(match, fieldValue); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"The field \" + match + \" is not a valid validation check.\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "db7366c28b71403d4f487d5c870ee7fc", "score": "0.6389814", "text": "func (model HCN) ValidateFields(structFields ...[]string) (bool, error) {\n\tif len(structFields) == 0 {\n\t\treturn helper.ValidateFields(model)\n\t}\n\treturn helper.ValidateFields(model, structFields[0])\n}", "title": "" }, { "docid": "f1b9112662188e05dd6a26d5fb3ce152", "score": "0.63872087", "text": "func ValidateFields(payload map[string]interface{}) error {\n\tvar err error\n\tfor key, value := range payload {\n\t\tswitch v := value.(type) {\n\t\tcase float64:\n\t\t\tif v == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase string:\n\t\t\tif v == \"\" {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase map[string]interface{}:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase []interface{}:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tcase []string:\n\t\t\tif len(v) == 0 {\n\t\t\t\terr = fmt.Errorf(\"%q cannot be empty\", key)\n\t\t\t}\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"invalid field types in request payload\")\n\t\t}\n\t}\n\treturn err\n}", "title": "" }, { "docid": "baf1055a462a120268b63e49cbe6e974", "score": "0.63624704", "text": "func ValidateFields(\n\tobject interface{},\n\tschema map[string]map[string]string,\n\tcustomFunctionsArg ...map[string]func(reflect.Value, string) (bool, string, error)) (\n\tbool,\n\tmap[string][]string,\n\terror) {\n\tvalueOf := reflect.ValueOf(object)\n\ttypeOf := reflect.TypeOf(object)\n\toutput := map[string][]string{}\n\n\t// If custom functions are given, add it to functions map\n\tif customFunctionsArg != nil {\n\t\tfor name, function := range customFunctionsArg[0] {\n\t\t\tfunctions[name] = function\n\t\t}\n\t}\n\n\tfor i := 0; i < typeOf.NumField(); i++ {\n\t\tcurField := typeOf.Field(i)\n\t\tif !valueOf.Field(i).IsZero() {\n\t\t\tif args, ok := schema[curField.Name]; ok {\n\t\t\t\tvalid, msgs, err := validateField(valueOf.Field(i), args)\n\t\t\t\tif err != nil {\n\t\t\t\t\terr = errors.Wrap(err, \"Error while validating field\")\n\t\t\t\t\treturn false, map[string][]string{}, err\n\t\t\t\t} else if !valid {\n\t\t\t\t\toutput[curField.Name] = msgs\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn len(output) <= 0, output, nil\n}", "title": "" }, { "docid": "bc7d894e9484bb70bb81e18f8d0381da", "score": "0.63566333", "text": "func ValidateType(record interface{}, list StructList) []Result {\n\ttyp := reflect.TypeOf(record)\n\t// if a pointer to a struct is passed, get the type of the dereferenced object\n\tif typ.Kind() == reflect.Ptr {\n\t\ttyp = typ.Elem()\n\t}\n\n\tfieldChecks := []func(f goflect.Info) []error{\n\t\tnominal,\n\t\tuniqueType,\n\t\tautoinc,\n\t\tcheckDefault,\n\t}\n\n\trecordChecks := []func(f []goflect.Info) []error{\n\t\tnominalOnce,\n\t\tnominalRequiresPrimary,\n\t\tprimaryOnce,\n\t\tvalidatorStringParseable,\n\t}\n\n\toutput := make([]Result, 0)\n\tfields := goflect.GetInfo(record)\n\n\tfor _, recordCheck := range recordChecks {\n\t\terrors := recordCheck(fields)\n\t\tfor _, err := range errors {\n\t\t\tcast, _ := err.(ValidationError)\n\t\t\tcast.Message += \" on type \" + strconv.Quote(typ.Name())\n\t\t\toutput = append(output, Result{Error: cast, Position: list.Position})\n\t\t}\n\t}\n\tfor _, field := range fields {\n\t\tpos := list.Position\n\t\tif fieldStruct, present := list.Structs[field.Name]; present {\n\t\t\tpos = fieldStruct.Position\n\t\t}\n\t\tvalType, _ := typ.FieldByName(field.Name)\n\t\terrors := structTag(string(valType.Tag))\n\t\tfor _, err := range errors {\n\t\t\tcast, _ := err.(ValidationError)\n\t\t\tcast.Message += \" with field \" + strconv.Quote(field.Name)\n\t\t\toutput = append(output, Result{Error: cast, Position: pos})\n\t\t}\n\t\tfor _, fieldCheck := range fieldChecks {\n\t\t\terrors := fieldCheck(field)\n\t\t\tfor _, err := range errors {\n\t\t\t\tcast, _ := err.(ValidationError)\n\t\t\t\tcast.Message += \" with field \" + strconv.Quote(field.Name)\n\t\t\t\toutput = append(output, Result{Error: cast, Position: pos})\n\t\t\t}\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "0478bb73cf2b599026cc807533925569", "score": "0.6318105", "text": "func (model HCNVinculation) ValidateFields(structFields ...[]string) (bool, error) {\n\tif len(structFields) == 0 {\n\t\treturn helper.ValidateFields(model)\n\t}\n\treturn helper.ValidateFields(model, structFields[0])\n}", "title": "" }, { "docid": "21bcf61b853dd1bbf18b28bcf3637e6e", "score": "0.6222629", "text": "func validateAllFieldsAreDefined(item interface{}) error {\n\treturn validateReflect(reflect.ValueOf(item), []string{})\n}", "title": "" }, { "docid": "b153b2791c691ca4f481a9d7ed9afd33", "score": "0.6222162", "text": "func Validate(v Validator) (errs Errors) {\n\treturn v.Validate(&Field{})\n}", "title": "" }, { "docid": "c0d81cb55222a7eaf4c9e0cb31fc5d7c", "score": "0.61053294", "text": "func Check(val interface{}) error {\n\tif err := validate.Struct(val); err != nil {\n\n\t\t// Use a type assertion to get the real error value.\n\t\tverrors, ok := err.(validator.ValidationErrors)\n\t\tif !ok {\n\t\t\treturn err\n\t\t}\n\n\t\t// lang controls the language of the error messages. You could look at the\n\t\t// Accept-Language header if you intend to support multiple languages.\n\t\tlang, _ := translator.GetTranslator(\"en\")\n\n\t\tvar fields FieldErrors\n\t\tfor _, verror := range verrors {\n\t\t\tfield := FieldError{\n\t\t\t\tField: verror.Field(),\n\t\t\t\tError: verror.Translate(lang),\n\t\t\t}\n\t\t\tfields = append(fields, field)\n\t\t}\n\n\t\treturn fields\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1aec484438b0e5228d52d2463703ae5b", "score": "0.610309", "text": "func (m *FieldInfo) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "242fdb2f6dfd362ddb413eea2ef1bc35", "score": "0.6101334", "text": "func validateFields(req *logical.Request, data *framework.FieldData) error {\n\tvar unknownFields []string\n\n\tfor k := range req.Data {\n\t\tif _, ok := data.Schema[k]; !ok {\n\t\t\tunknownFields = append(unknownFields, k)\n\t\t}\n\t}\n\n\tswitch len(unknownFields) {\n\tcase 0:\n\t\treturn nil\n\tcase 1:\n\t\treturn fmt.Errorf(\"%w: %s\", errUnknownField, unknownFields[0])\n\tdefault:\n\t\tsort.Strings(unknownFields)\n\n\t\treturn fmt.Errorf(\"%w: %s\", errUnknownFields, strings.Join(unknownFields, \", \"))\n\t}\n}", "title": "" }, { "docid": "45832e3a4a27d95c38c1f26b7b787a2c", "score": "0.60870385", "text": "func (v V) Validate(s interface{}) []error {\n\tvar val reflect.Value\n\n\t// If the interface is a reflect.Value, do nothing\n\tif reflect.TypeOf(s).String() == \"reflect.Value\" {\n\t\tval = s.(reflect.Value)\n\t} else {\n\t\tval = reflect.ValueOf(s)\n\t}\n\n\tif val.Kind() == reflect.Ptr {\n\t\tval = val.Elem()\n\t}\n\n\tt := val.Type()\n\tif t == nil || t.Kind() != reflect.Struct {\n\t\treturn nil\n\t}\n\n\tvar errs []error\n\n\tfor i := 0; i < t.NumField(); i++ {\n\t\tf := t.Field(i)\n\t\tfv := val.Field(i)\n\t\tif !fv.CanInterface() {\n\t\t\tcontinue\n\t\t}\n\t\tval := fv.Interface()\n\t\ttag := f.Tag.Get(\"validate\")\n\t\tif tag == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tvts := strings.Split(tag, \",\")\n\n\t\tfor _, vt := range vts {\n\t\t\tif vt == \"struct\" {\n\t\t\t\terrs2 := v.Validate(val)\n\t\t\t\tif len(errs2) > 0 {\n\t\t\t\t\terrs = append(errs, errs2...)\n\t\t\t\t}\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tvf := v[vt]\n\t\t\tif vf == nil {\n\t\t\t\terrs = append(errs, BadField{\n\t\t\t\t\tField: f.Name,\n\t\t\t\t\tDesc: fmt.Sprintf(\"undefined validator: %q\", vt),\n\t\t\t\t})\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := vf(val); err != nil {\n\t\t\t\tp := fmt.Sprintf(\"%s\", err)\n\t\t\t\terrs = append(errs, BadField{\n\t\t\t\t\tField: fieldName(&f),\n\t\t\t\t\tDesc: p,\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "2e308c3ffbc682228764bef3790f674a", "score": "0.6061799", "text": "func (m *PassObject) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateVehicleTypes(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3213defae123e2339c5009d5499857c1", "score": "0.60447633", "text": "func (m *ProfileTypeDTO) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "f403cd6cbf71828a5641b1ad9222295f", "score": "0.6036584", "text": "func (s Schema) Validate(doc Document) error {\n\tif len(s.fields) == 0 {\n\t\treturn nil\n\t}\n\n\tvar ve = make(ValidationError)\n\n\t// validate the fields in doc\n\tfor _, name := range s.RevComplement(doc) {\n\t\tve[name] = append(ve[name], fmt.Errorf(\"Unknown field: %s\", name))\n\t}\n\n\tfor _, name := range s.Intersection(doc) {\n\t\tfield := doc.Fields[name]\n\t\tschemaField := s.fields[name]\n\n\t\terr := field.Validate(name, schemaField)\n\t\tif err != nil {\n\t\t\tve[name] = err\n\t\t} else {\n\t\t\tdoc.Fields[name] = field\n\t\t}\n\t}\n\n\t// Check for missing fields\n\tfor _, name := range s.Complement(doc) {\n\t\tschemaField := s.fields[name]\n\t\tif schemaField.Required {\n\t\t\tve[name] = append(ve[name], fmt.Errorf(\"Required field %s missing\", name))\n\t\t}\n\t}\n\n\tif len(ve) == 0 {\n\t\treturn nil\n\t}\n\n\treturn ve\n}", "title": "" }, { "docid": "eddae5cb37b916df902f8b28d5a09ff5", "score": "0.6004227", "text": "func (f *SQLField) Validate() bool {\n\treturn f.Name != \"\" && f.SQLType != \"\"\n}", "title": "" }, { "docid": "492d54b0175b5fd60290f260ee8a2aa1", "score": "0.5988545", "text": "func (m *DurationFieldType) Validate(formats strfmt.Registry) error {\n\treturn nil\n}", "title": "" }, { "docid": "6f6f07331315bcaae6448d676404e31d", "score": "0.5967251", "text": "func ValidateAllFields(item interface{}) (bool, error) {\n\tv := reflect.ValueOf(item)\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tvalidator := getValidatorFromValue(v.Field(i))\n\t\tif validator != nil {\n\t\t\tres, err := validator.validate(v.Type().Field(i), v.Field(i))\n\t\t\tif err != nil || res == false {\n\t\t\t\treturn res, err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "8228a347697de8ed3b3317e792eb4d70", "score": "0.59413224", "text": "func (v *ComplexValidator) Validate(s interface{}) error {\n\tif v.TagName == \"\" {\n\t\tv.TagName = \"validate\"\n\t}\n\n\tfor _, field := range structs.Fields(s) {\n\t\tif err := v.processField(\"\", field); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "430fb1eb4d217d2645a9cf2556a9a7a5", "score": "0.59181535", "text": "func (PoseidonStrategy) Validate(ctx context.Context, obj runtime.Object) field.ErrorList {\n\to := obj.(*Poseidon)\n\tklog.Infof(\"Validating fields for Poseidon %s\\n\", o.Name)\n\terrors := field.ErrorList{}\n\t// perform validation here and add to errors using field.Invalid\n\treturn errors\n}", "title": "" }, { "docid": "b24342f4a592287a3706a4fb50643752", "score": "0.590286", "text": "func CheckStructFields(conf data.Config) {\n\tfor index, plugin := range conf.Plugins {\n\t\t_ = index\n\t\tfor index, check := range plugin.Checks {\n\t\t\t_ = index\n\t\t\tif check.Description == nil {\n\t\t\t\tlog.Fatal(\"Missing description field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t}\n\t\t\tif check.Remediation == nil {\n\t\t\t\tlog.Fatal(\"Missing remediation field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t}\n\t\t\tif check.Severity == nil {\n\t\t\t\tlog.Fatal(\"Missing severity field in \" + check.PluginName + \" plugin checks. Stopping execution.\")\n\t\t\t} else {\n\t\t\t\tif err := data.SeverityType.IsValid(*check.Severity); err != nil {\n\t\t\t\t\tlog.Fatal(\" ------ Unknown severity type : \" + string(*check.Severity) + \" . Only Informational / Low / Medium / High are valid severity types.\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "6f4de7bf7d5258c0ae5644af3fc3e6e6", "score": "0.58971655", "text": "func (t Type) Validate() error {\n\tv := string(t)\n\n\treturn validation.Validate(&v, validation.Required)\n}", "title": "" }, { "docid": "00b7b7027c6b64c661d2792bfb640c86", "score": "0.58235794", "text": "func (member *Member) Validate() (map[string]interface{}, bool) {\n\tif member.first_name == \"\" {\n\t\treturn u.Message(false, \"Member first name should be on the payload\"), false\n\t}\n\n\tif member.last_name == \"\" {\n\t\treturn u.Message(false, \"Member last name should be on the payload\"), false\n\t}\n\n\tif member.phone_number == \"\" {\n\t\treturn u.Message(false, \"Member phone number should be on the payload\"), false\n\t}\n\n\tif member.client_member_id == 0 {\n\t\treturn u.Message(false, \"Client member id should be on the payload\"), false\n\t}\n\n\tif member.account_id == 0 {\n\t\treturn u.Message(false, \"Account id should be on the payload\"), false\n\t}\n\n\t//All the required parameters are present\n\treturn u.Message(true, \"success\"), true\n}", "title": "" }, { "docid": "39561fef5fa762f1f20c40d885df4149", "score": "0.5819453", "text": "func (m *IngredientVersionAndUsageType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with IngredientAndVersion\n\tif err := m.IngredientAndVersion.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\t// validation for a type composition with IngredientVersionAndUsageTypeAllOf1\n\tif err := m.IngredientVersionAndUsageTypeAllOf1.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "081543052c6fce0e3df9901f7792b4a6", "score": "0.58058566", "text": "func (c *Criterion) Validate() error {\n\tif c == nil {\n\t\treturn nil\n\t}\n\tnoNil := 0\n\tif c.Value.Bool != nil {\n\t\tnoNil++\n\t}\n\tif c.Value.String != nil {\n\t\tnoNil++\n\t}\n\tif c.Value.Float != nil {\n\t\tnoNil++\n\t}\n\tif noNil != 1 {\n\t\treturn fmt.Errorf(\"value type should describe exactly one type\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ad7cb3721e9bd4d969727c2ef5b8caba", "score": "0.5796026", "text": "func Validate(v interface{}) error {\n\tvar inv InvalidError\n\tif fve := validate.Struct(v); fve != nil {\n\t\tfor _, fe := range fve.(validator.ValidationErrors) {\n\t\t\tinv = append(inv, Invalid{Field: fe.Field(), Error: fe.Tag()})\n\t\t}\n\t\treturn inv\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f4e7f3fe5389a2db0f90d37d47b40c1a", "score": "0.5788046", "text": "func (m *Member) Validate(action string) error {\n\tif m.Name == \"\" {\n\t\treturn errors.New(\"type name is required\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf78aeed8706b4a6aa3a0abe5648374e", "score": "0.57830894", "text": "func (pv *Validator) Validate(i interface{}) error {\n\terr := pv.validator.Struct(i)\n\n\tvar errorMessages []string\n\n\tif err != nil {\n\t\tfor _, err := range err.(validator.ValidationErrors) {\n\t\t\terrorMessages = append(errorMessages, validationErrorMessages[err.Field()])\n\t\t}\n\n\t\treturn errors.New(strings.Join(errorMessages, \" and \"))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "32760d75fb7a54259e8366ecdb5a76c7", "score": "0.57653767", "text": "func (schema *RawSchema) validate() (*Schema, error) {\n\tfieldsLen := len(schema.Fields)\n\ttypesLen := len(schema.Types)\n\tif fieldsLen != typesLen {\n\t\treturn nil, fmt.Errorf(\"Mismatched fields and types lengths: %d %d\", fieldsLen, typesLen)\n\t}\n\tvar types []SchemaType\n\tfor _, typeString := range schema.Types {\n\t\tvar validType SchemaType\n\t\tswitch typeString {\n\t\tcase \"int\":\n\t\t\tvalidType = INT\n\t\tcase \"string\":\n\t\t\tvalidType = STRING\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"Unrecognized schema type: %s\", typeString)\n\t\t}\n\t\ttypes = append(types, validType)\n\t}\n\treturn &Schema{schema.Fields, types}, nil\n}", "title": "" }, { "docid": "812c73858fbec0fa4deaced337cbc2a1", "score": "0.57478553", "text": "func Validate(schema Schema, rules ...*ozzo.FieldRules) error {\n\terr := ozzo.ValidateStruct(schema, rules...)\n\tswitch e := err.(type) {\n\tcase nil:\n\t\treturn nil\n\tcase ozzo.Errors:\n\t\t// Form a proper HTTPError\n\t\tmessages := make(map[string]string)\n\t\tfor k, v := range e {\n\t\t\tmessages[k] = v.Error()\n\t\t}\n\t\treturn errors.NewHTTPValidationError(messages)\n\tdefault:\n\t\treturn errors.NewInternalError(e, \"Error while validating\")\n\t}\n}", "title": "" }, { "docid": "da1e12f27f41242e8ab07e2a7976cc8c", "score": "0.574482", "text": "func (FestivalStrategy) Validate(ctx context.Context, obj runtime.Object) field.ErrorList {\n\to := obj.(*Festival)\n\tklog.Infof(\"Validating fields for Festival %s\", o.Name)\n\terrors := field.ErrorList{}\n\n\tif o.Spec.Year < 0 {\n\t\terrors = append(errors,\n\t\t\tfield.Invalid(field.NewPath(\"spec\", \"year\"), o.Spec.Year, \"year must be > 0\"))\n\t}\n\n\t// perform validation here and add to errors using field.Invalid\n\treturn errors\n}", "title": "" }, { "docid": "e71df1479c7d8bed2919eb476ceb1771", "score": "0.5743708", "text": "func (m *RType) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif !_RType_From_Pattern.MatchString(m.GetFrom()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"From\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\tif !_RType_To_Pattern.MatchString(m.GetTo()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"To\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\tif !_RType_Verb_Pattern.MatchString(m.GetVerb()) {\n\t\treturn RTypeValidationError{\n\t\t\tfield: \"Verb\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\t// no validation rules for Multiple\n\n\t// no validation rules for CountType\n\n\treturn nil\n}", "title": "" }, { "docid": "8a30e9ed1ee4b751d18029e76e321535", "score": "0.5741773", "text": "func (m *Query) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetField()) < 1 {\n\t\treturn QueryValidationError{\n\t\t\tfield: \"Field\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\t// no validation rules for Op\n\n\t// no validation rules for Value\n\n\t// no validation rules for ValueType\n\n\treturn nil\n}", "title": "" }, { "docid": "e7803f323c3ccf930ca5575cdd020580", "score": "0.5738999", "text": "func (ftc *FieldTypeCreate) check() error {\n\tif _, ok := ftc.mutation.Int(); !ok {\n\t\treturn &ValidationError{Name: \"int\", err: errors.New(`ent: missing required field \"FieldType.int\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int8(); !ok {\n\t\treturn &ValidationError{Name: \"int8\", err: errors.New(`ent: missing required field \"FieldType.int8\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int16(); !ok {\n\t\treturn &ValidationError{Name: \"int16\", err: errors.New(`ent: missing required field \"FieldType.int16\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int32(); !ok {\n\t\treturn &ValidationError{Name: \"int32\", err: errors.New(`ent: missing required field \"FieldType.int32\"`)}\n\t}\n\tif _, ok := ftc.mutation.Int64(); !ok {\n\t\treturn &ValidationError{Name: \"int64\", err: errors.New(`ent: missing required field \"FieldType.int64\"`)}\n\t}\n\tif v, ok := ftc.mutation.ValidateOptionalInt32(); ok {\n\t\tif err := fieldtype.ValidateOptionalInt32Validator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"validate_optional_int32\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.validate_optional_int32\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.State(); ok {\n\t\tif err := fieldtype.StateValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"state\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.state\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.MAC(); ok {\n\t\tif err := fieldtype.MACValidator(v.String()); err != nil {\n\t\t\treturn &ValidationError{Name: \"mac\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.mac\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Dir(); !ok {\n\t\treturn &ValidationError{Name: \"dir\", err: errors.New(`ent: missing required field \"FieldType.dir\"`)}\n\t}\n\tif v, ok := ftc.mutation.Ndir(); ok {\n\t\tif err := fieldtype.NdirValidator(string(v)); err != nil {\n\t\t\treturn &ValidationError{Name: \"ndir\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.ndir\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.Link(); ok {\n\t\tif err := fieldtype.LinkValidator(v.String()); err != nil {\n\t\t\treturn &ValidationError{Name: \"link\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.link\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.RawData(); ok {\n\t\tif err := fieldtype.RawDataValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"raw_data\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.raw_data\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.IP(); ok {\n\t\tif err := fieldtype.IPValidator([]byte(v)); err != nil {\n\t\t\treturn &ValidationError{Name: \"ip\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.ip\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Role(); !ok {\n\t\treturn &ValidationError{Name: \"role\", err: errors.New(`ent: missing required field \"FieldType.role\"`)}\n\t}\n\tif v, ok := ftc.mutation.Role(); ok {\n\t\tif err := fieldtype.RoleValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"role\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.role\": %w`, err)}\n\t\t}\n\t}\n\tif v, ok := ftc.mutation.Priority(); ok {\n\t\tif err := fieldtype.PriorityValidator(v); err != nil {\n\t\t\treturn &ValidationError{Name: \"priority\", err: fmt.Errorf(`ent: validator failed for field \"FieldType.priority\": %w`, err)}\n\t\t}\n\t}\n\tif _, ok := ftc.mutation.Pair(); !ok {\n\t\treturn &ValidationError{Name: \"pair\", err: errors.New(`ent: missing required field \"FieldType.pair\"`)}\n\t}\n\tif _, ok := ftc.mutation.Vstring(); !ok {\n\t\treturn &ValidationError{Name: \"vstring\", err: errors.New(`ent: missing required field \"FieldType.vstring\"`)}\n\t}\n\tif _, ok := ftc.mutation.Triple(); !ok {\n\t\treturn &ValidationError{Name: \"triple\", err: errors.New(`ent: missing required field \"FieldType.triple\"`)}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f5197474c2f161ebb1961164ed0fdd9", "score": "0.5736223", "text": "func (u UserDTO) Validate() (bool, []error) {\n\n\tvalid := true\n\terrs := []error{}\n\n\tif u.Name.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Missing name\"))\n\t}\n\n\tif u.Lastname.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Missing lastname\"))\n\t}\n\n\tif u.Gender.IsZero() {\n\t\tvalid = false\n\t\terrs = append(errs, errors.New(\"Gender missing\"))\n\t}\n\n\treturn valid, errs\n}", "title": "" }, { "docid": "bc4e616e999f1c1d3423bbafeb4a1f4d", "score": "0.5732323", "text": "func (m *UpdateStatefulSetRequest_Fields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateStatefulSetRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateStatefulSetRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "75f116bd7cf8210fd7994506a542c2e3", "score": "0.5714462", "text": "func (cv *Validator) Validate(i interface{}) error {\n\treturn cv.Validator.Struct(i)\n}", "title": "" }, { "docid": "55800e49c400177b56b7f3a8ac762b24", "score": "0.5714291", "text": "func (m *UpdateDeploymentRequest_Fields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateDeploymentRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn UpdateDeploymentRequest_FieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a967e42dc117ccb7a5542bc32bc2a559", "score": "0.57107663", "text": "func (m *PassGuestDataVehicleTypeObject) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateObject(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "61bf43f84cc15db0a524d0548b2468a2", "score": "0.56988263", "text": "func (m *ObjectMetaFields) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tfor key, val := range m.GetLabels() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn ObjectMetaFieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Labels[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Labels[key]\n\t}\n\n\tfor key, val := range m.GetAnnotations() {\n\t\t_ = val\n\n\t\tif len(key) < 1 {\n\t\t\treturn ObjectMetaFieldsValidationError{\n\t\t\t\tfield: fmt.Sprintf(\"Annotations[%v]\", key),\n\t\t\t\treason: \"value length must be at least 1 bytes\",\n\t\t\t}\n\t\t}\n\n\t\t// no validation rules for Annotations[key]\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a842b088add5854211a891864a02caad", "score": "0.56909573", "text": "func (s *Selector) Validate() error {\n\tvar count int\n\t{\n\t\tv := reflect.ValueOf(s).Elem()\n\t\tfor i := 0; i < v.NumField(); i++ {\n\t\t\tif !v.Field(i).IsNil() {\n\t\t\t\tcount++\n\t\t\t}\n\t\t}\n\t}\n\tif count != 1 {\n\t\treturn errors.New(\"music: one field must be specified\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ed19af5f633397e51bfe46970c9382e4", "score": "0.5685135", "text": "func (b *Blueprint) Validate() error {\n\tfor name, field := range schemaMap {\n\t\t// check if field exists\n\t\tok, err := reflections.HasField(b, name)\n\t\tif !ok || err != nil {\n\t\t\tif !ok {\n\t\t\t\treturn fmt.Errorf(\"Field %s is not a valid field name\", name)\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\t// check field is populated\n\t\tval, err := reflections.GetField(b, name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif val == field.NullValue && field.Required {\n\t\t\treturn fmt.Errorf(\"Field %s has no value and is required\", name)\n\t\t}\n\t\tif val == field.NullValue && !field.Required {\n\t\t\terr = reflections.SetField(b, name, field.DefaultValue)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// check field type\n\t\ttyp, err := reflections.GetFieldType(b, name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif typ != field.ValueType {\n\t\t\treturn fmt.Errorf(\"Found type of %s but expected type %s\", typ, field.ValueType)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "de44796ccd69e349351bd202bb0ea488", "score": "0.5684494", "text": "func (u *User) Validate() error {\n\treturn validate.Struct(u)\n}", "title": "" }, { "docid": "fd10ce461ad53d9cf615f30dd6260da9", "score": "0.565942", "text": "func (s *CreateEventSourceMappingInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CreateEventSourceMappingInput\"}\n\tif s.BatchSize != nil && *s.BatchSize < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BatchSize\", 1))\n\t}\n\tif s.FunctionName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"FunctionName\"))\n\t}\n\tif s.FunctionName != nil && len(*s.FunctionName) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"FunctionName\", 1))\n\t}\n\tif s.MaximumRecordAgeInSeconds != nil && *s.MaximumRecordAgeInSeconds < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRecordAgeInSeconds\", -1))\n\t}\n\tif s.MaximumRetryAttempts != nil && *s.MaximumRetryAttempts < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRetryAttempts\", -1))\n\t}\n\tif s.ParallelizationFactor != nil && *s.ParallelizationFactor < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"ParallelizationFactor\", 1))\n\t}\n\tif s.Queues != nil && len(s.Queues) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Queues\", 1))\n\t}\n\tif s.Topics != nil && len(s.Topics) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Topics\", 1))\n\t}\n\tif s.AmazonManagedKafkaEventSourceConfig != nil {\n\t\tif err := s.AmazonManagedKafkaEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AmazonManagedKafkaEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.DocumentDBEventSourceConfig != nil {\n\t\tif err := s.DocumentDBEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DocumentDBEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ScalingConfig != nil {\n\t\tif err := s.ScalingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ScalingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SelfManagedEventSource != nil {\n\t\tif err := s.SelfManagedEventSource.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SelfManagedEventSource\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SelfManagedKafkaEventSourceConfig != nil {\n\t\tif err := s.SelfManagedKafkaEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SelfManagedKafkaEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SourceAccessConfigurations != nil {\n\t\tfor i, v := range s.SourceAccessConfigurations {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"SourceAccessConfigurations\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8ba52dadac212ceee855cb00c5c7a902", "score": "0.56591845", "text": "func (m *Map) IsValid(object interface{}) (bool, []ValidationError) {\r\n\r\n\t// Get the object's value and type\r\n\tobjectValue := reflect.ValueOf(object)\r\n\tobjectType := reflect.TypeOf(object)\r\n\r\n\t// Get the validations\r\n\tvalidations := m.get(objectType)\r\n\r\n\t// If we are a pointer and not nil, run IsValid on it's interface\r\n\tif objectValue.Kind() == reflect.Ptr && !objectValue.IsNil() {\r\n\t\treturn IsValid(objectValue.Elem().Interface())\r\n\t}\r\n\r\n\t// Do we have some validations?\r\n\tif len(validations) == 0 {\r\n\t\tvar err error\r\n\r\n\t\t// Loop the fields and decrement through the loop\r\n\t\tfor i := objectType.NumField() - 1; i >= 0; i-- {\r\n\t\t\tfield := objectType.Field(i)\r\n\t\t\tvalidationTag := field.Tag.Get(\"validation\")\r\n\r\n\t\t\t// Do we have a validation tag?\r\n\t\t\tif len(validationTag) > 0 {\r\n\t\t\t\tvalidationComponent := strings.Split(validationTag, \" \")\r\n\r\n\t\t\t\t// Loop each validation component\r\n\t\t\t\tfor _, validationSpec := range validationComponent {\r\n\t\t\t\t\tcomponent := strings.Split(validationSpec, \"=\")\r\n\t\t\t\t\tif len(component) != 2 {\r\n\t\t\t\t\t\tlog.Fatalln(\"invalid validation specification:\", objectType.Name(), field.Name, validationSpec)\r\n\t\t\t\t\t}\r\n\r\n\t\t\t\t\t// Create the validation\r\n\t\t\t\t\tvar validation Interface\r\n\t\t\t\t\tif builder, ok := m.validationNameToBuilder.Load(component[0]); ok && builder != nil {\r\n\t\t\t\t\t\tfn := builder.(func(string, reflect.Kind) (Interface, error))\r\n\t\t\t\t\t\tvalidation, err = fn(component[1], field.Type.Kind())\r\n\r\n\t\t\t\t\t\tif err != nil {\r\n\t\t\t\t\t\t\tlog.Fatalln(\"error creating validation:\", objectType.Name(), field.Name, validationSpec, err)\r\n\t\t\t\t\t\t}\r\n\t\t\t\t\t} else {\r\n\t\t\t\t\t\tlog.Fatalln(\"unknown validation named:\", component[0])\r\n\t\t\t\t\t}\r\n\r\n\t\t\t\t\t// Store the other properties and append to validations\r\n\t\t\t\t\tvalidation.SetFieldName(field.Name)\r\n\t\t\t\t\tvalidation.SetFieldIndex(i)\r\n\t\t\t\t\tvalidations = append(validations, validation)\r\n\t\t\t\t}\r\n\t\t\t}\r\n\t\t}\r\n\r\n\t\t// Set the validations\r\n\t\tm.set(objectType, validations)\r\n\t}\r\n\r\n\t// Loop and build errors\r\n\tvar errors []ValidationError\r\n\tfor _, validation := range validations {\r\n\t\tfield := objectValue.Field(validation.FieldIndex())\r\n\t\tvalue := field.Interface()\r\n\t\tif err := validation.Validate(value, objectValue); err != nil {\r\n\t\t\terrors = append(errors, *err)\r\n\t\t}\r\n\t}\r\n\r\n\t// Return flag and errors\r\n\treturn len(errors) == 0, errors\r\n}", "title": "" }, { "docid": "56ec5d72247d9f1f02b57ff182d42837", "score": "0.565434", "text": "func (s Schema) Validate(field *Field) (errs Errors) {\n\treturn validateSchema(s, field, func(name string) string { return name })\n}", "title": "" }, { "docid": "ca26b9e91bba684584704f0e1b4887d0", "score": "0.5647664", "text": "func (fds FieldDataSpec) ValidateType(data interface{}) bool {\n\tisDataOk := false\n\tswitch fds.DataType {\n\tcase \"string\":\n\t\t_, isDataOk = data.(string)\n\tcase \"int\":\n\t\t_, isDataOk = data.(int)\n\tcase \"arrayInt\":\n\t\t_, isDataOk = data.([]int)\n\tcase \"arraySting\":\n\t\t_, isDataOk = data.([]string)\n\tcase \"arrayObjets\":\n\t\t_, isDataOk = data.([]interface{})\n\tcase \"mapOfObjects\":\n\t\t_, isDataOk = data.(map[string]interface{})\n\tcase \"mapOfString\":\n\t\t_, isDataOk = data.(map[string]string)\n\tcase \"object\":\n\t\t_, isDataOk = data.(interface{})\n\tcase \"bool\":\n\t\t_, isDataOk = data.(bool)\n\t}\n\treturn isDataOk\n}", "title": "" }, { "docid": "624052b098b58d5bd99729542b7a9848", "score": "0.56371564", "text": "func (p *U1) Validate() error {\n\tvalidate := validator.New()\n\treturn validate.Struct(p)\n}", "title": "" }, { "docid": "c3756ac69e0a88c7a02734d33b0fefc9", "score": "0.56338066", "text": "func (s *PutModelInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"PutModelInput\"}\n\tif s.Description != nil && len(*s.Description) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Description\", 1))\n\t}\n\tif s.LabelSchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"LabelSchema\"))\n\t}\n\tif s.ModelId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelId\"))\n\t}\n\tif s.ModelId != nil && len(*s.ModelId) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"ModelId\", 1))\n\t}\n\tif s.ModelType == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelType\"))\n\t}\n\tif s.ModelVariables == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ModelVariables\"))\n\t}\n\tif s.TrainingDataSource == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"TrainingDataSource\"))\n\t}\n\tif s.LabelSchema != nil {\n\t\tif err := s.LabelSchema.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"LabelSchema\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ModelVariables != nil {\n\t\tfor i, v := range s.ModelVariables {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ModelVariables\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.TrainingDataSource != nil {\n\t\tif err := s.TrainingDataSource.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"TrainingDataSource\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73cae87adce91b9b60595ef6941586fe", "score": "0.56316346", "text": "func (u *UserCreate) Validate() bool {\n\tanyBlank := false\n\tfieldErrors := false\n\n\tu.errors = JsonErrors{}\n\n\temail := strings.TrimSpace(u.Email)\n\tname := strings.TrimSpace(u.Name)\n\n\tif email == \"\" {\n\t\tu.errors[\"email\"] = UserEmailEmpty\n\t\tanyBlank = true\n\t}\n\t// Spaces are valid in passwords\n\tif u.Password == \"\" {\n\t\tu.errors[\"password\"] = UserPasswordEmpty\n\t\tanyBlank = true\n\t}\n\tif name == \"\" {\n\t\tu.errors[\"name\"] = UserNameEmpty\n\t\tanyBlank = true\n\t}\n\tif anyBlank {\n\t\treturn false\n\t}\n\n\tif !ValidatePassword(u.Password) {\n\t\tu.errors[\"password\"] = UserCreatePasswordLength\n\t\tfieldErrors = true\n\t}\n\n\tif !ValidateEmail(u.Email) {\n\t\tu.errors[\"email\"] = UserInvalidEmail\n\t\tfieldErrors = true\n\t}\n\n\treturn !fieldErrors\n}", "title": "" }, { "docid": "3ff68d7328faa93d141e3a14f2f8bd55", "score": "0.5627315", "text": "func (t Table) Validate() error {\n\treturn validateField(t)\n}", "title": "" }, { "docid": "a7a1b9d31e405ea0bd061501af7159bc", "score": "0.5625085", "text": "func Validate(i interface{}) error {\n\tvar value = reflect.ValueOf(i)\n\n\t// if the reflected value is nil\n\tif !value.IsValid() {\n\t\treturn errors.New(\"i value is nil\")\n\t}\n\n\t// as i is actually an interface, just get the thing behind the interface\n\tvalue = reflect.Indirect(value.Elem())\n\n\tvar errs = make(ValidationError)\n\t// recursively walk through it to see if it's valid\n\tvalidateRecursively(&value, \"\", errs)\n\n\tif len(errs) > 0 {\n\t\treturn errs\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f8419b9d5ad987d97ad30887c572e1a0", "score": "0.5624942", "text": "func (m *MoBaseComplexType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d4b83154201366e086a61ffca84a863", "score": "0.56241983", "text": "func (p Params) Validate() error {\n\tif err := validateCreditTypes(p.CreditTypes); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateAllowedClassCreators(p.AllowedClassCreators); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateAllowlistEnabled(p.AllowlistEnabled); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateCreditClassFee(p.CreditClassFee); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cd4851b36540a42ad2fc4ed9ec76635d", "score": "0.5613682", "text": "func (o *Complex) Validate() error {\n\tfor _, err := range dynahelpers.ValidateStruct(*o) {\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "39ee42c76fc1765534fff683e11de1e3", "score": "0.5609688", "text": "func (params *Params) Validate() error {\n\treturn deputil.ValidateParams(params)\n}", "title": "" }, { "docid": "60c29cff12fb7c43a0c419c1ad2b941b", "score": "0.5599035", "text": "func (f field) IsValid() bool { return f != nil }", "title": "" }, { "docid": "d3e835046df99cacdfb1e2b1253f33c1", "score": "0.55970466", "text": "func Validate(args ...interface{}) error {\n\tfor _, arg := range args {\n\t\t// type judge\n\t\tswitch arg.(type) {\n\t\tcase bool:\n\t\t\treturn nil\n\t\tcase int:\n\t\t\tif value, ok := arg.(int); ok && value == 0 {\n\t\t\t\treturn errors.New(\"int values is 0\")\n\t\t\t}\n\t\tcase string:\n\t\t\tif value, ok := arg.(string); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"string value length is 0\")\n\t\t\t}\n\t\tcase int64:\n\t\t\tif value, ok := arg.(int64); ok && value == 0 {\n\t\t\t\treturn errors.New(\"int64 value is 0\")\n\t\t\t}\n\t\tcase float64:\n\t\t\tif value, ok := arg.(float64); ok && value == 0 {\n\t\t\t\treturn errors.New(\"float64 value is 0.0\")\n\t\t\t}\n\t\tcase []int:\n\t\t\tif value, ok := arg.([]int); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"[]int value is 0\")\n\t\t\t}\n\t\tcase []string:\n\t\t\tif value, ok := arg.([]string); ok && len(value) == 0 {\n\t\t\t\treturn errors.New(\"[]string value is nil\")\n\t\t\t}\n\t\tcase map[string]string:\n\t\t\tif len(arg.(map[string]string)) == 0 {\n\t\t\t\treturn errors.New(\"map[string]string is nil\")\n\t\t\t}\n\t\tdefault:\n\t\t\treturn errors.New(\"unSupport type\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e06aff87a187c66063917c91c3187d9", "score": "0.55888486", "text": "func (m *ModuleType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateCreated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateDescription(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastUpdated(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateManufacturer(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateModel(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validatePartNumber(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateTags(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateURL(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateWeightUnit(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "283e845c78b5fcc2403c72ca9ab4b3a6", "score": "0.5584438", "text": "func (cv *Validator) Validate(i interface{}) error {\n\treturn cv.validator.Struct(i)\n}", "title": "" }, { "docid": "cec5fe2ef450550edc15567f15cf5697", "score": "0.5583899", "text": "func (v *Validation) Validate(i interface{}) ValidationErrors {\n\terr := v.validate.Struct(i)\n\tif ves, ok := err.(validator.ValidationErrors); ok {\n\t\tif len(ves) == 0 {\n\t\t\treturn nil\n\t\t}\n\n\t\tvar returnErrs []ValidationError\n\n\t\tfor _, ve := range ves {\n\t\t\t// cast the FieldError into ValidationError append into slice\n\t\t\t// from implemented Error()\n\t\t\te := ValidationError{ve.(validator.FieldError)}\n\t\t\treturnErrs = append(returnErrs, e)\n\t\t}\n\t\treturn returnErrs\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "28d7cc806e59e30c0e62bd344bc56fd5", "score": "0.5583356", "text": "func Validate(cfg interface{}) error {\n\tbaseConfigType := reflect.TypeOf((*Validator)(nil)).Elem()\n\n\tv := reflect.ValueOf(cfg).Elem()\n\tfor i := 0; i < v.NumField(); i++ {\n\t\tif v.Type().Field(i).Type.Implements(baseConfigType) {\n\t\t\terr := v.Field(i).Interface().(Validator).Validate()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "fbb5624b4a7d76d824963e54d707a11b", "score": "0.5581702", "text": "func (s *UpdateEventSourceMappingInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"UpdateEventSourceMappingInput\"}\n\tif s.BatchSize != nil && *s.BatchSize < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BatchSize\", 1))\n\t}\n\tif s.FunctionName != nil && len(*s.FunctionName) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"FunctionName\", 1))\n\t}\n\tif s.MaximumRecordAgeInSeconds != nil && *s.MaximumRecordAgeInSeconds < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRecordAgeInSeconds\", -1))\n\t}\n\tif s.MaximumRetryAttempts != nil && *s.MaximumRetryAttempts < -1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MaximumRetryAttempts\", -1))\n\t}\n\tif s.ParallelizationFactor != nil && *s.ParallelizationFactor < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"ParallelizationFactor\", 1))\n\t}\n\tif s.UUID == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"UUID\"))\n\t}\n\tif s.UUID != nil && len(*s.UUID) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"UUID\", 1))\n\t}\n\tif s.DocumentDBEventSourceConfig != nil {\n\t\tif err := s.DocumentDBEventSourceConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DocumentDBEventSourceConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ScalingConfig != nil {\n\t\tif err := s.ScalingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ScalingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SourceAccessConfigurations != nil {\n\t\tfor i, v := range s.SourceAccessConfigurations {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"SourceAccessConfigurations\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8be33636e365259305cbcf8cdaf48ef2", "score": "0.5568834", "text": "func (user *Users) Validate() (ValidationError, bool) {\n\terr := validate.Struct(user)\n\tif err != nil {\n\t\treturn constructValidationError(err), false\n\t}\n\treturn ValidationError{}, true\n}", "title": "" }, { "docid": "3ed9bdcf8a29d3790f29e1be64885775", "score": "0.5568791", "text": "func (p Params) Validate() error {\n\tif err := validateUnbondingTime(p.UnbondingTime); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMaxValidators(p.MaxValidators); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMaxEntries(p.MaxEntries); err != nil {\n\t\treturn err\n\t}\n\tif err := validateBondDenom(p.BondDenom); err != nil {\n\t\treturn err\n\t}\n\tif err := validateMinSelfDelegation(p.MinSelfDelegation); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ebe5f9e3054f98f15b81e0ce4b15e52d", "score": "0.5567386", "text": "func (m *Update) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif utf8.RuneCountInString(m.GetField()) < 1 {\n\t\treturn UpdateValidationError{\n\t\t\tfield: \"Field\",\n\t\t\treason: \"value length must be at least 1 runes\",\n\t\t}\n\t}\n\n\t// no validation rules for Action\n\n\t// no validation rules for Value\n\n\t// no validation rules for ValueType\n\n\treturn nil\n}", "title": "" }, { "docid": "1cb853c32b0398174ecfca597ea2369a", "score": "0.5566761", "text": "func (s Space) Validate() error {\n\treturn validation.ValidateStruct(&s,\n\t\tvalidation.Field(&s.Name, validation.Required, validation.Length(1, 25)),\n\t\tvalidation.Field(&s.About, validation.Required, validation.Length(1, 80)),\n\t\tvalidation.Field(&s.Topics, validation.Length(0, 3)),\n\t)\n}", "title": "" }, { "docid": "633602d8e7bbedaa45c05cd76a59e754", "score": "0.55664176", "text": "func (m *PassGuestData) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateModel(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateVehicleTypeObject(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e23811e59d9f1d94749ddf9cb93513ed", "score": "0.5565682", "text": "func (h Handler) Validate() (err error) {\n\terr = validation.ValidateStruct(&h,\n\t\tvalidation.Field(&h.Name, validation.Required),\n\t)\n\n\treturn\n}", "title": "" }, { "docid": "0989e10ac873d8c129ac5ec227b042e7", "score": "0.5564889", "text": "func (s *ConfigTypeData) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"ConfigTypeData\"}\n\tif s.AntennaDownlinkConfig != nil {\n\t\tif err := s.AntennaDownlinkConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaDownlinkConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.AntennaDownlinkDemodDecodeConfig != nil {\n\t\tif err := s.AntennaDownlinkDemodDecodeConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaDownlinkDemodDecodeConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.AntennaUplinkConfig != nil {\n\t\tif err := s.AntennaUplinkConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AntennaUplinkConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.DataflowEndpointConfig != nil {\n\t\tif err := s.DataflowEndpointConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"DataflowEndpointConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.S3RecordingConfig != nil {\n\t\tif err := s.S3RecordingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"S3RecordingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.TrackingConfig != nil {\n\t\tif err := s.TrackingConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"TrackingConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.UplinkEchoConfig != nil {\n\t\tif err := s.UplinkEchoConfig.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"UplinkEchoConfig\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60fc57b671be9ed58404fa88788914d9", "score": "0.55620545", "text": "func (v *Value) Validate(target interface{}) error {\n\tswitch v.Type {\n\tcase \"range\":\n\t\tt := target.(float32)\n\t\tif t < v.Range.From || t > v.Range.To {\n\t\t\treturn fmt.Errorf(\"out of range: %v\", target)\n\t\t}\n\tcase \"toggle\":\n\t\tt := target.(string)\n\t\tfor _, val := range v.Toggle {\n\t\t\tif val == target {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn fmt.Errorf(\"invalid toggle provided: %v\", t)\n\tcase \"step\":\n\t\tt := target.(string)\n\t\tfor _, val := range v.Step {\n\t\t\tif val == target {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t}\n\t\treturn fmt.Errorf(\"invalid step provided: %v\", t)\n\tcase \"shot\":\n\t\tt := target.(string)\n\t\tif v.Shot.Value == target || v.Default == target {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"invalid button provided: %v\", t)\n\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown type provided: %v\", v.Type)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3cfae618c5b66c04401cf54806e998b5", "score": "0.55583704", "text": "func (s *EndpointDetails) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"EndpointDetails\"}\n\tif s.AwsGroundStationAgentEndpoint != nil {\n\t\tif err := s.AwsGroundStationAgentEndpoint.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"AwsGroundStationAgentEndpoint\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Endpoint != nil {\n\t\tif err := s.Endpoint.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Endpoint\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.SecurityDetails != nil {\n\t\tif err := s.SecurityDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"SecurityDetails\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "73f2c02c2df26e5f1237b9d840ac3418", "score": "0.55543345", "text": "func (m *UserPrivate) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// validation for a type composition with UserBasic\n\tif err := m.UserBasic.Validate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBirthDate(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateBoasts(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastBirthDateChange(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateLastPosition(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateMatchs(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRadio(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf29270a21a8f39fdbb50bbd143d432d", "score": "0.5551194", "text": "func (m *E) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif !_E_Type_Pattern.MatchString(m.GetType()) {\n\t\treturn EValidationError{\n\t\t\tfield: \"Type\",\n\t\t\treason: \"value does not match regex pattern \\\"^[a-z][a-z0-9]{1,14}$\\\"\",\n\t\t}\n\t}\n\n\t// no validation rules for ID\n\n\t// no validation rules for ID1\n\n\t// no validation rules for ID2\n\n\t// no validation rules for ID3\n\n\t// no validation rules for CTime\n\n\t// no validation rules for UTime\n\n\t// no validation rules for State\n\n\t// no validation rules for Meta\n\n\t// no validation rules for Content\n\n\t// no validation rules for Score\n\n\t// no validation rules for Score1\n\n\treturn nil\n}", "title": "" }, { "docid": "6e1a60314725d32ef4f61e42f15f4430", "score": "0.5545619", "text": "func (s *GlobalSecondaryIndex) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"GlobalSecondaryIndex\"}\n\tif s.IndexName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"IndexName\"))\n\t}\n\tif s.IndexName != nil && len(*s.IndexName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"IndexName\", 3))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.Projection == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Projection\"))\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.Projection != nil {\n\t\tif err := s.Projection.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Projection\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5be3b3513756ea25a9ff51579f161dd8", "score": "0.5544243", "text": "func (v *Validator) Validate(i interface{}) error {\n\terr := v.Validator.Struct(i)\n\tif err == nil {\n\t\treturn nil\n\t}\n\terrs := err.(validator.ValidationErrors)\n\t// return pretty errors\n\tmsg := \"\"\n\tfor _, v := range errs.Translate(v.Trans) {\n\t\tif msg != \"\" {\n\t\t\tmsg += \", \"\n\t\t}\n\t\tmsg += v\n\t}\n\treturn errors.New(msg)\n}", "title": "" }, { "docid": "7004b34cf36b818ce764173df0306b15", "score": "0.5540569", "text": "func Validate(v *validationparams.ValidationParams) (*ValidationError, error) {\n\tvalidationErrors := validationErrorMap{}\n\tif v == nil {\n\t\treturn nil, errors.New(\"no FieldValidationData provided\")\n\t}\n\tperformFieldValidation(*v, &validationErrors)\n\tif len(validationErrors) > 0 {\n\t\treturn &ValidationError{\n\t\t\tErrors: validationErrors,\n\t\t}, nil\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "12681bd5a96f8b48ac785d554ccd4b02", "score": "0.5534314", "text": "func (a Account) Validate() error {\n\treturn validation.ValidateStruct(&a,\n\t\tvalidation.Field(&a.Address, validation.Required),\n\t)\n}", "title": "" }, { "docid": "57a2e43b71f99dd020d5bb0b51240eb9", "score": "0.55282664", "text": "func (s *Projection) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"Projection\"}\n\tif s.NonKeyAttributes != nil && len(s.NonKeyAttributes) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"NonKeyAttributes\", 1))\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b1c8d70c143d171fc064c8db5f4e882", "score": "0.55247706", "text": "func (m *SearchUsersRequest) ValidateFields(paths ...string) error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif len(paths) == 0 {\n\t\tpaths = SearchUsersRequestFieldPathsNested\n\t}\n\n\tfor name, subs := range _processPaths(append(paths[:0:0], paths...)) {\n\t\t_ = subs\n\t\tswitch name {\n\t\tcase \"query\":\n\n\t\t\tif utf8.RuneCountInString(m.GetQuery()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"query\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"id_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetIdContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"id_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"name_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetNameContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"name_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"description_contains\":\n\n\t\t\tif utf8.RuneCountInString(m.GetDescriptionContains()) > 50 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"description_contains\",\n\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"attributes_contain\":\n\n\t\t\tif len(m.GetAttributesContain()) > 10 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"attributes_contain\",\n\t\t\t\t\treason: \"value must contain no more than 10 pair(s)\",\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tfor key, val := range m.GetAttributesContain() {\n\t\t\t\t_ = val\n\n\t\t\t\tif utf8.RuneCountInString(key) > 36 {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value length must be at most 36 runes\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif !_SearchUsersRequest_AttributesContain_Pattern.MatchString(key) {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value does not match regex pattern \\\"^[a-z0-9](?:[-]?[a-z0-9]){2,}$\\\"\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif utf8.RuneCountInString(val) > 50 {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"attributes_contain[%v]\", key),\n\t\t\t\t\t\treason: \"value length must be at most 50 runes\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\n\t\tcase \"state\":\n\n\t\t\t_SearchUsersRequest_State_Unique := make(map[State]struct{}, len(m.GetState()))\n\n\t\t\tfor idx, item := range m.GetState() {\n\t\t\t\t_, _ = idx, item\n\n\t\t\t\tif _, exists := _SearchUsersRequest_State_Unique[item]; exists {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"state[%v]\", idx),\n\t\t\t\t\t\treason: \"repeated value must contain unique items\",\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\t_SearchUsersRequest_State_Unique[item] = struct{}{}\n\t\t\t\t}\n\n\t\t\t\tif _, ok := State_name[int32(item)]; !ok {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: fmt.Sprintf(\"state[%v]\", idx),\n\t\t\t\t\t\treason: \"value must be one of the defined enum values\",\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t}\n\n\t\tcase \"field_mask\":\n\n\t\t\tif v, ok := interface{}(m.GetFieldMask()).(interface{ ValidateFields(...string) error }); ok {\n\t\t\t\tif err := v.ValidateFields(subs...); err != nil {\n\t\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\t\tfield: \"field_mask\",\n\t\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\t\tcause: err,\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"order\":\n\n\t\t\tif _, ok := _SearchUsersRequest_Order_InLookup[m.GetOrder()]; !ok {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"order\",\n\t\t\t\t\treason: \"value must be in list [ user_id -user_id name -name primary_email_address -primary_email_address state -state admin -admin created_at -created_at]\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"limit\":\n\n\t\t\tif m.GetLimit() > 1000 {\n\t\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\t\tfield: \"limit\",\n\t\t\t\t\treason: \"value must be less than or equal to 1000\",\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"page\":\n\t\t\t// no validation rules for Page\n\t\tcase \"deleted\":\n\t\t\t// no validation rules for Deleted\n\t\tdefault:\n\t\t\treturn SearchUsersRequestValidationError{\n\t\t\t\tfield: name,\n\t\t\t\treason: \"invalid field path\",\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f5d6cfa9ff82dd2fcffa081bc0fd33d8", "score": "0.5523499", "text": "func (e Example) Validate(path *valley.Path) []valley.ConstraintViolation {\n\tvar violations []valley.ConstraintViolation\n\n\tpath.Write(\".\")\n\n\t{\n\t\t// MutuallyInclusive uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(len(e.Text) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"text\")\n\t\t}\n\n\t\tif !(len(e.Texts) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"texts\")\n\t\t}\n\n\t\tif len(nonEmpty) > 0 && len(nonEmpty) != 2 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"fields are mutually inclusive\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"fields\": []string{\"text\", \"texts\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\t{\n\t\t// MutuallyInclusive uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(e.Int == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"int\")\n\t\t}\n\n\t\tif !(e.Int2 == nil) {\n\t\t\tnonEmpty = append(nonEmpty, \"int2\")\n\t\t}\n\n\t\tif !(len(e.Ints) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"ints\")\n\t\t}\n\n\t\tif len(nonEmpty) > 0 && len(nonEmpty) != 3 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"fields are mutually inclusive\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"fields\": []string{\"int\", \"int2\", \"ints\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\t{\n\t\t// ExactlyNRequired uses it's own block to lock down nonEmpty's scope.\n\t\tvar nonEmpty []string\n\n\t\tif !(e.Int == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"int\")\n\t\t}\n\n\t\tif !(e.Int2 == nil) {\n\t\t\tnonEmpty = append(nonEmpty, \"int2\")\n\t\t}\n\n\t\tif !(len(e.Ints) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"ints\")\n\t\t}\n\n\t\tif !(len(e.Text) == 0) {\n\t\t\tnonEmpty = append(nonEmpty, \"text\")\n\t\t}\n\n\t\tif len(nonEmpty) != 3 {\n\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"struct\",\n\t\t\t\tMessage: \"exact number of required fields not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"num_required\": 3,\n\t\t\t\t\t\"fields\": []string{\"int\", \"int2\", \"ints\", \"text\"},\n\t\t\t\t},\n\t\t\t})\n\n\t\t}\n\t}\n\n\tif e.Adults < 1 {\n\t\tsize := path.Write(\"adults\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 1,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Adults > 9 {\n\t\tsize := path.Write(\"adults\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum value exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 9,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Bool == false {\n\t\tsize := path.Write(\"bool\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must not be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": false,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif !reflect.DeepEqual(e.Bool, true) {\n\t\tsize := path.Write(\"bool\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be deeply equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"deeply_equal_to\": true,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Chan) > 12 {\n\t\tsize := path.Write(\"chan\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 12,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children < 0 {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 0,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children != e.Adults+2 {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": e.Adults + 2,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Children > int(math.Max(float64(8-(e.Adults-1)), 0)) {\n\t\tsize := path.Write(\"children\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum value exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": int(math.Max(float64(8-(e.Adults-1)), 0)),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Float != math.Pi {\n\t\tsize := path.Write(\"float\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"values must be equal\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"equal_to\": math.Pi,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int == 0 {\n\t\tsize := path.Write(\"int\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 == nil {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 == nil {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must not be nil\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Int2 != nil && *e.Int2 < 0 {\n\t\tsize := path.Write(\"int2\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum value not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 0,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Ints) == 0 {\n\t\tsize := path.Write(\"ints\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Ints) > 3 {\n\t\tsize := path.Write(\"ints\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 3,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.Ints {\n\n\t\tif element == 0 {\n\t\t\tsize := path.Write(\"ints.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t\tif element < 0 {\n\t\t\tsize := path.Write(\"ints.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"minimum value not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 0,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif e.Nested == nil {\n\t\tsize := path.Write(\"nested\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Nested != nil {\n\t\tsize := path.Write(\"nested\")\n\t\tviolations = append(violations, e.Nested.Validate(path)...)\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor key := range e.NestedMap {\n\t\tsize := path.Write(\"nested_map.[\" + fmt.Sprintf(\"%v\", key) + \"]\")\n\t\tviolations = append(violations, key.Validate(path)...)\n\t\tpath.TruncateRight(size)\n\n\t}\n\n\tfor i, element := range e.Nesteds {\n\t\tif element != nil {\n\t\t\tsize := path.Write(\"nesteds.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, element.Validate(path)...)\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif len(e.Text) == 0 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif !patternGreeting.MatchString(e.Text) {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must match regular expression\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"regexp\": patternGreeting.String(),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) > 12 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"maximum length exceeded\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"maximum\": 12,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) != 5 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"exact length not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"exactly\": 5,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif e.Text != \"Hello, World!\" && e.Text != \"Hello, SeerUK!\" && e.Text != \"Hello, GitHub!\" {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must be one of the allowed values\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"allowed\": []interface{}{\"Hello, World!\", \"Hello, SeerUK!\", \"Hello, GitHub!\"},\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif strings.HasPrefix(e.Text, \"custom\") && len(e.Text) == 32 {\n\t\tsize := path.Write(\"text\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"\\\"value must be a valid custom ID\\\"\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Text) > 32 {\n\n\t\tif len(e.Text) == 0 {\n\t\t\tsize := path.Write(\"text\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"field\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t\tif len(e.Text) < 64 {\n\t\t\tsize := path.Write(\"text\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"field\",\n\t\t\t\tMessage: \"minimum length not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 64,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif len(e.TextMap) == 0 {\n\t\tsize := path.Write(\"text_map\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"a value is required\",\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.TextMap {\n\n\t\tif len(element) == 0 {\n\t\t\tsize := path.Write(\"text_map.[\" + fmt.Sprintf(\"%v\", i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"a value is required\",\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tfor key := range e.TextMap {\n\n\t\tif len(key) < 10 {\n\t\t\tsize := path.Write(\"text_map.[\" + fmt.Sprintf(\"%v\", key) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"key\",\n\t\t\t\tMessage: \"minimum length not met\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"minimum\": 10,\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tif !e.Time.Before(timeYosemite) {\n\t\tsize := path.Write(\"time\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"value must be before time\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"time\": timeYosemite.Format(time.RFC3339),\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tif len(e.Times) < 1 {\n\t\tsize := path.Write(\"times\")\n\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\tPath: path.String(),\n\t\t\tPathKind: \"field\",\n\t\t\tMessage: \"minimum length not met\",\n\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\"minimum\": 1,\n\t\t\t},\n\t\t})\n\t\tpath.TruncateRight(size)\n\t}\n\n\tfor i, element := range e.Times {\n\n\t\tif !element.Before(timeYosemite) {\n\t\t\tsize := path.Write(\"times.[\" + strconv.Itoa(i) + \"]\")\n\t\t\tviolations = append(violations, valley.ConstraintViolation{\n\t\t\t\tPath: path.String(),\n\t\t\t\tPathKind: \"element\",\n\t\t\t\tMessage: \"value must be before time\",\n\t\t\t\tDetails: map[string]interface{}{\n\t\t\t\t\t\"time\": timeYosemite.Format(time.RFC3339),\n\t\t\t\t},\n\t\t\t})\n\t\t\tpath.TruncateRight(size)\n\t\t}\n\n\t}\n\n\tpath.TruncateRight(1)\n\n\treturn violations\n}", "title": "" }, { "docid": "b06a4174a53a4ea1ecb57ed1c80d0499", "score": "0.55234385", "text": "func (v *Validator) Validate(structure interface{}) error {\n\t// Use the ShellHub package validator to validate the request body.\n\tif ok, err := v.validator.Struct(structure); !ok {\n\t\tfields, err := validator.GetInvalidFieldsFromErr(structure, err)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn errors.NewErrInvalidEntity(fields)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c554637688feff806b74e3b2912e47e7", "score": "0.5512067", "text": "func (s *AgentDetails) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"AgentDetails\"}\n\tif s.AgentVersion == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"AgentVersion\"))\n\t}\n\tif s.AgentVersion != nil && len(*s.AgentVersion) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"AgentVersion\", 1))\n\t}\n\tif s.ComponentVersions == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"ComponentVersions\"))\n\t}\n\tif s.ComponentVersions != nil && len(s.ComponentVersions) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"ComponentVersions\", 1))\n\t}\n\tif s.InstanceId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"InstanceId\"))\n\t}\n\tif s.InstanceId != nil && len(*s.InstanceId) < 10 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"InstanceId\", 10))\n\t}\n\tif s.InstanceType == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"InstanceType\"))\n\t}\n\tif s.InstanceType != nil && len(*s.InstanceType) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"InstanceType\", 1))\n\t}\n\tif s.ComponentVersions != nil {\n\t\tfor i, v := range s.ComponentVersions {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ComponentVersions\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fb1e1bfe1012d8f1b628166693c822cc", "score": "0.550661", "text": "func (s *CdmaObj) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CdmaObj\"}\n\tif s.BaseLat != nil && *s.BaseLat < -90 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BaseLat\", -90))\n\t}\n\tif s.BaseLng != nil && *s.BaseLng < -180 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"BaseLng\", -180))\n\t}\n\tif s.BaseStationId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"BaseStationId\"))\n\t}\n\tif s.CdmaNmr != nil && len(s.CdmaNmr) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"CdmaNmr\", 1))\n\t}\n\tif s.NetworkId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"NetworkId\"))\n\t}\n\tif s.PilotPower != nil && *s.PilotPower < -142 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"PilotPower\", -142))\n\t}\n\tif s.SystemId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"SystemId\"))\n\t}\n\tif s.SystemId != nil && *s.SystemId < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"SystemId\", 1))\n\t}\n\tif s.CdmaLocalId != nil {\n\t\tif err := s.CdmaLocalId.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"CdmaLocalId\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.CdmaNmr != nil {\n\t\tfor i, v := range s.CdmaNmr {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"CdmaNmr\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "34620d3b6b710b54fef404dc033fb2f4", "score": "0.5506322", "text": "func Validate(values []*Value) error {\n\t// Going through all values\n\tfor _, value := range values {\n\t\t// Setting default, if value string isn't set\n\t\tresolvedInput := value.Input\n\t\tif resolvedInput == \"\" {\n\t\t\tresolvedInput = value.Default\n\t\t}\n\n\t\t// Going through all rules for each value\n\t\tfor _, rule := range value.Rules {\n\t\t\t// Verifying rule passes\n\t\t\terr := rule(value.Name, resolvedInput)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// Set primitive + null type handlers\n\t\tif value.TypeHandler == nil {\n\t\t\terr := applyTypeHandler(value)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err.Error())\n\t\t\t}\n\t\t}\n\n\t\t// Validate against type\n\t\terr := value.TypeHandler(resolvedInput, value)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "196553345eae734c7acb298617be8ac5", "score": "0.5502611", "text": "func (m LOAType) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\t// value enum\n\tif err := m.validateLOATypeEnum(\"\", \"body\", m); err != nil {\n\t\treturn err\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c844a92fdf7330ad6f7f1c72fd6fd5b5", "score": "0.5497318", "text": "func (v *Validation) Validate(value interface{}, obj reflect.Value) *ValidationError {\r\n\treturn &ValidationError{\r\n\t\tKey: v.fieldName,\r\n\t\tMessage: \"validation not implemented\",\r\n\t}\r\n}", "title": "" }, { "docid": "e7f7f25f6544e2f91c077dc0be8160c9", "score": "0.5496373", "text": "func (s *CreateGlobalSecondaryIndexAction) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"CreateGlobalSecondaryIndexAction\"}\n\tif s.IndexName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"IndexName\"))\n\t}\n\tif s.IndexName != nil && len(*s.IndexName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"IndexName\", 3))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.Projection == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Projection\"))\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.Projection != nil {\n\t\tif err := s.Projection.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Projection\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.549579", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.549579", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "66543f632903197935784dd62b3ca4c8", "score": "0.549579", "text": "func (v *Validator) Validate(i interface{}) error {\n\treturn v.validator.Struct(i)\n}", "title": "" }, { "docid": "96084de563333a8cb2b2d7ca9b7d45f3", "score": "0.54887813", "text": "func (user *User) Validate() error {\n\tvalidate := validator.New()\n\treturn validate.Struct(user)\n\n}", "title": "" }, { "docid": "429d75ce234e2002816b0d89a0e90505", "score": "0.5488711", "text": "func (s *Address) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"Address\"}\n\tif s.City == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"City\"))\n\t}\n\tif s.City != nil && len(*s.City) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"City\", 1))\n\t}\n\tif s.Company != nil && len(*s.Company) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Company\", 1))\n\t}\n\tif s.Country == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Country\"))\n\t}\n\tif s.Country != nil && len(*s.Country) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Country\", 1))\n\t}\n\tif s.EmailAddress != nil && len(*s.EmailAddress) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"EmailAddress\", 1))\n\t}\n\tif s.Name == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Name\"))\n\t}\n\tif s.Name != nil && len(*s.Name) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Name\", 1))\n\t}\n\tif s.PhoneNumber != nil && len(*s.PhoneNumber) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"PhoneNumber\", 1))\n\t}\n\tif s.PostalCode == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"PostalCode\"))\n\t}\n\tif s.PostalCode != nil && len(*s.PostalCode) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"PostalCode\", 1))\n\t}\n\tif s.StateOrProvince == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"StateOrProvince\"))\n\t}\n\tif s.StateOrProvince != nil && len(*s.StateOrProvince) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"StateOrProvince\", 1))\n\t}\n\tif s.Street1 == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"Street1\"))\n\t}\n\tif s.Street1 != nil && len(*s.Street1) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street1\", 1))\n\t}\n\tif s.Street2 != nil && len(*s.Street2) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street2\", 1))\n\t}\n\tif s.Street3 != nil && len(*s.Street3) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Street3\", 1))\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b6fd5f745ab1e7d1104726ceec1aeded", "score": "0.54882956", "text": "func (m *CustomField) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := m.validateEnums(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateNested(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif err := m.validateRequiredStatuses(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6fd816d448132d62a3420b56aa3a318e", "score": "0.54852474", "text": "func (m *PacketBrokerInfo) ValidateFields(paths ...string) error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif len(paths) == 0 {\n\t\tpaths = PacketBrokerInfoFieldPathsNested\n\t}\n\n\tfor name, subs := range _processPaths(append(paths[:0:0], paths...)) {\n\t\t_ = subs\n\t\tswitch name {\n\t\tcase \"registration\":\n\n\t\t\tif v, ok := interface{}(m.GetRegistration()).(interface{ ValidateFields(...string) error }); ok {\n\t\t\t\tif err := v.ValidateFields(subs...); err != nil {\n\t\t\t\t\treturn PacketBrokerInfoValidationError{\n\t\t\t\t\t\tfield: \"registration\",\n\t\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\t\tcause: err,\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase \"forwarder_enabled\":\n\t\t\t// no validation rules for ForwarderEnabled\n\t\tcase \"home_network_enabled\":\n\t\t\t// no validation rules for HomeNetworkEnabled\n\t\tcase \"register_enabled\":\n\t\t\t// no validation rules for RegisterEnabled\n\t\tdefault:\n\t\t\treturn PacketBrokerInfoValidationError{\n\t\t\t\tfield: name,\n\t\t\t\treason: \"invalid field path\",\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7a39c272fdfe40ff08e6637777f53d49", "score": "0.54835284", "text": "func (m *ContainerType) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\t// no validation rules for Id\n\n\t// no validation rules for ContainerItemTypeId\n\n\t// no validation rules for MaxNumber\n\n\t// no validation rules for MaxVolume\n\n\t// no validation rules for MaxWeight\n\n\treturn nil\n}", "title": "" }, { "docid": "787134be0cb8e367a83cdfead7d99026", "score": "0.54821956", "text": "func (s *CreateCustomActionTypeInput) Validate() error {\n\tinvalidParams := aws.ErrInvalidParams{Context: \"CreateCustomActionTypeInput\"}\n\tif len(s.Category) == 0 {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Category\"))\n\t}\n\n\tif s.InputArtifactDetails == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"InputArtifactDetails\"))\n\t}\n\n\tif s.OutputArtifactDetails == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"OutputArtifactDetails\"))\n\t}\n\n\tif s.Provider == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Provider\"))\n\t}\n\tif s.Provider != nil && len(*s.Provider) < 1 {\n\t\tinvalidParams.Add(aws.NewErrParamMinLen(\"Provider\", 1))\n\t}\n\n\tif s.Version == nil {\n\t\tinvalidParams.Add(aws.NewErrParamRequired(\"Version\"))\n\t}\n\tif s.Version != nil && len(*s.Version) < 1 {\n\t\tinvalidParams.Add(aws.NewErrParamMinLen(\"Version\", 1))\n\t}\n\tif s.ConfigurationProperties != nil {\n\t\tfor i, v := range s.ConfigurationProperties {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"ConfigurationProperties\", i), err.(aws.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.InputArtifactDetails != nil {\n\t\tif err := s.InputArtifactDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"InputArtifactDetails\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.OutputArtifactDetails != nil {\n\t\tif err := s.OutputArtifactDetails.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"OutputArtifactDetails\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Settings != nil {\n\t\tif err := s.Settings.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"Settings\", err.(aws.ErrInvalidParams))\n\t\t}\n\t}\n\tif s.Tags != nil {\n\t\tfor i, v := range s.Tags {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"Tags\", i), err.(aws.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c85880d67e99a550d296a7e590fc6e81", "score": "0.548145", "text": "func (s *UpdateMissionProfileInput) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"UpdateMissionProfileInput\"}\n\tif s.MinimumViableContactDurationSeconds != nil && *s.MinimumViableContactDurationSeconds < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinValue(\"MinimumViableContactDurationSeconds\", 1))\n\t}\n\tif s.MissionProfileId == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"MissionProfileId\"))\n\t}\n\tif s.MissionProfileId != nil && len(*s.MissionProfileId) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"MissionProfileId\", 1))\n\t}\n\tif s.Name != nil && len(*s.Name) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"Name\", 1))\n\t}\n\tif s.StreamsKmsKey != nil {\n\t\tif err := s.StreamsKmsKey.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"StreamsKmsKey\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "02623cd7c811db8e875caa9cbac30922", "score": "0.5481296", "text": "func (s *TableCreationParameters) Validate() error {\n\tinvalidParams := request.ErrInvalidParams{Context: \"TableCreationParameters\"}\n\tif s.AttributeDefinitions == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"AttributeDefinitions\"))\n\t}\n\tif s.KeySchema == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"KeySchema\"))\n\t}\n\tif s.KeySchema != nil && len(s.KeySchema) < 1 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"KeySchema\", 1))\n\t}\n\tif s.TableName == nil {\n\t\tinvalidParams.Add(request.NewErrParamRequired(\"TableName\"))\n\t}\n\tif s.TableName != nil && len(*s.TableName) < 3 {\n\t\tinvalidParams.Add(request.NewErrParamMinLen(\"TableName\", 3))\n\t}\n\tif s.AttributeDefinitions != nil {\n\t\tfor i, v := range s.AttributeDefinitions {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"AttributeDefinitions\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.GlobalSecondaryIndexes != nil {\n\t\tfor i, v := range s.GlobalSecondaryIndexes {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"GlobalSecondaryIndexes\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.KeySchema != nil {\n\t\tfor i, v := range s.KeySchema {\n\t\t\tif v == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\tinvalidParams.AddNested(fmt.Sprintf(\"%s[%v]\", \"KeySchema\", i), err.(request.ErrInvalidParams))\n\t\t\t}\n\t\t}\n\t}\n\tif s.ProvisionedThroughput != nil {\n\t\tif err := s.ProvisionedThroughput.Validate(); err != nil {\n\t\t\tinvalidParams.AddNested(\"ProvisionedThroughput\", err.(request.ErrInvalidParams))\n\t\t}\n\t}\n\n\tif invalidParams.Len() > 0 {\n\t\treturn invalidParams\n\t}\n\treturn nil\n}", "title": "" } ]
39ade9973e5870eeacf936b198d0c01c
Returns bindinginfo if it exists
[ { "docid": "b79b5580b87d61a1ee8d0465e3c41f66", "score": "0.61013114", "text": "func (mgr *BinderMgr) getBindingByID(bindingID string) *BindingInfo {\n\t//check if binding is in the map and return state info.\n\t// Assuming bindingId is unique across instances.\n\tif binding, found := mgr.binds[bindingID]; found {\n\t\treturn binding\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "a9c27d16d6b949cc4f4e2335da3315fb", "score": "0.6388927", "text": "func (mgr *BinderMgr) Exists(instanceID string, bindingID string) (bool, error) {\n\tfor _, binding := range mgr.binds {\n\t\tif binding.instanceID == instanceID && binding.bindingID == bindingID {\n\t\t\treturn true, nil\n\t\t}\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "6020f1d972f6647ec7ffb827d280d1da", "score": "0.6268816", "text": "func getAvailableBinding() string {\n\tln, err := net.Listen(\"tcp\", \"[::]:0\")\n\tif err != nil {\n\t\tpanic(\"unable to get port: \" + err.Error())\n\t}\n\tdefer ln.Close()\n\treturn \":\" + strconv.Itoa(ln.Addr().(*net.TCPAddr).Port)\n}", "title": "" }, { "docid": "5f36ae943604ace0f191b478ae75559b", "score": "0.6253027", "text": "func (br *BindRecord) HasAvailableBinding() bool {\n\tfor _, binding := range br.Bindings {\n\t\tif binding.IsBindingAvailable() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e4206a750d0dd83536cc5e8ff000fa7b", "score": "0.6104158", "text": "func (t *Table) HasBinding(b string) bool {\n\treturn t.mbs[b]\n}", "title": "" }, { "docid": "b658c383abb781f9159613a6ea9f5722", "score": "0.592592", "text": "func (bindings Bindings) Get(name string) (ret Binding, ok bool) {\n\tfor _, b := range bindings {\n\t\tif b.Name == name {\n\t\t\tif len(ret.Name) == 0 || b.Scope > ret.Scope {\n\t\t\t\tret = b\n\t\t\t}\n\t\t}\n\t}\n\tif len(ret.Name) == 0 {\n\t\treturn ret, false\n\t}\n\treturn ret, true\n}", "title": "" }, { "docid": "9aa6e5f92977ebef569f80449fb63979", "score": "0.59197176", "text": "func (m *mongoAccountManager) GetEmptyBindingDetails() service.BindingDetails {\n\treturn nil\n}", "title": "" }, { "docid": "9397a8613220eca72e05bf875f40abd7", "score": "0.59154946", "text": "func (br *BindRecord) FindBinding(hint string) *Binding {\n\tfor i := range br.Bindings {\n\t\tbinding := br.Bindings[i]\n\t\tif binding.ID == hint {\n\t\t\treturn &binding\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "28512e87b454198d6a38bf63f3b403c2", "score": "0.59143245", "text": "func (p *Process) GetPreparedBinding(f *mentalese.StackFrame) mentalese.Binding {\n\n\tbinding := f.GetCurrentInBinding()\n\trelation := f.GetCurrentRelation()\n\n\tbinding = p.addMutableVariables(relation, binding)\n\n\t// filter out only the variables needed by the relation\n\tbinding = binding.FilterVariablesByName(relation.GetVariableNames())\n\n\treturn binding\n}", "title": "" }, { "docid": "d00f0e5c7b165c2d1181977874fb8ae3", "score": "0.5817179", "text": "func (self *holder) GetBindAddress() net.IP {\n\treturn self.bindAddress\n}", "title": "" }, { "docid": "3ff945310cd48eec67b1ed5699464577", "score": "0.58009577", "text": "func (c *Client) GetBind(name string, frontend string, transactionID string) (int64, *models.Bind, error) {\n\tp, err := c.GetParser(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tv, err := c.GetVersion(transactionID)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tbind, _ := c.getBindByName(name, frontend, p)\n\tif bind == nil {\n\t\treturn v, nil, NewConfError(ErrObjectDoesNotExist, fmt.Sprintf(\"Bind %s does not exist in frontend %s\", name, frontend))\n\t}\n\n\treturn v, bind, nil\n}", "title": "" }, { "docid": "8f9ebb9c037d0b04397c215d620ff279", "score": "0.57236654", "text": "func GetBinding(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *BindingState, opts ...pulumi.ResourceOption) (*Binding, error) {\n\tvar resource Binding\n\terr := ctx.ReadResource(\"google-native:gkehub/v1:Binding\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "21d22dd8ca91c2ed6651aa4beedb6b27", "score": "0.564523", "text": "func GetBindAddr(ctx context.Context) string {\n\treturn GetString(ctx, flagnames.BindAddr)\n}", "title": "" }, { "docid": "d8dfed5ec57f8b1c1e66cbd917ff8b68", "score": "0.5616578", "text": "func (c ServerConfig) GetBind() string {\n\treturn c.Bind\n}", "title": "" }, { "docid": "82410ff2a0de5a7dd824dd306f1e309d", "score": "0.55881715", "text": "func bindingForEndpoint(bindings map[uint64]*boundEndpoint, endpoint string) (uint64, *boundEndpoint, bool) {\n\tfor id, p := range bindings {\n\t\tif p.endpoint == endpoint {\n\t\t\treturn id, p, true\n\t\t}\n\t}\n\n\treturn 0, nil, false\n}", "title": "" }, { "docid": "f2af8aeee661fdc6c7fd41fd06944fe3", "score": "0.55769646", "text": "func (br *BindRecord) FindEnabledBinding() *Binding {\n\tfor _, binding := range br.Bindings {\n\t\tif binding.IsBindingEnabled() {\n\t\t\treturn &binding\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2d6536d9b21798c3e054684795afbb37", "score": "0.55666125", "text": "func GetBinding(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *BindingState, opts ...pulumi.ResourceOption) (*Binding, error) {\n\tvar resource Binding\n\terr := ctx.ReadResource(\"rabbitmq:index/binding:Binding\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "a2f689493adf39ba362e224d9b493730", "score": "0.5563589", "text": "func ServiceBindingGet(w http.ResponseWriter, r *http.Request) {\n\t// check if request header is validated\n\tflag, errFunc := checkRequestHeader(w, r)\n\tif !flag {\n\t\terrFunc(w)\n\t\treturn\n\t}\n\n\tinsID, bidID := mux.Vars(r)[\"instance_id\"], mux.Vars(r)[\"binding_id\"]\n\t// find the specified binding, and return 404 if not found\n\tpayload, err := store.FindServiceBindingPayload(insID, bidID)\n\tif err != nil {\n\t\terrMsg := fmt.Sprintf(\"service binding (%s) doesn't exist\", bidID)\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 404, \"Not Found\", errMsg)\n\t\treturn\n\t}\n\n\thandleResult(w, 200, payload.Payload)\n\treturn\n}", "title": "" }, { "docid": "0b4ee5bf01d765346f267a1eaa9a8832", "score": "0.55451536", "text": "func (b *Broker) GetBinding(ctx context.Context, first, second string) (domain.GetBindingSpec, error) {\n\treturn domain.GetBindingSpec{}, nil\n}", "title": "" }, { "docid": "5adc6fab1b17ad65b26275d421a6407b", "score": "0.54645383", "text": "func ST_BIND(info uint8) elf.SymBind", "title": "" }, { "docid": "5b10d582bb66e7a85f79cd895ecbf632", "score": "0.5448731", "text": "func (mr *MockIBindMockRecorder) GetBindInfo(v interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetBindInfo\", reflect.TypeOf((*MockIBind)(nil).GetBindInfo), v)\n}", "title": "" }, { "docid": "0b87084ef32e287b9789c90560abf135", "score": "0.5430435", "text": "func GetBinding(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *BindingState, opts ...pulumi.ResourceOption) (*Binding, error) {\n\tvar resource Binding\n\terr := ctx.ReadResource(\"azure-native:appplatform/v20190501preview:Binding\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "b3d12b08615d3344596293aa26b92858", "score": "0.5413456", "text": "func (m *Application) GetInfo()(InformationalUrlable) {\n val, err := m.GetBackingStore().Get(\"info\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(InformationalUrlable)\n }\n return nil\n}", "title": "" }, { "docid": "fb763433deb572d3b3766deef0aae011", "score": "0.54114777", "text": "func (br *BindRecord) HasEnabledBinding() bool {\n\tfor _, binding := range br.Bindings {\n\t\tif binding.IsBindingEnabled() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "5b93003d36abf61eadd315acf0eb02c2", "score": "0.5400638", "text": "func (o *CustconfAuthHttpBasic) GetBindingPointOk() (*string, bool) {\n\tif o == nil || o.BindingPoint == nil {\n\t\treturn nil, false\n\t}\n\treturn o.BindingPoint, true\n}", "title": "" }, { "docid": "2652dac36b9e51916f8c87f02dbcb18a", "score": "0.53998995", "text": "func (o *CustconfAuthHttpBasic) HasBindingPoint() bool {\n\tif o != nil && o.BindingPoint != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "7818db1fc4e97ffbc6876892d45ece96", "score": "0.5396592", "text": "func (exp *FieldExpression) GetBinding() []interface{} {\n\treturn nil\n}", "title": "" }, { "docid": "e5d19a10c2ed8625131eb6acb4619816", "score": "0.5390165", "text": "func (self *holder) GetInsecureBindAddress() net.IP {\n\treturn self.insecureBindAddress\n}", "title": "" }, { "docid": "cc86454db069b25a5c439aa886b14020", "score": "0.53881633", "text": "func (exp *PrefixedExp) GetBinding() []interface{} {\n\treturn exp.Binding\n}", "title": "" }, { "docid": "2ecd9e262d801385cd812eb8e9ac45db", "score": "0.5374597", "text": "func getBindings(kind string, actor Actor, id string) []binding {\n\tpair := pairs[kind]\n\tpair.mu.Lock()\n\tdefer pair.mu.Unlock()\n\tfound := pair.bindings.find(actor, id)\n\tlogger.Debug(\"found %v binding(s) matching {%v, %v}\", len(found), actor, id)\n\treturn found\n}", "title": "" }, { "docid": "1cd4eac4d970d0bac0975672e7158979", "score": "0.5331409", "text": "func (mgr *BinderMgr) Bind(instanceID string, bindingID string) (interface{}, error) {\n\t// Create mock binding\n\tsettings := map[string]string{\n\t\t\"instanceID\": instanceID,\n\t\t\"bindingID\": bindingID,\n\t}\n\t_, err := mgr.client.CreateBinding(settings)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcredentials := Credentials{\n\t\tinstanceID: instanceID,\n\t\tbindingID: bindingID,\n\t\t// \t\"EndpointURL\": instanceCredentials.EndpointURL\n\t\t// \t\"AccessKey\": instanceCredentials.AccessKey,\n\t\t// \t\"SecretKey\": instanceCredentials.SecretKey,\n\t}\n\t// Save binding state in memory\n\tbind := &BindingInfo{instanceID: instanceID,\n\t\tbindingID: bindingID,\n\t\tcreds: credentials}\n\tmgr.binds[bindingID] = bind\n\n\treturn bind, nil\n}", "title": "" }, { "docid": "88c25bec9bf13ddd2bd25636d691743b", "score": "0.5276543", "text": "func (m *AndroidManagedStoreAccountEnterpriseSettings) GetBindStatus()(*AndroidManagedStoreAccountBindStatus) {\n val, err := m.GetBackingStore().Get(\"bindStatus\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*AndroidManagedStoreAccountBindStatus)\n }\n return nil\n}", "title": "" }, { "docid": "4e57654cb3876291e3717b3258acb90d", "score": "0.5269417", "text": "func (s *serviceStub) BindDetails() brokerapi.BindDetails {\n\treturn brokerapi.BindDetails{\n\t\tServiceID: s.ServiceId,\n\t\tPlanID: s.PlanId,\n\t}\n}", "title": "" }, { "docid": "c3db8c93fca930c31f7f43d0946efe92", "score": "0.52484953", "text": "func (b *Binding) IsBindingAvailable() bool {\n\treturn b.IsBindingEnabled() || b.Status == Disabled\n}", "title": "" }, { "docid": "e1e4aeb3eece98ae03dfcb2c1e7fb4a6", "score": "0.5192418", "text": "func getBindToPort(mode networking.CaptureMode, node *model.Proxy) bool {\n\tif mode == networking.CaptureMode_DEFAULT {\n\t\t// Chain doesn't specify explicit config, so use the proxy defaults\n\t\treturn node.GetInterceptionMode() == model.InterceptionNone\n\t}\n\t// Explicitly configured in the config, ignore proxy defaults\n\treturn mode == networking.CaptureMode_NONE\n}", "title": "" }, { "docid": "d68d64c3f3edff68f7e7a0856c539bdd", "score": "0.5163814", "text": "func (s *Store) GetBindAddress(depositAddr, coinType string) (string, error) {\n\tvar skyAddr string\n\terr := s.db.View(func(tx *bolt.Tx) error {\n\t\tvar err error\n\t\tskyAddr, err = s.getBindAddressTx(tx, depositAddr, coinType)\n\t\treturn err\n\t})\n\treturn skyAddr, err\n}", "title": "" }, { "docid": "3b8d7fa4962d018037843d09a1f9cd0f", "score": "0.5163162", "text": "func (m *Settings) GetBindAddr() string {\n\tif m != nil {\n\t\treturn m.BindAddr\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "3b8d7fa4962d018037843d09a1f9cd0f", "score": "0.5163162", "text": "func (m *Settings) GetBindAddr() string {\n\tif m != nil {\n\t\treturn m.BindAddr\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "3b8d7fa4962d018037843d09a1f9cd0f", "score": "0.5163162", "text": "func (m *Settings) GetBindAddr() string {\n\tif m != nil {\n\t\treturn m.BindAddr\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "49ad31b7beda2899fbff6dd65fb280e6", "score": "0.516162", "text": "func (e environment) Lookup(symbol Symbol) (result interface{}, ok bool) {\n\tresult, ok = e.bindings[symbol]\n\tif !ok && e.parent != nil {\n\t\treturn e.parent.Lookup(symbol)\n\t}\n\treturn result, ok\n}", "title": "" }, { "docid": "d532d284728d668e12c022cebfef44b9", "score": "0.5151001", "text": "func (c *Client) GetBinding(ctx context.Context, r ResourceWithPolicy, role string) (*Binding, error) {\n\tctx = context.WithValue(ctx, dcl.APIRequestIDKey, dcl.CreateAPIRequestID())\n\tp, err := c.GetPolicy(ctx, r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, eb := range p.Bindings {\n\t\tif dcl.StringEquals(eb.Role, &role) {\n\t\t\treturn &eb, nil\n\t\t}\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "75aace80a78e0f3b213c527148ff59dc", "score": "0.5139144", "text": "func (o *RestrictionPolicyAttributes) GetBindingsOk() (*[]RestrictionPolicyBinding, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Bindings, true\n}", "title": "" }, { "docid": "811f3c4eb29a3ee8cf59213417ac08e4", "score": "0.5104313", "text": "func (is *instanceSharingPlugin) PollBinding(req *web.Request, next web.Handler) (*web.Response, error) {\n\treturn is.handleBinding(req, next)\n}", "title": "" }, { "docid": "7e684873093fd55017fd14d94dae5527", "score": "0.509949", "text": "func (e *Environment) Get(name string) Object {\n\treturn e.bindings[name]\n}", "title": "" }, { "docid": "210169111d20d55e12833ea3b289ccaf", "score": "0.5054593", "text": "func (gcpBroker *GCPServiceBroker) Bind(ctx context.Context, instanceID, bindingID string, details brokerapi.BindDetails, clientSupportsAsync bool) (brokerapi.Binding, error) {\n\tgcpBroker.Logger.Info(\"Binding\", lager.Data{\n\t\t\"instance_id\": instanceID,\n\t\t\"binding_id\": bindingID,\n\t\t\"details\": details,\n\t})\n\n\t// check for existing binding\n\texists, err := db_service.ExistsServiceBindingCredentialsByServiceInstanceIdAndBindingId(ctx, instanceID, bindingID)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, fmt.Errorf(\"Error checking for existing binding: %s\", err)\n\t}\n\tif exists {\n\t\treturn brokerapi.Binding{}, brokerapi.ErrBindingAlreadyExists\n\t}\n\n\t// get existing service instance details\n\tinstanceRecord, err := db_service.GetServiceInstanceDetailsById(ctx, instanceID)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, fmt.Errorf(\"Error retrieving service instance details: %s\", err)\n\t}\n\n\tserviceDefinition, serviceProvider, err := gcpBroker.getDefinitionAndProvider(instanceRecord.ServiceId)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, err\n\t}\n\n\t// verify the service exists and the plan exists\n\tplan, err := serviceDefinition.GetPlanById(details.PlanID)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, err\n\t}\n\n\t// Give the user a better error message if they give us a bad request\n\tif !isValidOrEmptyJSON(details.GetRawParameters()) {\n\t\treturn brokerapi.Binding{}, ErrInvalidUserInput\n\t}\n\n\t// validate parameters meet the service's schema and merge the plan's vars with\n\t// the user's\n\tvars, err := serviceDefinition.BindVariables(*instanceRecord, bindingID, details, plan)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, err\n\t}\n\n\t// create binding\n\tcredsDetails, err := serviceProvider.Bind(ctx, vars)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, err\n\t}\n\n\tserializedCreds, err := json.Marshal(credsDetails)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, fmt.Errorf(\"Error serializing credentials: %s. WARNING: these credentials cannot be unbound through cf. Please contact your operator for cleanup\", err)\n\t}\n\n\t// save binding to database\n\tnewCreds := models.ServiceBindingCredentials{\n\t\tServiceInstanceId: instanceID,\n\t\tBindingId: bindingID,\n\t\tServiceId: details.ServiceID,\n\t\tOtherDetails: string(serializedCreds),\n\t}\n\n\tif err := db_service.CreateServiceBindingCredentials(ctx, &newCreds); err != nil {\n\t\treturn brokerapi.Binding{}, fmt.Errorf(\"Error saving credentials to database: %s. WARNING: these credentials cannot be unbound through cf. Please contact your operator for cleanup\",\n\t\t\terr)\n\t}\n\n\tbinding, err := serviceProvider.BuildInstanceCredentials(ctx, newCreds, *instanceRecord)\n\tif err != nil {\n\t\treturn brokerapi.Binding{}, err\n\t}\n\n\treturn *binding, nil\n}", "title": "" }, { "docid": "3817963b87145bce9f88aeea72b883f0", "score": "0.50405854", "text": "func (m *MockIBind) GetBindInfo(v interface{}) interface{} {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetBindInfo\", v)\n\tret0, _ := ret[0].(interface{})\n\treturn ret0\n}", "title": "" }, { "docid": "5655ce89d20fc9936ef6d6fc7f4802b9", "score": "0.50232846", "text": "func TestNewBindingInfo(t *testing.T) {\n\ttype args struct {\n\t\ts string\n\t\td string\n\t}\n\ttests := []struct {\n\t\tname string\n\t\targs args\n\t\twantErr bool\n\t\twant *BindingInfo\n\t}{\n\t\t{\n\t\t\targs: args{s: \"status.configMapRef-password\", d: \"binding\"},\n\t\t\twant: &BindingInfo{\n\t\t\t\tFieldPath: \"status.configMapRef\",\n\t\t\t\tDescriptor: \"binding:password\",\n\t\t\t\tPath: \"password\",\n\t\t\t},\n\t\t\tname: \"{fieldPath}-{path} annotation\",\n\t\t\twantErr: false,\n\t\t},\n\t\t{\n\t\t\targs: args{s: \"status.connectionString\", d: \"binding\"},\n\t\t\twant: &BindingInfo{\n\t\t\t\tDescriptor: \"binding:status.connectionString\",\n\t\t\t\tFieldPath: \"status.connectionString\",\n\t\t\t\tPath: \"status.connectionString\",\n\t\t\t},\n\t\t\tname: \"{path} annotation\",\n\t\t\twantErr: false,\n\t\t},\n\t}\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\tb, err := NewBindingInfo(tt.args.s, tt.args.d)\n\t\t\tif err != nil && !tt.wantErr {\n\t\t\t\tt.Errorf(\"NewBindingInfo() error = %v, wantErr %v\", err, tt.wantErr)\n\t\t\t\treturn\n\t\t\t} else if err == nil {\n\t\t\t\trequire.Equal(t, tt.want, b)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "0c55759151c0d5d014c88b454bab1a6a", "score": "0.4995588", "text": "func (f *Instance) Has(name string) bool {\n\tif _, ok := f.bindings[strings.ToLower(name)]; ok {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "c5e5a86944b77806bf74ce881dfca1a0", "score": "0.4969469", "text": "func (b *Binding) GetBindingContext(\n\tcontext BindingContext,\n\tcodec crypto.Codec,\n) error {\n\tif len(b.EncryptedBindingContext) == 0 {\n\t\treturn nil\n\t}\n\tplaintext, err := codec.Decrypt(b.EncryptedBindingContext)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn json.Unmarshal(plaintext, context)\n}", "title": "" }, { "docid": "90cca5fcffd9b0fbbdcb66f8df32267b", "score": "0.49694136", "text": "func (c *Container) Bound(abstract string) bool {\n\t_, bound := c.bindings[abstract]\n\t_, boundSingleton := c.singletons[abstract]\n\treturn bound || boundSingleton\n}", "title": "" }, { "docid": "62da925cd2337030f53db1f591791808", "score": "0.49523374", "text": "func (c *CloudMemorystoreInstance) IsBound() bool {\n\treturn c.Status.Phase == corev1alpha1.BindingStateBound\n}", "title": "" }, { "docid": "86d9343bc5ac6d910d2fe5400d4940f3", "score": "0.49491528", "text": "func (h *BindHandle) GetBindRecord(hash, normdOrigSQL, db string) *BindMeta {\n\ttrace_util_0.Count(_handle_00000, 57)\n\treturn h.bindInfo.Load().(cache).getBindRecord(hash, normdOrigSQL, db)\n}", "title": "" }, { "docid": "b3b224fb7b8cbcfc8e144bdafe967e3f", "score": "0.49326384", "text": "func (c *FakeFooBindings) Get(name string, options v1.GetOptions) (result *v1alpha1.FooBinding, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewGetAction(foobindingsResource, c.ns, name), &v1alpha1.FooBinding{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.FooBinding), err\n}", "title": "" }, { "docid": "1d9abdfeef7a2d8e2eef1df396cf7bcc", "score": "0.4928945", "text": "func (s *Subnet) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn s.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "eb0b20b8b2cfcf28fb0636ab9f3f6041", "score": "0.49168816", "text": "func getBindRequest() ([]byte, *handlerError) {\n\tdata := \"<body rid='\" + strconv.Itoa(jabber_rid) + \"' xmlns='http://jabber.org/protocol/httpbind' sid='\" + jabber_sid + \"'><iq type='set' id='_bind_auth_2' xmlns='jabber:client'><bind xmlns='\" + config.BindXmlns + \"'/></iq></body>\"\n\tres_data, err := makeRequest(data, \"\")\n\tif err != nil {\n\t\treturn nil, &handlerError{err.Error, \"Unable to create bind request\", 100014}\n\t}\n\treturn res_data, nil\n}", "title": "" }, { "docid": "187861c459466632f9fcd7be004839ff", "score": "0.49139738", "text": "func (c *Device) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn c.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "c3bdff15a5c10d9d561c74b8600d3aa3", "score": "0.49079812", "text": "func ServiceBindingBinding(w http.ResponseWriter, r *http.Request) {\n\t// check if request header is validated\n\tflag, errFunc := checkRequestHeader(w, r)\n\tif !flag {\n\t\terrFunc(w)\n\t\treturn\n\t}\n\n\tinsID, bidID := mux.Vars(r)[\"instance_id\"], mux.Vars(r)[\"binding_id\"]\n\tqMap := r.URL.Query()\n\t// check if the request support async\n\tif async := qMap.Get(\"accepts_incomplete\"); async != \"true\" {\n\t\terrMsg := fmt.Sprintf(\"accepts_incomplete expected true, got %s\", async)\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 422, \"Unprocessable Entity\", errMsg)\n\t\treturn\n\t}\n\t// validate if request params is validated\n\tvar req openapi.ServiceBindingRequest\n\tif err := json.NewDecoder(r.Body).Decode(&req); err != nil {\n\t\terrMsg := fmt.Sprintf(\"request params validate failed: %v\", err)\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 400, \"Bad Request\", errMsg)\n\t\treturn\n\t}\n\tsvcID, planID := req.ServiceId, req.PlanId\n\tif svcID == \"\" || planID == \"\" {\n\t\terrMsg := fmt.Sprint(\"service_id or plan_id should not be empty\")\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 400, \"Bad Request\", errMsg)\n\t\treturn\n\t}\n\tif !store.CheckIfServiceIDExists(svcID) || !store.CheckIfPlanIDExists(svcID, planID) {\n\t\terrMsg := fmt.Sprint(\"service_id or plan_id doesn't exist\")\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 400, \"Bad Request\", errMsg)\n\t\treturn\n\t}\n\tif err := utils.ParametersSchemaCheck(*store.GetCatalogPayload(), &utils.SchemaOpts{\n\t\tServiceID: svcID,\n\t\tPlanID: planID,\n\t\tParameters: req.Parameters,\n\t\tSchemaType: \"service_binding\",\n\t\tAction: \"create\",\n\t}); err != nil {\n\t\terrMsg := fmt.Sprintf(\"request params validate failed: %v\", err)\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 400, \"Bad Request\", errMsg)\n\t\treturn\n\t}\n\t// return 409 Conflict if find service binding exists with different properties\n\tif store.CheckIfServiceBingdingExistsWithDifferentProperties(svcID, planID, insID, bidID, req.Parameters) {\n\t\terrMsg := fmt.Sprintf(\"service binding (%s) exists with different properties\", bidID)\n\t\tlog.Println(errMsg)\n\t\thandleError(w, 409, \"Conflict\", errMsg)\n\t\treturn\n\t}\n\t// return 200 OK if find service binding exists\n\tif store.CheckIfServiceBindingExists(svcID, planID, insID, bidID) {\n\t\tlog.Printf(\"service binding (%s) already exists\\n\", bidID)\n\t\tpayload, _ := store.FindServiceBindingPayload(insID, bidID)\n\t\thandleResult(w, 200, &openapi.ServiceBindingResponse{\n\t\t\tCredentials: payload.Payload.Credentials,\n\t\t})\n\t\treturn\n\t}\n\t// generate binding payload and store it in store.ServiceBindingPayloadList\n\tbindingPayload := &store.ServiceBindingPayload{\n\t\tServiceID: svcID,\n\t\tPlanID: planID,\n\t\tInstanceID: insID,\n\t\tBindingID: bidID,\n\t\tPayload: &openapi.ServiceBindingResource{\n\t\t\tCredentials: store.CredentialsPayload,\n\t\t\tParameters: req.Parameters,\n\t\t},\n\t}\n\tstore.StoreServiceBindingPayload(bindingPayload)\n\tlog.Printf(\"new service binding (%s) stored successfully\\n\", bidID)\n\n\t// return 202 Accepted after everything done\n\thandleResult(w, 202, &openapi.AsyncOperation{})\n\treturn\n}", "title": "" }, { "docid": "1f1345381ca068ed668297a3aa05f710", "score": "0.4899971", "text": "func (a *restapi) GetBindings(w http.ResponseWriter, req *http.Request, in proxy.Incoming) {\n\tq := req.URL.Query()\n\n\tbindings, err := a.proxy.GetBindings(in, apps.Context{\n\t\tUserAgentContext: apps.UserAgentContext{\n\t\t\tTeamID: q.Get(config.PropTeamID),\n\t\t\tChannelID: q.Get(config.PropChannelID),\n\t\t\tPostID: q.Get(config.PropPostID),\n\t\t\tUserAgent: q.Get(config.PropUserAgent),\n\t\t},\n\t})\n\tif err != nil {\n\t\thttputils.WriteError(w, err)\n\t\treturn\n\t}\n\t_ = httputils.WriteJSON(w, bindings)\n}", "title": "" }, { "docid": "502a671f6d129692ada559151b50f908", "score": "0.48882988", "text": "func (b *DBSubnetGroup) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn b.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "71e55fdfb5eac57c800b268aa04a2861", "score": "0.4870895", "text": "func (ee *exampleExecutor) Bind() (json.RawMessage, error) {\n\tlog.Printf(\"Binding %s\\n\", ee.Name)\n\tresp := ee.client.Bind(ee.InstanceId, ee.BindingId, ee.ServiceId, ee.PlanId, ee.BindParams)\n\n\tlog.Println(resp.String())\n\tif resp.InError() {\n\t\treturn nil, resp.Error\n\t}\n\n\tif resp.StatusCode == 201 {\n\t\treturn resp.ResponseBody, nil\n\t}\n\n\treturn nil, fmt.Errorf(\"Unexpected response code %d\", resp.StatusCode)\n}", "title": "" }, { "docid": "252b6d652038c08df4186b5b012fe23f", "score": "0.48586804", "text": "func (tr *LB) GetConnectionDetailsMapping() map[string]string {\n\treturn nil\n}", "title": "" }, { "docid": "61cfd43024343fc4b00c71836cf18caa", "score": "0.4853942", "text": "func (o *CustconfAuthHttpBasic) GetBindingPoint() string {\n\tif o == nil || o.BindingPoint == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.BindingPoint\n}", "title": "" }, { "docid": "5d3b56e001ca97770b14fc414a45408e", "score": "0.48525015", "text": "func (b Bind) Name() string {\n\treturn b.name\n}", "title": "" }, { "docid": "d14a73207ec908bd74dd5929c328e287", "score": "0.48384", "text": "func (c *FakeGoogleCloudSQLBindings) Get(name string, options v1.GetOptions) (result *v1alpha1.GoogleCloudSQLBinding, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewGetAction(googlecloudsqlbindingsResource, c.ns, name), &v1alpha1.GoogleCloudSQLBinding{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.GoogleCloudSQLBinding), err\n}", "title": "" }, { "docid": "bd70c2cd63a3754f86f66c83dfa3861e", "score": "0.4837502", "text": "func ST_INFO(bind elf.SymBind, typ elf.SymType,) uint8", "title": "" }, { "docid": "e83c4fa5c21698bd6ec53c9f34271910", "score": "0.4837403", "text": "func (c *policyBindings) Get(name string) (result *authorizationapi.PolicyBinding, err error) {\n\tresult = &authorizationapi.PolicyBinding{}\n\terr = c.r.Get().Namespace(c.ns).Resource(\"policyBindings\").Name(name).Do().Into(result)\n\treturn\n}", "title": "" }, { "docid": "c26f5ac36afdfe4b660a19da8c79872c", "score": "0.48341593", "text": "func (s *ServiceBroker) Bind(instanceID, bindingID string, details brokerapi.BindDetails) (brokerapi.Binding, error) {\n\tserviceBinding := NewServiceBinding()\n\tserviceBinding.SetInstanceID(instanceID)\n\tserviceBinding.SetBindingID(bindingID)\n\tserviceBinding.SetBindDetails(details)\n\tserviceBinding.SetActive(true)\n\terr := s.save(serviceBinding)\n\treturn brokerapi.Binding{}, err\n}", "title": "" }, { "docid": "77435f6703ec73d29e45b4f29be830bf", "score": "0.48297325", "text": "func (it *DataAttributeBindingIterator) PageInfo() *iterator.PageInfo {\n\treturn it.pageInfo\n}", "title": "" }, { "docid": "a0d09047cc557bea3edd9aca5e412bae", "score": "0.4829321", "text": "func (br *BindRecord) prepareHints(sctx sessionctx.Context) error {\n\tp := parser.New()\n\tfor i, bind := range br.Bindings {\n\t\tif (bind.Hint != nil && bind.ID != \"\") || bind.Status == deleted {\n\t\t\tcontinue\n\t\t}\n\t\thintsSet, stmt, warns, err := hint.ParseHintsSet(p, bind.BindSQL, bind.Charset, bind.Collation, br.Db)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif sctx != nil {\n\t\t\tparamChecker := &paramMarkerChecker{}\n\t\t\tstmt.Accept(paramChecker)\n\t\t\tif !paramChecker.hasParamMarker {\n\t\t\t\t_, err = getHintsForSQL(sctx, bind.BindSQL)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\thintsStr, err := hintsSet.Restore()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// For `create global binding for select * from t using select * from t`, we allow it though hintsStr is empty.\n\t\t// For `create global binding for select * from t using select /*+ non_exist_hint() */ * from t`,\n\t\t// the hint is totally invalid, we escalate warning to error.\n\t\tif hintsStr == \"\" && len(warns) > 0 {\n\t\t\treturn warns[0]\n\t\t}\n\t\tbr.Bindings[i].Hint = hintsSet\n\t\tbr.Bindings[i].ID = hintsStr\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "766faa961596caff44b18cda962b719a", "score": "0.48136392", "text": "func (o Netscaler) GetServicegroupServicegroupmemberBindingByIP(servicegroupname string, ip string, port int) (r model.ServicegroupServicegroupmemberBinding, err error) {\r\n\tresp := model.ServicegroupServicegroupmemberBindingWrapper{}\r\n\tfilter := fmt.Sprintf(\"servicegroup_servicegroupmember_binding/%s?filter=ip:%s,port:%v\", servicegroupname, ip, port)\r\n\terr = o.Session.Get(BaseURI+filter, &resp)\r\n\tif err != nil || len(resp.ServicegroupServicegroupmemberBinding) == 0 {\r\n\t\treturn\r\n\t}\r\n\tif resp.Errorcode != 0 {\r\n\t\terr = errors.New(resp.Message)\r\n\t\treturn\r\n\t}\r\n\tr = resp.ServicegroupServicegroupmemberBinding[0]\r\n\treturn\r\n}", "title": "" }, { "docid": "ca558ba5a9b15f676bfc302d0795d452", "score": "0.47943443", "text": "func (_Controller *ControllerCaller) GetContractInfo(opts *bind.CallOpts, _id [32]byte) (common.Address, [20]byte, error) {\n\tvar out []interface{}\n\terr := _Controller.contract.Call(opts, &out, \"getContractInfo\", _id)\n\n\tif err != nil {\n\t\treturn *new(common.Address), *new([20]byte), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\tout1 := *abi.ConvertType(out[1], new([20]byte)).(*[20]byte)\n\n\treturn out0, out1, err\n\n}", "title": "" }, { "docid": "8bc603f089fdf5f2c77310d62a3304a2", "score": "0.4778528", "text": "func (c *FakeServiceAccountIamBindings) Get(name string, options v1.GetOptions) (result *v1alpha1.ServiceAccountIamBinding, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewGetAction(serviceaccountiambindingsResource, c.ns, name), &v1alpha1.ServiceAccountIamBinding{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.ServiceAccountIamBinding), err\n}", "title": "" }, { "docid": "9af0718a040a0e17d96973f72eec7b40", "score": "0.47657463", "text": "func (s *SecurityGroup) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn s.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "ea50f307285ae6f8eb28382700c337e4", "score": "0.4765209", "text": "func moduleInfo[entryType moduleInfoConstraint](entry *entryType, proc *windows.LazyProc) (string, error) {\n\tvar buf []byte\n\tvar desiredLen uint32\n\tvar addr unsafe.Pointer\n\n\tfor {\n\t\te, _, _ := proc.Call(\n\t\t\tuintptr(unsafe.Pointer(entry)),\n\t\t\tuintptr(tcpipOwnerModuleBasicInfo),\n\t\t\tuintptr(addr),\n\t\t\tuintptr(unsafe.Pointer(&desiredLen)),\n\t\t)\n\t\terr := windows.Errno(e)\n\t\tif err == windows.ERROR_SUCCESS {\n\t\t\tbreak\n\t\t}\n\t\tif err == windows.ERROR_NOT_FOUND {\n\t\t\treturn \"\", nil\n\t\t}\n\t\tif err != windows.ERROR_INSUFFICIENT_BUFFER {\n\t\t\treturn \"\", err\n\t\t}\n\t\tif desiredLen > 1<<20 {\n\t\t\t// Sanity check before allocating too much.\n\t\t\treturn \"\", nil\n\t\t}\n\t\tbuf = make([]byte, desiredLen)\n\t\taddr = unsafe.Pointer(&buf[0])\n\t}\n\tif addr == nil {\n\t\t// GetOwnerModuleFromTcp*Entry can apparently return ERROR_SUCCESS\n\t\t// (NO_ERROR) on the first call without the usual first\n\t\t// ERROR_INSUFFICIENT_BUFFER result. Windows said success, so interpret\n\t\t// that was sucessfully not having data.\n\t\treturn \"\", nil\n\t}\n\tbasicInfo := (*_TCPIP_OWNER_MODULE_BASIC_INFO)(addr)\n\treturn windows.UTF16PtrToString(basicInfo.moduleName), nil\n}", "title": "" }, { "docid": "3d60467d2fbaabf47ac6c09e874c9f1e", "score": "0.47613335", "text": "func (b *Broker) Bind(ctx context.Context, instanceID string, bindID string, bindDetails domain.BindDetails, isAsyncAllowed bool) (domain.Binding, error) {\n\tbindData := &provider.BindData{\n\t\tInstanceID: instanceID,\n\t\tBindingID: bindID,\n\t\tDetails: bindDetails,\n\t}\n\tcredentials, operationData, err := b.Provider.Bind(ctx, bindData)\n\tif err != nil {\n\t\treturn domain.Binding{}, err\n\t}\n\treturn domain.Binding{Credentials: credentials, OperationData: operationData}, nil\n}", "title": "" }, { "docid": "1bbf1ecc208266b7f4f88fae59f104e9", "score": "0.4751849", "text": "func (idpSSOEl *IDPSSODescriptor) FrontChannelBindingExists() bool {\n\tfor _, SLOS := range idpSSOEl.SingleLogoutServices {\n\t\tif frontChannelBindingsSet[SLOS.Binding] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f6be533b7b674d0312d0f1383ed58c5d", "score": "0.47477165", "text": "func (serv Service) GetBinder(key string, port int) (service.Binder, error) {\n\tset, ok := serv.authorities[key]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"%w: %s\", ErrUnauthorizedKey, key)\n\t}\n\n\tif !set.Has(port) {\n\t\treturn nil, fmt.Errorf(\"%w: %d/udp (key: %s)\", ErrUnauthorizedPort, port, key)\n\t}\n\n\taddr, err := net.ResolveUDPAddr(\"udp\", \":\"+strconv.Itoa(port))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Binder{addr: addr}, nil\n}", "title": "" }, { "docid": "f496df00872ac7f4a1622b5caead1a2b", "score": "0.4743132", "text": "func UpdatePipelineBindIfNotExist(pName string, nName string) (err error) {\n\tres, err := etcdclient.Default().Get(context.TODO(), PipeBindPrefix())\n\tif err != nil {\n\t\treturn\n\t}\n\tpb := scheduler.EmptyPipelineBind()\n\tvar revision int64\n\tif len(res.Kvs) > 0 {\n\t\trevision = res.Kvs[0].CreateRevision\n\t\terr = pb.Unmarshal(res.Kvs[0].Value)\n\t}\n\tif _, ok := pb.Bindings[pName]; ok {\n\t\treturn\n\t}\n\tpb.Bindings[pName] = nName\n\ttxn := etcdclient.Default().Txn(context.TODO()).\n\t\tIf(clientv3.Compare(clientv3.CreateRevision(PipeBindPrefix()), \"=\", revision)).\n\t\tThen(clientv3.OpPut(PipeBindPrefix(), pb.Val()))\n\t_, err = txn.Commit()\n\tif err != nil {\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "1188b3ea12d2ef93be701508fdb55054", "score": "0.4739451", "text": "func unmarshalBindings(ctx UnmarshalContext, dec *marshal.Decoder) *bindings {\n\tn := dec.Varint()\n\tb := &bindings{\n\t\tframes: make([]*callFrame, n+1),\n\t}\n\tb.frames[0] = globalConsts\n\tfor i := 0; i < int(n); i++ {\n\t\tvar h hash.Hash\n\t\tdec.RawBytes(h[:])\n\t\tb.frames[i+1] = ctx.internFrame(h)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "b8e29431b735c2cb3e249f3662fbb84d", "score": "0.47207424", "text": "func loadBinding(ctx context.Context, kind string, actor Actor, partition, id string) error {\n\tpair := pairs[kind]\n\tpair.mu.Lock()\n\tdefer pair.mu.Unlock()\n\tkey := bindingKey(kind, actor, partition, id)\n\tfound := pair.bindings.find(actor, id)\n\tif len(found) > 0 { // bindingscription is already loaded\n\t\treturn nil\n\t}\n\tdata, err := store.HGetAll(ctx, key)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif len(data) == 0 { // bindingscription no longer exists\n\t\treturn err\n\t}\n\tb, err := pair.bindings.load(actor, id, key, data)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = pair.bindings.add(ctx, b)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlogger.Debug(\"loaded binding %v\", b)\n\treturn nil\n}", "title": "" }, { "docid": "68e14e88602d6d050d5062d7cf49c6c1", "score": "0.4716685", "text": "func Find(bindings []Binding, name string) (Binding, bool) {\n\tfor _, b := range bindings {\n\t\tif strings.EqualFold(b.GetName(), name) {\n\t\t\treturn b, true\n\t\t}\n\t}\n\n\treturn nil, false\n}", "title": "" }, { "docid": "9bad5f94b5f5c38c7b1b34e9009a9de5", "score": "0.47127762", "text": "func (b *Binding) GetBindingParameters(\n\tparams BindingParameters,\n\tcodec crypto.Codec,\n) error {\n\tif len(b.EncryptedBindingParameters) == 0 {\n\t\treturn nil\n\t}\n\tplaintext, err := codec.Decrypt(b.EncryptedBindingParameters)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn json.Unmarshal(plaintext, params)\n}", "title": "" }, { "docid": "904a3e3bcb45b567149279228a85458a", "score": "0.46968982", "text": "func (s *Store) getBindAddressTx(tx *bolt.Tx, depositAddr, coinType string) (string, error) {\n\tbindBktFullName := dbutil.ByteJoin(BindAddressBkt, coinType, \"_\")\n\tskyAddr, err := dbutil.GetBucketString(tx, bindBktFullName, depositAddr)\n\tswitch err.(type) {\n\tcase nil:\n\t\treturn skyAddr, nil\n\tcase dbutil.ObjectNotExistErr:\n\t\treturn \"\", nil\n\tdefault:\n\t\treturn \"\", err\n\t}\n}", "title": "" }, { "docid": "4e0e97ec63ff4bdbca2c80453d2219f1", "score": "0.4696433", "text": "func debugPrintBindings(bs []*cloudresourcemanager.Binding) string {\n\treturn tpgiamresource.DebugPrintBindings(bs)\n}", "title": "" }, { "docid": "6bc3cb5a54ec68e03b5cd3975618007f", "score": "0.4689254", "text": "func (m *connManager) getLabelInfo(hash LabelHash) labelInfo {\n\tm.Lock()\n\tdefer m.Unlock()\n\tci, ok := m.conns[hash]\n\tif !ok {\n\t\treturn labelInfo{}\n\t}\n\treturn ci.label\n}", "title": "" }, { "docid": "364720a0c012727a2ab80b501a3ac63b", "score": "0.46884593", "text": "func (m *receivedMessage) GetConnectionInfo() *gossip.ConnectionInfo {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "0a1cce84a90f51120d195a734ac077d8", "score": "0.46776775", "text": "func (a *Message) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn a.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "3b9bc76a0cbf4e05a09b7af19706c02e", "score": "0.46705386", "text": "func (b *binding) getShare(share bool) bool {\n\tif b.reflectType.Kind() != reflect.Func {\n\t\tb.share = true\n\t}\n\n\treturn share\n}", "title": "" }, { "docid": "45f5b390dae043cfcdd5c8a0d088b7eb", "score": "0.46675342", "text": "func (p *Proxy) scanAppBindings(app *apps.App, bindings []*apps.Binding, locPrefix apps.Location) []*apps.Binding {\n\tout := []*apps.Binding{}\n\tlocationsUsed := map[apps.Location]bool{}\n\tlabelsUsed := map[string]bool{}\n\tconf := p.conf.GetConfig()\n\n\tfor _, appB := range bindings {\n\t\t// clone just in case\n\t\tb := *appB\n\t\tif b.Location == \"\" {\n\t\t\tb.Location = apps.Location(app.Manifest.AppID)\n\t\t}\n\n\t\tfql := locPrefix.Make(b.Location)\n\t\tallowed := false\n\t\tfor _, grantedLoc := range app.GrantedLocations {\n\t\t\tif fql.In(grantedLoc) || grantedLoc.In(fql) {\n\t\t\t\tallowed = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !allowed {\n\t\t\tcontinue\n\t\t}\n\n\t\tif fql.IsTop() {\n\t\t\tif locationsUsed[appB.Location] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tlocationsUsed[appB.Location] = true\n\t\t} else {\n\t\t\tif b.Location == \"\" || b.Label == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif locationsUsed[appB.Location] || labelsUsed[appB.Label] {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tlocationsUsed[appB.Location] = true\n\t\t\tlabelsUsed[appB.Label] = true\n\t\t\tb.AppID = app.Manifest.AppID\n\t\t}\n\n\t\tif b.Icon != \"\" {\n\t\t\ticon, err := normalizeStaticPath(conf, app.AppID, b.Icon)\n\t\t\tif err != nil {\n\t\t\t\tp.log.WithError(err).Debugw(\"Invalid icon path in binding\",\n\t\t\t\t\t\"app_id\", app.AppID,\n\t\t\t\t\t\"icon\", b.Icon)\n\t\t\t\tb.Icon = \"\"\n\t\t\t} else {\n\t\t\t\tb.Icon = icon\n\t\t\t}\n\t\t}\n\n\t\tif len(b.Bindings) != 0 {\n\t\t\tscanned := p.scanAppBindings(app, b.Bindings, fql)\n\t\t\tif len(scanned) == 0 {\n\t\t\t\t// We do not add bindings without any valid sub-bindings\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tb.Bindings = scanned\n\t\t}\n\n\t\tout = append(out, &b)\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "96a02aa6dcc789c36a4673f90c7c0022", "score": "0.46653828", "text": "func (s *userProjectBindingLister) Get(name string) (*v1.UserProjectBinding, error) {\n\tobj, exists, err := s.indexer.GetByKey(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(v1.Resource(\"userprojectbinding\"), name)\n\t}\n\treturn obj.(*v1.UserProjectBinding), nil\n}", "title": "" }, { "docid": "d54b17372f57b7463f6d04846ab2c907", "score": "0.46637928", "text": "func (db DdbDataStore) GetServiceBinding(id string) (*serviceinstance.ServiceBinding, error) {\n\tresp, err := db.Ddb.GetItem(&dynamodb.GetItemInput{\n\t\tKey: map[string]*dynamodb.AttributeValue{\n\t\t\t\"id\": {S: aws.String(id)},\n\t\t\t\"userid\": {S: aws.String(db.Accountuuid.String())},\n\t\t},\n\t\tProjectionExpression: aws.String(\"servicebinding\"),\n\t\tTableName: aws.String(db.Tablename),\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t} else if len(resp.Item) == 0 {\n\t\treturn nil, nil\n\t}\n\n\tvar sb serviceinstance.ServiceBinding\n\terr = dynamodbattribute.Unmarshal(resp.Item[\"servicebinding\"], &sb)\n\treturn &sb, err\n}", "title": "" }, { "docid": "a53448d5dae2de572214b16764ad971a", "score": "0.46602538", "text": "func (o *WebSocketServer) GetBindIp() gdnative.String {\n\t//log.Println(\"Calling WebSocketServer.GetBindIp()\")\n\n\t// Build out the method's arguments\n\tptrArguments := make([]gdnative.Pointer, 0, 0)\n\n\t// Get the method bind\n\tmethodBind := gdnative.NewMethodBind(\"WebSocketServer\", \"get_bind_ip\")\n\n\t// Call the parent method.\n\t// String\n\tretPtr := gdnative.NewEmptyString()\n\tgdnative.MethodBindPtrCall(methodBind, o.GetBaseObject(), ptrArguments, retPtr)\n\n\t// If we have a return type, convert it from a pointer into its actual object.\n\tret := gdnative.NewStringFromPointer(retPtr)\n\treturn ret\n}", "title": "" }, { "docid": "4e355419b70d3895c8e9101bbb91e112", "score": "0.46549878", "text": "func FindDevfileServiceBinding(devfileObj parser.DevfileObj, kind string, name, context string) (string, bool, error) {\n\treturn findDevfileServiceBinding(devfileObj, kind, name, context, devfilefs.DefaultFs{})\n}", "title": "" }, { "docid": "193cd45c22a3a28ac79576cc3f451c67", "score": "0.4651281", "text": "func (_Controller *ControllerCallerSession) GetContractInfo(_id [32]byte) (common.Address, [20]byte, error) {\n\treturn _Controller.Contract.GetContractInfo(&_Controller.CallOpts, _id)\n}", "title": "" }, { "docid": "ab4bfa43c95cbce4508e3e90a98d1b1f", "score": "0.46489027", "text": "func (s kameletBindingNamespaceLister) Get(name string) (*v1alpha1.KameletBinding, error) {\n\tobj, exists, err := s.indexer.GetByKey(s.namespace + \"/\" + name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, errors.NewNotFound(v1alpha1.Resource(\"kameletbinding\"), name)\n\t}\n\treturn obj.(*v1alpha1.KameletBinding), nil\n}", "title": "" }, { "docid": "665a71b789204f82b4d34bdb107ea0c2", "score": "0.46484765", "text": "func (_Controller *ControllerSession) GetContractInfo(_id [32]byte) (common.Address, [20]byte, error) {\n\treturn _Controller.Contract.GetContractInfo(&_Controller.CallOpts, _id)\n}", "title": "" }, { "docid": "1d7a07479ea08b0924511c6c62364f8b", "score": "0.46475825", "text": "func binding(itr LexIterator) (ast.Binding, error) {\n\n\tvar zero ast.Binding\n\n\tvars, e := varList(itr)\n\tif e != nil {\n\t\treturn zero, e\n\t}\n\n\tif !itr.MatchAny(token.DEFINE, token.ASSIGN) {\n\t\treturn zero, err(itr, \"Expected DEFINE or ASSIGN\")\n\t}\n\n\top := itr.Read()\n\texprs, e := expressions(itr)\n\tif e != nil {\n\t\treturn zero, e\n\t}\n\n\treturn ast.MakeBinding(vars, op, exprs), nil\n}", "title": "" }, { "docid": "f8bb8d416244fc9a04f74050cc114ee3", "score": "0.46389917", "text": "func (kc *KubernetesCluster) GetBindingPhase() runtimev1alpha1.BindingPhase {\n\treturn kc.Status.GetBindingPhase()\n}", "title": "" }, { "docid": "c700e8f43385e279b1bdcc1237104ef0", "score": "0.46281826", "text": "func (m *Bindable) GetBindingPhase() v1alpha1.BindingPhase { return m.Phase }", "title": "" }, { "docid": "0b26ad725f47c350c62a7f8e88f8790d", "score": "0.4624922", "text": "func (o *ServiceBindingBindingCreated) IsSuccess() bool {\n\treturn true\n}", "title": "" }, { "docid": "9f013b2d643f392c7334358230e2dd18", "score": "0.46097818", "text": "func (data *Pair) Bind(r *http.Request) error {\n\treturn nil\n}", "title": "" } ]
9ce9d26d03064e7e0dd4fa3284bd54e5
versionString returns the CoreDNS version as a string.
[ { "docid": "ac7d42e9755fa47c1e1b716c623b1f6c", "score": "0.7197222", "text": "func versionString() string {\n\treturn fmt.Sprintf(\"%s-%s\\n\", caddy.AppName, caddy.AppVersion)\n}", "title": "" } ]
[ { "docid": "c074edc15d5dee3e65a77980558f1116", "score": "0.7449388", "text": "func (header Header) versionString() string {\n\tnullIndex := bytes.IndexByte(header.version[:], 0x00)\n\treturn string(header.version[:nullIndex])\n}", "title": "" }, { "docid": "3caebf9ff866149bbe8860350774ff5f", "score": "0.7380377", "text": "func (v *Version) String() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", v.Major, v.Minor, v.Patch)\n}", "title": "" }, { "docid": "305a4e36bbb433cde2c5ef7818e9c04f", "score": "0.7311647", "text": "func (v *SematicVersion) String() string {\n\treturn fmt.Sprintf(\"v%d.%d.%d\", v.major, v.minor, v.patch)\n}", "title": "" }, { "docid": "cc39f3bcee2e183fc7b5df3e951104ef", "score": "0.7296644", "text": "func VersionString() string {\n\tvar sb strings.Builder\n\tsb.WriteString(\"v\")\n\tsb.WriteString(currentVersion.String())\n\tif CommitHash != \"\" {\n\t\tsb.WriteString(\"-\")\n\t\tsb.WriteString(CommitHash)\n\t}\n\tsb.WriteString(\" \")\n\n\tif BuildDate != \"\" {\n\t\tsb.WriteString(\"(\")\n\t\tsb.WriteString(BuildDate)\n\t\tsb.WriteString(\")\")\n\t\tsb.WriteString(\" \")\n\t}\n\n\tsb.WriteString(runtime.GOOS)\n\tsb.WriteString(\"/\")\n\tsb.WriteString(runtime.GOARCH)\n\n\treturn sb.String()\n}", "title": "" }, { "docid": "856c4e44a1df48cfbfc0fd0cb9604a29", "score": "0.72056985", "text": "func (v Version) String() string {\n\treturn fmt.Sprintf(\"%d.%d\", v.Scalar, v.PID)\n}", "title": "" }, { "docid": "4bcae2bc2f938298dfe4bab9539b8459", "score": "0.71715087", "text": "func (v *Version) String() string {\n\treturn fmt.Sprintf(\"v%s.%s.%s\", v.Major, v.Minor, v.Patch)\n}", "title": "" }, { "docid": "8fbff40e7cb25032142231d2276f4f15", "score": "0.716391", "text": "func (v Version) String() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", v[0], v[1], v[2])\n}", "title": "" }, { "docid": "92a528fed0ac4918902c2c93a75b7bb5", "score": "0.71430355", "text": "func (s *Semver) String() string {\n\tstr := fmt.Sprintf(\"%d.%d.%d\", s.Major, s.Minor, s.Patch)\n\tif s.Prerelease != \"\" {\n\t\tstr += \"-\"\n\t\tstr += s.Prerelease\n\t}\n\tif s.Build != \"\" {\n\t\tstr += \"+\"\n\t\tstr += s.Build\n\t}\n\tif s.hasPrefix {\n\t\tstr = \"v\" + str\n\t}\n\treturn str\n}", "title": "" }, { "docid": "187d9a732a2a3884700f000020f6ac40", "score": "0.7031145", "text": "func (sv SemanticVersion) String() string{\n\treturn fmt.Sprintf(\"%d.%d.%d\", sv.major, sv.minor, sv.patch)\n}", "title": "" }, { "docid": "ea5fce0c6526c94435023a6e43595c56", "score": "0.70049655", "text": "func VersionString() string {\n\tif VersionRelease == \"\" {\n\t\treturn fmt.Sprintf(\"%v.%v.%v\", VersionMajor, VersionMinor, VersionPatch)\n\t}\n\treturn fmt.Sprintf(\"%v.%v.%v-%v\", VersionMajor, VersionMinor, VersionPatch, VersionRelease)\n\n}", "title": "" }, { "docid": "6ba6dcfaf4e608e4bed4baff7dcb6df3", "score": "0.699209", "text": "func (v Version) String() string {\n\treturn \"1.\" + fmt.Sprintf(\"%d\", v)\n}", "title": "" }, { "docid": "e3fcbf66b18cfdeac9f49e831f1f7599", "score": "0.69895595", "text": "func (v Version) String() string {\n\tvar buffer bytes.Buffer\n\tbuffer.WriteString(fmt.Sprintf(\"%d.%d.%d\", v.Major, v.Minor, v.Patch))\n\tif v.Label != \"\" {\n\t\tbuffer.WriteString(\"-\" + v.Label)\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "712a05abf56e88d9794b20c4a26e7d53", "score": "0.6959815", "text": "func (v VersionInfo) String() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", v.Major, v.Minor, v.Patch)\n}", "title": "" }, { "docid": "72c52c82789957dee308a4c567aa9d88", "score": "0.69590485", "text": "func (meta debMetadata) VersionString() string {\n\tvsn := meta.Version\n\tif meta.Env.Buildnum != \"\" {\n\t\tvsn += \"+build\" + meta.Env.Buildnum\n\t}\n\tif meta.Distro != \"\" {\n\t\tvsn += \"+\" + meta.Distro\n\t}\n\treturn vsn\n}", "title": "" }, { "docid": "b448f2a2963e4da0693e2e69c43b93d8", "score": "0.69246465", "text": "func VersionString() string {\n\tif VersionPrerelease != \"\" {\n\t\treturn fmt.Sprintf(\"%s-%s\", Version, VersionPrerelease)\n\t}\n\treturn Version\n}", "title": "" }, { "docid": "63e922edc00ace49f49b0597c532def6", "score": "0.6924002", "text": "func (o Version) String() string {\n\treturn fmt.Sprintf(\"%d.%d\", o[0], o[1])\n}", "title": "" }, { "docid": "c3c2dbd200076952d5bd39def8fe21cd", "score": "0.692281", "text": "func (v Version) String() string {\n\tvar buffer bytes.Buffer\n\n\tbuffer.WriteString(v.Major)\n\tbuffer.WriteString(\".\")\n\tbuffer.WriteString(v.Minor)\n\n\tif len(v.Patch) != 0 {\n\t\tbuffer.WriteString(\".\")\n\t\tbuffer.WriteString(v.Patch)\n\t}\n\tif len(v.Label) != 0 {\n\t\tbuffer.WriteString(\"-\")\n\t\tbuffer.WriteString(v.Label)\n\t}\n\tif len(v.Build) != 0 {\n\t\tbuffer.WriteString(\".\")\n\t\tbuffer.WriteString(v.Build)\n\t}\n\n\treturn buffer.String()\n}", "title": "" }, { "docid": "9824ef3b2e8e6340547ff979c3fe82ea", "score": "0.6919767", "text": "func (v VersionStruct) String() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", v.Major, v.Minor, v.Patch)\n}", "title": "" }, { "docid": "d8e2368fbbe62c1c53ee1aa84f5a2e26", "score": "0.69126916", "text": "func (v *Version) VersionString() VersionString {\n\treturn VersionString(v.String())\n}", "title": "" }, { "docid": "b5944e6210576b199d702d2644d7ee53", "score": "0.6866536", "text": "func (s GetCoreDefinitionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "9318e8681cd966847fa1dca4b8a38beb", "score": "0.6860258", "text": "func (v sdkVersion) String() string {\n\tif v.isCurrent() {\n\t\treturn \"current\"\n\t} else if v.isNumbered() {\n\t\treturn strconv.Itoa(int(v))\n\t}\n\treturn \"(no version)\"\n}", "title": "" }, { "docid": "1954817d78879fa0008b208ffe243eda", "score": "0.6848493", "text": "func (v Version) String() string {\n\treturn string(v)\n}", "title": "" }, { "docid": "1954817d78879fa0008b208ffe243eda", "score": "0.6848493", "text": "func (v Version) String() string {\n\treturn string(v)\n}", "title": "" }, { "docid": "392530c0d9e3ed2338610ef806ae9187", "score": "0.68363386", "text": "func Version() string {\n\treturn versionString\n}", "title": "" }, { "docid": "9855372dddd3a8e6d8f8ad2fed76f4a5", "score": "0.68313766", "text": "func (v Version) String() string {\n\treturn strings.Join(v, \".\")\n}", "title": "" }, { "docid": "9a209b51bcdf6e74064b65bf456debad", "score": "0.6829002", "text": "func (v *Semver) String() string {\n\tif v.Minor == \"\" {\n\t\treturn v.Major\n\t} else if v.Patch == \"\" {\n\t\treturn fmt.Sprintf(\"%s.%s\", v.Major, v.Minor)\n\t} else if v.Prerelease == \"\" {\n\t\treturn fmt.Sprintf(\"%s.%s.%s\", v.Major, v.Minor, v.Patch)\n\t} else {\n\t\treturn fmt.Sprintf(\"%s.%s.%s-%s\", v.Major, v.Minor, v.Patch, v.Prerelease)\n\t}\n}", "title": "" }, { "docid": "24747cb9c305aa2e7559ea67a15ec35e", "score": "0.68257654", "text": "func (s CoreDefinitionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "aa7de488969db1c6776a6d836214430a", "score": "0.6815714", "text": "func (v Version) String() string {\n\treturn bytes2String(v[:])\n}", "title": "" }, { "docid": "d7f3a9cfaacc5cf9947217ecc3c05825", "score": "0.68095154", "text": "func VersionString() string {\n\treturn fmt.Sprintf(\"v%s/git@%s-%s\", Version, GitCommit, GitState)\n\n}", "title": "" }, { "docid": "f5c4b13fcca985bce900fd2fa3dfa61e", "score": "0.6808427", "text": "func (v *Version) String() string {\n\tvar buf bytes.Buffer\n\tfmtParts := make([]string, len(v.segments))\n\tfor i, s := range v.segments {\n\t\t// We can ignore err here since we've pre-parsed the values in segments\n\t\tstr := strconv.FormatInt(s, 10)\n\t\tfmtParts[i] = str\n\t}\n\tfmt.Fprint(&buf, strings.Join(fmtParts, \".\"))\n\tif v.pre != \"\" {\n\t\tfmt.Fprintf(&buf, \"-%s\", v.pre)\n\t}\n\tif v.metadata != \"\" {\n\t\tfmt.Fprintf(&buf, \"+%s\", v.metadata)\n\t}\n\n\treturn buf.String()\n}", "title": "" }, { "docid": "4df16bbd812c0454eb3892e2152c91f2", "score": "0.6778007", "text": "func VersionString() string {\n\treturn fmt.Sprintf(\"scumbag v%s-%s\", Version, BuildTag)\n}", "title": "" }, { "docid": "aa9fe3c35e219998184468f09d2c16ff", "score": "0.673768", "text": "func GetVersionString() string {\n\treturn VERSION + \" api-\" + fourchan.API_VERSION + \"-git-\" + GitDescribe()\n}", "title": "" }, { "docid": "8f07ba62083ffd845d7337505c298293", "score": "0.6665731", "text": "func (s DBEngineVersion) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "22251f6df468c42834e831528424c8d3", "score": "0.6664604", "text": "func versionString() string {\n\tversion := strings.Builder{}\n\n\t// Version\n\t//\n\tversion.WriteString(Version)\n\n\t// Extras\n\t//\n\tif len(BuildDate) > 0 || len(GitSummary) > 0 || len(BuildTool) > 0 {\n\t\tif version.Len() > 0 {\n\t\t\tversion.WriteString(\" \")\n\t\t}\n\t\tversion.WriteString(\"(\")\n\t\tneedsSpace := false\n\t\t// Git Summary\n\t\t//\n\t\tif len(GitSummary) > 0 {\n\t\t\tversion.WriteString(\"build=\")\n\t\t\tversion.WriteString(GitSummary)\n\t\t\tneedsSpace = true\n\t\t}\n\t\t// Build Date\n\t\t//\n\t\tif len(BuildDate) > 0 {\n\t\t\tif needsSpace {\n\t\t\t\tversion.WriteString(\" \")\n\t\t\t}\n\t\t\tversion.WriteString(\"date=\")\n\t\t\tversion.WriteString(BuildDate)\n\t\t\tneedsSpace = true\n\t\t}\n\t\t// Build Tool\n\t\t//\n\t\tif len(BuildTool) > 0 {\n\t\t\tif needsSpace {\n\t\t\t\tversion.WriteString(\" \")\n\t\t\t}\n\t\t\tversion.WriteString(\"builder=\")\n\t\t\tversion.WriteString(BuildTool)\n\t\t\t// needsSpace = true\n\t\t}\n\t\tversion.WriteString(\")\")\n\t}\n\treturn version.String()\n}", "title": "" }, { "docid": "fdec93c107a7aacdcedbab55248e7335", "score": "0.6641945", "text": "func Version() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", major, minor, patch)\n}", "title": "" }, { "docid": "05491ee4d2bbcac69c85310ad46ef8bb", "score": "0.6574222", "text": "func Version() string {\n\tv := versionCore\n\t// add pre-release version info if we have it\n\tif versionPreRelease != \"\" {\n\t\tv += \"-\" + versionPreRelease\n\t\t// If gitCommitCount was set, add to the pre-release version\n\t\tif gitCommitCount != \"\" {\n\t\t\tv += \".\" + gitCommitCount\n\t\t}\n\t\t// if commit was set, add the + <build>\n\t\t// we only do this for pre-release versions\n\t\tif gitCommit != \"\" {\n\t\t\t// NOTE: use 14 character short hash, like Kubernetes\n\t\t\tv += \"+\" + truncate(gitCommit, 14)\n\t\t}\n\t}\n\treturn v\n}", "title": "" }, { "docid": "5159b8f1d8185fae68c8f9f875b92422", "score": "0.6539031", "text": "func Version() string {\n\treturn C.GoString(C.jsonnet_version())\n}", "title": "" }, { "docid": "49dc842b6faf49d3efb1e0b803135e17", "score": "0.652783", "text": "func (s Version) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "d632e72ac1aea5e9906164ecef884c7b", "score": "0.65267444", "text": "func (instance *Instance) MajorVersionString() string {\n\treturn strings.Join(instance.MajorVersion(), \".\")\n}", "title": "" }, { "docid": "548088565515154956ccdbab49610a2a", "score": "0.65220994", "text": "func Version() string {\n\tvar versionCore string\n\tif VersionPatch > 0 {\n\t\tversionCore = fmt.Sprintf(\"%d.%d.%d\", VersionMajor, VersionMinor, VersionPatch)\n\t} else {\n\t\tversionCore = fmt.Sprintf(\"%d.%d\", VersionMajor, VersionMinor)\n\t}\n\n\tif VersionReleaseLevel != \"\" {\n\t\tif VersionReleaseNumber > 0 {\n\t\t\treturn fmt.Sprintf(\"%s (%s revision %d)\", versionCore, VersionReleaseLevel, VersionReleaseNumber)\n\t\t}\n\t\treturn fmt.Sprintf(\"%s (%s)\", versionCore, VersionReleaseLevel)\n\t}\n\treturn versionCore\n}", "title": "" }, { "docid": "7297012b3b3294cc1832b8b06a468170", "score": "0.6512393", "text": "func Version() string {\n\treturn fmt.Sprintf(\"%d.%d\", VersionMajor, VersionMinor)\n}", "title": "" }, { "docid": "eb65ce0dafa73230a39effc064381cca", "score": "0.6509423", "text": "func versionString(v int, driver string) string {\r\n\tswitch driver {\r\n\tcase model.DatabaseDriverPostgres:\r\n\t\tminor := v % 10000\r\n\t\tmajor := v / 10000\r\n\t\treturn strconv.Itoa(major) + \".\" + strconv.Itoa(minor)\r\n\tcase model.DatabaseDriverMysql:\r\n\t\tminor := v % 1000\r\n\t\tmajor := v / 1000\r\n\t\tpatch := minor % 100\r\n\t\tminor = minor / 100\r\n\t\treturn strconv.Itoa(major) + \".\" + strconv.Itoa(minor) + \".\" + strconv.Itoa(patch)\r\n\t}\r\n\treturn \"\"\r\n}", "title": "" }, { "docid": "ef301a083313400f02fee93f5cdb5a20", "score": "0.65078646", "text": "func String() string {\n\treturn \"v\" + strconv.Itoa(Major) + \".\" + strconv.Itoa(Minor) + \".\" + strconv.Itoa(Build)\n}", "title": "" }, { "docid": "f0c9a4ec3868032de188dab8737b2eb2", "score": "0.64954555", "text": "func (a Version) String() string {\n\tif a == VersionEmpty {\n\t\treturn \"\"\n\t}\n\treturn fmt.Sprintf(\"%x\", uint16(a))\n}", "title": "" }, { "docid": "5988b8fd0f7681d246bee295224da2e6", "score": "0.6494006", "text": "func (s CreateCoreDefinitionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "56d0f169f048f00c60673206ccd8fe60", "score": "0.6493982", "text": "func (v ProtocolVersion) String() string {\n\treturn fmt.Sprintf(\"%s(%d)\", v.getDesc(), v)\n}", "title": "" }, { "docid": "707dadbb526576dc8251d2edd3d37732", "score": "0.64820504", "text": "func GetVersion() string {\n\tcStr := C.caca_get_version()\n\tb := C.GoBytes(unsafe.Pointer(cStr), C.int(C.strlen(cStr)))\n\n\treturn string(b)\n}", "title": "" }, { "docid": "18add2c42e67ddf6be56684889738ca4", "score": "0.647734", "text": "func (s GetSegmentVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0e1fe0b65cbb19d9237ea71c06b9b6b6", "score": "0.6476073", "text": "func (s SchemaVersionNumber) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "34b03c0ddbbab1da59beb0be1dead28e", "score": "0.6473698", "text": "func (s GetCoreDefinitionVersionInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "d4bedb905ffeeb8590f4efb1d2a96efb", "score": "0.6472182", "text": "func (v *Version) String() string {\n\treturn fmt.Sprintf(\"Version: %s\\nRevision: %s\\nBuild date: %s\\nGo version: %s\",\n\t\tv.Version, v.Revision, v.Build, v.Environment,\n\t)\n}", "title": "" }, { "docid": "feab2e08f454172bd37c170c82b18186", "score": "0.6461117", "text": "func CodecVersionStr() string {\n\t__ret := C.vpx_codec_version_str()\n\t__v := packPCharString(__ret)\n\treturn __v\n}", "title": "" }, { "docid": "178404f7b04c7b285e38a0673dcc12e4", "score": "0.646077", "text": "func GorootVersionString(goroot string) (string, error) {\n\tif data, err := ioutil.ReadFile(filepath.Join(\n\t\tgoroot, \"src\", \"runtime\", \"internal\", \"sys\", \"zversion.go\")); err == nil {\n\n\t\tr := regexp.MustCompile(\"const TheVersion = `(.*)`\")\n\t\tmatches := r.FindSubmatch(data)\n\t\tif len(matches) != 2 {\n\t\t\treturn \"\", errors.New(\"Invalid go version output:\\n\" + string(data))\n\t\t}\n\n\t\treturn string(matches[1]), nil\n\n\t} else if data, err := ioutil.ReadFile(filepath.Join(goroot, \"VERSION\")); err == nil {\n\t\treturn string(data), nil\n\n\t} else {\n\t\treturn \"\", err\n\t}\n}", "title": "" }, { "docid": "0177883d5c49962c46824b6771f377b9", "score": "0.64573956", "text": "func (c *control) version() string {\n\tif c.info.version.full != \"\" {\n\t\treturn c.info.version.full\n\t}\n\treturn fmt.Sprintf(\"%d.%d.%d\",\n\t\tc.info.version.major,\n\t\tc.info.version.minor,\n\t\tc.info.version.patch)\n}", "title": "" }, { "docid": "c4d870a79df73c0acd25455596c2b3b5", "score": "0.645262", "text": "func (s DBEngineVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6fb510d8e3c1ae642ec43a23af1211ba", "score": "0.64454615", "text": "func GetVersionString(more ...string) string {\n\tv := append(GetVersionParts(), more...)\n\treturn strings.Join(v, \"\\n\")\n}", "title": "" }, { "docid": "e4bc973d0b1f94ef4f77c8469fde0417", "score": "0.64377856", "text": "func (v PRVersion) String() string {\r\n\tif v.IsNum {\r\n\t\treturn strconv.FormatUint(v.VersionNum, 10)\r\n\t}\r\n\treturn v.VersionStr\r\n}", "title": "" }, { "docid": "e009cdb5c48e18bb8153150bdea03595", "score": "0.64364076", "text": "func (s DeviceDefinitionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "72b5382e743ffe91661419a5505f2414", "score": "0.6434572", "text": "func (v Version) Version() string {\n\treturn fmt.Sprintf(\"%d.%d.%d\", v.major, v.minor, v.Patch)\n}", "title": "" }, { "docid": "fe9c7a30f7509e7a9cbbfb50c78e3c5b", "score": "0.6433907", "text": "func (r *Release) GetVersionString() string {\n\treturn r.Version.String()\n}", "title": "" }, { "docid": "389f12cd30485e0437e01cb59681321c", "score": "0.6423127", "text": "func FullVersionString() string {\n\treturn fmt.Sprintf(\"%s (%s) %s\", Version, CommitHash, BuildDate)\n}", "title": "" }, { "docid": "39b89ee0f375b96f7b72a3212e9b7c81", "score": "0.6413697", "text": "func (v VhdCreatorVersion) String() string {\n\tswitch v {\n\tcase VhdCreatorVersionVS2004:\n\t\treturn \"VS2004\"\n\tcase VhdCreatorVersionVPC2004:\n\t\treturn \"VPC2004\"\n\tcase VhdCreatorVersionCSUP2011:\n\t\treturn \"SUP2011\"\n\t}\n\n\treturn fmt.Sprintf(\"%d\", v)\n}", "title": "" }, { "docid": "0ba2404c247233fb4ac15298333f9b96", "score": "0.6402295", "text": "func (s FunctionDefinitionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "4f816f20f04cb3358090643094f06928", "score": "0.6392979", "text": "func (vs Versionstamp) String() string {\n\treturn fmt.Sprintf(\"Versionstamp(%s, %d)\", fdb.Printable(vs.TransactionVersion[:]), vs.UserVersion)\n}", "title": "" }, { "docid": "15f841bfff5bbf8f30661076201c684e", "score": "0.6391005", "text": "func (this *Bucket) GetVersionAsString() string {\n version := this.GetVersion()\n versionStr := strconv.FormatUint(uint64(version), 10)\n return versionStr\n}", "title": "" }, { "docid": "492486c7745ccf2b2bce1c8a8e1aec22", "score": "0.63849634", "text": "func Version() string { return \"\" }", "title": "" }, { "docid": "507d054baedf9ce9728f227dfc9bb2a9", "score": "0.6376984", "text": "func Version() string {\n\treturn fmt.Sprintf(\"%s.%s.%s\", MajorVersion, MinorVersion, PatchVersion)\n}", "title": "" }, { "docid": "b6671ed77f68a1324891c7714bc1fa1c", "score": "0.6369548", "text": "func (v Version) String() string {\n\ts, _ := v.toJSON()\n\treturn s\n}", "title": "" }, { "docid": "7a96e1e8c2972f417c42aae57b9f81fd", "score": "0.63681525", "text": "func (s GetFunctionDefinitionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "8f99eb51012f4c5e4a0927466a1e5742", "score": "0.6367135", "text": "func (cc *V1) Version() string { return v1 }", "title": "" }, { "docid": "ce4cb2ec3d6fd19b6f5550b34872cd6b", "score": "0.6298625", "text": "func (dv DecimalVersion) String() (s string) {\n\tval := dv\n\ta := byte(val)\n\tval >>= 8\n\tb := byte(val)\n\tval >>= 8\n\tc := byte(val)\n\tval >>= 8\n\td := byte(val)\n\n\tif c == 0 {\n\t\tif d == 0 {\n\t\t\ts = fmt.Sprintf(\"%d.%d\", a, b)\n\t\t} else {\n\t\t\ts = fmt.Sprintf(\"%d.%d.%d.%d\", a, b, c, d)\n\t\t}\n\t} else if d == 0 {\n\t\ts = fmt.Sprintf(\"%d.%d.%d\", a, b, c)\n\t} else {\n\t\ts = fmt.Sprintf(\"%d.%d.%d.%d\", a, b, c, d)\n\t}\n\treturn\n}", "title": "" }, { "docid": "5cffc469884407888a214486914a99ce", "score": "0.62946707", "text": "func (s ObjectVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "5cffc469884407888a214486914a99ce", "score": "0.62946707", "text": "func (s ObjectVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "caf5f0c20ebaa2f4911a6636c7575b1a", "score": "0.628595", "text": "func (s VersionInformation) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "c853727d5682febd6aec70b6d35c3bb1", "score": "0.62855273", "text": "func (s SolutionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "70de824d112d9edeb4f7bb1db5ed8d81", "score": "0.6281775", "text": "func (s LoggerDefinitionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "d265dc81d1b80673c9b5c872277ac737", "score": "0.62770265", "text": "func Version() string {\n\treturn myVersion\n}", "title": "" }, { "docid": "f6493446134fe89ed97ef69ac5fdc231", "score": "0.6274237", "text": "func (v versionInfo) String() string {\n\tdate := tweegoDate\n\tif date != \"\" {\n\t\tdate = \" (\" + date + \")\"\n\t}\n\treturn fmt.Sprintf(\"version %s%s [%s]\", v.Version(), date, v.Platform())\n}", "title": "" }, { "docid": "34435df4a00e0015c6c158dca23c2323", "score": "0.6272243", "text": "func (d DocumentVersion) String() string {\n\treturn fmt.Sprint(d.Number)\n}", "title": "" }, { "docid": "f36b7e0ebcf0c2124a214e99d314c2ab", "score": "0.626119", "text": "func (o Version) String() string {\n\tfor i, ver := range verintlist {\n\t\tif ver == int(o) {\n\t\t\treturn verstringlist[i]\n\t\t}\n\t}\n\treturn verstringlist[len(verstringlist)-1]\n}", "title": "" }, { "docid": "b8ebc8420fa68958a87b8b9bc98ee6a8", "score": "0.6251943", "text": "func (v Version) String() string {\n\tif len(v.Stage.String()) == 0 {\n\t\treturn fmt.Sprintf(\"v%d\", v.Number)\n\t}\n\treturn fmt.Sprintf(\"v%d-%s\", v.Number, v.Stage)\n}", "title": "" }, { "docid": "d9741b9c28ad459751a3d6785f339093", "score": "0.6251553", "text": "func (s ListCoreDefinitionVersionsOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6e53cf95629bb78c3e8192f297a0ab3a", "score": "0.62444466", "text": "func GetVersionString() (string, error) {\n\tnoSocketFile()\n\tmysqlRoot, err := vtenv.VtMysqlRoot()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tmysqldPath, err := binaryPath(mysqlRoot, \"mysqld\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\t_, version, err := execCmd(mysqldPath, []string{\"--version\"}, nil, mysqlRoot, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn version, nil\n}", "title": "" }, { "docid": "cecac16d200e9b0715efb5c3a2ab2a86", "score": "0.62326217", "text": "func Version() string {\n\treturn fmt.Sprintf(\"%s v%s.%s%s\", NAME, MAJORVER, MINORVER, RELEASEVER)\n}", "title": "" }, { "docid": "8d9b957d77b9cda69a5e55f98f7e9156", "score": "0.62279797", "text": "func (s GetDeviceDefinitionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "49bae288a89b5fa8b5827df075ae0f44", "score": "0.6222878", "text": "func (l *Libvirt) Version() (string, error) {\n\tresp, err := l.request(constants.ProcConnectGetLibVersion, constants.ProgramRemote, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tr := <-resp\n\tif r.Status != StatusOK {\n\t\treturn \"\", decodeError(r.Payload)\n\t}\n\n\tresult := struct {\n\t\tVersion uint64\n\t}{}\n\n\tdec := xdr.NewDecoder(bytes.NewReader(r.Payload))\n\t_, err = dec.Decode(&result)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The version is provided as an int following this formula:\n\t// version * 1,000,000 + minor * 1000 + micro\n\t// See src/libvirt-host.c # virConnectGetLibVersion\n\tmajor := result.Version / 1000000\n\tresult.Version %= 1000000\n\tminor := result.Version / 1000\n\tresult.Version %= 1000\n\tmicro := result.Version\n\n\tversionString := fmt.Sprintf(\"%d.%d.%d\", major, minor, micro)\n\treturn versionString, nil\n}", "title": "" }, { "docid": "49bae288a89b5fa8b5827df075ae0f44", "score": "0.6222878", "text": "func (l *Libvirt) Version() (string, error) {\n\tresp, err := l.request(constants.ProcConnectGetLibVersion, constants.ProgramRemote, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tr := <-resp\n\tif r.Status != StatusOK {\n\t\treturn \"\", decodeError(r.Payload)\n\t}\n\n\tresult := struct {\n\t\tVersion uint64\n\t}{}\n\n\tdec := xdr.NewDecoder(bytes.NewReader(r.Payload))\n\t_, err = dec.Decode(&result)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The version is provided as an int following this formula:\n\t// version * 1,000,000 + minor * 1000 + micro\n\t// See src/libvirt-host.c # virConnectGetLibVersion\n\tmajor := result.Version / 1000000\n\tresult.Version %= 1000000\n\tminor := result.Version / 1000\n\tresult.Version %= 1000\n\tmicro := result.Version\n\n\tversionString := fmt.Sprintf(\"%d.%d.%d\", major, minor, micro)\n\treturn versionString, nil\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "92b81beb5222c70953fc425a66b7289c", "score": "0.6193863", "text": "func Version() string {\n\treturn version\n}", "title": "" }, { "docid": "1076597133e54470f0ac0eb3f4fcc834", "score": "0.61898196", "text": "func (v *Versioning) String() string {\n\tif v.Project != \"\" {\n\t\treturn v.Project\n\t}\n\treturn v.Version\n}", "title": "" }, { "docid": "5ab2dfda09e9128afdb992dc46f01874", "score": "0.6183081", "text": "func (v SemVer) Version() string {\n\tvar tail string\n\n\tif len(v.Prerelease) > 0 {\n\t\ttail += \"-\" + strings.Join(v.Prerelease, \".\")\n\t}\n\n\tif len(v.Metadata) > 0 {\n\t\ttail += \"+\" + strings.Join(v.Metadata, \".\")\n\t}\n\n\treturn fmt.Sprintf(\"%d.%d.%d%s\", v.Major, v.Minor, v.Patch, tail)\n}", "title": "" }, { "docid": "91b6ca50935054e845c5d7f197043d11", "score": "0.61724997", "text": "func (s ConnectorDefinitionVersion) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "78249601a80eff7cfcc4a56c425ac17a", "score": "0.61715716", "text": "func Version() string {\n\tif version == \"\" {\n\t\ttm, err := strconv.ParseInt(Compiled, 10, 64)\n\t\tif err != nil {\n\t\t\treturn \"unable to parse compiled time\"\n\t\t}\n\t\tversion = fmt.Sprintf(\"%s %s (branch: %s, git+sha: %s, built: %s)\", Prog, Release, GitBranch, GitSHA, time.Unix(tm, 0).Format(\"02-01-2006\"))\n\t}\n\n\treturn version\n}", "title": "" }, { "docid": "ae625eb4f97b1f866b639d2e41259520", "score": "0.61670136", "text": "func (s GetLoggerDefinitionVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
244944257e36445bcceae04c6c7a7852
DeleteWorkorder deletes a speicifc workorder by ID
[ { "docid": "f9b5910187f166b32d3fc73501fc92eb", "score": "0.8115998", "text": "func DeleteWorkorder(w http.ResponseWriter, r *http.Request) *appError {\n\tdefer r.Body.Close()\n\tvar order models.Workorder\n\tif err := json.NewDecoder(r.Body).Decode(&order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to decode json body.\", http.StatusBadRequest}\n\t}\n\tif err := workorderDao.Delete(order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to delete workorder.\", http.StatusBadRequest}\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "2b0e5a5b8afbfd9dd415e80a9d8252b0", "score": "0.82422364", "text": "func (w *WorkOrder) DeleteWorkOrder(db *sql.DB) (sql.Result, error) {\r\n\treturn db.Exec(\"DELETE FROM work_orders WHERE id = ?\", w.ID)\r\n}", "title": "" }, { "docid": "821f3766094e36b9da8cf1c98770721f", "score": "0.7495207", "text": "func (w *WorkOrder) DeleteWorkOrderTransaction(db *sql.Tx) (sql.Result, error) {\r\n\treturn db.Exec(\"DELETE FROM work_orders WHERE id = ?\", w.ID)\r\n}", "title": "" }, { "docid": "6fe412f77df30b6f005af87f02a24521", "score": "0.68591917", "text": "func DeleteWorkByID(svc *dynamodb.DynamoDB, id string) error {\n\n\tinput := &dynamodb.DeleteItemInput{\n\t\tKey: map[string]*dynamodb.AttributeValue{\n\t\t\t\"id\": {\n\t\t\t\tS: aws.String(id),\n\t\t\t},\n\t\t},\n\t\tTableName: aws.String(WorkTableName),\n\t}\n\n\t_, err := svc.DeleteItem(input)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "f9dc6f356deb277299f4930fc1a48ec1", "score": "0.6259438", "text": "func (client ContainerEngineClient) deleteWorkRequest(ctx context.Context, request common.OCIRequest, binaryReqBody *common.OCIReadSeekCloser, extraHeaders map[string]string) (common.OCIResponse, error) {\n\n\thttpRequest, err := request.HTTPRequest(http.MethodDelete, \"/workRequests/{workRequestId}\", binaryReqBody, extraHeaders)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar response DeleteWorkRequestResponse\n\tvar httpResponse *http.Response\n\thttpResponse, err = client.Call(ctx, &httpRequest)\n\tdefer common.CloseBodyIfValid(httpResponse)\n\tresponse.RawResponse = httpResponse\n\tif err != nil {\n\t\tapiReferenceLink := \"https://docs.oracle.com/iaas/api/#/en/containerengine/20180222/WorkRequest/DeleteWorkRequest\"\n\t\terr = common.PostProcessServiceError(err, \"ContainerEngine\", \"DeleteWorkRequest\", apiReferenceLink)\n\t\treturn response, err\n\t}\n\n\terr = common.UnmarshalResponse(httpResponse, &response)\n\treturn response, err\n}", "title": "" }, { "docid": "9422b2db49a1033229a46a50824bf111", "score": "0.60322326", "text": "func (db *DB) DeleteWorkout(workoutID int) error {\n\t_, err := db.Exec(\n\t\t`DELETE FROM workouts WHERE id = $1`,\n\t\tworkoutID,\n\t)\n\treturn err\n}", "title": "" }, { "docid": "9c3ac095f2357c105e64f9d844370548", "score": "0.60089576", "text": "func DeleteWorkout(ctx context.Context, conn pgxload.PgxTxLoader, workoutID uuid.UUID) error {\n\n\terr := ClearWorkoutWorkoutCategories(ctx, conn, workoutID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = conn.Exec(ctx, pgxload.RebindPositional(\"DELETE FROM \"+database.TableName(workout.Workout{})+\" WHERE id = ?\"), workoutID)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5be1e9003cf4a06a70af7e2d919e490a", "score": "0.5941207", "text": "func (client ContainerEngineClient) DeleteWorkRequest(ctx context.Context, request DeleteWorkRequestRequest) (response DeleteWorkRequestResponse, err error) {\n\tvar ociResponse common.OCIResponse\n\tpolicy := common.DefaultRetryPolicy()\n\tif client.RetryPolicy() != nil {\n\t\tpolicy = *client.RetryPolicy()\n\t}\n\tif request.RetryPolicy() != nil {\n\t\tpolicy = *request.RetryPolicy()\n\t}\n\tociResponse, err = common.Retry(ctx, request, client.deleteWorkRequest, policy)\n\tif err != nil {\n\t\tif ociResponse != nil {\n\t\t\tif httpResponse := ociResponse.HTTPResponse(); httpResponse != nil {\n\t\t\t\topcRequestId := httpResponse.Header.Get(\"opc-request-id\")\n\t\t\t\tresponse = DeleteWorkRequestResponse{RawResponse: httpResponse, OpcRequestId: &opcRequestId}\n\t\t\t} else {\n\t\t\t\tresponse = DeleteWorkRequestResponse{}\n\t\t\t}\n\t\t}\n\t\treturn\n\t}\n\tif convertedResponse, ok := ociResponse.(DeleteWorkRequestResponse); ok {\n\t\tresponse = convertedResponse\n\t} else {\n\t\terr = fmt.Errorf(\"failed to convert OCIResponse into DeleteWorkRequestResponse\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "ab159879d615963d05fcc34764fc91ce", "score": "0.589756", "text": "func Delete(db gorp.SqlExecutor, id string) error {\n\tconsumerID, err := db.SelectNullStr(\"SELECT auth_consumer_id FROM worker WHERE id = $1\", id)\n\tif err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\n\tquery := `DELETE FROM worker WHERE id = $1`\n\tif _, err := db.Exec(query, id); err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\n\tif consumerID.Valid {\n\t\tif err := authentication.DeleteConsumerByID(db, consumerID.String); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif _, err := db.Exec(\"UPDATE workflow_node_run_job SET worker_id = NULL WHERE worker_id = $1\", id); err != nil {\n\t\treturn sdk.WrapError(err, \"cannot update workflow_node_run_job to remove worker id in job if exists\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "084f41f87fa057147408e106d267ced8", "score": "0.58641005", "text": "func (ctrl OrderController) Delete(w http.ResponseWriter, r *http.Request) {\n\tlogStartInfo(ctrl.Name, funcName(), time.Now())\n\n\tsession, err := Authenticate(r)\n\tif err != nil {\n\t\tresponseError(w, http.StatusInternalServerError, fmt.Sprintf(\"Error while deleting order: %v\", err))\n\t\treturn\n\t}\n\torderID := pat.Param(r, \"id\")\n\torder := &model.Order{ID: orderID}\n\tif err := order.Delete(session.TenantID); err != nil {\n\t\tresponseError(w, http.StatusInternalServerError, fmt.Sprintf(\"Error while deleting order: %v\", err))\n\t\treturn\n\t}\n\trespondSucceed(w, \"Deleting order successfully\")\n}", "title": "" }, { "docid": "2f96c62e7c5e3d134d879e75369fe1da", "score": "0.5838266", "text": "func (f *Workflow) Delete(ctx context.Context, id string) error {\n\tif _, ok := f.Objs[id]; ok {\n\t\tdelete(f.Objs, id)\n\n\t\treturn nil\n\t}\n\n\treturn client.ErrNotFound\n}", "title": "" }, { "docid": "42c0944208f7f9c8fc3d5588bca6250c", "score": "0.58261734", "text": "func DeleteFromWorkflow(db gorp.SqlExecutor, workflowID int64) error {\n\tquery := \"DELETE FROM workflow_project_integration WHERE workflow_id = $1\"\n\n\tif _, err := db.Exec(query, workflowID); err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "57e3f90fab6abb509f47e59f65b29c14", "score": "0.57961184", "text": "func (o *CMFShopOrder) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no CMFShopOrder provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cmfShopOrderPrimaryKeyMapping)\n\tsql := \"DELETE FROM `cmf_shop_order` WHERE `id`=?\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from cmf_shop_order\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for cmf_shop_order\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "d18cab6629aa0865ac1b5d64f26f5294", "score": "0.5763559", "text": "func (jt *WorkflowService) DeleteWorkflow(id int) (*WorkflowJT, error) {\n\tresult := new(WorkflowJT)\n\tendpoint := fmt.Sprintf(\"/api/v2/workflow_job_templates/%d\", id)\n\n\tresp, err := jt.client.Requester.Delete(endpoint, result, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := CheckResponse(resp); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "f39dd88ad6e774b6e6e7a0db029324ae", "score": "0.575096", "text": "func (puo *ProjectUpdateOne) RemoveWorkOrders(w ...*WorkOrder) *ProjectUpdateOne {\n\tids := make([]string, len(w))\n\tfor i := range w {\n\t\tids[i] = w[i].ID\n\t}\n\treturn puo.RemoveWorkOrderIDs(ids...)\n}", "title": "" }, { "docid": "da0f8f64a426fec3a6efc83d4ec04ad4", "score": "0.57360697", "text": "func (d DB) DeleteWorkflow(_ context.Context, _ string, _ int32) error {\n\treturn nil\n}", "title": "" }, { "docid": "1e5e93bc0277ad56ce5467406d0feb32", "score": "0.57357883", "text": "func (lc *LinkCreate) SetWorkOrderID(id string) *LinkCreate {\n\tif lc.work_order == nil {\n\t\tlc.work_order = make(map[string]struct{})\n\t}\n\tlc.work_order[id] = struct{}{}\n\treturn lc\n}", "title": "" }, { "docid": "ddb03e637dea6d2badece420a90d6b63", "score": "0.57354987", "text": "func DeleteLotteryOrder(id int) (err error) {\n\to := orm.NewOrm()\n\tv := LotteryOrder{Id: id}\n\t// ascertain id exists in the database\n\tif err = o.Read(&v); err == nil {\n\t\tvar num int64\n\t\tif num, err = o.Delete(&LotteryOrder{Id: id}); err == nil {\n\t\t\tfmt.Println(\"Number of records deleted in database:\", num)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "83d3c1a6cd21589ba7306cdf6ca3b772", "score": "0.5700211", "text": "func DeleteWorkByUserID(svc *dynamodb.DynamoDB, userID string) error {\n\n\tfilt := expression.Name(\"userId\").Equal(expression.Value(userID))\n\n\texpr, err := expression.NewBuilder().WithFilter(filt).Build()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tparams := &dynamodb.ScanInput{\n\t\tExpressionAttributeNames: expr.Names(),\n\t\tExpressionAttributeValues: expr.Values(),\n\t\tFilterExpression: expr.Filter(),\n\t\tTableName: aws.String(WorkTableName),\n\t}\n\n\tresult, err := svc.Scan(params)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\twriteRequest := []*dynamodb.WriteRequest{}\n\n\tif len(result.Items) != 0 {\n\t\tfor _, i := range result.Items {\n\t\t\titem := Work{}\n\t\t\terr = dynamodbattribute.UnmarshalMap(i, &item)\n\n\t\t\twriteRequest = append(\n\t\t\t\twriteRequest,\n\t\t\t\t&dynamodb.WriteRequest{\n\t\t\t\t\tDeleteRequest: &dynamodb.DeleteRequest{\n\t\t\t\t\t\tKey: map[string]*dynamodb.AttributeValue{\n\t\t\t\t\t\t\t\"id\": {\n\t\t\t\t\t\t\t\tS: aws.String(item.ID),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t)\n\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tinput := &dynamodb.BatchWriteItemInput{\n\t\t\tRequestItems: map[string][]*dynamodb.WriteRequest{\n\t\t\t\tWorkTableName: writeRequest,\n\t\t\t},\n\t\t}\n\n\t\t_, err = svc.BatchWriteItem(input)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2f7c1af98b8c5a45dcb96b9dcc4a617c", "score": "0.56924725", "text": "func (m *CheckListCategoryMutation) SetWorkOrderID(id int) {\n\tm.work_order = &id\n}", "title": "" }, { "docid": "aa22793ed10d447ba2fe53d97fdb0f61", "score": "0.5691886", "text": "func (pu *ProjectUpdate) RemoveWorkOrders(w ...*WorkOrder) *ProjectUpdate {\n\tids := make([]string, len(w))\n\tfor i := range w {\n\t\tids[i] = w[i].ID\n\t}\n\treturn pu.RemoveWorkOrderIDs(ids...)\n}", "title": "" }, { "docid": "19b0ae04db0ab250d8cae174ca27ed78", "score": "0.56456304", "text": "func (m *LinkMutation) SetWorkOrderID(id int) {\n\tm.work_order = &id\n}", "title": "" }, { "docid": "95f161e10a4bf481788409b07eddd306", "score": "0.5640072", "text": "func (m *PropertyMutation) SetWorkOrderID(id int) {\n\tm.work_order = &id\n}", "title": "" }, { "docid": "c359e62f23782a659148da523e25caa7", "score": "0.56330544", "text": "func Delete(db gorp.SqlExecutor, ID int64) error {\n\tm := WorkerModel(sdk.Model{ID: ID})\n\tcount, err := db.Delete(&m)\n\tif err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\tif count == 0 {\n\t\treturn sdk.WithStack(sdk.ErrNoWorkerModel)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e09a7a25b3e074a1fadf43abb8b7c73b", "score": "0.56068134", "text": "func (m *EquipmentMutation) SetWorkOrderID(id int) {\n\tm.work_order = &id\n}", "title": "" }, { "docid": "fd899acbdd667a3591f92d6e162cb092", "score": "0.55930203", "text": "func (c *Order) Delete(id string) interface{} {\n\n\tvar befData Order\n\tgt.NewCrud().DB().First(&befData, id)\n\n\tif err := crud.Delete(id).Error(); err != nil {\n\t\treturn result.GetError(err)\n\t}\n\t// 删除订单关联的其他表信息\n\tgo func() {\n\t\tcrud.Select(\"delete from `order_goods` where order_id = ?\", id).Exec()\n\t\t// 操作记录\n\t\tgo record.Log(cons.Order, befData.AdminID, \"客户[\"+befData.ClientName+\"]订单被取消, 订单支付编号:\"+befData.OutTradeNo, befData)\n\t}()\n\treturn result.MapDelete\n}", "title": "" }, { "docid": "726da07f0951064f90f9fac93ddfce41", "score": "0.5568683", "text": "func DeleteOrder(floor int, ch_outgoing_msg chan<- config.Message, call_is_local bool) {\n\tlast_button := config.BUTTON_CALL_DOWN\n\tif call_is_local {\n\t\tlast_button = config.BUTTON_COMMAND\n\t\tch_outgoing_msg <- config.Message{Msg_type: config.DELETE_ORDER, Button: config.ButtonStruct{Floor: floor}}\n\t}\n\tfor button := config.BUTTON_CALL_UP; button <= last_button; button++ {\n\t\tQueue[floor][button].Active = false\n\t\tQueue[floor][button].Addr = \"\"\n\t\tif Queue[floor][button].Timer != nil {\n\t\t\tQueue[floor][button].Timer.Stop()\n\t\t}\n\t}\n\tFileWrite(config.QUEUE_FILENAME)\n}", "title": "" }, { "docid": "adac3be1b8869cd4a9f72b7b0212f445", "score": "0.5544633", "text": "func (auo *ActivityUpdateOne) SetWorkOrderID(id int) *ActivityUpdateOne {\n\tauo.mutation.SetWorkOrderID(id)\n\treturn auo\n}", "title": "" }, { "docid": "bc467e16ed790fc1f613fec6d0249c9b", "score": "0.55284476", "text": "func Delete(context interface{}, db *db.DB, id string) error {\n\tlog.Dev(context, \"Delete\", \"Started : Submission[%s]\", id)\n\n\tif !bson.IsObjectIdHex(id) {\n\t\tlog.Error(context, \"Delete\", ErrInvalidID, \"Completed\")\n\t\treturn ErrInvalidID\n\t}\n\n\tobjectID := bson.ObjectIdHex(id)\n\n\tf := func(c *mgo.Collection) error {\n\t\tlog.Dev(context, \"Delete\", \"MGO : db.%s.remove(%s)\", c.Name, mongo.Query(objectID))\n\t\treturn c.RemoveId(objectID)\n\t}\n\n\tif err := db.ExecuteMGO(context, Collection, f); err != nil {\n\t\tlog.Error(context, \"Delete\", err, \"Completed\")\n\t\treturn err\n\t}\n\n\tlog.Dev(context, \"Delete\", \"Started\")\n\treturn nil\n}", "title": "" }, { "docid": "c0b76c5bd8cb41c874aeffb2e57fc45d", "score": "0.54828316", "text": "func (w *WorkOrder) DeleteAssignedUsersTransaction(db *sql.Tx) (sql.Result, error) {\r\n\treturn db.Exec(\r\n\t\t\"DELETE FROM work_order_users WHERE work_order_id = ?\",\r\n\t\tw.ID,\r\n\t)\r\n}", "title": "" }, { "docid": "980af334e297dd306276bf67235a08ce", "score": "0.54783803", "text": "func (c *Client) DeleteWorkitem(ctx context.Context, path string) (*http.Response, error) {\n\treq, err := c.NewDeleteWorkitemRequest(ctx, path)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "f22add65d365e56b588d454c87b7189b", "score": "0.5463666", "text": "func UpdateWorkorder(w http.ResponseWriter, r *http.Request) *appError {\n\tdefer r.Body.Close()\n\tvar order models.Workorder\n\tif err := json.NewDecoder(r.Body).Decode(&order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to decode json body.\", http.StatusBadRequest}\n\t}\n\tif err := workorderDao.Update(order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to update workorder.\", http.StatusBadRequest}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "549f3ae2243b5ad3b3cadddfd047d7bd", "score": "0.5456551", "text": "func (m *CheckListCategoryMutation) WorkOrderID() (id int, exists bool) {\n\tif m.work_order != nil {\n\t\treturn *m.work_order, true\n\t}\n\treturn\n}", "title": "" }, { "docid": "8ab080a913b6a382c22c256f627c1562", "score": "0.5449557", "text": "func (wotuo *WorkOrderTypeUpdateOne) RemoveWorkOrders(w ...*WorkOrder) *WorkOrderTypeUpdateOne {\n\tids := make([]string, len(w))\n\tfor i := range w {\n\t\tids[i] = w[i].ID\n\t}\n\treturn wotuo.RemoveWorkOrderIDs(ids...)\n}", "title": "" }, { "docid": "abf70b800e981a8e86d30506cdc351e4", "score": "0.5444995", "text": "func Delete(client *ticketmatic.Client, id int64) error {\n\tr := client.NewRequest(\"DELETE\", \"/{accountname}/settings/communicationanddesign/ordermails/{id}\", \"json\")\n\tr.UrlParameters(map[string]interface{}{\n\t\t\"id\": id,\n\t})\n\n\treturn r.Run(nil)\n}", "title": "" }, { "docid": "fda2b70d27192378ba4185d1511d99df", "score": "0.54372597", "text": "func GetWorkOrderByID(db *sql.DB, id int64) (*WorkOrder, error) {\r\n\torder := &WorkOrder{}\r\n\trow := db.QueryRow(\r\n\t\t\"SELECT id, code, description, state, start_date, end_date FROM work_orders WHERE id = ?\",\r\n\t\tid,\r\n\t)\r\n\tif err := row.Scan(&order.ID, &order.Code, &order.Description, &order.State, &order.StartDate, &order.EndDate); err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\treturn order, nil\r\n}", "title": "" }, { "docid": "d223ec6cf9b609b76f08d9557999d2ab", "score": "0.5423579", "text": "func (s *ShopOrdersEndpoint) Delete(ctx context.Context, division int, id *types.GUID) error {\n\tb, _ := s.client.ResolvePathWithDivision(\"/api/v1/{division}/manufacturing/ShopOrders\", division) // #nosec\n\tu, err := api.AddOdataKeyToURL(b, id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, r, requestError := s.client.NewRequestAndDo(ctx, \"DELETE\", u.String(), nil, nil)\n\tif requestError != nil {\n\t\treturn requestError\n\t}\n\n\tif r.StatusCode != http.StatusNoContent {\n\t\tbody, _ := ioutil.ReadAll(r.Body) // #nosec\n\t\treturn fmt.Errorf(\"Failed with status %v and body %v\", r.StatusCode, body)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2be7744838fba29eac46d6f9a0cb361c", "score": "0.5408838", "text": "func (a *Applicator) DeleteWorkflowWithHieraData(workflowName string, hieraData map[string]string) {\n\ta.applyWithHieraData(workflowName, hieraData, wf.Delete)\n}", "title": "" }, { "docid": "e208b7b2d5832f77d30c05e93dbe2909", "score": "0.5408277", "text": "func DeleteWorker(conf *Conf, db DB, pk WorkerPK) (err error) {\n\tipk, err := dynamodbattribute.MarshalMap(pk)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to marshal keys map\")\n\t}\n\n\tif _, err = db.DeleteItem(&dynamodb.DeleteItemInput{\n\t\tTableName: aws.String(conf.WorkersTableName),\n\t\tKey: ipk,\n\t\tConditionExpression: aws.String(\"attribute_exists(#wrk)\"),\n\t\tExpressionAttributeNames: map[string]*string{\n\t\t\t\"#wrk\": aws.String(\"wrk\"),\n\t\t},\n\t}); err != nil {\n\t\taerr, ok := err.(awserr.Error)\n\t\tif !ok || aerr.Code() != dynamodb.ErrCodeConditionalCheckFailedException {\n\t\t\treturn errors.Wrap(err, \"failed to delete item\")\n\t\t}\n\n\t\treturn ErrWorkerNotExists\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9ec8b19239cf8dd8506e39f5de71d949", "score": "0.5394093", "text": "func (s *WorkcentersEndpoint) Delete(ctx context.Context, division int, id *types.GUID) error {\n\tb, _ := s.client.ResolvePathWithDivision(\"/api/v1/{division}/manufacturing/Workcenters\", division) // #nosec\n\tu, err := api.AddOdataKeyToURL(b, id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, r, requestError := s.client.NewRequestAndDo(ctx, \"DELETE\", u.String(), nil, nil)\n\tif requestError != nil {\n\t\treturn requestError\n\t}\n\n\tif r.StatusCode != http.StatusNoContent {\n\t\tbody, _ := ioutil.ReadAll(r.Body) // #nosec\n\t\treturn fmt.Errorf(\"Failed with status %v and body %v\", r.StatusCode, body)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "43c376c075db34a42ca32ab71ca445af", "score": "0.5392818", "text": "func (w *WorkOrder) DeleteAssignedUser(db *sql.DB, u *User) (sql.Result, error) {\r\n\treturn db.Exec(\r\n\t\t\"DELETE FROM work_order_users WHERE work_order_id = ? AND user_id = ?\",\r\n\t\tw.ID,\r\n\t\tu.ID,\r\n\t)\r\n}", "title": "" }, { "docid": "a53dc17b62c87595367870b4c1721d55", "score": "0.5382815", "text": "func (m *LinkMutation) WorkOrderID() (id int, exists bool) {\n\tif m.work_order != nil {\n\t\treturn *m.work_order, true\n\t}\n\treturn\n}", "title": "" }, { "docid": "a12d35418e1936a9a25498abfcf3aec3", "score": "0.53775275", "text": "func DeleteWorkitemPath(wiID uuid.UUID) string {\n\tparam0 := wiID.String()\n\n\treturn fmt.Sprintf(\"/api/workitems/%s\", param0)\n}", "title": "" }, { "docid": "7ba3a00f7d37748be162d7575da36f20", "score": "0.53723276", "text": "func (client *WorkloadGroupsClient) deleteOperation(ctx context.Context, resourceGroupName string, serverName string, databaseName string, workloadGroupName string, options *WorkloadGroupsBeginDeleteOptions) (*http.Response, error) {\n\treq, err := client.deleteCreateRequest(ctx, resourceGroupName, serverName, databaseName, workloadGroupName, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.pl.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !runtime.HasStatusCode(resp, http.StatusOK, http.StatusAccepted, http.StatusNoContent) {\n\t\treturn nil, client.deleteHandleError(resp)\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "b7cc6337d91f4553c341703b8505da3e", "score": "0.53550524", "text": "func (au *ActivityUpdate) SetWorkOrderID(id int) *ActivityUpdate {\n\tau.mutation.SetWorkOrderID(id)\n\treturn au\n}", "title": "" }, { "docid": "303931a889ddd6043c978db5a7ae19ea", "score": "0.5354357", "text": "func (m *EquipmentMutation) WorkOrderID() (id int, exists bool) {\n\tif m.work_order != nil {\n\t\treturn *m.work_order, true\n\t}\n\treturn\n}", "title": "" }, { "docid": "19765c97f20022965e0c7844e4396696", "score": "0.5353627", "text": "func (db *PgDB) DeleteExperiment(id int) error {\n\ttx, err := db.sql.Begin()\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error starting transaction\")\n\t}\n\tdefer func() {\n\t\tif tx == nil {\n\t\t\treturn\n\t\t}\n\n\t\tif rErr := tx.Rollback(); rErr != nil {\n\t\t\tlog.Errorf(\"error during rollback: %v\", rErr)\n\t\t}\n\t}()\n\n\t// This delete cascades to checkpoints and validations.\n\t_, err = tx.Exec(`\nDELETE FROM steps\nWHERE trial_id IN (SELECT id FROM trials WHERE experiment_id = $1)\n`, id)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error deleting steps for experiment %v\", id)\n\t}\n\t_, err = tx.Exec(`\nDELETE FROM trial_logs\nWHERE trial_id IN (SELECT id FROM trials WHERE experiment_id = $1);\n`, id)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error deleting trial logs for experiment %v\", id)\n\t}\n\t_, err = tx.Exec(`\nDELETE FROM trials\nWHERE experiment_id = $1;\n`, id)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error deleting trials for experiment %v\", id)\n\t}\n\t_, err = tx.Exec(`\nDELETE FROM searcher_events\nWHERE experiment_id = $1;\n`, id)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error deleting events for experiment %v\", id)\n\t}\n\tresult, err := tx.Exec(`\nDELETE FROM experiments\nWHERE id = $1\n`, id)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error deleting experiment %v\", id)\n\t}\n\tnum, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error in RowsAffected when deleting experiment %v\", id)\n\t}\n\tif num != 1 {\n\t\treturn errors.Errorf(\"error deleting non-existing experiment %v\", id)\n\t}\n\terr = tx.Commit()\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"error committing delete from experiment %v\", id)\n\t}\n\n\ttx = nil\n\n\treturn nil\n}", "title": "" }, { "docid": "5c651499b80d68cc283d6d10438c70c0", "score": "0.53400517", "text": "func FindWorkorder(w http.ResponseWriter, r *http.Request) *appError {\n\tparams := mux.Vars(r)\n\torder, err := workorderDao.FindById(params[\"id\"])\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to retrieve record from database\", http.StatusBadRequest}\n\t}\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\terr = json.NewEncoder(w).Encode(order)\n\treturn nil\n}", "title": "" }, { "docid": "ce77b59a2b05de00b3dd37c8e0652bf1", "score": "0.53349733", "text": "func (wotu *WorkOrderTypeUpdate) RemoveWorkOrders(w ...*WorkOrder) *WorkOrderTypeUpdate {\n\tids := make([]string, len(w))\n\tfor i := range w {\n\t\tids[i] = w[i].ID\n\t}\n\treturn wotu.RemoveWorkOrderIDs(ids...)\n}", "title": "" }, { "docid": "437376784e0ac95d77e62c222188415f", "score": "0.53324616", "text": "func RemoveFromWorkflow(db gorp.SqlExecutor, workflowID int64, projectIntegrationID int64) error {\n\tquery := \"DELETE FROM workflow_project_integration WHERE workflow_id = $1 AND project_integration_id = $2\"\n\n\tif _, err := db.Exec(query, workflowID, projectIntegrationID); err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ad34d5e2e18a74284037cea7be96a66f", "score": "0.53226495", "text": "func (puo *ProjectUpdateOne) RemoveWorkOrderIDs(ids ...string) *ProjectUpdateOne {\n\tif puo.removedWorkOrders == nil {\n\t\tpuo.removedWorkOrders = make(map[string]struct{})\n\t}\n\tfor i := range ids {\n\t\tpuo.removedWorkOrders[ids[i]] = struct{}{}\n\t}\n\treturn puo\n}", "title": "" }, { "docid": "8c2a89514d1e68538b26cf4601c78bc7", "score": "0.53100145", "text": "func (m *workoutManager) DeleteWorkout(ctx context.Context, workoutID string) error {\n\t// Delete (set inactive) the workout\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "2c7384f626758cd2af5916060a5a8aad", "score": "0.5306579", "text": "func (c *StoreAPIController) DeleteOrder(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\torderIdParam := params[\"orderId\"]\n\tresult, err := c.service.DeleteOrder(r.Context(), orderIdParam)\n\t// If an error occurred, encode the error with the status code\n\tif err != nil {\n\t\tc.errorHandler(w, r, err, &result)\n\t\treturn\n\t}\n\t// If no error, encode the body and the result code\n\tEncodeJSONResponse(result.Body, &result.Code, result.Headers, w)\n}", "title": "" }, { "docid": "f5ebee2dbe83cbfc2f9253a1f9d15ba0", "score": "0.5303581", "text": "func (m *ProjectMutation) RemoveWorkOrderIDs(ids ...int) {\n\tif m.removedwork_orders == nil {\n\t\tm.removedwork_orders = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedwork_orders[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "95bfdcfc248daeb2f654bfe0cce9b53d", "score": "0.52870274", "text": "func worksetDeleteHandler(w http.ResponseWriter, r *http.Request) {\n\n\tdn := getRequestParam(r, \"model\")\n\twsn := getRequestParam(r, \"set\")\n\n\t// update workset metadata\n\tok, err := theCatalog.DeleteWorkset(dn, wsn)\n\tif err != nil {\n\t\thttp.Error(w, \"Workset delete failed \"+dn+\": \"+wsn, http.StatusBadRequest)\n\t\treturn\n\t}\n\tif ok {\n\t\tw.Header().Set(\"Content-Location\", \"/api/model/\"+dn+\"/workset/\"+wsn)\n\t\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\t}\n}", "title": "" }, { "docid": "7ce460e4ea7449d5a6111ea3165ff99e", "score": "0.5286512", "text": "func (lc *LinkCreate) SetWorkOrder(w *WorkOrder) *LinkCreate {\n\treturn lc.SetWorkOrderID(w.ID)\n}", "title": "" }, { "docid": "a77b64452d1e9affdcb4717691449c3a", "score": "0.52781785", "text": "func (m *PropertyMutation) WorkOrderID() (id int, exists bool) {\n\tif m.work_order != nil {\n\t\treturn *m.work_order, true\n\t}\n\treturn\n}", "title": "" }, { "docid": "49d302084eb1758dfd07533d96687785", "score": "0.52767336", "text": "func DeleteSavedSearch(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tid := ps.ByName(\"id\")\n\n\t// Retrieve UserID\n\tuser, err := models.GetUser(db, getUsername(r))\n\tif err != nil {\n\t\traven.CaptureError(err, nil)\n\t\tlog.WithError(err).Error(\"error while authenticating user: not authorized\")\n\t\tError(w, http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tif code, err := models.DeleteSavedSearch(db, id, user.KeyID); err != nil {\n\t\traven.CaptureError(err, nil)\n\t\tlog.WithError(err).Error(\"error while deleting savedSearch by ID\")\n\t\tError(w, code)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "edea7700d11e91b88d7640cf9eca12c2", "score": "0.5272755", "text": "func (c *Client) DeleteOrder(acctNum string, orderID int) error {\n\tendpoint := fmt.Sprintf(\"accounts/%s/orders/%d\", acctNum, orderID)\n\treq, err := http.NewRequest(\"DELETE\", c.Credentials.ApiServer+endpoint, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Header.Add(\"Authorization\", c.Credentials.authHeader())\n\n\tres, err := c.httpClient.Do(req)\n\n\tout := struct {\n\t\tOrderID int `json:\"OrderID\"`\n\t}{}\n\n\terr = c.processResponse(res, out)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e00cb11349ca1d05c2ab560b989ea6c9", "score": "0.5269509", "text": "func CreateWorkorder(w http.ResponseWriter, r *http.Request) *appError {\n\tdefer r.Body.Close()\n\tvar order models.Workorder\n\tif err := json.NewDecoder(r.Body).Decode(&order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"Error trying to decode json body.\", http.StatusBadRequest}\n\t}\n\torder.ID = bson.NewObjectId()\n\tif err := workorderDao.Insert(order); err != nil {\n\t\tfmt.Println(err)\n\t\treturn &appError{err, \"There was an error when trying to insert into database.\", http.StatusBadRequest}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "03d088524a824aa9e9a64bde76ff3aa5", "score": "0.5251849", "text": "func (m *ProjectTypeMutation) RemoveWorkOrderIDs(ids ...int) {\n\tif m.removedwork_orders == nil {\n\t\tm.removedwork_orders = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedwork_orders[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "4f2374762a94735cf7d486d61312c2dc", "score": "0.5251827", "text": "func Delete(db gorp.SqlExecutor, wt *sdk.WorkflowTemplate) error {\n\treturn sdk.WrapError(gorpmapping.Delete(db, wt), \"unable to delete workflow template %s\", wt.Name)\n}", "title": "" }, { "docid": "0bfbb141af45acc8dc76fb855da38750", "score": "0.52391607", "text": "func Delete(db gorp.SqlExecutor, id string) error {\n\taccessTokenID, err := db.SelectNullStr(\"SELECT auth_consumer_id FROM worker WHERE id = $1\", id)\n\tif err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\tquery := `DELETE FROM worker WHERE id = $1`\n\tif _, err := db.Exec(query, id); err != nil {\n\t\treturn sdk.WithStack(err)\n\t}\n\n\tif accessTokenID.Valid {\n\t\tif err := authentication.DeleteConsumerByID(db, accessTokenID.String); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "03f86679f3f2bbbb15491136a6efe7db", "score": "0.5237894", "text": "func (cc *HelloWorld) delete(stub shim.ChaincodeStubInterface, args []string) peer.Response {\n\n\t// Validate and extract parameters\n\tif rc := Validate(\"delete\", args /*args[0]=id*/, \"%s\", 1, 64); rc.Status > 0 {\n\t\treturn rc\n\t}\n\tid := strings.ToLower(args[0])\n\n\t// Validate that this ID exist\n\tif value, err := stub.GetState(id); err != nil || value == nil {\n\t\treturn Error(http.StatusNotFound, \"Not Found\")\n\t}\n\n\t// Delete the message\n\tif err := stub.DelState(id); err != nil {\n\t\treturn Error(http.StatusInternalServerError, err.Error())\n\t}\n\n\treturn Success(http.StatusNoContent, \"Message Deleted\", nil)\n}", "title": "" }, { "docid": "bf6da7f6e6aa5f3c9cffb13b48f9f738", "score": "0.5234653", "text": "func Delete(db gorp.SqlExecutor, wt *sdk.WorkflowTemplate) error {\n\treturn sdk.WrapError(gorpmapping.Delete(db, wt), \"Unable to delete workflow template %s\", wt.Name)\n}", "title": "" }, { "docid": "41994a5f9722d7a7aa50549513d3a3fa", "score": "0.5234575", "text": "func (o *Synchronization) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no Synchronization provided for delete\")\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), synchronizationPrimaryKeyMapping)\n\tsql := \"DELETE FROM \\\"Synchronization\\\" WHERE \\\"ClientId\\\"=$1\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from Synchronization\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for Synchronization\")\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "4d0b105d120c89812e43ba2113b734a8", "score": "0.52265084", "text": "func (fuo *FileUpdateOne) SetWorkOrderID(id int) *FileUpdateOne {\n\tfuo.mutation.SetWorkOrderID(id)\n\treturn fuo\n}", "title": "" }, { "docid": "196853b1c8fcb6945d8b702dd70b27f9", "score": "0.5195427", "text": "func (t *orderTree) delete(order *Order) {\n\t// TODO: Need a reference to the tree here.. even if we store a pointer\n\t// back to the *orderTree, we'd still need a reference to its parent to\n\t// be able to drop that parent's reference when we delete\n\t// though. Looking up node by order.id is O(n).\n\tdebug(\"delete(%v)\\n\", order)\n}", "title": "" }, { "docid": "f31ea21a066517717c6780d0235aafc4", "score": "0.5190593", "text": "func (data *Warehouse) Delete(ID string) error {\n\tdb, err := GetDB()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = db.Exec(`DELETE FROM warehouse WHERE id = ?`, data.Id)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1404dec523762a26245030ba62ccee3d", "score": "0.5183414", "text": "func WorkSpaceDelete(cfg *config.Config, name string) {\n\n\turl := fmt.Sprintf(workspacePattern, cfg.ServerURL(), name)\n\t// fmt.Println(url)\n\tmethod := \"DELETE\"\n\tpayload := strings.NewReader(fmt.Sprintf(\"{\\\"workspace\\\":{\\\"name\\\":\\\"%s\\\"}}\", name))\n\n\treq := NewRequest(cfg, method, url, payload)\n\tDelete(req, workspaceDeleteStatus)\n}", "title": "" }, { "docid": "43012e7ae0e844b18d53a632a22f9754", "score": "0.51817256", "text": "func (m *LinkMutation) ClearWorkOrder() {\n\tm.clearedwork_order = true\n}", "title": "" }, { "docid": "f5f8d279eff348637cdf0943cd951ca1", "score": "0.5179066", "text": "func (rc RunController) DeleteRun(w http.ResponseWriter, _ *http.Request, ps httprouter.Params) {\n\trunID := ps.ByName(\"id\")\n\tif !bson.IsObjectIdHex(runID) {\n\t\trc.base.Response(\"\", \"invalid bson id\", http.StatusBadRequest, w)\n\t\treturn\n\t}\n\n\terr := rc.base.MGS.DB(\"marathon\").C(\"runs\").RemoveId(bson.ObjectIdHex(runID))\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\trc.base.Response(\"\", err.Error(), http.StatusNotFound, w)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n\n\trc.base.WSRunUpdate()\n}", "title": "" }, { "docid": "72f46963efa7cbe0a47d1a999371c4aa", "score": "0.5176386", "text": "func deleteJob(w io.Writer, jobName string) error {\n\t// jobName := \"job-example\"\n\tctx := context.Background()\n\tclient, err := dlp.NewClient(ctx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"dlp.NewClient: %w\", err)\n\t}\n\tdefer client.Close()\n\treq := &dlppb.DeleteDlpJobRequest{\n\t\tName: jobName,\n\t}\n\tif err = client.DeleteDlpJob(ctx, req); err != nil {\n\t\treturn fmt.Errorf(\"DeleteDlpJob: %w\", err)\n\t}\n\tfmt.Fprintf(w, \"Successfully deleted job\")\n\treturn nil\n}", "title": "" }, { "docid": "5bbed0e6c4989e90061f428c5f88087d", "score": "0.5175646", "text": "func (k Keeper) RemoveOrder(ctx sdk.Context, id uint64) {\n\tstore := prefix.NewStore(ctx.KVStore(k.storeKey), types.KeyPrefix(types.OrderKey))\n\tstore.Delete(GetOrderIDBytes(id))\n}", "title": "" }, { "docid": "d0fe73e1668fc132ea50f7fa23792883", "score": "0.5175235", "text": "func (c *WorkItemLinkController) Delete(ctx *app.DeleteWorkItemLinkContext) error {\n\treturn application.Transactional(c.db, func(appl application.Application) error {\n\t\treturn deleteWorkItemLink(newWorkItemLinkContext(ctx.Context, appl, c.db, ctx.RequestData, ctx.ResponseData, app.WorkItemLinkHref), ctx, ctx.LinkID)\n\t})\n}", "title": "" }, { "docid": "ecd31f5e77a5fc536eeb64dcd89b1c52", "score": "0.51681477", "text": "func (pu *ProjectUpdate) RemoveWorkOrderIDs(ids ...string) *ProjectUpdate {\n\tif pu.removedWorkOrders == nil {\n\t\tpu.removedWorkOrders = make(map[string]struct{})\n\t}\n\tfor i := range ids {\n\t\tpu.removedWorkOrders[ids[i]] = struct{}{}\n\t}\n\treturn pu\n}", "title": "" }, { "docid": "5af36fd1781ad41bb8bfa9d39fc9e104", "score": "0.5159996", "text": "func DeleteBuyOrder(orderId string) (deleteRes DeleteResponse, err error) {\n\terr = database.GetDB().Table(\"buy_order_book\").Where(\"order_id= ?\", orderId).Delete(model.BuyOrderBook{}).Error\n\tif err != nil {\n\t\tdeleteRes.Message = \"Failed\"\n\t\tdeleteRes.Success = false\n\t\treturn deleteRes, err\n\t}\n\tdeleteRes.Message = \"Success\"\n\tdeleteRes.Success = true\n\treturn deleteRes, nil\n}", "title": "" }, { "docid": "7469752363c7b83d200d26aeefaa17b8", "score": "0.5150377", "text": "func (fu *FileUpdate) SetWorkOrderID(id int) *FileUpdate {\n\tfu.mutation.SetWorkOrderID(id)\n\treturn fu\n}", "title": "" }, { "docid": "f1a19e82ed9d73039240a3add9053449", "score": "0.51337785", "text": "func (r *CoursesCourseWorkService) Delete(courseId string, id string) *CoursesCourseWorkDeleteCall {\n\tc := &CoursesCourseWorkDeleteCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.courseId = courseId\n\tc.id = id\n\treturn c\n}", "title": "" }, { "docid": "79261ff5693ad341a77baa35816e845b", "score": "0.513351", "text": "func (m *EquipmentMutation) ClearWorkOrder() {\n\tm.clearedwork_order = true\n}", "title": "" }, { "docid": "1d69c8ac5eb38b20c9f7736c8edc1014", "score": "0.5126056", "text": "func deleteBackground(w http.ResponseWriter, r *http.Request) {\n params := mux.Vars(r)\n idParam, _ := strconv.ParseUint(params[\"id\"], 10, 16)\n\n background := &DndBackground{ID: uint(idParam)}\n _, err := core_module.Db.Model(background).WherePK().Delete()\n if err != nil {\n w.WriteHeader(http.StatusInternalServerError)\n json.NewEncoder(w).Encode(&core_module.CoreException{\n Message: \"Could not insert into database!\",\n })\n log.Println(err)\n return\n }\n\n w.WriteHeader(http.StatusAccepted)\n}", "title": "" }, { "docid": "ce7fcd7e50d8d60efa83b43597101794", "score": "0.5125853", "text": "func DeleteBookingByID(wr http.ResponseWriter, req *http.Request, ps httprouter.Params) {\n\tresponse, _ := http.NewRequest(\"DELETE\", \"http://localhost:8000/bookings/\"+ps.ByName(\"id\"), nil)\n\n\tnew(http.Client).Do(response)\n\n\tGetAllBooking(wr, req, ps)\n}", "title": "" }, { "docid": "fa9cb149653477329bd8b76e8741752c", "score": "0.51021075", "text": "func (a *Client) DeleteWorkflow(ctx context.Context, params *DeleteWorkflowParams) (*DeleteWorkflowOK, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"DeleteWorkflow\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/workflow/{workflowId}\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteWorkflowReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*DeleteWorkflowOK), nil\n\n}", "title": "" }, { "docid": "6968c0091d0b74be1f65cf65136427b3", "score": "0.5096954", "text": "func (m *LocationMutation) RemoveWorkOrderIDs(ids ...int) {\n\tif m.removedwork_orders == nil {\n\t\tm.removedwork_orders = make(map[int]struct{})\n\t}\n\tfor i := range ids {\n\t\tm.removedwork_orders[ids[i]] = struct{}{}\n\t}\n}", "title": "" }, { "docid": "35e431eaa9df1500e52266b6eb12a4cf", "score": "0.50887835", "text": "func (o *CMFShopOrderRefund) Delete(ctx context.Context, exec boil.ContextExecutor) (int64, error) {\n\tif o == nil {\n\t\treturn 0, errors.New(\"models: no CMFShopOrderRefund provided for delete\")\n\t}\n\n\tif err := o.doBeforeDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\targs := queries.ValuesFromMapping(reflect.Indirect(reflect.ValueOf(o)), cmfShopOrderRefundPrimaryKeyMapping)\n\tsql := \"DELETE FROM `cmf_shop_order_refund` WHERE `id`=?\"\n\n\tif boil.IsDebug(ctx) {\n\t\twriter := boil.DebugWriterFrom(ctx)\n\t\tfmt.Fprintln(writer, sql)\n\t\tfmt.Fprintln(writer, args...)\n\t}\n\tresult, err := exec.ExecContext(ctx, sql, args...)\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: unable to delete from cmf_shop_order_refund\")\n\t}\n\n\trowsAff, err := result.RowsAffected()\n\tif err != nil {\n\t\treturn 0, errors.Wrap(err, \"models: failed to get rows affected by delete for cmf_shop_order_refund\")\n\t}\n\n\tif err := o.doAfterDeleteHooks(ctx, exec); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn rowsAff, nil\n}", "title": "" }, { "docid": "081a5a20177e17537143b8fe586fd329", "score": "0.5086512", "text": "func (db *SQLLiteORM) DeleteSiswa(id int) error {\n\tif id <= 0 {\n\t\treturn fmt.Errorf(\"No id %v\", id)\n\t}\n\tvar siswa nmodel.Siswa\n\tdb.db.First(&siswa, id)\n\tif siswa.ID != uint(id) {\n\t\treturn fmt.Errorf(\"unable to find id %v\", id)\n\t}\n\tdb.db.Delete(&siswa)\n\treturn nil\n}", "title": "" }, { "docid": "b9e7dd182700d2e22a6c9ea570d929a6", "score": "0.50817055", "text": "func (e *Edb) DeletePractice(id int64) error {\n\tif id == 0 {\n\t\treturn nil\n\t}\n\t_, err := e.db.Exec(`\n\t\tDELETE FROM\n\t\t\tpractices\n\t\tWHERE\n\t\t\tid = $1\n\t`, id)\n\tif err != nil {\n\t\tlog.Println(\"DeletePractice e.db.Exec: \", id, err)\n\t\treturn fmt.Errorf(\"DeletePractice e.db.Exec: %s\", err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "c11a8e1ec85baeba3fb0e7b5a9bcd091", "score": "0.5081323", "text": "func (a *WorkflowApiService) DeleteWorkflowRollbackWorkflow(ctx _context.Context, moid string) ApiDeleteWorkflowRollbackWorkflowRequest {\n\treturn ApiDeleteWorkflowRollbackWorkflowRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tmoid: moid,\n\t}\n}", "title": "" }, { "docid": "0c1dbdee5c3524882f99d09dd18c141c", "score": "0.5081111", "text": "func (f *FTX) DeleteOrder(ctx context.Context, orderID string) (string, error) {\n\tif orderID == \"\" {\n\t\treturn \"\", errInvalidOrderID\n\t}\n\treturn f.deleteOrderByPath(ctx, deleteOrder+orderID)\n}", "title": "" }, { "docid": "9377d233f5c1932274d60db95141bbe3", "score": "0.507583", "text": "func Delete(c *messagebird.Client, id string) error {\n\treturn c.Request(nil, http.MethodDelete, path+\"/\"+id, nil)\n}", "title": "" }, { "docid": "7a2f547ff266be1716cea69ab3644dc4", "score": "0.50750965", "text": "func (m *MockStore) DeleteOrderById(arg0 context.Context, arg1 int32) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DeleteOrderById\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "da87aa5077f04421744e542d2a8fa6fe", "score": "0.5074189", "text": "func DeleteTelemetrySetupById(session *xorm.Session, id int64) (err error) {\n\t_, err = session.Delete(&TelemetrySetup{Id: id})\n\treturn\n}", "title": "" }, { "docid": "981dd0994bc28f58027369934c5249c7", "score": "0.50685585", "text": "func (wotuo *WorkOrderTypeUpdateOne) RemoveWorkOrderIDs(ids ...string) *WorkOrderTypeUpdateOne {\n\tif wotuo.removedWorkOrders == nil {\n\t\twotuo.removedWorkOrders = make(map[string]struct{})\n\t}\n\tfor i := range ids {\n\t\twotuo.removedWorkOrders[ids[i]] = struct{}{}\n\t}\n\treturn wotuo\n}", "title": "" }, { "docid": "22aa91a47aa791a14785f96b8adad0ae", "score": "0.5062886", "text": "func (h *Jobs) Delete(w http.ResponseWriter, r *http.Request) {\n\tid := mux.Vars(r)[\"id\"]\n\t_, err := h.repository.Cancel(id)\n\tif err != nil {\n\t\tErrorResponse(w, err, http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "2405f7c2d3d932db174600279bff3055", "score": "0.50546044", "text": "func DeleteLessonById(c *fiber.Ctx) error {\n\t//Get data of lesson\n\tvar data map[string]string\n\n\terr := c.BodyParser(&data)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tid := data[\"id\"]\n\n\tdatabase.DB.Where(\"id\", id).Delete(&models.Lesson{})\n\n\tc.Status(fiber.StatusOK)\n\treturn c.JSON(fiber.Map{\n\t\t\"message\": \"Lesson with ID:\"+id+\" deleted\",\n\t})\n}", "title": "" }, { "docid": "828ba8422855b7646ae32175a93829b9", "score": "0.5054308", "text": "func (r Repo) Delete(farmID int, userID int) (err error) {\n\treturn r.farmWorkerAdapter.Delete(farmID, userID)\n}", "title": "" }, { "docid": "1933917e0f51946646c552879a05ff32", "score": "0.5047878", "text": "func Delete(c messagebird.Client, id string) error {\n\treturn c.Request(nil, http.MethodDelete, path+\"/\"+id, nil)\n}", "title": "" }, { "docid": "1933917e0f51946646c552879a05ff32", "score": "0.5047878", "text": "func Delete(c messagebird.Client, id string) error {\n\treturn c.Request(nil, http.MethodDelete, path+\"/\"+id, nil)\n}", "title": "" }, { "docid": "6bcae9d1eb7ba73a3dcadeeacba9001e", "score": "0.50434864", "text": "func DeleteById(modelName string, id string) error {\n\tt := newTransaction()\n\tif err := t.deleteModelById(modelName, id); err != nil {\n\t\treturn err\n\t}\n\n\t// execute the transaction\n\tif err := t.exec(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "89543a1d2fbfc71987557478256c1579", "score": "0.50380665", "text": "func (f *MySQLRepository) DeleteFlight(ID string, soft bool) error {\n\tvar stmt *sql.Stmt\n\tvar err error\n\n\tif soft { // Hope its not microsoft... Then we are in trouble\n\t\tstmt, err = f.db.Prepare(\"DELETE FROM Flight WHERE Id = ? LIMIT 1\")\n\t} else { // Do it hard ;)\n\t\tstmt, err = f.db.Prepare(\"UPDATE Flight SET Deleted = current_timestamp() WHERE Id = ? LIMIT 1\")\n\t}\n\n\tif err != nil {\n\t\tBadSqlError.NewFromException(err, \"DELETE\", \"Flight\")\n\t}\n\tdefer stmt.Close()\n\n\t_, err = stmt.Exec(ID)\n\n\tif err != nil {\n\t\treturn StatementExecutionError.NewFromException(err, \"DELETE\", \"Flight\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4678ff24e181153930581f8a7b40587c", "score": "0.5036239", "text": "func (w Workloads) Delete(c *kubernetes.Cluster, ui *ui.UI) error {\n\tui.Note().KeeplineUnder(1).Msg(\"Removing Workloads...\")\n\n\texistsAndOwned, err := c.NamespaceExistsAndOwned(WorkloadsDeploymentID)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to check if namespace '%s' is owned or not\", WorkloadsDeploymentID)\n\t}\n\tif !existsAndOwned {\n\t\tui.Exclamation().Msg(\"Skipping Workspace because namespace either doesn't exist or not owned by Fuseml\")\n\t\treturn nil\n\t}\n\n\tif err := w.deleteWorkloadsNamespace(c, ui); err != nil {\n\t\treturn errors.Wrapf(err, \"Failed deleting namespace %s\", WorkloadsDeploymentID)\n\t}\n\n\texistsAndOwned, err = c.NamespaceExistsAndOwned(\"app-ingress\")\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to check if namespace 'app-ingress' is owned or not\")\n\t}\n\tif !existsAndOwned {\n\t\tui.Exclamation().Msg(\"Skipping app-ingress namespace deletion because either doesn't exist or not owned by Fuseml\")\n\t\treturn nil\n\t}\n\n\tif out, err := helpers.KubectlDeleteEmbeddedYaml(appIngressYamlPath, true); err != nil {\n\t\treturn errors.Wrap(err, fmt.Sprintf(\"Deleting %s failed:\\n%s\", appIngressYamlPath, out))\n\t}\n\n\tui.Success().Msg(\"Workloads removed\")\n\n\treturn nil\n}", "title": "" } ]
414a1803c0e2f57f870c8902f9cd25f5
Call invokes the (constant) contract method with params as input values and sets the output to result. The result type might be a single field for simple returns, a slice of interfaces for anonymous returns and a struct for named returns.
[ { "docid": "3a2ff669f02ac2b4577ed108fe071df8", "score": "0.0", "text": "func (_OldContract *OldContractCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _OldContract.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" } ]
[ { "docid": "ace09710dc0f2e6bbd956718d06e58c1", "score": "0.6297874", "text": "func (cf ContractFunction) Call(ctx reflect.Value, supplementaryMetadata *metadata.TransactionMetadata, components *metadata.ComponentMetadata, serializer serializer.TransactionSerializer, params ...string) (string, interface{}, error) {\n\tvar parameterMetadata []metadata.ParameterMetadata\n\tif supplementaryMetadata != nil {\n\t\tparameterMetadata = supplementaryMetadata.Parameters\n\t}\n\n\tvalues, err := cf.formatArgs(ctx, parameterMetadata, components, params, serializer)\n\n\tif err != nil {\n\t\treturn \"\", nil, err\n\t}\n\n\tsomeResp := cf.function.Call(values)\n\n\tvar returnsMetadata *metadata.ReturnMetadata\n\tif supplementaryMetadata != nil {\n\t\treturnsMetadata = &supplementaryMetadata.Returns\n\t}\n\n\treturn cf.handleResponse(someResp, returnsMetadata, components, serializer)\n}", "title": "" }, { "docid": "77f193d3cf408f44e4a830378cd9e35c", "score": "0.6225912", "text": "func (_Constants *ConstantsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Constants.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "78d479981293b5c98e30e81c58714148", "score": "0.619508", "text": "func (_Value *ValueCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Value.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "78d479981293b5c98e30e81c58714148", "score": "0.619508", "text": "func (_Value *ValueCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Value.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "67085bd300f7f2349e8f18aa6ae1f49e", "score": "0.61354345", "text": "func (_Dexcontracts *DexcontractsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Dexcontracts.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "980d35600a4e95d7fbebd955831a7699", "score": "0.6132328", "text": "func (cPtr *BoundContract) Call(opts *CallOpts, result interface{}, method string, bgmparam ...interface{}) error {\n\t// Don't crash on a lazy user\n\tif opts == nil {\n\t\topts = new(CallOpts)\n\t}\n\t// Pack the input, call and unpack the results\n\tinput, err := cPtr.abi.Pack(method, bgmparam...)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar (\n\t\tmsg = bgmchain.CallMsg{From: opts.From, To: &cPtr.address, Data: input}\n\t\tCTX = ensureContext(opts.Context)\n\t\tcode []byte\n\t\toutput []byte\n\t)\n\tif opts.Pending {\n\t\tpb, ok := cPtr.Called.(PendingContractCalled)\n\t\tif !ok {\n\t\t\treturn ErrNoPendingState\n\t\t}\n\t\toutput, err = pbPtr.PendingCallContract(CTX, msg)\n\t\tif err == nil && len(output) == 0 {\n\t\t\t// Make sure we have a contract to operate on, and bail out otherwise.\n\t\t\tif code, err = pbPtr.PendingCodeAt(CTX, cPtr.address); err != nil {\n\t\t\t\treturn err\n\t\t\t} else if len(code) == 0 {\n\t\t\t\treturn ErrNoCode\n\t\t\t}\n\t\t}\n\t} else {\n\t\toutput, err = cPtr.Called.CallContract(CTX, msg, nil)\n\t\tif err == nil && len(output) == 0 {\n\t\t\t// Make sure we have a contract to operate on, and bail out otherwise.\n\t\t\tif code, err = cPtr.Called.CodeAt(CTX, cPtr.address, nil); err != nil {\n\t\t\t\treturn err\n\t\t\t} else if len(code) == 0 {\n\t\t\t\treturn ErrNoCode\n\t\t\t}\n\t\t}\n\t}\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn cPtr.abi.Unpack(result, method, output)\n}", "title": "" }, { "docid": "3f9b41fab8f74a6bbaea1f3fea7c69e5", "score": "0.61128455", "text": "func (_Dexcontracts *DexcontractsRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Dexcontracts.Contract.DexcontractsCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "c2fd35ce05864e5f48368496804d7d24", "score": "0.6085928", "text": "func Call(funcName string, params ...interface{}) (result interface{}, err error) {\n\tf := reflect.ValueOf(StubStorage[funcName])\n\tt := f.Type()\n\tif len(params) != t.NumIn() {\n\t\terr = errors.New(\"params is out of index\")\n\t\treturn\n\t}\n\t// in := make([]reflect.Value, len(params))\n\tvar callArgs []reflect.Value\n\tfor i := 0; i < t.NumIn(); i++ {\n\t\tt := t.In(i)\n\t\tv := reflect.New(t).Elem()\n\t\tif i < len(params) {\n\t\t\t// Convert arg to type of v and set.\n\t\t\targ := params[i]\n\t\t\tswitch t.Kind() {\n\t\t\tcase reflect.String:\n\t\t\t\tswitch arg := arg.(type) {\n\t\t\t\tcase string:\n\t\t\t\t\tv.SetString(arg)\n\t\t\t\tcase []byte:\n\t\t\t\t\tv.SetString(string(arg))\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"not supported\")\n\t\t\t\t}\n\t\t\tcase reflect.Slice:\n\t\t\t\tif t.Elem() != reflect.TypeOf(byte(0)) {\n\t\t\t\t\tpanic(\"not supported\")\n\t\t\t\t}\n\t\t\t\tswitch arg := arg.(type) {\n\t\t\t\tcase string:\n\t\t\t\t\tv.SetBytes([]byte(arg))\n\t\t\t\tcase []byte:\n\t\t\t\t\tv.SetBytes(arg)\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"not supported\")\n\t\t\t\t}\n\n\t\t\tcase reflect.Int:\n\t\t\t\tswitch arg := arg.(type) {\n\t\t\t\tcase int:\n\t\t\t\t\tv.SetInt(int64(arg))\n\t\t\t\tcase string:\n\t\t\t\t\ti, err := strconv.ParseInt(arg, 10, 0)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tpanic(\"bad int\")\n\t\t\t\t\t}\n\t\t\t\t\tv.SetInt(i)\n\t\t\t\tdefault:\n\t\t\t\t\tpanic(\"not supported\")\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tpanic(\"not supported\")\n\t\t\t}\n\t\t}\n\t\t// Collect arguments for the call below.\n\t\tcallArgs = append(callArgs, v)\n\t}\n\t// for k, param := range params {\n\t// \tin[k] = reflect.ValueOf(param)\n\t// }\n\tvar res []reflect.Value\n\tres = f.Call(callArgs)\n\tresult = res[0].Interface()\n\treturn\n}", "title": "" }, { "docid": "9d41702f59506eca65d50828ee66b148", "score": "0.6080274", "text": "func (c *Client) Call(method string, params []interface{}, result interface{}) error {\n\tc.mu.Lock()\n\tif c.closed {\n\t\tc.mu.Unlock()\n\t\treturn io.EOF\n\t}\n\tc.mu.Unlock()\n\n\t// convert the parameters into json\n\tencodedParams := make([]json.RawMessage, len(params))\n\tfor i, param := range params {\n\t\tvar err error\n\t\tencodedParams[i], err = json.Marshal(param)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// send the request (multiple requests can happen in parallel, so we wait on a channel)\n\tch := make(chan Response, 1)\n\tc.requests <- clientRequest{\n\t\tmethod: method,\n\t\tparams: encodedParams,\n\t\tresponse: ch,\n\t}\n\tres := <-ch\n\n\t// return an error if the result has an error. we just ignore the code\n\tif res.Error != nil {\n\t\treturn fmt.Errorf(\"%v\", res.Error.Message)\n\t}\n\n\t// Decode the result\n\tif result != nil && res.Result != nil {\n\t\terr := json.Unmarshal(*res.Result, result)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ba202b8eee430cc1132014c2aa4cb7b0", "score": "0.60517395", "text": "func (_Abimarket *AbimarketCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Abimarket.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "4368960ea057dfae17374125d8a8523c", "score": "0.600241", "text": "func (_Validators *ValidatorsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Validators.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "9d5aa87dcbaa9cb8624eb2c02148c85d", "score": "0.60015774", "text": "func (_Executor *ExecutorCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Executor.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "cc554ccfc742be5289f540f5b0cda893", "score": "0.5983633", "text": "func (_Constants *ConstantsRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Constants.Contract.ConstantsCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "8668c8d0c91bc63d49a8df631ea0f371", "score": "0.59672374", "text": "func (_MulticallContract *MulticallContractCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _MulticallContract.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "8dc2aac3abab8f33ecfe0009aa7df11b", "score": "0.59637433", "text": "func (_Utils *UtilsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Utils.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "ba46ca5a8aa10d5add5e9cd3930c4982", "score": "0.5956882", "text": "func (_Value *ValueRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Value.Contract.ValueCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "ba46ca5a8aa10d5add5e9cd3930c4982", "score": "0.5956882", "text": "func (_Value *ValueRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Value.Contract.ValueCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "7dd734e162dab7bab95620c09138e1ab", "score": "0.59426546", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "7dd734e162dab7bab95620c09138e1ab", "score": "0.59426546", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "fea690a41667287ca7f95df3cc93a392", "score": "0.5922122", "text": "func (_MulticallContract *MulticallContractRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _MulticallContract.Contract.MulticallContractCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "f1a17300f56e75b2cf4b3d00ec76e16c", "score": "0.59125143", "text": "func (_Contract *ContractRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Contract.Contract.ContractCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "3170619947b6384b3b62db1c71547051", "score": "0.5899576", "text": "func (_Vat *VatCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Vat.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "c15cb90628970858c17a982aaa53cbf3", "score": "0.58990914", "text": "func (_Contract *ContractCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Contract.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "7f36d8fdb9e21616bf93306382b93df9", "score": "0.5893812", "text": "func (_Random *RandomCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Random.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "3682bfad607285a820bdb7c545a51865", "score": "0.5874734", "text": "func (_VirtContractResolver *VirtContractResolverCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _VirtContractResolver.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e162f1d41ede23c8f1ec78e32e5e9093", "score": "0.5867818", "text": "func (_ContractRegistry *ContractRegistryCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _ContractRegistry.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.585338", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "37f6622fc7ceacc0f6b332868ef41439", "score": "0.58530504", "text": "func (_Metadata *MetadataCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Metadata.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172303cfdfb31dc95211d79d11ded58", "score": "0.5852354", "text": "func (_SafeMath *SafeMathCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "379962fcf2e98369fa723743a63fb182", "score": "0.5830597", "text": "func (_Abimarket *AbimarketRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Abimarket.Contract.AbimarketCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "abef8c75a01ca4cf5f3f26181b15dc55", "score": "0.58267754", "text": "func (_Escrow *EscrowCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Escrow.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "949a47485e99aab0eacf0af442a6ee03", "score": "0.58243835", "text": "func (_IValidator *IValidatorCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _IValidator.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "44c9d77a2123635c702eacdab4773d81", "score": "0.58235294", "text": "func (_ISignatureValidatorConstants *ISignatureValidatorConstantsRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _ISignatureValidatorConstants.Contract.ISignatureValidatorConstantsCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "ac40112e68abf5feb59ed1bafec9b0f3", "score": "0.582254", "text": "func (_Singleton *SingletonCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Singleton.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "3114651539b7070b73a8dd29a2bfa59a", "score": "0.58216393", "text": "func (_CoolContract *CoolContractCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _CoolContract.Contract.contract.Call(opts, nil, method, params...)\n}", "title": "" }, { "docid": "22830c38b0d43b87ccdf5636cd95c399", "score": "0.58204406", "text": "func (_ISignatureValidatorConstants *ISignatureValidatorConstantsCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _ISignatureValidatorConstants.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "c7d42955bfdd8734fcd0f834c43f4634", "score": "0.58018994", "text": "func (_Flipper *FlipperCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Flipper.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5172489cab929933e2d719f0260fa9a1", "score": "0.5801138", "text": "func (_Enum *EnumCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Enum.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "b8b17c6592bf59c1b2210a1614bc2c73", "score": "0.57974154", "text": "func (_SignatureDecoder *SignatureDecoderCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SignatureDecoder.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "fd8a18838002649180328f80056ea58c", "score": "0.5791049", "text": "func (_EmitItems *EmitItemsCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _EmitItems.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "68c14c3284e2e0b215bb417b2d628c6e", "score": "0.578805", "text": "func (_Escrows *EscrowsCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Escrows.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "a94ea77e986322660d0d4767145a7aff", "score": "0.57852393", "text": "func (_Pausable *PausableCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Pausable.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "19360848efe4bb7e8a05bb7eb0f887cc", "score": "0.5780632", "text": "func (_Sampel *SampelCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Sampel.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "f7243f28a888c0082e3435e711703fa8", "score": "0.5778627", "text": "func (_SafeMath128 *SafeMath128CallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath128.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "c27df0ea8e05c7749c14ebb0b4b1e145", "score": "0.57768834", "text": "func (_EIP20Contract *EIP20ContractCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _EIP20Contract.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "8990eaaa5d62f62875809437ce1c0cad", "score": "0.57739836", "text": "func (_JIincInterfaceForForwarder *JIincInterfaceForForwarderCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _JIincInterfaceForForwarder.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "9287d490487ae043580f19c77f21b21d", "score": "0.5767644", "text": "func (_AccessControlled *AccessControlledCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _AccessControlled.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "2afde7d00a7ca057913e5f272ec92082", "score": "0.5766185", "text": "func (_TomoValidator *TomoValidatorCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _TomoValidator.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "7c5ff7a0a477bd74809999446c8636c9", "score": "0.57659274", "text": "func (_Uni *UniCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Uni.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e0b1319ba1c024b3d3597b8e0931cf0d", "score": "0.5762616", "text": "func (_Utils *UtilsRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Utils.Contract.UtilsCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "d1637d63a8af53d230fad7be23bc9fdf", "score": "0.5756812", "text": "func (_Masterchef *MasterchefCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Masterchef.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "6863edc1230cefca850ada7178384a57", "score": "0.5756626", "text": "func (_BN256 *BN256CallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _BN256.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "1234f0d44c7c8aa2c24756db5bfae977", "score": "0.5752365", "text": "func (_Bindings *BindingsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Bindings.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "bea7b16a24469f7241b6c8f0cfd062b9", "score": "0.5743657", "text": "func (_RollupUtils *RollupUtilsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _RollupUtils.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "00ca8af718acc00f186e03503717493f", "score": "0.57364225", "text": "func (_Validators *ValidatorsRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Validators.Contract.ValidatorsCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "34fc6889ba5adf8d2946a2f44c4fedb0", "score": "0.57329196", "text": "func (_Swap *SwapCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Swap.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "d2e7818dedaa5a9051cef3cec6cd5a99", "score": "0.5732682", "text": "func (_Utilities *UtilitiesCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Utilities.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "99fcbe711f46256d98132d216d6bd490", "score": "0.5731446", "text": "func (_Vat *VatRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Vat.Contract.VatCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "c1fd38420b171822841dd77b156c1ecc", "score": "0.5728662", "text": "func (_DiviesInterface *DiviesInterfaceCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _DiviesInterface.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "0f924e8f17442c7296cef324166f5684", "score": "0.5728165", "text": "func (_Repv2 *Repv2CallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Repv2.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "1d1b3e586219daf6f9a422474c4f9bef", "score": "0.5727079", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "1d1b3e586219daf6f9a422474c4f9bef", "score": "0.5727079", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "fc0bca43b4cc11abc795a3396cb1ef3e", "score": "0.572009", "text": "func (s *SmartContract) Invoke(APIstub shim.ChaincodeStubInterface) sc.Response {\n\n\tfunction, args := APIstub.GetFunctionAndParameters()\n\tlogger.Infof(\"Function name is: %d\", function)\n\tlogger.Infof(\"Args length is : %d\", len(args))\n\n\tswitch function {\n\tcase \"queryIC\":\n\t\treturn s.queryIC(APIstub, args)\n\tcase \"initLedger\":\n\t\treturn s.initLedger(APIstub)\n\tcase \"createIC\":\n\t\treturn s.createIC(APIstub, args)\n\tcase \"queryAllICs\":\n\t\treturn s.queryAllICs(APIstub)\n\tcase \"changeICOwner\":\n\t\treturn s.changeICOwner(APIstub, args)\n\tcase \"getHistoryForAsset\":\n\t\treturn s.getHistoryForAsset(APIstub, args)\n\tcase \"queryICsByOwner\":\n\t\treturn s.queryICsByOwner(APIstub, args)\n\tcase \"restictedMethod\":\n\t\treturn s.restictedMethod(APIstub, args)\n\tcase \"test\":\n\t\treturn s.test(APIstub, args)\n\tcase \"createPrivateIC\":\n\t\treturn s.createPrivateIC(APIstub, args)\n\tcase \"readPrivateIC\":\n\t\treturn s.readPrivateIC(APIstub, args)\n\tcase \"updatePrivateData\":\n\t\treturn s.updatePrivateData(APIstub, args)\n\tcase \"readICPrivateDetails\":\n\t\treturn s.readICPrivateDetails(APIstub, args)\n\tcase \"createPrivateICImplicitForOrg1\":\n\t\treturn s.createPrivateICImplicitForOrg1(APIstub, args)\n\tcase \"createPrivateICImplicitForOrg2\":\n\t\treturn s.createPrivateICImplicitForOrg2(APIstub, args)\n\tcase \"queryPrivateDataHash\":\n\t\treturn s.queryPrivateDataHash(APIstub, args)\n\tdefault:\n\t\treturn shim.Error(\"Invalid Smart Contract function name.\")\n\t}\n\n\t// return shim.Error(\"Invalid Smart Contract function name.\")\n}", "title": "" }, { "docid": "664fd8c75f6172aebe7bae670cb5a29a", "score": "0.57124925", "text": "func (_Verifier *VerifierCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Verifier.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "9669b3059fd8c3bebcff7eb91ac81e51", "score": "0.5712031", "text": "func (_ValidatorsDiamond *ValidatorsDiamondCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _ValidatorsDiamond.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "cb0623f41a68a378f1ca615ab2ed60b9", "score": "0.57074964", "text": "func (_Onepay *OnepayCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Onepay.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "0998f72ae3ea751886bc9df32b11f067", "score": "0.5704431", "text": "func (_SocialMoney *SocialMoneyCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SocialMoney.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "19d67c79dab862aadb55927e9842fdd7", "score": "0.570276", "text": "func (_Pairing *PairingCallerRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Pairing.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "d50b88091d4a82565db273f79a96b7f4", "score": "0.5695543", "text": "func (_Executor *ExecutorRaw) Call(opts *bind.CallOpts, result *[]interface{}, method string, params ...interface{}) error {\n\treturn _Executor.Contract.ExecutorCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "199de908ecd10deb68a40a3ff7d4665d", "score": "0.5694016", "text": "func (_State *StateCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _State.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "ab47beef01921ad9775571f74649adfe", "score": "0.56931484", "text": "func (_IServiceCoreEx *IServiceCoreExCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _IServiceCoreEx.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "488f5965e30a63b63a9539df42590823", "score": "0.56916696", "text": "func (_CoolContract *CoolContractRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _CoolContract.Contract.CoolContractCaller.contract.Call(opts, nil, method, params...)\n}", "title": "" }, { "docid": "e4648d9319f62a93696920a64dd5571c", "score": "0.56894135", "text": "func (_Seccontract *SeccontractCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Seccontract.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "9b6eb9f45587a6208042af4aa757a47e", "score": "0.568879", "text": "func (s *SmartContract) Invoke(APIstub shim.ChaincodeStubInterface) sc.Response {\n\n\tfunction, args := APIstub.GetFunctionAndParameters()\n\n\tlogger.Infof(\"Function name is: %d\", function)\n\tlogger.Infof(\"Args length is : %d\", len(args))\n\n\tif function == \"queryLicense\" {\n\t\treturn s.queryLicense(APIstub, args)\n\t} else if function == \"initLedger\" {\n\t\treturn s.initLedger(APIstub)\n\t} else if function == \"createLearnerLicense\" {\n\t\treturn s.createLearnerLicense(APIstub, args)\n\t} else if function == \"inputTest1Result\" {\n\t\treturn s.inputTest1Result(APIstub, args)\n\t} else if function == \"inputTest2Result\" {\n\t\treturn s.inputTest2Result(APIstub, args)\n\t} else if function == \"inputTest3Result\" {\n\t\treturn s.inputTest3Result(APIstub, args)\n\t} else if function == \"getHistoryForAsset\" {\n\t\treturn s.getHistoryForAsset(APIstub, args)\n\t} else if function == \"queryLearnerList\" {\n\t\treturn s.queryLearnerList(APIstub, args)\n\t} else if function == \"restictedMethod\" {\n\t\treturn s.restictedMethod(APIstub, args)\n\t} else if function == \"queryWaitingList\" {\n\t\treturn s.queryWaitingList(APIstub, args)\n\t} else if function == \"upgradeLearnerToActive\" {\n\t\treturn s.upgradeLearnerToActive(APIstub, args)\n\t} else if function == \"queryActiveList\" {\n\t\treturn s.queryActiveList(APIstub, args)\n\t} else if function == \"createPoliceReport\" {\n\t\treturn s.createPoliceReport(APIstub, args)\n\t} else if function == \"queryComplainByLicenseNo\" {\n\t\treturn s.queryComplainByLicenseNo(APIstub, args)\n\t} else if function == \"queryToStallList\" {\n\t\treturn s.queryToStallList(APIstub, args)\n\t} else if function == \"revokeLicense\" {\n\t\treturn s.revokeLicense(APIstub, args)\n\t} else if function == \"queryStalledList\" {\n\t\treturn s.queryStalledList(APIstub, args)\n\t} else if function == \"deleteLicense\" {\n\t\treturn s.deleteLicense(APIstub, args)\n\t}\n\n\treturn shim.Error(\"Invalid Smart Contract function name.\")\n}", "title": "" }, { "docid": "0b89f9d67c68656fe38b643390e49660", "score": "0.5688786", "text": "func (_Attestations *AttestationsCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Attestations.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "83863bb79c28be63d31920ba99cddbbc", "score": "0.5688002", "text": "func (_Factory *FactoryCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Factory.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "74293b5d2de847bf4f31eed6c0bb5fd8", "score": "0.56725055", "text": "func (_IEthCrossChainManager *IEthCrossChainManagerCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _IEthCrossChainManager.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "ca3bf496fb5c5bea855c375072a5e899", "score": "0.5669991", "text": "func (_Tellor *TellorCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Tellor.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "910355f6bc47fc77a891b5e08ca4d0b4", "score": "0.5667586", "text": "func (_Seccontract *SeccontractRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _Seccontract.Contract.SeccontractCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "5b652d770c7aadb63a8b2cfba290f94f", "score": "0.56640893", "text": "func (_ERC20Interface *ERC20InterfaceCallerRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _ERC20Interface.Contract.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" }, { "docid": "e16b6cd706e8d6c6ee77068e2cfc7d99", "score": "0.5662683", "text": "func (_SafeMath *SafeMathRaw) Call(opts *bind.CallOpts, result interface{}, method string, params ...interface{}) error {\n\treturn _SafeMath.Contract.SafeMathCaller.contract.Call(opts, result, method, params...)\n}", "title": "" } ]
cca172448a5e36f5b8566fc753edcdef
AddStore creates a new store on the same Transport but doesn't create any ranges.
[ { "docid": "f5c3621968785f99156f616c07ba1fbd", "score": "0.6774298", "text": "func (m *multiTestContext) addStore(idx int) {\n\tvar clock *hlc.Clock\n\tif len(m.clocks) > idx {\n\t\tclock = m.clocks[idx]\n\t} else {\n\t\tclock = m.clock\n\t\tm.clocks = append(m.clocks, clock)\n\t}\n\tvar eng engine.Engine\n\tvar needBootstrap bool\n\tif len(m.engines) > idx {\n\t\teng = m.engines[idx]\n\t} else {\n\t\tengineStopper := stop.NewStopper()\n\t\tm.engineStoppers = append(m.engineStoppers, engineStopper)\n\t\teng = engine.NewInMem(roachpb.Attributes{}, 1<<20, engineStopper)\n\t\tm.engines = append(m.engines, eng)\n\t\tneedBootstrap = true\n\t}\n\tgrpcServer := rpc.NewServer(m.rpcContext)\n\tm.grpcServers[idx] = grpcServer\n\tm.transports[idx] = storage.NewRaftTransport(m.getNodeIDAddress, grpcServer, m.rpcContext)\n\n\tstopper := stop.NewStopper()\n\n\t// Give this store the first store as a resolver. We don't provide all of the\n\t// previous stores as resolvers as doing so can cause delays in bringing the\n\t// gossip network up.\n\tresolvers := func() []resolver.Resolver {\n\t\tm.mu.Lock()\n\t\tdefer m.mu.Unlock()\n\t\taddr := m.nodeIDtoAddr[1]\n\t\tif addr == nil {\n\t\t\treturn nil\n\t\t}\n\t\tr, err := resolver.NewResolverFromAddress(addr)\n\t\tif err != nil {\n\t\t\tm.t.Fatal(err)\n\t\t}\n\t\treturn []resolver.Resolver{r}\n\t}()\n\tm.gossips[idx] = gossip.New(m.rpcContext, grpcServer, resolvers, m.transportStopper, metric.NewRegistry())\n\tm.gossips[idx].SetNodeID(roachpb.NodeID(idx + 1))\n\tif m.timeUntilStoreDead == 0 {\n\t\tm.timeUntilStoreDead = storage.TestTimeUntilStoreDeadOff\n\t}\n\n\tm.populateStorePool(idx, stopper)\n\tm.populateDB(idx, stopper)\n\n\tctx := m.makeContext(idx)\n\tnodeID := roachpb.NodeID(idx + 1)\n\tstore := storage.NewStore(ctx, eng, &roachpb.NodeDescriptor{NodeID: nodeID})\n\tif needBootstrap {\n\t\terr := store.Bootstrap(roachpb.StoreIdent{\n\t\t\tNodeID: roachpb.NodeID(idx + 1),\n\t\t\tStoreID: roachpb.StoreID(idx + 1),\n\t\t}, stopper)\n\t\tif err != nil {\n\t\t\tm.t.Fatal(err)\n\t\t}\n\n\t\t// Bootstrap the initial range on the first store\n\t\tif idx == 0 {\n\t\t\terr := store.BootstrapRange(sqlbase.MakeMetadataSchema().GetInitialValues())\n\t\t\tif err != nil {\n\t\t\t\tm.t.Fatal(err)\n\t\t\t}\n\t\t}\n\t}\n\n\tln, err := netutil.ListenAndServeGRPC(m.transportStopper, grpcServer, util.TestAddr)\n\tif err != nil {\n\t\tm.t.Fatal(err)\n\t}\n\tm.mu.Lock()\n\tif m.nodeIDtoAddr == nil {\n\t\tm.nodeIDtoAddr = make(map[roachpb.NodeID]net.Addr)\n\t}\n\t_, ok := m.nodeIDtoAddr[nodeID]\n\tif !ok {\n\t\tm.nodeIDtoAddr[nodeID] = ln.Addr()\n\t}\n\tm.mu.Unlock()\n\tif ok {\n\t\tm.t.Fatalf(\"node %d already listening\", nodeID)\n\t}\n\n\tstores := storage.NewStores(clock)\n\tstores.AddStore(store)\n\troachpb.RegisterInternalStoresServer(grpcServer, storage.MakeInternalStoresServer(m.nodeDesc(nodeID), stores))\n\n\t// Add newly created objects to the multiTestContext's collections.\n\t// (these must be populated before the store is started so that\n\t// FirstRange() can find the sender)\n\tm.mu.Lock()\n\tm.stores[idx] = store\n\tm.stoppers[idx] = stopper\n\tsender := storage.NewStores(clock)\n\tsender.AddStore(store)\n\tm.senders[idx] = sender\n\t// Save the store identities for later so we can use them in\n\t// replication operations even while the store is stopped.\n\tm.idents[idx] = store.Ident\n\tm.mu.Unlock()\n\n\t// NB: On Mac OS X, we sporadically see excessively long dialing times (~15s)\n\t// which cause various trickle down badness in tests. To avoid every test\n\t// having to worry about such conditions we pre-warm the connection\n\t// cache. See #8440 for an example of the headaches the long dial times\n\t// cause.\n\tif _, err := m.rpcContext.GRPCDial(ln.Addr().String(), grpc.WithBlock()); err != nil {\n\t\tm.t.Fatal(err)\n\t}\n\n\tm.gossips[idx].Start(ln.Addr())\n\n\tif err := store.Start(stopper); err != nil {\n\t\tm.t.Fatal(err)\n\t}\n\tif err := m.gossipNodeDesc(m.gossips[idx], nodeID); err != nil {\n\t\tm.t.Fatal(err)\n\t}\n\tstore.WaitForInit()\n}", "title": "" } ]
[ { "docid": "cf0d783da20539e5f6895d7febdfe3cd", "score": "0.7115757", "text": "func AddStore(store store.Backend, init Initialize) {\n\tinitializers[store] = init\n}", "title": "" }, { "docid": "57aa7c7357176e95df97b27579e71393", "score": "0.65706474", "text": "func (m *MultiReader) AddStore(store ...content.Provider) {\n\tm.stores = append(m.stores, store...)\n}", "title": "" }, { "docid": "9f0c0582fec490fb2d6468f4733ba71e", "score": "0.61411285", "text": "func (prs *EndpointPairPortRollupStore) Add(sourceAddr []byte, destAddr []byte, sourcePort uint16, destPort uint16) {\n\tsrcToDestKey := buildStoreKey(sourceAddr, destAddr, isSourceEndpoint, sourcePort)\n\tdestToSrcKey := buildStoreKey(sourceAddr, destAddr, isDestinationEndpoint, destPort)\n\n\tprs.AddToStore(prs.curStore, srcToDestKey, destToSrcKey, sourceAddr, destAddr, sourcePort, destPort, NoEphemeralPort)\n\n\t// We pass isEphemeralStatus here to avoid writing to newStore if a port is known to be ephemeral already in curStore\n\tprs.AddToStore(prs.newStore, srcToDestKey, destToSrcKey, sourceAddr, destAddr, sourcePort, destPort, prs.IsEphemeralFromKeys(srcToDestKey, destToSrcKey))\n}", "title": "" }, { "docid": "63c7a6bacb9e2906e43ac452cc54bd17", "score": "0.61192644", "text": "func registerStore(app *extkingpin.App) {\n\tcmd := app.Command(component.Store.String(), \"Store node giving access to blocks in a bucket provider. Now supported GCS, S3, Azure, Swift, Tencent COS and Aliyun OSS.\")\n\n\tconf := &storeConfig{}\n\tconf.registerFlag(cmd)\n\n\tcmd.Setup(func(g *run.Group, logger log.Logger, reg *prometheus.Registry, tracer opentracing.Tracer, _ <-chan struct{}, debugLogging bool) error {\n\t\tif conf.filterConf.MinTime.PrometheusTimestamp() > conf.filterConf.MaxTime.PrometheusTimestamp() {\n\t\t\treturn errors.Errorf(\"invalid argument: --min-time '%s' can't be greater than --max-time '%s'\",\n\t\t\t\tconf.filterConf.MinTime, conf.filterConf.MaxTime)\n\t\t}\n\n\t\thttpLogOpts, err := logging.ParseHTTPOptions(\"\", conf.reqLogConfig)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"error while parsing config for request logging\")\n\t\t}\n\n\t\ttagOpts, grpcLogOpts, err := logging.ParsegRPCOptions(\"\", conf.reqLogConfig)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"error while parsing config for request logging\")\n\t\t}\n\n\t\tconf.debugLogging = debugLogging\n\n\t\treturn runStore(g,\n\t\t\tlogger,\n\t\t\treg,\n\t\t\ttracer,\n\t\t\thttpLogOpts,\n\t\t\tgrpcLogOpts,\n\t\t\ttagOpts,\n\t\t\t*conf,\n\t\t\tgetFlagsMap(cmd.Flags()),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "8385e9b9867a469c7057d08de7593c57", "score": "0.59552544", "text": "func NewStore(id meta.NodeID, serv *grpc.Server, client client.Admin,\n\teng engine.Engine, stopper *stop.Stopper, nc *cache.NodesCache) (Store, error) {\n\tt := newTransport(serv, stopper, nc)\n\ts := &store{\n\t\tnodeID: id,\n\t\tengine: eng,\n\t\ttransport: t,\n\t\tclient: client,\n\t\tstopper: stopper,\n\t\treplicas: make(map[meta.RangeID]*replica),\n\t\tasyncRequestChan: make(chan *asyncRequest, asyncChanSize),\n\t}\n\n\tvar err error\n\tif s.rangeStats, err = s.loadRangeStats(); err != nil {\n\t\treturn nil, errors.Annotatef(err, \"get local node stats error\")\n\t}\n\n\ts.transport.listen(s.raftMessage)\n\ts.uploadRangeStats()\n\ts.newAsyncRequestWorker()\n\n\tlog.Debugf(\"nodeID:%d\", id)\n\n\treturn s, nil\n}", "title": "" }, { "docid": "d37c25cef97ebc577069b25a30f7a42f", "score": "0.59375477", "text": "func AddSunStore(m *SunStore) (id int64, err error) {\n\to := orm.NewOrm()\n\tid, err = o.Insert(m)\n\treturn\n}", "title": "" }, { "docid": "9e8edff76ad603d06f2cae910a96f8b2", "score": "0.59351486", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tbyID: make(map[string]*Config),\n\t}\n}", "title": "" }, { "docid": "acca83c986572ba08e784e0182d7a44e", "score": "0.59338486", "text": "func NewStore(db trustdb.TrustDB, local addr.IA, options Config, logger log.Logger) *Store {\n\tstore := &Store{\n\t\ttrustdb: db,\n\t\tia: local,\n\t\tconfig: options,\n\t\tlog: logger,\n\t}\n\treturn store\n}", "title": "" }, { "docid": "0384ec9b633546abd56a690cd62bd85e", "score": "0.59293455", "text": "func NewStore(repo *aggregate.Repository) *Store {\n\treturn &Store{\n\t\trepo: repo,\n\t}\n}", "title": "" }, { "docid": "2c2cb6830017f4a433d1330ea9cba8a6", "score": "0.5896142", "text": "func newStore() *store {\n\ts := store{\n\t\tserviceToConfigs: make(map[string][]integration.Config),\n\t\tserviceToTagsHash: make(map[string]string),\n\t\ttemplateToConfigs: make(map[string][]integration.Config),\n\t\tloadedConfigs: make(map[string]integration.Config),\n\t\tnameToJMXMetrics: make(map[string]integration.Data),\n\t\tadIDToServices: make(map[string]map[string]struct{}),\n\t\tentityToService: make(map[string]listeners.Service),\n\t\ttemplateCache: newTemplateCache(),\n\t}\n\n\treturn &s\n}", "title": "" }, { "docid": "b61661c2600628bf212f1ff7d9c7944e", "score": "0.5893296", "text": "func NewStore() *Store {\n\tvar shards [SHARDS]*shard\n\tfor i := range shards {\n\t\tshards[i] = newShard()\n\t}\n\treturn &Store{\n\t\tshards: shards,\n\t\tseed: maphash.MakeSeed(),\n\t}\n}", "title": "" }, { "docid": "b60ea380bac7d013bb0949cf27e995fd", "score": "0.5889306", "text": "func (bc *BasicCluster) PutStore(store *core.StoreInfo) error {\n\tbc.Stores.SetStore(store)\n\treturn nil\n}", "title": "" }, { "docid": "23b62979f5d2aa85e87dce4ac3aa06f9", "score": "0.5873555", "text": "func (prs *EndpointPairPortRollupStore) AddToStore(store map[string][]uint16, srcToDestKey string, destToSrcKey string, sourceAddr []byte, destAddr []byte, sourcePort uint16, destPort uint16, curStoreIsEphemeralStatus IsEphemeralStatus) {\n\tprs.storeMu.Lock()\n\tsourceToDestPorts := len(store[srcToDestKey])\n\tdestToSourcePorts := len(store[destToSrcKey])\n\n\t// either source or dest port is already ephemeral\n\tif sourceToDestPorts >= prs.portRollupThreshold || destToSourcePorts >= prs.portRollupThreshold {\n\t\tprs.storeMu.Unlock()\n\t\treturn\n\t}\n\tif destToSourcePorts+1 < prs.portRollupThreshold && curStoreIsEphemeralStatus != IsEphemeralSourcePort {\n\t\tstore[srcToDestKey] = appendPort(store[srcToDestKey], destPort)\n\t}\n\t// if the destination port is ephemeral, we can delete the corresponding destToSrc entries\n\tif len(store[srcToDestKey]) >= prs.portRollupThreshold {\n\t\tfor _, port := range store[srcToDestKey] {\n\t\t\tdelete(store, buildStoreKey(sourceAddr, destAddr, isDestinationEndpoint, port))\n\t\t}\n\t}\n\n\tif sourceToDestPorts+1 < prs.portRollupThreshold && curStoreIsEphemeralStatus != IsEphemeralDestPort {\n\t\tstore[destToSrcKey] = appendPort(store[destToSrcKey], sourcePort)\n\t}\n\t// if the source port is ephemeral, we can delete the corresponding srcToDest entries\n\tif len(store[destToSrcKey]) >= prs.portRollupThreshold {\n\t\tfor _, port := range store[destToSrcKey] {\n\t\t\tdelete(store, buildStoreKey(sourceAddr, destAddr, isSourceEndpoint, port))\n\t\t}\n\t}\n\n\tprs.storeMu.Unlock()\n}", "title": "" }, { "docid": "c0043da2c7ec011c09767ca8f139e0e0", "score": "0.58683646", "text": "func NewStore() *Store {\n\tstore := &Store{}\n\tstore.RecordTransformer = map[string]func(string) string{}\n\tstore.ValueTransformer = map[string]func(float64) float64{}\n\treturn store\n}", "title": "" }, { "docid": "bd30f69aac7e596e661e31ee16a8cc0d", "score": "0.58654", "text": "func NewStore(c dipper.RPCCaller) *Store {\n\tstore := &Store{\n\t\tcaller: c,\n\t\trequests: &sync.Map{},\n\t\trequestsByInput: &sync.Map{},\n\t}\n\tstore.apiDef = GetDefs()\n\tstore.newUUID = dipper.NewUUID\n\n\treturn store\n}", "title": "" }, { "docid": "f384c49d01e65718675c7233593c3e47", "score": "0.5861708", "text": "func NewStore(opt *Options) (*Store, error) {\n\tzkCli := zkclient.NewZkClient(opt.Addrs)\n\tif err := zkCli.ConnectEx(time.Duration(opt.ConnectTimeoutSeconds) * time.Second); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Store{\n\t\tbasePath: filepath.Join(rootPath, opt.BasePath),\n\t\tzk: zkCli,\n\t}, nil\n}", "title": "" }, { "docid": "a31eddca65b80646760ad0d3e57b03be", "score": "0.58550304", "text": "func NewStore(options ...StoreOption) (*Store, error) {\n\ts := &Store{}\n\n\tfor _, option := range options {\n\t\tif err := option(s); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "addd8aaba1d521fcfd420cad838b43c0", "score": "0.58436626", "text": "func InsertStore(s *models.Store) error {\n\n\tdb, err := Connect()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif s.ID != 0 {\n\t\t_, err = db.Exec(`\n\t\t\tinsert into stores (id, name, affiliateURL, imageURL, querySelector)\n\t\t\tvalues (?, ?, ?, ?, ?);\n\t\t`, s.ID, s.Name, s.AffiliateURL, s.ImageURL, s.QuerySelector)\n\t} else {\n\t\t_, err = db.Exec(`\n\t\t\tinsert into stores (name, affiliateURL, imageURL, querySelector)\n\t\t\tvalues (?, ?, ?, ?);\n\t\t`, s.Name, s.AffiliateURL, s.ImageURL, s.QuerySelector)\n\t}\n\tif err != nil {\n\t\tif strings.Contains(err.Error(), \"Error 1062\") {\n\t\t\tduplicated := strings.Split(err.Error(), \"'\")[1]\n\t\t\treturn errors.New(`duplicated, ` + duplicated)\n\t\t}\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8ee3feec5fa2333e0af827768eabe777", "score": "0.5813268", "text": "func NewStore(db *storm.DB) *Store {\n\treturn &Store{\n\t\tdb: db,\n\t\tvalidate: validator.New(),\n\t}\n}", "title": "" }, { "docid": "c57321225e416aabc02b5e2f7cf3e3ad", "score": "0.5809707", "text": "func NewStoreSet(\n\tlogger log.Logger,\n\treg *prometheus.Registry,\n\tstoreSpecs func() []StoreSpec,\n\tdialOpts []grpc.DialOption,\n) *StoreSet {\n\tstoreNodeConnections := prometheus.NewGauge(prometheus.GaugeOpts{\n\t\tName: \"thanos_store_nodes_grpc_connections\",\n\t\tHelp: \"Number indicating current number of gRPC connection to store nodes. This indicates also to how many stores query node have access to.\",\n\t})\n\n\tif logger == nil {\n\t\tlogger = log.NewNopLogger()\n\t}\n\tif reg != nil {\n\t\treg.MustRegister(storeNodeConnections)\n\t}\n\tif storeSpecs == nil {\n\t\tstoreSpecs = func() []StoreSpec { return nil }\n\t}\n\treturn &StoreSet{\n\t\tlogger: logger,\n\t\tstoreSpecs: storeSpecs,\n\t\tdialOpts: dialOpts,\n\t\tstoreNodeConnections: storeNodeConnections,\n\t\tgRPCRetryTimeout: 3 * time.Second,\n\t}\n}", "title": "" }, { "docid": "d5b64d3957a7ae5ca5e7afc0c0098557", "score": "0.58081156", "text": "func NewStore(db *dbstore.DB) core.ExperimentStore {\n\tdb.AutoMigrate(&core.ArchiveExperiment{})\n\n\treturn &experimentStore{db}\n}", "title": "" }, { "docid": "78b95e2f66a2c1ab7ccbd966c1f1aea5", "score": "0.5773068", "text": "func newStore(t *testing.T, addresses []string) client.ServerStore {\n\tt.Helper()\n\n\tservers := make([]client.ServerInfo, len(addresses))\n\tfor i, address := range addresses {\n\t\tservers[i].ID = uint64(i)\n\t\tservers[i].Address = address\n\t}\n\n\tstore := client.NewInmemServerStore()\n\trequire.NoError(t, store.Set(context.Background(), servers))\n\n\treturn store\n}", "title": "" }, { "docid": "629892d95fc7622c893f96da259f61f1", "score": "0.57723683", "text": "func newStore(db *bolt.DB) (*store, error) {\n\tif db == nil {\n\t\treturn nil, errors.New(\"new exchange store failed, db is nil\")\n\t}\n\n\tif err := db.Update(func(tx *bolt.Tx) error {\n\t\t// create exchange meta bucket if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(exchangeMetaBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(exchangeMetaBkt, err)\n\t\t}\n\n\t\t// create deposit status bucket if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(depositInfoBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(depositInfoBkt, err)\n\t\t}\n\n\t\t// create bind address bucket if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(bindAddressBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(bindAddressBkt, err)\n\t\t}\n\n\t\tif _, err := tx.CreateBucketIfNotExists(skyDepositSeqsIndexBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(skyDepositSeqsIndexBkt, err)\n\t\t}\n\n\t\tif _, err := tx.CreateBucketIfNotExists(btcTxsBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(btcTxsBkt, err)\n\t\t}\n\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &store{\n\t\tdb: db,\n\t}, nil\n}", "title": "" }, { "docid": "c407a987f4e79657fddb4e6fd224c726", "score": "0.5764245", "text": "func NewStore() *Store {\n\tvar mux sync.Mutex\n\ts := Store{&mux, nil}\n\ts.Data = make(map[string]storeDetails)\n\treturn &s\n}", "title": "" }, { "docid": "3156b029638108c10ae70dcdf139ef42", "score": "0.575445", "text": "func NewStore(table *meta.Table, regionID, startKey, endKey string) (*LocalStore, error) {\n\ts := new(LocalStore)\n\ts.table = table\n\ts.regionID = regionID\n\ts.regionStart = startKey\n\ts.regionEnd = endKey\n\ts.currentSegment = btree.New(3)\n\tlog, err := txlog.NewTransactionLog(regionID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts.currentTxLog = log\n\ts.ready = true\n\treturn s, nil\n}", "title": "" }, { "docid": "4edddfe7134d75cc5de84183448fca3c", "score": "0.5745963", "text": "func NewStore(store storage.Interface) *Store {\n\treturn &Store{\n\t\tstore: store,\n\t\taccounts: accounts.NewStore(store),\n\t}\n}", "title": "" }, { "docid": "cda4fccb1f60e74cdf29bfb8f44e00e3", "score": "0.5741747", "text": "func NewStore() Store {\n\treturn &storeImpl{}\n}", "title": "" }, { "docid": "b830858d623247717d7015cab6da5c5c", "score": "0.5739683", "text": "func NewStore(client topo.TopoClient) (Store, error) {\n\treturn &topoStore{client: client}, nil\n}", "title": "" }, { "docid": "7cc7c3ded1147ac73e9d14a7208d1314", "score": "0.57059383", "text": "func UseStore(s wtypes.Store) error {\n\tif s == nil {\n\t\treturn errors.New(\"no store supplied\")\n\t}\n\tstore = s\n\n\treturn nil\n}", "title": "" }, { "docid": "41763b505db4f340177fcadf0dfde9e3", "score": "0.56896937", "text": "func NewStore() job.Store {\n\treturn &store{\n\t\tids: make(map[string]*record),\n\t\ttags: make(map[string]map[string]*record),\n\t}\n}", "title": "" }, { "docid": "b748a26f074ce978b4a078fd29f88fc3", "score": "0.5688399", "text": "func TracerStore(n string) TracerOption {\n\treturn func(o *tracerOptions) {\n\t\to.stores = append(o.stores, n)\n\t}\n}", "title": "" }, { "docid": "29e544ef7563c6c45f61a7a2f8cda0c8", "score": "0.56605136", "text": "func NewStore() Store {\n\treturn Store{}\n}", "title": "" }, { "docid": "66ac857dc662b2fa4b4e991d1e6ffbb8", "score": "0.56603694", "text": "func NewStore(log *log.Logger, gql *graphql.GraphQL) Store {\n\treturn Store{\n\t\tlog: log,\n\t\tgql: gql,\n\t}\n}", "title": "" }, { "docid": "d2e3b2284a95f1d79a8fa7c166a2a330", "score": "0.56469333", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tdatabase: make(map[string]Vegetable),\n\t}\n}", "title": "" }, { "docid": "d3370d7fae2d7c7c02d0f30fe327f271", "score": "0.5632096", "text": "func (g *TEMX) newLedgerStore(ctx context.Context, dag pb.NodeAPIClient, pub pb.PubSubAPIClient) (*ledgerStore, error) {\n\tswitch g.DSType {\n\tcase DSTypeBadger:\n\t\treturn g.newBadgerLedgerStore(dag)\n\tcase DSTypeCrdt:\n\t\treturn g.newCrdtLedgerStore(ctx, dag, pub)\n\t}\n\treturn nil, fmt.Errorf(`data store type \"%v\" not supported`, g.DSType)\n}", "title": "" }, { "docid": "15d96d79fd0a737067942b675c57435c", "score": "0.5631199", "text": "func NewStore(writer, reader *sqlx.DB) Store {\n\treturn &storeImpl{writer, reader}\n}", "title": "" }, { "docid": "db2d123d5191728e0ab90133ac567f7e", "score": "0.56226915", "text": "func NewStore(db *sqlx.DB) *store {\n\treturn &store{\n\t\tDB: db,\n\t}\n}", "title": "" }, { "docid": "7fb60766a6eb4e7a2fd4ee2c6c8903f8", "score": "0.56201863", "text": "func (state *State) SetStore(s store.Store) {\n\toldStore := state.S\n\tif s == oldStore {\n\t\treturn\n\t}\n\n\tstate.RegisteredMetricsLock.RLock()\n\tdefer state.RegisteredMetricsLock.RUnlock()\n\n\t// Register metrics on the new store.\n\tfor _, m := range state.RegisteredMetrics {\n\t\ts.Register(m)\n\t}\n\n\tstate.S = s\n\n\t// Unregister metrics from the old store.\n\tif oldStore != nil {\n\t\tfor _, m := range state.RegisteredMetrics {\n\t\t\toldStore.Unregister(m)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4d718b36d1a9750a2edf6449de3250ec", "score": "0.5617326", "text": "func (p *Snap) SetStore(_ PluginStore) {}", "title": "" }, { "docid": "9c5c0ae72d799f5746a10d601683b120", "score": "0.5610914", "text": "func NewStore(id string, service string, addr Address) (*Store, error) {\n\tstore := &Store{userService: service, userAddress: addr, cli: orderClient}\n\treturn store, InitStore(id, store)\n}", "title": "" }, { "docid": "d23ce9447979465ab83e3af8112a76a2", "score": "0.5604328", "text": "func Store(s ...store.Store) Option {\n\treturn func(o *Options) error {\n\t\to.Stores = s\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "674bc412650b99cb8162093a5ab53240", "score": "0.5598356", "text": "func RegisterStore(keyPairs ...[]byte) {\n\tstore := sessions.NewFilesystemStore(\"\", keyPairs...)\n\tM.Store = store\n}", "title": "" }, { "docid": "724cdeeb6e7185c555e208d8373bc42e", "score": "0.5597455", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tcontainers: map[string]Container{},\n\t}\n}", "title": "" }, { "docid": "725275e21aaafa0e7fb47f0f85850fe6", "score": "0.5595627", "text": "func NewStore(log *log.Logger, db *database.DB) Store {\n\treturn Store{\n\t\tlog: log,\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "725275e21aaafa0e7fb47f0f85850fe6", "score": "0.5595627", "text": "func NewStore(log *log.Logger, db *database.DB) Store {\n\treturn Store{\n\t\tlog: log,\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "c59e5e969da09d632841317de9c535b7", "score": "0.55952823", "text": "func NewStore(clusterInfo ClusterInfo, nodeInfo NodeInfo) *Store {\n\ts := &Store{\n\t\tinfo: nodeInfo,\n\t\tclusterInfo: clusterInfo,\n\n\t\tdata: make(map[int]*Data),\n\t\tnodeData: map[int]map[int]*Data{},\n\t}\n\n\t//Create all nodeData for each node\n\tfor i := 0; i < s.clusterInfo.NumNodes; i++ {\n\t\tif i != s.info.ID {\n\t\t\ts.nodeData[i] = make(map[int]*Data)\n\t\t}\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "2dbc6b962827e5c9823ef154c0f63109", "score": "0.55906093", "text": "func NewStore() *Storer {\n\tdb := make(map[int]string)\n\treturn &Storer{\n\t\tdata: db,\n\t\ttotalRequests: 0,\n\t\tlatency: 0,\n\t}\n}", "title": "" }, { "docid": "3a44908deeb424cd4b6a3a5c85b02811", "score": "0.55851096", "text": "func NewStore(p Params) (*Store, error) {\n\tdb, err := NewSqliteDb(p.File, p.ID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error opening db: %v\", err)\n\t}\n\n\t// we don't have node ID yet, but need to init here so we can start\n\t// collecting data\n\n\tauthorizer, err := api.NewKey(db.meta.JWTKey)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Error creating authorizer: %v\", err)\n\t}\n\n\tlog.Println(\"store connecting to nats server: \", p.Server)\n\treturn &Store{\n\t\tparams: p,\n\t\tnc: p.Nc,\n\t\tdb: db,\n\t\tauthorizer: authorizer,\n\t\tsubscriptions: make(map[string]*nats.Subscription),\n\t\tchStop: make(chan struct{}),\n\t\tchStopMetrics: make(chan struct{}),\n\t\tchWaitStart: make(chan struct{}),\n\t\tmetricCycleNodePoint: client.NewMetric(p.Nc, \"\",\n\t\t\tdata.PointTypeMetricNatsCycleNodePoint, reportMetricsPeriod),\n\t\tmetricCycleNodeEdgePoint: client.NewMetric(p.Nc, \"\",\n\t\t\tdata.PointTypeMetricNatsCycleNodeEdgePoint, reportMetricsPeriod),\n\t\tmetricCycleNode: client.NewMetric(p.Nc, \"\",\n\t\t\tdata.PointTypeMetricNatsCycleNode, reportMetricsPeriod),\n\t\tmetricCycleNodeChildren: client.NewMetric(p.Nc, \"\",\n\t\t\tdata.PointTypeMetricNatsCycleNodeChildren, reportMetricsPeriod),\n\t}, nil\n}", "title": "" }, { "docid": "55aa72f4d4832844bd56f055b817a757", "score": "0.55612814", "text": "func NewStore(db *sqlx.DB) *Store {\n\treturn &Store{\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "3ad32188f7f3525c0ee38c739bb608db", "score": "0.5561153", "text": "func NewStore(endpoints []string) *Store {\n\ts := &Store{\n\t\tEndpoints: endpoints,\n\t}\n\n\tconfig := etcd.Config{\n\t\tEndpoints: s.Endpoints,\n\t\tTransport: etcd.DefaultTransport,\n\t\tHeaderTimeoutPerRequest: time.Second,\n\t}\n\n\tc, err := etcd.New(config)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ts.Client = &c\n\n\treturn s\n}", "title": "" }, { "docid": "3ad32188f7f3525c0ee38c739bb608db", "score": "0.5561153", "text": "func NewStore(endpoints []string) *Store {\n\ts := &Store{\n\t\tEndpoints: endpoints,\n\t}\n\n\tconfig := etcd.Config{\n\t\tEndpoints: s.Endpoints,\n\t\tTransport: etcd.DefaultTransport,\n\t\tHeaderTimeoutPerRequest: time.Second,\n\t}\n\n\tc, err := etcd.New(config)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\ts.Client = &c\n\n\treturn s\n}", "title": "" }, { "docid": "4053a66b771bc631f2ff75f67d31c8e1", "score": "0.5558594", "text": "func (p *DMR) SetStore(s PluginStore) {\n}", "title": "" }, { "docid": "9b3f9ea6b55308caa9f1b6a15743b05b", "score": "0.5554231", "text": "func NewStore(dir string) (asset.Store, error) {\n\treturn newStore(dir)\n}", "title": "" }, { "docid": "bdb14ed8810db05cf3392ff8c4e535fa", "score": "0.55518824", "text": "func NewStore(serviceName string) Store {\n\treturn &lrsStore{\n\t\tserviceName: serviceName,\n\t\tnode: &basepb.Node{\n\t\t\tMetadata: &structpb.Struct{\n\t\t\t\tFields: map[string]*structpb.Value{\n\t\t\t\t\tinternal.GrpcHostname: {\n\t\t\t\t\t\tKind: &structpb.Value_StringValue{StringValue: serviceName},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tbackoff: backoff.Exponential{\n\t\t\tMaxDelay: 120 * time.Second,\n\t\t},\n\t\tlastReported: time.Now(),\n\t}\n}", "title": "" }, { "docid": "d78ad6240651f1868eaf073909be7d86", "score": "0.55411124", "text": "func NewStore(db kvdb.Store) *Store {\n\ts := &Store{\n\t\tdb: db,\n\t\tInstance: logger.MakeInstance(),\n\t\trlp: rlpstore.Helper{logger.MakeInstance()},\n\t}\n\n\ttable.MigrateTables(&s.table, s.db)\n\n\treturn s\n}", "title": "" }, { "docid": "bb9b378dd7a84b103e28bd22a210f216", "score": "0.55391806", "text": "func NewStore(db *bolt.DB) Store {\n\treturn &store{db}\n}", "title": "" }, { "docid": "e6f79deba16a35a30ddf252efc14b13b", "score": "0.55381036", "text": "func NewStore(name string) Store {\n\tnewFunc, ok := stores[name]\n\tif !ok {\n\t\treturn nil\n\t}\n\treturn newFunc()\n}", "title": "" }, { "docid": "3b6513e1088ddd4da67622892eea5628", "score": "0.55380833", "text": "func WithStore(store rangedb.Store) Option {\n\treturn func(api *api) {\n\t\tapi.store = store\n\t}\n}", "title": "" }, { "docid": "71761e533a1cc05bac566281c222a0f1", "score": "0.5534899", "text": "func NewStore(enc encoding.Unmarshaler) *Store {\n\treturn &Store{\n\t\tencoder: enc,\n\t}\n}", "title": "" }, { "docid": "9770e599cfc7756c872b4d9c6b7c12c8", "score": "0.55333453", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tIP: make(map[string]*IPMeta),\n\t}\n}", "title": "" }, { "docid": "f6e99c77a870da523dcf2c1b669068b4", "score": "0.5526129", "text": "func NewStore(ds datastore.Datastore) *SnapStore {\n\t// check if we have cached headers (with the store macaroon)\n\tcfg, err := ds.SettingsGet(\"store\", \"headers\")\n\tif err != nil {\n\t\treturn &SnapStore{\n\t\t\tDatastore: ds,\n\t\t}\n\t}\n\theaders, err := readHeaders([]byte(cfg.Data))\n\tif err != nil {\n\t\treturn &SnapStore{\n\t\t\tDatastore: ds,\n\t\t}\n\t}\n\n\t// use the cached headers, so no login needed\n\treturn &SnapStore{\n\t\tDatastore: ds,\n\t\theaders: headers,\n\t}\n}", "title": "" }, { "docid": "a34982a329fd7a37be48b3e2d8479487", "score": "0.5522939", "text": "func newStore() *store {\n\treturn &store{}\n}", "title": "" }, { "docid": "a7d61638759740f2b491dcc4585955c8", "score": "0.55199087", "text": "func NewStore(name string) *Store {\n\treturn &Store{\n\t\tName: name,\n\t\tFullName: PascalCase(name) + \"Store\",\n\t}\n}", "title": "" }, { "docid": "c76f87467e886efbe7b71e2300820bbb", "score": "0.55194986", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tData: new(sync.Map),\n\t}\n}", "title": "" }, { "docid": "7c8ccd43264cad8f7bebaf6909a1bf8e", "score": "0.5517547", "text": "func NewStore(opts ...store.Option) store.Store {\n\toptions := store.Options{\n\t\tNodes: []string{},\n\t\tDatabase: \"default\",\n\t\tTable: \"\",\n\t\tContext: context.Background(),\n\t}\n\n\tn := &natsStore{\n\t\tdescription: \"Object storage administered by go-micro store plugin\",\n\t\topts: options,\n\t\tjsopts: []nats.JSOpt{},\n\t\tobjStoreConfigs: []*nats.ObjectStoreConfig{},\n\t\tbuckets: map[string]nats.ObjectStore{},\n\t\tstorageType: nats.FileStorage,\n\t}\n\n\tn.setOption(opts...)\n\n\treturn n\n}", "title": "" }, { "docid": "6753e77da4f2b0d4ec22b5ae00f009be", "score": "0.551054", "text": "func (svc *Service) RegisterNewStore(cmd RegisterNewStoreCommand) (*store.Store, error) {\n\tstr, err := store.New(store.NextID(), cmd.Name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err = svc.storeRepo.Store(str); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn str, nil\n}", "title": "" }, { "docid": "afe1421eb6942adf2da681717d210e43", "score": "0.5509989", "text": "func NewStore(apiClient apiClient, gracePeriod time.Duration, logger *zap.Logger) Store {\n\treturn &store{\n\t\tapiClient: apiClient,\n\t\tsyncInterval: defaultSyncInterval,\n\t\tgracePeriod: gracePeriod,\n\t\tlatestEvents: make(map[string]*model.Event),\n\t\tlogger: logger.Named(\"event-store\"),\n\t}\n}", "title": "" }, { "docid": "9a3f6ff499e7349c89fc523d3fb2ead3", "score": "0.5509351", "text": "func NewStore() *Store {\n\treturn &Store{}\n}", "title": "" }, { "docid": "c87726fb223b75655a31d43c987d9002", "score": "0.5506139", "text": "func NewStore(log logrus.FieldLogger, db *bolt.DB) (*Store, error) {\n\tif db == nil {\n\t\treturn nil, errors.New(\"new Store failed: db is nil\")\n\t}\n\n\tif err := db.Update(func(tx *bolt.Tx) error {\n\t\t// create reservations bucket if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(ReservationsKittyBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(ReservationsKittyBkt, err)\n\t\t}\n\n\t\t// create users bucket if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(UsersBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(UsersBkt, err)\n\t\t}\n\n\t\t// create kitty owner bkt if not exist\n\t\tif _, err := tx.CreateBucketIfNotExists(KittyOwnerBkt); err != nil {\n\t\t\treturn dbutil.NewCreateBucketFailedErr(KittyOwnerBkt, err)\n\t\t}\n\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Store{\n\t\tdb: db,\n\t\tlog: log,\n\t}, nil\n}", "title": "" }, { "docid": "1d0189adefa6b01609761e1b93e6c834", "score": "0.5503323", "text": "func (s *StakeStore) addHashToStore(hash *chainhash.Hash) {\n\ts.ownedSStxs[*hash] = struct{}{}\n}", "title": "" }, { "docid": "423135c9f8a33c0ecb440c1e0d37531c", "score": "0.5497265", "text": "func NewStore(db dbutil.DB) *Store {\n\treturn NewStoreWithClock(db, func() time.Time {\n\t\treturn time.Now().UTC().Truncate(time.Microsecond)\n\t})\n}", "title": "" }, { "docid": "734456c5ebd1793845ae1ccd6f301a54", "score": "0.5482058", "text": "func WithStore(storage Store) ManagerOption {\n\treturn func(settings managerSettings) {\n\t\tsettings.setStore(storage)\n\t}\n}", "title": "" }, { "docid": "c52cc39b9651d580ceaab0adf5aee6ff", "score": "0.5477852", "text": "func NewStore(db *db.DB, fileStore file.Store, log logger.Logger) *store {\n\treturn &store{db, fileStore, log}\n}", "title": "" }, { "docid": "6ff490ceb1134986039538c6b857cc44", "score": "0.5469527", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tMutex: &sync.Mutex{},\n\t\tsessions: map[string]*PointingSession{},\n\t}\n}", "title": "" }, { "docid": "9cf687751418ed2f3eeb9caa4e476304", "score": "0.5467485", "text": "func NewStore(opts StoreOpts) *Store {\n\treturn &Store{opts: opts, NotFoundCache: &sync.Map{}}\n}", "title": "" }, { "docid": "937fa4a4691f1cb95075f1da98340f17", "score": "0.54636097", "text": "func NewStoreLog() (Storer, error) {\n\treturn &storeLog{}, nil\n}", "title": "" }, { "docid": "01dd8e9010f4eebd73c6fbe778b8fd6f", "score": "0.5457317", "text": "func NewStore(assetsPath, indexName, esURL string) Storage {\n\tclient, err := elastic.NewClient(\n\t\telastic.SetURL(esURL),\n\t\telastic.SetSniff(false),\n\t)\n\tif err != nil {\n\t\tlog.WithError(err).Fatal(\"Failed to start elasticsearch client\")\n\t}\n\tstore := &Store{\n\t\tes: client,\n\t\ttrainerIndex: indexName,\n\t\ttrainerType: \"trainer\",\n\t}\n\n\tif err := store.bootstrap(assetsPath, indexName); err != nil {\n\t\tlog.WithError(err).Fatal(\"Failed to bootstrap elasticsearch store\")\n\t}\n\treturn store\n}", "title": "" }, { "docid": "c0304b4e03db1e876fc1bec1980da05e", "score": "0.54542863", "text": "func NewStore(ctrl *gomock.Controller) *Store {\n\tmock := &Store{ctrl: ctrl}\n\tmock.recorder = &StoreMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "3e1cacbb36acc05913192fe0de91d5c4", "score": "0.5453142", "text": "func NewStore(path string) (Store, error) {\n\tm := make(map[string][]time.Time)\n\ts, err := index.NewPersistStore(path, &m)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &store{\n\t\tm: m,\n\t\tstore: s,\n\t}, nil\n}", "title": "" }, { "docid": "4ff73f8e90b70f1bf71f82c619e78c9a", "score": "0.54481894", "text": "func NewStore(logger *log.Logger, nodeID, raftDir, raftAddress string, enableSingle bool, rpcAddress string, bucketName, cohortRaftAddress, cohortJoinAddress string) *Store {\n\tif nodeID == \"\" {\n\t\tnodeID = \"node-\" + common.RandNodeID(common.NodeIDLen)\n\t}\n\n\tif raftDir == \"\" {\n\t\traftDir, _ = os.Hostname()\n\t}\n\n\tl := logger.WithField(\"component\", \"store\")\n\tshardsDir := filepath.Join(common.RaftPVBaseDir, raftDir)\n\n\tl.Infof(\"Preparing node-%s with persistent directory %s, raftAddress %s\", nodeID, shardsDir, raftAddress)\n\tos.MkdirAll(shardsDir, 0700)\n\tif bucketName == \"\" {\n\t\tbucketName = \"bucket-\" + nodeID\n\t}\n\tpersistDbConn := newDBConn(filepath.Join(shardsDir, SnapshotPersistFile), bucketName, logger)\n\n\ts := &Store{\n\t\tID: nodeID,\n\t\tRaftAddress: raftAddress,\n\t\tkv: common.NewCmap(logger, common.LockContention),\n\t\tlog: l,\n\t\trpcAddress: rpcAddress,\n\t\tpersistKvDbConn: persistDbConn,\n\t\tpersistBucketName: bucketName,\n\t\tRaftDir: shardsDir,\n\t}\n\n\tra, err := common.SetupRaft((*fsm)(s), s.ID, s.RaftAddress, shardsDir, enableSingle)\n\tif err != nil {\n\t\tl.Fatalf(\"Unable to setup raft instance for kv store:%s\", err)\n\t}\n\ts.raft = ra\n\tgo startCohort(s, rpcAddress, \"c-\"+s.ID, cohortRaftAddress, \"cohort\"+s.RaftDir, enableSingle, cohortJoinAddress)\n\treturn s\n}", "title": "" }, { "docid": "e7ca1107679946a38f650e8e09ae08b5", "score": "0.5447601", "text": "func NewStore(eventStore x.EventStore, aggregateFactory cqrs.AggregateFactory) *AggregateStore {\n\tif eventStore == nil {\n\t\tpanic(\"eventStore is required\")\n\t}\n\n\tif aggregateFactory == nil {\n\t\tpanic(\"aggregateFactory is required\")\n\t}\n\n\treturn &AggregateStore{\n\t\teventStore: eventStore,\n\t\taggregateFactory: aggregateFactory,\n\t}\n}", "title": "" }, { "docid": "7baf934df7b59d0570e6fb0d47822b67", "score": "0.54440844", "text": "func NewStore(backend store.Backend, addrs []string, options *store.Config) (store.Store, error) {\n\tif init, exists := initializers[backend]; exists {\n\t\treturn init(addrs, options)\n\t}\n\n\treturn nil, fmt.Errorf(\"%s %s\", store.ErrBackendNotSupported.Error(), supportedBackend)\n}", "title": "" }, { "docid": "1de655c45462dbf6c22b017a7587509a", "score": "0.5444041", "text": "func (e Engine) NewStore(config dvid.StoreConfig) (dvid.Store, bool, error) {\n\treturn e.newBigTable(config)\n}", "title": "" }, { "docid": "a1888d946653e8672b7074505dea12aa", "score": "0.5435225", "text": "func NewStore(cli Client, serviceAuthToken string) *Store {\n\treturn &Store{cli, serviceAuthToken}\n}", "title": "" }, { "docid": "86124491f2728325a523ebaba758d856", "score": "0.5429662", "text": "func NewStore(id string, opts ...store.Option) (store.Store, error) {\n\to := store.NewOptions()\n\tfor _, apply := range opts {\n\t\tapply(&o)\n\t}\n\n\treturn &Memory{\n\t\tWeightedUndirectedGraph: simple.NewWeightedUndirectedGraph(0.0, 0.0),\n\t\tid: id,\n\t\tnodes: make(map[string]*node),\n\t\tGraphAttrs: o.GraphAttrs,\n\t\tNodeAttrs: o.NodeAttrs,\n\t\tEdgeAttrs: o.EdgeAttrs,\n\t}, nil\n}", "title": "" }, { "docid": "09191d2859ff487d8f4e65dffa5117e6", "score": "0.5428807", "text": "func (prs *EndpointPairPortRollupStore) UseNewStoreAsCurrentStore() {\n\tprs.storeMu.Lock()\n\tdefer prs.storeMu.Unlock()\n\n\tprs.curStore = prs.newStore\n\tprs.newStore = make(map[string][]uint16)\n}", "title": "" }, { "docid": "55aef70778335d62686eef046ef240d3", "score": "0.5428741", "text": "func NewStore(root string) (*Store, error) {\n\tif err := mkDirOrExist(fmt.Sprintf(\"%s\", root)); err != nil {\n\t\treturn nil, reterr(\"NewStore\", err)\n\t}\n\tif err := mkDirOrExist(fmt.Sprintf(\"%s/str\", root)); err != nil {\n\t\treturn nil, reterr(\"NewStore\", err)\n\t}\n\tif err := mkDirOrExist(fmt.Sprintf(\"%s/trpl\", root)); err != nil {\n\t\treturn nil, reterr(\"NewStore\", err)\n\t}\n\treturn &Store{root, new(sync.RWMutex), make(map[string]*sync.RWMutex)}, nil\n}", "title": "" }, { "docid": "69bf8f36c18473c1b1e9a87acb8abcdb", "score": "0.54225045", "text": "func NewStore(opt *Options) Store {\n\treturn &argo{\n\t\toption: opt,\n\t}\n}", "title": "" }, { "docid": "26751f694f2a2ee6e19a45e30d8de6a4", "score": "0.54220194", "text": "func NewStore(cfg Config, storeCfg chunk.StoreConfig, schemaCfg SchemaConfig, limits storage.StoreLimits, registerer prometheus.Registerer) (Store, error) {\n\ts, err := storage.NewStore(cfg.Config, storeCfg, schemaCfg.SchemaConfig, limits, registerer, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &store{\n\t\tStore: s,\n\t\tcfg: cfg,\n\t}, nil\n}", "title": "" }, { "docid": "c2ab42979582b03c5059a16470315fdd", "score": "0.5417784", "text": "func NewStore(t StorageType) Store {\n\tswitch t {\n\tcase DiskStorage:\n\t\treturn newDiskStorage()\n\tcase TempStorage:\n\t\treturn newTempStorage()\n\tcase MemoryStorage:\n\t\treturn newMemoryStorage()\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "3d08ee61d1822087eb94ff0e72e2b192", "score": "0.5414876", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tData: make(map[string]string),\n\t}\n}", "title": "" }, { "docid": "ffbb0a6890c2da36134211df88c27940", "score": "0.5413273", "text": "func newStore(ifi string, s config.Storage, ll *log.Logger) (wgipam.Store, error) {\n\tswitch {\n\tcase s.Memory:\n\t\tll.Println(\"using ephemeral in-memory storage\")\n\t\treturn wgipam.MemoryStore(), nil\n\tcase s.File != \"\":\n\t\tfile := filepath.Join(s.File, fmt.Sprintf(\"wgipamd-%s.db\", ifi))\n\t\tll.Printf(\"using file %q storage\", file)\n\t\treturn wgipam.FileStore(file)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"invalid storage configuration: %#v\", s)\n\t}\n}", "title": "" }, { "docid": "cc843575605bf4728ec6cebd262f6536", "score": "0.5407636", "text": "func NewStore(region, tableName string) (store *Store, err error) {\n\tconf := &aws.Config{\n\t\tRegion: aws.String(region),\n\t}\n\tsess, err := session.NewSession(conf)\n\tif err != nil {\n\t\treturn\n\t}\n\tstore = &Store{\n\t\tClient: dynamodb.New(sess),\n\t\tTableName: aws.String(tableName),\n\t\tDataTypes: make(map[string]func() interface{}),\n\t}\n\treturn\n}", "title": "" }, { "docid": "21c5c8367811a39ea3716cbe9268d789", "score": "0.5405881", "text": "func createStores(count int, t *testing.T) (*hlc.ManualClock, []*Store, *Stores, *stop.Stopper) {\n\tstopper := stop.NewStopper()\n\tctx := TestStoreContext()\n\tmanualClock := hlc.NewManualClock(0)\n\tctx.Clock = hlc.NewClock(manualClock.UnixNano)\n\tls := NewStores(ctx.Clock)\n\n\t// Create two stores with ranges we care about.\n\tstores := []*Store{}\n\tfor i := 0; i < 2; i++ {\n\t\tctx.Transport = NewDummyRaftTransport()\n\t\ts := NewStore(ctx, engine.NewInMem(roachpb.Attributes{}, 1<<20, stopper), &roachpb.NodeDescriptor{NodeID: 1})\n\t\tstoreIDAlloc++\n\t\ts.Ident.StoreID = storeIDAlloc\n\t\tstores = append(stores, s)\n\t}\n\n\treturn manualClock, stores, ls, stopper\n}", "title": "" }, { "docid": "9fd7ec010cb66be79a3d86adeba61d1f", "score": "0.54054546", "text": "func NewStore() *DataStore {\n\treturn &DataStore{\n\t\tSetLists: make(map[string]*SetList),\n\t\tSongs: make(map[string]*Song),\n\t\tDMXScenes: make(map[string]*DMXScene),\n\t\tDMXPresets: make(map[string]*DMXPreset),\n\t\tDMXAnimations: make(map[string]*DMXAnimation),\n\t\tDMXTransitions: make(map[string]*DMXTransition),\n\t\tDMXDevices: make(map[string]*DMXDevice),\n\t\tDMXDeviceTypes: make(map[string]*DMXDeviceType),\n\t\tDMXDeviceGroups: make(map[string]*DMXDeviceGroup),\n\t\tDMXColorVariables: make(map[string]*DMXColorVariable),\n\t}\n}", "title": "" }, { "docid": "a5f8439f42fabdf326af408116d2470b", "score": "0.5399572", "text": "func (s *Server) SetStore(db persistance.Client) {\n\ts.store = db\n\treturn\n}", "title": "" }, { "docid": "8823d77d592a629287c0feb01f22ee87", "score": "0.5399", "text": "func NewStore(client *clientv3.Client, name string) *Store {\n\tstore := &Store{\n\t\tclient: client,\n\t\tkeepalivesPath: path.Join(EtcdRoot, keepalivesPathPrefix, name),\n\t}\n\n\treturn store\n}", "title": "" }, { "docid": "1571a504356f200b906adc71376ed574", "score": "0.5396512", "text": "func NewStore() *Store {\n\treturn &Store{\n\t\tsessions: map[ident.SessionID]*Session{},\n\t}\n}", "title": "" }, { "docid": "63756489e19faddfc374bb6ee759f1ae", "score": "0.53874445", "text": "func newStore() *store {\n\treturn &store{make(map[string]metric)}\n}", "title": "" }, { "docid": "fbee9f57b8e9a7647b4bd315d5c1e540", "score": "0.5383721", "text": "func NewStore(ds repo.Datastore, cst state.IpldStore, stl state.TreeLoader, genesisCid cid.Cid) *Store {\n\treturn &Store{\n\t\tstateAndBlockSource: newSource(cst),\n\t\tstateTreeLoader: stl,\n\t\tds: ds,\n\t\theadEvents: pubsub.New(128),\n\t\ttipIndex: NewTipIndex(),\n\t\tgenesis: genesisCid,\n\t}\n}", "title": "" } ]
a2ab4dba35b7c1849fd6a3dd49a5d538
NewCreateOrderConflict creates a CreateOrderConflict with default headers values
[ { "docid": "0cd40ca614709264c35ca9b20d2ba225", "score": "0.65515476", "text": "func NewCreateOrderConflict() *CreateOrderConflict {\n\treturn &CreateOrderConflict{}\n}", "title": "" } ]
[ { "docid": "396fc318a5247a87454bf3011662559a", "score": "0.68423045", "text": "func NewCreateOrderConflict(body *CreateOrderConflictResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "6cb27591985aa82aae575b4c5d6d1d9f", "score": "0.6429113", "text": "func NewConflict(message string) Response {\n\treturn Response{Payload: ErrorPayload{Message: message}, StatusCode: http.StatusConflict}\n}", "title": "" }, { "docid": "4b23e85a3976a684708dc7765d3b2621", "score": "0.6029648", "text": "func NewConflict(name string, value string) *Error {\n\treturn &Error{\n\t\tTimestamp: time.Now(),\n\t\tStatusCode: http.StatusConflict,\n\t\tType: Conflict,\n\t\tMessage: fmt.Sprintf(\"resource: %v with value: %v already exists\", name, value),\n\t}\n}", "title": "" }, { "docid": "10864d8581f9de542495090e43f71bf5", "score": "0.5808249", "text": "func Conflict(format string, args ...interface{}) error {\n\treturn NewError(http.StatusConflict, \"\", format, args...)\n}", "title": "" }, { "docid": "4b1a3b109c0d597bb2ae0cc6f6fd4fb3", "score": "0.58056027", "text": "func (w *processPaymentResponseWriter) Conflict(err error) {\n\truntime.WriteError(w, 409, err)\n}", "title": "" }, { "docid": "02f9cdd62876cc73d4fa7be986dd4031", "score": "0.5802803", "text": "func TestNewConflict(t *testing.T) {\n\n\texpectedMessage := \"A message\"\n\tresponse := NewConflict(expectedMessage)\n\tassertErrorResponse(t, response, http.StatusConflict, expectedMessage)\n\n}", "title": "" }, { "docid": "962950cd47926b795ca2943b4ae96d28", "score": "0.57854307", "text": "func NewListOrdersConflict(body *ListOrdersConflictResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "3ff9237f2cbfe6d70f8222c92f137524", "score": "0.57021534", "text": "func NewConflict(parameters ...wparams.ParamStorer) Error {\n\treturn NewError(DefaultConflict, parameters...)\n}", "title": "" }, { "docid": "8c7d7fd8c473c9d423581f8035ef8047", "score": "0.5669986", "text": "func NewAdminCreateUserOrderConflict() *AdminCreateUserOrderConflict {\n\treturn &AdminCreateUserOrderConflict{}\n}", "title": "" }, { "docid": "de420a5a1decb9deccb936f7b9121054", "score": "0.5556468", "text": "func NewCheckOrderFulfillabilityConflict(body *CheckOrderFulfillabilityConflictResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "af5cdd06d0877321b6940c00370d9653", "score": "0.54544765", "text": "func NewConflict(conflictID utxo.OutputID, conflictIDs []utxo.TransactionID) *Conflict {\n\treturn &Conflict{\n\t\tOutputID: NewOutputID(conflictID),\n\t\tConflictIDs: func() (mappedConflictIDs []string) {\n\t\t\tmappedConflictIDs = make([]string, 0)\n\t\t\tfor _, conflictID := range conflictIDs {\n\t\t\t\tmappedConflictIDs = append(mappedConflictIDs, conflictID.Base58())\n\t\t\t}\n\n\t\t\treturn\n\t\t}(),\n\t}\n}", "title": "" }, { "docid": "b6ba6af371091cb94a6b25069d57ad6f", "score": "0.5419702", "text": "func Conflict(w http.ResponseWriter, message string) {\n\tJSONResponse(w, http.StatusConflict, &ResponseError{\n\t\tCode: http.StatusConflict,\n\t\tMessage: message,\n\t})\n}", "title": "" }, { "docid": "ff9c9b9ce48a3ae27aaaf0b029527519", "score": "0.52969563", "text": "func NewCreateDefaultsSectionConflict() *CreateDefaultsSectionConflict {\n\n\treturn &CreateDefaultsSectionConflict{}\n}", "title": "" }, { "docid": "41e7ce9637778e7a56fb12a0c8ec9e81", "score": "0.52897424", "text": "func ValidateCreateOrderConflictResponseBody(body *CreateOrderConflictResponseBody) (err error) {\n\tif body.Name == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"name\", \"body\"))\n\t}\n\tif body.ID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"id\", \"body\"))\n\t}\n\tif body.Message == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"message\", \"body\"))\n\t}\n\tif body.Temporary == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"temporary\", \"body\"))\n\t}\n\tif body.Timeout == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"timeout\", \"body\"))\n\t}\n\tif body.Fault == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"fault\", \"body\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ef323fb3fce52556069b514b987fbb47", "score": "0.5268972", "text": "func NewCreateReasonConflict() *CreateReasonConflict {\n\treturn &CreateReasonConflict{}\n}", "title": "" }, { "docid": "f2937239c2ef926034e604b87e99f66f", "score": "0.51334155", "text": "func NewConflict(conflictID ledgerstate.ConflictID, branchIDs []ledgerstate.BranchID) *Conflict {\n\treturn &Conflict{\n\t\tOutputID: NewOutputID(conflictID.OutputID()),\n\t\tBranchIDs: func() (mappedBranchIDs []string) {\n\t\t\tmappedBranchIDs = make([]string, 0)\n\t\t\tfor _, branchID := range branchIDs {\n\t\t\t\tmappedBranchIDs = append(mappedBranchIDs, branchID.Base58())\n\t\t\t}\n\n\t\t\treturn\n\t\t}(),\n\t}\n}", "title": "" }, { "docid": "b027d8b0aafe5732f4299cdb7f9a510e", "score": "0.51148355", "text": "func NewCreateStatConflict() *CreateStatConflict {\n\treturn &CreateStatConflict{}\n}", "title": "" }, { "docid": "b6e5e378fff27963ff15760c5b79a0ba", "score": "0.50944155", "text": "func NewCreateKeyspaceConflict() *CreateKeyspaceConflict {\n\treturn &CreateKeyspaceConflict{}\n}", "title": "" }, { "docid": "36fa11ad48515da3ec0e6c8c5b707dd0", "score": "0.5074036", "text": "func CreateCreateDatabaseExportOrderResponse() (response *CreateDatabaseExportOrderResponse) {\n\tresponse = &CreateDatabaseExportOrderResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "dc5dccc176a3ab061bd5d090a1904db9", "score": "0.50697935", "text": "func NewCreateRequestsConflict() *CreateRequestsConflict {\n\treturn &CreateRequestsConflict{}\n}", "title": "" }, { "docid": "4091333277818a979e2c50212f32338a", "score": "0.50422454", "text": "func (c *creator) ensureConflict(insert *sql.InsertBuilder) {\n\tif opts := c.CreateSpec.OnConflict; len(opts) > 0 {\n\t\tinsert.OnConflict(opts...)\n\t\tc.ensureLastInsertID(insert)\n\t}\n}", "title": "" }, { "docid": "cb4d5ea83840f1705fb520ba2b8568dc", "score": "0.5037554", "text": "func (a AlwaysConflict) Conflict(_ internal.Message, __ []internal.Message) bool {\n\treturn true\n}", "title": "" }, { "docid": "7a1eff02a2dfcadbb8175d43323ecce0", "score": "0.5030579", "text": "func CreateOrder(w http.ResponseWriter, r *http.Request) {\n\tvar newOrder models.Order\n\t_ = json.NewDecoder(r.Body).Decode(&newOrder)\n\tnewOrder.OrderID = models.GetNewObjectId(\"order\")\n\tnewOrder.ID = newOrder.OrderID\n\tnewOrder.Items = []models.OrderItemMap{}\n\tmodels.OrderList = append(models.OrderList, newOrder)\n\tjson.NewEncoder(w).Encode(newOrder)\n}", "title": "" }, { "docid": "62ebc1658c782079d271d24b50f5e745", "score": "0.50225776", "text": "func (c *batchCreator) ensureConflict(insert *sql.InsertBuilder) {\n\tif opts := c.BatchCreateSpec.OnConflict; len(opts) > 0 {\n\t\tinsert.OnConflict(opts...)\n\t}\n}", "title": "" }, { "docid": "ad43ade7cdf2cc76ed8ea22ff2039815", "score": "0.50218093", "text": "func NewCreateOrderBadRequest(body *CreateOrderBadRequestResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "0356f7b3cd6b879e42d2ee08f130f922", "score": "0.5018209", "text": "func NewCreatePortTransactionConflict() *CreatePortTransactionConflict {\n\treturn &CreatePortTransactionConflict{}\n}", "title": "" }, { "docid": "bbe3e81299e5c45dadfb643b4e51e582", "score": "0.49801394", "text": "func NewCreateOrderBadRequest() *CreateOrderBadRequest {\n\treturn &CreateOrderBadRequest{}\n}", "title": "" }, { "docid": "06197df1225686d7e7e1b6eabd629ba2", "score": "0.49790987", "text": "func CreateOrder(w http.ResponseWriter, r *http.Request) {\n\n\t// get the bearer token\n\tbearerHeader := r.Header.Get(\"Authorization\")\n\n\t// validate token, it will return a User{UserID, Name}\n\t_, err := ValidateToken(bearerHeader)\n\n\tcheckErr(err)\n\n\t// get the db connection\n\tdb := getDBConn()\n\n\t// close db connection\n\tdefer db.Close()\n\n\tvar params order\n\n\t// decode the request parameters to order type\n\terr = json.NewDecoder(r.Body).Decode(&params)\n\n\tcheckErr(err)\n\n\tfmt.Println(params)\n\n\t// insert into the orders db\n\tstmt, err := db.Prepare(\"INSERT INTO orders SET orderID=?, merchantID=?, deliveryID=?, customerID=?, itemID=?, orderStatus=?\")\n\n\t// close the stmt request\n\tdefer stmt.Close()\n\n\tcheckErr(err)\n\n\t// execute the insert statement\n\tres, err := stmt.Exec(params.OrderID, params.MerchantID, params.DeliveryID, params.CustomerID, params.ItemID, params.OrderStatus)\n\n\tcheckErr(err)\n\n\tid, err := res.LastInsertId()\n\n\tcheckErr(err)\n\n\tfmt.Println(id)\n\n\t// return the order created msg in json format\n\tjson.NewEncoder(w).Encode(\"Order Created!\")\n}", "title": "" }, { "docid": "b88f027c1dc0ed52e087e0d880e24ff7", "score": "0.49784356", "text": "func NewCreateConnectionConflict() *CreateConnectionConflict {\n\treturn &CreateConnectionConflict{}\n}", "title": "" }, { "docid": "b88f027c1dc0ed52e087e0d880e24ff7", "score": "0.49784356", "text": "func NewCreateConnectionConflict() *CreateConnectionConflict {\n\treturn &CreateConnectionConflict{}\n}", "title": "" }, { "docid": "116d7cf7a695202e900c0834ef4f050f", "score": "0.4976732", "text": "func TestCommitConflictRepeat4A(t *testing.T) {\n\tbuilder := newBuilder(t)\n\tcmd := builder.commitRequest([]byte{3})\n\tbuilder.init([]kv{\n\t\t{cf: engine_util.CfDefault, key: []byte{3}, value: []byte{42}},\n\t\t{cf: engine_util.CfWrite, key: []byte{3}, ts: 110, value: []byte{1, 0, 0, 0, 0, 0, 0, 0, builder.ts()}},\n\t})\n\tresp := builder.runOneRequest(cmd).(*kvrpcpb.CommitResponse)\n\n\tassert.Nil(t, resp.Error)\n\tassert.Nil(t, resp.RegionError)\n\tbuilder.assertLens(1, 0, 1)\n\tbuilder.assert([]kv{\n\t\t{cf: engine_util.CfWrite, key: []byte{3}, ts: 110},\n\t\t{cf: engine_util.CfDefault, key: []byte{3}},\n\t})\n}", "title": "" }, { "docid": "0a5427cb2263197f7cf0d02bdab7e120", "score": "0.4925403", "text": "func NewPrepareConflict() *PrepareConflict {\n\treturn &PrepareConflict{}\n}", "title": "" }, { "docid": "2cd5ad7ae1cb5c86d693b2eead173897", "score": "0.4923587", "text": "func NewAddItemConflict() *AddItemConflict {\n\treturn &AddItemConflict{}\n}", "title": "" }, { "docid": "6133e626c9e212eb7fdee07f9c8c329b", "score": "0.4911654", "text": "func NewConflictErr(kind, name string, err error) error {\n\treturn &apiServerError{api.Status{\n\t\tStatus: api.StatusFailure,\n\t\tCode: http.StatusConflict,\n\t\tReason: api.StatusReasonConflict,\n\t\tDetails: &api.StatusDetails{\n\t\t\tKind: kind,\n\t\t\tID: name,\n\t\t},\n\t\tMessage: fmt.Sprintf(\"%s %q cannot be updated: %s\", kind, name, err),\n\t}}\n}", "title": "" }, { "docid": "443923390841162689cbc1b3ee998fdb", "score": "0.49046797", "text": "func NewCreateGroupConflict() *CreateGroupConflict {\n\treturn &CreateGroupConflict{}\n}", "title": "" }, { "docid": "9a803e24d5068f8676b4cb9f800d2137", "score": "0.49011752", "text": "func (c apiController) Conflict(v interface{}) {\n\tc.RootController.JSON(http.StatusConflict, v)\n}", "title": "" }, { "docid": "91d84681f871e7aa8feadb4a9056ac86", "score": "0.48826933", "text": "func (r *Reply) Conflict() *Reply {\n\treturn r.Status(http.StatusConflict)\n}", "title": "" }, { "docid": "de4e5f5a9c6ea92afbad3e57c2f55fb7", "score": "0.48777595", "text": "func NewOnConflictAction(raw string) (OnConflictAction, error) {\n\tswitch raw {\n\tcase onConflictNothingStr:\n\t\treturn OnConflictNothing, nil\n\tcase onConflictUpdateStr:\n\t\treturn OnConflictUpdate, nil\n\tdefault:\n\t\treturn OnConflictAction(Unknown), fmt.Errorf(global.ErrFmt, pkg.Name(), errors.Errorf(\"unknown type %q\", raw))\n\t}\n}", "title": "" }, { "docid": "fb442f0cb4d1ea0a42203204ba880362", "score": "0.48753598", "text": "func CreateHeader(ctx context.Context, req *http.Request) *http.Request {\n\tif ctx.Value(\"transactionid\") != nil {\n\t\ttransactionID := ctx.Value(\"transactionid\").(string)\n\t\tactionID := ctx.Value(\"actionid\").(string)\n\t\tactionName := ctx.Value(\"actionname\").(string)\n\t\tthreadID := ctx.Value(\"threadid\").(string)\n\t\tthreadName := ctx.Value(\"threadname\").(string)\n\t\tprocessName := ctx.Value(\"processname\").(string)\n\t\treq.Header.Set(common.TransactionID, transactionID)\n\t\treq.Header.Set(common.ActionID, actionID)\n\t\treq.Header.Set(common.ActionName, actionName)\n\t\treq.Header.Set(common.ThreadID, threadID)\n\t\treq.Header.Set(common.ThreadName, threadName)\n\t\treq.Header.Set(common.ProcessName, processName)\n\t}\n\treturn req\n}", "title": "" }, { "docid": "6b8ceb3c3631be089b78d2f0591b926d", "score": "0.48556077", "text": "func (o *Order) Create() (statusCode int, conektaError ConektaError, conektaResponse ConektaResponse) {\n\tstatusCode, response := request(\"POST\", \"/orders\", o)\n\tif statusCode != 200 {\n\t\terr := json.Unmarshal(response, &conektaError)\n\t\tcheckError(err)\n\t} else {\n\t\terr := json.Unmarshal(response, &conektaResponse)\n\t\tcheckError(err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f585b74044868a9c454cf30b795e71ec", "score": "0.48550886", "text": "func NewCreateOrderNotImplemented(body *CreateOrderNotImplementedResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "df04d94e4a7e2d94e213542447726571", "score": "0.48462042", "text": "func TestCommitConflictRollback4A(t *testing.T) {\n\tbuilder := newBuilder(t)\n\tcmd := builder.commitRequest([]byte{3})\n\tbuilder.init([]kv{\n\t\t{cf: engine_util.CfWrite, key: []byte{3}, ts: 110, value: []byte{3, 0, 0, 0, 0, 0, 0, 0, builder.ts()}},\n\t})\n\tresp := builder.runOneRequest(cmd).(*kvrpcpb.CommitResponse)\n\n\tassert.Nil(t, resp.Error)\n\tassert.Nil(t, resp.RegionError)\n\tbuilder.assertLens(0, 0, 1)\n\tbuilder.assert([]kv{\n\t\t{cf: engine_util.CfWrite, key: []byte{3}, ts: 110},\n\t})\n}", "title": "" }, { "docid": "d4265db70c5f701805eef6fa38a970bb", "score": "0.48348132", "text": "func NewCreateConfigConflict() *CreateConfigConflict {\n\treturn &CreateConfigConflict{}\n}", "title": "" }, { "docid": "b9321dd65726e309e2b62ea2f6eb0991", "score": "0.48196518", "text": "func CreateHeaders(transactionID string, originSystem string, bookmark string) map[string]string {\n\tconst dateFormat = \"2006-01-02T15:04:05.000Z0700\"\n\tmessageUUID := uuid.New()\n\treturn map[string]string{\n\t\t\"X-Request-Id\": transactionID,\n\t\t\"Message-Timestamp\": time.Now().Format(dateFormat),\n\t\t\"Message-Id\": messageUUID.String(),\n\t\t\"Message-Type\": \"concept-annotation\",\n\t\t\"Content-Type\": \"application/json\",\n\t\t\"Origin-System-Id\": originSystem,\n\t\t\"Neo4j-Bookmark\": bookmark,\n\t}\n}", "title": "" }, { "docid": "8e57b148d0d5ce788877feb38eaf44be", "score": "0.4776018", "text": "func TestConflict(t *testing.T) {\n\trr := httptest.NewRecorder()\n\n\tstatusCode := 409\n\terrorType := \"Conflict\"\n\tmessage := \"This is a custom messsage\"\n\n\tvar boomResponse Err\n\n\tRenderConflict(rr, message)\n\n\tif err := json.Unmarshal(rr.Body.Bytes(), &boomResponse); err != nil {\n\t\tt.Errorf(\"response body was not valid JSON: %v\", err)\n\t}\n\n\tif boomResponse.ErrorType != errorType || boomResponse.Message != message || boomResponse.StatusCode != statusCode {\n\t\tt.Fail()\n\t}\n\n\tif rr.Code != statusCode {\n\t\tt.Errorf(\"handler returned wrong status code: got %v want %v\", rr.Code, statusCode)\n\t}\n}", "title": "" }, { "docid": "3419ef44b1d7e6b98daacd34301cbb82", "score": "0.47647953", "text": "func CreateNewOrderInDB(notifyData *NotifyResponse) (int, data.Order, bool) {\n\n\toid := notifyData.OrderID\n\tID := oid\n\t//val := &bytes.Buffer{}\n\t//states, err := data.GetLog(ID)\n\t//logger.Info(states) // remove 2020/11/05\n\tbuff, _ := json.Marshal(notifyData)\n\torder := data.Order{\n\n\t\tStatus: data.OrderPaid,\n\t\t//OrderRequest: record.Request,\n\t\t//OrderDetail: record.Result,\n\t\tOrderID: oid,\n\t\tPaymentVendor: \"payssion\",\n\t\tPaymentMethod: notifyData.PMID,\n\t\tPaymentNote: notifyData.AppName,\n\t\tNotifyInfo: string(buff[:]),\n\t\tDescription: notifyData.Description,\n\t\t//Comments: notifyData.Description,\n\t\tCurrency: notifyData.Currency,\n\t\tTotal: notifyData.Amount,\n\t\tPaid: notifyData.Paid,\n\t\tNet: notifyData.Net,\n\t\tAdminNote: oid,\n\t\tUpdateTime: fmt.Sprint(time.Now().Format(time.RFC1123)),\n\t\tPaytime: fmt.Sprint(time.Now().Format(time.RFC1123)),\n\t\tIsRefund: false,\n\t\tIsChargeBack: false,\n\t}\n\t// now to get some data from payment request\n\n\trequest, err := data.GetRequestByID(ID)\n\t/* \toriginReq, err := data.GetRequestByState(ID, PayssionPending)\n\n\t \tif err == nil {\n\t \t\tdatabuff, _ := json.Marshal(originReq.ReturnData)\n\t \t\torder.OrderDetail = string(databuff[:])\n\t \t\torder.Payer = originReq.BuyerEmail\n\t \t\torder.PayerIP = originReq.IP\n\t \t\torder.RequestTime = fmt.Sprint(time.Unix(originReq.RequestTime, 0).Format(time.RFC1123))\n\t \t} */\n\tif err == nil {\n\t\tdatabuff, _ := json.MarshalIndent(request.ItemList, \"\", \" \")\n\t\torder.OrderDetail = string(databuff[:])\n\t\torder.User = request.Email\n\t\torder.PayerLink = request.ContactInfo\n\t\torder.PayerIP = request.IPAddr\n\t\torder.Payer = \"\"\n\t\torder.Comments = request.RequestInfo\n\t\torder.RequestTime = fmt.Sprint(time.Unix(request.OrderDate, 0).Format(time.RFC1123))\n\t} else {\n\t\tlogger.Errorf(\"The request is not found, This is wired!,ID is %f\", ID)\n\t}\n\torder.Status = data.OrderPaid // create a order start from order paid\n\tmm, _ := json.Marshal(order)\n\n\tretCode, ok := admin.CreateContent(\"Order\", mm)\n\n\t//admin.UpdateContent(\"Order\", fmt.Sprintf(\"%d\", retCode), \"status\", []byte(data.OrderInValidate))\n\t//to update the order status\n\tif ok {\n\t\treturn retCode, order, true\n\t} else {\n\t\tlogger.Error(\"error in creat order with code :\", retCode)\n\t\treturn 0, order, false\n\t}\n\n}", "title": "" }, { "docid": "567aa3f428322f6836a9da33d190bab6", "score": "0.47639298", "text": "func NewCreateDashboardConflict() *CreateDashboardConflict {\n\treturn &CreateDashboardConflict{}\n}", "title": "" }, { "docid": "78d126ee7f58c21e773b124b496a252f", "score": "0.4761335", "text": "func CreatePendingOrder(ctx context.Context, order Order) (Order, error) {\n\tdbconn := db.GetConnection()\n\tconst q = \"INSERT INTO checkout_order (order_id, status) VALUES ($1, $2) RETURNING id, created_at, updated_at\"\n\ttx, err := dbconn.Begin()\n\tif err != nil {\n\t\treturn order, err\n\t}\n\tdefer tx.Rollback()\n\tif err := dbconn.QueryRowContext(ctx, q, order.OrderID, StatusPending).Scan(&order.ID, &order.CreatedAt, &order.UpdatedAt); err != nil {\n\t\treturn order, err\n\t}\n\n\tfor _, item := range order.Items {\n\t\tconst q = \"INSERT INTO checkout_order_item (order_id, name, description, amount) VALUES ($1, $2, $3, $4) RETURNING id, created_at, updated_at\"\n\t\tif err := dbconn.QueryRowContext(ctx, q, order.ID, item.Name, item.Description, item.Amount).Scan(&item.ID, &item.CreatedAt, &item.UpdatedAt); err != nil {\n\t\t\treturn order, err\n\t\t}\n\t}\n\treturn order, tx.Commit()\n}", "title": "" }, { "docid": "c5e01e1a033eda6df3dd45c25ffd74e0", "score": "0.474449", "text": "func Conflict(w http.ResponseWriter, response interface{}) {\n\tRespond(w, http.StatusConflict, response)\n}", "title": "" }, { "docid": "1be3cf4c3868ae1ede736407135fda53", "score": "0.47429746", "text": "func NewCreateHPCResourceConflict() *CreateHPCResourceConflict {\n\treturn &CreateHPCResourceConflict{}\n}", "title": "" }, { "docid": "2117c60435e2e240f8a6caf2774848fd", "score": "0.47422707", "text": "func CreateConflictingSTHPOM(obj1 *CTObject, obj2 *CTObject) (*CTObject, error) {\n\tif !(obj1.TypeID == \"STH\" || obj1.TypeID == \"STH_POC\") || !(obj2.TypeID == \"STH\" || obj2.TypeID == \"STH_POC\"){\n\t\treturn nil, fmt.Errorf(\"Not valid STH or STH_POC CTObjects\")\n\t}\n\n\tif bytes.Equal(obj1.Digest, obj2.Digest){\n\t\treturn nil, fmt.Errorf(\"STHs are not conflicting. Error creating PoM\")\n\t}\n\n\tvar signer string\n\tversion := VersionData{1,0,0} // TODO replace this with a better way to get currentVersion\n\tsth1, err := obj1.DeconstructSTH()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating ConflictingSTHPOM: %w\", err)\n\t}\n\n\tsth2, err := obj2.DeconstructSTH()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating ConflictingSTHPOM: %w\", err)\n\t}\n\n\t// Create fields of the PoM CTObject\n\ttypeID := ConflictingSTHPOMTypeID\n\ttimestamp := sth1.TreeHeadData.Timestamp\n\tsubject := sth1.LogID\n\tproof := ConflictingSTHPOM{*sth1, *sth2}\n\tblob, err := signature.SerializeData(proof)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error constructing ConflictingSTHPOM serializing data: %w\", err)\n\t}\n\tdigest, _, err := signature.GenerateHash(sth1.Signature.Algorithm.Hash, blob)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error constructing ConflictingSTHPOM generating hash: %w\", err)\n\t}\n\t\n\t// Create the POM CTObject\n\tctObject := &CTObject{typeID, version, timestamp, signer, subject, digest, blob}\n\treturn ctObject, nil\n}", "title": "" }, { "docid": "6a42214c71ec65f3a3de0df19d7f992a", "score": "0.47370762", "text": "func (c *Client) CreateNormalOrder(req interface{}) error {\n\teReq := req.(*model.ExchangeReq)\n\tvar orderReq model.OrderReq\n\t_ = jsoniter.UnmarshalFromString(eReq.TradeReq.Value, &orderReq)\n\tif orderReq.OrderQty <= float64(0) {\n\t\tlogger.Errorf(\"提交订单数量不能为0\")\n\t\treturn nil\n\t}\n\t// 缓存订单id绑定用户id\n\tcache_service.CacheOrderIDBindUser(orderReq.OrderID, eReq.UserID, eReq.StrategyID)\n\tcheckError := c.ProcessCreateOrder(orderReq, 1)\n\tif checkError != nil {\n\t\tlogger.Errorf(\"提交订单错误: %s\", checkError.Msg)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d01bd8c96c1296bc2f330d4e9c68774c", "score": "0.47312477", "text": "func (o *CreateNonSITAddressUpdateRequestConflict) Code() int {\n\treturn 409\n}", "title": "" }, { "docid": "111fc6819c4fe9a3f7e40ce1424c1f79", "score": "0.47169274", "text": "func (o *CreateDefaultsSectionConflict) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\t// response header Configuration-Version\n\n\tconfigurationVersion := o.ConfigurationVersion\n\tif configurationVersion != \"\" {\n\t\trw.Header().Set(\"Configuration-Version\", configurationVersion)\n\t}\n\n\trw.WriteHeader(409)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3b726aacbc0283a68472994b72ce58ae", "score": "0.47103053", "text": "func NewCreateBackendSwitchingRuleConflict() *CreateBackendSwitchingRuleConflict {\n\treturn &CreateBackendSwitchingRuleConflict{\n\t\tConfigurationVersion: 0,\n\t}\n}", "title": "" }, { "docid": "a4dbafef94abc944a0f3915c014fc931", "score": "0.4708435", "text": "func TestCommitConflictRace4A(t *testing.T) {\n\tbuilder := newBuilder(t)\n\tcmd := builder.commitRequest([]byte{3})\n\tbuilder.init([]kv{\n\t\t{cf: engine_util.CfDefault, key: []byte{3}, ts: 90, value: []byte{110}},\n\t\t{cf: engine_util.CfLock, key: []byte{3}, value: []byte{1, 3, 0, 0, 0, 0, 0, 0, 0, 90, 0, 0, 0, 0, 0, 0, 0, 0}},\n\t})\n\tresp := builder.runOneRequest(cmd).(*kvrpcpb.CommitResponse)\n\n\tassert.NotNil(t, resp.Error.Retryable)\n\tassert.Nil(t, resp.RegionError)\n\tbuilder.assertLens(1, 1, 0)\n\tbuilder.assert([]kv{\n\t\t{cf: engine_util.CfLock, key: []byte{3}},\n\t\t{cf: engine_util.CfDefault, key: []byte{3}, ts: 90},\n\t})\n}", "title": "" }, { "docid": "5165e79c68da2a0eecc590ac2d9d4b81", "score": "0.47040653", "text": "func NewCreateOrderNotFound(body *CreateOrderNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "1ad2c56df3b5239ef0fa97fc7f11b7f7", "score": "0.4699242", "text": "func ConflictMessage(messageId uint16) *Message {\n\treturn NewMessage(TYPE_NONCONFIRMABLE, COAPCODE_409_CONFLICT, messageId)\n}", "title": "" }, { "docid": "c4a36bbaad0672921260878cee6f074f", "score": "0.4685143", "text": "func (s *service) Create(ctx context.Context, order ordersvc.Order) (string, error) {\n\tlogger := log.With(s.logger, \"method\", \"Create\")\n\tuuid, _ := uuid.NewV4()\n\tid := uuid.String()\n\torder.ID = id\n\torder.Status = \"Pending\"\n\torder.CreatedOn = time.Now().Unix()\n\n\tif err := s.repository.CreateOrder(ctx, order); err != nil {\n\t\tlevel.Error(logger).Log(\"err\", err)\n\t\treturn \"\", ordersvc.ErrCmdRepository\n\t}\n\treturn id, nil\n}", "title": "" }, { "docid": "38b81c4e4e635599c6b9a051947f550a", "score": "0.46840662", "text": "func NewCreateDeploymentConflict() *CreateDeploymentConflict {\n\treturn &CreateDeploymentConflict{}\n}", "title": "" }, { "docid": "a5079da19922883885badfb3b22a0c97", "score": "0.468176", "text": "func NewCreateConsulConflict() *CreateConsulConflict {\n\n\treturn &CreateConsulConflict{}\n}", "title": "" }, { "docid": "5548e26b4e1a7e16828f69a185b21287", "score": "0.46784526", "text": "func (o *AddBlueprinterBlessingConflict) Code() int {\n\treturn 409\n}", "title": "" }, { "docid": "cd2520549777dbc9a1afe4b5a9146fb0", "score": "0.46699262", "text": "func NewCreateStat1Conflict() *CreateStat1Conflict {\n\treturn &CreateStat1Conflict{}\n}", "title": "" }, { "docid": "04a19d56cf6bac32447bc7108ec96e8e", "score": "0.46641472", "text": "func NewChildConflict(childConflict *conflictdag.Conflict[utxo.TransactionID, utxo.OutputID]) *ChildConflict {\n\treturn &ChildConflict{\n\t\tConflictID: childConflict.ID().Base58(),\n\t}\n}", "title": "" }, { "docid": "23db82543eaf0abde110f73eb7c05cbc", "score": "0.46571052", "text": "func ignoreConflict(err error) error {\n\tif e, ok := err.(*googleapi.Error); ok {\n\t\tif e.Code == http.StatusConflict {\n\t\t\treturn nil\n\t\t}\n\t\tpretty.Print(e)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2bb649830e549e87090f175302f862a9", "score": "0.46536738", "text": "func (p *Buffer) CreateHeader(messageID uint64, opcode byte, cachename string, previous bool) {\n\tp.EncodeRawBytes([]byte{RequestMagic})\n\tp.EncodeVarint(messageID)\n\tp.EncodeRawBytes([]byte{Protocol25})\n\tp.EncodeRawBytes([]byte{opcode})\n\tp.EncodeString(cachename)\n\tif previous {\n\t\tp.EncodeRawBytes([]byte{1}) //Force return value flags\n\t} else {\n\t\tp.EncodeRawBytes([]byte{0}) //Empty client flags\n\t}\n\tp.EncodeRawBytes([]byte{ClientIntelligenceBasic})\n\tp.EncodeRawBytes([]byte{0}) //Client Topology ID\n}", "title": "" }, { "docid": "288af957eb361ab05f48ff3afbfe4756", "score": "0.46491417", "text": "func (o Order) BeforeCreate(scope *gorm.Scope) error {\n\tscope.SetColumn(\"OrderID\", uuid.NewV4())\n\treturn nil\n}", "title": "" }, { "docid": "8beab4c3df456ade779f9c7d0f006aa2", "score": "0.46484628", "text": "func NewCreateInstanceObjectObjectNameDefinitionConflict() *CreateInstanceObjectObjectNameDefinitionConflict {\n\treturn &CreateInstanceObjectObjectNameDefinitionConflict{}\n}", "title": "" }, { "docid": "0f956d59c97680653f69e6660f2ead0d", "score": "0.4648144", "text": "func NewDefeatureItemConflict() *DefeatureItemConflict {\n\treturn &DefeatureItemConflict{}\n}", "title": "" }, { "docid": "4108cd2921ca693ec7045f468e68758c", "score": "0.46453834", "text": "func NewCreateCrossConnectGroupConflict() *CreateCrossConnectGroupConflict {\n\treturn &CreateCrossConnectGroupConflict{}\n}", "title": "" }, { "docid": "4c8803c6e0b681ea87192f3bad059232", "score": "0.46442744", "text": "func CreateConflictingSRDPOM(obj1 *CTObject, obj2 *CTObject) (*CTObject, error) {\n\tif obj1.TypeID != SRDWithRevDataTypeID || obj2.TypeID != SRDWithRevDataTypeID {\n\t\treturn nil, fmt.Errorf(\"Not valid SRDWithRevData CTObjects\")\n\t}\n\n\tif bytes.Equal(obj1.Digest, obj2.Digest){\n\t\treturn nil, fmt.Errorf(\"SRDs are not conflicting. Error creating PoM\")\n\t}\n\n\tvar signer string\n\tversion := VersionData{1,0,0} // TODO replace this with a better way to get currentVersion\n\tsrd1, err := obj1.DeconstructSRD()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating ConflictingSTHPOM: %w\", err)\n\t}\n\n\tsrd2, err := obj2.DeconstructSRD()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error creating ConflictingSTHPOM: %w\", err)\n\t}\n\n\t// Create fields of the PoM CTObject\n\ttypeID := ConflictingSRDPOMTypeID\n\ttimestamp := srd1.RevDigest.Timestamp\n\tsubject := srd1.EntityID\n\tproof := ConflictingSRDPOM{*srd1, *srd2}\n\tblob, err := signature.SerializeData(proof)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error constructing ConflictingSRDPOM serializing data: %w\", err)\n\t}\n\tdigest, _, err := signature.GenerateHash(srd1.Signature.Algorithm.Hash, blob)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"error constructing ConflictingSRDPOM generating hash: %w\", err)\n\t}\n\t\n\t// Create the POM CTObject\n\tctObject := &CTObject{typeID, version, timestamp, signer, subject, digest, blob}\n\treturn ctObject, nil\n}", "title": "" }, { "docid": "f5418b6a54e6af10f94166768c8e3c7e", "score": "0.46420765", "text": "func CreateCreateDataArchiveOrderResponse() (response *CreateDataArchiveOrderResponse) {\n\tresponse = &CreateDataArchiveOrderResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "ded8fdc5ca2915934b78795a6e25a0da", "score": "0.46346742", "text": "func NewCreateViewConflict() *CreateViewConflict {\n\treturn &CreateViewConflict{}\n}", "title": "" }, { "docid": "6de0c157642e9d4e2a2b9715539fa7ec", "score": "0.46294287", "text": "func NewCreateOrderTooManyRequests(body *CreateOrderTooManyRequestsResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "66797b8c2a17fcf32b8eb0c5812b19cb", "score": "0.4628501", "text": "func NewDownloadInfraEnvDiscoveryImageHeadersConflict() *DownloadInfraEnvDiscoveryImageHeadersConflict {\n\n\treturn &DownloadInfraEnvDiscoveryImageHeadersConflict{}\n}", "title": "" }, { "docid": "1b31e0172e1d6f59a6eb5ad1496c7a4c", "score": "0.46156126", "text": "func CreateCreateDatabaseExportOrderRequest() (request *CreateDatabaseExportOrderRequest) {\n\trequest = &CreateDatabaseExportOrderRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"dms-enterprise\", \"2018-11-01\", \"CreateDatabaseExportOrder\", \"dms-enterprise\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "b87d028eeedc8ebd9f2bf1ffe64f802e", "score": "0.4614941", "text": "func TestConflictManager(t *testing.T) {\n\tm := NewConflictManager()\n\tadj1 := map[v1.ResourceName]action.ActionResource{\n\t\tv1.ResourceCPU + \"_\" + v1.ResourceMemory: {\n\t\t\tName: v1.ResourceCPU,\n\t\t\tConflicting: false,\n\t\t\tConflictQuantity: map[action.ActionFormula]resource.Quantity{\n\t\t\t\taction.FormulaStep: resource.MustParse(\"1\"),\n\t\t\t},\n\t\t},\n\t}\n\tchanged, _ := m.UpdateConflictList(adj1)\n\tif changed {\n\t\tt.Errorf(\"expect conflict resource not changed because no conflict\")\n\t}\n\tadj1 = map[v1.ResourceName]action.ActionResource{\n\t\tv1.ResourceCPU + \"_\" + v1.ResourceMemory: {\n\t\t\tName: v1.ResourceCPU,\n\t\t\tConflicting: true,\n\t\t\tConflictQuantity: map[action.ActionFormula]resource.Quantity{\n\t\t\t\taction.FormulaStep: resource.MustParse(\"-1\"),\n\t\t\t},\n\t\t},\n\t}\n\tchanged, _ = m.UpdateConflictList(adj1)\n\tif !changed {\n\t\tt.Errorf(\"expect conflict resource change because of conflict\")\n\t}\n\tchanged, _ = m.UpdateConflictList(adj1)\n\tif !changed {\n\t\tt.Errorf(\"expect conflict resource change because of conflict\")\n\t}\n\tadj1 = map[v1.ResourceName]action.ActionResource{\n\t\tv1.ResourceCPU + \"_\" + v1.ResourceMemory: {\n\t\t\tName: v1.ResourceCPU,\n\t\t\tConflicting: true,\n\t\t\tConflictQuantity: map[action.ActionFormula]resource.Quantity{\n\t\t\t\taction.FormulaPercent: resource.MustParse(\"-0.1\"),\n\t\t\t},\n\t\t},\n\t}\n\tchanged, _ = m.UpdateConflictList(adj1)\n\tif !changed {\n\t\tt.Errorf(\"expect conflict resource change because of conflict\")\n\t}\n\tconstPredictRes := v1.ResourceList{\n\t\tv1.ResourceCPU: resource.MustParse(\"3\"),\n\t\tv1.ResourceMemory: resource.MustParse(\"5Gi\"),\n\t}\n\tpredictList := constPredictRes.DeepCopy()\n\tconfRes, _ := m.CheckAndSubConflictResource(predictList)\n\tassert.DeepEqual(t, confRes, map[v1.ResourceName]bool{v1.ResourceCPU: true})\n\tassert.DeepEqual(t, predictList[v1.ResourceCPU], resource.MustParse(\"1\"))\n\tadj1 = map[v1.ResourceName]action.ActionResource{\n\t\tv1.ResourceCPU + \"_\" + v1.ResourceMemory: {\n\t\t\tName: v1.ResourceCPU,\n\t\t\tConflicting: false,\n\t\t\tConflictQuantity: map[action.ActionFormula]resource.Quantity{\n\t\t\t\taction.FormulaStep: resource.MustParse(\"1\"),\n\t\t\t},\n\t\t},\n\t}\n\t_, _ = m.UpdateConflictList(adj1)\n\tpredictList = constPredictRes.DeepCopy()\n\tconfRes, _ = m.CheckAndSubConflictResource(predictList)\n\tassert.DeepEqual(t, confRes, map[v1.ResourceName]bool{v1.ResourceCPU: false})\n\tassert.DeepEqual(t, predictList[v1.ResourceCPU], resource.MustParse(\"2\"))\n\t_, _ = m.UpdateConflictList(adj1)\n\n\tpredictList = constPredictRes.DeepCopy()\n\t_, _ = m.CheckAndSubConflictResource(predictList)\n\tassert.DeepEqual(t, predictList[v1.ResourceCPU], resource.MustParse(\"2.7\"))\n}", "title": "" }, { "docid": "74991b4ba8e8f4937adf24f1f031ae5a", "score": "0.46113566", "text": "func (rs *RuleSet) AddConflict(A string, B string) {\n\trs.Conflicts = append(rs.Conflicts, [2]string{A, B})\n}", "title": "" }, { "docid": "516432d5197d0178287581c56bf2b4ef", "score": "0.4601503", "text": "func (o *CreateConsulConflict) WriteResponse(rw http.ResponseWriter, producer runtime.Producer) {\n\n\t// response header Configuration-Version\n\n\tconfigurationVersion := o.ConfigurationVersion\n\tif configurationVersion != \"\" {\n\t\trw.Header().Set(\"Configuration-Version\", configurationVersion)\n\t}\n\n\trw.WriteHeader(409)\n\tif o.Payload != nil {\n\t\tpayload := o.Payload\n\t\tif err := producer.Produce(rw, payload); err != nil {\n\t\t\tpanic(err) // let the recovery middleware deal with this\n\t\t}\n\t}\n}", "title": "" }, { "docid": "89724bc034f2b3bcc195ccc21caf7eb2", "score": "0.45997208", "text": "func OnConflictKeysReplace(keys []string) OnConflict {\n\treturn OnConflict{Keys: keys, Replace: true}\n}", "title": "" }, { "docid": "804cbff6eb00da7d970a77016cf86a7e", "score": "0.4593662", "text": "func CreatePHOrderAsset(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\tvar err error\n\tvar Avalbytes []byte\n\tvar keys []string\n\n\tif len(args) < 1 {\n\t\tlogger.Errorf(\"CreatePHOrderAsset : Incorrect number of arguments.\")\n\t\treturn shim.Error(\"CreatePHOrderAsset : Incorrect number of arguments.\")\n\t}\n\t// Convert the arg to a PHOrderAsset Object\n\tlogger.Infof(\"CreatePHOrderAsset: Arguments for ledgerapi %s : \", args[0])\n\tasset, err := JsontoPHOrderAsset([]byte(args[0]))\n\tlogger.Infof(\"CreatePHOrderAsset :OrderId ID is : %s \", asset.OrderID)\n\tasset.DocType = PHORDER_ASSET_RECORD_TYPE\n\ttimeinfo, err := stub.GetTxTimestamp()\n\tif err != nil {\n\t\tlogger.Errorf(\"CreateCcOrderAsset : Error getting timestamp %s\", err)\n\t\treturn shim.Error(fmt.Sprintf(\"CreateCSOrderAsset : PHOrderAsset object create failed due to timestamp read %s\", err))\n\t}\n\tlogger.Infof(\"CreatePHOrderAsset: Time stamp is %+v \", timeinfo)\n\tasset.OrderUnixTime = timeinfo.GetSeconds()\n\tkeys = append(keys, asset.OrderID)\n\tAvalbytes, _ = PHOrderAssettoJson(asset)\n\terr = CreateAsset(stub, PHORDER_ASSET_RECORD_TYPE, keys, Avalbytes)\n\tif err != nil {\n\t\tlogger.Errorf(\"CreatePHOrderAsset : Error inserting Object into LedgerState %s\", err)\n\t\treturn shim.Error(fmt.Sprintf(\"CreatePHOrderAsset : PHOrderAsset object create failed %s\", err))\n\t}\n\tlogger.Infof(\"CreatePHOrderAsset Asset : %s \", string(Avalbytes))\n\treturn shim.Success([]byte(Avalbytes))\n}", "title": "" }, { "docid": "0786d372fe7781c892a55759073ff19f", "score": "0.45905", "text": "func createOrder(c *gin.Context) {\n\tvar newCart Cart\n\n\t// Call BindJSON to bind the received JSON to newProduct.\n\tif err := c.BindJSON(&newCart); err != nil {\n\t\treturn\n\t}\n\n\t// Add the new album to the slice.\n\tCarts = append(Carts, newCart)\n\tc.IndentedJSON(http.StatusCreated, newCart)\n}", "title": "" }, { "docid": "6b4251d1c84eaffc4aac37695a3ec6c6", "score": "0.45893803", "text": "func recoverFromCreationConflictIfNeeded(client libdocker.Interface, createConfig dockertypes.ContainerCreateConfig, err error) (*dockertypes.ContainerCreateResponse, error) {\n\tmatches := conflictRE.FindStringSubmatch(err.Error())\n\tif len(matches) != 2 {\n\t\treturn nil, err\n\t}\n\n\tid := matches[1]\n\tglog.Warningf(\"Unable to create pod sandbox due to conflict. Attempting to remove sandbox %q\", id)\n\tif rmErr := client.RemoveContainer(id, dockertypes.ContainerRemoveOptions{RemoveVolumes: true}); rmErr == nil {\n\t\tglog.V(2).Infof(\"Successfully removed conflicting container %q\", id)\n\t\treturn nil, err\n\t} else {\n\t\tglog.Errorf(\"Failed to remove the conflicting container %q: %v\", id, rmErr)\n\t\t// Return if the error is not container not found error.\n\t\tif !libdocker.IsContainerNotFoundError(rmErr) {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\t// randomize the name to avoid conflict.\n\tcreateConfig.Name = randomizeName(createConfig.Name)\n\tglog.V(2).Infof(\"Create the container with randomized name %s\", createConfig.Name)\n\treturn client.CreateContainer(createConfig)\n}", "title": "" }, { "docid": "dced7f530fa5f6f5d859ab10dce68e94", "score": "0.4582411", "text": "func TypeNewOrder(msg *models.Message) error {\n\tmsg.Type = models.NewOrder\n\treturn nil\n}", "title": "" }, { "docid": "8d58591b3fb976aaf1269bbcc96cfce3", "score": "0.4580476", "text": "func (t *JiraIssue) DBCreateIgnoreDuplicate(ctx context.Context, db DB) (sql.Result, error) {\n\tq := \"INSERT INTO `jira_issue` (`jira_issue`.`id`,`jira_issue`.`checksum`,`jira_issue`.`issue_id`,`jira_issue`.`project_id`,`jira_issue`.`issue_type_id`,`jira_issue`.`user_id`,`jira_issue`.`assignee_id`,`jira_issue`.`priority_id`,`jira_issue`.`status_id`,`jira_issue`.`resolution_id`,`jira_issue`.`fix_version_ids`,`jira_issue`.`version_ids`,`jira_issue`.`environment`,`jira_issue`.`component_ids`,`jira_issue`.`label_ids`,`jira_issue`.`duedate_at`,`jira_issue`.`planned_start_at`,`jira_issue`.`planned_end_at`,`jira_issue`.`key`,`jira_issue`.`custom_field_ids`,`jira_issue`.`sprint_id`,`jira_issue`.`epic_id`,`jira_issue`.`parent_id`,`jira_issue`.`strategic_parent_id`,`jira_issue`.`in_progress_count`,`jira_issue`.`reopen_count`,`jira_issue`.`in_progress_duration`,`jira_issue`.`verification_duration`,`jira_issue`.`in_progress_start_at`,`jira_issue`.`customer_id`,`jira_issue`.`ref_id`,`jira_issue`.`user_ref_id`,`jira_issue`.`cost`) VALUES (?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?) ON DUPLICATE KEY UPDATE `id` = `id`\"\n\tchecksum := t.CalculateChecksum()\n\tif t.GetChecksum() == checksum {\n\t\treturn nil, nil\n\t}\n\tt.Checksum = &checksum\n\treturn db.ExecContext(ctx, q,\n\t\torm.ToSQLString(t.ID),\n\t\torm.ToSQLString(t.Checksum),\n\t\torm.ToSQLString(t.IssueID),\n\t\torm.ToSQLString(t.ProjectID),\n\t\torm.ToSQLString(t.IssueTypeID),\n\t\torm.ToSQLString(t.UserID),\n\t\torm.ToSQLString(t.AssigneeID),\n\t\torm.ToSQLString(t.PriorityID),\n\t\torm.ToSQLString(t.StatusID),\n\t\torm.ToSQLString(t.ResolutionID),\n\t\torm.ToSQLString(t.FixVersionIds),\n\t\torm.ToSQLString(t.VersionIds),\n\t\torm.ToSQLString(t.Environment),\n\t\torm.ToSQLString(t.ComponentIds),\n\t\torm.ToSQLString(t.LabelIds),\n\t\torm.ToSQLInt64(t.DuedateAt),\n\t\torm.ToSQLInt64(t.PlannedStartAt),\n\t\torm.ToSQLInt64(t.PlannedEndAt),\n\t\torm.ToSQLString(t.Key),\n\t\torm.ToSQLString(t.CustomFieldIds),\n\t\torm.ToSQLString(t.SprintID),\n\t\torm.ToSQLString(t.EpicID),\n\t\torm.ToSQLString(t.ParentID),\n\t\torm.ToSQLString(t.StrategicParentID),\n\t\torm.ToSQLInt64(t.InProgressCount),\n\t\torm.ToSQLInt64(t.ReopenCount),\n\t\torm.ToSQLInt64(t.InProgressDuration),\n\t\torm.ToSQLInt64(t.VerificationDuration),\n\t\torm.ToSQLInt64(t.InProgressStartAt),\n\t\torm.ToSQLString(t.CustomerID),\n\t\torm.ToSQLString(t.RefID),\n\t\torm.ToSQLString(t.UserRefID),\n\t\torm.ToSQLFloat64(t.Cost),\n\t)\n}", "title": "" }, { "docid": "da2df28132c916d5786de90f17219060", "score": "0.45782137", "text": "func NewImportConfigurationConflict() *ImportConfigurationConflict {\n\treturn &ImportConfigurationConflict{}\n}", "title": "" }, { "docid": "6e850fc34535582d3b895fbc0e499cf0", "score": "0.4577552", "text": "func (i *InsertBuilder) OnConflict(opts ...ConflictOption) *InsertBuilder {\n\tif i.conflict == nil {\n\t\ti.conflict = &conflict{}\n\t}\n\tfor _, opt := range opts {\n\t\topt(i.conflict)\n\t}\n\treturn i\n}", "title": "" }, { "docid": "d4eef30a999227e735264c4216f20cd3", "score": "0.4571815", "text": "func Conflict(err error) error {\n\tif err == nil || IsConflict(err) {\n\t\treturn err\n\t}\n\treturn errConflict{err}\n}", "title": "" }, { "docid": "17a33e2471056b457d560777f9c652ae", "score": "0.4571726", "text": "func CreateOrder(se Servicer) httprouter.Handle {\n\treturn func(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\t\trlt := &pp.EmptyRes{}\n\t\tfor {\n\t\t\treq, err := makeOrderReq(r)\n\t\t\tif err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\ta, err := account.GetActive()\n\t\t\tif err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrRes(err)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\treq.Pubkey = pp.PtrString(a.Pubkey)\n\t\t\tvar res pp.OrderRes\n\t\t\tif err := sknet.EncryGet(se.GetServAddr(), \"/create/order\", req, &res); err != nil {\n\t\t\t\tlogger.Error(err.Error())\n\t\t\t\trlt = pp.MakeErrResWithCode(pp.ErrCode_ServerError)\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tsendJSON(w, res)\n\t\t\treturn\n\t\t}\n\t\tsendJSON(w, rlt)\n\t}\n}", "title": "" }, { "docid": "3fafc577c117a03bdf6362110a37eb5f", "score": "0.45698044", "text": "func NewCreateUserAttributeConflict() *CreateUserAttributeConflict {\n\treturn &CreateUserAttributeConflict{}\n}", "title": "" }, { "docid": "f048c3cadd35ecf50dc800b9d76cfd8c", "score": "0.45663992", "text": "func OnConflictReplace() OnConflict {\n\treturn OnConflict{Replace: true}\n}", "title": "" }, { "docid": "170fcb6890b89ab1b632cb823ed43f34", "score": "0.45629227", "text": "func CreateOrder(productID, customerID, shipmentID string) (Order, Quote, Transaction, error) {\n\treturn Order{}, Quote{}, Transaction{}, nil\n}", "title": "" }, { "docid": "d169b471eb384026523376eb70c398c9", "score": "0.45604694", "text": "func NewPatchMTOShipmentStatusConflict() *PatchMTOShipmentStatusConflict {\n\n\treturn &PatchMTOShipmentStatusConflict{}\n}", "title": "" }, { "docid": "ecc8f4c6969a909c1f0725eb422d1682", "score": "0.45552912", "text": "func (s *DraftOrderServiceOp) CreateFulfillment(orderID int, fulfillment Fulfillment) (*Fulfillment, error) {\n\tfulfillmentService := &FulfillmentServiceOp{client: s.client, resource: draftOrdersResourceName, resourceID: orderID}\n\treturn fulfillmentService.Create(fulfillment)\n}", "title": "" }, { "docid": "7aeedc3c2a08cbc52d188829268300b3", "score": "0.45456544", "text": "func (c *Context) Conflict() *Context {\n\tc.status = http.StatusConflict\n\treturn c\n}", "title": "" }, { "docid": "06a2328a4c6147d16e34d1ff5ef7f587", "score": "0.45446137", "text": "func (h *OrderHandler) CreateOrder(w http.ResponseWriter, r *http.Request) {\n\n\tvar errorResponse models.ErrorResponse\n\tvar orderRequest models.CreateOrderRequest\n\terr := json.NewDecoder(r.Body).Decode(&orderRequest)\n\n\tif err != nil {\n\t\terrorResponse.Message = \"Invalid Request\"\n\t\th.log.WithError(err).Error(errorResponse.Message)\n\t\tutils.WritePretty(w, http.StatusBadRequest, &errorResponse)\n\t\treturn\n\t}\n\t// Get the user which wants to add the order\n\tuserID := r.Context().Value(models.ContextKey(\"user_id\"))\n\n\th.log.WithFields(logrus.Fields{\n\t\t\"user\": userID,\n\t}).Debug(\"Received Create Order request\")\n\n\t// cerate the order\n\torder := &models.Order{\n\t\tUserID: userID.(string),\n\t\tID: uuid.NewV4().String(),\n\t\tName: orderRequest.Name,\n\t}\n\n\terr = h.db.AddOrder(order)\n\tif err != nil {\n\t\terrorResponse.Message = \"Error in creating the order\"\n\t\th.log.WithError(err).Error(errorResponse.Message)\n\t\tutils.WritePretty(w, http.StatusInternalServerError, &errorResponse)\n\t\treturn\n\t}\n\n\torderMessage := &models.CreateOrderResponse{\n\t\tMessage: \"Order created succesfuly\",\n\t\tID: order.ID,\n\t}\n\tutils.WritePretty(w, http.StatusCreated, orderMessage)\n}", "title": "" }, { "docid": "c54ada01b55e5764f5beb1b03d0f9e14", "score": "0.45399278", "text": "func (client *JobExecutionsClient) createOrUpdateCreateRequest(ctx context.Context, resourceGroupName string, serverName string, jobAgentName string, jobName string, jobExecutionID string, options *JobExecutionsClientBeginCreateOrUpdateOptions) (*policy.Request, error) {\n\turlPath := \"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Sql/servers/{serverName}/jobAgents/{jobAgentName}/jobs/{jobName}/executions/{jobExecutionId}\"\n\tif resourceGroupName == \"\" {\n\t\treturn nil, errors.New(\"parameter resourceGroupName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{resourceGroupName}\", url.PathEscape(resourceGroupName))\n\tif serverName == \"\" {\n\t\treturn nil, errors.New(\"parameter serverName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{serverName}\", url.PathEscape(serverName))\n\tif jobAgentName == \"\" {\n\t\treturn nil, errors.New(\"parameter jobAgentName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{jobAgentName}\", url.PathEscape(jobAgentName))\n\tif jobName == \"\" {\n\t\treturn nil, errors.New(\"parameter jobName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{jobName}\", url.PathEscape(jobName))\n\turlPath = strings.ReplaceAll(urlPath, \"{jobExecutionId}\", url.PathEscape(jobExecutionID))\n\tif client.subscriptionID == \"\" {\n\t\treturn nil, errors.New(\"parameter client.subscriptionID cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{subscriptionId}\", url.PathEscape(client.subscriptionID))\n\treq, err := runtime.NewRequest(ctx, http.MethodPut, runtime.JoinPaths(client.host, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2020-11-01-preview\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header.Set(\"Accept\", \"application/json\")\n\treturn req, nil\n}", "title": "" }, { "docid": "84ea55cdd80b11cf331dea468f1b06ce", "score": "0.45392686", "text": "func (b Insert) OnConflict(args ...interface{}) Insert {\n\tif !b.insert.OnConflict.IsEmpty() {\n\t\tpanic(\"loukoum: insert builder has on conflict clause already defined\")\n\t}\n\n\tif len(args) == 0 {\n\t\tpanic(\"loukoum: on conflict clause requires arguments\")\n\t}\n\n\tfor i := range args {\n\t\tswitch value := args[i].(type) {\n\t\tcase string, stmt.Column:\n\t\t\tb.insert.OnConflict.Target.Columns = append(b.insert.OnConflict.Target.Columns, ToColumn(value))\n\t\tcase stmt.ConflictNoAction:\n\t\t\tb.insert.OnConflict.Action = value\n\t\t\treturn b\n\t\tcase stmt.ConflictUpdateAction:\n\t\t\tif b.insert.OnConflict.Target.IsEmpty() {\n\t\t\t\tpanic(\"loukoum: on conflict update clause requires at least one target\")\n\t\t\t}\n\t\t\tb.insert.OnConflict.Action = value\n\t\t\treturn b\n\t\tdefault:\n\t\t\tpanic(fmt.Sprintf(\"loukoum: cannot use %T as on conflict clause\", args[i]))\n\t\t}\n\t}\n\n\tpanic(\"loukoum: on conflict clause requires an action\")\n}", "title": "" }, { "docid": "7cd6bd001d4507a1ae6868e5adf16e29", "score": "0.4524275", "text": "func NewCreateOrganizationConflict() *CreateOrganizationConflict {\n\treturn &CreateOrganizationConflict{}\n}", "title": "" }, { "docid": "3b499443f7e19f357be7410d887757ef", "score": "0.45211416", "text": "func (s *LendingOrderService) HandleLendingOrdersCreateCancel(msg *rabbitmq.Message) error {\n\tswitch msg.Type {\n\tcase \"NEW_LENDING_ORDER\":\n\t\terr := s.handleNewLendingOrder(msg.Data)\n\t\tif err != nil {\n\t\t\tlogger.Error(err)\n\t\t\treturn err\n\t\t}\n\tcase \"CANCEL_LENDING_ORDER\":\n\t\terr := s.handleCancelLendingOrder(msg.Data)\n\t\tif err != nil {\n\t\t\tlogger.Error(err)\n\t\t\treturn err\n\t\t}\n\tdefault:\n\t\tlogger.Error(\"Unknown message\", msg)\n\t}\n\n\treturn nil\n}", "title": "" } ]
9faf4d75b8401c62230b7c23f580f62b
UnmarshalJSON handles deserialization of an Application. This custom unmarshaling is needed because the resulting property may be an id or the full struct if it was expanded.
[ { "docid": "b90cf65d3fb8739df231d306ccfa7bf8", "score": "0.79346335", "text": "func (a *Application) UnmarshalJSON(data []byte) error {\r\n\ttype application Application\r\n\tvar aa application\r\n\terr := json.Unmarshal(data, &aa)\r\n\tif err == nil {\r\n\t\t*a = Application(aa)\r\n\t} else {\r\n\t\t// the id is surrounded by \"\\\" characters, so strip them\r\n\t\ta.ID = string(data[1 : len(data)-1])\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" } ]
[ { "docid": "e88fc6b98d32fcdb525dddcc490920fd", "score": "0.7629259", "text": "func (a *Application) UnmarshalJSON(b []byte) error {\n\tmarshalLog.Debug(\"Application.UnmarshalJSON b:%s\\n\", string(b))\n\tvar err error\n\n\t// Normal array case\n\tvar aa applicationArray\n\tif err = json.Unmarshal(b, &aa); err == nil {\n\t\tmarshalLog.Debug(\"Application.UnmarshalJSON aa:%+v\\n\", aa)\n\t\t*a = Application(aa)\n\t\treturn nil\n\t}\n\n\t// Bogus non-wrapped case\n\tvar as applicationSingle\n\tif err = json.Unmarshal(b, &as); err == nil {\n\t\tmarshalLog.Debug(\"Application.UnmarshalJSON as:%+v\\n\", as)\n\t\ta.Name = as.Name\n\t\ta.Instances = make([]*Instance, 1, 1)\n\t\ta.Instances[0] = as.Instance\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2f8d8f71fd80320e379247e4b0c6c914", "score": "0.75241035", "text": "func (a *Application) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"properties\":\n\t\t\tif v != nil {\n\t\t\t\tvar applicationProperties ApplicationProperties\n\t\t\t\terr = json.Unmarshal(*v, &applicationProperties)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.ApplicationProperties = &applicationProperties\n\t\t\t}\n\t\tcase \"plan\":\n\t\t\tif v != nil {\n\t\t\t\tvar plan Plan\n\t\t\t\terr = json.Unmarshal(*v, &plan)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Plan = &plan\n\t\t\t}\n\t\tcase \"kind\":\n\t\t\tif v != nil {\n\t\t\t\tvar kind string\n\t\t\t\terr = json.Unmarshal(*v, &kind)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Kind = &kind\n\t\t\t}\n\t\tcase \"identity\":\n\t\t\tif v != nil {\n\t\t\t\tvar identity Identity\n\t\t\t\terr = json.Unmarshal(*v, &identity)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Identity = &identity\n\t\t\t}\n\t\tcase \"managedBy\":\n\t\t\tif v != nil {\n\t\t\t\tvar managedBy string\n\t\t\t\terr = json.Unmarshal(*v, &managedBy)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.ManagedBy = &managedBy\n\t\t\t}\n\t\tcase \"sku\":\n\t\t\tif v != nil {\n\t\t\t\tvar sku Sku\n\t\t\t\terr = json.Unmarshal(*v, &sku)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Sku = &sku\n\t\t\t}\n\t\tcase \"id\":\n\t\t\tif v != nil {\n\t\t\t\tvar ID string\n\t\t\t\terr = json.Unmarshal(*v, &ID)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.ID = &ID\n\t\t\t}\n\t\tcase \"name\":\n\t\t\tif v != nil {\n\t\t\t\tvar name string\n\t\t\t\terr = json.Unmarshal(*v, &name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Name = &name\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tif v != nil {\n\t\t\t\tvar typeVar string\n\t\t\t\terr = json.Unmarshal(*v, &typeVar)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Type = &typeVar\n\t\t\t}\n\t\tcase \"location\":\n\t\t\tif v != nil {\n\t\t\t\tvar location string\n\t\t\t\terr = json.Unmarshal(*v, &location)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Location = &location\n\t\t\t}\n\t\tcase \"tags\":\n\t\t\tif v != nil {\n\t\t\t\tvar tags map[string]*string\n\t\t\t\terr = json.Unmarshal(*v, &tags)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\ta.Tags = tags\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a861b5f89e71caf1f9e02ee3ed7afb23", "score": "0.740833", "text": "func (a *Application) UnmarshalJSON(data []byte) error {\n\tbv := &JSONApplication{}\n\tif err := ModuleCdc.UnmarshalJSON(data, bv); err != nil {\n\t\treturn err\n\t}\n\tconsPubKey, err := crypto.NewPublicKey(bv.PublicKey)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*a = Application{\n\t\tAddress: bv.Address,\n\t\tPublicKey: consPubKey,\n\t\tChains: bv.Chains,\n\t\tMaxRelays: bv.MaxRelays,\n\t\tJailed: bv.Jailed,\n\t\tStakedTokens: bv.StakedTokens,\n\t\tStatus: bv.Status,\n\t\tUnstakingCompletionTime: bv.UnstakingCompletionTime,\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4a51abbdbdf598f99a63bc69ac74ce7b", "score": "0.73900133", "text": "func (a *Applications) UnmarshalJSON(data []byte) (err error) {\n\treturn json.Unmarshal(data, &a.Applications)\n}", "title": "" }, { "docid": "b4b87fe9f619cbeca3005024d5683e60", "score": "0.73593867", "text": "func (app *App) UnmarshalJSON(data []byte) error {\n\tvar m map[string]interface{}\n\tif err := json.Unmarshal(data, &m); err != nil {\n\t\treturn err\n\t}\n\tvar err error\n\tif m[AttrApp_Ubo] != nil {\n\t\tjs, _ := json.Marshal(m[AttrApp_Ubo])\n\t\tif err := json.Unmarshal(js, &app.UniversalBo); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif m[AttrApp_PublicAttrs] != nil {\n\t\tjs, _ := json.Marshal(m[AttrApp_PublicAttrs])\n\t\tif err := json.Unmarshal(js, &app.attrsPublic); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif app.ownerId, err = reddo.ToString(m[FieldApp_OwnerId]); err != nil {\n\t\treturn err\n\t}\n\tapp.sync()\n\treturn nil\n}", "title": "" }, { "docid": "a1be4c4eef6026ad621ab06042cda5e2", "score": "0.6981609", "text": "func (x *ApplicationUp) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "ad7e9aa2f3500ee5c25dd04bf85ee559", "score": "0.69170016", "text": "func (a *AzureActiveDirectoryApp) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"appKey\":\n\t\t\terr = unpopulate(val, \"AppKey\", &a.AppKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"applicationId\":\n\t\t\terr = unpopulate(val, \"ApplicationID\", &a.ApplicationID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tenantId\":\n\t\t\terr = unpopulate(val, \"TenantID\", &a.TenantID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aafe3dac8d4c856160dbb1864345bcce", "score": "0.6915392", "text": "func (system *System) UnmarshalJSON(b []byte) error {\n\ttype systemAlias System\n\taux := &struct {\n\t\tApplication struct {\n\t\t\tID string `json:\"applicationID\"`\n\t\t} `json:\"application\"`\n\t\t*systemAlias\n\t}{\n\t\tsystemAlias: (*systemAlias)(system),\n\t}\n\tif err := json.Unmarshal(b, &aux); err != nil {\n\t\treturn err\n\t}\n\tsystem.ApplicationID = aux.Application.ID\n\treturn nil\n}", "title": "" }, { "docid": "81ad87222ff1eede9eb12069474a28a2", "score": "0.69133794", "text": "func (ap *ApplicationPatchable) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"properties\":\n\t\t\tif v != nil {\n\t\t\t\tvar applicationProperties ApplicationProperties\n\t\t\t\terr = json.Unmarshal(*v, &applicationProperties)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.ApplicationProperties = &applicationProperties\n\t\t\t}\n\t\tcase \"plan\":\n\t\t\tif v != nil {\n\t\t\t\tvar plan PlanPatchable\n\t\t\t\terr = json.Unmarshal(*v, &plan)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Plan = &plan\n\t\t\t}\n\t\tcase \"kind\":\n\t\t\tif v != nil {\n\t\t\t\tvar kind string\n\t\t\t\terr = json.Unmarshal(*v, &kind)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Kind = &kind\n\t\t\t}\n\t\tcase \"identity\":\n\t\t\tif v != nil {\n\t\t\t\tvar identity Identity\n\t\t\t\terr = json.Unmarshal(*v, &identity)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Identity = &identity\n\t\t\t}\n\t\tcase \"managedBy\":\n\t\t\tif v != nil {\n\t\t\t\tvar managedBy string\n\t\t\t\terr = json.Unmarshal(*v, &managedBy)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.ManagedBy = &managedBy\n\t\t\t}\n\t\tcase \"sku\":\n\t\t\tif v != nil {\n\t\t\t\tvar sku Sku\n\t\t\t\terr = json.Unmarshal(*v, &sku)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Sku = &sku\n\t\t\t}\n\t\tcase \"id\":\n\t\t\tif v != nil {\n\t\t\t\tvar ID string\n\t\t\t\terr = json.Unmarshal(*v, &ID)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.ID = &ID\n\t\t\t}\n\t\tcase \"name\":\n\t\t\tif v != nil {\n\t\t\t\tvar name string\n\t\t\t\terr = json.Unmarshal(*v, &name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Name = &name\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tif v != nil {\n\t\t\t\tvar typeVar string\n\t\t\t\terr = json.Unmarshal(*v, &typeVar)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Type = &typeVar\n\t\t\t}\n\t\tcase \"location\":\n\t\t\tif v != nil {\n\t\t\t\tvar location string\n\t\t\t\terr = json.Unmarshal(*v, &location)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Location = &location\n\t\t\t}\n\t\tcase \"tags\":\n\t\t\tif v != nil {\n\t\t\t\tvar tags map[string]*string\n\t\t\t\terr = json.Unmarshal(*v, &tags)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tap.Tags = tags\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bfed90163b956be4c1cb685efa66ada8", "score": "0.67242676", "text": "func (v *VirtualApplication) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", v, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"physicalPath\":\n\t\t\terr = unpopulate(val, \"PhysicalPath\", &v.PhysicalPath)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preloadEnabled\":\n\t\t\terr = unpopulate(val, \"PreloadEnabled\", &v.PreloadEnabled)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"virtualDirectories\":\n\t\t\terr = unpopulate(val, \"VirtualDirectories\", &v.VirtualDirectories)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"virtualPath\":\n\t\t\terr = unpopulate(val, \"VirtualPath\", &v.VirtualPath)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", v, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b318b3ef0d638fd623750b24ba3fe05d", "score": "0.6642805", "text": "func (c *ContainerApp) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &c.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &c.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &c.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &c.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &c.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &c.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &c.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8589305ae4d13834103ed911cfab57f4", "score": "0.66022396", "text": "func (x *ApplicationUplink) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "6afdc8c3da9d6ba2e9cb7f404216079a", "score": "0.6538871", "text": "func (u *applicationConfigUnmarshaller) Unmarshal(data []byte) (interface{}, error) {\n\tvar rawMatchSpecification json.RawMessage\n\tvar rawTagFilterExpression json.RawMessage\n\ttemp := &ApplicationConfig{\n\t\tMatchSpecification: &rawMatchSpecification,\n\t\tTagFilterExpression: &rawTagFilterExpression,\n\t}\n\tif err := json.Unmarshal(data, &temp); err != nil {\n\t\treturn &ApplicationConfig{}, err\n\t}\n\tmatchSpecification, err := u.unmarshalMatchSpecification(rawMatchSpecification)\n\tif err != nil {\n\t\treturn &ApplicationConfig{}, err\n\t}\n\ttagFilter, err := u.unmarshalTagFilterExpressionElement(rawTagFilterExpression)\n\tif err != nil {\n\t\treturn &ApplicationConfig{}, err\n\t}\n\treturn &ApplicationConfig{\n\t\tID: temp.ID,\n\t\tLabel: temp.Label,\n\t\tMatchSpecification: matchSpecification,\n\t\tTagFilterExpression: tagFilter,\n\t\tScope: temp.Scope,\n\t\tBoundaryScope: temp.BoundaryScope,\n\t}, nil\n}", "title": "" }, { "docid": "aca559ae7c25c93172ad5ce9e7be9025", "score": "0.65330684", "text": "func (x *ApplicationLocation) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "59eb77311b667152949015fa5f0703b5", "score": "0.64480746", "text": "func (ad *ApplicationDefinition) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"properties\":\n\t\t\tif v != nil {\n\t\t\t\tvar applicationDefinitionProperties ApplicationDefinitionProperties\n\t\t\t\terr = json.Unmarshal(*v, &applicationDefinitionProperties)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.ApplicationDefinitionProperties = &applicationDefinitionProperties\n\t\t\t}\n\t\tcase \"managedBy\":\n\t\t\tif v != nil {\n\t\t\t\tvar managedBy string\n\t\t\t\terr = json.Unmarshal(*v, &managedBy)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.ManagedBy = &managedBy\n\t\t\t}\n\t\tcase \"sku\":\n\t\t\tif v != nil {\n\t\t\t\tvar sku Sku\n\t\t\t\terr = json.Unmarshal(*v, &sku)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.Sku = &sku\n\t\t\t}\n\t\tcase \"id\":\n\t\t\tif v != nil {\n\t\t\t\tvar ID string\n\t\t\t\terr = json.Unmarshal(*v, &ID)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.ID = &ID\n\t\t\t}\n\t\tcase \"name\":\n\t\t\tif v != nil {\n\t\t\t\tvar name string\n\t\t\t\terr = json.Unmarshal(*v, &name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.Name = &name\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tif v != nil {\n\t\t\t\tvar typeVar string\n\t\t\t\terr = json.Unmarshal(*v, &typeVar)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.Type = &typeVar\n\t\t\t}\n\t\tcase \"location\":\n\t\t\tif v != nil {\n\t\t\t\tvar location string\n\t\t\t\terr = json.Unmarshal(*v, &location)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.Location = &location\n\t\t\t}\n\t\tcase \"tags\":\n\t\t\tif v != nil {\n\t\t\t\tvar tags map[string]*string\n\t\t\t\terr = json.Unmarshal(*v, &tags)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tad.Tags = tags\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "66efea0c09ab89ee8b287c8a7c6cea64", "score": "0.638757", "text": "func (r *GetAppsResponse) UnmarshalJSON(b []byte) error {\n\tmarshalLog.Debug(\"GetAppsResponse.UnmarshalJSON b:%s\\n\", string(b))\n\tvar err error\n\n\t// Normal array case\n\tvar ra getAppsResponseArray\n\tif err = json.Unmarshal(b, &ra); err == nil {\n\t\tmarshalLog.Debug(\"GetAppsResponse.UnmarshalJSON ra:%+v\\n\", ra)\n\t\t*r = GetAppsResponse(ra)\n\t\treturn nil\n\t}\n\t// Bogus non-wrapped case\n\tvar rs getAppsResponseSingle\n\tif err = json.Unmarshal(b, &rs); err == nil {\n\t\tmarshalLog.Debug(\"GetAppsResponse.UnmarshalJSON rs:%+v\\n\", rs)\n\t\tr.Applications = make([]*Application, 1, 1)\n\t\tr.Applications[0] = rs.Application\n\t\tr.AppsHashcode = rs.AppsHashcode\n\t\tr.VersionsDelta = rs.VersionsDelta\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "2750a46f0d2e3b6f8b6f86bd2209ccda", "score": "0.6375518", "text": "func (x *ApplicationDownlink) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "37345a1c2d4ab5df6e2af409e9c658ef", "score": "0.6285798", "text": "func (c *CloudApplicationEntity) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &c.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &c.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &c.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &c.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &c.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &c.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "71b8fdb87f029fb1cf45dfc947845170", "score": "0.6283715", "text": "func (x *ApplicationUplinkNormalized) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "2aebdf6c4faa917b2b92105f95f757fb", "score": "0.6245425", "text": "func (m *NetflowApplication) UnmarshalJSON(raw []byte) error {\n\tvar data struct {\n\n\t\t// IP\n\t\t// Read Only: true\n\t\tIP string `json:\"IP,omitempty\"`\n\n\t\t// client count\n\t\t// Read Only: true\n\t\tClientCount int32 `json:\"clientCount,omitempty\"`\n\n\t\t// destination m bytes\n\t\t// Read Only: true\n\t\tDestinationMBytes float64 `json:\"destinationMBytes,omitempty\"`\n\n\t\t// dns\n\t\t// Read Only: true\n\t\tDNS string `json:\"dns,omitempty\"`\n\n\t\t// first epoch in sec\n\t\t// Read Only: true\n\t\tFirstEpochInSec int64 `json:\"firstEpochInSec,omitempty\"`\n\n\t\t// flow count\n\t\t// Read Only: true\n\t\tFlowCount int64 `json:\"flowCount,omitempty\"`\n\n\t\t// last epoch in sec\n\t\t// Read Only: true\n\t\tLastEpochInSec int64 `json:\"lastEpochInSec,omitempty\"`\n\n\t\t// percent usage\n\t\t// Read Only: true\n\t\tPercentUsage float64 `json:\"percentUsage,omitempty\"`\n\n\t\t// port\n\t\t// Read Only: true\n\t\tPort int32 `json:\"port,omitempty\"`\n\n\t\t// protocol\n\t\t// Read Only: true\n\t\tProtocol string `json:\"protocol,omitempty\"`\n\n\t\t// source m bytes\n\t\t// Read Only: true\n\t\tSourceMBytes float64 `json:\"sourceMBytes,omitempty\"`\n\n\t\t// usage\n\t\t// Read Only: true\n\t\tUsage float64 `json:\"usage,omitempty\"`\n\t}\n\tbuf := bytes.NewBuffer(raw)\n\tdec := json.NewDecoder(buf)\n\tdec.UseNumber()\n\n\tif err := dec.Decode(&data); err != nil {\n\t\treturn err\n\t}\n\n\tvar base struct {\n\t\t/* Just the base type fields. Used for unmashalling polymorphic types.*/\n\n\t\tDataType string `json:\"dataType,omitempty\"`\n\t}\n\tbuf = bytes.NewBuffer(raw)\n\tdec = json.NewDecoder(buf)\n\tdec.UseNumber()\n\n\tif err := dec.Decode(&base); err != nil {\n\t\treturn err\n\t}\n\n\tvar result NetflowApplication\n\n\tif base.DataType != result.DataType() {\n\t\t/* Not the type we're looking for. */\n\t\treturn errors.New(422, \"invalid dataType value: %q\", base.DataType)\n\t}\n\n\tresult.IP = data.IP\n\n\tresult.ClientCount = data.ClientCount\n\n\tresult.DestinationMBytes = data.DestinationMBytes\n\n\tresult.DNS = data.DNS\n\n\tresult.FirstEpochInSec = data.FirstEpochInSec\n\n\tresult.FlowCount = data.FlowCount\n\n\tresult.LastEpochInSec = data.LastEpochInSec\n\n\tresult.PercentUsage = data.PercentUsage\n\n\tresult.Port = data.Port\n\n\tresult.Protocol = data.Protocol\n\n\tresult.SourceMBytes = data.SourceMBytes\n\n\tresult.Usage = data.Usage\n\n\t*m = result\n\n\treturn nil\n}", "title": "" }, { "docid": "768c8aabd082329e72a40877c2a9ebbd", "score": "0.61557525", "text": "func (s *StaticSiteUserProvidedFunctionApp) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &s.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &s.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &s.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &s.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &s.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e77160ec8a1833745bc57bd78f41bda0", "score": "0.61236453", "text": "func (session *RequestSession) UnmarshalJSON(b []byte) error {\n\ttype sessionAlias RequestSession\n\taux := &struct {\n\t\tApplication struct {\n\t\t\tID string `json:\"applicationID\"`\n\t\t} `json:\"application\"`\n\t\t*sessionAlias\n\t}{\n\t\tsessionAlias: (*sessionAlias)(session),\n\t}\n\tif err := json.Unmarshal(b, &aux); err != nil {\n\t\treturn err\n\t}\n\tsession.ApplicationID = aux.Application.ID\n\treturn nil\n}", "title": "" }, { "docid": "5764c6692d1cf9412793e1e60dea0bd5", "score": "0.6114559", "text": "func (future *ApplicationsCreateOrUpdateFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "96b72946837ad40c935eeed729a001bc", "score": "0.6085619", "text": "func (wrap *ProgramWrapper) UnmarshalJSON(data []byte) error {\n\n\tprogType, err := getProgramType(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar rawJson json.RawMessage\n\tenv := programUnmarshal{\n\t\tProgram: &rawJson,\n\t}\n\tif err := json.Unmarshal(data, &env); err != nil {\n\t\treturn err\n\t}\n\t// logger.Infof(\"rawJson: %+v\\n\", string(rawJson)) // REMOVE\n\tprog, err := programs.NewProgram(progType)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := json.Unmarshal(rawJson, &prog); err != nil {\n\t\treturn err\n\t}\n\twrap.Program = prog\n\treturn nil\n}", "title": "" }, { "docid": "0deae27f08046e19b45a4695912d337a", "score": "0.60799426", "text": "func (v *RUMApplicationUpdateType) UnmarshalJSON(src []byte) error {\n\tvar value string\n\terr := json.Unmarshal(src, &value)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*v = RUMApplicationUpdateType(value)\n\treturn nil\n}", "title": "" }, { "docid": "2d277624e583ebe3143d66ef28bdfa54", "score": "0.6064893", "text": "func (a *AzureStaticWebApps) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"enabled\":\n\t\t\terr = unpopulate(val, \"Enabled\", &a.Enabled)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"registration\":\n\t\t\terr = unpopulate(val, \"Registration\", &a.Registration)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ab1d4b0a756b9b07b067298ff92cd804", "score": "0.6058721", "text": "func (c *ContainerAppCollection) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &c.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &c.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b3da0d147aaa40262caf0928f38b0b71", "score": "0.6040948", "text": "func (a *ApplicationStack) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"dependency\":\n\t\t\terr = unpopulate(val, \"Dependency\", &a.Dependency)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"display\":\n\t\t\terr = unpopulate(val, \"Display\", &a.Display)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"frameworks\":\n\t\t\terr = unpopulate(val, \"Frameworks\", &a.Frameworks)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isDeprecated\":\n\t\t\terr = unpopulate(val, \"IsDeprecated\", &a.IsDeprecated)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"majorVersions\":\n\t\t\terr = unpopulate(val, \"MajorVersions\", &a.MajorVersions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &a.Name)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1cb52cb4701b9e086375be517c39a1fd", "score": "0.59875834", "text": "func (a *AppRegistration) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"appId\":\n\t\t\terr = unpopulate(val, \"AppID\", &a.AppID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"appSecretSettingName\":\n\t\t\terr = unpopulate(val, \"AppSecretSettingName\", &a.AppSecretSettingName)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9056a624fa34e085e0466088a8e6b947", "score": "0.59863406", "text": "func (future *ApplicationsCreateOrUpdateByIDFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "5cb5f2179f6e9adf598c8d62b3e0706b", "score": "0.598232", "text": "func (l *EMRClusterApplicationList) UnmarshalJSON(buf []byte) error {\n\t// Cloudformation allows a single object when a list of objects is expected\n\titem := EMRClusterApplication{}\n\tif err := json.Unmarshal(buf, &item); err == nil {\n\t\t*l = EMRClusterApplicationList{item}\n\t\treturn nil\n\t}\n\tlist := []EMRClusterApplication{}\n\terr := json.Unmarshal(buf, &list)\n\tif err == nil {\n\t\t*l = EMRClusterApplicationList(list)\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "fe355d1c6ecd0181a8f4aeac871284a6", "score": "0.5978293", "text": "func (c *CloudApplicationEntityProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"additionalData\":\n\t\t\terr = unpopulate(val, \"AdditionalData\", &c.AdditionalData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"appId\":\n\t\t\terr = unpopulate(val, \"AppID\", &c.AppID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"appName\":\n\t\t\terr = unpopulate(val, \"AppName\", &c.AppName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"friendlyName\":\n\t\t\terr = unpopulate(val, \"FriendlyName\", &c.FriendlyName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"instanceName\":\n\t\t\terr = unpopulate(val, \"InstanceName\", &c.InstanceName)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d6cbc31d54a68bf667e6c9700f27b480", "score": "0.5923054", "text": "func (f *FunctionAppMinorVersion) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"displayText\":\n\t\t\terr = unpopulate(val, \"DisplayText\", &f.DisplayText)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"stackSettings\":\n\t\t\terr = unpopulate(val, \"StackSettings\", &f.StackSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &f.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "51eed7b8b976e5c4e89ebd9b79244981", "score": "0.59211385", "text": "func (x *ApplicationDownlinks) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "eb5efc454384fddfd215c4c0611633dd", "score": "0.5915541", "text": "func (a *Appliance) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &a.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identity\":\n\t\t\terr = unpopulate(val, \"Identity\", &a.Identity)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &a.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &a.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &a.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &a.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &a.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &a.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "44e982a018f56ee9ddadf444e8b1264a", "score": "0.5899286", "text": "func (a *Apple) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"enabled\":\n\t\t\terr = unpopulate(val, \"Enabled\", &a.Enabled)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"login\":\n\t\t\terr = unpopulate(val, \"Login\", &a.Login)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"registration\":\n\t\t\terr = unpopulate(val, \"Registration\", &a.Registration)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b38f457b78b6b41204fadc55fa708bf", "score": "0.58910996", "text": "func (c *ContainerAppProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"configuration\":\n\t\t\terr = unpopulate(val, \"Configuration\", &c.Configuration)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kubeEnvironmentId\":\n\t\t\terr = unpopulate(val, \"KubeEnvironmentID\", &c.KubeEnvironmentID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"latestRevisionFqdn\":\n\t\t\terr = unpopulate(val, \"LatestRevisionFqdn\", &c.LatestRevisionFqdn)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"latestRevisionName\":\n\t\t\terr = unpopulate(val, \"LatestRevisionName\", &c.LatestRevisionName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningState\":\n\t\t\terr = unpopulate(val, \"ProvisioningState\", &c.ProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"template\":\n\t\t\terr = unpopulate(val, \"Template\", &c.Template)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c22bafd65faefe46e6b7f570b557653a", "score": "0.58500224", "text": "func (f *FunctionAppMajorVersion) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"displayText\":\n\t\t\terr = unpopulate(val, \"DisplayText\", &f.DisplayText)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"minorVersions\":\n\t\t\terr = unpopulate(val, \"MinorVersions\", &f.MinorVersions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &f.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1d095e73ec63a782e1fda8c588a2dd85", "score": "0.58371073", "text": "func (f *FunctionAppRuntimes) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"linuxRuntimeSettings\":\n\t\t\terr = unpopulate(val, \"LinuxRuntimeSettings\", &f.LinuxRuntimeSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"windowsRuntimeSettings\":\n\t\t\terr = unpopulate(val, \"WindowsRuntimeSettings\", &f.WindowsRuntimeSettings)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5eb3061955e0ad983074242a84beeeef", "score": "0.58366877", "text": "func (x *ApplicationUp) UnmarshalProtoJSON(s *jsonplugin.UnmarshalState) {\n\tif s.ReadNil() {\n\t\treturn\n\t}\n\ts.ReadObject(func(key string) {\n\t\tswitch key {\n\t\tdefault:\n\t\t\ts.ReadAny() // ignore unknown field\n\t\tcase \"end_device_ids\", \"endDeviceIds\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.EndDeviceIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.EndDeviceIds = &EndDeviceIdentifiers{}\n\t\t\tx.EndDeviceIds.UnmarshalProtoJSON(s.WithField(\"end_device_ids\", true))\n\t\tcase \"correlation_ids\", \"correlationIds\":\n\t\t\ts.AddField(\"correlation_ids\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.CorrelationIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.CorrelationIds = s.ReadStringArray()\n\t\tcase \"received_at\", \"receivedAt\":\n\t\t\ts.AddField(\"received_at\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ReceivedAt = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalTimestamp(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ReceivedAt = v\n\t\tcase \"uplink_message\", \"uplinkMessage\":\n\t\t\tov := &ApplicationUp_UplinkMessage{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.UplinkMessage = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.UplinkMessage = &ApplicationUplink{}\n\t\t\tov.UplinkMessage.UnmarshalProtoJSON(s.WithField(\"uplink_message\", true))\n\t\tcase \"uplink_normalized\", \"uplinkNormalized\":\n\t\t\tov := &ApplicationUp_UplinkNormalized{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.UplinkNormalized = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.UplinkNormalized = &ApplicationUplinkNormalized{}\n\t\t\tov.UplinkNormalized.UnmarshalProtoJSON(s.WithField(\"uplink_normalized\", true))\n\t\tcase \"join_accept\", \"joinAccept\":\n\t\t\tov := &ApplicationUp_JoinAccept{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.JoinAccept = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.JoinAccept = &ApplicationJoinAccept{}\n\t\t\tov.JoinAccept.UnmarshalProtoJSON(s.WithField(\"join_accept\", true))\n\t\tcase \"downlink_ack\", \"downlinkAck\":\n\t\t\tov := &ApplicationUp_DownlinkAck{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkAck = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkAck = &ApplicationDownlink{}\n\t\t\tov.DownlinkAck.UnmarshalProtoJSON(s.WithField(\"downlink_ack\", true))\n\t\tcase \"downlink_nack\", \"downlinkNack\":\n\t\t\tov := &ApplicationUp_DownlinkNack{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkNack = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkNack = &ApplicationDownlink{}\n\t\t\tov.DownlinkNack.UnmarshalProtoJSON(s.WithField(\"downlink_nack\", true))\n\t\tcase \"downlink_sent\", \"downlinkSent\":\n\t\t\tov := &ApplicationUp_DownlinkSent{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkSent = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkSent = &ApplicationDownlink{}\n\t\t\tov.DownlinkSent.UnmarshalProtoJSON(s.WithField(\"downlink_sent\", true))\n\t\tcase \"downlink_failed\", \"downlinkFailed\":\n\t\t\tov := &ApplicationUp_DownlinkFailed{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkFailed = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkFailed = &ApplicationDownlinkFailed{}\n\t\t\tov.DownlinkFailed.UnmarshalProtoJSON(s.WithField(\"downlink_failed\", true))\n\t\tcase \"downlink_queued\", \"downlinkQueued\":\n\t\t\tov := &ApplicationUp_DownlinkQueued{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkQueued = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkQueued = &ApplicationDownlink{}\n\t\t\tov.DownlinkQueued.UnmarshalProtoJSON(s.WithField(\"downlink_queued\", true))\n\t\tcase \"downlink_queue_invalidated\", \"downlinkQueueInvalidated\":\n\t\t\tov := &ApplicationUp_DownlinkQueueInvalidated{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.DownlinkQueueInvalidated = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.DownlinkQueueInvalidated = &ApplicationInvalidatedDownlinks{}\n\t\t\tov.DownlinkQueueInvalidated.UnmarshalProtoJSON(s.WithField(\"downlink_queue_invalidated\", true))\n\t\tcase \"location_solved\", \"locationSolved\":\n\t\t\tov := &ApplicationUp_LocationSolved{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.LocationSolved = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tov.LocationSolved = &ApplicationLocation{}\n\t\t\tov.LocationSolved.UnmarshalProtoJSON(s.WithField(\"location_solved\", true))\n\t\tcase \"service_data\", \"serviceData\":\n\t\t\ts.AddField(\"service_data\")\n\t\t\tov := &ApplicationUp_ServiceData{}\n\t\t\tx.Up = ov\n\t\t\tif s.ReadNil() {\n\t\t\t\tov.ServiceData = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: ApplicationServiceData does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v ApplicationServiceData\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tov.ServiceData = &v\n\t\tcase \"simulated\":\n\t\t\ts.AddField(\"simulated\")\n\t\t\tx.Simulated = s.ReadBool()\n\t\t}\n\t})\n}", "title": "" }, { "docid": "d9aabec90eefbd92f32495892a2fd4d3", "score": "0.58334935", "text": "func (a *App) UnmarshalBinary(b []byte) error {\n\treturn json.Unmarshal(b, a)\n}", "title": "" }, { "docid": "3fee349e8aab120aaa8cb248a79d5017", "score": "0.58192194", "text": "func (e *Event) UnmarshalJSON(b []byte) error {\n\tes := eventScaffold{}\n\tif err := json.Unmarshal(b, &es); err != nil {\n\t\treturn err\n\t}\n\tctxt, err := json.Marshal(es.Context)\n\tif err != nil {\n\t\treturn err\n\t}\n\te.Application = es.Application\n\te.Type = es.Type\n\te.Message = es.Message\n\te.Context = ctxt\n\te.StackTrace = es.StackTrace\n\te.CreatedAt = time.Unix(es.CreatedAt, 0) // no nano sec at this time\n\treturn nil\n}", "title": "" }, { "docid": "a052550c35cf902ababf0f13f6376874", "score": "0.57162815", "text": "func (a *ApplicationStackResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &a.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &a.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &a.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &a.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &a.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0e21507bde6e6c93e6c324a654501009", "score": "0.57147974", "text": "func (s *StaticSiteUserProvidedFunctionAppARMResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &s.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &s.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &s.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &s.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &s.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "14a1d9a95119292dabee19073c66b95f", "score": "0.57131517", "text": "func (c *ContainerAppSecret) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &c.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &c.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f2c7b9c93ae4d564c7e3f177d3f1d498", "score": "0.5708062", "text": "func (f *FunctionAppStack) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &f.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &f.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &f.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &f.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &f.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &f.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cb54a8645223f383b11d9787df628578", "score": "0.56547743", "text": "func (a *App) UnMarshal(data []byte) error {\n\ta.lock.Lock()\n\tdefer a.lock.Unlock()\n\treturn a.unmarshalChannelBlocks(data)\n}", "title": "" }, { "docid": "8f4d0dde2ef0542192486399a5a36fef", "score": "0.5630087", "text": "func (w *WebAppMinorVersion) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"displayText\":\n\t\t\terr = unpopulate(val, \"DisplayText\", &w.DisplayText)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"stackSettings\":\n\t\t\terr = unpopulate(val, \"StackSettings\", &w.StackSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &w.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3fbcc8f79e36c4c3f2df468024ac4832", "score": "0.56244016", "text": "func (c *ContainerAppsConfiguration) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"appSubnetResourceId\":\n\t\t\terr = unpopulate(val, \"AppSubnetResourceID\", &c.AppSubnetResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"controlPlaneSubnetResourceId\":\n\t\t\terr = unpopulate(val, \"ControlPlaneSubnetResourceID\", &c.ControlPlaneSubnetResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"daprAIInstrumentationKey\":\n\t\t\terr = unpopulate(val, \"DaprAIInstrumentationKey\", &c.DaprAIInstrumentationKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dockerBridgeCidr\":\n\t\t\terr = unpopulate(val, \"DockerBridgeCidr\", &c.DockerBridgeCidr)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"platformReservedCidr\":\n\t\t\terr = unpopulate(val, \"PlatformReservedCidr\", &c.PlatformReservedCidr)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"platformReservedDnsIP\":\n\t\t\terr = unpopulate(val, \"PlatformReservedDNSIP\", &c.PlatformReservedDNSIP)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4ecde87e05e290bd83ea3a3c1064cb83", "score": "0.56067365", "text": "func (future *ApplicationsDeleteByIDFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "a4128521065ca9fb63dcc4d5fe5d7537", "score": "0.5603728", "text": "func (s *StaticSiteUserProvidedFunctionAppsCollection) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &s.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &s.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d1590e54b8106c976c9c1f9bb2b5dd4b", "score": "0.5603494", "text": "func Unmarshal(data []byte) (*Bundle, error) {\n\tb := &Bundle{}\n\treturn b, json.Unmarshal(data, b)\n}", "title": "" }, { "docid": "97382d7b6097684d2b5f2240853213ce", "score": "0.5602115", "text": "func (r *RequireMFAType) UnmarshalJSON(data []byte) error {\n\tvar val interface{}\n\terr := json.Unmarshal(data, &val)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\n\terr = r.decode(val)\n\treturn trace.Wrap(err)\n}", "title": "" }, { "docid": "0373729e435deb727b1833a9050d70cf", "score": "0.55999625", "text": "func (future *ApplicationsDeleteFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "d32de8070ccc982dab492207f70ce7ab", "score": "0.5586166", "text": "func NewApplicationConfigUnmarshaller() JSONUnmarshaller {\n\treturn &applicationConfigUnmarshaller{}\n}", "title": "" }, { "docid": "86f5264ab7e5e25983f4cc436e831181", "score": "0.55759335", "text": "func (jCaller *JSONCaller) Unmarshal(data []byte, v interface{}) error {\n\treturn json.Unmarshal(data, v)\n}", "title": "" }, { "docid": "e399a97a2812bafe4393b0798395c06a", "score": "0.5574267", "text": "func (s *StaticSiteUserProvidedFunctionAppProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"createdOn\":\n\t\t\terr = unpopulateTimeRFC3339(val, \"CreatedOn\", &s.CreatedOn)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"functionAppRegion\":\n\t\t\terr = unpopulate(val, \"FunctionAppRegion\", &s.FunctionAppRegion)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"functionAppResourceId\":\n\t\t\terr = unpopulate(val, \"FunctionAppResourceID\", &s.FunctionAppResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7c32424d185996ee4382709302a20871", "score": "0.55654585", "text": "func (x *ApplicationUplink) UnmarshalProtoJSON(s *jsonplugin.UnmarshalState) {\n\tif s.ReadNil() {\n\t\treturn\n\t}\n\ts.ReadObject(func(key string) {\n\t\tswitch key {\n\t\tdefault:\n\t\t\ts.ReadAny() // ignore unknown field\n\t\tcase \"session_key_id\", \"sessionKeyId\":\n\t\t\ts.AddField(\"session_key_id\")\n\t\t\tx.SessionKeyId = s.ReadBytes()\n\t\tcase \"f_port\", \"fPort\":\n\t\t\ts.AddField(\"f_port\")\n\t\t\tx.FPort = s.ReadUint32()\n\t\tcase \"f_cnt\", \"fCnt\":\n\t\t\ts.AddField(\"f_cnt\")\n\t\t\tx.FCnt = s.ReadUint32()\n\t\tcase \"frm_payload\", \"frmPayload\":\n\t\t\ts.AddField(\"frm_payload\")\n\t\t\tx.FrmPayload = s.ReadBytes()\n\t\tcase \"decoded_payload\", \"decodedPayload\":\n\t\t\ts.AddField(\"decoded_payload\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.DecodedPayload = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalStruct(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.DecodedPayload = v\n\t\tcase \"decoded_payload_warnings\", \"decodedPayloadWarnings\":\n\t\t\ts.AddField(\"decoded_payload_warnings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.DecodedPayloadWarnings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.DecodedPayloadWarnings = s.ReadStringArray()\n\t\tcase \"normalized_payload\", \"normalizedPayload\":\n\t\t\ts.AddField(\"normalized_payload\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NormalizedPayload = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\ts.ReadArray(func() {\n\t\t\t\tv := golang.UnmarshalStruct(s)\n\t\t\t\tif s.Err() != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tx.NormalizedPayload = append(x.NormalizedPayload, v)\n\t\t\t})\n\t\tcase \"normalized_payload_warnings\", \"normalizedPayloadWarnings\":\n\t\t\ts.AddField(\"normalized_payload_warnings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NormalizedPayloadWarnings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.NormalizedPayloadWarnings = s.ReadStringArray()\n\t\tcase \"rx_metadata\", \"rxMetadata\":\n\t\t\ts.AddField(\"rx_metadata\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.RxMetadata = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\ts.ReadArray(func() {\n\t\t\t\tif s.ReadNil() {\n\t\t\t\t\tx.RxMetadata = append(x.RxMetadata, nil)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tv := &RxMetadata{}\n\t\t\t\tv.UnmarshalProtoJSON(s.WithField(\"rx_metadata\", false))\n\t\t\t\tif s.Err() != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tx.RxMetadata = append(x.RxMetadata, v)\n\t\t\t})\n\t\tcase \"settings\":\n\t\t\ts.AddField(\"settings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Settings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: TxSettings does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v TxSettings\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tx.Settings = &v\n\t\tcase \"received_at\", \"receivedAt\":\n\t\t\ts.AddField(\"received_at\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ReceivedAt = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalTimestamp(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ReceivedAt = v\n\t\tcase \"app_s_key\", \"appSKey\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.AppSKey = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.AppSKey = &KeyEnvelope{}\n\t\t\tx.AppSKey.UnmarshalProtoJSON(s.WithField(\"app_s_key\", true))\n\t\tcase \"last_a_f_cnt_down\", \"lastAFCntDown\":\n\t\t\ts.AddField(\"last_a_f_cnt_down\")\n\t\t\tx.LastAFCntDown = s.ReadUint32()\n\t\tcase \"confirmed\":\n\t\t\ts.AddField(\"confirmed\")\n\t\t\tx.Confirmed = s.ReadBool()\n\t\tcase \"consumed_airtime\", \"consumedAirtime\":\n\t\t\ts.AddField(\"consumed_airtime\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ConsumedAirtime = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalDuration(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ConsumedAirtime = v\n\t\tcase \"locations\":\n\t\t\ts.AddField(\"locations\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Locations = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.Locations = make(map[string]*Location)\n\t\t\ts.ReadStringMap(func(key string) {\n\t\t\t\tvar v Location\n\t\t\t\tv.UnmarshalProtoJSON(s)\n\t\t\t\tx.Locations[key] = &v\n\t\t\t})\n\t\tcase \"version_ids\", \"versionIds\":\n\t\t\ts.AddField(\"version_ids\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.VersionIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: EndDeviceVersionIdentifiers does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v EndDeviceVersionIdentifiers\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tx.VersionIds = &v\n\t\tcase \"network_ids\", \"networkIds\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NetworkIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.NetworkIds = &NetworkIdentifiers{}\n\t\t\tx.NetworkIds.UnmarshalProtoJSON(s.WithField(\"network_ids\", true))\n\t\t}\n\t})\n}", "title": "" }, { "docid": "4e57967baa5fb495656d6c669303ae5a", "score": "0.5548837", "text": "func (w *WebAppMajorVersion) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"displayText\":\n\t\t\terr = unpopulate(val, \"DisplayText\", &w.DisplayText)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"minorVersions\":\n\t\t\terr = unpopulate(val, \"MinorVersions\", &w.MinorVersions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &w.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "71432e178457c80c1647139454782744", "score": "0.5532556", "text": "func (am AppMessage) UnmarshalPayload() (proto.Message, error) {\n\tvar message proto.Message\n\n\tswitch am.GetType() {\n\tcase AppMessage_TypeAcknowledge:\n\t\tmessage = &AppMessage_Acknowledge{}\n\tcase AppMessage_TypeUserMessage:\n\t\tmessage = &AppMessage_UserMessage{}\n\tcase AppMessage_TypeGroupInvitation:\n\t\tmessage = &AppMessage_GroupInvitation{}\n\tcase AppMessage_TypeSetGroupInfo:\n\t\tmessage = &AppMessage_SetGroupInfo{}\n\tcase AppMessage_TypeSetUserInfo:\n\t\tmessage = &AppMessage_SetUserInfo{}\n\tcase AppMessage_TypeAccountDirectoryServiceRegistered:\n\t\tmessage = &AppMessage_AccountDirectoryServiceRegistered{}\n\tcase AppMessage_TypeAccountDirectoryServiceUnregistered:\n\t\tmessage = &AppMessage_AccountDirectoryServiceUnregistered{}\n\tdefault:\n\t\treturn nil, errcode.TODO.Wrap(fmt.Errorf(\"unsupported AppMessage type: %q\", am.GetType()))\n\t}\n\n\treturn message, proto.Unmarshal(am.GetPayload(), message)\n}", "title": "" }, { "docid": "a445d154ed91dc75d632aa86e06b3e8b", "score": "0.5528071", "text": "func (a *ApplicationStackCollection) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &a.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &a.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "da23f5db64b5163b7d1e3c83fbe10f21", "score": "0.5517054", "text": "func (a *ApplianceListResult) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &a.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &a.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3c0949e5b17a1fd84dcb8c335644f2fd", "score": "0.54945636", "text": "func (f *FunctionAppStackCollection) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &f.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &f.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "945c8acfd4bfedc3f820aa57eec7545b", "score": "0.54940933", "text": "func (w *WebAppCollection) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"nextLink\":\n\t\t\terr = unpopulate(val, \"NextLink\", &w.NextLink)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &w.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fcc85d51b76df1783c217e5b95e2d11f", "score": "0.54735285", "text": "func (p *PatchableAppliance) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", p, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &p.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", p, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1fec1c1eadc3b7fdd958235cd5f900bb", "score": "0.5470119", "text": "func (v *Info) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjson5a72dc82DecodeGithubComZorinArsenijTechDbForumInternalAppDomainPost4(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "8fe46be4be31193af0b57ace7e89dba4", "score": "0.54632026", "text": "func (d *DeletedAppRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &d.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &d.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &d.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &d.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &d.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "babd416674ff98a815167161f4a63dcc", "score": "0.5462866", "text": "func (x *ApplicationUplinkNormalized) UnmarshalProtoJSON(s *jsonplugin.UnmarshalState) {\n\tif s.ReadNil() {\n\t\treturn\n\t}\n\ts.ReadObject(func(key string) {\n\t\tswitch key {\n\t\tdefault:\n\t\t\ts.ReadAny() // ignore unknown field\n\t\tcase \"session_key_id\", \"sessionKeyId\":\n\t\t\ts.AddField(\"session_key_id\")\n\t\t\tx.SessionKeyId = s.ReadBytes()\n\t\tcase \"f_port\", \"fPort\":\n\t\t\ts.AddField(\"f_port\")\n\t\t\tx.FPort = s.ReadUint32()\n\t\tcase \"f_cnt\", \"fCnt\":\n\t\t\ts.AddField(\"f_cnt\")\n\t\t\tx.FCnt = s.ReadUint32()\n\t\tcase \"frm_payload\", \"frmPayload\":\n\t\t\ts.AddField(\"frm_payload\")\n\t\t\tx.FrmPayload = s.ReadBytes()\n\t\tcase \"normalized_payload\", \"normalizedPayload\":\n\t\t\ts.AddField(\"normalized_payload\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NormalizedPayload = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalStruct(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.NormalizedPayload = v\n\t\tcase \"normalized_payload_warnings\", \"normalizedPayloadWarnings\":\n\t\t\ts.AddField(\"normalized_payload_warnings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NormalizedPayloadWarnings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.NormalizedPayloadWarnings = s.ReadStringArray()\n\t\tcase \"rx_metadata\", \"rxMetadata\":\n\t\t\ts.AddField(\"rx_metadata\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.RxMetadata = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\ts.ReadArray(func() {\n\t\t\t\tif s.ReadNil() {\n\t\t\t\t\tx.RxMetadata = append(x.RxMetadata, nil)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tv := &RxMetadata{}\n\t\t\t\tv.UnmarshalProtoJSON(s.WithField(\"rx_metadata\", false))\n\t\t\t\tif s.Err() != nil {\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tx.RxMetadata = append(x.RxMetadata, v)\n\t\t\t})\n\t\tcase \"settings\":\n\t\t\ts.AddField(\"settings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Settings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: TxSettings does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v TxSettings\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tx.Settings = &v\n\t\tcase \"received_at\", \"receivedAt\":\n\t\t\ts.AddField(\"received_at\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ReceivedAt = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalTimestamp(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ReceivedAt = v\n\t\tcase \"confirmed\":\n\t\t\ts.AddField(\"confirmed\")\n\t\t\tx.Confirmed = s.ReadBool()\n\t\tcase \"consumed_airtime\", \"consumedAirtime\":\n\t\t\ts.AddField(\"consumed_airtime\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ConsumedAirtime = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalDuration(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ConsumedAirtime = v\n\t\tcase \"locations\":\n\t\t\ts.AddField(\"locations\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Locations = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.Locations = make(map[string]*Location)\n\t\t\ts.ReadStringMap(func(key string) {\n\t\t\t\tvar v Location\n\t\t\t\tv.UnmarshalProtoJSON(s)\n\t\t\t\tx.Locations[key] = &v\n\t\t\t})\n\t\tcase \"version_ids\", \"versionIds\":\n\t\t\ts.AddField(\"version_ids\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.VersionIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: EndDeviceVersionIdentifiers does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v EndDeviceVersionIdentifiers\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tx.VersionIds = &v\n\t\tcase \"network_ids\", \"networkIds\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.NetworkIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.NetworkIds = &NetworkIdentifiers{}\n\t\t\tx.NetworkIds.UnmarshalProtoJSON(s.WithField(\"network_ids\", true))\n\t\t}\n\t})\n}", "title": "" }, { "docid": "105b16ac94ef3d32c666164458104527", "score": "0.54440486", "text": "func AsApplication(e ld.Entity) Application { return Application{AsObject(e)} }", "title": "" }, { "docid": "fe4a3b605beb200b2347279cf7187b0b", "score": "0.5441224", "text": "func (x *ApplicationJoinAccept) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "615a06ba3c45e055a6808abe1cde8e85", "score": "0.54337007", "text": "func (a Application) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"id\", a.ID)\n\tpopulate(objectMap, \"identity\", a.Identity)\n\tpopulate(objectMap, \"kind\", a.Kind)\n\tpopulate(objectMap, \"location\", a.Location)\n\tpopulate(objectMap, \"managedBy\", a.ManagedBy)\n\tpopulate(objectMap, \"name\", a.Name)\n\tpopulate(objectMap, \"plan\", a.Plan)\n\tpopulate(objectMap, \"properties\", a.Properties)\n\tpopulate(objectMap, \"sku\", a.SKU)\n\tpopulate(objectMap, \"tags\", a.Tags)\n\tpopulate(objectMap, \"type\", a.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "0cad845b0d28f45435636461437402ad", "score": "0.54178137", "text": "func (f *FunctionAppStackProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"displayText\":\n\t\t\terr = unpopulate(val, \"DisplayText\", &f.DisplayText)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"majorVersions\":\n\t\t\terr = unpopulate(val, \"MajorVersions\", &f.MajorVersions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"preferredOs\":\n\t\t\terr = unpopulate(val, \"PreferredOs\", &f.PreferredOs)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"value\":\n\t\t\terr = unpopulate(val, \"Value\", &f.Value)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ee022554128c6dd1072cdc89a75f504", "score": "0.5408879", "text": "func (n *NetAppVolume) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", n, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &n.ID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", n, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "03d76df7b5d818052053a715cb603fd2", "score": "0.5399628", "text": "func (j *NativeAdMarkupInner) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "d624182f42f6575827a37c88ca3455a8", "score": "0.537874", "text": "func (t *Items) UnmarshalJSON(b []byte) error {\n\tif b[0] == '[' {\n\t\treturn json.Unmarshal(b, &t.Types)\n\t}\n\terr := json.Unmarshal(b, &t.Type)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "085d08ad76a6311356b39f68d468a1c1", "score": "0.53749424", "text": "func (x *ApplicationLocation) UnmarshalProtoJSON(s *jsonplugin.UnmarshalState) {\n\tif s.ReadNil() {\n\t\treturn\n\t}\n\ts.ReadObject(func(key string) {\n\t\tswitch key {\n\t\tdefault:\n\t\t\ts.ReadAny() // ignore unknown field\n\t\tcase \"service\":\n\t\t\ts.AddField(\"service\")\n\t\t\tx.Service = s.ReadString()\n\t\tcase \"location\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Location = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.Location = &Location{}\n\t\t\tx.Location.UnmarshalProtoJSON(s.WithField(\"location\", true))\n\t\tcase \"attributes\":\n\t\t\ts.AddField(\"attributes\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.Attributes = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.Attributes = make(map[string]string)\n\t\t\ts.ReadStringMap(func(key string) {\n\t\t\t\tx.Attributes[key] = s.ReadString()\n\t\t\t})\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ba387f3928992e7bc82ffa1cc3df20b8", "score": "0.5371389", "text": "func (o *A_1) UnmarshalJSON(b []byte) error {\r\n\treturn o.DeserializeJSON(b)\r\n}", "title": "" }, { "docid": "5993cdcba709375d88ead10b73090ced", "score": "0.5370403", "text": "func (v *ArbLangInfo) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjson5edff16dDecodeGithubComEmpirefoxProtocGenDartExtPkgArb2(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "5ea21b465804df45a30ed2d005cda706", "score": "0.53510827", "text": "func (a *AppCertificate) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &a.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &a.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &a.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &a.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &a.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &a.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &a.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dc1daf2628142383cc31178465fe7be4", "score": "0.5341407", "text": "func (d *Dapr) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"appId\":\n\t\t\terr = unpopulate(val, \"AppID\", &d.AppID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"appPort\":\n\t\t\terr = unpopulate(val, \"AppPort\", &d.AppPort)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"components\":\n\t\t\terr = unpopulate(val, \"Components\", &d.Components)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"enabled\":\n\t\t\terr = unpopulate(val, \"Enabled\", &d.Enabled)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", d, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d0f00cd6922a04335918113f51923581", "score": "0.53403765", "text": "func (a Application) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"etag\", a.Etag)\n\tpopulate(objectMap, \"id\", a.ID)\n\tpopulate(objectMap, \"name\", a.Name)\n\tpopulate(objectMap, \"properties\", a.Properties)\n\tpopulate(objectMap, \"systemData\", a.SystemData)\n\tpopulate(objectMap, \"tags\", a.Tags)\n\tpopulate(objectMap, \"type\", a.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "aeeb5587521513d3c7b78b633d85325d", "score": "0.53387547", "text": "func (x *ApplicationDownlink) UnmarshalProtoJSON(s *jsonplugin.UnmarshalState) {\n\tif s.ReadNil() {\n\t\treturn\n\t}\n\ts.ReadObject(func(key string) {\n\t\tswitch key {\n\t\tdefault:\n\t\t\ts.ReadAny() // ignore unknown field\n\t\tcase \"session_key_id\", \"sessionKeyId\":\n\t\t\ts.AddField(\"session_key_id\")\n\t\t\tx.SessionKeyId = s.ReadBytes()\n\t\tcase \"f_port\", \"fPort\":\n\t\t\ts.AddField(\"f_port\")\n\t\t\tx.FPort = s.ReadUint32()\n\t\tcase \"f_cnt\", \"fCnt\":\n\t\t\ts.AddField(\"f_cnt\")\n\t\t\tx.FCnt = s.ReadUint32()\n\t\tcase \"frm_payload\", \"frmPayload\":\n\t\t\ts.AddField(\"frm_payload\")\n\t\t\tx.FrmPayload = s.ReadBytes()\n\t\tcase \"decoded_payload\", \"decodedPayload\":\n\t\t\ts.AddField(\"decoded_payload\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.DecodedPayload = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tv := golang.UnmarshalStruct(s)\n\t\t\tif s.Err() != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.DecodedPayload = v\n\t\tcase \"decoded_payload_warnings\", \"decodedPayloadWarnings\":\n\t\t\ts.AddField(\"decoded_payload_warnings\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.DecodedPayloadWarnings = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.DecodedPayloadWarnings = s.ReadStringArray()\n\t\tcase \"confirmed\":\n\t\t\ts.AddField(\"confirmed\")\n\t\t\tx.Confirmed = s.ReadBool()\n\t\tcase \"class_b_c\", \"classBC\":\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ClassBC = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.ClassBC = &ApplicationDownlink_ClassBC{}\n\t\t\tx.ClassBC.UnmarshalProtoJSON(s.WithField(\"class_b_c\", true))\n\t\tcase \"priority\":\n\t\t\ts.AddField(\"priority\")\n\t\t\tx.Priority.UnmarshalProtoJSON(s)\n\t\tcase \"correlation_ids\", \"correlationIds\":\n\t\t\ts.AddField(\"correlation_ids\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.CorrelationIds = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\tx.CorrelationIds = s.ReadStringArray()\n\t\tcase \"confirmed_retry\", \"confirmedRetry\":\n\t\t\ts.AddField(\"confirmed_retry\")\n\t\t\tif s.ReadNil() {\n\t\t\t\tx.ConfirmedRetry = nil\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// NOTE: ApplicationDownlink_ConfirmedRetry does not seem to implement UnmarshalProtoJSON.\n\t\t\tvar v ApplicationDownlink_ConfirmedRetry\n\t\t\tgolang.UnmarshalMessage(s, &v)\n\t\t\tx.ConfirmedRetry = &v\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ff378523738ac586c52393eb217675d0", "score": "0.532997", "text": "func MarshalApplicationObject(obj *ApplicationObject) *app.Application {\n\treturn &app.Application{\n\t\tID: obj.OID,\n\t\tType: obj.ObjType,\n\t\tNamespaceID: obj.NamespaceID,\n\t\tDeploymentName: obj.Deployment,\n\t\tServer: obj.Server,\n\t\tRegistry: obj.ChartRegistry,\n\t\tName: obj.ChartName,\n\t\tVersion: obj.ChartVersion,\n\t\tChannel: obj.Channel,\n\t\tUsername: obj.Username,\n\t\tConfig: obj.Config,\n\t\tJSONValues: obj.JSONValues,\n\t\tCreatedAt: obj.CreatedAt,\n\t\tUpdatedAt: obj.UpdatedAt,\n\t\tStatus: &struct {\n\t\t\tDeployedAt time.Time `form:\"deployed_at\" json:\"deployed_at\" xml:\"deployed_at\"`\n\t\t\tNotes *string `form:\"notes,omitempty\" json:\"notes,omitempty\" xml:\"notes,omitempty\"`\n\t\t\tState string `form:\"state\" json:\"state\" xml:\"state\"`\n\t\t}{\n\t\t\tobj.Status.DeployedAt,\n\t\t\tnil,\n\t\t\tobj.Status.State,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "eb3f2ea19c7d4acd091957ab2cac5955", "score": "0.53186303", "text": "func (future *ApplicationDefinitionsCreateOrUpdateByIDFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "7c96149fc645a7e404ec342662034e89", "score": "0.5305209", "text": "func (j *NativeAdMarkup) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "404fd08bd42e3f6f2c1465604e0ee6a3", "score": "0.53031385", "text": "func (u *alertingConfigurationUnmarshaller) Unmarshal(data []byte) (InstanaDataObject, error) {\n\tconfig := AlertingConfiguration{}\n\tif err := json.Unmarshal(data, &config); err != nil {\n\t\treturn config, fmt.Errorf(\"failed to parse json; %s\", err)\n\t}\n\treturn config, nil\n}", "title": "" }, { "docid": "28e9fdf32c737dcc6b463945550c2c43", "score": "0.52967376", "text": "func (w *WebAppStack) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &w.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"kind\":\n\t\t\terr = unpopulate(val, \"Kind\", &w.Kind)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &w.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &w.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &w.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &w.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c757e0f608b5d8a3917f7385ba4a4fd0", "score": "0.5290936", "text": "func (x *ApplicationInvalidatedDownlinks) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "ef782a5e31aec4d9f30bf76e8823d6af", "score": "0.52900904", "text": "func (j *Xref_Interpro) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "55d7d742a151e1773633a0e5b9d5b1d5", "score": "0.528887", "text": "func (am AppMessage) UnmarshalPayload() (proto.Message, error) {\n\tswitch am.Type {\n\tcase AppMessage_TypeAcknowledge:\n\t\tvar ret AppMessage_Acknowledge\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\tcase AppMessage_TypeUserMessage:\n\t\tvar ret AppMessage_UserMessage\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\tcase AppMessage_TypeUserReaction:\n\t\tvar ret AppMessage_UserReaction\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\tcase AppMessage_TypeGroupInvitation:\n\t\tvar ret AppMessage_GroupInvitation\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\tcase AppMessage_TypeSetGroupName:\n\t\tvar ret AppMessage_SetGroupName\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\tcase AppMessage_TypeSetUserName:\n\t\tvar ret AppMessage_SetUserName\n\t\terr := proto.Unmarshal(am.GetPayload(), &ret)\n\t\treturn &ret, err\n\t}\n\n\treturn nil, errcode.TODO.Wrap(fmt.Errorf(\"unsupported AppMessage type: %q\", am.Type))\n}", "title": "" }, { "docid": "662f78e9e96b61ed6fbbdc4101599f6f", "score": "0.52875155", "text": "func (x *ApplicationDownlinkFailed) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "9d83789d22a827b78dfac7aadc706a86", "score": "0.52766496", "text": "func (j *NativeData) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "8b882f7c906297273eb205fb3c6a4b07", "score": "0.5276074", "text": "func (w *WebAppRuntimes) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"linuxContainerSettings\":\n\t\t\terr = unpopulate(val, \"LinuxContainerSettings\", &w.LinuxContainerSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"linuxRuntimeSettings\":\n\t\t\terr = unpopulate(val, \"LinuxRuntimeSettings\", &w.LinuxRuntimeSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"windowsContainerSettings\":\n\t\t\terr = unpopulate(val, \"WindowsContainerSettings\", &w.WindowsContainerSettings)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"windowsRuntimeSettings\":\n\t\t\terr = unpopulate(val, \"WindowsRuntimeSettings\", &w.WindowsRuntimeSettings)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", w, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7413abb15dea49e83b670ffa708ebc11", "score": "0.527124", "text": "func (future *ApplicationDefinitionsCreateOrUpdateFuture) UnmarshalJSON(body []byte) error {\n\tvar azFuture azure.Future\n\tif err := json.Unmarshal(body, &azFuture); err != nil {\n\t\treturn err\n\t}\n\tfuture.FutureAPI = &azFuture\n\tfuture.Result = future.result\n\treturn nil\n}", "title": "" }, { "docid": "2135b5c68de12948c2aca7016ae677bf", "score": "0.5269437", "text": "func (a *AppleRegistration) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"clientId\":\n\t\t\terr = unpopulate(val, \"ClientID\", &a.ClientID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"clientSecretSettingName\":\n\t\t\terr = unpopulate(val, \"ClientSecretSettingName\", &a.ClientSecretSettingName)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f33aac180051a2ff475be31876cad4c6", "score": "0.52686876", "text": "func (j *typ) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "ddd35632bd78d2d98af9163cd3fa528a", "score": "0.525121", "text": "func (j *Event) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "410304994247438e6eb272fb2440a34c", "score": "0.52503824", "text": "func (v *Package) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjsonC1cedd36DecodeGithubComSmolaGocompat2(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "f0b2e76bacb4ece62dcef70285cefd74", "score": "0.524538", "text": "func (a *AzureStaticWebAppsRegistration) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"clientId\":\n\t\t\terr = unpopulate(val, \"ClientID\", &a.ClientID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b3d21c53a03c9d5316d8bce179ecb97", "score": "0.5239493", "text": "func Unmarshal(data []byte, value interface{}) error {\n\td := NewDecoder(bytes.NewBuffer(data))\n\td.Extend(&jsonExt)\n\treturn d.Decode(value)\n}", "title": "" } ]
b3e131af6605b54b099e965b7e2bd4fc
Methods for above error types ErrCommitNotFound ErrCommitNotFound indicates that a the requested commit was not found.
[ { "docid": "02a7e3403596bd06c9f3893040947793", "score": "0.8720921", "text": "func ErrCommitNotFound() error {\n\treturn cmn.ErrorWrap(errCommitNotFound{}, \"\")\n}", "title": "" } ]
[ { "docid": "138c5b2ed1193fc9a83f6828d71e1049", "score": "0.6731361", "text": "func NewErrCommitNotFound(repo string, commitID string) *ErrCommitNotFound {\n\treturn &ErrCommitNotFound{\n\t\terror: fmt.Errorf(\"commit %v not found in repo %v\", commitID, repo),\n\t}\n}", "title": "" }, { "docid": "bfa84200e37af9b39d31520168cb6fe7", "score": "0.61858815", "text": "func NewErrParentCommitNotFound(repo string, commitID string) *ErrParentCommitNotFound {\n\treturn &ErrParentCommitNotFound{\n\t\terror: fmt.Errorf(\"parent commit %v not found in repo %v\", commitID, repo),\n\t}\n}", "title": "" }, { "docid": "94b0a382aa2a81bc723df92ca157611f", "score": "0.6112781", "text": "func FindCommit(commits []*Commit, targetHash string) (int, *Commit) {\n\tif targetHash == \"\" {\n\t\treturn -1, nil\n\t}\n\tfor idx, commit := range commits {\n\t\tif commit.Hash == targetHash {\n\t\t\treturn idx, commit\n\t\t}\n\t}\n\treturn -1, nil\n}", "title": "" }, { "docid": "94b0a382aa2a81bc723df92ca157611f", "score": "0.6112781", "text": "func FindCommit(commits []*Commit, targetHash string) (int, *Commit) {\n\tif targetHash == \"\" {\n\t\treturn -1, nil\n\t}\n\tfor idx, commit := range commits {\n\t\tif commit.Hash == targetHash {\n\t\t\treturn idx, commit\n\t\t}\n\t}\n\treturn -1, nil\n}", "title": "" }, { "docid": "da9da0b8f9c7dafc3cc033cb9c31d3ae", "score": "0.6041921", "text": "func NewCommitInputPortTransactionNotFound() *CommitInputPortTransactionNotFound {\n\treturn &CommitInputPortTransactionNotFound{}\n}", "title": "" }, { "docid": "8beb683ac824c6fb6bd16d602daf5165", "score": "0.59722644", "text": "func (r *Repository) FindCommit(id string) *Commit {\n\t//TODO implement lockup without questioning all commits\n\tcommits := r.Commits\n\tif commit, ok := commits[id]; ok {\n\t\tlog.Printf(\"found commit with id %s\", id)\n\t\treturn commit\n\t} else {\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "cb768c8a43446a875d91248de5d5a6fd", "score": "0.58991283", "text": "func NewMergeCommitsNotFound() *MergeCommitsNotFound {\n\treturn &MergeCommitsNotFound{}\n}", "title": "" }, { "docid": "f88985c6f0d2ab5285e0f497cec285d5", "score": "0.5741295", "text": "func ErrNotFound(s string) error {\n\treturn errNotFound{\n\t\te: s,\n\t}\n}", "title": "" }, { "docid": "8f61948f0bd1a0246ea1e1d77bf38cf1", "score": "0.5635429", "text": "func (repos *Repository) LookupCommit(oid *Oid) (*Commit, error) {\n\t_, _, data, err := repos.getRawObject(oid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tci, err := parseCommitData(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tci.repository = repos\n\tci.Oid = oid\n\n\t_, _, data, err = repos.getRawObject(ci.treeId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttree, err := parseTreeData(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttree.Oid = ci.TreeId()\n\ttree.repository = repos\n\tci.Tree = tree\n\treturn ci, nil\n}", "title": "" }, { "docid": "5501042a69c6b53b9359604b3e5f7ce4", "score": "0.5569671", "text": "func ErrNotFound(ctx context.Context, err error) error {\n\tlog.FromContext(ctx).Error(\"not found\", log.Error(err))\n\treturn status.Error(codes.NotFound, err.Error())\n}", "title": "" }, { "docid": "800c3aa6022141bfd002943270208d58", "score": "0.55515385", "text": "func NewErrCommitExists(repo string, commitID string) *ErrCommitExists {\n\treturn &ErrCommitExists{\n\t\terror: fmt.Errorf(\"commit %v already exists in repo %v\", commitID, repo),\n\t}\n}", "title": "" }, { "docid": "f2b836629c8cae6f51eb87b80c72a6b2", "score": "0.55487657", "text": "func (o *PullrequestEndpoint) GetCommitOk() (*PullRequestCommit, bool) {\n\tif o == nil || o.Commit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Commit, true\n}", "title": "" }, { "docid": "ba678761091e1620c2a39392e295a357", "score": "0.5519278", "text": "func NewGetRevertCommitNotFound() *GetRevertCommitNotFound {\n\treturn &GetRevertCommitNotFound{}\n}", "title": "" }, { "docid": "a0dd239c381cb91c0ed524fc70cbe5e8", "score": "0.54713434", "text": "func commitIndex(cs []change.Commit, commitID string) int {\n\tfor i := range cs {\n\t\tif cs[i].SHA == commitID {\n\t\t\treturn i\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "3b21b2e0b38c7fcd10815a78e8a1e108", "score": "0.54705983", "text": "func NotFound(format string, a ...interface{}) error {\n\treturn errors.NotFound(\"error-not-found\", format, a...)\n}", "title": "" }, { "docid": "09fa037cc69ab134ed5b601b54c3df22", "score": "0.5443749", "text": "func ErrNotFound(ctx context.Context, message interface{}, keyvals ...interface{}) error {\n\tresponseData := goa.ContextResponse(ctx)\n\tif responseData == nil {\n\t\treturn errors.New(\"cannot extract responseData\")\n\t}\n\treturn responseData.Service.Send(ctx, 404, goa.ErrNotFound(message, keyvals...))\n}", "title": "" }, { "docid": "359699dd166ccf8c91f3e035e3a76c21", "score": "0.54032224", "text": "func (s *Server) GetCommit(_ context.Context, req *GetCommitRequest) (*GetCommitResponse, error) {\n\n\terr := s.validate.Struct(req)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"bad request: %w\", err)\n\t}\n\n\tcommit, err := s.index.Commit(req.Height)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not get commit: %w\", err)\n\t}\n\n\tres := GetCommitResponse{\n\t\tHeight: req.Height,\n\t\tCommit: commit[:],\n\t}\n\n\treturn &res, nil\n}", "title": "" }, { "docid": "cd671e7e5e3516d64b5aa20e03faf747", "score": "0.54012877", "text": "func (s *Server) GetCommit(_ context.Context, req *GetCommitRequest) (*GetCommitResponse, error) {\n\n\tcommit, err := s.index.Commit(req.Height)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not get commit: %w\", err)\n\t}\n\n\tres := GetCommitResponse{\n\t\tHeight: req.Height,\n\t\tCommit: commit[:],\n\t}\n\n\treturn &res, nil\n}", "title": "" }, { "docid": "11665edaad15f00f97ab0aed566fb64a", "score": "0.5376518", "text": "func getCommit(r vcs.Repository, id vcs.CommitID) (*vcs.Commit, error) {\n\tc, err := r.GetCommit(id)\n\tif err != nil {\n\t\treturn nil, err\n\t} else if c.Committer == nil {\n\t\treturn nil, fmt.Errorf(\"commit %q has no committer\", c.ID)\n\t}\n\treturn c, nil\n}", "title": "" }, { "docid": "25ed17d48c03ff97b4a3953ee9122df0", "score": "0.53513485", "text": "func NewChangeBalanceNotFound() *ChangeBalanceNotFound {\n\treturn &ChangeBalanceNotFound{}\n}", "title": "" }, { "docid": "6868f96fc7815b51d4d5388d1d856e6e", "score": "0.5340166", "text": "func NotFound(err error) error {\n\tif err == nil {\n\t\treturn nil\n\t}\n\treturn errorNotFound{err}\n}", "title": "" }, { "docid": "3355dda8e5b613593a4460463fa63ee2", "score": "0.533816", "text": "func (r *Repository) FindFileInCommit(fileId string, commitId string) *File {\n\tcommit := r.FindCommit(commitId)\n\tif commit != nil {\n\t\tif file, ok := commit.Files[fileId]; ok {\n\t\t\tlog.Printf(\"found file %s in commit %s\", file.Id, commitId)\n\t\t\treturn file\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dfd11dafa3664f558b5b65b8159480dc", "score": "0.53287995", "text": "func ErrPoolNotFound(name types.PoolName) sdk.Error {\n\treturn types.NewError(types.CodePoolNotFound, fmt.Sprintf(\"pool not found: %s\", name))\n}", "title": "" }, { "docid": "1d6850597efdfe3e2319c536d6b09439", "score": "0.5316748", "text": "func Commit(message string) error {\n\tcommand := fmt.Sprintf(gitCommitFormatString, message)\n\treturn Err(zsh.Status(command))\n}", "title": "" }, { "docid": "59f62465fbbef6080859397add79f1f5", "score": "0.53101605", "text": "func (ctx *UpdateMemosContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "5cad9809622a723048ed7d77c524c0a9", "score": "0.53001314", "text": "func ErrNotFound(id, topic string, serverTs, incomingReqTs time.Time) *ServerComMessage {\n\treturn &ServerComMessage{Ctrl: &MsgServerCtrl{\n\t\tId: id,\n\t\tCode: http.StatusNotFound, // 404\n\t\tText: \"not found\",\n\t\tTopic: topic,\n\t\tTimestamp: serverTs}, Id: id, Timestamp: incomingReqTs}\n}", "title": "" }, { "docid": "360a2bbf15d63dc6d1a32cbc80ef2402", "score": "0.52810806", "text": "func (c *GitHub) QueryCommit(ctx context.Context, in QueryCommitInput) (*QueryCommitOutput, error) {\n\tvar q struct {\n\t\tRepository struct {\n\t\t\tObject struct {\n\t\t\t\tCommit struct {\n\t\t\t\t\tChangedFiles int\n\t\t\t\t} `graphql:\"... on Commit\"`\n\t\t\t} `graphql:\"object(oid: $commitSHA)\"`\n\t\t} `graphql:\"repository(owner: $owner, name: $repo)\"`\n\t}\n\tv := map[string]interface{}{\n\t\t\"owner\": githubv4.String(in.Repository.Owner),\n\t\t\"repo\": githubv4.String(in.Repository.Name),\n\t\t\"commitSHA\": githubv4.GitObjectID(in.CommitSHA),\n\t}\n\tc.Logger.Debugf(\"Querying the commit with %+v\", v)\n\tif err := c.Client.Query(ctx, &q, v); err != nil {\n\t\treturn nil, fmt.Errorf(\"GitHub API error: %w\", err)\n\t}\n\tc.Logger.Debugf(\"Got the result: %+v\", q)\n\tout := QueryCommitOutput{\n\t\tChangedFiles: q.Repository.Object.Commit.ChangedFiles,\n\t}\n\tc.Logger.Debugf(\"Returning the commit: %+v\", out)\n\treturn &out, nil\n}", "title": "" }, { "docid": "1983e2c64a24c127f35f63de6b8dbc1f", "score": "0.5278178", "text": "func NotFound(id, format string, a ...interface{}) error {\r\n\treturn &Error{\r\n\t\tId: id,\r\n\t\tCode: 404,\r\n\t\tDetail: fmt.Sprintf(format, a...),\r\n\t\tStatus: http.StatusText(404),\r\n\t}\r\n}", "title": "" }, { "docid": "7b79b25ffaec7bd2ace2cd0f7ec1a164", "score": "0.52781296", "text": "func (t *DamlOnFabric) readCommit(stub shim.ChaincodeStubInterface, args []string, rawArgs [][]byte) pb.Response {\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(fmt.Sprintf(\"Expected 1 argument (Index), got %d\", len(args)))\n\t}\n\n\tvar i int\n\ti64, err := strconv.ParseInt(args[0], 10, 32)\n\ti = int(i64)\n\tif err != nil {\n\t\treturn shim.Error(fmt.Sprintf(\"Expected an integer for Index, got '%s'\", args[0]))\n\t}\n\n\t// get current commit entry\n\tvar commitLogIndex int\n\tcommitLogIndexBytes, err := stub.GetState(_commitLogIndex)\n\tif err != nil {\n\t\treturn shim.Error(fmt.Sprintf(\"Error reading Fabric state: %s\", err.Error()))\n\t}\n\n\tif commitLogIndexBytes != nil && len(commitLogIndexBytes) == 4 {\n\t\tcommitLogIndex = int(binary.LittleEndian.Uint32(commitLogIndexBytes))\n\t\tlogger.Infof(\"reading commitLogIndex as %d from %s\", commitLogIndex, _commitLogIndex)\n\t} else {\n\t\tlogger.Infof(\"failed reading commitLogIndex from %s\", _commitLogIndex)\n\t\treturn shim.Error(fmt.Sprintf(\"Commit log is not initialized yet, requested index %d\", i))\n\t}\n\n\tif i < 0 || i >= commitLogIndex {\n\t\treturn shim.Error(fmt.Sprintf(\"Expected Index to be between %d and %d, got %d\", 0, commitLogIndex-1, i))\n\t}\n\n\tcommitKey := fmt.Sprintf(\"%s%08x\", _prefixCommitLog, i)\n\n\tcommit, err := stub.GetState(commitKey)\n\tif err != nil {\n\t\treturn shim.Error(fmt.Sprintf(\"Error reading Fabric state: %s\", err.Error()))\n\t}\n\n\treturn shim.Success(commit)\n\n}", "title": "" }, { "docid": "930eba18c2a4afbc5509bd7814ad4cc6", "score": "0.5257917", "text": "func NotFound(format string, a ...interface{}) *Error {\n\treturn newError(ErrNotFound, format, a, nil)\n}", "title": "" }, { "docid": "74f101c1b314a260c2a686c455a56697", "score": "0.5257193", "text": "func GetCommit(w http.ResponseWriter, r *http.Request, params httprouter.Params, ctx context.Context) {\n\tcurrentRepo := getRepo(ctx)\n\tsha := params.ByName(\"sha\")\n\tcommit, err := currentRepo.GetCommit(sha)\n\tif err != nil {\n\t\tHandleError(w, err)\n\t\treturn\n\t}\n\n\tsendJSON(w, 200, commit)\n}", "title": "" }, { "docid": "5e0bc1ff78cfa2088a3c4b305a9da829", "score": "0.5220299", "text": "func ErrMethodNotFound() *Error {\n\treturn &Error{\n\t\tCode: ErrorCodeMethodNotFound,\n\t\tMessage: \"METHOD_NOT_FOUND\",\n\t}\n}", "title": "" }, { "docid": "6c9d0cd1ad55570e30e7d8751f9c50c6", "score": "0.5196997", "text": "func GitCommit(message string) (err error, hash string) {\n\targs := []string{\"commit\", \"--allow-empty\", \"-m\", message}\n\tcmdOutput, cmdErr = exec.Command(mainCmd, args...).Output()\n\n\tif cmdErr != nil {\n\t\treturn cmdErr, \"\"\n\t} else {\n\t\treturn parser.CommitHash(string(cmdOutput))\n\t}\n}", "title": "" }, { "docid": "a686c067de151b346a5dc90c69a9bbce", "score": "0.5193789", "text": "func (ctx *CreateMemosContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "3f2c32732eeabcd5b0a64af370512312", "score": "0.5187955", "text": "func ErrAccountInfoNotFound() sdk.Error {\n\treturn types.NewError(types.CodeAccountInfoNotFound, fmt.Sprintf(\"account info is not found\"))\n}", "title": "" }, { "docid": "56aa4a41f2efc647e95d63331b2afe5f", "score": "0.5177035", "text": "func NotFound(msg ...string) errors.Error {\n\treturn statusError{\n\t\tmessage: makeMessage(\"not found\", msg),\n\t\tstatus: http.StatusNotFound,\n\t}\n}", "title": "" }, { "docid": "f4215f714771a8db768ce376fa516afb", "score": "0.51656", "text": "func ErrAccountBankNotFound() sdk.Error {\n\treturn types.NewError(types.CodeAccountBankNotFound, fmt.Sprintf(\"account bank is not found\"))\n}", "title": "" }, { "docid": "fe92357de59caf2454e7919294cb26e1", "score": "0.5163191", "text": "func (o *ServiceResponse) GetDeployedCommitIdOk() (*string, bool) {\n\tif o == nil || o.DeployedCommitId == nil {\n\t\treturn nil, false\n\t}\n\treturn o.DeployedCommitId, true\n}", "title": "" }, { "docid": "b448428f62e4e76d612f57d911731cba", "score": "0.51565444", "text": "func ErrDatabaseNotFound(name string) error { return fmt.Errorf(\"database not found: %s\", name) }", "title": "" }, { "docid": "154f40140bddbadcbb5ece329ed94cea", "score": "0.5154568", "text": "func ErrAccountNotFound(username types.AccountKey) sdk.Error {\n\treturn types.NewError(types.CodeAccountNotFound, fmt.Sprintf(\"account %s not found\", username))\n}", "title": "" }, { "docid": "5cd482100d8ff8d406044812883ce32c", "score": "0.5146711", "text": "func ValidCommit(chainID string, commit *tmproto.Commit, valSet *tmproto.ValidatorSet) (err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\terr = sdkerrors.Wrapf(clienttypes.ErrInvalidMisbehaviour, \"invalid commit: %v\", r)\n\t\t}\n\t}()\n\n\ttmCommit, err := tmtypes.CommitFromProto(commit)\n\tif err != nil {\n\t\treturn sdkerrors.Wrap(err, \"commit is not tendermint commit type\")\n\t}\n\ttmValset, err := tmtypes.ValidatorSetFromProto(valSet)\n\tif err != nil {\n\t\treturn sdkerrors.Wrap(err, \"validator set is not tendermint validator set type\")\n\t}\n\n\t// Convert commits to vote-sets given the validator set so we can check if they both have 2/3 power\n\tvoteSet := tmtypes.CommitToVoteSet(chainID, tmCommit, tmValset)\n\n\tblockID, ok := voteSet.TwoThirdsMajority()\n\n\t// Check that ValidatorSet did indeed commit to blockID in Commit\n\tif !ok || !blockID.Equals(tmCommit.BlockID) {\n\t\treturn sdkerrors.Wrap(clienttypes.ErrInvalidMisbehaviour, \"validator set did not commit to header\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c33f45fac3445a15f3fa6b42c67ac472", "score": "0.51451546", "text": "func NewContainerChangesNotFound() *ContainerChangesNotFound {\n\treturn &ContainerChangesNotFound{}\n}", "title": "" }, { "docid": "f3169dc8add3fd6801036e17aec52db7", "score": "0.5133879", "text": "func (r repository) GetCommit(commitID vcs.CommitID) (*vcs.Commit, error) {\n\tstart := time.Now()\n\tcommit, err := r.r.GetCommit(commitID)\n\tr.rec.Child().Event(GoVCS{\n\t\tName: \"vcs.Repository.GetCommit\",\n\t\tArgs: fmt.Sprintf(\"%#v\", commitID),\n\t\tStartTime: start,\n\t\tEndTime: time.Now(),\n\t})\n\treturn commit, err\n}", "title": "" }, { "docid": "aa1ec5da6a573bcd795c9c8523c6c1b4", "score": "0.51323986", "text": "func NotFoundErr(predicate bool, errMessage string) {\n\tif predicate {\n\t\tfmt.Printf(\"NotFoundErr: %v\\n\", errMessage)\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "0e1bb47886e2d2eef20ebfc1bea3fef9", "score": "0.51286", "text": "func (c APIClient) FindCommits(req *pfs.FindCommitsRequest) (*FindCommitsResponse, error) {\n\tctx, cf := context.WithCancel(c.Ctx())\n\tdefer cf()\n\tclient, err := c.PfsAPIClient.FindCommits(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp := &FindCommitsResponse{}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := grpcutil.ForEach[*pfs.FindCommitsResponse](client, func(x *pfs.FindCommitsResponse) error {\n\t\tswitch x.Result.(type) {\n\t\tcase *pfs.FindCommitsResponse_LastSearchedCommit:\n\t\t\tresp.LastSearchedCommit = x.GetLastSearchedCommit()\n\t\t\tresp.CommitsSearched = x.CommitsSearched\n\t\tcase *pfs.FindCommitsResponse_FoundCommit:\n\t\t\tresp.FoundCommits = append(resp.FoundCommits, x.GetFoundCommit())\n\t\t}\n\t\treturn nil\n\t}); err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "c1bbb8435dad6615e06635ba052f6ddd", "score": "0.512681", "text": "func ParseCommit(message string, hash [20]byte) quoad.Commit {\n\tmatch := expectedFormatRegex.FindStringSubmatch(message)\n\n\tif len(match) == 0 {\n\t\treturn quoad.Commit{}\n\t}\n\n\tresult := make(map[string]string)\n\tfor i, name := range expectedFormatRegex.SubexpNames() {\n\t\tif i != 0 && name != \"\" {\n\t\t\tresult[name] = match[i]\n\t\t}\n\t}\n\n\tscope := result[\"scope\"]\n\n\t// strip brackets from scope if present\n\tif scope != \"\" {\n\t\tscope = strings.Replace(scope, \"(\", \"\", 1)\n\t\tscope = strings.Replace(scope, \")\", \"\", 1)\n\t}\n\n\treturn quoad.Commit{\n\t\tCategory: result[\"category\"],\n\t\tScope: scope,\n\t\tBreaking: result[\"breaking\"] == \"!\",\n\t\tHeading: result[\"heading\"],\n\t\tBody: result[\"body\"],\n\t\tHash: hash,\n\t}\n}", "title": "" }, { "docid": "02d3510fecd1760e429f480f5e074c56", "score": "0.51143575", "text": "func FetchRecipeIDForCommit(commitID strfmt.UUID, owner, project, orgID string, private bool) (*strfmt.UUID, *failures.Failure) {\n\treturn fetchRecipeID(commitID, owner, project, orgID, private, &HostPlatform)\n}", "title": "" }, { "docid": "b83b4acded219abc00f6d8a77e239b9b", "score": "0.5103668", "text": "func ErrAccountBankNotFound(addr sdk.Address) sdk.Error {\n\treturn types.NewError(types.CodeAccountBankNotFound, fmt.Sprintf(\"account bank not found: %s\", addr))\n}", "title": "" }, { "docid": "f0dce93e84c50dd14ea95721a543db90", "score": "0.51028854", "text": "func NotFound(format string, msg ...interface{}) *Boom {\r\n\treturn CreateError(http.StatusNotFound, format, msg...)\r\n}", "title": "" }, { "docid": "526d4eae79717fbae005b0d702d79540", "score": "0.5086313", "text": "func FindReviewIssueForCommit(\n\tclient *github.Client,\n\towner string,\n\trepo string,\n\tcommitSHA string,\n) (*github.Issue, error) {\n\n\t// Find the relevant review issue.\n\tsubstring := fmt.Sprintf(\"Review commit %v:\", commitSHA[:7])\n\treturn findReviewIssue(client, owner, repo, substring, \"in:title\", matchesTitle(substring))\n}", "title": "" }, { "docid": "f23e968321e6e19ef8b24643d621ac0b", "score": "0.5082703", "text": "func (ctx *ShowProjectContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "57b2841b96587fb3073ebc78faa55553", "score": "0.5082211", "text": "func (ctx *ShowMemosContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "d5c1ad0e786a90fd27c1777438377ed6", "score": "0.50793684", "text": "func ErrMethodNotFound() *Error {\n\treturn &Error{\n\t\tCode: ErrorCodeMethodNotFound,\n\t\tMessage: errof.ErrMethodNotFound.Error(),\n\t}\n}", "title": "" }, { "docid": "533775deeb66c626d6ebd96f8a1f8fdf", "score": "0.5077521", "text": "func Commit(commitmsg string) error {\n\tif IsDirect() {\n\t\t// Set bare false and revert at the end of the function\n\t\terr := setBare(false)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to toggle repository bare mode\")\n\t\t}\n\t\tdefer setBare(true)\n\t}\n\n\tcmd := Command(\"commit\", fmt.Sprintf(\"--message=%s\", commitmsg))\n\tstdout, stderr, err := cmd.OutputError()\n\n\tif err != nil {\n\t\tsstdout := string(stdout)\n\t\tif strings.Contains(sstdout, \"nothing to commit\") || strings.Contains(sstdout, \"nothing added to commit\") || strings.Contains(sstdout, \"no changes added to commit\") {\n\t\t\t// Return special error\n\t\t\tlog.Write(\"Nothing to commit\")\n\t\t\treturn fmt.Errorf(\"Nothing to commit\")\n\t\t}\n\t\tlog.Write(\"Error during GitCommit\")\n\t\tlogstd(stdout, stderr)\n\t\treturn fmt.Errorf(string(stderr))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a1a3f722a40e148e5356552054bb659b", "score": "0.50646544", "text": "func ErrGrantPubKeyNotFound() sdk.Error {\n\treturn types.NewError(types.CodeGrantPubKeyNotFound, fmt.Sprintf(\"grant public key is not found\"))\n}", "title": "" }, { "docid": "903daf3007785b8062a0c179633754c7", "score": "0.50575924", "text": "func ValidCommit(chainID string, commit *tmtypes.Commit, valSet *tmtypes.ValidatorSet) (err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\terr = sdkerrors.Wrapf(clienttypes.ErrInvalidEvidence, \"invalid commit: %v\", r)\n\t\t}\n\t}()\n\n\t// Convert commits to vote-sets given the validator set so we can check if they both have 2/3 power\n\tvoteSet := tmtypes.CommitToVoteSet(chainID, commit, valSet)\n\n\tblockID, ok := voteSet.TwoThirdsMajority()\n\n\t// Check that ValidatorSet did indeed commit to blockID in Commit\n\tif !ok || !blockID.Equals(commit.BlockID) {\n\t\treturn sdkerrors.Wrap(clienttypes.ErrInvalidEvidence, \"validator set did not commit to header 1\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "9546e147321f67dc853eb8fe78306f26", "score": "0.5052562", "text": "func (u *UnknownOrchestratorConfigProvider) GetCommit() string {\n\tlog.Entry().Warning(\"Unknown orchestrator - returning default values.\")\n\treturn \"n/a\"\n}", "title": "" }, { "docid": "ec840c8efd382f867710d7107af324d2", "score": "0.505175", "text": "func (d *Dao) HasCommit(projID int, commitID string) (total int, err error) {\n\terr = pkgerr.WithStack(d.db.Model(&model.StatisticsCommits{}).Where(\"project_id = ? AND commit_id = ?\", projID, commitID).Count(&total).Error)\n\treturn\n}", "title": "" }, { "docid": "f05d19c4cad1021f06df384f655e98d7", "score": "0.5050993", "text": "func (ctx *JobsProjectContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "5222c67fbf7443e82cc3392278fb50b7", "score": "0.50407314", "text": "func MustGitCommit(repoPath, format string, a ...interface{}) {\n\tmsg := fmt.Sprintf(format, a...)\n\n\tfmt.Printf(\"\\n%s\\n\", msg)\n\tfmt.Printf(\"\\033[38;5;245m\")\n\n\tif err := GitCommit(repoPath, format, a...); err != nil {\n\t\tExitFail(\"error: %s\", err)\n\t}\n\n\tfmt.Printf(\"\\033[0m\")\n}", "title": "" }, { "docid": "aba0f7e8b085c6742acf63e1b67db1c8", "score": "0.50388235", "text": "func GetCommit(dir, commit string) (c *Commit, err error) {\n\tdir, err = GetRoot(dir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcmd := exec.Command(\"git\", \"log\", \"-1\", `--pretty=format:{\"commit\":\"%H\",\"abbreviated_commit\":\"%h\",\"tree\":\"%T\",\"abbreviated_tree\":\"%t\",\"parent\":\"%P\",\"abbreviated_parent\":\"%p\",\"refs\":\"%D\",\"author\":{\"name\":\"%aN\",\"email\":\"%aE\",\"date\":\"%aD\"},\"commiter\":{\"name\":\"%cN\",\"email\":\"%cE\",\"date\":\"%cD\"}}`, commit)\n\tcmd.Dir = dir\n\n\tb, err := output(cmd)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := json.Unmarshal(b, &c); err != nil {\n\t\treturn nil, errors.Wrap(err, \"unmarshaling\")\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "581111970362dbae29a9284c3da7e647", "score": "0.503683", "text": "func NotFound(message string, debugMessage ...string) *APIError {\n\tif message == \"\" {\n\t\tmessage = http.StatusText(http.StatusNotFound)\n\t}\n\n\tdebugMsg := \"\"\n\n\tif len(debugMessage) > 0 {\n\t\tdebugMsg = debugMessage[0]\n\t}\n\treturn NewAPIError(http.StatusNotFound, message, debugMsg)\n}", "title": "" }, { "docid": "cd76c71818315aa7ec28219e02311698", "score": "0.5036295", "text": "func (ctx *StatusBackupContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "433ce922fa51b6ee2f54e2c006a90965", "score": "0.5035993", "text": "func NotFound(id string) error {\n\treturn status.Error(codes.NotFound, \"resource not found: \"+id)\n}", "title": "" }, { "docid": "4eb7baa47f1431480650e598caad8648", "score": "0.5034822", "text": "func NewErrNotFound(format string, a ...interface{}) *ErrNotFound {\n\treturn &ErrNotFound{\n\t\tmsg: fmt.Sprintf(format, a...),\n\t}\n}", "title": "" }, { "docid": "994c9267ce0af545fde8dc4571fea595", "score": "0.50318164", "text": "func NewErrFileNotFound(file string, repo string, commitID string) *ErrFileNotFound {\n\treturn &ErrFileNotFound{\n\t\terror: fmt.Errorf(\"file %v not found in repo %v at commit %v\", file, repo, commitID),\n\t}\n}", "title": "" }, { "docid": "196c6d7e57fea717816533590c0e2027", "score": "0.5031792", "text": "func NotFound(message string, args ...interface{}) Error {\n\treturn WrapWithMessage(&NotFoundError{\n\t\tMessage: fmt.Sprintf(message, args...),\n\t}, message, args...)\n}", "title": "" }, { "docid": "2b616d49b2d2badbac43c97b8613987d", "score": "0.50305945", "text": "func (rbs *RemoteBlockstore) blockNotFound(resp *pb.BlockstoreResponse, respErr error) error {\n\tif respErr != nil {\n\t\treturn respErr\n\t}\n\tif len(resp.GetBlocks()) <= 0 {\n\t\treturn ErrNotFound\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2662345fbab05bd9b1912557a483ee90", "score": "0.5021658", "text": "func (ctx *UpdateCompanyBranchHyCompanybranchContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "a9c4947ac03066c8b90d081f72139e6e", "score": "0.500952", "text": "func (desc *immutable) ValidateTxnCommit(\n\t_ catalog.ValidationErrorAccumulator, _ catalog.ValidationDescGetter,\n) {\n\t// No-op.\n}", "title": "" }, { "docid": "8e4385c992aee687c82a144e9df9374d", "score": "0.500395", "text": "func NewContainerInspectNotFound() *ContainerInspectNotFound {\n\treturn &ContainerInspectNotFound{}\n}", "title": "" }, { "docid": "e91de08eb03323c087539168f133761c", "score": "0.5003628", "text": "func ErrNotFound(err error) bool {\n\treturn strings.Contains(err.Error(), \"not found\")\n}", "title": "" }, { "docid": "92e7685775bd493e4776d3d7fff72097", "score": "0.49938095", "text": "func (ctx *GetCompanyBranchHyCompanybranchContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "2260fcc78dd17017274eedbd2e5e97f7", "score": "0.4987871", "text": "func ErrNotFound() render.Renderer {\n\treturn &ErrResponse{\n\t\tHTTPStatusCode: http.StatusNotFound,\n\t\tStatusText: \"Resource not found.\",\n\t}\n}", "title": "" }, { "docid": "edcfc0b52241422871a75e6a205e85fc", "score": "0.49866968", "text": "func _cgoexp_ebd397278953_var_setholochain_ErrHashNotFound(a unsafe.Pointer, n int32, ctxt uintptr) {\n\tfn := _cgoexpwrap_ebd397278953_var_setholochain_ErrHashNotFound\n\t_cgo_runtime_cgocallback(**(**unsafe.Pointer)(unsafe.Pointer(&fn)), a, uintptr(n), ctxt);\n}", "title": "" }, { "docid": "1755358e0f2643812cb1eb4a12f3c392", "score": "0.49851504", "text": "func ErrNotFound(err NotFoundError) *ProblemDetail {\n\treturn &ProblemDetail{\n\t\tType: t,\n\t\tTitle: \"object cannot be found\",\n\t\tStatus: http.StatusNotFound,\n\t\tDetail: err.Error(),\n\t}\n}", "title": "" }, { "docid": "94dd001d2aba84b1c650ad96f11ac3e5", "score": "0.49840435", "text": "func (ctx *ListMemosContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "c1dcc468e06100f8d4a6cd64568c9b04", "score": "0.4978051", "text": "func ErrGrantPubKeyNotFound() sdk.Error {\n\treturn types.NewError(\n\t\ttypes.CodeGrantPubKeyNotFound, fmt.Sprintf(\"grant public key is not found\"))\n}", "title": "" }, { "docid": "17c562698e4469ca88d3bdd3e8c270c7", "score": "0.49626365", "text": "func ParamsErrPreparedStatementNotFound(argumentError error) (verrorComponent string, verrorOperation string, returnErr error) {\n\tparams := verror.Params(argumentError)\n\tif params == nil {\n\t\treturnErr = fmt.Errorf(\"no parameters found in: %T: %v\", argumentError, argumentError)\n\t\treturn\n\t}\n\titer := &paramListIterator{params: params, max: len(params)}\n\n\tif verrorComponent, verrorOperation, returnErr = iter.preamble(); returnErr != nil {\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "59abca538bc96a72df1023fd54f9ab7c", "score": "0.49596578", "text": "func Get() (string, error) {\n\tdata, err := readFileFromKoData(commitIDFile)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tcommitID := strings.TrimSpace(string(data))\n\tif rID := strings.TrimPrefix(commitID, \"ref: \"); rID != commitID {\n\t\tdata, err := readFileFromKoData(rID)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tcommitID = strings.TrimSpace(string(data))\n\t}\n\tif commitIDRE.MatchString(commitID) {\n\t\treturn commitID[:7], nil\n\t}\n\treturn \"\", fmt.Errorf(\"%q is not a valid GitHub commit ID\", commitID)\n}", "title": "" }, { "docid": "3098b5b9708056edd9cb9d1cc3a8c8fa", "score": "0.49588385", "text": "func (ctx *DeleteMemosContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "d2c6597367b4bd110535e493d8a2db2e", "score": "0.49537218", "text": "func NotFound(c echo.Context, message string) (e error) {\n\treturn HTTPError(c, 404, message)\n}", "title": "" }, { "docid": "5d5e5d2694f1c0b69f33e6bc757bd0fc", "score": "0.49484664", "text": "func NotFound(message string, args ...interface{}) error {\r\n\treturn WrapWithMessage(&NotFoundError{\r\n\t\tMessage: fmt.Sprintf(message, args...),\r\n\t}, message, args...)\r\n}", "title": "" }, { "docid": "b6af588575a71ecdd2b94681d68562b8", "score": "0.49422002", "text": "func CommitExists(sha string) (bool, error) {\n\tif _, err := GetCommit(sha); err != nil {\n\t\tif strings.Contains(err.Error(), sqlNotFound) {\n\t\t\treturn false, nil\n\t\t}\n\t\treturn false, err\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "b50dc4c59eb77228786d37d8f96c3aac", "score": "0.492752", "text": "func NotFound(format string, v ...interface{}) *Error {\n\treturn New(http.StatusNotFound, fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "2278884238254e4d15f993ff4925ade2", "score": "0.49097714", "text": "func ErrNoLockInfoFound(addr string, pool string) sdk.EnvelopedErr {\n\treturn sdk.EnvelopedErr{Err: sdkerrors.New(DefaultParamspace, CodeInvalidLockInfo, fmt.Sprintf(\"failed. %s hasn't locked in pool %s\", addr, pool))}\n}", "title": "" }, { "docid": "7954a755ef2f7965f5f1f7ade3a76227", "score": "0.4906417", "text": "func (o *DeploymentHistoryResponse) GetCommitOk() (*CommitResponse, bool) {\n\tif o == nil || o.Commit == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Commit, true\n}", "title": "" }, { "docid": "e1664d0345e52dd1df1f7be82cc4c366", "score": "0.49005768", "text": "func (ctx *UpdateMessagecontentsContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "8b71b6e1ef5e5d3cd2ec906615ed7500", "score": "0.4895428", "text": "func (err BucketNotFoundError) NotFound() bool {\n\treturn true\n}", "title": "" }, { "docid": "e9c2ef6789f35a3eed9728b6491526fe", "score": "0.48891193", "text": "func NewErrNotFound(message string) *ErrNotFound {\n\treturn &ErrNotFound{\n\t\tmessage: message,\n\t}\n}", "title": "" }, { "docid": "21ccca0306fd087944ee937d497fa035", "score": "0.4885859", "text": "func IsBlobNotFound(err error) bool {\n\tif err == nil {\n\t\treturn false\n\t}\n\treturn strings.Contains(microerror.Cause(err).Error(), \"ServiceCode=BlobNotFound\")\n}", "title": "" }, { "docid": "a27dd75f9bdeb68462342525cefe2f65", "score": "0.48848248", "text": "func CreateCommit(u User, c GitHubCommitRepo) error {\n\tdebug.Printf(\"Creating commit %v for user %s\", c, u.Login)\n\tif c.Author == nil || u.Login != *c.Author.Login {\n\t\t// Ignore the commit if the commit has no GitHub\n\t\t// author, or the author does not match u.\n\t\treturn nil\n\t}\n\ttx, err := db.DB.Beginx()\n\tif err != nil {\n\t\treturn wrapError(err)\n\t}\n\tif c.Message == nil {\n\t\tc.Message = github.String(\"\")\n\t}\n\tb := &db.Binder{}\n\tquery := `\nINSERT INTO commit(sha, uid, author_date, repo_name, message, additions, deletions)\n VALUES (` +\n\t\tb.Bind(*c.SHA, u.UID, *c.Commit.Author.Date,\n\t\t\tc.RepoName, *c.Commit.Message, *c.Stats.Additions, *c.Stats.Deletions) +\n\t\t`)`\n\tif _, err := tx.Exec(query, b.Items...); err != nil {\n\t\t// Ignore if we've seen this commit.\n\t\tif strings.Contains(err.Error(), \"duplicate key value violates unique constraint\") {\n\t\t\treturn nil\n\t\t}\n\t\treturn wrapError(err)\n\t}\n\tfor _, f := range c.Files {\n\t\tb := &db.Binder{}\n\t\t// For empty files, Patch is nil.\n\t\tif f.Patch == nil {\n\t\t\tf.Patch = github.String(\"\")\n\t\t}\n\t\tquery := `\nINSERT INTO commit_file(commit_sha, filename, status, additions, deletions, patch)\n VALUES (` +\n\t\t\tb.Bind(*c.SHA, *f.Filename, *f.Status, *f.Additions, *f.Deletions, *f.Patch) +\n\t\t\t`)`\n\t\tif _, err := tx.Exec(query, b.Items...); err != nil {\n\t\t\treturn wrapError(err)\n\t\t}\n\t}\n\tif err := tx.Commit(); err != nil {\n\t\treturn wrapError(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7a30aa3beddb8d74a259bd88d7132fa8", "score": "0.4883732", "text": "func (o *GetRunArtifactsTreeNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "f7e95613f51b7c384d0d1e029843f5ed", "score": "0.48582515", "text": "func (o *GetAccountEmailAuditLogsWithHistoryNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "7083b71705de676b935f179d413d55d3", "score": "0.48541495", "text": "func (ctx *GetMessagecontentsContext) NotFound() error {\n\tctx.ResponseData.WriteHeader(404)\n\treturn nil\n}", "title": "" }, { "docid": "b6645a360b4e1f52559af74bf721db87", "score": "0.48525065", "text": "func (enn ErrNoNetwork) NotFound() {}", "title": "" }, { "docid": "79f475e0ef4a8680384bfaacdfb549d6", "score": "0.48493987", "text": "func ErrNotFound(err error) render.Renderer {\n\treturn &ErrResponse{\n\t\tErr: err,\n\t\tHTTPStatusCode: http.StatusNotFound,\n\t\tStatusText: \"Not Found\",\n\t\tErrorText: err.Error(),\n\t}\n}", "title": "" }, { "docid": "5264b7dd551f03853763b3b6068e6392", "score": "0.48428348", "text": "func (ctx *ShowUserContext) NotFound(r error) error {\n\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "733ca5abbd58a6328b2ed2969828fb3b", "score": "0.4835681", "text": "func CommandNotFound(c *cli.Context, command string) {\n\tfmt.Fprintf(os.Stderr, \"%s: '%s' is not an %s command. See '%s --help'.\", c.App.Name, command, c.App.Name, c.App.Name)\n\tos.Exit(2)\n}", "title": "" }, { "docid": "4a2ab54a69b7e949aa73abdde3799762", "score": "0.48312336", "text": "func CommandNotFound(c *cli.Context, command string) {\n\tfmt.Fprintf(os.Stderr, \"%s: '%s' is not a %s command. See '%s --help'.\", c.App.Name, command, c.App.Name, c.App.Name)\n\tos.Exit(2)\n}", "title": "" } ]
4563ca7f10ac022d1eaf84829fd55b7f
GetTotalPrefixes retrieves the value of the leaf TotalPrefixes from the Bgp_Global struct. Caution should be exercised whilst using this method since it will return the Go zero value if the field is explicitly unset. If the caller explicitly does not care if TotalPrefixes is set, it can safely use t.GetTotalPrefixes() to retrieve the value. In the case that the caller has different actions based on whether the leaf is set or unset, it should use 'if t.TotalPrefixes == nil' before retrieving the leaf's value.
[ { "docid": "57065ec18b2dc8d4058dd190cfc55d0c", "score": "0.8497401", "text": "func (t *Bgp_Global) GetTotalPrefixes() uint32 {\n\tif t == nil || t.TotalPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPrefixes\n}", "title": "" } ]
[ { "docid": "367f8e48df7fdca83127757c1f51284c", "score": "0.7603348", "text": "func (t *Bgp_Global_AfiSafi) GetTotalPrefixes() uint32 {\n\tif t == nil || t.TotalPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPrefixes\n}", "title": "" }, { "docid": "c181229aa3c786df74de2f22140a13ad", "score": "0.7452765", "text": "func (t *Bgp_PeerGroup) GetTotalPrefixes() uint32 {\n\tif t == nil || t.TotalPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPrefixes\n}", "title": "" }, { "docid": "bebe88c6047e44972a9e385ad5071796", "score": "0.60706675", "text": "func (t *Bgp_Global) GetTotalPaths() uint32 {\n\tif t == nil || t.TotalPaths == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPaths\n}", "title": "" }, { "docid": "0a687580c026b7b53b447eb76197d74f", "score": "0.55014455", "text": "func (t *Bgp_Global_AfiSafi_L2VpnEvpn_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "3bf62dd92c4979f804045f1c0420077c", "score": "0.54772794", "text": "func (t *Bgp_Global_AfiSafi_Ipv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "24a662387400363520e86970855e6600", "score": "0.54741013", "text": "func (t *Bgp_Global_AfiSafi_SrtePolicyIpv6_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "a19087f7d0437217d9dbb1f8ab8baa06", "score": "0.5463052", "text": "func (t *Bgp_Global_AfiSafi_Ipv6LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "f7060a18154078e5280b0e7ec97957e6", "score": "0.5460986", "text": "func (t *Bgp_Global_AfiSafi_L2VpnVpls_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "95f410e6cff16cc0a597addb66004166", "score": "0.54589653", "text": "func (t *Bgp_Global_AfiSafi_SrtePolicyIpv4_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "503d83ed34498773654a5fe5c09147f5", "score": "0.54563123", "text": "func (t *Bgp_Global_AfiSafi_Ipv4LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "c57b6366e61b2b1c4021a749c88c100f", "score": "0.54353064", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "cbca8545a1798580ce2c25a2a3edfbb8", "score": "0.5434421", "text": "func (t *Bgp_Global_AfiSafi_Ipv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "17b9dbb99b3efd8ac074549251279b88", "score": "0.5425532", "text": "func (k Keeper) countTotal(ctx sdk.Context, prefix []byte) int {\n\tstore := ctx.KVStore(k.storeKey)\n\tres := 0\n\n\titer := sdk.KVStorePrefixIterator(store, prefix)\n\tdefer iter.Close()\n\n\tfor ; iter.Valid(); iter.Next() {\n\t\tres++\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "12e3746d8989e2f68b9d5c14cc1999ba", "score": "0.53622437", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "ccc725f1797e17f5eecb80737c55da09", "score": "0.5326615", "text": "func (sns ScmNamespaces) Total() (tb uint64) {\n\tfor _, sn := range sns {\n\t\ttb += (*ScmNamespace)(sn).Total()\n\t}\n\treturn\n}", "title": "" }, { "docid": "694e49101f740925d294bf5f6ce49e7a", "score": "0.532336", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "6c55e23312c1a5c0e6b925646d397f02", "score": "0.5320047", "text": "func (t *Bgp_PeerGroup_AfiSafi_SrtePolicyIpv6_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "48e34ae7d2b0dea8190c690f3e4af6d2", "score": "0.531396", "text": "func (t *Bgp_PeerGroup_AfiSafi_L2VpnEvpn_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "a44f2b65ba6f8fc5b236180b5bebe682", "score": "0.5311735", "text": "func (t *Bgp_PeerGroup_AfiSafi_L3VpnIpv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "a777ae5a68c9a2a3ab3fcf63a8c981e4", "score": "0.5310195", "text": "func (t *Bgp_PeerGroup_AfiSafi_SrtePolicyIpv4_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "25ee47fa088b0d1bbc7a3f662b3e4420", "score": "0.53073984", "text": "func (t *Bgp_Neighbor_AfiSafi_Ipv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "875083cc1948884472430b84b95a5443", "score": "0.5306079", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv6LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "68cda271a7ad59d21f772a96e0f6a76f", "score": "0.5302214", "text": "func (t *Bgp_Neighbor_AfiSafi_Ipv6LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "98798ece9b2d9e1fa9b76b1ae8038e10", "score": "0.52922803", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv4LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "712897f1c90784665342e7ae334defad", "score": "0.5283532", "text": "func (t *Bgp_PeerGroup_AfiSafi_L2VpnVpls_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "29bec6899c4891207a45b5ff363b41d3", "score": "0.5283283", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv6Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "7eb780fe84242bc05b472e8d58cd3cb0", "score": "0.5275565", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "d199625e9a718d91078f03c5fcc55546", "score": "0.52558357", "text": "func (t *Bgp_Neighbor_AfiSafi_Ipv4LabeledUnicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "34fd522d22430266adcc6c0f2e1963c9", "score": "0.5248547", "text": "func (t *Bgp_Neighbor_AfiSafi_SrtePolicyIpv6_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "38d0d3a0e7a70a2273bacb13a6ef3233", "score": "0.5241812", "text": "func (t *Bgp_Neighbor_AfiSafi_L2VpnVpls_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "1a40084c7e403a2ab1962643deb5acdd", "score": "0.52412415", "text": "func (t *Bgp_Neighbor_AfiSafi_L2VpnEvpn_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "fdbe3f1f03b344d61703bd9d4ae9997e", "score": "0.52379376", "text": "func (t *Bgp_PeerGroup_AfiSafi_L3VpnIpv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "875683f56ca6c9b2e1ce8efa4886663f", "score": "0.52331626", "text": "func (t *Bgp_Neighbor_AfiSafi_L3VpnIpv6Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "deffaaf8e22b7873602f68a18fbfad08", "score": "0.5231788", "text": "func (sn ScmNamespace) Total() uint64 {\n\tif sn.Mount == nil {\n\t\treturn 0\n\t}\n\treturn sn.Mount.TotalBytes\n}", "title": "" }, { "docid": "a89e6579166087fa7cf2a23ee0c3c5ba", "score": "0.522369", "text": "func (t *Bgp_Neighbor_AfiSafi_Ipv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "d6a60ac3fc6bc48aa5a0b5ee275d7ebf", "score": "0.5221649", "text": "func (t *Interface_Subinterface_Ipv6_Address) GetPrefixLength() uint8 {\n\tif t == nil || t.PrefixLength == nil {\n\t\treturn 0\n\t}\n\treturn *t.PrefixLength\n}", "title": "" }, { "docid": "4a1fb3989598fc6fd1f171c6e309a5f1", "score": "0.5217997", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv4Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "6b3bb39b105134ecd206d5e7b304d515", "score": "0.5209392", "text": "func (t *Bgp_Neighbor_AfiSafi_SrtePolicyIpv4_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "6b1aaf3600a4ab73fb43eda59ea4a50a", "score": "0.517949", "text": "func (t *Interface_RoutedVlan_Ipv6_Address) GetPrefixLength() uint8 {\n\tif t == nil || t.PrefixLength == nil {\n\t\treturn 0\n\t}\n\treturn *t.PrefixLength\n}", "title": "" }, { "docid": "73cf3cbf55a0f0251b71be056d17c2ad", "score": "0.5148876", "text": "func (m *VpnRoute) GetPrefixSize()(*int32) {\n val, err := m.GetBackingStore().Get(\"prefixSize\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*int32)\n }\n return nil\n}", "title": "" }, { "docid": "4da6014974790b48973c86f7c921eeb5", "score": "0.5146552", "text": "func (t *Interface_Subinterface_Ipv4_Address) GetPrefixLength() uint8 {\n\tif t == nil || t.PrefixLength == nil {\n\t\treturn 0\n\t}\n\treturn *t.PrefixLength\n}", "title": "" }, { "docid": "2a7fe9940e94aac477af5d6b6beb20f3", "score": "0.5136327", "text": "func (t *Bgp_PeerGroup_AfiSafi_L3VpnIpv6Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "e161a1df31afbab393f9c1e78dc4edd8", "score": "0.51343805", "text": "func (t *Bgp_Neighbor_AfiSafi_L3VpnIpv4Unicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "3692227dc64c09e525aa559993813004", "score": "0.5114244", "text": "func (t *Bgp_Neighbor_AfiSafi_L3VpnIpv6Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "1df597fba6a404b23744f5229f4b2de9", "score": "0.5096514", "text": "func (t *Bgp_Global_AfiSafi) GetTotalPaths() uint32 {\n\tif t == nil || t.TotalPaths == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPaths\n}", "title": "" }, { "docid": "461adddc5e6377927bcc5bcc126a2810", "score": "0.5078726", "text": "func (tree *IPPool) GetPrefixes() []string {\n\ttree.lock.Lock()\n\tclone := tree.clone()\n\ttree.lock.Unlock()\n\n\tif clone.root == nil {\n\t\treturn nil\n\t}\n\n\tit := iterator{\n\t\tnode: clone.root,\n\t}\n\tfor it.node.Left != nil {\n\t\tit.node = it.node.Left\n\t}\n\n\tvar prefixes []string\n\tfor node := it.Next(); node != nil; node = it.Next() {\n\t\tprefixes = append(prefixes, node.getPrefixes(clone.ipLength)...)\n\t}\n\n\treturn prefixes\n}", "title": "" }, { "docid": "73c7e4d308206ccd5878c3d9207fea95", "score": "0.50720805", "text": "func (t *Bgp_PeerGroup_AfiSafi_L3VpnIpv4Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "9b1450c4873f5b940bd4d4a2cc4a5a9c", "score": "0.50653166", "text": "func (t *Bgp_PeerGroup) GetTotalPaths() uint32 {\n\tif t == nil || t.TotalPaths == nil {\n\t\treturn 0\n\t}\n\treturn *t.TotalPaths\n}", "title": "" }, { "docid": "151edbb78accdeb01aa945bec26e15c0", "score": "0.5052756", "text": "func (t *Interface_RoutedVlan_Ipv4_Address) GetPrefixLength() uint8 {\n\tif t == nil || t.PrefixLength == nil {\n\t\treturn 0\n\t}\n\treturn *t.PrefixLength\n}", "title": "" }, { "docid": "03b16a79767107a2ec61d5806f50528a", "score": "0.50321686", "text": "func (t *Bgp_Neighbor_AfiSafi_L3VpnIpv4Multicast_PrefixLimit) GetMaxPrefixes() uint32 {\n\tif t == nil || t.MaxPrefixes == nil {\n\t\treturn 0\n\t}\n\treturn *t.MaxPrefixes\n}", "title": "" }, { "docid": "522df2082f487936e34dcfca9a644b62", "score": "0.50217104", "text": "func (n *NonLeafRoutingTableNode) GetSubtreeSize() uint32 {\n\treturn n.ZeroPathNode.GetSubtreeSize() + n.OnePathNode.GetSubtreeSize()\n}", "title": "" }, { "docid": "d2d8ae22d623fd0d139db01eb0997283", "score": "0.5021587", "text": "func (t *Bgp_Neighbor_AfiSafi) GetPrefixes() *Bgp_Neighbor_AfiSafi_Prefixes {\n\tif t != nil && t.Prefixes != nil {\n\t\treturn t.Prefixes\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "21bc5cb5e1e9d8dd98308db2b672a2d4", "score": "0.4953429", "text": "func (a *Account) TotalSubs() int {\n\ta.mu.RLock()\n\tdefer a.mu.RUnlock()\n\treturn int(a.sl.Count())\n}", "title": "" }, { "docid": "ee02c2ed69ac06633e1c9ecf48f12e0b", "score": "0.49389914", "text": "func (n *LeafRoutingTableNode) GetSubtreeSize() uint32 {\n\treturn uint32(len(n.ContactNodes))\n}", "title": "" }, { "docid": "57aff837d128c771bb0662872446e01f", "score": "0.48254243", "text": "func (o *AppApplicationDataData) GetApplicationTotalNodes() string {\n\tif o == nil || o.ApplicationTotalNodes == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ApplicationTotalNodes\n}", "title": "" }, { "docid": "67736a7f521a2ff9c54210a3b100489b", "score": "0.4805804", "text": "func (t *Bgp_Neighbor_AfiSafi_Prefixes) GetInstalled() uint32 {\n\tif t == nil || t.Installed == nil {\n\t\treturn 0\n\t}\n\treturn *t.Installed\n}", "title": "" }, { "docid": "a83c128b10f8265061c21d3b7e330372", "score": "0.47607806", "text": "func (l *LanguagePackInfo) GetTotalStringCount() (value int32) {\n\tif l == nil {\n\t\treturn\n\t}\n\treturn l.TotalStringCount\n}", "title": "" }, { "docid": "ada5207c5b35a7948038567b4b5488f9", "score": "0.47536126", "text": "func (o *MultipleRoute) GetTotal() int64 {\n\tif o == nil || o.Total == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Total\n}", "title": "" }, { "docid": "a2ee7ed8157e7cb435ad06e137c2e925", "score": "0.47269166", "text": "func (c *Config) TotalShardCount(namespace string) uint64 {\n\t// HACK(hinoka): This namespace requires a lot more shards than your average\n\t// namespace. crbug.com/920852\n\tif namespace == \"luci.chromium\" {\n\t\treturn 64\n\t}\n\treturn c.NumShards\n}", "title": "" }, { "docid": "a5be0e9c107256886e522bf4f6260a31", "score": "0.46822888", "text": "func (o *IppoolIpV6Config) GetPrefix() int64 {\n\tif o == nil || o.Prefix == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Prefix\n}", "title": "" }, { "docid": "36a77b9cfee4678d350405bca72fb1b3", "score": "0.46787664", "text": "func GetProxyTotal() (metrics types.Metrics) {\n\treturn GetMetricsFilter(\"downstream.proxy.global\")\n}", "title": "" }, { "docid": "03577e30abe9de312648c3763d63b0c6", "score": "0.46684527", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv6Unicast) GetPrefixLimit() *Bgp_Global_AfiSafi_L3VpnIpv6Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b7be97cc279ce005fe91da54314ecfa", "score": "0.4663129", "text": "func (t *Bgp_Global_AfiSafi_Ipv6Unicast) GetPrefixLimit() *Bgp_Global_AfiSafi_Ipv6Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "58c257f0992125a4453979d1233e8cb2", "score": "0.46586013", "text": "func (o *StoragePureArrayUtilizationAllOf) GetTotalReduction() float32 {\n\tif o == nil || o.TotalReduction == nil {\n\t\tvar ret float32\n\t\treturn ret\n\t}\n\treturn *o.TotalReduction\n}", "title": "" }, { "docid": "72953316f0ef3cf31763b55261c44346", "score": "0.46485665", "text": "func (t *Bgp_Global_AfiSafi_Ipv6LabeledUnicast) GetPrefixLimit() *Bgp_Global_AfiSafi_Ipv6LabeledUnicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6a5d8e898bb4c2c87e3f413820fc765", "score": "0.46210912", "text": "func (o *StoragePureArrayUtilizationAllOf) GetTotalReductionOk() (*float32, bool) {\n\tif o == nil || o.TotalReduction == nil {\n\t\treturn nil, false\n\t}\n\treturn o.TotalReduction, true\n}", "title": "" }, { "docid": "ec4cc7ad5db4b45307f9465a507bc406", "score": "0.4608121", "text": "func (n *Needle) GetTotalSize() int {\n\treturn totalHeaderLen + int(n.Size) + totalFooterLen + len(n.Padding)\n}", "title": "" }, { "docid": "84f214319774d6983e2a10d2b2a6ba7c", "score": "0.4600733", "text": "func GetTotalCallCount() int {\n\treturn DefaultTransport.GetTotalCallCount()\n}", "title": "" }, { "docid": "84f214319774d6983e2a10d2b2a6ba7c", "score": "0.4600733", "text": "func GetTotalCallCount() int {\n\treturn DefaultTransport.GetTotalCallCount()\n}", "title": "" }, { "docid": "49da9340f6e2a74b289976845f8fce3e", "score": "0.45963338", "text": "func (t *Bgp_Global_AfiSafi_SrtePolicyIpv6) GetPrefixLimit() *Bgp_Global_AfiSafi_SrtePolicyIpv6_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4057c077cc0494c8667887560308117c", "score": "0.45906758", "text": "func (g GymClasses) Total() int {\n\treturn len(g)\n}", "title": "" }, { "docid": "5253e903f61ae7e82af16c5614a61baf", "score": "0.4577931", "text": "func (s *StateStorage) GetTotalCount() int64 {\n\treturn s.store.Get(storage.TotalCountKey)\n}", "title": "" }, { "docid": "29fe276f967ce5c1f8de73e3488d0950", "score": "0.45650294", "text": "func (m *Metrics) Total() LevelMetrics {\n\tvar total LevelMetrics\n\tfor level := 0; level < numLevels; level++ {\n\t\tl := &m.Levels[level]\n\t\ttotal.Add(l)\n\t\ttotal.Sublevels += l.Sublevels\n\t}\n\t// Compute total bytes-in as the bytes written to the WAL + bytes ingested.\n\ttotal.BytesIn = m.WAL.BytesWritten + total.BytesIngested\n\t// Add the total bytes-in to the total bytes-flushed. This is to account for\n\t// the bytes written to the log and bytes written externally and then\n\t// ingested.\n\ttotal.BytesFlushed += total.BytesIn\n\treturn total\n}", "title": "" }, { "docid": "358348d4df559c70b2a899fb1a2789d4", "score": "0.45640978", "text": "func (r *ListFoldersResponse) UnsafeGetTotalCount() uint32 {\n\treturn r.TotalCount\n}", "title": "" }, { "docid": "3627458f68a22c0f1665b78c411c715d", "score": "0.4558125", "text": "func (t *Bgp_Global_AfiSafi_L2VpnEvpn) GetPrefixLimit() *Bgp_Global_AfiSafi_L2VpnEvpn_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aff0707621dc049d836e854734098831", "score": "0.45467335", "text": "func (p *Parser) getTotal(root *html.Node) string {\n\ttotal := trimString(getTag(root, TOTAL))\n\n\treturn total\n}", "title": "" }, { "docid": "657538bb78d1d211c442d844998ef76a", "score": "0.45450708", "text": "func (ts *TreeStorage) GetCount() int {\n\treturn len(ts.root.leafs)\n}", "title": "" }, { "docid": "8e076c7569abd9adaf42c8084503fb2f", "score": "0.45376372", "text": "func (o *AppApplicationDataData) GetApplicationTotalNodesOk() (*string, bool) {\n\tif o == nil || o.ApplicationTotalNodes == nil {\n\t\treturn nil, false\n\t}\n\treturn o.ApplicationTotalNodes, true\n}", "title": "" }, { "docid": "15c6fcac476dc905a9c847a3efd73fc6", "score": "0.45261332", "text": "func (m *MapOf[T]) VisitPrefixes(p key.Path, fn func(v T) error) error {\n\treturn m.visit(prefix, p, fn)\n}", "title": "" }, { "docid": "ee3c8a066758293ba7db59e9244fe80d", "score": "0.45240167", "text": "func (t *Bgp_PeerGroup_AfiSafi_L3VpnIpv6Unicast) GetPrefixLimit() *Bgp_PeerGroup_AfiSafi_L3VpnIpv6Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7d4702e84fb811dcb67e9c197e3d1d8f", "score": "0.4506601", "text": "func (t *LocalRoutes_Aggregate) GetPrefix() string {\n\tif t == nil || t.Prefix == nil {\n\t\treturn \"\"\n\t}\n\treturn *t.Prefix\n}", "title": "" }, { "docid": "7d1509db1fed1204ed742ccc0679a740", "score": "0.45031166", "text": "func (o *ClusterResource) GetTotal() ClusterResourceTotal {\n\tif o == nil {\n\t\tvar ret ClusterResourceTotal\n\t\treturn ret\n\t}\n\n\treturn o.Total\n}", "title": "" }, { "docid": "abf0f79382dfae60cad5cee12a38774c", "score": "0.45000982", "text": "func (o *ManagementInterfaceAllOf) GetIpv6Prefix() int64 {\n\tif o == nil || o.Ipv6Prefix == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.Ipv6Prefix\n}", "title": "" }, { "docid": "7d19c3aa28028a671425dc73b6643247", "score": "0.4491772", "text": "func (t *Bgp_Global_AfiSafi_Ipv4LabeledUnicast) GetPrefixLimit() *Bgp_Global_AfiSafi_Ipv4LabeledUnicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "590a70fdbe09656a3afd4a0102301a41", "score": "0.4486756", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv6LabeledUnicast) GetPrefixLimit() *Bgp_PeerGroup_AfiSafi_Ipv6LabeledUnicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c27d96772ba9b7d5b8b98584618c9b32", "score": "0.4485845", "text": "func (t *Bgp_PeerGroup_AfiSafi_Ipv6Unicast) GetPrefixLimit() *Bgp_PeerGroup_AfiSafi_Ipv6Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b1b58f27bb196c2f4ae74160928fbc28", "score": "0.44636348", "text": "func (r *ListNodesResponse) UnsafeGetTotalCount() uint32 {\n\treturn r.TotalCount\n}", "title": "" }, { "docid": "6ec16a9360dc669bababdfcc682967d8", "score": "0.4462245", "text": "func (o *ClusterResource) GetTotalOk() (*ClusterResourceTotal, bool) {\n\tif o == nil {\n\t\treturn nil, false\n\t}\n\treturn &o.Total, true\n}", "title": "" }, { "docid": "24342d4969f3f3d0ae21eae066256054", "score": "0.44613534", "text": "func (x *WeightedCluster) GetTotalWeight() *wrapperspb.UInt32Value {\n\tif x != nil {\n\t\treturn x.TotalWeight\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9c244b1564d0e38961ffd0bb67d271cc", "score": "0.44571647", "text": "func (t *Bgp_Global_AfiSafi_L3VpnIpv6Multicast) GetPrefixLimit() *Bgp_Global_AfiSafi_L3VpnIpv6Multicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47831166965cbebf3b4fff00f3b18e99", "score": "0.44555482", "text": "func (r *RadixBucket) GetLongestPrefix(key []byte) (pref,val []byte) {\r\n\tif len(key) == 0 {\r\n\t\treturn nil,nil\r\n\t}\r\n\treturn r.acc.getLongestPrefix(key)\r\n}", "title": "" }, { "docid": "6c9fe5d43e03efe4d8d523f66e82ab9c", "score": "0.44554946", "text": "func (t *Bgp_Global_AfiSafi_Ipv4Unicast) GetPrefixLimit() *Bgp_Global_AfiSafi_Ipv4Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2da7be68fc2a0e7009beb38eb07d41b3", "score": "0.4454006", "text": "func (o *FileUsageResponseFilesUsage) GetTotal() int32 {\n\tif o == nil || o.Total == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Total\n}", "title": "" }, { "docid": "6db659c8145b9977ca6879d75044187f", "score": "0.44516167", "text": "func GetTotal(page int) int {\n\tvar total datastruct.Total\n\tresponse, err := makeRequest(page)\n\n\tif err == nil {\n\t\tdata, err := ioutil.ReadAll(response.Body)\n\t\tif err == nil {\n\t\t\t_ = json.Unmarshal(data, &total)\n\t\t}\n\t}\n\n\treturn total.Total\n}", "title": "" }, { "docid": "c34aa1a723f52ca9e7f232d1bfb37b81", "score": "0.44479552", "text": "func (o *IppoolIpV6Config) GetPrefixOk() (*int64, bool) {\n\tif o == nil || o.Prefix == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Prefix, true\n}", "title": "" }, { "docid": "d7d78b967800659512ba3d99be9e1f53", "score": "0.44446936", "text": "func (cg *CellGroup) TotalLoad() (load uint64) {\n\tcg.mu.Lock()\n\tdefer cg.mu.Unlock()\n\treturn cg.totalLoad()\n}", "title": "" }, { "docid": "12c665931200e4eda7eb4c89597cb87a", "score": "0.44418332", "text": "func GetPrefixs(tx *bolt.Tx, bucket string) ([]string, error) {\n\tvar cnt []string\n\tvar last string\n\tvar blast []byte\n\tb := tx.Bucket([]byte(bucket))\n\tif b == nil {\n\t\treturn nil, errors.New(\"bucket not found \" + bucket)\n\t}\n\terr := b.ForEach(func(k, v []byte) error {\n\t\tif blast != nil && bytes.HasPrefix(k, blast) {\n\t\t\treturn nil\n\t\t}\n\t\tloc := bytes.IndexByte(k, 0x00)\n\t\tif loc == -1 {\n\t\t\treturn errors.New(\"not have string prefix\")\n\t\t}\n\t\tlast = string(k[:loc])\n\t\tcnt = append(cnt, last)\n\t\tblast = make([]byte, loc+1)\n\t\tcopy(blast, k[:loc+1])\n\t\treturn nil\n\t})\n\treturn cnt, err\n}", "title": "" }, { "docid": "1fa8febc24f5cd2dcddf0e9e5fec54e4", "score": "0.44407552", "text": "func (m *Measured) GetPrefix(ctx context.Context, prefix string) (map[string][]byte, error) {\n\tt0 := time.Now()\n\tvs, err := m.kv.GetPrefix(ctx, prefix)\n\treportMetric(getOpType, time.Since(t0).Seconds(), err == nil)\n\treturn vs, err\n}", "title": "" }, { "docid": "1e8025898b38e3d051d524796871b871", "score": "0.4438734", "text": "func (t *Bgp_Global_AfiSafi_SrtePolicyIpv4) GetPrefixLimit() *Bgp_Global_AfiSafi_SrtePolicyIpv4_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c69de1ba5a99c672d67984ce8a310bfa", "score": "0.4427965", "text": "func (t *Bgp_Neighbor_AfiSafi_L3VpnIpv6Unicast) GetPrefixLimit() *Bgp_Neighbor_AfiSafi_L3VpnIpv6Unicast_PrefixLimit {\n\tif t != nil && t.PrefixLimit != nil {\n\t\treturn t.PrefixLimit\n\t}\n\treturn nil\n}", "title": "" } ]
8b1d109531926c78c1d4fb1a2eee7ad9
NewOrganizationCreateBody instantiates a new OrganizationCreateBody object. This constructor will assign default values to properties that have it defined, and makes sure properties required by API are set, but the set of arguments will change when the set of required properties is changed.
[ { "docid": "1f5d426eb04dee0378aafd839aa04a5f", "score": "0.78790015", "text": "func NewOrganizationCreateBody(name string) *OrganizationCreateBody {\n\tthis := OrganizationCreateBody{}\n\tthis.Name = name\n\treturn &this\n}", "title": "" } ]
[ { "docid": "34c17051ad088da6699ce64592f821b0", "score": "0.7024936", "text": "func NewOrganizationCreateBodyWithDefaults() *OrganizationCreateBody {\n\tthis := OrganizationCreateBody{}\n\treturn &this\n}", "title": "" }, { "docid": "2dec48be1e986ee9c10d8a32a9a0c691", "score": "0.58585626", "text": "func CreateCreateOrganizationRequest() (request *CreateOrganizationRequest) {\n\trequest = &CreateOrganizationRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Baas\", \"2018-07-31\", \"CreateOrganization\", \"\", \"\")\n\treturn\n}", "title": "" }, { "docid": "c01615ca2caeea5fa17191daab3568ea", "score": "0.5739311", "text": "func (o *OrganizationCreateBody) UnmarshalJSON(bytes []byte) (err error) {\n\traw := map[string]interface{}{}\n\trequired := struct {\n\t\tName *string `json:\"name\"`\n\t}{}\n\tall := struct {\n\t\tBilling *OrganizationBilling `json:\"billing,omitempty\"`\n\t\tName string `json:\"name\"`\n\t\tSubscription *OrganizationSubscription `json:\"subscription,omitempty\"`\n\t}{}\n\terr = json.Unmarshal(bytes, &required)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif required.Name == nil {\n\t\treturn fmt.Errorf(\"Required field name missing\")\n\t}\n\terr = json.Unmarshal(bytes, &all)\n\tif err != nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t\treturn nil\n\t}\n\tif all.Billing != nil && all.Billing.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Billing = all.Billing\n\to.Name = all.Name\n\tif all.Subscription != nil && all.Subscription.UnparsedObject != nil && o.UnparsedObject == nil {\n\t\terr = json.Unmarshal(bytes, &raw)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\to.UnparsedObject = raw\n\t}\n\to.Subscription = all.Subscription\n\treturn nil\n}", "title": "" }, { "docid": "d051c8cbda59447e8169f33efe260460", "score": "0.5725874", "text": "func (c *Client) CreateOrganization(orgname string) (Organization, error) {\n\tvar org Organization\n\torgreq := &Organization{\n\t\tName: orgname,\n\t}\n\terr := c.do(\"POST\", OrgEndpointName, &org, orgreq)\n\treturn org, err\n}", "title": "" }, { "docid": "12374f41dee6a0862a071fb5652e9956", "score": "0.5718463", "text": "func (a *Client) CreateOrganization(params *CreateOrganizationParams, authInfo runtime.ClientAuthInfoWriter) (*CreateOrganizationOK, *CreateOrganizationCreated, *CreateOrganizationAccepted, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewCreateOrganizationParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"createOrganization\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/api/v1/organizations\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &CreateOrganizationReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, nil, nil, err\n\t}\n\tswitch value := result.(type) {\n\tcase *CreateOrganizationOK:\n\t\treturn value, nil, nil, nil\n\tcase *CreateOrganizationCreated:\n\t\treturn nil, value, nil, nil\n\tcase *CreateOrganizationAccepted:\n\t\treturn nil, nil, value, nil\n\t}\n\treturn nil, nil, nil, nil\n\n}", "title": "" }, { "docid": "8099ad8bcfdedc12ff2fb0f8f5e589df", "score": "0.5697524", "text": "func (s *OrgClientService) CreateOrganization(ctx context.Context, o *influxdb.Organization) error {\n\tspan, _ := tracing.StartSpanFromContext(ctx)\n\tdefer span.Finish()\n\n\tif o.Name != \"\" {\n\t\tspan.LogKV(\"org\", o.Name)\n\t}\n\tif o.ID != 0 {\n\t\tspan.LogKV(\"org-id\", o.ID)\n\t}\n\n\treturn s.Client.\n\t\tPostJSON(o, prefixOrganizations).\n\t\tDecodeJSON(o).\n\t\tDo(ctx)\n}", "title": "" }, { "docid": "f630bad2e81bba01bbec16170090bd1d", "score": "0.5667197", "text": "func (a *Client) CreateOrganization(ctx context.Context, params *CreateOrganizationParams) (*CreateOrganizationCreated, error) {\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"createOrganization\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/organization\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &CreateOrganizationReader{formats: a.formats},\n\t\tAuthInfo: a.authInfo,\n\t\tContext: ctx,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*CreateOrganizationCreated), nil\n\n}", "title": "" }, { "docid": "be809df859ac3ed04517fa18efbf9c1f", "score": "0.5654218", "text": "func (a *OrganizationAPI) Create(ctx context.Context, req *pb.CreateOrganizationRequest) (*pb.CreateOrganizationResponse, error) {\n\tif req.Organization == nil {\n\t\treturn nil, status.Errorf(codes.InvalidArgument, \"organization must not be nil\")\n\t}\n\n\tif valid, err := organization.NewValidator(a.st).ValidateOrganizationsAccess(ctx, auth.Create); !valid || err != nil {\n\t\treturn nil, status.Errorf(codes.Unauthenticated, \"authentication failed: %s\", err)\n\t}\n\n\torg := organization.Organization{\n\t\tName: req.Organization.Name,\n\t\tDisplayName: req.Organization.DisplayName,\n\t\tCanHaveGateways: req.Organization.CanHaveGateways,\n\t\tMaxDeviceCount: int(req.Organization.MaxDeviceCount),\n\t\tMaxGatewayCount: int(req.Organization.MaxGatewayCount),\n\t}\n\n\terr := a.st.CreateOrganization(ctx, &org)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// set all default settings for new organization, this step should not interrupt creating organization\n\torganization.ActivateOrganization(ctx, a.st, a.st, a.st, org.ID, a.nsCli)\n\treturn &pb.CreateOrganizationResponse{\n\t\tId: org.ID,\n\t}, nil\n}", "title": "" }, { "docid": "cebc6657debb1e8f2f630506f313b3e7", "score": "0.5542889", "text": "func NewCreateLinkPostRequestBody()(*CreateLinkPostRequestBody) {\n m := &CreateLinkPostRequestBody{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "35c173d06fd32aa0b7921ee493b45e4a", "score": "0.5530533", "text": "func NewCreateRequestBody(p *log.Log) *CreateRequestBody {\n\tbody := &CreateRequestBody{\n\t\tID: p.ID,\n\t\tCreatedAt: p.CreatedAt,\n\t\tUpdatedAt: p.UpdatedAt,\n\t\tName: p.Name,\n\t\tSize: p.Size,\n\t\tFireID: p.FireID,\n\t\tAddedAt: p.AddedAt,\n\t}\n\tif p.Weather != nil {\n\t\tbody.Weather = marshalLogWeatherToWeatherRequestBody(p.Weather)\n\t}\n\treturn body\n}", "title": "" }, { "docid": "b7347e3c9606cb1bc4fa9cdbd23b1260", "score": "0.5518794", "text": "func (client *Client) CreateOrganization(request *CreateOrganizationRequest) (response *CreateOrganizationResponse, err error) {\n\tresponse = CreateCreateOrganizationResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "title": "" }, { "docid": "347fa8c1e747893808cd0ed068d37d9f", "score": "0.54629207", "text": "func (s *OrganizationService) Create(params *CreateOrganizationParams) (*Organization, *http.Response, error) {\n\torg := new(Organization)\n\tapiError := new(APIError)\n\tresp, err := s.sling.New().Post(\"\").BodyJSON(params).Receive(org, apiError)\n\treturn org, resp, relevantError(err, *apiError)\n}", "title": "" }, { "docid": "9cfa387de40fa043d0551b339a23c42a", "score": "0.5461854", "text": "func NewOrganization(pgsql postgres.Client) core.Organization {\n\treturn &organization{\n\t\tpg: pgsql,\n\t\tmainPg: pgsql.MainDatastore(),\n\t}\n}", "title": "" }, { "docid": "43aafa1740784ba6c65099d43444d155", "score": "0.5459123", "text": "func (s *GlAuth) CreateOrganization(ctx context.Context, req *pb.CreateOrganizationRequest) (*pb.CreateOrganizationResponse, error) {\n\tstart := time.Now().UnixNano()\n\tvar err error\n\n\tresp := &pb.CreateOrganizationResponse{}\n\tresp.ErrorCode = 401\n\tresp.ErrorMessage = \"not authorized\"\n\n\tok, aid := s.HasAdminAccess(ctx)\n\tif ok {\n\t\treq.MserviceId = aid\n\t\tresp, err = s.glService.CreateOrganization(ctx, req)\n\t} else if s.IsTokenExpired(ctx) {\n\t\tresp.ErrorCode = 498\n\t\tresp.ErrorMessage = tokenExpiredMessage\n\t}\n\n\tduration := time.Now().UnixNano() - start\n\tlevel.Info(s.logger).Log(\"endpoint\", \"CreateOrganization\",\n\t\t\"organization\", req.GetOrganizationName(),\n\t\t\"errcode\", resp.GetErrorCode(), \"duration\", duration)\n\n\treturn resp, err\n}", "title": "" }, { "docid": "d621364ec5a05962998bef5d38fa9f75", "score": "0.54043007", "text": "func CreateOrganization() *Organization {\n\tout := Organization{\n\t\torgs: map[string]organizations.Organization{},\n\t}\n\n\treturn &out\n}", "title": "" }, { "docid": "05cc4e9dd0628b8c8c86529c76ce67e2", "score": "0.5391381", "text": "func CreateUpdateOrganization(\n\torgDB *databases.Organization,\n\ttokenDB *databases.Token,\n\torganizationBuilderFactory organizations.OrganizationBuilderFactory,\n\tcmdBuilderFactory commands.CommandBuilderFactory,\n\tupdateBuilderFactory commands.UpdateBuilderFactory,\n) processors.Transaction {\n\tout := UpdateOrganization{\n\t\torgDB: orgDB,\n\t\ttokenDB: tokenDB,\n\t\torganizationBuilderFactory: organizationBuilderFactory,\n\t\tcmdBuilderFactory: cmdBuilderFactory,\n\t\tupdateBuilderFactory: updateBuilderFactory,\n\t}\n\n\treturn &out\n}", "title": "" }, { "docid": "eded1033b947223d026d35750c24fb1d", "score": "0.532982", "text": "func NewOrganization(type_ OrganizationsType) *Organization {\n\tthis := Organization{}\n\tthis.Type = type_\n\treturn &this\n}", "title": "" }, { "docid": "e2b5aaff9a5b845890089209d1e51c11", "score": "0.53195786", "text": "func (s *StaticOrganizationService) CreateOrganization(ctx context.Context, o *platform.Organization) error {\n\tpanic(\"not implemented\")\n}", "title": "" }, { "docid": "54da690da0611646b519bd557417be30", "score": "0.5318964", "text": "func CreateOrganizationFunc(w http.ResponseWriter, r *http.Request) {\n // Take the user POST data and serialize it.\n data := &serializer.OrganizationRequest{}\n\tif err := render.Bind(r, data); err != nil {\n\t\trender.Render(w, r, serializer.ErrInvalidRequest(err))\n\t\treturn\n\t}\n\n // Create our user model in our database from the serialized data.\n organization, _ := data.Save(r.Context())\n\n // Take newly created Organization model data object and serialize it\n // to be returned as the result for this API endpoint.\n render.Status(r, http.StatusCreated)\n\trender.Render(w, r, serializer.NewOrganizationDetailResponse(organization))\n}", "title": "" }, { "docid": "22a2eb3f8e5e9318d28350dca2b1ab6d", "score": "0.52150035", "text": "func (osc *Client) CreateOrg(companyName string, companyWebsite string) (*models.Organization, error) {\n\ttok, err := token.GetToken()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// use linux foundation logo as default\n\tlinuxFoundation, err := osc.SearchOrganization(\"Linux Foundation\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tclientAuth := runtimeClient.BearerToken(tok)\n\tdescription := \"No Description\"\n\tcompanyType := \"No Type\"\n\tcompanySource := \"No Source\"\n\tindustry := \"No Industry\"\n\tlogoURL := linuxFoundation[0].LogoURL\n\n\torg := models.CreateOrg{\n\t\tDescription: &description,\n\t\tName: &companyName,\n\t\tWebsite: &companyWebsite,\n\t\tIndustry: &industry,\n\t\tSource: &companySource,\n\t\tType: &companyType,\n\t\tLogoURL: &logoURL,\n\t}\n\n\tparams := &organizations.CreateOrgParams{\n\t\tOrg: &org,\n\t\tContext: context.Background(),\n\t}\n\n\tresult, err := osc.cl.Organizations.CreateOrg(params, clientAuth)\n\n\tif err != nil {\n\t\tlog.Warnf(\"Failed to create salesforce Company :%s , err: %+v \", companyName, err)\n\t\treturn nil, err\n\t}\n\n\treturn result.Payload, err\n}", "title": "" }, { "docid": "af1af70e371aed897b7aaf97fdf0940f", "score": "0.51931715", "text": "func BuildAddPayload(organizationAddBody string) (*organization.Organization, error) {\n\tvar err error\n\tvar body AddRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(organizationAddBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, example of valid JSON:\\n%s\", \"'{\\n \\\"name\\\": \\\"Creating a new request in netflix!\\\",\\n \\\"url\\\": \\\"http://www.google.com/\\\"\\n }'\")\n\t\t}\n\t\tif utf8.RuneCountInString(body.Name) > 200 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(\"body.name\", body.Name, utf8.RuneCountInString(body.Name), 200, false))\n\t\t}\n\t\terr = goa.MergeErrors(err, goa.ValidatePattern(\"body.url\", body.URL, \"(?i)^(https?|ftp)://[^\\\\s/$.?#].[^\\\\s]*$\"))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tv := &organization.Organization{\n\t\tName: body.Name,\n\t\tURL: body.URL,\n\t}\n\n\treturn v, nil\n}", "title": "" }, { "docid": "a22458eea056865092ea44cdf2b0d9c9", "score": "0.51644117", "text": "func CreateOrganization(iq IQ, name string) (string, error) {\n\tdoError := func(err error) error {\n\t\treturn fmt.Errorf(\"organization '%s' not created: %v\", name, err)\n\t}\n\n\trequest, err := json.Marshal(iqNewOrgRequest{Name: name})\n\tif err != nil {\n\t\treturn \"\", doError(err)\n\t}\n\n\tbody, _, err := iq.Post(restOrganization, bytes.NewBuffer(request))\n\tif err != nil {\n\t\treturn \"\", doError(err)\n\t}\n\n\tvar org Organization\n\tif err = json.Unmarshal(body, &org); err != nil {\n\t\treturn \"\", doError(err)\n\t}\n\n\treturn org.ID, nil\n}", "title": "" }, { "docid": "43dd7f4d84498d6aaf54c0a072a0f659", "score": "0.51409227", "text": "func NewAddOrganizationParams() *AddOrganizationParams {\n\tvar ()\n\treturn &AddOrganizationParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "d6860e9188e6b887c92d394704415a67", "score": "0.51386786", "text": "func CreateOrganizationHandler(w http.ResponseWriter, r *http.Request) {\n\tfunction := \"CreateOrganizationHandler\"\n\tif r.Method != \"POST\" {\n\t\tLogAndWriteErr(\n\t\t\tw,\n\t\t\terrors.New(\"Only POST requests are allowed at this route\"),\n\t\t\thttp.StatusMethodNotAllowed,\n\t\t\tfunction,\n\t\t)\n\t\treturn\n\t}\n\n\tbytes, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tLogAndWriteStatusBadRequest(w, err, function)\n\t\treturn\n\t}\n\tdefer r.Body.Close()\n\n\tvar body CreateOrganizationRequestBody\n\terr = json.Unmarshal(bytes, &body)\n\tif err != nil {\n\t\tLogAndWriteStatusBadRequest(w, err, function)\n\t\treturn\n\t}\n\n\tqueries, ok := r.URL.Query()[\"admin\"]\n\tif !ok || len(queries) > 1 {\n\t\tLogAndWriteErr(\n\t\t\tw,\n\t\t\terrors.New(\"request query parameters must contain 'admin'\"),\n\t\t\thttp.StatusBadRequest,\n\t\t\tfunction,\n\t\t)\n\t\treturn\n\t}\n\tadmin := queries[0]\n\n\tfmt.Println(body.Organization, admin)\n\n\terr = createOrganization(body.Organization, admin)\n\tif err != nil {\n\t\tLogAndWriteStatusInternalServerError(w, err, function)\n\t\treturn\n\t}\n\n\tLogAndWrite(\n\t\tw,\n\t\tserver.StrToBytes(\"Successfully created new organization\"),\n\t\thttp.StatusCreated,\n\t\tfunction,\n\t)\n}", "title": "" }, { "docid": "691271453d523750395273d477da7233", "score": "0.5134003", "text": "func BuildCreatePayload(bookCreateBody string) (*book.Book, error) {\n\tvar err error\n\tvar body CreateRequestBody\n\t{\n\t\terr = json.Unmarshal([]byte(bookCreateBody), &body)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"invalid JSON for body, \\nerror: %s, \\nexample of valid JSON:\\n%s\", err, \"'{\\n \\\"description\\\": \\\"Books are human\\\\'s best friend\\\",\\n \\\"id\\\": 1,\\n \\\"name\\\": \\\"book1\\\",\\n \\\"price\\\": 100\\n }'\")\n\t\t}\n\t\tif utf8.RuneCountInString(body.Name) > 100 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(\"body.name\", body.Name, utf8.RuneCountInString(body.Name), 100, false))\n\t\t}\n\t\tif utf8.RuneCountInString(body.Description) > 100 {\n\t\t\terr = goa.MergeErrors(err, goa.InvalidLengthError(\"body.description\", body.Description, utf8.RuneCountInString(body.Description), 100, false))\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tv := &book.Book{\n\t\tID: body.ID,\n\t\tName: body.Name,\n\t\tDescription: body.Description,\n\t\tPrice: body.Price,\n\t}\n\n\treturn v, nil\n}", "title": "" }, { "docid": "fab31f930fb8862c25bf57302d52f759", "score": "0.5133984", "text": "func (c *ULBClient) NewCreateULBRequest() *CreateULBRequest {\n\treq := &CreateULBRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(false)\n\treturn req\n}", "title": "" }, { "docid": "5b16816fe3d7153eb18bda3aae12dbd3", "score": "0.5119691", "text": "func (ps *PgStore) CreateOrganization(ctx context.Context, org *org.Organization) error {\n\tif err := org.Validate(); err != nil {\n\t\treturn errors.Wrap(err, \"validate error\")\n\t}\n\n\tnow := time.Now()\n\n\terr := sqlx.GetContext(ctx, ps.db, &org.ID, `\n\t\tinsert into organization (\n\t\t\tcreated_at,\n\t\t\tupdated_at,\n\t\t\tname,\n\t\t\tdisplay_name,\n\t\t\tcan_have_gateways,\n\t\t\tmax_gateway_count,\n\t\t\tmax_device_count\n\t\t) values ($1, $2, $3, $4, $5, $6, $7) returning id`,\n\t\tnow,\n\t\tnow,\n\t\torg.Name,\n\t\torg.DisplayName,\n\t\torg.CanHaveGateways,\n\t\torg.MaxGatewayCount,\n\t\torg.MaxDeviceCount,\n\t)\n\tif err != nil {\n\t\treturn handlePSQLError(Insert, err, \"insert error\")\n\t}\n\torg.CreatedAt = now\n\torg.UpdatedAt = now\n\tlog.WithFields(log.Fields{\n\t\t\"id\": org.ID,\n\t\t\"name\": org.Name,\n\t\t\"ctx_id\": ctx.Value(logging.ContextIDKey),\n\t}).Info(\"organization created\")\n\treturn nil\n}", "title": "" }, { "docid": "d2fb8537c5bd65889958c8c6f82b9faf", "score": "0.51016116", "text": "func NewOrganization() *Organization {\n\tthis := Organization{}\n\treturn &this\n}", "title": "" }, { "docid": "b9d3a1df5d78775a0c2fdf26903920c5", "score": "0.5101354", "text": "func (s *GithubSCM) CreateOrganization(ctx context.Context, opt *OrganizationOptions) (*pb.Organization, error) {\n\treturn nil, ErrNotSupported{\n\t\tSCM: \"github\",\n\t\tMethod: \"CreateOrganization\",\n\t}\n}", "title": "" }, { "docid": "4d85208dbea7d9a0894e61bb532aeb7e", "score": "0.5083997", "text": "func NewCreateFamilyParams() *CreateFamilyParams {\n\tvar ()\n\treturn &CreateFamilyParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "0b1b49b35e87541ec269211a34386939", "score": "0.5066779", "text": "func NewInstantiatePostRequestBody()(*InstantiatePostRequestBody) {\n m := &InstantiatePostRequestBody{\n }\n m.SetAdditionalData(make(map[string]interface{}));\n return m\n}", "title": "" }, { "docid": "1ffc57aa01ffdb807469531042cb5517", "score": "0.50667715", "text": "func NewOrganizationCreateResponse() *OrganizationCreateResponse {\n\tthis := OrganizationCreateResponse{}\n\treturn &this\n}", "title": "" }, { "docid": "d21f1addd04940703bf5e5907cc665b4", "score": "0.49915913", "text": "func (o OrganizationCreateBody) MarshalJSON() ([]byte, error) {\n\ttoSerialize := map[string]interface{}{}\n\tif o.UnparsedObject != nil {\n\t\treturn json.Marshal(o.UnparsedObject)\n\t}\n\tif o.Billing != nil {\n\t\ttoSerialize[\"billing\"] = o.Billing\n\t}\n\ttoSerialize[\"name\"] = o.Name\n\tif o.Subscription != nil {\n\t\ttoSerialize[\"subscription\"] = o.Subscription\n\t}\n\n\tfor key, value := range o.AdditionalProperties {\n\t\ttoSerialize[key] = value\n\t}\n\treturn json.Marshal(toSerialize)\n}", "title": "" }, { "docid": "0131c35198c0bec2e7df850f09dc5f18", "score": "0.49689075", "text": "func (o *IdentitiesCreateAccountParams) SetBody(body *models.V1CreateAccountRequest) {\n\to.Body = body\n}", "title": "" }, { "docid": "286d96de2fd8447881e2db851adf70e6", "score": "0.49434662", "text": "func CreateInsertOrganization(orgID *uuid.UUID, tokenID *uuid.UUID, percentNeededForConcensus float64) *InsertOrganization {\n\tout := InsertOrganization{\n\t\tOrgID: orgID,\n\t\tTokenID: tokenID,\n\t\tPercentNeededForConcensus: percentNeededForConcensus,\n\t}\n\n\treturn &out\n}", "title": "" }, { "docid": "9f403fdc678415b28b8b449ee8597189", "score": "0.49287686", "text": "func (o *CalendarServiceCreateEventParams) SetBody(body *models.CreateEventRequest) {\n\to.Body = body\n}", "title": "" }, { "docid": "8520515ae3580b9798eaba6986a2813d", "score": "0.4885833", "text": "func (c *Client) NewOrg(name string) (Org, error) {\n\torg := Org{Name: name}\n\tnewOrg := map[string]string{\"name\": name}\n\tres, err := c.doJSONRequest(\"POST\", \"/api/orgs\", newOrg)\n\tif err != nil {\n\t\treturn org, err\n\t}\n\n\tif !res.OK() {\n\t\treturn org, res.Error()\n\t}\n\n\tbody := struct {\n\t\tID int64 `json:\"orgId\"`\n\t}{0}\n\n\terr = res.BindJSON(&body)\n\tif err == nil {\n\t\torg.ID = body.ID\n\t}\n\n\treturn org, err\n}", "title": "" }, { "docid": "6e5a27ee8a0bc21a02877e05b301bf04", "score": "0.48712993", "text": "func NewOrganizationAPI(h *store.Handler, nsCli *nscli.Client) *OrganizationAPI {\n\treturn &OrganizationAPI{\n\t\tst: h,\n\t\tnsCli: nsCli,\n\t}\n}", "title": "" }, { "docid": "8a11b5c2b081604d1dd4a56d7e1b7bd8", "score": "0.48653919", "text": "func CreateOrganization(org, owner *User) (err error) {\n\tif err = IsUsableName(org.Name); err != nil {\n\t\treturn err\n\t}\n\n\tisExist, err := IsUserExist(0, org.Name)\n\tif err != nil {\n\t\treturn err\n\t} else if isExist {\n\t\treturn ErrUserAlreadyExist{org.Name}\n\t}\n\n\torg.LowerName = strings.ToLower(org.Name)\n\torg.FullName = org.Name\n\torg.Rands = GetUserSalt()\n\torg.Salt = GetUserSalt()\n\torg.UseCustomAvatar = true\n\torg.MaxRepoCreation = -1\n\torg.NumTeams = 1\n\torg.NumMembers = 1\n\n\tsess := x.NewSession()\n\tdefer sessionRelease(sess)\n\tif err = sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\n\tif _, err = sess.Insert(org); err != nil {\n\t\treturn fmt.Errorf(\"insert organization: %v\", err)\n\t}\n\torg.GenerateRandomAvatar()\n\n\t// Add initial creator to organization and owner team.\n\tif _, err = sess.Insert(&OrgUser{\n\t\tUid: owner.Id,\n\t\tOrgID: org.Id,\n\t\tIsOwner: true,\n\t\tNumTeams: 1,\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"insert org-user relation: %v\", err)\n\t}\n\n\t// Create default owner team.\n\tt := &Team{\n\t\tOrgID: org.Id,\n\t\tLowerName: strings.ToLower(OWNER_TEAM),\n\t\tName: OWNER_TEAM,\n\t\tAuthorize: ACCESS_MODE_OWNER,\n\t\tNumMembers: 1,\n\t}\n\tif _, err = sess.Insert(t); err != nil {\n\t\treturn fmt.Errorf(\"insert owner team: %v\", err)\n\t}\n\n\tif _, err = sess.Insert(&TeamUser{\n\t\tUid: owner.Id,\n\t\tOrgID: org.Id,\n\t\tTeamID: t.ID,\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"insert team-user relation: %v\", err)\n\t}\n\n\tif err = os.MkdirAll(UserPath(org.Name), os.ModePerm); err != nil {\n\t\treturn fmt.Errorf(\"create directory: %v\", err)\n\t}\n\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "706791a9bc175d28dfe395efac814cb7", "score": "0.48486874", "text": "func NewCreateBundleParams() *CreateBundleParams {\n\tvar ()\n\treturn &CreateBundleParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "e0eb263a1d659efc229efc1c50cd8d0a", "score": "0.48374805", "text": "func CreateCreateOrganizationResponse() (response *CreateOrganizationResponse) {\n\tresponse = &CreateOrganizationResponse{\n\t\tBaseResponse: &responses.BaseResponse{},\n\t}\n\treturn\n}", "title": "" }, { "docid": "e499460b858484e4519e85d5338ac318", "score": "0.48151854", "text": "func NewCreateRoleBindingParams() *CreateRoleBindingParams {\n\tvar ()\n\treturn &CreateRoleBindingParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "5ae67ce7f41f12b09be6154e11e48c86", "score": "0.4807483", "text": "func NewCreatePayload(body *CreateRequestBody, orgID uint, apiVersion string, token *string) *publishedtemplate.CreatePayload {\n\tv := &publishedtemplate.CreatePayload{\n\t\tTemplateHref: *body.TemplateHref,\n\t}\n\tv.OrgID = orgID\n\tv.APIVersion = apiVersion\n\tv.Token = token\n\treturn v\n}", "title": "" }, { "docid": "199b3d007eb570fe67bf9ad9f333e305", "score": "0.47973275", "text": "func NewAddRequestBody(p *tasks.Task) *AddRequestBody {\n\tbody := &AddRequestBody{\n\t\tTitle: p.Title,\n\t\tDescription: p.Description,\n\t\tCreatedDate: p.CreatedDate,\n\t\tUpdatedDate: p.UpdatedDate,\n\t\tDueDate: p.DueDate,\n\t\tStatus: p.Status,\n\t}\n\tif p.Owner != nil {\n\t\tbody.Owner = marshalTasksStoredUserToStoredUserRequestBody(p.Owner)\n\t}\n\tif p.Assignee != nil {\n\t\tbody.Assignee = marshalTasksStoredUserToStoredUserRequestBody(p.Assignee)\n\t}\n\treturn body\n}", "title": "" }, { "docid": "81eef195934f67b5c6ae258b738f3643", "score": "0.4795901", "text": "func NewOrganization(organization Organization, repo Repository) func(handler http.Handler) http.Handler {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tquery := r.URL.Query()\n\n\t\t\tlog.Debug(\"Starting organization auth middleware\")\n\t\t\tlogger := log.WithFields(log.Fields{\n\t\t\t\t\"path\": r.RequestURI,\n\t\t\t\t\"origin\": r.RemoteAddr,\n\t\t\t})\n\n\t\t\tusername, password, authOK := r.BasicAuth()\n\t\t\tif !authOK {\n\t\t\t\terrors.Handler(w, r, ErrNotAuthorized)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tvar found bool\n\t\t\tusers, err := repo.FindAll()\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).Error(\"Error when getting all users\")\n\t\t\t\terrors.Handler(w, r, errors.New(http.StatusInternalServerError, \"there was an error when looking for users\"))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\thash := encrypt.Hash{}\n\t\t\tvar organizationConfig *OrganizationConfig\n\n\t\t\tfor _, u := range users {\n\t\t\t\t//if username == u.Username && (subtle.ConstantTimeCompare([]byte(password), []byte(u.Password)) == 1) {\n\t\t\t\tif username == u.Username && (hash.Compare(u.Password, password) == nil) {\n\t\t\t\t\tfound = true\n\t\t\t\t\torganization.Organization = u.Organization\n\t\t\t\t\torganizationConfig, err = repo.FindOrganization(u.Organization)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.WithError(err).Error(\"Error finding organization\")\n\t\t\t\t\t\terrors.Handler(w, r, errors.New(http.StatusInternalServerError, \"there was an error when looking for organization\"))\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !found {\n\t\t\t\tlogger.Debug(\"Invalid user/password provided.\")\n\t\t\t\terrors.Handler(w, r, ErrNotAuthorized)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// if the header already exists, delete it and write a new one it\n\t\t\tif organization.Organization != \"\" {\n\t\t\t\tif r.Header.Get(organizationHeader) != \"\" {\n\t\t\t\t\tr.Header.Del(organizationHeader)\n\t\t\t\t}\n\t\t\t\tr.Header.Add(organizationHeader, organization.Organization)\n\n\t\t\t\tif r.Header.Get(organizationConfigHeader) != \"\" {\n\t\t\t\t\tr.Header.Del(organizationConfigHeader)\n\t\t\t\t}\n\t\t\t\tbOrganizationConfig, err := json.Marshal(organizationConfig)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.WithError(err).Error(\"Error marshaling organization for config header\")\n\t\t\t\t\terrors.Handler(w, r, errors.New(http.StatusInternalServerError, \"there was an error when setting config header\"))\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\tr.Header.Add(organizationConfigHeader, string(bOrganizationConfig))\n\t\t\t} else {\n\t\t\t\tlog.Debugf(\"No organization associated with user\")\n\t\t\t}\n\n\t\t\tr.URL.RawQuery = query.Encode()\n\t\t\tnext.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "00cc81cd98f1b712df854f6ffffee619", "score": "0.47798413", "text": "func New(c Config) *UserOrganizationAPI {\n\tvar (\n\t\thost = DefaultHost\n\t\tbasePath = DefaultBasePath\n\t\tschemes = DefaultSchemes\n\t)\n\n\tif c.URL != nil {\n\t\thost = c.URL.Host\n\t\tbasePath = c.URL.Path\n\t\tschemes = []string{c.URL.Scheme}\n\t}\n\n\ttransport := rtclient.New(host, basePath, schemes)\n\tif c.Transport != nil {\n\t\ttransport.Transport = c.Transport\n\t}\n\n\tcli := new(UserOrganizationAPI)\n\tcli.Transport = transport\n\tcli.AccessManagement = access_management.New(transport, strfmt.Default, c.AuthInfo)\n\tcli.HpcManagement = hpc_management.New(transport, strfmt.Default, c.AuthInfo)\n\tcli.OrganizationManagement = organization_management.New(transport, strfmt.Default, c.AuthInfo)\n\tcli.ProjectManagement = project_management.New(transport, strfmt.Default, c.AuthInfo)\n\tcli.StatusManagement = status_management.New(transport, strfmt.Default, c.AuthInfo)\n\tcli.UserManagement = user_management.New(transport, strfmt.Default, c.AuthInfo)\n\treturn cli\n}", "title": "" }, { "docid": "7c9464eda0190da5a6b02980f5a1f538", "score": "0.4767419", "text": "func NewAddOrganizationBadRequest() *AddOrganizationBadRequest {\n\treturn &AddOrganizationBadRequest{}\n}", "title": "" }, { "docid": "74385a4bf8a4dc8613c00ddade7b50b4", "score": "0.4724594", "text": "func NewAdminCreateIdentityBody(schemaId string, traits map[string]interface{}) *AdminCreateIdentityBody {\n\tthis := AdminCreateIdentityBody{}\n\tthis.SchemaId = schemaId\n\tthis.Traits = traits\n\treturn &this\n}", "title": "" }, { "docid": "124ef8cab2b06d645b86b5a3e1740129", "score": "0.470725", "text": "func (e Endpoints) CreateOrg(ctx context.Context, data model.Organization) (rs string, err error) {\n\trequest := CreateOrgRequest{Data: data}\n\tresponse, err := e.CreateOrgEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn response.(CreateOrgResponse).Rs, response.(CreateOrgResponse).Err\n}", "title": "" }, { "docid": "ae92693bcfaf9e6d4ef0e200e67bbab8", "score": "0.47008747", "text": "func (api *API) CreateAccessOrganization(accountID string, accessOrganization AccessOrganization) (AccessOrganization, error) {\n\turi := \"/accounts/\" + accountID + \"/access/organizations\"\n\n\tres, err := api.makeRequest(\"POST\", uri, accessOrganization)\n\tif err != nil {\n\t\treturn AccessOrganization{}, errors.Wrap(err, errMakeRequestError)\n\t}\n\n\tvar accessOrganizationDetailResponse AccessOrganizationDetailResponse\n\terr = json.Unmarshal(res, &accessOrganizationDetailResponse)\n\tif err != nil {\n\t\treturn AccessOrganization{}, errors.Wrap(err, errUnmarshalError)\n\t}\n\n\treturn accessOrganizationDetailResponse.Result, nil\n}", "title": "" }, { "docid": "182b98c9a2d0e5d3435727b0ed799b99", "score": "0.46702155", "text": "func NewAgreement(agreementId uint64, agreementNumber string, agreementName string, description string, loanAmount sdk.Coin, amountPaid sdk.Coin, amountRemaining sdk.Coin, subtotal sdk.Coin, total sdk.Coin, party sdk.AccAddress, counterparty sdk.AccAddress, dueDate time.Time, periodStartDate time.Time, periodEndDate time.Time, paid bool, active bool, createdTime time.Time) Loan {\r\n\treturn Agreement{\r\n\t\tAgreementID: \t agreementID,\r\n\t\tAgreementNumber: agreementNumber,\r\n\t\tAgreementName: \t agreementName,\r\n\t\tAgreementType: \t\t agreementType,\r\n\t\tAgreementStatus: \t agreementStatus,\r\n\t\tTotalAgreementValue: totalAgreementValue,\r\n\t\tParty:\t\t \t party,\r\n\t\tCounterparty:\t \t counterparty,\r\n\t\tAgreementStartBlock: AgreementStartBlock,\r\n\t\tAgreementEndBlock: \t AgreementEndBlock,\r\n\t\tPaid:\t\t\t \t paid,\r\n\t\tActive: \t\t \t active,\r\n\t\tCreatedTime: \t createdTime,\r\n\t}\r\n}", "title": "" }, { "docid": "9d45465cc8e08e072511a159b9bca243", "score": "0.46571875", "text": "func CreateHolderWithOrganization(org *Organization) *Holder {\n\tout := Holder{\n\t\tUsr: nil,\n\t\tOrg: org,\n\t}\n\n\treturn &out\n}", "title": "" }, { "docid": "ecbe984b9feeea4004cfe2462ad79811", "score": "0.46508175", "text": "func NewCreateResponseBody(res *publishedtemplate.CreateResult) *CreateResponseBody {\n\tbody := &CreateResponseBody{\n\t\tLocation: res.Location,\n\t}\n\treturn body\n}", "title": "" }, { "docid": "f9d294c1ef9b5379b179ee8eae79c87c", "score": "0.4640069", "text": "func NewCreatePaymentParams() *CreatePaymentParams {\n\tvar ()\n\treturn &CreatePaymentParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "97e1c53c4bc08a668a50d579e409e588", "score": "0.46380585", "text": "func ValidateCreateRequestBody(body *CreateRequestBody) (err error) {\n\tif body.TemplateHref == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingFieldError(\"template_href\", \"body\"))\n\t}\n\tif body.TemplateHref != nil {\n\t\terr = goa.MergeErrors(err, goa.ValidatePattern(\"body.template_href\", *body.TemplateHref, \"^/api/governance/projects/[0-9]+/policy_templates/[0-9a-f]+$\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "47d70661697a3d4c1b39ae0e383d68f2", "score": "0.46106812", "text": "func New(instance string, options map[string][]http.ClientOption) (service.OrganizationService, error) {\n\tif !strings.HasPrefix(instance, \"http\") {\n\t\tinstance = \"http://\" + instance\n\t}\n\tu, err := url.Parse(instance)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar createUserOrganizationByIdEndpoint endpoint.Endpoint\n\t{\n\t\tcreateUserOrganizationByIdEndpoint = http.NewClient(\"POST\", copyURL(u, \"/api/v1/organization\"), encodeHTTPGenericRequest, decodeCreateUserOrganizationByIdResponse, options[\"CreateUserOrganizationById\"]...).Endpoint()\n\t}\n\n\tvar deleteUserOrganizationByIdEndpoint endpoint.Endpoint\n\t{\n\t\tdeleteUserOrganizationByIdEndpoint = http.NewClient(\"DELETE\", copyURL(u, \"/api/v1/organization/{organizationId}\"), encodeHTTPGenericRequest, decodeDeleteUserOrganizationByIdResponse, options[\"DeleteUserOrganizationById\"]...).Endpoint()\n\t}\n\n\tvar getUserOrganizationByIdEndpoint endpoint.Endpoint\n\t{\n\t\tgetUserOrganizationByIdEndpoint = http.NewClient(\"GET\", copyURL(u, \"/api/v1/organization/{organizationId}\"), encodeHTTPGenericRequest, decodeGetUserOrganizationByIdResponse, options[\"GetUserOrganizationById\"]...).Endpoint()\n\t}\n\n\tvar getUserOrganizationsEndpoint endpoint.Endpoint\n\t{\n\t\tgetUserOrganizationsEndpoint = http.NewClient(\"GET\", copyURL(u, \"/api/v1/organization\"), encodeHTTPGenericRequest, decodeGetUserOrganizationsResponse, options[\"GetUserOrganizations\"]...).Endpoint()\n\t}\n\n\tvar updateUserOrganizationByIdEndpoint endpoint.Endpoint\n\t{\n\t\tupdateUserOrganizationByIdEndpoint = http.NewClient(\"PUT\", copyURL(u, \"/api/v1/organization\"), encodeHTTPGenericRequest, decodeUpdateUserOrganizationByIdResponse, options[\"UpdateUserOrganizationById\"]...).Endpoint()\n\t}\n\n\tvar healthEndpoint endpoint.Endpoint\n\t{\n\t\thealthEndpoint = http.NewClient(\"GET\", copyURL(u, \"/api/v1/organization/health\"), encodeHTTPGenericRequest, decodeHealthResponse, options[\"Health\"]...).Endpoint()\n\t}\n\n\treturn endpoint1.Endpoints{\n\t\tCreateUserOrganizationByIdEndpoint: createUserOrganizationByIdEndpoint,\n\t\tDeleteUserOrganizationByIdEndpoint: deleteUserOrganizationByIdEndpoint,\n\t\tGetUserOrganizationByIdEndpoint: getUserOrganizationByIdEndpoint,\n\t\tGetUserOrganizationsEndpoint: getUserOrganizationsEndpoint,\n\t\tHealthEndpoint: healthEndpoint,\n\t\tUpdateUserOrganizationByIdEndpoint: updateUserOrganizationByIdEndpoint,\n\t}, nil\n}", "title": "" }, { "docid": "18ab5e69077fbeafd218c490ecba7f61", "score": "0.4610513", "text": "func NewCreatePortParams() *CreatePortParams {\n\tvar ()\n\treturn &CreatePortParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "3996611d9a34ed9a837c5eeca0f21347", "score": "0.46094617", "text": "func NewCreateBadRequest(body *CreateBadRequestResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "bb584c511a02a2664793d5dd78dc434b", "score": "0.46060392", "text": "func (c *Client) NewCreateCodebaseRequest(ctx context.Context, path string, payload *CreateCodebasePayload) (*http.Request, error) {\n\tvar body bytes.Buffer\n\terr := c.Encoder.Encode(payload, &body, \"*/*\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to encode body: %s\", err)\n\t}\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"POST\", u.String(), &body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader := req.Header\n\theader.Set(\"Content-Type\", \"application/json\")\n\tif c.JWTSigner != nil {\n\t\tc.JWTSigner.Sign(req)\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "64f8823f72093c1894324f5eb485a3be", "score": "0.46053216", "text": "func (mr *MockServiceMockRecorder) CreateOrganization(ctx, organization interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"CreateOrganization\", reflect.TypeOf((*MockService)(nil).CreateOrganization), ctx, organization)\n}", "title": "" }, { "docid": "d6ed4d0d8220ce5e4cf6ced30e2a7c4a", "score": "0.46042183", "text": "func (b *CreateBody) Validate() error {\n\treturn validation.ValidateStruct(b,\n\t\tvalidation.Field(&b.ModelID, validation.Required),\n\t\tvalidation.Field(&b.Mjml, validation.Required),\n\t\tvalidation.Field(&b.Variables, validation.Required),\n\t\tvalidation.Field(&b.InsUserID, validation.Required),\n\t)\n}", "title": "" }, { "docid": "4157b19c0bccc84164d4b385d2a21cd1", "score": "0.45855218", "text": "func (s Calculator_defFunction_Params) NewBody() (Calculator_Expression, error) {\n\tss, err := NewCalculator_Expression(s.Struct.Segment())\n\tif err != nil {\n\t\treturn Calculator_Expression{}, err\n\t}\n\terr = s.Struct.SetPtr(0, ss.Struct.ToPtr())\n\treturn ss, err\n}", "title": "" }, { "docid": "c8a748dfe63b757a66b5d52bd8b00848", "score": "0.4582294", "text": "func (c *VPCClient) NewCreateSubnetRequest() *CreateSubnetRequest {\n\tcfg := c.client.GetConfig()\n\n\treturn &CreateSubnetRequest{\n\t\tCommonBase: request.CommonBase{\n\t\t\tRegion: cfg.Region,\n\t\t\tProjectId: cfg.ProjectId,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "03b663b9a6a56255e27adbb9c83561ce", "score": "0.4580819", "text": "func (bs *BuildsService) Create(org string, pipeline string, b *CreateBuild) (*Build, *Response, error) {\n\tu := fmt.Sprintf(\"v2/organizations/%s/pipelines/%s/builds\", org, pipeline)\n\n\treq, err := bs.client.NewRequest(\"POST\", u, b)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tbuild := new(Build)\n\tresp, err := bs.client.Do(req, build)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn build, resp, err\n}", "title": "" }, { "docid": "3ee527574a62fa1e26f78c5ed77be122", "score": "0.45756024", "text": "func (s *NetworkACLService) NewCreateNetworkACLParams(protocol string) *CreateNetworkACLParams {\n\tp := &CreateNetworkACLParams{}\n\tp.p = make(map[string]interface{})\n\tp.p[\"protocol\"] = protocol\n\treturn p\n}", "title": "" }, { "docid": "7ac9c4893b1e95d9adff204c6586eb8c", "score": "0.4570654", "text": "func New(bundles []bundle.Bundle) Antibody {\n\treturn Antibody{bundles: bundles}\n}", "title": "" }, { "docid": "ad155c85c47cc43ee89da82a3fdc51bf", "score": "0.45682493", "text": "func NewBody() Body {\n\treturn &stdoutBody{}\n}", "title": "" }, { "docid": "e1aecc22327bf38d4796677579a73fef", "score": "0.45677337", "text": "func NewRoleBindingCreateRequest(accountId string, roleId string, type_ string) *RoleBindingCreateRequest {\n\tthis := RoleBindingCreateRequest{}\n\tthis.AccountId = accountId\n\tthis.RoleId = roleId\n\tthis.Type = type_\n\treturn &this\n}", "title": "" }, { "docid": "7c00ae9fbba7fe85cc82b4cb813701ac", "score": "0.45546135", "text": "func (gc *GrafanaClient) CreateOrgHandler(c *gin.Context) {\n\tak := ack.Gin(c)\n\n\torgName := c.Param(\"orgName\")\n\n\torg := GraOrg{\n\t\tName: orgName,\n\t}\n\n\t// Create an organization\n\t// https://grafana.com/docs/http_api/org/#create-organization\n\tcode, resp, err := gc.CmdObj(\"POST\", \"/api/orgs\", 0, org)\n\tif err != nil {\n\t\tak.GinErrorAbort(500, \"GrafanaClientError\", err.Error())\n\t\treturn\n\t}\n\n\tif code != 200 {\n\t\tak.GinErrorAbort(code, \"Non200\", string(*resp))\n\t\treturn\n\t}\n\n\tgcOrg := &GraCreateOrgResponse{}\n\n\terr = json.Unmarshal(*resp, gcOrg)\n\tif err != nil {\n\t\tak.SetPayload(string(*resp))\n\t\tak.GinErrorAbort(code, \"UnmarshalError\", err.Error())\n\t}\n\n\tuser := GraUser{\n\t\tName: orgName,\n\t\tLogin: orgName,\n\t\tPassword: getSimplePassword(),\n\t}\n\n\t// Create a global user\n\t// https://grafana.com/docs/http_api/admin/#global-users\n\tcode, resp, err = gc.CmdObj(\"POST\", \"/api/admin/users\", 0, user)\n\tif err != nil {\n\t\tak.GinErrorAbort(500, \"GrafanaClientError\", err.Error())\n\t\treturn\n\t}\n\n\tif code != 200 {\n\t\t// @TODO rollback?\n\t\tak.GinErrorAbort(code, \"Non200\", string(*resp))\n\t\treturn\n\t}\n\n\tgcUsr := &GraCreateUserResponse{}\n\n\terr = json.Unmarshal(*resp, gcUsr)\n\tif err != nil {\n\t\t// @TODO rollback?\n\t\tak.SetPayload(string(*resp))\n\t\tak.GinErrorAbort(code, \"Non200\", err.Error())\n\t}\n\n\tgcLoginRole := &GraUserOrgRole{\n\t\tLoginOrEmail: orgName,\n\t\tRole: \"Viewer\",\n\t}\n\n\t// Remove new global user from org 1\n\t// https://grafana.com/docs/http_api/org/#delete-user-in-organization\n\tcode, resp, err = gc.CmdObj(\"DELETE\",\n\t\tfmt.Sprintf(\"/api/orgs/1/users/%d\", gcUsr.Id),\n\t\t0,\n\t\tgcLoginRole,\n\t)\n\tif err != nil {\n\t\t// @TODO rollback?\n\t\tak.GinErrorAbort(500, \"GrafanaClientError\", err.Error())\n\t\treturn\n\t}\n\n\tif code != 200 {\n\t\t// @TODO rollback?\n\t\tak.GinErrorAbort(code, \"Non200\", string(*resp))\n\t\treturn\n\t}\n\n\t// Update the new org with the new user.\n\t// https://grafana.com/docs/http_api/org/#update-users-in-organization\n\tcode, resp, err = gc.CmdObj(\"POST\",\n\t\tfmt.Sprintf(\"/api/orgs/%d/users\", gcOrg.OrgId),\n\t\t0,\n\t\tgcLoginRole,\n\t)\n\tif err != nil {\n\t\t// @TODO rollback?\n\t\tak.GinErrorAbort(500, \"GrafanaClientError\", err.Error())\n\t\treturn\n\t}\n\n\tif code != 200 {\n\t\t// @TODO rollback?\n\t\tak.GinErrorAbort(code, \"Non200\", string(*resp))\n\t\treturn\n\t}\n\n\tgcr := GraCreateResult{\n\t\tOrg: *gcOrg,\n\t\tUser: user,\n\t}\n\n\tak.SetPayloadType(\"GraCreateResult\")\n\tak.GinSend(gcr)\n}", "title": "" }, { "docid": "550310623ca906d2a96560c02b41fd35", "score": "0.4549928", "text": "func (client *Client) CreateOrganizationWithChan(request *CreateOrganizationRequest) (<-chan *CreateOrganizationResponse, <-chan error) {\n\tresponseChan := make(chan *CreateOrganizationResponse, 1)\n\terrChan := make(chan error, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tdefer close(responseChan)\n\t\tdefer close(errChan)\n\t\tresponse, err := client.CreateOrganization(request)\n\t\tif err != nil {\n\t\t\terrChan <- err\n\t\t} else {\n\t\t\tresponseChan <- response\n\t\t}\n\t})\n\tif err != nil {\n\t\terrChan <- err\n\t\tclose(responseChan)\n\t\tclose(errChan)\n\t}\n\treturn responseChan, errChan\n}", "title": "" }, { "docid": "2ab3cac669970a6a90989aad2963fd8f", "score": "0.45393786", "text": "func (o *CreateBundleParams) WithRequestBody(requestBody *models.ConfigurationBundle) *CreateBundleParams {\n\to.SetRequestBody(requestBody)\n\treturn o\n}", "title": "" }, { "docid": "07586536ff13a10f0f442539cf0c4db3", "score": "0.45273128", "text": "func NewAddUserToOrganizationParams() *AddUserToOrganizationParams {\n\tvar ()\n\treturn &AddUserToOrganizationParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "8e52c3b2b5293ef78e3e22221fbddb8a", "score": "0.45173132", "text": "func (client *Client) CreateOrganizationWithCallback(request *CreateOrganizationRequest, callback func(response *CreateOrganizationResponse, err error)) <-chan int {\n\tresult := make(chan int, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tvar response *CreateOrganizationResponse\n\t\tvar err error\n\t\tdefer close(result)\n\t\tresponse, err = client.CreateOrganization(request)\n\t\tcallback(response, err)\n\t\tresult <- 1\n\t})\n\tif err != nil {\n\t\tdefer close(result)\n\t\tcallback(nil, err)\n\t\tresult <- 0\n\t}\n\treturn result\n}", "title": "" }, { "docid": "19658ec32bddcab16f0468171a46f65e", "score": "0.45024595", "text": "func buildBody(configuration configuration, level, title string, extras map[string]interface{}) map[string]interface{} {\n\ttimestamp := time.Now().Unix()\n\n\tdata := map[string]interface{}{\n\t\t\"environment\": configuration.environment,\n\t\t\"title\": title,\n\t\t\"level\": level,\n\t\t\"timestamp\": timestamp,\n\t\t\"platform\": configuration.platform,\n\t\t\"language\": \"go\",\n\t\t\"code_version\": configuration.codeVersion,\n\t\t\"server\": map[string]interface{}{\n\t\t\t\"host\": configuration.serverHost,\n\t\t\t\"root\": configuration.serverRoot,\n\t\t},\n\t\t\"notifier\": map[string]interface{}{\n\t\t\t\"name\": NAME,\n\t\t\t\"version\": VERSION,\n\t\t},\n\t}\n\n\tcustom := buildCustom(configuration.custom, extras)\n\tif custom != nil {\n\t\tdata[\"custom\"] = custom\n\t}\n\n\tperson := configuration.person\n\tif person.id != \"\" {\n\t\tdata[\"person\"] = map[string]string{\n\t\t\t\"id\": person.id,\n\t\t\t\"username\": person.username,\n\t\t\t\"email\": person.email,\n\t\t}\n\t}\n\n\treturn map[string]interface{}{\n\t\t\"access_token\": configuration.token,\n\t\t\"data\": data,\n\t}\n}", "title": "" }, { "docid": "3cf782a41213cc4a86f453e518237ee2", "score": "0.45011505", "text": "func NewAddOrganizationParamsWithTimeout(timeout time.Duration) *AddOrganizationParams {\n\tvar ()\n\treturn &AddOrganizationParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "b4e8a55ab33e8ce33fc913ba8b56c5cb", "score": "0.4489263", "text": "func (o *CreateRoleBindingParams) WithBody(body *models.RoleBinding) *CreateRoleBindingParams {\n\to.SetBody(body)\n\treturn o\n}", "title": "" }, { "docid": "b0569377c7ad894bf248af3670fbd7be", "score": "0.44809133", "text": "func NewCreatePaymentParamsWithTimeout(timeout time.Duration) *CreatePaymentParams {\n\tvar ()\n\treturn &CreatePaymentParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "4de5fd10b9eb1c6c65052228936ec28c", "score": "0.4474817", "text": "func NewModifyOrganizationBadRequest() *ModifyOrganizationBadRequest {\n\treturn &ModifyOrganizationBadRequest{}\n}", "title": "" }, { "docid": "7b4440b4b354f4899978d4b93771cbf8", "score": "0.44597933", "text": "func (c *Client) NewCreateCompanyBranchHyCompanybranchRequest(ctx context.Context, path string, payload *CreateCompanyBranchHyCompanybranchPayload, contentType string) (*http.Request, error) {\n\tvar body bytes.Buffer\n\tif contentType == \"\" {\n\t\tcontentType = \"*/*\" // Use default encoder\n\t}\n\terr := c.Encoder.Encode(payload, &body, contentType)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to encode body: %s\", err)\n\t}\n\tscheme := c.Scheme\n\tif scheme == \"\" {\n\t\tscheme = \"http\"\n\t}\n\tu := url.URL{Host: c.Host, Scheme: scheme, Path: path}\n\treq, err := http.NewRequest(\"POST\", u.String(), &body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\theader := req.Header\n\tif contentType == \"*/*\" {\n\t\theader.Set(\"Content-Type\", \"application/xml\")\n\t} else {\n\t\theader.Set(\"Content-Type\", contentType)\n\t}\n\tif c.JWTSigner != nil {\n\t\tif err := c.JWTSigner.Sign(req); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "48d08266a5383e232c57f554145003fc", "score": "0.4455723", "text": "func NewSignupRequestBody(p *userservice.SignupPayload) *SignupRequestBody {\n\tbody := &SignupRequestBody{\n\t\tEmail: p.Email,\n\t}\n\treturn body\n}", "title": "" }, { "docid": "cc44080f1a0a3827912f9c50a001d8c6", "score": "0.44390348", "text": "func NewOrgEntry() *Entry {\n\tself := new(Entry)\n\tself.Fields = make(map[string]string)\n\tself.Signatures = make(map[string]string)\n\tself.Keys = make([]KeyInfo, 4)\n\n\tself.Type = \"Organization\"\n\tself.FieldNames.Items = []string{\n\t\t\"Index\",\n\t\t\"Name\",\n\t\t\"Contact-Admin\",\n\t\t\"Contact-Abuse\",\n\t\t\"Contact-Support\",\n\t\t\"Language\",\n\t\t\"Primary-Verification-Key\",\n\t\t\"Secondary-Verification-Key\",\n\t\t\"Encryption-Key\",\n\t\t\"Time-To-Live\",\n\t\t\"Expires\",\n\t\t\"Timestamp\"}\n\n\t// If changes are made to the number of these fields, the minimum line count in NewEntryFromData\n\t// will need to be updated\n\tself.RequiredFields.Items = []string{\n\t\t\"Index\",\n\t\t\"Name\",\n\t\t\"Contact-Admin\",\n\t\t\"Primary-Verification-Key\",\n\t\t\"Encryption-Key\",\n\t\t\"Time-To-Live\",\n\t\t\"Expires\",\n\t\t\"Timestamp\"}\n\n\tself.Keys = []KeyInfo{\n\t\t{\"Primary-Verification-Key\", \"signing\", false},\n\t\t{\"Secondary-Verification-Key\", \"signing\", false},\n\t\t{\"Encryption-Key\", \"encryption\", true}}\n\n\tself.SignatureInfo.Items = []SigInfo{\n\t\t{\"Custody\", 1, true, SigInfoSignature},\n\t\t{\"Hashes\", 2, false, SigInfoHash},\n\t\t{\"Organization\", 3, false, SigInfoSignature}}\n\n\tself.Fields[\"Index\"] = \"1\"\n\tself.Fields[\"Time-To-Live\"] = \"30\"\n\tself.SetExpiration(-1)\n\n\tnow := time.Now()\n\tself.Fields[\"Timestamp\"] = fmt.Sprintf(\"%d%02d%02dT%02d%02d%02dZ\", now.Year(), now.Month(),\n\t\tnow.Day(), now.Hour(), now.Minute(), now.Second())\n\n\treturn self\n}", "title": "" }, { "docid": "d98d545a28d8557d95cdb065498a7b78", "score": "0.4431494", "text": "func NewCreateBundleParamsWithTimeout(timeout time.Duration) *CreateBundleParams {\n\tvar ()\n\treturn &CreateBundleParams{\n\n\t\ttimeout: timeout,\n\t}\n}", "title": "" }, { "docid": "2ac40d5e3c1e3597ab69aa23b2c0b26a", "score": "0.4428693", "text": "func (o *CalendarServiceCreateEventParams) WithBody(body *models.CreateEventRequest) *CalendarServiceCreateEventParams {\n\to.SetBody(body)\n\treturn o\n}", "title": "" }, { "docid": "1ea5bd434bae5741e96609ca22581532", "score": "0.442035", "text": "func NewOrganizationCreateResponseWithDefaults() *OrganizationCreateResponse {\n\tthis := OrganizationCreateResponse{}\n\treturn &this\n}", "title": "" }, { "docid": "623d637b53dd03497ff977a384b90b03", "score": "0.44199777", "text": "func (o *ResourceControlCreateParams) SetBody(body *models.ResourceControlCreateRequest) {\n\to.Body = body\n}", "title": "" }, { "docid": "f98cadb061dfcbec29fa5ba25d82ffc2", "score": "0.4417962", "text": "func (ok *OKEx) BuildRequestBody(params interface{}) (string, *bytes.Reader, error) {\n\tif params == nil {\n\t\treturn \"\", nil, errors.New(\"illegal parameter\")\n\t}\n\tdata, err := json.Marshal(params)\n\tif err != nil {\n\t\t//log.Println(err)\n\t\treturn \"\", nil, errors.New(\"json convert string error\")\n\t}\n\n\tjsonBody := string(data)\n\tbinBody := bytes.NewReader(data)\n\n\treturn jsonBody, binBody, nil\n}", "title": "" }, { "docid": "924cfe85c066e6b992fd39b0ae2ac235", "score": "0.44150454", "text": "func (o *WeaviateThingsCreateBody) Validate(formats strfmt.Registry) error {\n\tvar res []error\n\n\tif err := o.validateThing(formats); err != nil {\n\t\tres = append(res, err)\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f5aab3ffb4cce96cbd4369640eb0da61", "score": "0.44131643", "text": "func CreateAndDoHTTPRequestOptionsBody(\n\tbody io.Reader,\n\tcontentType string,\n) CreateAndDoHTTPRequestOptionsFunc {\n\treturn func(options *CreateAndDoHTTPRequestOptions) {\n\t\toptions.hasBody = true\n\t\toptions.body = body\n\t\toptions.bodyContentType = contentType\n\t}\n}", "title": "" }, { "docid": "f49fdf63e8f0c8167d004f6a765f8ade", "score": "0.440682", "text": "func (c *UAccountClient) NewCreateProjectRequest() *CreateProjectRequest {\n\treq := &CreateProjectRequest{}\n\n\t// setup request with client config\n\tc.Client.SetupRequest(req)\n\n\t// setup retryable with default retry policy (retry for non-create action and common error)\n\treq.SetRetryable(false)\n\treturn req\n}", "title": "" }, { "docid": "8d042720305b760e06e1e57b982235c7", "score": "0.44060767", "text": "func (c *Client) CreateBodyComposition(ctx context.Context, bc BodyComposition) (*http.Response, error) {\n\treq, err := c.NewRequest(\"POST\", \"metrics/bodyComposition\", bc)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := c.Do(ctx, req, nil)\n\treturn resp, err\n}", "title": "" }, { "docid": "75b9a9326a065d99c85dc3e7e67d1da5", "score": "0.44054702", "text": "func NewMsgCreateInvoice(statesetID, invoiceId string, invoiceNumber string, billingReason string, amountDue sdk.Coin, amountpaid sdk.Coin, amountRemaining sdk.Coin, subtotal Int, total Int, dueDate Date, periodStartDate Date, periodEndDate Date, merchant sdk.AccAddress, source string) MsgCreateInvoice {\r\n\treturn MsgCreateInvoice{\r\n\t\tStatesetID: statesetID,\r\n\t\tInvoice: invoiceID,\r\n\t\tInvoiceNumber: invoiceNumber,\r\n\t\tInvoiceName: invoiceName,\r\n\t\tBillingReason: billingReason,\r\n\t\tAmountDue: amountDue,\r\n\t\tAmountPaid: amountPaid,\r\n\t\tAmountRemaining: amountRemaining,\r\n\t\tSubtotal: subtotal,\r\n\t\tTotal: total,\r\n\t\tParty: party,\r\n\t\tCounterparty: counterparty,\r\n\t\tDueDate: dueDate,\r\n\t\tPeriodStartDate: periodStartDate\r\n\t\tPeriodEndDate: periodEndDate\r\n\t\tPaid: paid,\r\n\t\tActive: active,\r\n\t\tCreatedTime: CreatedTime\r\n\t}\r\n}", "title": "" }, { "docid": "5687bfa1c6550d17a2aab671a1f4787b", "score": "0.440376", "text": "func NewCreateOverrideParams() *CreateOverrideParams {\n\tvar ()\n\treturn &CreateOverrideParams{\n\n\t\ttimeout: cr.DefaultTimeout,\n\t}\n}", "title": "" }, { "docid": "ca0f72bdf1fac676550f7f433c4d1e4c", "score": "0.43897602", "text": "func NewCreateBusinessCase(\n\tconfig Config,\n\tfetchIntake func(c context.Context, id uuid.UUID) (*models.SystemIntake, error),\n\tauthorize func(c context.Context, i *models.SystemIntake) (bool, error),\n\tcreateAction func(context.Context, *models.Action) (*models.Action, error),\n\tfetchUserInfo func(context.Context, string) (*models.UserInfo, error),\n\tcreateBizCase func(context.Context, *models.BusinessCase) (*models.BusinessCase, error),\n\tupdateIntake func(context.Context, *models.SystemIntake) (*models.SystemIntake, error),\n) func(c context.Context, b *models.BusinessCase) (*models.BusinessCase, error) {\n\treturn func(ctx context.Context, businessCase *models.BusinessCase) (*models.BusinessCase, error) {\n\t\tintake, err := fetchIntake(ctx, businessCase.SystemIntakeID)\n\t\tif err != nil {\n\t\t\t// We return an empty id in this error because the business case hasn't been created\n\t\t\treturn &models.BusinessCase{}, &apperrors.ResourceConflictError{\n\t\t\t\tErr: errors.New(\"system intake is required to create a business case\"),\n\t\t\t\tResource: models.BusinessCase{},\n\t\t\t\tResourceID: \"\",\n\t\t\t}\n\t\t}\n\t\tok, err := authorize(ctx, intake)\n\t\tif err != nil {\n\t\t\treturn &models.BusinessCase{}, err\n\t\t}\n\t\tif !ok {\n\t\t\treturn &models.BusinessCase{}, &apperrors.UnauthorizedError{Err: err}\n\t\t}\n\t\terr = appvalidation.BusinessCaseForCreation(businessCase, intake)\n\t\tif err != nil {\n\t\t\treturn &models.BusinessCase{}, err\n\t\t}\n\n\t\tuserInfo, err := fetchUserInfo(ctx, appcontext.Principal(ctx).ID())\n\t\tif err != nil {\n\t\t\treturn &models.BusinessCase{}, err\n\t\t}\n\t\tif userInfo == nil || userInfo.Email == \"\" || userInfo.CommonName == \"\" || userInfo.EuaUserID == \"\" {\n\t\t\treturn &models.BusinessCase{}, &apperrors.ExternalAPIError{\n\t\t\t\tErr: errors.New(\"user info fetch was not successful\"),\n\t\t\t\tModel: intake,\n\t\t\t\tModelID: intake.ID.String(),\n\t\t\t\tOperation: apperrors.Fetch,\n\t\t\t\tSource: \"CEDAR LDAP\",\n\t\t\t}\n\t\t}\n\n\t\taction := models.Action{\n\t\t\tIntakeID: &intake.ID,\n\t\t\tActionType: models.ActionTypeCREATEBIZCASE,\n\t\t\tActorName: userInfo.CommonName,\n\t\t\tActorEmail: userInfo.Email,\n\t\t\tActorEUAUserID: userInfo.EuaUserID,\n\t\t}\n\t\t_, err = createAction(ctx, &action)\n\t\tif err != nil {\n\t\t\treturn &models.BusinessCase{}, &apperrors.QueryError{\n\t\t\t\tErr: err,\n\t\t\t\tModel: action,\n\t\t\t\tOperation: apperrors.QueryPost,\n\t\t\t}\n\t\t}\n\n\t\t// Autofill time and intake data\n\t\tnow := config.clock.Now()\n\t\tbusinessCase.CreatedAt = &now\n\t\tbusinessCase.UpdatedAt = &now\n\t\tbusinessCase.Requester = null.StringFrom(intake.Requester)\n\t\tbusinessCase.BusinessOwner = intake.BusinessOwner\n\t\tbusinessCase.ProjectName = intake.ProjectName\n\t\tbusinessCase.BusinessNeed = intake.BusinessNeed\n\t\tbusinessCase.Status = models.BusinessCaseStatusOPEN\n\t\tif businessCase, err = createBizCase(ctx, businessCase); err != nil {\n\t\t\treturn &models.BusinessCase{}, err\n\t\t}\n\n\t\tintake.Status = models.SystemIntakeStatusBIZCASEDRAFT\n\t\tintake.UpdatedAt = &now\n\t\tif _, err = updateIntake(ctx, intake); err != nil {\n\t\t\treturn &models.BusinessCase{}, err\n\t\t}\n\n\t\treturn businessCase, nil\n\t}\n}", "title": "" }, { "docid": "39874bb74c341a876745ce2b2c27d19f", "score": "0.43891424", "text": "func CreateBot(server, channel, botname string) *Bot {\n\treturn &Bot{Server: server, Channel: channel, Nick: botname}\n}", "title": "" }, { "docid": "e44d95da5943232a8fb87cb26e2aca8c", "score": "0.43868744", "text": "func NewCreateRequest(folderID int) *CreateRequest {\n\treturn &CreateRequest{\n\t\tOverwrite: true,\n\t\tFolderID: folderID,\n\t}\n}", "title": "" }, { "docid": "f5219953f69d3d035995e6001975d26a", "score": "0.43789536", "text": "func NewJob(b store.Build, commenv map[string]string) (err error) {\n\n\t// Clear build job after 10mins.\n\tttl := int32(60 * 10)\n\tbf := int32(1)\n\n\tvar ev []apiv1.EnvVar\n\n\tfor key, value := range commenv {\n\t\tev = append(ev, apiv1.EnvVar{\n\t\t\tName: key,\n\t\t\tValue: value,\n\t\t})\n\t}\n\n\tjob := v1.Job{\n\t\tTypeMeta: metav1.TypeMeta{},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"%s-%d\", b.Name, b.Id),\n\t\t\tNamespace: kc.namespace,\n\t\t},\n\t\tSpec: v1.JobSpec{\n\t\t\tBackoffLimit: &bf,\n\t\t\tTTLSecondsAfterFinished: &ttl,\n\t\t\tTemplate: apiv1.PodTemplateSpec{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tName: fmt.Sprintf(\"%s-%d\", b.Name, b.Id),\n\t\t\t\t\tNamespace: kc.namespace,\n\t\t\t\t},\n\t\t\t\tSpec: apiv1.PodSpec{\n\t\t\t\t\tContainers: []apiv1.Container{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: b.Name,\n\t\t\t\t\t\t\tImage: b.Image,\n\t\t\t\t\t\t\tImagePullPolicy: apiv1.PullAlways,\n\t\t\t\t\t\t\tEnv: []apiv1.EnvVar{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_SHA\",\n\t\t\t\t\t\t\t\t\tValue: b.Sha,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_USER\",\n\t\t\t\t\t\t\t\t\tValue: b.User,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_JID\",\n\t\t\t\t\t\t\t\t\tValue: b.Name,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_ID\",\n\t\t\t\t\t\t\t\t\tValue: strconv.Itoa(b.Id),\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_GIT\",\n\t\t\t\t\t\t\t\t\tValue: b.Git,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_BRANCH\",\n\t\t\t\t\t\t\t\t\tValue: b.Branch,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_TOKEN\",\n\t\t\t\t\t\t\t\t\tValue: b.Token,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NTCI_BUILDER_ADDR\",\n\t\t\t\t\t\t\t\t\tValue: b.Addr,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tVolumeMounts: []apiv1.VolumeMount{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"dockersock\",\n\t\t\t\t\t\t\t\t\tMountPath: \"/var/run/docker.sock\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tRestartPolicy: apiv1.RestartPolicyNever,\n\t\t\t\t\tVolumes: []apiv1.Volume{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"dockersock\",\n\t\t\t\t\t\t\tVolumeSource: apiv1.VolumeSource{\n\t\t\t\t\t\t\t\tHostPath: &apiv1.HostPathVolumeSource{\n\t\t\t\t\t\t\t\t\tPath: \"/var/run/docker.sock\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\tfor _, e := range ev {\n\t\tjob.Spec.Template.Spec.Containers[0].Env = append(job.Spec.Template.Spec.Containers[0].Env, e)\n\t}\n\n\tj, err := kc.client.BatchV1().Jobs(kc.namespace).Create(&job)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlogrus.Debugf(\"Job Pod Num: %d\", j.Status.Succeeded)\n\n\treturn nil\n}", "title": "" }, { "docid": "5931b13d84a6322c087a0e5e78309866", "score": "0.4374409", "text": "func CreateTodo(w http.ResponseWriter, r *http.Request) {\n\t// title, _ := r.Body.Read([]byte(\"title\"))\n\tvar body input\n\tif err := json.NewDecoder(r.Body).Decode(&body); err != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tif err := body.validate(); err != nil {\n\t\tw.WriteHeader(err.StatusCode)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t_ = json.NewEncoder(w).Encode(err)\n\t\treturn\n\t}\n\n\ttodo := model.Todo{\n\t\tTitle: body.Title,\n\t\tIsCompleted: false,\n\t}\n\n\t_ = json.NewEncoder(w).Encode(todo)\n\n}", "title": "" }, { "docid": "7394b6faf133a650e7410a5836bf3d13", "score": "0.43723378", "text": "func (o *AddOrganizationParams) WithTimeout(timeout time.Duration) *AddOrganizationParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "cec8609d8d74a0f3eb10f76307fa0919", "score": "0.43654662", "text": "func NewEditOrganizationBadRequest() *EditOrganizationBadRequest {\n\treturn &EditOrganizationBadRequest{}\n}", "title": "" }, { "docid": "2c9ad38a5d2c5bbe264f262ba11dbc59", "score": "0.4361044", "text": "func NewCreateDataFlowRequestWithoutParam() *CreateDataFlowRequest {\n\n return &CreateDataFlowRequest{\n JDCloudRequest: core.JDCloudRequest{\n URL: \"/regions/{regionId}/dataFlow:create\",\n Method: \"POST\",\n Header: nil,\n Version: \"v1\",\n },\n }\n}", "title": "" } ]
7b2ad97c311db565349984425224a172
Receive waits for the response promised by the future and returns an error if the registration was not successful.
[ { "docid": "aac2695d1652b53ee9155bd1bd1a914b", "score": "0.5199431", "text": "func (r *FutureNotifyBlocksResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" } ]
[ { "docid": "3677e150a0f18ad1fab699146f0f4776", "score": "0.6732716", "text": "func (r *FutureRegenTemplateResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "b94d4c44f3a3d65b7d24b466e1b50078", "score": "0.5949134", "text": "func (r FutureNotifyReceivedResult) Receive() error {\n\t_, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "63a09a7d0868beecaa8effee6b26f31a", "score": "0.58656293", "text": "func (p *Pupil) handleRegistration(response []byte, eventChan chan []byte) {\n\tif !isSuccess(response) {\n\t\tlog.Fatal(\"Couldn't register with the monk master\")\n\t}\n\tlog.Printf(\"pupil registered successfully\")\n\n\t// Close this registration socket and open another one as\n\t// a respondent\n\tp.Sock.Close()\n\n\tvar err error\n\tif p.Sock, err = respondent.NewSocket(); err != nil {\n\t\tlog.Fatal(\"Couldn't open the event port\")\n\t}\n\tp.Sock.AddTransport(tcp.NewTransport())\n\n\tif err = p.Sock.Listen(p.URL); err != nil {\n\t\tlog.Fatalf(\"Error when listening on %s - %s\\n\", p.URL, err.Error())\n\t}\n\n\tlog.Printf(\"pupil ready to receive events from the master\")\n\n\tfor {\n\t\tresp, err := p.Sock.Recv()\n\t\tif err != nil {\n\t\t\tlog.Printf(\"WARNING: Error when trying to recv() - %s\\n\", err.Error())\n\t\t}\n\t\teventChan <- resp\n\t}\n\n}", "title": "" }, { "docid": "5f64d1fe713ceccc228ea0ab9a6944ba", "score": "0.5813594", "text": "func (r *FutureNotifyTSpendResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "67f17286e7aae98de1c890e37dbe6e93", "score": "0.57517564", "text": "func (r FutureRescanResult) Receive() error {\n\t_, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7af649f105d4238442bc3d998e9da0da", "score": "0.57500345", "text": "func (r *FutureGetGenerateResult) Receive() (bool, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\t// Unmarshal result as a boolean.\n\tvar result bool\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "639319b8d5806a19c4298daea534e3dd", "score": "0.57073253", "text": "func Register(resp RegisterResponse, c Challenge, config *Config) (*Registration, error) {\n\tif config == nil {\n\t\tconfig = &Config{}\n\t}\n\n\tif time.Now().Sub(c.Timestamp) > timeout {\n\t\treturn nil, errors.New(\"u2f: challenge has expired\")\n\t}\n\n\tregData, err := decodeBase64(resp.RegistrationData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclientData, err := decodeBase64(resp.ClientData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treg, sig, err := parseRegistration(regData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyClientData(clientData, c); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyAttestationCert(*reg, config); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyRegistrationSignature(*reg, sig, c.AppID, clientData); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn reg, nil\n}", "title": "" }, { "docid": "2e88d43e242c59006e264847f6342dad", "score": "0.5633494", "text": "func (r *FutureSetGenerateResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "6445a1b1830c38d9b62587c31c817eb0", "score": "0.5628354", "text": "func (r *FutureNotifyNewTicketsResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "fc2d46100f2045f70bedde3015ed9f12", "score": "0.5622156", "text": "func (r FutureNotifyNewTransactionsResult) Receive() error {\n\t_, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1271c3378aeac6b3229498014d058e05", "score": "0.5602247", "text": "func (r FutureNotifySpentResult) Receive() error {\n\t_, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "744e42fe11185be9d652334de8cbf9a0", "score": "0.5588371", "text": "func (c *Challenge) Register(resp RegisterResponse, config *RegistrationConfig) (*Registration, error) {\n\tif config == nil {\n\t\tconfig = &RegistrationConfig{}\n\t}\n\n\tif time.Now().Sub(c.Timestamp) > timeout {\n\t\treturn nil, ErrChallengeExpired\n\t}\n\n\tregData, err := decodeBase64(resp.RegistrationData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclientData, err := decodeBase64(resp.ClientData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treg, sig, err := parseRegistration(regData)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyClientData(clientData, *c); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyAttestationCert(*reg, config); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := verifyRegistrationSignature(*reg, sig, c.AppID, clientData); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcleanReg := reg.ToRegistration()\n\treturn cleanReg, nil\n}", "title": "" }, { "docid": "084e566f64f51eee513f34b96fe0fd05", "score": "0.5587377", "text": "func (r FutureRawResult) Receive() (json.RawMessage, error) {\n\treturn ReceiveFuture(r)\n}", "title": "" }, { "docid": "74bbd27ad2e3e0cea71446ed03f0893e", "score": "0.55191773", "text": "func (r FutureNameShowResult) Receive() (*NameShowResult, error) {\n\tres, err := rpcclient.ReceiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a name_show result object\n\tvar nameShow NameShowResult\n\terr = json.Unmarshal(res, &nameShow)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &nameShow, nil\n}", "title": "" }, { "docid": "d669d32948b8c36d1108d0f8d305e2b1", "score": "0.5480145", "text": "func (r FutureGetAccountInfoResult) Receive() (*xrpjson.GetAccountInfoResult, error) {\n\tres, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a string\n\tvar accountInfoResult xrpjson.GetAccountInfoResult\n\terr = json.Unmarshal(res, &accountInfoResult)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &accountInfoResult, nil\n}", "title": "" }, { "docid": "5368ed030ce3d73562c98670c9ff0380", "score": "0.54782987", "text": "func (r *FutureSubmitBlockResult) Receive() error {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif string(res) != \"null\" {\n\t\tvar result string\n\t\terr = json.Unmarshal(res, &result)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn errors.New(result)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "823a18a606ec2bd4f2048c130035039b", "score": "0.54553115", "text": "func (self *pipestanceHolder) Register(force bool) chan struct{} {\n\tif !self.enableUI && !force {\n\t\treturn nil\n\t}\n\tif enterpriseHost := os.Getenv(\"MARTIAN_ENTERPRISE\"); enterpriseHost != \"\" {\n\t\tu := url.URL{\n\t\t\tScheme: \"http\",\n\t\t\tHost: strings.TrimPrefix(enterpriseHost, \"http://\"),\n\t\t\tPath: api.QueryRegisterEnterprise,\n\t\t}\n\t\tif strings.HasPrefix(enterpriseHost, \"https://\") {\n\t\t\tu.Host = enterpriseHost[len(\"https://\"):]\n\t\t\tu.Scheme = \"https\"\n\t\t}\n\t\tform := self.info.AsForm()\n\t\tform.Set(\"authkey\", self.authKey)\n\t\tif self.https {\n\t\t\tform.Set(\"https\", \"true\")\n\t\t}\n\t\tself.lastRegister = time.Now()\n\t\tcomplete := make(chan struct{})\n\t\tgo func() {\n\t\t\tdefer close(complete)\n\t\t\tif res, err := http.PostForm(u.String(), form); err == nil {\n\t\t\t\tdefer func() {\n\t\t\t\t\t// Clear out the response buffer and close it.\n\t\t\t\t\t// Ignore the content.\n\t\t\t\t\tb := make([]byte, 1024)\n\t\t\t\t\tfor _, err := res.Body.Read(b); err == nil; _, err = res.Body.Read(b) {\n\t\t\t\t\t}\n\t\t\t\t\tres.Body.Close()\n\t\t\t\t}()\n\t\t\t\tif res.StatusCode >= http.StatusBadRequest {\n\t\t\t\t\tutil.LogInfo(\"mrenter\", \"Registration failed with %s.\", res.Status)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tutil.LogError(err, \"mrenter\", \"Registration to %s failed\", u.Host)\n\t\t\t}\n\t\t}()\n\t\treturn complete\n\t} else {\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "4b1cc75c8d80ee4f851720eed8662e47", "score": "0.54188186", "text": "func (r FutureNotifyBlocksResult) Receive() error {\n\t_, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "643d35ca3c1081a491252618780b93a4", "score": "0.53924185", "text": "func (r *FutureCreateRawSSRtxResult) Receive() (*wire.MsgTx, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a string.\n\tvar txHex string\n\terr = json.Unmarshal(res, &txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Decode the serialized transaction hex to raw bytes.\n\tserializedTx, err := hex.DecodeString(txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Deserialize the transaction and return it.\n\tvar msgTx wire.MsgTx\n\tif err := msgTx.Deserialize(bytes.NewReader(serializedTx)); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &msgTx, nil\n}", "title": "" }, { "docid": "70df8871e98cbf5c3a3d0a967e6106fe", "score": "0.5386604", "text": "func (r *FutureNotifyWorkResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "375c0e874a5ca9f5d9e03218cdd9fcac", "score": "0.53457284", "text": "func (f *RegistrationFlow) Finish(ctx context.Context, req RegisterResponse) (*types.MFADevice, error) {\n\tswitch {\n\tcase req.User == \"\":\n\t\treturn nil, trace.BadParameter(\"user required\")\n\tcase req.DeviceName == \"\":\n\t\treturn nil, trace.BadParameter(\"device name required\")\n\tcase req.CreationResponse == nil:\n\t\treturn nil, trace.BadParameter(\"credential creation response required\")\n\t}\n\n\tparsedResp, err := parseCredentialCreationResponse(req.CreationResponse)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\torigin := parsedResp.Response.CollectedClientData.Origin\n\tif err := validateOrigin(origin, f.Webauthn.RPID); err != nil {\n\t\tlog.WithError(err).Debugf(\"WebAuthn: origin validation failed\")\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// TODO(codingllama): Verify that the public key matches the allowed\n\t// credential params? It doesn't look like duo-labs/webauthn does that.\n\n\twla, err := f.Identity.GetWebauthnLocalAuth(ctx, req.User)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tu := newWebUser(req.User, wla.UserID, true /* credentialIDOnly */, nil /* devices */)\n\n\tsessionDataPB, err := f.Identity.GetWebauthnSessionData(ctx, req.User, scopeSession)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tsessionData := sessionFromPB(sessionDataPB)\n\n\t// Activate passwordless switches (resident key, user verification) if we\n\t// required verification in the begin step.\n\tpasswordless := sessionData.UserVerification == protocol.VerificationRequired\n\tif req.Passwordless && !passwordless {\n\t\treturn nil, trace.BadParameter(\"passwordless registration failed, requested CredentialCreation was for an MFA registration\")\n\t}\n\n\tweb, err := newWebAuthn(webAuthnParams{\n\t\tcfg: f.Webauthn,\n\t\trpID: f.Webauthn.RPID,\n\t\torigin: origin,\n\t\trequireResidentKey: passwordless,\n\t\trequireUserVerification: passwordless,\n\t})\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tcredential, err := web.CreateCredential(u, *sessionData, parsedResp)\n\tif err != nil {\n\t\t// Use a more friendly message for certain verification errors.\n\t\tprotocolErr := &protocol.Error{}\n\t\tif errors.As(err, &protocolErr) &&\n\t\t\tprotocolErr.Type == protocol.ErrVerification.Type &&\n\t\t\tpasswordless &&\n\t\t\t!parsedResp.Response.AttestationObject.AuthData.Flags.UserVerified() {\n\t\t\tlog.WithError(err).Debug(\"WebAuthn: Replacing verification error with PIN message\")\n\t\t\treturn nil, trace.BadParameter(\"authenticator doesn't support passwordless, setting up a PIN may fix this\")\n\t\t}\n\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// Finally, check against attestation settings, if any.\n\t// This runs after web.CreateCredential so we can take advantage of the\n\t// attestation format validation it performs.\n\tif err := verifyAttestation(f.Webauthn, parsedResp.Response.AttestationObject); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tnewDevice := types.NewMFADevice(req.DeviceName, uuid.NewString() /* id */, time.Now() /* addedAt */)\n\tnewDevice.Device = &types.MFADevice_Webauthn{\n\t\tWebauthn: &types.WebauthnDevice{\n\t\t\tCredentialId: credential.ID,\n\t\t\tPublicKeyCbor: credential.PublicKey,\n\t\t\tAttestationType: credential.AttestationType,\n\t\t\tAaguid: credential.Authenticator.AAGUID,\n\t\t\tSignatureCounter: credential.Authenticator.SignCount,\n\t\t\tAttestationObject: req.CreationResponse.AttestationResponse.AttestationObject,\n\t\t\tResidentKey: req.Passwordless,\n\t\t\tCredentialRpId: f.Webauthn.RPID,\n\t\t},\n\t}\n\t// We delegate a few checks to identity, including:\n\t// * The validity of the created MFADevice\n\t// * Uniqueness validation of the deviceName\n\t// * Uniqueness validation of the Webauthn credential ID.\n\tif err := f.Identity.UpsertMFADevice(ctx, req.User, newDevice); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// Registration complete, remove the registration challenge we just used.\n\tif err := f.Identity.DeleteWebauthnSessionData(ctx, req.User, scopeSession); err != nil {\n\t\tlog.Warnf(\"WebAuthn: failed to delete registration SessionData for user %v\", req.User)\n\t}\n\n\treturn newDevice, nil\n}", "title": "" }, { "docid": "8f4536776d5fae35e3ec91a81d45273a", "score": "0.5331128", "text": "func (r *FutureNotifyNewTransactionsResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "911b4e19e3fc4e2a0ea641f059de60ce", "score": "0.533063", "text": "func (r *FutureNotifyWinningTicketsResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "a7df8ca279102a8545b4cf0e6783972e", "score": "0.5228875", "text": "func (auth *AuthManager) handleRegister(conn comms.Link, msg *msgjson.Message) *msgjson.Error {\n\t// Unmarshal.\n\tregister := new(msgjson.Register)\n\terr := json.Unmarshal(msg.Payload, &register)\n\tif err != nil {\n\t\treturn &msgjson.Error{\n\t\t\tCode: msgjson.RPCParseError,\n\t\t\tMessage: \"error parsing register request\",\n\t\t}\n\t}\n\n\t// Create account.Account from pubkey.\n\tacct, err := account.NewAccountFromPubKey(register.PubKey)\n\tif err != nil {\n\t\treturn &msgjson.Error{\n\t\t\tCode: msgjson.PubKeyParseError,\n\t\t\tMessage: \"error parsing pubkey: \" + err.Error(),\n\t\t}\n\t}\n\n\t// Check signature.\n\tsigMsg := register.Serialize()\n\terr = checkSigS256(sigMsg, register.SigBytes(), acct.PubKey)\n\tif err != nil {\n\t\treturn &msgjson.Error{\n\t\t\tCode: msgjson.SignatureError,\n\t\t\tMessage: \"signature error: \" + err.Error(),\n\t\t}\n\t}\n\n\t// Register account and get a fee payment address.\n\tfeeAddr, err := auth.storage.CreateAccount(acct)\n\tif err != nil {\n\t\tlog.Debugf(\"CreateAccount(%v) failed: %v\", acct, err)\n\t\treturn &msgjson.Error{\n\t\t\tCode: msgjson.RPCInternalError,\n\t\t\tMessage: \"failed to create new account (already registered?)\",\n\t\t}\n\t}\n\n\tlog.Infof(\"Created new user account %v with fee address %v\", acct.ID, feeAddr)\n\n\t// Prepare, sign, and send response.\n\tregRes := &msgjson.RegisterResult{\n\t\tDEXPubKey: auth.signer.PubKey().SerializeCompressed(),\n\t\tClientPubKey: register.PubKey,\n\t\tAddress: feeAddr,\n\t\tFee: auth.regFee,\n\t\tTime: encode.UnixMilliU((unixMsNow())),\n\t}\n\tauth.Sign(regRes)\n\n\tresp, err := msgjson.NewResponse(msg.ID, regRes, nil)\n\tif err != nil {\n\t\tlog.Errorf(\"error creating new response for registration result: %v\", err)\n\t\treturn &msgjson.Error{\n\t\t\tCode: msgjson.RPCInternalError,\n\t\t\tMessage: \"internal error\",\n\t\t}\n\t}\n\n\terr = conn.Send(resp)\n\tif err != nil {\n\t\tlog.Warnf(\"Error sending register result to link: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "91347056d2dbfbcfdfc251f5164a1821", "score": "0.52189565", "text": "func initiatedRegistration(ctx context.Context, s *discordgo.Session, m *discordgo.MessageCreate) registeringState {\n\tcontent := strings.TrimSpace(m.Content)\n\tlog.WithContext(ctx).Info(\"Emailing user.\")\n\n\tif !umailRegex.MatchString(content) {\n\t\ts.ChannelMessageSendEmbed(m.ChannelID, errorEmbed(\"Please use a valid UCC email address!\"))\n\t\treturn initiatedRegistration\n\t}\n\n\trand.Seed(time.Now().UnixNano())\n\trandomCode := petname.Generate(3, \"-\")\n\tresponse, err := emails.SendEmail(\n\t\t\"UCC Netsoc\",\n\t\t\"discord.registration@netsoc.co\",\n\t\tm.Author.Username,\n\t\tcontent,\n\t\t\"UCC Netsoc Discord Verification\",\n\t\t\"Please message the following token to the Netsoc Bot to gain access to the UCC Netsoc Discord Server:\\n\\n\"+\n\t\t\trandomCode+\"\\n\\nIf you did not request access to the UCC Netsoc Discord Server, ignore this message.\",\n\t\temails.FillTemplate(\n\t\t\t\"Discord Verification\",\n\t\t\t\"Please message the following token to the Netsoc Bot to gain access to the UCC Netosc Discord Server. <br /><br />If you did not request access to the UCC Netsoc Discord Server, ignore this message.\",\n\t\t\trandomCode),\n\t)\n\tif err != nil {\n\t\tlog.WithContext(ctx).\n\t\t\tWithError(err).\n\t\t\tError(\"failed to send verification email\")\n\t\ts.ChannelMessageSendEmbed(m.ChannelID, errorEmbed(\"Failed to send verification email. Please try again later or contact a SysAdmin\"))\n\t\treturn initiatedRegistration\n\t}\n\n\t// Success\n\tif response.StatusCode < 300 && response.StatusCode > 199 {\n\t\tverifyCodes[m.Author.ID] = randomCode\n\t\ts.ChannelMessageSendEmbed(m.ChannelID, embed.NewEmbed().\n\t\t\tSetTitle(\"UCC Netsoc Server Registration\").\n\t\t\tSetDescription(\"Please reply with the token that has been emailed to you. If you wish to enter another email, type `!register`.\").\n\t\t\tMessageEmbed)\n\t\treturn submittedEmail\n\t}\n\n\tlog.WithContext(ctx).\n\t\tWithFields(log.Fields{\"status_code\": response.StatusCode, \"response\": response.Body}).\n\t\tError(\"Sendgrid returned bad status code\")\n\ts.ChannelMessageSendEmbed(m.ChannelID, errorEmbed(\"Failed to send verification email. Please try again later or contact a SysAdmin\"))\n\treturn initiatedRegistration\n}", "title": "" }, { "docid": "a3c251a585b423743b495a0a5398351f", "score": "0.51875275", "text": "func HandleRegist_Resp(agent *Agent, pkt *packet.Pkt) {\n\tdataRegResp := packet.PktDataRegResp{}\n\terr := packet.Unpack(pkt, &dataRegResp)\n\tif err != nil {\n\t\tlog.Errorf(\"Error unpack pkt: %s\", err.Error())\n\t}\n\n\tlog.Infof(\"Received Regist_Resp AppId: [%s] RegId: [%s] Result: %d\",\n\t\tdataRegResp.AppId, dataRegResp.RegId, dataRegResp.Result)\n\tagent.RegIds[dataRegResp.AppId] = dataRegResp.RegId\n\tagent.SaveRegIds()\n\tif agent.OnRegResponse != nil {\n\t\tagent.OnRegResponse(dataRegResp.AppId, dataRegResp.RegId, dataRegResp.Result)\n\t}\n}", "title": "" }, { "docid": "7e9d81d91d5c3879fc8745e0a62debf5", "score": "0.5168559", "text": "func (p *Poll) RegisterResponse(r *http.Request) error {\n\tname := r.FormValue(\"name\")\n\tct, update := p.Participants[name]\n\tif !update {\n\t\tct = new(bfv.Ciphertext)\n\t\tp.responses = append(p.responses, ct)\n\t\tp.Participants[name] = ct\n\t}\n\treturn utils.UnmarshalFromBase64(ct, r.FormValue(\"ct\"))\n}", "title": "" }, { "docid": "e4170ee7b00a185bafd62bb2ced7b1d4", "score": "0.515777", "text": "func (p *Pupil) register(regChan chan []byte) {\n\tvar err error\n\tlog.Printf(\"Registering with master at %s\\n\", p.MasterRegistrationURL)\n\tif err = p.Sock.Dial(p.MasterRegistrationURL); err != nil {\n\t\tlog.Fatalf(\"Wasn't able to reach the monk master at %s - %s\", p.MasterRegistrationURL, err.Error())\n\t}\n\n\t// We need to receive this only once\n\tregMessage := p.prepareRegistrationMessage()\n\terr = p.Sock.Send(regMessage)\n\tif err != nil {\n\t\tlog.Fatalf(\"Couldn't send registration request\\n\")\n\t}\n\n\tvar msg []byte\n\tmsg, err = p.Sock.Recv()\n\tif err != nil {\n\t\tlog.Fatalf(\"Error on registering with the monk master - %s\", err.Error())\n\t}\n\tregChan <- msg\n}", "title": "" }, { "docid": "54b384b2dbfa0550279b45ee1bd50924", "score": "0.514621", "text": "func (r FutureGetAccountTxResult) Receive() (*xrpjson.GetAccountTxResult, error) {\n\tres, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Unmarshal result as a gettransaction result object\n\tvar getTx xrpjson.GetAccountTxResult\n\terr = json.Unmarshal(res, &getTx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &getTx, nil\n}", "title": "" }, { "docid": "0706d3504f46a9609c10caa720284178", "score": "0.5136596", "text": "func (r FutureGetBlockChainInfoResult) Receive() (*results.GetBlockChainInfoResult, error) {\n\tres, err := ReceiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar result results.GetBlockChainInfoResult\n\tif err := json.Unmarshal(res, &result); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &result, nil\n}", "title": "" }, { "docid": "c0c2600e411e2dfafd8c7c38bc24433e", "score": "0.5114789", "text": "func (b *BrokerServer) Register() (register *Register, err error) {\n\tresponse, err := b.Client.Get(b.Base + \"/register\")\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer response.Body.Close()\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = json.Unmarshal(body, &register)\n\tif err != nil {\n\t\treturn nil, errors.New(\"invalid JSON\")\n\t}\n\terr = register.Validate()\n\tif err != nil {\n\t\treturn nil, errors.New(\"invalid register\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "3f5b1397b2a28241423e6887e3f980e7", "score": "0.50973374", "text": "func (future *RegisteredServersCreateFuture) result(client RegisteredServersClient) (rs RegisteredServer, err error) {\n\tvar done bool\n\tdone, err = future.DoneWithContext(context.Background(), client)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"storagesync.RegisteredServersCreateFuture\", \"Result\", future.Response(), \"Polling failure\")\n\t\treturn\n\t}\n\tif !done {\n\t\trs.Response.Response = future.Response()\n\t\terr = azure.NewAsyncOpIncompleteError(\"storagesync.RegisteredServersCreateFuture\")\n\t\treturn\n\t}\n\tsender := autorest.DecorateSender(client, autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n\tif rs.Response.Response, err = future.GetResult(sender); err == nil && rs.Response.Response.StatusCode != http.StatusNoContent {\n\t\trs, err = client.CreateResponder(rs.Response.Response)\n\t\tif err != nil {\n\t\t\terr = autorest.NewErrorWithError(err, \"storagesync.RegisteredServersCreateFuture\", \"Result\", rs.Response.Response, \"Failure responding to request\")\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "a18b17a78eca5c5a527d8ea751b31a77", "score": "0.5095", "text": "func (ec *EventsClient) register(config *RegistrationConfig) error {\n\tvar err error\n\tif err = ec.RegisterAsync(config); err != nil {\n\t\treturn err\n\t}\n\n\tregChan := make(chan struct{})\n\tgo func() {\n\t\tdefer close(regChan)\n\t\tin, inerr := ec.stream.Recv()\n\t\tif inerr != nil {\n\t\t\terr = inerr\n\t\t\treturn\n\t\t}\n\t\tswitch in.Event.(type) {\n\t\tcase *ehpb.Event_Register:\n\t\tcase nil:\n\t\t\terr = fmt.Errorf(\"invalid nil object for register\")\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"invalid registration object\")\n\t\t}\n\t}()\n\tselect {\n\tcase <-regChan:\n\tcase <-time.After(ec.regTimeout):\n\t\terr = fmt.Errorf(\"timeout waiting for registration\")\n\t}\n\treturn err\n}", "title": "" }, { "docid": "3b7ec931cbaf39ce11f4942a76bd51a8", "score": "0.5092923", "text": "func (r *FutureGetWorkSubmit) Receive() (bool, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\t// Unmarshal result as a boolean.\n\tvar accepted bool\n\terr = json.Unmarshal(res, &accepted)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\n\treturn accepted, nil\n}", "title": "" }, { "docid": "41c06e7bb44173cc1bc6b914f9ff25b4", "score": "0.5083251", "text": "func (c *Connection) Register(clientKey string) (string, error) {\n\t// Create the request\n\trequestID := c.getID()\n\trequest := request{\n\t\tID: requestID,\n\t\tType: reqTypeRegister,\n\t\tPayload: registerReqPayload{\n\t\t\tPairingType: pairTypePrompt,\n\t\t\tManifest: manifest{\n\t\t\t\tPermissions: getPermissions(),\n\t\t\t},\n\t\t\tClientKey: clientKey,\n\t\t},\n\t}\n\n\t// Marshal the request\n\tmessage, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// Create the channel to recieve the response\n\trespChan := c.addRespChannel(requestID)\n\tdefer c.removeRespChan(requestID)\n\n\t// Send the message to the websocket\n\terr = c.conn.WriteMessage(websocket.TextMessage, message)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// For register requests, multiple responses are recieved, wait until we get either\n\t// an error response, or a registered response (or we timeout)\n\tticker := time.NewTicker(registerTimeoutSeconds * time.Second)\n\tfor {\n\t\tselect {\n\t\tcase <-ticker.C:\n\t\t\treturn \"\", ErrRegisterTimeout\n\t\tcase resp := <-respChan:\n\t\t\tif resp.Type == respTypeRegistered {\n\t\t\t\treturn resp.Payload.(*registerRespPayload).ClientKey, nil\n\t\t\t} else if resp.Type == respTypeError {\n\t\t\t\treturn \"\", errors.New(resp.Error)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "47375b6bc15f5eaee2263d26425337a4", "score": "0.5072879", "text": "func (t *TaskChaincode) regist(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\n\t// 0 1 2\n\t//\"$username\", \"$orgname\" \"$description\"\n if len(args) != 3 {\n return shim.Error(\"Incorrect number of arguments. Expecting 3\")\n }\n\n fmt.Println(\"- start regist\")\n\tif len(args[0]) <= 0 {\n\t\treturn shim.Error(\"1st argument must be a non-empty string\")\n\t}\n\tif len(args[1]) <= 0 {\n\t\treturn shim.Error(\"2nd argument must be a non-empty string\")\n\t}\n\tif len(args[2]) <= 0 {\n\t\treturn shim.Error(\"3nd argument must be a non-empty string\")\n\t}\n\n\tobjectType := \"User\"\n\taccount := args[0]\n\torgname := args[1]\n\tdescription := args[2]\n\n\t// ==== Check if account already exists ====\n\tregistAsBytes, err := stub.GetState(account)\n\tif err != nil {\n\t\treturn shim.Error(\"Failed to regist: \" + err.Error())\n\t} else if registAsBytes != nil {\n\t\tfmt.Println(\"The account already exists! Please change your account.\")\n\t\treturn shim.Error(\"The account \" + account + \" already exists! Please modify your account.\")\n\t}\n\n\tregistJSON := &user{objectType, account, orgname, description}\n registJSONAsBytes, err := json.Marshal(registJSON)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\t// ==== Save regist to state ====\n err = stub.PutState(account, registJSONAsBytes)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n fmt.Println(\"regist successfully\", account)\n fmt.Println(\"- end regist\\n\")\n\treturn shim.Success(registJSONAsBytes)\n}", "title": "" }, { "docid": "2ae34068234b7f02a0b56b24a6b439b7", "score": "0.5060057", "text": "func (r FutureRenderDagResult) Receive() (*soterjson.RenderDagResult, error) {\n\tres, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar renderedDag soterjson.RenderDagResult\n\tif err := json.Unmarshal(res, &renderedDag); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &renderedDag, nil\n}", "title": "" }, { "docid": "1201ebad6ec5906ec0e68fa7fc7383b7", "score": "0.50486624", "text": "func (client *Client) register(wg *sync.WaitGroup) {\n reader := bufio.NewReader(os.Stdin) // read from stdin\n for {\n fmt.Print(\"Enter a screen name: \")\n name, _ := reader.ReadString('\\n')\n nameNoLine := name[:len(name) - 1]\n if strings.IndexByte(nameNoLine, ' ') != -1 {\n fmt.Println(\"cannot have white space in user name\")\n continue\n }\n fmt.Printf(\"attempting to register user: %s\", name)\n args := &shared.NewUserArgs{Name: nameNoLine}\n resp := &shared.NewUserResp{}\n // RPC call to register new user\n err := client.Conn.Call(NEWUSER, args, resp)\n // err is only non-nil if chat room is full, should exit\n if err != nil {\n log.Fatal(err)\n }\n // name is taken, failed to register user\n if resp.Code == -1 {\n fmt.Printf(\"Failed to register, name %s is taken\\n\", name[:len(name) - 1])\n continue\n // successfully registered user\n } else {\n fmt.Printf(\"Successfully registered user, welcome %s\", name)\n client.Name = nameNoLine\n break\n }\n }\n wg.Done()\n}", "title": "" }, { "docid": "364db8a7ea43227aa332c9d301cdc5ac", "score": "0.50309515", "text": "func (s *Service) CompleteRegistration(c *gin.Context) {\n\turl := s.NoebsConfig.ConsumerIP + ebs_fields.ConsumerCompleteRegistration // EBS simulator endpoint url goes here.\n\n\tvar fields = ebs_fields.ConsumerCompleteRegistrationFields{}\n\n\tbindingErr := c.ShouldBindBodyWith(&fields, binding.JSON)\n\n\tswitch bindingErr := bindingErr.(type) {\n\n\tcase validator.ValidationErrors:\n\t\tvar details []ebs_fields.ErrDetails\n\t\tfor _, err := range bindingErr {\n\t\t\tdetails = append(details, ebs_fields.ErrorToString(err))\n\t\t}\n\t\tpayload := ebs_fields.ErrorDetails{Details: details, Code: http.StatusBadRequest, Message: \"Request fields validation error\", Status: ebs_fields.BadRequest}\n\t\tc.JSON(http.StatusBadRequest, ebs_fields.ErrorResponse{ErrorDetails: payload})\n\n\tcase nil:\n\t\tfields.ApplicationId = s.NoebsConfig.ConsumerID\n\t\tjsonBuffer, err := json.Marshal(fields)\n\t\tif err != nil {\n\t\t\t// there's an error in parsing the struct. Server error.\n\t\t\ter := ebs_fields.ErrorDetails{Details: nil, Code: http.StatusBadRequest, Message: \"Unable to parse the request\", Status: ebs_fields.ParsingError}\n\t\t\tc.AbortWithStatusJSON(http.StatusBadRequest, ebs_fields.ErrorResponse{ErrorDetails: er})\n\t\t}\n\n\t\t// if no errors, then proceed to creating a new user\n\t\tvar user ebs_fields.User\n\t\tvar userID int\n\t\tuser.Mobile = fields.Mobile\n\t\tuser.Password = fields.NoebsPassword\n\t\tuser.HashPassword()\n\t\tuser.SanitizeName()\n\t\tif res := s.Db.Create(&user); res.Error == nil {\n\t\t\tuserID = int(res.RowsAffected)\n\t\t}\n\t\tuser.ID = uint(userID)\n\n\t\tfields.NoebsPassword = \"\"\n\t\tfields.Mobile = \"\"\n\n\t\t// the only part left is fixing EBS errors. Formalizing them per se.\n\t\tcode, res, ebsErr := ebs_fields.EBSHttpClient(url, jsonBuffer)\n\t\ts.Logger.Printf(\"response is: %d, %+v, %v\", code, res, ebsErr)\n\n\t\tres.Name = s.ToDatabasename(url)\n\n\t\tif err := s.Db.Table(\"transactions\").Create(&res.EBSResponse); err != nil {\n\t\t\tlogrus.WithFields(logrus.Fields{\n\t\t\t\t\"code\": \"unable to migrate purchase model\",\n\t\t\t\t\"message\": err,\n\t\t\t}).Info(\"error in migrating purchase model\")\n\t\t}\n\n\t\tif ebsErr != nil {\n\t\t\tpayload := ebs_fields.ErrorDetails{Code: res.ResponseCode, Status: ebs_fields.EBSError, Details: res, Message: ebs_fields.EBSError}\n\t\t\tc.JSON(code, payload)\n\t\t} else {\n\t\t\tc.JSON(code, gin.H{\"ebs_response\": res})\n\t\t\t// Associate the card to that user\n\t\t\t// create a card here\n\t\t\tcard := ebs_fields.CacheCards{Pan: res.PAN, Expiry: res.ExpDate}\n\n\t\t\t// now, it is better to store this card as a cached card\n\t\t\tebs_fields.SaveOrUpdates(s.Db, card, true)\n\n\t\t\t// we associated the newly created card to its owner\n\t\t\tuser.UpsertCards([]ebs_fields.Card{card.NewCardFromCached(userID)})\n\t\t}\n\n\tdefault:\n\t\tc.AbortWithStatusJSON(http.StatusBadRequest, gin.H{\"code\": bindingErr.Error()})\n\t}\n}", "title": "" }, { "docid": "1761e834c4b0011456b54404456beced", "score": "0.5024731", "text": "func (h *hub) registration(client *client) bool {\n\th.Lock()\n\tdefer h.Unlock()\n\n\t// generates a random user id for new client\n\tuserID := utils.RandInt31()\n\n\t// send registration response to client\n\theader := responseHeader(messages.S_JOIN_RESPONSE, 0, \"Welcome to CoinShuffle++. Waiting for other peers to join ...\", \"\")\n\tregistration, err := proto.Marshal(&messages.RegisterResponse{\n\t\tHeader: header,\n\t\tId: userID,\n\t})\n\n\tif checkError(err) {\n\t\treturn false\n\t}\n\n\tclient.send <- registration\n\n\t// map client with its userID\n\th.clients[client] = userID\n\n\t// store client in waiting queue\n\th.waitingQueue = append(h.waitingQueue, &waitingClient{id: userID})\n\treturn true\n}", "title": "" }, { "docid": "0b98067f441bf4334cac4cbeaa127c3b", "score": "0.5024469", "text": "func (client *Client) registerHandleResponse(resp *http.Response) (ClientRegisterResponse, error) {\n\tresult := ClientRegisterResponse{}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.FeatureResult); err != nil {\n\t\treturn ClientRegisterResponse{}, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "39cd589ee38e8710ab279a7fb6817cf7", "score": "0.5012697", "text": "func (f FutureFloat64) Receive() (float64, error) {\n\tres, err := ReceiveFuture(f)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\t// Unmarshal the result as a float64.\n\tvar result float64\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "199b86afa81c29b1f0ec97eef9524a75", "score": "0.5011968", "text": "func doRegistration(hc protocol.Poster, uri string, req *protocol.Registration, opts ...RegistrationOpt) (*Registration, error) {\n\tfor _, opt := range opts {\n\t\topt(req)\n\t}\n\n\tvar recPriv *ecdsa.PrivateKey\n\tif req.RecoveryKey != nil {\n\t\t// Save the private key and insert just the public key.\n\t\t// The key was assigned through WithRecoveryKeyMaterial,\n\t\t// so must be an ecdsa.PrivateKey.\n\t\trecPriv = req.RecoveryKey.Client.Key.(*ecdsa.PrivateKey)\n\t\treq.RecoveryKey.Client.Key = recPriv.Public()\n\t}\n\n\treg, resp, err := protocol.PostRegistration(hc, uri, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tu, _ := resp.Location()\n\n\tswitch resp.StatusCode {\n\tcase http.StatusAccepted, http.StatusCreated:\n\t\t// TODO: Unspecified behavior.\n\t\t// ResourceReg returns StatusAccepted in Boulder.\n\t\tbreak\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unexpected HTTP status code: %s\", resp.Status)\n\t}\n\n\tret, err := newRegistration(reg, req, recPriv)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif u == nil {\n\t\tret.URI = uri\n\t} else {\n\t\tret.URI = u.String()\n\t}\n\n\tus := links(resp, \"terms-of-service\")\n\tif len(us) > 0 {\n\t\tret.TermsOfServiceURI = us[0]\n\t}\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "b4a924dd771f9cbdbd42d9415d7dce93", "score": "0.50108385", "text": "func (r *FutureGetMiningInfoResult) Receive() (*chainjson.GetMiningInfoResult, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a getmininginfo result object.\n\tvar infoResult chainjson.GetMiningInfoResult\n\terr = json.Unmarshal(res, &infoResult)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &infoResult, nil\n}", "title": "" }, { "docid": "d1006582ddce1b88c1437800a1173680", "score": "0.5004717", "text": "func (c *Channel) awaitRegistered(ctx context.Context) error {\n\t// Start event subscription.\n\tsub, err := c.adjudicator.Subscribe(ctx, c.Params().ID())\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"subscribing to adjudicator events\")\n\t}\n\tdefer func() {\n\t\tif err := sub.Close(); err != nil {\n\t\t\tc.Log().Warn(\"Subscription closed with error:\", err)\n\t\t}\n\t}()\n\n\t// Scan for event.\n\tfor e := sub.Next(); e != nil; e = sub.Next() {\n\t\tswitch e.(type) {\n\t\tcase *channel.RegisteredEvent:\n\t\tcase *channel.ProgressedEvent:\n\t\tcase *channel.ConcludedEvent:\n\t\tdefault:\n\t\t\tlog.Warnf(\"unrecognized event type: %T\", e)\n\t\t\tcontinue\n\t\t}\n\n\t\t// We set phase registered to ensure that we are in the correct phase\n\t\t// even if the channel has been registered by someone else.\n\t\tl, err := c.tryLockRecursive(ctx)\n\t\tdefer l.Unlock()\n\t\tif err != nil {\n\t\t\treturn errors.WithMessage(err, \"locking recursive\")\n\t\t}\n\t\terr = c.setRegisteredRecursive(ctx)\n\t\tif err != nil {\n\t\t\treturn errors.WithMessage(err, \"setting phase `Registered` recursive\")\n\t\t}\n\n\t\t// Wait until end of channel phase.\n\t\treturn e.Timeout().Wait(ctx)\n\t}\n\treturn sub.Err()\n}", "title": "" }, { "docid": "ea64ebe9938bf082f23c8e3c3b27561c", "score": "0.5004494", "text": "func (ec *EventsClient) RegisterAsync(config *RegistrationConfig) error {\n\tcreator, err := getCreator()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error getting creator from MSP: %s\", err)\n\t}\n\n\temsg := &ehpb.Event{Event: &ehpb.Event_Register{Register: &ehpb.Register{Events: config.InterestedEvents}}, Creator: creator, Timestamp: config.Timestamp}\n\n\tif config.TlsCert != nil {\n\t\temsg.TlsCertHash = utils.ComputeSHA256(config.TlsCert.Raw)\n\t}\n\tif err = ec.send(emsg); err != nil {\n\t\tconsumerLogger.Errorf(\"error on Register send %s\\n\", err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "99e42013526fc761d8168c77f1f66888", "score": "0.50010467", "text": "func (r FutureOmniGetbalance) Receive() (OmniBalance, error) {\n\tres, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn OmniBalance{}, err\n\t}\n\n\t// Unmarshal result as a OmniBalance.\n\tvar balance = OmniBalance{}\n\terr = json.Unmarshal(res, &balance)\n\tif err != nil {\n\t\treturn OmniBalance{}, err\n\t}\n\n\treturn balance, nil\n}", "title": "" }, { "docid": "b019fe7f46f98b0107d4f51a5849cf3c", "score": "0.49871388", "text": "func (w *WebAuthn) FinishRegistration(r *http.Request, rw http.ResponseWriter, user User, session Session, body []byte) Authenticator {\n\tvar attestationResponse protocol.AttestationResponse\n\terr := json.Unmarshal(body, &attestationResponse)\n\tif err != nil {\n\t\tw.writeError(r, rw, protocol.ErrInvalidRequest.WithDebug(err.Error()))\n\t\treturn nil\n\t}\n\n\tauthr, err := w.ParseAndFinishRegistration(attestationResponse, user, session)\n\tif err != nil {\n\t\tw.writeError(r, rw, err)\n\t\treturn nil\n\t}\n\n\trw.WriteHeader(http.StatusCreated)\n\n\treturn authr\n}", "title": "" }, { "docid": "67e52e9c7ca958c5bd2d3dd11e5225d0", "score": "0.4982525", "text": "func waitAndRouteIdentityRegistrationEvent(asyncRes *gocelery.AsyncResult, confirmations chan<- *WatchIdentity, pushThisIdentity Identity) {\n\t_, err := asyncRes.Get(ethereum.GetDefaultContextTimeout())\n\tconfirmations <- &WatchIdentity{pushThisIdentity, err}\n}", "title": "" }, { "docid": "5d12f9bb1955d19cffbfd4c91ad499e2", "score": "0.4979088", "text": "func (r *FutureCreateRawTransactionResult) Receive() (*wire.MsgTx, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a string.\n\tvar txHex string\n\terr = json.Unmarshal(res, &txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Decode the serialized transaction hex to raw bytes.\n\tserializedTx, err := hex.DecodeString(txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Deserialize the transaction and return it.\n\tvar msgTx wire.MsgTx\n\tif err := msgTx.Deserialize(bytes.NewReader(serializedTx)); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &msgTx, nil\n}", "title": "" }, { "docid": "9f3bd74029bf7a9f5f775dc6a9a90bfc", "score": "0.49760035", "text": "func (r *FutureSendRawTransactionResult) Receive() (*chainhash.Hash, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a string.\n\tvar txHashStr string\n\terr = json.Unmarshal(res, &txHashStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn chainhash.NewHashFromStr(txHashStr)\n}", "title": "" }, { "docid": "0624950c97e82a09745688e291b99350", "score": "0.49729452", "text": "func (r *FutureGetHashesPerSecResult) Receive() (int64, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\n\t// Unmarshal result as an int64.\n\tvar result int64\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "9f8f2456b24a9c407ec2c6cc2f379f6f", "score": "0.4960261", "text": "func (c Client) GetRegistrationResponse() proto.RegisterResponse {\n\tvar ret proto.RegisterResponse\n\tmsg := <-c.channels.registerResponse\n\tret = msg\n\treturn ret\n}", "title": "" }, { "docid": "36f22a3fcc37fc3c260949dff2ce8edb", "score": "0.495989", "text": "func (r FutureVolatileCheckpointResult) Receive() error {\n\t_, err := receiveFuture(r)\n\treturn err\n}", "title": "" }, { "docid": "f375be5e80be2f39d85993fbb28f91ef", "score": "0.4958776", "text": "func (a *Api) HandleRegistration(w http.ResponseWriter, r *http.Request) {\n\tvar reqBody struct {\n\t\tLogin string `json:\"login\"`\n\t\tPassword string `json:\"password\"`\n\t\tName string `json:\"name\"`\n\t}\n\tif err := json.NewDecoder(r.Body).Decode(&reqBody); err != nil {\n\t\treplyWithError(w, http.StatusBadRequest, fmt.Errorf(\"decode request body: %v\", err))\n\t\treturn\n\t}\n\tdefer r.Body.Close()\n\tif err := insertUser(a.db, reqBody.Login, reqBody.Password, reqBody.Name); err != nil {\n\t\terr = fmt.Errorf(\"insert new user: %v\", err)\n\t\tlogE.Print(err)\n\t\treplyWithError(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "685f9e95184edff248e07d1903180bba", "score": "0.49538407", "text": "func newFutureResponse(opcode linux.FUSEOpcode) *futureResponse {\n\treturn &futureResponse{\n\t\topcode: opcode,\n\t\tch: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "6e6dfd4340444232b264a0504babc04d", "score": "0.4940507", "text": "func (f *GetRoomFuture) Wait() (*GetRoomResponse, error) {\n\t<-f.done\n\treturn f.rsp, f.err\n}", "title": "" }, { "docid": "26a34d5b06982f8424fa54346f99c005", "score": "0.49217173", "text": "func (r FutureGetTxOutResult) Receive() (*results.GetTxOutResult, error) {\n\tres, err := ReceiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// take care of the special case where the output has been spent already\n\t// it should return the string \"null\"\n\tif string(res) == \"null\" {\n\t\treturn nil, nil\n\t}\n\n\t// Unmarshal result as an gettxout result object.\n\tvar txOutInfo *results.GetTxOutResult\n\terr = json.Unmarshal(res, &txOutInfo)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn txOutInfo, nil\n}", "title": "" }, { "docid": "7ba225f807215ec900cc01e5430ee1bd", "score": "0.4914393", "text": "func (r *FutureCreateRawSStxResult) Receive() (*wire.MsgTx, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a string.\n\tvar txHex string\n\terr = json.Unmarshal(res, &txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Decode the serialized transaction hex to raw bytes.\n\tserializedTx, err := hex.DecodeString(txHex)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Deserialize the transaction and return it.\n\tvar msgTx wire.MsgTx\n\tif err := msgTx.Deserialize(bytes.NewReader(serializedTx)); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &msgTx, nil\n}", "title": "" }, { "docid": "d4b74fa3c8bab862276aecce75a4a0fd", "score": "0.49142686", "text": "func (nr *namedReceiver) Receive(ctx context.Context, callbackID string, result Result) error {\n\tmetricRecvTotal.WithLabelValues(nr.ns.destType.String(), result.String())\n\treturn nr.r.Receive(ctx, callbackID, result)\n}", "title": "" }, { "docid": "f38838ec1f9a5e4eea052fe1147aa81b", "score": "0.4912288", "text": "func (r *Registry) WaitForCompletion() {\n\tr.wg.Wait()\n}", "title": "" }, { "docid": "21620883f374bb2892c671e08256e690", "score": "0.4905354", "text": "func UserRegisteration(w http.ResponseWriter, r *http.Request) {\n\n\t//Allow CORS here By * or specific origin\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type\")\n\t// return \"OKOK\"\n\n\tlog.Println(\"*** Inside Registration ***\")\n\n\theader := r.Header.Get(\"Content-Type\")\n\tif header != \"application/json\" {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tres := router.Response{}\n\t\tres.Error = \"ERROR\"\n\t\tres.ErrorCode = \"E001\"\n\t\tres.Message = router.ErrorMap[\"E001\"]\n\t\tjson.NewEncoder(w).Encode(res)\n\t\tlog.Println(\"*** ERROR *** \\n\", router.ErrorMap[\"E001\"])\n\t\treturn\n\t}\n\n\tb, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusPartialContent)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tres := router.Response{}\n\t\tres.Error = \"ERROR\"\n\t\tres.ErrorCode = \"E002\"\n\t\tres.Message = router.ErrorMap[\"E002\"]\n\t\tjson.NewEncoder(w).Encode(res)\n\t\tlog.Println(\"*** ERROR *** \\n\", router.ErrorMap[\"E002\"])\n\t\treturn\n\t}\n\n\tvar id int\n\tid, err = srv.UserRegistrationService(b)\n\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusOK)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tres := router.Response{}\n\t\tres.Error = \"ERROR\"\n\t\tres.ErrorCode = \"SRVERR\"\n\t\tres.Message = err.Error()\n\t\tjson.NewEncoder(w).Encode(res)\n\t\t//log.Println(\"*** ERROR *** \\n\", err.Error())\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tres := router.Response{}\n\tres.Error = \"NONE\"\n\tres.ErrorCode = \"S001\"\n\tres.Message = router.ErrorMap[\"S001\"]\n\tjson.NewEncoder(w).Encode(res)\n\tlog.Println(\"*** Success *** \\n\", router.ErrorMap[\"S001\"], \" NEW ID\", id)\n\treturn\n\n}", "title": "" }, { "docid": "99a15d807076b94d4c0d6d299bfd7d3b", "score": "0.48916957", "text": "func LookupRegistration(ctx *pulumi.Context, args *LookupRegistrationArgs, opts ...pulumi.InvokeOption) (*LookupRegistrationResult, error) {\n\tvar rv LookupRegistrationResult\n\terr := ctx.Invoke(\"google-native:domains/v1beta1:getRegistration\", args, &rv, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &rv, nil\n}", "title": "" }, { "docid": "a4dc31e8be2ae35d3829b1a5848354d1", "score": "0.48854077", "text": "func finishRegistration(this js.Value, inputs []js.Value) interface{} {\n\t// Get parameters\n\tuserStr := inputs[0].String()\n\tregistrationSessionDataStr := inputs[1].String()\n\tbody := inputs[2].String()\n\tcallback := inputs[len(inputs)-1:][0]\n\n\t// Check if we have context first!\n\tif webAuthn == nil {\n\t\tcallback.Invoke(\"Context not initialized!\", js.Null())\n\t\treturn js.Null()\n\t}\n\n\tvar user User\n\terr := json.Unmarshal([]byte(userStr), &user)\n\tif err != nil {\n\t\tcallback.Invoke(\"Failed to parse user: \"+err.Error(), js.Null())\n\t\treturn js.Null()\n\t}\n\n\tsessionData := webauthn.SessionData{}\n\terr = json.Unmarshal([]byte(registrationSessionDataStr), &sessionData)\n\tif err != nil {\n\t\tcallback.Invoke(err.Error(), js.Null())\n\t\treturn js.Null()\n\t}\n\n\tr := protocol.Request{}\n\tr.Body = ioutil.NopCloser(bytes.NewReader([]byte(body)))\n\tcredential, err := webAuthn.FinishRegistration(user, sessionData, &r)\n\tif err != nil {\n\t\tcallback.Invoke(err.Error(), js.Null())\n\t\treturn js.Null()\n\t}\n\n\tcallback.Invoke(js.Null(), responseJS(*credential))\n\treturn js.Null()\n}", "title": "" }, { "docid": "b80602c8aa9dfcf567a81243493cf3c7", "score": "0.48750758", "text": "func (f FutureStringArray) Receive() (*[]string, error) {\n\tres, err := ReceiveFuture(f)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal the result as a string.\n\tvar result []string\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &result, nil\n}", "title": "" }, { "docid": "864abdbb825216ddcf3687e8d846fe93", "score": "0.48665527", "text": "func (s *EkadashiBot) handleRegistration(username string) error {\n\tpassword := generateHash(username)\n\tuserRequest, err := marshalMessage(username, password)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot unmarshal user: %v\", err)\n\t}\n\tresp, err := http.Post(s.serverURL+s.registerURL, \"application/json\", userRequest)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot send request: %v\", err)\n\t}\n\tdefer resp.Body.Close()\n\tif resp.StatusCode != http.StatusOK {\n\t\terrorMessage := new(errorMessage)\n\t\terr := json.NewDecoder(resp.Body).Decode(&errorMessage)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"cannot decode request: %v\", err)\n\t\t}\n\t\tif resp.StatusCode != http.StatusConflict {\n\t\t\treturn fmt.Errorf(\"cannot register user: %v %v %v\", resp.Status, resp.Header, errorMessage.Reason)\n\t\t}\n\t}\n\terr = s.addUser(User{ID: username, Password: password})\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = s.handleLogin(username)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot login user: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "732bee96afcada5595ebc9103e41cd45", "score": "0.48649725", "text": "func (u *Connection) Receive() error {\n\tres, err := u.readResponse()\n\tif err != nil {\n\t\tlog.Printf(\"[Receive] Error: %s\", err)\n\t\tu.conn.Close()\n\t\treturn err\n\t}\n\tif res == nil {\n\t\t// Handled some control message.\n\t\treturn nil\n\t}\n\tlog.Printf(\"[Connection.Receive] Received response %v\", res.Result)\n\t/*\n\t\tswitch req.Method {\n\t\tcase \"rename\":\n\t\t\tname, ok := req.Params[\"name\"].(string)\n\t\t\tif !ok {\n\t\t\t\treturn u.writeErrorTo(req, websockets.Params{\n\t\t\t\t\t\"error\": \"bad params\",\n\t\t\t\t})\n\t\t\t}\n\t\t\tprev, ok := u.ConnectionsManager.Rename(u, name)\n\t\t\tif !ok {\n\t\t\t\treturn u.writeErrorTo(req, websockets.Params{\n\t\t\t\t\t\"error\": \"already exists\",\n\t\t\t\t})\n\t\t\t}\n\t\t\tu.ConnectionsManager.Broadcast(\"rename\", websockets.Params{\n\t\t\t\t\"prev\": prev,\n\t\t\t\t\"name\": name,\n\t\t\t\t\"time\": timestamp(),\n\t\t\t})\n\t\t\treturn u.writeResultTo(req, nil)\n\t\tcase \"publish\":\n\t\t\treq.Params[\"author\"] = u.name\n\t\t\treq.Params[\"time\"] = timestamp()\n\t\t\tu.ConnectionsManager.Broadcast(\"publish\", req.Params)\n\t\tdefault:\n\t\t\treturn u.writeErrorTo(req, websockets.Params{\n\t\t\t\t\"error\": \"not implemented\",\n\t\t\t})\n\t\t}\n\t*/\n\treturn nil\n}", "title": "" }, { "docid": "1bbb92189633a45f7740ded4b6622088", "score": "0.48555458", "text": "func (f *CreateSceneFuture) Wait() (*CreateSceneResponse, error) {\n\t<-f.done\n\treturn f.rsp, f.err\n}", "title": "" }, { "docid": "33b637169bb3d036d8e0da4aa06b2d8c", "score": "0.48502666", "text": "func (r *FutureLoadTxFilterResult) Receive() error {\n\t_, err := receiveFuture(r.ctx, r.c)\n\treturn err\n}", "title": "" }, { "docid": "2445e04580389c39f98a01321f011164", "score": "0.48237744", "text": "func (r *FutureDecodeRawTransactionResult) Receive() (*chainjson.TxRawResult, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a decoderawtransaction result object.\n\tvar rawTxResult chainjson.TxRawResult\n\terr = json.Unmarshal(res, &rawTxResult)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &rawTxResult, nil\n}", "title": "" }, { "docid": "152f561838df1fe024ce53ad957c04f4", "score": "0.48225325", "text": "func DeRegistration(ue *RanUeContext) error {\n\n\tvar n int\n\tvar sendMsg []byte\n\tvar recvMsg = make([]byte, 2048)\n\n\t// send NAS Deregistration Request (UE Originating)\n\tmobileIdentity5GS := nasType.MobileIdentity5GS{\n\t\tLen: 11, // 5g-guti\n\t\tBuffer: []uint8{0x02, 0x02, 0xf8, 0x39, 0xca, 0xfe, 0x00, 0x00, 0x00, 0x00, 0x01},\n\t}\n\tpdu := nasTestpacket.GetDeregistrationRequest(nasMessage.AccessType3GPP, 0, 0x04, mobileIdentity5GS)\n\tpdu, err := EncodeNasPduWithSecurity(ue, pdu, nas.SecurityHeaderTypeIntegrityProtectedAndCiphered, true, false)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error encoding Deregistration NAS with Security\")\n\t\treturn err\n\t}\n\tsendMsg, err = GetUplinkNASTransport(ue.AmfUeNgapId, ue.RanUeNgapId, pdu)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error building Deregistration NAS\")\n\t\treturn err\n\t}\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending Deregistration NAS to AMF\")\n\t\treturn err\n\t}\n\n\ttime.Sleep(500 * time.Millisecond)\n\n\t// receive Deregistration Accept\n\tn, err = amfConn.Read(recvMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error reading AMF Deregistration Accept\")\n\t\treturn err\n\t}\n\tngapPdu, err := ngap.Decoder(recvMsg[:n])\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error decoding AMF Deregistration Accept\")\n\t\treturn err\n\t}\n\n\tif ngapPdu.Present != ngapType.NGAPPDUPresentInitiatingMessage ||\n\t\tngapPdu.InitiatingMessage.ProcedureCode.Value != ngapType.ProcedureCodeDownlinkNASTransport {\n\t\tlogger.GNBLog.Errorln(\"Error No DownlinkNASTransport received\")\n\t\treturn errors.New(\"Error No DownlinkNASTransport received\")\n\t}\n\n\tnasPdu := GetNasPdu(ue, ngapPdu.InitiatingMessage.Value.DownlinkNASTransport)\n\tif nasPdu == nil {\n\t\tlogger.GNBLog.Errorln(\"Error NAS PDU is nil\")\n\t\treturn errors.New(\"Error NAS PDU is nil\")\n\t}\n\n\tif nasPdu.GmmMessage == nil {\n\t\tlogger.GNBLog.Errorln(\"Error GMM Message is nil\")\n\t\treturn errors.New(\"Error GMM Message is nil\")\n\t}\n\n\tif nasPdu.GmmHeader.GetMessageType() != nas.MsgTypeDeregistrationAcceptUEOriginatingDeregistration {\n\t\tlogger.GNBLog.Errorln(\"Error Received wrong GMM message\")\n\t\treturn errors.New(\"Error Received wrong GMM message\")\n\t}\n\n\t// receive ngap UE Context Release Command\n\tn, err = amfConn.Read(recvMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error reading UE Context Release Command\")\n\t\treturn err\n\t}\n\n\tngapPdu, err = ngap.Decoder(recvMsg[:n])\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error decoding UE Context Release Command\")\n\t\treturn err\n\t}\n\n\tif ngapPdu.Present != ngapType.NGAPPDUPresentInitiatingMessage ||\n\t\tngapPdu.InitiatingMessage.ProcedureCode.Value != ngapType.ProcedureCodeUEContextRelease {\n\t\tlogger.GNBLog.Errorln(\"Error No UEContextReleaseCommand received\")\n\t\treturn errors.New(\"Error No UEContextReleaseCommand received\")\n\t}\n\n\t// send ngap UE Context Release Complete\n\tsendMsg, err = GetUEContextReleaseComplete(ue.AmfUeNgapId, ue.RanUeNgapId, nil)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error building ngap UE Context Release Complete\")\n\t\treturn err\n\t}\n\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending ngap UE Context Release Complete\")\n\t\treturn err\n\t}\n\n\ttime.Sleep(time.Second * 1)\n\treturn nil\n\n}", "title": "" }, { "docid": "126f52e79f25f1689315cc8cfb9a758f", "score": "0.48121017", "text": "func RegisterDevice(makepl MakePayload, fail func(core.ISockMessage), success func(core.ISockMessage)) {\n\t// Getting the device registration\n\t// for the device registration we need the user details\n\tlog.Info(\"Now trying to verify registration of the device with luminapi...\")\n\tregUrl := os.Getenv(\"REGBASEURL\")\n\t// Here if the registration url is not set, it would mean the client does not want any regisrations to be checked\n\tif regUrl == \"\" {\n\t\tsuccess(nil)\n\t\treturn\n\t}\n\tpayload, err := makepl()\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err_payload\": err,\n\t\t}).Error(\"Failed to make payload for registering the device: Will not continue to verify registeration\")\n\t\tfail(&core.SockMessage{Reg: false})\n\t\treturn\n\t}\n\tbody, _ := json.Marshal(payload)\n\treq, _ := http.NewRequest(\"POST\", fmt.Sprintf(\"%s\", regUrl), bytes.NewBuffer(body))\n\tresp, err := (&http.Client{}).Do(req)\n\n\tif err != nil {\n\t\t// Error here would mean the request for registration did not go thru\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"reg_base_url\": regUrl,\n\t\t\t\"reponse_err\": err,\n\t\t}).Error(\"Failed to contact server for registration, device may have lost internet connection or the service on the cloud may not be running.\")\n\t\t// Changing this from nil to &core.SockMessage, refer to issue #2\n\t\tfail(&core.SockMessage{Reg: false})\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\tvar sockMsg core.ISockMessage\n\tbody, err = ioutil.ReadAll(resp.Body)\n\tif resp.StatusCode != 200 {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"Reg_resp_status\": resp.StatusCode,\n\t\t\t\"body\": string(body),\n\t\t}).Error(\"Failed to register device with lumin server\")\n\t\tsockMsg = &core.SockMessage{Reg: false}\n\t\tfail(sockMsg)\n\t\treturn\n\t}\n\t// Incase the request succeeds the body of the response contains the default schedules\n\t// httpResult := map[string]interface{}{} // expected output data shape\n\tlog.Info(\"Done registering the device withg luminapi\")\n\thttpResult := &core.SchedSockMessage{SockMessage: &core.SockMessage{Reg: true}}\n\tif json.Unmarshal(body, httpResult) != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"response_body\": string(body),\n\t\t}).Error(\"RegisterDevice:failed to unmarshal response body\")\n\t}\n\tsuccess(httpResult)\n\treturn\n}", "title": "" }, { "docid": "f33bde3f8a69ad8726e4d37f57c09e98", "score": "0.48117617", "text": "func (r *FutureGetWork) Receive() (*chainjson.GetWorkResult, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a getwork result object.\n\tvar result chainjson.GetWorkResult\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &result, nil\n}", "title": "" }, { "docid": "c2848f7353f1550c3019532d66c7bfde", "score": "0.48051488", "text": "func (r *RegistryServer) Register(ctx context.Context, request *pb.RegisterRequest) (*pb.RegisterResponse, error) {\n\n\tinstance := registry.NewInstance(request.Instance)\n\n\tin, _ := r.registry.Register(instance)\n\tif request.Type == pb.ReplicationType_Yes {\n\t\tserverInstance := registry.NewServiceInstance(in)\n\t\tr.pool.PushSyncMessage(&p2p.SyncMessage{\n\t\t\tType: p2p.SyncRegType,\n\t\t\tContent: &pb.RegisterRequest{\n\t\t\t\tType: pb.ReplicationType_No,\n\t\t\t\tInstance: serverInstance,\n\t\t\t},\n\t\t})\n\t}\n\treturn &pb.RegisterResponse{\n\t\tCode: 0,\n\t\tMessage: \"success\",\n\t\tInstance: registry.NewServiceInstance(in),\n\t}, nil\n}", "title": "" }, { "docid": "47d38aeb85a0e6299125db114e80428c", "score": "0.47991583", "text": "func (r *writeRequestFuture) Recv() (interface{}, time.Duration, error) {\n\tr.wg.Wait()\n\tr.s.writeMu.Lock()\n\tif r.s.write[r.from] == r {\n\t\tdelete(r.s.write, r.from)\n\t}\n\tr.s.writeMu.Unlock()\n\treturn r.resp, r.elap, r.err\n}", "title": "" }, { "docid": "7610fbbf5e7534be60b6d7992b7e2b3f", "score": "0.47972363", "text": "func Registration(ueID string) (*RanUeContext, error) {\n\n\tvar n int\n\tvar sendMsg []byte\n\tvar recvMsg = make([]byte, 2048)\n\n\t// RAN connect to AMF\n\terr := checkAmfConnection()\n\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error connecting to the AMF\")\n\t\treturn nil, err\n\t}\n\n\t// New UE\n\t// ue := test.NewRanUeContext(\"imsi-2089300007487\", 1, security.AlgCiphering128NEA2, security.AlgIntegrity128NIA2)\n\tue := NewRanUeContext(ueID, 1, security.AlgCiphering128NEA0, security.AlgIntegrity128NIA2)\n\tue.AmfUeNgapId = 1\n\tue.AuthenticationSubs = GetAuthSubscription(APIConfig.Configuration.Security.K,\n\t\tAPIConfig.Configuration.Security.OPC,\n\t\tAPIConfig.Configuration.Security.OP)\n\n\tsuci, err := supiToSuci(ueID)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error encoding SUPI to SUCI\")\n\t\treturn nil, err\n\t}\n\n\t// send InitialUeMessage(Registration Request)(imsi- 02 08 93 00 00 74 87)\n\tmobileIdentity5GS := nasType.MobileIdentity5GS{\n\t\tLen: 12, // suci\n\t\tBuffer: suci,\n\t}\n\n\tueSecurityCapability := ue.GetUESecurityCapability()\n\tregistrationRequest := nasTestpacket.GetRegistrationRequest(\n\t\tnasMessage.RegistrationType5GSInitialRegistration, mobileIdentity5GS, nil, ueSecurityCapability, nil, nil, nil)\n\tsendMsg, err = GetInitialUEMessage(ue.RanUeNgapId, registrationRequest, \"\")\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error building Initial UE Message\")\n\t\treturn nil, err\n\t}\n\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending Initial UE Message\")\n\t\treturn nil, err\n\t}\n\n\t// receive NAS Authentication Request Msg\n\tn, err = amfConn.Read(recvMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error reading NAS Authentication Request Msg\")\n\t\treturn nil, err\n\t}\n\tngapPdu, err := ngap.Decoder(recvMsg[:n])\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error decoding NAS Authentication Request Msg\")\n\t\treturn nil, err\n\t}\n\tif ngapPdu.Present != ngapType.NGAPPDUPresentInitiatingMessage {\n\t\tlogger.GNBLog.Errorln(\"Error No NGAP Initiating Message received.\")\n\t\treturn nil, err\n\t}\n\n\t// Calculate for RES*\n\tnasPdu := GetNasPdu(ue, ngapPdu.InitiatingMessage.Value.DownlinkNASTransport)\n\trand := nasPdu.AuthenticationRequest.GetRANDValue()\n\tresStat := ue.DeriveRESstarAndSetKey(ue.AuthenticationSubs, rand[:], APIConfig.Configuration.Security.NetworkName)\n\n\t// send NAS Authentication Response\n\tpdu := nasTestpacket.GetAuthenticationResponse(resStat, \"\")\n\tsendMsg, err = GetUplinkNASTransport(ue.AmfUeNgapId, ue.RanUeNgapId, pdu)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error building NAS UplinkNASTransport\")\n\t\treturn nil, err\n\t}\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending NAS UplinkNASTransport\")\n\t\treturn nil, err\n\t}\n\n\t// receive NAS Security Mode Command Msg\n\tn, err = amfConn.Read(recvMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error reading NAS Security Mode Command Msg\")\n\t\treturn nil, err\n\t}\n\tngapPdu, err = ngap.Decoder(recvMsg[:n])\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error decoding NAS Security Mode Command Msg\")\n\t\treturn nil, err\n\t}\n\tnasPdu = GetNasPdu(ue, ngapPdu.InitiatingMessage.Value.DownlinkNASTransport)\n\tif nasPdu.GmmHeader.GetMessageType() != nas.MsgTypeSecurityModeCommand {\n\t\tlogger.GNBLog.Errorln(\"No Security Mode Command received. Message: \" + strconv.Itoa(int(nasPdu.GmmHeader.GetMessageType())))\n\t\treturn nil, errors.New(\"No Security Mode Command received. Message: \" + strconv.Itoa(int(nasPdu.GmmHeader.GetMessageType())))\n\t}\n\n\t// send NAS Security Mode Complete Msg\n\tregistrationRequestWith5GMM := nasTestpacket.GetRegistrationRequest(nasMessage.RegistrationType5GSInitialRegistration,\n\t\tmobileIdentity5GS, nil, ueSecurityCapability, ue.Get5GMMCapability(), nil, nil)\n\tpdu = nasTestpacket.GetSecurityModeComplete(registrationRequestWith5GMM)\n\tpdu, err = EncodeNasPduWithSecurity(ue, pdu, nas.SecurityHeaderTypeIntegrityProtectedAndCipheredWithNew5gNasSecurityContext, true, true)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error encoding NAS PDU with Security\")\n\t\treturn nil, err\n\t}\n\tsendMsg, err = GetUplinkNASTransport(ue.AmfUeNgapId, ue.RanUeNgapId, pdu)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending NAS PDU with Security\")\n\t\treturn nil, err\n\t}\n\t_, err = amfConn.Write(sendMsg)\n\n\t// receive ngap Initial Context Setup Request Msg\n\tn, err = amfConn.Read(recvMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error reading ngap Initial Context Setup Request Msg\")\n\t\treturn nil, err\n\t}\n\tngapPdu, err = ngap.Decoder(recvMsg[:n])\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error decoding ngap Initial Context Setup Request Msg\")\n\t\treturn nil, err\n\t}\n\tif ngapPdu.Present != ngapType.NGAPPDUPresentInitiatingMessage ||\n\t\tngapPdu.InitiatingMessage.ProcedureCode.Value != ngapType.ProcedureCodeInitialContextSetup {\n\t\tlogger.GNBLog.Errorln(\"Error No InitialContextSetup received\")\n\t\treturn nil, errors.New(\"Error No InitialContextSetup received\")\n\t}\n\n\t// send ngap Initial Context Setup Response Msg\n\tsendMsg, err = GetInitialContextSetupResponse(ue.AmfUeNgapId, ue.RanUeNgapId)\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending ngap Initial Context Setup Response Msg\")\n\t\treturn nil, err\n\t}\n\n\t// send NAS Registration Complete Msg\n\tpdu = nasTestpacket.GetRegistrationComplete(nil)\n\tpdu, err = EncodeNasPduWithSecurity(ue, pdu, nas.SecurityHeaderTypeIntegrityProtectedAndCiphered, true, false)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error encoding NAS Registration Complete Msg with Security\")\n\t\treturn nil, err\n\t}\n\n\tsendMsg, err = GetUplinkNASTransport(ue.AmfUeNgapId, ue.RanUeNgapId, pdu)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error building NAS Registration Complete Msg with Security\")\n\t\treturn nil, err\n\t}\n\n\t_, err = amfConn.Write(sendMsg)\n\tif err != nil {\n\t\tlogger.GNBLog.Errorln(\"Error sending NAS Registration Complete Msg with Security\")\n\t\treturn nil, err\n\t}\n\n\ttime.Sleep(1 * time.Second)\n\n\treturn ue, err\n\n}", "title": "" }, { "docid": "011ded7c78f098bde562f539241aa16d", "score": "0.47960922", "text": "func decodeGRPCRegisterNodeResponse(_ context.Context, grpcReply interface{}) (interface{}, error) {\n\treply := grpcReply.(*pb.RegisterNodeReply)\n\treturn endpoint.RegisterNodeResponse{ID: reply.NodeID, Err: str2err(reply.Err)}, nil\n}", "title": "" }, { "docid": "3422490d93c884b5096415d5bafd3ddd", "score": "0.4769482", "text": "func (ec *eventsClient) register(ies []*fabricpb.Interest) error {\n\tvar err error\n\tif err = ec.RegisterAsync(ies); err != nil {\n\t\treturn err\n\t}\n\tregChan := make(chan struct{})\n\tgo func() {\n\t\tdefer close(regChan)\n\t\tin, inerr := ec.stream.Recv()\n\t\tif inerr != nil {\n\t\t\terr = inerr\n\t\t\treturn\n\t\t}\n\t\tswitch in.Event.(type) {\n\t\tcase *fabricpb.Event_Register:\n\t\tcase nil:\n\t\t\terr = fmt.Errorf(\"invalid nil object for register\")\n\t\tdefault:\n\t\t\terr = fmt.Errorf(\"invalid registration object\")\n\t\t}\n\t}()\n\tselect {\n\tcase <-regChan:\n\tcase <-time.After(ec.regTimeout):\n\t\terr = fmt.Errorf(\"timeout waiting for registration\")\n\t}\n\treturn err\n}", "title": "" }, { "docid": "c453f61be696e4393acf8d33b421574f", "score": "0.47672287", "text": "func receiveChallengeResponse(s *slave) (verified bool, err error) {\n\tchallengePacket := new(slaveDiscoveryChallengeResponse)\n\t// this is to allow hashing even if the packet reception fails (to avoid a possible timing attack)\n\tchallengePacket.Hash = []byte{}\n\n\terr = s.decoder.Decode(challengePacket)\n\t// check that hashes are the same that we expect\n\tverificationSignature := sha256.Sum256(append(s.nonce, []byte(globalConfig.Security.SecretKey)...))\n\tverified = string(verificationSignature[:]) == string(challengePacket.Hash)\n\n\treturn\n}", "title": "" }, { "docid": "0d7b7fd9ccf394c1fb387b92a1f1d6c2", "score": "0.47592044", "text": "func (ra *REGAgent) Register(r registry.ServiceRegistrationRequest) (registry.ServiceRegistrationResponse, error) {\n\tra.client.NewRequest(r)\n\n\tresponse, err := ra.client.Register()\n\tif err != nil {\n\t\tlog.Printf(\"service registration failed: %s\", err)\n\t\tlog.Print(\"keep trying registration\")\n\t\tgo ra.client.WatchRegistry()\n\t}\n\n\treturn response, err\n}", "title": "" }, { "docid": "24c4de501cb9ad8899424a92c7268804", "score": "0.47403285", "text": "func HandleRegister(r *sipnet.Request, conn *sipnet.Conn) {\n\tfrom, to, err := sipnet.ParseUserHeader(r.Header)\n\tif err != nil {\n\t\tresp := sipnet.NewResponse()\n\t\tresp.BadRequest(conn, r, \"Failed to parse From or To header.\")\n\t\treturn\n\t}\n\n\tif to.URI.UserDomain() != from.URI.UserDomain() {\n\t\tresp := sipnet.NewResponse()\n\t\tresp.BadRequest(conn, r, \"User in To and From fields do not match.\")\n\t\treturn\n\t}\n\n\tauthHeader := r.Header.Get(\"Authorization\")\n\tif authHeader == \"\" {\n\t\trequestAuthentication(r, conn, from)\n\t\treturn\n\t}\n\n\targs, err := parseAuthHeader(authHeader)\n\tif err != nil {\n\t\tresp := sipnet.NewResponse()\n\t\tresp.BadRequest(conn, r, \"Failed to parse Authorization header.\")\n\t\treturn\n\t}\n\n\tcheckAuthorization(r, conn, args, from)\n}", "title": "" }, { "docid": "4cffe4a5ce7617b43a061766bfc4ee49", "score": "0.4739645", "text": "func (w *WalletClient) Register(header http.Header, body *wallet.RegisterWalletBody) (result *wallet.WalletResponse, err error) {\n\tif body == nil {\n\t\terr = fmt.Errorf(\"request payload invalid\")\n\t\treturn\n\t}\n\n\t// Build http request\n\tr := w.c.NewRequest(\"POST\", \"/v1/wallet/register\")\n\tr.SetHeaders(header)\n\tr.SetBody(body)\n\n\t// Do http request\n\t_, resp, err := restapi.RequireOK(w.c.DoRequest(r))\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\t// Parse http response\n\tvar respBody rtstructs.Response\n\tif err = restapi.DecodeBody(resp, &respBody); err != nil {\n\t\treturn\n\t}\n\n\tif respBody.ErrCode != errors.SuccCode {\n\t\terr = rest.CodedError(respBody.ErrCode, respBody.ErrMessage)\n\t\treturn\n\t}\n\n\tpayload, ok := respBody.Payload.(string)\n\tif !ok {\n\t\terr = fmt.Errorf(\"response payload type invalid: %v\", reflect.TypeOf(respBody.Payload))\n\t\treturn\n\t}\n\n\terr = json.Unmarshal([]byte(payload), &result)\n\n\tresult, err = w.trusteeKeyPair(header, result)\n\treturn\n}", "title": "" }, { "docid": "a05f165b154f22ea0550d81ad7c3dc41", "score": "0.47367382", "text": "func (r *FutureGenerateResult) Receive() ([]*chainhash.Hash, error) {\n\tres, err := receiveFuture(r.ctx, r.c)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Unmarshal result as a list of strings.\n\tvar result []string\n\terr = json.Unmarshal(res, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Convert each block hash to a chainhash.Hash and store a pointer to\n\t// each.\n\tconvertedResult := make([]*chainhash.Hash, len(result))\n\tfor i, hashString := range result {\n\t\tconvertedResult[i], err = chainhash.NewHashFromStr(hashString)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn convertedResult, nil\n}", "title": "" }, { "docid": "529b43853f77a48eba16dc57811bde39", "score": "0.47267595", "text": "func waitAndRouteKeyRegistrationEvent(asyncRes *gocelery.AsyncResult, confirmations chan<- *WatchIdentity, pushThisIdentity Identity) {\n\t_, err := asyncRes.Get(ethereum.GetDefaultContextTimeout())\n\tconfirmations <- &WatchIdentity{Identity: pushThisIdentity, Error: err}\n}", "title": "" }, { "docid": "c346cafcaeb67ba728488d7c1ff1a5c6", "score": "0.4721445", "text": "func TestRegistrationError(t *testing.T) {\n\tonce.Do(startServer) \n\n\terr := srv.Register(new(ReplyNotPointer))\n\tif err == nil {\n\t\tt.Error(\"expected error registering ReplyNotPointer\")\n\t}\n\terr = srv.Register(new(ArgNotPublic))\n\tif err == nil {\n\t\tt.Error(\"expected error registering ArgNotPublic\")\n\t}\n\terr = srv.Register(new(ReplyNotPublic))\n\tif err == nil {\n\t\tt.Error(\"expected error registering ReplyNotPublic\")\n\t}\n\terr = srv.Register(NeedsPtrType(0))\n\tif err == nil {\n\t\tt.Error(\"expected error registering NeedsPtrType\")\n\t} \n}", "title": "" }, { "docid": "55e4a93a28fed4be3e76d29f339f706d", "score": "0.47179285", "text": "func (c *taskContext) ReceiveResult(resp *pb.TaskResponse) {\n\tdefer func() {\n\t\t// check if task completed,\n\t\t// if yes, closes the merger\n\t\tif c.Completed() && c.completed.CAS(false, true) {\n\t\t\tc.merger.close()\n\t\t}\n\t}()\n\tif len(resp.ErrMsg) > 0 {\n\t\tc.expectResults.Store(0)\n\t\tc.err = errors.New(resp.ErrMsg)\n\t\treturn\n\t}\n\t// task is completed need return it\n\tif c.Completed() {\n\t\treturn\n\t}\n\t// merge the response\n\tc.merger.merge(resp)\n\t// if task is completed, reduces expect result count\n\tif resp.Completed {\n\t\tc.expectResults.Dec()\n\t}\n}", "title": "" }, { "docid": "ff9c1f5da8441a1f4fd434a55acfbcda", "score": "0.47052127", "text": "func register(res http.ResponseWriter, req *http.Request) {\n if req.Method != \"POST\" {\n http.Error(res, http.StatusText(405), 405)\n return\n }\n //make room for user\n var usr models.CreateUser\n\n //POST request handling\n decoder := json.NewDecoder(req.Body)\n if err := decoder.Decode(&usr); err != nil {\n http.Error(res, http.StatusText(400), 400)\n return\n }\n\n //validate forms\n isValid := validateEmail(usr.Email) && validateGeneral(usr.Username) && validatePassword(usr.Password)\n if !isValid {\n http.Error(res, http.StatusText(422), 422)\n return\n }\n\n //hash pw\n key := []byte(config.Secret)\n hasher := hmac.New(sha256.New, key)\n hasher.Write([]byte(usr.Password))\n hashword := base64.StdEncoding.EncodeToString(hasher.Sum(nil))\n\n //create user since forms are valid\n id, err := db.CreateUser(usr.Email, usr.Username, hashword);\n\n //check if something went wrong\n if err != nil {\n http.Error(res, http.StatusText(500), 500)\n return\n }\n\n //makes token with id hex baked in\n token, errToken := util.MakeToken(id)\n if errToken != nil {\n http.Error(res, http.StatusText(500), 500)\n return\n }\n\n //send user validation email -- this should be done in a goroutine\n go setupEmail(usr.Email, token)\n\n //statuscode 204\n res.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "637349c9442e2cc9529c635ea35e317f", "score": "0.4701325", "text": "func (client *HostPoolsClient) retrieveRegistrationTokenHandleResponse(resp *http.Response) (HostPoolsClientRetrieveRegistrationTokenResponse, error) {\n\tresult := HostPoolsClientRetrieveRegistrationTokenResponse{RawResponse: resp}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.RegistrationInfo); err != nil {\n\t\treturn HostPoolsClientRetrieveRegistrationTokenResponse{}, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "172eb7df83d9a0519829d0540be24b74", "score": "0.46979392", "text": "func Register(w http.ResponseWriter, r *http.Request) {\n\n\tfname := r.FormValue(\"fname\")\n\tlname := r.FormValue(\"lname\")\n\temail := r.FormValue(\"email\")\n\tpassword := r.FormValue(\"password\")\n\n\tsession, err := NewUser(fname, lname, email, password)\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\thttp.Error(w, \"Registration could not be completed at this time.\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif err = json.NewEncoder(w).Encode(RegisterRes{\n\t\tSession: session,\n\t\tResult: result{\n\t\t\tError: \"\",\n\t\t\tMessage: \"Registration successful\",\n\t\t\tStatus: 200,\n\t\t},\n\t}); err != nil {\n\t\tlog.Println(\"JSON encoder error: \" + err.Error())\n\t\thttp.Error(w, err.Error(), http.StatusInternalServerError)\n\t}\n}", "title": "" }, { "docid": "288138ae06f835d23ac184b199cb82d3", "score": "0.46959144", "text": "func (c *Receiver) ReceiveAsync() {\n\tdefer func() {\n\t\tif errs := recover(); errs != nil {\n\t\t\tc.Stop()\n\t\t}\n\n\t\t// debug.PrintStack()\n\t}()\n\n\tif c.connection != nil && !c.connection.IsOpened() {\n\t\tc.Stop()\n\t\treturn\n\t}\n\n\tpdu, err := c.ReceivePDUFromConnection(c.connection, c.unprocessed)\n\tif err != nil {\n\t\tif err == Exception.InvalidPDUException {\n\t\t\tvar seqNr int32\n\t\t\tif pdu != nil {\n\t\t\t\tseqNr = pdu.GetSequenceNumber()\n\t\t\t}\n\n\t\t\tif c.automaticNack {\n\t\t\t\tc.sendGenericNack(Data.ESME_RINVMSGLEN, seqNr)\n\t\t\t} else {\n\t\t\t\tpdu = PDU.NewGenericNackWithCmStatusSeqNum(Data.ESME_RINVMSGLEN, seqNr)\n\t\t\t}\n\t\t} else if err == Exception.UnknownCommandIdException {\n\t\t\tvar seqNr int32\n\t\t\tif pdu != nil {\n\t\t\t\tseqNr = pdu.GetSequenceNumber()\n\t\t\t}\n\n\t\t\tif c.automaticNack {\n\t\t\t\tc.sendGenericNack(Data.ESME_RINVCMDID, seqNr)\n\t\t\t} else {\n\t\t\t\tpdu = PDU.NewGenericNackWithCmStatusSeqNum(Data.ESME_RINVCMDID, seqNr)\n\t\t\t}\n\t\t} else if pdu != nil {\n\t\t\tif c.automaticNack {\n\t\t\t\tc.sendGenericNack(err.ErrorCode, pdu.GetSequenceNumber())\n\t\t\t} else {\n\t\t\t\tpdu = PDU.NewGenericNackWithCmStatusSeqNum(err.ErrorCode, pdu.GetSequenceNumber())\n\t\t\t}\n\t\t}\n\t}\n\n\tif pdu != nil {\n\t\tif c.asynchronousSending {\n\t\t\tc.handle(pdu)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "380da7f4f7f871f9dcffca05baa9e38b", "score": "0.46946627", "text": "func (p *MultiPromise) Receive(valCallback func(PromisedValue), errCallback func(error)) {\n\tp.mux.Lock()\n\tdefer p.mux.Unlock()\n\tnextIndex := 0\n\tfor {\n\t\t// processing the stuff already in p.vals\n\t\tfor nextIndex < len(p.vals) {\n\t\t\tvalCallback(p.vals[nextIndex])\n\t\t\tnextIndex++\n\t\t}\n\t\t// checks error status\n\t\tif p.err != nil {\n\t\t\terrCallback(p.err)\n\t\t}\n\t\t// checks whether p is done\n\t\tif p.isDone() {\n\t\t\treturn\n\t\t}\n\t\t// if not done, wait for a signal\n\t\tp.cv.Wait()\n\t}\n}", "title": "" }, { "docid": "12c037c313e2fe9e4f8f07c0604ac0e5", "score": "0.46698314", "text": "func (arClient *AutoraceClient) RequestPartyCreation(partyConfig models.PartyCreationToken, readyToReceive chan bool) (*models.Party, error) {\n\treceived := make(chan interface{})\n\t// start the handling function before sending a request\n\tgo func() {\n\t\terr := arClient.rabbitConnection.ReceiveMessageOnTopic(\"autocar.party.creation.\"+arClient.playerUUID.String(), arClient.computePartyCreationResponse, received, readyToReceive)\n\t\tif err != nil {\n\t\t\tlogger.Error(\"error while receiving Party creation from server :\", err)\n\t\t\treturn\n\t\t}\n\t}()\n\t// waiting for listener to be started\n\t<-readyToReceive\n\t// send the actual request\n\tgo func() {\n\t\tarClient.rabbitConnection.SendMessageOnTopic(partyConfig, \"autocar.party.creation\")\n\t}()\n\t// waiting response\n\tresponse := <-received\n\t// handle response\n\tif response == nil {\n\t\treturn nil, errors.New(\"unable to receive response to Party creation token\")\n\t}\n\tif reflect.TypeOf(response) == reflect.TypeOf(messaging.ErrorResponse{}) {\n\t\treturn nil, errors.New(response.(messaging.ErrorResponse).ErrorMessage)\n\t}\n\t// store party UUID for further usage\n\tarClient.partyUUID = response.(*models.Party).PartyUUID\n\treturn response.(*models.Party), nil\n}", "title": "" }, { "docid": "76e676977355608181157c922bc8b8d7", "score": "0.46621105", "text": "func (s *RegistryServer) Register(ctx context.Context, request *pb.RegisterRequest) (*pb.RegisterResponse, error) {\n\n\tinstance := registry.NewInstance(request)\n\tin, _ := s.r.Register(instance)\n\n\treturn &pb.RegisterResponse{\n\t\tCode: 0,\n\t\tMessage: \"\",\n\t\tInstance: registry.NewServiceInstance(in),\n\t}, nil\n}", "title": "" }, { "docid": "fa5cb1b7e2e59f96128ae28cdedbcb3d", "score": "0.46605885", "text": "func regCreateHandler(server *Server, client *Client, msg ircmsg.IrcMessage) bool {\n\t// get and sanitise account name\n\taccount := strings.TrimSpace(msg.Params[1])\n\tcasefoldedAccount, err := CasefoldName(account)\n\t// probably don't need explicit check for \"*\" here... but let's do it anyway just to make sure\n\tif err != nil || msg.Params[1] == \"*\" {\n\t\tclient.Send(nil, server.name, ERR_REG_UNSPECIFIED_ERROR, client.nick, account, \"Account name is not valid\")\n\t\treturn false\n\t}\n\n\t// check whether account exists\n\t// do it all in one write tx to prevent races\n\terr = server.store.Update(func(tx *buntdb.Tx) error {\n\t\taccountKey := fmt.Sprintf(keyAccountExists, casefoldedAccount)\n\n\t\t_, err := tx.Get(accountKey)\n\t\tif err != buntdb.ErrNotFound {\n\t\t\t//TODO(dan): if account verified key doesn't exist account is not verified, calc the maximum time without verification and expire and continue if need be\n\t\t\tclient.Send(nil, server.name, ERR_ACCOUNT_ALREADY_EXISTS, client.nick, account, \"Account already exists\")\n\t\t\treturn errAccountCreation\n\t\t}\n\n\t\tregisteredTimeKey := fmt.Sprintf(keyAccountRegTime, casefoldedAccount)\n\n\t\ttx.Set(accountKey, \"1\", nil)\n\t\ttx.Set(fmt.Sprintf(keyAccountName, casefoldedAccount), account, nil)\n\t\ttx.Set(registeredTimeKey, strconv.FormatInt(time.Now().Unix(), 10), nil)\n\t\treturn nil\n\t})\n\n\t// account could not be created and relevant numerics have been dispatched, abort\n\tif err != nil {\n\t\tif err != errAccountCreation {\n\t\t\tclient.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, \"REG\", \"CREATE\", \"Could not register\")\n\t\t\tlog.Println(\"Could not save registration initial data:\", err.Error())\n\t\t}\n\t\treturn false\n\t}\n\n\t// account didn't already exist, continue with account creation and dispatching verification (if required)\n\tcallback := strings.ToLower(msg.Params[2])\n\tvar callbackNamespace, callbackValue string\n\n\tif callback == \"*\" {\n\t\tcallbackNamespace = \"*\"\n\t} else if strings.Contains(callback, \":\") {\n\t\tcallbackValues := strings.SplitN(callback, \":\", 2)\n\t\tcallbackNamespace, callbackValue = callbackValues[0], callbackValues[1]\n\t} else {\n\t\tcallbackNamespace = server.accountRegistration.EnabledCallbacks[0]\n\t\tcallbackValue = callback\n\t}\n\n\t// ensure the callback namespace is valid\n\t// need to search callback list, maybe look at using a map later?\n\tvar callbackValid bool\n\tfor _, name := range server.accountRegistration.EnabledCallbacks {\n\t\tif callbackNamespace == name {\n\t\t\tcallbackValid = true\n\t\t}\n\t}\n\n\tif !callbackValid {\n\t\tclient.Send(nil, server.name, ERR_REG_INVALID_CALLBACK, client.nick, account, callbackNamespace, \"Callback namespace is not supported\")\n\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\treturn false\n\t}\n\n\t// get credential type/value\n\tvar credentialType, credentialValue string\n\n\tif len(msg.Params) > 4 {\n\t\tcredentialType = strings.ToLower(msg.Params[3])\n\t\tcredentialValue = msg.Params[4]\n\t} else if len(msg.Params) == 4 {\n\t\tcredentialType = \"passphrase\" // default from the spec\n\t\tcredentialValue = msg.Params[3]\n\t} else {\n\t\tclient.Send(nil, server.name, ERR_NEEDMOREPARAMS, client.nick, msg.Command, \"Not enough parameters\")\n\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\treturn false\n\t}\n\n\t// ensure the credential type is valid\n\tvar credentialValid bool\n\tfor _, name := range server.accountRegistration.EnabledCredentialTypes {\n\t\tif credentialType == name {\n\t\t\tcredentialValid = true\n\t\t}\n\t}\n\tif credentialType == \"certfp\" && client.certfp == \"\" {\n\t\tclient.Send(nil, server.name, ERR_REG_INVALID_CRED_TYPE, client.nick, credentialType, callbackNamespace, \"You are not using a certificiate\")\n\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\treturn false\n\t}\n\n\tif !credentialValid {\n\t\tclient.Send(nil, server.name, ERR_REG_INVALID_CRED_TYPE, client.nick, credentialType, callbackNamespace, \"Credential type is not supported\")\n\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\treturn false\n\t}\n\n\t// store details\n\terr = server.store.Update(func(tx *buntdb.Tx) error {\n\t\t// certfp special lookup key\n\t\tif credentialType == \"certfp\" {\n\t\t\tassembledKeyCertToAccount := fmt.Sprintf(keyCertToAccount, client.certfp)\n\n\t\t\t// make sure certfp doesn't already exist because that'd be silly\n\t\t\t_, err := tx.Get(assembledKeyCertToAccount)\n\t\t\tif err != buntdb.ErrNotFound {\n\t\t\t\treturn errCertfpAlreadyExists\n\t\t\t}\n\n\t\t\ttx.Set(assembledKeyCertToAccount, casefoldedAccount, nil)\n\t\t}\n\n\t\t// make creds\n\t\tvar creds AccountCredentials\n\n\t\t// always set passphrase salt\n\t\tcreds.PassphraseSalt, err = NewSalt()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Could not create passphrase salt: %s\", err.Error())\n\t\t}\n\n\t\tif credentialType == \"certfp\" {\n\t\t\tcreds.Certificate = client.certfp\n\t\t} else if credentialType == \"passphrase\" {\n\t\t\tcreds.PassphraseHash, err = server.passwords.GenerateFromPassword(creds.PassphraseSalt, credentialValue)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"Could not hash password: %s\", err)\n\t\t\t}\n\t\t}\n\t\tcredText, err := json.Marshal(creds)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Could not marshal creds: %s\", err)\n\t\t}\n\t\ttx.Set(fmt.Sprintf(keyAccountCredentials, account), string(credText), nil)\n\n\t\treturn nil\n\t})\n\n\t// details could not be stored and relevant numerics have been dispatched, abort\n\tif err != nil {\n\t\terrMsg := \"Could not register\"\n\t\tif err == errCertfpAlreadyExists {\n\t\t\terrMsg = \"An account already exists for your certificate fingerprint\"\n\t\t}\n\t\tclient.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, \"REG\", \"CREATE\", errMsg)\n\t\tlog.Println(\"Could not save registration creds:\", err.Error())\n\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\treturn false\n\t}\n\n\t// automatically complete registration\n\tif callbackNamespace == \"*\" {\n\t\terr = server.store.Update(func(tx *buntdb.Tx) error {\n\t\t\ttx.Set(fmt.Sprintf(keyAccountVerified, casefoldedAccount), \"1\", nil)\n\n\t\t\t// load acct info inside store tx\n\t\t\taccount := ClientAccount{\n\t\t\t\tName: strings.TrimSpace(msg.Params[1]),\n\t\t\t\tRegisteredAt: time.Now(),\n\t\t\t\tClients: []*Client{client},\n\t\t\t}\n\t\t\t//TODO(dan): Consider creating ircd-wide account adding/removing/affecting lock for protecting access to these sorts of variables\n\t\t\tserver.accounts[casefoldedAccount] = &account\n\t\t\tclient.account = &account\n\n\t\t\tclient.Send(nil, server.name, RPL_REGISTRATION_SUCCESS, client.nick, account.Name, \"Account created\")\n\t\t\tclient.Send(nil, server.name, RPL_LOGGEDIN, client.nick, client.nickMaskString, account.Name, fmt.Sprintf(\"You are now logged in as %s\", account.Name))\n\t\t\tclient.Send(nil, server.name, RPL_SASLSUCCESS, client.nick, \"Authentication successful\")\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\tclient.Send(nil, server.name, ERR_UNKNOWNERROR, client.nick, \"REG\", \"CREATE\", \"Could not register\")\n\t\t\tlog.Println(\"Could not save verification confirmation (*):\", err.Error())\n\t\t\tremoveFailedRegCreateData(server.store, casefoldedAccount)\n\t\t\treturn false\n\t\t}\n\n\t\treturn false\n\t}\n\n\t// dispatch callback\n\tclient.Notice(fmt.Sprintf(\"We should dispatch a real callback here to %s:%s\", callbackNamespace, callbackValue))\n\n\treturn false\n}", "title": "" }, { "docid": "a34e6b229be9535673be25549a3c7202", "score": "0.46591324", "text": "func (s Server) RegisterFin(u User, r io.Reader) error {\n\tj := json.NewDecoder(r)\n\tb := RegisterResponse{}\n\terr := j.Decode(&b)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif b.RegistrationData == \"\" {\n\t\treturn fmt.Errorf(\"malformed JSON, missing registrationData\")\n\t}\n\n\td, err := s.validateClientData(\"navigator.id.finishEnrollment\", b.ClientData, u.Devices)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = s.validateRegisterResponse(b, d)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tu.Enrolled = true\n\terr = s.Users.PutUser(u)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cc0b3cd26c99b79820d99210d84a86f3", "score": "0.46487254", "text": "func (ad *AuthDelivery) Register(_ context.Context, in *rpc.RegisterRequest) (*rpc.RegisterResponse, error) {\n\t// TODO @winwisely268: currently unimplemented\n\treturn &rpc.RegisterResponse{\n\t\tSuccess: true,\n\t\tSuccessMsg: \"Not implemented\",\n\t\tErrorReason: nil,\n\t}, nil\n}", "title": "" }, { "docid": "17e8e636c743b12ea9a68b3fb8e717f1", "score": "0.46438953", "text": "func (rec *Receiver) Register(w http.ResponseWriter, r *http.Request) {\n\tuser := &User{}\n\terr := json.NewDecoder(r.Body).Decode(user)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprintf(w, \"%s\", err.Error())\n\t\treturn\n\t}\n\n\tif err := rec.Business.Register(user); err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprintf(w, err.Error())\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "55de986c53d1d25eb88bd180bcbee6d2", "score": "0.4638616", "text": "func (ec *eventsClient) RegisterAsync(ies []*fabricpb.Interest) error {\n\temsg := &fabricpb.Event{Event: &fabricpb.Event_Register{Register: &fabricpb.Register{Events: ies}}}\n\tvar err error\n\tif err = ec.send(emsg); err != nil {\n\t\tfmt.Printf(\"error on Register send %s\\n\", err)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "157e7f260236ed07a63565afd5425d44", "score": "0.46166104", "text": "func NewRegistrationListener(p *world.Player) *ResponseListener {\n\treturn &ResponseListener{player: p, listener: make(chan ResponseCode), kind: RegisterCode, result: -555}\n}", "title": "" }, { "docid": "e92d6cd0d099539417a662101940e7f2", "score": "0.46150026", "text": "func (r FutureGetDAGTipsResult) Receive() (*soterjson.GetDAGTipsResult, error) {\n\tres, err := receiveFuture(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar dagSnapshot soterjson.GetDAGTipsResult\n\tif err := json.Unmarshal(res, &dagSnapshot); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &dagSnapshot, nil\n}", "title": "" } ]
8242cd3645491bbdc49580a4f4046044
ProcessOrder runs processing logic on teh order with teh specified ID.
[ { "docid": "9901281b58224fe1c88585adede19c4b", "score": "0.7504757", "text": "func (s *NotificationsService) ProcessOrder(id int) error {\n\torder, err := s.GetOrder(id)\n\tapplesAvail := s.stockCountApples\n\torangesAvail := s.stockCountOranges\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Determine if order can be fulfilled with current stock\n\tfor _, itm := range order.OrderInput {\n\t\tswitch strings.ToLower(itm) {\n\t\tcase \"apple\":\n\t\t\tif applesAvail--; applesAvail == -1 {\n\t\t\t\treturn ErrOutOfStock{\"Apple\"}\n\t\t\t}\n\t\tcase \"orange\":\n\t\t\tif orangesAvail--; orangesAvail == -1 {\n\t\t\t\treturn ErrOutOfStock{\"Orange\"}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Update stock count for this order\n\ts.stockCountApples -= s.stockCountApples - applesAvail\n\ts.stockCountOranges -= s.stockCountOranges - orangesAvail\n\t// Indicate that this order has been processed\n\torder.Status = true\n\treturn nil\n}", "title": "" } ]
[ { "docid": "cef9ca21a15df0c5fa15b5e4f897e3bf", "score": "0.70933133", "text": "func ProcessOrder(order models.Order, db *sqlx.DB) {\n\tdb.MustExec(\"UPDATE orders SET status='close' WHERE id=?\", order.ID)\n\tfmt.Printf(\"ORDER PROCESSED : %s\\n\", order.UUID)\n\tfmt.Println(\"----------------------------------------------\")\n}", "title": "" }, { "docid": "46f9bc0c4f29b7770f3567b62def382a", "score": "0.6781503", "text": "func ProcessOrder(o *Order, n Notifier) *Order {\n\to.isProcessed = n.NotifyUser(o.userEmail)\n\n\treturn o\n}", "title": "" }, { "docid": "b467e3e5609853fda44f3a5e5b58ef4d", "score": "0.64249086", "text": "func ProcessOrders(orderFile string) {\n\tvar orders Orders\n\tjsonFile, _ := os.Open(orderFile)\n\torder_file,_ := ioutil.ReadAll(jsonFile)\n\tjson.Unmarshal(order_file,&orders)\n\tfor _,order := range orders.Orders {\n\t\tCoffeeMachine.serve(order.Name)\n\t\t//time.Sleep(10000)\n\t}\n}", "title": "" }, { "docid": "10db38b57de7887834f99a6190484c79", "score": "0.63101065", "text": "func (r *Runtime) processOrders() {\n\tfor {\n\t\torder := <-r.orderStream\n\n\t\tif COMMAND_CODES[order.GetCommandCode()] == \"update tick\" {\n\t\t\t// Don't need to specialy handle this, since all commands may\n\t\t\t// update the tick number as part of them\n\t\t} else if COMMAND_CODES[order.GetCommandCode()] == \"set queue\" {\n\t\t\tentity := GAME.GetEntityByPlayer(order.GetPlayer())\n\n\t\t\tif len(order.GetActions()) <= 0 {\n\t\t\t\tlog.Printf(\"Ignoring %v's set queue: no actions set\",\n\t\t\t\t\torder.GetPlayer().GetName())\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tentity.SetActionQueue(order.GetActions())\n\t\t}\n\n\t\t// Must be done after the rest of the order processing to make sure\n\t\t// that the game state update routine doesn't race condition us\n\t\tupdateTick(order)\n\t}\n}", "title": "" }, { "docid": "f01f54a8d47c37d72dd30396235bfbd5", "score": "0.617687", "text": "func (u *__GroupMember_Updater) OrderId(newVal int) *__GroupMember_Updater {\n\tup := updateCol{\" OrderId = \" + u.nextDollar(), newVal}\n\tu.updates = append(u.updates, up)\n\t// u.updates[\" OrderId = \" + u.nextDollar()] = newVal\n\treturn u\n}", "title": "" }, { "docid": "1fb1cdd9f9efd7922e4d88f88a7cd113", "score": "0.6099797", "text": "func (e *Engine) Process(ctx context.Context, req *engineGrpc.Order) (*engineGrpc.OutputOrders, error) {\n\tbigZero, _ := new(decimal.Big).SetString(\"0.0\")\n\torderString := fmt.Sprintf(\"{\\\"id\\\":\\\"%s\\\", \\\"type\\\": \\\"%s\\\", \\\"amount\\\": \\\"%s\\\", \\\"price\\\": \\\"%s\\\" }\", req.GetID(), req.GetType(), req.GetAmount(), req.GetPrice())\n\n\tvar order engine.Order\n\t// decode the message\n\t// fmt.Println(\"Orderstring =: \", orderString)\n\terr := order.FromJSON([]byte(orderString))\n\tif err != nil {\n\t\tfmt.Println(\"JSON Parse Error =: \", err)\n\t\treturn nil, err\n\t}\n\n\tif order.Amount.Cmp(bigZero) == 0 || order.Price.Cmp(bigZero) == 0 {\n\t\tfmt.Println(\"Invalid JSON\")\n\t\treturn nil, errors.New(\"Invalid JSON\")\n\t}\n\n\tordersProcessed, partialOrder := e.book.Process(order)\n\t// fmt.Printf(\"\\nordersProcessed: %v, \\n\\npartialOrder: %v\\n\", ordersProcessed, partialOrder)\n\n\tordersProcessedString, err := json.Marshal(ordersProcessed)\n\n\tfmt.Println(e.book)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// fmt.Println(\"ordersProcessedString\", string(ordersProcessedString))\n\n\tif partialOrder != nil {\n\t\tvar partialOrderString []byte\n\t\tpartialOrderString, err = json.Marshal(partialOrder)\n\t\treturn &engineGrpc.OutputOrders{OrdersProcessed: string(ordersProcessedString), PartialOrder: string(partialOrderString)}, nil\n\t}\n\treturn &engineGrpc.OutputOrders{OrdersProcessed: string(ordersProcessedString), PartialOrder: \"null\"}, nil\n\n}", "title": "" }, { "docid": "fc380de659696bf9834b20fe96113b84", "score": "0.6038728", "text": "func (u *__HomeFanout_Updater) OrderId(newVal int) *__HomeFanout_Updater {\n\tup := updateCol{\" OrderId = \" + u.nextDollar(), newVal}\n\tu.updates = append(u.updates, up)\n\t// u.updates[\" OrderId = \" + u.nextDollar()] = newVal\n\treturn u\n}", "title": "" }, { "docid": "48088299dc1e9b08f164f5eee1c6bd98", "score": "0.60196185", "text": "func (svc *impl) orderWorker(ctx context.Context, orderNo int64) {\n\tdefer svc.wg.Done()\n\n\t// accepts the incoming order from the `orderChan` and quits if the context of the program is done.\n\tselect {\n\tcase <-ctx.Done():\n\t\t// fmt.Println(\"context done\")\n\t\treturn\n\tcase bvg, ok := <-svc.orderChan:\n\t\tif !ok {\n\t\t\t// fmt.Println(\"not ok\")\n\t\t\treturn\n\t\t}\n\t\tif !svc.machine.Serving(bvg) {\n\t\t\tsvc.print(fmt.Sprintf(\"Order: %v, %v is not served on this machine\\n\", orderNo, bvg))\n\t\t\treturn\n\t\t}\n\t\t// `ingredientAccess` at any point only one go routine can have access to the ingredients\n\t\t// to avoid any race conditions\n\t\tsvc.ingredientAccess.Lock()\n\t\tsvc.prepareBeverage(ctx, bvg, orderNo)\n\t\tsvc.ingredientAccess.Unlock()\n\t\t// svc.IngredientsAvailiblity(ctx)\n\t}\n}", "title": "" }, { "docid": "80cc1616ba79d45f100edb6f9b01b813", "score": "0.60016626", "text": "func (o Orders) UpdateOrder(ctx context.Context, id string) (string, error) {\n\tif o.ID == \"\" {\n\t\treturn \"\", fmt.Errorf(\"id should not be empty\")\n\t}\n\terr := isDriver(ctx, id)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Can't find drivers ID. Error: %s\", err.Error())\n\t}\n\terr = checkDriversOrder(ctx, id, o.ID)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Can't take order. Error: %s\", err.Error())\n\t}\n\to.Status = \"in progress\"\n\n\terr = repo.Orders(o).UpdateOrder(ctx, id)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn fmt.Sprintf(\"order %s teken successfully\", o.ID), nil\n}", "title": "" }, { "docid": "115c3b1cfe2ef6f1409faefdd22b17e6", "score": "0.5929957", "text": "func orderProcessor(){\n\tvar status string\n\n\tsession, err := mgo.Dial(mongodb_server)\n\tfor;;{\n\t\t// Connects to MongoDB\n if err != nil {\n \tfmt.Println(\"Orders API - orderProcessing - Unable to connect to MongoDB during read operation\")\n panic(err)\n }\n session.SetMode(mgo.Monotonic, true)\n c := session.DB(mongodb_database).C(mongodb_collection)\n var result []bson.M\n\t\terr = c.Find(nil).All(&result)\n\t\tif err != nil {\n fmt.Println(\"Orders API - orderProcessing - Error reading data from MongoDB\")\n }\n for i:=0;i<len(result);i++{\n \tif(result[i][\"status\"] != \"Delivered\"){\n \t//fmt.Println(\"\\n\\nOrder ID being updated is:\\n\", result[i][\"orderId\"])\n \tswitch result[i][\"status\"] {\n \tcase \"Order Placed\": status = \"Order Processed\"\n \tcase \"Order Processed\": status = \"Shipped\"\n \tcase \"Shipped\": status = \"Delivered\"\n \t}\n\n \t//fmt.Println(\"Order ID: \",result[i][\"orderId\"],\" Updated Status: \",result[i][\"status\"],\"\\n\\n\")\n \t//Update MongoDB with the new status\n \t//fmt.Println(result[i])\n \tquery := bson.M{\"orderId\" : result[i][\"orderId\"]}\n \tchange := bson.M{\"$set\": bson.M{ \"status\" : status}}\n \terr = c.Update(query, change)\n \ttimer1 := time.NewTimer(time.Second * 10)\n\t\t\t<-timer1.C\n\t\t}\n }\n\t}\n defer session.Close()\n}", "title": "" }, { "docid": "29a9c31a67ca002ce183c54b7cf60cb5", "score": "0.5846757", "text": "func (api API) getOrder(resp http.ResponseWriter, req *http.Request) {\n\tvars := mux.Vars(req)\n\torder, err := api.service.Get(vars[\"id\"])\n\tif err != nil {\n\t\tprob := err.(*problem.Problem)\n\t\tprob.Send(resp)\n\t\treturn\n\t}\n\n\tmetricOrderGetTotal.Inc()\n\tapi.Send(order, resp)\n}", "title": "" }, { "docid": "7ef269c37e43095258dbb432e6feee47", "score": "0.58390564", "text": "func (os *OrderService) Order(id uint) (*entity.Order, []error) {\n\tord, errs := os.orderRepo.Order(id)\n\tif len(errs) > 0 {\n\t\treturn nil, errs\n\t}\n\treturn ord, errs\n}", "title": "" }, { "docid": "6cf07df9cff0d17d3b51a9bf007a879f", "score": "0.5782287", "text": "func processOrder(uname string) []byte {\n\turl := \"http://96.30.245.134:3000/orders/processed\"\n\n\tpayload := strings.NewReader(\"{\\n\\t\\\"order\\\": {\\n\\t\\t\\\"username\\\": \\\"\" + uname + \"\\\"\\n\\t}\\n}\")\n\n\treq, _ := http.NewRequest(\"POST\", url, payload)\n\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treq.Header.Add(\"User-Agent\", \"PostmanRuntime/7.19.0\")\n\treq.Header.Add(\"Accept\", \"*/*\")\n\treq.Header.Add(\"Cache-Control\", \"no-cache\")\n\treq.Header.Add(\"Postman-Token\", \"aa411b8b-f735-484e-9f7c-2a871763a9dc,7b8a5042-c09d-47b0-a4ea-68ba0a8dda7a\")\n\treq.Header.Add(\"Host\", \"96.30.245.134:3000\")\n\treq.Header.Add(\"Accept-Encoding\", \"gzip, deflate\")\n\treq.Header.Add(\"Content-Length\", \"39\")\n\treq.Header.Add(\"Connection\", \"keep-alive\")\n\treq.Header.Add(\"cache-control\", \"no-cache\")\n\n\tres, _ := http.DefaultClient.Do(req)\n\n\tdefer res.Body.Close()\n\tbody, _ := ioutil.ReadAll(res.Body)\n\n\t//fmt.Println(res)\n\t//fmt.Println(string(body))\n\n\treturn body\n}", "title": "" }, { "docid": "06116f06c0c553032147c0af6c6b077f", "score": "0.57290757", "text": "func (m *OrderLineItemMutation) SetOrderID(id uuid.UUID) {\n\tm.order = &id\n}", "title": "" }, { "docid": "3c8f23df62ba1fef9ad956255eb38bcb", "score": "0.5675601", "text": "func updateOrder(c *gin.Context) {\n\tupdatedBy := c.MustGet(\"id\").(string)\n\toid := c.Param(\"id\")\n\toiInDB, err := getOrderByID(oid)\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, errors.GetMessage(err))\n\t\treturn\n\t}\n\tif oiInDB == nil {\n\t\tc.JSON(http.StatusBadRequest, fmt.Sprintf(\"Order %s doesn't exist\", oid))\n\t\treturn\n\t}\n\toi := orderItem{\n\t\tID: oid,\n\t\tExtraInfo: c.PostForm(\"extra_info\"),\n\t\tSpecialNotice: c.PostForm(\"special_notice\"),\n\t\tStatus: orderStatusAToOrderStatusM(strings.ToUpper(c.PostForm(\"status\"))),\n\t}\n\tpriceUSDStr := c.PostForm(\"sold_price_usd\")\n\tif priceUSDStr != \"\" {\n\t\tcValue, err := util.StringToFloat(priceUSDStr)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else if cValue == 0 {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else {\n\t\t\toi.SoldPriceUSD = cValue\n\t\t}\n\t}\n\tpriceCNYStr := c.PostForm(\"sold_price_cny\")\n\tif priceCNYStr != \"\" {\n\t\tcValue, err := util.StringToFloat(priceCNYStr)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else if cValue == 0 {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else {\n\t\t\toi.SoldPriceCNY = cValue\n\t\t}\n\t}\n\tpriceEURStr := c.PostForm(\"sold_price_eur\")\n\tif priceEURStr != \"\" {\n\t\tcValue, err := util.StringToFloat(priceEURStr)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else if cValue == 0 {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderPriceNotValid)\n\t\t\treturn\n\t\t} else {\n\t\t\toi.SoldPriceEUR = cValue\n\t\t}\n\t}\n\tdownPaymentStr := c.PostForm(\"downpayment\")\n\tif downPaymentStr != \"\" {\n\t\tcValue, err := util.StringToFloat(downPaymentStr)\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderDownPaymentNotValid)\n\t\t\treturn\n\t\t} else if cValue == 0 {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderDownPaymentNotValid)\n\t\t\treturn\n\t\t} else {\n\t\t\toi.DownPayment = cValue\n\t\t}\n\t}\n\n\tif oi.Status != \"\" {\n\t\tif !util.IsInArrayString(oi.Status, validOrderStatusM) {\n\t\t\tc.JSON(http.StatusOK, vemsgOrderStatusNotValid)\n\t\t\treturn\n\t\t}\n\n\t\tif oi.Status == CANCELLED || oi.Status == MCANCELLED {\n\t\t\tvemsgOrderStatusNotValid.Message = \"Not allowed to cancel order, please call cancel API\"\n\t\t\tc.JSON(http.StatusOK, vemsgOrderStatusNotValid)\n\t\t\treturn\n\t\t}\n\t\tif !isOrderStatusChangeAllowed(oiInDB.Status, oi.Status) {\n\t\t\tvemsgOrderStatusNotValid.Message = fmt.Sprintf(\"Cannot change status from %s to %s\", oiInDB.Status, oi.Status)\n\t\t\tc.JSON(http.StatusOK, vemsgOrderStatusNotValid)\n\t\t\treturn\n\t\t}\n\t}\n\tif oi.Status != \"\" && strings.ToUpper(oiInDB.ItemCategory) == DIAMOND {\n\t\terr := dbTransact(db, func(tx *sql.Tx) error {\n\t\t\tq := oi.composeUpdateQueryTrack(updatedBy)\n\t\t\ttraceSQL(q)\n\t\t\tresult, err := tx.Exec(q)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif r, err := result.RowsAffected(); err != nil {\n\t\t\t\treturn err\n\t\t\t} else if r != 1 {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\ttq := fmt.Sprintf(`UPDATE diamonds SET status='%s' WHERE id='%s'`, oi.Status, oiInDB.ItemID)\n\t\t\ttraceSQL(tq)\n\t\t\t_, err = tx.Exec(tq)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// r, err := result.RowsAffected()\n\t\t\t// if err != nil {\n\t\t\t// \treturn err\n\t\t\t// }\n\t\t\t// if r == 1 {\n\t\t\t// \toStateMap := make(map[string]interface{})\n\t\t\t// \toStateMap[\"status\"] = oi.Status + \",Due to Order: \" + oid + \" Status Change\"\n\t\t\t// \t//diamonds status changed\n\t\t\t// \tgo newHistoryRecords(updatedBy, \"diamonds\", oiInDB.ItemID, oStateMap)\n\t\t\t// }\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, errors.GetMessage(err))\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tq := oi.composeUpdateQueryTrack(updatedBy)\n\t\tif _, err := dbExec(q); err != nil {\n\t\t\tc.JSON(http.StatusInternalServerError, errors.GetMessage(err))\n\t\t\treturn\n\t\t}\n\t}\n\n\tc.JSON(http.StatusOK, \"SUCCESS\")\n\t// go newHistoryRecords(updatedBy, \"orders\", oi.ID, oi.parmsKV())\n}", "title": "" }, { "docid": "1bbe2f73e3d2e1023f6b1bf2d7e99108", "score": "0.5656187", "text": "func (msg PguStatusMsg) OrderID() string {\n\treturn msg.orderID\n}", "title": "" }, { "docid": "f0aeedf7dc994e1509b779684dc94dc9", "score": "0.5617064", "text": "func (op *OrderProcessor) ProcessMessage(dbtx database.Tx, peer peer.ID, message *npb.OrderMessage) (interface{}, error) {\n\t// Load the order if it exists.\n\tvar (\n\t\torder models.Order\n\t\tevent interface{}\n\t\terr error\n\t)\n\terr = dbtx.Read().Where(\"id = ?\", message.OrderID).First(&order).Error\n\tif err != nil && !errors.Is(err, gorm.ErrRecordNotFound) {\n\t\treturn nil, err\n\t} else if errors.Is(err, gorm.ErrRecordNotFound) && message.MessageType != npb.OrderMessage_ORDER_OPEN {\n\t\t// Order does not exist in the DB and the message type is not an order open. This can happen\n\t\t// in the case where we download offline messages out of order. In this case we will park\n\t\t// the message so that we can try again later if we receive other messages.\n\t\tlog.Warningf(\"Received %s message from peer %d for an order that does not exist yet\", message.MessageType, peer.Pretty())\n\t\torder.ID = models.OrderID(message.OrderID)\n\t\tif err := order.ParkMessage(message); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, dbtx.Save(&order)\n\t}\n\n\torderCopy := order\n\tevent, err = op.processMessage(dbtx, &order, peer, message)\n\tif err != nil {\n\t\tlog.Errorf(\"Error processing order message for order %s: %s\", order.ID.String(), err)\n\t\tif err := orderCopy.PutErrorMessage(message); err != nil {\n\t\t\treturn nil, dbtx.Save(&orderCopy)\n\t\t}\n\t}\n\n\tparkedMessages, err := order.GetParkedMessages()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsort.Slice(parkedMessages, func(i, j int) bool {\n\t\treturn parkedMessages[i].MessageType < parkedMessages[j].MessageType\n\t})\n\n\tfor _, parked := range parkedMessages {\n\t\tif proto.Equal(parked, message) {\n\t\t\tcontinue\n\t\t}\n\t\t_, err = op.processMessage(dbtx, &order, peer, parked)\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Error processing parked message for order %s: %s\", order.ID.String(), err)\n\t\t\tif err := order.PutErrorMessage(message); err != nil {\n\t\t\t\tlog.Errorf(\"Error saving errored message for order %s: %s\", order.ID.String(), err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Save changes to the database.\n\treturn event, dbtx.Save(&order)\n}", "title": "" }, { "docid": "e13223239df7af4501d675ddc5c7dd9a", "score": "0.55904245", "text": "func (o *DeleteOrderShipmentParams) SetOrderID(orderID int64) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "c7f2e537c99e97b9b26613d5af01493f", "score": "0.5590209", "text": "func printOrder(order interfaces.Order) {\n\tentity := GAME.GetEntityByPlayer(order.GetPlayer())\n\tlog.Printf(\"Handled Order: command:'%v' tick:%v actions:%v player:%v\",\n\t\tCOMMAND_CODES[order.GetCommandCode()], order.GetTickNumber(),\n\t\tentity.GetStringActionQueue(),\n\t\torder.GetPlayer().GetPlayerId())\n}", "title": "" }, { "docid": "6dadd7cade3bee7024eabcafb7ad733c", "score": "0.5588651", "text": "func (o *OrderCancelParams) SetOrderID(orderID *string) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "6d6c3a15b1647a3eee07d3c99cfb9e6e", "score": "0.5584015", "text": "func PaymentChangeOrderByID(w *fiber.Ctx) {\n\tid := w.Params(\"id\")\n\tstatus, _ := strconv.ParseBool(w.Params(\"bool\"))\n\t\n\tvar order e.Order\n\torder.ID = id\n\tresult := db.DBConn.Model(&order).Update(\"paid\", status)\n\tif result.Error != nil {\n\t\tw.Status(500).JSON(\"Server error\")\n\t\treturn\n\t}\n\n\tw.Status(200).JSON(order)\n}", "title": "" }, { "docid": "0e17a42ad329864a6c20f5d496df5efe", "score": "0.55814075", "text": "func (ob *OrderBook) Process(order Order) ([]*Order, *Order) {\n\tif order.Type == Buy {\n\t\t// return ob.processOrderB(order)\n\t\treturn ob.commonProcess(order, ob.SellTree, ob.addBuyOrder, ob.removeSellNode)\n\t}\n\t// return ob.processOrderS(order)\n\treturn ob.commonProcess(order, ob.BuyTree, ob.addSellOrder, ob.removeBuyNode)\n}", "title": "" }, { "docid": "cbe69ec596fe58ef7ca1432c7e17a23a", "score": "0.55775774", "text": "func (s *Service) orderID() string {\n\tvar b bytes.Buffer\n\tb.WriteString(fmt.Sprintf(\"%05d\", s.rnd.Int63n(99999)))\n\tb.WriteString(fmt.Sprintf(\"%03d\", time.Now().UnixNano()/1e6%1000))\n\tb.WriteString(time.Now().Format(\"060102150405\"))\n\treturn b.String()\n}", "title": "" }, { "docid": "094a633e133b609824301a174afb6d22", "score": "0.5563094", "text": "func ProcessTask(id ID, priority Priority) {\n\tfmt.Printf(\"id = %d, priority = %d \\n\", id, priority)\n}", "title": "" }, { "docid": "d2a954d2a87ab6d78f4db0e1e2d880df", "score": "0.55424356", "text": "func (o *GetOrderTaxesParams) SetOrderID(orderID int64) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "27eed5b2c100c9a08d11df1246722a67", "score": "0.5527845", "text": "func (a *OrdersApiService) GetOrderByIdExecute(r ApiGetOrderByIdRequest) (*OrderResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *OrderResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"OrdersApiService.GetOrderById\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/orders/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", url.PathEscape(parameterValueToString(r.id, \"id\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/vnd.conekta-v2.1.0+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.acceptLanguage != nil {\n\t\tparameterAddToHeaderOrQuery(localVarHeaderParams, \"Accept-Language\", r.acceptLanguage, \"\")\n\t}\n\tif r.xChildCompanyId != nil {\n\t\tparameterAddToHeaderOrQuery(localVarHeaderParams, \"X-Child-Company-Id\", r.xChildCompanyId, \"\")\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "7ab10e99eca6161f8d98c01ca6b77c9a", "score": "0.5526142", "text": "func (s *Service) process(id string, didCommCallback event.DIDCommCallback) error {\n\tif didCommCallback.Err != nil {\n\t\t// TODO https://github.com/hyperledger/aries-framework-go/issues/242 Service callback processing error handling\n\t\treturn nil\n\t}\n\n\t// fetch the record\n\tjsonDoc, err := s.store.Get(id)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"document for the id doesn't exists in the database: %w\", didCommCallback.Err)\n\t}\n\n\tdocument := &message{}\n\terr = json.Unmarshal(jsonDoc, document)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"JSON marshalling failed: %w\", didCommCallback.Err)\n\t}\n\n\t// continue the processing\n\terr = s.handle(document)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"processing of the message failed: %w\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bbf9a651f716b1882c69d94806ed9776", "score": "0.5490023", "text": "func (o *SalesInvoiceOrderV1ExecutePostParams) SetOrderID(orderID int64) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "9eea01b3cb46b6f597eb58b66be3f8ae", "score": "0.5487097", "text": "func (ch *chain) Order(env *cb.Envelope) error {\n\tselect {\n\tcase ch.sendChan <- &message{\n\t\tnormalMsg: env,\n\t}:\n\t\treturn nil\n\tcase <-ch.exitChan:\n\t\t//log.Fatal(\"Exiting\")\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "9eea01b3cb46b6f597eb58b66be3f8ae", "score": "0.5487097", "text": "func (ch *chain) Order(env *cb.Envelope) error {\n\tselect {\n\tcase ch.sendChan <- &message{\n\t\tnormalMsg: env,\n\t}:\n\t\treturn nil\n\tcase <-ch.exitChan:\n\t\t//log.Fatal(\"Exiting\")\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "3a3338c7e1c9ab43945a337ffab9e346", "score": "0.5480226", "text": "func (tx Tx) FetchOrder(id model.OrderID) (o *model.Order) {\n\tvar (\n\t\tq strings.Builder\n\t\tlrows *sql.Rows\n\t\tpid model.ProductID\n\t\tprows *sql.Rows\n\t\ttrows *sql.Rows\n\t\teid model.EventID\n\t\terr error\n\t)\n\to = new(model.Order)\n\tq.WriteString(`SELECT `)\n\tq.WriteString(orderColumns)\n\tq.WriteString(` FROM orderT WHERE id=?`)\n\tswitch err = scanOrder(tx.tx.QueryRow(q.String(), id), o); err {\n\tcase nil:\n\t\tbreak\n\tcase sql.ErrNoRows:\n\t\treturn nil\n\tdefault:\n\t\tpanic(err)\n\t}\n\tprows, err = tx.tx.Query(\n\t\t`SELECT id, type, subtype, method, stripe, created, amount FROM payment WHERE orderid=? ORDER BY id`,\n\t\to.ID)\n\tpanicOnError(err)\n\tfor prows.Next() {\n\t\tvar p model.Payment\n\t\tpanicOnError(prows.Scan(&p.ID, &p.Type, &p.Subtype, &p.Method, &p.Stripe, (*Time)(&p.Created), &p.Amount))\n\t\to.Payments = append(o.Payments, &p)\n\t}\n\tpanicOnError(prows.Err())\n\tlrows, err = tx.tx.Query(\n\t\t`SELECT id, product, quantity, price, guest_name, guest_email, option FROM order_line WHERE orderid=? ORDER BY id`, o.ID)\n\tpanicOnError(err)\n\tfor lrows.Next() {\n\t\tvar ol model.OrderLine\n\t\tpanicOnError(lrows.Scan(&ol.ID, &pid, &ol.Quantity, &ol.Price, &ol.GuestName, &ol.GuestEmail, &ol.Option))\n\t\tol.Product = tx.FetchProduct(pid)\n\t\ttrows, err = tx.tx.Query(`SELECT id, event, used FROM ticket WHERE order_line=? ORDER BY id`, ol.ID)\n\t\tpanicOnError(err)\n\t\tfor trows.Next() {\n\t\t\tvar t model.Ticket\n\t\t\tpanicOnError(trows.Scan(&t.ID, (*IDStr)(&eid), (*Time)(&t.Used)))\n\t\t\tif eid != \"\" {\n\t\t\t\tt.Event = tx.FetchEvent(eid)\n\t\t\t}\n\t\t\tol.Tickets = append(ol.Tickets, &t)\n\t\t}\n\t\tpanicOnError(trows.Err())\n\t\to.Lines = append(o.Lines, &ol)\n\t}\n\tpanicOnError(lrows.Err())\n\treturn o\n}", "title": "" }, { "docid": "ac4f72c76cce5c6adbcc99b6dbcbfdae", "score": "0.5474355", "text": "func ProcessTxid(txid string, ignoreBelowheight int, rc TxGetter, nc TxEventPublisher) error {\n\tctx := context.Background()\n\ttransfers, err := rc.GetTransferByTxid(ctx, txid)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttx, err := RpcTxToTx(transfers)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif tx.Height < ignoreBelowheight {\n\t\t// The Tx is below ignoring height. It won't be\n\t\t// published to NATS\n\t\treturn nil\n\t}\n\n\treturn nc.PushTxEvent(*tx)\n}", "title": "" }, { "docid": "09b2a9f84f3630f90e0222069bed523b", "score": "0.5464212", "text": "func OrderDeliversByOrderid(ctx context.Context, orderid int, key ...interface{}) ([]*OrderDeliver, error) {\n\tvar err error\n\tvar dbConn *sql.DB\n\n\ttableName, err := GetOrderDeliverTableName(key...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// sql query\n\tsqlstr := `SELECT ` +\n\t\t`order_did, orderid, fid, sid, uid, created, note, deliver_type, deliver_company_id, deliver_company_name, deliver_sn, deliver_user_id, deliver_user_name, deliver_user_phone, deliver_send_time ` +\n\t\t`FROM ` + tableName +\n\t\t` WHERE orderid = ?`\n\n\t// run query\n\tutils.GetTraceLog(ctx).Debug(\"DB\", zap.String(\"SQL\", fmt.Sprint(sqlstr, orderid)))\n\n\ttx, err := components.M.GetConnFromCtx(ctx)\n\tif err != nil {\n\t\tdbConn, err = components.M.GetSlaveConn()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tvar queryData *sql.Rows\n\tif tx != nil {\n\t\tqueryData, err = tx.Query(sqlstr, orderid)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tqueryData, err = dbConn.Query(sqlstr, orderid)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tdefer queryData.Close()\n\n\t// load results\n\tres := make([]*OrderDeliver, 0)\n\tfor queryData.Next() {\n\t\tod := OrderDeliver{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = queryData.Scan(&od.OrderDid, &od.Orderid, &od.Fid, &od.Sid, &od.UID, &od.Created, &od.Note, &od.DeliverType, &od.DeliverCompanyID, &od.DeliverCompanyName, &od.DeliverSn, &od.DeliverUserID, &od.DeliverUserName, &od.DeliverUserPhone, &od.DeliverSendTime)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &od)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "cb15f15b3a52e396be41a305150bbefa", "score": "0.546368", "text": "func FinishOrder(c *gin.Context) {\r\n\ttype DoneOrder struct {\r\n\t\tHelperID string `json:\"helpid\"`\r\n\t\tDoneText string `json:\"donetext\" binding:\"required,min=1,max=255\"`\r\n\t\tActualType string `json:\"actualtype\" binding:\"required,min=1,max=40\"`\r\n\t}\r\n\tid := c.Param(\"id\")\r\n\torder := model.Order{}\r\n\tif err := model.DB.Where(\"id = ?\", id).First(&order).Error; err != nil {\r\n\t\tutils.InternalError(c, nil, err.Error())\r\n\t\treturn\r\n\t}\r\n\tif order.AudittedAt.IsZero() {\r\n\t\tutils.BadRequest(c, nil, \"该订单未审核\")\r\n\t\treturn\r\n\t}\r\n\tif order.GotAt.IsZero() {\r\n\t\tutils.BadRequest(c, nil, \"该订单未接受\")\r\n\t\treturn\r\n\t}\r\n\tif !order.DoneAt.IsZero() {\r\n\t\tutils.BadRequest(c, nil, \"订单已经完成过了\")\r\n\t\treturn\r\n\t}\r\n\tsession := sessions.Default(c)\r\n\tuserid := session.Get(\"UserID\").(string)\r\n\r\n\tif order.MaintainerID != userid {\r\n\t\tutils.BadRequest(c, nil, \"不能完成他人订单\")\r\n\t\treturn\r\n\t}\r\n\tdoneorder := DoneOrder{}\r\n\tuser := model.User{}\r\n\r\n\tif err := c.BindJSON(&doneorder); err != nil {\r\n\t\tutils.BadRequest(c, nil, err.Error())\r\n\t\treturn\r\n\t}\r\n\r\n\tif !model.IsSelectExist(\"problemtype\", doneorder.ActualType) {\r\n\t\tutils.BadRequest(c, nil, \"问题类型不存在\")\r\n\t\treturn\r\n\t}\r\n\r\n\tuser.WorkID = doneorder.HelperID\r\n\texist, err := user.IsUserExist()\r\n\r\n\tif err != nil {\r\n\t\tutils.InternalError(c, nil, \"数据库操作失败\")\r\n\t\treturn\r\n\t}\r\n\tif !exist {\r\n\t\tutils.BadRequest(c, nil, \"协同人员不存在\")\r\n\t\treturn\r\n\t}\r\n\torder.ActualType = html.EscapeString(doneorder.ActualType)\r\n\torder.DoneText = html.EscapeString(doneorder.DoneText)\r\n\torder.HelperID = doneorder.HelperID\r\n\torder.DoneAt = time.Now()\r\n\r\n\tif err := model.DB.Model(&order).Updates(&order).Error; err != nil {\r\n\t\tutils.InternalError(c, nil, err.Error())\r\n\t\treturn\r\n\t}\r\n\tutils.Success(c, nil, \"完成\")\r\n}", "title": "" }, { "docid": "32cd53507f1c1c927302977f84f8786d", "score": "0.5461272", "text": "func Process(ctx context.Context, ch <-chan MessageCloser, handler Handler) {\n\tctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\tinFlight := map[string]struct{}{} // keeps track of work to prevent duplication of effort\n\tinFlightCount := int32(0)\n\n\tdone := make(chan struct{})\n\tfinished := make(chan string, 128)\n\n\t// Wait for in flight tasks to complete\n\tgo func() {\n\t\tdefer close(done)\n\t\tdefer close(finished)\n\t\t<-ctx.Done()\n\n\t\tfor atomic.LoadInt32(&inFlightCount) > 0 {\n\t\t\t<-finished\n\t\t}\n\t}()\n\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\t<-done\n\t\t\treturn\n\n\t\tcase id := <-finished:\n\t\t\tdelete(inFlight, id)\n\n\t\tcase m, ok := <-ch:\n\t\t\tif !ok {\n\t\t\t\tcancel()\n\t\t\t\t<-done\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tid := m.AggregateID()\n\t\t\tif _, found := inFlight[id]; !found {\n\t\t\t\tinFlight[id] = struct{}{}\n\t\t\t\tatomic.AddInt32(&inFlightCount, 1)\n\n\t\t\t\tgo func(m MessageCloser) {\n\t\t\t\t\tdefer func() { atomic.AddInt32(&inFlightCount, -1) }()\n\t\t\t\t\tdefer func() { finished <- m.AggregateID() }()\n\t\t\t\t\tdefer m.Close()\n\t\t\t\t\thandler.Process(ctx, m)\n\t\t\t\t}(m)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b26992129a970075899cb22b71bd94ed", "score": "0.5437508", "text": "func payOrder(ctx echo.Context) error {\n\torderID := ctx.Param(\"order_id\")\n\n\tresp := core.Response{}\n\n\tdb := app.DB()\n\n\tou := data.NewOrderRepository()\n\tm, err := ou.GetDetails(db, orderID)\n\tif err != nil {\n\t\tresp.Title = \"Order not found\"\n\t\tresp.Status = http.StatusNotFound\n\t\tresp.Code = errors.OrderNotFound\n\t\tresp.Errors = err\n\t\treturn resp.ServerJSON(ctx)\n\t}\n\n\tif m.Status == models.OrderCancelled {\n\t\tresp.Title = \"Order already cancelled\"\n\t\tresp.Status = http.StatusBadRequest\n\t\tresp.Code = errors.OrderAlreadyCancelled\n\t\tresp.Errors = err\n\t\treturn resp.ServerJSON(ctx)\n\t}\n\n\tif m.PaymentStatus == models.PaymentCompleted {\n\t\tresp.Title = \"Order already paid\"\n\t\tresp.Status = http.StatusConflict\n\t\tresp.Code = errors.PaymentAlreadyProcessed\n\t\tresp.Errors = err\n\t\treturn resp.ServerJSON(ctx)\n\t}\n\n\tif m.PaymentStatus == models.PaymentReverted {\n\t\tresp.Title = \"Order payment already reverted\"\n\t\tresp.Status = http.StatusBadRequest\n\t\tresp.Code = errors.OrderPaymentAlreadyReverted\n\t\tresp.Errors = err\n\t\treturn resp.ServerJSON(ctx)\n\t}\n\n\tswitch m.PaymentGateway {\n\tcase payment_gateways.BrainTreePaymentGatewayName:\n\t\treturn processPayOrderForBrainTree(ctx, m)\n\tcase payment_gateways.StripePaymentGatewayName:\n\t\treturn processPayOrderForStripe(ctx, m)\n\tcase payment_gateways.SSLCommerzPaymentGatewayName:\n\t\treturn processPayOrderForSSL(ctx, m)\n\tcase payment_gateways.PaddlePaymentGatewayName:\n\t\treturn processPayOrderForPaddle(ctx, m)\n\t}\n\treturn serveInvalidPaymentRequest(ctx)\n}", "title": "" }, { "docid": "6a0ea5a21932eb40ddc81a3fdff42a2b", "score": "0.54333717", "text": "func (as *ApiService) Order(orderId string) (*ApiResponse, error) {\n\treq := NewRequest(http.MethodGet, \"/api/v1/orders/\"+orderId, nil)\n\treturn as.Call(req)\n}", "title": "" }, { "docid": "e345c8dbfd38404525518de7daea901a", "score": "0.5423893", "text": "func onOrderUpdate(order kiteconnect.Order) {\n\tfmt.Printf(\"Order: %v \", order.OrderID)\n}", "title": "" }, { "docid": "37779fd6b3bd27a64ba71a06fe45a470", "score": "0.5420407", "text": "func (s *Service) HandlerPayOrder() (err error) {\n\tvar (\n\t\tsize = 1000\n\t\toldMaxID int\n\t)\n\tif oldMaxID, err = s.dao.SelOldOrderMaxID(context.TODO()); err != nil {\n\t\tlog.Error(\"selOldOrderMaxID error(%+v)\", err)\n\t\treturn\n\t}\n\n\tpage := oldMaxID / size\n\tif oldMaxID%size != 0 {\n\t\tpage++\n\t}\n\tfor i := 0; i < page; i++ {\n\t\tstartID := i * size\n\t\tendID := (i + 1) * size\n\t\tif endID > oldMaxID {\n\t\t\tendID = oldMaxID\n\t\t}\n\t\tvar (\n\t\t\tres []*model.VipPayOrderOld\n\t\t\tbatchOrder []*model.VipPayOrder\n\t\t\torderNos []string\n\t\t\toldRechargeOrder []*model.VipRechargeOrder\n\t\t)\n\n\t\trechargeMap := make(map[string]*model.VipRechargeOrder)\n\t\tif res, err = s.dao.SelOldPayOrder(context.TODO(), startID, endID); err != nil {\n\t\t\tlog.Error(\"selOldPayOrder(startID:%v endID:%v) error(%+v)\", startID, endID, err)\n\t\t\treturn\n\t\t}\n\t\tfor _, v := range res {\n\t\t\tbatchOrder = append(batchOrder, convertPayOrderOldToNew(v))\n\t\t}\n\n\t\tfor _, v := range batchOrder {\n\t\t\torderNos = append(orderNos, v.OrderNo)\n\t\t}\n\t\tif oldRechargeOrder, err = s.dao.SelOldRechargeOrder(context.TODO(), orderNos); err != nil {\n\t\t\treturn\n\t\t}\n\t\tfor _, v := range oldRechargeOrder {\n\t\t\trechargeMap[v.PayOrderNo] = v\n\t\t}\n\t\tfor _, v := range batchOrder {\n\t\t\trechargeOrder := rechargeMap[v.OrderNo]\n\t\t\tif rechargeOrder != nil {\n\t\t\t\tv.ThirdTradeNo = rechargeOrder.ThirdTradeNo\n\t\t\t\tv.RechargeBp = rechargeOrder.RechargeBp\n\t\t\t}\n\t\t}\n\t\tif err = s.dao.BatchAddPayOrder(context.TODO(), batchOrder); err != nil {\n\t\t\treturn\n\t\t}\n\n\t}\n\treturn\n}", "title": "" }, { "docid": "a9cb689bf740953fe781798a1a744887", "score": "0.5382742", "text": "func UpdateOrderById(m *Order) (err error) {\n\to := orm.NewOrm()\n\tv := Order{Id: m.Id}\n\t// ascertain id exists in the database\n\tif err = o.Read(&v); err == nil {\n\t\tvar num int64\n\t\tif num, err = o.Update(m); err == nil {\n\t\t\tfmt.Println(\"Number of records updated in database:\", num)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "46b7cd192688107426d0132fa72f9698", "score": "0.53666013", "text": "func (op *OrderProcessor) processMessage(dbtx database.Tx, order *models.Order, peer peer.ID, message *npb.OrderMessage) (event interface{}, err error) {\n\terr = verifyOrderMessageSignature(peer, message)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tswitch message.MessageType {\n\tcase npb.OrderMessage_ORDER_OPEN:\n\t\tevent, err = op.processOrderOpenMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_PAYMENT_SENT:\n\t\tevent, err = op.processPaymentSentMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_RATING_SIGNATURES:\n\t\tevent, err = op.processRatingSignaturesMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_ORDER_REJECT:\n\t\tevent, err = op.processOrderRejectMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_ORDER_CONFIRMATION:\n\t\tevent, err = op.processOrderConfirmationMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_ORDER_CANCEL:\n\t\tevent, err = op.processOrderCancelMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_REFUND:\n\t\tevent, err = op.processRefundMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_ORDER_FULFILLMENT:\n\t\tevent, err = op.processOrderFulfillmentMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_ORDER_COMPLETE:\n\t\tevent, err = op.processOrderCompleteMessage(dbtx, order, peer, message)\n\tcase npb.OrderMessage_DISPUTE_OPEN:\n\t\tevent, err = op.processDisputeOpenMessage(dbtx, order, peer, message)\n\n\tdefault:\n\t\treturn nil, errors.New(\"unknown order message type\")\n\t}\n\treturn event, err\n}", "title": "" }, { "docid": "5103fb5148c707c116ec1cece86e81f4", "score": "0.5359926", "text": "func (m Message) OrderID() (*field.OrderIDField, quickfix.MessageRejectError) {\n\tf := &field.OrderIDField{}\n\terr := m.Body.Get(f)\n\treturn f, err\n}", "title": "" }, { "docid": "107e14ebefa5e49e0a3f33ee10c6e337", "score": "0.5357327", "text": "func (aoh *AdminOrderHandler) PutOrder(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\tvar apiKey = r.Header.Get(\"api-key\")\n\tif apiKey == \"\" || (apiKey != adminApiKey && apiKey != userApiKey) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusForbidden), http.StatusForbidden)\n\t\treturn\n\t}\n\tid, err := strconv.Atoi(ps.ByName(\"id\"))\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\torder, errs := aoh.orderService.Order(uint(id))\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tl := r.ContentLength\n\n\tbody := make([]byte, l)\n\n\tr.Body.Read(body)\n\n\tjson.Unmarshal(body, &order)\n\n\torder, errs = aoh.orderService.UpdateOrder(order)\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\toutput, err := json.MarshalIndent(order, \"\", \"\\t\")\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(output)\n\treturn\n}", "title": "" }, { "docid": "cf49cd609117c89e554cbe4e3abd7f5d", "score": "0.53511196", "text": "func (h GetMoveTaskOrderHandler) Handle(params movetaskorderops.GetMoveTaskOrderParams) middleware.Responder {\n\treturn h.AuditableAppContextFromRequestWithErrors(params.HTTPRequest,\n\t\tfunc(appCtx appcontext.AppContext) (middleware.Responder, error) {\n\t\t\tsearchParams := services.MoveTaskOrderFetcherParams{\n\t\t\t\tIsAvailableToPrime: true,\n\t\t\t\tExcludeExternalShipments: true,\n\t\t\t}\n\n\t\t\t// Add either ID or Locator to search params\n\t\t\tmoveTaskOrderID := uuid.FromStringOrNil(params.MoveID)\n\t\t\tif moveTaskOrderID != uuid.Nil {\n\t\t\t\tsearchParams.MoveTaskOrderID = moveTaskOrderID\n\t\t\t} else {\n\t\t\t\tsearchParams.Locator = params.MoveID\n\t\t\t}\n\n\t\t\tmto, err := h.moveTaskOrderFetcher.FetchMoveTaskOrder(appCtx, &searchParams)\n\t\t\tif err != nil {\n\t\t\t\tappCtx.Logger().Error(\"primeapi.GetMoveTaskOrderHandler error\", zap.Error(err))\n\t\t\t\tswitch err.(type) {\n\t\t\t\tcase apperror.NotFoundError:\n\t\t\t\t\treturn movetaskorderops.NewGetMoveTaskOrderNotFound().WithPayload(\n\t\t\t\t\t\tpayloads.ClientError(handlers.NotFoundMessage, *handlers.FmtString(err.Error()), h.GetTraceIDFromRequest(params.HTTPRequest))), err\n\t\t\t\tdefault:\n\t\t\t\t\treturn movetaskorderops.NewGetMoveTaskOrderInternalServerError().WithPayload(\n\t\t\t\t\t\tpayloads.InternalServerError(handlers.FmtString(err.Error()), h.GetTraceIDFromRequest(params.HTTPRequest))), err\n\t\t\t\t}\n\t\t\t}\n\t\t\tmoveTaskOrderPayload := payloads.MoveTaskOrder(mto)\n\n\t\t\treturn movetaskorderops.NewGetMoveTaskOrderOK().WithPayload(moveTaskOrderPayload), nil\n\t\t})\n}", "title": "" }, { "docid": "32444bcd42aa1ddd4dc26b78e2f86a9f", "score": "0.53477156", "text": "func GetOrderByID(c *gin.Context) {\r\n\tid := c.Param(\"id\")\r\n\torder := model.Order{}\r\n\tif err := model.DB.Where(\"id = ?\", id).First(&order).Error; err != nil {\r\n\t\tif err == gorm.ErrRecordNotFound {\r\n\t\t\tutils.BadRequest(c, nil, \"订单不存在\")\r\n\t\t\treturn\r\n\t\t}\r\n\t\tutils.InternalError(c, nil, \"数据库操作失败\")\r\n\t\treturn\r\n\t}\r\n\tutils.Success(c, gin.H{\"order\": order}, \"订单查询成功\")\r\n}", "title": "" }, { "docid": "a7d635ecf60f5b8c06fa3d76c37d1b38", "score": "0.5346943", "text": "func (m *OrderLineItemMutation) OrderID() (id uuid.UUID, exists bool) {\n\tif m.order != nil {\n\t\treturn *m.order, true\n\t}\n\treturn\n}", "title": "" }, { "docid": "390c974e1a7f765e1bb23be9a74df02d", "score": "0.5340678", "text": "func (c *cache) UpdateOrder(clordid, orderid string) (*CachedOrder, error) {\n\tc.log.Info(\"updated order cache\", zap.String(\"ClOrdID\", clordid), zap.String(\"OrderID\", orderid))\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\tif order, ok := c.orders[clordid]; ok {\n\t\torder.OrderID = orderid\n\t\treturn order, nil\n\t}\n\treturn nil, fmt.Errorf(\"could not find order to update with ClOrdID %s\", clordid)\n}", "title": "" }, { "docid": "63013c1d481b7de5f306e2303a7b12f8", "score": "0.5323019", "text": "func Handler(ctx context.Context, sqsEvent events.SQSEvent) (Response, error) {\n\tfor _, message := range sqsEvent.Records {\n\t\tfmt.Printf(\"The message %s for event source %s = %s \\n\", message.MessageId, message.EventSource, message.Body)\n\n\t\torder := cart.Order{}\n\t\terr := json.Unmarshal([]byte(string(message.Body)), &order)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(\"xerr while converting json to struct\", err)\n\t\t\t//return Response{StatusCode: 500}, err\n\t\t}\n\t\tfmt.Println(\"order\", order)\n\n\t\tprocessRepo := databaseadapterdynamodb.NewDynamoCheckoutRepository()\n\t\tprocessService := cart.NewProcessService(processRepo)\n\t\terr = processService.ProcessOrder(&order)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(\"error saving in repo\", err)\n\t\t}\n\t}\n\n\tvar buf bytes.Buffer\n\n\tfmt.Println(\"Go Process v1.0! Your function executed successfully!\")\n\tbody, err := json.Marshal(map[string]interface{}{\n\t\t\"message\": \"Go Process v1.0! Your function executed successfully!\",\n\t})\n\tif err != nil {\n\t\treturn Response{StatusCode: 404}, err\n\t}\n\tjson.HTMLEscape(&buf, body)\n\n\tresp := Response{\n\t\tStatusCode: 200,\n\t\tIsBase64Encoded: false,\n\t\tBody: buf.String(),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"X-MyCompany-Func-Reply\": \"hello-handler\",\n\t\t},\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "5e4dc38405a549bb0ef0b1024bb956f6", "score": "0.5321107", "text": "func (s *server) ShipOrder(ctx context.Context, in *pb.ShipOrderRequest) (*pb.ShipOrderResponse, error) {\n\tspan := apitrace.SpanFromContext(ctx)\n\tspan.AddEvent(\"Ship Order\")\n\tlog.Info(\"[ShipOrder] received request\")\n\tdefer log.Info(\"[ShipOrder] completed request\")\n\t// 1. Create a Tracking ID\n\tbaseAddress := fmt.Sprintf(\"%s, %s, %s\", in.Address.StreetAddress, in.Address.City, in.Address.State)\n\tid := CreateTrackingId(baseAddress)\n\n\t// 2. Generate a response.\n\treturn &pb.ShipOrderResponse{\n\t\tTrackingId: id,\n\t}, nil\n}", "title": "" }, { "docid": "6aef04eb5d22d933d7cb401153a3845e", "score": "0.53091073", "text": "func (o *OrderRepostory) FindOrderByID(orderID int64)( order *model.Order, err error) {\n\torder = &model.Order{}\n\treturn order, o.mysql.Preload(\"OrderDetail\").First(order,orderID).Error\n}", "title": "" }, { "docid": "91276561e848bcaac359480e33667eaa", "score": "0.5307989", "text": "func (o *GetMeOrderOrderIDDetailsOrderDetailIDParams) SetOrderID(orderID int64) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "238e711fdeabdf3a1f28d145fd6fafc0", "score": "0.5290772", "text": "func (o *SalesRefundOrderV1ExecutePostParams) SetOrderID(orderID int64) {\n\to.OrderID = orderID\n}", "title": "" }, { "docid": "3a2ceaabc07be1f6921feedf2c04c4a9", "score": "0.52806103", "text": "func (f *FTX) Order(\n\tctx context.Context,\n\tmarketName, side, orderType string,\n\treduceOnly, ioc, postOnly bool,\n\tclientID string,\n\tprice, size float64,\n) (OrderData, error) {\n\treq := make(map[string]interface{})\n\treq[\"market\"] = marketName\n\treq[\"side\"] = side\n\treq[\"price\"] = price\n\treq[\"type\"] = orderType\n\treq[\"size\"] = size\n\tif reduceOnly {\n\t\treq[\"reduceOnly\"] = reduceOnly\n\t}\n\tif ioc {\n\t\treq[\"ioc\"] = ioc\n\t}\n\tif postOnly {\n\t\treq[\"postOnly\"] = postOnly\n\t}\n\tif clientID != \"\" {\n\t\treq[\"clientId\"] = clientID\n\t}\n\tresp := struct {\n\t\tData OrderData `json:\"result\"`\n\t}{}\n\treturn resp.Data, f.SendAuthHTTPRequest(ctx, exchange.RestSpot, http.MethodPost, placeOrder, req, &resp)\n}", "title": "" }, { "docid": "0b931828824e25e4f7337a68434294b9", "score": "0.5264923", "text": "func (cs *ControllerStruct) PlaceOrder(c *gin.Context) {\n\tvar order Models.Order\n\tif err := c.BindJSON(&order); err != nil {\n\t\tfmt.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tproductId := order.ProductID\n\tcustomerId := order.CustomerID\n\torderQuantity := order.Quantity\n\torder.Status = \"order placed\"\n\tlastOrderTime, ok := Config.CustomerOrders[customerId]\n\tif ok && time.Now().Sub(lastOrderTime).Milliseconds() < 300000 {\n\t\tc.JSON(http.StatusTooEarly, \"Customer is in cool-down period\")\n\t\treturn\n\t}\n\tproduct, exists, err := Repo.GetProductByID(productId, cs.DB)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tif !exists {\n\t\tc.JSON(http.StatusNoContent, \"Product does not exist\")\n\t\treturn\n\t}\n\tif product.Quantity - orderQuantity < 0 {\n\t\torder.Status = \"failed\"\n\t}\n\tif order.ID == \"\" {\n\t\torder.ID = \"ORD\" + Config.GetOrderCounter()\n\t}\n\terr = Repo.PlaceOrder(&order, cs.DB)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tConfig.CustomerOrders[customerId] = order.CreatedAt\n\tif order.Status == \"failed\" {\n\t\tc.JSON(http.StatusOK, order)\n\t\treturn\n\t}\n\tif err = Repo.UpdateProductByID(&product, cs.DB, product.Price, product.Quantity-orderQuantity); err != nil {\n\t\tfmt.Println(err)\n\t\tc.JSON(http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, order)\n}", "title": "" }, { "docid": "3a12f01924ec1583108535bdf429b9f6", "score": "0.5263953", "text": "func OrderByUserId(Order *[]*model.Order, buyerID string) (err error) {\n\n\tvar OrderDetails []*model.OrderDetails\n\terr = db.DB[\"smartdb\"].Where(\"buyerId='\" + buyerID + \"'\").Find(&OrderDetails).Error\n\tif err != nil {\n\t\tlog.Print(err)\n\t\treturn\n\n\t}\n\torderMap := make(map[string]model.Order, len(OrderDetails)+1)\n\tfor _, val := range OrderDetails {\n\n\t\tif _, ok := orderMap[val.OrderNumber]; !ok {\n\t\t\tvar tempOrder model.Order\n\t\t\ttempOrder.ID = val.ID\n\t\t\ttempOrder.Source = val.Source\n\t\t\ttempOrder.BuyerID = val.BuyerID\n\t\t\ttempOrder.OrderNumber = val.OrderNumber\n\t\t\ttempOrder.OrderDate = val.OrderDate\n\t\t\ttempOrder.SupplierID = val.SupplierID\n\t\t\ttempOrder.TakenOn = val.TakenOn\n\t\t\ttempOrder.DeliveryOption = val.DeliveryOption\n\t\t\ttempOrder.DeliveryMode = val.DeliveryMode\n\t\t\ttempOrder.Remarks = val.Remarks\n\t\t\ttempOrder.WorkspaceID = val.WorkspaceID\n\t\t\ttempOrder.Status = val.Status\n\t\t\ttempOrder.InvoiceNumber = val.InvoiceNumber\n\t\t\ttempOrder.IsBounced = val.IsBounced\n\t\t\torderMap[val.OrderNumber] = tempOrder\n\t\t}\n\t\to, _ := orderMap[val.OrderNumber]\n\t\tvar product model.Product\n\t\tproduct.ProductCode = val.ProductCode\n\t\tproduct.ProductName = val.ProductName\n\t\tproduct.Company = val.Company\n\t\tproduct.Pack = val.Pack\n\t\tproduct.Quantity = val.Quantity\n\t\tproduct.FreeQuantity = val.FreeQuantity\n\t\tproduct.SchemePercentage = val.SchemePercentage\n\t\tproduct.Closing = val.Closing\n\t\tproduct.Mrp = val.Mrp\n\t\tproduct.Ptr = val.Ptr\n\t\tproduct.Pts = val.Pts\n\t\to.Products = append(o.Products, &product)\n\t\torderMap[val.OrderNumber] = o\n\n\t}\n\n\tfor _, mapVal := range orderMap {\n\t\ttemp := mapVal\n\t\t*Order = append(*Order, &temp)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "abb95dc1ce136129ad698dbdf3c0bcf2", "score": "0.5261545", "text": "func (mr *MockProcessorMockRecorder) ProcessOrder(ctx, order interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ProcessOrder\", reflect.TypeOf((*MockProcessor)(nil).ProcessOrder), ctx, order)\n}", "title": "" }, { "docid": "e94b87360289e7bcc669e02c2b9524d9", "score": "0.5259188", "text": "func (s *NotificationsService) GetOrder(id int) (order *Order, err error) {\n\tfor i := 0; i < len(s.Orders); i++ {\n\t\tif s.Orders[i].ID == id {\n\t\t\torder = &s.Orders[i]\n\t\t\terr = nil\n\t\t\treturn\n\t\t}\n\t}\n\n\terr = fmt.Errorf(\"Item with ID %d does not exist\", id)\n\treturn\n}", "title": "" }, { "docid": "5d67486fab606cad9377f5cb755a3735", "score": "0.5250291", "text": "func (s *server) ShipOrder(ctx context.Context, in *pb.ShipOrderRequest) (*pb.ShipOrderResponse, error) {\n\tlog.Info(\"[ShipOrder] received request\")\n\tdefer log.Info(\"[ShipOrder] completed request\")\n\t// 1. Create a Tracking ID\n\tbaseAddress := fmt.Sprintf(\"%s, %s, %s\", in.Address.StreetAddress, in.Address.City, in.Address.State)\n\tid := CreateTrackingId(baseAddress)\n\n\t// 2. Generate a response.\n\treturn &pb.ShipOrderResponse{\n\t\tTrackingId: id,\n\t}, nil\n}", "title": "" }, { "docid": "6ea968f0e141f09aa14bf9ee35de6411", "score": "0.5242629", "text": "func (em *ExManager) Process(id uint64) {\n\tex, err := em.backend.Expenses.Get(id)\n\tif err != nil {\n\t\terrors.Print(err)\n\t\treturn\n\t}\n\texpense := Cast(ex)\n\tclassifyExpense(expense, em.backend.DB)\n\terr = em.Update(expense)\n\tif err != nil {\n\t\tfmt.Println(\"Error updating expense\")\n\t}\n\tem.backend.Change <- changes.ExpenseEvent\n\tem.backend.ReclassifyDocuments <- true\n}", "title": "" }, { "docid": "77f89aa0f3ffe1b5ff8644c28d62ea85", "score": "0.5237929", "text": "func (server *Server) UpdateOrder(writer http.ResponseWriter, request *http.Request) {\n\n\tvars := mux.Vars(request)\n\tshopID := vars[\"shop_id\"]\n\torderID := vars[\"order_id\"]\n\tshop := models.Shop{}\n\torder := models.Order{}\n\torderFinder := models.Order{}\n\n\tbody, err := ioutil.ReadAll(request.Body)\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusUnprocessableEntity, err)\n\t}\n\n\terr = json.Unmarshal(body, &order)\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\terr = order.Validate(\"updatestatus\")\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tisAdmin, err := auth.IsAdminToken(request)\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusUnprocessableEntity, err)\n\t\treturn\n\t}\n\n\tif !isAdmin {\n\t\tresponses.ERROR(writer, http.StatusUnauthorized, errors.New(\"Unauthorized: This is not an admin token\"))\n\t\treturn\n\t}\n\n\tcurrentOrder, err := orderFinder.FindOrderByID(server.DB, orderID)\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif currentOrder.ShopID.String() != shopID {\n\t\tresponses.ERROR(writer, http.StatusUnauthorized, errors.New(\"Unauthorized: This order does not belong to the given shop\"))\n\t\treturn\n\t}\n\n\t_, err = shop.FindShopByID(server.DB, currentOrder.ShopID.String())\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tupdatedOrder, err := order.UpdateOrder(server.DB, orderID)\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tresponses.JSON(writer, http.StatusOK, updatedOrder)\n}", "title": "" }, { "docid": "7de5dc3144e7e0e971fd92eaedc1d7ef", "score": "0.5203683", "text": "func OrdersHandler(w http.ResponseWriter, r *http.Request) {\r\n\tlog.Debug(\"Entering\")\r\n\tdefer log.Debug(\"Exiting\")\r\n\r\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\r\n\r\n\tvars := mux.Vars(r)\r\n\tid := vars[\"id\"]\r\n\tif id == \"\" {\r\n\t\tlog.Error(\"ID missing\")\r\n\t\tjson.NewEncoder(w).Encode(\"ID missing\")\r\n\t\tw.WriteHeader(http.StatusBadRequest)\r\n\t\treturn\r\n\t}\r\n\r\n\tlog.Info(\"Searching for \", id)\r\n\tname := DB.Getorder(id)\r\n\r\n\tif name != \"\" {\r\n\t\tw.WriteHeader(http.StatusOK)\r\n\t\tjson.NewEncoder(w).Encode(name)\r\n\t\treturn\r\n\t}\r\n\r\n\tjson.NewEncoder(w).Encode(\"No ID found\")\r\n\tw.WriteHeader(http.StatusNotFound)\r\n\r\n}", "title": "" }, { "docid": "4fc2ae91ea41e2ffd193055efe00fa63", "score": "0.5194061", "text": "func reviewOrder(js nats.JetStreamContext, order model.Order) {\n\t// Changing the Order status\n\torder.Status = \"approved\"\n\torderJSON, _ := json.Marshal(order)\n\t_, err := js.Publish(pubSubjectName, orderJSON)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tlog.Printf(\"Order with OrderID:%d has been %s\\n\", order.OrderID, order.Status)\n}", "title": "" }, { "docid": "c3e4bb91baef73329823d996fc94419c", "score": "0.51855344", "text": "func (r *GetOrderRequest) Do(ctx context.Context) (*GetOrderResponse, error) {\n\trespBytes, err := r.client.callAPI(ctx, &r.amazonRequest)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\txmlResponse := &GetOrderResponse{}\n\terr = xml.Unmarshal(respBytes, xmlResponse)\n\tif err != nil {\n\t\treturn nil, r.client.parseAPIerrors(respBytes)\n\t}\n\n\treturn xmlResponse, nil\n}", "title": "" }, { "docid": "60d282860e76a24b187f782cde582fba", "score": "0.51818866", "text": "func (f *FTX) ModifyOrderByClientID(ctx context.Context, clientOrderID, clientID string, price, size float64) (OrderData, error) {\n\treq := make(map[string]interface{})\n\treq[\"price\"] = price\n\treq[\"size\"] = size\n\tif clientID != \"\" {\n\t\treq[\"clientID\"] = clientID\n\t}\n\tresp := struct {\n\t\tData OrderData `json:\"result\"`\n\t}{}\n\treturn resp.Data, f.SendAuthHTTPRequest(ctx, exchange.RestSpot, http.MethodPost, fmt.Sprintf(modifyOrderByClientID, clientOrderID), req, &resp)\n}", "title": "" }, { "docid": "98ee9d9ce58e6848bcf9e3167f2df3a2", "score": "0.5176145", "text": "func (n *OpenBazaarNode) CalcOrderID(order *pb.Order) (string, error) {\n\tser, err := proto.Marshal(order)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tid, err := ipfs.EncodeMultihash(ser)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn id.B58String(), nil\n}", "title": "" }, { "docid": "b07f55bdccae9f940e3c8e65e793e881", "score": "0.5175137", "text": "func (a *OrdersApiService) UpdateOrderExecute(r ApiUpdateOrderRequest) (*OrderResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPut\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *OrderResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"OrdersApiService.UpdateOrder\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/orders/{id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"id\"+\"}\", url.PathEscape(parameterValueToString(r.id, \"id\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.orderUpdateRequest == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"orderUpdateRequest is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/vnd.conekta-v2.1.0+json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif r.acceptLanguage != nil {\n\t\tparameterAddToHeaderOrQuery(localVarHeaderParams, \"Accept-Language\", r.acceptLanguage, \"\")\n\t}\n\t// body params\n\tlocalVarPostBody = r.orderUpdateRequest\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 422 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ModelError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "79f16eaf7f9c8f32c7abba36970ce924", "score": "0.51742375", "text": "func (this *BaseOrder) Do(tx *sqlx.Tx) error {\n\treturn errors.New(\"*BaseOrder does not implement opay.IOrder (missing Do method).\")\n}", "title": "" }, { "docid": "70120dc69c49fa2d816d171f4537375d", "score": "0.5173497", "text": "func (r *ListOrderItemsRequest) Do(ctx context.Context) (*ListOrderItemsResponse, error) {\n\trespBytes, err := r.client.callAPI(ctx, &r.amazonRequest)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\txmlResponse := &ListOrderItemsResponse{}\n\terr = xml.Unmarshal(respBytes, xmlResponse)\n\tif err != nil {\n\t\treturn nil, r.client.parseAPIerrors(respBytes)\n\t}\n\n\treturn xmlResponse, nil\n}", "title": "" }, { "docid": "d10e6591337796e4b408083da912e1eb", "score": "0.517194", "text": "func (server *Server) GetOrderByID(writer http.ResponseWriter, request *http.Request) {\n\n\tvars := mux.Vars(request)\n\torder := models.Order{}\n\torderRetrieved, err := order.FindOrderByID(server.DB, vars[\"id\"])\n\tif err != nil {\n\t\tresponses.ERROR(writer, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tresponses.JSON(writer, http.StatusOK, orderRetrieved)\n}", "title": "" }, { "docid": "2de40388af72f281cf8ea72355507beb", "score": "0.51640457", "text": "func (o *CreateExcessWeightRecordParams) SetMoveTaskOrderID(moveTaskOrderID strfmt.UUID) {\n\to.MoveTaskOrderID = moveTaskOrderID\n}", "title": "" }, { "docid": "2b7afc2053dd37ade80ab5adfa379535", "score": "0.51626366", "text": "func (intr Internal) StoreOrder(ctx context.Context, tx *sql.Tx, order Order) (ID int64, err error) {\n\tvar args []interface{}\n\tquery := `INSERT INTO orders \n\t\t\t\t\t(\n\t\t\t\t\t\torder_id_format,\n\t\t\t\t\t\tproduct_id,\n\t\t\t\t\t\tquantity,\n\t\t\t\t\t\tdescription,\n\t\t\t\t\t\tdate,\n\t\t\t\t\t\tprice \n\t\t\t\t\t)\n\t\t\tVALUES (\n\t\t\t\t\t\t?, \n\t\t\t\t\t\t?, \n\t\t\t\t\t\t?,\n\t\t\t\t\t\t?, \n\t\t\t\t\t\t?, \n\t\t\t\t\t\t?\t\t\t\t\t\t\n\t\t\t\t\t)\n\t\t\t`\n\targs = append(args,\n\t\torder.OrderIDFormat,\n\t\torder.ProductID,\n\t\torder.Quantity,\n\t\torder.Description,\n\t\torder.Date,\n\t\torder.Price,\n\t)\n\tif order.OrderID != 0 {\n\t\tquery = `UPDATE orders \n\t\t\t\t SET \n\t\t\t\t\t\torder_id_format = ?,\n\t\t\t\t\t\tproduct_id = ?,\n\t\t\t\t\t\tquantity = ?,\n\t\t\t\t\t\tdescription = ?,\n\t\t\t\t\t\tdate = ?,\n\t\t\t\t\t\tprice = ? \n\t\t\t\tWHERE \n\t\t\t\t\t\torder_id = ?\n\t\t\t\t\t\t \n\t\t`\n\t\targs = append(args, order.OrderID)\n\t}\n\n\tresult, err := tx.ExecContext(ctx, query, args...)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tif order.OrderID == 0 {\n\t\t// no need to check error, since it will be occurred by database incompatibility\n\t\torder.OrderID, _ = result.LastInsertId()\n\t}\n\n\treturn order.OrderID, err\n}", "title": "" }, { "docid": "8faeff9829883c4d063f969fde68fd5c", "score": "0.51597357", "text": "func Update(id string, params *stripe.OrderUpdateParams) (*stripe.Order, error) {\n\treturn getC().Update(id, params)\n}", "title": "" }, { "docid": "def09d2c82ad3ea364a050e6b161283f", "score": "0.51527184", "text": "func (am *AssetManager) Process(id uint64) {\n}", "title": "" }, { "docid": "99400a69a1cf9a48021e656e0958142f", "score": "0.5136988", "text": "func getOrder(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\tparams := mux.Vars(r) // Gets params\n\t// Loop through orders and find one with the id from the params\n\tfor _, item := range orders {\n\t\tif item.OrderID == params[\"id\"] {\n\t\t\tjson.NewEncoder(w).Encode(item)\n\t\t\treturn\n\t\t}\n\t}\n\tjson.NewEncoder(w).Encode(&Order{})\n}", "title": "" }, { "docid": "94b6ba42f897975266b11268364b2ca6", "score": "0.5124966", "text": "func GetPurchaseOrderItemsByOrderID(c *gin.Context) {\n\tparams := c.Request.URL.Query()\n\tstrPurchaseOrderID := params.Get(\"purchaseOrderID\")\n\tpurchaseOrderID, err := strconv.ParseUint(strPurchaseOrderID, 10, 32)\n\tif err != nil {\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"code\": 3000,\n\t\t\t\"msg\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tpurchaseOrderItems := make([]models.PurchaseOrderItem, 0)\n\terr = service.GetPurchaseOrderItemsByOrderID(uint(purchaseOrderID), &purchaseOrderItems)\n\tif err != nil {\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"code\": 3000,\n\t\t\t\"msg\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"code\": 2000,\n\t\t\"msg\": \"success\",\n\t\t\"data\": purchaseOrderItems,\n\t})\n}", "title": "" }, { "docid": "c2a914e123bd6d81e90824696210023c", "score": "0.512283", "text": "func (p *BasOrderServ) FindByID(id types.RowID) (order cafmodel.Order, err error) {\n\tif order, err = p.Repo.FindByID(id); err != nil {\n\t\terr = corerr.Tick(err, \"E3243183\", \"can't fetch the order\", id)\n\t\treturn\n\t}\n\n\torderFoodServ := ProvideBasOrderFoodService(cafrepo.ProvideOrderFoodRepo(p.Engine))\n\tvar params param.Param\n\tparams.PreCondition = fmt.Sprintf(\" order_id = %v \", id)\n\tparams.Limit = 10000\n\tparams.Select = \"*\"\n\n\tvar foods []cafmodel.OrderFood\n\n\tif foods, _, err = orderFoodServ.List(params); err != nil {\n\t\terr = corerr.Tick(err, \"E3263291\", \"can't fetch the order's foods\", id)\n\t\treturn\n\t}\n\n\torder.Foods = foods\n\n\treturn\n}", "title": "" }, { "docid": "6d336b036833109b382ff49d134070c4", "score": "0.5112173", "text": "func withOrderID(id uuid.UUID) orderOption {\n\treturn func(m *OrderMutation) {\n\t\tvar (\n\t\t\terr error\n\t\t\tonce sync.Once\n\t\t\tvalue *Order\n\t\t)\n\t\tm.oldValue = func(ctx context.Context) (*Order, error) {\n\t\t\tonce.Do(func() {\n\t\t\t\tif m.done {\n\t\t\t\t\terr = fmt.Errorf(\"querying old values post mutation is not allowed\")\n\t\t\t\t} else {\n\t\t\t\t\tvalue, err = m.Client().Order.Get(ctx, id)\n\t\t\t\t}\n\t\t\t})\n\t\t\treturn value, err\n\t\t}\n\t\tm.id = &id\n\t}\n}", "title": "" }, { "docid": "d36a6949dde9a99075ab879753156a19", "score": "0.5111302", "text": "func (ob *OrderBook) CancelOrder(id string) *Order {\n\torderNode := ob.orders[id]\n\t// fmt.Printf(\"orderNode: %v\\n\", orderNode.Orders)\n\t// orderNode.Orders = []*Order{}\n\tfor i, order := range orderNode.Orders {\n\t\tif order.ID == id {\n\t\t\t// ob.orders[id].addOrder(*order)\n\t\t\t// ob.removeOrder(order, i)\n\t\t\torderNode.removeOrder(i)\n\t\t\t// orderNode.updateVolume(-order.Amount)\n\t\t\t// orderNode.Orders = append(orderNode.Orders[:i], orderNode.Orders[i+1:]...)\n\t\t\tif len(orderNode.Orders) == 0 {\n\t\t\t\tob.removeOrder(order)\n\t\t\t}\n\t\t\tob.mutex.Lock()\n\t\t\tdelete(ob.orders, id)\n\t\t\tob.mutex.Unlock()\n\t\t\treturn order\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e58f57cd04139bcbd9610da101656fa4", "score": "0.5108588", "text": "func (clic *CheckListItemCreate) SetWorkOrderID(id string) *CheckListItemCreate {\n\tif clic.work_order == nil {\n\t\tclic.work_order = make(map[string]struct{})\n\t}\n\tclic.work_order[id] = struct{}{}\n\treturn clic\n}", "title": "" }, { "docid": "23f674f5f82d4d2d30e42343fb853c99", "score": "0.5100695", "text": "func AddOrder(c echo.Context) error {\n\n\tvar inputJSON models.Orders\n\t//var outResponse models.Orders\n\n\terr := c.Bind(&inputJSON)\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusInternalServerError, \"Wrong data\")\n\t}\n\n\t// Select all workers by id\n\tfor i := 0; i < (len(inputJSON.CurrentWorkers)); i++ {\n\n\t\t// Try Select Worker by id\n\t\tif inputJSON.CurrentWorkers[0].CurrentWorkerID > 0 {\n\t\t\tvar worker models.Workers\n\n\t\t\terr = db.Conn.Model(&worker).Where(\"ID = ?\", inputJSON.CurrentWorkers[i].CurrentWorkerID).Select()\n\t\t\tif err != nil {\n\t\t\t\treturn echo.NewHTTPError(http.StatusOK, \"Worker not found. \"+err.Error())\n\t\t\t}\n\n\t\t\t// Add worker by id\n\t\t\tinputJSON.CurrentWorkers[i].CurrentWorkerInitials = worker.Initials\n\t\t\tinputJSON.CurrentWorkers[i].CurrentWorkerPhone = worker.Phone\n\n\t\t}\n\n\t}\n\n\t// Try select Client by id\n\tif inputJSON.ClientID > 0 {\n\t\tvar client models.Clients\n\n\t\terr = db.Conn.Model(&client).Where(\"ID = ?\", inputJSON.ClientID).Select()\n\t\tif err != nil {\n\t\t\treturn echo.NewHTTPError(http.StatusOK, \"Client not found. \"+err.Error())\n\t\t}\n\n\t\tinputJSON.ClientInitials = client.Initials\n\t\tinputJSON.ClientPhone = client.Phone\n\t}\n\n\t// Default values\n\tinputJSON.Status.StatusOfficeStart = true\n\tinputJSON.Status.DataOfficeStart = time.Now()\n\n\t// Insert\n\t_, err = db.Conn.Model(&inputJSON).Returning(\"*\").Insert()\n\n\tif err != nil {\n\t\treturn echo.NewHTTPError(http.StatusOK, err.Error())\n\t}\n\n\tvar outResponse OrderID\n\toutResponse.ID = inputJSON.ID\n\treturn echo.NewHTTPError(http.StatusOK, outResponse)\n}", "title": "" }, { "docid": "34d2bd4fc2abffc648db85faa67c9dba", "score": "0.5092093", "text": "func (o *UploadAmendedOrdersParams) validateOrdersID(formats strfmt.Registry) error {\n\n\tif err := validate.FormatOf(\"ordersId\", \"path\", \"uuid\", o.OrdersID.String(), formats); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "565041e8b24e0f6878b276dda60d8423", "score": "0.5090337", "text": "func (c *PlaceOrderCommand) Handle(payload eventstore.Payloader, aggregateId uuid.ID, revision int) error {\n\t// command create and save event in event store\n\tord, found := payload.(Order)\n\tif !found {\n\t\treturn fmt.Errorf(\"expected type Order, got %T\", payload)\n\t}\n\tc.Order = ord\n\n\t// Place order is create and event and aggregate\n\tevn, err := c.EventBuilder.SetName(\"order_placed\").\n\t\tSetAggregateID(aggregateId).\n\t\tGenID().\n\t\tSetItem(ord).\n\t\tSetStorer(c.Storer).Build()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// put the event\n\n\tgo func() {\n\t\tmsgBus := eventstore.GetMessageBus()\n\t\tmsgBus.Input() <- evn\n\t}()\n\n\treturn nil\n\n}", "title": "" }, { "docid": "19e0c68ce4b961df72aadc266eeb99a8", "score": "0.5085237", "text": "func (o *ProcessedTransaction) SetOrder(exec boil.Executor, insert bool, related *UserOrder) error {\n\tvar err error\n\tif insert {\n\t\tif err = related.Insert(exec, boil.Infer()); err != nil {\n\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t}\n\t}\n\n\tupdateQuery := fmt.Sprintf(\n\t\t\"UPDATE \\\"processed_transaction\\\" SET %s WHERE %s\",\n\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"order_id\"}),\n\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, processedTransactionPrimaryKeyColumns),\n\t)\n\tvalues := []interface{}{related.ID, o.ID}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\tif _, err = exec.Exec(updateQuery, values...); err != nil {\n\t\treturn errors.Wrap(err, \"failed to update local table\")\n\t}\n\n\to.OrderID = related.ID\n\tif o.R == nil {\n\t\to.R = &processedTransactionR{\n\t\t\tOrder: related,\n\t\t}\n\t} else {\n\t\to.R.Order = related\n\t}\n\n\tif related.R == nil {\n\t\trelated.R = &userOrderR{\n\t\t\tOrderProcessedTransaction: o,\n\t\t}\n\t} else {\n\t\trelated.R.OrderProcessedTransaction = o\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a797df13b041a7d3cbab73e294d42245", "score": "0.50830907", "text": "func UpdateOrder(w http.ResponseWriter, r *http.Request) {\n\tvar orderDetailsDto dtos.OrderDetailsDto\n\terr := json.NewDecoder(r.Body).Decode(&orderDetailsDto)\n\tcheck(err)\n\tif orderDetailsDto.ClienDetails.FirstName == \"\" {\n\t\tpanic(http.StatusBadRequest)\n\t}\n\n\t//delete old order lines\n\t_, err = DB.Exec(\"delete from OrderLines where orderHeaderId=?\", orderDetailsDto.ClienDetails.ID)\n\tcheck(err)\n\n\tvar numberOfItems int\n\tvar totalPrice float64\n\tfor _, v := range orderDetailsDto.OrderDetails {\n\t\tnumberOfItems = numberOfItems + v.Amount\n\t\ttotalPrice = totalPrice + float64(v.Amount)*v.LinePrice\n\t}\n\trows, err := DB.Prepare(\"update OrderHeaders set(numberOfItems, totalPrice, ClientFirstName,ClientSureName,ClientEmail,ClientCell,ClientRemarks,DateCreation,DateTarget,StatusId) values(?,?,?,?,?,?,?,?,?,?) where Id=?\")\n\tcheck(err)\n\tre, err := rows.Exec(numberOfItems,\n\t\ttotalPrice,\n\t\torderDetailsDto.ClienDetails.FirstName,\n\t\torderDetailsDto.ClienDetails.SureName,\n\t\torderDetailsDto.ClienDetails.Email,\n\t\torderDetailsDto.ClienDetails.MobileNumber,\n\t\torderDetailsDto.ClienDetails.Notes,\n\t\ttime.Now(),\n\t\torderDetailsDto.ClienDetails.DateReady,\n\t\t1,\n\t\torderDetailsDto.ClienDetails.ID)\n\tcheck(err)\n\tLastOrderID, err := re.LastInsertId()\n\tcheck(err)\n\tfor _, v := range orderDetailsDto.OrderDetails {\n\t\t_, err := DB.Exec(\"insert into OrderLines values (?,?,?,?,?)\",\n\t\t\tLastOrderID,\n\t\t\tv.LineNumber,\n\t\t\tv.ItemID,\n\t\t\tv.Amount,\n\t\t\tv.LinePrice)\n\t\tcheck(err)\n\t}\n}", "title": "" }, { "docid": "66737e2bf485f73c5cace56eeb422417", "score": "0.50813854", "text": "func (repo *repository) GetOrderByID(ctx context.Context, id string) (order.Order, error) {\n\tvar orderRow = order.Order{}\n\tif err := repo.db.QueryRowContext(ctx,\n\t\t\"SELECT id, customerid, status, createdon, restaurantid FROM orders WHERE id = $1\",\n\t\tid).\n\t\tScan(\n\t\t\t&orderRow.ID, &orderRow.CustomerID, &orderRow.Status, &orderRow.CreatedOn, &orderRow.RestaurantId,\n\t\t); err != nil {\n\t\treturn orderRow, err\n\t}\n\treturn orderRow, nil\n}", "title": "" }, { "docid": "8258e79e613446e338535b73f5ac72d9", "score": "0.5061714", "text": "func (h *Handler) Orders(message *tbot.Message) {\n\tstatus := message.Vars[\"status\"]\n\tstatus = strings.ToLower(status)\n\tif len(status) <= 0 {\n\t\tstatus = \"any\"\n\t}\n\tlog.Debug(\"[Orders] executed, var status=\", status)\n\n\toptions := struct {\n\t\tStatus string `url:\"fulfillment_status\"`\n\t}{status}\n\n\tresult, err := h.client.Count(\"/admin/orders/count.json\", options)\n\tif err != nil {\n\t\tmessage.Reply(fmt.Sprintf(\"Error retriving orders. err %s\", err.Error()))\n\t\treturn\n\t}\n\n\tmessage.Reply(fmt.Sprintf(\"%d orders with fullfilment status %s\", result, status))\n\n}", "title": "" }, { "docid": "01f21516f4418e229d8ba157a1488133", "score": "0.506081", "text": "func (s basicService) PlaceOrder(ctx context.Context, bookID string) (Order, error) {\n\treturn Order{}, nil\n}", "title": "" }, { "docid": "23dea18d2886c66e08b299221961ccda", "score": "0.5060004", "text": "func (ob *orderBook) processBid(bid *models.Bid) {\n\tvar l = ob.logger.WithFields(logrus.Fields{\n\t\t\"method\": \"processBid\",\n\t\t\"paramBid\": bid,\n\t})\n\n\t// if control reaches here, it's NOT a stoploss order\n\tvar askDone, bidDone bool\n\n\t// matchingAsk is still in the queue. It must be removed once it finishes\n\tmatchingAsk, addBackOrders := ob.getTopMatchingAsk(bid)\n\n\tfor matchingAsk != nil {\n\t\t/*\n\t\t * makeTrade invokes fillOrderFn\n\t\t * It handles changes in market depth, closing of orders\n\t\t * It does not handle popping of the opposing order\n\t\t */\n\t\taskDone, bidDone = ob.makeTrade(matchingAsk, bid, false, true)\n\t\tif askDone {\n\t\t\tob.asks.Pop()\n\t\t}\n\t\taddBackOrders()\n\n\t\t// Check if error occurred in acquiring locks or database transactions\n\t\tif askDone == false && bidDone == false {\n\t\t\tl.Errorf(\"makeTrade returned both askDone, bidDone false\")\n\t\t\treturn\n\t\t}\n\n\t\t// check if bid is fulfilled\n\t\tif bidDone == true {\n\t\t\t// nothing more needs to be done here. addBackOrders has been called\n\t\t\t// and if the ask was fulfilled, it has been popped above already.\n\t\t\treturn\n\t\t}\n\n\t\t// If bid has not been completely fulfilled, find the next top matching ask and repeat\n\t\tmatchingAsk, addBackOrders = ob.getTopMatchingAsk(bid)\n\t}\n\n\t// addBackOrders doesn't need to be called here because matchingAsk is nil\n\n\t// if bid is still not fulfilled, add it to queue & update depth\n\tif bidDone == false {\n\t\tob.bids.Push(bid)\n\t\tob.addBidToDepth(bid)\n\t}\n}", "title": "" }, { "docid": "eddf06809d315ff460cf5c59b7989bb2", "score": "0.50574726", "text": "func scanOrder(scanner interface{ Scan(...interface{}) error }, o *model.Order) error {\n\treturn scanner.Scan(&o.ID, &o.Token, &o.Valid, &o.Source, &o.Name, &o.Email,\n\t\t&o.Address, &o.City, &o.State, &o.Zip, &o.Phone, &o.Customer,\n\t\t&o.Member, (*Time)(&o.Created), &o.CNote, &o.ONote, &o.InAccess,\n\t\t&o.Coupon)\n}", "title": "" }, { "docid": "16708035ca405f9bf14312654265fdf0", "score": "0.50573516", "text": "func orderHandler(formatter *render.Render) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, req *http.Request) {\n\t\t// Connects to MongoDB\n\t\tsession, err := mgo.Dial(mongodb_server)\n if err != nil {\n \tfmt.Println(\"Orders API - Unable to connect to MongoDB during read operation\")\n panic(err)\n }\n defer session.Close()\n session.SetMode(mgo.Monotonic, true)\n c := session.DB(mongodb_database).C(mongodb_collection)\n params := mux.Vars(req)\n var customer_id string = params[\"customer_id\"]\n fmt.Println(\"Placing the order for: \"+customer_id)\n var result []bson.M\n\t\terr = c.Find(bson.M{\"customerId\" : customer_id}).All(&result)\n\t\tif err != nil {\n log.Fatal(mux.Vars(req))\n }\n fmt.Println(\"\\nObtained orders from DB..\")\n fmt.Println(\"\\nOrders are:\\n\", result)\n\t\tformatter.JSON(w, http.StatusOK, result)\n\n\t}\n}", "title": "" }, { "docid": "38c6bc1f0635db857048b8b352249531", "score": "0.5056409", "text": "func PostOrder(c *gin.Context) {\n\n\tbody := c.Request.Body\n\tbyteContent, err := ioutil.ReadAll(body)\n\tif err != nil {\n\t\tfmt.Println(\"Sorry no content found: \", err.Error())\n\t}\n\n\tvar NewOrder OrderModels.Order\n\t_ = json.Unmarshal(byteContent, &NewOrder)\n\n\torderid := NewOrder.OrderId\n\tcustomerid := NewOrder.CustomerId\n\trestaurantid := NewOrder.RestaurantId\n\titemlist := NewOrder.ItemLine\n\tprice := NewOrder.Price\n\tdiscount := NewOrder.Discount\n\n\tvar itemline []*orderpb.Item\n\n\tfor i := range itemlist {\n\t\titemline = append(itemline, &orderpb.Item{\n\t\t\tName: itemlist[i].Name,\n\t\t\tPrice: itemlist[i].Price,\n\t\t})\n\t}\n\n\treq := &orderpb.OrderRequest{Ord: &orderpb.Order{\n\t\tOrderId: orderid,\n\t\tCustomerId: customerid,\n\t\tRestaurantId: restaurantid,\n\t\tItemLine: itemline,\n\t\tPrice: price,\n\t\tDiscount: discount,\n\t}}\n\n\tres, err := queryServiceClient.AddOrder(c, req)\n\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"error\": err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"response\": res.Res,\n\t})\n}", "title": "" }, { "docid": "b9840cb9a28c4a8644d781056ab56add", "score": "0.50554115", "text": "func WithOrderID(ctx context.Context, orderID string) context.Context {\n\treturn context.WithValue(ctx, orderIDKey, orderID)\n}", "title": "" }, { "docid": "1f177ba6962013fcb272806845f0c3bd", "score": "0.5055205", "text": "func orderInfoHandlerFn(cliCtx context.CLIContext) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\torderID := mux.Vars(r)[\"orderId\"]\n\t\tcliCtx, ok := rest.ParseQueryHeightOrReturnBadRequest(w, cliCtx, r)\n\t\tif !ok {\n\t\t\treturn\n\t\t}\n\n\t\tparams := types.NewQueryOrderParams(orderID)\n\t\tbz, err := cliCtx.Codec.MarshalJSON(params)\n\t\tif err != nil {\n\t\t\trest.WriteErrorResponse(w, http.StatusBadRequest, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tres, height, err := cliCtx.QueryWithData(fmt.Sprintf(\"custom/%s/%s\", types.QuerierRoute, types.QueryOrder), bz)\n\t\tif err != nil {\n\t\t\trest.WriteErrorResponse(w, http.StatusInternalServerError, err.Error())\n\t\t\treturn\n\t\t}\n\n\t\tcliCtx = cliCtx.WithHeight(height)\n\t\trest.PostProcessResponse(w, cliCtx, res)\n\t}\n}", "title": "" }, { "docid": "309c6ffb4d693e36ef19e75175f77e33", "score": "0.50483555", "text": "func (e Endpoints) PutOrder(ctx context.Context, orderID int64, step string, flag bool) (Order, error) {\n\tvar order Order\n\n\trequest := putOrderRequest{OrderID: orderID, Step: step, Flag: flag}\n\tresponse, err := e.PutOrderEndpoint(ctx, request)\n\tif err != nil {\n\t\treturn order, err\n\t}\n\torder = response.(putOrderResponse).Order\n\treturn order, str2err(response.(putOrderResponse).Err)\n}", "title": "" }, { "docid": "e720e713fefcdb6fa01cf26709b75f55", "score": "0.5041693", "text": "func GetOrderById(id int) (v *Order, err error) {\n\to := orm.NewOrm()\n\tv = &Order{Id: id}\n\tif err = o.Read(v); err == nil {\n\t\to.Read(v.UserId)\n\t\treturn v, nil\n\t}\n\treturn nil, err\n}", "title": "" }, { "docid": "8d717339fc27d667194fd5e4feea4ba4", "score": "0.5024606", "text": "func OrderDetailByOrderIDProductID(ctx context.Context, db DB, orderID, productID int) (*OrderDetail, error) {\n\t// query\n\tconst sqlstr = `SELECT ` +\n\t\t`order_id, product_id, unit_price, quantity, discount ` +\n\t\t`FROM order_details ` +\n\t\t`WHERE order_id = $1 AND product_id = $2`\n\t// run\n\tlogf(sqlstr, orderID, productID)\n\tod := OrderDetail{\n\t\t_exists: true,\n\t}\n\tif err := db.QueryRowContext(ctx, sqlstr, orderID, productID).Scan(&od.OrderID, &od.ProductID, &od.UnitPrice, &od.Quantity, &od.Discount); err != nil {\n\t\treturn nil, logerror(err)\n\t}\n\treturn &od, nil\n}", "title": "" }, { "docid": "cfd2b61de8c4017eb2d3c9edb8baea34", "score": "0.5020557", "text": "func (c *client) ReplaceOrder(orderID string, req ReplaceOrderRequest) (*Order, error) {\n\tu, err := url.Parse(fmt.Sprintf(\"%s/%s/orders/%s\", c.opts.BaseURL, apiVersion, orderID))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := c.patch(u, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\torder := &Order{}\n\n\tif err = unmarshal(resp, order); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn order, nil\n}", "title": "" }, { "docid": "e68410da507987b98a44eca83703a927", "score": "0.5013276", "text": "func ExecuteOrder(next_order_chan chan int) {\n\tfor {\n\t\tnext_order := <-next_order_chan\n\t\tdesired_floor = next_order\n\t\tfmt.Printf(\"desired floor is:\", desired_floor)\n\t\tif next_order > current_state.CurrentFloor && !door_open {\n\t\t\tdriver.ElevDriveElevator(1)\n\t\t\tcurrent_state.Direction = 1\n\t\t} else if next_order < current_state.CurrentFloor && !door_open {\n\t\t\tdriver.ElevDriveElevator(-1)\n\t\t\tcurrent_state.Direction = -1\n\t\t}\n\t}\n}", "title": "" }, { "docid": "f2e36afadfb2155d2b5e2e14e8aba3e4", "score": "0.50088966", "text": "func (db *BoltDB) Order(oid order.OrderID) (mord *dexdb.MetaOrder, err error) {\n\toidB := oid[:]\n\terr = db.ordersView(func(ob, archivedOB *bbolt.Bucket) error {\n\t\toBkt := ob.Bucket(oidB)\n\t\t// If the order is not in the active bucket, check the archived\n\t\t// orders bucket.\n\t\tif oBkt == nil {\n\t\t\toBkt = archivedOB.Bucket(oidB)\n\t\t}\n\t\tif oBkt == nil {\n\t\t\treturn fmt.Errorf(\"order %s not found\", oid)\n\t\t}\n\t\tvar err error\n\t\tmord, err = decodeOrderBucket(oidB, oBkt)\n\t\treturn err\n\t})\n\treturn mord, err\n}", "title": "" }, { "docid": "e9ea9ab787b4f12dd96ba5f7afba9fa7", "score": "0.50063777", "text": "func (a *OrdersApiService) UpdateOrder(ctx context.Context, id string) ApiUpdateOrderRequest {\n\treturn ApiUpdateOrderRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tid: id,\n\t}\n}", "title": "" } ]
67855087c5401269bdb69866bdfdacbe
mockBatchWEBHeader creates a WEB batch header
[ { "docid": "b1fb69fdf2b5b264cc9dadcc78f4fed0", "score": "0.8564254", "text": "func mockBatchWEBHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = CreditsOnly\n\tbh.StandardEntryClassCode = WEB\n\tbh.CompanyName = \"Your Company, inc\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"Online Order\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" } ]
[ { "docid": "0143515df18fad871f9faa6a1f5e3103", "score": "0.68321973", "text": "func mockBatchRCKHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = RCK\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "085a0c27460e5b256606ce82da3b43e7", "score": "0.67464477", "text": "func testBatchWebCreate(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\t// Must have valid batch header to create a batch\n\tmockBatch.GetHeader().ServiceClassCode = 63\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrServiceClass) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "701fd05eb170b7d778f477a947e8ba59", "score": "0.6743081", "text": "func mockBatchWEB(t testing.TB) *BatchWEB {\n\tmockBatch := NewBatchWEB(mockBatchWEBHeader())\n\tmockBatch.AddEntry(mockWEBEntryDetail())\n\tmockBatch.GetEntries()[0].AddendaRecordIndicator = 1\n\tmockBatch.GetEntries()[0].AddAddenda05(mockAddenda05())\n\trequire.NoError(t, mockBatch.Create())\n\treturn mockBatch\n}", "title": "" }, { "docid": "0a9f42a49552a61f3686a19406094a48", "score": "0.6485276", "text": "func mockBatchTRCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = TRC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = TRC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "f384d64b593e0fa2def7d0f41aa076c1", "score": "0.6379513", "text": "func mockBatchBOCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = BOC\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = BOC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "6637bf8f943f9ada36694ff47ac9fe07", "score": "0.62677073", "text": "func mockBatchRCKHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = RCK\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "993b0e69dbef5d3ff50791e70646729a", "score": "0.6150621", "text": "func TestBatchRCKHeader(t *testing.T) {\n\ttestBatchRCKHeader(t)\n}", "title": "" }, { "docid": "10aa4bb4ff88096d37371b15f1dc2dee", "score": "0.60949326", "text": "func mockBatchARCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = ARC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = ARC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "4ddca2c35f59582239e01a1037def441", "score": "0.60386723", "text": "func TestHTTPHeadersResponse_genClient(t *testing.T) {\n\tso := assert.New(t)\n\timpl, ts := getTestSvc()\n\tdefer ts.Close()\n\n\ttc := []a{\n\t\ta{\n\t\t\tName: \"X-Something-For-Test\",\n\t\t\tValues: []string{\"val1\", \"Val2\"},\n\t\t},\n\t\ta{\n\t\t\tName: \"X-Something-For-Test-2\",\n\t\t\tValues: []string{\"val3\", \"Val2\"},\n\t\t},\n\t}\n\n\tcalledFunc := false\n\n\timpl.f = func(ctx context.Context, req *String) (*String, error) {\n\t\tcalledFunc = true\n\n\t\tmd := metadata.New(map[string]string{})\n\t\tfor _, c := range tc {\n\n\t\t\tfor i := range c.Values {\n\t\t\t\tmd.Append(c.Name, c.Values[i])\n\t\t\t}\n\t\t}\n\t\tgrpc.SetHeader(ctx, md)\n\n\t\treturn &String{}, nil\n\t}\n\n\tcli := NewStringsHTTPClient(http.DefaultClient, ts.URL)\n\n\tgotHeaders := metadata.MD{}\n\n\t_, err := cli.ToLower(\n\t\tcontext.Background(),\n\t\t&String{},\n\t\tgrpc.Header(&gotHeaders),\n\t)\n\tso.Nil(err)\n\tso.True(calledFunc)\n\n\tfor _, c := range tc {\n\t\tso.EqualValues(c.Values, gotHeaders.Get(strings.ToLower(c.Name)))\n\t}\n}", "title": "" }, { "docid": "a20bdb688de0a14cc0f4c6c335b55463", "score": "0.598702", "text": "func makeBatchHeader(id string, options Options, xfer *client.Transfer, source Source) *ach.BatchHeader {\n\tbatchHeader := ach.NewBatchHeader()\n\tbatchHeader.ID = id\n\n\t// Picking between credit and debit is based on which of a transfer's source or destination is the ODFI.\n\tif options.FileConfig.BalanceEntries {\n\t\tbatchHeader.ServiceClassCode = ach.MixedDebitsAndCredits\n\t} else {\n\t\tif options.ODFIRoutingNumber == source.Account.RoutingNumber {\n\t\t\tbatchHeader.ServiceClassCode = ach.CreditsOnly\n\t\t} else {\n\t\t\tbatchHeader.ServiceClassCode = ach.DebitsOnly\n\t\t}\n\t}\n\n\t// Set the Company Name from Customer information or file config\n\tbatchHeader.CompanyName = fmt.Sprintf(\"%s %s\", source.Customer.FirstName, source.Customer.LastName)\n\tif source.Customer.NickName != \"\" {\n\t\tbatchHeader.CompanyName = source.Customer.NickName\n\t}\n\tif options.FileConfig.CompanyName != \"\" {\n\t\tbatchHeader.CompanyName = options.FileConfig.CompanyName\n\t}\n\n\t// Set DiscretionaryData if it exists\n\tif v, ok := source.Customer.Metadata[\"discretionary\"]; ok {\n\t\tbatchHeader.CompanyDiscretionaryData = v\n\t}\n\n\t// Fill in the other fields\n\tbatchHeader.CompanyIdentification = options.CompanyIdentification\n\tbatchHeader.CompanyEntryDescription = xfer.Description // 10 character max\n\n\tnow := time.Now().In(options.CutoffTimezone)\n\tif xfer.SameDay {\n\t\t// Same-Day ACH uses \"SDHHMM\" for this field\n\t\tbatchHeader.CompanyDescriptiveDate = fmt.Sprintf(\"SD%s\", now.Format(\"1504\"))\n\t} else {\n\t\tbatchHeader.CompanyDescriptiveDate = now.Format(\"060102\")\n\t}\n\n\tbatchHeader.EffectiveEntryDate = options.EffectiveEntryDate.Format(\"060102\") // Date to be posted, YYMMDD\n\tbatchHeader.ODFIIdentification = ABA8(options.ODFIRoutingNumber)\n\n\treturn batchHeader\n}", "title": "" }, { "docid": "a2623e748df31d0935b7472dc25fc336", "score": "0.5985038", "text": "func mockBatchTRCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = TRC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = TRC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "14e7730738caea9fcf7dcc8815931038", "score": "0.59188175", "text": "func generateHeader(p *HttpParams) std_http.Header {\n\th := std_http.Header{}\n\tfor k, v := range p.Headers {\n\t\th.Add(k, fmt.Sprintf(\"%v\", v))\n\t}\n\treturn h\n}", "title": "" }, { "docid": "5a0e9a42f251cc65cce647bd189323d8", "score": "0.59059453", "text": "func mockBatchBOCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = BOC\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "1ae010cfffb3279d61ef5a2c1424b194", "score": "0.5878356", "text": "func TestServerSendsHeader(t *testing.T) {}", "title": "" }, { "docid": "92ad6664358382db96e121cb8cbf3872", "score": "0.58475906", "text": "func TestAddHeaders(t *testing.T) {\n\ttestConfig := Config{\n\t\tHeaders: map[string]string{\n\t\t\t\"TestHeaderOne\": \"TestFieldTwo\",\n\t\t\t\"TestHeaderTwo\": \"TestFieldTwo\",\n\t\t},\n\t}\n\texporter := Exporter{testConfig}\n\n\t// Create http request to add headers to.\n\treq, err := http.NewRequest(\"POST\", \"test.com\", nil)\n\trequire.NoError(t, err)\n\terr = exporter.addHeaders(req)\n\trequire.NoError(t, err)\n\n\t// Check that all the headers are there.\n\tfor name, field := range testConfig.Headers {\n\t\trequire.Equal(t, req.Header.Get(name), field)\n\t}\n\trequire.Equal(t, req.Header.Get(\"Content-Encoding\"), \"snappy\")\n\trequire.Equal(t, req.Header.Get(\"Content-Type\"), \"application/x-protobuf\")\n\trequire.Equal(t, req.Header.Get(\"X-Prometheus-Remote-Write-Version\"), \"0.1.0\")\n}", "title": "" }, { "docid": "3823ed1382086374047589e02a126e0f", "score": "0.58227265", "text": "func TestHTTPHeadersResponse(t *testing.T) {\n\tso := assert.New(t)\n\timpl, ts := getTestSvc()\n\tdefer ts.Close()\n\n\ttc := []a{\n\t\ta{\n\t\t\tName: \"X-Something-For-Test\",\n\t\t\tValues: []string{\"val1\", \"Val2\"},\n\t\t},\n\t\ta{\n\t\t\tName: \"X-Something-For-Test-2\",\n\t\t\tValues: []string{\"val3\", \"Val2\"},\n\t\t},\n\t}\n\n\tcalledFunc := false\n\n\timpl.f = func(ctx context.Context, req *String) (*String, error) {\n\t\tcalledFunc = true\n\n\t\tfor _, c := range tc {\n\t\t\tmd := metadata.New(map[string]string{})\n\n\t\t\tfor i := range c.Values {\n\t\t\t\tmd.Append(c.Name, c.Values[i])\n\t\t\t}\n\t\t\tgrpc.SetHeader(ctx, md)\n\t\t}\n\n\t\treturn nil, nil\n\t}\n\n\treq, err := http.NewRequest(\"POST\", ts.URL+pattern_goclay_Strings_ToLower_0_builder(&String{}), bytes.NewReader([]byte(\"{}\")))\n\tso.Nil(err)\n\n\trsp, err := http.DefaultClient.Do(req)\n\tso.Nil(err)\n\tso.True(calledFunc)\n\n\tfor _, c := range tc {\n\t\tso.EqualValues(c.Values, rsp.Header[c.Name])\n\t}\n}", "title": "" }, { "docid": "c7f6469968f696d5e334e12690312beb", "score": "0.5766422", "text": "func testBatchWebSEC(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\tmockBatch.Header.StandardEntryClassCode = RCK\n\terr := mockBatch.Validate()\n\tif !base.Match(err, ErrBatchSECType) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "21803639dac6bc11f240be2c0c244024", "score": "0.5747515", "text": "func testBatchBOCStandardEntryClassCode(t testing.TB) {\n\tmockBatch := mockBatchBOC(t)\n\tmockBatch.Header.StandardEntryClassCode = WEB\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrBatchSECType) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "02eceb839412d17ea4293bd7b235bee8", "score": "0.5723632", "text": "func mockBatchARCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = ARC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = ARC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "b0350d4abd5ce4ae6a3dee30b6c05f5b", "score": "0.57200974", "text": "func TestBatchWebCreate(t *testing.T) {\n\ttestBatchWebCreate(t)\n}", "title": "" }, { "docid": "46ec1322fa64ee4a988393c8823b980d", "score": "0.57019293", "text": "func (ch *callHandle) prepHeaders() []*runner.HttpHeader {\n\tvar headers []*runner.HttpHeader\n\tfor h, vals := range ch.headers {\n\t\tfor _, v := range vals {\n\t\t\theaders = append(headers, &runner.HttpHeader{\n\t\t\t\tKey: h,\n\t\t\t\tValue: v,\n\t\t\t})\n\t\t}\n\t}\n\treturn headers\n}", "title": "" }, { "docid": "72dacf66287d966ca396b44e93778150", "score": "0.5680906", "text": "func testBatchTRCStandardEntryClassCode(t testing.TB) {\n\tmockBatch := mockBatchTRC(t)\n\tmockBatch.Header.StandardEntryClassCode = WEB\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrBatchSECType) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "03a97e81d0573e6c28488dc5ec5d56b2", "score": "0.56781936", "text": "func (c *ProjectsLocationsTensorboardsExperimentsRunsTimeSeriesBatchCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d40b08db537bd4a377ae2253fea9fd1b", "score": "0.5657282", "text": "func (c *ProjectsLocationsTensorboardsExperimentsRunsBatchCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "17962578de4f94559195113961d0b7d5", "score": "0.56252337", "text": "func TestWriteHeaderNoCodeCheck_h1(t *testing.T) { testWriteHeaderAfterWrite(t, h1Mode, false) }", "title": "" }, { "docid": "e1056723f906969057c04080982c7480", "score": "0.55979204", "text": "func MockAuthHeader() http.Header {\n\theader := http.Header{}\n\theader.Add(\"Authorization\", \"TEST\")\n\treturn header\n}", "title": "" }, { "docid": "41a24aca716aaa1780b9c0130d00fad7", "score": "0.55755067", "text": "func (m *MockDeviceService_ListClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f490c96db5ff6c13a215706c9cc9f8be", "score": "0.55730754", "text": "func CreateHeaderStruct(slice []string) (http.Header, error) {\n\thd := SetCommonHeader()\n\tfor _, s := range slice {\n\t\tsplit := strings.Split(s, \"=\")\n\t\tif len(split) != 2 {\n\t\t\treturn nil, fmt.Errorf(\"wrong format header: %s\", s)\n\t\t}\n\t\thd.Add(split[0], split[1])\n\t}\n\n\treturn hd, nil\n}", "title": "" }, { "docid": "4e96628e3220b06f347f74f7779662c8", "score": "0.5567467", "text": "func testBatchRCKStandardEntryClassCode(t testing.TB) {\n\tmockBatch := mockBatchRCK(t)\n\tmockBatch.Header.StandardEntryClassCode = WEB\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrBatchSECType) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "ace41499a57da3d23fed13b3eba9445c", "score": "0.55533385", "text": "func generateHeaders(profile string) http.Header {\n\n\tif len(profile) != 8 {\n\t\tpanic(\"Profile must be exactly eight digits long\")\n\t}\n\n\theaders := make(http.Header)\n\n\tfor index, header := range possible_headers {\n\t\tif string(profile[index]) == \"1\" {\n\t\t\theaders.Add(header, uniuri.New())\n\t\t}\n\t}\n\treturn headers\n}", "title": "" }, { "docid": "6668b98ae2612416c4420b4239dacebd", "score": "0.554383", "text": "func BuildRequestHeaders(request *http.Request, utcString string, ops string) {\n\trequest.Header.Set(\"Content-Type\", constants.ContentType)\n\trequest.Header.Add(\"MaxDataServiceVersion\", \"3.0;NetFx\")\n\trequest.Header.Add(\"DataServiceVersion\", \"3.0;\")\n\trequest.Header.Add(\"x-ms-date\", utcString)\n\n\tswitch ops {\n\tcase constants.CREATE:\n\t\trequest.Header.Add(\"Prefer\", \"return-no-content\")\n\t\trequest.Header.Add(\"Accept\", \"application/json;odata=minimalmetadata\")\n\t\trequest.Header.Add(\"Content-Length\", \"1135\")\n\t\tbreak\n\tcase constants.INSERT:\n\t\trequest.Header.Add(\"Prefer\", \"return-no-content\")\n\t\tbreak\n\tcase constants.FETCH:\n\t\trequest.Header.Add(\"Prefer\", \"return-content\")\n\t\trequest.Header.Add(\"Accept\", \"application/json;odata=nometadata\")\n\t\tbreak\n\tcase constants.DELETE:\n\t\trequest.Header.Add(\"Prefer\", \"return-no-content\")\n\t\trequest.Header.Add(\"Accept\", \"application/json;odata=nometadata\")\n\t\trequest.Header.Add(\"If-Match\", \"*\")\n\t\tbreak\n\t}\n\n}", "title": "" }, { "docid": "8761e92f4a19f6cf9e8eff45ac634aca", "score": "0.5508889", "text": "func TestBatchWEBAddendum99(t *testing.T) {\n\tmockBatch := NewBatchWEB(mockBatchWEBHeader())\n\tmockBatch.AddEntry(mockWEBEntryDetail())\n\tmockAddenda99 := mockAddenda99()\n\tmockAddenda99.TypeCode = \"05\"\n\tmockBatch.GetEntries()[0].Category = CategoryReturn\n\tmockBatch.GetEntries()[0].Addenda99 = mockAddenda99\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrAddendaTypeCode) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "30aea01a43fbddc19ecda3904a901ea3", "score": "0.5459016", "text": "func makeHeader(endpointType byte, userID, timeout, size int64, contentType, endpoint string) []byte {\n\tb := make([]byte, headerSize)\n\tub := make([]byte, 8)\n\ttb := make([]byte, 8)\n\tsb := make([]byte, 8)\n\n\tbinary.LittleEndian.PutUint64(ub, uint64(userID))\n\tbinary.LittleEndian.PutUint64(tb, uint64(timeout))\n\tbinary.LittleEndian.PutUint64(sb, uint64(size))\n\n\tb[0] = endpointType\n\n\tfor i, bb := range ub {\n\t\tb[i+1] = bb\n\t}\n\tfor i, bb := range tb {\n\t\tb[i+9] = bb\n\t}\n\tfor i, bb := range sb {\n\t\tb[i+17] = bb\n\t}\n\tfor i, bb := range []byte(contentType) {\n\t\tb[i+25] = bb\n\t}\n\tfor i, bb := range []byte(endpoint) {\n\t\tb[i+125] = bb\n\t}\n\treturn b\n}", "title": "" }, { "docid": "3cf2986b4e9babfd51a0b986aecf38c7", "score": "0.5457481", "text": "func headerWorker(t *testing.T, id string, count *int32) (chan bool, func(context context.Context, in *bindings.ReadResponse) ([]byte, error)) {\n\tch := make(chan bool, 1)\n\n\treturn ch, func(context context.Context, in *bindings.ReadResponse) ([]byte, error) {\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Job-Key\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Job-Type\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Process-Instance-Key\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Bpmn-Process-Id\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Process-Definition-Version\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Process-Definition-Key\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Element-Id\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Element-Instance-Key\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Worker\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Retries\")\n\t\tassert.Contains(t, in.Metadata, \"X-Zeebe-Deadline\")\n\t\tassert.Contains(t, in.Metadata, \"process-header-1\")\n\t\tassert.Contains(t, in.Metadata, \"process-header-2\")\n\n\t\tassert.Equal(t, id+\"-test\", in.Metadata[\"X-Zeebe-Job-Type\"])\n\t\tassert.Equal(t, id, in.Metadata[\"X-Zeebe-Bpmn-Process-Id\"])\n\t\tassert.Equal(t, \"1\", in.Metadata[\"X-Zeebe-Process-Definition-Version\"])\n\t\tassert.Equal(t, \"Activity_test\", in.Metadata[\"X-Zeebe-Element-Id\"])\n\t\tassert.Equal(t, \"test\", in.Metadata[\"X-Zeebe-Worker\"])\n\t\tassert.Equal(t, \"3\", in.Metadata[\"X-Zeebe-Retries\"])\n\t\tassert.Equal(t, \"1\", in.Metadata[\"process-header-1\"])\n\t\tassert.Equal(t, \"2\", in.Metadata[\"process-header-2\"])\n\n\t\tatomic.AddInt32(count, 1)\n\n\t\tch <- true\n\n\t\treturn nil, nil\n\t}\n}", "title": "" }, { "docid": "bcc7f172153c244a2fb7c8c6008d444a", "score": "0.5449052", "text": "func TestTransportGCRequest_Body_h1(t *testing.T) { testTransportGCRequest(t, h1Mode, true) }", "title": "" }, { "docid": "1a1e4f770fa3e8b6cab42efe16e275fd", "score": "0.54359436", "text": "func (cl *Client) makeHeaders(bodyLen int) []byte {\n\tvar headers []byte\n\n\theaders = cl.appendHeader(headers, \"CONTENT_LENGTH\", strconv.Itoa(bodyLen))\n\theaders = cl.appendHeader(headers, \"SCGI\", \"1\")\n\n\tvar keys []string\n\n\tfor k := range cl.headers {\n\t\tkeys = append(keys, k)\n\t}\n\n\tsort.Strings(keys)\n\n\tfor _, k := range keys {\n\t\theaders = cl.appendHeader(headers, k, cl.headers[k])\n\t}\n\n\treturn headers\n}", "title": "" }, { "docid": "5d81f5d7138c5209b554814eeb8852d7", "score": "0.54336077", "text": "func testBatchWebIndividualNameRequired(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\t// mock batch already has one addenda. Creating two addenda should error\n\tmockBatch.GetEntries()[0].IndividualName = \"\"\n\terr := mockBatch.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "9a0e3599dcea13ac28af87e5f5eb7771", "score": "0.543281", "text": "func TestHTTPHeadersPass_vanillaHTTP(t *testing.T) {\n\tso := assert.New(t)\n\timpl, ts := getTestSvc()\n\tdefer ts.Close()\n\n\ttc := []a{\n\t\ta{\n\t\t\tName: \"Empty string field\",\n\t\t\tResp: &String{Str: \"\"},\n\t\t\tMarshaledData: `{\"str\":\"\"}`,\n\t\t},\n\t}\n\n\n\n\n\treq, err := http.NewRequest(\"POST\", ts.URL+pattern_goclay_Strings_ToLower_0_builder(), bytes.NewReader([]byte(\"{}\")))\n\tso.Nil(err)\n\n\tfor _, c := range tc {\n\t\timpl.f = func(ctx context.Context, req *String) (*String, error) {\n\t\t\treturn c.Resp, nil\n\t\t}\n\n\t\tresp, err := http.DefaultClient.Do(req)\n\t\tso.Nil(err)\n\t\tdata, err := ioutil.ReadAll(resp.Body)\n\t\tso.Equal(c.MarshaledData, string(data))\n\t}\n\n\n}", "title": "" }, { "docid": "a43b321163b93ea6882e3ec7de5c9a78", "score": "0.541941", "text": "func (c *RmasRunRmaStepsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "25c702b8e9100131100bbbeeb3ff0e39", "score": "0.5407072", "text": "func (c *ProjectsAppsAppAttestConfigBatchGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "124f089bed36ccebfbb4a39ac5eb5b3f", "score": "0.539571", "text": "func (m *MockImages_CreateImageClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "08c9b4cf7e05432eabd12f08f8bf1a09", "score": "0.5395311", "text": "func (mock *HardwareService_AllClientMock) HeaderCalls() []struct {\n} {\n\tvar calls []struct {\n\t}\n\tmock.lockHeader.RLock()\n\tcalls = mock.calls.Header\n\tmock.lockHeader.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "c3aa7ced3091e6fa2d496861ef86d2d3", "score": "0.53808886", "text": "func TestHTTPSendCustomRequestHeaders(t *testing.T) {\n\t// test server\n\tts := httptest.NewServer(http.HandlerFunc(echoCustomHeaders))\n\tdefer ts.Close()\n\n\t// expected result with default User-Agent\n\texpectedResult := make(map[string]interface{})\n\texpectedResult[\"status\"] = \"200 OK\"\n\texpectedResult[\"status_code\"] = http.StatusOK\n\n\tbodyMap := map[string][]string{\"X-Foo\": {\"ISO-8859-1,utf-8;q=0.7,*;q=0.7\"}, \"X-Opa\": {\"server\"}, \"User-Agent\": {version.UserAgent}}\n\texpectedResult[\"body\"] = bodyMap\n\texpectedResult[\"raw_body\"] = fmt.Sprintf(\"{\\\"User-Agent\\\":[\\\"%s\\\"],\\\"X-Foo\\\":[\\\"ISO-8859-1,utf-8;q=0.7,*;q=0.7\\\"],\\\"X-Opa\\\":[\\\"server\\\"]}\\n\", version.UserAgent)\n\n\tjsonString, err := json.Marshal(expectedResult)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\ts := string(jsonString[:])\n\n\t// expected result with custom User-Agent\n\n\tbodyMap = map[string][]string{\"X-Opa\": {\"server\"}, \"User-Agent\": {\"AuthZPolicy/0.0.1\"}}\n\texpectedResult[\"body\"] = bodyMap\n\texpectedResult[\"raw_body\"] = \"{\\\"User-Agent\\\":[\\\"AuthZPolicy/0.0.1\\\"],\\\"X-Opa\\\":[\\\"server\\\"]}\\n\"\n\n\tjsonString, err = json.Marshal(expectedResult)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\ts2 := string(jsonString[:])\n\n\t// run the test\n\ttests := []struct {\n\t\tnote string\n\t\trules []string\n\t\texpected interface{}\n\t}{\n\t\t{\"http.send custom headers\", []string{fmt.Sprintf(\n\t\t\t`p = x { http.send({\"method\": \"get\", \"url\": \"%s\", \"headers\": {\"X-Foo\": \"ISO-8859-1,utf-8;q=0.7,*;q=0.7\", \"X-Opa\": \"server\"}}, resp); x := remove_headers(resp) }`, ts.URL)}, s},\n\t\t{\"http.send custom UA\", []string{fmt.Sprintf(\n\t\t\t`p = x { http.send({\"method\": \"get\", \"url\": \"%s\", \"headers\": {\"User-Agent\": \"AuthZPolicy/0.0.1\", \"X-Opa\": \"server\"}}, resp); x := remove_headers(resp) }`, ts.URL)}, s2},\n\t}\n\n\tdata := loadSmallTestData()\n\n\tfor _, tc := range tests {\n\t\trunTopDownTestCase(t, data, tc.note, append(tc.rules, httpSendHelperRules...), tc.expected)\n\t}\n}", "title": "" }, { "docid": "1187ae9471ca376c86a149f6a7c7ad45", "score": "0.5368966", "text": "func TestHeadersAddDelete(t *testing.T) {\n\tha := Headers{\"ka\", \"va\", \"kb\", \"vb\", \"kc\", \"vc\"}\n\thb := Headers{\"kaa\", \"va\", \"kbb\", \"vb\", \"kcc\", \"vc\"}\n\thn := ha.AddHeaders(hb)\n\tif len(ha)+len(hb) != len(hn) {\n\t\tt.Fatalf(\"Unexpected length AddHeaders, got: [%v], expected: [%v]\\n\", len(hn), len(ha)+len(hb))\n\t}\n\tol := len(hn)\n\thn = hn.Delete(\"ka\")\n\tif len(hn) != ol-2 {\n\t\tt.Fatalf(\"Unexpected length Delete 1, got: [%v], expected: [%v]\\n\", len(hn), ol-2)\n\t}\n\thn = hn.Delete(\"kcc\")\n\tif len(hn) != ol-4 {\n\t\tt.Fatalf(\"Unexpected length Delete 2, got: [%v], expected: [%v]\\n\", len(hn), ol-4)\n\t}\n}", "title": "" }, { "docid": "a18dcdce20b61b81cd72705d3736f00a", "score": "0.5359574", "text": "func setStatHeader(w http.ResponseWriter, metric *MetricData) error {\n\tblob, err := json.Marshal(metric)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tw.Header().Set(\"X-Metric-Stat\", string(blob))\n\treturn nil\n}", "title": "" }, { "docid": "7c4f9fbb6db43d0881f8d9bf0f557cce", "score": "0.535708", "text": "func (m *MockApp_QueryClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "11346bbe92a6ea739139d6f3705ed36f", "score": "0.5348718", "text": "func (c *ProjectsAgentEntityTypesEntitiesBatchCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c28c432a99833f1fd01e10d09c3602dd", "score": "0.53459424", "text": "func buildHeaders(ctx context.Context, mds ...metadata.MD) http.Header {\n\tif cmd, ok := metadata.FromOutgoingContext(ctx); ok {\n\t\tmds = append(mds, cmd)\n\t}\n\tmd := metadata.Join(mds...)\n\treturn http.Header(md)\n}", "title": "" }, { "docid": "0562689afbb3dbd09b3bfa38127851a6", "score": "0.5322682", "text": "func buildHeadersCode(s *spec.Swagger, op *spec.Operation) string {\n\tvar buf bytes.Buffer\n\n\tfor _, param := range op.Parameters {\n\t\tif param.In == \"header\" {\n\t\t\tt := swagger.ParamToTemplate(&param, op)\n\t\t\tstr, err := templates.WriteTemplate(headerParamStr, t)\n\t\t\tif err != nil {\n\t\t\t\tpanic(fmt.Errorf(\"unexpected error: %s\", err))\n\t\t\t}\n\t\t\tbuf.WriteString(str)\n\t\t}\n\t}\n\n\treturn buf.String()\n}", "title": "" }, { "docid": "246d690d56001af673dda515dd54072f", "score": "0.53220546", "text": "func (m *MockCfgMgmtService_ReportExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "6f5e0a5eae5e7328ac7a919b44ba12d5", "score": "0.53037983", "text": "func setHeaders(req *http.Request, target *core.BuildTarget, env core.BuildEnv) error {\n\treq.Header.Set(\"User-Agent\", fmt.Sprintf(\"please.build/%s\", core.PleaseVersion))\n\n\tparam := func(str string) (string, string) {\n\t\tif !strings.HasPrefix(str, \"remote_file:\") {\n\t\t\treturn \"\", \"\"\n\t\t}\n\t\tstr = strings.TrimPrefix(str, \"remote_file:\")\n\t\ti := strings.IndexRune(str, ':')\n\t\treturn str[:i], str[(i + 1):]\n\t}\n\n\tuserName := \"\"\n\tpassword := \"\"\n\tfor _, l := range target.Labels {\n\t\tparam, value := param(l)\n\t\tswitch param {\n\t\tcase \"\":\n\t\t\tcontinue\n\t\tcase \"header\":\n\t\t\tk, v := header(value)\n\t\t\tv = os.Expand(v, env.ReplaceEnvironment)\n\t\t\treq.Header.Set(k, v)\n\t\tcase \"secret_header\":\n\t\t\tk, v := header(value)\n\t\t\tb, err := os.ReadFile(fs.ExpandHomePath(v))\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to read secret file: %v\", err)\n\t\t\t}\n\n\t\t\treq.Header.Set(k, string(b))\n\t\tcase \"username\":\n\t\t\tuserName = value\n\t\tcase \"password_file\":\n\t\t\tp, err := os.ReadFile(fs.ExpandHomePath(value))\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to read password file: %v\", err)\n\t\t\t}\n\t\t\tpassword = string(p)\n\t\tdefault:\n\t\t\treturn fmt.Errorf(\"unknown remote file label: %v\", l)\n\t\t}\n\t}\n\n\tif userName != \"\" || password != \"\" {\n\t\treq.SetBasicAuth(userName, password)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7544270128687bdcbb4f0086c76e781c", "score": "0.52914006", "text": "func TestPermittedHeaderRegexp(t *testing.T) {\n\t// The syntax is http-request set-header <name> <fmt>. As per this http://cbonte.github.io/haproxy-dconv/2.6/configuration.html#4.2-http-request%20add-header\n\t// the format follows the log-format rules (see Custom Log Format in section 8.2.4) i.e http://cbonte.github.io/haproxy-dconv/2.6/configuration.html#8.2.4\n\t// The usage of it shall be as per section 8.2.6\n\t// However for dynamic values, req.hdr, res.hdr, ssl_c_der are the allowed fetchers and lower, base64 are the allowed converters.\n\ttype HeaderValueTest struct {\n\t\tdescription string\n\t\tvalidInput bool\n\t\tinput string\n\t}\n\n\ttests := []HeaderValueTest{\n\t\t{description: \"empty value\", input: ``, validInput: false},\n\t\t{description: \"single character\", input: `a`, validInput: true},\n\t\t{description: \"multiple characters\", input: `abc`, validInput: true},\n\t\t{description: \"multiple words without escaped space\", input: `abc def`, validInput: true},\n\t\t{description: \"multiple words with escaped space\", input: `abc\\ def`, validInput: true},\n\t\t{description: \"multiple words each word quoted\", input: `\"abc\"\\ \"def\"`, validInput: true},\n\t\t{description: \"multiple words each word quoted and with an embedded space\", input: `\"abc \"\\ \"def \"`, validInput: true},\n\t\t{description: \"multiple words each word one double quoted and other single quoted and with an embedded space\", input: `\"abc \"\\ 'def '`, validInput: true},\n\t\t{description: \"single % character\", input: `%`, validInput: false},\n\t\t{description: \"escaped % character\", input: `%%`, validInput: true},\n\t\t{description: \"escaped % and only a % character\", input: `%%%`, validInput: false},\n\t\t{description: \"two literal % characters\", input: `%%%%`, validInput: true},\n\t\t{description: \"zero percent\", input: `%%%%%%0`, validInput: true},\n\t\t{description: \"escaped expression\", input: `%%[XYZ.hdr(Host)]\\ %[XYZ.hdr(Host)]`, validInput: true},\n\t\t{description: \"simple empty expression\", input: `%[]`, validInput: false},\n\t\t{description: \"nested empty expressions\", input: `%[%[]]`, validInput: false},\n\t\t{description: \"empty quoted value\", input: `%{+Q}`, validInput: false},\n\t\t{description: \"quoted value\", input: `%{+Q}foo`, validInput: false},\n\t\t{description: \"quoted value\", input: `%{+Q} ssl_c_der`, validInput: false},\n\t\t{description: \"valid input\", input: `{+Q}[ssl_c_der,base64]`, validInput: true},\n\t\t{description: \"valid input\", input: `%{+Q}[ssl_c_der,base64]`, validInput: true},\n\n\t\t{description: \"hdr with empty field\", input: `%[XYZ.hdr()]`, validInput: false},\n\t\t{description: \"hdr with percent field\", input: `%[XYZ.hdr(%)]`, validInput: false},\n\t\t{description: \"hdr with known field\", input: `%[XYZ.hdr(Host)]`, validInput: true},\n\t\t{description: \"hdr with syntax error\", input: `%[XYZ.hdr(Host]`, validInput: false},\n\n\t\t{description: \"hdr with valid X-XSS-Protection value\", input: `1;mode=block`, validInput: true},\n\t\t{description: \"hdr with valid Content-Type value\", input: `text/plain,text/html`, validInput: true},\n\n\t\t{description: \"incomplete expression\", input: `%[req`, validInput: false},\n\t\t{description: \"quoted field\", input: `%[XYZ.hdr(%{+Q}Host)]`, validInput: false},\n\n\t\t// If the value has \"if foo\" in it, the string \"if foo\" will be taken literally as part of the value.\n\t\t// The router will quote the entire value so that the \"if foo\" is not interpreted as a conditional.\n\t\t{description: \"value with conditional expression\", input: `%[XYZ.hdr(Host)] if foo`, validInput: true},\n\t\t{description: \"value with what looks like a conditional expression\", input: `%[XYZ.hdr(Host)]\\ if\\ foo`, validInput: true},\n\n\t\t{description: \"unsupported fetcher and converter\", input: `%[date(3600),http_date]`, validInput: false},\n\t\t{description: \"not allowed sample fetchers\", input: `%[foo,lower]`, validInput: false},\n\t\t{description: \"not allowed converters\", input: `%[req.hdr(host),foo]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `}`\", input: `%{Q[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `{`\", input: `%Q}[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `}`\", input: `%{{Q}[req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `]`\", input: `%[req.hdr(host)`, validInput: false},\n\t\t{description: \"missing parentheses or braces `[`\", input: `%req.hdr(host)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `(`\", input: `%[req.hdrhost)]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `)`\", input: `%[req.hdr(host]`, validInput: false},\n\t\t{description: \"missing parentheses or braces `)]`\", input: `%[req.hdr(host`, validInput: false},\n\t\t{description: \"missing parentheses or braces `[]`\", input: `%{req.hdr(host)}`, validInput: false},\n\t\t{description: \"parameters for a sample fetcher that doesn't take parameters\", input: `%[ssl_c_der(host)]`, validInput: false},\n\t\t{description: \"dangerous sample fetchers and converters\", input: `%[env(FOO)]`, validInput: false},\n\t\t{description: \"dangerous sample fetchers and converters\", input: `%[req.hdr(host),debug()]`, validInput: false},\n\t\t{description: \"extra comma\", input: `%[req.hdr(host),,lower]`, validInput: false},\n\n\t\t// CR and LF are not allowed in header value as per RFC https://datatracker.ietf.org/doc/html/rfc7230#section-3.2.4\n\t\t{description: \"carriage return\", input: \"\\r\", validInput: false},\n\t\t{description: \"CRLF\", input: \"\\r\\n\", validInput: false},\n\n\t\t// HAProxy does not interpret ${} syntax, so it is safe to have ${ in the value; it will be taken\n\t\t// literally as part of the header value.\n\t\t{description: \"environment variable with a bracket missing\", input: `${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\t\t{description: \"value with conditional expression and env var\", input: `%[XYZ.hdr(Host)] if ${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\t\t{description: \"value with what looks like a conditional expression and env var\", input: `%[XYZ.hdr(Host)]\\ if\\ ${NET_COOLOCP_HOSTPRIMARY`, validInput: true},\n\n\t\t{description: \"sample value\", input: `%ci:%cp [%tr] %ft %ac/%fc %[fc_err]/%[ssl_fc_err,hex]/%[ssl_c_err]/%[ssl_c_ca_err]/%[ssl_fc_is_resumed] %[ssl_fc_sni]/%sslv/%sslc`, validInput: false},\n\t\t{description: \"interpolation of T i.e %T\", input: `%T`, validInput: false},\n\n\t\t// url\n\t\t// regex does not check validity of url in a header value.\n\t\t{description: \"hdr with url\", input: `http:??//url/hack`, validInput: true},\n\n\t\t// spaces and tab\n\t\t// regex allows spaces before and after. The reason is that after a dynamic value is provided someone might provide a condition `%[XYZ.hdr(Host)] if foo` which would have\n\t\t// spaces after the dynamic value and if condition.\n\t\t// tab is rejected as control characters are not allowed by the regex.\n\t\t{description: \"space before and after the value\", input: ` T `, validInput: true},\n\t\t{description: \"double space before and after the value\", input: ` T `, validInput: true},\n\t\t{description: \"tab before and after the value\", input: \"\\tT\\t\", validInput: false},\n\t}\n\n\tvar requestTypes = []struct {\n\t\tdescription string\n\t\tregexp *regexp.Regexp\n\t\ttestInputSubstituter func(s string) string\n\t}{{\n\t\tdescription: \"request\",\n\t\tregexp: permittedRequestHeaderValueRE,\n\t\ttestInputSubstituter: func(s string) string { return strings.ReplaceAll(s, \"XYZ\", \"req\") },\n\t}, {\n\t\tdescription: \"response\",\n\t\tregexp: permittedResponseHeaderValueRE,\n\t\ttestInputSubstituter: func(s string) string { return strings.ReplaceAll(s, \"XYZ\", \"res\") },\n\t}}\n\n\tfor _, rt := range requestTypes {\n\t\tt.Run(rt.description, func(t *testing.T) {\n\t\t\tfor _, tc := range tests {\n\t\t\t\tt.Run(tc.description, func(t *testing.T) {\n\t\t\t\t\tinput := rt.testInputSubstituter(tc.input)\n\t\t\t\t\tif got := rt.regexp.MatchString(input); got != tc.validInput {\n\t\t\t\t\t\tt.Errorf(\"%q: expected %v, got %t\", input, tc.validInput, got)\n\t\t\t\t\t}\n\t\t\t\t})\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "312e8ae7ccc5af1482bbcbe0f25ecf29", "score": "0.52860105", "text": "func (m *MockRuntime_SubscribeConfigurationClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "4f434e0b739c72b1d98480f749dfde7f", "score": "0.52858603", "text": "func (va *Validator) GenerateHeader() base.HeaderValue {\n\tvar ret base.HeaderValue\n\tfor _, m := range va.methods {\n\t\tswitch m {\n\t\tcase headers.AuthBasic:\n\t\t\tret = append(ret, (&headers.Auth{\n\t\t\t\tMethod: headers.AuthBasic,\n\t\t\t\tRealm: &va.realm,\n\t\t\t}).Write()...)\n\n\t\tcase headers.AuthDigest:\n\t\t\tret = append(ret, headers.Auth{\n\t\t\t\tMethod: headers.AuthDigest,\n\t\t\t\tRealm: &va.realm,\n\t\t\t\tNonce: &va.nonce,\n\t\t\t}.Write()...)\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "c3091418af7ddc68b216e0ebefe9d585", "score": "0.52829343", "text": "func (m *MockCfgMgmtService_NodeExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "eadc8140295cf4dbaa8ad13ebfbae54e", "score": "0.5281159", "text": "func TestResponseSetHeader(t *testing.T) {\n\tfakeService := httpfake.New()\n\tdefer fakeService.Server.Close()\n\n\t// register a handler for our fake service\n\tfakeService.NewHandler().\n\t\tGet(\"/users\").\n\t\tReply(200).\n\t\tSetHeader(\"X-My-Header\", \"My Header value\").\n\t\tBodyString(\"[]\")\n\n\treq, err := http.NewRequest(\"GET\", fakeService.ResolveURL(\"/users\"), nil)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tres, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer res.Body.Close() // nolint errcheck\n\n\t// Check the status code is what we expect\n\tif status := res.StatusCode; status != 200 {\n\t\tt.Errorf(\"request returned wrong status code: got %v want %v\",\n\t\t\tstatus, 200)\n\t}\n\n\t// Check the response body is what we expect\n\texpected := \"[]\"\n\tbody, _ := ioutil.ReadAll(res.Body)\n\tif bodyString := string(body); bodyString != expected {\n\t\tt.Errorf(\"request returned unexpected body: got %v want %v\",\n\t\t\tbodyString, expected)\n\t}\n\n\t// Check the response header is what we expect\n\texpected = \"My Header value\"\n\tif header := res.Header.Get(\"X-My-Header\"); header != expected {\n\t\tt.Errorf(\"request returned unexpected value for header X-My-Header: got %v want %v\",\n\t\t\theader, expected)\n\t}\n}", "title": "" }, { "docid": "89ca4713db88b6f66045d84383c03db6", "score": "0.52807254", "text": "func testBatchWebAddenda(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\t// mock batch already has one addenda. Creating two addenda should error\n\tmockBatch.GetEntries()[0].AddAddenda05(mockAddenda05())\n\terr := mockBatch.Create()\n\tif !base.Match(err, NewErrBatchAddendaCount(2, 1)) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "af4f452d36cd754acc49648ac0690c44", "score": "0.52765507", "text": "func (m *MockRuntime_GetFileClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "502946ced1e9677dc84c5c5859adaed2", "score": "0.5276129", "text": "func (m *MockEventFeedService_EventExportClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d124e20042fa5a68fb41248ba61027cd", "score": "0.52756697", "text": "func TestBatchWEBCategoryReturn(t *testing.T) {\n\tmockBatch := NewBatchWEB(mockBatchWEBHeader())\n\tmockBatch.AddEntry(mockWEBEntryDetail())\n\tmockAddenda05 := mockAddenda05()\n\tmockBatch.GetEntries()[0].Category = CategoryReturn\n\tmockBatch.GetEntries()[0].AddendaRecordIndicator = 1\n\tmockBatch.GetEntries()[0].AddAddenda05(mockAddenda05)\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrBatchAddendaCategory) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "7eefb1352da7ca851d33bba7cee015f8", "score": "0.5269591", "text": "func (m *MockRuntime_PutFileClient) Header() (metadata.MD, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "b0e2a4e3fe7f14f79dd3a726f13008a3", "score": "0.5259665", "text": "func makeHTTPAttachHeader(stream byte, length uint32) []byte {\n\theader := make([]byte, 8)\n\theader[0] = stream\n\tbinary.BigEndian.PutUint32(header[4:], length)\n\treturn header\n}", "title": "" }, { "docid": "c883b8e8d33b0e461ae7ef99932f93b7", "score": "0.5251884", "text": "func Header(req events.APIGatewayProxyRequest, name string) string {\n\tfor k, v := range req.Headers {\n\t\tif strings.ToLower(k) == strings.ToLower(name) {\n\t\t\treturn v\n\t\t}\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "f16fe1e5cbb0afa8b821019f7c7fb79a", "score": "0.52474385", "text": "func (c *ProjectsLocationsTensorboardsExperimentsRunsTimeSeriesBatchReadCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9a98211342d355e848e3596e8a3a5b73", "score": "0.52463365", "text": "func TestHeadersBasic(t *testing.T) {\n\tk := \"keya\"\n\tv := \"valuea\"\n\th := Headers{k, v}\n\tif nil != h.Validate() {\n\t\tt.Fatalf(\"Header validate error: [%v]\\n\", h.Validate())\n\t}\n\tif len(h) != 2 {\n\t\tt.Fatalf(\"Header Unexpected length error 1, length: [%v]\\n\", len(h))\n\t}\n\th = h.Add(\"keyb\", \"valueb\").Add(\"keya\", \"valuea2\")\n\tif len(h) != 6 {\n\t\tt.Fatalf(\"Header Unexpected length error 2, length after add: [%v]\\n\", len(h))\n\t}\n\tif _, ok := h.Contains(k); !ok {\n\t\tt.Fatalf(\"Header Unexpected false for key: [%v]\\n\", k)\n\t}\n\tk = \"xyz\"\n\tif _, ok := h.Contains(k); ok {\n\t\tt.Fatalf(\"Header Unexpected true for key: [%v]\\n\", k)\n\t}\n\t//\n\th = Headers{k}\n\tif e := h.Validate(); e != EHDRLEN {\n\t\tt.Fatalf(\"Header Validate, got [%v], expected [%v]\\n\", e, EHDRLEN)\n\t}\n}", "title": "" }, { "docid": "114f70c041ea866539ed3df54d17ba59", "score": "0.52463305", "text": "func ExampleHeader_bug() {\n\tl := src.Header(\"Title\", []string{\"Line 1\", \"Line 2\"})\n\tfmt.Printf(l)\n\t// Output: <h1>Title</h1>\n\n\t// Line 1\n\t// Line 2\n}", "title": "" }, { "docid": "c5ad00a314f277907c3af0445326e8ed", "score": "0.5232532", "text": "func startSpanFromHeader(header http.Header, operateName string) opentracing.Span {\n\tvar span opentracing.Span\n\twireContext, _ := opentracing.GlobalTracer().Extract(\n\t\topentracing.HTTPHeaders,\n\t\topentracing.HTTPHeadersCarrier(header))\n\tspan = opentracing.StartSpan(\n\t\toperateName,\n\t\t//ext.RPCServerOption(wireContext),\n\t\topentracing.ChildOf(wireContext),\n\t)\n\treturn span\n}", "title": "" }, { "docid": "02575de01185a3fd6d5b78d82c99363d", "score": "0.5228361", "text": "func TestGetDeviceHeaders(t *testing.T) {\n\tframework := New(\"./fixtures/\")\n\theaders := strings.TrimSpace(framework.GetDeviceHeaders(getGenericDevice1Config()))\n\n\tif headers != \"\" {\n\t\tt.Error(\"The device headers are not empty. It contains: \" + headers)\n\t}\n}", "title": "" }, { "docid": "70e0200d9e147d2426e140f0495c24e5", "score": "0.5226159", "text": "func TestParseHeaders(t *testing.T) {\n\ttests := []struct {\n\t\tdesc string\n\t\tin []string\n\t\tout []Header\n\t\terr string\n\t}{\n\t\t{\n\t\t\tdesc: \"parse multiple headers\",\n\t\t\tin: []string{\n\t\t\t\t\"Host: example.com \",\n\t\t\t\t\"X-Teleport-Logins: root, {{internal.logins}}\",\n\t\t\t\t\"X-Env : {{external.env}}\",\n\t\t\t\t\"X-Env: env:prod\",\n\t\t\t\t\"X-Empty:\",\n\t\t\t},\n\t\t\tout: []Header{\n\t\t\t\t{Name: \"Host\", Value: \"example.com\"},\n\t\t\t\t{Name: \"X-Teleport-Logins\", Value: \"root, {{internal.logins}}\"},\n\t\t\t\t{Name: \"X-Env\", Value: \"{{external.env}}\"},\n\t\t\t\t{Name: \"X-Env\", Value: \"env:prod\"},\n\t\t\t\t{Name: \"X-Empty\", Value: \"\"},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header format (missing value)\",\n\t\t\tin: []string{\"X-Header\"},\n\t\t\terr: `failed to parse \"X-Header\" as http header`,\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header name (empty)\",\n\t\t\tin: []string{\": missing\"},\n\t\t\terr: `invalid http header name: \": missing\"`,\n\t\t},\n\t\t{\n\t\t\tdesc: \"invalid header name (space)\",\n\t\t\tin: []string{\"X Space: space\"},\n\t\t\terr: `invalid http header name: \"X Space: space\"`,\n\t\t},\n\t}\n\tfor _, test := range tests {\n\t\tt.Run(test.desc, func(t *testing.T) {\n\t\t\tout, err := ParseHeaders(test.in)\n\t\t\tif test.err != \"\" {\n\t\t\t\trequire.EqualError(t, err, test.err)\n\t\t\t} else {\n\t\t\t\trequire.NoError(t, err)\n\t\t\t\trequire.Equal(t, test.out, out)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "c29d172559b3e6e29e1efeb4a976b32c", "score": "0.5217852", "text": "func genHeader(wr io.Writer) {\n\tconst text = `/*\nCopyright {{.Year}} The Kubernetes Authors.\n\nLicensed under the Apache License, Version 2.0 (the \"License\");\nyou may not use this file except in compliance with the License.\nYou may obtain a copy of the License at\n\n http://www.apache.org/licenses/LICENSE-2.0\n\nUnless required by applicable law or agreed to in writing, software\ndistributed under the License is distributed on an \"AS IS\" BASIS,\nWITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.\nSee the License for the specific language governing permissions and\nlimitations under the License.\n*/\n\n// This file was generated by \"go run gen/main.go > gen.go\". Do not edit\n// directly.\n\npackage cloud\n\nimport (\n\t\"context\"\n\t\"fmt\"\n\t\"net/http\"\n\t\"sync\"\n\n\t\"google.golang.org/api/googleapi\"\n\t\"github.com/golang/glog\"\n\n\t\"{{.PackageRoot}}/filter\"\n\t\"{{.PackageRoot}}/meta\"\n\n`\n\ttmpl := template.Must(template.New(\"header\").Parse(text))\n\tvalues := map[string]string{\n\t\t\"Year\": fmt.Sprintf(\"%v\", time.Now().Year()),\n\t\t\"PackageRoot\": packageRoot,\n\t}\n\tif err := tmpl.Execute(wr, values); err != nil {\n\t\tpanic(err)\n\t}\n\n\tvar hasGA, hasAlpha, hasBeta bool\n\tfor _, s := range meta.AllServices {\n\t\tswitch s.Version() {\n\t\tcase meta.VersionGA:\n\t\t\thasGA = true\n\t\tcase meta.VersionAlpha:\n\t\t\thasAlpha = true\n\t\tcase meta.VersionBeta:\n\t\t\thasBeta = true\n\t\t}\n\t}\n\tif hasAlpha {\n\t\tfmt.Fprintln(wr, `\talpha \"google.golang.org/api/compute/v0.alpha\"`)\n\t}\n\tif hasBeta {\n\t\tfmt.Fprintln(wr, `\tbeta \"google.golang.org/api/compute/v0.beta\"`)\n\t}\n\tif hasGA {\n\t\tfmt.Fprintln(wr, `\tga \"google.golang.org/api/compute/v1\"`)\n\t}\n\tfmt.Fprintf(wr, \")\\n\\n\")\n}", "title": "" }, { "docid": "8781e19a1d626989dbcce7a3db63211d", "score": "0.52082455", "text": "func (c *ProjectsDlpJobsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d6fd988592452a96f06c9142abdc3df2", "score": "0.5205181", "text": "func testBatchWebPaymentType(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\tmockBatch.GetEntries()[0].DiscretionaryData = \"AA\"\n\terr := mockBatch.Validate()\n\t// TODO: are we expecting there to be no errors here?\n\tif !base.Match(err, nil) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "5866b494bdbcf90d8141022d12378987", "score": "0.52018005", "text": "func Header(h http.Header) Command {\n\treturn CommandFunc(func(f *Fetcher) error {\n\t\tMergeHeader(f.Header, h)\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "0e0c91151bd6e7d93f79a897705ca87b", "score": "0.5200854", "text": "func (c *ProjectsLocationsTensorboardsExperimentsRunsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "00a5c227a61c142603ee153203a53a51", "score": "0.5200262", "text": "func (c *ProjectsLocationsSpecialistPoolsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "3fee0d46a0d96c0dd02b021d46414bf4", "score": "0.51866555", "text": "func (c *ProjectsLocationsTensorboardsExperimentsRunsTimeSeriesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "42ccc1f621a897d5938326e18b699649", "score": "0.5183441", "text": "func TestHeadersRegexMatchingMock(t *testing.T) {\n\tfor _, method := range e2e_helpers.SupportedHTTPMethods {\n\t\trandomString := go_mock_yourself_helpers.RandomString\n\n\t\t//\n\t\t// Generate random HTTP Headers\n\t\t//\n\n\t\theaders := make(map[string]string)\n\t\theaders[randomString(100)] = randomString(100)\n\t\theaders[randomString(100)] = randomString(100)\n\n\t\t//\n\t\t// Generate URL Matching Mock\n\t\t//\n\n\t\tmock := e2e_helpers.CreateMock(nil, nil, headers, nil)\n\n\t\t//\n\t\t// Generate HTTP request matching just generated mock\n\t\t//\n\n\t\trequest := e2e_helpers.CreateHTTPRequest(method, \"/my-bogus-url\", headers, \"\")\n\n\t\t//\n\t\t// Ensure Mock matches HTTP Request\n\t\t//\n\n\t\tmockShouldMatch(t, request, mock)\n\t}\n}", "title": "" }, { "docid": "20da00e16008077a06ed31b813f673e1", "score": "0.5179378", "text": "func testBatchRCKHeader(t testing.TB) {\n\tbatch, _ := NewBatch(mockBatchRCKHeader())\n\terr, ok := batch.(*BatchRCK)\n\tif !ok {\n\t\tt.Errorf(\"Expecting BatchRCK got %T\", err)\n\t}\n}", "title": "" }, { "docid": "801200200fe83a14e4f4683f8fa1b574", "score": "0.5176813", "text": "func (c *ProjectsLocationsFeaturestoresEntityTypesFeaturesBatchCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e6dc9b42d2d5eede9c5efbc08de82a1f", "score": "0.5167748", "text": "func Test_getExtendHeader(t *testing.T) {\n\t//Testcases\n\ttests := []struct {\n\t\tname string\n\t\ttest testHeaderYamlGenerator\n\t\twant http.Header\n\t}{\n\t\t//Positive Testcase with proper input provided\n\t\t{\"Test_getExtendHeader1: Proper Input \",\n\t\t\ttestHeaderYamlGenerator{\n\t\t\t\textendHeaderConfigYaml{\n\t\t\t\t\tArch: \"x86\",\n\t\t\t\t\tDockerRootDir: \"/usr\",\n\t\t\t\t}},\n\t\t\thttp.Header{\n\t\t\t\t\"Arch\": []string{\"x86\"},\n\t\t\t\t\"Dockerrootdir\": []string{\"/usr\"},\n\t\t\t}},\n\n\t\t//Positive Testcase with only architecture input provided\n\t\t{\"Test_getExtendHeader2: Only Arch provided\",\n\t\t\ttestHeaderYamlGenerator{\n\t\t\t\textendHeaderConfigYaml{\n\t\t\t\t\tArch: \"x86\",\n\t\t\t\t}},\n\t\t\thttp.Header{\n\t\t\t\t\"Arch\": []string{\"x86\"},\n\t\t\t}},\n\n\t\t//Positive Testcase with only docker root directory input provided\n\t\t{\"Test_getExtendHeader3: Only Docker root directory provided\",\n\t\t\ttestHeaderYamlGenerator{\n\t\t\t\textendHeaderConfigYaml{\n\t\t\t\t\tDockerRootDir: \"/usr\",\n\t\t\t\t}},\n\t\t\thttp.Header{\n\t\t\t\t\"Dockerrootdir\": []string{\"/usr\"},\n\t\t\t}},\n\t}\n\tfor _, tt := range tests {\n\t\tt.Run(tt.name, func(t *testing.T) {\n\t\t\terr := util.GenerateTestYaml(tt.test, \"/tmp/kubeedge/testData\", \"edge\")\n\t\t\tif err != nil {\n\t\t\t\tt.Error(\"Unable to generate test YAML file: \", err)\n\t\t\t}\n\t\t\terr = util.LoadConfig(\"/tmp/kubeedge/testData\")\n\t\t\tif err != nil {\n\t\t\t\tt.Error(\"Unable to load the configuration file \", err)\n\t\t\t}\n\t\t\terr = os.RemoveAll(\"/tmp/kubeedge\")\n\t\t\tif err != nil {\n\t\t\t\tt.Error(\"Unable to delete the temporary directory: \", err)\n\t\t\t}\n\t\t\tif got := getExtendHeader(); !reflect.DeepEqual(got, tt.want) {\n\t\t\t\tt.Errorf(\"getExtendHeader() = %v, want %v\", got, tt.want)\n\t\t\t}\n\t\t})\n\t}\n}", "title": "" }, { "docid": "1e63c188cae31037163343920be7c14e", "score": "0.5162267", "text": "func (engine *ScriptEngine) setReqHeader(call otto.FunctionCall) otto.Value {\n\theaderName, _ := call.Argument(0).ToString()\n\theaderValue, _ := call.Argument(1).ToString()\n\tif engine.Request != nil {\n\t\tengine.Request.Header.Set(headerName, headerValue)\n\t} else {\n\t\tengine.EndpointConfig.Headers[headerName] = []string{headerValue}\n\t}\n\treturn otto.Value{}\n}", "title": "" }, { "docid": "021ebc1f45fb7b768123d57d9a9efe66", "score": "0.5159676", "text": "func TestBatchWEBAddendum98(t *testing.T) {\n\tmockBatch := NewBatchWEB(mockBatchWEBHeader())\n\tmockBatch.AddEntry(mockWEBEntryDetail())\n\tmockAddenda98 := mockAddenda98()\n\tmockAddenda98.TypeCode = \"05\"\n\tmockBatch.GetEntries()[0].Category = CategoryNOC\n\tmockBatch.GetEntries()[0].Addenda98 = mockAddenda98\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrAddendaTypeCode) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "ce8933bc2b6502128f75e59c87d48c12", "score": "0.51594865", "text": "func testBatchARCStandardEntryClassCode(t testing.TB) {\n\tmockBatch := mockBatchARC(t)\n\tmockBatch.Header.StandardEntryClassCode = WEB\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrBatchSECType) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "a34c0a3b1e73f7fb0ea3d00eea73e89b", "score": "0.5152173", "text": "func generateHeaders(user *User) []Header {\n\treturn []Header{\n\t\tcsrfHeader(user.getCSRFToken()),\n\t\trefererHeader(path.Home + \"/\"),\n\t\txRequestedWithHeader,\n\t\tacceptHeader,\n\t}\n}", "title": "" }, { "docid": "2db4592acafeaeab3705b3556ecc93d9", "score": "0.51513076", "text": "func (c *RmasListCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4f5632ba41aa1bc213251f68ea10d542", "score": "0.5147063", "text": "func TestGetHeader(t *testing.T) {\n\thttpRequest, _ := http.NewRequest(\"GET\", \"/\", nil)\n\thttpRequest.Header.Set(\"X-Test-Header\", \"yes\")\n\n\trequest := NewRequest(httpRequest)\n\n\tif request.GetHeader(\"X-Test-Header\") != \"yes\" {\n\t\tt.Fail()\n\t}\n}", "title": "" }, { "docid": "9535ce2f92b0ff05df7600074c7d85d8", "score": "0.5143429", "text": "func (c *ProjectsLocationsTrainingPipelinesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "06b0f9e7a40e924c66c21395aa4e19f3", "score": "0.5141392", "text": "func makeReq(url string, headername string, headervalue string) models.FullResp {\n\tclient := &http.Client{}\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\t// req.Header.Add(headername, \"2833\")\n\treq.Header.Add(headername, headervalue)\n\tresp, err := client.Do(req)\n\n\tif err != nil {\n\t\tfmt.Printf(\"the Request failed with error %s \\n\", err)\n\t}\n\tdefer resp.Body.Close()\n\n\tdata, _ := ioutil.ReadAll(resp.Body)\n\tvar response models.FullResp\n\tegg := string(data)\n\n\tbytes := []byte(egg)\n\terr = json.Unmarshal(bytes, &response)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// buses := response.Buses\n\treturn response\n}", "title": "" }, { "docid": "83db1d113b3dc8b8078b24434d491f52", "score": "0.5140116", "text": "func TestSetResponseHeadersAddsGivenHeaderWhenAlreadySet(t *testing.T) {\n\thw := httptest.NewRecorder()\n\thw.Header()[\"bar\"] = []string{\"BAZ\"}\n\th := model.Handler{\n\t\tRequest: httptest.NewRequest(\"POST\", \"/\", nil),\n\t\tWriter: hw,\n\t}\n\tr := createMuxRequest(\"/handlers/HANDLERID/response/headers/{name}\", \"/handlers/HANDLERID/response/headers/bar\", \"PUT\", strings.NewReader(\"QUX\"))\n\tw := httptest.NewRecorder()\n\n\tsetResponseHeaders(w, r, &h)\n\n\tres := hw.Result()\n\t// nolint\n\tif values, ok := res.Header[\"bar\"]; !ok || !reflect.DeepEqual(values, []string{\"BAZ\", \"QUX\"}) {\n\t\tt.Errorf(`Header mismatch. Expected [\"BAZ\", \"QUX\"]. Contents %v`, res.Header)\n\t}\n}", "title": "" }, { "docid": "84e6aafdb428def552cc3cc2dc5153b3", "score": "0.51354545", "text": "func TestMinerHeader(t *testing.T) {\n\tif testing.Short() {\n\t\tt.SkipNow()\n\t}\n\tt.Parallel()\n\tst, err := createServerTester(t.Name())\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer st.server.panicClose()\n\tstartingHeight := st.cs.Height()\n\n\t// Get a header that can be used for mining.\n\tresp, err := HttpGET(\"http://\" + st.server.listener.Addr().String() + \"/miner/header\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer resp.Body.Close()\n\ttargetAndHeader, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// Twiddle the header bits until a block has been found.\n\t//\n\t// Note: this test treats the target as hardcoded, if the testing target is\n\t// changed, this test will also need to be changed.\n\tif types.RootTarget[0] != 128 {\n\t\tt.Fatal(\"test will fail because the testing constants have been unexpectedly changed\")\n\t}\n\tvar header [80]byte\n\tcopy(header[:], targetAndHeader[32:])\n\theaderHash := crypto.HashObject(header)\n\tfor headerHash[0] >= types.RootTarget[0] {\n\t\theader[35]++\n\t\theaderHash = crypto.HashObject(header)\n\t}\n\n\t// Submit the solved header through the api and check that the height of\n\t// the blockchain increases.\n\tresp, err = HttpPOST(\"http://\"+st.server.listener.Addr().String()+\"/miner/header\", string(header[:]))\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer resp.Body.Close()\n\ttime.Sleep(500 * time.Millisecond)\n\tif st.cs.Height() != startingHeight+1 {\n\t\tt.Errorf(\"block height did not increase after trying to mine a block through the api, started at %v and ended at %v\", startingHeight, st.cs.Height())\n\t}\n}", "title": "" }, { "docid": "0ca1be575238d6e689ed48fb0ac55935", "score": "0.51284397", "text": "func (c *OpportunitiesPitchesBatchCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b17bbea12c9ef1179e555d46e0141d55", "score": "0.5116461", "text": "func mockHeader() *BlockHeader {\n\treturn &BlockHeader{\n\t\tChainID: mockHash(),\n\t\tVersion: 1,\n\t\tHeight: rand.Uint64(),\n\t\tTimestamp: time.Unix(rand.Int63(), 0),\n\t\tPrevious: mockHash(),\n\t\tTransactionRoot: mockHash(),\n\t\tWitnessRoot: mockHash(),\n\t\tProposalRoot: mockHash(),\n\t\tTarget: mockBigInt(),\n\t\tChallenge: mockHash(),\n\t\tPubKey: mockPublicKey(),\n\t\tProof: &poc.Proof{\n\t\t\tX: mockLenBytes(3),\n\t\t\tXPrime: mockLenBytes(3),\n\t\t\tBitLength: rand.Intn(20)*2 + 20,\n\t\t},\n\t\tSignature: mockSignature(),\n\t\tBanList: make([]*pocec.PublicKey, 0),\n\t}\n}", "title": "" }, { "docid": "323307c2f8705b78510f306caa49610e", "score": "0.51146567", "text": "func testBatchWEBAddendaTypeCode(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\tmockBatch.GetEntries()[0].AddAddenda05(mockAddenda05())\n\tmockBatch.GetEntries()[0].Addenda05[0].TypeCode = \"02\"\n\terr := mockBatch.Validate()\n\tif !base.Match(err, ErrAddendaTypeCode) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "6b52793f45a3cbbbc8223522d31a386c", "score": "0.5114317", "text": "func (c *EditsTestersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e11161632a1c560de1d09ab76de9c37b", "score": "0.5111063", "text": "func (m *MockNode_AttestClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "ee60dd0f80ccbad1ed31a74c10a349bc", "score": "0.51051635", "text": "func (m *MockNode_FetchX509SVIDClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "6c992512f37771fe609ff864ee20176a", "score": "0.5105058", "text": "func (m *MockHello_DuplexstreamClient) Header() (metadata.MD, error) {\n\tret := m.ctrl.Call(m, \"Header\")\n\tret0, _ := ret[0].(metadata.MD)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d475ca3340933a27c21d619f68ad0a16", "score": "0.5104582", "text": "func TestAPIMiddlewareInvalidHeader(t *testing.T) {\n\trw := new(responseWriterMock)\n\trequest, _ := http.NewRequest(\"GET\", \"/api/v1/foo\", nil)\n\trequest.Header.Set(\"Authorization\", \"NotSupported token123\")\n\trw.On(\"Write\", []byte(\"invalid authorization header\")).Once()\n\trw.On(\"WriteHeader\", 401).Once()\n\n\tAPIMiddleware(rw, request, http.HandlerFunc(mockHTTPHandler))\n\n\trw.AssertExpectations(t)\n}", "title": "" }, { "docid": "3fbf0fe3b9a093830817f13df86b4369", "score": "0.51040006", "text": "func (c *ProjectsLocationsPipelineJobsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "664af48fe914869637634c80e25a692e", "score": "0.50989264", "text": "func (c *InspectOperationsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" } ]
be6f80dd192e56b16fe875bbe7f2c5b4
AddRoute registers a route. See `Router.AddRouteUnsafe`.
[ { "docid": "fcac57b09c4b1ceeea061277b3899379", "score": "0.76494086", "text": "func (h *routerHandler) AddRoute(r *Route) error {\n\tvar (\n\t\tmethod = r.Method\n\t\tstatusCode = r.StatusCode\n\t\tsubdomain = r.Subdomain\n\t\tpath = r.Path\n\t\thandlers = r.Handlers\n\t)\n\n\tt := h.getTree(statusCode, method, subdomain)\n\n\tif t == nil {\n\t\tn := newTrieNode()\n\t\t// first time we register a route to this method with this subdomain\n\t\tt = &trie{statusCode: statusCode, method: method, subdomain: subdomain, root: n}\n\t\tif statusCode > 0 {\n\t\t\th.errorTrees = append(h.errorTrees, t)\n\t\t} else {\n\t\t\th.trees = append(h.trees, t)\n\t\t}\n\t}\n\n\tt.insert(path, r.ReadOnly, handlers)\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "4d81792df18aa94aa41b8a6504520df5", "score": "0.79910654", "text": "func (router *Router) AddRoute(route Route) *Router {\n\tlog.Printf(\"Registering route %-25s: %10s %s\\n\", route.Name, route.Method, route.Path)\n\trouter.mux.\n\t\tPath(route.Path).\n\t\tHandlerFunc(route.Handler).\n\t\tMethods(route.Method).\n\t\tName(route.Name)\n\treturn router\n}", "title": "" }, { "docid": "ee3721c13f886a1c2c09b12c389e3625", "score": "0.79642296", "text": "func (app GoApp) AddRoute(method string, route string, handler GoAppHandlerFunc) {\n\tapp.router.AddRoute(method, route, handler)\n}", "title": "" }, { "docid": "d333cde7e6da727b6d5efb062f33eef9", "score": "0.79102933", "text": "func (rtr *router) AddRoute(path string, h *SideHandlers) SideRouter {\n\tif rtr.sealed {\n\t\tpanic(\"router sealed; cannot add route handler\")\n\t}\n\n\tif rtr.HasRoute(path) {\n\t\tpanic(fmt.Sprintf(\"route %s has already been initialized\", path))\n\t}\n\n\trtr.routes[path] = h\n\treturn rtr\n}", "title": "" }, { "docid": "1ecb3f6ed76726cb74b894087c3fd653", "score": "0.78493905", "text": "func (s *server) AddRoute(route route.Route) error {\n\tvar handler http.Handler\n\n\thandler = route.HandlerFunc()\n\thandler = logging.Logger(handler, route.Name())\n\n\ts.router.\n\t\tMethods(route.Method()).\n\t\tPath(route.Path()).\n\t\tName(route.Name()).\n\t\tHandler(handler)\n\n\treturn nil\n}", "title": "" }, { "docid": "3e9008a8b974fa68341216731d86d9d3", "score": "0.78407204", "text": "func (router *Router) AddRoute(route *Route) error {\n\tmethod := route.Method\n\tif method == \"\" {\n\t\treturn errors.New(\"Route is missing method\")\n\t}\n\tmethod = strings.ToUpper(method)\n\tpath := route.Path\n\tif path == \"\" {\n\t\treturn errors.New(\"Route is missing path\")\n\t}\n\treturn router.node().Add(method+\" \"+path, router, nil)\n}", "title": "" }, { "docid": "33589eaf5c041a0488b3b5e335cacb40", "score": "0.7776444", "text": "func (s *DeviceService) AddRoute(route string, handler func(http.ResponseWriter, *http.Request), methods ...string) error {\n\treturn s.controller.AddRoute(route, handler, methods...)\n}", "title": "" }, { "docid": "8a3057d85c36d9f2903cd204766ac212", "score": "0.7754934", "text": "func (r *Router) AddRoute(route *Route) {\n\tr.routes = append(r.routes, route)\n}", "title": "" }, { "docid": "424575b27db232d341c8066cd05394a1", "score": "0.77172816", "text": "func (c *Controller) AddRoute(path, method string, fn HTTPFunc) {\n\tif c.Router == nil {\n\t\tc.Router = mux.NewRouter()\n\t}\n\tc.Router.HandleFunc(path, fn).Methods(method)\n}", "title": "" }, { "docid": "2d640a876fa61cdfedc39cfd230bc412", "score": "0.7670338", "text": "func (r *Router) AddRoute(opts ...RouteOptFn) *Route {\n\tr.rw.Lock()\n\tdefer r.rw.Unlock()\n\n\tn := newRoute(opts...)\n\tr.routes = append(r.routes, n)\n\treturn n\n}", "title": "" }, { "docid": "8a0979ca63f45bb6f2a72f32fd476fb2", "score": "0.76684946", "text": "func (local *Node) AddRoute(node RemoteNode) (err error) {\n\t// TODO: students should implement this\n\treturn\n}", "title": "" }, { "docid": "d9ff912f9902e80a4f2a1e5723c3b2d4", "score": "0.7646307", "text": "func (d *Domain) AddRoute(route *Route) error {\n\tif ess.IsStrEmpty(route.Method) {\n\t\treturn errors.New(\"router: method value is empty\")\n\t}\n\n\tt := d.trees[route.Method]\n\tif t == nil {\n\t\tt = &tree{root: new(node), tralingSlash: d.RedirectTrailingSlash}\n\t\td.trees[route.Method] = t\n\t}\n\n\tif err := t.add(route.Path, route); err != nil {\n\t\treturn err\n\t}\n\n\td.routes[route.Name] = route\n\treturn nil\n}", "title": "" }, { "docid": "8f017ff49b8f31ec6eef390d4e4bd328", "score": "0.7608868", "text": "func (manager *RouteManager) AddRoute(route *Route) {\n\tmanager.routes = append(manager.routes, route)\n}", "title": "" }, { "docid": "89bd487cbcd697fb8391ab3c5e1415cd", "score": "0.7599047", "text": "func (d *DefaultHTTPDriver) AddRoute(methods []string, path string, handler http.HandlerFunc) error {\n\td.router.Methods(methods...).Path(path).HandlerFunc(handler)\n\treturn nil\n}", "title": "" }, { "docid": "6349ce7fe40c41133a3a8f6a59a8b5e8", "score": "0.7571825", "text": "func (s *Server) AddRoute(method string, path interface{}, hs []HandlerFunc) {\n\tswitch path.(type) {\n\tcase string:\n\t\ts.routes.pathMatchers = append(s.routes.pathMatchers, makeStringMatcher(path.(string)))\n\t\ts.routes.handlerFuncs = append(s.routes.handlerFuncs, hs)\n\t\ts.routes.methods = append(s.routes.methods, method)\n\tdefault:\n\t\ts.Log.Critical(\"Unknown path type %v\", path)\n\t}\n}", "title": "" }, { "docid": "c04ed6c7b4740db9f959bab2f1e5bf15", "score": "0.75688666", "text": "func (app *App) AddRoute(\n\tserverType string,\n\troutingFunction router.RoutingFunc,\n) error {\n\tif app.router != nil {\n\t\tif app.running {\n\t\t\treturn constants.ErrChangeRouteWhileRunning\n\t\t}\n\t\tapp.router.AddRoute(serverType, routingFunction)\n\t} else {\n\t\treturn constants.ErrRouterNotInitialized\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d059c839bb140f57d9007d342e2862c5", "score": "0.75503343", "text": "func (r *Router) AddRoute(name string, route IRoute) {\n\tr.routes[name] = route\n}", "title": "" }, { "docid": "30d161634186f81267b642ede20b502f", "score": "0.7543652", "text": "func AddRoute(destination, gateway net.IP, mask net.IPMask) error {\n\treturn errors.New(\"add route: not supported on this platform\")\n}", "title": "" }, { "docid": "b07718e2871df99b96307c283672ae9c", "score": "0.7497053", "text": "func (p *RouteProvider) AddRoute(method, route string, handler HandlerFunc) {\n\trouteHandler, err := newRouteHandlerFunc(route, handler)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\tp.routeMap[method] = append(p.routeMap[method], routeHandler)\n}", "title": "" }, { "docid": "165411ae054548ae1c8c72137127c6bc", "score": "0.74538803", "text": "func (srv *WebServer) AddRoute(httpMethod, href string, handler HandlerFunc) {\n\twebHandler := func(w http.ResponseWriter, r *http.Request) {\n\t\thandler(w, r)\n\t}\n\tsrv.handler.HandleFunc(href, webHandler).Methods(httpMethod)\n}", "title": "" }, { "docid": "99428220e2a96b7c5322b363f562e474", "score": "0.7412044", "text": "func (rt *RouteTable) AddRoute(route tcpip.Route, prf Preference, metric Metric, tracksInterface bool, dynamic bool, enabled bool) {\n\trt.Lock()\n\tdefer rt.Unlock()\n\n\trt.AddRouteLocked(route, prf, metric, tracksInterface, dynamic, enabled)\n}", "title": "" }, { "docid": "779fed31d30964875ed31865f042d905", "score": "0.7395942", "text": "func (d *Device) AddRoute(r *net.IPNet) error {\n\terr := d.addRoute(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\td.Routes = append(d.Routes, r)\n\treturn nil\n}", "title": "" }, { "docid": "1ba0772a0d7ec1226be6df7bacf1562a", "score": "0.738052", "text": "func (c *cmswww) addRoute(\n\tmethod string,\n\troute string,\n\thandler http.HandlerFunc,\n\tperm permission,\n\trequiresInventory bool,\n) {\n\tfullRoute := v1.APIRoute + route\n\n\tif requiresInventory {\n\t\thandler = c.loadInventory(handler)\n\t}\n\tswitch perm {\n\tcase permissionAdmin:\n\t\thandler = logging(c.isLoggedInAsAdmin(handler))\n\tcase permissionLogin:\n\t\thandler = logging(c.isLoggedIn(handler))\n\tdefault:\n\t\thandler = logging(handler)\n\t}\n\n\t// All handlers need to close the body\n\thandler = closeBody(handler)\n\n\tc.router.StrictSlash(true).HandleFunc(fullRoute, handler).Methods(method)\n}", "title": "" }, { "docid": "bb5b6b9a2e125dc74d5855540b6508e0", "score": "0.736631", "text": "func (r *Router) AddRoute(path string) *RouteBuilder {\n\tbuilder := &RouteBuilder{\n\t\tpath: path,\n\t\textenders: []Extender{},\n\t\tmodel: &NullModel{},\n\t\tvalidator: &NullValidator{},\n\t\tprocessor: &NullProcessor{},\n\t\twriter: &NullWriter{},\n\t}\n\troute := r.Mux.Handle(path, builder)\n\tbuilder.route = route\n\n\treturn builder\n}", "title": "" }, { "docid": "b7116f8ddd77476b933d531b4c55272f", "score": "0.7339416", "text": "func (nr *NestedRoute) AddRoute(r Route) *NestedRoute {\n\tnr.routes = append(nr.routes, &innerRoute{basepath: nr.BasePath, inner: r})\n\treturn nr\n}", "title": "" }, { "docid": "17110e7dcdb0ab463164381d6fec3ba2", "score": "0.7316526", "text": "func (r *Router) AddRoute(path string, dest string) {\n\turl, err := url.Parse(dest)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tproxy := httputil.NewSingleHostReverseProxy(url)\n\tr.Handle(path, proxy)\n\n\tn := len(path)\n\tif n > 1 && path[n-1] == '/' {\n\t\t// Add a prefix route\n\t\tr.Handle(path[0:n-1], proxy)\n\t}\n}", "title": "" }, { "docid": "73b5507428d1ec6c109e1b8408c55075", "score": "0.7307939", "text": "func (this *Router) AddRoute(regex string, rewriteTo string, paramMapping map[int]string){\n\tcr := regexp.MustCompile(regex)\n\troute := rewriteRoute{\n\t\tr: regex,\n\t\tcompiledR: cr,\n\t\trewriteTo: rewriteTo,\n\t\tparamMapping: paramMapping,\n\t}\n\tthis.routes = append(this.routes, route)\n}", "title": "" }, { "docid": "8e0e66ecbb8528347ef847bcd2892c80", "score": "0.7304521", "text": "func (c *client) AddRoute(topic string, callback MessageHandler) {\n\tif callback != nil {\n\t\tc.msgRouter.addRoute(topic, callback)\n\t}\n}", "title": "" }, { "docid": "485fb08cc83ec6cad3d35433acbfafcb", "score": "0.7222319", "text": "func (b *BigIP) AddRoute(config *Route) error {\n\treturn b.post(config, uriNet, uriRoute)\n}", "title": "" }, { "docid": "711f6c9be2a3eab64eb111257066ab4b", "score": "0.7220486", "text": "func Add(r *handle.Route) error {\n\tlog.Debug.Log(\"Adding '%v' to handler.\", r.Name())\n\tif compareRoute(r) {\n\t\treturn errors.New(\"Route already exists\")\n\t}\n\troutes = append(routes, *r)\n\treturn nil\n}", "title": "" }, { "docid": "4ca97f9a62981035349b532e18b104cf", "score": "0.7218329", "text": "func (self *Trie) AddRoute(path string, route interface{}) error {\n\treturn self.root.addRoute(path, route)\n}", "title": "" }, { "docid": "7243941748a06d86acf43d32687f127e", "score": "0.71934694", "text": "func (router *Router) AddRouteUnsafe(routes ...*Route) error {\n\tif h := router.requestHandler; h != nil {\n\t\tif v, ok := h.(RouteAdder); ok {\n\t\t\tfor _, r := range routes {\n\t\t\t\treturn v.AddRoute(r)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn ErrNotRouteAdder\n}", "title": "" }, { "docid": "b053c4c20afa06d154569bfd46e5e9f3", "score": "0.71686584", "text": "func (rg *RouterGroup) addRoute(r *Route) {\n\tif r.Name != \"\" {\n\t\trg.routes[r.Name] = r\n\t} else {\n\t\trg.routes[r.Named()] = r\n\t}\n}", "title": "" }, { "docid": "a87406431d9881fd108513d54c512d62", "score": "0.71585864", "text": "func (tx *Transaction) AddRoute(cidr string, args ...string) {\n\ttx.exec(append([]string{\"route\", \"add\", cidr, \"dev\", tx.link}, args...))\n}", "title": "" }, { "docid": "1f9ce6160c72857e7dd07a05007d6548", "score": "0.7137253", "text": "func (r *Routes) Add(title, method, pattern, description string, handlerFunc http.HandlerFunc) {\n\t*r = append(*r, Route{title, method, pattern, description, handlerFunc})\n}", "title": "" }, { "docid": "8422956834227bcd20f81ebc68580a5c", "score": "0.7121105", "text": "func VppAddRoute(route *Route, vppChan *govppapi.Channel, timeLog measure.StopWatchEntry) error {\n\treturn vppAddDelRoute(route, vppChan, false, timeLog)\n}", "title": "" }, { "docid": "adbf8e78b24bb5aaa3c14c36b5425902", "score": "0.7116296", "text": "func (c *Controller) AddRoute(w http.ResponseWriter, r *http.Request) {\n\terr := r.ParseForm()\n\tif err != nil {\n\t\tLogger.Err(err).Msg(\"failed to parse form\")\n\t}\n\n\tpeerName := r.PostFormValue(\"peerName\")\n\tif peerName == \"\" {\n\t\tLogger.Error().Msg(\"peerName is empty\")\n\t\treturn\n\t}\n\n\tnextHop := r.PostFormValue(\"nextHop\")\n\tif nextHop == \"\" {\n\t\tLogger.Error().Msg(\"nextHop is empty\")\n\t\treturn\n\t}\n\n\tc.gossiper.AddRoute(peerName, nextHop)\n}", "title": "" }, { "docid": "0ead3c0057b471f15f6272e58b4a425c", "score": "0.7070724", "text": "func (route *Route) AddRoute(routeBase BaseController) {\n\troutes := routeBase.Routes()\n\tif route.controllers == nil {\n\t\troute.controllers = make(map[string]map[string]RoutePath)\n\t}\n\n\tfor _, r := range routes {\n\t\t_, ok := route.controllers[r.Method]\n\t\tif !ok {\n\t\t\troute.controllers[r.Method] = make(map[string]RoutePath)\n\t\t}\n\t\troute.controllers[r.Method][r.Path] = r\n\t}\n}", "title": "" }, { "docid": "f3db40c8da4efcc84ef7a23e12979fd9", "score": "0.70608485", "text": "func (s RouteSet) AddRoute(method, path string, handle Handle) error {\n\tif path[0] != '/' {\n\t\treturn errors.New(\"path must begin with '/' in path '\" + path + \"'\")\n\t}\n\n\troot := s[method]\n\tif root == nil {\n\t\troot = new(node)\n\t\ts[method] = root\n\t}\n\n\treturn root.addRoute(path, handle)\n}", "title": "" }, { "docid": "8d00da40f33a587205212427613d8e08", "score": "0.7037072", "text": "func AddRoute(ip, gateway string) error {\n\treturn run(\"ip\", \"r\", \"add\", ip, \"via\", gateway)\n}", "title": "" }, { "docid": "39a16ebf9dda5f57e8c2af7886cf5887", "score": "0.7028932", "text": "func (p *Proxy) AddRoute(ipPort string, dest Target) {\n\tp.addRoute(ipPort, fixedTarget{dest})\n}", "title": "" }, { "docid": "0bcae1f2f490c3f5760750af7b391700", "score": "0.70054364", "text": "func (router *MyRouter) Add(name string, methods []string, path string, requirements Requirements) (*Route, error) {\n\treturn router.AddCustom(name, methods, router.defaultSchema, router.defaultUnsecureUser, router.defaultHost, router.defaultPort, path, requirements)\n}", "title": "" }, { "docid": "a1d39269da1179ef74da3a607f94f61c", "score": "0.69841456", "text": "func (g *Group) addRoute(method, path string, fn http.Handler, middlewares []MiddlewareFunc) {\n\tgroupRouteMiddlewares := []MiddlewareFunc{}\n\tfor _, middleware := range g.middlewares {\n\t\tgroupRouteMiddlewares = append(groupRouteMiddlewares, middleware.fn)\n\t}\n\n\tgroupRouteMiddlewares = append(groupRouteMiddlewares, middlewares...)\n\n\tg.srv.addRoute(method, g.basePath+\"/\"+strings.TrimLeft(path, \"/\"), fn, groupRouteMiddlewares)\n\n\tg.hasRoutes = true\n}", "title": "" }, { "docid": "0aa24c966fd017565a34c107de9323da", "score": "0.69385594", "text": "func AddRoute(e *echo.Group) {\n\tservices := e.Group(\"/services\")\n\n\t// Basic services request\n\tservices.GET(\"\", getAll)\n\tservices.POST(\"\", save, middleware.WithAdmin)\n\n\t{\n\t\tservice := services.Group(fmt.Sprintf(\"/:%s\", types.SERVICE_ID_PARAM))\n\n\t\tservice.GET(\"\", getByID)\n\t\tservice.DELETE(\"\", deleteByID, middleware.WithAdmin)\n\t}\n\n\t{\n\t\tsubService := services.Group(fmt.Sprintf(\"/subservice/:%s\", types.SUBSERVICE_ID_PARAM))\n\n\t\tsubService.GET(\"\", getBySubServiceID)\n\t}\n\n\tservices.POST(\"/validate\", validateTemplate)\n}", "title": "" }, { "docid": "bd8c120765f218ea9491702e6f5030cb", "score": "0.68826586", "text": "func AddRoute(e *echo.Group) {\n\tadmin := e.Group(\"/admin\")\n\n\t{\n\t\tassets := admin.Group(\"/assets\")\n\t\tassets.Use(middleware.WithAdmin)\n\t\tassets.GET(\"\", getAssets)\n\t\tassets.POST(fmt.Sprintf(\"/:%s\", types.ASSET_NAME_PARAM), saveAsset)\n\t}\n\n\t{\n\t\tconfig := admin.Group(\"/config\")\n\t\tconfig.GET(\"\", getConfig)\n\t\tconfig.POST(\"\", saveConfig)\n\t}\n\n\t{\n\t\tcron := admin.Group(\"/cron\")\n\t\tcron.Use(middleware.WithAdmin)\n\t\tcron.GET(\"/status\", cronStatus)\n\t}\n}", "title": "" }, { "docid": "a1981b9f8847dc38a6f99712b256c537", "score": "0.68616736", "text": "func (c *Client) AddRoute(ipCIDR, gateway string) error {\n\treturn modifyRoutingTable(\"add\", ipCIDR, gateway)\n}", "title": "" }, { "docid": "8cbe4ee85afde74392f2f7d859e9f4e5", "score": "0.68434787", "text": "func (group *Group) AddRoute(route *Route) {\n\ti := sort.Search(len(group.Routes), func(i int) bool {\n\t\treturn group.RouteSorter(group.Routes[i], route)\n\t})\n\tif i == len(group.Routes) || group.Routes[i].Name != route.Name {\n\t\tgroup.Routes = append(group.Routes[:i], append([]*Route{route}, group.Routes[i:]...)...)\n\t\troute.Groups = append(route.Groups, group)\n\t}\n}", "title": "" }, { "docid": "2ec23465920fa32bb5bf0ce00d53f6b0", "score": "0.67298067", "text": "func (r *Route) Add(method []string, pattern string, handler interface{}) *Route {\n\troute := r.initRoute()\n\troute.method = method\n\troute.pattern = r.getPrefix(pattern)\n\troute.handler = handler\n\treturn route\n}", "title": "" }, { "docid": "534f9ad7c7440c98d5477d272543dd54", "score": "0.6718419", "text": "func (p *Register) Add(route *Route) error {\n\tdefinition := route.Proxy\n\n\tvar balancer Balancer\n\tif definition.IsBalancerDefined() {\n\t\tlog.WithField(\"balancing_alg\", definition.Upstreams.Balancing).Debug(\"Using a load balancing algorithm\")\n\n\t\tvar err error\n\t\tbalancer, err = NewBalancer(definition.Upstreams.Balancing)\n\t\tif err != nil {\n\t\t\tmsg := \"Could not create a balancer\"\n\t\t\tlog.WithError(err).Error(msg)\n\t\t\treturn errors.Wrap(err, msg)\n\t\t}\n\t}\n\n\tp.params.Outbound = route.Outbound\n\tp.params.InsecureSkipVerify = definition.InsecureSkipVerify\n\thandler := &httputil.ReverseProxy{\n\t\tDirector: p.createDirector(definition, balancer),\n\t\tTransport: NewTransportWithParams(p.params),\n\t}\n\n\tmatcher := router.NewListenPathMatcher()\n\tif matcher.Match(definition.ListenPath) {\n\t\tp.doRegister(matcher.Extract(definition.ListenPath), handler.ServeHTTP, definition.Methods, route.Inbound)\n\t}\n\n\tp.doRegister(definition.ListenPath, handler.ServeHTTP, definition.Methods, route.Inbound)\n\treturn nil\n}", "title": "" }, { "docid": "80b15dbbab84f965f264f4aa9f20998e", "score": "0.6700718", "text": "func AddRouteWith(\n\tr *mux.Router,\n\twithHandlerConfig func(dependentHandler) handlerutil.WithParams,\n) func(verb, path string, handler dependentHandler) {\n\treturn func(verb, path string, handler dependentHandler) {\n\t\tr.Methods(verb).Path(path).Handler(negroni.New(negroni.Wrap(withHandlerConfig(handler))))\n\t}\n}", "title": "" }, { "docid": "6383d2278295ce844fc36a65cf4d2b56", "score": "0.66942734", "text": "func (rm *routersManagerImpl) AddRoute(routerConfigName, domain string, route *v2.Router) error {\n\tif v, ok := rm.routersWrapperMap.Load(routerConfigName); ok {\n\t\trw, ok := v.(*RoutersWrapper)\n\t\tif !ok {\n\t\t\tlog.DefaultLogger.Errorf(RouterLogFormat, \"routers_manager\", \"AddRoute\", \"unexpected object in routers map\")\n\t\t\treturn ErrUnexpected\n\t\t}\n\t\trw.mux.Lock()\n\t\tdefer rw.mux.Unlock()\n\t\trouters := rw.routers\n\t\t// Stored routers should not be nil when called the api\n\t\tif routers == nil {\n\t\t\tlog.DefaultLogger.Errorf(RouterLogFormat, \"routers_manager\", \"AddRoute\", \"error: %v\", ErrNoRouters)\n\t\t\treturn ErrNoRouters\n\t\t}\n\t\tcfg := rw.routersConfig\n\t\tindex := routers.AddRoute(domain, route)\n\t\tif index == -1 {\n\t\t\terrMsg := fmt.Sprintf(\"add route: %s into domain: %s failed\", routerConfigName, domain)\n\t\t\tlog.DefaultLogger.Errorf(RouterLogFormat, \"routers_manager\", \"AddRoute\", errMsg)\n\t\t\treturn errors.New(errMsg)\n\t\t}\n\t\t// modify config\n\t\troutersCfg := cfg.VirtualHosts[index].Routers\n\t\troutersCfg = append(routersCfg, *route)\n\t\tcfg.VirtualHosts[index].Routers = routersCfg\n\t\trw.routersConfig = cfg\n\t\tconfigmanager.SetRouter(*cfg)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "16ad2faffcb5ce6636006a3aae2c70ee", "score": "0.6675584", "text": "func (i Interface) AddRoute(cidr *net.IPNet) error {\n\tcmd := exec.Command(\"route\", \"-n\", \"add\", \"-net\", cidr.String(), \"-interface\", i.Interface.Name())\n\treturn cmd.Run()\n}", "title": "" }, { "docid": "74bc6361adb5c996f42f64451d6db4a6", "score": "0.6640936", "text": "func AddStaticRoute(name string, route *netlink.Route, log logging.Logger, timeLog measure.StopWatchEntry) error {\n\tlog.Debugf(\"Creating the new static route %s\", name)\n\tstart := time.Now()\n\tdefer func() {\n\t\tif timeLog != nil {\n\t\t\ttimeLog.LogTimeEntry(time.Since(start))\n\t\t}\n\t}()\n\n\treturn netlink.RouteAdd(route)\n}", "title": "" }, { "docid": "72587df47738a9f31babd39984dcc03c", "score": "0.662129", "text": "func (d *SDKSteps) RegisterRoute(agentID, varName, routerID string) error {\n\tgo d.ApproveRequest(routerID, nil)\n\n\terr := d.bddContext.RouteClients[agentID].Register(d.bddContext.Args[varName])\n\tif err != nil {\n\t\treturn fmt.Errorf(\"register route : %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "7f8a2b24c44b0ff7bdceb2cdabfffede", "score": "0.6618302", "text": "func (mux *Mux) Add(method, path string, handler HandlerFunc, middleware ...MiddlewareFunc) *Route {\n\tname := handlerName(handler)\n\tmux.router.add(method, path, func(c Context) error {\n\t\th := handler\n\t\t// Chain middleware\n\t\tfor i := len(middleware) - 1; i >= 0; i-- {\n\t\t\th = compose(h, middleware[i])\n\t\t}\n\t\treturn h(c)\n\t})\n\tr := &Route{\n\t\tMethod: method,\n\t\tPath: path,\n\t\tName: name,\n\t}\n\tmux.router.routes[method+path] = r\n\treturn r\n}", "title": "" }, { "docid": "7de94bf941fb0d5a8eb6048e89b113ff", "score": "0.6538075", "text": "func (h *RouteHandler) VppAddRoute(ctx context.Context, route *vpp_l3.Route) error {\n\tswIfIdx, err := h.getRouteSwIfIndex(route.OutgoingInterface)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn h.vppAddDelRoute(route, swIfIdx, false)\n}", "title": "" }, { "docid": "67968bd23a249035d9eeb753a78611a2", "score": "0.6520337", "text": "func (f RouteCollection) Add(value string) error {\n\ts, err := newRoute(value)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif _, exists := f[s.MuxMatch()]; exists {\n\t\treturn errors.New(\"Route already exists.\")\n\t}\n\tf[s.MuxMatch()] = *s\n\treturn nil\n}", "title": "" }, { "docid": "68019b2cb72f415056ee831e877239c3", "score": "0.65198374", "text": "func AddRoute(ipCIDR, gateway string) error {\n\tip, netmask, err := parseCIDR(ipCIDR)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error parsing IP CIDR: %w\", err)\n\t}\n\n\tcmd := fmt.Sprintf(addRouteCMDFmt, ip, netmask, gateway)\n\tfmt.Fprintf(os.Stdout, \"Running command: \\\"%s\\\"\\n\", cmd)\n\treturn run(\"cmd\", \"/C\", cmd)\n}", "title": "" }, { "docid": "2363090a67143c853ec570a33f6afa26", "score": "0.64543813", "text": "func (s *Cli) AddRoute(cidr string) *exec.Cmd {\n\t// run command: ip route add 10.96.0.0/16 dev tun0\n\tcmd := exec.Command(\"ip\",\n\t\t\"route\",\n\t\t\"add\",\n\t\tcidr,\n\t\t\"dev\",\n\t\ts.TunName,\n\t)\n\treturn cmd\n}", "title": "" }, { "docid": "fa891d5c38a9a0e7bdcff4db2276ff0f", "score": "0.6433803", "text": "func (g *Group) Add(method, path string, handler HandlerFunc, middleware ...MiddlewareFunc) *Route {\n\t// Combine into a new slice to avoid accidentally passing the same slice for\n\t// multiple routes, which would lead to later add() calls overwriting the\n\t// middleware from earlier calls.\n\tm := []MiddlewareFunc{}\n\tm = append(m, g.middleware...)\n\tm = append(m, middleware...)\n\treturn g.akita.Add(method, g.prefix+path, handler, m...)\n}", "title": "" }, { "docid": "a60928a5df56d60c64e6f1a8249ee0fc", "score": "0.6426455", "text": "func (r *router) addRoute(topic string, callback MessageHandler) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tfor e := r.routes.Front(); e != nil; e = e.Next() {\n\t\tif e.Value.(*route).match(topic) {\n\t\t\tr := e.Value.(*route)\n\t\t\tr.callback = callback\n\t\t\treturn\n\t\t}\n\t}\n\tr.routes.PushBack(&route{topic: topic, callback: callback})\n}", "title": "" }, { "docid": "8c87993832999a62af983776304483a2", "score": "0.639426", "text": "func (m *RouteMux) AddRoute(method string, pattern string, data interface{}) error {\n\t// Remove leading and trailing slashes and split the url into sections.\n\tl := len(pattern)\n\tfor l > 0 && pattern[0] == '/' {\n\t\tpattern = pattern[1:]\n\t\tl--\n\t}\n\tfor l > 0 && pattern[l-1] == '/' {\n\t\tpattern = pattern[:l-1]\n\t\tl--\n\t}\n\n\t// Initialize methods map, if needed.\n\tif m.methods == nil {\n\t\tm.methods = make(map[string]*route, 10)\n\t}\n\n\t// Get root route from method map.\n\tr, ok := m.methods[method]\n\tif !ok {\n\t\tr = &route{}\n\t\tm.methods[method] = r\n\t}\n\n\tif l == 0 {\n\t\tr.data = data\n\t\treturn nil\n\t}\n\n\tparts := strings.Split(pattern, \"/\")\n\n\t// Check for misplaced wildcard parts.\n\tfor i, part := range parts {\n\t\tif part == \"*\" && i != len(parts)-1 {\n\t\t\treturn ErrWildcardMisplaced\n\t\t}\n\t}\n\n\t// Create a slice to capture path parameter names.\n\tvar paramNames = make([]string, 0, 10)\n\nwalk:\n\tfor _, part := range parts {\n\t\tif len(part) == 0 {\n\t\t\treturn ErrBadSyntax\n\t\t}\n\n\t\t// Find params that start with \":\" and create variable routes.\n\t\tif part[0] == ':' {\n\t\t\t// Variable part\n\t\t\texpr := \"\"\n\t\t\t// A user may choose to override the defult expression\n\t\t\t// similar to expressjs: ‘/user/:id([0-9]+)’\n\t\t\tif index := strings.Index(part, \"(\"); index != -1 {\n\t\t\t\texpr = part[index:]\n\t\t\t\tpart = part[:index]\n\t\t\t}\n\n\t\t\tparamNames = append(paramNames, part[1:])\n\n\t\t\tif expr == \"\" {\n\t\t\t\t// No custom regexp defined.\n\t\t\t\tif r.variable != nil {\n\t\t\t\t\tr = r.variable\n\t\t\t\t\tcontinue walk\n\t\t\t\t}\n\n\t\t\t\t// Set the non-regexp variable route.\n\t\t\t\tnext := &route{}\n\t\t\t\tr.variable = next\n\t\t\t\tr = next\n\t\t\t} else {\n\t\t\t\t// Find existing regexp.\n\t\t\t\tfor _, v := range r.variables {\n\t\t\t\t\tif v.expr == expr {\n\t\t\t\t\t\tr = v.route\n\t\t\t\t\t\tcontinue walk\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// Compile the new expression.\n\t\t\t\tregex, regexErr := regexp.Compile(expr)\n\t\t\t\tif regexErr != nil {\n\t\t\t\t\treturn regexErr\n\t\t\t\t}\n\n\t\t\t\t// Create the new variable route.\n\t\t\t\tnext := &variableRoute{\n\t\t\t\t\texpr: expr,\n\t\t\t\t\troute: &route{},\n\t\t\t\t\tregex: regex,\n\t\t\t\t}\n\n\t\t\t\t// Initialize the variable routes slice, if needed.\n\t\t\t\tif r.variables == nil {\n\t\t\t\t\tr.variables = make([]*variableRoute, 0, 1)\n\t\t\t\t}\n\n\t\t\t\tr.variables = append(r.variables, next)\n\t\t\t\tr = next.route\n\t\t\t}\n\t\t} else if part == \"*\" {\n\t\t\t// Wildcard part\n\t\t\tr.wildcard = true\n\t\t} else {\n\t\t\t// Static part\n\t\t\tvar next *route\n\n\t\t\t// If non-nil, use the static map to find an existing route.\n\t\t\tif r.staticMap != nil {\n\t\t\t\tnext = r.staticMap[part]\n\t\t\t\tif next == nil {\n\t\t\t\t\tnext = &route{}\n\t\t\t\t}\n\n\t\t\t\tr.staticMap[part] = next\n\t\t\t} else {\n\t\t\t\t// Initialize the parallel slices, if needed.\n\t\t\t\tif r.indices == nil {\n\t\t\t\t\tr.indices = make([]string, 0, 10)\n\t\t\t\t\tr.static = make([]*route, 0, 10)\n\t\t\t\t}\n\n\t\t\t\t// Find existing static route.\n\t\t\t\tfor i, v := range r.indices {\n\t\t\t\t\tif v == part {\n\t\t\t\t\t\tnext = r.static[i]\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\t// A new route must be created.\n\t\t\t\tif next == nil {\n\t\t\t\t\tnext = &route{}\n\n\t\t\t\t\t// Is the count of static routes enough to warrant a map instead of a slice.\n\t\t\t\t\tif len(r.indices) >= 5 {\n\t\t\t\t\t\t// Convert the parallel slices to a map.\n\t\t\t\t\t\tr.staticMap = make(map[string]*route, 25)\n\t\t\t\t\t\tfor i, v := range r.indices {\n\t\t\t\t\t\t\tr.staticMap[v] = r.static[i]\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\tr.staticMap[part] = next\n\n\t\t\t\t\t\t// Allow slices to be GC'd\n\t\t\t\t\t\tr.indices = nil\n\t\t\t\t\t\tr.static = nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\tr.indices = append(r.indices, part)\n\t\t\t\t\t\tr.static = append(r.static, next)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tr = next\n\t\t}\n\t}\n\n\t// Set the data and parameter names.\n\tr.data = data\n\tr.paramNames = paramNames\n\n\treturn nil\n}", "title": "" }, { "docid": "0e2ee1aae44e37684d39ee35127acb70", "score": "0.63730204", "text": "func (rb *RouteBuilder) Register(m, p string, h http.HandlerFunc) {\n\tr := Route{\n\t\tMethod: m,\n\t\tPath: p,\n\t\tHandler: h,\n\t}\n\n\trb.Routes = append(rb.Routes, r)\n}", "title": "" }, { "docid": "9b3cb929c3173060f22c59b57d93bfe6", "score": "0.6369483", "text": "func (s *Server) Add(method, path string, handler HandlerFunc, middleware ...MiddlewareFunc) {\n\ts.router.Add(method, path, func(c Context) error {\n\t\th := applyMiddleware(handler, middleware...)\n\t\treturn h(c)\n\t})\n}", "title": "" }, { "docid": "2d873384fa4d332cea3a1faff06c82c0", "score": "0.6362317", "text": "func (e *Echo) Add(method, path string, handler HandlerFunc, middleware ...MiddlewareFunc) *Route {\n\treturn e.add(\"\", method, path, handler, middleware...)\n}", "title": "" }, { "docid": "14eed998dc4754b8ec58a840221c1420", "score": "0.63101876", "text": "func (router *MyRouter) AddCustom(name string, methods []string, scheme string, unsecureUser string, host string, port int, path string, requirements Requirements) (*Route, error) {\n\tvar err error\n\tvar route *Route\n\tvar _, ok = router.routes[name]\n\tif ok {\n\t\terr = errors.New(strings.Join([]string{\"Route name already registered\", name}, \" \"))\n\t\treturn nil, err\n\t}\n\tfor _, method := range methods {\n\t\tmethod = strings.ToLower(method)\n\t\tif !arrayContainsStringNoCase(SupportedMethods, method) {\n\t\t\tvar err = errors.New(strings.Join([]string{\"Unsupported method\", method}, \" \"))\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\troute, err = NewRoute(name, methods, scheme, host, port, path, requirements)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\troute.UnsecureUser = unsecureUser\n\n\tif len(methods) > 0 {\n\t\tfor _, method := range methods {\n\t\t\tmethod = strings.ToLower(method)\n\t\t\trouter.verbs[method][name] = route\n\t\t}\n\t} else {\n\t\tfor method := range router.verbs {\n\t\t\tmethod = strings.ToLower(method)\n\t\t\trouter.verbs[method][name] = route\n\t\t}\n\t}\n\trouter.routes[name] = route\n\n\treturn route, nil\n}", "title": "" }, { "docid": "4e871e80d69f5fed280fe66d1021d838", "score": "0.6308165", "text": "func (p *HostAdmitter) addRoute(route *routev1.Route) error {\n\t// Find displaced routes (or error if an existing route displaces us)\n\tdisplacedRoutes, err, ownerNamespace := p.displacedRoutes(route)\n\tif err != nil {\n\t\tmsg := fmt.Sprintf(\"a route in another namespace holds host %s\", route.Spec.Host)\n\t\tif ownerNamespace == route.Namespace {\n\t\t\t// Use the full error details if we got bumped by a\n\t\t\t// route in our namespace.\n\t\t\tmsg = err.Error()\n\t\t}\n\t\tp.recorder.RecordRouteRejection(route, \"HostAlreadyClaimed\", msg)\n\t\treturn err\n\t}\n\n\t// Remove displaced routes\n\tfor _, displacedRoute := range displacedRoutes {\n\t\twildcardKey := routeapihelpers.GetDomainForHost(displacedRoute.Spec.Host)\n\t\tp.claimedHosts.RemoveRoute(displacedRoute.Spec.Host, displacedRoute)\n\t\tp.blockedWildcards.RemoveRoute(wildcardKey, displacedRoute)\n\t\tp.claimedWildcards.RemoveRoute(wildcardKey, displacedRoute)\n\n\t\tmsg := \"\"\n\t\tif route.Namespace == displacedRoute.Namespace {\n\t\t\tif route.Spec.WildcardPolicy == routev1.WildcardPolicySubdomain {\n\t\t\t\tmsg = fmt.Sprintf(\"wildcard route %s/%s has host *.%s blocking %s\", route.Namespace, route.Name, wildcardKey, displacedRoute.Spec.Host)\n\t\t\t} else {\n\t\t\t\tmsg = fmt.Sprintf(\"route %s/%s has host %s, blocking %s\", route.Namespace, route.Name, route.Spec.Host, displacedRoute.Spec.Host)\n\t\t\t}\n\t\t} else {\n\t\t\tmsg = fmt.Sprintf(\"a route in another namespace holds host %s\", displacedRoute.Spec.Host)\n\t\t}\n\n\t\tp.recorder.RecordRouteRejection(displacedRoute, \"HostAlreadyClaimed\", msg)\n\t\tp.plugin.HandleRoute(watch.Deleted, displacedRoute)\n\t}\n\n\tif len(route.Spec.WildcardPolicy) == 0 {\n\t\troute.Spec.WildcardPolicy = routev1.WildcardPolicyNone\n\t}\n\n\t// Add the new route\n\twildcardKey := routeapihelpers.GetDomainForHost(route.Spec.Host)\n\n\tswitch route.Spec.WildcardPolicy {\n\tcase routev1.WildcardPolicyNone:\n\t\t// claim the host, block wildcards that would conflict with this host\n\t\tp.claimedHosts.InsertRoute(route.Spec.Host, route)\n\t\tp.blockedWildcards.InsertRoute(wildcardKey, route)\n\t\t// ensure the route doesn't exist as a claimed wildcard (in case it previously was)\n\t\tp.claimedWildcards.RemoveRoute(wildcardKey, route)\n\n\tcase routev1.WildcardPolicySubdomain:\n\t\t// claim the wildcard\n\t\tp.claimedWildcards.InsertRoute(wildcardKey, route)\n\t\t// ensure the route doesn't exist as a claimed host or blocked wildcard\n\t\tp.claimedHosts.RemoveRoute(route.Spec.Host, route)\n\t\tp.blockedWildcards.RemoveRoute(wildcardKey, route)\n\tdefault:\n\t\tp.claimedHosts.RemoveRoute(route.Spec.Host, route)\n\t\tp.claimedWildcards.RemoveRoute(wildcardKey, route)\n\t\tp.blockedWildcards.RemoveRoute(wildcardKey, route)\n\t\terr := fmt.Errorf(\"unsupported wildcard policy %s\", route.Spec.WildcardPolicy)\n\t\tp.recorder.RecordRouteRejection(route, \"RouteNotAdmitted\", err.Error())\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4e5a7d8faa796c57e0595b81004ca686", "score": "0.62780374", "text": "func (ep *Endpoint) AddStaticRoute(destination *net.IPNet, routeType int, nextHop net.IP) error {\n\tep.mu.Lock()\n\tdefer ep.mu.Unlock()\n\n\tr := types.StaticRoute{Destination: destination, RouteType: routeType, NextHop: nextHop}\n\n\tif routeType == types.NEXTHOP {\n\t\t// If the route specifies a next-hop, then it's loosely routed (i.e. not bound to a particular interface).\n\t\tep.joinInfo.StaticRoutes = append(ep.joinInfo.StaticRoutes, &r)\n\t} else {\n\t\t// If the route doesn't specify a next-hop, it must be a connected route, bound to an interface.\n\t\tep.iface.routes = append(ep.iface.routes, r.Destination)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1051e5b2a01292e272082890adca6730", "score": "0.6271468", "text": "func (s SubRoutes) Add(path string, subRoute SubRoute) {\n\ts[path] = subRoute\n}", "title": "" }, { "docid": "53122309e58dc34f220cccec78c14a0e", "score": "0.6209172", "text": "func (v *validator) InsertRoute(ctx context.Context, route *models.Route) (*models.Route, error) {\n\tif route == nil {\n\t\treturn nil, models.ErrDatastoreEmptyRoute\n\t}\n\n\tif err := route.Validate(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn v.Datastore.InsertRoute(ctx, route)\n}", "title": "" }, { "docid": "1303774ec7cc5228d4fe3619c27e7b4a", "score": "0.6204119", "text": "func (s *Context) InstallRoute(command, description string, middlewares ...muxer.HandlerFunc) error {\n\ts.mux.Route(command, description, middlewares...)\n\treturn nil\n}", "title": "" }, { "docid": "88eef4cd973e3ca1787c155e5c82315d", "score": "0.6196079", "text": "func (m *Mux) Add(method string, pattern string, handler http.Handler, middlewares ...func(next http.Handler) http.Handler) *Mux {\n\tpattern = strings.ToLower(strings.Trim(pattern, \" /\"))\n\tp := make([]string, 0)\n\tinparam := false\n\tpart := \"\"\n\tfor _, e := range pattern {\n\t\tif inparam {\n\t\t\tif !isAlpha(e) && !isNum(e) {\n\t\t\t\tinparam = false\n\t\t\t\tif part != \"\" {\n\t\t\t\t\tp = append(p, part)\n\t\t\t\t\tpart = \"\"\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tif e == ':' {\n\t\t\t\tinparam = true\n\t\t\t\tif part != \"\" {\n\t\t\t\t\tp = append(p, part)\n\t\t\t\t\tpart = \"\"\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tpart += string(e)\n\t}\n\tif part != \"\" {\n\t\tp = append(p, part)\n\t}\n\tm.routes = append(m.routes, route{\n\t\tmethod: method,\n\t\tpattern: p,\n\t\thandler: handler,\n\t\tmiddlewares: middlewares,\n\t})\n\treturn m\n}", "title": "" }, { "docid": "5a8b589b7a5bea694e81e94322ceeaee", "score": "0.61914974", "text": "func (r *Route) AddStatic(ctx context.Context) (err error) {\n\tdlog.Debugf(ctx, \"Adding static route %s\", r)\n\tctx, span := otel.GetTracerProvider().Tracer(\"\").Start(ctx, \"AddStatic\", trace.WithAttributes(attribute.Stringer(\"tel2.route\", r)))\n\tdefer tracing.EndAndRecord(span, err)\n\treturn r.addStatic(ctx)\n}", "title": "" }, { "docid": "feccbd329f4863b333791717a43310d0", "score": "0.61845905", "text": "func (c *cmswww) addPostRoute(\n\troute string,\n\thandler routeHandlerFunc,\n\treq interface{},\n\tperm permission,\n\trequiresInventory bool,\n) {\n\twrapper := func(w http.ResponseWriter, r *http.Request) {\n\t\t// Get the command.\n\t\tdecoder := json.NewDecoder(r.Body)\n\t\tif err := decoder.Decode(req); err != nil {\n\t\t\tRespondWithError(w, r, 0, \"route handler: failed to decode: %v\", err)\n\t\t\treturn\n\t\t}\n\n\t\tuser, err := c.GetSessionUser(r)\n\t\tif err != nil && err != database.ErrUserNotFound {\n\t\t\tRespondWithError(w, r, 0,\n\t\t\t\t\"route handler: GetSessionUser %v\", err)\n\t\t\treturn\n\t\t}\n\n\t\tresp, err := handler(req, user, w, r)\n\t\tif err != nil {\n\t\t\tRespondWithError(w, r, 0, \"route handler: %v\", err)\n\t\t\treturn\n\t\t}\n\n\t\tutil.RespondWithJSON(w, http.StatusOK, resp)\n\t}\n\n\tc.addRoute(http.MethodPost, route, wrapper, perm, requiresInventory)\n}", "title": "" }, { "docid": "6459a76d763363cea856f7da39651780", "score": "0.61734885", "text": "func (n *Story) Register(route Route) {\n\tn.Routes = append(n.Routes, route)\n}", "title": "" }, { "docid": "6eba471ef04a282c388783c3a7e7e6de", "score": "0.61667144", "text": "func (router *Router) AddHandler(method string, pattern string, handler Handler) {\n\troute := NewRoute(method, pattern, handler)\n\trouter.routes = append(router.routes, route)\n}", "title": "" }, { "docid": "1577d29b34e9ac07b1c9c762d14da578", "score": "0.6098723", "text": "func (r *Router) Add(name, path, method string, h interface{}) (n int, err error) {\n\tif h == nil {\n\t\treturn 0, fmt.Errorf(\"route handler must not be nil\")\n\t}\n\n\tmethod = strings.ToUpper(method)\n\n\t// Validate path\n\tif r.conf.RemoveTrailingSlash {\n\t\tpath = strings.TrimRight(path, \"/\")\n\t}\n\tif path == \"\" {\n\t\tpath = \"/\"\n\t}\n\tif path[0] != '/' {\n\t\tpath = \"/\" + path\n\t}\n\n\tvar addRoute bool\n\tif name != \"\" {\n\t\tif orig, ok := r.routes[name]; ok {\n\t\t\tif orig != path {\n\t\t\t\treturn 0, errInconsistentRouteName\n\t\t\t}\n\t\t} else {\n\t\t\taddRoute = true\n\t\t}\n\n\t\tfor n, p := range r.routes {\n\t\t\tif p == path {\n\t\t\t\tif n != name {\n\t\t\t\t\treturn 0, errInconsistentRouteName\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tnotend := true\n\tpnames := []string{} // Param names\n\tppath := path // Pristine path\n\n\tfor i, l := 0, len(path); i < l; i++ {\n\t\tif path[i] == ':' {\n\t\t\tj := i + 1\n\n\t\t\tr.insert(\"\", method, \"\", path[:i], skind, nil, nil)\n\t\t\tfor ; i < l && path[i] != '/'; i++ {\n\t\t\t}\n\n\t\t\tpnames = append(pnames, path[j:i])\n\t\t\tpath = path[:j] + path[i:]\n\t\t\ti, l = j, len(path)\n\n\t\t\tif i == l {\n\t\t\t\tr.insert(name, method, ppath, path[:i], pkind, h, pnames)\n\t\t\t\tnotend = false\n\t\t\t\tbreak\n\t\t\t} else {\n\t\t\t\tr.insert(\"\", method, \"\", path[:i], pkind, nil, nil)\n\t\t\t}\n\t\t} else if path[i] == '*' {\n\t\t\tr.insert(\"\", method, \"\", path[:i], skind, nil, nil)\n\t\t\tname := strings.TrimRight(path[i+1:], \"/ \")\n\t\t\tif name == \"\" {\n\t\t\t\tname = \"*\"\n\t\t\t}\n\t\t\tpnames = append(pnames, name)\n\t\t\tr.insert(name, method, ppath, path[:i+1], akind, h, pnames)\n\t\t\tnotend = false\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif notend {\n\t\tr.insert(name, method, ppath, path, skind, h, pnames)\n\t}\n\n\tif addRoute {\n\t\tr.routes[name] = ppath\n\t}\n\treturn r.maxnum, nil\n}", "title": "" }, { "docid": "c031104ca84fb7489d532419acf36ce0", "score": "0.60646695", "text": "func AddRoute(l *Land, from, to uint32, direction int8) (err error) {\n\tif from == to {\n\t\terr = fmt.Errorf(\"From and to are the same (cannot add a route): %v\", from)\n\t\treturn\n\t}\n\t// check the direction\n\tif direction == 0 || math.Abs(float64(direction)) > 2 {\n\t\terr = fmt.Errorf(\"Unknown direction %v\", direction)\n\t\treturn\n\t}\n\t// test whenever a route already exists\n\t_h, _d := routeHash(from, to, direction)\n\tif d, ex := l.routeH[_h]; ex && d != _d {\n\t\t// route exists with different direction\n\t\terr = fmt.Errorf(\"route from %v to %v exists with a different direction: %v\", from, to, d)\n\t\treturn\n\t}\n\n\t// init a route, create the direction map if it does not exists\n\tir := func(x uint32) (v map[int8]uint32) {\n\t\tv, ex := l.routes[x]\n\t\tif !ex {\n\t\t\tv = make(map[int8]uint32)\n\t\t\tl.routes[x] = v\n\t\t}\n\t\treturn v\n\t}\n\t// get the \"from city\" routes\n\tfromRoutes := ir(from)\n\t// if there is already an existing target for that direction\n\t// check that it is the same of the one requested, otherwise return error\n\tif t, ex := fromRoutes[direction]; ex && t != to {\n\t\terr = fmt.Errorf(\"target direction %v to %v exists to a different location: %v\", direction, to, from)\n\t\treturn\n\t}\n\t// get the \"to city\" routes\n\ttoRoutes := ir(to)\n\t// if there were no errors add both routes\n\tfromRoutes[direction] = to\n\ttoRoutes[direction*-1] = from\n\t// save the edge index\n\tl.routeH[_h] = _d\n\treturn\n}", "title": "" }, { "docid": "9d2aca965bb8f0b3bf1c44902f57ab6c", "score": "0.60016245", "text": "func NewRoute(p string, m string, pr sync.ProcessorFunc, trace bool, auth auth.Authenticator, mm ...MiddlewareFunc) Route {\n\tvar middlewares []MiddlewareFunc\n\tif trace {\n\t\tmiddlewares = append(middlewares, NewLoggingTracingMiddleware(p))\n\t}\n\tif auth != nil {\n\t\tmiddlewares = append(middlewares, NewAuthMiddleware(auth))\n\t}\n\tif len(mm) > 0 {\n\t\tmiddlewares = append(middlewares, mm...)\n\t}\n\treturn Route{Pattern: p, Method: m, Handler: handler(pr), Trace: trace, Auth: auth, Middlewares: middlewares}\n}", "title": "" }, { "docid": "6cdbbc19a98378799e13f2808867c6e2", "score": "0.599065", "text": "func (self *OfnetMaster) MacRouteAdd (macRoute *MacRoute, ret *bool) error {\n // Check if we have the route already and which is more recent\n oldRoute := self.macRouteDb[macRoute.MacAddrStr]\n if (oldRoute != nil) {\n // If old route has more recent timestamp, nothing to do\n if (!macRoute.Timestamp.After(oldRoute.Timestamp)) {\n return nil\n }\n }\n\n // Save the route in DB\n self.macRouteDb[macRoute.MacAddrStr] = macRoute\n\n // Publish it to all agents except where it came from\n for _, node := range self.agentDb {\n if (node.HostAddr != macRoute.OriginatorIp.String()) {\n var resp bool\n\n log.Infof(\"Sending MacRoute: %+v to node %s\", macRoute, node.HostAddr)\n\n client := rpcHub.Client(node.HostAddr, node.HostPort)\n err := client.Call(\"Vxlan.MacRouteAdd\", macRoute, &resp)\n if (err != nil) {\n log.Errorf(\"Error adding route to %s. Err: %v\", node.HostAddr, err)\n return err\n }\n }\n }\n\n *ret = true\n return nil\n}", "title": "" }, { "docid": "8205f93c4e31ff2b09ec1fddc1fb49f1", "score": "0.5964353", "text": "func (s *GinServer) AddRouter(method string, path string, handler func(*http.Request) Response) error {\n\tswitch method {\n\tcase http.MethodGet:\n\t\ts.router.GET(path, ginHandlerWrapper(handler))\n\t\treturn nil\n\tcase http.MethodPost:\n\t\ts.router.POST(path, ginHandlerWrapper(handler))\n\t\treturn nil\n\t}\n\treturn fmt.Errorf(\"invalid method\")\n}", "title": "" }, { "docid": "15c95a26540dbb2904f8b208ef7051b2", "score": "0.59220576", "text": "func (r *Router) addPath(method, path, name string, fn httprouter.Handle) {\n\n\tfullPath := r.fullPath(path)\n\n\t// record the full path of this router, and if name is empty, means do not export the api file\n\tif len(name) > 0 {\n\t\tif r.Urls[method] == nil {\n\t\t\tr.Urls[method] = make(map[string]string)\n\t\t}\n\t\tr.Urls[method][name] = fullPath\n\t}\n\n\t// Wrapper function to bypass the parameter problem\n\twf := func(response http.ResponseWriter, request *http.Request, params httprouter.Params) {\n\t\t// do filter first\n\t\tr.FilterChain.DoFilter(response, request)\n\t\t// go to the controller\n\t\tfn(response, request, params)\n\t}\n\n\tr.R.Handle(method, fullPath, wf)\n}", "title": "" }, { "docid": "eac30a42628b0240ad3054d7560ab854", "score": "0.59137446", "text": "func (mr *methodRouter) Add(method string, handler http.Handler) {\n\tmr.handlers[method] = handler\n}", "title": "" }, { "docid": "15151a40e163b2ba1fbc491901328467", "score": "0.59129", "text": "func (r *Route) AddMethod(method string) {\n\tr.Methods = append(r.Methods, method)\n}", "title": "" }, { "docid": "32ca0d5dc3a945ab459e15b6cdeda290", "score": "0.59125316", "text": "func (m *MailgunMail) RegisterRoute(i data.Inbox) (string, error) {\n\trouteAddr := m.websiteAddr + \"/mg/incoming/\" + i.ID + \"/\"\n\troute, err := m.mg.CreateRoute(mailgun.Route{\n\t\tPriority: 1,\n\t\tDescription: strconv.Itoa(int(i.TTL)),\n\t\tExpression: \"match_recipient(\\\"\" + i.Address + \"\\\")\",\n\t\tActions: []string{\"forward(\\\"\" + routeAddr + \"\\\")\", \"store()\", \"stop()\"},\n\t})\n\treturn route.ID, errors.Wrap(err, \"createRoute: failed to create mailgun route\")\n}", "title": "" }, { "docid": "60402fd22ae0bb43d993139dca479443", "score": "0.5907354", "text": "func (route *Route) AddMethod(method string, handler http.Handler) {\n\troute.methods[method] = handler\n}", "title": "" }, { "docid": "7ae78d93456e77f01ad570d51466d2bd", "score": "0.59017104", "text": "func (pc *PermissionCreate) AddRoutes(r ...*Route) *PermissionCreate {\n\tids := make([]int, len(r))\n\tfor i := range r {\n\t\tids[i] = r[i].ID\n\t}\n\treturn pc.AddRouteIDs(ids...)\n}", "title": "" }, { "docid": "09c9c5bda0307aaa3e4bbe02539ee6a5", "score": "0.5872377", "text": "func (r *Route) add(method string, handlers []Handler) *Route {\n\thh := combineHandlers(r.group.handlers, handlers)\n\tr.group.macross.add(method, r.path, hh)\n\treturn r\n}", "title": "" }, { "docid": "d53f5bbc31e2a465b110ebd7ca6a413e", "score": "0.5862711", "text": "func WithRoute(name string, rule string) func(*types.Route) string {\n\treturn func(r *types.Route) string {\n\t\tr.Rule = rule\n\t\treturn name\n\t}\n}", "title": "" }, { "docid": "302b66c3ab476f89328364471f781477", "score": "0.58464754", "text": "func (route *Route) AddMethod(name string, delegate MethodDelegate) (method *Method) {\n\tmethod = &Method{\n\t\tdelegate: delegate,\n\t\tparams: make(map[string]methodParam),\n\t}\n\troute.methods[name] = method\n\treturn\n}", "title": "" }, { "docid": "ad0bba3ed7bb5758284c9c18ddd96238", "score": "0.58411855", "text": "func NewRoute(method, path string, handler httputils.APIFunc) Route {\n\treturn localRoute{method, path, handler}\n}", "title": "" }, { "docid": "7b373a502911580b4acf777233554842", "score": "0.58385885", "text": "func (r *Router) Route(path string, handler HandlerFunc) *Route {\n\troute := NewRoute(path, handler)\n\tr.routes = append(r.routes, route)\n\treturn route\n}", "title": "" }, { "docid": "864c6f56ff83b07987f7c38b4415aaf6", "score": "0.5820593", "text": "func (rm *Controller) Add(rule netlink.Rule) error {\n\trm.mu.Lock()\n\tdefer rm.mu.Unlock()\n\t// check if we are already managing this route and if so, no-op\n\tfor _, existingRule := range rm.rules {\n\t\tif areNetlinkRulesEqual(existingRule.rule, &rule) {\n\t\t\treturn nil\n\t\t}\n\t}\n\trm.rules = append(rm.rules, ipRule{rule: &rule})\n\treturn rm.reconcile()\n}", "title": "" }, { "docid": "cb94776829407f9e6366bdc8c73090b9", "score": "0.5817111", "text": "func (c *Client) AddRoutes(podCIDR *net.IPNet, nodeName string, peerNodeIP, peerGwIP net.IP) error {\n\tobj, found := c.hostRoutes.Load(podCIDR.String())\n\tif found {\n\t\trt := obj.(*netroute.Route)\n\t\tif rt.GatewayAddress.Equal(peerGwIP) {\n\t\t\tklog.V(4).Infof(\"Route with destination %s already exists on %s (%s)\", podCIDR.String(), nodeName, peerNodeIP)\n\t\t\treturn nil\n\t\t}\n\t\t// Remove the existing route entry if the gateway address is not as expected.\n\t\tif err := c.nr.RemoveNetRoute(rt.LinkIndex, rt.DestinationSubnet, rt.GatewayAddress); err != nil {\n\t\t\tklog.Errorf(\"Failed to delete existing route entry with destination %s gateway %s on %s (%s)\", podCIDR.String(), peerGwIP.String(), nodeName, peerNodeIP)\n\t\t\treturn err\n\t\t}\n\t}\n\tif err := c.nr.NewNetRoute(c.nodeConfig.GatewayConfig.LinkIndex, podCIDR, peerGwIP); err != nil {\n\t\treturn err\n\t}\n\tc.hostRoutes.Store(podCIDR.String(), &netroute.Route{\n\t\tLinkIndex: c.nodeConfig.GatewayConfig.LinkIndex,\n\t\tDestinationSubnet: podCIDR,\n\t\tGatewayAddress: peerGwIP,\n\t})\n\tklog.V(2).Infof(\"Added route with destination %s via %s on host gateway on %s (%s)\", podCIDR.String(), peerGwIP.String(), nodeName, peerNodeIP)\n\treturn nil\n}", "title": "" }, { "docid": "d54d98848668f033037be335466188a0", "score": "0.5814855", "text": "func AddRoutes(app *fiber.App, db *gorm.DB) {\n\tr := &routeContext{DB: db}\n\n\tapp.Post(\"/auths/register\", r.handleRegister)\n\tapp.Post(\"/auths/login\", r.handleLogin)\n\n\tapp.Use(\"/auths/verify\", JwtMiddleware)\n\tapp.Get(\"/auths/verify\", r.handleTokenVerify)\n}", "title": "" }, { "docid": "135def8b68482dad48acecfe794049e0", "score": "0.58003575", "text": "func (r *Handler) addRouter(path string, subrouter router) {\n\t// replace \":paramname\" with (?P<paramname>[^/]+) for regex matching\n\tplaceholderRegexp := regexp.MustCompile(\":[A-Za-z]+\")\n\thasPlaceholders := placeholderRegexp.Match([]byte(path))\n\n\tif hasPlaceholders {\n\t\tprefix := []byte(\"(?P<\")\n\t\tsuffix := []byte(\">[^/]+)\")\n\t\tpath = string(placeholderRegexp.ReplaceAllFunc([]byte(path), func(match []byte) []byte {\n\t\t\treturn append(append(prefix, match[1:]...), suffix...)\n\t\t}))\n\t}\n\n\tpattern := regexp.MustCompile(\n\t\tfmt.Sprintf(\"^%s(?P<subpath>/?.*)$\", path), //ensures subpath is parsed in CallRoute\n\t)\n\tif hasPlaceholders {\n\t\tr.placeholderSubroutes = append(r.placeholderSubroutes, &subroute{pattern, subrouter})\n\t} else {\n\t\tr.verbatimSubroutes = append(r.verbatimSubroutes, &subroute{pattern, subrouter})\n\t}\n}", "title": "" }, { "docid": "9eeeb1fa9402421529139712267ab9b9", "score": "0.5799447", "text": "func Add(exec executor.Executor, target, via, routingTable string) error {\n\t_, dst, err := net.ParseCIDR(target)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tgw := net.ParseIP(via)\n\n\tcmd := \"ip\"\n\targs := []string{\"route\", \"add\"}\n\tif dst.IP.To4() == nil {\n\t\targs = []string{\"-6\", \"route\", \"add\"}\n\t}\n\tif routingTable != \"\" {\n\t\targs = append(args, \"table\", routingTable)\n\t}\n\targs = append(args, dst.String(), \"via\", gw.String())\n\tout, err := exec.Exec(cmd, args...)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Failed to add route %s %s %s\", cmd, args, out)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "24cf0cb412ab272687120fa25e4eae42", "score": "0.57956266", "text": "func (mr *MockInterfaceMockRecorder) AddRoutes(arg0, arg1, arg2, arg3 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"AddRoutes\", reflect.TypeOf((*MockInterface)(nil).AddRoutes), arg0, arg1, arg2, arg3)\n}", "title": "" }, { "docid": "a390059e3c9a80ac9090e436b982c668", "score": "0.57859665", "text": "func (mux *Mux) Add(t *route.T) {\n\t*mux = append(*mux, t)\n}", "title": "" }, { "docid": "3c5c01b7c82a27eb1cc18ef3e4e94b5d", "score": "0.57811755", "text": "func (s *RouteParams) Add(key, value string) {\n\t(*s).Keys = append((*s).Keys, key)\n\t(*s).Values = append((*s).Values, value)\n}", "title": "" }, { "docid": "883558b5809bd871c9667cd7398556a0", "score": "0.57778084", "text": "func (app *App) AddEndpoint(path string, internal bool, f func(http.ResponseWriter, *http.Request)) *mux.Route {\n\n\troute := app.router.HandleFunc(path, f)\n\tif internal {\n\t\troute = route.Host(\"localhost\")\n\t}\n\treturn route\n}", "title": "" } ]
bc2aa8ef3288ec8852eb7ec819e3818d
GetMethod returns request method.
[ { "docid": "fece11fdde66a4e86197764c399e1da0", "score": "0.6427382", "text": "func (s *FuncHandler) GetMethod() faygo.Methodset {\n\treturn s.Method\n}", "title": "" } ]
[ { "docid": "0015b74f3d6988d451489e88f8130517", "score": "0.7535803", "text": "func GetMethod(k *knot.WebContext) string {\n\tm := k.Request.Method\n\treturn m\n}", "title": "" }, { "docid": "cbaae3ef1692915f68c027c3e9a77246", "score": "0.7420476", "text": "func (s *WebhookTrigger) getMethod() string {\n\tmethod := strings.ToUpper(s.config.Settings[\"method\"])\n\tif method == \"\" {\n\t\tmethod = \"GET\"\n\t\tif s.config.Settings[\"body\"] != \"\" {\n\t\t\tmethod = \"POST\"\n\t\t}\n\t}\n\treturn method\n}", "title": "" }, { "docid": "f134987af7deb8709d67fa2b155885fb", "score": "0.72481585", "text": "func (request *ListTopicRequest) GetMethod() string {\n\treturn util.GET\n}", "title": "" }, { "docid": "f638d85c8e872ed4c57e72caf42f2029", "score": "0.71925825", "text": "func (request *PublishMessageTemplateRequest) GetMethod() string {\n\treturn util.POST\n}", "title": "" }, { "docid": "d712c7dd61e4f0a76375f8b8c64460e7", "score": "0.70509684", "text": "func (baseRequest *BaseRequest) GetMethod() string {\n\treturn baseRequest.Method\n}", "title": "" }, { "docid": "69ce0bea082853c875bcfa6fa77ca84e", "score": "0.7017504", "text": "func (r *DefaultDownloadRequest) GetMethod() string {\n\tr.syncOncePrepare.Do(r.Prepare)\n\treturn r.Method\n}", "title": "" }, { "docid": "f84f0b6d6061d14219758b7fc033c59f", "score": "0.6985536", "text": "func (o *SchemawafRequest) GetMethod() WafHttpMethod {\n\tif o == nil || o.Method == nil {\n\t\tvar ret WafHttpMethod\n\t\treturn ret\n\t}\n\treturn *o.Method\n}", "title": "" }, { "docid": "41dff9111ff7834a6efe7e0996b799d5", "score": "0.68942124", "text": "func (hc *HttpContext) GetMethod() string {\n\treturn hc.Request.Method\n}", "title": "" }, { "docid": "8ddc4f9064c40f1aa84a7324a3588bb4", "score": "0.6886414", "text": "func (w *WebCAS) Method() string {\n\treturn http.MethodGet\n}", "title": "" }, { "docid": "e6a11fae29caaba7b227bf104460bbb3", "score": "0.6872197", "text": "func (r *Request) Method() jps.Method {\n\treturn GetMethod(r.MethodStr)\n}", "title": "" }, { "docid": "db8f56d5f6e91527120a9f0d39dd2aa8", "score": "0.68006355", "text": "func (o *HttpEventAllOf) GetMethod() string {\n\tif o == nil || o.Method == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Method\n}", "title": "" }, { "docid": "5926e748b61028a2a38a61809bac83a1", "score": "0.6679483", "text": "func (this RequestDetailsView) GetMethod() *string { return this.Method }", "title": "" }, { "docid": "5926e748b61028a2a38a61809bac83a1", "score": "0.6679483", "text": "func (this RequestDetailsView) GetMethod() *string { return this.Method }", "title": "" }, { "docid": "54a39da872ea82b253ec1b20cc1c9d3b", "score": "0.6620039", "text": "func (r *Request) Method() []byte {\n\treturn r.reqLine.Method()\n}", "title": "" }, { "docid": "54a39da872ea82b253ec1b20cc1c9d3b", "score": "0.6620039", "text": "func (r *Request) Method() []byte {\n\treturn r.reqLine.Method()\n}", "title": "" }, { "docid": "ea3b94c0ccb6ea66310583ad18be8ddc", "score": "0.6609865", "text": "func isGetMethod(m p.MethodDescriptor) bool {\n\tmethodName := string(m.Name())\n\tif methodName == \"GetIamPolicy\" {\n\t\treturn false\n\t}\n\treturn regexp.MustCompile(\"^Get(?:[A-Z]|$)\").MatchString(string(m.Name()))\n}", "title": "" }, { "docid": "55e98773dfba20d546be9e24595f89fd", "score": "0.66007656", "text": "func (i *Invoker) getMethod(service reflect.Value, methodName string) reflect.Value {\n\tmethodReflectionValue := service.MethodByName(methodName)\n\n\tif !methodReflectionValue.IsValid() {\n\t\tlog.Fatalf(\"Could not find Method: '%s' in Service: '%s'\", methodName, service.Type().String())\n\t}\n\n\treturn methodReflectionValue\n}", "title": "" }, { "docid": "a3e1feca62bce809e3c1139660392876", "score": "0.6580025", "text": "func (op *InitRecurrentDMSAssembly) GetHTTPMethod() string {\n\treturn op.opHTTPData.GetHTTPMethod()\n}", "title": "" }, { "docid": "6a231d4600ef2fd79bd7f0f63b75594f", "score": "0.6561756", "text": "func (r *Request) Method() string {\n\treturn r.requestData.Method\n}", "title": "" }, { "docid": "1d42d67fc3298939f1a0f9152cc93b4a", "score": "0.6523144", "text": "func (req *asanaRequest) Method() string {\n\treturn req.Context.HTTPRequest.Method\n}", "title": "" }, { "docid": "a01dc4f6783c723c1c052dc48d413511", "score": "0.65189534", "text": "func (cli *ServicedCli) getMethod(name string) (reflect.Method, bool) {\n\n\t// Contruct the method name to be CmdFoo, where foo was passed\n\tmethodName := \"Cmd\"\n\tfor _, part := range strings.Split(name, \"-\") {\n\t\tmethodName = methodName + strings.ToUpper(part[:1]) + strings.ToLower(part[1:])\n\t}\n\treturn reflect.TypeOf(cli).MethodByName(methodName)\n}", "title": "" }, { "docid": "623f50e98b8aec87a90f43b7cdc2dcc1", "score": "0.65091676", "text": "func (c *CodecRequest) Method() (string, error) {\n\tif c.err == nil {\n\t\treturn *c.request.Method, nil\n\t}\n\treturn \"\", c.err\n}", "title": "" }, { "docid": "74edb5499c5c334ab937f092bb7167f0", "score": "0.65000397", "text": "func (c *Context) GetMethod() string {\n if c.input != nil {\n return c.input.Method\n }\n\n return \"CMD\"\n}", "title": "" }, { "docid": "e3588359a305a78b75a5f126f0a7faff", "score": "0.6499861", "text": "func GetHTTPMethod(req *http.Request) int {\n\treturn GetMethodID(req.Method)\n}", "title": "" }, { "docid": "4ff1ee0a9b64c3a0aebd2a143e43b143", "score": "0.6497321", "text": "func requestMethodVerb(rawMethod string) (verb string) {\n\tverbPlus := strings.SplitN(rawMethod, \" \", 2)\n\tswitch {\n\tcase len(verbPlus) == 0: // Per docs, Method will be empty if it's GET.\n\t\tverb = \"GET\"\n\tdefault:\n\t\tverb = verbPlus[0]\n\t}\n\treturn verb\n}", "title": "" }, { "docid": "638262a8d483223a1f77fe6580e2fe26", "score": "0.6482123", "text": "func (n *UsersNewAction) Method() string {\n\treturn \"GET\"\n}", "title": "" }, { "docid": "29d4b8eb18c2b5151d82234846726f1c", "score": "0.6480075", "text": "func (o *UpdateMonitorRequestPatchHttpConfiguration) GetMethod() string {\n\tif o == nil || o.Method == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Method\n}", "title": "" }, { "docid": "efaa33a0e47e2f83556e6ee8ad6a2797", "score": "0.64694136", "text": "func getMethod(r *http.Request) (m string) {\n\tm = r.Header.Get(HEAD_X_HTTP_METHOD_OVERRIDE)\n\tif m == \"\" {\n\t\tm = r.FormValue(PARAM_HTTP_METHOD_OVERRIDE)\n\t}\n\treturn\n}", "title": "" }, { "docid": "cd01a05955d67cc81bb08ca27646ba0c", "score": "0.6459235", "text": "func (c *CodecRequest) Method() (string, error) {\n\tif c.err == nil {\n\t\treturn c.request.Method, nil\n\t}\n\treturn \"\", c.err\n}", "title": "" }, { "docid": "0e01b74999ee08b3b1138e41bf734561", "score": "0.6394474", "text": "func (this *Method) HttpMethod() string {\n\tif ss, ok := this.Doc[\"method\"]; ok {\n\t\treturn strings.ToUpper(ss[len(ss)-1])\n\t}\n\tfor _, param := range this.Params {\n\t\tif param.In == \"body\" || param.In == \"file\" {\n\t\t\treturn \"POST\"\n\t\t}\n\t}\n\treturn \"GET\"\n}", "title": "" }, { "docid": "b7c26f7833f63b4d838ab37eb6288efb", "score": "0.6382602", "text": "func (r *Request) Method(m methods.Value) Interface {\n\tif m == nil {\n\t\tr.err = fmt.Errorf(\"Warning, request method is nil, method not set, used default 'GET'\")\n\t\treturn r\n\t}\n\tr.method = m\n\treturn r\n}", "title": "" }, { "docid": "c9b6dabc674d4b89fdc6d23b70921a94", "score": "0.63763404", "text": "func (r *Request) HTTPMethod() string {\n\treturn r.MethodStr\n}", "title": "" }, { "docid": "e094423b69587fc715efe8f024992427", "score": "0.63742995", "text": "func (o *UpdateSettingsFlowWithLookupMethod) GetMethod() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Method\n}", "title": "" }, { "docid": "0bcbc42fe2b6c788e0f6fe2849f8b32f", "score": "0.63266355", "text": "func (o *SubmitSelfServiceRegistrationFlowWithWebAuthnMethodBody) GetMethod() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Method\n}", "title": "" }, { "docid": "5b6067a9c16a26d3483a3d5c46ea4cb0", "score": "0.6318633", "text": "func (op *CardAssembly) GetHTTPMethod() string {\n\treturn op.opHTTPData.GetHTTPMethod()\n}", "title": "" }, { "docid": "fe47849997179105310ee1c1148b1ac4", "score": "0.63129395", "text": "func (req *jsonRequest) GetServiceMethod() string {\n\treturn req.ServiceMethod\n}", "title": "" }, { "docid": "06d5e57aaa9f2553f204364fab870260", "score": "0.6266635", "text": "func (m *VirtualCluster) GetMethod() core.RequestMethod {\n\tif m != nil {\n\t\treturn m.Method\n\t}\n\treturn core.RequestMethod_METHOD_UNSPECIFIED\n}", "title": "" }, { "docid": "06d5e57aaa9f2553f204364fab870260", "score": "0.6266635", "text": "func (m *VirtualCluster) GetMethod() core.RequestMethod {\n\tif m != nil {\n\t\treturn m.Method\n\t}\n\treturn core.RequestMethod_METHOD_UNSPECIFIED\n}", "title": "" }, { "docid": "5874e20e18e55cf11f0b6c9a52cf37dd", "score": "0.62435395", "text": "func (c *Context) Method() string {\n\treturn c.request.Method\n}", "title": "" }, { "docid": "2ceb23ced84650f73577f60eb6ea9441", "score": "0.6235813", "text": "func (r *Route) Method() string {\n\tif len(r.methodMatch) != 1 {\n\t\tpanic(\"no methods available\")\n\t}\n\treturn r.methodMatch[0]\n}", "title": "" }, { "docid": "b17d893fbfaff7ccdc8d6fb52d969957", "score": "0.6182709", "text": "func (ch *Chi) Method() string {\n\treturn ch.ctx.Request.Method\n}", "title": "" }, { "docid": "87eb8b1673d02a96aae2fa285c0fcaa8", "score": "0.6141822", "text": "func (i *UsersIndexAction) Method() string {\n\treturn \"GET\"\n}", "title": "" }, { "docid": "3542e7ed7bbd3206939ef5aced17b67d", "score": "0.61382157", "text": "func (o *RegistrationFlowMethod) GetMethod() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Method\n}", "title": "" }, { "docid": "130aaffbdb245c14ccb3945ae3ebe388", "score": "0.60972387", "text": "func getMethodHandler(endpoint Endpoint, method string, header http.Header) http.Handler {\n\tswitch strings.ToUpper(method) {\n\tcase Options:\n\t\treturn optionsHandler(endpoint)\n\tcase Head, Get:\n\t\tif i, supported := endpoint.(Getter); supported {\n\t\t\treturn GetFunc(i.Get)\n\t\t}\n\tcase Patch:\n\t\tif i, supported := endpoint.(Patcher); supported {\n\t\t\treturn PatchFunc(i.Patch)\n\t\t}\n\tcase Put:\n\t\tif i, supported := endpoint.(Putter); supported {\n\t\t\treturn PutFunc(i.Put)\n\t\t}\n\tcase Post:\n\t\tif i, supported := endpoint.(Poster); supported {\n\t\t\treturn PostFunc(i.Post)\n\t\t}\n\tcase Delete:\n\t\tif i, supported := endpoint.(Deleter); supported {\n\t\t\treturn DeleteFunc(i.Delete)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "efe1f24732ff5bd053c738706bb5e0b1", "score": "0.60695887", "text": "func (o *SubmitSelfServiceRecoveryFlowWithCodeMethodBody) GetMethod() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Method\n}", "title": "" }, { "docid": "038cdce4d906212d8834a5b3510d4cfb", "score": "0.6058109", "text": "func (mh *MethodHandler) GetMethod(method string) *Handler {\n\treturn mh.methodMap[method]\n}", "title": "" }, { "docid": "8698c3648845826e9a4ad10bbd316f96", "score": "0.60467577", "text": "func (call *Call) GetMethod(name string) transport.Method {\n\tfor _, method := range call.methods {\n\t\tif method.GetName() == name {\n\t\t\treturn method\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ff9ed938e12f54ceb6370dd65ad5e0c5", "score": "0.6003101", "text": "func GetMethodName(m int) string {\n\tswitch m {\n\tdefault:\n\t\treturn \"\"\n\tcase Options:\n\t\treturn \"OPTIONS\"\n\tcase Head:\n\t\treturn \"HEAD\"\n\tcase Post:\n\t\treturn \"POST\"\n\tcase Get:\n\t\treturn \"GET\"\n\tcase Put:\n\t\treturn \"PUT\"\n\tcase Patch:\n\t\treturn \"PATCH\"\n\tcase Delete:\n\t\treturn \"DELETE\"\n\tcase Connect:\n\t\treturn \"CONNECT\"\n\tcase Trace:\n\t\treturn \"TRACE\"\n\t}\n}", "title": "" }, { "docid": "3da2ede775ceaad2cfd8aef545d5202d", "score": "0.59607965", "text": "func Method(r *http.Request, f []zap.Field) []zap.Field {\n\treturn append(f, zap.String(DefaultMethodKey, r.Method))\n}", "title": "" }, { "docid": "754529881d61fd64fe3597624e626a41", "score": "0.59556717", "text": "func GetHttpMethodClass(method string) string {\n\tswitch method {\n\tcase \"GET\":\n\t\treturn \"success\"\n\tcase \"POST\":\n\t\treturn \"warning\"\n\tcase \"PATCH\":\n\t\treturn \"primary\"\n\tcase \"PUT\":\n\t\treturn \"info\"\n\tcase \"DELETE\":\n\t\treturn \"danger\"\n\tdefault:\n\t\treturn \"secondary\"\n\t}\n}", "title": "" }, { "docid": "f6e665beab04006f71cd71ac089f4559", "score": "0.5952791", "text": "func (c *Client) GetMethod(id int64) (*sendcloud.Method, error) {\n\tmr := sendcloud.MethodResponseContainer{}\n\terr := sendcloud.Request(\"GET\", \"/api/v2/shipping_methods/\"+strconv.Itoa(int(id)), nil, c.apiKey, c.apiSecret, &mr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn mr.GetResponse().(*sendcloud.Method), nil\n}", "title": "" }, { "docid": "287531862577c127c950c2947d712aac", "score": "0.59459084", "text": "func (i *AboutIndexAction) Method() string {\n\treturn \"GET\"\n}", "title": "" }, { "docid": "89ee722147190ca4e9da842c761e31b6", "score": "0.5906222", "text": "func getMethodHandler(isItem bool, method string) methodHandler {\n\tif isItem {\n\t\tswitch method {\n\t\tcase http.MethodOptions:\n\t\t\treturn itemOptions\n\t\tcase http.MethodHead, http.MethodGet:\n\t\t\treturn itemGet\n\t\tcase http.MethodPut:\n\t\t\treturn itemPut\n\t\tcase http.MethodPatch:\n\t\t\treturn itemPatch\n\t\tcase http.MethodDelete:\n\t\t\treturn itemDelete\n\t\t}\n\t} else {\n\t\tswitch method {\n\t\tcase http.MethodOptions:\n\t\t\treturn listOptions\n\t\tcase http.MethodHead, http.MethodGet:\n\t\t\treturn listGet\n\t\tcase http.MethodPost:\n\t\t\treturn listPost\n\t\tcase http.MethodDelete:\n\t\t\treturn listDelete\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "61b2f16009eef36278f94d0dcb5de3af", "score": "0.5896604", "text": "func (s *UsersShowAction) Method() string {\n\treturn \"GET\"\n}", "title": "" }, { "docid": "87bc930d94b7313bffe2cfb412ab57c6", "score": "0.58930516", "text": "func GetMethodEndpoint(method *specs.Method) (string, string, error) {\n\toptions := method.Options\n\n\trequest := options[MethodOption]\n\tendpoint := options[EndpointOption]\n\n\treturn request, endpoint, nil\n}", "title": "" }, { "docid": "ad671eda8f89e7393d06ef16bb5bb36b", "score": "0.58867383", "text": "func (e *UsersEditAction) Method() string {\n\treturn \"GET\"\n}", "title": "" }, { "docid": "90ac15d5e5951285601b2fa29e56d9a4", "score": "0.58626634", "text": "func (client BaseClient) GetMethod(ctx context.Context, userID string) (result UserUserType, err error) {\n if tracing.IsEnabled() {\n ctx = tracing.StartSpan(ctx, fqdn + \"/BaseClient.GetMethod\")\n defer func() {\n sc := -1\n if result.Response.Response != nil {\n sc = result.Response.Response.StatusCode\n }\n tracing.EndSpan(ctx, sc, err)\n }()\n }\n req, err := client.GetMethodPreparer(ctx, userID)\n if err != nil {\n err = autorest.NewErrorWithError(err, \".BaseClient\", \"GetMethod\", nil , \"Failure preparing request\")\n return\n }\n\n resp, err := client.GetMethodSender(req)\n if err != nil {\n result.Response = autorest.Response{Response: resp}\n err = autorest.NewErrorWithError(err, \".BaseClient\", \"GetMethod\", resp, \"Failure sending request\")\n return\n }\n\n result, err = client.GetMethodResponder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \".BaseClient\", \"GetMethod\", resp, \"Failure responding to request\")\n }\n\n return\n }", "title": "" }, { "docid": "31c91da12db046092f2fec1e19d3978a", "score": "0.58309054", "text": "func ToMethod(method string) Method {\n\tswitch method {\n\tcase \"GET\":\n\t\treturn GET\n\tcase \"POST\":\n\t\treturn POST\n\tcase \"PUT\":\n\t\treturn PUT\n\tcase \"HEAD\":\n\t\treturn HEAD\n\tcase \"DELETE\":\n\t\treturn DELETE\n\tdefault:\n\t\tlog.Error(\"Unable to decode Http method \" + method)\n\t\treturn GET\n\t}\n}", "title": "" }, { "docid": "05ec550d1c5e60aff7a35f355b2abb45", "score": "0.58245146", "text": "func (_this *HTMLFormElement) Method() string {\n\tvar ret string\n\tvalue := _this.Value_JS.Get(\"method\")\n\tret = (value).String()\n\treturn ret\n}", "title": "" }, { "docid": "29508b3d28c6d7264aebd9409f2d1114", "score": "0.58227706", "text": "func (r *Requist) Method(method string) *Requist {\n\n\tswitch strings.ToUpper(method) {\n\tcase http.MethodGet:\n\t\tr.method = http.MethodGet\n\n\tcase http.MethodPut:\n\t\tr.method = http.MethodPut\n\n\tcase http.MethodPost:\n\t\tr.method = http.MethodPost\n\n\tcase http.MethodPatch:\n\t\tr.method = http.MethodPatch\n\n\tcase http.MethodDelete:\n\t\tr.method = http.MethodDelete\n\n\tcase http.MethodOptions:\n\t\tr.method = http.MethodOptions\n\n\tcase http.MethodConnect:\n\t\tr.method = http.MethodConnect\n\n\tdefault:\n\t\tr.method = http.MethodGet\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "b03f17798a71fe8993912163c87cb0a5", "score": "0.58197796", "text": "func (o ActionHttpOutput) Method() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ActionHttp) pulumi.StringOutput { return v.Method }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e0a4de58136c8c1ed27264ec57557205", "score": "0.5784892", "text": "func (o *SchemawafRequest) GetMethodOk() (*WafHttpMethod, bool) {\n\tif o == nil || o.Method == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Method, true\n}", "title": "" }, { "docid": "a929579db76aba5b83f8fadff42a1ed5", "score": "0.57744694", "text": "func httpMethod(w http.ResponseWriter, r *http.Request) {\n\tswitch r.Method {\n\t\tcase \"GET\": Get(w, r)\n\t\tcase \"POST\": Post(w, r)\n\t}\n}", "title": "" }, { "docid": "b46b65c06e661b2f9d7ab9e03bdf791b", "score": "0.5750105", "text": "func (l localRoute) Method() string {\n\treturn l.method\n}", "title": "" }, { "docid": "b46b65c06e661b2f9d7ab9e03bdf791b", "score": "0.5750105", "text": "func (l localRoute) Method() string {\n\treturn l.method\n}", "title": "" }, { "docid": "09f6ce7846e5a437c1d39f244885aa16", "score": "0.5748408", "text": "func Method(next echo.HandlerFunc) echo.HandlerFunc {\n\treturn echo.HandlerFunc(func(c echo.Context) error {\n\t\tmethod := c.Request().Method\n\t\tcustomMethod := strings.ToUpper(c.QueryParam(\"_method\"))\n\t\tswitch customMethod {\n\t\tcase http.MethodGet, http.MethodDelete, http.MethodPost, http.MethodPut:\n\t\t\tmethod = customMethod\n\t\t}\n\t\t//TODO : Revisit the following\n\t\t//Why : Check if it is changing the method at the route\n\t\t{\n\t\t\tc.Request().Method = method\n\t\t\tc.SetRequest(c.Request())\n\t\t}\n\t\tc.Set(KeyMethod, method)\n\t\treturn next(c)\n\t})\n}", "title": "" }, { "docid": "cb78d4ab47513783943fc66b5dc2c1af", "score": "0.5746126", "text": "func contractCreateTransaction_getMethod(request request, channel *channel) method {\n\treturn method{\n\t\ttransaction: channel.getContract().CreateContract,\n\t}\n}", "title": "" }, { "docid": "55f61e73a436196f5e0738595f4fcacb", "score": "0.5666731", "text": "func (o *HttpEventAllOf) GetMethodOk() (*string, bool) {\n\tif o == nil || o.Method == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Method, true\n}", "title": "" }, { "docid": "b12cc1e2edc75d0633c399b76cd83b1f", "score": "0.5616007", "text": "func methodKV(r *http.Request) label.KeyValue {\n\tif kv, ok := methods[r.Method]; ok {\n\t\treturn kv\n\t}\n\treturn label.String(\"http.method\", r.Method)\n}", "title": "" }, { "docid": "ea9dbd3588be221270ef9011bb56615a", "score": "0.5605535", "text": "func (r *Request) IsGet() bool {\n\treturn strings.EqualFold(\"GET\", r.Method)\n}", "title": "" }, { "docid": "4c74527aeb3d23c91db1eca764ac7016", "score": "0.55855435", "text": "func (c *JClassHolder) GetMethod(name, args string) (JMethodID, error) {\n\tname = c.nameArgsToName(name, args)\n\tmethodId, ok := c.methods[name]\n\tif ok {\n\t\treturn methodId, nil\n\t}\n\treturn InvalidMethod, fmt.Errorf(\"method %s.%s(%s) not found\", c.name, name, args)\n}", "title": "" }, { "docid": "721dc380a04562b009c9e3d3ad69137a", "score": "0.55839074", "text": "func (o *CustconfAuthUrlAsymmetricSignTlu) GetMethodFilter() string {\n\tif o == nil || o.MethodFilter == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.MethodFilter\n}", "title": "" }, { "docid": "df17ddee78669135d32d575e124211a8", "score": "0.55818915", "text": "func (p *ControllerRegister) getUpperMethodString(method string) string {\n\tmethod = strings.ToUpper(method)\n\tif method != \"*\" && !HTTPMETHOD[method] {\n\t\tpanic(\"not support http method: \" + method)\n\t}\n\treturn method\n}", "title": "" }, { "docid": "9815e5a08ab4c331777b0ff6da9c8825", "score": "0.55792695", "text": "func HTTPMethod(val string) attribute.KeyValue {\n\treturn HTTPMethodKey.String(val)\n}", "title": "" }, { "docid": "57460aff3de6936ca8d388dacf995339", "score": "0.55791557", "text": "func (t *RestReqDescriptor) MaybeGet() *ggt.MethodDescriptor { return t.methodMaybeGet }", "title": "" }, { "docid": "683ae52e944b4a73cbf75c22ffe19394", "score": "0.5567632", "text": "func (client BaseClient) GetMethodSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req,\n autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n }", "title": "" }, { "docid": "b2d80edafd2893cdce906e57158db3c4", "score": "0.55544555", "text": "func (o *CustconfAuthUrlSignHmacTlu) GetMethodFilter() string {\n\tif o == nil || o.MethodFilter == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.MethodFilter\n}", "title": "" }, { "docid": "4b221e7918f0b47a1c85296a3cbb6585", "score": "0.5516415", "text": "func getRequestVerb(method string) string {\n\tapiVerb := \"\"\n\tswitch method {\n\tcase http.MethodPost:\n\t\tapiVerb = \"create\"\n\tcase http.MethodGet:\n\t\tapiVerb = \"get\"\n\tcase http.MethodPut:\n\t\tapiVerb = \"update\"\n\tcase http.MethodPatch:\n\t\tapiVerb = \"patch\"\n\tcase http.MethodDelete:\n\t\tapiVerb = \"delete\"\n\t}\n\treturn apiVerb\n}", "title": "" }, { "docid": "2538fefce4fa28e77634f7c03f61e917", "score": "0.55121523", "text": "func (p *ControllerRegister) getHttpMethodMapMethod(httpMethod, ctMethod string) map[string]string {\n\tmethods := make(map[string]string)\n\t// not match-all sign, only add for the http method\n\tif httpMethod != \"*\" {\n\n\t\tif ctMethod == \"\" {\n\t\t\tctMethod = httpMethod\n\t\t}\n\t\tmethods[httpMethod] = ctMethod\n\t\treturn methods\n\t}\n\n\t// add all http method\n\tfor val := range HTTPMETHOD {\n\t\tif ctMethod == \"\" {\n\t\t\tmethods[val] = val\n\t\t} else {\n\t\t\tmethods[val] = ctMethod\n\t\t}\n\t}\n\treturn methods\n}", "title": "" }, { "docid": "d505433ae563f9061761d8a0687ce2a6", "score": "0.550622", "text": "func (n *Null) GetMethod(string) BuiltinFunction {\n\treturn nil\n}", "title": "" }, { "docid": "ef9576a89b28d94b70683e0aa735aced", "score": "0.54945165", "text": "func (node Invoke) Method() string {\n\tcamel := \"\"\n\tfor _, word := range strings.Split(node.Function, \"-\") {\n\t\tcamel += strings.Title(word)\n\t}\n\n\treturn camel\n}", "title": "" }, { "docid": "f4b5544ef4c4dd26b1ea563b67e8e927", "score": "0.5474589", "text": "func (c *RESTClient) Get() *Request {\n\treturn c.Verb(\"GET\")\n}", "title": "" }, { "docid": "f4b5544ef4c4dd26b1ea563b67e8e927", "score": "0.5474589", "text": "func (c *RESTClient) Get() *Request {\n\treturn c.Verb(\"GET\")\n}", "title": "" }, { "docid": "216d06a1e8deb90efd61c6b0681a6170", "score": "0.54717046", "text": "func (p *LoginPage) GetMethods() []string {\n\treturn []string{\"GET\", \"POST\"}\n}", "title": "" }, { "docid": "e19d034fb5d044ec6421bbe2fe02b9bf", "score": "0.54464775", "text": "func GRPCMethod(ctx context.Context) string {\n\tmethod, ok := grpc.Method(ctx)\n\tif !ok {\n\t\treturn \"unknown\"\n\t}\n\n\t_, name := filepath.Split(method)\n\tif len(name) != 0 {\n\t\treturn name\n\t}\n\treturn \"unknown\"\n}", "title": "" }, { "docid": "fe9df9a9200dd7efa20ac9a73fcc5ba4", "score": "0.54451954", "text": "func (cc *ClientConn) getMethodConfig(method string) (m MethodConfig, ok bool) {\n\tcc.mu.RLock()\n\tdefer cc.mu.RUnlock()\n\tm, ok = cc.sc.Methods[method]\n\treturn\n}", "title": "" }, { "docid": "7f768d8e7fcfe8d129c8a670057236a2", "score": "0.54418814", "text": "func HTTPMethod(payload string) (string, error) {\n\tpend := strings.IndexByte(payload, ' ')\n\tif pend == -1 {\n\t\treturn invalidPayloadError(payload)\n\t}\n\treturn payload[:pend], nil\n}", "title": "" }, { "docid": "2f8623619edebeb07e897697798afb3c", "score": "0.5431928", "text": "func rtype_MethodByName(*rtype, string) (reflect.Method, bool)", "title": "" }, { "docid": "049c532282e16af6394a47b9cc4eee0a", "score": "0.5420404", "text": "func (self Request) MethodMatch(method string) bool {\n\tmatch := true // if no matching criteria specified, match!\n\n\tif self.matchingMethods != nil {\n\t\tmatch = (*self.matchingMethods)(method)\n\n\t} else if self.methods != nil {\n\t\tmatch = self.methods.MatchString(method)\n\t}\n\n\treturn match\n}", "title": "" }, { "docid": "5f1f11de7d30985dd217ecdc460e1835", "score": "0.53885293", "text": "func InvokeMethod(completeURL string, methodName string) (*http.Response, error) {\n\tform := url.Values{}\n\tform.Add(\"invokeMethod\", methodName)\n\tform.Add(\"submit\", \"Invoke Method\")\n\n\treturn basic(completeURL, form)\n}", "title": "" }, { "docid": "c605ee3822b4991ef80f15421fca3835", "score": "0.53689075", "text": "func (server *Server) GetHandler(method string) ServerMethodHandler {\n\tswitch method {\n\tcase \"CreateTable\":\n\t\treturn server.handleCreateTable\n\t}\n\tpanic(\"Unknown method:\" + method)\n}", "title": "" }, { "docid": "7dca42fc3de804193f9f095557ac9fe6", "score": "0.5364195", "text": "func GetMethodList(c *gin.Context) {\n\tresourceId := c.Query(controller.ResourceID)\n\n\tres, err := logic.BizGetMethodList(resourceId)\n\tif err != nil {\n\t\tc.JSON(http.StatusOK, controller.WithError(err))\n\t\treturn\n\t}\n\tdata, _ := json.Marshal(res)\n\tc.JSON(http.StatusOK, controller.WithRet(string(data)))\n}", "title": "" }, { "docid": "b03891d6a06a7598ab9c655885ca71d0", "score": "0.53529483", "text": "func (r *RestBuilder) Method( s ...string ) *RestBuilder {\n r.methods = s\n return r\n}", "title": "" }, { "docid": "2f8d634c05c5c04766daab6d24bd7bc7", "score": "0.53388965", "text": "func Method(methods ...string) Middleware {\n\n\t// Create a new Middleware\n\treturn func(f http.HandlerFunc) http.HandlerFunc {\n\n\t\t// Define the http.HandlerFunc\n\t\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t\tfor _, m := range methods {\n\t\t\t\tif r.Method == m {\n\t\t\t\t\tf(w, r)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\n\t\t\thttp.Error(w, http.StatusText(http.StatusMethodNotAllowed), http.StatusMethodNotAllowed)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "234810f6274d15157ce2a6e196203bee", "score": "0.53387004", "text": "func GetMethodID(method string) int {\n\tswitch method {\n\tdefault:\n\t\treturn 0\n\tcase \"OPTIONS\":\n\t\treturn Options\n\tcase \"HEAD\":\n\t\treturn Head\n\tcase \"POST\":\n\t\treturn Post\n\tcase \"GET\":\n\t\treturn Get\n\tcase \"PUT\":\n\t\treturn Put\n\tcase \"PATCH\":\n\t\treturn Patch\n\tcase \"DELETE\":\n\t\treturn Delete\n\tcase \"CONNECT\":\n\t\treturn Connect\n\tcase \"TRACE\":\n\t\treturn Trace\n\t}\n}", "title": "" }, { "docid": "0199218303fcd34ac5403c4ac159b2e8", "score": "0.5320057", "text": "func (f *Form) Method() string {\n\treturn f.method\n}", "title": "" }, { "docid": "81587a9357a1f320bf05d16c5c12ca9f", "score": "0.5307141", "text": "func method(m string) middleware {\n\treturn func(next http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tif r.Method != m {\n\t\t\t\thttp.Error(w, http.StatusText(http.StatusBadRequest), http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tnext.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "5c030d9a818eb3d0a6679f85ece67fe2", "score": "0.53057295", "text": "func (r *RPCInvocation) MethodName() string {\n\treturn r.methodName\n}", "title": "" }, { "docid": "df1417973ae23000a19bca5eb91f42bc", "score": "0.53026813", "text": "func get(handler http.HandlerFunc) http.HandlerFunc {\n\treturn checkHTTPMethod(http.MethodGet, handler)\n}", "title": "" }, { "docid": "beba1a3dfa2f96a51491129899ea2abc", "score": "0.529928", "text": "func (c *JClassHolder) GetStaticMethod(name, args string) (JMethodID, error) {\n\tname = c.nameArgsToName(name, args)\n\tmethodId, ok := c.staticMethods[name]\n\tif ok {\n\t\treturn methodId, nil\n\t}\n\treturn InvalidMethod, fmt.Errorf(\"method %s::%s(%s) not found\", c.name, name, args)\n}", "title": "" } ]
65a3401d4317329aa8dfb4e47f342e51
handleHTTPGetRequest generates the GET request with proper certificate handling
[ { "docid": "ef4492011f4318ea516424a86382ae43", "score": "0.67436016", "text": "func handleHTTPGetRequest(client kubecli.KubevirtClient, vmexport *exportv1.VirtualMachineExport, downloadUrl string, insecure bool, exportURL string, headers map[string]string) (*http.Response, error) {\n\ttoken, err := getTokenFromSecret(client, vmexport)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar cert string\n\t// Create new certPool and append our external SSL certificate\n\tif exportURL == \"\" {\n\t\tcert = vmexport.Status.Links.External.Cert\n\t} else {\n\t\tcert = vmexport.Status.Links.Internal.Cert\n\t}\n\troots := x509.NewCertPool()\n\troots.AppendCertsFromPEM([]byte(cert))\n\ttransport := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{RootCAs: roots},\n\t}\n\thttpClient := httpClientCreatorFunc(transport, insecure)\n\n\t// Generate and do the request\n\treq, _ := http.NewRequest(\"GET\", downloadUrl, nil)\n\tfor k, v := range headers {\n\t\treq.Header.Set(k, v)\n\t}\n\treq.Header.Set(exportTokenHeader, token)\n\n\treturn httpClient.Do(req)\n}", "title": "" } ]
[ { "docid": "1369abaa9d0dbe369b8f84043b59b52e", "score": "0.6195718", "text": "func HttpReqGet(u string, hc *http.Client, rc *string, ref *string, noref bool) ([]byte, error) {\n\tl := log.WithFields(log.Fields{\n\t\t\"action\": \"httpclient.HttpReqGet\",\n\t})\n\n\t// Create a HTTP request\n\thttpReq, err := http.NewRequest(\"GET\", u, nil)\n\tif err != nil {\n\t\treturn []byte{}, fmt.Errorf(\"an error occurred creating new HTTP GET request: %v\", err)\n\t}\n\n\t// Set cookie\n\tif rc != nil {\n\t\tratCookie := &http.Cookie{\n\t\t\tName: \"rat\",\n\t\t\tValue: *rc,\n\t\t}\n\t\thttpReq.AddCookie(ratCookie)\n\t}\n\n\t// Set referer\n\tif !noref {\n\t\thttpReq.Header.Set(\"referer\", \"https://www.seaofthieves.com/profile/achievements\")\n\t\tif ref != nil {\n\t\t\thttpReq.Header.Set(\"referer\", *ref)\n\t\t}\n\t}\n\n\t// Set HTTP header\n\tsetReqHeader(httpReq)\n\tserverResp, err := hc.Do(httpReq)\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\tdefer func() {\n\t\terr := serverResp.Body.Close()\n\t\tif err != nil {\n\t\t\tl.Printf(\"error while closing response body: %v\", err)\n\t\t}\n\t}()\n\n\tif serverResp.StatusCode >= 400 {\n\t\tl.Errorf(\"HTTP request failed: %v\", serverResp.Status)\n\t\treturn []byte{}, fmt.Errorf(\"%v\", serverResp.StatusCode)\n\t}\n\n\t// Read the response body\n\tvar respBody bytes.Buffer\n\t_, err = io.Copy(&respBody, serverResp.Body)\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\n\treturn respBody.Bytes(), nil\n}", "title": "" }, { "docid": "18baef8ae33f673b3dfdbac0140f22b4", "score": "0.6138178", "text": "func handleGetRequest(w http.ResponseWriter, e *models.Endpoint, r *http.Request, h *func() (interface{}, error)) {\n\tw.Header().Add(\"Access-Control-Allow-Origin\", \"*\")\n\n\t// Run the handler func\n\thandler := *h\n\tdata, err2 := handler()\n\tif err2 != nil {\n\t\tsendError(w, []error{err2})\n\t\treturn\n\t}\n\n\tsendJSONResponse(w, http.StatusOK, data)\n}", "title": "" }, { "docid": "538778e5e75559dfd25eefd46de8f3aa", "score": "0.59864205", "text": "func (c *controller) doCertificateRequest(encoded string) error {\n\tlog.WithFields(log.Fields{\n\t\t\"domains\": strings.Join(c.config.Domains, \",\"),\n\t\t\"endpoint\": c.config.EndpointURL,\n\t\t\"expiry\": c.config.Expiry.String(),\n\t\t\"profile\": c.config.EndpointProfile,\n\t}).Info(\"attempting to acquire certificate from ceritificate authority\")\n\n\terr := func() error {\n\t\tresponse, err := c.doSigningRequest(&SigningRequest{\n\t\t\tBundle: true,\n\t\t\tCertificateRequest: encoded,\n\t\t\tProfile: c.config.EndpointProfile,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := c.handleCertificateResponse(response); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"certificate\": c.config.CertificateFile(),\n\t\t\t\"private_key\": c.config.PrivateKeyFile(),\n\t\t}).Info(\"successfully wrote the tls certificate\")\n\n\t\treturn nil\n\t}()\n\n\treturn err\n}", "title": "" }, { "docid": "2e7ccbf3f590174842860aec32a91c0e", "score": "0.59620076", "text": "func requestCertificate(cfsslServer string, csr string, csrExpiry string, cfsslProfileName string, cfsslLabelName string) ([]byte, error) {\n\trequest := ApiCertificateRequest{\n\t\tHosts: nil,\n\t\tCertificateRequest: csr,\n\t\tExpiry: csrExpiry,\n\t\tProfile: cfsslProfileName,\n\t\tLabel: cfsslLabelName,\n\t\tBundle: true,\n\t}\n\n\tif csrExpiry != \"\" {\n\t\t_, err := time.ParseDuration(csrExpiry)\n\t\tif err != nil {\n\t\t\terr := fmt.Errorf(\"Expiry has the wrong format - It should contain a time duration in the form understood by Go's time package\")\n\t\t\treturn nil, errors.Wrap(err, \"expiry format\")\n\t\t}\n\t}\n\n\tencodedJsonRequest, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"request json marhal\")\n\t}\n\tlog.WithFields(log.Fields{\n\t\t\"encodedJsonRequest\": string(encodedJsonRequest),\n\t}).Debug(\"The JSON request that we're about to send\")\n\n\trequestUrl := fmt.Sprintf(\"%s/api/v1/cfssl/sign\", cfsslServer)\n\tresponse, err := http.Post(requestUrl, \"application/json\", bytes.NewBuffer(encodedJsonRequest))\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"http post\")\n\t}\n\tdefer response.Body.Close()\n\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"reading body\")\n\t}\n\tlog.WithFields(log.Fields{\n\t\t\"statusCode\": response.StatusCode,\n\t\t\"rawResponseBody\": string(body),\n\t}).Debug(\"Response info\")\n\n\tif response.StatusCode != http.StatusOK {\n\t\terr = fmt.Errorf(\"http status: got %v, want %v\", response.StatusCode, http.StatusOK)\n\t}\n\treturn body, nil\n}", "title": "" }, { "docid": "17bfc5837b1afc54fb81e6f19b37576a", "score": "0.5824812", "text": "func HTTPRequest(cfg *CLIConfigFlags, urlOptions URLFields) (int, []byte, error) {\n\thttpClient, err := client.NewClient(cfg.IAMConfig, cfg.CACert)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrap(err, \"unable to create HTTP client\")\n\t}\n\n\turl, err := getURL(httpClient, cfg, urlOptions)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tlogrus.Debugf(\"GET %s\", url)\n\treq, err := http.NewRequest(\"GET\", url.String(), nil)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrap(err, \"unable to create a new HTTP request\")\n\t}\n\n\tresp, err := httpClient.Do(req)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrapf(err, \"unable to execute GET %s\", url)\n\t}\n\n\tresponseData, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrapf(err, \"unable to read response body\")\n\t}\n\tdefer resp.Body.Close()\n\n\treturn resp.StatusCode, responseData, nil\n}", "title": "" }, { "docid": "e62d42ef42a6e6d025137d14782d9d92", "score": "0.5818146", "text": "func HTTPRequest(cfg *CLIConfigFlags, urlOptions URLFields) (int, []byte, error) {\n\thttpClient, err := client.NewClient(cfg.IAMConfig, cfg.CACert)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrap(err, \"unable to create HTTP client\")\n\t}\n\n\turl, err := GetURL(httpClient, cfg, urlOptions)\n\tif err != nil {\n\t\treturn 0, nil, err\n\t}\n\n\tlogrus.Debugf(\"GET %s\", url)\n\treq, err := http.NewRequest(\"GET\", url.String(), nil)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrap(err, \"unable to create a new HTTP request\")\n\t}\n\n\tresp, err := httpClient.Do(req)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrapf(err, \"unable to execute GET %s\", url)\n\t}\n\n\tresponseData, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn 0, nil, errors.Wrapf(err, \"unable to read response body\")\n\t}\n\tdefer resp.Body.Close()\n\n\treturn resp.StatusCode, responseData, nil\n}", "title": "" }, { "docid": "3de35b440536a385ccae597bbbae8eee", "score": "0.5784265", "text": "func (c *controller) handleCertificateRequest(ctx context.Context, encoded string) error {\n\tdoneCh := make(chan error, 0)\n\tbucket := make(chan struct{}, 1)\n\tdefer close(bucket)\n\n\tgo func() {\n\t\t// @logic as long as we have a token to operate continue\n\t\tfor range bucket {\n\t\t\tdoneCh <- c.doCertificateRequest(encoded)\n\t\t}\n\t}()\n\n\t// @step: add a single token into the bucket\n\tbucket <- struct{}{}\n\t// @step: create a backoff for failed attempts\n\tjitter := &backoff.Backoff{Min: 3 * time.Second, Max: 10 * time.Second, Jitter: true, Factor: 1.2}\n\tfor {\n\t\t// @step: wait for a timeout of a result from the request\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn errors.New(\"operation has timed out or been canceled\")\n\t\tcase err := <-doneCh:\n\t\t\tif err == nil {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\tlog.WithFields(log.Fields{\"error\": err.Error()}).Error(\"unable to process certificate request\")\n\t\t}\n\t\t// @step: wait for a period of time and retry\n\t\ttime.Sleep(jitter.Duration())\n\t\t// @step: add a token to operate\n\t\tbucket <- struct{}{}\n\t}\n}", "title": "" }, { "docid": "79c4572b20bddac8097b65ceb02b017c", "score": "0.5701746", "text": "func doHTTPRequest(client *http.Client, url string, user string, pass string) (*httpResponse, error) {\n\tlog.Infof(\"Fetching %q \\n\", url)\n\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.SetBasicAuth(user, pass)\n\n\tresp, err := client.Do(req)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode == 404 {\n\t\treturn nil, fmt.Errorf(\"Received 404 status from Sonus API, ensure the URL is correct. \")\n\t}\n\n\t// Read the body to a byte array so it can be used elsewhere\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tdefer resp.Body.Close()\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &httpResponse{url, resp, &body}, nil\n}", "title": "" }, { "docid": "3c955f1f39cdc11672cb03359e2163a8", "score": "0.56646717", "text": "func TestGetCertHandler(t *testing.T) {\n\tassert := tassert.New(t)\n\n\tds := DebugConfig{\n\t\tcertDebugger: tresorFake.NewFake(time.Hour),\n\t}\n\n\t_, err := ds.certDebugger.IssueCertificate(certificate.ForServiceIdentity(\"commonName\"))\n\tassert.Nil(err)\n\n\thandler := ds.getCertHandler()\n\n\tresponseRecorder := httptest.NewRecorder()\n\thandler.ServeHTTP(responseRecorder, nil)\n\n\tactualResponseBody := responseRecorder.Body.String()\n\n\tassert.Contains(actualResponseBody, \"Common Name\")\n\tassert.Contains(actualResponseBody, \"Valid Until\")\n\tassert.Contains(actualResponseBody, \"Cert Chain (SHA256)\")\n\tassert.Contains(actualResponseBody, \"x509.SignatureAlgorithm\")\n\tassert.Contains(actualResponseBody, \"x509.PublicKeyAlgorithm\")\n\tassert.Contains(actualResponseBody, \"x509.SerialNumber\")\n}", "title": "" }, { "docid": "12bbf604f969ad6d797babad61608441", "score": "0.5636271", "text": "func DoHTTPRequest(request *http.Request, skipSslVerification bool) (*http.Response, error) {\n\ttimeout := httpTimeout\n\tvar client *http.Client\n\n\tif skipSslVerification {\n\t\ttr := &http.Transport{\n\t\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true},\n\t\t}\n\t\tclient = &http.Client{\n\t\t\tTimeout: timeout,\n\t\t\tTransport: tr,\n\t\t}\n\t} else {\n\t\tclient = &http.Client{\n\t\t\tTimeout: timeout,\n\t\t}\n\t}\n\treturn client.Do(request)\n}", "title": "" }, { "docid": "08186f6a988ff06ce57afae81a4d511c", "score": "0.5612734", "text": "func (cl *Clientl) newGetRequest(host, path, realIP string, params url.Values) (req *xhttp.Request, err error) {\n\tif params == nil {\n\t\tparams = url.Values{}\n\t}\n\tparams.Add(\"client_id\", cl.conf.App.Key)\n\tenc := sign(params, path, cl.conf.App.Secret)\n\tru := host + path\n\tif enc != \"\" {\n\t\tru = ru + \"?\" + enc\n\t}\n\treq, err = xhttp.NewRequest(xhttp.MethodGet, ru, nil)\n\tif err != nil {\n\t\terr = pkgerr.Wrapf(err, \"uri:%s\", ru)\n\t\treturn\n\t}\n\tconst (\n\t\t_userAgent = \"User-Agent\"\n\t)\n\tif realIP != \"\" {\n\t\treq.Header.Set(_httpHeaderRemoteIP, realIP)\n\t}\n\treq.Header.Set(_userAgent, _noKickUserAgent+\" \"+env.AppID)\n\treturn\n}", "title": "" }, { "docid": "e3b9ae451717e729dcde978eaece9609", "score": "0.5601119", "text": "func makeRequest(user string, key string, url string) (responseData []byte) {\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tlog.Error(\"Error forming HTTP request\", map[string]interface{}{\n\t\t\t\"module\": \"zendesk\",\n\t\t\t\"error\": err,\n\t\t})\n\t}\n\treq.SetBasicAuth(user, key)\n\n\t// create custom http.Client to manually set timeout and disable keepalive\n\t// in an attempt to avoid EOF errors\n\tvar netClient = &http.Client{\n\t\tTimeout: time.Second * 60,\n\t\tTransport: &http.Transport{\n\t\t\tDisableKeepAlives: true,\n\t\t},\n\t}\n\n\tresp, err := netClient.Do(req)\n\n\tif err != nil {\n\t\tlog.Error(\"Error reaching Zendesk\", map[string]interface{}{\n\t\t\t\"module\": \"zendesk\",\n\t\t\t\"error\": err,\n\t\t})\n\t\treturn\n\t}\n\tlog.Info(\"Zendesk request received\", map[string]interface{}{\n\t\t\"module\": \"zendesk\",\n\t\t\"status\": resp.StatusCode,\n\t})\n\tdefer resp.Body.Close()\n\tresponseData, err = ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Error(\"Error reading Zendesk response\", map[string]interface{}{\n\t\t\t\"module\": \"zendesk\",\n\t\t\t\"error\": err,\n\t\t})\n\t\treturn\n\t}\n\treturn responseData\n}", "title": "" }, { "docid": "3e178372b23a879cd4d91c7270904f56", "score": "0.5586784", "text": "func makeGetRequest(handler http.Handler, target string) (int, http.Header, string) {\n\treq := httptest.NewRequest(http.MethodGet, target, nil)\n\tres := httptest.NewRecorder()\n\thandler.ServeHTTP(res, req)\n\tresult := res.Result()\n\tbodyBytes, err := io.ReadAll(result.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn result.StatusCode, result.Header, string(bodyBytes)\n}", "title": "" }, { "docid": "d26da441afb1f38e3653fd2245d8dd73", "score": "0.55803704", "text": "func getURLContents(givenURL string, args map[string]string) (data []byte) {\n\tverbose(3, \"Fetching %s...\", givenURL)\n\n\t_, err := url.Parse(givenURL)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Unable to parse url '%s': %s\\n\", givenURL, err)\n\t\treturn\n\t}\n\n\tclient := &http.Client{}\n\n\tmethod := \"GET\"\n\tif m, found := args[\"method\"]; found {\n\t\tmethod = m\n\t}\n\n\tvar postData io.Reader\n\tif d, found := args[\"data\"]; found {\n\t\tpostData = strings.NewReader(d)\n\t}\n\n\tif x509, ok := args[\"auth\"]; ok && x509 == \"x509\" {\n\t\tif len(CONFIG[\"x509Cert\"]) < 1 || len(CONFIG[\"x509Key\"]) < 1 {\n\t\t\tfmt.Fprintf(os.Stderr, \"URL '%s' requires an x509 cert/key, but none found in config.\\n\", givenURL)\n\t\t\treturn\n\t\t}\n\n\t\treloader := &mtls.CertReloader{Config: mtls.Config{\n\t\t\tCert: CONFIG[\"x509Cert\"],\n\t\t\tKey: CONFIG[\"x509Key\"],\n\t\t}}\n\n\t\tclient = &http.Client{\n\t\t\tTransport: &http.Transport{\n\t\t\t\tTLSHandshakeTimeout: time.Minute * 5,\n\t\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\t\tGetClientCertificate: reloader.GetClientCertificate,\n\t\t\t\t\tRenegotiation: tls.RenegotiateOnceAsClient,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t}\n\n\trequest, err := http.NewRequest(method, givenURL, postData)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Unable to create new request for '%s': %s\\n\", givenURL, err)\n\t\treturn\n\t}\n\n\tif method == \"POST\" {\n\t\trequest.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\t}\n\n\tvar ba_user string\n\tvar ba_pass string\n\n\tfor key, val := range args {\n\t\tif key == \"ua\" {\n\t\t\trequest.Header.Set(\"User-Agent\", \"Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36\")\n\t\t} else if key == \"basic-auth-user\" {\n\t\t\tba_user = val\n\t\t} else if key == \"basic-auth-password\" {\n\t\t\tba_pass = val\n\t\t} else {\n\t\t\trequest.Header.Set(key, val)\n\t\t}\n\t}\n\n\tif len(ba_user) > 0 {\n\t\trequest.SetBasicAuth(ba_user, ba_pass)\n\t}\n\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Unable to %s '%s': %s\\n\", method, givenURL, err)\n\t\treturn\n\t}\n\n\tdefer response.Body.Close()\n\n\tdata, err = ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Unable to read body of '%s': %s\\n\", givenURL, err)\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "44262e0813a7e3bed717aecb5a44736c", "score": "0.5544761", "text": "func Request(client *http.Client, clientTLS *http.Client) Component {\n\t// if client.Transport.(*http.Transport) {\n\t//\n\t// }\n\t// client := &http.Client{Transport: &http.Transport{\n\t// \tTLSClientConfig: &tls.Config{InsecureSkipVerify: false},\n\t// }}\n\n\t// log.Println(client.Transport)\n\t// client.Transport.TLSClientConfig.InsecureSkipVerify = true\n\n\treturn func(c *ht.Context, r *ht.Report) {\n\t\tr.Components[\"request\"] = make(map[string]string)\n\n\t\tresp, err := clientTLS.Get(c.URL)\n\t\tc.Response = resp\n\t\tif err != nil {\n\t\t\tr.StatusError()\n\n\t\t\tif strings.Contains(err.Error(), \"x509: certificate signed by unknown authority\") {\n\t\t\t\tr.Components[\"request\"][\"TLS\"] = err.Error()\n\n\t\t\t\t//try client that ignores TLS\n\t\t\t\tresp, err = client.Get(c.URL)\n\t\t\t\tc.Response = resp\n\t\t\t\tif err != nil {\n\t\t\t\t\tr.Components[\"request\"][\"NO_TLS\"] = err.Error()\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tr.Components[\"request\"][\"ERROR\"] = err.Error()\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "17613958062f335eceb97ce6175a3d67", "score": "0.55378497", "text": "func (c *Client) doHTTPGet(url string, data url.Values) (*http.Response, error) {\n\tif data != nil {\n\t\turl = url + \"?\" + data.Encode()\n\t}\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c.doHTTP(req)\n}", "title": "" }, { "docid": "c69a3ef8d4089ae160ffedcebdec2176", "score": "0.5533489", "text": "func sendHTTPRequest(content string, URL string, method string, id string, passwordOrToken string, insecureTLS bool, providerId string) (string, error) {\n\n\trootCAPool, _ := x509.SystemCertPool()\n\tif rootCAPool == nil {\n\t\trootCAPool = x509.NewCertPool()\n\t}\n\n\tif !insecureTLS {\n\t\tcert, err := ioutil.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/service-ca.crt\")\n\t\tif err != nil {\n\t\t\treturn \"\", errors.New(\"Error reading TLS certificates: \" + err.Error())\n\t\t}\n\t\trootCAPool.AppendCertsFromPEM(cert)\n\t}\n\n\tclient := &http.Client{\n\t\tTimeout: time.Second * 20,\n\t\tTransport: &http.Transport{\n\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\tRootCAs: rootCAPool,\n\t\t\t\tInsecureSkipVerify: insecureTLS,\n\t\t\t},\n\t\t},\n\t}\n\n\tvar requestBody = []byte(content)\n\n\trequest, err := http.NewRequest(method, URL, bytes.NewBuffer(requestBody))\n\tif strings.HasPrefix(content, \"{\") {\n\t\trequest.Header.Set(\"Content-type\", \"application/json\")\n\t\trequest.Header.Set(\"Accept\", \"application/json\")\n\t} else {\n\t\trequest.Header.Set(\"Content-type\", \"application/x-www-form-urlencoded\")\n\t}\n\n\tif id != \"\" {\n\t\trequest.SetBasicAuth(id, passwordOrToken)\n\t} else {\n\t\tif passwordOrToken != \"\" {\n\t\t\trequest.Header.Set(\"Authorization\", \"Bearer \"+passwordOrToken)\n\t\t}\n\t}\n\n\tconst errorStr = \"error\"\n\tvar errorMsgPreamble = \"Provider \" + providerId + \": error occurred communicating with OIDC provider. URL: \" + URL + \": \"\n\tif err != nil {\n\t\treturn errorStr, errors.New(errorMsgPreamble + err.Error())\n\t}\n\n\tresponse, err := client.Do(request)\n\tif response == nil {\n\t\treturn errorStr, errors.New(errorMsgPreamble + err.Error()) // bad hostname, can't connect, etc.\n\t}\n\tdefer response.Body.Close()\n\n\tif err != nil {\n\t\treturn errorStr, errors.New(errorMsgPreamble + err.Error()) // timeout, conn reset, etc.\n\t}\n\n\trespBytes, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn errorStr, errors.New(errorMsgPreamble + err.Error())\n\t}\n\trespString := string(respBytes)\n\n\t// a successful registration usually has a 201 response code.\n\tif response.StatusCode != 200 && response.StatusCode != 201 {\n\t\treturn errorStr, errors.New(errorMsgPreamble + response.Status + \". \" + respString + \". Data sent was: \" + content)\n\t}\n\treturn respString, nil\n}", "title": "" }, { "docid": "208bed2ae5dd934cb7d75b208498198d", "score": "0.55307764", "text": "func (client *Client) getCertificateHandleResponse(resp *http.Response) (GetCertificateResponse, error) {\n\tresult := GetCertificateResponse{}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.CertificateBundle); err != nil {\n\t\treturn GetCertificateResponse{}, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "38376b4b6a3193168a36d40976a05aa2", "score": "0.55276847", "text": "func makeGetRequest(route string) (*http.Response, error) {\n\tconfig, err := GetConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn performRequest(newGetRequest(route, config))\n}", "title": "" }, { "docid": "a9679492168baa2931b6c96184c292c7", "score": "0.5525213", "text": "func (m *ThreatIntelligenceSslCertificatesRequestBuilder) Get(ctx context.Context, requestConfiguration *ThreatIntelligenceSslCertificatesRequestBuilderGetRequestConfiguration)(i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.SslCertificateCollectionResponseable, error) {\n requestInfo, err := m.ToGetRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.BaseRequestBuilder.RequestAdapter.Send(ctx, requestInfo, i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.CreateSslCertificateCollectionResponseFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.SslCertificateCollectionResponseable), nil\n}", "title": "" }, { "docid": "d03526d61514f658072e7e0f2fc02342", "score": "0.5488601", "text": "func GetCertificatesHandler(c *gin.Context) {\n\t// Get the user from provided authorisation token or throw error\n\tUser := GetUserOrError(c)\n\tif User == nil {\n\t\treturn\n\t}\n\t// Get user id from url parameters\n\tRequestedID := c.Param(\"userId\")\n\tif RequestedID == \"\" {\n\t\tc.JSON(400, map[string]string{\n\t\t\t\"status\": \"failed\",\n\t\t\t\"error\": \"Malformed Request: missing userId parameter\",\n\t\t})\n\t\tlog.Println(\"GET /users/:userId/certificates: Failed to get users certificates (missing userId parameter)\")\n\t\treturn\n\t}\n\t// Create new slice for the users certificates\n\tUserCertificates := []*Certificate{}\n\t// Check that the user is requesting certificates for a user they are allowed to (i.e. themself)\n\tif User.Id == RequestedID {\n\t\t// Loop through all certificates, add certificates that the user owns to the slice\n\t\tfor _, Certificate := range Certificates {\n\t\t\tif Certificate.OwnerId == User.Id {\n\t\t\t\tUserCertificates = append(UserCertificates, Certificate)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tc.JSON(401, map[string]string{\n\t\t\t\"status\": \"failed\",\n\t\t\t\"error\": \"Invalid User: You are requesting another users certificates\",\n\t\t})\n\t\tlog.Println(\"GET /users/:userId/certificates: Failed to get users certificates (requesting another users certificates)\")\n\t\treturn\n\t}\n\t// Respond with success message and certificates\n\tc.JSON(200, map[string]interface{}{\n\t\t\"status\": \"success\",\n\t\t\"certificates\": UserCertificates,\n\t})\n}", "title": "" }, { "docid": "5fe23a6a4956c99a1e176cd57ecdf791", "score": "0.5454922", "text": "func (a *SettingsApiService) GetCertificate(ctx _context.Context, url string) (VidmCertificate, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue VidmCertificate\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/settings/vidm/certificate\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tlocalVarQueryParams.Add(\"url\", parameterToString(url, \"\"))\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 200 {\n\t\t\tvar v VidmCertificate\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ApiError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "b5ee4fef5dd0843eecefa9a9fccc76fd", "score": "0.54519176", "text": "func (c Client) GetRequest(url string) (*http.Request, ClientError) {\n\tvar errorImpl ClientErrorImpl\n\n\turl = c.Protocol + \"://\" + c.CurrentAddress + url\n\treq, err := http.NewRequest(http.MethodGet, url, nil)\n\tif err != nil {\n\t\terrorImpl.requestError = err\n\t\treturn nil, &errorImpl\n\t}\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.SetBasicAuth(c.Username, c.Password)\n\treturn req, nil\n}", "title": "" }, { "docid": "e39686c24374f97beb7cd3ff5bbbe31a", "score": "0.5444329", "text": "func RequestCert(endpoint string, domains []string, c *AppConfig) (*cservice.CertificateResponse, error) {\n\t// Setup a new Lego client\n\tuser, err := NewUserFromConfig(c, certcrypto.ParsePEMPrivateKey)\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\tclient, err := lego.NewClient(NewClientConfigFromUser(user, endpoint))\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\n\t// Configure the CloudFlare provider\n\tprovider, err := cloudflare.NewDNSProviderConfig(NewCloudFlareConfig(c))\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\tif err := client.Challenge.SetDNS01Provider(provider); err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\n\tlog.Printf(\"Sending certificate request to %s\\n\", endpoint)\n\tcertificates, err := client.Certificate.Obtain(GetRequest(domains))\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\n\tlog.Println(\"Authenticating against vault at \", c.VaultCfg.Address)\n\tvaultClient, err := NewDefaultClient(c)\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\tif err := AuthenticateClient(vaultClient, c); err != nil {\n\t\treturn &cservice.CertificateResponse{}, err\n\t}\n\n\tlog.Println(\"Writing certificates to Vault\")\n\tpaths, err := WriteCertificate(vaultClient, certificates, domains)\n\tif err != nil {\n\t\treturn &cservice.CertificateResponse{\n\t\t\tVaultPaths: paths,\n\t\t\tSuccess: false,\n\t\t}, err\n\t}\n\n\tlog.Println(\"Done!\")\n\treturn &cservice.CertificateResponse{\n\t\tVaultPaths: paths,\n\t\tSuccess: true,\n\t}, nil\n}", "title": "" }, { "docid": "0ae9673469e593097399e3dc671ef5c3", "score": "0.54234445", "text": "func HTTPGetRequest(client *http.Client, url string) ([]byte, error) {\n\tr, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresp, err := client.Do(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn body, nil\n}", "title": "" }, { "docid": "af679d4e2de29253c3f69f14efa2e9e1", "score": "0.54168665", "text": "func handleRequest(conn net.Conn, policyKey *tao.Keys, guard tao.Guard) error {\n\t// Expect an attestation from the client.\n\tms := util.NewMessageStream(conn)\n\tvar a tao.Attestation\n\tif err := ms.ReadMessage(&a); err != nil {\n\t\treturn err\n\t}\n\n\tpeerCert := conn.(*tls.Conn).ConnectionState().PeerCertificates[0]\n\tif err := tao.ValidatePeerAttestation(&a, peerCert, guard); err != nil {\n\t\treturn err\n\t}\n\n\t// Sign cert and put it in attestation statement\n\t// a consists of serialized statement, sig and SignerInfo\n\t// a is a says speaksfor, Delegate of speaksfor is cert and should be DER encoded\n\n\t// Get underlying says\n\tf, err := auth.UnmarshalForm(a.SerializedStatement)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar saysStatement *auth.Says\n\tif ptr, ok := f.(*auth.Says); ok {\n\t\tsaysStatement = ptr\n\t} else if val, ok := f.(auth.Says); ok {\n\t\tsaysStatement = &val\n\t}\n\tsf, ok := saysStatement.Message.(auth.Speaksfor)\n\tif ok != true {\n\t\treturn fmt.Errorf(\"keynegoserver: says doesn't have a speaksfor message\\n\")\n\t}\n\n\tkprin, ok := sf.Delegate.(auth.Prin)\n\tif ok != true {\n\t\treturn fmt.Errorf(\"keynegoserver: speaksfor Delegate is not auth.Prin\\n\")\n\t}\n/*\n\t// JLM: FIX\n\tsubjectPrin, ok := sf.Delegator.(auth.Prin)\n\tif ok != true {\n\t\treturn fmt.Errorf(\"keynegoserver: can't get subject principal\\n\")\n\t}\n\tsubjectName := subjectPrin.String()\n\tdetails := &tao.X509Details{\n\t\tCountry: proto.String(\"US\"),\n\t\tOrganization: proto.String(\"Google\"),\n\t\tOrganizationalUnit: proto.String(subjectName),\n\t\tCommonName: proto.String(\"localhost\"),\n\t}\n\tsubjectname := tao.NewX509Name(details)\n\tSerialNumber = SerialNumber + 1\n\tverifier, err := tao.FromPrincipal(kprin)\n\tif err != nil {\n\t\treturn errors.New(\"can't get principal from kprin\")\n\t}\n\tclientCert, err := policyKey.SigningKey.CreateSignedX509(policyKey.Cert, int(SerialNumber), verifier, subjectname)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"keynegoserver: can't create client certificate: %s\\n\", err)\n\t}\n\tclientDERCert := clientCert.Raw\n\terr = ioutil.WriteFile(\"ClientCert\", clientDERCert, os.ModePerm)\n */\n\tclientDERCert := []byte{1,2} //REMOVE\n\n\tnowTime := time.Now().UnixNano()\n\texpireTime := time.Now().AddDate(1, 0, 0).UnixNano()\n\t// Replace self signed cert in attest request\n\tnewSpeaksFor := &auth.Speaksfor{\n\t\tDelegate: auth.Bytes(clientDERCert),\n\t\tDelegator: sf.Delegator,\n\t}\n\tkeyNegoSays := auth.Says{\n\t\tSpeaker: policyKey.SigningKey.ToPrincipal(),\n\t\tTime: &nowTime,\n\t\tExpiration: &expireTime,\n\t\tMessage: newSpeaksFor,\n\t}\n\n\tdelegator, ok := sf.Delegator.(auth.Prin)\n\tif !ok {\n\t\treturn fmt.Errorf(\"keynegoserver: the delegator must be a principal\")\n\t}\n\tfound := false\n\tfor _, sprin := range delegator.Ext {\n\t\tif !found && (sprin.Name == \"Program\") {\n\t\t\tfound = true\n\t\t}\n\t\tif found {\n\t\t\tkprin.Ext = append(kprin.Ext, sprin)\n\t\t}\n\t}\n\tra, err := tao.GenerateAttestation(policyKey.SigningKey, nil, keyNegoSays)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Couldn't attest to the new says statement: %s\", err)\n\t}\n\n\tif _, err := ms.WriteMessage(ra); err != nil {\n\t\treturn fmt.Errorf(\"Couldn't return the attestation on the channel: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e0707a5737f3065b4c321f8bf1df64b1", "score": "0.5410649", "text": "func GetRequest(c *http.Client, url string) *http.Response {\n\tresp, err := c.Get(url)\n\tif err != nil {\n\t\tlog.Printf(\"[error] %s\\n\", err)\n\t\treturn nil\n\t}\n\tresp.Body.Close()\n\treturn resp\n}", "title": "" }, { "docid": "a1c002a3f3d8650a96fe1b676a25dff7", "score": "0.53959095", "text": "func handleGetResource(node *cot.Node, w http.ResponseWriter, r *http.Request) {\n\ttokenString, err := cot.GetJwtFromRequest(r, \"\")\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\ttoken, err := node.Verify(tokenString)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tj, err := json.MarshalIndent(token, \"\", \" \")\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\n\tif !token.Valid {\n\t\tw.WriteHeader(http.StatusUnauthorized)\n\t\tw.Write(j)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(j)\n\treturn\n}", "title": "" }, { "docid": "a60019c726188c2c14b2e70e2439ead3", "score": "0.53921926", "text": "func DoNTLMRequest(httpClient *http.Client, request *http.Request) (*http.Response, error) {\r\n\r\n\thandshakeReq, err := cloneRequest(request)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\tres, err := httpClient.Do(handshakeReq)\r\n\tif err != nil && res == nil {\r\n\t\treturn nil, err\r\n\t}\r\n\r\n\t//If the status is 401 then we need to re-authenticate, otherwise it was successful\r\n\tif res.StatusCode == 401 {\r\n\r\n\t\tauth, authOk := getDefaultCredentialsAuth()\r\n\t\tif authOk {\r\n\t\t\tnegotiateMessageBytes, err := auth.GetNegotiateBytes()\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\t\t\tdefer auth.ReleaseContext()\r\n\r\n\t\t\tnegotiateReq, err := cloneRequest(request)\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\r\n\t\t\tchallengeMessage, err := sendNegotiateRequest(httpClient, negotiateReq, negotiateMessageBytes)\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\r\n\t\t\tchallengeReq, err := cloneRequest(request)\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\r\n\t\t\tresponseBytes, err := auth.GetResponseBytes(challengeMessage)\r\n\r\n\t\t\tres, err := sendChallengeRequest(httpClient, challengeReq, responseBytes)\r\n\t\t\tif err != nil {\r\n\t\t\t\treturn nil, err\r\n\t\t\t}\r\n\r\n\t\t\treturn res, nil\r\n\t\t}\r\n\t}\r\n\r\n\treturn res, nil\r\n}", "title": "" }, { "docid": "fb9ce10eb1e569de87dc228a197b5066", "score": "0.53907645", "text": "func secureRequest(inputURL string) []string {\n\turlPath := \"\"\n\tparsedURL, err := url.Parse(inputURL)\n\tif err != nil {\n\t\tfmt.Println(\"URL Parsing Error: \" + err.Error())\n\t} else {\n\t\t// Check to see if it's a raw path, whatever that means...\n\t\tif strings.Compare(parsedURL.RawPath, \"\") == 0 {\n\t\t\turlPath = parsedURL.Path\n\t\t} else {\n\t\t\turlPath = parsedURL.RawPath\n\t\t}\n\t}\n\n\t// Establish a connection with the server.\n\tif conn, err := tls.Dial(\"tcp\", convertURL(inputURL), &tls.Config{InsecureSkipVerify: true,}); err == nil {\n\t\tdefer conn.Close()\n\n\t\tfmt.Fprintf(conn, \"GET /\" + strings.TrimPrefix(urlPath, \"/\") + \" HTTP/1.1\\r\\n\")\n\t\tfmt.Fprintf(conn, \"Host: \" + parsedURL.Hostname() + \"\\r\\n\")\n\t\tfmt.Fprintf(conn, \"Connection: close\\r\\n\")\n\t\tfmt.Fprintf(conn, \"Accept: text/html\\r\\n\")\n\t\tfmt.Fprintf(conn, \"\\r\\n\\r\\n\")\n\n\t\treturn parseBody(conn)\n\t} else {\n\t\tfmt.Println(\"TLS Connection Error: \" + err.Error())\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "0c3cee0622f44861cd7105eab4dd7cf4", "score": "0.5390665", "text": "func DoRequest(request *Request, requestRuntime map[string]interface{}) (response *Response, err error) {\n\truntimeObject := NewRuntimeObject(requestRuntime)\n\tfieldMap := make(map[string]string)\n\tInitLogMsg(fieldMap)\n\tdefer func() {\n\t\tif runtimeObject.Logger != nil {\n\t\t\truntimeObject.Logger.PrintLog(fieldMap, err)\n\t\t}\n\t}()\n\tif request.Method == \"\" {\n\t\trequest.Method = \"GET\"\n\t}\n\n\tif request.Protocol == \"\" {\n\t\trequest.Protocol = \"http\"\n\t} else {\n\t\trequest.Protocol = strings.ToLower(request.Protocol)\n\t}\n\n\tif request.Protocol == \"http\" {\n\t\trequest.Port = 80\n\t} else if request.Protocol == \"https\" {\n\t\trequest.Port = 443\n\t}\n\n\trequestURL := \"\"\n\trequest.Domain = request.Headers[\"host\"]\n\tmatched, _ := regexp.MatchString(\":\", request.Domain)\n\tif matched {\n\t\trequestURL = fmt.Sprintf(\"%s://%s%s\", request.Protocol, request.Domain, request.Pathname)\n\t} else {\n\t\trequestURL = fmt.Sprintf(\"%s://%s:%d%s\", request.Protocol, request.Domain, request.Port, request.Pathname)\n\t}\n\tqueryParams := request.Query\n\t// sort QueryParams by key\n\tq := url.Values{}\n\tfor key, value := range queryParams {\n\t\tq.Add(key, value)\n\t}\n\tquerystring := q.Encode()\n\tif len(querystring) > 0 {\n\t\tif strings.Contains(requestURL, \"?\") {\n\t\t\trequestURL = fmt.Sprintf(\"%s&%s\", requestURL, querystring)\n\t\t} else {\n\t\t\trequestURL = fmt.Sprintf(\"%s?%s\", requestURL, querystring)\n\t\t}\n\t}\n\tdebugLog(\"> %s %s\", request.Method, requestURL)\n\n\thttpRequest, err := http.NewRequest(request.Method, requestURL, request.Body)\n\tif err != nil {\n\t\treturn\n\t}\n\thttpRequest.Host = request.Domain\n\n\tclient := getTeaClient(runtimeObject.getClientTag(request.Domain))\n\tclient.Lock()\n\tif !client.ifInit {\n\t\ttrans, err := getHttpTransport(request, runtimeObject)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tclient.httpClient.Timeout = time.Duration(runtimeObject.ConnectTimeout) * time.Second\n\t\tclient.httpClient.Transport = trans\n\t\tclient.ifInit = true\n\t}\n\tclient.Unlock()\n\tfor key, value := range request.Headers {\n\t\tif value == \"\" || key == \"content-length\" {\n\t\t\tcontinue\n\t\t} else if key == \"host\" {\n\t\t\thttpRequest.Header[\"Host\"] = []string{value}\n\t\t} else {\n\t\t\thttpRequest.Header[key] = []string{value}\n\t\t}\n\t\tdebugLog(\"> %s: %s\", key, value)\n\t}\n\tcontentlength, _ := strconv.Atoi(request.Headers[\"content-length\"])\n\tevent := NewProgressEvent(TransferStartedEvent, 0, int64(contentlength), 0)\n\tPublishProgress(runtimeObject.Listener, event)\n\n\tputMsgToMap(fieldMap, httpRequest)\n\tstartTime := time.Now()\n\tfieldMap[\"{start_time}\"] = startTime.Format(\"2006-01-02 15:04:05\")\n\tres, err := hookDo(client.httpClient.Do)(httpRequest)\n\tfieldMap[\"{cost}\"] = time.Since(startTime).String()\n\tcompletedBytes := int64(0)\n\tif runtimeObject.Tracker != nil {\n\t\tcompletedBytes = runtimeObject.Tracker.CompletedBytes\n\t}\n\tif err != nil {\n\t\tevent = NewProgressEvent(TransferFailedEvent, completedBytes, int64(contentlength), 0)\n\t\tPublishProgress(runtimeObject.Listener, event)\n\t\treturn\n\t}\n\n\tevent = NewProgressEvent(TransferCompletedEvent, completedBytes, int64(contentlength), 0)\n\tPublishProgress(runtimeObject.Listener, event)\n\n\tresponse = NewResponse(res)\n\tfieldMap[\"{code}\"] = strconv.Itoa(res.StatusCode)\n\tfieldMap[\"{res_headers}\"] = TransToString(res.Header)\n\tdebugLog(\"< HTTP/1.1 %s\", res.Status)\n\tfor key, value := range res.Header {\n\t\tdebugLog(\"< %s: %s\", key, strings.Join(value, \"\"))\n\t\tif len(value) != 0 {\n\t\t\tresponse.Headers[strings.ToLower(key)] = value[0]\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "7a60f528f81f0eb6b3dd067842a0ce70", "score": "0.53783673", "text": "func generateRequest(c *Controller, application_id string, end_point string, resource_id string, method_type string) *http.Request {\n\tprotocol := c.Protocol\n\thost := c.Host\n\tuser := c.User\n\tpassword := c.Password\n\tport := c.Port\n\taccount := c.Account\n\tauth := user + \"@\" + account\n\turl := protocol + \"://\" + host + \":\" + string(port) + \"/controller/alerting/rest/v1/applications/\" + application_id + \"/\" + end_point + \"/\" + resource_id\n\tlog.Debug(\"URL to read resource: \" + url)\n\n\treq, err := http.NewRequest(method_type, url, nil)\n\treq.SetBasicAuth(auth, password)\n\tif err != nil {\n\t\tlog.Error(\"Failed to create request with error: \" + err.Error())\n\t}\n\treturn req\n}", "title": "" }, { "docid": "b3e8e2aafada975f6d3dab97011a5b0e", "score": "0.5365559", "text": "func (m methodREQHttpGet) handler(proc process, message Message, node string) ([]byte, error) {\n\tlog.Printf(\"<--- REQHttpGet received from: %v, containing: %v\", message.FromNode, message.Data)\n\n\tproc.processes.wg.Add(1)\n\tgo func() {\n\t\tdefer proc.processes.wg.Done()\n\n\t\turl := message.Data[0]\n\n\t\tclient := http.Client{\n\t\t\tTimeout: time.Second * 5,\n\t\t}\n\n\t\tctx, cancel := context.WithTimeout(proc.ctx, time.Second*time.Duration(message.MethodTimeout))\n\n\t\treq, err := http.NewRequestWithContext(ctx, http.MethodGet, url, nil)\n\t\tif err != nil {\n\t\t\ter := fmt.Errorf(\"error: methodREQHttpGet: NewRequest failed: %v, bailing out: %v\", err, message)\n\t\t\tsendErrorLogMessage(proc.configuration, proc.processes.metrics, proc.toRingbufferCh, proc.node, er)\n\t\t\tcancel()\n\t\t\treturn\n\t\t}\n\n\t\toutCh := make(chan []byte)\n\n\t\tproc.processes.wg.Add(1)\n\t\tgo func() {\n\t\t\tdefer proc.processes.wg.Done()\n\n\t\t\tresp, err := client.Do(req)\n\t\t\tif err != nil {\n\t\t\t\ter := fmt.Errorf(\"error: methodREQHttpGet: client.Do failed: %v, bailing out: %v\", err, message)\n\t\t\t\tsendErrorLogMessage(proc.configuration, proc.processes.metrics, proc.toRingbufferCh, proc.node, er)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tdefer resp.Body.Close()\n\n\t\t\tif resp.StatusCode != 200 {\n\t\t\t\tcancel()\n\t\t\t\ter := fmt.Errorf(\"error: methodREQHttpGet: not 200, where %#v, bailing out: %v\", resp.StatusCode, message)\n\t\t\t\tsendErrorLogMessage(proc.configuration, proc.processes.metrics, proc.toRingbufferCh, proc.node, er)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tbody, err := io.ReadAll(resp.Body)\n\t\t\tif err != nil {\n\t\t\t\ter := fmt.Errorf(\"error: methodREQHttpGet: io.ReadAll failed : %v, message: %v\", err, message)\n\t\t\t\tsendErrorLogMessage(proc.configuration, proc.processes.metrics, proc.toRingbufferCh, proc.node, er)\n\t\t\t\tlog.Printf(\"%v\\n\", er)\n\t\t\t}\n\n\t\t\tout := body\n\n\t\t\tselect {\n\t\t\tcase outCh <- out:\n\t\t\tcase <-ctx.Done():\n\t\t\t\treturn\n\t\t\t}\n\t\t}()\n\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\tcancel()\n\t\t\ter := fmt.Errorf(\"error: methodREQHttpGet: method timed out %v\", message)\n\t\t\tsendErrorLogMessage(proc.configuration, proc.processes.metrics, proc.toRingbufferCh, proc.node, er)\n\t\tcase out := <-outCh:\n\t\t\tcancel()\n\n\t\t\t// Prepare and queue for sending a new message with the output\n\t\t\t// of the action executed.\n\t\t\tnewReplyMessage(proc, message, out)\n\t\t}\n\n\t}()\n\n\tackMsg := []byte(\"confirmed from: \" + node + \": \" + fmt.Sprint(message.ID))\n\treturn ackMsg, nil\n}", "title": "" }, { "docid": "097a6ef8cf3de102007f897249494721", "score": "0.5349238", "text": "func (s *Secure) processRequest(w http.ResponseWriter, r *http.Request) (http.Header, *http.Request, error) {\n\t// Setup nonce if required.\n\tif s.opt.nonceEnabled {\n\t\tr = withCSPNonce(r, cspRandNonce())\n\t}\n\n\t// Resolve the host for the request, using proxy headers if present.\n\thost := r.Host\n\n\tfor _, header := range s.opt.HostsProxyHeaders {\n\t\tif h := r.Header.Get(header); h != \"\" {\n\t\t\thost = h\n\t\t\tbreak\n\t\t}\n\t}\n\n\t// Allowed hosts check.\n\tif len(s.opt.AllowedHosts) > 0 && !s.opt.IsDevelopment {\n\t\tisGoodHost := false\n\n\t\tif s.opt.AllowedHostsAreRegex {\n\t\t\tfor _, allowedHost := range s.cRegexAllowedHosts {\n\t\t\t\tif match := allowedHost.MatchString(host); match {\n\t\t\t\t\tisGoodHost = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tfor _, allowedHost := range s.opt.AllowedHosts {\n\t\t\t\tif strings.EqualFold(allowedHost, host) {\n\t\t\t\t\tisGoodHost = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif !isGoodHost {\n\t\t\ts.badHostHandler.ServeHTTP(w, r)\n\t\t\treturn nil, nil, fmt.Errorf(\"bad host name: %s\", host)\n\t\t}\n\t}\n\n\t// Determine if we are on HTTPS.\n\tssl := s.isSSL(r)\n\n\t// SSL check.\n\tif s.opt.SSLRedirect && !ssl && !s.opt.IsDevelopment {\n\t\turl := r.URL\n\t\turl.Scheme = \"https\"\n\t\turl.Host = host\n\n\t\tif s.opt.SSLHostFunc != nil {\n\t\t\tif h := (*s.opt.SSLHostFunc)(host); len(h) > 0 {\n\t\t\t\turl.Host = h\n\t\t\t}\n\t\t} else if len(s.opt.SSLHost) > 0 {\n\t\t\turl.Host = s.opt.SSLHost\n\t\t}\n\n\t\tstatus := http.StatusMovedPermanently\n\t\tif s.opt.SSLTemporaryRedirect {\n\t\t\tstatus = http.StatusTemporaryRedirect\n\t\t}\n\n\t\thttp.Redirect(w, r, url.String(), status)\n\n\t\treturn nil, nil, fmt.Errorf(\"redirecting to HTTPS\")\n\t}\n\n\tif s.opt.SSLForceHost {\n\t\ttempSSLHost := host\n\n\t\tif s.opt.SSLHostFunc != nil {\n\t\t\tif h := (*s.opt.SSLHostFunc)(host); len(h) > 0 {\n\t\t\t\ttempSSLHost = h\n\t\t\t}\n\t\t} else if len(s.opt.SSLHost) > 0 {\n\t\t\ttempSSLHost = s.opt.SSLHost\n\t\t}\n\n\t\tif tempSSLHost != host {\n\t\t\turl := r.URL\n\t\t\turl.Scheme = \"https\"\n\t\t\turl.Host = tempSSLHost\n\n\t\t\tstatus := http.StatusMovedPermanently\n\t\t\tif s.opt.SSLTemporaryRedirect {\n\t\t\t\tstatus = http.StatusTemporaryRedirect\n\t\t\t}\n\n\t\t\thttp.Redirect(w, r, url.String(), status)\n\n\t\t\treturn nil, nil, fmt.Errorf(\"redirecting to HTTPS\")\n\t\t}\n\t}\n\n\t// If the AllowRequestFunc is set, call it and exit early if needed.\n\tif s.opt.AllowRequestFunc != nil && !s.opt.AllowRequestFunc(r) {\n\t\ts.badRequestHandler.ServeHTTP(w, r)\n\t\treturn nil, nil, fmt.Errorf(\"request not allowed\")\n\t}\n\n\t// Create our header container.\n\tresponseHeader := make(http.Header)\n\n\t// Strict Transport Security header. Only add header when we know it's an SSL connection.\n\t// See https://tools.ietf.org/html/rfc6797#section-7.2 for details.\n\tif s.opt.STSSeconds != 0 && (ssl || s.opt.ForceSTSHeader) && !s.opt.IsDevelopment {\n\t\tstsSub := \"\"\n\t\tif s.opt.STSIncludeSubdomains {\n\t\t\tstsSub = stsSubdomainString\n\t\t}\n\n\t\tif s.opt.STSPreload {\n\t\t\tstsSub += stsPreloadString\n\t\t}\n\n\t\tresponseHeader.Set(stsHeader, fmt.Sprintf(\"max-age=%d%s\", s.opt.STSSeconds, stsSub))\n\t}\n\n\t// Frame Options header.\n\tif len(s.opt.CustomFrameOptionsValue) > 0 {\n\t\tresponseHeader.Set(frameOptionsHeader, s.opt.CustomFrameOptionsValue)\n\t} else if s.opt.FrameDeny {\n\t\tresponseHeader.Set(frameOptionsHeader, frameOptionsValue)\n\t}\n\n\t// Content Type Options header.\n\tif s.opt.ContentTypeNosniff {\n\t\tresponseHeader.Set(contentTypeHeader, contentTypeValue)\n\t}\n\n\t// XSS Protection header.\n\tif len(s.opt.CustomBrowserXssValue) > 0 {\n\t\tresponseHeader.Set(xssProtectionHeader, s.opt.CustomBrowserXssValue)\n\t} else if s.opt.BrowserXssFilter {\n\t\tresponseHeader.Set(xssProtectionHeader, xssProtectionValue)\n\t}\n\n\t// HPKP header.\n\tif len(s.opt.PublicKey) > 0 && ssl && !s.opt.IsDevelopment {\n\t\tresponseHeader.Set(hpkpHeader, s.opt.PublicKey)\n\t}\n\n\t// Content Security Policy header.\n\tif len(s.opt.ContentSecurityPolicy) > 0 {\n\t\tif s.opt.nonceEnabled {\n\t\t\tresponseHeader.Set(cspHeader, fmt.Sprintf(s.opt.ContentSecurityPolicy, CSPNonce(r.Context())))\n\t\t} else {\n\t\t\tresponseHeader.Set(cspHeader, s.opt.ContentSecurityPolicy)\n\t\t}\n\t}\n\n\t// Content Security Policy Report Only header.\n\tif len(s.opt.ContentSecurityPolicyReportOnly) > 0 {\n\t\tif s.opt.nonceEnabled {\n\t\t\tresponseHeader.Set(cspReportOnlyHeader, fmt.Sprintf(s.opt.ContentSecurityPolicyReportOnly, CSPNonce(r.Context())))\n\t\t} else {\n\t\t\tresponseHeader.Set(cspReportOnlyHeader, s.opt.ContentSecurityPolicyReportOnly)\n\t\t}\n\t}\n\n\t// Referrer Policy header.\n\tif len(s.opt.ReferrerPolicy) > 0 {\n\t\tresponseHeader.Set(referrerPolicyHeader, s.opt.ReferrerPolicy)\n\t}\n\n\t// Feature Policy header.\n\tif len(s.opt.FeaturePolicy) > 0 {\n\t\tresponseHeader.Set(featurePolicyHeader, s.opt.FeaturePolicy)\n\t}\n\n\t// Permissions Policy header.\n\tif len(s.opt.PermissionsPolicy) > 0 {\n\t\tresponseHeader.Set(permissionsPolicyHeader, s.opt.PermissionsPolicy)\n\t}\n\n\t// Cross Origin Opener Policy header.\n\tif len(s.opt.CrossOriginOpenerPolicy) > 0 {\n\t\tresponseHeader.Set(coopHeader, s.opt.CrossOriginOpenerPolicy)\n\t}\n\n\t// Expect-CT header.\n\tif len(s.opt.ExpectCTHeader) > 0 {\n\t\tresponseHeader.Set(expectCTHeader, s.opt.ExpectCTHeader)\n\t}\n\n\treturn responseHeader, r, nil\n}", "title": "" }, { "docid": "04c2cd48080050881a4c064f10513b9f", "score": "0.53429264", "text": "func (h *HTTPHandler) performGetRequest(ctx context.Context, u *url.URL) (html string, err error) {\n\treq, err := http.NewRequestWithContext(ctx, \"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"error while creating HTTP request\")\n\t}\n\n\tresp, err := h.HTTPClient.Do(req)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"error while performing HTTP request\")\n\t}\n\tdefer func() { _ = resp.Body.Close() }()\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn \"\", errors.New(\"could not get a response from url\")\n\t}\n\n\tt := resp.Header.Get(\"Content-Type\")\n\tif !strings.HasPrefix(t, \"text/html\") {\n\t\treturn \"\", errors.New(\"response content type wasn't text/html\")\n\t}\n\n\tb, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"could not read the response body\")\n\t}\n\n\treturn string(b), nil\n}", "title": "" }, { "docid": "f2b4f8390e23519063370e775e4ce380", "score": "0.53408986", "text": "func (m *Handler) getCertificate(w http.ResponseWriter, r *http.Request, p httprouter.Params, context *AuthContext) (interface{}, error) {\n\tcert, err := context.Operator.GetClusterCertificate(ops.SiteKey{\n\t\tAccountID: context.User.GetAccountID(),\n\t\tSiteDomain: p[0].Value,\n\t}, false)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tinfo, err := utils.ParseCertificate(cert.Certificate)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn info, nil\n}", "title": "" }, { "docid": "31cfb656f37fd4b2492e4eb51c7fc6f5", "score": "0.533533", "text": "func request(uri string) (string, int, error) {\n\tclient := &http.Client{\n\t\tTimeout: time.Duration(OPTIONS.Timeout) * time.Second}\n\tHttptransport := &http.Transport{}\n\tif OPTIONS.Proxy != \"\" {\n\t\tproxy, er := url.Parse(OPTIONS.Proxy)\n\t\tif er != nil {\n\t\t\treturn \"\", 0, er\n\t\t}\n\t\tHttptransport.Proxy = http.ProxyURL(proxy)\n\t}\n\tif OPTIONS.IgnoreInvalidSSL == true {\n\t\tHttptransport.TLSClientConfig = &tls.Config{InsecureSkipVerify: true}\n\t}\n\tclient = &http.Client{Transport: Httptransport}\n\treq, er := http.NewRequest(\"GET\", trim(uri), nil)\n\tif er != nil {\n\t\treturn \"\", 0, er\n\t}\n\theaders := strings.Split(trim(VIEWS_OBJ[\"HEADERS\"].Buffer()), \"\\n\")\n\tfor _, v := range headers {\n\t\tkv := strings.Split(v, \": \")\n\t\tkv[0] = strings.Replace(kv[0], \" \", \"\", -1)\n\t\treq.Header.Set(kv[0], kv[1])\n\t}\n\tresp, er := client.Do(req)\n\tif er != nil {\n\t\treturn \"\", 0, er\n\t}\n\tdefer resp.Body.Close()\n\tBody, er := ioutil.ReadAll(resp.Body)\n\tif er != nil {\n\t\treturn \"\", 0, er\n\t}\n\treturn string(Body), resp.StatusCode, er\n}", "title": "" }, { "docid": "0d2fd357c56d9f8e21b1711df6ce4d09", "score": "0.53324544", "text": "func makeGetUnCertifyInfoHandler(m *mux.Router, endpoints endpoint.Endpoints, options []http.ServerOption) {\n\tm.Methods(\"GET\").Path(\"/api/certs/{userId:[a-zA-Z0-9_-]+}\").Handler(handlers.CORS(handlers.AllowedMethods([]string{\"GET\"}), handlers.AllowedOrigins([]string{\"*\"}))(http.NewServer(endpoints.GetUnCertifyInfoEndpoint, decodeGetUnCertifyInfoRequest, encodeGetUnCertifyInfoResponse, options...)))\n}", "title": "" }, { "docid": "457d41e4c3ca6d8596318611808f11f2", "score": "0.5329268", "text": "func (client *AppServiceCertificateOrdersClient) getCertificateHandleResponse(resp *http.Response) (AppServiceCertificateOrdersGetCertificateResponse, error) {\n\tresult := AppServiceCertificateOrdersGetCertificateResponse{RawResponse: resp}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.AppServiceCertificateResource); err != nil {\n\t\treturn AppServiceCertificateOrdersGetCertificateResponse{}, runtime.NewResponseError(err, resp)\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "a7d8441253c3d36c5531f976bb8e22eb", "score": "0.53248984", "text": "func doRequest(url string, response interface{}) string {\n\tclient := &http.Client{}\n\tvar err error\n\trequest, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\trequest.SetBasicAuth(\"apiToken\", KanbanflowAPIKey)\n\tresp, err := client.Do(request)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tif response == nil {\n\t\tbody, readErr := ioutil.ReadAll(resp.Body)\n\t\tif readErr != nil {\n\t\t\tpanic(readErr)\n\t\t}\n\t\treturn string(body)\n\t}\n\n\terr = json.NewDecoder(resp.Body).Decode(response)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "586a9c407b08d59ad27dc4ba4a2c61a3", "score": "0.5321109", "text": "func getRequest(ctx context.Context, req *http.Request, request common.Validator) (context.Context, error, errorhandler.ErrorHandler) {\n\tvar err error\n\tctx, err = validateRequest(ctx, req, request)\n\tif err != nil {\n\t\treturn ctx, err, errorhandler.AuthenticationErr\n\t}\n\n\treqBody, err := ioutil.ReadAll(req.Body)\n\n\t//Hack. TODO : Find a way to deserialize the request into struct in GET request\n\tif req.Method == http.MethodGet {\n\t\treqBody = []byte(getParam(req.URL.Query()))\n\t}\n\n\tif err != nil {\n\t\tlogger.Error(ctx, err.Error())\n\t\treturn ctx, err, errorhandler.RequestErr\n\t}\n\n\tlogger.Info(ctx, fmt.Sprintf(\"Request body : %s\", string(reqBody)))\n\tctx = context.WithValue(ctx, constants.RequestData, string(reqBody))\n\terr = json.Unmarshal(reqBody, request)\n\tif err != nil {\n\t\tlogger.Error(ctx, err.Error())\n\t\treturn ctx, err, errorhandler.RequestErr\n\t}\n\n\terr = request.Validate()\n\tif err != nil {\n\t\tlogger.Error(ctx, err.Error())\n\t\treturn ctx, err, errorhandler.ValidationErr\n\t}\n\n\t//Add book keeping entries only for Asynchronous processor\n\tif _, ok := request.(common.Asynchronous); ok {\n\t\tif err = impl.BookKeeping.Create(ctx, \"Scheduled\"); err != nil {\n\t\t\treturn ctx, err, errorhandler.ServerErr\n\t\t}\n\t}\n\n\treturn ctx, nil, nil\n}", "title": "" }, { "docid": "918858cac8795aa60df6c0c99206348b", "score": "0.53169465", "text": "func httpRequestHandler(w http.ResponseWriter, req *http.Request) {\t\n\tlog.Printf(\"received the http request from : %s\", req.URL.String())\n\t\n\t//check if we blocked this address\n\tfor blockedURL, isBlocked := range blockedURLs {\n\t\tif strings.Contains(req.URL.String(), blockedURL) && isBlocked {\n\t\t\tw.WriteHeader(http.StatusLocked)\n\t\t\tlog.Printf(\"Request blocked according to administrator policy.\")\n\t\t\treturn\n\t\t}\t\n\t}\n\tclient := &http.Client{}\t\n\turl := req.URL\n url.Host = req.Host\n url.Scheme = \"http\"\n \n // take response from cache the response and send to client, if it's not expired and us there\n cachedResp, exists := httpCache[req.URL.String()]\n if exists {\n \tvar unformattedDate string\n \tvar maxAge int\n \tvar err error\n \tfor head, values := range cachedResp.response.Header {\n\t\t\tif head == \"Cache-Control\" {\n\t\t\t\tfor _, value := range values {\n\t\t\t\t\tif strings.Contains(value, \"max-age\") {\n\t\t\t\t\t\tnewVal := strings.Split(value, \",\") //safety guard for wrongly parsed/constructed headers\n\t\t\t\t\t\tvalue = newVal[0]\n\t\t\t\t\t\tmaxAge, err = strconv.Atoi(value[8:])\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlog.Fatalf(\"Failed converting max-age value to integer: %v\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t} else if head == \"Date\" {\n\t\t\t\tunformattedDate = values[0]\n\t\t\t}\n\t\t}\n \tformattedDate, err := time.Parse(dateFormat, unformattedDate)\n \tif err != nil {\n \t\tlog.Fatalf(\"Failed formatting Date from header into variable: %v\", err)\n \t}\n \texpiryTime := formattedDate.Add(time.Duration(maxAge)*time.Second)\n \tif expiryTime.After(time.Now()){\n\t\t\tcachedBody := cachedResp.responseBody\n\t\t if err != nil {\n\t\t http.Error(w, err.Error(), http.StatusInternalServerError)\n\t\t return\n\t\t }\n\t\t log.Printf(\"Read the cached body\")\n\t\t\tfor head, values := range cachedResp.response.Header {\n\t\t\t\tfor _, value := range values {\n\t\t\t\tw.Header().Add(head, value)\n\t\t\t\t}\n\t\t\t}\n\t\t\tw.Write(cachedBody)\n\t\t\tlog.Printf(\"Supplied cached response\")\n\t\t\treturn\n \t} else {\n \t\tlog.Printf(\"Response timed out, fetching new one\")\n \t}\n }\n\t \n\t// clone and forward\n\tproxyReq, err := http.NewRequest(req.Method, url.String(), req.Body)\n\tif err != nil {\n\t\tlog.Print(err)\n\t}\n\tproxyReq.Header = req.Header\n\tresp, err := client.Do(proxyReq)\n\tif err != nil {\n\t\tlog.Printf(\"Error sending forwarding request %v\",err)\n\t}\n\tlog.Printf(\"forwarded the request and received the response\")\t\n\t\n\tbody, err := ioutil.ReadAll(resp.Body)\n if err != nil {\n http.Error(w, err.Error(), http.StatusInternalServerError)\n return\n }\n\t\n\t//conditionally cache the response\n\tcanCache := true\n\tfor head, values := range resp.Header {\n\t\tif head == \"Cache-Control\" {\n\t\t\tfor _, value := range values {\n\t\t\t\tif value == \"no-cache\" || value == \"no-store\" || value == \"private\" {\n\t\t\t\t\tcanCache = false\n\t\t\t\t\tlog.Printf(\"Response not cache-able\")\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif canCache {\n\t\ttoCache := cachedResponse{\n\t\t\tresponse : resp,\n\t\t\tresponseBody : body,\n\t\t}\n\t\thttpCache[req.URL.String()] = toCache\n\t\tlog.Printf(\"Response cached\")\n\t}\n\t\n\t// clone the response and send to client\n defer resp.Body.Close()\n log.Printf(\"Read the body\")\n\tfor head, values := range resp.Header {\n\t\tfor _, value := range values {\n\t\t\tw.Header().Add(head, value)\n\t\t}\n\t}\n\tw.Write(body)\n\tlog.Printf(\"Finished cloning\")\t\t\n}", "title": "" }, { "docid": "0a8bf14f0a0f0896155d32fb13cb3a75", "score": "0.5316561", "text": "func HttpGetTicketHelloID(hostname string, addr string, helloID tls.ClientHelloID) (*http.Response, error) {\n\tconfig := tls.Config{ServerName: hostname}\n\tdialConn, err := net.DialTimeout(\"tcp\", addr, dialTimeout)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"net.DialTimeout error: %+v\", err)\n\t}\n\tuTlsConn := tls.UClient(dialConn, &config, helloID)\n\tdefer uTlsConn.Close()\n\n\tmasterSecret := make([]byte, 48)\n\tcopy(masterSecret, []byte(\"masterSecret is NOT sent over the wire\")) // you may use it for real security\n\n\t// Create a session ticket that wasn't actually issued by the server.\n\tsessionState := tls.MakeClientSessionState(sessionTicket, uint16(tls.VersionTLS12),\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\tmasterSecret,\n\t\tnil, nil)\n\n\tuTlsConn.SetSessionState(sessionState)\n\terr = uTlsConn.Handshake()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"uTlsConn.Handshake() error: %+v\", err)\n\t}\n\n\tfmt.Println(\"#> This is how client hello with session ticket looked:\")\n\tfmt.Print(hex.Dump(uTlsConn.HandshakeState.Hello.Raw))\n\n\treturn httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)\n}", "title": "" }, { "docid": "fa13ab0f055b58a20b812c820a8e0a0b", "score": "0.53135985", "text": "func (c *controller) doSigningRequest(request *SigningRequest) (*SigningResponse, error) {\n\t// @check if this a authenticated request\n\tauth := c.config.EndpointToken != \"\"\n\n\tvar url string\n\tvar body interface{}\n\tswitch auth {\n\tcase false:\n\t\turl = fmt.Sprintf(\"%s/api/v1/cfssl/sign\", c.config.EndpointURL)\n\t\tbody = request\n\tdefault:\n\t\turl = fmt.Sprintf(\"%s/api/v1/cfssl/authsign\", c.config.EndpointURL)\n\t\tbody = &AuthSigningRequest{Token: c.config.EndpointToken, Request: request}\n\t}\n\n\t// @step: marshal the json pay load\n\tencoded, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// @step: construct the http request\n\treq, err := http.NewRequest(http.MethodPost, url, bytes.NewBuffer(encoded))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// @step: perform the actual request and decode the response\n\tresp, err := c.client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcontent, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &SigningResponse{}\n\tif err := json.Unmarshal(content, response); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "0700036308b89c0bddb1d0e6f56a9b55", "score": "0.53100383", "text": "func HandleApplyLicenseGet(c *gin.Context) {\n\tlog.Root.Info(\"HandleApplyLicenseGet BEGIN\")\n\n\tmacBase64 := c.Query(\"mac\")\n\tmac, err := base64.StdEncoding.DecodeString(macBase64)\n\tif err != nil {\n\t\tlog.Root.Error(\"Decode mac address base64 failed. MAC address: %v\", macBase64)\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"err\": errcode.ErrParams.Code,\n\t\t\t\"errMsg\": errcode.ErrParams.String,\n\t\t})\n\t\treturn\n\t}\n\n\t//Authorise mac address\n\tisValid, err := dao.AuthMacAddress(string(mac))\n\tif err != nil {\n\t\tlog.Root.Error(\"Authorise mac address failed. MAC address: %v\", string(mac))\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"err\": errcode.ErrQuery.Code,\n\t\t\t\"errMsg\": errcode.ErrQuery.String,\n\t\t})\n\t\treturn\n\t}\n\n\tif false == isValid {\n\t\tlog.Root.Error(\"Authenticated unpass. MAC address: %v\", string(mac))\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"err\": errcode.ErrPermissionDenied.Code,\n\t\t\t\"errMsg\": errcode.ErrPermissionDenied.String,\n\t\t})\n\t\treturn\n\t}\n\n\t//Encrypt mac\n\tmacEncrypted, err := lib.EncryptByAES([]byte(mac), []byte(env.AESSecretKey), []byte(env.AESSecretIV))\n\tif err != nil {\n\t\tlog.Root.Error(\"Encrypt mac failed. Mac address: %v\", mac)\n\t\tc.JSON(http.StatusOK, gin.H{\n\t\t\t\"err\": errcode.ErrServer.Code,\n\t\t\t\"errMsg\": errcode.ErrServer.String,\n\t\t})\n\t\treturn\n\t}\n\n\tmacEncryptedBase64 := base64.StdEncoding.EncodeToString(macEncrypted)\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"err\": errcode.ErrNoError.Code,\n\t\t\"errMsg\": errcode.ErrNoError.String,\n\t\t\"license\": macEncryptedBase64,\n\t})\n\treturn\n}", "title": "" }, { "docid": "6b0e4a6e5bac66312bd29c9868a7f894", "score": "0.5303441", "text": "func HTTPGet(url, token string, req interface{}) (string, error) {\n\t// Prepend URL\n\turl = fmt.Sprintf(\"http://%s\", url)\n\n\t_, response, err := httpOp(http.MethodGet, url, token, req)\n\treturn response, err\n}", "title": "" }, { "docid": "96cc96c72b9062863b50913af07b39ff", "score": "0.5299856", "text": "func httpGet(url string) {\n fmt.Println(\"Requesting: \" + url)\n request, err := http.NewRequest(\n \"GET\",\n url,\n nil,\n )\n if (err != nil) {\n return\n }\n\n // Iterate over the http requests headers map and add set each.\n for httpHeaderKey, httpHeaderValue := range headers {\n request.Header.Set(httpHeaderKey, httpHeaderValue)\n }\n\n client := &http.Client{\n Timeout: time.Second * 30,\n }\n //Golang will follow 300 redirects be default.\n resp, err := client.Do(request)\n if err != nil {\n return\n }\n defer resp.Body.Close()\n}", "title": "" }, { "docid": "6f227ccdb5afeba8f028fc9d0ac5e5a9", "score": "0.52920485", "text": "func (d *DictionaryServerTransport) Do(req *http.Request) (*http.Response, error) {\n\trawMethod := req.Context().Value(runtime.CtxAPINameKey{})\n\tmethod, ok := rawMethod.(string)\n\tif !ok {\n\t\treturn nil, nonRetriableError{errors.New(\"unable to dispatch request, missing value for CtxAPINameKey\")}\n\t}\n\n\tvar resp *http.Response\n\tvar err error\n\n\tswitch method {\n\tcase \"DictionaryClient.GetArrayEmpty\":\n\t\tresp, err = d.dispatchGetArrayEmpty(req)\n\tcase \"DictionaryClient.GetArrayItemEmpty\":\n\t\tresp, err = d.dispatchGetArrayItemEmpty(req)\n\tcase \"DictionaryClient.GetArrayItemNull\":\n\t\tresp, err = d.dispatchGetArrayItemNull(req)\n\tcase \"DictionaryClient.GetArrayNull\":\n\t\tresp, err = d.dispatchGetArrayNull(req)\n\tcase \"DictionaryClient.GetArrayValid\":\n\t\tresp, err = d.dispatchGetArrayValid(req)\n\tcase \"DictionaryClient.GetBase64URL\":\n\t\tresp, err = d.dispatchGetBase64URL(req)\n\tcase \"DictionaryClient.GetBooleanInvalidNull\":\n\t\tresp, err = d.dispatchGetBooleanInvalidNull(req)\n\tcase \"DictionaryClient.GetBooleanInvalidString\":\n\t\tresp, err = d.dispatchGetBooleanInvalidString(req)\n\tcase \"DictionaryClient.GetBooleanTfft\":\n\t\tresp, err = d.dispatchGetBooleanTfft(req)\n\tcase \"DictionaryClient.GetByteInvalidNull\":\n\t\tresp, err = d.dispatchGetByteInvalidNull(req)\n\tcase \"DictionaryClient.GetByteValid\":\n\t\tresp, err = d.dispatchGetByteValid(req)\n\tcase \"DictionaryClient.GetComplexEmpty\":\n\t\tresp, err = d.dispatchGetComplexEmpty(req)\n\tcase \"DictionaryClient.GetComplexItemEmpty\":\n\t\tresp, err = d.dispatchGetComplexItemEmpty(req)\n\tcase \"DictionaryClient.GetComplexItemNull\":\n\t\tresp, err = d.dispatchGetComplexItemNull(req)\n\tcase \"DictionaryClient.GetComplexNull\":\n\t\tresp, err = d.dispatchGetComplexNull(req)\n\tcase \"DictionaryClient.GetComplexValid\":\n\t\tresp, err = d.dispatchGetComplexValid(req)\n\tcase \"DictionaryClient.GetDateInvalidChars\":\n\t\tresp, err = d.dispatchGetDateInvalidChars(req)\n\tcase \"DictionaryClient.GetDateInvalidNull\":\n\t\tresp, err = d.dispatchGetDateInvalidNull(req)\n\tcase \"DictionaryClient.GetDateTimeInvalidChars\":\n\t\tresp, err = d.dispatchGetDateTimeInvalidChars(req)\n\tcase \"DictionaryClient.GetDateTimeInvalidNull\":\n\t\tresp, err = d.dispatchGetDateTimeInvalidNull(req)\n\tcase \"DictionaryClient.GetDateTimeRFC1123Valid\":\n\t\tresp, err = d.dispatchGetDateTimeRFC1123Valid(req)\n\tcase \"DictionaryClient.GetDateTimeValid\":\n\t\tresp, err = d.dispatchGetDateTimeValid(req)\n\tcase \"DictionaryClient.GetDateValid\":\n\t\tresp, err = d.dispatchGetDateValid(req)\n\tcase \"DictionaryClient.GetDictionaryEmpty\":\n\t\tresp, err = d.dispatchGetDictionaryEmpty(req)\n\tcase \"DictionaryClient.GetDictionaryItemEmpty\":\n\t\tresp, err = d.dispatchGetDictionaryItemEmpty(req)\n\tcase \"DictionaryClient.GetDictionaryItemNull\":\n\t\tresp, err = d.dispatchGetDictionaryItemNull(req)\n\tcase \"DictionaryClient.GetDictionaryNull\":\n\t\tresp, err = d.dispatchGetDictionaryNull(req)\n\tcase \"DictionaryClient.GetDictionaryValid\":\n\t\tresp, err = d.dispatchGetDictionaryValid(req)\n\tcase \"DictionaryClient.GetDoubleInvalidNull\":\n\t\tresp, err = d.dispatchGetDoubleInvalidNull(req)\n\tcase \"DictionaryClient.GetDoubleInvalidString\":\n\t\tresp, err = d.dispatchGetDoubleInvalidString(req)\n\tcase \"DictionaryClient.GetDoubleValid\":\n\t\tresp, err = d.dispatchGetDoubleValid(req)\n\tcase \"DictionaryClient.GetDurationValid\":\n\t\tresp, err = d.dispatchGetDurationValid(req)\n\tcase \"DictionaryClient.GetEmpty\":\n\t\tresp, err = d.dispatchGetEmpty(req)\n\tcase \"DictionaryClient.GetEmptyStringKey\":\n\t\tresp, err = d.dispatchGetEmptyStringKey(req)\n\tcase \"DictionaryClient.GetFloatInvalidNull\":\n\t\tresp, err = d.dispatchGetFloatInvalidNull(req)\n\tcase \"DictionaryClient.GetFloatInvalidString\":\n\t\tresp, err = d.dispatchGetFloatInvalidString(req)\n\tcase \"DictionaryClient.GetFloatValid\":\n\t\tresp, err = d.dispatchGetFloatValid(req)\n\tcase \"DictionaryClient.GetIntInvalidNull\":\n\t\tresp, err = d.dispatchGetIntInvalidNull(req)\n\tcase \"DictionaryClient.GetIntInvalidString\":\n\t\tresp, err = d.dispatchGetIntInvalidString(req)\n\tcase \"DictionaryClient.GetIntegerValid\":\n\t\tresp, err = d.dispatchGetIntegerValid(req)\n\tcase \"DictionaryClient.GetInvalid\":\n\t\tresp, err = d.dispatchGetInvalid(req)\n\tcase \"DictionaryClient.GetLongInvalidNull\":\n\t\tresp, err = d.dispatchGetLongInvalidNull(req)\n\tcase \"DictionaryClient.GetLongInvalidString\":\n\t\tresp, err = d.dispatchGetLongInvalidString(req)\n\tcase \"DictionaryClient.GetLongValid\":\n\t\tresp, err = d.dispatchGetLongValid(req)\n\tcase \"DictionaryClient.GetNull\":\n\t\tresp, err = d.dispatchGetNull(req)\n\tcase \"DictionaryClient.GetNullKey\":\n\t\tresp, err = d.dispatchGetNullKey(req)\n\tcase \"DictionaryClient.GetNullValue\":\n\t\tresp, err = d.dispatchGetNullValue(req)\n\tcase \"DictionaryClient.GetStringValid\":\n\t\tresp, err = d.dispatchGetStringValid(req)\n\tcase \"DictionaryClient.GetStringWithInvalid\":\n\t\tresp, err = d.dispatchGetStringWithInvalid(req)\n\tcase \"DictionaryClient.GetStringWithNull\":\n\t\tresp, err = d.dispatchGetStringWithNull(req)\n\tcase \"DictionaryClient.PutArrayValid\":\n\t\tresp, err = d.dispatchPutArrayValid(req)\n\tcase \"DictionaryClient.PutBooleanTfft\":\n\t\tresp, err = d.dispatchPutBooleanTfft(req)\n\tcase \"DictionaryClient.PutByteValid\":\n\t\tresp, err = d.dispatchPutByteValid(req)\n\tcase \"DictionaryClient.PutComplexValid\":\n\t\tresp, err = d.dispatchPutComplexValid(req)\n\tcase \"DictionaryClient.PutDateTimeRFC1123Valid\":\n\t\tresp, err = d.dispatchPutDateTimeRFC1123Valid(req)\n\tcase \"DictionaryClient.PutDateTimeValid\":\n\t\tresp, err = d.dispatchPutDateTimeValid(req)\n\tcase \"DictionaryClient.PutDateValid\":\n\t\tresp, err = d.dispatchPutDateValid(req)\n\tcase \"DictionaryClient.PutDictionaryValid\":\n\t\tresp, err = d.dispatchPutDictionaryValid(req)\n\tcase \"DictionaryClient.PutDoubleValid\":\n\t\tresp, err = d.dispatchPutDoubleValid(req)\n\tcase \"DictionaryClient.PutDurationValid\":\n\t\tresp, err = d.dispatchPutDurationValid(req)\n\tcase \"DictionaryClient.PutEmpty\":\n\t\tresp, err = d.dispatchPutEmpty(req)\n\tcase \"DictionaryClient.PutFloatValid\":\n\t\tresp, err = d.dispatchPutFloatValid(req)\n\tcase \"DictionaryClient.PutIntegerValid\":\n\t\tresp, err = d.dispatchPutIntegerValid(req)\n\tcase \"DictionaryClient.PutLongValid\":\n\t\tresp, err = d.dispatchPutLongValid(req)\n\tcase \"DictionaryClient.PutStringValid\":\n\t\tresp, err = d.dispatchPutStringValid(req)\n\tdefault:\n\t\terr = fmt.Errorf(\"unhandled API %s\", method)\n\t}\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "a6de22eac69c566e3dd0aa7b82767e97", "score": "0.5289835", "text": "func MakeGetCallAndReturnResponse(url string, headers map[string]string, queryParams map[string]string) (output []byte, err error) {\n\tlog.Debug(\"Starting MakeGetCallAndReturnResponse\")\n\tlog.Trace(\"url = \", url)\n\tclient := http.Client{\n\t\tTransport: &http.Transport{\n\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\tInsecureSkipVerify: true,\n\t\t\t},\n\t\t},\n\t}\n\n\trequest, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\tlog.Error(\"Error in creating get request \" + err.Error())\n\t\treturn nil, errors.Wrap(err, \"Error in creating get request \")\n\t}\n\n\tlog.Trace(\"queryParams : \", queryParams)\n\tq := request.URL.Query()\n\tfor key, value := range queryParams {\n\t\tq.Add(key, value)\n\t}\n\trequest.URL.RawQuery = q.Encode()\n\n\t// log.Trace(\"headers : \", headers)\n\tfor key, value := range headers {\n\t\trequest.Header.Add(key, value)\n\t}\n\n\tresponse, err := client.Do(request)\n\tif err != nil {\n\t\tlog.Error(\"Error in making http request : \" + err.Error())\n\t\treturn nil, errors.Wrap(err, \"Error in making http request \")\n\t} else if !(response.StatusCode >= 200 && response.StatusCode <= 299) {\n\t\tlog.Error(\"Status : \", response.Status)\n\t\treturn nil, errors.New(\"Status: \" + response.Status)\n\t}\n\n\tdefer response.Body.Close()\n\n\tbody, err := ioutil.ReadAll(response.Body)\n\tlog.Trace(\"body : \", string(body))\n\tif err != nil || len(body) <= 0 {\n\t\tlog.Error(\"Error in reading the response : \" + err.Error())\n\t\treturn nil, errors.Wrap(err, \"Error in reading the response\")\n\t}\n\toutput = body\n\tlog.Debug(\"Finished MakeGetCallAndReturnResponse\")\n\treturn\n}", "title": "" }, { "docid": "1b3f9f3932f44a350326aa824b003746", "score": "0.5283554", "text": "func httpGet(url_, user, pass string) (*http.Response, error) {\n\tvar r *http.Response\n\tvar err error\n\n\tif user != \"\" && pass != \"\" {\n\t\tr, err = authGet(url_, user, pass)\n\t} else {\n\t\tr, err = http.Get(url_)\n\t}\n\n\treturn r, err\n}", "title": "" }, { "docid": "9e0326494b60f93532c5710b7305a0ab", "score": "0.52789176", "text": "func (c C) CtxGet(ctx context.Context, url string) (*http.Response, error) {\n\treturn c.do(ctx, url, http.MethodGet, \"\", nil)\n}", "title": "" }, { "docid": "157d0834a9609752051a68b03810fae7", "score": "0.5277346", "text": "func (m *httpsRequestModifier) ModifyRequest(req *http.Request) error {\n\tvar (\n\t\troots *x509.CertPool\n\t\tcerts []tls.Certificate\n\t\thostDir string\n\t)\n\n\tif req.URL.Scheme == \"https\" {\n\t\thasFile := func(files []os.FileInfo, name string) bool {\n\t\t\tfor _, f := range files {\n\t\t\t\tif f.Name() == name {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn false\n\t\t}\n\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\thostDir = path.Join(os.TempDir(), \"/docker/certs.d\", req.URL.Host)\n\t\t} else {\n\t\t\thostDir = path.Join(\"/etc/docker/certs.d\", req.URL.Host)\n\t\t}\n\t\tlogrus.Debugf(\"hostDir: %s\", hostDir)\n\t\tfs, err := ioutil.ReadDir(hostDir)\n\t\tif err != nil && !os.IsNotExist(err) {\n\t\t\treturn nil\n\t\t}\n\n\t\tfor _, f := range fs {\n\t\t\tif strings.HasSuffix(f.Name(), \".crt\") {\n\t\t\t\tif roots == nil {\n\t\t\t\t\troots = x509.NewCertPool()\n\t\t\t\t}\n\t\t\t\tlogrus.Debugf(\"crt: %s\", hostDir+\"/\"+f.Name())\n\t\t\t\tdata, err := ioutil.ReadFile(filepath.Join(hostDir, f.Name()))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\troots.AppendCertsFromPEM(data)\n\t\t\t}\n\t\t\tif strings.HasSuffix(f.Name(), \".cert\") {\n\t\t\t\tcertName := f.Name()\n\t\t\t\tkeyName := certName[:len(certName)-5] + \".key\"\n\t\t\t\tlogrus.Debugf(\"cert: %s\", hostDir+\"/\"+f.Name())\n\t\t\t\tif !hasFile(fs, keyName) {\n\t\t\t\t\treturn fmt.Errorf(\"Missing key %s for certificate %s\", keyName, certName)\n\t\t\t\t}\n\t\t\t\tcert, err := tls.LoadX509KeyPair(filepath.Join(hostDir, certName), path.Join(hostDir, keyName))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tcerts = append(certs, cert)\n\t\t\t}\n\t\t\tif strings.HasSuffix(f.Name(), \".key\") {\n\t\t\t\tkeyName := f.Name()\n\t\t\t\tcertName := keyName[:len(keyName)-4] + \".cert\"\n\t\t\t\tlogrus.Debugf(\"key: %s\", hostDir+\"/\"+f.Name())\n\t\t\t\tif !hasFile(fs, certName) {\n\t\t\t\t\treturn fmt.Errorf(\"Missing certificate %s for key %s\", certName, keyName)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tm.mu.Lock()\n\t\tm.tlsConfig.RootCAs = roots\n\t\tm.tlsConfig.Certificates = certs\n\t\tm.mu.Unlock()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "979799bcc5f82bff02bf9e12ac6d6d3d", "score": "0.52621406", "text": "func HTTPGet(ctx context.Context, addr string) error {\n\tif !strings.HasPrefix(addr, \"http://\") {\n\t\taddr = fmt.Sprintf(\"http://%s\", addr)\n\t}\n\n\tr, err := http.NewRequest(http.MethodGet, addr, nil) // nolint:gosec\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tr = r.WithContext(ctx)\n\n\tres, err := http.DefaultClient.Do(r)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer func() {\n\t\t_ = res.Body.Close()\n\t}()\n\n\tif res.StatusCode >= http.StatusBadRequest {\n\t\treturn fmt.Errorf(\"unexpected response code: %d\", res.StatusCode)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3e1cf9805303dfb48ccef686262f499d", "score": "0.5257175", "text": "func getRequest(handler http.Handler, target string) (int, http.Header, string) {\n\treturn request(handler, http.MethodGet, target, nil, \"\")\n}", "title": "" }, { "docid": "72141a2972f8a00bca78a2002dfc486f", "score": "0.52536523", "text": "func HttpGETAuthenticated(url string, password string) (resp *http.Response, err error) {\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"User-Agent\", \"Sia-Agent\")\n\treq.SetBasicAuth(\"\", password)\n\treturn new(http.Client).Do(req)\n}", "title": "" }, { "docid": "44bb5fe7ac145637ef69d6c90e477986", "score": "0.5236002", "text": "func (c *Client) getRequest(requestURL string) (response StandardResponse, err error) {\r\n\r\n\t// Set the user agent\r\n\treq := c.Resty.R().SetHeader(\"User-Agent\", c.Options.UserAgent)\r\n\r\n\t// Enable tracing\r\n\tif c.Options.RequestTracing {\r\n\t\treq.EnableTrace()\r\n\t}\r\n\r\n\t// Fire the request\r\n\tvar resp *resty.Response\r\n\tif resp, err = req.Get(requestURL); err != nil {\r\n\t\treturn\r\n\t}\r\n\r\n\t// Tracing enabled?\r\n\tif c.Options.RequestTracing {\r\n\t\tresponse.Tracing = resp.Request.TraceInfo()\r\n\t}\r\n\r\n\t// Set the status code\r\n\tresponse.StatusCode = resp.StatusCode()\r\n\r\n\t// Set the body\r\n\tresponse.Body = resp.Body()\r\n\r\n\treturn\r\n}", "title": "" }, { "docid": "d65632f7bc990419ad4bf23929301db2", "score": "0.52336645", "text": "func DoGETWithoutTLS(url string, body map[string]string, headers map[string]string) ([]byte, int, errors.Error) {\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true},\n\t}\n\treturn doRead(http.MethodGet, url, body, headers, tr)\n}", "title": "" }, { "docid": "22d02cf83240181bf31d40f8dad3d834", "score": "0.5225954", "text": "func (alipay *Alipay) DoHttpGet(targetUrl string) ([]byte, error) {\n\t//req.Header.Add(\"Content-type\", \"application/x-www-form-urlencoded;charset=UTF-8\")\n\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: false},\n\t}\n\tclient := &http.Client{Transport: tr}\n\n\tresp, err := client.Get(targetUrl)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdefer resp.Body.Close()\n\trespData, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn respData, err\n}", "title": "" }, { "docid": "adf3da5cea83c18011a7d7e5407d6b13", "score": "0.5218501", "text": "func GenericHTTPRequest(requestType string, jsonPayloadStr string, url string, headers map[string]string) (responseBody string, httpResponseCode int, httpResponse *http.Response, err error) {\n\tvar req *http.Request\n\tvar errorMessage string\n\tvar payload *bytes.Buffer\n\thttpResponseCode = -1\n\tdebugMessage := \"\"\n\tresponseBody = \"\"\n\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tdebugMessage = fmt.Sprintf(\"MakeHTTPRequest : Recovered in f : %v\", r)\n\t\t\tfmt.Println(debugMessage)\n\t\t\t// find out exactly what the error was and set err\n\t\t\tswitch x := r.(type) {\n\t\t\tcase string:\n\t\t\t\terr = errors.New(x)\n\t\t\tcase error:\n\t\t\t\terr = x\n\t\t\tdefault:\n\t\t\t\terr = errors.New(\"defer : unknown panic in MakeHTTPRequest\")\n\t\t\t}\n\t\t}\n\t}()\n\n\tdebugMessage = fmt.Sprintf(\"MakeHTTPRequest: requestType: (%v) , jsonPayloadStr: (%v) , url: (%v) , headers: (%v)\", requestType, jsonPayloadStr, url, headers)\n\tfmt.Println(debugMessage)\n\n\ttr := &http.Transport{\n\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true},\n\t\tDial: (&net.Dialer{\n\t\t\tTimeout: 0,\n\t\t\tKeepAlive: 0,\n\t\t}).Dial,\n\t\tTLSHandshakeTimeout: 10 * time.Second,\n\t}\n\n\tif jsonPayloadStr != \"\" {\n\t\tpayloadBytes := []byte(jsonPayloadStr)\n\t\tpayload = bytes.NewBuffer(payloadBytes)\n\t} else {\n\t\tpayload = nil\n\t}\n\n\treq, err = http.NewRequest(requestType, url, payload)\n\tif err != nil {\n\t\terrorMessage = fmt.Sprintf(\"ERROR : Could not form a new HTTP Request : %v\", err.Error())\n\t\tfmt.Println(errorMessage)\n\t\treturn responseBody, httpResponseCode, nil, errors.New(errorMessage)\n\t}\n\n\tif len(headers) != 0 {\n\t\tfor key, value := range headers {\n\t\t\treq.Header.Set(key, value)\n\t\t}\n\t}\n\n\treq.Header.Set(\"Connection\", \"close\")\n\n\tclient := &http.Client{Transport: tr}\n\n\thttpResponse, err = client.Do(req)\n\tif err != nil {\n\t\terrorMessage = fmt.Sprintf(\"ERROR : Making HTTP Request : %v\", err.Error())\n\t\tfmt.Println(errorMessage)\n\t\treturn responseBody, httpResponseCode, nil, errors.New(errorMessage)\n\t}\n\tdefer func() {\n\t\t_ = httpResponse.Body.Close()\n\t}()\n\n\tbody, err := ioutil.ReadAll(httpResponse.Body)\n\tif err != nil {\n\t\terrorMessage = fmt.Sprintf(\"ERROR : Reading data from HTTP Request : %v\", err.Error())\n\t\tfmt.Println(errorMessage)\n\t\treturn responseBody, httpResponseCode, nil, errors.New(errorMessage)\n\t}\n\n\thttpResponseCode = httpResponse.StatusCode\n\t// convert body to string\n\tresponseBody = string(body)\n\treturn responseBody, httpResponseCode, httpResponse, nil\n}", "title": "" }, { "docid": "ab5a46fa6248284e1566309b66443640", "score": "0.52119386", "text": "func (client *Client) setupHttpRequest(req *request) (*http.Request, error) {\n\t// Copy so that signing the http request will not mutate it\n\n\tu, err := req.url()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu.Opaque = fmt.Sprintf(\"//%s%s\", u.Host, partiallyEscapedPath(u.Path))\n\tif client.Debug {\n\t\tlog.Printf(\"setupHttpRequest path:%v, opaque:%v\", u.Path, u.Opaque)\n\t}\n\tu.Host = client.GetHost(req.bucket)\n\n\threq := http.Request{\n\t\tURL: u,\n\t\tMethod: req.method,\n\t\tProtoMajor: 1,\n\t\tProtoMinor: 1,\n\t\tClose: true,\n\t\tHeader: req.headers,\n\t\tForm: req.params,\n\t}\n\n\tcontentLength := req.headers.Get(\"Content-Length\")\n\n\tif contentLength != \"\" {\n\t\threq.ContentLength, _ = strconv.ParseInt(contentLength, 10, 64)\n\t\treq.headers.Del(\"Content-Length\")\n\t}\n\n\tif req.payload != nil {\n\t\threq.Body = ioutil.NopCloser(req.payload)\n\t}\n\n\treturn &hreq, nil\n}", "title": "" }, { "docid": "b9add30b53e9ce7c2fa20a1479da481e", "score": "0.51993203", "text": "func (rh *RequestHandlers) Get(req *GetRequest, resp *GetResponse) error {\n\tlogger.Infof(\"Handling intrnal request Get(%s)\", req.Key)\n\n\tvalue, err := rh.kvs.Get(req.Key)\n\tresp.Node = rh.kvs.address\n\tif err != nil {\n\t\tresp.Ok = false\n\t\tresp.Message = err.Error()\n\t\treturn nil\n\t}\n\n\tresp.Ok = true\n\tresp.Key = req.Key\n\tresp.Value = *value\n\treturn nil\n}", "title": "" }, { "docid": "5b1e0a86f2e8baf5f88c6070de3723e8", "score": "0.51973045", "text": "func HandleGet(w http.ResponseWriter, req *http.Request) {\n\t// record current time for exit3\n\tstart := time.Now()\n\n\t//handle get\n\t//step1. get \"GET\" request id.\n\t//step2. start tracking this request's state\n\tids, ok := req.URL.Query()[\"id\"]\n\tif !ok {\n\t\tLogger.Error(\"Handle Get Url Param 'key' is missing\")\n\t\treturn\n\t}\n\tid := ids[0]\n\tmemberIDs, ok := req.URL.Query()[\"memberID\"]\n\tif !ok {\n\t\tLogger.Error(\"Handle PUT Url Param 'key' is missing\")\n\t\treturn\n\t}\n\tmemberID := memberIDs[0]\n\t//Write2Shell(\"Master receive GET request id: \" + fmt.Sprintf(\"%v\", id))\n\n\t//step3. get \"GET\" request file name\n\tfile, ok := req.URL.Query()[\"file\"]\n\tif !ok {\n\t\tLogger.Error(\"Get IPs Url Param 'key' is missing\")\n\t\treturn\n\t}\n\tfilename := file[0]\n\t//Write2Shell(\"Master receive GET request for file: \" + filename)\n\n\t//step4. handle reader and writer logic\n\t//if we cannot read now, we stop here and wait for permission\n\t//Write2Shell(\"STEP4\")\n\t//Write2Shell(\"Writer count: \" + fmt.Sprint(WriteCounter))\n\t//Write2Shell(\"Reader count: \" + fmt.Sprint(ReadCounter))\n\tfor {\n\t\tMR.Lock()\n\t\tMW.Lock()\n\t\tif WriteCounter == 0 {\n\t\t\tReadCounter++\n\t\t\t//Write2Shell(\"Reader count for loop: \" + fmt.Sprint(ReadCounter))\n\t\t\tMW.Unlock()\n\t\t\tMR.Unlock()\n\t\t\tbreak\n\t\t}\n\t\tMW.Unlock()\n\t\tMR.Unlock()\n\t}\n\tCM.Lock()\n\tClientMap[id] = \"Get\"\n\tCM.Unlock()\n\t//Write2Shell(\"Now Approve This Read id: \" + fmt.Sprintf(\"%v\", id))\n\n\t//Write2Shell(\"STEP5\")\n\t//step5. send ips back to client\n\tvar res []byte\n\tvar err error\n\tif val, ok := File2VmMap[filename]; ok {\n\t\tres, err = json.Marshal(val)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\t// print ips\n\t\t//Write2Shell(\"Master sends IPS: \" + string(res))\n\t} else {\n\t\tres = []byte(\"[]\")\n\t\tWrite2Shell(\"File does not exist\")\n\t}\n\tw.Write(res)\n\t//Write2Shell(\"FinishWriteIPS\")\n\t//step6. master wait ACK from client\n\t//exit 1: receive \"Done\" -> get success\n\t//exit 2: receive \"Bad\" -> get fail\n\t//exit 3: timer timeout\t -> timeout\n\t//Question local variable?\n\tgo func() {\n\t\t//Write2Shell(\"Now waiting ACK from id: \" + fmt.Sprintf(\"%v\", id))\n\t\tfor {\n\t\t\tCM.Lock()\n\t\t\tif ClientMap[id] == \"Done\" {\n\t\t\t\t//Write2Shell(\"Get success ACK from id: \" + fmt.Sprintf(\"%v\", id))\n\t\t\t\tw.Write([]byte(\"OK\"))\n\t\t\t\t//change readcounter to 0\n\t\t\t\tMR.Lock()\n\t\t\t\tReadCounter--\n\t\t\t\t//Write2Shell(\"Reader count: \" + fmt.Sprint(ReadCounter))\n\t\t\t\tMR.Unlock()\n\t\t\t\tCM.Unlock()\n\t\t\t\tbreak\n\t\t\t} else if ClientMap[id] == \"Bad\" {\n\t\t\t\t//Write2Shell(\"Get fail ACK from id: \" + fmt.Sprintf(\"%v\", id))\n\t\t\t\tw.Write([]byte(\"Bad\"))\n\t\t\t\t//change readcounter to 0\n\t\t\t\tMR.Lock()\n\t\t\t\tReadCounter--\n\t\t\t\t//Write2Shell(\"Reader count: \" + fmt.Sprint(ReadCounter))\n\t\t\t\tMR.Unlock()\n\t\t\t\tCM.Unlock()\n\t\t\t\tbreak\n\t\t\t} else if _, ok := FailedNodes[memberID]; ok{ // the client ip has failed\n\t\t\t\t//Write2Shell(\"exit for failednodes: \" + memberID)\n\t\t\t\tw.Write([]byte(\"Bad\"))\n\t\t\t\t//change readcounter to 0\n\t\t\t\tMR.Lock()\n\t\t\t\tReadCounter--\n\t\t\t\t//Write2Shell(\"Reader count: \" + fmt.Sprint(ReadCounter))\n\t\t\t\tMR.Unlock()\n\t\t\t\tCM.Unlock()\n\t\t\t\tbreak\n\t\t\t} else if elapsed := time.Now().Sub(start); elapsed > MasterGetTimeout*time.Second {\n\t\t\t\tWrite2Shell(\"Timeout id: \" + fmt.Sprintf(\"%v\", id))\n\t\t\t\tMR.Lock()\n\t\t\t\tReadCounter--\n\t\t\t\t//Write2Shell(\"Reader count: \" + fmt.Sprint(ReadCounter))\n\t\t\t\tMR.Unlock()\n\t\t\t\tCM.Unlock()\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\t// exit 1 compare time 15 mins\n\t\t\t// exit 2 Question add else if ClientMap[id] == \"Node Fail\" exit\n\t\t\tCM.Unlock()\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "5190a500a2b3d3bd298a2950d55583c6", "score": "0.5192743", "text": "func GetRequest(domains []string) certificate.ObtainRequest {\n\treturn certificate.ObtainRequest{\n\t\tDomains: domains,\n\t\tBundle: true,\n\t}\n}", "title": "" }, { "docid": "a25404a8736b04ea5efa13ae7d367004", "score": "0.51828086", "text": "func (r *request) Do() (resp *http.Response, err error) {\n\tif r.config.AccessKeyID != \"\" && r.config.SecretAccessKey != \"\" {\n\t\tr.SignV4()\n\t}\n\ttransport := http.DefaultTransport\n\tif r.config.Transport != nil {\n\t\ttransport = r.config.Transport\n\t}\n\t// do not use http.Client{}, while it may seem intuitive but the problem seems to be\n\t// that http.Client{} internally follows redirects and there is no easier way to disable\n\t// it from outside using a configuration parameter -\n\t// this auto redirect causes complications in verifying subsequent errors\n\t//\n\t// The best is to use RoundTrip() directly, so the request comes back to the caller where\n\t// we are going to handle such replies. And indeed that is the right thing to do here.\n\t//\n\treturn transport.RoundTrip(r.req)\n}", "title": "" }, { "docid": "a25404a8736b04ea5efa13ae7d367004", "score": "0.51828086", "text": "func (r *request) Do() (resp *http.Response, err error) {\n\tif r.config.AccessKeyID != \"\" && r.config.SecretAccessKey != \"\" {\n\t\tr.SignV4()\n\t}\n\ttransport := http.DefaultTransport\n\tif r.config.Transport != nil {\n\t\ttransport = r.config.Transport\n\t}\n\t// do not use http.Client{}, while it may seem intuitive but the problem seems to be\n\t// that http.Client{} internally follows redirects and there is no easier way to disable\n\t// it from outside using a configuration parameter -\n\t// this auto redirect causes complications in verifying subsequent errors\n\t//\n\t// The best is to use RoundTrip() directly, so the request comes back to the caller where\n\t// we are going to handle such replies. And indeed that is the right thing to do here.\n\t//\n\treturn transport.RoundTrip(r.req)\n}", "title": "" }, { "docid": "8f5f6f15d6157f8b1f7e2811731c5356", "score": "0.51720804", "text": "func (cf CF_c) request (url string, jStr []byte, put []byte) (body []byte, err error) {\n var req *http.Request\n \n if len(jStr) > 0 { //we're posting data\n finalUrl := fmt.Sprintf(\"%s/%s/%s\", cf_base_url, cf.Config.Zone, url)\n cf.superMessage(\"url: \" + finalUrl)\n req, err = http.NewRequest(\"POST\", finalUrl, bytes.NewBuffer(jStr))\n } else if len(put) > 0 { //put request\n finalUrl := fmt.Sprintf(\"%s/%s/%s\", cf_base_url, cf.Config.Zone, url)\n cf.superMessage(\"url: \" + finalUrl)\n req, err = http.NewRequest(\"PUT\", finalUrl, bytes.NewBuffer(put))\n } else { //we're doing a get\n finalUrl := fmt.Sprintf(\"%s/%s/%s\", cf_base_url, cf.Config.Zone, url)\n cf.superMessage(\"url: \" + finalUrl)\n req, err = http.NewRequest(\"GET\", finalUrl, nil)\n }\n \n if err == nil {\n req.Header.Set(\"Content-Type\", \"application/json\")\n req.Header.Set(\"X-Auth-Email\", cf.Config.Email)\n req.Header.Set(\"X-Auth-Key\", cf.Config.APIKey)\n \n client := &http.Client{}\n resp, err := client.Do(req)\n if err == nil {\n defer resp.Body.Close()\n body, _ = ioutil.ReadAll(resp.Body)\n \n if cf.SuperVerbose {\n fmt.Println(\"response Status:\", resp.Status)\n fmt.Println(\"response Headers:\", resp.Header)\n fmt.Println(\"response Body:\", string(body[:]))\n }\n \n if resp.StatusCode >= 300 {\n return nil, fmt.Errorf(\"Response code: %s\", resp.Status)\n }\n } else {\n return nil, err\n }\n }\n \n return\n}", "title": "" }, { "docid": "c7a17ac49a1ba2a66fa32e408ec4c4c7", "score": "0.51683265", "text": "func HTTPRequest(backend Backend, method string, url string, data io.Reader) (http.Client, *http.Request) {\n\tclient := http.Client{Timeout: time.Second * 2}\n\n\treq, reqErr := http.NewRequest(method, url, data)\n\tif reqErr != nil {\n\t\tpanic(reqErr)\n\t}\n\n\ttoken := backend.Token\n\n\treq.Header.Set(\"Accept\", \"application/vnd.pagerduty+json;version=2\")\n\treq.Header.Set(\"Authorization\", \"Token token=\"+token)\n\n\treturn client, req\n}", "title": "" }, { "docid": "b801000be336920fc5d292a0747e125e", "score": "0.51651824", "text": "func (a *Authority) SignHTTP(w http.ResponseWriter, r *http.Request) {\n\tvar (\n\t\tinput = &shapes.SignRequest{}\n\t\tresponse = &shapes.KeyResponse{}\n\t)\n\n\temail, ok := oidcauth.FromContext(r.Context())\n\tif !ok {\n\t\tzap.L().Error(\"Couldn't get email from context: please wrap with oidcauth.OidcEmailContext()\")\n\t\thttp.Error(w, http.StatusText(http.StatusInternalServerError), http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\terr := json.NewDecoder(r.Body).Decode(input)\n\tif err != nil {\n\t\thttp.Error(w, \"Error decoding input\", http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tsignedCert, err := a.CA.Sign(\n\t\tinput.Key,\n\t\temail,\n\t\tinput.Principals,\n\t\ta.Duration,\n\t)\n\tif err != nil {\n\t\tzap.L().Error(\"Error signing request\", zap.Error(err))\n\t\thttp.Error(w, \"Error signing request\", http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tresponse.Certificate = signedCert\n\terr = json.NewEncoder(w).Encode(response)\n\tif err != nil {\n\t\tzap.L().Error(\"Error encoding response\", zap.Error(err))\n\t\thttp.Error(w, \"Error encoding response\", http.StatusInternalServerError)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "dd49d987321b2ed0ce88510e8c03695b", "score": "0.5164565", "text": "func getVaultCertificateRequest(hosts []string, ttl time.Duration) map[string]interface{} {\n\trequest := map[string]interface{}{\n\t\tpkiCommonName: hosts[0],\n\t\tpkiTTL: fmt.Sprintf(\"%fh\", ttl.Hours()),\n\t}\n\tif len(hosts) > 1 {\n\t\trequest[pkiHosts] = strings.Join(hosts[1:], \",\")\n\t}\n\n\treturn request\n}", "title": "" }, { "docid": "52baab5eb297b5275e509a9f7453ed72", "score": "0.5163379", "text": "func HttpGet(g *GetOptions) (w *net.Response, err error) {\n\tif g.Timeout <= 0 {\n\t\tg.Timeout = 2\n\t}\n\n\terrChan := make(chan error)\n\n\tgo func() {\n\t\tdefer func() {\n\t\t\terrChan <- err\n\t\t}()\n\t\tr, err := http.Get(g.Url)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tdefer r.Body.Close()\n\t\tw, err = net.ResponseRecorder(r)\n\t}()\n\n\tselect {\n\tcase err = <-errChan:\n\tcase <-time.After(time.Duration(g.Timeout) * time.Second):\n\t\treturn nil, ERR_REQUEST_TIMEOUT\n\t}\n\treturn w, err\n}", "title": "" }, { "docid": "3503215191b5461ac7ac25d7c0b270c9", "score": "0.5160296", "text": "func MakeAuthRequest(user, pass, authURL string) (resp *http.Response, err error) {\n\tclient := &http.Client{}\n\t//$ curl -i https://auth.selcdn.ru/ \\\n\tr, err := http.NewRequest(\"GET\", authURL, nil)\n\tif err != nil {\n\t\treturn nil, errors.New(\"http.NewRequest error: \" + err.Error())\n\t}\n\t//-H \"X-Auth-User:user\" \\\n\t//-H \"X-Auth-Key:password\"\n\tr.Header.Add(\"X-Auth-User\", user)\n\tr.Header.Add(\"X-Auth-Key\", pass)\n\tlog.Println(authURL+\" Request: \", r)\n\tresp, err = client.Do(r)\n\tif resp != nil {\n\t\tdefer resp.Body.Close()\n\t}\n\tif err != nil {\n\t\treturn nil, errors.New(\"http.Request.Do error: \" + err.Error())\n\t}\n\tlog.Println(authURL, \" Response: \", resp)\n\tif resp.Header.Get(\"X-Auth-Token\") != \"\" && resp.Header.Get(\"X-Expire-Auth-Token\") != \"\" && resp.Header.Get(\"X-Storage-Token\") != \"\" && resp.Header.Get(\"X-Storage-Url\") != \"\" {\n\t\treturn resp, nil\n\t}\n\treturn nil, errors.New(\"makeAuthRequest error: Some of response headers are empty.\")\n}", "title": "" }, { "docid": "0f43fd00cd58486d5e73b4c36a3e0c16", "score": "0.5153891", "text": "func GetChallengeRequest(URL url.URL) (*http.Request, error) {\n\treq, err := http.NewRequest(\"GET\", URL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"Accept\", \"*/*\")\n\treq.Header.Set(\"User-Agent\", \"Watchtower (Docker)\")\n\treturn req, nil\n}", "title": "" }, { "docid": "927435517cc14f7cffede5374f03dad5", "score": "0.51489866", "text": "func (client *Client) getCertificateOperationHandleResponse(resp *http.Response) (GetCertificateOperationResponse, error) {\n\tresult := GetCertificateOperationResponse{}\n\tif err := runtime.UnmarshalAsJSON(resp, &result.CertificateOperation); err != nil {\n\t\treturn GetCertificateOperationResponse{}, err\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "6bdae93202e77036d2eeac365cd14ae7", "score": "0.5146241", "text": "func (client *Client) getCertificateCreateRequest(ctx context.Context, certificateName string, certificateVersion string, options *GetCertificateOptions) (*policy.Request, error) {\n\turlPath := \"/certificates/{certificate-name}/{certificate-version}\"\n\tif certificateName == \"\" {\n\t\treturn nil, errors.New(\"parameter certificateName cannot be empty\")\n\t}\n\turlPath = strings.ReplaceAll(urlPath, \"{certificate-name}\", url.PathEscape(certificateName))\n\turlPath = strings.ReplaceAll(urlPath, \"{certificate-version}\", url.PathEscape(certificateVersion))\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.endpoint, urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"7.3\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "0b239c59fbb471b8a1768cdd76a17eca", "score": "0.51428914", "text": "func (c *Connector) RequestCertificate(_ *certificate.Request) (requestID string, err error) {\n\tpanic(\"operation is not supported yet\")\n}", "title": "" }, { "docid": "c034d98e07527c21b9fdf510a897ee87", "score": "0.5136934", "text": "func makeHTTPSRequest(t *testing.T, f *framework.Framework, ctx *framework.TestCtx,\n\tnamespacedName types.NamespacedName) error {\n\terr := wait.Poll(retryInterval, timeout, func() (done bool, err error) {\n\t\troute := &routev1.Route{}\n\t\terr = f.Client.Get(goctx.TODO(), namespacedName, route)\n\t\tif err != nil {\n\t\t\treturn true, err\n\t\t}\n\n\t\tresp, err := http.Get(\"https://\" + route.Spec.Host)\n\t\tif err != nil {\n\t\t\treturn true, err\n\t\t}\n\t\tif resp.StatusCode < 200 || resp.StatusCode >= 300 {\n\t\t\tt.Log(\"Retrying to make https connection ...\")\n\t\t\treturn false, nil\n\t\t}\n\t\treturn true, nil\n\t})\n\n\tif errors.Is(err, wait.ErrWaitTimeout) {\n\t\treturn errors.New(\"status code outside of 200 range upon initiating https request\")\n\t}\n\n\treturn err // implicitly return nil if no errors\n}", "title": "" }, { "docid": "84ec9b538a514ba9d61a735fc275a20c", "score": "0.51355374", "text": "func doRequest(method, url string, body io.Reader) ([]byte, error) {\n\treq, err := http.NewRequest(method, url, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// These values are cached, so we can fetch them every time.\n\tuserpass, err := metadata.ProjectAttributeValue(authMetadataKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tp := strings.SplitN(userpass, \":\", 2)\n\tif len(p) != 2 {\n\t\treturn nil, errors.New(\"bad authentication data\")\n\t}\n\treq.SetBasicAuth(p[0], p[1])\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trespBody, err := ioutil.ReadAll(resp.Body)\n\tresp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode/100 != 2 {\n\t\treturn respBody, fmt.Errorf(\"Bad response: %v\\nBody:\\n%s\", resp.Status, respBody)\n\t}\n\treturn respBody, nil\n\n}", "title": "" }, { "docid": "5500dab8160da79da6b958f387a609c3", "score": "0.5131255", "text": "func GetHTTPRequestHandle(url string, method string, content []byte, headerMap map[string]string) (req *http.Request) {\n\treq, err := http.NewRequest(method, url, bytes.NewBuffer(content))\n\tif err != nil {\n\t\tlog.Println(err.Error())\n\t\treturn\n\t}\n\tfor head, value := range headerMap {\n\t\treq.Header.Set(head, value)\n\t}\n\treturn\n}", "title": "" }, { "docid": "7a4ae22e65c5c625299d9d7f6fadb225", "score": "0.51306367", "text": "func ReadGetRequest(r *http.Request, w http.ResponseWriter) *HTTPGetRequest {\n\tif r.Method != http.MethodGet {\n\t\tHTTPResponse(w, http.StatusInternalServerError)\n\t\treturn nil\n\t}\n\treturn &HTTPGetRequest{request: r}\n}", "title": "" }, { "docid": "7fef9a9edf1c2d91aa505a150df9bf68", "score": "0.51303893", "text": "func handleRequest(context context.Context, key string, writer http.ResponseWriter, request *http.Request,\n\tfuncGet func(context.Context, string, http.ResponseWriter, *http.Request),\n\tfuncPost func(context.Context, string, http.ResponseWriter, *http.Request),\n\tfuncPut func(context.Context, string, http.ResponseWriter, *http.Request),\n\tfuncDelete func(context.Context, string, http.ResponseWriter, *http.Request)) {\n\tswitch request.Method {\n\tcase MethodGet:\n\t\tfuncGet(context, key, writer, request)\n\t\treturn\n\tcase MethodPost:\n\t\tfuncPost(context, key, writer, request)\n\t\treturn\n\tcase MethodPut:\n\t\tfuncPut(context, key, writer, request)\n\t\treturn\n\tcase MethodDelete:\n\t\tfuncDelete(context, key, writer, request)\n\t\treturn\n\tdefault:\n\t\tRespondMethodNotAllowed(context, key, writer, request)\n\t}\n}", "title": "" }, { "docid": "76358a545904c378da8f214c91a18c23", "score": "0.5127934", "text": "func (self *Client) makeApiGetRequest(fullurl string, parameters map[string]string) (resp *http.Response, err error) {\n\tif err = self.checkApiKey(); err != nil {\n\t\treturn resp, err\n\t}\n\n\tvalues := url.Values{}\n\tvalues.Set(\"apikey\", self.Apikey)\n\tfor k, v := range parameters {\n\t\tvalues.Add(k, v)\n\t}\n\n\thttpClient := http.Client{}\n\t// TODO(wb) check if final character is ?, or if ? already exists\n\treq, err := http.NewRequest(\"GET\", fullurl+\"?\"+values.Encode(), nil)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\n\tif self.BasicAuthUsername != \"\" {\n\t\treq.SetBasicAuth(self.BasicAuthUsername, self.BasicAuthPassword)\n\t}\n\n\tresp, err = httpClient.Do(req)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\n\tif resp.StatusCode != 200 {\n\t\tvar msg string = fmt.Sprintf(\"Unexpected status code: %d\", resp.StatusCode)\n\t\tresp.Write(os.Stdout)\n\t\treturn resp, ClientError{msg: msg}\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "d3d241e17e86e6697cd44510a6548a85", "score": "0.51269674", "text": "func getCert(domain string) string{\n\t// Create a client to the acme of letsencrypt.\n\tcli, err := letsencrypt.NewClient(\"https://acme-v01.api.letsencrypt.org/directory\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t// Find or generate the private key to register on the ACME server.\n\tvar key *rsa.PrivateKey\n\tkey, err = loadKey(\"registerkey.pem\")\n\tif err!= nil{\n\t\tlog.Print(\"new generate RSA key for register , keep it safe\")\n\t\tkey, err = rsa.GenerateKey(rand.Reader, 2048)\t\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\tioutil.WriteFile(\"registerkey.pem\", pem.EncodeToMemory(&pem.Block{Bytes: x509.MarshalPKCS1PrivateKey(key), Type: \"RSA PRIVATE KEY\"}), 0644)\n\t}\n\t\n\t//register to the ACME server\n\tif _, err := cli.NewRegistration(key); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t\n\tlog.Print(\"Registration successful!\")\n\t\n\t//Get the http-challenge\n\tauth, _, err := cli.NewAuthorization(key, \"dns\", domain)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\thttpChalURL := \"\" \n\tfor _, chal := range auth.Challenges {\n\t\tif chal.Type == \"http-01\"{\n\t\t\thttpChalURL=chal.URI\n\t\t}\n\t}\n\tif httpChalURL == \"\"{\n\t\tlog.Fatal(\"Not found http-01 challenge\")\n\t}\n\tchal, err := cli.Challenge(httpChalURL)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t\n\t//Get the path and the resource needed to perform the challenge\n\tpath, resource, err := chal.HTTP(key)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t//copy the resource for the challenge\n\tif os.MkdirAll(\"./.well-known/acme-challenge/\",0711)!= nil {\n \t\tlog.Fatal(\"problem creating new dir for challenge :\",err)\n\t}\n\tif err := ioutil.WriteFile(\".\"+path, []byte(resource), 0644); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t//complete the challenge\n\tif err := cli.ChallengeReady(key, chal); err != nil {\n\t\tlog.Fatal(\"Challenge not complete :\", err)\n\t}\n\tlog.Print(\"Challenge Complete\")\n\t//create a certificate request\n\tcsr,_,err:=newCSR(domain)\n\tif err != nil {\n \tlog.Fatal(err)\n \t}\n \t// Request a certificate for the domain\n cert, err := cli.NewCertificate(key, csr)\n \tif err != nil {\n \t\tlog.Fatal(err)\n }\n log.Print(\"New Certificate Successfuly created\")\n cert_PEM:=pem.EncodeToMemory(&pem.Block{Bytes: cert.Certificate.Raw, Type: \"CERTIFICATE\"})\n fullchain,err:=cli.Bundle(cert)\n if err!=nil{\n \tlog.Fatal(\"can't bundles the certificate:\", err)\n }\n ioutil.WriteFile(\"fullchain.pem\",fullchain,0644)\n return string(cert_PEM)\n}", "title": "" }, { "docid": "ec85fdc0b35a4356665d79b26fc028b7", "score": "0.5119296", "text": "func HttpGetTicket(hostname string, addr string) (*http.Response, error) {\n\tconfig := tls.Config{ServerName: hostname}\n\tdialConn, err := net.DialTimeout(\"tcp\", addr, dialTimeout)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"net.DialTimeout error: %+v\", err)\n\t}\n\tuTlsConn := tls.UClient(dialConn, &config, tls.HelloGolang)\n\tdefer uTlsConn.Close()\n\n\terr = uTlsConn.BuildHandshakeState()\n\tif err != nil {\n\t\t// have to call BuildHandshakeState() first, when using default UClient, to avoid settings' overwriting\n\t\treturn nil, fmt.Errorf(\"uTlsConn.BuildHandshakeState() error: %+v\", err)\n\t}\n\n\tmasterSecret := make([]byte, 48)\n\tcopy(masterSecret, []byte(\"masterSecret is NOT sent over the wire\")) // you may use it for real security\n\n\t// Create a session ticket that wasn't actually issued by the server.\n\tsessionState := tls.MakeClientSessionState(sessionTicket, uint16(tls.VersionTLS12),\n\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\n\t\tmasterSecret,\n\t\tnil, nil)\n\n\terr = uTlsConn.SetSessionState(sessionState)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = uTlsConn.Handshake()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"uTlsConn.Handshake() error: %+v\", err)\n\t}\n\tfmt.Println(\"#> This is how client hello with session ticket looked:\")\n\tfmt.Print(hex.Dump(uTlsConn.HandshakeState.Hello.Raw))\n\n\treturn httpGetOverConn(uTlsConn, uTlsConn.HandshakeState.ServerHello.AlpnProtocol)\n}", "title": "" }, { "docid": "034aaf1e8a42dc8678ba724d8237a9b6", "score": "0.51184875", "text": "func GetRequest(r *http.Request) (string, *Authentication, *Authorization) {\n\tvar ip string\n\trequestAuth := &Authentication{}\n\trequestUpdate := &Authorization{}\n\n\t// get client IP\n\tip = GetIP(r)\n\n\t// get send header with basic auth creds\n\tvar OK bool\n\trequestAuth.username, requestAuth.password, OK = r.BasicAuth()\n if OK == false {\n\t\t// error in basic auth header. No creds recieved\n\t\treturn ip, nil, nil\n\t\t}\n\n\t// get send content\n\trequestUpdate.domainname = r.URL.Query().Get(\"domainname\")\n\tif len(requestUpdate.domainname) == 0 {\n\t\t// parameter domainname is missing\n\t\treturn ip, requestAuth, nil\n\t}\n\trequestUpdate.ip = r.URL.Query().Get(\"newip\")\n\n\t// test if string is given and if string is in ip format\n\tif len(net.ParseIP(requestUpdate.ip)) == 0 {\n\t\t// no ip send. Try to get it from header\n\t\trequestUpdate.ip = GetIP(r)\n\t\tif len(requestUpdate.ip) == 0 {\n\t\t\t// could not find any ip\n\t\t\treturn \"\", nil, nil\n\t\t}\n\t}\n\treturn ip, requestAuth, requestUpdate\n}", "title": "" }, { "docid": "276fbeef6d8f385ad6b9a5c23af82a2f", "score": "0.51127124", "text": "func (s *Server) handleAdminV1APIUseridGetRequest(args [0]string, argsEscaped bool, w http.ResponseWriter, r *http.Request) {\n\tvar otelAttrs []attribute.KeyValue\n\n\t// Start a span for this request.\n\tctx, span := s.cfg.Tracer.Start(r.Context(), \"AdminV1APIUseridGet\",\n\t\tserverSpanKind,\n\t)\n\tdefer span.End()\n\n\t// Run stopwatch.\n\tstartTime := time.Now()\n\tdefer func() {\n\t\telapsedDuration := time.Since(startTime)\n\t\t// Use floating point division here for higher precision (instead of Millisecond method).\n\t\ts.duration.Record(ctx, float64(float64(elapsedDuration)/float64(time.Millisecond)), metric.WithAttributes(otelAttrs...))\n\t}()\n\n\t// Increment request counter.\n\ts.requests.Add(ctx, 1, metric.WithAttributes(otelAttrs...))\n\n\tvar (\n\t\trecordError = func(stage string, err error) {\n\t\t\tspan.RecordError(err)\n\t\t\tspan.SetStatus(codes.Error, stage)\n\t\t\ts.errors.Add(ctx, 1, metric.WithAttributes(otelAttrs...))\n\t\t}\n\t\terr error\n\t\topErrContext = ogenerrors.OperationContext{\n\t\t\tName: \"AdminV1APIUseridGet\",\n\t\t\tID: \"\",\n\t\t}\n\t)\n\t{\n\t\ttype bitset = [1]uint8\n\t\tvar satisfied bitset\n\t\t{\n\t\t\tsctx, ok, err := s.securityCookieAuth(ctx, \"AdminV1APIUseridGet\", r)\n\t\t\tif err != nil {\n\t\t\t\terr = &ogenerrors.SecurityError{\n\t\t\t\t\tOperationContext: opErrContext,\n\t\t\t\t\tSecurity: \"CookieAuth\",\n\t\t\t\t\tErr: err,\n\t\t\t\t}\n\t\t\t\trecordError(\"Security:CookieAuth\", err)\n\t\t\t\ts.cfg.ErrorHandler(ctx, w, r, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif ok {\n\t\t\t\tsatisfied[0] |= 1 << 0\n\t\t\t\tctx = sctx\n\t\t\t}\n\t\t}\n\n\t\tif ok := func() bool {\n\t\tnextRequirement:\n\t\t\tfor _, requirement := range []bitset{\n\t\t\t\t{0b00000001},\n\t\t\t} {\n\t\t\t\tfor i, mask := range requirement {\n\t\t\t\t\tif satisfied[i]&mask != mask {\n\t\t\t\t\t\tcontinue nextRequirement\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn true\n\t\t\t}\n\t\t\treturn false\n\t\t}(); !ok {\n\t\t\terr = &ogenerrors.SecurityError{\n\t\t\t\tOperationContext: opErrContext,\n\t\t\t\tErr: ogenerrors.ErrSecurityRequirementIsNotSatisfied,\n\t\t\t}\n\t\t\trecordError(\"Security\", err)\n\t\t\ts.cfg.ErrorHandler(ctx, w, r, err)\n\t\t\treturn\n\t\t}\n\t}\n\n\tvar response *AdminV1APIUseridGetOK\n\tif m := s.cfg.Middleware; m != nil {\n\t\tmreq := middleware.Request{\n\t\t\tContext: ctx,\n\t\t\tOperationName: \"AdminV1APIUseridGet\",\n\t\t\tOperationID: \"\",\n\t\t\tBody: nil,\n\t\t\tParams: middleware.Parameters{},\n\t\t\tRaw: r,\n\t\t}\n\n\t\ttype (\n\t\t\tRequest = struct{}\n\t\t\tParams = struct{}\n\t\t\tResponse = *AdminV1APIUseridGetOK\n\t\t)\n\t\tresponse, err = middleware.HookMiddleware[\n\t\t\tRequest,\n\t\t\tParams,\n\t\t\tResponse,\n\t\t](\n\t\t\tm,\n\t\t\tmreq,\n\t\t\tnil,\n\t\t\tfunc(ctx context.Context, request Request, params Params) (response Response, err error) {\n\t\t\t\tresponse, err = s.h.AdminV1APIUseridGet(ctx)\n\t\t\t\treturn response, err\n\t\t\t},\n\t\t)\n\t} else {\n\t\tresponse, err = s.h.AdminV1APIUseridGet(ctx)\n\t}\n\tif err != nil {\n\t\trecordError(\"Internal\", err)\n\t\ts.cfg.ErrorHandler(ctx, w, r, err)\n\t\treturn\n\t}\n\n\tif err := encodeAdminV1APIUseridGetResponse(response, w, span); err != nil {\n\t\trecordError(\"EncodeResponse\", err)\n\t\ts.cfg.ErrorHandler(ctx, w, r, err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "6917918ba8206d8a3206b67254f1aac8", "score": "0.5105832", "text": "func httpHandler(c conn.Conn, proto string) {\n\tdefer c.Close()\n\tdefer func() {\n\t\t// recover from failures\n\t\tif r := recover(); r != nil {\n\t\t\tc.Warn(\"http处理失败,出现错误 %v: %s\", r, debug.Stack())\n\t\t}\n\t}()\n\n\t// Make sure we detect dead connections while we decide how to multiplex\n\tc.SetDeadline(time.Now().Add(connReadTimeout))\n\n\t// multiplex by extracting the Host header, the vhost library\n\tvhostConn, err := vhost.HTTP(c)\n\tif err != nil {\n\t\tc.Warn(\"无法读取有效的 %s 请求: %v\", proto, err)\n\t\tc.Write([]byte(BadRequest))\n\t\treturn\n\t}\n\n\t// read out the Host header and auth from the request\n\thost := strings.ToLower(vhostConn.Host())\n\tauth := vhostConn.Request.Header.Get(\"Authorization\")\n\n\t//输出隧道的在线域名列表\n\tsubDomain := strings.Split(host,\".\")[0]\n\tif subDomain == \"status\" {\n\t\tk := 0\n\t\tc.Info(\"获取隧道域名列表请求 host: %v\", host)\n\t\tbatch := make(map[string]string)\n\n\t\t//循环连接控制类\n\t\tfor _, cc := range controlRegistry.controls {\n\t\t\t//循环隧道类获得url\n\t\t\tfor _, t := range cc.tunnels{\n\t\t\t\tmapKey := fmt.Sprintf(\"%d\", k)\n\t\t\t\tbatch[mapKey] = t.url\n\t\t\t\tk++\n\t\t\t}\n\t\t}\n\n\t\t//url数组json化后输出\n\t\tpayload, _ := json.Marshal(batch)\n\t\tc.Write([]byte(fmt.Sprintf(OkRequest, len(payload), payload)))\n\t\treturn\n\t}\n\n\t//接受参数\n\tCookieKey, err := vhostConn.Request.Cookie(\"tunnels-key\")\n\tCookieTime, err := vhostConn.Request.Cookie(\"tunnels-time\")\n\n\tif opts.signatureKey != \"\" && err != nil {\n\t\tc.Warn(\"无法读取Cookie: %v\", err)\n\t\tc.Write([]byte(NotKeyAuthorized))\n\t\treturn\n\t}\n\n\t// done reading mux data, free up the request memory\n\tvhostConn.Free()\n\n\t// We need to read from the vhost conn now since it mucked around reading the stream\n\tc = conn.Wrap(vhostConn, \"pub\")\n\n\t// multiplex to find the right backend host\n\tc.Debug(\"在请求中找到hostname %s \", host)\n\ttunnel := tunnelRegistry.Get(fmt.Sprintf(\"%s://%s\", proto, host))\n\tif tunnel == nil {\n\t\tc.Info(\"找不到 hostname %s 的隧道\", host)\n\t\tc.Write([]byte(fmt.Sprintf(NotFound, len(host)+18, host)))\n\t\treturn\n\t}\n\n\t//添加cookie签名验证,过期时间为1天\n\t//没有配置signatureKey参数不使用此功能\n\tif opts.signatureKey != \"\" {\n\t\t//检查时间是否过期\n\t\tCookieTimeInt64, _ := strconv.ParseInt(CookieTime.Value, 10, 64)\n\t\tisExpire := CookieTimeInt64 <= (time.Now().Unix() - 86400)\n\n\t\t//生成签名\n\t\tmd5Byte := md5.Sum( []byte(fmt.Sprintf(\"%s%s\", opts.signatureKey, CookieTime.Value)) )\n\t\tsignString := fmt.Sprintf(\"%x\", md5Byte)\n\n\t\t//对比验证\n\t\tif signString != CookieKey.Value || isExpire {\n\t\t\tc.Info(\"签名验证失败: %s, 时间戳: %s, 是否过期:%t, 正确签名: %s\", CookieKey.Value, CookieTime.Value, isExpire, signString)\n\t\t\tc.Write([]byte(NotKeyAuthorized))\n\t\t\treturn\n\t\t}\n\t}\n\n\t// If the client specified http auth and it doesn't match this request's auth\n\t// then fail the request with 401 Not Authorized and request the client reissue the\n\t// request with basic authdeny the request\n\tif tunnel.req.HttpAuth != \"\" && auth != tunnel.req.HttpAuth {\n\t\tc.Info(\"Auth验证失败: %s\", auth)\n\t\tc.Write([]byte(NotAuthorized))\n\t\treturn\n\t}\n\n\t// dead connections will now be handled by tunnel heartbeating and the client\n\tc.SetDeadline(time.Time{})\n\n\t// let the tunnel handle the connection now\n\ttunnel.HandlePublicConnection(c)\n}", "title": "" }, { "docid": "c1e3d20148b540ea435c2b5eb90decc0", "score": "0.50975835", "text": "func (m *ThreatIntelligenceHostSslCertificatesHostSslCertificateItemRequestBuilder) Get(ctx context.Context, requestConfiguration *ThreatIntelligenceHostSslCertificatesHostSslCertificateItemRequestBuilderGetRequestConfiguration)(i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.HostSslCertificateable, error) {\n requestInfo, err := m.ToGetRequestInformation(ctx, requestConfiguration);\n if err != nil {\n return nil, err\n }\n errorMapping := i2ae4187f7daee263371cb1c977df639813ab50ffa529013b7437480d1ec0158f.ErrorMappings {\n \"4XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n \"5XX\": i20a3050780ee0b0cde0a884a4f35429a20d60067e3bcda382ec5400079147459.CreateODataErrorFromDiscriminatorValue,\n }\n res, err := m.BaseRequestBuilder.RequestAdapter.Send(ctx, requestInfo, i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.CreateHostSslCertificateFromDiscriminatorValue, errorMapping)\n if err != nil {\n return nil, err\n }\n if res == nil {\n return nil, nil\n }\n return res.(i084fa7ab3bba802bf5cc3b408e230cc64c167a57976e0d42c37e17154afd5b78.HostSslCertificateable), nil\n}", "title": "" }, { "docid": "c49de18825ca450aad5fe1e770928535", "score": "0.50959533", "text": "func requestCertificate(client certificatesclient.CertificateSigningRequestInterface, csrData []byte, usages []certificates.KeyUsage) (certData []byte, err error) {\n\tglog.Infof(\"Requesting new certificate.\")\n\treq, err := client.Create(&certificates.CertificateSigningRequest{\n\t\t// Username, UID, Groups will be injected by API server.\n\t\tTypeMeta: metav1.TypeMeta{Kind: \"CertificateSigningRequest\"},\n\t\tObjectMeta: metav1.ObjectMeta{GenerateName: \"csr-\"},\n\n\t\tSpec: certificates.CertificateSigningRequestSpec{\n\t\t\tRequest: csrData,\n\t\t\tUsages: usages,\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot create certificate signing request: %v\", err)\n\t}\n\n\t// Make a default timeout = 3600s.\n\tvar defaultTimeoutSeconds int64 = 3600\n\tcertWatch, err := client.Watch(metav1.ListOptions{\n\t\tWatch: true,\n\t\tTimeoutSeconds: &defaultTimeoutSeconds,\n\t\tFieldSelector: fields.OneTermEqualSelector(\"metadata.name\", req.Name).String(),\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"cannot watch on the certificate signing request: %v\", err)\n\t}\n\tdefer certWatch.Stop()\n\tch := certWatch.ResultChan()\n\n\tfor {\n\t\tevent, ok := <-ch\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\n\t\tif event.Type == watch.Modified || event.Type == watch.Added {\n\t\t\tif event.Object.(*certificates.CertificateSigningRequest).UID != req.UID {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tstatus := event.Object.(*certificates.CertificateSigningRequest).Status\n\t\t\tfor _, c := range status.Conditions {\n\t\t\t\tif c.Type == certificates.CertificateDenied {\n\t\t\t\t\treturn nil, fmt.Errorf(\"certificate signing request is not approved, reason: %v, message: %v\", c.Reason, c.Message)\n\t\t\t\t}\n\t\t\t\tif c.Type == certificates.CertificateApproved && status.Certificate != nil {\n\t\t\t\t\treturn status.Certificate, nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"watch channel closed\")\n}", "title": "" }, { "docid": "fa8145e684c7daf01849130d9a2d0220", "score": "0.5093696", "text": "func GetHandler(response http.ResponseWriter, request *http.Request, baseLog *logrus.Logger) {\n\trequestID, _ := uuid.NewRandom()\n\tlog := baseLog.WithFields(logrus.Fields{\n\t\t\"endpoint\": endpoint,\n\t\t\"request_id\": requestID.String(),\n\t})\n\tlog.Debug(\"request received\")\n\n\thelloWorldResponse := GetResponse{\n\t\tMessage: \"Hello, World!\",\n\t}\n\tresponse.Header().Set(\"Content-Type\", \"application/json\")\n\tresponse.WriteHeader(http.StatusOK)\n\tjson.NewEncoder(response).Encode(helloWorldResponse)\n\n\tlog.Debug(\"request completed\")\n}", "title": "" }, { "docid": "68f9c1e60cc37b29ec23463f7dd1ec7b", "score": "0.50884104", "text": "func CreateDescribeCertificationRequest() (request *DescribeCertificationRequest) {\nrequest = &DescribeCertificationRequest{\nRpcRequest: &requests.RpcRequest{},\n}\nrequest.InitWithApiInfo(\"R-kvstore\", \"2015-01-01\", \"DescribeCertification\", \"kvstore\", \"openAPI\")\nreturn\n}", "title": "" }, { "docid": "0c8db5125e86b7bd6b94614d56842699", "score": "0.50830764", "text": "func _cgoexp_ebd397278953_new_holochain_GetReq(a unsafe.Pointer, n int32, ctxt uintptr) {\n\tfn := _cgoexpwrap_ebd397278953_new_holochain_GetReq\n\t_cgo_runtime_cgocallback(**(**unsafe.Pointer)(unsafe.Pointer(&fn)), a, uintptr(n), ctxt);\n}", "title": "" }, { "docid": "3a5b05400dc8822135fdc6c0a273938c", "score": "0.50814074", "text": "func requestHandler(r *http.Request, ctx *goproxy.ProxyCtx) (*http.Request, *http.Response) {\n\n\tvar onRequest requestFn\n\t_, err := initRequestScript(&onRequest)\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\n\tif err == nil {\n\t\t// TODO here we can add http header modifications\n\n\t\tallowed := onRequest(r)\n\t\tif allowed {\n\t\t\treturn r, nil\n\t\t}\n\t}\n\n\treturn r, goproxy.NewResponse(r,\n\t\tgoproxy.ContentTypeText,\n\t\thttp.StatusForbidden,\n\t\t\"Blocked by proxy!\")\n\n}", "title": "" }, { "docid": "8a5db75b976d8f66fa8abce7e86b9b30", "score": "0.50812596", "text": "func certHandler(w http.ResponseWriter, r *http.Request) {\n\tcert, err := ioutil.ReadFile(\"certificate.cer\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tw.WriteHeader(200)\n\tw.Write(cert)\n}", "title": "" }, { "docid": "a0c2bb999b4d5d087852bee92eaf700f", "score": "0.50770736", "text": "func makeGetAuthInfoHandler(m *mux.Router, endpoints endpoint.Endpoints, options []http.ServerOption) {\n\tm.Methods(\"GET\").Path(\"/api/users/{userId:[a-zA-Z0-9_-]+}/certs\").Handler(\n\t\thandlers.CORS(\n\t\t\thandlers.AllowedMethods([]string{\"GET\"}),\n\t\t\thandlers.AllowedOrigins([]string{\"*\"}),\n\t\t)(\n\t\t\thttp.NewServer(\n\t\t\t\tendpoints.GetAuthInfoEndpoint,\n\t\t\t\tdecodeGetAuthInfoRequest,\n\t\t\t\tencodeGetAuthInfoResponse,\n\t\t\t\toptions...,\n\t\t\t),\n\t\t),\n\t)\n}", "title": "" }, { "docid": "c16a362261f7de26b70c3c07f8ca4f9d", "score": "0.5072222", "text": "func (h *Handler) ServeHTTP(w http.ResponseWriter, r *http.Request) (int, error) {\n\t// Only if challenge is active\n\tif atomic.LoadInt32(&h.ChallengeActive) == 1 {\n\t\th.Lock()\n\t\tpath := h.ChallengePath\n\t\th.Unlock()\n\n\t\t// Request path must be correct; if so, proxy to ACME client\n\t\tif r.URL.Path == path {\n\t\t\tupstream, err := url.Parse(\"https://\" + r.Host + \":\" + alternatePort)\n\t\t\tif err != nil {\n\t\t\t\treturn http.StatusInternalServerError, err\n\t\t\t}\n\t\t\tproxy := httputil.NewSingleHostReverseProxy(upstream)\n\t\t\tproxy.Transport = &http.Transport{\n\t\t\t\tTLSClientConfig: &tls.Config{InsecureSkipVerify: true}, // client uses self-signed cert\n\t\t\t}\n\t\t\tproxy.ServeHTTP(w, r)\n\t\t\treturn 0, nil\n\t\t}\n\t}\n\n\treturn h.Next.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "0f13d37da461309647fd380e13662e83", "score": "0.5070705", "text": "func doHTTPReq(req *http.Request) (string, error) {\n\treq.Header.Set(\"User-Agent\", userAgent)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdefer resp.Body.Close()\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn string(body), nil\n}", "title": "" }, { "docid": "bc6bc3eb4d2c5fa9e540e19fec9f77a6", "score": "0.50565076", "text": "func httpGet(url, user, pwd string) (*http.Response, string, os.Error) {\n var r *http.Response\n var full string = \"\"\n var err os.Error\n\n if user != \"\" && pwd != \"\" {\n r, err = authGet(url, user, pwd)\n } else {\n r, err = http.Get(url)\n }\n\n return r, full, err\n}", "title": "" }, { "docid": "94fe94f4e6077d2aa58da81dacf42049", "score": "0.50558066", "text": "func doRequest(ctx context.Context, srv *sdk.Service, method, path string, args []byte, mods ...cdsclient.RequestModifier) ([]byte, http.Header, int, error) {\n\tcallURL, err := url.ParseRequestURI(srv.HTTPURL + path)\n\tif err != nil {\n\t\treturn nil, nil, 0, sdk.WithStack(err)\n\t}\n\tvar r io.Reader\n\tif args != nil {\n\t\tr = bytes.NewReader(args)\n\t}\n\treturn doRequestFromURL(ctx, method, callURL, r, mods...)\n}", "title": "" }, { "docid": "5687b2895d9b1ffe8b9a238c0d1d127a", "score": "0.5054811", "text": "func RequestForEvent(e events.APIGatewayV2HTTPRequest) (*http.Request, error) {\n\tbody := []byte(e.Body)\n\tif e.IsBase64Encoded {\n\t\tdecoded, err := base64.StdEncoding.DecodeString(e.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tbody = decoded\n\t}\n\n\turi := &url.URL{}\n\n\tpath := e.RawPath\n\tif len(path) == 0 {\n\t\tpath = e.RequestContext.HTTP.Path\n\t}\n\n\tif !strings.HasPrefix(path, \"/\") {\n\t\tpath = \"/\" + path\n\t}\n\n\turi.Scheme = `https`\n\turi.Path = path\n\turi.Host = e.RequestContext.DomainName\n\n\tif len(uri.Host) == 0 {\n\t\turi.Host = `localhost`\n\t}\n\tif port, ok := e.Headers[`X-Forwarded-Port`]; ok {\n\t\turi.Host = net.JoinHostPort(uri.Host, port)\n\t}\n\n\tif len(e.RawQueryString) > 0 {\n\t\turi.RawQuery = e.RawQueryString\n\t} else if len(e.QueryStringParameters) > 0 {\n\t\tquery := url.Values{}\n\n\t\tfor k, v := range e.QueryStringParameters {\n\t\t\tquery.Add(k, v)\n\t\t}\n\n\t\turi.RawQuery = query.Encode()\n\t}\n\n\treq, err := http.NewRequest(strings.ToUpper(e.RequestContext.HTTP.Method), uri.String(), bytes.NewReader(body))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor k, v := range e.Headers {\n\t\tfor _, val := range strings.Split(v, \",\") {\n\t\t\tif k == `User-Agent` {\n\t\t\t\treq.Header.Set(k, v)\n\t\t\t} else {\n\t\t\t\treq.Header.Add(k, strings.Trim(val, \" \"))\n\t\t\t}\n\t\t}\n\t}\n\n\treq.RemoteAddr = e.RequestContext.HTTP.SourceIP\n\treq.RequestURI = uri.String()\n\n\treturn req, nil\n}", "title": "" }, { "docid": "1b86e383760c49cf957e626e8eef042e", "score": "0.50536656", "text": "func (s *ProxySuite) TestGetRequestInProxyNoParams(c *C) {\n\tcontrol := s.newServer(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Write([]byte(`{\"response\": \"hi!\"}`))\n\t})\n\tdefer control.Close()\n\n\tcode := fmt.Sprintf(\n\t\t`function handle(request){\n return get(\"%s\")\n }\n `, control.URL)\n\n\tproxy := s.newProxy(code, s.backend, roundrobin.NewRoundRobin(s.timeProvider))\n\tdefer proxy.Close()\n\n\tresponse, bodyBytes := s.Get(c, proxy.URL, s.authHeaders, \"hello!\")\n\tc.Assert(response.StatusCode, Equals, http.StatusOK)\n\tc.Assert(string(bodyBytes), Equals, `{\"response\":\"hi!\"}`)\n}", "title": "" } ]
6f31b40d9c99a331894dd77657b93236
GetDataMigrateJobName returns DataMigrate job(or cronjob)'s name given the DataMigrate helm release's name
[ { "docid": "962b2232b70790b15c6a0d08e04de880", "score": "0.8579686", "text": "func GetDataMigrateJobName(releaseName string) string {\n\treturn fmt.Sprintf(\"%s-migrate\", releaseName)\n}", "title": "" } ]
[ { "docid": "1795afe0729ede1262eba0544f1636ab", "score": "0.71993244", "text": "func GetDataMigrateReleaseName(name string) string {\n\treturn fmt.Sprintf(\"%s-migrate\", name)\n}", "title": "" }, { "docid": "1f73e988ef19d3ee87dcb368bd83c570", "score": "0.6906913", "text": "func GetDataLoadJobName(releaseName string) string {\n\treturn fmt.Sprintf(\"%s-job\", releaseName)\n}", "title": "" }, { "docid": "44a9f46868bfda54fd885f0849bc995a", "score": "0.5719164", "text": "func (JobUpgradeTest) Name() string { return \"[sig-apps] job-upgrade\" }", "title": "" }, { "docid": "2717927c593f68f353d3c6d4e3374761", "score": "0.5718614", "text": "func (a *AzureDevOpsConfigProvider) GetJobName() string {\n\treturn getEnv(\"BUILD_REPOSITORY_NAME\", \"n/a\")\n}", "title": "" }, { "docid": "b6e17f3b8042447c09021a73cbf1580d", "score": "0.5675345", "text": "func (o SynchronizationJobOutput) DtsJobName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *SynchronizationJob) pulumi.StringOutput { return v.DtsJobName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b9b4759c21f0387f70ef1397ef5c6c3a", "score": "0.5619663", "text": "func (c CreateTasksTable) GetMigrationName() string {\n\treturn \"create_tasks_table\"\n}", "title": "" }, { "docid": "7673dde3a20b1bd1ee195f9a956bb377", "score": "0.5604587", "text": "func GetJobName() string {\n\tif *JobName == \"\" {\n\t\tid := atomic.AddInt32(&unique, 1)\n\t\treturn fmt.Sprintf(\"go-job-%v-%v\", id, time.Now().UnixNano())\n\t}\n\treturn *JobName\n}", "title": "" }, { "docid": "fe695b3ccbe5adf43e42c5ac6ccb737c", "score": "0.54575855", "text": "func (j *JenkinsConfigProvider) GetJobName() string {\n\treturn getEnv(\"JOB_NAME\", \"n/a\")\n}", "title": "" }, { "docid": "5bf71e173f401921e2d17a0986a84f07", "score": "0.5412844", "text": "func (h *appHandler) getWorkloadName(w runtime.RawExtension, componentName string, revisionName string) (string, error) {\n\tworkload, err := oamutil.RawExtension2Unstructured(&w)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tvar revision = 0\n\tif len(revisionName) != 0 {\n\t\tr, err := utils.ExtractRevision(revisionName)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\trevision = r\n\t}\n\tapplicationconfiguration.SetAppWorkloadInstanceName(componentName, workload, revision, strconv.FormatBool(h.inplace))\n\treturn workload.GetName(), nil\n}", "title": "" }, { "docid": "4cee3a813c6deb86b890ae37006d464c", "score": "0.5339019", "text": "func (j Job) GetName() string {\n\treturn \"jobs\"\n}", "title": "" }, { "docid": "023aa936a8f97de284d5f7830d84af6e", "score": "0.533628", "text": "func CronJobName(backupName string) string {\n\treturn fmt.Sprintf(\"%s-job\", backupName)\n}", "title": "" }, { "docid": "740207f7df1c751ba3e59a4c72334963", "score": "0.5327666", "text": "func (jt *JobTemplate) JobName() (string, *Error) {\n\treturn getStringValue(jt.jt, C.DRMAA_JOB_NAME)\n}", "title": "" }, { "docid": "c98a00a2489359e026db68c3608d32b7", "score": "0.5310927", "text": "func (b *Backup) GetNameForJob() string {\n\treturn fmt.Sprintf(\"%s-backup\", b.Name)\n}", "title": "" }, { "docid": "7563774f99216ecfccc51df5f72cad68", "score": "0.5279163", "text": "func (o *ModelsBackupJob) GetName() string {\n\tif o == nil || o.Name == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Name\n}", "title": "" }, { "docid": "f3bd52e8e28a2b5234dd56dbe8dccaf2", "score": "0.5278317", "text": "func (cbc *ciBuilderClientImpl) GetJobName(jobType, repoOwner, repoSource, id string) string {\n\n\t// create job name of max 63 chars\n\tmaxJobNameLength := 63\n\n\tre := regexp.MustCompile(\"[^a-zA-Z0-9]+\")\n\trepoName := re.ReplaceAllString(fmt.Sprintf(\"%v/%v\", repoOwner, repoSource), \"-\")\n\n\tmaxRepoNameLength := maxJobNameLength - len(jobType) - 1 - len(id) - 1\n\tif len(repoName) > maxRepoNameLength {\n\t\trepoName = repoName[:maxRepoNameLength]\n\t}\n\n\treturn strings.ToLower(fmt.Sprintf(\"%v-%v-%v\", jobType, repoName, id))\n}", "title": "" }, { "docid": "ef2627a3d5128373bd70fa30f80f1b82", "score": "0.5266468", "text": "func GetDataMigrate(client client.Client, name, namespace string) (*datav1alpha1.DataMigrate, error) {\n\tkey := types.NamespacedName{\n\t\tNamespace: namespace,\n\t\tName: name,\n\t}\n\tvar dataMigrate datav1alpha1.DataMigrate\n\tif err := client.Get(context.TODO(), key, &dataMigrate); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &dataMigrate, nil\n}", "title": "" }, { "docid": "95c932d3cc4bed01c49e75b64351e373", "score": "0.5262097", "text": "func getJobFromName(jobName string, app *crd.ClowdApp) (job crd.Job, err error) {\n\tfor _, j := range app.Spec.Jobs {\n\t\tif j.Name == jobName {\n\t\t\treturn j, nil\n\t\t}\n\t}\n\treturn crd.Job{}, errors.New(fmt.Sprintf(\"No such job %s\", jobName))\n\n}", "title": "" }, { "docid": "a6d33b01c01f5d7f5f3c004ce9a55c02", "score": "0.5254655", "text": "func GetCommandName(entry MachineEventLogEntry) string {\n\n\tif entry.GetType() == TypeDevFileCommandExecutionBegin {\n\t\treturn entry.(*DevFileCommandExecutionBegin).CommandID\n\t} else if entry.GetType() == TypeDevFileCommandExecutionComplete {\n\t\treturn entry.(*DevFileCommandExecutionComplete).CommandID\n\t} else {\n\t\treturn \"\"\n\t}\n\n}", "title": "" }, { "docid": "b902f3543e37d2634fa0e1c8968a53d3", "score": "0.524951", "text": "func (cmd MigrateCmd) Name() string {\n\treturn \"migrate\"\n}", "title": "" }, { "docid": "b902f3543e37d2634fa0e1c8968a53d3", "score": "0.524951", "text": "func (cmd MigrateCmd) Name() string {\n\treturn \"migrate\"\n}", "title": "" }, { "docid": "1e1d99ee5fd1fb2fcabbf883e7113a75", "score": "0.5208654", "text": "func (j GoVetJob) Name() string {\n\treturn string(j)\n}", "title": "" }, { "docid": "5b0ebaa8ad7ef0b67d22df12090bb7d3", "score": "0.5183407", "text": "func GetTaskName(config Config) (string, error) {\n\tif config.Lang.Default == \"cpp\" {\n\t\treturn \"main.cpp\", nil\n\t} else if config.Lang.Default == \"java\" {\n\t\treturn \"Main.java\", nil\n\t} else if config.Lang.Default == \"python\" {\n\t\treturn \"main.py\", nil\n\t} else {\n\t\treturn \"\", errors.New(fmt.Sprintf(\"Unknown default language %s, please edit your settings\", config.Lang.Default))\n\t}\n}", "title": "" }, { "docid": "b1a47bc27bbedeb7ebcb674fbfdb51ae", "score": "0.51771104", "text": "func GetJobRunQueueName(uniqueName string) string {\n\treturn fmt.Sprintf(\"%s-jobrun\", uniqueName)\n}", "title": "" }, { "docid": "3ff5cbe2a136c379099e15de8ccd5559", "score": "0.5173912", "text": "func GetInstallJobName(provision *hivev1.ClusterProvision) string {\n\treturn apihelpers.GetResourceName(provision.Name, \"provision\")\n}", "title": "" }, { "docid": "3feaec5a05ec138e3fed3f39f5b9bc71", "score": "0.5153639", "text": "func (w *Worker) GenerateDeploymentName() string {\n\treturn w.Name\n}", "title": "" }, { "docid": "0dc3a49f410602caf4ba145c5e2ed872", "score": "0.5139406", "text": "func GetDBName() string {\n\tsource := os.Getenv(dbSourceKey)\n\tresult := dbnameRegex.FindStringSubmatch(source)\n\n\tif len(result) > 0 {\n\t\treturn result[1]\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "e17d300d2c83a9580e0bf06487012281", "score": "0.5121946", "text": "func (m *CloudPcExportJob) GetReportName()(*CloudPcReportName) {\n val, err := m.GetBackingStore().Get(\"reportName\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*CloudPcReportName)\n }\n return nil\n}", "title": "" }, { "docid": "0bda77ca1ae627800694004308c6337e", "score": "0.51126194", "text": "func (j *job) Name() string {\n\treturn j.name\n}", "title": "" }, { "docid": "6dbd5b78c0a78f77b34a3eb57c32a902", "score": "0.51061076", "text": "func (job *Job) GetName() string {\n\treturn job.Name\n}", "title": "" }, { "docid": "968dd871803cd5854dc70de381822af2", "score": "0.51053715", "text": "func (o *JenkinsOptions) GetJenkinsJobName() string {\n\towner := os.Getenv(\"REPO_OWNER\")\n\trepo := os.Getenv(\"REPO_NAME\")\n\tbranch := o.GetBranchName(\"\")\n\n\tif owner != \"\" && repo != \"\" && branch != \"\" {\n\t\treturn fmt.Sprintf(\"%s/%s/%s\", owner, repo, branch)\n\t}\n\n\tjob := os.Getenv(\"JOB_NAME\")\n\tif job != \"\" {\n\t\treturn job\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "02890f9b8fbb3b569648ccde9b521048", "score": "0.50878125", "text": "func PvcToJobName(pvc *v1.PersistentVolumeClaim) (string, error) {\n\n\tif pvc == nil {\n\t\treturn \"\", fmt.Errorf(\"Nil persistent volume claim provided\")\n\t}\n\n\tif pvc.Name == \"\" {\n\t\treturn \"\", fmt.Errorf(\"Missing name in pvc\")\n\t}\n\n\treturn pvc.Name, nil\n}", "title": "" }, { "docid": "6ce227237492f9b4a91dbfd63a76baaa", "score": "0.50863636", "text": "func GetDataLoadReleaseName(name string) string {\n\treturn fmt.Sprintf(\"%s-loader\", name)\n}", "title": "" }, { "docid": "a0111325d1a564709ffb35913d4fb8ea", "score": "0.5039427", "text": "func (m MockDataModel) GetDataName() string {\n\targs := m.Called()\n\treturn args.String(0)\n}", "title": "" }, { "docid": "4bb7deb730b35c5bb1ce4272a0f0cde0", "score": "0.5038146", "text": "func getReleaseName(release string) string {\n\treleaseFields := strings.Split(string(release), \"\\t\")\n\tif len(releaseFields) <= 0 {\n\t\treturn \"\"\n\t}\n\treleaseName := strings.TrimSpace(releaseFields[0])\n\treturn strings.TrimSpace(releaseName)\n}", "title": "" }, { "docid": "405e7ca021d2e6156692515729dc5b19", "score": "0.50186485", "text": "func (r *helmRelease) getChartName() string {\n\tchart := r.Chart\n\trunes := []rune(chart)\n\treturn string(runes[0:strings.LastIndexByte(chart[0:strings.IndexByte(chart, '.')], '-')])\n}", "title": "" }, { "docid": "26e68c4abf6bba498114f2270773cd62", "score": "0.4986678", "text": "func GetJobStartQueueName(uniqueName string) string {\n\treturn fmt.Sprintf(\"%s-jobstart\", uniqueName)\n}", "title": "" }, { "docid": "e2f523d136e43ba4bb0cb2c95068e781", "score": "0.49824306", "text": "func (js *JobStatus) JobName() string {\n\treturn geparser.GetJobName(&js.js)\n}", "title": "" }, { "docid": "9d129355115cdf93feba4199d9b38122", "score": "0.4978448", "text": "func GetUninstallJobName(name string) string {\n\treturn apihelpers.GetResourceName(name, \"uninstall\")\n}", "title": "" }, { "docid": "520d6686964cf657648cafbfd81c7f8b", "score": "0.4978096", "text": "func getCmdName(args []string) (string, error) {\n\t// command name should always be the second string in the process args\n\tif len(args) < 2 {\n\t\treturn \"\", errors.New(\"Unable to find a command\")\n\t}\n\n\treturn args[1], nil\n}", "title": "" }, { "docid": "464b082ca9e79cceb948ffcd2cc7c30a", "score": "0.49492115", "text": "func getFullJobName(job gojenkins.Job) string {\n\treturn strings.Trim(strings.Replace(job.Base, \"/job/\", \"/\", -1), \"/\")\n}", "title": "" }, { "docid": "656e6aab056cb4413871c528c3ad665a", "score": "0.49312076", "text": "func makeJobName(job *batchv1.Job) string {\n\tuid := strings.Split(string(uuid.NewUUID()), \"-\")\n\tsuffix := uid[0]\n\ttimestamp := time.Now().Unix()\n\treturn fmt.Sprintf(\"%s-%d-%s\", job.Name, timestamp, suffix)\n}", "title": "" }, { "docid": "9ef38ba451bec1d577a09c5b069df2e6", "score": "0.4920534", "text": "func (o RdsUpgradeDbInstanceOutput) DbName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *RdsUpgradeDbInstance) pulumi.StringPtrOutput { return v.DbName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6417c5e2bc1b7b23a23b958541cc4ac9", "score": "0.49162203", "text": "func (task *BootstrapTask) GetName() string {\n\treturn \"Bootstrap\"\n}", "title": "" }, { "docid": "e27290213b247916fa93df6e2a2f6094", "score": "0.49089664", "text": "func (o KafkaClusterMetastoresHivePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KafkaClusterMetastoresHive) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "05dfaab5c8becdbacd3a8d15da228ec2", "score": "0.49032345", "text": "func JobRcName(id string) string {\n\t// k8s won't allow RC names that contain upper-case letters\n\t// or underscores\n\t// TODO: deal with name collision\n\tid = strings.Replace(id, \"_\", \"-\", -1)\n\treturn fmt.Sprintf(\"job-%s\", strings.ToLower(id))\n}", "title": "" }, { "docid": "3930fa136767cf74e023db8fa22cd16a", "score": "0.48869985", "text": "func getDBName(datasource string) string {\n\tvar dbName string\n\tdatasource = strings.ToLower(datasource)\n\n\tre := regexp.MustCompile(`(?:\\/([^\\/?]+))|(?:dbname=([^\\s]+))`)\n\tgetName := re.FindStringSubmatch(datasource)\n\tif getName != nil {\n\t\tdbName = getName[1]\n\t\tif dbName == \"\" {\n\t\t\tdbName = getName[2]\n\t\t}\n\t}\n\n\treturn dbName\n}", "title": "" }, { "docid": "38d718130c4e868e5900ba1ce287268c", "score": "0.48559585", "text": "func getProcessName(data interface{}) (name string, err error) {\n\tswitch data.(type) {\n\tcase Event:\n\t\tvar ok bool\n\t\tif name, ok = (data.(Event)).Meta[\"processname\"]; !ok {\n\t\t\terr = errors.New(\"processname not found in event metadata\")\n\t\t}\n\tcase ProcessInfo:\n\t\tname = (data.(ProcessInfo)).Name\n\tdefault:\n\t\terr = errors.New(\"invalid data type\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "56adc0e5767dc20915f396f301ba141e", "score": "0.48533458", "text": "func (db *DB) GetMigrationString() string {\n\treturn strings.Join(db.sqls, \";\\n\")\n}", "title": "" }, { "docid": "76b6703fe51c053b6721837ec5856f33", "score": "0.48524764", "text": "func (o HadoopClusterMetastoresHivePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *HadoopClusterMetastoresHive) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "52b862af16f3fe85ed5bd4761d1f5883", "score": "0.48489338", "text": "func (t testsql) GetCurrentDatabaseNameFunc(dbType string, connectionString string) (string, error) {\n\treturnValue := \"testDatabase\"\n\tvar err error\n\treturn returnValue, err\n}", "title": "" }, { "docid": "571d12008830606aca9d6085adb945a5", "score": "0.4848794", "text": "func genDBName(pe plugins.ProjectExtension) string {\n\tprojectSlugWithUnderscores := strings.Replace(pe.Project.Slug, \"-\", \"_\", -1)\n\tenvWithUnderscores := strings.Replace(pe.Environment, \"-\", \"_\", -1)\n\tif len(projectSlugWithUnderscores) > 10 {\n\t\tprojectSlugWithUnderscores = projectSlugWithUnderscores[:10]\n\t}\n\n\tif len(envWithUnderscores) > 10 {\n\t\tenvWithUnderscores = envWithUnderscores[:10]\n\t}\n\n\tuniqueID := uuid.NewV4()\n\n\treturn fmt.Sprintf(\"%s_%s_%s\", projectSlugWithUnderscores, envWithUnderscores, strings.Replace(uniqueID.String()[:12], \"-\", \"_\", -1))\n}", "title": "" }, { "docid": "ff2ba3ee25000d419715cce8c977d7d9", "score": "0.4842315", "text": "func genDBName(pe plugins.ProjectExtension) string {\n\treturn fmt.Sprintf(\"%s_%s\", pe.Project.Slug, pe.Environment)\n}", "title": "" }, { "docid": "e7eee7fd0534718a63771751f345bc4c", "score": "0.4818193", "text": "func (o SparkClusterMetastoresHivePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SparkClusterMetastoresHive) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6f1702a491be2cd04b6ab10327b64d68", "score": "0.48124197", "text": "func (o HadoopClusterMetastoresOoziePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *HadoopClusterMetastoresOozie) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "698ee893248d10ca579533f2420670ea", "score": "0.4801282", "text": "func (db *DBService) GetPrerequisiteJob(nickname string) (*DataHistoryJob, error) {\n\tswitch db.driver {\n\tcase database.DBSQLite3, database.DBSQLite:\n\t\treturn db.getPrerequisiteJobSQLite(nickname)\n\tcase database.DBPostgreSQL:\n\t\treturn db.getPrerequisiteJobPostgres(nickname)\n\tdefault:\n\t\treturn nil, database.ErrNoDatabaseProvided\n\t}\n}", "title": "" }, { "docid": "e55b3f007257bd5340148cf99744bb76", "score": "0.48006603", "text": "func ExtractComponentName(revisionName string) string {\n\tsplits := strings.Split(revisionName, \"-\")\n\treturn strings.Join(splits[0:len(splits)-1], \"-\")\n}", "title": "" }, { "docid": "2f9115f2f5db12f145b20323005ae7c3", "score": "0.47990695", "text": "func (o KafkaClusterMetastoresOoziePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KafkaClusterMetastoresOozie) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ab171d5b04f167815c1be8f9da4347c3", "score": "0.47861502", "text": "func (w Workloader) DBName() string {\n\treturn w.cfg.DBName\n}", "title": "" }, { "docid": "173e09f39107556530a36f97dddaed43", "score": "0.4784885", "text": "func (js *JobScheduler) Name() string {\n\treturn js.Job.Name()\n}", "title": "" }, { "docid": "146aefc8c7a12e4b934311fec8e27dbe", "score": "0.47774354", "text": "func getJob(service *talent.Service, jobName string) (*talent.Job, error) {\n\tjob, err := service.Projects.Jobs.Get(jobName).Do()\n\tif err != nil {\n\t\tlog.Fatalf(\"Failed to get job %s, Err: %v\", jobName, err)\n\t}\n\n\treturn job, err\n}", "title": "" }, { "docid": "7c8dadcf6b3e12fc33e82365ffa52603", "score": "0.47766286", "text": "func (o KafkaClusterMetastoresHiveOutput) DatabaseName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v KafkaClusterMetastoresHive) string { return v.DatabaseName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ba7275e012d595f72e42ac83692a791d", "score": "0.4772136", "text": "func (nl *NamedLockFunction) GetLockName(ctx *sql.Context, row sql.Row) (*string, error) {\n\tif nl.Child == nil {\n\t\treturn nil, nil\n\t}\n\n\tval, err := nl.Child.Eval(ctx, row)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif val == nil {\n\t\treturn nil, nil\n\t}\n\n\ts, ok := nl.Child.Type().(sql.StringType)\n\tif !ok {\n\t\treturn nil, ErrIllegalLockNameArgType.New(nl.Child.Type().String(), nl.funcName)\n\t}\n\tlockName, err := types.ConvertToString(val, s)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"%w; %s\", ErrIllegalLockNameArgType.New(nl.Child.Type().String(), nl.funcName), err)\n\t}\n\n\treturn &lockName, nil\n}", "title": "" }, { "docid": "2b0977cd50d06b9d1235ba255b32405f", "score": "0.47708803", "text": "func CmdName() string {\n\te, err := os.Executable()\n\tif err != nil {\n\t\treturn \"cmd\"\n\t}\n\n\t// fallbackName, the lowercase basename of the executable, is what we return if\n\t// we can't find the Go module metadata embedded in the file.\n\tfallbackName := filepath.Base(strings.TrimSuffix(strings.ToLower(e), \".exe\"))\n\n\tvar ret string\n\tv, err := version.ReadExe(e)\n\tif err != nil {\n\t\treturn fallbackName\n\t}\n\t// v is like:\n\t// \"path\\ttailscale.com/cmd/tailscale\\nmod\\ttailscale.com\\t(devel)\\t\\ndep\\tgithub.com/apenwarr/fixconsole\\tv0.0.0-20191012055117-5a9f6489cc29\\th1:muXWUcay7DDy1/hEQWrYlBy+g0EuwT70sBHg65SeUc4=\\ndep\\tgithub....\n\tfor _, line := range strings.Split(v.ModuleInfo, \"\\n\") {\n\t\tif strings.HasPrefix(line, \"path\\t\") {\n\t\t\tgoPkg := strings.TrimPrefix(line, \"path\\t\") // like \"tailscale.com/cmd/tailscale\"\n\t\t\tret = path.Base(goPkg) // goPkg is always forward slashes; use path, not filepath\n\t\t\tbreak\n\t\t}\n\t}\n\tif ret == \"\" {\n\t\treturn fallbackName\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "c9bd760c4ca322a389c16b18fe45fbdd", "score": "0.47688508", "text": "func GetMcName(t *testing.T, cs *framework.ClientSet, poolName string) string {\n\t// grab the initial machineconfig used by the worker pool\n\t// this MC is gonna be the one which is going to be reapplied once the previous MC is deleted\n\tmcp, err := cs.MachineConfigPools().Get(context.TODO(), poolName, metav1.GetOptions{})\n\trequire.Nil(t, err)\n\treturn mcp.Status.Configuration.Name\n}", "title": "" }, { "docid": "ebef758ebe2d0c8140f92399b443175e", "score": "0.4765565", "text": "func getRunID(name interface{}) string {\n\tjobName := name.(string)\n\tif len(jobName) > 63 {\n\t\tjobName = jobName[0:63]\n\t\tfor jobName[len(jobName)-1:] == \"-\" {\n\t\t\tjobName = jobName[:len(jobName)-1]\n\t\t}\n\t}\n\treturn \"\\\"\" + jobName + \"\\\"\"\n}", "title": "" }, { "docid": "0d743b108683140f05ca4d6a9a8e15c5", "score": "0.47633806", "text": "func (m *ArchivedPrintJob) GetPrinterName()(*string) {\n val, err := m.GetBackingStore().Get(\"printerName\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "a7236791e88f21653ca3d32ab372aabc", "score": "0.47573602", "text": "func (jr JobRun) GetName() string {\n\treturn \"runs\"\n}", "title": "" }, { "docid": "52e076448156f136cda1a8742fc3b63d", "score": "0.4754303", "text": "func (o SparkClusterMetastoresOoziePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *SparkClusterMetastoresOozie) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3f027f87638933ae74420c0ebe947246", "score": "0.47471425", "text": "func (o FlockerVolumeSourcePatchPtrOutput) DatasetName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *FlockerVolumeSourcePatch) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.DatasetName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "e71afa9d8a5d2305e1f5d7dc91a43df5", "score": "0.47465363", "text": "func (m *Employee) GetJobTitle()(*string) {\n val, err := m.GetBackingStore().Get(\"jobTitle\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "8dab1f794fa2fa8659fc630b99a885e8", "score": "0.4741241", "text": "func tableizeSchemaName(schemaName string) string {\n\tif schemaName == \"frontend\" {\n\t\treturn \"schema_migrations\"\n\t}\n\n\treturn fmt.Sprintf(\"%s_schema_migrations\", schemaName)\n}", "title": "" }, { "docid": "8998d9e63ea011bb60051b685ff5132a", "score": "0.47373307", "text": "func GenerateBatchNameFromJobRun(uniqueName string, jobRunName string, batchid int) string {\n\treturn fmt.Sprintf(\"%s-%s-%d\", uniqueName, jobRunName, batchid)\n}", "title": "" }, { "docid": "eb81d8c54219febbd92d3b50933ac26e", "score": "0.47359535", "text": "func getTaskRunName(prName string, pt *v1alpha1.PipelineTask) string {\n\treturn fmt.Sprintf(\"%s-%s\", prName, pt.Name)\n}", "title": "" }, { "docid": "11218632053bf0e835a133a2b7bb5a02", "score": "0.47346184", "text": "func GetModuleName() (string, error) {\n\tif len(os.Args) < 2 {\n\t\treturn \"\", fmt.Errorf(\n\t\t\t\"Must have at least one argument for the CLI module name: %s <modname>\", os.Args[0])\n\t}\n\treturn os.Args[1], nil\n}", "title": "" }, { "docid": "25ace65fb499f91ed879081bde25ea58", "score": "0.47345954", "text": "func (o KafkaClusterMetastoresOozieOutput) DatabaseName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v KafkaClusterMetastoresOozie) string { return v.DatabaseName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "bbd1d1f5a81a8e97aa6dd8d3cc08397c", "score": "0.473409", "text": "func (c *ReplicationDatabaseSpec) GetName() string {\n\treturn util.GetName(c.qserv, string(constants.ReplDbName))\n}", "title": "" }, { "docid": "24d58a33cb389c46a21bc678b3ad0c66", "score": "0.47323793", "text": "func (o BackupStatusPtrOutput) CronJobName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *BackupStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.CronJobName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8604c365d2a9f6ca18c6902f698ef203", "score": "0.47319722", "text": "func (hr HelmRelease) GetReleaseName() string {\n\tif hr.Spec.ReleaseName == \"\" {\n\t\tnamespace := hr.GetDefaultedNamespace()\n\t\ttargetNamespace := hr.GetTargetNamespace()\n\n\t\tif namespace != targetNamespace {\n\t\t\t// prefix the releaseName with the administering HelmRelease namespace as well\n\t\t\treturn fmt.Sprintf(\"%s-%s-%s\", namespace, targetNamespace, hr.Name)\n\t\t}\n\t\treturn fmt.Sprintf(\"%s-%s\", targetNamespace, hr.Name)\n\t}\n\n\treturn hr.Spec.ReleaseName\n}", "title": "" }, { "docid": "4a39d4f827929a404e5a3257078baf1a", "score": "0.4731696", "text": "func (o TransferJobOutput) Name() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *TransferJob) pulumi.StringOutput { return v.Name }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "f10f430e315fbfabc4905b7be0424a69", "score": "0.47312275", "text": "func GetDBNameFromAppBindingRef(dbAppRef *appcat.AppReference) string {\n\tcluster := \"-\"\n\tif clusterid.ClusterName() != \"\" {\n\t\tcluster = clusterid.ClusterName()\n\t}\n\treturn fmt.Sprintf(\"k8s.%s.%s.%s\", cluster, dbAppRef.Namespace, dbAppRef.Name)\n}", "title": "" }, { "docid": "d4e05689f6845c43e85b8f9ea094ad22", "score": "0.47286606", "text": "func (o BackupStatusOutput) CronJobName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BackupStatus) string { return v.CronJobName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "e85ae1222785075b3f3e98a07c87b643", "score": "0.47250444", "text": "func (blueprint *Blueprint) ProjectName() string {\n\treturn path.Base(blueprint.namespace)\n}", "title": "" }, { "docid": "d752c3dda78ee396be1f15ab63010ae3", "score": "0.4723961", "text": "func GetScriptName(fiName string) string {\n\treturn AideScriptConfigMapPrefix + \"-\" + fiName\n}", "title": "" }, { "docid": "7697cf9bf266d14927f3e075145ac833", "score": "0.47147414", "text": "func StepBookmarkName(fs string, guid uint64, id JobID) (string, error) {\n\treturn stepBookmarkNameImpl(fs, guid, id.String())\n}", "title": "" }, { "docid": "7697cf9bf266d14927f3e075145ac833", "score": "0.47147414", "text": "func StepBookmarkName(fs string, guid uint64, id JobID) (string, error) {\n\treturn stepBookmarkNameImpl(fs, guid, id.String())\n}", "title": "" }, { "docid": "ca178108d92c197691d1bb152f69a8e0", "score": "0.47126824", "text": "func (j *Job) Name() string {\n\treturn j.name\n}", "title": "" }, { "docid": "81f96316dd426a9502fdeb0cec8661f5", "score": "0.47111621", "text": "func (m Migration) GetPrimaryKeyName() string {\n\treturn MigrationsColRecordID\n}", "title": "" }, { "docid": "06e6678195f6925df3398d0900eb2d99", "score": "0.47041857", "text": "func (o FlockerVolumeSourcePatchOutput) DatasetName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v FlockerVolumeSourcePatch) *string { return v.DatasetName }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b9b8beff68ad7863e234e216e151504f", "score": "0.4695993", "text": "func (o HadoopClusterMetastoresOozieOutput) DatabaseName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HadoopClusterMetastoresOozie) string { return v.DatabaseName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2b3b519775ac413a7c1de999f226587f", "score": "0.4695817", "text": "func (o HadoopClusterMetastoresHiveOutput) DatabaseName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v HadoopClusterMetastoresHive) string { return v.DatabaseName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0100a0c0445e9d7cf42f3f0d99924777", "score": "0.46944857", "text": "func (o InteractiveQueryClusterMetastoresHivePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InteractiveQueryClusterMetastoresHive) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d83a7c33e82e026288ea59989d9f20d0", "score": "0.46876267", "text": "func GenerateBackupEntryName(shootTechnicalID string, shootUID types.UID) (string, error) {\n\tif shootTechnicalID == \"\" {\n\t\treturn \"\", fmt.Errorf(\"can't generate backup entry name with an empty shoot technical ID\")\n\t}\n\tif shootUID == \"\" {\n\t\treturn \"\", fmt.Errorf(\"can't generate backup entry name with an empty shoot UID\")\n\t}\n\treturn shootTechnicalID + backupEntryDelimiter + string(shootUID), nil\n}", "title": "" }, { "docid": "9ff65f4efe28fa7753dbe07318b97646", "score": "0.46808788", "text": "func (db *DataBag) GetName() string {\n\treturn db.Name\n}", "title": "" }, { "docid": "9ebd4205d967d91711d60475f77f8f1d", "score": "0.46762776", "text": "func GetDatabaseName(connStr string) string {\n\treturn p.Base(connStr)\n}", "title": "" }, { "docid": "25b2961caee44d32efa3185423d519b6", "score": "0.46756428", "text": "func (o SparkClusterMetastoresHiveOutput) DatabaseName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SparkClusterMetastoresHive) string { return v.DatabaseName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "351a1ab652c40b59775496d421ba22d7", "score": "0.4674634", "text": "func (m *Module) generateHelmReleaseName() string {\n\treturn m.Name\n}", "title": "" }, { "docid": "af6b38762dc077105466eeb4c01542db", "score": "0.46744958", "text": "func getJobManagerServiceName(clusterName string) string {\n\treturn clusterName + \"-jobmanager\"\n}", "title": "" }, { "docid": "528f785117735c0bb494b736ef704117", "score": "0.4670514", "text": "func (o *Task) GetName() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Name\n}", "title": "" }, { "docid": "8cfa321b3dc398db95ae0c94b14658ee", "score": "0.4666347", "text": "func GetPluginName(spec []byte) (string, error) {\n\tplugin, err := indexscanner.DecodePluginFile(bytes.NewReader(spec))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn plugin.GetName(), nil\n}", "title": "" }, { "docid": "ce5a60192abbff38338990e71a784571", "score": "0.46557158", "text": "func (o HBaseClusterMetastoresHivePtrOutput) DatabaseName() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *HBaseClusterMetastoresHive) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.DatabaseName\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" } ]
d0e3d808d1396ed99414fcfb58a5cacc
/GeneredUUID : Genera un codigo uuid unico
[ { "docid": "f8ca5d6b856561397c860ae6812fe678", "score": "0.8453005", "text": "func GeneredUUID() string {\n\tvar err error\n\tu1 := uuid.Must(uuid.NewV4(), err)\n\tuuid := fmt.Sprintf(\"%s\", u1)\n\n\treturn uuid\n}", "title": "" } ]
[ { "docid": "0b5bff9253db57b30725b66122e1e6ba", "score": "0.77031857", "text": "func GenerateUUID() string{\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n \t// log.Fatal(err)\n\t}\n\t// This is cool but it's really long\n\n\t// uuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\",\n\t// \tb[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\tuuid := fmt.Sprintf(\"%x\",\n\t b[0:4])\n\t// fmt.Println(uuid)\n\n\treturn uuid\n}", "title": "" }, { "docid": "5b19c313d41c01ced4b82725c065a074", "score": "0.76348245", "text": "func generateUUID() (string, error) {\n\tuuidLocker.Lock()\n\tdefer uuidLocker.Unlock()\n\n\tt := time.Now().UTC()\n\tentropy := rand.New(rand.NewSource(t.UnixNano()))\n\n\tid, err := ulid.New(ulid.Timestamp(t), entropy)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn strings.ToLower(id.String()), nil\n}", "title": "" }, { "docid": "736d3f849aa3436444efb5c68f3d6d96", "score": "0.75243616", "text": "func UUID() (string) {\n randInt = rand.Int63n(time.Now().UnixNano())\n rand.Seed(time.Now().UnixNano() + randInt)\n\n b := make([]byte, 16)\n _, err := rand.Read(b)\n\n CheckError(\"Error reading byte slice:\", err)\n\n if err != nil {\n return \"\"\n }\n\n uuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\n return uuid\n}", "title": "" }, { "docid": "12d664783a48712eb4c7497673065f78", "score": "0.75076514", "text": "func generateUUID() string {\n\tid, err := uuid.NewV4()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn id.String()\n}", "title": "" }, { "docid": "f8d3248475f31a78b7d699ebfeb01fba", "score": "0.7506071", "text": "func generateUUID() (string, error) {\n\tuuid, err := uuid.NewV4()\n\treturn uuid.String(), err\n}", "title": "" }, { "docid": "074ba1cd63913b940f985352d139c272", "score": "0.75036675", "text": "func GenerateUUID() uuid.UUID {\n\t/*****\n\t//eventually do this once we upgrade to new lib versions.\n\t// for now, still use this function as an unchanging interface,\n\t// but it does not do anything\n\t****/\n\n\tid, err := uuid.NewV1()\n\tif err != nil {\n\t\tid, err = uuid.NewV4()\n\t\tif err != nil {\n\t\t\treturn uuid.NewV5(nsUUID, time.Now().String())\n\t\t}\n\t}\n\n\treturn id\n}", "title": "" }, { "docid": "481a67efb2f0afa2a206f767d031a810", "score": "0.74995613", "text": "func GenerateUUID() (uuid string) {\n\tu := new([16]byte)\n\t_, err := rand.Read(u[:])\n\tif err != nil {\n\t\tlog.Println(\"UUID generation failed\", err)\n\t}\n\tu[8] = (u[8] | 0x40) & 0x7F\n\tu[6] = (u[6] & 0xF) | (0x4 << 4)\n\tuuid = fmt.Sprintf(\"%x-%x-%x-%x-%x\", u[0:4], u[4:6], u[6:8], u[8:10], u[10:])\n\treturn\n}", "title": "" }, { "docid": "a9f15eacdf4d7ce3ce29086d62708b52", "score": "0.7468885", "text": "func GenerateUUID() (string, error) {\n\tb := make([]byte, 16)\n\t_, er := rand.Read(b)\n\tif er != nil {\n\t\treturn \"\", er\n\t}\n\n\treturn fmt.Sprintf(\"%X-%X-%X-%X-%X\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:]), nil\n}", "title": "" }, { "docid": "d67df56fd44c43e77a48797d08005791", "score": "0.74506855", "text": "func GenUUID(sid uint8) string {\n\tb := make([]byte, 16)\n\n\tt := time.Now().Unix()\n\ttmpid := uint16(atomic.AddUint32(&uuid, 1))\n\n\tb[0] = byte(sid)\n\tb[1] = byte(0)\n\tb[2] = byte(tmpid)\n\tb[3] = byte(tmpid >> 8)\n\n\tb[4] = byte(t)\n\tb[5] = byte(t >> 8)\n\tb[6] = byte(t >> 16)\n\tb[7] = byte(t >> 24)\n\n\tc, _ := rc4.NewCipher([]byte{0x0c, b[2], b[3], b[0]})\n\tc.XORKeyStream(b[8:], b[:8])\n\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", b[:4], b[4:6], b[6:8], b[8:12], b[12:])\n}", "title": "" }, { "docid": "85c0a9309b803433cb4106b4e1cce52f", "score": "0.7387031", "text": "func GenerateUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tfor i := 0; i < 1000; i++ {\n\t\tn, err := io.ReadFull(rand.Reader, uuid)\n\t\tif n != len(uuid) || err != nil {\n\t\t\ttime.Sleep(100 * time.Millisecond)\n\t\t\tcontinue\n\t\t} else {\n\t\t\tuuid[8] = uuid[8]&^0xc0 | 0x80 // variant bits; see section 4.1.1\n\t\t\tuuid[6] = uuid[6]&^0xf0 | 0x40 // version 4 (pseudo-random); see section 4.1.3\n\t\t\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n\t\t}\n\t}\n\treturn \"\", ErrorNewUuid\n}", "title": "" }, { "docid": "2a25962a2496fe814ab36d3f261d4466", "score": "0.73780143", "text": "func GenUuid() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := rand.Read(uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// TODO: verify the two lines implement RFC 4122 correctly\n\tuuid[8] = 0x80 // variant bits see page 5\n\tuuid[4] = 0x40 // version 4 Pseudo Random, see page 7\n\n\treturn hex.EncodeToString(uuid), nil\n}", "title": "" }, { "docid": "a3f598bc6a47d24eb6a3d69095a919b3", "score": "0.7353064", "text": "func GenRandUUID() string {\n\ts := GenRandString(16)\n\treturn strings.Join([]string{s[:8], s[8:12], s[12:16], s[16:20], s[20:]}, \"-\")\n}", "title": "" }, { "docid": "015f1ba6a37db76e1d6daed89a1bfd71", "score": "0.732454", "text": "func GenUUID() string {\n\treturn IdSource{Randomness}.ReadUUID()\n}", "title": "" }, { "docid": "1a5142fcae8475c4805a1b189af39a56", "score": "0.73075294", "text": "func GenUUID() string {\n\tnewUUID := uuid.NewV4()\n\treturn newUUID.String()\n}", "title": "" }, { "docid": "5261346faef9bd67959644cf961dcf28", "score": "0.73061067", "text": "func uuid() string {\n\tb := make([]byte, 16)\n\tio.ReadFull(rand.Reader, b)\n\tb[6] = (b[6] & 0x0f) | 0x40\n\tb[8] = (b[8] & 0x3f) | 0x80\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n}", "title": "" }, { "docid": "adfd48f9199575395561b2a7ddddb7c7", "score": "0.72863185", "text": "func uuid() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tfmt.Println(\"Error: \", err)\n\t\tos.Exit(-1)\n\t\treturn \"\"\n\t}\n\treturn fmt.Sprintf(\"%X-%X-%X-%X-%X\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n}", "title": "" }, { "docid": "50959c68d4e0c538cdadb62960888d1e", "score": "0.7240081", "text": "func uuidGen() string {\n\treturn uuid.Must(uuid.NewV4()).String()\n}", "title": "" }, { "docid": "3a47d8030481b3c80cb48cf89c351f88", "score": "0.71455014", "text": "func GenUUID4() (uuid string) {\n\tb := make([]byte, 16)\n\trand.Read(b)\n\tuuid = fmt.Sprintf(\"%X-%X-%X-%X-%X\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "title": "" }, { "docid": "fa6f49c563f1f30bedb94b0d4191ecce", "score": "0.714429", "text": "func UUID() []byte { return uuid.NewV4().Bytes() }", "title": "" }, { "docid": "3f6fd823e095de72e1955d1dacc33454", "score": "0.71078247", "text": "func GenerateUUID() (string, error) {\n\tid, err := uuid.NewV4()\n\treturn id.String(), err\n}", "title": "" }, { "docid": "01fa960b87e510a8032bf4b676248153", "score": "0.70887214", "text": "func GenRandString(byteLength int) (uuid string) {\n\treturn hex.EncodeToString(GenRandBytes(byteLength))\n}", "title": "" }, { "docid": "b630556b0c44462389c714846f0ffeab", "score": "0.7079731", "text": "func NewUUID() string {\n\tout, err := exec.Command(\"uuidgen\").Output()\n\tif err != nil {\n\t\tt := time.Now()\n\t\treturn fmt.Sprintf(\"%s\", t.UnixNano())\n\t}\n\treturn strings.Trim(fmt.Sprintf(\"%s\", out), \"\\n\")\n}", "title": "" }, { "docid": "ab842beb3e33c31c6841939e9f1aaaa9", "score": "0.7047675", "text": "func GenerateUID() string {\n\tbuf := make([]byte, 16)\n\tif _, err := crand.Read(buf); err != nil {\n\t\tpanic(fmt.Errorf(\"failed generating uid: %v\", err))\n\t}\n\treturn fmt.Sprintf(\"%08x-%04x-%04x-%04x-%12x\",\n\t\tbuf[0:4],\n\t\tbuf[4:6],\n\t\tbuf[6:8],\n\t\tbuf[8:10],\n\t\tbuf[10:16])\n}", "title": "" }, { "docid": "5be520522b0268ad754cad8569b6ec30", "score": "0.70363253", "text": "func UUID(rs rand.Source) string {\n\tuuid := make([]byte, 16)\n\tif rs == nil {\n\t\trs = globalRandSource\n\t}\n\t_, _ = rand.New(rs).Read(uuid)\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:])\n}", "title": "" }, { "docid": "d6ec057e3faea6c67658bc8b22ea7bf6", "score": "0.7025108", "text": "func generateUID() (string, error) {\n\tuid, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn uid.String(), nil\n}", "title": "" }, { "docid": "accdfd363f1796498904328dbdff969d", "score": "0.7020754", "text": "func GenerateUUID() string {\n\tuuid, _ := uuid.NewV4()\n\treturn uuid.String()\n}", "title": "" }, { "docid": "1fadda66bd912c3f74a96ffc1bed35be", "score": "0.7012677", "text": "func GenerateUUID() string {\n\tu4, _ := uuid.NewV4()\n\treturn u4.String()\n}", "title": "" }, { "docid": "48aeb467df2493d0c8ee1de8f6fb1ccb", "score": "0.70049095", "text": "func UUID() (string, error) {\n\tn := 5\n\tb := make([]byte, n)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Could not generate UUID %v\", err)\n\t}\n\ts := fmt.Sprintf(\"%X\", b)\n\treturn s, nil\n}", "title": "" }, { "docid": "78925e13f74e0405445062eb15aee1dc", "score": "0.69964373", "text": "func genid() string {\n\tlength := 8\n\tb := make([]byte, length)\n\tfor i := 0; i < length; i++ {\n\t\tb[i] = byte(rand.Intn(122-97) + 97)\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "a5ead42377380ab31ae233a39e91f058", "score": "0.69926375", "text": "func generateID() string { return ksuid.New().String() }", "title": "" }, { "docid": "b74a8f4134d92a6d7634482bf7d1abf6", "score": "0.6979464", "text": "func UUID() (string, error) {\n\tuuid, err := GenerateRandomBytes(uuidLen)\n\tif err != nil {\n\t\terr = stacktrace.Propagate(err, \"could not generate uuid with length '%v'\", uuidLen)\n\t\treturn \"\", err\n\t}\n\tif len(uuid) != uuidLen {\n\t\terr := stacktrace.NewError(\"could not generate uuid due to wrong length byte slice (%d)\", len(uuid))\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "b2d0ab8e5a5c69932652cb688ac82b55", "score": "0.69676214", "text": "func UUID() (string, error) {\n\tbytes := make([]byte, 16)\n\t_, err := rand.Read(bytes)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\thx := hex.EncodeToString(bytes)\n\treturn fmt.Sprintf(\"%s-%s-%s-%s-%s\", hx[0:8], hx[8:12], hx[12:16], hx[16:20], hx[20:]), nil\n}", "title": "" }, { "docid": "eb72f307cadaadff060f92596ffb98ec", "score": "0.69096655", "text": "func GenerateRandomUuid() string {\n\tbuf := GenerateRandomUuidBytes()\n\treturn (hex.EncodeToString(buf[:4]) + \"-\" + hex.EncodeToString(buf[4:6]) + \n\t\t\"-\" + hex.EncodeToString(buf[6:8]) + \"-\" + hex.EncodeToString(buf[8:10]) + \n\t\t\"-\" + hex.EncodeToString(buf[10:]))\n}", "title": "" }, { "docid": "46cf5b4446cdf314d57111e3b914455b", "score": "0.6859401", "text": "func GenerateId() string {\n\treturn fmt.Sprint(uuid.NewV4())\n}", "title": "" }, { "docid": "7f469eac840895ee038ebb59163dcb73", "score": "0.6830061", "text": "func UUID() string {\n\tconst DefaultLength = 16\n\tuuid := make([]byte, DefaultLength)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\tpanic(err)\n\t}\n\treturn fmt.Sprintf(\"%x\", uuid)\n}", "title": "" }, { "docid": "a2d0d26630552484278f24ac1ec412ad", "score": "0.68298626", "text": "func (e EventData) generateUID() string { return strconv.Itoa(rand.Int()) }", "title": "" }, { "docid": "b88fd3264b5d3ba4c8726163f3bf9db0", "score": "0.68209076", "text": "func randomID() string {\n\treturn strings.ToUpper(strings.ReplaceAll(uuid.New().String(), \"-\", \"\")[0:17])\n}", "title": "" }, { "docid": "ae8a034d3e1e8776782e31ea0667dd70", "score": "0.6808728", "text": "func (Lgc) genID() (string, error) {\n\tf, err := exec.Command(\"uuidgen\").Output()\n\n\t// Trim the resulting whitespace (if any) from the uuidgen command.\n\tuid := string(f)\n\tuid = strings.TrimSpace(uid)\n\treturn uid, err\n}", "title": "" }, { "docid": "3069d62792c0ad1fd64b5bf716067306", "score": "0.6793105", "text": "func GenerateID() string {\n\tb := make([]byte, 4)\n\trand.Read(b)\n\treturn fmt.Sprintf(\"%x\", b)\n}", "title": "" }, { "docid": "e6d7fa124bc29c4d71142626eaeeb30b", "score": "0.6777269", "text": "func (f Funcs) UUID() string {\n\tu := uuid.NewV4()\n\treturn u.String()\n}", "title": "" }, { "docid": "7bb61cb267fe93e976e31572867e8ee0", "score": "0.6769916", "text": "func UUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "bf85ee71ba8164b87066e21e4c14e64c", "score": "0.676001", "text": "func NewUUID() string {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tATrue(n == len(uuid) && err == nil)\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:])\n}", "title": "" }, { "docid": "64a22e1195442bc0978c402c457cffa6", "score": "0.6750338", "text": "func (s *Server) UUID() string {\n\tuuid := s.gen.Next()\n\tkey := base64.StdEncoding.EncodeToString(uuid[:])\n\n\treturn key\n}", "title": "" }, { "docid": "95fc2693d19387e1de5629106adfc00c", "score": "0.674257", "text": "func NewUUID() string {\n\treturn uuid.New().String()\n}", "title": "" }, { "docid": "b86b202bbe31e00379dab697b82d5d46", "score": "0.67385477", "text": "func randomUUID() string {\n\treturn uuid.Must(uuid.NewV4()).String()\n}", "title": "" }, { "docid": "85d00e15be98191386f06376719ae87a", "score": "0.6730808", "text": "func GenerateRandomID() string {\n\tb := make([]byte, 32)\n\tfor i := range b {\n\tb[i] = safeBytes[rand.Intn(len(safeBytes))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "2aab8f37699689c5109f0bfb0a3a58c1", "score": "0.67165047", "text": "func genID() (interface{}, error) {\n\tnumBytes := 8\n\tbytes := make([]byte, numBytes)\n\tn, err := rand.Reader.Read(bytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif n != numBytes {\n\t\treturn nil, errors.New(\"generated insufficient random bytes\")\n\t}\n\n\thexStr := hex.EncodeToString(bytes)\n\treturn fmt.Sprintf(\"terraformed-%s\", hexStr), nil\n}", "title": "" }, { "docid": "45d2c31084ebce1cc98f452853cf6ce7", "score": "0.671564", "text": "func NewUUID() string {\n\treturn stringutil.ReplaceAll(uuid.New().String(), \"-\", \"\")\n}", "title": "" }, { "docid": "c76b2a6c7032944542b8c72f5b49e91f", "score": "0.67061174", "text": "func uniqueId() string {\n\tcharSet := []rune(\"0123456789abcdef\")\n\tb := make([]rune, 13)\n\tfor i := range b {\n\t\tb[i] = charSet[rand.Intn(len(charSet))]\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "4990a1bcf918af1296890d0e631b1851", "score": "0.66953963", "text": "func GenerateTag() string {\n\tu := uuid.New()\n\treturn strings.Replace(u.String(), \"-\", \"+\", -1)\n}", "title": "" }, { "docid": "d096894becead8168e3ded949b561f84", "score": "0.6681211", "text": "func createUUID() (uuid string) {\n\tu := new([16]byte)\n\t_, err := rand.Read(u[:])\n\tif err != nil {\n\t\tmisc.Error(\"Cannot generate UUID\", err)\n\t}\n\tu[8] = (u[8] | 0x40) & 0x7F\n\tu[6] = (u[6] & 0xF) | (0x4 << 4)\n\tuuid = fmt.Sprintf(\"%x-%x-%x-%x-%x\", u[0:4], u[4:6], u[6:8], u[8:10], u[10:])\n\treturn\n}", "title": "" }, { "docid": "8a58429ded1060993e76cdb11a964cfd", "score": "0.66797215", "text": "func NextUID() string {\n\tuid := make([]byte, 16)\n\t// use Golang standard lib to get cryptographically secure pseudorandom numbers\n\t// the generator is backed by /dev/urandom (as per Golang's implementation)\n\t// be aware: this will be slow in Plan9 due to its lack of /dev/random\n\tentropy, err := rand.Read(uid)\n\tif err != nil || entropy != 16 {\n\t\tpanic(\"no enough entropy\")\n\t}\n\treturn hex.EncodeToString(uid)\n}", "title": "" }, { "docid": "848313d1902de0e3f50ac83c89d16789", "score": "0.66618377", "text": "func UniqueID() string {\n\tuuid := make([]byte, 16)\n\tio.ReadFull(rand.Reader, uuid)\n\treturn fmt.Sprintf(\"%x\", uuid)\n}", "title": "" }, { "docid": "a3f8089458ae23a83b23a39931fc4cb5", "score": "0.66587317", "text": "func newUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "a3f8089458ae23a83b23a39931fc4cb5", "score": "0.66587317", "text": "func newUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "85c0830308813cbad94bf8865f83e42b", "score": "0.6638587", "text": "func NewUUID() (string, error) {\n\tb := make([]byte, 16)\n\tn, err := io.ReadFull(crand.Reader, b)\n\tif n != len(b) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tb[8] = b[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tb[6] = b[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:]), nil\n}", "title": "" }, { "docid": "4e452806bd8517a5b239fe912d3dca23", "score": "0.66319376", "text": "func geneUniqueID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tuuid := fmt.Sprintf(\"%x-%x-%x-%x-%x\", b[0:4], b[4:6], b[6:8], b[8:10], b[10:])\n\treturn uuid\n}", "title": "" }, { "docid": "4d43d150cfb7417ca9b0a21b998301a3", "score": "0.6627903", "text": "func (g *goUUID) Generate() string {\n\treturn uuid.Must(uuid.NewV4(), nil).String()\n}", "title": "" }, { "docid": "6722f611f1d0b1bfd1304b66f339f770", "score": "0.66254455", "text": "func NewUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "ed5e42484cf7d95304e6a7811c7c1b1c", "score": "0.66198117", "text": "func createUID() string {\n\tc := sha1.New()\n\tr := createRandom()\n\tio.WriteString(c, string(r))\n\ts := fmt.Sprintf(\"%x\", c.Sum(nil))\n\treturn \"drone-\" + s[0:10]\n}", "title": "" }, { "docid": "ed5e42484cf7d95304e6a7811c7c1b1c", "score": "0.66198117", "text": "func createUID() string {\n\tc := sha1.New()\n\tr := createRandom()\n\tio.WriteString(c, string(r))\n\ts := fmt.Sprintf(\"%x\", c.Sum(nil))\n\treturn \"drone-\" + s[0:10]\n}", "title": "" }, { "docid": "a9f367fff5ce6eb5c81b167cadf2cace", "score": "0.6604986", "text": "func GenUID() (uid string) {\n\tt := time.Now()\n\tstr := t.String()\n\th := sha1.New()\n\th.Write([]byte(str))\n\tuid = fmt.Sprintf(\"%x\", h.Sum(nil))\n\treturn string([]byte(uid[:10]))\n}", "title": "" }, { "docid": "e719adc8a8dd3731c081d38fb4515330", "score": "0.65931606", "text": "func newUUID() string {\n\treturn uuid.Must(uuid.NewV4()).String()\n}", "title": "" }, { "docid": "03e3090eedafba0e2b96ae300a178db3", "score": "0.6591667", "text": "func Generate() (string, error) {\n\tid, err := sf.NextID()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn strconv.FormatUint(id, 10), nil\n}", "title": "" }, { "docid": "e37f17788e6cce3547646ebaddce77f9", "score": "0.65914965", "text": "func GetUuid() string {\n\treturn strings.ReplaceAll(uuid.New().String(), \"-\", \"\")\n}", "title": "" }, { "docid": "281cab43679ee4124ad18605e9a566c3", "score": "0.6591365", "text": "func NewUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "281cab43679ee4124ad18605e9a566c3", "score": "0.6591365", "text": "func NewUUID() (string, error) {\n\tuuid := make([]byte, 16)\n\tn, err := io.ReadFull(rand.Reader, uuid)\n\tif n != len(uuid) || err != nil {\n\t\treturn \"\", err\n\t}\n\t// variant bits; see section 4.1.1\n\tuuid[8] = uuid[8]&^0xc0 | 0x80\n\t// version 4 (pseudo-random); see section 4.1.3\n\tuuid[6] = uuid[6]&^0xf0 | 0x40\n\treturn fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:]), nil\n}", "title": "" }, { "docid": "047c9dd90134be8794ad4b5723743713", "score": "0.6589082", "text": "func (c *UUIDController) Generate(ctx *app.GenerateUUIDContext) error {\n\t// UUIDController_Generate: start_implement\n\n uuid := make([]byte, 16)\n n, err := io.ReadFull(rand.Reader, uuid)\n if n != len(uuid) || err != nil {\n return err\n }\n // variant bits; see section 4.1.1\n uuid[8] = uuid[8]&^0xc0 | 0x80\n // version 4 (pseudo-random); see section 4.1.3\n uuid[6] = uuid[6]&^0xf0 | 0x40\n\ts := fmt.Sprintf(\"%x-%x-%x-%x-%x\", uuid[0:4], uuid[4:6], uuid[6:8], uuid[8:10], uuid[10:])\n return ctx.OK([]byte(s))\n\n\t// UUIDController_Generate: end_implement\n\treturn nil\n}", "title": "" }, { "docid": "1093ce16c301b6dbffd5fffe28be6064", "score": "0.6580672", "text": "func randomId() string {\n\n\t// Call Seed, using current nanoseconds.\n\trand.Seed(int64(time.Now().Nanosecond()))\n\t// Random int will be different each program execution.\n\tvalue := rand.Int63()\n \n return fmt.Sprintf(\"%X\", value) \n\n }", "title": "" }, { "docid": "6d9fadc9e0597a6f31b91f48a6c2ce7f", "score": "0.65700114", "text": "func UUID() string {\n\treturn strings.ReplaceAll(uuid.New().String(), \"-\", \"\")\n}", "title": "" }, { "docid": "cfa63355ae2eab154ff616bb4a2335a9", "score": "0.6569816", "text": "func GenerateId() string {\n\tid := make([]byte, 32)\n\tif _, err := io.ReadFull(rand.Reader, id); err != nil {\n\t\tpanic(err)\n\t}\n\tvalue := hex.EncodeToString(id)\n\n\treturn value\n}", "title": "" }, { "docid": "33801a4e3d46c5b38302a1379b608083", "score": "0.6556953", "text": "func createEventUUID() string {\n\tuuid, err := uuid.NewV4()\n\tif err != nil {\n\t\tlogrus.Errorf(\"Failed to create UUID %v\", err)\n\t\t// Using a default UUID if the creation of the UUID fails\n\t\treturn \"39bffcd3-4325-4d18-bff5-5bd4410949ba\"\n\t}\n\n\treturn uuid.String()\n}", "title": "" }, { "docid": "ab995c21026dc21e7e391be944371dde", "score": "0.6555403", "text": "func UUID() *goncrete.UUID {\n\tuuid := goncrete.NewUUID()\n\tuuid.UuidString = sampleUUID\n\treturn uuid\n}", "title": "" }, { "docid": "a392b5ff7d74379156d765efaeb472ff", "score": "0.6552627", "text": "func RandomID() string {\n\tb := make([]byte, 16)\n\t_, err := rand.Read(b)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn fmt.Sprintf(\"%x\", b)\n}", "title": "" }, { "docid": "f6d2261c3c22a1e14a8a6a502f32dfbe", "score": "0.6548759", "text": "func NewID() string {\n\tvar b bytes.Buffer\n\tencoder := base32.NewEncoder(encoding, &b)\n\tencoder.Write(uuid.NewRandom())\n\tencoder.Close()\n\tb.Truncate(26) // removes the '==' padding\n\treturn b.String()\n}", "title": "" }, { "docid": "06ea2e67346fed0266275089172bdb7f", "score": "0.6547663", "text": "func UUID() string {\n\treturn uuid.New().String()\n}", "title": "" }, { "docid": "964e45a59d26926c29f9cea7d2b0adcb", "score": "0.6543893", "text": "func GenerateRandomUuidBytes() []byte {\n\tonce.Do(func() {\n\t\tvar b [8]byte\n\t\t_, err := crand.Read(b[:])\n\t\tif err == nil {\n\t\t\tseed := int64(binary.BigEndian.Uint64(b[:]))\n\t\t\trand.Seed(seed)\n\t\t}\n\t})\n\n\tbuf := make([]byte, 16)\n\trand.Read(buf)\n\tb1 := buf[6]\n\tbuf[6] = 0x40 + (b1 & 0x0F)\n\tb2 := buf[8]\n\tbuf[8] = 0x80 + (b2 & 0x3F)\n\treturn buf\n}", "title": "" }, { "docid": "4b88a3d9ba4075f52e466c24c9f3ae01", "score": "0.6538323", "text": "func Generate() (u UUID) {\n\tconst (\n\t\t// ensures we backoff for less than 450ms total. Use the following to\n\t\t// select new value, in units of 10ms:\n\t\t// \tn*(n+1)/2 = d -> n^2 + n - 2d -> n = (sqrt(8d + 1) - 1)/2\n\t\tmaxretries = 9\n\t\tbackoff = time.Millisecond * 10\n\t)\n\n\tvar (\n\t\ttotalBackoff time.Duration\n\t\tcount int\n\t\tretries int\n\t)\n\n\tfor {\n\t\t// This should never block but the read may fail. Because of this,\n\t\t// we just try to read the random number generator until we get\n\t\t// something. This is a very rare condition but may happen.\n\t\tb := time.Duration(retries) * backoff\n\t\ttime.Sleep(b)\n\t\ttotalBackoff += b\n\n\t\tn, err := io.ReadFull(rand.Reader, u[count:])\n\t\tif err != nil {\n\t\t\tif retryOnError(err) && retries < maxretries {\n\t\t\t\tcount += n\n\t\t\t\tretries++\n\t\t\t\tLoggerf(\"error generating version 4 uuid, retrying: %v\", err)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// Any other errors represent a system problem. What did someone\n\t\t\t// do to /dev/urandom?\n\t\t\tpanic(fmt.Errorf(\"error reading random number generator, retried for %v: %v\", totalBackoff.String(), err))\n\t\t}\n\n\t\tbreak\n\t}\n\n\tu[6] = (u[6] & 0x0f) | 0x40 // set version byte\n\tu[8] = (u[8] & 0x3f) | 0x80 // set high order byte 0b10{8,9,a,b}\n\n\treturn u\n}", "title": "" }, { "docid": "ffa6affaeba8940e5f73e26f1913e9a4", "score": "0.6536663", "text": "func newUUID() string {\n\tu, _ := uuid.NewV4()\n\treturn strings.Replace(u.String(), \"-\", \"\", -1)\n}", "title": "" }, { "docid": "84adf746d235367d8a9e4021d8a5d67b", "score": "0.6535255", "text": "func CreateNewUUID() string {\n\tval1 := rand.Int63()\n\tval2 := rand.Int63()\n\tuuid := fmt.Sprintf(\"%x%x\", val1, val2)\n\treturn uuid\n}", "title": "" }, { "docid": "86065cb0166280a116d3ba2f27149b1a", "score": "0.6528295", "text": "func NewID() string {\n\tvar b bytes.Buffer\n\tencoder := base32.NewEncoder(encoding, &b)\n\t_, _ = encoder.Write(uuid.NewRandom())\n\tencoder.Close()\n\tb.Truncate(26) // removes the '==' padding\n\treturn b.String()\n}", "title": "" }, { "docid": "86065cb0166280a116d3ba2f27149b1a", "score": "0.6528295", "text": "func NewID() string {\n\tvar b bytes.Buffer\n\tencoder := base32.NewEncoder(encoding, &b)\n\t_, _ = encoder.Write(uuid.NewRandom())\n\tencoder.Close()\n\tb.Truncate(26) // removes the '==' padding\n\treturn b.String()\n}", "title": "" }, { "docid": "ff098bde80c2ed64a601221014d1f62a", "score": "0.6526765", "text": "func GenerateID() string {\n\tb := make([]byte, 6)\n\tfor i := range b {\n\t\tb[i] = letterBytes[rand.Intn(len(letterBytes))]\n\t}\n\treturn fmt.Sprintf(gameIDFormat, b[0:3], b[3:6])\n}", "title": "" }, { "docid": "a351d958ab01ed9e82b8ffed9b58cc51", "score": "0.65266865", "text": "func GenerateUniqueStrID() string {\n\tobjID := bson.NewObjectIdWithTime(time.Now())\n\treturn objID.String()\n}", "title": "" }, { "docid": "0317f018984fea99022478ba87f0ebed", "score": "0.6520087", "text": "func NewUUID() UUID {\n\tif nodeID == nil {\n\t\tSetNodeInterface(\"\")\n\t}\n\n\tnow, seq, err := GetTime()\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tuuid := make([]byte, 16)\n\n\ttime_low := uint32(now & 0xffffffff)\n\ttime_mid := uint16((now >> 32) & 0xffff)\n\ttime_hi := uint16((now >> 48) & 0x0fff)\n\ttime_hi |= 0x1000 // Version 1\n\n\tbinary.BigEndian.PutUint32(uuid[0:], time_low)\n\tbinary.BigEndian.PutUint16(uuid[4:], time_mid)\n\tbinary.BigEndian.PutUint16(uuid[6:], time_hi)\n\tbinary.BigEndian.PutUint16(uuid[8:], seq)\n\tcopy(uuid[10:], nodeID)\n\n\treturn uuid\n}", "title": "" }, { "docid": "18ebedc8710acb5238862ca3e09b2808", "score": "0.6506147", "text": "func newUUID() (string, error) {\n\n\tresult, err := uuid.NewV4()\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn result.String(), nil\n}", "title": "" }, { "docid": "d14a7c433b2c35806e190877ecbfea90", "score": "0.65049034", "text": "func GenerateUUIDWithoutDashes() string {\n\tuuid, _ := uuid.NewV4()\n\tstringVersion := strings.Replace(uuid.String(), \"-\", \"\", -1)\n\treturn stringVersion\n}", "title": "" }, { "docid": "1cbe5c1858f559b6c22158adc7a0fdbe", "score": "0.6504608", "text": "func genNewRandID(p *page.Params, d *ds.Device) {\n\tb := make([]byte, 9) // Use 9 bytes: multiple of 3 bytes (ideal for base64 encoding so no padding '=' signs will be needed)\n\tif _, p.Err = rand.Read(b); p.Err != nil {\n\t\treturn\n\t}\n\n\tRandID := base64.URLEncoding.EncodeToString(b)\n\n\t// Check if RandID is unique.\n\t// It will be, but once in a million years we might maybe perhaps encounter a match!\n\tq := datastore.NewQuery(ds.ENameDevice).Filter(ds.PNameRandID+\"=\", RandID).KeysOnly().Limit(1)\n\tvar devKeys []*datastore.Key\n\tif devKeys, p.Err = q.GetAll(p.AppCtx, nil); p.Err != nil {\n\t\treturn\n\t}\n\tif len(devKeys) > 0 {\n\t\tp.Err = fmt.Errorf(\"Generated device RandID already exists: %s\", RandID)\n\t\treturn\n\t}\n\n\td.RandID = RandID\n}", "title": "" }, { "docid": "b05274ccd5aed12375c48596e14c1e84", "score": "0.64945954", "text": "func GenerateRandBytes() []byte {\n\tu, _ := uuid.NewV4()\n\treturn u.Bytes()\n}", "title": "" }, { "docid": "7a53e0566bb265fcb7badee30b32cc4b", "score": "0.6489666", "text": "func UniqueString() string { return uuid.New().String() }", "title": "" }, { "docid": "6ee34e72500fd43de8b2732b887c4c7c", "score": "0.648486", "text": "func UUIDString(id []byte) string { return uuid.FromBytesOrNil(id).String() }", "title": "" }, { "docid": "c1d959343ed1fbb84f9c3e4695906a66", "score": "0.64785266", "text": "func RandomUUID() (ruuid string) {\n\tdest := []byte(RandomChars(16))\n\tsetVersion(dest,4)\n\tSetVariant(dest)\n\truuid = uuid(dest)\n\treturn\n}", "title": "" }, { "docid": "67427a7f675e5bfacfd9c2944b24f7ba", "score": "0.6468919", "text": "func (userStruct *User) generateID() {\n\tuuidID := []byte(uuid.NewV1().String())\n\t// Cut to 8 char length\n\tuserStruct.ID = string(uuidID[:idLength])\n}", "title": "" }, { "docid": "afb1b4178b73ba3554c03e7570b6341e", "score": "0.64673287", "text": "func getUUID() string {\n\tu4, err := uuid.NewV4()\n\tif err != nil {\n\t\tfmt.Println(\"error:\", err)\n\t\treturn \"\"\n\t}\n\treturn u4.String()\n}", "title": "" }, { "docid": "69d67c07518c5e5f7e05aee70272ad56", "score": "0.6461309", "text": "func IDGenerate() string {\n\tvar ourEpochMS uint64 = 1496635208000\n\tvar n uint64\n\n\tnowMS := uint64(time.Now().UnixNano() / 1e6)\n\tseqIndex := uint64(nextSeqID())\n\tseqID := uint64(seqIndex % 1024)\n\tshardID := uint64(5)\n\n\tn = (nowMS - ourEpochMS) << 23\n\tn = n | (shardID << 10)\n\tn = n | seqID\n\n\tbin := make([]byte, 8)\n\tbinary.BigEndian.PutUint64(bin, n)\n\tencodeString := base32.HexEncoding.WithPadding(base32.NoPadding).EncodeToString(bin)\n\n\treturn encodeString\n\n}", "title": "" }, { "docid": "d1e59a6c341ea61401602fa89f180978", "score": "0.6442626", "text": "func NewUUID() [16]byte {\n\treturn uuid.New()\n}", "title": "" }, { "docid": "dfb18c35937e3ab880086c3640a26f6f", "score": "0.6436461", "text": "func (kws *Websocket) createUUID() string {\n\treturn kws.randomUUID()\n}", "title": "" }, { "docid": "f033831f2e9febe1a520a3ca91f84878", "score": "0.6435379", "text": "func NewUUID() string {\n\treturn uuid.NewV4().String()\n}", "title": "" }, { "docid": "f033831f2e9febe1a520a3ca91f84878", "score": "0.6435379", "text": "func NewUUID() string {\n\treturn uuid.NewV4().String()\n}", "title": "" }, { "docid": "27e449fa2b89d49344bf099d308daf4e", "score": "0.6431872", "text": "func RandomID() string {\n\tvar letterRunes = []rune(\"abcdefghijklmnopqrstuvwxyz0123456789\")\n\n\tb := make([]rune, 16)\n\tfor i := range b {\n\t\tb[i] = letterRunes[rand.Intn(len(letterRunes))]\n\t}\n\n\treturn string(b)\n}", "title": "" } ]
87726cd292561819ce496f84df973124
PutObject creates a new object using the data in body with the given key
[ { "docid": "9d1303a269a99e84d25a44e94d1bafbe", "score": "0.7263594", "text": "func (o *objectStore) PutObject(bucketName string, key string, body io.Reader) error {\n\tb, err := o.client.Bucket(bucketName)\n\tif err != nil {\n\t\treturn errors.WrapIfWithDetails(err, \"error getting bucket instance\", \"bucket\", bucketName)\n\t}\n\n\terr = b.PutObject(key, body)\n\tif err != nil {\n\t\terr = o.convertError(err)\n\t\treturn errors.WrapIfWithDetails(err, \"error putting object\", \"bucket\", bucketName, \"object\", key)\n\t}\n\n\treturn nil\n}", "title": "" } ]
[ { "docid": "fedd12a0e33522e959656c845d63dfba", "score": "0.72921634", "text": "func (store *MockStore) PutObject(input *s3.PutObjectInput) (*s3.PutObjectOutput, error) {\n\tvar b []byte\n\tvar err error\n\n\t// Copy the contents of Body\n\tif b, err = ioutil.ReadAll(input.Body); err != nil {\n\t\treturn nil, err\n\t}\n\n\tswitch {\n\tcase strings.HasPrefix(*input.Key, \"/page\"):\n\t\tpage := common.Page{}\n\n\t\tif err = json.Unmarshal(b, &page); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to deserialize Page: %w\", err)\n\t\t}\n\n\t\tstore.Pages[*input.Key] = page\n\n\tcase strings.HasPrefix(*input.Key, \"/node\"):\n\t\tnode := common.Node{}\n\n\t\tif err = json.Unmarshal(b, &node); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to deserialize Node: %w\", err)\n\t\t}\n\n\t\tstore.Nodes[*input.Key] = node\n\n\tcase strings.HasPrefix(*input.Key, \"/data\"):\n\t\tabout := common.Thing{}\n\n\t\tif err = json.Unmarshal(b, &about); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to deserialize Thing: %w\", err)\n\t\t}\n\n\t\tstore.Abouts[*input.Key] = about\n\n\tcase strings.HasPrefix(*input.Key, \"/topics\"):\n\t\ttopics := []common.RelatedTopic{}\n\n\t\tif err = json.Unmarshal(b, &topics); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to deserialize Thing: %w\", err)\n\t\t}\n\n\t\tstore.Topics[*input.Key] = topics\n\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unrecognized key format (%s)\", *input.Key)\n\n\t}\n\n\treturn &s3.PutObjectOutput{}, nil\n}", "title": "" }, { "docid": "03a820a1ee28c52d7d9cdeb4778b88d5", "score": "0.7192057", "text": "func PutObject(c *StoreContext, rw web.ResponseWriter, req *web.Request) {\n\tlogrus.WithField(\"key\", c.key).Info(\"starting PutObject\")\n\terr := objstore.Store(c.key, req.Body)\n\tif err != nil {\n\t\thttp.Error(rw, err.Error(), http.StatusPreconditionFailed)\n\t\treturn\n\t}\n\trw.WriteHeader(http.StatusAccepted)\n}", "title": "" }, { "docid": "c538e0965776da98626dda521555d17b", "score": "0.6972504", "text": "func (f *FSObjectClient) PutObject(_ context.Context, objectKey string, object io.ReadSeeker) error {\n\tfullPath := filepath.Join(f.cfg.Directory, filepath.FromSlash(objectKey))\n\terr := util.EnsureDirectory(filepath.Dir(fullPath))\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfl, err := os.OpenFile(fullPath, os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer runutil.CloseWithLogOnErr(util_log.Logger, fl, \"fullPath: %s\", fullPath)\n\n\t_, err = io.Copy(fl, object)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = fl.Sync()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn fl.Close()\n}", "title": "" }, { "docid": "0d7e8b9f36b719ec6186e4da6778060b", "score": "0.6829269", "text": "func (c *Client) PutObject(destination string, contentType string, r io.Reader) error {\n\theaders := make(http.Header)\n\theaders.Add(\"content-type\", \"application/json\")\n\n\tlog.Println(\"filepath:\", destination)\n\tresp, err := c.Put(destination, headers, r)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer resp.Body.Close()\n\n\treturn c.ensureStatus(resp, 204)\n}", "title": "" }, { "docid": "fad5f1950a29dd3f2aef1ded2c48fc9d", "score": "0.682819", "text": "func (b BaiduBOSBackend) PutObject(path string, content []byte) error {\n\tkey := pathutil.Join(b.Prefix, path)\n\tvar err error\n\t_, err = b.Client.PutObjectFromBytes(b.Bucket, key, content, nil)\n\treturn err\n}", "title": "" }, { "docid": "149a187015f1499812f697da71172625", "score": "0.6801938", "text": "func (*awsProvider) PutObj(r io.ReadCloser, lom *cluster.LOM) (errCode int, err error) {\n\tvar (\n\t\tsvc *s3.S3\n\t\tuploadOutput *s3manager.UploadOutput\n\t\th = cmn.BackendHelpers.Amazon\n\t\tcksumType, cksumValue = lom.Checksum().Get()\n\t\tcloudBck = lom.Bck().RemoteBck()\n\t\tmd = make(map[string]*string, 2)\n\t)\n\n\tsvc, _, err = newClient(sessConf{bck: cloudBck}, \"[put_object]\")\n\tif err != nil && superVerbose {\n\t\tnlog.Warningln(err)\n\t}\n\n\tmd[cos.S3MetadataChecksumType] = aws.String(cksumType)\n\tmd[cos.S3MetadataChecksumVal] = aws.String(cksumValue)\n\n\tuploader := s3manager.NewUploaderWithClient(svc)\n\tuploadOutput, err = uploader.Upload(&s3manager.UploadInput{\n\t\tBucket: aws.String(cloudBck.Name),\n\t\tKey: aws.String(lom.ObjName),\n\t\tBody: r,\n\t\tMetadata: md,\n\t})\n\tif err != nil {\n\t\terrCode, err = awsErrorToAISError(err, cloudBck)\n\t\tcos.Close(r)\n\t\treturn\n\t}\n\t// compare with setCustomS3() above\n\tif v, ok := h.EncodeVersion(uploadOutput.VersionID); ok {\n\t\tlom.SetCustomKey(cmn.VersionObjMD, v)\n\t\tlom.SetVersion(v)\n\t}\n\tif v, ok := h.EncodeCksum(uploadOutput.ETag); ok {\n\t\tlom.SetCustomKey(cmn.ETag, v)\n\t\t// see ETag/MD5 NOTE above\n\t\tif !strings.Contains(v, cmn.AwsMultipartDelim) {\n\t\t\tlom.SetCustomKey(cmn.MD5ObjMD, v)\n\t\t}\n\t}\n\tif superVerbose {\n\t\tnlog.Infof(\"[put_object] %s\", lom)\n\t}\n\tcos.Close(r)\n\treturn\n}", "title": "" }, { "docid": "a0714da849cd45dafae8004271fe1c4c", "score": "0.67347467", "text": "func (a *API) PutObject(r io.Reader, bucket, path string, force bool) error {\n\treturn nil\n}", "title": "" }, { "docid": "0e5e201e63740382841a88e009f8b6d7", "score": "0.6665683", "text": "func (a *API) PutObject(bucket, object string, rd io.Reader, options ...Option) error {\n\treturn a.Do(\"PUT\", bucket, object, nil, append([]Option{HTTPBody(rd)}, options...)...)\n}", "title": "" }, { "docid": "07ac4e8570ae434e53303d31c55d580d", "score": "0.6646693", "text": "func (c Client) PutObject(bucketName, objectName string, reader io.Reader, contentType string) (n int64, err error) {\n\treturn c.PutObjectWithMetadata(bucketName, objectName, reader, map[string][]string{\n\t\t\"Content-Type\": []string{contentType},\n\t}, nil)\n}", "title": "" }, { "docid": "e2cfea7589cf9bc2b17c40c9f4aa36e7", "score": "0.66165423", "text": "func (gbase *Gobolt) SetByKey(bucket_name string, key_name string, obj interface{}) error {\n\terr := gbase.gb.Update(func(tx *bolt.Tx) error {\n\t\tbucket, err := tx.CreateBucketIfNotExists([]byte(bucket_name))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t//id, _ := bucket.NextSequence()\n\t\t//obj.ID = int(id)\n\t\tid := []byte(key_name)\n\n\t\tbuf, err := json.Marshal(obj)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = bucket.Put(id, buf)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\n\treturn err\n}", "title": "" }, { "docid": "b0661a520ac2119aad883d8cd839646a", "score": "0.6613945", "text": "func (c *SyscallService) PutObject(ctx context.Context, in *pb.PutRequest) (*pb.PutResponse, error) {\n\tnctx, ok := c.ctxmgr.Context(in.GetHeader().Ctxid)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"bad ctx id:%d\", in.Header.Ctxid)\n\t}\n\tif in.Value == nil {\n\t\tnctx.Logger.Error(\"PutObject\", \"contract\", nctx.ContractName, \"key\", in.Key, \"error\", \"put nil value\")\n\t\treturn nil, errors.New(\"put nil value\")\n\t}\n\n\terr := nctx.Cache.Put(nctx.ContractName, in.Key, in.Value)\n\tif err != nil {\n\t\tnctx.Logger.Error(\"PutObject\", \"contract\", nctx.ContractName, \"key\", in.Key, \"value\", in.Value, \"error\", err)\n\t\treturn nil, err\n\t}\n\n\treturn &pb.PutResponse{}, nil\n}", "title": "" }, { "docid": "cb5fcba63669fd1f898c78571c7a2a21", "score": "0.65607566", "text": "func (s S3) PutObject(bucket, path, name string) error {\n\n\tif bucket == \"\" {\n\t\treturn errors.Wrap(bindings.ErrInvalidParameter, \"bucket\")\n\t}\n\tif path == \"\" {\n\t\treturn errors.Wrap(bindings.ErrInvalidParameter, \"path\")\n\t}\n\tif name == \"\" {\n\t\treturn errors.Wrap(bindings.ErrInvalidParameter, \"name\")\n\t}\n\n\tfile, err := readFile(path)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"coudln't read local file from path %s\", path)\n\t}\n\n\tin := &s3.PutObjectInput{\n\t\tBucket: aws.String(bucket),\n\t\tKey: aws.String(name),\n\t\tContentType: aws.String(file.contentType),\n\t\tBody: bytes.NewReader(file.content),\n\t\tContentLength: aws.Int64(file.contentLength),\n\t}\n\n\t_, err = s.s3.PutObject(in)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"unable to put object %s\", name)\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "f31089ab25d0f3c5d7bec8ad9fbe682e", "score": "0.64990747", "text": "func (c *SyscallService) PutObject(ctx context.Context, in *pb.PutRequest) (*pb.PutResponse, error) {\n\tnctx, ok := c.ctxmgr.Context(in.GetHeader().Ctxid)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"bad ctx id:%d\", in.Header.Ctxid)\n\t}\n\tif in.Value == nil {\n\t\treturn nil, errors.New(\"put nil value\")\n\t}\n\n\terr := nctx.Cache.Put(nctx.ContractName, in.Key, in.Value)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tlog.Printf(\"put value:%s=%s\", in.Key, in.Value)\n\treturn &pb.PutResponse{}, nil\n}", "title": "" }, { "docid": "502efd37b41caa21b888212eea9d0616", "score": "0.64809954", "text": "func (dao *workerDao) PutObject(space string, jobID string, topic string, rowID string, data interface{}) error {\n\tdataBytes, err := dao.client.MarshalObject(data)\n\tif err != nil {\n\t\tdao.logger.Error(\"[ERROR-WorkerDao] PutObject marshal\", err)\n\t}\n\t// fmt.Println(\"&&&&& PutObject :: key=\", key, \", data=\", data)\n\treturn dao.PutData(space, jobID, topic, rowID, dataBytes)\n}", "title": "" }, { "docid": "3e647625f348e6f14b654cccd81bf49e", "score": "0.64582217", "text": "func (x *xObjects) putObject(ctx context.Context, r io.Reader, bucket string, object string, opts minio.ObjectOptions) (minio.ObjectInfo, error) {\n\thash, size, err := ipfsFileUpload(ctx, x.fileClient, r)\n\tif err != nil {\n\t\treturn minio.ObjectInfo{}, x.toMinioErr(err, bucket, object, \"\")\n\t}\n\tobinfo := newObjectInfo(bucket, object, size, opts)\n\terr = x.ledgerStore.PutObject(ctx, bucket, object, &Object{\n\t\tDataHash: hash,\n\t\tObjectInfo: obinfo,\n\t})\n\tif err != nil {\n\t\treturn minio.ObjectInfo{}, x.toMinioErr(err, bucket, object, \"\")\n\t}\n\n\tobinfo.UserDefined = map[string]string{\n\t\tfleekIpfsContentHash: hash,\n\t\tfleekIpfsContentHashV0: convertToHashV0(hash),\n\t}\n\n\tpingHash(hash)\n\n\tlog.Printf(\"bucket-name: %s, object-name: %s, file-hash: %s\", bucket, object, hash)\n\treturn getMinioObjectInfo(&obinfo), nil\n}", "title": "" }, { "docid": "90f8f350071609057fe96227342f2340", "score": "0.64502215", "text": "func (awsp *awsProvider) PutObj(ctx context.Context, r io.Reader, lom *cluster.LOM) (version string, err error, errCode int) {\n\tvar (\n\t\tuploadOutput *s3manager.UploadOutput\n\t\tcksumType, cksumValue = lom.Cksum().Get()\n\t\tcloudBck = lom.Bck().CloudBck()\n\t\tmd = make(map[string]*string, 2)\n\t)\n\tmd[awsChecksumType] = aws.String(cksumType)\n\tmd[awsChecksumVal] = aws.String(cksumValue)\n\n\tuploader := s3manager.NewUploader(createSession(ctx))\n\tuploadOutput, err = uploader.Upload(&s3manager.UploadInput{\n\t\tBucket: aws.String(cloudBck.Name),\n\t\tKey: aws.String(lom.ObjName),\n\t\tBody: r,\n\t\tMetadata: md,\n\t})\n\tif err != nil {\n\t\terr, errCode = awsErrorToAISError(err, cloudBck, lom.T.Snode().Name())\n\t\treturn\n\t}\n\tif glog.FastV(4, glog.SmoduleAIS) {\n\t\tif uploadOutput.VersionID != nil {\n\t\t\tversion = *uploadOutput.VersionID\n\t\t\tglog.Infof(\"[put_object] %s, version %s\", lom, version)\n\t\t} else {\n\t\t\tglog.Infof(\"[put_object] %s\", lom)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "e35a2a2d2c369914cf7df74a2d13c8e1", "score": "0.6421449", "text": "func (b TencentCOSBackend) PutObject(path string, content []byte) error {\n\treturn b.Bucket.PutObject(path, content)\n}", "title": "" }, { "docid": "94844a2aabfc987742bee13929f3f0eb", "score": "0.6412939", "text": "func PutObjectWithSetters(sess *session.Session, bucket *string, key *string) error {\n //snippet-start:[s3.go.put_object.call]\n svc := s3.New(sess)\n\n _, err := svc.PutObject((&s3.PutObjectInput{}).\n SetBucket(*bucket).\n SetKey(*key).\n SetBody(strings.NewReader(\"object body\")), //.\n // SetWebsiteRedirectLocation(\"https://example.com/something\"),\n )\n //snippet-end:[s3.go.put_object.call]\n if err != nil {\n return err\n }\n\n return nil\n}", "title": "" }, { "docid": "2fa495397c653e93cbf7f7505db6591d", "score": "0.63999254", "text": "func (c *Client) Put(key string, obj []byte) error {\n\tc.conn.writeMsg(PUT.String() + \"|\" + key + \"|\" + strconv.Itoa(len(obj)))\n\tn, _ := c.conn.netConn.Write(obj)\n\tfmt.Println(\"Writing Object of Size \" + strconv.Itoa(n))\n\tmsgData, err := c.conn.reader.ReadString('\\n')\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn c.conn.handleAck(strings.TrimSpace(msgData))\n}", "title": "" }, { "docid": "857d517bc329863753ec99be59f7381f", "score": "0.6345147", "text": "func (s3 S3) CreateObject(key string, content []byte) error {\n\tsess := session.Must(session.NewSession())\n\tuploader := s3manager.NewUploader(sess)\n\n\tr := bytes.NewReader(content)\n\t_, err := uploader.Upload(&s3manager.UploadInput{\n\t\tBucket: aws.String(s3.Bucket),\n\t\tKey: aws.String(key),\n\t\tBody: r,\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to upload object, %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c2de4fa4831c4f628858da9ddbde334b", "score": "0.63323045", "text": "func (oh *ObjectHandle) Put(e Epoch, dkey string, akey string, value []byte) error {\n\tkr := NewKeyRequest([]byte(akey))\n\tkr.Put(0, 1, uint64(len(value)), value)\n\n\treturn oh.Update(e, []byte(dkey), []*KeyRequest{kr})\n}", "title": "" }, { "docid": "5728e8c5f1124b912815a619c5bee4b2", "score": "0.6290142", "text": "func fPutObj(svc *s3.S3 , datafile string) (*s3.PutObjectOutput,error) {\n\n\tvar (\n\n\t\tmetafile = datafile+\".\"+ metaEx\n\t\t_,key = filepath.Split(datafile)\n\t\tusermd = map[string]string{}\n\t\terr error\n\n\t)\n\tif absolute {\n\t\tkey = datafile\n\t}\n\tgLog.Info.Print(key)\n\tif usermd,err = utils.ReadUsermd(metafile); err != nil {\n\t\tgLog.Error.Printf(\"Error %v reading meta data file %s\",err,metafile)\n\t}\n\n\treq:= datatype.FputObjRequest{\n\t\t// Service : s3.New(api.CreateSession()),\n\t\tService: svc,\n\t\tBucket: bucket,\n\t\tKey: key,\n\t\tInputfile: datafile,\n\t\tUsermd : usermd,\n\n\t}\n\treturn api.FputObject2(req)\n}", "title": "" }, { "docid": "1423ee0fb19eb569da2fb8c5f90e90fa", "score": "0.62587994", "text": "func (b *Bucket) Put(object string, content io.Reader, headers map[string]string) error {\n\tbuffer := new(bytes.Buffer)\n\tio.Copy(buffer, content)\n\n\theader := make(http.Header)\n\theader.Set(\"Content-Type\", http.DetectContentType(buffer.Bytes()))\n\theader.Set(\"Content-Length\", strconv.Itoa(buffer.Len()))\n\n\tfor key, val := range headers {\n\t\theader.Set(key, val)\n\t}\n\n\tresp, err := b.do(\"PUT\", b.name, string(b.region), object, header, buffer)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer resp.Body.Close()\n\n\tif resp.StatusCode != 200 {\n\t\terr = errors.New(resp.Status)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "740b23a5ae2553faac83b7b99b095a15", "score": "0.6253191", "text": "func (c *Client) PutObj(reqid uint64, oid string, objData []byte, timeout time.Duration) error {\n\t_, err := c.callTimeout(reqid, objPutMethod, oid, objData, timeout)\n\treturn err\n}", "title": "" }, { "docid": "474130e7586135d6330a5df661b4d323", "score": "0.62507945", "text": "func (s *S3) PutObject(name string, data io.Reader, size int64) error {\n\t_, err := s.minioClient.PutObject(s.ctx, s.bucketName, s.prefix+name, data, size, minio.PutObjectOptions{})\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"put object\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "72537693a1884c5cbe0b11c9b2a12f95", "score": "0.62365186", "text": "func (c Core) PutObject(ctx context.Context, bucket, object string, data io.Reader, size int64, md5Base64, sha256Hex string, opts PutObjectOptions) (UploadInfo, error) {\n\thookReader := newHook(data, opts.Progress)\n\treturn c.putObjectDo(ctx, bucket, object, hookReader, md5Base64, sha256Hex, size, opts)\n}", "title": "" }, { "docid": "a58069ae74510861326b71c171eb51bd", "score": "0.6213641", "text": "func (c *ClusterClient) Put(key *KeyObject, value []byte) error {\n\n\tvar requests []*pb.Request\n\trequest := &pb.Request{\n\t\tPut: &pb.PutRequest{\n\t\t\tKey: key.GetKey(),\n\t\t\tPartitionHash: key.GetPartitionHash(),\n\t\t\tUpdatedAtNs: c.UpdatedAtNs,\n\t\t\tTtlSecond: c.TtlSecond,\n\t\t\tOpAndDataType: pb.OpAndDataType_BYTES,\n\t\t\tValue: value,\n\t\t},\n\t}\n\trequests = append(requests, request)\n\n\treturn c.BatchProcess(requests, func(responses []*pb.Response, err error) error {\n\t\treturn err\n\t})\n}", "title": "" }, { "docid": "82c722353d8803484e51f8690552c2ea", "score": "0.6195236", "text": "func (c *Client) PutObject(object *types.PutObjectInput) error {\n\n\ttags := fmt.Sprintf(\n\t\t\"%s=%s&%s=%s\",\n\t\tApplicatonMetaKey,\n\t\tobject.Application,\n\t\tEnvironmentMetaKey,\n\t\tobject.Environment,\n\t)\n\n\tparams := &s3.PutObjectInput{\n\t\tBucket: aws.String(c.bucket),\n\t\tKey: aws.String(object.Key),\n\t\tACL: aws.String(s3ACL),\n\t\tBody: bytes.NewReader([]byte(object.Value)),\n\t\tMetadata: map[string]*string{\n\t\t\tApplicatonMetaKey: aws.String(object.Application),\n\t\t\tEnvironmentMetaKey: aws.String(object.Environment),\n\t\t},\n\t\tServerSideEncryption: aws.String(s3ServerSideEncryption),\n\t\tSSEKMSKeyId: aws.String(\"alias/\" + object.Environment),\n\t\tTagging: aws.String(tags),\n\t}\n\n\t_, err := c.S3Svc.PutObject(params)\n\n\treturn err\n}", "title": "" }, { "docid": "e13d24572f2eab341228d98a30d11a80", "score": "0.6173681", "text": "func (x *xObjects) PutObject(ctx context.Context, bucket string, object string, r *minio.PutObjReader, opts minio.ObjectOptions) (objInfo minio.ObjectInfo, err error) {\n\t// TODO(bonedaddy): ensure consistency with the way s3 and b2 handle this\n\tobinfo := &ObjectInfo{}\n\tfor k, v := range opts.UserDefined {\n\t\tswitch strings.ToLower(k) {\n\t\tcase \"content-encoding\":\n\t\t\tobinfo.ContentEncoding = v\n\t\tcase \"content-disposition\":\n\t\t\tobinfo.ContentDisposition = v\n\t\tcase \"content-language\":\n\t\t\tobinfo.ContentLanguage = v\n\t\tcase \"content-type\":\n\t\t\tobinfo.ContentType = v\n\t\t}\n\t}\n\tobinfo.ModTime = time.Now().UTC().String()\n\tdata, err := ioutil.ReadAll(r)\n\tif err != nil {\n\t\treturn objInfo, err\n\t}\n\t// add the object to ipfs\n\tobjectHash, err := x.objectToIPFS(ctx, &Object{\n\t\tData: data,\n\t\tObjectInfo: obinfo,\n\t})\n\t// update the bucket on ipfs with the new object\n\tbucketHash, err := x.addObjectToBucketAndIPFS(ctx, object, objectHash, bucket)\n\tif err != nil {\n\t\treturn objInfo, err\n\t}\n\t// update our internal ledger state\n\tif err := x.ledgerStore.AddObjectToBucket(bucket, object, objectHash); err != nil {\n\t\treturn objInfo, err\n\t}\n\treturn x.getMinioObjectInfo(ctx, bucket, object)\n}", "title": "" }, { "docid": "b8166e623874ac40423c7bbe75d6bfa9", "score": "0.61631507", "text": "func (a api) PutObject(bucket, object, contentType string, size int64, data io.Reader) error {\n\tif err := invalidBucketError(bucket); err != nil {\n\t\treturn err\n\t}\n\tif err := invalidArgumentError(object); err != nil {\n\t\treturn err\n\t}\n\t// for un-authenticated requests do not initiated multipart operation\n\t//\n\t// NOTE: this behavior is only kept valid for S3, since S3 doesn't\n\t// allow unauthenticated multipart requests\n\tif a.config.Region != \"milkyway\" {\n\t\tif a.config.AccessKeyID == \"\" || a.config.SecretAccessKey == \"\" {\n\t\t\t_, err := a.putObjectUnAuthenticated(bucket, object, contentType, size, data)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t}\n\t}\n\tswitch {\n\tcase size < minimumPartSize:\n\t\t// Single Part use case, use PutObject directly\n\t\tfor part := range chopper(data, minimumPartSize, nil) {\n\t\t\tif part.Err != nil {\n\t\t\t\treturn part.Err\n\t\t\t}\n\t\t\t// This verifies if the part.Len was an unexpected read i.e if we lost few bytes\n\t\t\tif part.Len != size {\n\t\t\t\treturn ErrorResponse{\n\t\t\t\t\tCode: \"MethodUnexpectedEOF\",\n\t\t\t\t\tMessage: \"Data read is less than the requested size\",\n\t\t\t\t\tResource: separator + bucket + separator + object,\n\t\t\t\t}\n\t\t\t}\n\t\t\t_, err := a.putObject(bucket, object, contentType, part.MD5Sum, part.Len, part.ReadSeeker)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t}\n\tdefault:\n\t\tvar inProgress bool\n\t\tvar inProgressUploadID string\n\t\tfor mpUpload := range a.listMultipartUploadsRecursive(bucket, object) {\n\t\t\tif mpUpload.Err != nil {\n\t\t\t\treturn mpUpload.Err\n\t\t\t}\n\t\t\tif mpUpload.Metadata.Key == object {\n\t\t\t\tinProgress = true\n\t\t\t\tinProgressUploadID = mpUpload.Metadata.UploadID\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\tif !inProgress {\n\t\t\treturn a.newObjectUpload(bucket, object, contentType, size, data)\n\t\t}\n\t\treturn a.continueObjectUpload(bucket, object, inProgressUploadID, size, data)\n\t}\n\treturn errors.New(\"Unexpected control flow, please report this error at https://github.com/minio/minio-go-legacy/issues\")\n}", "title": "" }, { "docid": "f8b3502ee5bafb00c4e5f7043e7350c4", "score": "0.61592096", "text": "func (u *UploadLoggingClient) PutObject(ctx context.Context, params *s3.PutObjectInput, optFns ...func(*s3.Options)) (*s3.PutObjectOutput, error) {\n\tu.m.Lock()\n\tdefer u.m.Unlock()\n\n\tif u.ConsumeBody {\n\t\tio.Copy(ioutil.Discard, params.Body)\n\t}\n\n\tu.traceOperation(\"PutObject\", params)\n\tif err := u.simulateHTTPClientOption(optFns...); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif u.PutObjectFn != nil {\n\t\treturn u.PutObjectFn(u, params)\n\t}\n\n\treturn &s3.PutObjectOutput{\n\t\tVersionId: aws.String(\"VERSION-ID\"),\n\t}, nil\n}", "title": "" }, { "docid": "0679f6d308e17d246c9a57820e2ed9bb", "score": "0.61415416", "text": "func (e *eosObjects) PutObject(ctx context.Context, bucket, object string, data *minio.PutObjReader, opts minio.ObjectOptions) (objInfo minio.ObjectInfo, err error) {\n\te.Log(2, \"S3cmd: PutObject: %s/%s\", bucket, object)\n\n\tif e.readonly {\n\t\treturn objInfo, minio.NotImplemented{}\n\t}\n\n\tfor key, val := range opts.UserDefined {\n\t\te.Log(3, \"PutObject %s = %s\", key, val)\n\t}\n\n\tbuf, _ := ioutil.ReadAll(data)\n\tetag := hex.EncodeToString(data.MD5Current())\n\n\tdir := bucket + \"/\" + filepath.Dir(object)\n\tif _, err := e.EOSfsStat(dir); err != nil {\n\t\te.EOSmkdirWithOption(dir, \"&mgm.option=p\")\n\t}\n\n\terr = e.EOSput(bucket+\"/\"+object, buf)\n\tif err != nil {\n\t\te.Log(1, \"ERROR: PUT:%+v\", err)\n\t\treturn objInfo, err\n\t}\n\terr = e.EOSsetETag(bucket+\"/\"+object, etag)\n\tif err != nil {\n\t\te.Log(1, \"ERROR: PUT:%+v\", err)\n\t\treturn objInfo, err\n\t}\n\terr = e.EOSsetContentType(bucket+\"/\"+object, opts.UserDefined[\"content-type\"])\n\tif err != nil {\n\t\te.Log(1, \"ERROR: PUT:%+v\", err)\n\t\treturn objInfo, err\n\t}\n\n\te.EOScacheDeleteObject(bucket, object)\n\treturn e.GetObjectInfo(ctx, bucket, object, opts)\n}", "title": "" }, { "docid": "f8fadeb34d2241049472bd7755272025", "score": "0.6115657", "text": "func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {\n\texistingObj, err := f.NewObject(ctx, src.Remote())\n\tswitch err {\n\tcase nil:\n\t\treturn existingObj, existingObj.Update(ctx, in, src, options...)\n\tcase fs.ErrorObjectNotFound:\n\t\t// Not found so create it\n\t\treturn f.PutUnchecked(ctx, in, src, options...)\n\tdefault:\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "ba91cbaff9ba66139dd6f4d4faa94010", "score": "0.6105498", "text": "func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {\n\texistingObj, err := f.newObjectWithInfo(ctx, src.Remote(), nil)\n\tswitch err {\n\tcase nil:\n\t\treturn existingObj, existingObj.Update(ctx, in, src, options...)\n\tcase fs.ErrorObjectNotFound:\n\t\t// Not found so create it\n\t\treturn f.PutUnchecked(ctx, in, src)\n\tdefault:\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "e690d9358624d2545758ce4e93a02a99", "score": "0.6041154", "text": "func (objr objectResource) put(a *action) interface{} {\n\tvar expectHash []byte\n\tif c := a.req.Header.Get(\"ETag\"); c != \"\" {\n\t\tvar err error\n\t\texpectHash, err = hex.DecodeString(c)\n\t\tif err != nil || len(expectHash) != md5.Size {\n\t\t\tfatalf(400, \"InvalidDigest\", \"The ETag you specified was invalid\")\n\t\t}\n\t}\n\tsum := md5.New()\n\t// TODO avoid holding lock while reading data.\n\tdata, err := ioutil.ReadAll(io.TeeReader(a.req.Body, sum))\n\tif err != nil {\n\t\tfatalf(400, \"TODO\", \"read error\")\n\t}\n\tgotHash := sum.Sum(nil)\n\tif expectHash != nil && bytes.Compare(gotHash, expectHash) != 0 {\n\t\tfatalf(422, \"Bad ETag\", \"The ETag you specified did not match what we received\")\n\t}\n\tif a.req.ContentLength >= 0 && int64(len(data)) != a.req.ContentLength {\n\t\tfatalf(400, \"IncompleteBody\", \"You did not provide the number of bytes specified by the Content-Length HTTP header\")\n\t}\n\n\t// TODO is this correct, or should we erase all previous metadata?\n\tobj := objr.object\n\tif obj == nil {\n\t\tobj = &Object{\n\t\t\tName: objr.name,\n\t\t\tMetadata: Metadata{\n\t\t\t\tMeta: make(http.Header),\n\t\t\t},\n\t\t}\n\t\ta.user.Objects++\n\t} else {\n\t\tobjr.container.Bytes -= len(obj.Data)\n\t\ta.user.BytesUsed -= int64(len(obj.Data))\n\t}\n\n\tvar content_type string\n\tif content_type = a.req.Header.Get(\"Content-Type\"); content_type == \"\" {\n\t\tcontent_type = mime.TypeByExtension(obj.Name)\n\t\tif content_type == \"\" {\n\t\t\tcontent_type = \"application/octet-stream\"\n\t\t}\n\t}\n\n\t// PUT request has been successful - save data and metadata\n\tobj.setMetadata(a, \"object\")\n\tobj.Content_type = content_type\n\tobj.Data = data\n\tobj.Checksum = gotHash\n\tobj.Mtime = time.Now().UTC()\n\tobjr.container.Objects[objr.name] = obj\n\tobjr.container.Bytes += len(data)\n\ta.user.BytesUsed += int64(len(data))\n\n\th := a.w.Header()\n\th.Set(\"ETag\", hex.EncodeToString(obj.Checksum))\n\n\treturn nil\n}", "title": "" }, { "docid": "48b370c6b6cc1efd904ad0ba7ed724bb", "score": "0.6023972", "text": "func (api objectAPIHandlers) PutObjectHandler(w http.ResponseWriter, r *http.Request) {\n\t// If the matching failed, it means that the X-Amz-Copy-Source was\n\t// wrong, fail right here.\n\tif _, ok := r.Header[\"X-Amz-Copy-Source\"]; ok {\n\t\twriteErrorResponse(w, r, ErrInvalidCopySource, r.URL.Path)\n\t\treturn\n\t}\n\tvars := mux.Vars(r)\n\tbucket := vars[\"bucket\"]\n\tobject := vars[\"object\"]\n\n\t// Get Content-Md5 sent by client and verify if valid\n\tmd5Bytes, err := checkValidMD5(r.Header.Get(\"Content-Md5\"))\n\tif err != nil {\n\t\terrorIf(err, \"Unable to validate content-md5 format.\")\n\t\twriteErrorResponse(w, r, ErrInvalidDigest, r.URL.Path)\n\t\treturn\n\t}\n\t/// if Content-Length is unknown/missing, deny the request\n\tsize := r.ContentLength\n\tif size == -1 && !contains(r.TransferEncoding, \"chunked\") {\n\t\twriteErrorResponse(w, r, ErrMissingContentLength, r.URL.Path)\n\t\treturn\n\t}\n\t/// maximum Upload size for objects in a single operation\n\tif isMaxObjectSize(size) {\n\t\twriteErrorResponse(w, r, ErrEntityTooLarge, r.URL.Path)\n\t\treturn\n\t}\n\n\t// Save metadata.\n\tmetadata := make(map[string]string)\n\t// Make sure we hex encode md5sum here.\n\tmetadata[\"md5Sum\"] = hex.EncodeToString(md5Bytes)\n\t// Save other metadata if available.\n\tmetadata[\"content-type\"] = r.Header.Get(\"Content-Type\")\n\tmetadata[\"content-encoding\"] = r.Header.Get(\"Content-Encoding\")\n\tfor key := range r.Header {\n\t\tcKey := http.CanonicalHeaderKey(key)\n\t\tif strings.HasPrefix(cKey, \"x-amz-meta-\") {\n\t\t\tmetadata[cKey] = r.Header.Get(cKey)\n\t\t} else if strings.HasPrefix(key, \"x-minio-meta-\") {\n\t\t\tmetadata[cKey] = r.Header.Get(cKey)\n\t\t}\n\t}\n\n\tvar md5Sum string\n\tswitch getRequestAuthType(r) {\n\tdefault:\n\t\t// For all unknown auth types return error.\n\t\twriteErrorResponse(w, r, ErrAccessDenied, r.URL.Path)\n\t\treturn\n\tcase authTypeAnonymous:\n\t\t// http://docs.aws.amazon.com/AmazonS3/latest/dev/using-with-s3-actions.html\n\t\tif s3Error := enforceBucketPolicy(\"s3:PutObject\", bucket, r.URL); s3Error != ErrNone {\n\t\t\twriteErrorResponse(w, r, s3Error, r.URL.Path)\n\t\t\treturn\n\t\t}\n\t\t// Create anonymous object.\n\t\tmd5Sum, err = api.ObjectAPI.PutObject(bucket, object, size, r.Body, metadata)\n\tcase authTypePresigned, authTypeSigned:\n\t\t// Initialize signature verifier.\n\t\treader := newSignVerify(r)\n\t\t// Create object.\n\t\tmd5Sum, err = api.ObjectAPI.PutObject(bucket, object, size, reader, metadata)\n\t}\n\tif err != nil {\n\t\terrorIf(err, \"Unable to create an object.\")\n\t\twriteErrorResponse(w, r, toAPIErrorCode(err), r.URL.Path)\n\t\treturn\n\t}\n\tif md5Sum != \"\" {\n\t\tw.Header().Set(\"ETag\", \"\\\"\"+md5Sum+\"\\\"\")\n\t}\n\twriteSuccessResponse(w, nil)\n}", "title": "" }, { "docid": "9c7a5afe923817fea372a1fb890e0750", "score": "0.6018543", "text": "func UpdateObject(stub shim.ChaincodeStubInterface, objectType string, keys []string, objectData []byte) error {\n\n\t// Check how many keys\n\n\terr := VerifyAtLeastOneKeyIsPresent(objectType, keys)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Convert keys to compound key\n\tcompositeKey, _ := stub.CreateCompositeKey(objectType, keys)\n\n\t// Add Object JSON to state\n\terr = stub.PutState(compositeKey, objectData)\n\tif err != nil {\n\t\tfmt.Println(\"UpdateObject() : Error inserting Object into State Database %s\", err)\n\t\treturn err\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "7b2468790cb56bc5d61b0483eccd2b2d", "score": "0.5993969", "text": "func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {\n\t// Temporary Object under construction\n\tfs := &Object{\n\t\tfs: f,\n\t\tremote: src.Remote(),\n\t}\n\treturn fs, fs.Update(ctx, in, src, options...)\n}", "title": "" }, { "docid": "f72b15ee49a28e1c763e0ea9103a0def", "score": "0.5993329", "text": "func (f *Fs) Put(in io.Reader, src fs.ObjectInfo) (fs.Object, error) {\n\tremote := src.Remote()\n\tsize := src.Size()\n\tmodTime := src.ModTime()\n\n\to, _, _, err := f.createObject(remote, modTime, size)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn o, o.Update(in, src)\n}", "title": "" }, { "docid": "0c0d05c212ed810b1cc362efb213196a", "score": "0.599209", "text": "func (h *S3Helper) PutObjectInBucket(bucketname string, body string, key string,\n\tcontentType string) (bool, error) {\n\t_, err := h.s3client.PutObject(&s3.PutObjectInput{\n\t\tBody: strings.NewReader(body),\n\t\tBucket: &bucketname,\n\t\tKey: &key,\n\t\tContentType: &contentType,\n\t})\n\tif err != nil {\n\t\tlogger.Errorf(\"error encountered while putting object in bucket : %v\", err)\n\t\treturn false, err\n\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "38229675918a8489b434a829b8daca77", "score": "0.5990243", "text": "func (f *Fs) Put(ctx context.Context, in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {\n\to, err := f.NewObject(ctx, src.Remote())\n\tswitch err {\n\tcase nil:\n\t\treturn o, o.Update(ctx, in, src, options...)\n\tcase fs.ErrorObjectNotFound:\n\t\treturn f.put(ctx, in, src, false, options...)\n\tdefault:\n\t\treturn nil, err\n\t}\n}", "title": "" }, { "docid": "9c5addddc481e42b09818d0a3f51de05", "score": "0.59232473", "text": "func (c *Connection) Put(key []byte, object []byte) (*ResponsePut, error) {\n\tput := createPut(key, object, <-id, DefaultCache)\n\tc.connection.Write(put)\n\tstatus, err := bufio.NewReader(c.connection).Read(c.buf[:1024])\n\tif err != nil {\n\t\treturn &ResponsePut{}, err\n\t}\n\tp := NewBuffer(c.buf[:status])\n\treturn p.DecodePutResponse()\n}", "title": "" }, { "docid": "cd61e06e6f3a82dc17f8213adff133d6", "score": "0.58960634", "text": "func (gs *GoogleCloud) Put(ctx context.Context, url, path string) (*Object, error) {\n\tu, err := gs.parse(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treader, err := os.Open(path)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"googleStorage: opening file: %v\", err)\n\t}\n\tdefer reader.Close()\n\n\tobj := &storage.Object{\n\t\tName: u.path,\n\t}\n\n\t_, err = gs.svc.Objects.Insert(u.bucket, obj).Media(fsutil.Reader(ctx, reader)).Do()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"googleStorage: uploading object %s: %v\", url, err)\n\t}\n\treturn gs.Stat(ctx, url)\n}", "title": "" }, { "docid": "1a9360125e2eccc5f1ef7e371be6a2b8", "score": "0.5869141", "text": "func (b *Bucket) addObject(obj *PutObject, path, acl string) {\n\tb.putSpoolMu.Lock()\n\tdefer b.putSpoolMu.Unlock()\n\n\tsize := obj.Size()\n\treq := &SDK.PutObjectInput{\n\t\tACL: &acl,\n\t\tBucket: &b.nameWithPrefix,\n\t\tBody: obj.data,\n\t\tContentLength: &size,\n\t\tContentType: pointers.String(obj.FileType()),\n\t\tKey: pointers.String(path),\n\t}\n\tb.putSpool = append(b.putSpool, req)\n}", "title": "" }, { "docid": "ae9edfa7e9e42fcac2f7f5d9d67476b8", "score": "0.5860379", "text": "func PutObject(icon string) (bool, string) {\n\tobjectName, iconString := objectNameAndData(icon)\n\tif objectName == \"\" {\n\t\treturn false, objectName\n\t}\n\n\ticonByte, _ := base64.StdEncoding.DecodeString(iconString)\n\n\terr := bucket.PutObject(objectName, bytes.NewReader(iconByte))\n\tif err != nil {\n\t\thandleError(err)\n\t}\n\n\treturn true, objectName\n}", "title": "" }, { "docid": "38c215f540a724126e953e5a4a1a01a0", "score": "0.58507574", "text": "func (a *azureObjects) PutObject(bucket, object string, data *HashReader, metadata map[string]string) (objInfo ObjectInfo, err error) {\n\tdelete(metadata, \"etag\")\n\terr = a.client.CreateBlockBlobFromReader(bucket, object, uint64(data.Size()), data, s3ToAzureHeaders(metadata))\n\tif err != nil {\n\t\treturn objInfo, azureToObjectError(traceError(err), bucket, object)\n\t}\n\tif err = data.Verify(); err != nil {\n\t\ta.client.DeleteBlob(bucket, object, nil)\n\t\treturn ObjectInfo{}, azureToObjectError(traceError(err))\n\t}\n\treturn a.GetObjectInfo(bucket, object)\n}", "title": "" }, { "docid": "4a66e74160b486fbb9fbeb33a2ea4ead", "score": "0.58437026", "text": "func (kv1 KV1) Put(ctx context.Context, key string, data Values, options ...RequestOption) error {\n\tcontents, err := kv1.Client.jsonBody(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq := kv1.Client.createRequest(MethodPut, filepath.Join(\"/v1/\", key), options...).WithContext(ctx)\n\treq.Body = contents\n\tres, err := kv1.Client.send(req, OptTraceVaultOperation(\"kv1.put\"), OptTraceKeyName(key))\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer res.Close()\n\treturn nil\n}", "title": "" }, { "docid": "157b71a1292bd008a4698d709a26787d", "score": "0.5838633", "text": "func PutObject(args PutObjectArgs) (err error) {\n\tquery := cmn.AddBckToQuery(nil, args.Bck)\n\treturn _putObject(args, query)\n}", "title": "" }, { "docid": "53811920e7306c17e64a0a1cb7545a88", "score": "0.58253247", "text": "func (g *GoFakeS3) createObject(bucket, object string, w http.ResponseWriter, r *http.Request) (err error) {\n\tg.log.Print(LogInfo, \"CREATE OBJECT:\", bucket, object)\n\n\tmeta, err := metadataHeaders(r.Header, g.timeSource.Now(), g.metadataSizeLimit)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tvar (\n\t\tsize int64\n\t\tbody = r.Body\n\t)\n\n\t// S3 to S3 copy operations has Content-Length=0 header. First, we need to\n\t// fetch the original object from the given source and copy it to the\n\t// destination.\n\tcopySource := r.Header.Get(copySourceHeader)\n\tif copySource != \"\" {\n\t\tparts := strings.SplitN(copySource, \"/\", 2)\n\t\tsrcBucket := parts[0]\n\t\tsrcKey := parts[1]\n\n\t\tsrcKey, err = url.QueryUnescape(srcKey)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tsrc, err := g.storage.GetObject(srcBucket, srcKey, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsize = src.Size\n\n\t\tbody = src.Contents\n\n\t} else {\n\t\tvar err error\n\t\tsize, err = strconv.ParseInt(r.Header.Get(\"Content-Length\"), 10, 64)\n\t\tif err != nil || size <= 0 {\n\t\t\treturn ErrMissingContentLength\n\t\t}\n\t}\n\n\tif len(object) > KeySizeLimit {\n\t\treturn ResourceError(ErrKeyTooLong, object)\n\t}\n\n\tvar md5Base64 string\n\tif g.integrityCheck {\n\t\tmd5Base64 = r.Header.Get(\"Content-MD5\")\n\n\t\tif _, ok := r.Header[textproto.CanonicalMIMEHeaderKey(\"Content-MD5\")]; ok && md5Base64 == \"\" {\n\t\t\treturn ErrInvalidDigest // Satisfies s3tests\n\t\t}\n\t}\n\n\t// hashingReader is still needed to get the ETag even if integrityCheck\n\t// is set to false:\n\trdr, err := newHashingReader(body, md5Base64)\n\tdefer body.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresult, err := g.storage.PutObject(bucket, object, meta, rdr, size)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif copySource != \"\" {\n\t\treturn g.xmlEncoder(w).Encode(CopyObjectResult{\n\t\t\tETag: `\"` + hex.EncodeToString(rdr.Sum(nil)) + `\"`,\n\t\t\tLastModified: NewContentTime(g.timeSource.Now()),\n\t\t})\n\t}\n\n\tif result.VersionID != \"\" {\n\t\tg.log.Print(LogInfo, \"CREATED VERSION:\", bucket, object, result.VersionID)\n\t\tw.Header().Set(\"x-amz-version-id\", string(result.VersionID))\n\t}\n\tw.Header().Set(\"ETag\", `\"`+hex.EncodeToString(rdr.Sum(nil))+`\"`)\n\n\treturn nil\n}", "title": "" }, { "docid": "c28e5f66900f9811bf44b5074ef70f7f", "score": "0.5812918", "text": "func (objr objectResource) put(a *action) interface{} {\n\tvar expectHash []byte\n\tif c := a.req.Header.Get(\"ETag\"); c != \"\" {\n\t\tvar err error\n\t\texpectHash, err = hex.DecodeString(c)\n\t\tif err != nil || len(expectHash) != md5.Size {\n\t\t\tfatalf(400, \"InvalidDigest\", \"The ETag you specified was invalid\")\n\t\t}\n\t}\n\tsum := md5.New()\n\t// TODO avoid holding lock while reading data.\n\tdata, err := ioutil.ReadAll(io.TeeReader(a.req.Body, sum))\n\tif err != nil {\n\t\tfatalf(400, \"TODO\", \"read error\")\n\t}\n\tgotHash := sum.Sum(nil)\n\tif expectHash != nil && !bytes.Equal(gotHash, expectHash) {\n\t\tfatalf(422, \"Bad ETag\", \"The ETag you specified did not match what we received\")\n\t}\n\tif a.req.ContentLength >= 0 && int64(len(data)) != a.req.ContentLength {\n\t\tfatalf(400, \"IncompleteBody\", \"You did not provide the number of bytes specified by the Content-Length HTTP header\")\n\t}\n\n\t// TODO is this correct, or should we erase all previous metadata?\n\tobj := objr.object\n\tif obj == nil {\n\t\tobj = &object{\n\t\t\tname: objr.name,\n\t\t\tmetadata: metadata{\n\t\t\t\tmeta: make(http.Header),\n\t\t\t},\n\t\t}\n\t\tatomic.AddInt64(&a.user.Objects, 1)\n\t} else {\n\t\tatomic.AddInt64(&objr.container.bytes, -int64(len(obj.data)))\n\t\tatomic.AddInt64(&a.user.BytesUsed, -int64(len(obj.data)))\n\t}\n\n\tvar content_type string\n\tif content_type = a.req.Header.Get(\"Content-Type\"); content_type == \"\" {\n\t\tcontent_type = mime.TypeByExtension(obj.name)\n\t\tif content_type == \"\" {\n\t\t\tcontent_type = \"application/octet-stream\"\n\t\t}\n\t}\n\n\tif a.req.URL.Query().Get(\"multipart-manifest\") == \"put\" {\n\t\t// TODO: check the content of the SLO\n\t\ta.req.Header.Set(\"X-Static-Large-Object\", \"True\")\n\n\t\tvar segments []segment\n\t\terr := json.Unmarshal(data, &segments)\n\t\tif err != nil {\n\t\t\tfatalf(400, \"BadParameters\", \"Unmarshal failed.\")\n\t\t}\n\t\tfor i := range segments {\n\t\t\tsegments[i].Name = \"/\" + segments[i].Path\n\t\t\tsegments[i].Path = \"\"\n\t\t\tsegments[i].Hash = segments[i].Etag\n\t\t\tsegments[i].Etag = \"\"\n\t\t\tsegments[i].Bytes = segments[i].Size\n\t\t\tsegments[i].Size = 0\n\t\t}\n\n\t\tdata, _ = json.Marshal(segments)\n\t\tsum = md5.New()\n\t\tsum.Write(data)\n\t\tgotHash = sum.Sum(nil)\n\t}\n\n\t// PUT request has been successful - save data and metadata\n\tobj.setMetadata(a, \"object\")\n\tobj.content_type = content_type\n\tobj.data = data\n\tobj.checksum = gotHash\n\tobj.mtime = time.Now().UTC()\n\tobjr.container.Lock()\n\tobjr.container.objects[objr.name] = obj\n\tobjr.container.bytes += int64(len(data))\n\tobjr.container.Unlock()\n\n\tatomic.AddInt64(&a.user.BytesUsed, int64(len(data)))\n\n\th := a.w.Header()\n\th.Set(\"ETag\", hex.EncodeToString(obj.checksum))\n\n\treturn nil\n}", "title": "" }, { "docid": "90fbd3e14ab4a5eb3f52f3b1c23bd855", "score": "0.57758856", "text": "func (es *erasureSingle) putObject(ctx context.Context, bucket string, object string, r *PutObjReader, opts ObjectOptions) (objInfo ObjectInfo, err error) {\n\tdata := r.Reader\n\n\t// No metadata is set, allocate a new one.\n\tif opts.UserDefined == nil {\n\t\topts.UserDefined = make(map[string]string)\n\t}\n\n\tstorageDisks := []StorageAPI{es.disk}\n\tparityDrives := 0\n\tdataDrives := len(storageDisks) - parityDrives\n\n\t// we now know the number of blocks this object needs for data and parity.\n\t// writeQuorum is dataBlocks + 1\n\twriteQuorum := dataDrives\n\tif dataDrives == parityDrives {\n\t\twriteQuorum++\n\t}\n\n\t// Validate input data size and it can never be less than zero.\n\tif data.Size() < -1 {\n\t\tlogger.LogIf(ctx, errInvalidArgument, logger.Application)\n\t\treturn ObjectInfo{}, toObjectErr(errInvalidArgument)\n\t}\n\n\t// Initialize parts metadata\n\tpartsMetadata := make([]FileInfo, len(storageDisks))\n\n\tfi := newFileInfo(pathJoin(bucket, object), dataDrives, parityDrives)\n\tfi.VersionID = opts.VersionID\n\tif opts.Versioned && fi.VersionID == \"\" {\n\t\tfi.VersionID = mustGetUUID()\n\t}\n\n\tfi.DataDir = mustGetUUID()\n\tuniqueID := mustGetUUID()\n\ttempObj := uniqueID\n\n\t// Initialize erasure metadata.\n\tfor index := range partsMetadata {\n\t\tpartsMetadata[index] = fi\n\t}\n\n\t// Order disks according to erasure distribution\n\tvar onlineDisks []StorageAPI\n\tonlineDisks, partsMetadata = shuffleDisksAndPartsMetadata(storageDisks, partsMetadata, fi)\n\n\terasure, err := NewErasure(ctx, fi.Erasure.DataBlocks, fi.Erasure.ParityBlocks, fi.Erasure.BlockSize)\n\tif err != nil {\n\t\treturn ObjectInfo{}, toObjectErr(err, bucket, object)\n\t}\n\n\t// Fetch buffer for I/O, returns from the pool if not allocates a new one and returns.\n\tvar buffer []byte\n\tswitch size := data.Size(); {\n\tcase size == 0:\n\t\tbuffer = make([]byte, 1) // Allocate atleast a byte to reach EOF\n\tcase size == -1:\n\t\tif size := data.ActualSize(); size > 0 && size < fi.Erasure.BlockSize {\n\t\t\tbuffer = make([]byte, data.ActualSize()+256, data.ActualSize()*2+512)\n\t\t} else {\n\t\t\tbuffer = es.bp.Get()\n\t\t\tdefer es.bp.Put(buffer)\n\t\t}\n\tcase size >= fi.Erasure.BlockSize:\n\t\tbuffer = es.bp.Get()\n\t\tdefer es.bp.Put(buffer)\n\tcase size < fi.Erasure.BlockSize:\n\t\t// No need to allocate fully blockSizeV1 buffer if the incoming data is smaller.\n\t\tbuffer = make([]byte, size, 2*size+int64(fi.Erasure.ParityBlocks+fi.Erasure.DataBlocks-1))\n\t}\n\n\tif len(buffer) > int(fi.Erasure.BlockSize) {\n\t\tbuffer = buffer[:fi.Erasure.BlockSize]\n\t}\n\n\tpartName := \"part.1\"\n\ttempErasureObj := pathJoin(uniqueID, fi.DataDir, partName)\n\n\t// Delete temporary object in the event of failure.\n\t// If PutObject succeeded there would be no temporary\n\t// object to delete.\n\tvar online int\n\tdefer func() {\n\t\tif online != len(onlineDisks) {\n\t\t\tes.disk.RenameFile(context.Background(), minioMetaTmpBucket, tempObj, minioMetaTmpDeletedBucket, mustGetUUID())\n\t\t}\n\t}()\n\n\tshardFileSize := erasure.ShardFileSize(data.Size())\n\twriters := make([]io.Writer, len(onlineDisks))\n\tvar inlineBuffers []*bytes.Buffer\n\tif shardFileSize >= 0 {\n\t\tif !opts.Versioned && shardFileSize < smallFileThreshold {\n\t\t\tinlineBuffers = make([]*bytes.Buffer, len(onlineDisks))\n\t\t} else if shardFileSize < smallFileThreshold/8 {\n\t\t\tinlineBuffers = make([]*bytes.Buffer, len(onlineDisks))\n\t\t}\n\t} else {\n\t\t// If compressed, use actual size to determine.\n\t\tif sz := erasure.ShardFileSize(data.ActualSize()); sz > 0 {\n\t\t\tif !opts.Versioned && sz < smallFileThreshold {\n\t\t\t\tinlineBuffers = make([]*bytes.Buffer, len(onlineDisks))\n\t\t\t} else if sz < smallFileThreshold/8 {\n\t\t\t\tinlineBuffers = make([]*bytes.Buffer, len(onlineDisks))\n\t\t\t}\n\t\t}\n\t}\n\tfor i, disk := range onlineDisks {\n\t\tif disk == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tif !disk.IsOnline() {\n\t\t\tcontinue\n\t\t}\n\n\t\tif len(inlineBuffers) > 0 {\n\t\t\tsz := shardFileSize\n\t\t\tif sz < 0 {\n\t\t\t\tsz = data.ActualSize()\n\t\t\t}\n\t\t\tinlineBuffers[i] = bytes.NewBuffer(make([]byte, 0, sz))\n\t\t\twriters[i] = newStreamingBitrotWriterBuffer(inlineBuffers[i], DefaultBitrotAlgorithm, erasure.ShardSize())\n\t\t\tcontinue\n\t\t}\n\n\t\twriters[i] = newBitrotWriter(disk, minioMetaTmpBucket, tempErasureObj, shardFileSize, DefaultBitrotAlgorithm, erasure.ShardSize())\n\t}\n\n\ttoEncode := io.Reader(data)\n\tif data.Size() > bigFileThreshold {\n\t\t// We use 2 buffers, so we always have a full buffer of input.\n\t\tbufA := es.bp.Get()\n\t\tbufB := es.bp.Get()\n\t\tdefer es.bp.Put(bufA)\n\t\tdefer es.bp.Put(bufB)\n\t\tra, err := readahead.NewReaderBuffer(data, [][]byte{bufA[:fi.Erasure.BlockSize], bufB[:fi.Erasure.BlockSize]})\n\t\tif err == nil {\n\t\t\ttoEncode = ra\n\t\t\tdefer ra.Close()\n\t\t}\n\t\tlogger.LogIf(ctx, err)\n\t}\n\tn, erasureErr := erasure.Encode(ctx, toEncode, writers, buffer, writeQuorum)\n\tcloseBitrotWriters(writers)\n\tif erasureErr != nil {\n\t\treturn ObjectInfo{}, toObjectErr(erasureErr, minioMetaTmpBucket, tempErasureObj)\n\t}\n\n\t// Should return IncompleteBody{} error when reader has fewer bytes\n\t// than specified in request header.\n\tif n < data.Size() {\n\t\treturn ObjectInfo{}, IncompleteBody{Bucket: bucket, Object: object}\n\t}\n\n\tif !opts.NoLock {\n\t\tlk := es.NewNSLock(bucket, object)\n\t\tlkctx, err := lk.GetLock(ctx, globalOperationTimeout)\n\t\tif err != nil {\n\t\t\treturn ObjectInfo{}, err\n\t\t}\n\t\tctx = lkctx.Context()\n\t\tdefer lk.Unlock(lkctx.Cancel)\n\t}\n\n\tvar index []byte\n\tif opts.IndexCB != nil {\n\t\tindex = opts.IndexCB()\n\t}\n\n\tmodTime := opts.MTime\n\tif opts.MTime.IsZero() {\n\t\tmodTime = UTCNow()\n\t}\n\n\tfor i, w := range writers {\n\t\tif w == nil {\n\t\t\tonlineDisks[i] = nil\n\t\t\tcontinue\n\t\t}\n\t\tif len(inlineBuffers) > 0 && inlineBuffers[i] != nil {\n\t\t\tpartsMetadata[i].Data = inlineBuffers[i].Bytes()\n\t\t} else {\n\t\t\tpartsMetadata[i].Data = nil\n\t\t}\n\t\tpartsMetadata[i].AddObjectPart(1, \"\", n, data.ActualSize(), modTime, index)\n\t\tpartsMetadata[i].Erasure.AddChecksumInfo(ChecksumInfo{\n\t\t\tPartNumber: 1,\n\t\t\tAlgorithm: DefaultBitrotAlgorithm,\n\t\t\tHash: bitrotWriterSum(w),\n\t\t})\n\t}\n\tif opts.UserDefined[\"etag\"] == \"\" {\n\t\topts.UserDefined[\"etag\"] = r.MD5CurrentHexString()\n\t}\n\n\t// Guess content-type from the extension if possible.\n\tif opts.UserDefined[\"content-type\"] == \"\" {\n\t\topts.UserDefined[\"content-type\"] = mimedb.TypeByExtension(path.Ext(object))\n\t}\n\n\t// Fill all the necessary metadata.\n\t// Update `xl.meta` content on each disks.\n\tfor index := range partsMetadata {\n\t\tpartsMetadata[index].Metadata = opts.UserDefined\n\t\tpartsMetadata[index].Size = n\n\t\tpartsMetadata[index].ModTime = modTime\n\t}\n\n\tif len(inlineBuffers) > 0 {\n\t\t// Set an additional header when data is inlined.\n\t\tfor index := range partsMetadata {\n\t\t\tpartsMetadata[index].SetInlineData()\n\t\t}\n\t}\n\n\t// Rename the successfully written temporary object to final location.\n\tif onlineDisks, err = renameData(ctx, onlineDisks, minioMetaTmpBucket, tempObj, partsMetadata, bucket, object, writeQuorum); err != nil {\n\t\tif errors.Is(err, errFileNotFound) {\n\t\t\treturn ObjectInfo{}, toObjectErr(errErasureWriteQuorum, bucket, object)\n\t\t}\n\t\tlogger.LogIf(ctx, err)\n\t\treturn ObjectInfo{}, toObjectErr(err, bucket, object)\n\t}\n\n\tdefer NSUpdated(bucket, object)\n\n\tfor i := 0; i < len(onlineDisks); i++ {\n\t\tif onlineDisks[i] != nil && onlineDisks[i].IsOnline() {\n\t\t\t// Object info is the same in all disks, so we can pick\n\t\t\t// the first meta from online disk\n\t\t\tfi = partsMetadata[i]\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfi.ReplicationState = opts.PutReplicationState()\n\tonline = countOnlineDisks(onlineDisks)\n\n\t// we are adding a new version to this object under the namespace lock, so this is the latest version.\n\tfi.IsLatest = true\n\n\treturn fi.ToObjectInfo(bucket, object, opts.Versioned || opts.VersionSuspended), nil\n}", "title": "" }, { "docid": "a972f4cea0daf98a05f44333d56f4dd5", "score": "0.5737162", "text": "func (x *xObjects) PutObject(\n\tctx context.Context,\n\tbucket, object string,\n\tr *minio.PutObjReader,\n\topts minio.ObjectOptions,\n) (minio.ObjectInfo, error) {\n\terr := x.ledgerStore.AssertBucketExits(bucket)\n\tif err != nil {\n\t\treturn minio.ObjectInfo{}, x.toMinioErr(err, bucket, \"\", \"\")\n\t}\n\tdata := r.Reader\n\t// NOTE: dont support files with bytes size 0 without a folder suffix\n\tif data.Size() == 0 && !strings.HasSuffix(object, \"/\") {\n\t\treturn minio.ObjectInfo{}, x.toMinioErr(ErrObjectSizeZero, bucket, object, \"\")\n\t}\n\t// emulates creation of an empty folder to keep parity with S3\n\tif data.Size() == 0 && strings.HasSuffix(object, \"/\") {\n\t\t// TODO: this may need to support several folders and subfolder structure recursively?\n\t\tnewObject, newR, err := x.emulateCreateFolder(object)\n\t\tif err != nil {\n\t\t\treturn minio.ObjectInfo{}, x.toMinioErr(err, bucket, object, \"\")\n\t\t}\n\t\tdefer newR.Close()\n\t\treturn x.putObject(ctx, newR, bucket, newObject, opts)\n\t} else {\n\t\treturn x.putObject(ctx, r, bucket, object, opts)\n\t}\n}", "title": "" }, { "docid": "03d6aad6d60765963396e03a8bf71676", "score": "0.5726192", "text": "func (c *fakeClient) WriteObject(bucket, objectKey, data, contentType, contentEncoding string, metadata map[string]*string) error {\n\tc.WriteCounter++\n\tc.LastBucket = bucket\n\tc.LastObjectKey = objectKey\n\tc.LastData = data\n\tc.LastContentType = contentType\n\tc.LastContentEncoding = contentEncoding\n\tc.LastMetadata = metadata\n\n\treturn c.WriteError\n}", "title": "" }, { "docid": "027f038b145bb4cc3db7d458ae143750", "score": "0.5676943", "text": "func AppendObject(args AppendArgs) (handle string, err error) {\n\tq := make(url.Values, 4)\n\tq.Set(cmn.URLParamAppendType, cmn.AppendOp)\n\tq.Set(cmn.URLParamAppendHandle, args.Handle)\n\tq = cmn.AddBckToQuery(q, args.Bck)\n\n\treqArgs := cmn.ReqArgs{\n\t\tMethod: http.MethodPut,\n\t\tBase: args.BaseParams.URL,\n\t\tPath: cmn.URLPathObjects.Join(args.Bck.Name, args.Object),\n\t\tQuery: q,\n\t\tBodyR: args.Reader,\n\t}\n\n\tnewRequest := func(reqArgs cmn.ReqArgs) (*http.Request, error) {\n\t\treq, err := reqArgs.Req()\n\t\tif err != nil {\n\t\t\treturn nil, newErrCreateHTTPRequest(err)\n\t\t}\n\n\t\t// The HTTP package doesn't automatically set this for files, so it has to be done manually\n\t\t// If it wasn't set, we would need to deal with the redirect manually.\n\t\treq.GetBody = func() (io.ReadCloser, error) {\n\t\t\treturn args.Reader.Open()\n\t\t}\n\t\tif args.Size != 0 {\n\t\t\treq.ContentLength = args.Size // as per https://tools.ietf.org/html/rfc7230#section-3.3.2\n\t\t}\n\n\t\tsetAuthToken(req, args.BaseParams)\n\t\treturn req, nil\n\t}\n\n\tresp, err := DoReqWithRetry(args.BaseParams.Client, newRequest, reqArgs) // nolint:bodyclose // it's closed inside\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"failed to %s, err: %v\", http.MethodPut, err)\n\t}\n\treturn resp.Header.Get(cmn.HdrAppendHandle), err\n}", "title": "" }, { "docid": "9efd7ca8aa612356f25bc1fe56aaed0c", "score": "0.5673322", "text": "func (rctx *requestContext) Put(ctx context.Context, inp *PutInput) {\n\t// Get response handler\n\tresHan := responsehandler.GetResponseHandlerFromContext(ctx)\n\n\t// Generate start key\n\tkey := rctx.generateStartKey(inp.RequestPath)\n\t// Add / at the end if not present\n\tif !strings.HasSuffix(key, \"/\") {\n\t\tkey += \"/\"\n\t}\n\t// Add filename at the end of key\n\tkey += inp.Filename\n\t// Manage key rewrite\n\tkey, err := rctx.manageKeyRewrite(ctx, key)\n\t// Check error\n\tif err != nil {\n\t\tresHan.InternalServerError(rctx.LoadFileContent, err)\n\t\t// Stop\n\t\treturn\n\t}\n\n\t// Create input\n\tinput := &s3client.PutInput{\n\t\tKey: key,\n\t\tBody: inp.Body,\n\t\tContentType: inp.ContentType,\n\t\tContentSize: inp.ContentSize,\n\t}\n\n\t// Check if post actions configuration exists\n\tif rctx.targetCfg.Actions.PUT != nil &&\n\t\trctx.targetCfg.Actions.PUT.Config != nil {\n\t\t// Check if system metadata is defined\n\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata != nil {\n\t\t\t// Manage cache control\n\t\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata.CacheControl != \"\" {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.SystemMetadata.CacheControl)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Store\n\t\t\t\t\tinput.CacheControl = val\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Manage content disposition\n\t\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentDisposition != \"\" {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentDisposition)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Store\n\t\t\t\t\tinput.ContentDisposition = val\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Manage content encoding\n\t\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentEncoding != \"\" {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentEncoding)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Store\n\t\t\t\t\tinput.ContentEncoding = val\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Manage content language\n\t\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentLanguage != \"\" {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.SystemMetadata.ContentLanguage)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Store\n\t\t\t\t\tinput.ContentLanguage = val\n\t\t\t\t}\n\t\t\t}\n\t\t\t// Manage content language\n\t\t\tif rctx.targetCfg.Actions.PUT.Config.SystemMetadata.Expires != \"\" {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.SystemMetadata.Expires)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Parse\n\t\t\t\t\td, err3 := time.Parse(time.RFC3339, val)\n\t\t\t\t\t// Check error\n\t\t\t\t\tif err3 != nil {\n\t\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, errors.WithStack(err3))\n\n\t\t\t\t\t\treturn\n\t\t\t\t\t}\n\t\t\t\t\t// Store\n\t\t\t\t\tinput.Expires = &d\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Check if metadata is configured in target configuration\n\t\tif rctx.targetCfg.Actions.PUT.Config.Metadata != nil {\n\t\t\t// Store templated data\n\t\t\tmetadata := map[string]string{}\n\n\t\t\t// Render templates\n\t\t\tfor k, v := range rctx.targetCfg.Actions.PUT.Config.Metadata {\n\t\t\t\t// Execute template\n\t\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, v)\n\t\t\t\t// Check error\n\t\t\t\tif err2 != nil {\n\t\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t\t// Check if value is empty or not\n\t\t\t\tif val != \"\" {\n\t\t\t\t\t// Store\n\t\t\t\t\tmetadata[k] = val\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Store all metadata\n\t\t\tinput.Metadata = metadata\n\t\t}\n\n\t\t// Check if storage class is present in target configuration\n\t\tif rctx.targetCfg.Actions.PUT.Config.StorageClass != \"\" {\n\t\t\t// Execute template\n\t\t\tval, err2 := rctx.tplPutData(ctx, inp, key, rctx.targetCfg.Actions.PUT.Config.StorageClass)\n\t\t\t// Check error\n\t\t\tif err2 != nil {\n\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Check if value is empty or not\n\t\t\tif val != \"\" {\n\t\t\t\t// Store\n\t\t\t\tinput.StorageClass = val\n\t\t\t}\n\t\t}\n\n\t\t// Check if allow override is enabled\n\t\tif !rctx.targetCfg.Actions.PUT.Config.AllowOverride {\n\t\t\t// Need to check if file already exists\n\t\t\theadOutput, err2 := rctx.s3ClientManager.\n\t\t\t\tGetClientForTarget(rctx.targetCfg.Name).\n\t\t\t\tHeadObject(ctx, key)\n\t\t\t// Check if error is not found if exists\n\t\t\tif err2 != nil && !errors.Is(err2, s3client.ErrNotFound) {\n\t\t\t\tresHan.InternalServerError(rctx.LoadFileContent, err2)\n\t\t\t\t// Stop\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Check if file exists\n\t\t\tif headOutput != nil {\n\t\t\t\t// Create error\n\t\t\t\terr2 := fmt.Errorf(\"file detected on path %s for PUT request and override isn't allowed\", key)\n\t\t\t\t// Response\n\t\t\t\tresHan.ForbiddenError(rctx.LoadFileContent, err2)\n\t\t\t\t// Stop\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\t// Put file\n\tinfo, err := rctx.s3ClientManager.\n\t\tGetClientForTarget(rctx.targetCfg.Name).\n\t\tPutObject(ctx, input)\n\t// Check error\n\tif err != nil {\n\t\tresHan.InternalServerError(rctx.LoadFileContent, err)\n\t\t// Stop\n\t\treturn\n\t}\n\n\t// Send hook\n\trctx.webhookManager.ManagePUTHooks(\n\t\tctx,\n\t\trctx.targetCfg.Name,\n\t\tinp.RequestPath,\n\t\t&webhook.PutInputMetadata{\n\t\t\tFilename: inp.Filename,\n\t\t\tContentType: inp.ContentType,\n\t\t\tContentSize: inp.ContentSize,\n\t\t},\n\t\t&webhook.S3Metadata{\n\t\t\tBucket: info.Bucket,\n\t\t\tRegion: info.Region,\n\t\t\tS3Endpoint: info.S3Endpoint,\n\t\t\tKey: info.Key,\n\t\t},\n\t)\n\n\t// Answer\n\tresHan.Put(\n\t\trctx.LoadFileContent,\n\t\t&responsehandler.PutInput{\n\t\t\tKey: key,\n\t\t\tContentType: inp.ContentType,\n\t\t\tContentSize: inp.ContentSize,\n\t\t\tMetadata: input.Metadata,\n\t\t\tStorageClass: input.StorageClass,\n\t\t\tFilename: inp.Filename,\n\t\t},\n\t)\n}", "title": "" }, { "docid": "db2dfa451e3e3ebce7d994ea27cc08b6", "score": "0.56598467", "text": "func (er erasureObjects) PutObject(ctx context.Context, bucket string, object string, data *PutObjReader, opts ObjectOptions) (objInfo ObjectInfo, err error) {\n\treturn er.putObject(ctx, bucket, object, data, opts)\n}", "title": "" }, { "docid": "31dcd973f2fb2eae236d2d127fec5fca", "score": "0.56561786", "text": "func (b *Bucket) PutOne(obj *PutObject, path, acl string) error {\n\tsize := obj.Size()\n\treq := &SDK.PutObjectInput{\n\t\tACL: &acl,\n\t\tBucket: &b.nameWithPrefix,\n\t\tBody: obj.data,\n\t\tContentLength: &size,\n\t\tContentType: pointers.String(obj.FileType()),\n\t\tKey: pointers.String(path),\n\t}\n\n\t_, err := b.service.client.PutObject(req)\n\tif err != nil {\n\t\tb.service.Errorf(\"error on `PutObject` operation; bucket=%s; error=%s;\", b.nameWithPrefix, err.Error())\n\t}\n\treturn err\n}", "title": "" }, { "docid": "a0635d02d852ede3e18f6704c196c10d", "score": "0.5633282", "text": "func (h *client) Put(ctx context.Context, path string, data interface{}, v interface{}) error {\n\treturn h.Do(ctx, \"PUT\", path, nil, data, v)\n}", "title": "" }, { "docid": "2c510b6ca9f85940879b01264bd679fe", "score": "0.561647", "text": "func (m KeyValueMap) AddObject(k string, v interface{}) error {\n\tm[k] = v\n\treturn nil\n}", "title": "" }, { "docid": "b39137bd61a2df4bcea5b368767008d3", "score": "0.56151843", "text": "func (c Client) PutObjectWithMetadata(bucketName, objectName string, reader io.Reader, metadata map[string][]string, progress io.Reader) (n int64, err error) {\n\treturn c.PutObjectWithProgress(bucketName, objectName, reader, metadata, progress)\n}", "title": "" }, { "docid": "0252bd977dd369f01bc24fde98441a09", "score": "0.5605529", "text": "func PutObjectFromFile(fileID string, fileType string, fileName string) {\n\tbucket := ossConfig()\n\tobjectName := fileType + \"/\" + fileID + \"/\" + fileName\n\tlocalFileName := \"tmp/\" + fileID + \".mp4\"\n\terr := bucket.PutObjectFromFile(objectName, localFileName)\n\tif err != nil {\n\t\thandleError(err)\n\t}\n}", "title": "" }, { "docid": "be5aa5e20e5bf73f8bae12be64ed2964", "score": "0.5584974", "text": "func saveObject(key string, resp *s3.GetObjectOutput,pdir string ) (error) {\n\tpathname := filepath.Join(pdir,strings.Replace(key,string(os.PathSeparator),\"_\",-1))\n\treturn utils.SaveObject(resp,pathname)\n}", "title": "" }, { "docid": "74cb5376d4d81563d4a525170134ac25", "score": "0.5578404", "text": "func UploadBody(\n\tlg *zap.Logger,\n\ts3API s3iface.S3API,\n\tbucket string,\n\ts3Key string,\n\tbody io.ReadSeeker) (err error) {\n\n\tlg.Info(\"uploading\",\n\t\tzap.String(\"s3-bucket\", bucket),\n\t\tzap.String(\"remote-path\", s3Key),\n\t)\n\tvar output *s3.PutObjectOutput\n\toutput, err = s3API.PutObject(&s3.PutObjectInput{\n\t\tBucket: aws.String(bucket),\n\t\tKey: aws.String(s3Key),\n\n\t\tBody: body,\n\n\t\t// https://docs.aws.amazon.com/AmazonS3/latest/dev/acl-overview.html#canned-acl\n\t\t// vs. \"public-read\"\n\t\tACL: aws.String(\"private\"),\n\n\t\tMetadata: map[string]*string{\n\t\t\t\"Kind\": aws.String(\"aws-k8s-tester\"),\n\t\t\t\"User\": aws.String(user.Get()),\n\t\t},\n\t})\n\tif err == nil {\n\t\tlg.Info(\"uploaded\",\n\t\t\tzap.String(\"s3-bucket\", bucket),\n\t\t\tzap.String(\"remote-path\", s3Key),\n\t\t\tzap.String(\"version-id\", aws.StringValue(output.VersionId)),\n\t\t)\n\t} else {\n\t\tlg.Warn(\"failed to upload\",\n\t\t\tzap.String(\"s3-bucket\", bucket),\n\t\t\tzap.String(\"remote-path\", s3Key),\n\t\t\tzap.Error(err),\n\t\t)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "84a3f79e5797814c046389698c37c6ac", "score": "0.5556199", "text": "func (c Client) PutObjectWithSize(bucketName, objectName string, reader io.Reader, readerSize int64, metadata map[string][]string, progress io.Reader) (n int64, err error) {\n\treturn c.putObjectCommon(bucketName, objectName, reader, readerSize, metadata, progress)\n}", "title": "" }, { "docid": "153c0d78dea5b9cf6ae62cf31a85208d", "score": "0.5550606", "text": "func newObject(bucket *bucket, objectName string) (object, fail.Error) {\n\tif bucket == nil {\n\t\treturn object{}, fail.InvalidInstanceError()\n\t}\n\n\to := object{\n\t\tbucket: bucket,\n\t\tname: objectName,\n\t}\n\titem, err := bucket.stowContainer.Item(objectName)\n\tif err != nil {\n\t\tswitch err.Error() {\n\t\tcase NotFound: // this is an implementation detail of stow\n\t\t\treturn o, nil // nolint, we get an empty object\n\t\tdefault:\n\t\t\treturn o, fail.ConvertError(err)\n\t\t}\n\t}\n\n\tif item == nil {\n\t\treturn o, fail.InvalidInstanceContentError(\"item\", \"should NOT be nil\")\n\t}\n\n\t// if the object exists, we get its content\n\to.item = item\n\treturn o, nil\n}", "title": "" }, { "docid": "15d762ac0a28e3374f1a4f83328545a8", "score": "0.552976", "text": "func (s *S3) Put(ctx context.Context, reader io.Reader, to *objurl.ObjectURL, metadata map[string]string) error {\n\tstorageClass := metadata[\"StorageClass\"]\n\tcontentType := metadata[\"ContentType\"]\n\tif contentType == \"\" {\n\t\tcontentType = \"application/octet-stream\"\n\t}\n\n\t_, err := s.uploader.UploadWithContext(ctx, &s3manager.UploadInput{\n\t\tBucket: aws.String(to.Bucket),\n\t\tKey: aws.String(to.Path),\n\t\tBody: reader,\n\t\tContentType: aws.String(contentType),\n\t\tStorageClass: aws.String(storageClass),\n\t}, func(u *s3manager.Uploader) {\n\t\tu.PartSize = s.opts.UploadChunkSizeBytes\n\t\tu.Concurrency = s.opts.UploadConcurrency\n\t})\n\n\treturn err\n}", "title": "" }, { "docid": "fb14e0ae4a9afb70187ecdadd7b20608", "score": "0.5515445", "text": "func (gson *Gson) AddObject(strPath, strKey, strOrigVal string) (resErr error) {\n\tdefer func() {\n\t\tif err := recover(); nil != err {\n\t\t\tresErr = fmt.Errorf(\"%v\", err)\n\t\t}\n\t}()\n\tvalue, err := gson.Get(strPath)\n\tif nil != err {\n\t\treturn err\n\t}\n\tif vObjectType != value.vType {\n\t\treturn errors.New(\"the item with specified path should be an object\")\n\t}\n\t_, ok := ((*tJsonObject)(value.ptrValue)).mapObjects[strKey]\n\tif ok {\n\t\treturn errors.New(\"the key already exist\")\n\t}\n\tnewVal := getValueByString(strOrigVal)\n\tif nil == newVal {\n\t\treturn errors.New(\"invalid value format\")\n\t}\n\t((*tJsonObject)(value.ptrValue)).mapObjects[strKey] = newVal\n\treturn nil\n}", "title": "" }, { "docid": "6a7ef9e29604cdfa7748ef99d62d79e9", "score": "0.5483892", "text": "func (c Client) PutObjectWithProgress(bucketName, objectName string, reader io.Reader, metadata map[string][]string, progress io.Reader) (n int64, err error) {\n\t// Size of the object.\n\tvar size int64\n\n\t// Get reader size.\n\tsize, err = getReaderSize(reader)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn c.putObjectCommon(bucketName, objectName, reader, size, metadata, progress)\n}", "title": "" }, { "docid": "bdb45a9fd3364cf17c8d8a51968f51f6", "score": "0.54703814", "text": "func (o *OBSBucket) Put(_ context.Context, localFile, key string) error {\n\tvar input obs.PutFileInput\n\n\tinput.Bucket = o.Config.Name\n\tinput.Key = key\n\tinput.SourceFile = localFile\n\n\tlog.Debugf(\"start upload %s to obs\", key)\n\toutput, err := o.Client.PutFile(&input)\n\n\tif err != nil {\n\t\tlog.Error(err)\n\t\treturn err\n\t}\n\n\tlog.Debugf(\"put %s with out error, status code %d\", key, output.StatusCode)\n\treturn nil\n}", "title": "" }, { "docid": "8808bd2cc0472950d72bec7db19add08", "score": "0.545402", "text": "func CreateObject(\n\tctx context.Context,\n\tbucket gcs.Bucket,\n\tname string,\n\tcontents []byte) (*gcs.Object, error) {\n\treq := &gcs.CreateObjectRequest{\n\t\tName: name,\n\t\tContents: bytes.NewReader(contents),\n\t}\n\n\treturn bucket.CreateObject(ctx, req)\n}", "title": "" }, { "docid": "bfadfebd5819f681d5b91093a1d3795a", "score": "0.5451806", "text": "func (a *AclLockFilter) PutObject(ctx context.Context, node *tree.Node, reader io.Reader, requestData *PutRequestData) (int64, error) {\n\tif branchInfo, ok := GetBranchInfo(ctx, \"in\"); ok && branchInfo.Binary {\n\t\treturn a.next.PutObject(ctx, node, reader, requestData)\n\t}\n\tif err := utils.CheckContentLock(ctx, node); err != nil {\n\t\treturn 0, err\n\t}\n\treturn a.next.PutObject(ctx, node, reader, requestData)\n}", "title": "" }, { "docid": "4aee72ea5aa89d75f7684db041b9214c", "score": "0.54466206", "text": "func Put(ctx context.Context, key string, value string, opts ...OpOption) error {\n\topts = append(opts, PUT, WithStrKey(key), WithStrValue(value))\n\t_, err := Instance().Do(ctx, opts...)\n\treturn err\n}", "title": "" }, { "docid": "1a9dd4b070b931ea336c5003b5481a68", "score": "0.54449683", "text": "func (g *GoFakeS3) copyObject(bucket, object string, meta map[string]string, w http.ResponseWriter, r *http.Request) (err error) {\n\tsource := meta[\"X-Amz-Copy-Source\"]\n\tg.log.Print(LogInfo, \"└── COPY:\", source)\n\n\tif len(object) > KeySizeLimit {\n\t\treturn ResourceError(ErrKeyTooLong, object)\n\t}\n\n\t// XXX No support for versionId subresource\n\tparts := strings.SplitN(strings.TrimPrefix(source, \"/\"), \"/\", 2)\n\tsrcBucket := parts[0]\n\tsrcKey := strings.SplitN(parts[1], \"?\", 2)[0]\n\n\tsrcKey, err = url.QueryUnescape(srcKey)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsrcObj, err := g.storage.GetObject(srcBucket, srcKey, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif srcObj == nil {\n\t\tg.log.Print(LogErr, \"unexpected nil object for key\", bucket, object)\n\t\treturn ErrInternal\n\t}\n\tdefer srcObj.Contents.Close()\n\n\t// XXX No support for delete marker\n\t// \"If the current version of the object is a delete marker, Amazon S3\n\t// behaves as if the object was deleted.\"\n\n\t// merge metadata, ACL is not preserved\n\tfor k, v := range srcObj.Metadata {\n\t\tif _, found := meta[k]; !found && k != \"X-Amz-Acl\" {\n\t\t\tmeta[k] = v\n\t\t}\n\t}\n\n\tresult, err := g.storage.PutObject(bucket, object, meta, srcObj.Contents, srcObj.Size)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif srcObj.VersionID != \"\" {\n\t\tw.Header().Set(\"x-amz-copy-source-version-id\", string(srcObj.VersionID))\n\t}\n\tif result.VersionID != \"\" {\n\t\tg.log.Print(LogInfo, \"CREATED VERSION:\", bucket, object, result.VersionID)\n\t\tw.Header().Set(\"x-amz-version-id\", string(result.VersionID))\n\t}\n\n\treturn g.xmlEncoder(w).Encode(CopyObjectResult{\n\t\tETag: `\"` + hex.EncodeToString(srcObj.Hash) + `\"`,\n\t\tLastModified: NewContentTime(g.timeSource.Now()),\n\t})\n}", "title": "" }, { "docid": "cc28d3dd8fe9c6baa0c89e3adc063175", "score": "0.5441997", "text": "func (f *Fs) Put(in io.Reader, src fs.ObjectInfo, options ...fs.OpenOption) (fs.Object, error) {\n\tfs.Debugf(f, \"put data at '%s'\", src.Remote())\n\treturn f.put(in, src, options, f.Fs.Put)\n}", "title": "" }, { "docid": "43fdc42f0a0c51e0549fdc69d8979f23", "score": "0.54356474", "text": "func put (c *ishell.Context, pwd *string, service *ServiceSession) {\n\tif len(c.Args) == 0 || len(c.Args) > 2 {\n\t\tc.Println(\"Please specify the local file to be uploaded.\") //, and, optionally, the bucket and prefix to upload to.\")\t\n\t\treturn\n\t}\n\tkey := c.Args[0]\n/*\n\t Might need to process the path to get the filename.\n\t Consider BuildPath -- and then usng baseName as the key\n\t Or, take last element of stirngs.Split(key \"/\")\n*/\n// Getting bucket and prefix -- see comments in other funcs\n\tbucket := strings.SplitAfter(*pwd, \"/\")[1]\n\tif strings.LastIndex(bucket, \"/\") == len(bucket) -1 {\n bucket = bucket[:len(bucket) - 1]\n }\n\tprefix := strings.SplitAfter(*pwd, bucket)[1]\n if strings.Index(prefix, \"/\") == 0 {\n prefix = prefix[1:]\n }\n if strings.LastIndex(prefix, \"/\") != len(prefix) - 1 {\n prefix = prefix + \"/\"\n }\n fullKey := prefix + key\n\n\n\t\n\tuploader := s3manager.NewUploader(service.Sess)\n\tf, err := os.Open(key)\n\tif err != nil {\n\t\tc.Println(\"Can't open the file.\")\n\t\treturn\n\t}\n\tres, err := uploader.Upload(&s3manager.UploadInput{\n\t\t\tBucket: &bucket,\n\t\t\tKey: \t&fullKey,\n\t\t\tBody: f,\n\t\t})\n\tc.Printf(\"File %v uploaded to %v\\n\", c.Args[0], res.Location)\n}", "title": "" }, { "docid": "a62a23f45eab929b893b59a54f0ea808", "score": "0.54166406", "text": "func ExampleObjectStorage_UploadFile() {\n//\tobjects = getObject(ctx, c, namespace, BUCKET_NAME, \"mseelam-so/config/sauron-1/20181016-144546/\")\n\t//defer deleteBucket(ctx, c, namespace, bname)\n\t//\n\t//contentlen := 1024 * 1000\n\t//filepath, filesize := writeTempFileOfSize(int64(contentlen))\n\t//filename := path.Base(filepath)\n\t//defer func() {\n\t//\tos.Remove(filename)\n\t//}()\n\t//\n\t//file, e := os.Open(filepath)\n\t//defer file.Close()\n\t//helpers.FatalIfError(e)\n\t//\n\t//e = putObject(ctx, c, namespace, bname, filename, filesize, file, nil)\n\t//helpers.FatalIfError(e)\n\t//defer deleteObject(ctx, c, namespace, bname, filename)\n\n\t// Output:\n\t// get namespace\n\t// create bucket\n\t// put object\n\t// delete object\n\t// delete bucket\n}", "title": "" }, { "docid": "04561ff2fdcccf8eef5ee320eaa03559", "score": "0.5404546", "text": "func ReplaceObject(stub shim.ChaincodeStubInterface, objectType string, keys []string, objectData []byte) error {\n\n\t// Check how many keys\n\n\terr := VerifyAtLeastOneKeyIsPresent(objectType, keys)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Convert keys to compound key\n\tcompositeKey, _ := stub.CreateCompositeKey(objectType, keys)\n\n\t// Add Party JSON to state\n\terr = stub.PutState(compositeKey, objectData)\n\tif err != nil {\n\t\tfmt.Println(\"ReplaceObject() : Error replacing Object in State Database %s\", err)\n\t\treturn err\n\t}\n\n\tfmt.Println(\"ReplaceObject() : - end init object \", objectType)\n\treturn nil\n}", "title": "" }, { "docid": "feb2341c03ee11659fc34bb21693165f", "score": "0.5400078", "text": "func (s *siaObjects) AnonPutObject(bucket, object string, size int64, data io.Reader, metadata map[string]string, sha256sum string) (objInfo ObjectInfo, err error) {\n\ts.debugmsg(\"Gateway.AnonPutObject\")\n\treturn s.PutObject(bucket, object, size, data, metadata, sha256sum)\n}", "title": "" }, { "docid": "148628394c9ccda8d67fb2652d23af16", "score": "0.53996897", "text": "func (c *Client) PutObject(ctx context.Context, params *PutObjectInput, optFns ...func(*Options)) (*PutObjectOutput, error) {\n\tif params == nil {\n\t\tparams = &PutObjectInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"PutObject\", params, optFns, c.addOperationPutObjectMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*PutObjectOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "aa470ec8adb472e4edee359060d1035a", "score": "0.5397499", "text": "func (c *Client) Put(collection string, key string, value interface{}) (*Path, error) {\n\treader, writer := io.Pipe()\n\tencoder := json.NewEncoder(writer)\n\n\tgo func() { writer.CloseWithError(encoder.Encode(value)) }()\n\treturn c.PutRaw(collection, key, reader)\n}", "title": "" }, { "docid": "aa470ec8adb472e4edee359060d1035a", "score": "0.5397499", "text": "func (c *Client) Put(collection string, key string, value interface{}) (*Path, error) {\n\treader, writer := io.Pipe()\n\tencoder := json.NewEncoder(writer)\n\n\tgo func() { writer.CloseWithError(encoder.Encode(value)) }()\n\treturn c.PutRaw(collection, key, reader)\n}", "title": "" }, { "docid": "c2c3d0848ea74467ecfffbe675beef55", "score": "0.53782153", "text": "func (ck *Clerk) Put(key string, value string) {\n\tck.sendRequest(_PUT, key, value)\n}", "title": "" }, { "docid": "260678eabefc4e49d0305bc6a6125e22", "score": "0.5374384", "text": "func (s *Service) Put(v interface{}, path string, body interface{}) error {\n\treturn s.Do(v, \"PUT\", path, body, nil)\n}", "title": "" }, { "docid": "9c812e5d766ff25211aa5fe76ced0d64", "score": "0.5370061", "text": "func (h *Handler) writeToS3(ctx context.Context, name string, data io.Reader) error {\n\t_, err := h.client.PutObject(ctx, &s3.PutObjectInput{\n\t\tBucket: &h.bucketName,\n\t\tKey: &name,\n\t\tBody: data,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "755456b7f835d5e6cc0d7e0978c471a5", "score": "0.5365656", "text": "func (c *Client) Put(path string, data, resource interface{}) error {\n\treturn c.CreateAndDo(\"PUT\", path, data, nil, resource)\n}", "title": "" }, { "docid": "f9210ccfea41b49c2443e5e3b7ad4258", "score": "0.53631103", "text": "func (s *Store) PutItem(v interface{}) error {\n\t// Turn it into a map[string]interface{} so we can check if the primary key is there\n\tvar m map[string]interface{}\n\tbytes, err := json.Marshal(v)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not convert item to JSON: %w\", err)\n\t}\n\tjson.Unmarshal(bytes, &m)\n\n\tkey, ok := m[s.key]\n\tif !ok {\n\t\treturn fmt.Errorf(\"Your object does not contain the primary key for this store (%v)\", s.key)\n\t}\n\n\ts.m[key.(string)] = bytes\n\treturn nil\n}", "title": "" }, { "docid": "d6341ab7c8468cf84c384236528788dc", "score": "0.5340115", "text": "func s3put(bck cmn.Bck, objName string, reader cos.ReadOpenCloser) (err error) {\n\tuploader := s3manager.NewUploaderWithClient(s3svc)\n\t_, err = uploader.Upload(&s3manager.UploadInput{\n\t\tBucket: aws.String(bck.Name),\n\t\tKey: aws.String(objName),\n\t\tBody: reader,\n\t})\n\terc := reader.Close()\n\tdebug.AssertNoErr(erc)\n\treturn\n}", "title": "" }, { "docid": "53382b0d06a3ff119267d873ededed66", "score": "0.53359544", "text": "func (e *entStorage) Put(ctx context.Context, data ent.Image) error {\n\t// 如果指定了id,则是更新\n\tif data.ID != 0 {\n\t\treturn e.update(ctx, data)\n\t}\n\t_, err := e.client.Image.Create().\n\t\tSetBucket(data.Bucket).\n\t\tSetName(data.Name).\n\t\tSetType(data.Type).\n\t\tSetSize(len(data.Data)).\n\t\tSetWidth(data.Width).\n\t\tSetHeight(data.Height).\n\t\tSetMetadata(data.Metadata).\n\t\tSetCreator(data.Creator).\n\t\tSetData(data.Data).\n\t\tSetTags(data.Tags).\n\t\tSave(ctx)\n\treturn err\n}", "title": "" }, { "docid": "e86114eaf21d0a7074b203954c1bf8aa", "score": "0.5334223", "text": "func (f *Functional) Put(ctx context.Context, key string, data []byte) error {\n\treturn f.put(ctx, key, data)\n}", "title": "" }, { "docid": "84e914e9f608c532f23f0513dba925af", "score": "0.53339666", "text": "func WriteObject(ctx context.Context, client *storage.Client, bucket, object string, r io.Reader) error {\n\tw := client.Bucket(bucket).Object(object).NewWriter(ctx)\n\t_, err := io.Copy(w, r)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn w.Close()\n}", "title": "" }, { "docid": "698aafb23af863aa06065b6d34135b84", "score": "0.5325851", "text": "func (c *Client) Put(key string, data []byte, opts ...datasync.PutOption) error {\n\tconsulLogger.Debugf(\"Put: %q\", key)\n\tp := &api.KVPair{Key: transformKey(key), Value: data}\n\t_, err := c.client.KV().Put(p, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "def167498de077aa2d3a71042deecc40", "score": "0.5321649", "text": "func (m *MockClient) PutObject(arg0 context.Context, arg1 *s3client.PutInput) (*s3client.ResultInfo, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"PutObject\", arg0, arg1)\n\tret0, _ := ret[0].(*s3client.ResultInfo)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "7190efb27e352df2af4a153d0635f9ee", "score": "0.5321585", "text": "func (s *S3Client) Put(bucket, file_name, content_type string, content []byte) (*bytes.Buffer, *http.Response, error) {\n\n\treq, err := s.NewS3Request(\"PUT\", bucket, file_name)\n\tif err != nil {\n\t\treturn nil, nil, fmt.Errorf(\"Error creating PUT request: %s\", err)\n\t}\n\n\treq.ContentType = content_type\n\treq.Content = content\n\n\treq.sign(false)\n\n\treturn req.Exec()\n}", "title": "" }, { "docid": "63ff70763895055832c37e48e4161759", "score": "0.53132105", "text": "func putObject(frame *rtda.Frame) {\n\tvars := frame.LocalVars()\n\tobj := vars.GetRef(1)\n\toffset := vars.GetLong(2)\n\tx := vars.GetRef(4)\n\n\tfields := obj.Fields()\n\tswitch fields.(type) {\n\tcase []Any: // object\n\t\tfields.([]Any)[offset] = x\n\tcase []*rtc.Obj: // array of ref\n\t\tfields.([]*rtc.Obj)[offset] = x\n\t}\n}", "title": "" }, { "docid": "f919b4a7bda0a5913d2db6fd3e34a474", "score": "0.53086346", "text": "func (f F) Put(ctx context.Context, key string, value []byte) (err error) {\n\t// nolint: gas, we want group permissions so that all services access\n\t// the file.\n\tfp, err := os.OpenFile(filepath.Join(f.WD, encode(key)),\n\t\tos.O_WRONLY|os.O_CREATE|os.O_EXCL, 0660)\n\tif err != nil {\n\t\tif os.IsExist(err) {\n\t\t\treturn storage.ExistError{Key: key, Err: PutExistingKeyError{Err: err}}\n\t\t}\n\t\treturn log.Alert(PutKeyError{Key: key, Err: err})\n\t}\n\tdefer func() {\n\t\tif cerr := fp.Close(); cerr != nil && err == nil {\n\t\t\terr = log.Alert(PutCloseError{Key: key, Err: cerr})\n\t\t}\n\t}()\n\n\tif _, err = fp.Write(value); err != nil {\n\t\treturn log.Alert(PutValueError{Key: key, Err: err})\n\t}\n\treturn\n}", "title": "" }, { "docid": "92c97545d1e972457d351cc5df532f0d", "score": "0.53073883", "text": "func PutKeyVal(circle *ConsistentHash, str string, input string) {\n\tipAddress := circle.Get(str)\n\taddress := \"http://\" + ipAddress.IP + \"/keys/\" + str + \"/\" + input\n\tfmt.Printf(\"%s\", address)\n\treq, err := http.NewRequest(\"PUT\", address, nil)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tfmt.Println(\"Error:\", err)\n\t} else {\n\t\tdefer resp.Body.Close()\n\t\tfmt.Printf(\"-------PUT successful\\n\")\n\t}\n}", "title": "" }, { "docid": "b255b22fd2afb37cd8eb786d17155d4f", "score": "0.53070533", "text": "func CreateGCSObject(w http.ResponseWriter, r *http.Request) {\n\tvar d struct {\n\t\tEntryContent string `json:\"entryContent\"`\n\t\tBucket string `json:\"bucket\"`\n\t\tEntryPath string `json:\"entryPath\"`\n\t}\n\tif err := json.NewDecoder(r.Body).Decode(&d); err != nil {\n\t\tcode := http.StatusBadRequest\n\t\tfmt.Printf(\"json.NewDecoder: %v\", err)\n\t\thttp.Error(w, http.StatusText(code), code)\n\t\treturn\n\t}\n\tif d.EntryContent == \"\" {\n\t\thttp.Error(w, \"entryContent must not be empty\",\n\t\t\thttp.StatusBadRequest)\n\t\treturn\n\t}\n\tif d.Bucket == \"\" {\n\t\thttp.Error(w, \"bucket must not be empty\",\n\t\t\thttp.StatusBadRequest)\n\t\treturn\n\t}\n\tif d.EntryPath == \"\" {\n\t\thttp.Error(w, \"entryPath must not be empty\",\n\t\t\thttp.StatusBadRequest)\n\t\treturn\n\t}\n\n\tctx := context.Background()\n\tclient, err := gcs.NewClient(ctx)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Failed to create GCS client: %q\", err),\n\t\t\thttp.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tobj := client.Bucket(d.Bucket).Object(d.EntryPath)\n\twriter := obj.NewWriter(ctx)\n\tif n, err := writer.Write([]byte(d.EntryContent)); err != nil {\n\t\thttp.Error(w,\n\t\t\tfmt.Sprintf(\"Failed to write GCS obj %q: %q\", d.EntryPath, err),\n\t\t\thttp.StatusInternalServerError)\n\t\treturn\n\t} else if n != len(d.EntryContent) {\n\t\thttp.Error(w,\n\t\t\tfmt.Sprintf(\"Failed to write GCS obj %q: only wrote %d of %d bytes\", d.EntryPath, n, len(d.EntryContent)),\n\t\t\thttp.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tif err := writer.Close(); err != nil {\n\t\thttp.Error(w,\n\t\t\tfmt.Sprintf(\"Failed to close GCS obj %q: %q\", d.EntryPath, err),\n\t\t\thttp.StatusInternalServerError)\n\t}\n\n\tfmt.Fprintf(w, \"Successfully wrote GCS obj %q\", d.EntryPath)\n}", "title": "" }, { "docid": "008d3f2a69be0e70e24653c3797de32c", "score": "0.53059626", "text": "func (f *fsBucket) Put(key string, data []byte) error {\n\treturn f.state.Put([]byte(key), data)\n}", "title": "" }, { "docid": "85fe3571f4466bf193cd1f355d8c3bb4", "score": "0.5303508", "text": "func (persist *Persistence) updateObject(txn TxnContext, obj PersistObj) error {\n\n\tif persist.InMemoryOnly {\n\t\tpersist.allObjects[obj.getId()] = obj\n\t} else {\n\t\t// Serialize (marshall) the object to JSON, and store it in redis using the\n\t\t// object's Id as the key. When the object is written out, it will be\n\t\t// written as,\n\t\t// \"<typename>\": { <object fields> }\n\t\t// so that getPersistentObject will later be able to map the JSON to the\n\t\t// appropriate go type, using reflection.\n\t\t\n\t\tvar key string = ObjectIdPrefix + obj.getId()\n\t\tvar json = obj.asJSON()\n\t\t//fmt.Println(\"Writing Object Id \" + key + \" value: \" + json)\n\t\tvar err = getRedisTransaction(txn).Command(\"SET\", key, json)\n\t\tif err != nil { debug.PrintStack() }\n\t\tif err != nil { return err }\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e6d55be3d417ab007025cca1e024d3f5", "score": "0.53024626", "text": "func (c *APIConnection) Put(resource string, body interface{}) (*APIResponse, error) {\n\treturn c.Invoke(APIRequest{\n\t\tMethod: \"PUT\",\n\t\tResource: resource,\n\t\tBody: body,\n\t})\n}", "title": "" } ]
1e309ccc6e808c41384729401d559b50
Cors set response headers for CORS related purposes.
[ { "docid": "7072363cee281829fbb4cc729c953b23", "score": "0.6554495", "text": "func Cors(c *gin.Context) {\n\tif c.Request.Method == \"OPTIONS\" {\n\t\tc.Writer.Header().Set(\"Content-Type\", \"text/plain\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Methods\", \"GET, PUT, PATCH, POST, DELETE, OPTIONS\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tc.Writer.Header().Set(\"Access-Control-Max-Age\", \"600\")\n\t\tc.Writer.Header().Set(\"Cache-Control\", \"max-age=600\")\n\t\tc.AbortWithStatus(http.StatusNoContent)\n\t\treturn\n\t}\n\n\tc.Writer.Header().Set(\"Content-Type\", \"application/json\")\n\tc.Writer.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\tc.Writer.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\n\tc.Next()\n}", "title": "" } ]
[ { "docid": "a1c434f37093a880822d1cfeda3e40b7", "score": "0.82321924", "text": "func setupCorsResponse(w *http.ResponseWriter, req *http.Request) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t(*w).Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t(*w).Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Authorization\")\n}", "title": "" }, { "docid": "b324e412201f873d0886565d52fb644d", "score": "0.80267805", "text": "func setAccessControlHeaders(w http.ResponseWriter) {\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Authorization, Content-Type, Origin\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Date\")\n}", "title": "" }, { "docid": "e7af859cce7e0167d827b9400ce44b05", "score": "0.78585374", "text": "func SetHeaders(w http.ResponseWriter) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, PUT, DELETE, OPTIONS\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Origin, X-Requested-With, Content-Type, Accept\")\n}", "title": "" }, { "docid": "82255906461d0feecf597bfe6960f30a", "score": "0.7751408", "text": "func SetCORS(w http.ResponseWriter) {\n\tfor h, v := range corsHeaders {\n\t\tw.Header().Set(h, v)\n\t}\n}", "title": "" }, { "docid": "b3119fd3548044a84d37ba568ed81374", "score": "0.7702524", "text": "func SetHeader(w *http.ResponseWriter) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t(*w).Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\t(*w).Header().Set(\"Access-Control-Allow-Headers\", \"Origin, X-Requested-With, Content-Type, Accept\")\n\t(*w).Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, PUT, OPTIONS, DELETE\")\n}", "title": "" }, { "docid": "767b3b6756cd2580b8b973740743431d", "score": "0.7658648", "text": "func addCORSheaders(w http.ResponseWriter) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", ALLOWED_METHODS)\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\tw.Header().Set(\"Access-Control-Max-Age\", \"7200\")\n}", "title": "" }, { "docid": "9c48d58ef8b867ec50d284ac92dca9d2", "score": "0.7600983", "text": "func AddCorsHeaders(r *http.Request, w http.ResponseWriter) {\n\tif IsProd() {\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\tif r.Method == \"OPTIONS\" {\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET,POST,OPTIONS\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept,Origin,Content-Type,X-Custom-Header,X-Test\")\n\t}\n}", "title": "" }, { "docid": "424c239735c1ca6eb8c4b515ab44be9a", "score": "0.75894564", "text": "func handleCors(w *http.ResponseWriter) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t(*w).Header().Set(\"Access-Control-Allow-Headers\", \"X-Auth-Code\")\n}", "title": "" }, { "docid": "1573295fdaf0f0250e1f7d2ebdd1d259", "score": "0.7542921", "text": "func SetHeaders(w http.ResponseWriter) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST\")\n\tw.Header().Set(\"Content-Security-Policy\", \"script-src 'self'\")\n\tw.Header().Set(\"X-Content-Type-Options\", \"nosniff\")\n\tw.Header().Set(\"X-Frame-Options\", \"Deny\")\n\tw.Header().Set(\"X-XSS-Protection\", \"1; mode=block\")\n}", "title": "" }, { "docid": "26111dc3bdc1ab36922b51adfb5e993a", "score": "0.7486196", "text": "func writeCorsPreflightHeaders(w http.ResponseWriter, c cors) {\n\tc.WriteCorsActualRequestHeaders(w)\n\tw.Header().Set(ACCESS_CONTROL_ALLOW_METHODS_HEADER, GetCorsAllowMethods(c.Prefix))\n\tw.Header().Set(ACCESS_CONTROL_ALLOW_HEADERS_HEADER, GetCorsAllowHeaders(c.Prefix))\n\tw.Header().Set(ACCESS_CONTROL_EXPOSE_HEADERS_HEADER, GetCorsExposeHeaders(c.Prefix))\n\tmaxAge := GetCorsMaxAge(c.Prefix)\n\tif maxAge != \"\" {\n\t\tw.Header().Set(ACCESS_CONTROL_MAX_AGE_HEADER, maxAge)\n\t}\n}", "title": "" }, { "docid": "3ef3f57ddcca29c233d4c39c892be7a3", "score": "0.74254787", "text": "func SetCORS(w http.ResponseWriter) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "429f49728025c858afae16e983c6dc67", "score": "0.73674804", "text": "func (r *Response) WithCors() {\n\tif r.Headers == nil {\n\t\tr.Headers = map[string]string{}\n\t}\n\n\tr.Headers[\"Access-Control-Allow-Origin\"] = \"*\"\n\tr.Headers[\"Access-Control-Allow-Credentials\"] = \"true\"\n}", "title": "" }, { "docid": "b23263ae18208a0b45593634e32f5b82", "score": "0.73385304", "text": "func settingHeaders(fn http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Add(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Add(\"Content-Type\", \"application/json\")\n\t\tfn(w, r)\n\t}\n}", "title": "" }, { "docid": "6d611dedd26e055460b6fe31851e86b5", "score": "0.7326419", "text": "func ClearCorsHeaders(response *http.Response) error {\n\t//hack when upstream service has cors enabled; cors will be handled by the gateway\n\tresponse.Header.Del(\"Access-Control-Allow-Origin\")\n\tresponse.Header.Del(\"Access-Control-Allow-Credentials\")\n\tresponse.Header.Del(\"Access-Control-Allow-Methods\")\n\tresponse.Header.Del(\"Access-Control-Allow-Headers\")\n\treturn nil\n}", "title": "" }, { "docid": "f419ef600425f7b95cf7c060b6b313a0", "score": "0.7277195", "text": "func CorsSetAllowedHeaders(val []string) {\r\n\tcorsAllowedHeaders = val\r\n}", "title": "" }, { "docid": "5b5363e090925d462c33453496f7c08c", "score": "0.72066694", "text": "func (m *CorsConfiguration) SetAllowedHeaders(value []string)() {\n err := m.GetBackingStore().Set(\"allowedHeaders\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "485db19a6e17001de3fef38ac85bf6d6", "score": "0.7188888", "text": "func (c cors) WriteCorsActualRequestHeaders(w http.ResponseWriter) {\n\tw.Header().Set(ACCESS_CONTROL_ALLOW_ORIGIN_HEADER, GetCorsAllowOrigin(c.Prefix))\n\tallowCredentials := GetCorsAllowCredentials(c.Prefix)\n\tif strings.TrimSpace(allowCredentials) == \"true\" {\n\t\tw.Header().Set(ACCESS_CONTROL_ALLOW_CREDENTIALS_HEADER, strings.TrimSpace(allowCredentials))\n\t}\n}", "title": "" }, { "docid": "d0b8a91e2439288b82f255bd91f1ac1c", "score": "0.7178687", "text": "func removeCORSHeaders(resp *http.Response) {\n\tresp.Header.Del(\"Access-Control-Allow-Credentials\")\n\tresp.Header.Del(\"Access-Control-Allow-Headers\")\n\tresp.Header.Del(\"Access-Control-Allow-Methods\")\n\tresp.Header.Del(\"Access-Control-Allow-Origin\")\n}", "title": "" }, { "docid": "554b93f19af9c217f8e0339a5e9c2db2", "score": "0.7039374", "text": "func enableCors(w *http.ResponseWriter) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"http://localhost:3000\")\n\t(*w).Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, PUT, DELETE, OPTIONS\")\n\t(*w).Header().Set(\"Access-Control-Allow-Headers\", \"Origin, Content-Type, X-Auth-Token, Authorization, Accept, token\")\n\t(*w).Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n}", "title": "" }, { "docid": "34bc9154ee9715b2622b2ae65406de32", "score": "0.7038441", "text": "func addCommonJwtRespHeaders(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Cache-Control\", \"must-revalidate\")\n\tif origin := r.Header.Get(\"Origin\"); origin != \"\" {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t}\n\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n}", "title": "" }, { "docid": "6d58e727754ab8bc22219da150897b42", "score": "0.70175785", "text": "func setCORS() *cors.Cors {\n\tcors := cors.New(cors.Options{\n\t\tAllowedOrigins: []string{\"*\"},\n\t\tAllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\", \"OPTIONS\"},\n\t\tAllowedHeaders: []string{\"Accept\", \"Authorization\", \"Content-Type\", \"X-Requested-With\", \"access-token\", \"initial-code\"},\n\t\tExposedHeaders: []string{\"Link\"},\n\t\tAllowCredentials: true,\n\t\tMaxAge: 300,\n\t})\n\treturn cors\n}", "title": "" }, { "docid": "f9d7bd3a9f7b611b57db70075c5c58bc", "score": "0.6975809", "text": "func (h *httpRouterHandlerObject) setHeaders(context HttpContext) {\n\tvar methodsStrings = \"OPTIONS, HEAD, \"\n\tfor _, endpoint := range context.RouteHandler.GetEndPointMethods() {\n\t\tmethodsStrings += endpoint.GetHttpMethod() + \",\"\n\t}\n\n\tfmt.Println(\"MethodsStrings: \", methodsStrings)\n\tcontext.Writer.Header().Add(\"Access-Control-Allow-Origin\", \"*\") //Allow access from anywhere\n\tcontext.Writer.Header().Add(\"Access-Control-Allow-Headers\", \"Content-Type, Access-Control-Request-Origin\") //Allows setting of the Content-Type by the client\n\tcontext.Writer.Header().Add(\"Access-Control-Allow-Methods\", methodsStrings) //REST API supports GET, POST, PUT, DELETE\n\tcontext.Writer.Header().Add(\"Accept\", \"application/json\") //Only json is accepted\n\tcontext.Writer.Header().Add(\"Content-Type\", \"application/json\")\n}", "title": "" }, { "docid": "d742cd2f804102886f95a2711bc734ff", "score": "0.6961262", "text": "func accessControlHeaders(c *gin.Context) {\n\tc.Writer.Header().Set(\"Access-Control-Allow-Methods\", \"DELETE, POST, PUT, PATCH\")\n\tc.Writer.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type\")\n\tc.Next()\n}", "title": "" }, { "docid": "316fac242fb88bdaffab215f6a89cb3e", "score": "0.6949049", "text": "func enableCors(w *http.ResponseWriter) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "316fac242fb88bdaffab215f6a89cb3e", "score": "0.6949049", "text": "func enableCors(w *http.ResponseWriter) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "c0053b7b3aa238e1f75bbb416592bb3b", "score": "0.6875398", "text": "func addHeaders(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(CONTENTTYPE, APPLICATIONJSON)\n\t// use this for cors\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n}", "title": "" }, { "docid": "10ab8c287b54e6da774393451d7066a9", "score": "0.687263", "text": "func responseHeaders(res http.ResponseWriter) {\n\n\tres.Header().Set(\"Content-Type\", \"application/json\")\n\n}", "title": "" }, { "docid": "dbdad809c21445994568852da79eaa48", "score": "0.68681926", "text": "func EnableCors(w http.ResponseWriter) {\n\t(w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "3cfe49bc34f18ca619908f5c2121f2ad", "score": "0.68443906", "text": "func SetupResponse(w *http.ResponseWriter, req *http.Request) {\n\t(*w).Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t(*w).Header().Set(\"Access-Control-Allow-Methods\", \"*\")\n\t(*w).Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\tif (*req).Method == \"OPTIONS\" {\n\t\t(*w).Header().Set(\"Access-Control-Max-Age\", \"86400\")\n\t\t(*w).WriteHeader(http.StatusOK)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "de36c53381ae73a01be38881ad3dff36", "score": "0.67967284", "text": "func (rm *resourceManager) setResourceCORS(\n\tr *resource,\n\tresp *svcsdk.GetBucketCorsOutput,\n) *svcapitypes.CORSConfiguration {\n\tres := &svcapitypes.CORSConfiguration{}\n\tif resp.CORSRules != nil {\n\t\tresf0 := []*svcapitypes.CORSRule{}\n\t\tfor _, resf0iter := range resp.CORSRules {\n\t\t\tresf0elem := &svcapitypes.CORSRule{}\n\t\t\tif resf0iter.AllowedHeaders != nil {\n\t\t\t\tresf0elemf0 := []*string{}\n\t\t\t\tfor _, resf0elemf0iter := range resf0iter.AllowedHeaders {\n\t\t\t\t\tvar resf0elemf0elem string\n\t\t\t\t\tresf0elemf0elem = *resf0elemf0iter\n\t\t\t\t\tresf0elemf0 = append(resf0elemf0, &resf0elemf0elem)\n\t\t\t\t}\n\t\t\t\tresf0elem.AllowedHeaders = resf0elemf0\n\t\t\t}\n\t\t\tif resf0iter.AllowedMethods != nil {\n\t\t\t\tresf0elemf1 := []*string{}\n\t\t\t\tfor _, resf0elemf1iter := range resf0iter.AllowedMethods {\n\t\t\t\t\tvar resf0elemf1elem string\n\t\t\t\t\tresf0elemf1elem = *resf0elemf1iter\n\t\t\t\t\tresf0elemf1 = append(resf0elemf1, &resf0elemf1elem)\n\t\t\t\t}\n\t\t\t\tresf0elem.AllowedMethods = resf0elemf1\n\t\t\t}\n\t\t\tif resf0iter.AllowedOrigins != nil {\n\t\t\t\tresf0elemf2 := []*string{}\n\t\t\t\tfor _, resf0elemf2iter := range resf0iter.AllowedOrigins {\n\t\t\t\t\tvar resf0elemf2elem string\n\t\t\t\t\tresf0elemf2elem = *resf0elemf2iter\n\t\t\t\t\tresf0elemf2 = append(resf0elemf2, &resf0elemf2elem)\n\t\t\t\t}\n\t\t\t\tresf0elem.AllowedOrigins = resf0elemf2\n\t\t\t}\n\t\t\tif resf0iter.ExposeHeaders != nil {\n\t\t\t\tresf0elemf3 := []*string{}\n\t\t\t\tfor _, resf0elemf3iter := range resf0iter.ExposeHeaders {\n\t\t\t\t\tvar resf0elemf3elem string\n\t\t\t\t\tresf0elemf3elem = *resf0elemf3iter\n\t\t\t\t\tresf0elemf3 = append(resf0elemf3, &resf0elemf3elem)\n\t\t\t\t}\n\t\t\t\tresf0elem.ExposeHeaders = resf0elemf3\n\t\t\t}\n\t\t\tif resf0iter.MaxAgeSeconds != nil {\n\t\t\t\tresf0elem.MaxAgeSeconds = resf0iter.MaxAgeSeconds\n\t\t\t}\n\t\t\tresf0 = append(resf0, resf0elem)\n\t\t}\n\t\tres.CORSRules = resf0\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "f5c356b1475819bfd14334cf6c409d96", "score": "0.6756294", "text": "func AddHeaders(w http.ResponseWriter, r *http.Request, next http.HandlerFunc) {\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tnext.ServeHTTP(w, r)\n}", "title": "" }, { "docid": "8e9e3f6a65e2cc1fb5927bc5bfaafc2d", "score": "0.6739906", "text": "func AddCorsHeader(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\theaders := w.Header()\n\t\theaders.Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "3454b453e2102aa526e9aa9b9de52813", "score": "0.66438776", "text": "func CORS(exposedHeaders []string, next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\tif _, ok := r.Header[\"Access-Control-Request-Method\"]; !ok {\n\t\t\t\tw.WriteHeader(http.StatusBadRequest)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tmethod := r.Header.Get(\"Access-Control-Request-Method\")\n\t\t\tif method != \"GET\" {\n\t\t\t\tw.WriteHeader(http.StatusMethodNotAllowed)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tif headers := r.Header.Get(\"Access-Control-Request-Headers\"); headers != \"\" {\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", headers)\n\t\t\t}\n\n\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET\")\n\t\t} else {\n\t\t\t// Expose headers\n\t\t\tif exposedHeaders != nil {\n\t\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", strings.Join(exposedHeaders, \", \"))\n\t\t\t}\n\n\t\t\tnext.ServeHTTP(w, r)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "9a9203b57b117646dca39226a4c81ad9", "score": "0.6625811", "text": "func addHeaders(h http.Handler) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\th.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "9d050cfdb968abad91394256922e0aed", "score": "0.6616524", "text": "func addHeaders(w http.ResponseWriter, r *http.Request) {\n\tif r.Header.Get(\"API-KEY\") != \"\" {\n\t\tw.Header().Set(\"API_KEY_PT\", r.Header.Get(\"API_KEY\"))\n\t}\n\tw.Header().Set(CONTENTTYPE, APPLICATIONJSON)\n\t// use this for cors\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization, Accept-Language\")\n}", "title": "" }, { "docid": "6a25e0ffb9a4e001b62a27a843bfab22", "score": "0.66132885", "text": "func addHeaders(w http.ResponseWriter, r *http.Request) {\n\tif r.Header.Get(\"API-KEY\") != \"\" {\n\t\tw.Header().Set(\"API_KEY_PT\", r.Header.Get(\"API_KEY\"))\n\t}\n\tw.Header().Set(CONTENTTYPE, APPLICATIONJSON)\n\t// use this for cors\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n}", "title": "" }, { "docid": "8ee528b6e0599e4fd81738493e7088a8", "score": "0.6553148", "text": "func WithHeaders(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Header().Set(\"Connection\", \"keep-alive\")\n\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"DNT,Authorization,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, OPTIONS, PUT, DELETE\")\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "7c938b4c467eebb11a752f0886dfd72a", "score": "0.6552262", "text": "func CORS() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tc.Header(\"Access-Control-Allow-Origin\", \"*\")\n\t\tc.Header(\"Access-Control-Allow-Headers\", \"access-control-allow-origin, access-control-allow-headers, authorization, content-type\")\n\t\tc.Header(\"Content-Type\", \"application/json\")\n\t}\n}", "title": "" }, { "docid": "2dbab8280bda54e56d13cea92b7996f1", "score": "0.6542471", "text": "func setHeaders(request *http.Request) {\n\trequest.Header.Set(\"Accept\", \"application/vnd.api+json\")\n\trequest.Header.Set(\"Host\", \"api.form3.tech\")\n\trequest.Header.Set(\"Date\", time.Now().UTC().String())\n\trequest.Header.Set(\"Content-Type\", \"application/vnd.api+json\")\n}", "title": "" }, { "docid": "d58e097436c1e99cf9e7772acdc5fb5a", "score": "0.6537898", "text": "func handleCorsPreflight(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\n\tlog.Infof(\"Received [OPTIONS] request to CorsPreFlight: %+v\", r)\n\n\tc := cors.New(REST_CORS_PREFIX, log)\n\tc.HandlePreflight(w, r)\n}", "title": "" }, { "docid": "810f562428e2995cd472c8ce9451a0c3", "score": "0.65255326", "text": "func HandleAllCors(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\theaders := w.Header()\n\t\theaders.Add(\"Access-Control-Allow-Origin\", \"*\")\n\t\theaders.Add(\"Access-Control-Allow-Methods\", \"*\")\n\t\theaders.Add(\"Access-Control-Allow-Headers\", \"*\")\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t} else {\n\t\t\tnext.ServeHTTP(w, r)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "3332abcedfed9159dce8c36a6f3804ad", "score": "0.65234905", "text": "func setCORSOrigin(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "772c8df221aafa6168e0d5e5b72ba630", "score": "0.65169656", "text": "func (c *CLI) EnableCORS(origin, methods, headers string) {\n\tc.SetHeader(\"Access-Control-Allow-Origin\", origin)\n\tc.SetHeader(\"Access-Control-Allow-Methods\", methods)\n\tc.SetHeader(\"Access-Control-Allow-Headers\", headers)\n}", "title": "" }, { "docid": "ec92ad4e5a79ced35c52b3fcb9b47fdb", "score": "0.64515513", "text": "func SetCorsHandler(h http.Handler, objectLayer ObjectLayer) http.Handler {\n\treturn corsHandler{\n\t\thandler: h,\n\t\tobjectLayer: objectLayer,\n\t}\n}", "title": "" }, { "docid": "d74e55c5efd29abc8ffa8341448ccb24", "score": "0.6444011", "text": "func CORS(allowedOrigin string) iris.Handler { // or \"github.com/iris-contrib/middleware/cors\"\n\tif allowedOrigin == \"\" {\n\t\tallowedOrigin = \"*\"\n\t}\n\n\treturn func(ctx iris.Context) {\n\t\tctx.Header(\"Access-Control-Allow-Origin\", allowedOrigin)\n\t\tctx.Header(\"Access-Control-Allow-Credentials\", \"true\")\n\t\t// July 2021 Mozzila updated the following document: https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Referrer-Policy\n\t\tctx.Header(\"Referrer-Policy\", \"no-referrer-when-downgrade\")\n\t\tctx.Header(\"Access-Control-Expose-Headers\", \"*, Authorization, X-Authorization\")\n\t\tif ctx.Method() == iris.MethodOptions {\n\t\t\tctx.Header(\"Access-Control-Allow-Methods\", \"*\")\n\t\t\tctx.Header(\"Access-Control-Allow-Headers\", \"*\")\n\t\t\tctx.Header(\"Access-Control-Max-Age\", \"86400\")\n\t\t\tctx.StatusCode(iris.StatusNoContent)\n\t\t\treturn\n\t\t}\n\n\t\tctx.Next()\n\t}\n}", "title": "" }, { "docid": "10b4fa7c67da54a23813f4604212e614", "score": "0.64390093", "text": "func preflightHandler(w http.ResponseWriter, r *http.Request) {\n\theaders := []string{\"Content-Type\", \"Accept\", \"Authorization\"}\n\tw.Header().Set(\"Access-Control-Allow-Headers\", strings.Join(headers, \",\"))\n\tmethods := []string{\"GET\", \"HEAD\", \"POST\", \"PUT\", \"PATCH\", \"DELETE\"}\n\tw.Header().Set(\"Access-Control-Allow-Methods\", strings.Join(methods, \",\"))\n}", "title": "" }, { "docid": "52d7cbe667cc7f27d49c0135eca1ac28", "score": "0.643381", "text": "func Headers(r http.Handler) http.Handler {\n\theadersOk := handlers.AllowedHeaders([]string{\"Authorization\"})\n\toriginsOk := handlers.AllowedOrigins([]string{\"*\"})\n\tmethodsOk := handlers.AllowedMethods([]string{\"GET\", \"POST\", \"PUT\", \"OPTIONS\"})\n\treturn handlers.CORS(headersOk, originsOk, methodsOk)(r)\n}", "title": "" }, { "docid": "f5b0d6cdc24ba748df39f1c27dd589f1", "score": "0.642463", "text": "func SetupCORSHeaders(env string, originHeader string) map[string]string {\n\tif env == \"dev\" {\n\t\treturn Headers[\"dev\"]\n\t}\n\n\tprodHeaders := Headers[\"prod\"]\n\tif originHeader != \"https://www.bscfees.com\" && originHeader != \"https://bscfees.com\" {\n\t\treturn prodHeaders\n\t}\n\n\tprodHeaders[\"Access-Control-Allow-Origin\"] = originHeader\n\treturn prodHeaders\n}", "title": "" }, { "docid": "295dacb5bee5787025c2c01a37704d9d", "score": "0.6422876", "text": "func (m CORS) ServeHandler(h http.Handler) http.Handler {\n\tif !m.AllowAllOrigins && m.AllowOrigins == nil {\n\t\tpanic(\"cors: AllowOrigins must be set if AllowAllOrigins is false\")\n\t}\n\n\tpreflightHeaders := make(http.Header)\n\theaders := make(http.Header)\n\n\tif m.AllowCredentials {\n\t\theader.Set(preflightHeaders, header.AccessControlAllowCredentials, \"true\")\n\t\theader.Set(headers, header.AccessControlAllowCredentials, \"true\")\n\t}\n\tif len(m.AllowMethods) > 0 {\n\t\theader.Set(preflightHeaders, header.AccessControlAllowMethods, strings.Join(m.AllowMethods, \",\"))\n\t}\n\tif len(m.AllowHeaders) > 0 {\n\t\theader.Set(preflightHeaders, header.AccessControlAllowHeaders, strings.Join(m.AllowHeaders, \",\"))\n\t}\n\tif len(m.ExposeHeaders) > 0 {\n\t\theader.Set(headers, header.AccessControlExposeHeaders, strings.Join(m.ExposeHeaders, \",\"))\n\t}\n\tif m.MaxAge > time.Duration(0) {\n\t\theader.Set(preflightHeaders, header.AccessControlMaxAge, strconv.FormatInt(int64(m.MaxAge/time.Second), 10))\n\t}\n\tif m.AllowAllOrigins {\n\t\theader.Set(preflightHeaders, header.AccessControlAllowOrigin, \"*\")\n\t\theader.Set(headers, header.AccessControlAllowOrigin, \"*\")\n\t} else {\n\t\theader.Add(preflightHeaders, header.Vary, header.Origin)\n\t\theader.Add(preflightHeaders, header.Vary, header.AccessControlRequestMethod)\n\t\theader.Add(preflightHeaders, header.Vary, header.AccessControlRequestHeaders)\n\t\theader.Set(headers, header.Vary, header.Origin)\n\t}\n\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif origin := header.Get(r.Header, header.Origin); len(origin) > 0 {\n\t\t\th := w.Header()\n\t\t\tif !m.AllowAllOrigins {\n\t\t\t\tif m.AllowOrigins(origin) {\n\t\t\t\t\theader.Set(h, header.AccessControlAllowOrigin, origin)\n\t\t\t\t} else {\n\t\t\t\t\tw.WriteHeader(http.StatusForbidden)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t\tif r.Method == http.MethodOptions {\n\t\t\t\tfor k, v := range preflightHeaders {\n\t\t\t\t\th[k] = v\n\t\t\t\t}\n\t\t\t\tw.WriteHeader(http.StatusOK)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tfor k, v := range headers {\n\t\t\t\th[k] = v\n\t\t\t}\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "612f52eecb1917d5d4c95effe9373166", "score": "0.6417043", "text": "func (d *DataStreamHandler) EnableCORS(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\n\treturn\n}", "title": "" }, { "docid": "0ae5c3a84841ec8d8b44f5bb486e3524", "score": "0.64131725", "text": "func AddHeaders(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Add(\"content-type\", \"application/json\")\n\t\tw.Header().Add(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Add(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, DELETE, PUT\")\n\t\tw.Header().Add(\"Access-Control-Max-Age\", \"3600\")\n\t\tw.Header().Add(\"Access-Control-Allow-Headers\", \"Content-Type, Accept, X-Requested-With, remember-me\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "9ab44efc9c3b570ff346e83a6e88227e", "score": "0.63513625", "text": "func CORS(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t// allowing all origins\n\t\t// TODO - mebs limit this down in the future\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", r.Header.Get(\"Origin\"))\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Authorization\")\n\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "20a7812d589429755e52442070e9aca1", "score": "0.63481057", "text": "func HandleCORS(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(writer http.ResponseWriter, request *http.Request) {\n\t\twriter.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, session\")\n\t\twriter.Header().Set(\"Access-Control-Allow-Methods\", \"HEAD, GET, POST, PUT, DELETE, OPTIONS\")\n\t\twriter.Header().Set(\"Access-Control-Max-Age\", \"600\")\n\t\tnext.ServeHTTP(writer, request)\n\t})\n}", "title": "" }, { "docid": "900142c1cf3235f83da3630741300261", "score": "0.6337053", "text": "func corsMiddleware(c *gin.Context) {\n\tc.Header(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "a8b3243678429f5ceb50ab6b762a1b3e", "score": "0.63283414", "text": "func (o RuleRuleActionCorsConfigOutput) ExposeHeaders() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v RuleRuleActionCorsConfig) []string { return v.ExposeHeaders }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "9aff606e4ee395c5ae361c35928be762", "score": "0.6326782", "text": "func SetCORS(router *gin.Engine) {\n\thostName := os.Getenv(\"KOOKY_HOSTNAME\")\n\torigin := fmt.Sprintf(\"https://%s\", hostName)\n\trouter.Use(cors.New(cors.Config{\n\t\tAllowOrigins: []string{origin},\n\t\tAllowMethods: []string{\"POST\", \"GET\", \"OPTIONS\"},\n\t\tAllowHeaders: []string{\"Origin\"},\n\t\tExposeHeaders: []string{\"Content-Length\", \"Content-Type\"},\n\t\tAllowCredentials: true,\n\t\tAllowAllOrigins: false,\n\t\tMaxAge: 12 * time.Hour,\n\t}))\n}", "title": "" }, { "docid": "04a875e682518724bfc017feae880426", "score": "0.6326203", "text": "func WithCORSAllowHeaders(headers ...string) CORSOption {\n\treturn func(cfg *corsCfg) {\n\t\tfor _, h := range headers {\n\t\t\tcfg.headers += h + \", \"\n\t\t}\n\t\tcfg.headers = strings.TrimRight(cfg.headers, \", \")\n\t}\n}", "title": "" }, { "docid": "d16714acc9a9fe8a61ecab2fbcb0220b", "score": "0.6316785", "text": "func CORS() HandlerFunc {\n\treturn func(c *Context) {\n\t\tmethod := c.Request.Method\n\t\torigin := c.Request.Header.Get(\"Origin\")\n\t\thander := c.Writer.Header()\n\t\thander.Set(\"Access-Control-Allow-Origin\", origin)\n\t\thander.Set(\"Access-Control-Allow-Headers\", \"Content-Type,X-Token\")\n\t\thander.Set(\"Access-Control-Allow-Methods\", \"POST,GET,OPTIONS,DELETE,PUT\")\n\t\thander.Set(\"Access-Control-Expose-Headers\", \"Content-Length, Access-Control-Allow-Origin, Access-Control-Allow-Headers, Content-Type\")\n\t\thander.Set(\"Access-Control-Allow-Credentials\", \"true\")\n\n\t\t// 放行所有OPTIONS方法\n\t\tif method == \"OPTIONS\" {\n\t\t\tc.AbortWithStatus(http.StatusNoContent)\n\t\t}\n\t\t// 处理请求\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "e0f1c3d1f4ea4ac4672ec0acd4f4f65b", "score": "0.62851125", "text": "func openCORS(next http.Handler) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"http://localhost:4200\")\n\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Access-Control-Allow-Headers, Origin,Accept, X-Requested-With, Content-Type, Access-Control-Request-Method, Access-Control-Request-Headers\")\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\tfmt.Fprintln(w, \"\")\n\t\t\treturn\n\t\t}\n\t\tnext.ServeHTTP(w, r)\n\t}\n}", "title": "" }, { "docid": "5697b43a47034925df4a5815bc2b57c3", "score": "0.6254938", "text": "func corsAndOptionHandler(h http.Handler) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type\")\n\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\tw.WriteHeader(http.StatusOK)\n\t\t} else {\n\t\t\th.ServeHTTP(w, r)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fc448767c94eb814fb529b30b06905a1", "score": "0.6226742", "text": "func (ac *tokenAuthChallenge) SetHeaders(req *http.Request, w http.ResponseWriter) {\n\t// WWW-Authenticate response challenge header.\n\t// See https://docs.docker.com/registry/spec/auth/token/#/how-to-authenticate and https://tools.ietf.org/html/rfc6750#section-3\n\tstr := fmt.Sprintf(\"Bearer realm=%q\", ac.realm)\n\tif ac.service != \"\" {\n\t\tstr += fmt.Sprintf(\",service=%q\", ac.service)\n\t}\n\tw.Header().Set(\"WWW-Authenticate\", str)\n}", "title": "" }, { "docid": "e3e1b1f05a81e7a3170cea67984201d9", "score": "0.6222917", "text": "func CORS(handler http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\torigin := r.Header.Get(\"Origin\")\n\t\tif origin == \"\" {\n\t\t\torigin = \"*\"\n\t\t}\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\treturn\n\t\t}\n\t\thandler.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "6e40f0215d42750e3c9d3b12434703db", "score": "0.62099063", "text": "func JSONHeaders(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "3adfba38b151d2dc22c144574de876ea", "score": "0.6203288", "text": "func SetHeaders(req *http.Request, annonceID, annonceType string) {\n\tua := getrandomUA()\n\treq.Header.Set(\"User-Agent\", ua)\n\treq.Header.Set(\"Host\", \"api.leboncoin.fr\")\n\treq.Header.Set(\"Connection\", \"keep-alive\")\n\treq.Header.Set(\"Accept\", \"application/json\")\n\treq.Header.Set(\"Accept-Language\", \"fr-FR;fr;q=0.5\")\n\treq.Header.Set(\"Origin\", \"https://www.leboncoin.fr\")\n\treq.Header.Set(\"Content-Type\", \"application/x-www-form-urlencoded\")\n\treq.Header.Set(\"Referer\", fmt.Sprintf(\"https://www.leboncoin.fr/%s/%s.htm/\", annonceType, annonceID))\n}", "title": "" }, { "docid": "db629b2c1825c63f7e0def6804ac17c9", "score": "0.6187698", "text": "func CORS(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\torigin := r.Header.Get(\"Origin\")\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\tif r.Method == \"OPTIONS\" {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET,POST,PUT,DELETE,PATCH\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type, X-CSRF-Token, Authorization, Version\")\n\t\t\tw.WriteHeader(http.StatusNoContent)\n\t\t\treturn\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "6ac8e7d0efbb3d8d6e3d5f7f5536e002", "score": "0.61856633", "text": "func EnableCors(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(\n\t\tfunc(w http.ResponseWriter, r *http.Request) {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\t\tnext.ServeHTTP(w, r)\n\t\t},\n\t)\n}", "title": "" }, { "docid": "165e11afec7f1aaef6f67df21a9f4873", "score": "0.61765444", "text": "func Cors() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Origin\", \"http://localhost\")\n\t\tc.Writer.Header().Set(\"Access-Control-Max-Age\", \"86400\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE, UPDATE\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Headers\", \"X-Requested-With, Content-Type, Origin, Authorization, Accept, Client-Security-Token, Accept-Encoding, x-access-token\")\n\t\tc.Writer.Header().Set(\"Access-Control-Expose-Headers\", \"Content-Length\")\n\t\tc.Writer.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\n\t\tc.Next()\n\t}\n}", "title": "" }, { "docid": "a7567b00f74b24c3fb15bbd2e50a335f", "score": "0.6174385", "text": "func handleObservationOrigin(h goa.Handler) goa.Handler {\n\n\treturn func(ctx context.Context, rw http.ResponseWriter, req *http.Request) error {\n\t\torigin := req.Header.Get(\"Origin\")\n\t\tif origin == \"\" {\n\t\t\t// Not a CORS request\n\t\t\treturn h(ctx, rw, req)\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"*\") {\n\t\t\tctx = goa.WithLogContext(ctx, \"origin\", origin)\n\t\t\trw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\trw.Header().Set(\"Access-Control-Expose-Headers\", \"Origin, Authorization, Accept, Content-Type, X-Requested-With\")\n\t\t\trw.Header().Set(\"Access-Control-Max-Age\", \"600\")\n\t\t\trw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\t\tif acrm := req.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS\")\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Headers\", \"Origin, Authorization, Accept, Content-Type, X-Requested-With\")\n\t\t\t}\n\t\t\treturn h(ctx, rw, req)\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"http://localhost:8080\") {\n\t\t\tctx = goa.WithLogContext(ctx, \"origin\", origin)\n\t\t\trw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\trw.Header().Set(\"Vary\", \"Origin\")\n\t\t\trw.Header().Set(\"Access-Control-Expose-Headers\", \"Origin, Authorization, Accept, Content-Type, X-Requested-With\")\n\t\t\trw.Header().Set(\"Access-Control-Max-Age\", \"600\")\n\t\t\trw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\t\tif acrm := req.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, HEAD, POST, PUT, DELETE, TRACE, OPTIONS\")\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Headers\", \"Origin, Authorization, Accept, Content-Type, X-Requested-With\")\n\t\t\t}\n\t\t\treturn h(ctx, rw, req)\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"http://swagger.goa.design\") {\n\t\t\tctx = goa.WithLogContext(ctx, \"origin\", origin)\n\t\t\trw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\trw.Header().Set(\"Vary\", \"Origin\")\n\t\t\trw.Header().Set(\"Access-Control-Expose-Headers\", \"Content-Type, Origin\")\n\t\t\trw.Header().Set(\"Access-Control-Max-Age\", \"600\")\n\t\t\trw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t\t\tif acrm := req.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, PUT, PATCH, DELETE\")\n\t\t\t\trw.Header().Set(\"Access-Control-Allow-Headers\", \"Accept, Content-Type\")\n\t\t\t}\n\t\t\treturn h(ctx, rw, req)\n\t\t}\n\n\t\treturn h(ctx, rw, req)\n\t}\n}", "title": "" }, { "docid": "f7162dd75fe9944dbdcfa4249d8e999c", "score": "0.6167672", "text": "func handleExportOrigin(h http.Handler) http.Handler {\n\tspec0 := regexp.MustCompile(\"(.+[.])?fklocal.org:\\\\d+\")\n\tspec1 := regexp.MustCompile(\"127.0.0.1:\\\\d+\")\n\tspec2 := regexp.MustCompile(\"192.168.(\\\\d+).(\\\\d+):\\\\d+\")\n\torigHndlr := h.(http.HandlerFunc)\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\torigin := r.Header.Get(\"Origin\")\n\t\tif origin == \"\" {\n\t\t\t// Not a CORS request\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOriginRegexp(origin, spec0) {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOriginRegexp(origin, spec1) {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOriginRegexp(origin, spec2) {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"https://*.fieldkit.org\") {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"https://*.fkdev.org\") {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"https://dataviz.floodnet.nyc\") {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"https://fieldkit.org\") {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\tif cors.MatchOrigin(origin, \"https://fkdev.org\") {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tw.Header().Set(\"Vary\", \"Origin\")\n\t\t\tw.Header().Set(\"Access-Control-Expose-Headers\", \"Authorization, Content-Type\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"false\")\n\t\t\tif acrm := r.Header.Get(\"Access-Control-Request-Method\"); acrm != \"\" {\n\t\t\t\t// We are handling a preflight request\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, OPTIONS, POST, DELETE, PATCH, PUT\")\n\t\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\t\t}\n\t\t\torigHndlr(w, r)\n\t\t\treturn\n\t\t}\n\t\torigHndlr(w, r)\n\t\treturn\n\t})\n}", "title": "" }, { "docid": "154ba056cdec393566a592b76fca6d71", "score": "0.6153487", "text": "func SetHeader(resp *echo.Response, pragma *Pragma) {\n\theader := resp.Header()\n\tfor key, value := range pragma.ResponseHeaders() {\n\t\theader.Set(key, value)\n\t}\n}", "title": "" }, { "docid": "eb23db6016434812d154be7ce6e33474", "score": "0.6152365", "text": "func AccessControl(handler http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, req *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"3.5\") //firefox\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"GET, POST, PUT, PATCH, DELETE, OPTIONS\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\t\tif req.Method == \"OPTIONS\" {\n\t\t\treturn\n\t\t}\n\t\thandler.ServeHTTP(w, req)\n\t}\n\n}", "title": "" }, { "docid": "5127a8bccdfc0714b5cbc40bd08c53c4", "score": "0.6146375", "text": "func (ch challenge) SetHeaders(w http.ResponseWriter) {\n\tw.Header().Set(\"WWW-Authenticate\", fmt.Sprintf(\"Basic realm=%q\", ch.realm))\n}", "title": "" }, { "docid": "01e28df92b16bc8ed10dc7cef2f70c58", "score": "0.6139835", "text": "func CORSHandler(fn http.HandlerFunc) http.HandlerFunc {\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// if origin := r.Header.Get(\"Origin\"); origin != \"\" {\n\t\t//\n\t\t// \tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t// }\n\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token\")\n\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\n\t\tfn(w, r)\n\t}\n}", "title": "" }, { "docid": "797287a227193f11eb44c2ec5b5093e6", "score": "0.6131191", "text": "func allowCORS(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Println(r)\n\t\tif origin := r.Header.Get(\"Origin\"); origin != \"\" {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tif r.Method == \"OPTIONS\" && r.Header.Get(\"Access-Control-Request-Method\") != \"\" {\n\t\t\t\tpreflightHandler(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "c5f2e91e873795f890de04503b096e41", "score": "0.612341", "text": "func (obsClient ObsClient) SetBucketCors(input *SetBucketCorsInput) (output *BaseModel, err error) {\n\tif input == nil {\n\t\treturn nil, errors.New(\"SetBucketCorsInput is nil\")\n\t}\n\toutput = &BaseModel{}\n\terr = obsClient.doActionWithBucket(\"SetBucketCors\", HTTP_PUT, input.Bucket, input, output)\n\tif err != nil {\n\t\toutput = nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "ff65ca16ffb163f80d4617410ef1d033", "score": "0.6116921", "text": "func CORS(next http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\torigin, ok := ctxx.Origin(r.Context())\n\t\tif !ok {\n\t\t\tutil.HTTPAbort(w, \"missing origin\", http.StatusInternalServerError)\n\t\t\treturn\n\t\t}\n\n\t\tw.Header().Add(\"Access-Control-Allow-Origin\", origin)\n\t\tw.Header().Add(\"Access-Control-Allow-Headers\", \"Content-Type\")\n\t\tnext.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "7bf24b55a46e524bbe606dd679874a2a", "score": "0.61074245", "text": "func SetHeaders(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(header.XContentTypeOptions, \"nosniff\")\n\t\tw.Header().Set(header.XXSSProtection, \"1; mode=block\")\n\t\tw.Header().Set(header.XFrameOptions, \"deny\")\n\t\t// w.Header().Set(header.ContentSecurityPolicy, \"img-src https: data:; font-src https: data:; media-src https:;\")\n\t\tw.Header().Set(header.CacheControl, \"no-cache, no-store, must-revalidate\")\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "8265590194a2d573c4cec3b14532a9ad", "score": "0.6100234", "text": "func (client *BlobClient) setHTTPHeadersHandleResponse(resp *http.Response) (BlobClientSetHTTPHeadersResponse, error) {\n\tresult := BlobClientSetHTTPHeadersResponse{}\n\tif val := resp.Header.Get(\"ETag\"); val != \"\" {\n\t\tresult.ETag = (*azcore.ETag)(&val)\n\t}\n\tif val := resp.Header.Get(\"Last-Modified\"); val != \"\" {\n\t\tlastModified, err := time.Parse(time.RFC1123, val)\n\t\tif err != nil {\n\t\t\treturn BlobClientSetHTTPHeadersResponse{}, err\n\t\t}\n\t\tresult.LastModified = &lastModified\n\t}\n\tif val := resp.Header.Get(\"x-ms-blob-sequence-number\"); val != \"\" {\n\t\tblobSequenceNumber, err := strconv.ParseInt(val, 10, 64)\n\t\tif err != nil {\n\t\t\treturn BlobClientSetHTTPHeadersResponse{}, err\n\t\t}\n\t\tresult.BlobSequenceNumber = &blobSequenceNumber\n\t}\n\tif val := resp.Header.Get(\"x-ms-client-request-id\"); val != \"\" {\n\t\tresult.ClientRequestID = &val\n\t}\n\tif val := resp.Header.Get(\"x-ms-request-id\"); val != \"\" {\n\t\tresult.RequestID = &val\n\t}\n\tif val := resp.Header.Get(\"x-ms-version\"); val != \"\" {\n\t\tresult.Version = &val\n\t}\n\tif val := resp.Header.Get(\"Date\"); val != \"\" {\n\t\tdate, err := time.Parse(time.RFC1123, val)\n\t\tif err != nil {\n\t\t\treturn BlobClientSetHTTPHeadersResponse{}, err\n\t\t}\n\t\tresult.Date = &date\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "fe9e7a5de8759af980d624a474dbeeaf", "score": "0.60914934", "text": "func disableCors(h http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"*\")\n\t\th(w, r)\n\t}\n}", "title": "" }, { "docid": "fe9e7a5de8759af980d624a474dbeeaf", "score": "0.60914934", "text": "func disableCors(h http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", \"*\")\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"*\")\n\t\th(w, r)\n\t}\n}", "title": "" }, { "docid": "2a7d4cd84b822c436e86e2cb807e71c8", "score": "0.6091284", "text": "func CheckCors(h http.Handler, cors bool) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif cors {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\t\t\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Content-Type\")\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "2fcd3d942027a2e66edff195cdd2e2fa", "score": "0.6087566", "text": "func AllowCORS(r *http.Request, responseHeader http.Header) bool {\n\tresponseHeader.Add(\"Access-Control-Allow-Origin\", \"*\")\n\tif r.Method == \"OPTIONS\" {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "10570b02a1b938b8ef7460fbac257deb", "score": "0.60338986", "text": "func preflightHandler(w http.ResponseWriter, r *http.Request) {\n\theaders := []string{\"Content-Type\", \"Accept\", \"Authorization\"}\n\tw.Header().Set(\"Access-Control-Allow-Headers\", strings.Join(headers, \",\"))\n\tmethods := []string{\"GET\", \"HEAD\", \"POST\", \"PUT\", \"DELETE\"}\n\tw.Header().Set(\"Access-Control-Allow-Methods\", strings.Join(methods, \",\"))\n\tglog.Infof(\"preflight request for %s\", r.URL.Path)\n}", "title": "" }, { "docid": "6c6f8792e201e041973febbeee30730c", "score": "0.602264", "text": "func (request *Request) setCustomHeaders(req *generatedRequest) {\n\tfor k, v := range request.customHeaders {\n\t\tif req.rawRequest != nil {\n\t\t\treq.rawRequest.Headers[k] = v\n\t\t} else {\n\t\t\tkk, vv := strings.TrimSpace(k), strings.TrimSpace(v)\n\t\t\treq.request.Header.Set(kk, vv)\n\t\t\tif kk == \"Host\" {\n\t\t\t\treq.request.Host = vv\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b930e4010a0bb4cdf433d3dd15f61d94", "score": "0.6018932", "text": "func (ac *authChallenge) SetHeaders(req *http.Request, w http.ResponseWriter) {\n\t// WWW-Authenticate response challenge header.\n\t// See https://tools.ietf.org/html/rfc6750#section-3\n\tstr := fmt.Sprintf(\"Basic realm=%s\", ac.realm)\n\tif ac.err != nil {\n\t\tstr = fmt.Sprintf(\"%s,error=%q\", str, ac.Error())\n\t}\n\tw.Header().Set(\"WWW-Authenticate\", str)\n}", "title": "" }, { "docid": "819134a1757bf339afb2037dcb4109b5", "score": "0.6008426", "text": "func (p *Exorequester) SetHeaders() *Exorequester {\n\tp.requester.\n\t\tSet(\"'User-Agent\", \"goapi-v1\").\n\t\tSet(\"Accept-language\", \"es\").\n\t\tSet(\"accept\", \"application/json\")\n\treturn p\n}", "title": "" }, { "docid": "20e153da4903b7cd19d3c9a3a97e9bcb", "score": "0.60033417", "text": "func HttpHeader_AccessControlAllowHeaders() *HttpHeader {\n\treturn &HttpHeader{\n\t\t\"Access-Control-Allow-Headers\",\n\t\t\"\", // comma-separated list\n\t}\n}", "title": "" }, { "docid": "9607359b3042337b802fe423c54a3c13", "score": "0.5988238", "text": "func setResponseHeaders() Middleware {\n\treturn func(h http.Handler) http.Handler {\n\t\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\t\tw.Header().Add(\"Content-Security-Policy\", \"default-src 'none'; object-src 'none';\")\n\t\t\tw.Header().Add(\"X-Frame-Options\", \"DENY\")\n\t\t\tw.Header().Add(\"X-Content-Type-Options\", \"nosniff\")\n\t\t\tw.Header().Add(\"Strict-Transport-Security\", \"max-age=31536000;\")\n\t\t\th.ServeHTTP(w, r)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "8e53b63d7c50a69a5b3e991b5b38ec5c", "score": "0.5985914", "text": "func ServeSetHeaders(w http.ResponseWriter, opts *ServeHeaderOptions) {\n\theader := w.Header()\n\n\tcontentType := typesniffer.ApplicationOctetStream\n\tif opts.ContentType != \"\" {\n\t\tif opts.ContentTypeCharset != \"\" {\n\t\t\tcontentType = opts.ContentType + \"; charset=\" + strings.ToLower(opts.ContentTypeCharset)\n\t\t} else {\n\t\t\tcontentType = opts.ContentType\n\t\t}\n\t}\n\theader.Set(\"Content-Type\", contentType)\n\theader.Set(\"X-Content-Type-Options\", \"nosniff\")\n\n\tif opts.ContentLength != nil {\n\t\theader.Set(\"Content-Length\", strconv.FormatInt(*opts.ContentLength, 10))\n\t}\n\n\tif opts.Filename != \"\" {\n\t\tdisposition := opts.Disposition\n\t\tif disposition == \"\" {\n\t\t\tdisposition = \"attachment\"\n\t\t}\n\n\t\tbackslashEscapedName := strings.ReplaceAll(strings.ReplaceAll(opts.Filename, `\\`, `\\\\`), `\"`, `\\\"`) // \\ -> \\\\, \" -> \\\"\n\t\theader.Set(\"Content-Disposition\", fmt.Sprintf(`%s; filename=\"%s\"; filename*=UTF-8''%s`, disposition, backslashEscapedName, url.PathEscape(opts.Filename)))\n\t\theader.Set(\"Access-Control-Expose-Headers\", \"Content-Disposition\")\n\t}\n\n\tduration := opts.CacheDuration\n\tif duration == 0 {\n\t\tduration = 5 * time.Minute\n\t}\n\thttpcache.SetCacheControlInHeader(header, duration)\n\n\tif !opts.LastModified.IsZero() {\n\t\theader.Set(\"Last-Modified\", opts.LastModified.UTC().Format(http.TimeFormat))\n\t}\n}", "title": "" }, { "docid": "38e99e607265b011b1977273a9d88c75", "score": "0.5982569", "text": "func allowCORS(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif origin := r.Header.Get(\"Origin\"); origin != \"\" {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tif r.Method == \"OPTIONS\" && r.Header.Get(\"Access-Control-Request-Method\") != \"\" {\n\t\t\t\tpreflightHandler(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" }, { "docid": "3f485db48fa3484de9f3c1e9bfc85033", "score": "0.59761924", "text": "func (c *Context) CorsMiddleware(rw web.ResponseWriter, r *web.Request,\n\tnext web.NextMiddlewareFunc) {\n\tif r.Method != \"OPTIONS\" {\n\t\tnext(rw, r)\n\t\treturn\n\t}\n\n\trw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n}", "title": "" }, { "docid": "ff65111132496ac0bde6524c6f73e939", "score": "0.5954016", "text": "func writeValidPreflightResponse(w http.ResponseWriter, c cors) {\n\t// Write 200 with CORS headers\n\twriteCorsPreflightHeaders(w, c)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "56eeb4cfbdf8999d6cad5393733513da", "score": "0.5953215", "text": "func cors(w http.ResponseWriter, r *http.Request) bool {\n\torigin := r.Header.Get(\"Origin\")\n\n\t// If the client has not provided it's origin, the\n\t// request will be answered in any case.\n\tif origin == \"\" {\n\t\treturn true\n\t}\n\n\t// Only allow our own origin if not on development server.\n\tif !appengine.IsDevAppServer() && origin != \"https://app.cod.uno\" {\n\t\thttp.Error(w, \"Invalid Origin\", http.StatusUnauthorized)\n\t\treturn false\n\t}\n\n\t// We have a nice CORS established, so set appropriate headers.\n\t// TODO(flowlo): Figure out how to send correct methods.\n\tw.Header().Set(\"Access-Control-Allow-Methods\", \"OPTIONS, GET, POST, PUT, DELETE\")\n\tw.Header().Set(\"Access-Control-Allow-Headers\", \"Authorization, Content-Type\")\n\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\n\t// If this is an OPTIONS request, we answer it\n\t// immediately and do not bother higher level handlers.\n\tif r.Method == \"OPTIONS\" {\n\t\tw.Write([]byte(\"OK\"))\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "9326fab43c359d1f38b5970b1d61949b", "score": "0.59401274", "text": "func SetRelaxedSecurityHeaders(ctx *fasthttp.RequestCtx) {\n\tSetBaseSecurityHeaders(ctx)\n\n\tctx.Response.Header.SetBytesKV(headerCrossOriginOpenerPolicy, headerValueSameOrigin)\n\tctx.Response.Header.SetBytesKV(headerCrossOriginEmbedderPolicy, headerValueUnsafeNone)\n\tctx.Response.Header.SetBytesKV(headerCrossOriginResourcePolicy, headerValueCrossOrigin)\n}", "title": "" }, { "docid": "6fad31101c39cb629253dc5f00b22e44", "score": "0.59349704", "text": "func (s *WithCORS) ServeHTTP(res http.ResponseWriter, req *http.Request) {\n\tif origin := req.Header.Get(\"Origin\"); origin != \"\" {\n\t\tres.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\tres.Header().Set(\"Access-Control-Allow-Methods\", \"POST, GET, OPTIONS, PUT, DELETE\")\n\t\tres.Header().Set(\"Access-Control-Allow-Headers\",\n\t\t\t\"Accept, Content-Type, Content-Length, Accept-Encoding, X-CSRF-Token, Authorization\")\n\t}\n\n\t// Stop here for a Preflighted OPTIONS request.\n\tif req.Method == \"OPTIONS\" {\n\t\treturn\n\t}\n\t// Lets Gorilla work\n\ts.r.ServeHTTP(res, req)\n}", "title": "" }, { "docid": "696e229c89217538ab91ec7c9bdc0bac", "score": "0.59329766", "text": "func ResponseHeaders(headers ...string) Option {\n\treturn func(t *Tracer) error {\n\t\tt.respHeaders = append(t.respHeaders, headers...)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "8574bca87750ed6a2dd3ad83f653dd9a", "score": "0.5929305", "text": "func SetHeader(h http.HandlerFunc) http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\th(w, r)\n\t})\n}", "title": "" }, { "docid": "c9b2b7bd365c321c82d51101b526960d", "score": "0.59266245", "text": "func (o RuleRuleActionCorsConfigPtrOutput) ExposeHeaders() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v *RuleRuleActionCorsConfig) []string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.ExposeHeaders\n\t}).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "b97cbdf23a16ad6b95d9d6d24d669e29", "score": "0.5925988", "text": "func (c *CORS) Handle(w http.ResponseWriter, r *vertex.Request, next vertex.HandlerFunc) (interface{}, error) {\n\tif c.AllowOrigin != \"\" {\n\t\tw.Header().Set(\"Access-Control-Allow-Origin\", c.AllowOrigin)\n\t}\n\n\tif c.allowHeaders != nil && len(c.allowHeaders) > 0 {\n\t\tw.Header().Set(\"Access-Control-Allow-Headers\", strings.Join(c.allowHeaders, \",\"))\n\t}\n\n\tif c.exposeHeaders != nil && len(c.exposeHeaders) > 0 {\n\t\tw.Header().Set(\"Access-Control-Expose-Headers\", strings.Join(c.exposeHeaders, \",\"))\n\t}\n\n\tif c.allowMethods != nil && len(c.allowMethods) > 0 {\n\t\tw.Header().Set(\"Access-Control-Allow-Methods\", strings.Join(c.allowMethods, \",\"))\n\t}\n\n\tif c.allowCredentials {\n\t\tw.Header().Set(\"Access-Control-Allow-Credentials\", \"true\")\n\t}\n\n\treturn next(w, r)\n}", "title": "" }, { "docid": "2aec438ffecc5e2741f2e0cf718db73f", "score": "0.5925208", "text": "func AllowCORS(h http.Handler) http.Handler {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tif origin := r.Header.Get(\"Origin\"); origin != \"\" {\n\t\t\tw.Header().Set(\"Access-Control-Allow-Origin\", origin)\n\t\t\tif r.Method == \"OPTIONS\" && r.Header.Get(\"Access-Control-Request-Method\") != \"\" {\n\t\t\t\tpreflightHandler(w, r)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\th.ServeHTTP(w, r)\n\t})\n}", "title": "" } ]
f31d1833ce169b4996a421ab27adc99b
BenchmarkADVFCFieldInclusion benchmarks validating file control field inclusion
[ { "docid": "e5eee06cdf56d1f19ef81244981ebcf3", "score": "0.74115443", "text": "func BenchmarkADVFCFieldInclusion(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestADVFCFieldInclusion(b)\n\t}\n}", "title": "" } ]
[ { "docid": "b7bfc546c6b0dfd7e604f4392970cf40", "score": "0.75642806", "text": "func testADVFCFieldInclusion(t testing.TB) {\n\tfc := mockADVFileControl()\n\tfc.BatchCount = 0\n\terr := fc.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "2be355d09fb26ffcc5a73e7e109c34ac", "score": "0.7122219", "text": "func TestADVFCFieldInclusion(t *testing.T) {\n\ttestADVFCFieldInclusion(t)\n}", "title": "" }, { "docid": "8e424c240105b6f597cf403a3866c709", "score": "0.67812747", "text": "func TestADVFCFieldInclusionBlockCount(t *testing.T) {\n\ttestADVFCFieldInclusionBlockCount(t)\n}", "title": "" }, { "docid": "5212946576749420d6c612af310922a4", "score": "0.6765243", "text": "func (fc *ADVFileControl) fieldInclusion() error {\n\tif fc.BatchCount == 0 {\n\t\treturn fieldError(\"BatchCount\", ErrConstructor, fc.BatchCountField())\n\t}\n\tif fc.BlockCount == 0 {\n\t\treturn fieldError(\"BlockCount\", ErrConstructor, fc.BlockCountField())\n\t}\n\tif fc.EntryAddendaCount == 0 {\n\t\treturn fieldError(\"EntryAddendaCount\", ErrConstructor, fc.EntryAddendaCountField())\n\t}\n\tif fc.EntryHash == 0 {\n\t\treturn fieldError(\"EntryHash\", ErrConstructor, fc.EntryHashField())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c5e059d59f035a0197c235b74820966c", "score": "0.6746159", "text": "func BenchmarkADVFCFieldInclusionBlockCount(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestADVFCFieldInclusionBlockCount(b)\n\t}\n}", "title": "" }, { "docid": "4220f5641554d0c41e5425574793d0e0", "score": "0.66048056", "text": "func testADVFCFieldInclusionBlockCount(t testing.TB) {\n\tfc := mockADVFileControl()\n\tfc.BlockCount = 0\n\terr := fc.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "d2da2e45c7db004b03784b157870b192", "score": "0.6301627", "text": "func BenchmarkADVFCFieldInclusionEntryHash(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestADVFCFieldInclusionEntryHash(b)\n\t}\n}", "title": "" }, { "docid": "a3ca22876efda2251a825d2d243d6ea9", "score": "0.6265949", "text": "func testADVFCFieldInclusionEntryHash(t testing.TB) {\n\tfc := mockADVFileControl()\n\tfc.EntryHash = 0\n\terr := fc.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "af81df9355094947192fbbda8cdebb1d", "score": "0.61994046", "text": "func TestADVFCFieldInclusionEntryHash(t *testing.T) {\n\ttestADVFCFieldInclusionEntryHash(t)\n}", "title": "" }, { "docid": "7c71609df6f73f574e1540568c17828f", "score": "0.61931396", "text": "func testADVFCFieldInclusionEntryAddendaCount(t testing.TB) {\n\tfc := mockADVFileControl()\n\tfc.EntryAddendaCount = 0\n\terr := fc.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\n\t\tt.Errorf(\"%T: %s\", err, err)\n\n\t}\n}", "title": "" }, { "docid": "b260f6376c07c1a10c1fbb507ae45b73", "score": "0.6081382", "text": "func RunIncludedFieldsChecks(capInt map[string]interface{}, includedFields []endpointmanager.IncludedField, fhirVersion string) []endpointmanager.IncludedField {\n\tfieldsList := getFieldsList(fhirVersion)\n\t// Get name of field\n\tfor _, fieldNames := range fieldsList {\n\t\tvar stringIndex string\n\t\tlength := len(fieldNames)\n\t\tif length != 1 {\n\t\t\tfor index, name := range fieldNames {\n\t\t\t\tif index == length-1 {\n\t\t\t\t\tstringIndex = stringIndex + name\n\t\t\t\t} else if index == 0 {\n\t\t\t\t\tstringIndex = name + \".\"\n\t\t\t\t} else {\n\t\t\t\t\tstringIndex = stringIndex + name + \".\"\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tstringIndex = fieldNames[0]\n\t\t}\n\n\t\t// Create fieldObj with field name, if the field exists, and if it is an extension\n\t\tfieldObj := endpointmanager.IncludedField{\n\t\t\tField: stringIndex,\n\t\t\tExists: checkField(capInt, fieldNames),\n\t\t\tExtension: false,\n\t\t}\n\t\tincludedFields = append(includedFields, fieldObj)\n\t}\n\n\treturn includedFields\n}", "title": "" }, { "docid": "9aa7c5f3e20cc7ab56a82c4b0607e630", "score": "0.60372645", "text": "func BenchmarkAddenda02FieldInclusionTypeCode(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda02FieldInclusionTypeCode(b)\n\t}\n}", "title": "" }, { "docid": "f32035c983f62fd2fbd82eab6731de3d", "score": "0.6014033", "text": "func BenchmarkAddenda14FieldInclusionRDFIIdentification(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionRDFIIdentification(b)\n\t}\n}", "title": "" }, { "docid": "e1d8369cb8c6e03113f964c9c5cfb232", "score": "0.59915596", "text": "func BenchmarkADVFCFieldInclusionEntryAddendaCount(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestADVFCFieldInclusionEntryAddendaCount(b)\n\t}\n}", "title": "" }, { "docid": "f538676141b4b2879efb5ae28f82a42d", "score": "0.5861957", "text": "func BenchmarkAddenda14FieldInclusionTypeCode(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionTypeCode(b)\n\t}\n}", "title": "" }, { "docid": "a2a052ca8fb2b9a84f961ed1c5a16502", "score": "0.5793199", "text": "func TestADVFCFieldInclusionEntryAddendaCount(t *testing.T) {\n\ttestADVFCFieldInclusionEntryAddendaCount(t)\n}", "title": "" }, { "docid": "b3e260a22444d7b9be6681d7723cf026", "score": "0.577048", "text": "func (batch *IATBatch) isFieldInclusion() error {\n\tif err := batch.Header.Validate(); err != nil {\n\t\treturn err\n\t}\n\tfor _, entry := range batch.Entries {\n\t\tif err := entry.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Verifies the required Addenda* properties for an IAT entry detail are included\n\t\tif err := batch.addendaFieldInclusion(entry); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Verifies each Addenda* record is valid\n\t\tif err := entry.Addenda10.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda11.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda12.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda13.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda14.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda15.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := entry.Addenda16.Validate(); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Verifies addendumer Addenda17 and Addenda18 records are valid\n\t\tfor _, IATAddenda := range entry.Addendum {\n\t\t\tif err := IATAddenda.Validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\treturn batch.Control.Validate()\n}", "title": "" }, { "docid": "1dfe3ce503519156a65f18848d028c91", "score": "0.5688342", "text": "func testParseADVFileControl(t testing.TB) {\n\tvar line = \"90000010000010000000100053200010000000000000001050000000000000000000000 \"\n\tr := NewReader(strings.NewReader(line))\n\tr.line = line\n\tbatchADV := mockBatchADV(t)\n\tr.File.AddBatch(batchADV)\n\n\terr := r.parseFileControl()\n\tif err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n\trecord := r.File.ADVControl\n\n\tif record.BatchCountField() != \"000001\" {\n\t\tt.Errorf(\"BatchCount Expected '000001' got: %v\", record.BatchCountField())\n\t}\n\tif record.BlockCountField() != \"000001\" {\n\t\tt.Errorf(\"BlockCount Expected '000001' got: %v\", record.BlockCountField())\n\t}\n\tif record.EntryAddendaCountField() != \"00000001\" {\n\t\tt.Errorf(\"EntryAddendaCount Expected '00000001' got: %v\", record.EntryAddendaCountField())\n\t}\n\tif record.EntryHashField() != \"0005320001\" {\n\t\tt.Errorf(\"EntryHash Expected '0005320001' got: %v\", record.EntryHashField())\n\t}\n\tif record.TotalDebitEntryDollarAmountInFileField() != \"00000000000000010500\" {\n\t\tt.Errorf(\"TotalDebitEntryDollarAmountInFile Expected '0000000000000010500' got: %v\", record.TotalDebitEntryDollarAmountInFileField())\n\t}\n\tif record.TotalCreditEntryDollarAmountInFileField() != \"00000000000000000000\" {\n\t\tt.Errorf(\"TotalCreditEntryDollarAmountInFile Expected '00000000000000000000' got: %v\", record.TotalCreditEntryDollarAmountInFileField())\n\t}\n}", "title": "" }, { "docid": "7a9a64673216edd82286ee7c169321ad", "score": "0.55515915", "text": "func (fc *ADVFileControl) Validate() error {\n\tif err := fc.fieldInclusion(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "028c9e1292274e77ed6693f8cf807755", "score": "0.55391955", "text": "func BenchmarkAddenda14FieldInclusionRDFIName(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionRDFIName(b)\n\t}\n}", "title": "" }, { "docid": "3b946eeeb6aaaceb3ce5efd2de933f88", "score": "0.5516717", "text": "func testMockADVFileControl(t testing.TB) {\n\tfc := mockADVFileControl()\n\tif err := fc.Validate(); err != nil {\n\t\tt.Error(\"mockADVFileControl does not validate and will break other tests\")\n\t}\n\tif fc.BatchCount != 1 {\n\t\tt.Error(\"BatchCount dependent default value has changed\")\n\t}\n\tif fc.BlockCount != 1 {\n\t\tt.Error(\"BlockCount dependent default value has changed\")\n\t}\n\tif fc.EntryAddendaCount != 1 {\n\t\tt.Error(\"EntryAddendaCount dependent default value has changed\")\n\t}\n\tif fc.EntryHash != 5320001 {\n\t\tt.Error(\"EntryHash dependent default value has changed\")\n\t}\n}", "title": "" }, { "docid": "194af490e88507f7091e1cc5afa1f937", "score": "0.54668593", "text": "func (clc *CashLetterControl) fieldInclusion() error {\n\tif clc.recordType == \"\" {\n\t\treturn &FieldError{FieldName: \"recordType\",\n\t\t\tValue: clc.recordType,\n\t\t\tMsg: msgFieldInclusion + \", did you use CashLetterControl()?\"}\n\t}\n\tif clc.CashLetterItemsCount == 0 {\n\t\treturn &FieldError{FieldName: \"CashLetterItemsCount\",\n\t\t\tValue: clc.CashLetterItemsCountField(),\n\t\t\tMsg: msgFieldInclusion + \", did you use CashLetterControl()?\"}\n\t}\n\tif clc.CashLetterTotalAmount == 0 {\n\t\treturn &FieldError{FieldName: \"CashLetterTotalAmount\",\n\t\t\tValue: clc.CashLetterTotalAmountField(),\n\t\t\tMsg: msgFieldInclusion + \", did you use CashLetterControl()?\"}\n\t}\n\n\t// optional field - if present, year must be between 1993 and 9999\n\tif date := clc.SettlementDate; !date.IsZero() {\n\t\tif date.Year() < 1993 || date.Year() > 9999 {\n\t\t\treturn &FieldError{FieldName: \"SettlementDate\",\n\t\t\t\tValue: clc.SettlementDateField(), Msg: msgInvalidDate + \": year must be between 1993 and 9999\"}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "188c1aff5bf56e14026d4dd3b9d9f7bc", "score": "0.5419625", "text": "func RunIncludedFieldsAndExtensionsChecks(capInt map[string]interface{}, fhirVersion string) []endpointmanager.IncludedField {\n\tif capInt == nil {\n\t\treturn nil\n\t}\n\n\tvar includedFields []endpointmanager.IncludedField\n\tincludedFields = RunIncludedFieldsChecks(capInt, includedFields, fhirVersion)\n\tincludedFields = RunIncludedExtensionsChecks(capInt, includedFields, fhirVersion)\n\treturn includedFields\n}", "title": "" }, { "docid": "9deceda83b04df96d8616c60a2b968e7", "score": "0.53895134", "text": "func RunIncludedExtensionsChecks(capInt map[string]interface{}, includedFields []endpointmanager.IncludedField, fhirVersion string) []endpointmanager.IncludedField {\n\textensionList := getExtensionsList(fhirVersion)\n\n\t// Get name of extension and create extensionObj with extension name, if the extension exists, and if it is an extension\n\tfor _, extensionPath := range extensionList {\n\t\textensionName := extensionPath[len(extensionPath)-1]\n\t\textensionURL := extensionPath[len(extensionPath)-2]\n\t\t// Check if includedFields already contains this extension\n\t\tindex := includedFieldsContains(includedFields, extensionName)\n\t\tif index != -1 {\n\t\t\t//If includedFields contains extension but Exists is false, check next possible location to see if it exists\n\t\t\tif !includedFields[index].Exists {\n\t\t\t\tincludedFields[index].Exists = checkExtension(capInt, extensionPath, extensionURL)\n\t\t\t} else {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t} else {\n\t\t\textensionObj := endpointmanager.IncludedField{\n\t\t\t\tField: extensionName,\n\t\t\t\tExists: checkExtension(capInt, extensionPath, extensionURL),\n\t\t\t\tExtension: true,\n\t\t\t}\n\t\t\tincludedFields = append(includedFields, extensionObj)\n\t\t}\n\t}\n\n\treturn includedFields\n}", "title": "" }, { "docid": "0d4c32b72be5241b65ed5f80335c4ab2", "score": "0.53864694", "text": "func testAddenda14FieldInclusionRDFIIdentification(t testing.TB) {\n\taddenda14 := mockAddenda14()\n\taddenda14.RDFIIdentification = \"\"\n\terr := addenda14.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "7fdc6b2b4e461721ebd5b7cecfe09902", "score": "0.53403884", "text": "func (ivAnalysis *ImageViewAnalysis) fieldInclusion() error {\n\tif ivAnalysis.recordType == \"\" {\n\t\treturn &FieldError{FieldName: \"recordType\",\n\t\t\tValue: ivAnalysis.recordType,\n\t\t\tMsg: msgFieldInclusion + \", did you use ImageViewAnalysis()?\"}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "902e3443719aba2f08d86a6c46c0f390", "score": "0.5330433", "text": "func isFileIncluded(name string, opts *Options, r *Results) bool {\n\tinc := opts.FileIncludes\n\texc := opts.FileExcludes\n\tif len(exc) == 0 && len(inc) == 0 {\n\t\treturn true\n\t}\n\tif len(inc) > 0 && isMatched(name, inc) {\n\t\tr.IncludedFileCount++\n\t\treturn true\n\t}\n\tif len(exc) > 0 && !isMatched(name, exc) {\n\t\treturn true\n\t}\n\tr.ExcludedFileCount++\n\treturn false\n}", "title": "" }, { "docid": "08934a25ee9e22c7f5e1cfbcd5fe406f", "score": "0.5328112", "text": "func BenchmarkParseADVFileControl(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestParseADVFileControl(b)\n\t}\n}", "title": "" }, { "docid": "a590849ea6fa6c4cff0fe05948c1c66f", "score": "0.53174376", "text": "func (oof *OriginatorOptionF) fieldInclusion() error {\n\treturn nil\n}", "title": "" }, { "docid": "da5f869e5f8553641bd26f5aca7b6d26", "score": "0.52812505", "text": "func TestAddenda14FieldInclusionRDFIIdentification(t *testing.T) {\n\ttestAddenda14FieldInclusionRDFIIdentification(t)\n}", "title": "" }, { "docid": "57d1a52bec242353601dece45684fd4e", "score": "0.5227668", "text": "func testAddenda14FieldInclusionRDFIBranchCountryCode(t testing.TB) {\n\taddenda14 := mockAddenda14()\n\taddenda14.RDFIBranchCountryCode = \"\"\n\terr := addenda14.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "6566fcf5430a6683acd80558f49ead95", "score": "0.5222557", "text": "func TestAddenda02FieldInclusionTypeCode(t *testing.T) {\n\ttestAddenda02FieldInclusionTypeCode(t)\n}", "title": "" }, { "docid": "27b526e232511f0fbd900b8d226d0ce8", "score": "0.5180104", "text": "func (ed *IATEntryDetail) fieldInclusion() error {\n\tif ed.recordType == \"\" {\n\t\treturn fieldError(\"recordType\", ErrConstructor, ed.recordType)\n\t}\n\tif ed.TransactionCode == 0 {\n\t\treturn fieldError(\"TransactionCode\", ErrConstructor, strconv.Itoa(ed.TransactionCode))\n\t}\n\tif ed.RDFIIdentification == \"\" {\n\t\treturn fieldError(\"RDFIIdentification\", ErrConstructor, ed.RDFIIdentificationField())\n\t}\n\tif ed.AddendaRecords == 0 {\n\t\treturn fieldError(\"AddendaRecords\", ErrConstructor, strconv.Itoa(ed.AddendaRecords))\n\t}\n\tif ed.DFIAccountNumber == \"\" {\n\t\treturn fieldError(\"DFIAccountNumber\", ErrConstructor, ed.DFIAccountNumber)\n\t}\n\tif ed.AddendaRecordIndicator == 0 {\n\t\treturn fieldError(\"AddendaRecordIndicator\", ErrConstructor, strconv.Itoa(ed.AddendaRecordIndicator))\n\t}\n\tif ed.TraceNumber == \"\" {\n\t\treturn fieldError(\"TraceNumber\", ErrConstructor, ed.TraceNumberField())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a2978c41b800c7697f1eebd44953f010", "score": "0.51591015", "text": "func (imad *InputMessageAccountabilityData) fieldInclusion() error {\n\tif imad.InputCycleDate == \"\" {\n\t\treturn fieldError(\"InputCycleDate\", ErrFieldRequired, imad.InputCycleDate)\n\t}\n\tif imad.InputSource == \"\" {\n\t\treturn fieldError(\"InputSource\", ErrFieldRequired, imad.InputSource)\n\t}\n\tif imad.InputSequenceNumber == \"\" {\n\t\treturn fieldError(\"InputSequenceNumber\", ErrFieldRequired, imad.InputSequenceNumber)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ec9ab8adc2505ffa2b5975c671cf403", "score": "0.5156685", "text": "func testAddenda14FieldInclusionRDFIName(t testing.TB) {\n\taddenda14 := mockAddenda14()\n\taddenda14.RDFIName = \"\"\n\terr := addenda14.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "f22492b8d9e5c9e151fcb45ba854b8dc", "score": "0.51387995", "text": "func (r *Report)PreProcess(f *fdb.Flight) (bool, []fdb.TrackIntersection) {\n\tr.I[\"[A] PreProcessed\"]++\n\n\tfor _,nottag := range r.NotTags {\n\t\tif f.HasTag(nottag) {\n\t\t\tr.I[fmt.Sprintf(\"[B] Eliminated: had not-tag '%s'\", nottag)]++\n\t\t\treturn false, []fdb.TrackIntersection{}\n\t\t}\n\t}\n\n\tfor _,notwp := range r.NotWaypoints {\n\t\tif f.HasWaypoint(notwp) {\n\t\t\tr.I[fmt.Sprintf(\"[B] Eliminated: had not-waypoint '%s'\", notwp)]++\n\t\t\treturn false, []fdb.TrackIntersection{}\n\t\t}\n\t}\n\n\tif f.HasTag(\"FOIA\") {\n\t\tif !f.HasTrack(\"FOIA\"){\n\t\t\tr.I[fmt.Sprintf(\"[B] Eliminated: FOIA tag, but no FOIA track !\")]++\n\t\t\treturn false, []fdb.TrackIntersection{}\n\t\t}\n\t\tt := f.Tracks[\"FOIA\"]\n\t\tfoiaSrc := (*t)[0].DataSource\n\t\tif allowed,str := r.CanSeeThisFOIASource(foiaSrc); !allowed {\n\t\t\tr.I[str]++\n\t\t\treturn false, []fdb.TrackIntersection{}\n\t\t}\n\t}\n\t\n\t// If restrictions were specified, only match flights that satisfy them\n\tfailed := false\n\tintersections := []fdb.TrackIntersection{}\n\n\tif !r.Options.GRS.IsNil() {\n\t\ttStart := time.Now()\n\t\tsatisfied,outcomes := f.SatisfiesGeoRestrictorSet(r.Options.GRS)\n\t\tr.Debugf(\"---- %s\\nSources: %v\\n\", f.IdentityString(), r.ListPreferredDataSources())\n\t\tr.Debugf(\"--{ GRS }--\\n%s\", r.Options.GRS)\n\t\tr.Debugf(\"--{ Outcome satisfies=%v }--\\n\", satisfied)\n\t\tr.Debugf(\"--{ Debug }--\\n%s\\n\", outcomes.Debug())\n\t\tr.Stats.RecordValue(\"restrictions\", (time.Since(tStart).Nanoseconds()/1000))\n\t\t\n\t\tif satisfied {\n\t\t\tfor _,o := range outcomes.Outcomes {\n\t\t\t\tintersections = append(intersections, o.TrackIntersection)\n\t\t\t}\n\t\t} else {\n\t\t\tr.I[\"[B] Eliminated: did not satisfy \"+outcomes.BlameString(r.Options.GRS)]++\n\t\t\tfailed = true\n\t\t}\n\t}\n\tif failed { return false, intersections }\n\n\tr.I[\"[B] <b>Satisfied geo restrictions</b> \"]++\n\n\tif r.TimeOfDay.IsInitialized() {\n\n\t\t//r.Info(fmt.Sprintf(\"**** ToD %s, %s\\n\", r.TimeOfDay, f))\n\t\ttimes := []time.Time{} // Accumulate interesting timestamps in one place\n\t\t\n\t\tif len(intersections) > 0 {\n\t\t\tfor _,ti := range intersections {\n\t\t\t\ttimes = append(times, ti.Start.TimestampUTC)\n\t\t\t\t//r.Info(fmt.Sprintf(\" * i.s %s\\n\", date.InPdt(ti.Start.TimestampUTC)))\n\t\t\t\tif !ti.IsPointIntersection() {\n\t\t\t\t\ttimes = append(times, ti.End.TimestampUTC)\n\t\t\t\t\t//r.Info(fmt.Sprintf(\" * i.e %s\\n\", date.InPdt(ti.End.TimestampUTC)))\n\t\t\t\t}\n\t\t\t}\n\t\t} else if len(r.Waypoints) > 0 {\n\t\t\tfor _,wpName := range r.Waypoints {\n\t\t\t\tif \tt,exists := f.Waypoints[wpName]; exists {\n\t\t\t\t\t// r.Info(fmt.Sprintf(\" * wp %s (%s)\\n\", date.InPdt(t), wpName))\n\t\t\t\t\ttimes = append(times, t)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tmeetsToD := false\n\t\tfor _,t := range times {\n\t\t\t//tPdt := date.InPdt(t)\n\t\t\t//s,e := r.TimeOfDay.AnchorInsideDay(tPdt)\n\t\t\t//r.Info(fmt.Sprintf(\" ** ToD %s {%s -- %s} %s : %v\\n\", r.TimeOfDay, s,e,\n\t\t\t//\ttPdt, r.TimeOfDay.Contains(tPdt)))\n\n\t\t\tif r.TimeOfDay.Contains(date.InPdt(t)) {\n\t\t\t\tmeetsToD = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\tif meetsToD {\n\t\t\tr.I[\"[Bb] <b>Satisfied TimeOfDay restrictions</b> \"]++\n\t\t} else {\n\t\t\tr.I[\"[Bb] Failed TimeOfDay restrictions \"]++\n\t\t\treturn false, intersections\n\t\t}\n\t}\n\t\n\tdataSrc := \"non-ADSB\"\n\tif f.HasTrack(\"ADSB\") { dataSrc = \"ADSB\" }\n\tr.I[\"[Bz] track source: \"+dataSrc]++\n\t\n\treturn true, intersections\n}", "title": "" }, { "docid": "02299d691e16b6711dbfd94fc3dcbc9d", "score": "0.51173025", "text": "func BenchmarkAddenda14FieldInclusionRDFIIdNumberQualifier(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionRDFIIDNumberQualifier(b)\n\t}\n}", "title": "" }, { "docid": "78bddc9280cb9a8f8d38dd524e0fc281", "score": "0.50822514", "text": "func TestHasField(t *testing.T) {\n\tt.Parallel()\n\tt.Run(\"TestHasFieldWhenStructReturnsFieldPresentWhenPresent\", func(t *testing.T) {\n\t\tassert.True(t, preprocessor.HasField(TestStruct{}, \"FieldA\"))\n\t\tassert.False(t, preprocessor.HasField(TestStruct{}, \"FieldB\"))\n\n\t})\n\n\tt.Run(\"TestHasFieldWhenEmbeddedStructReturnsEmbeddedFieldPresent\", func(t *testing.T) {\n\t\ttype Embedded struct {\n\t\t\tA struct{}\n\t\t}\n\n\t\ttype Embedding struct {\n\t\t\t*Embedded\n\t\t\tB struct{}\n\t\t}\n\t\tassert.True(t, preprocessor.HasField(Embedding{}, \"B\"))\n\t\tassert.True(t, preprocessor.HasField(Embedding{}, \"A\"))\n\t})\n\n\tt.Run(\"TestHasFieldWhenStructPtrReturnsFieldPresentWhenPresent\", func(t *testing.T) {\n\t\tassert.True(t, preprocessor.HasField(&TestStruct{}, \"FieldA\"))\n\t\tassert.False(t, preprocessor.HasField(&TestStruct{}, \"FieldB\"))\n\t})\n\n\tt.Run(\"TestHasFieldWhenGivenAsLowerCaseAndIsCapitalReturnsTrue\", func(t *testing.T) {\n\t\tassert.True(t, preprocessor.HasField(&TestStruct{}, \"fieldA\"))\n\t\tassert.True(t, preprocessor.HasField(&TestStruct{}, \"fielda\"))\n\t\tassert.False(t, preprocessor.HasField(&TestStruct{}, \"fieldB\"))\n\t})\n\n\tt.Run(\"TestHasFieldWhenNilPtrReturnsTrue\", func(t *testing.T) {\n\t\tvar test *TestStruct\n\t\tassert.True(t, preprocessor.HasField(test, \"FieldA\"))\n\t\tassert.False(t, preprocessor.HasField(test, \"FieldB\"))\n\t})\n\n}", "title": "" }, { "docid": "e3bc96f98e7ac00548084546dfa0a4d1", "score": "0.5055355", "text": "func structToFiledsGeneral(structPointer interface{}, isCollect bool, filedsFilter ...string) (fileds []string, values []interface{}) {\n\t//func structToFiledsGeneral(structPointer interface{}, isCollect bool , filedsFilter ...string )([]string, []interface{} ) {\n\ts := reflect.ValueOf(structPointer).Elem().Interface() //for pointer\n\trjs := make(map[string]bool)\n\t//var fileds []string\n\t//var values []interface{}\n\n\tfor _, r := range filedsFilter {\n\t\trjs[r] = true\n\t}\n\t//fmt.Println(rjs)\n\n\t//should run @A if bloc\n\tshouldRunBlock := func(existis bool) bool {\n\t\tswitch {\n\t\tcase isCollect && existis:\n\t\t\treturn true\n\t\tcase isCollect && !existis:\n\t\t\treturn false\n\n\t\t//it is reject list\n\t\tcase !isCollect && existis:\n\t\t\treturn false\n\t\tcase !isCollect && !existis:\n\t\t\treturn true\n\t\t}\n\n\t\treturn false\n\t}\n\t//_ = shouldRunBlock\n\t//_ =s\n\n\tvls, fls := DeepFields(s) //len(fls) == len(valeus)\n\t//fmt.Println(\"Depps: \",vls,fls)\n\tfor i, filed := range fls {\n\t\tif inMap := rjs[filed]; shouldRunBlock(inMap) {\n\t\t\tfileds = append(fileds, fls[i])\n\t\t\tvalues = append(values, vls[i])\n\t\t}\n\t}\n\n\t//fmt.Println(DeepFields(s))\n\n\t//allFileds := make([]string,10)//for embeded\n\n\t//stut := s.Type()\n\t/*\tfor i := 0; i < s.NumField(); i++ {\n\t\tf := s.Field(i)\n\t\tfiled := stut.Field(i).Name\n\t\tif unicode.IsLower(rune(filed[0])) {//will painc for un-exported filds\n\t\t\tcontinue\n\t\t}\n\t\tswitch f.Kind() {\n\t\tcase reflect.Struct:\n\t\t\tfields = append(fields, DeepFields(v.Interface())...)\n\t\tdefault:\n\t\t\tfields = append(fields, v)\n\t\t}\n\t\tallFileds = append(fileds, filed)*/\n\t/*\n\t\tvalue := f.Interface()\n\t\tif reflect\n\t\t//if filed != \"Id\" {\n\t\t//@A\n\t\tif inMap := rjs[filed]; shouldRunBlock(inMap) {\n\t\t\tfileds = append(fileds, filed)\n\t\t\tvalues = append(values, value)\n\t\t} else {\n\t\t\t//id = value.(int) //only used for update\n\t\t}*/\n\t//}\n\n\t//fmt.Println(fileds)\n\t//fmt.Println(values)\n\treturn //fileds, values\n}", "title": "" }, { "docid": "b06e223b0946376f4be135e791ab8970", "score": "0.5047743", "text": "func (p *Parser) parseFieldList(op opcode, args []interface{}, maxReadOffset uint32) bool {\n\tvar (\n\t\t// for fieldUnit, name0 is the region name and name1 is not used;\n\t\t// for indexField,\n\t\tname0, name1 string\n\t\tflags uint64\n\n\t\tok bool\n\t\tbitWidth uint32\n\t\tcurBitOffset uint32\n\t\taccessAttrib FieldAccessAttrib\n\t\taccessByteCount uint8\n\t\tunitName string\n\t)\n\n\tswitch op {\n\tcase opField: // Field := PkgLength Region AccessFlags FieldList\n\t\tif len(args) != 2 {\n\t\t\tkfmt.Fprintf(p.errWriter, \"[table: %s, offset: %d, opcode 0x%2x] invalid arg count: %d\\n\", p.tableName, p.r.Offset(), uint32(op), len(args))\n\t\t\treturn false\n\t\t}\n\n\t\tname0, ok = args[0].(string)\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\n\t\tflags, ok = args[1].(uint64)\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\tcase opIndexField: // Field := PkgLength IndexFieldName DataFieldName AccessFlags FieldList\n\t\tif len(args) != 3 {\n\t\t\tkfmt.Fprintf(p.errWriter, \"[table: %s, offset: %d, opcode 0x%2x] invalid arg count: %d\\n\", p.tableName, p.r.Offset(), uint32(op), len(args))\n\t\t\treturn false\n\t\t}\n\n\t\tname0, ok = args[0].(string)\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\n\t\tname1, ok = args[1].(string)\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\n\t\tflags, ok = args[2].(uint64)\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// Decode flags\n\taccessType := FieldAccessType(flags & 0xf) // access type; bits[0:3]\n\tlock := (flags>>4)&0x1 == 0x1 // lock; bit 4\n\tupdateRule := FieldUpdateRule((flags >> 5) & 0x3) // update rule; bits[5:6]\n\n\tvar (\n\t\tconnectionName string\n\t\tresolvedConnection Entity\n\t)\n\n\tfor p.r.Offset() < maxReadOffset {\n\t\tnext, err := p.r.ReadByte()\n\t\tif err != nil {\n\t\t\treturn false\n\t\t}\n\n\t\tswitch next {\n\t\tcase 0x00: // ReservedField; generated by the Offset() command\n\t\t\tbitWidth, ok = p.parsePkgLength()\n\t\t\tif !ok {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tcurBitOffset += bitWidth\n\t\t\tcontinue\n\t\tcase 0x1: // AccessField; set access attributes for following fields\n\t\t\tnext, err := p.r.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\taccessType = FieldAccessType(next & 0xf) // access type; bits[0:3]\n\n\t\t\tattrib, err := p.r.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\t// To specify AccessAttribBytes, RawBytes and RawProcessBytes\n\t\t\t// the ASL compiler will emit an ExtendedAccessField opcode.\n\t\t\taccessByteCount = 0\n\t\t\taccessAttrib = FieldAccessAttrib(attrib)\n\n\t\t\tcontinue\n\t\tcase 0x2: // ConnectField => <0x2> NameString> | <0x02> TermObj => Buffer\n\t\t\tcurOffset := p.r.Offset()\n\t\t\tif connectionName, ok = p.parseNameString(); !ok {\n\t\t\t\t// Rewind and try parsing it as an object\n\t\t\t\tp.r.SetOffset(curOffset)\n\t\t\t\tif resolvedConnection, ok = p.parseArgObj(); !ok {\n\t\t\t\t\treturn false\n\t\t\t\t}\n\t\t\t}\n\t\tcase 0x3: // ExtendedAccessField => <0x03> AccessType ExtendedAccessAttrib AccessLength\n\t\t\tnext, err := p.r.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\taccessType = FieldAccessType(next & 0xf) // access type; bits[0:3]\n\n\t\t\textAccessAttrib, err := p.r.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\taccessByteCount, err = p.r.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tswitch extAccessAttrib {\n\t\t\tcase 0x0b:\n\t\t\t\taccessAttrib = FieldAccessAttribBytes\n\t\t\tcase 0xe:\n\t\t\t\taccessAttrib = FieldAccessAttribRawBytes\n\t\t\tcase 0x0f:\n\t\t\t\taccessAttrib = FieldAccessAttribRawProcessBytes\n\t\t\t}\n\t\tdefault: // NamedField\n\t\t\t_ = p.r.UnreadByte()\n\t\t\tif unitName, ok = p.parseNameString(); !ok {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\tbitWidth, ok = p.parsePkgLength()\n\t\t\tif !ok {\n\t\t\t\treturn false\n\t\t\t}\n\n\t\t\t// According to the spec, the field elements are should\n\t\t\t// be visible at the same scope as the Field/IndexField\n\t\t\tswitch op {\n\t\t\tcase opField:\n\t\t\t\tp.scopeCurrent().Append(&fieldUnitEntity{\n\t\t\t\t\tfieldEntity: fieldEntity{\n\t\t\t\t\t\tnamedEntity: namedEntity{\n\t\t\t\t\t\t\ttableHandle: p.tableHandle,\n\t\t\t\t\t\t\top: op,\n\t\t\t\t\t\t\tname: unitName,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tbitOffset: curBitOffset,\n\t\t\t\t\t\tbitWidth: bitWidth,\n\t\t\t\t\t\tlock: lock,\n\t\t\t\t\t\tupdateRule: updateRule,\n\t\t\t\t\t\taccessType: accessType,\n\t\t\t\t\t\taccessAttrib: accessAttrib,\n\t\t\t\t\t\tbyteCount: accessByteCount,\n\t\t\t\t\t},\n\t\t\t\t\tconnectionName: connectionName,\n\t\t\t\t\tresolvedConnection: resolvedConnection,\n\t\t\t\t\tregionName: name0,\n\t\t\t\t})\n\t\t\tcase opIndexField:\n\t\t\t\tp.scopeCurrent().Append(&indexFieldEntity{\n\t\t\t\t\tfieldEntity: fieldEntity{\n\t\t\t\t\t\tnamedEntity: namedEntity{\n\t\t\t\t\t\t\ttableHandle: p.tableHandle,\n\t\t\t\t\t\t\top: op,\n\t\t\t\t\t\t\tname: unitName,\n\t\t\t\t\t\t},\n\t\t\t\t\t\tbitOffset: curBitOffset,\n\t\t\t\t\t\tbitWidth: bitWidth,\n\t\t\t\t\t\tlock: lock,\n\t\t\t\t\t\tupdateRule: updateRule,\n\t\t\t\t\t\taccessType: accessType,\n\t\t\t\t\t\taccessAttrib: accessAttrib,\n\t\t\t\t\t\tbyteCount: accessByteCount,\n\t\t\t\t\t},\n\t\t\t\t\tconnectionName: connectionName,\n\t\t\t\t\tresolvedConnection: resolvedConnection,\n\t\t\t\t\tindexRegName: name0,\n\t\t\t\t\tdataRegName: name1,\n\t\t\t\t})\n\t\t\t}\n\n\t\t\tcurBitOffset += bitWidth\n\n\t\t}\n\n\t}\n\n\treturn ok && p.r.Offset() == maxReadOffset\n}", "title": "" }, { "docid": "787a26ea011f5d9f7bca8a6d4717ac7e", "score": "0.5031177", "text": "func TestAddCounters(t *testing.T) {\n\tt.Run(\"simple code\", func(t *testing.T) {\n\t\tfset := token.NewFileSet()\n\t\tastFile, err := parser.ParseFile(fset, \"\", code, parser.ParseComments)\n\n\t\tassert.Equal(t, nil, err)\n\n\t\tvisitor := NewVisitorPtr(fset)\n\t\tast.Walk(visitor, astFile)\n\n\t\tvisitor.AddImportDecl(astFile)\n\n\t\tout := AstToBytes(astFile, fset)\n\n\t\tlines := strings.Fields(out.String())\n\t\tassert.Equal(t, lines[25], \"__tidb_go_fuzz_dep.GetTraceTable().AddCount(0,\")\n\t})\n\n\tt.Run(\"more cases\", func(t *testing.T) {\n\n\t\tfset := token.NewFileSet()\n\n\t\tt.Log(\"parsing\")\n\n\t\tastFile, err := parser.ParseFile(fset, \"\", complexCode, parser.ParseComments)\n\n\t\tassert.Equal(t, nil, err)\n\n\t\tvisitor := NewVisitorPtr(fset)\n\t\tast.Walk(visitor, astFile)\n\n\t\tvisitor.AddImportDecl(astFile)\n\n\t\t_ := AstToBytes(astFile, fset)\n\t\t// need to check manually\n\n\t})\n}", "title": "" }, { "docid": "9ad6c500ec6e0c994eba984795708462", "score": "0.50265163", "text": "func testADVFCString(t testing.TB) {\n\tvar line = \"90000010000010000000100053200010000000000000001050000000000000000000000 \"\n\tr := NewReader(strings.NewReader(line))\n\tr.line = line\n\tbatchADV := mockBatchADV(t)\n\tr.File.AddBatch(batchADV)\n\n\terr := r.parseFileControl()\n\tif err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n\trecord := r.File.ADVControl\n\tif record.String() != line {\n\t\tt.Errorf(\"\\nStrings do not match %s\\n %s\", line, record.String())\n\t}\n}", "title": "" }, { "docid": "f8b1123d8cda9d595ae46c8bbceab93c", "score": "0.5015737", "text": "func TestAddenda14FieldInclusionTypeCode(t *testing.T) {\n\ttestAddenda14FieldInclusionTypeCode(t)\n}", "title": "" }, { "docid": "5ab3c6c1d9a80a56096f9b4d1c4ed170", "score": "0.5008927", "text": "func BenchmarkAddenda14FieldInclusionRDFIBranchCountryCode(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionRDFIBranchCountryCode(b)\n\t}\n}", "title": "" }, { "docid": "d5e2496e8c73122ac73fa1b6529aab1f", "score": "0.5001597", "text": "func testAddenda14FieldInclusionTypeCode(t testing.TB) {\n\taddenda14 := mockAddenda14()\n\taddenda14.TypeCode = \"\"\n\terr := addenda14.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "f05d47f9a9e59d3a2a7a05e5a97ff134", "score": "0.497303", "text": "func (li *LocalInstrument) fieldInclusion() error {\n\tif li.LocalInstrumentCode != ProprietaryLocalInstrumentCode && li.ProprietaryCode != \"\" {\n\t\treturn fieldError(\"ProprietaryCode\", ErrInvalidProperty, li.ProprietaryCode)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "300244ce982af63b921780e907d67ce1", "score": "0.49336463", "text": "func (mfs *MemFS) isIncluded(sysPath string, mode os.FileMode) bool {\n\tif len(mfs.incRE) == 0 && len(mfs.excRE) == 0 {\n\t\treturn true\n\t}\n\tfor _, re := range mfs.excRE {\n\t\tif re.MatchString(sysPath) {\n\t\t\treturn false\n\t\t}\n\t}\n\tif len(mfs.incRE) > 0 {\n\t\tfor _, re := range mfs.incRE {\n\t\t\tif re.MatchString(sysPath) {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn mode.IsDir()\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "652be8933d6e9a43d0f354e2b94c8cec", "score": "0.492312", "text": "func testAddenda02FieldInclusionTypeCode(t testing.TB) {\n\taddenda02 := mockAddenda02()\n\taddenda02.TypeCode = \"\"\n\terr := addenda02.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "c3539f059b41a8f6f301acef16733b7a", "score": "0.48691994", "text": "func includedFieldsContains(includedFields []endpointmanager.IncludedField, extensionName string) int {\n\tfor index, fieldObj := range includedFields {\n\t\tif fieldObj.Field == extensionName {\n\t\t\treturn index\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "ad91ed2330be2ec3aafee6b892fce90a", "score": "0.4849812", "text": "func TestParseADVFileControl(t *testing.T) {\n\ttestParseADVFileControl(t)\n}", "title": "" }, { "docid": "617499dedb2fdc5a337f2820c0e42452", "score": "0.48376775", "text": "func BenchmarkMockADVFileControl(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestMockADVFileControl(b)\n\t}\n}", "title": "" }, { "docid": "538fe1a1b0c3b2dd94f60109780dc86b", "score": "0.48357835", "text": "func (fm *FieldModelInt8) Verify() bool { return true }", "title": "" }, { "docid": "34e126253d8b0925fb489c2899530e49", "score": "0.4828902", "text": "func TestInvalidADVFCParse(t *testing.T) {\n\tvar line = \"9000001000001000000010005320001000000000000000105\"\n\tr := NewReader(strings.NewReader(line))\n\tr.line = line\n\tbatchADV := mockBatchADV(t)\n\tr.File.AddBatch(batchADV)\n\n\terr := r.parseFileControl()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "f42112694d7133c32e6bf4ae673a6b42", "score": "0.48115915", "text": "func SfvVerify(sfv_filename string) (errors []string) {\n\tstart := time.Now()\n\tvar total_bytes int64 = 0\n\n\tvar sfv sfvTable\n\tsfv.read(sfv_filename)\n\n\tif len(sfv.entries) == 0 {\n\t\telog.Println(\"No entries captured from SFV file; done.\")\n\t\treturn\n\t}\n\n\tb := NewCrc32Buffer(*flagCrcBufferSize)\n\tfor _, entry := range sfv.entries {\n\t\tconst max_filename_len = 68 // want full line to be < 80\n\t\tfmt.Print(pretty.CollapseMiddle(entry.filename, max_filename_len), \": \")\n\t\tchecksum, ok := b.ComputeFileChecksum(entry.filename)\n\t\tif !ok {\n\t\t\terrors = append(errors,\n\t\t\t\tfmt.Sprintf(\"Error accessing %s\", entry.filename))\n\t\t\tcontinue\n\t\t}\n\t\tfi, err := os.Stat(entry.filename)\n\t\tif err != nil {\n\t\t\telog.Fatal(err)\n\t\t}\n\t\ttotal_bytes += fi.Size()\n\t\tif checksum != entry.checksum {\n\t\t\terr := fmt.Sprintf(\"CRC mismatch for %s (expected: 0x%08X; was: 0x%08X)\",\n\t\t\t\tentry.filename, entry.checksum, checksum)\n\t\t\t// Print error on separate line.\n\t\t\tfmt.Println(\"*****\")\n\t\t\tfmt.Println(\" \", err)\n\t\t\terrors = append(errors, err)\n\t\t\tcontinue\n\t\t}\n\t\tfmt.Println(\"CRC OK\")\n\t}\n\tduration := time.Now().Sub(start)\n\telog.Println(\"Time elapsed:\", duration)\n\telog.Printf(\"Average speed: %5.1f MB/s\\n\",\n\t\tfloat64(total_bytes) / 1024 / 1024 / duration.Seconds())\n\treturn\n}", "title": "" }, { "docid": "0274291786f8701b94334ea006bd4caf", "score": "0.4805863", "text": "func TestAddenda14FieldInclusionRDFIName(t *testing.T) {\n\ttestAddenda14FieldInclusionRDFIName(t)\n}", "title": "" }, { "docid": "d5c7a5cbb9656fd3e05097f21fe75a15", "score": "0.4804883", "text": "func TestAddFileFields(t *testing.T) {\n\tt.Parallel()\n\toperator, logReceived, tempDir := newTestFileOperator(t, func(cfg *InputConfig) {\n\t\tcfg.IncludeFileName = true\n\t\tcfg.IncludeFilePath = true\n\t}, nil)\n\n\t// Create a file, then start\n\ttemp := openTemp(t, tempDir)\n\twriteString(t, temp, \"testlog\\n\")\n\n\trequire.NoError(t, operator.Start(testutil.NewMockPersister(\"test\")))\n\tdefer operator.Stop()\n\n\te := waitForOne(t, logReceived)\n\trequire.Equal(t, filepath.Base(temp.Name()), e.Attributes[\"log.file.name\"])\n\trequire.Equal(t, temp.Name(), e.Attributes[\"log.file.path\"])\n}", "title": "" }, { "docid": "1cd5c35e85f1048cb17ae3c1a6a04030", "score": "0.47988445", "text": "func (z *Field) fieldsNotEmpty(isempty []bool) uint32 {\n\tif len(isempty) == 0 {\n\t\treturn 11\n\t}\n\tvar fieldsInUse uint32 = 11\n\tisempty[2] = (len(z.FieldTagName) == 0) // string, omitempty\n\tif isempty[2] {\n\t\tfieldsInUse--\n\t}\n\tisempty[3] = (len(z.FieldTypeStr) == 0) // string, omitempty\n\tif isempty[3] {\n\t\tfieldsInUse--\n\t}\n\tisempty[4] = (z.FieldCategory == 0) // number, omitempty\n\tif isempty[4] {\n\t\tfieldsInUse--\n\t}\n\tisempty[5] = (z.FieldPrimitive == 0) // number, omitempty\n\tif isempty[5] {\n\t\tfieldsInUse--\n\t}\n\tisempty[6] = (z.FieldFullType == nil) // pointer, omitempty\n\tif isempty[6] {\n\t\tfieldsInUse--\n\t}\n\tisempty[7] = (!z.OmitEmpty) // bool, omitempty\n\tif isempty[7] {\n\t\tfieldsInUse--\n\t}\n\tisempty[8] = (!z.Skip) // bool, omitempty\n\tif isempty[8] {\n\t\tfieldsInUse--\n\t}\n\tisempty[9] = (!z.Deprecated) // bool, omitempty\n\tif isempty[9] {\n\t\tfieldsInUse--\n\t}\n\tisempty[10] = (!z.ShowZero) // bool, omitempty\n\tif isempty[10] {\n\t\tfieldsInUse--\n\t}\n\n\treturn fieldsInUse\n}", "title": "" }, { "docid": "bd45a604174a9d3cde7ffe4d1935a70d", "score": "0.4777488", "text": "func (c *checker) checkFieldList(fields []*ast.Field) error {\n\tvar dups []ast.Node\n\tfieldSet := make(map[string]*ast.Field)\n\tfor _, field := range fields {\n\t\tif field.Name == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tdupField, ok := fieldSet[field.Name.Text]\n\t\tif ok {\n\t\t\tif len(dups) == 0 {\n\t\t\t\tdups = append(dups, dupField.Name)\n\t\t\t}\n\t\t\tdups = append(dups, field.Name)\n\t\t\tcontinue\n\t\t}\n\n\t\tfieldSet[field.Name.Text] = field\n\t}\n\treturn errdefs.WithDuplicates(dups)\n}", "title": "" }, { "docid": "8020e3493c40de05e28792fea88657ab", "score": "0.4767519", "text": "func (e *goof) IncludeFieldsInFormat(enable bool) {\n\te.includeFieldsInFormat = enable\n}", "title": "" }, { "docid": "cfd71bf46b25a324404977ab1f77046b", "score": "0.47606418", "text": "func main() {\n\tfn := \"input/infile05\"\n\tniceCount := 0\n\n\tlines := fileToArray(fn)\n\tfor _, line := range lines {\n\t\tif parseLine(line) {\n\t\t\tniceCount += 1\n\t\t}\n\t}\n\n\tfmt.Printf(\"Nice count: %v\\n\", niceCount)\n}", "title": "" }, { "docid": "12b722867297e8236b3e0450c840d945", "score": "0.47221062", "text": "func BenchmarkAddenda14FieldInclusionEntryDetailSequenceNumber(b *testing.B) {\n\tb.ReportAllocs()\n\tfor i := 0; i < b.N; i++ {\n\t\ttestAddenda14FieldInclusionEntryDetailSequenceNumber(b)\n\t}\n}", "title": "" }, { "docid": "84fd5629629b9deb3f8caedcd95bc451", "score": "0.47100613", "text": "func checkDocumented(t *testing.T, data []common.MapStr, omitFields []string) error {\n\tfieldsData, err := asset.GetFields(\"metricbeat\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfields, err := mapping.LoadFields(fieldsData)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdocumentedFields := fields.GetKeys()\n\tkeys := map[string]interface{}{}\n\n\tfor _, k := range documentedFields {\n\t\tkeys[k] = struct{}{}\n\t}\n\n\tfor _, d := range data {\n\t\tflat := d.Flatten()\n\t\tif err := documentedFieldCheck(flat, keys, omitFields); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ceb7b49bfca78c2fe7add66900ec3323", "score": "0.46845645", "text": "func TestAddenda14FieldInclusionRDFIBranchCountryCode(t *testing.T) {\n\ttestAddenda14FieldInclusionRDFIBranchCountryCode(t)\n}", "title": "" }, { "docid": "5c084227514642637e8d8df5d964ea22", "score": "0.46670836", "text": "func (l *Loader) WalkFields(fn func(f Field) bool) {\n\tif !l.isBuilt {\n\t\tpanic(\"aconfig: you must run Build method before using the loader\")\n\t}\n\tfor _, f := range l.fields {\n\t\tif !fn(f) {\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "37169b7b6d3f1b0016b124aded66ba31", "score": "0.46449676", "text": "func TestAddenda14FieldInclusionRDFIIdNumberQualifier(t *testing.T) {\n\ttestAddenda14FieldInclusionRDFIIDNumberQualifier(t)\n}", "title": "" }, { "docid": "2014f3bd368d297ef621acb416081ca1", "score": "0.46399873", "text": "func TestValidFileExtractor(t *testing.T) {\n\tassert := assert.New(t)\n\topts := NewFileExtractOptions()\n\topts.SetFilename(\"pirata-fr23_tsg\")\n\tassert.Equal(opts.Filename(), \"pirata-fr23_tsg\")\n\topts.SetVarsList(\"LATITUDE,3,float64,LONGITUDE,4,float64\")\n\tassert.Equal(opts.VarsList(), map[string]Types{\"LATITUDE\": {column: 3, types: \"float64\"}, \"LONGITUDE\": {column: 4, types: \"float64\"}})\n\tassert.Equal(opts.hdr, []string{\"LATITUDE\", \"LONGITUDE\"})\n\tassert.Len(opts.hdr, 2)\n\topts.SetSkipLine(2)\n\tassert.Equal(opts.skipLine, 2)\n}", "title": "" }, { "docid": "2b1192e1a824c22b3653f6ceadab5184", "score": "0.4632987", "text": "func include(vc []byte, c byte) bool {\n\treturn index(vc, c) >= 0\n}", "title": "" }, { "docid": "9bbfe5432938f1792d732bb78e6c2b4c", "score": "0.4625835", "text": "func TestAddInfFields(t *testing.T) {\n\tinf := math.Inf(1)\n\tninf := math.Inf(-1)\n\n\ta := accumulator{}\n\tnow := time.Now()\n\ta.metrics = make(chan telegraf.Metric, 10)\n\tdefer close(a.metrics)\n\ta.inputConfig = &internal_models.InputConfig{}\n\n\tfields := map[string]interface{}{\n\t\t\"usage\": inf,\n\t\t\"nusage\": ninf,\n\t}\n\ta.AddFields(\"acctest\", fields, map[string]string{})\n\ta.AddFields(\"acctest\", fields, map[string]string{\"acc\": \"test\"})\n\ta.AddFields(\"acctest\", fields, map[string]string{\"acc\": \"test\"}, now)\n\n\tassert.Len(t, a.metrics, 0)\n\n\t// test that non-inf fields are kept and not dropped\n\tfields[\"notinf\"] = float64(100)\n\ta.AddFields(\"acctest\", fields, map[string]string{})\n\ttestm := <-a.metrics\n\tactual := testm.String()\n\tassert.Contains(t, actual, \"acctest notinf=100\")\n}", "title": "" }, { "docid": "24c4848af42c298d4c41d6e53d2bcaf3", "score": "0.4622862", "text": "func TestSanity(t *testing.T) {\n\tvar x FieldElement\n\tvar x2, x2sq FieldElement\n\t// var x2Go, x2sqGo FieldElement\n\n\tx = [5]uint64{1, 1, 1, 1, 1}\n\tFeMul(&x2, &x, &x)\n\t// FeMulGo(&x2Go, &x, &x)\n\tFeSquare(&x2sq, &x)\n\t// FeSquareGo(&x2sqGo, &x)\n\n\t// if !vartimeEqual(x2, x2Go) || !vartimeEqual(x2sq, x2sqGo) || !vartimeEqual(x2, x2sq) {\n\t// \tt.Fatalf(\"all ones failed\\nmul.s: %d\\nmul.g: %d\\nsqr.s: %d\\nsqr.g: %d\\n\", x2, x2Go, x2sq, x2sqGo)\n\t// }\n\n\tif !vartimeEqual(x2, x2sq) {\n\t\tt.Fatalf(\"all ones failed\\nmul: %x\\nsqr: %x\\n\", x2, x2sq)\n\t}\n\n\tvar bytes [32]byte\n\n\t_, err := io.ReadFull(rand.Reader, bytes[:])\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tFeFromBytes(&x, &bytes)\n\n\tFeMul(&x2, &x, &x)\n\t// FeMulGo(&x2Go, &x, &x)\n\tFeSquare(&x2sq, &x)\n\t// FeSquareGo(&x2sqGo, &x)\n\n\t// if !vartimeEqual(x2, x2Go) || !vartimeEqual(x2sq, x2sqGo) || !vartimeEqual(x2, x2sq) {\n\t// \tt.Fatalf(\"random field element failed\\nfe: %x\\n\\nmul.s: %x\\nmul.g: %x\\nsqr.s: %x\\nsqr.g: %x\\n\", x, x2, x2Go, x2sq, x2sqGo)\n\t// }\n\n\tif !vartimeEqual(x2, x2sq) {\n\t\tt.Fatalf(\"all ones failed\\nmul: %x\\nsqr: %x\\n\", x2, x2sq)\n\t}\n}", "title": "" }, { "docid": "4c324a3d1249c56a198cb5ddab556e64", "score": "0.46226713", "text": "func calculateAllocationFileOptions(initial uint16, fop *FileOptionsParameters) (bool, uint16) {\n\tif fop == nil {\n\t\treturn false, initial\n\t}\n\n\tmask := initial\n\n\tif fop.ForbidUpload.Changed {\n\t\tmask = updateMaskBit(mask, 0, !fop.ForbidUpload.Value)\n\t}\n\n\tif fop.ForbidDelete.Changed {\n\t\tmask = updateMaskBit(mask, 1, !fop.ForbidDelete.Value)\n\t}\n\n\tif fop.ForbidUpdate.Changed {\n\t\tmask = updateMaskBit(mask, 2, !fop.ForbidUpdate.Value)\n\t}\n\n\tif fop.ForbidMove.Changed {\n\t\tmask = updateMaskBit(mask, 3, !fop.ForbidMove.Value)\n\t}\n\n\tif fop.ForbidCopy.Changed {\n\t\tmask = updateMaskBit(mask, 4, !fop.ForbidCopy.Value)\n\t}\n\n\tif fop.ForbidRename.Changed {\n\t\tmask = updateMaskBit(mask, 5, !fop.ForbidRename.Value)\n\t}\n\n\treturn mask != initial, mask\n}", "title": "" }, { "docid": "ee636f94f5f0f54c87ffadeb0c38e988", "score": "0.46178564", "text": "func matchfield(f string) bool {\n\tfor _, tag := range strings.Split(f, \",\") {\n\t\tif !matchtag(tag) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "81b2f5cd99def3f301b1c7e35cc3242b", "score": "0.46168622", "text": "func xTestPatternFields(t *testing.T) {\n\t// gob.Register((*core.Text)(nil))\n\t// gob.Register((*debug.MatchNumber)(nil))\n\n\t// db := newQnaDB(t, testdb.Memory)\n\t// defer db.Close()\n\t// if e := tables.CreateModel(db); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if e := tables.CreateRun(db); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if e := tables.CreateRunViews(db); e != nil {\n\t// \tt.Fatal(e)\n\t// }\n\t// m := assembly.NewAssembler(db)\n\t// if e := m.WritePat(\"pat\", \"param\", \"text_eval\", 1); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if e := m.WriteStart(\"pat\", \"param\", \"default\"); e != nil {\n\t// \tt.Fatal(e)\n\t// }\n\t// //\n\t// run := NewRuntime(db)\n\t// if p, e := run.GetField(\"pat\", \"param\"); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if v, e := p.GetText(run); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if v != \"default\" {\n\t// \tt.Fatal(\"mismatch\", v)\n\t// } else /*if field, e := run.GetFieldByIndex(\"pat\", 1); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if field != \"param\" {\n\t// \tt.Fatal(e)\n\t// } else */if pairs := run.pairs; len(pairs) != 3 {\n\t// \tt.Fatal(\"unexpected cached values\", pairs, len(pairs))\n\t// } else if val, ok := pairs[keyType{\"pat\", \"param\"}]; !ok {\n\t// \tt.Fatal(\"missing cached default; have\", val)\n\t// } else if str, e := val.GetText(run); e != nil {\n\t// \tt.Fatal(e)\n\t// } else if str != \"default\" {\n\t// \tt.Fatal(\"expected cached default; have\", val)\n\t// } /*else if field := pairs[keyType{\"pat\", \"$1\"}]; field != \"param\" {\n\t// \tt.Fatal(\"expected cached param name; have\", field)\n\t// }*/\n\t// FIX -- test pattern prep ( what was GetFieldByIndex )\n}", "title": "" }, { "docid": "ed5bc4b26b20d7454a9f76785a0ac31f", "score": "0.4614859", "text": "func buildRuleValidateOverlappingCsvFiles(ctx android.BuilderContext, name string, desc string, monolithicFilePath android.WritablePath, modularFilePaths android.Paths) android.WritablePath {\n\t// The file which is used to record that the flags file is valid.\n\tvalidFile := pathForValidation(ctx, monolithicFilePath)\n\n\t// Create a rule to validate the output from the following rule.\n\trule := android.NewRuleBuilder(pctx, ctx)\n\trule.Command().\n\t\tBuiltTool(\"verify_overlaps\").\n\t\tInput(monolithicFilePath).\n\t\tInputs(modularFilePaths).\n\t\t// If validation passes then update the file that records that.\n\t\tText(\"&& touch\").Output(validFile)\n\trule.Build(name+\"Validation\", desc+\" validation\")\n\n\treturn validFile\n}", "title": "" }, { "docid": "7a598ae3d459b5d90146f53d3e3b563a", "score": "0.46077317", "text": "func (fm *FinalModelStructNested) VerifyFields() int {\n fbeCurrentOffset := 0\n fbeFieldSize := 0\n\n\n fm.FinalModelStructOptional.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.FinalModelStructOptional.VerifyFields(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1000.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1000.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1001.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1001.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1002.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1002.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1003.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1003.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1004.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1004.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1005.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1005.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1006.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1006.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1007.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1007.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1008.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1008.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1009.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1009.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1010.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1010.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n fm.F1011.SetFBEOffset(fbeCurrentOffset)\n if fbeFieldSize = fm.F1011.Verify(); fbeFieldSize == fbe.MaxInt {\n return fbe.MaxInt\n }\n fbeCurrentOffset += fbeFieldSize\n\n return fbeCurrentOffset\n}", "title": "" }, { "docid": "1d154ee1899b4096c12533a5033851e7", "score": "0.46007773", "text": "func checkInclusion(s1 string, s2 string) bool {\n\tif len(s1) > len(s2) {\n\t\treturn false\n\t}\n\tif len(s1) == 0 || len(s2) == 0 {\n\t\treturn false\n\t}\n\n\tmapping := make(map[byte]int, 0)\n\tvar i int\n\n\tfor _, b := range s1 {\n\t\tmapping[byte(b)] += 1\n\t}\n\n\tfor i = 0; i < len(s1); i++ {\n\t\tif _, ok := mapping[s2[i]]; ok {\n\t\t\tmapping[s2[i]] -= 1\n\t\t}\n\t}\n\tif isSolution(mapping) {\n\t\treturn true\n\t}\n\n\tfor ; i < len(s2); i++ {\n\t\tif _, ok := mapping[s2[i]]; ok {\n\t\t\tmapping[s2[i]] -= 1\n\t\t}\n\t\tif _, ok := mapping[s2[i-len(s1)]]; ok {\n\t\t\tfmt.Printf(\"set: i:%v %c -1\\n\",i, s2[i-len(s1)])\n\t\t\tmapping[s2[i-len(s1)]] += 1\n\t\t}\n\t\tif isSolution(mapping) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "67506baff9d4c181d845f1b9fd25f912", "score": "0.45921162", "text": "func testAddenda14FieldInclusionRDFIIDNumberQualifier(t testing.TB) {\n\taddenda14 := mockAddenda14()\n\taddenda14.RDFIIDNumberQualifier = \"\"\n\terr := addenda14.Validate()\n\tif !base.Match(err, ErrConstructor) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "278837d376e1b08b312c8a5afac70542", "score": "0.4576581", "text": "func (p *ImportWrapper) fileValidation(filePaths []string) (bool, error) {\n\t// use this map to check duplicate file name(only for numpy file)\n\tfileNames := make(map[string]struct{})\n\n\ttotalSize := int64(0)\n\trowBased := false\n\tfor i := 0; i < len(filePaths); i++ {\n\t\tfilePath := filePaths[i]\n\t\tname, fileType := GetFileNameAndExt(filePath)\n\n\t\t// only allow json file or numpy file\n\t\tif fileType != JSONFileExt && fileType != NumpyFileExt {\n\t\t\tlog.Error(\"import wrapper: unsupported file type\", zap.String(\"filePath\", filePath))\n\t\t\treturn false, fmt.Errorf(\"unsupported file type: '%s'\", filePath)\n\t\t}\n\n\t\t// we use the first file to determine row-based or column-based\n\t\tif i == 0 && fileType == JSONFileExt {\n\t\t\trowBased = true\n\t\t}\n\n\t\t// check file type\n\t\t// row-based only support json type, column-based only support numpy type\n\t\tif rowBased {\n\t\t\tif fileType != JSONFileExt {\n\t\t\t\tlog.Error(\"import wrapper: unsupported file type for row-based mode\", zap.String(\"filePath\", filePath))\n\t\t\t\treturn rowBased, fmt.Errorf(\"unsupported file type for row-based mode: '%s'\", filePath)\n\t\t\t}\n\t\t} else {\n\t\t\tif fileType != NumpyFileExt {\n\t\t\t\tlog.Error(\"import wrapper: unsupported file type for column-based mode\", zap.String(\"filePath\", filePath))\n\t\t\t\treturn rowBased, fmt.Errorf(\"unsupported file type for column-based mode: '%s'\", filePath)\n\t\t\t}\n\t\t}\n\n\t\t// check dupliate file\n\t\t_, ok := fileNames[name]\n\t\tif ok {\n\t\t\tlog.Error(\"import wrapper: duplicate file name\", zap.String(\"filePath\", filePath))\n\t\t\treturn rowBased, fmt.Errorf(\"duplicate file: '%s'\", filePath)\n\t\t}\n\t\tfileNames[name] = struct{}{}\n\n\t\t// check file size, single file size cannot exceed MaxFileSize\n\t\tsize, err := p.chunkManager.Size(p.ctx, filePath)\n\t\tif err != nil {\n\t\t\tlog.Error(\"import wrapper: failed to get file size\", zap.String(\"filePath\", filePath), zap.Error(err))\n\t\t\treturn rowBased, fmt.Errorf(\"failed to get file size of '%s', error:%w\", filePath, err)\n\t\t}\n\n\t\t// empty file\n\t\tif size == 0 {\n\t\t\tlog.Error(\"import wrapper: file size is zero\", zap.String(\"filePath\", filePath))\n\t\t\treturn rowBased, fmt.Errorf(\"the file '%s' size is zero\", filePath)\n\t\t}\n\n\t\tif size > MaxFileSize {\n\t\t\tlog.Error(\"import wrapper: file size exceeds the maximum size\", zap.String(\"filePath\", filePath),\n\t\t\t\tzap.Int64(\"fileSize\", size), zap.Int64(\"MaxFileSize\", MaxFileSize))\n\t\t\treturn rowBased, fmt.Errorf(\"the file '%s' size exceeds the maximum size: %d bytes\", filePath, MaxFileSize)\n\t\t}\n\t\ttotalSize += size\n\t}\n\n\t// especially for column-base, total size of files cannot exceed MaxTotalSizeInMemory\n\tif totalSize > MaxTotalSizeInMemory {\n\t\tlog.Error(\"import wrapper: total size of files exceeds the maximum size\", zap.Int64(\"totalSize\", totalSize), zap.Int64(\"MaxTotalSize\", MaxTotalSizeInMemory))\n\t\treturn rowBased, fmt.Errorf(\"total size(%d bytes) of all files exceeds the maximum size: %d bytes\", totalSize, MaxTotalSizeInMemory)\n\t}\n\n\t// check redundant files for column-based import\n\t// if the field is primary key and autoid is false, the file is required\n\t// any redundant file is not allowed\n\tif !rowBased {\n\t\terr := p.validateColumnBasedFiles(filePaths, p.collectionSchema)\n\t\tif err != nil {\n\t\t\treturn rowBased, err\n\t\t}\n\t}\n\n\treturn rowBased, nil\n}", "title": "" }, { "docid": "cb8cc2b4f671a10f037664be9be57b0d", "score": "0.45734027", "text": "func (p *ImportWrapper) fileValidation(filePaths []string) (bool, error) {\n\t// use this map to check duplicate file name(only for numpy file)\n\tfileNames := make(map[string]struct{})\n\n\ttotalSize := int64(0)\n\trowBased := false\n\tfor i := 0; i < len(filePaths); i++ {\n\t\tfilePath := filePaths[i]\n\t\tname, fileType := GetFileNameAndExt(filePath)\n\n\t\t// only allow json file or numpy file\n\t\tif fileType != JSONFileExt && fileType != NumpyFileExt {\n\t\t\tlog.Warn(\"import wrapper: unsupported file type\", zap.String(\"filePath\", filePath))\n\t\t\treturn false, fmt.Errorf(\"unsupported file type: '%s'\", filePath)\n\t\t}\n\n\t\t// we use the first file to determine row-based or column-based\n\t\tif i == 0 && fileType == JSONFileExt {\n\t\t\trowBased = true\n\t\t}\n\n\t\t// check file type\n\t\t// row-based only support json type, column-based only support numpy type\n\t\tif rowBased {\n\t\t\tif fileType != JSONFileExt {\n\t\t\t\tlog.Warn(\"import wrapper: unsupported file type for row-based mode\", zap.String(\"filePath\", filePath))\n\t\t\t\treturn rowBased, fmt.Errorf(\"unsupported file type for row-based mode: '%s'\", filePath)\n\t\t\t}\n\t\t} else {\n\t\t\tif fileType != NumpyFileExt {\n\t\t\t\tlog.Warn(\"import wrapper: unsupported file type for column-based mode\", zap.String(\"filePath\", filePath))\n\t\t\t\treturn rowBased, fmt.Errorf(\"unsupported file type for column-based mode: '%s'\", filePath)\n\t\t\t}\n\t\t}\n\n\t\t// check dupliate file\n\t\t_, ok := fileNames[name]\n\t\tif ok {\n\t\t\tlog.Warn(\"import wrapper: duplicate file name\", zap.String(\"filePath\", filePath))\n\t\t\treturn rowBased, fmt.Errorf(\"duplicate file: '%s'\", filePath)\n\t\t}\n\t\tfileNames[name] = struct{}{}\n\n\t\t// check file size, single file size cannot exceed MaxFileSize\n\t\tsize, err := p.chunkManager.Size(p.ctx, filePath)\n\t\tif err != nil {\n\t\t\tlog.Warn(\"import wrapper: failed to get file size\", zap.String(\"filePath\", filePath), zap.Error(err))\n\t\t\treturn rowBased, fmt.Errorf(\"failed to get file size of '%s', error:%w\", filePath, err)\n\t\t}\n\n\t\t// empty file\n\t\tif size == 0 {\n\t\t\tlog.Warn(\"import wrapper: file size is zero\", zap.String(\"filePath\", filePath))\n\t\t\treturn rowBased, fmt.Errorf(\"the file '%s' size is zero\", filePath)\n\t\t}\n\n\t\tif size > params.Params.CommonCfg.ImportMaxFileSize.GetAsInt64() {\n\t\t\tlog.Warn(\"import wrapper: file size exceeds the maximum size\", zap.String(\"filePath\", filePath),\n\t\t\t\tzap.Int64(\"fileSize\", size), zap.String(\"MaxFileSize\", params.Params.CommonCfg.ImportMaxFileSize.GetValue()))\n\t\t\treturn rowBased, fmt.Errorf(\"the file '%s' size exceeds the maximum size: %s bytes\",\n\t\t\t\tfilePath, params.Params.CommonCfg.ImportMaxFileSize.GetValue())\n\t\t}\n\t\ttotalSize += size\n\t}\n\n\treturn rowBased, nil\n}", "title": "" }, { "docid": "1eac461ef442607589e8f50a4cc9162c", "score": "0.45630774", "text": "func (ivAnalysis *ImageViewAnalysis) validateConditionalFields() error {\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.PartialImageField()); err != nil {\n\t\treturn &FieldError{FieldName: \"PartialImage\",\n\t\t\tValue: ivAnalysis.PartialImageField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.ExcessiveImageSkewField()); err != nil {\n\t\treturn &FieldError{FieldName: \"ExcessiveImageSkew\",\n\t\t\tValue: ivAnalysis.ExcessiveImageSkewField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.PiggybackImageField()); err != nil {\n\t\treturn &FieldError{FieldName: \"PiggybackImage\",\n\t\t\tValue: ivAnalysis.PiggybackImageField(), Msg: err.Error()}\n\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.TooLightOrTooDarkField()); err != nil {\n\t\treturn &FieldError{FieldName: \"TooLightOrTooDark\",\n\t\t\tValue: ivAnalysis.TooLightOrTooDarkField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.StreaksAndOrBandsField()); err != nil {\n\t\treturn &FieldError{FieldName: \"StreaksAndOrBands\",\n\t\t\tValue: ivAnalysis.StreaksAndOrBandsField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.BelowMinimumImageSizeField()); err != nil {\n\t\treturn &FieldError{FieldName: \"BelowMinimumImageSize\",\n\t\t\tValue: ivAnalysis.BelowMinimumImageSizeField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.ExceedsMaximumImageSizeField()); err != nil {\n\t\treturn &FieldError{FieldName: \"ExceedsMaximumImageSize\",\n\t\t\tValue: ivAnalysis.ExceedsMaximumImageSizeField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.ImageEnabledPODField()); err != nil {\n\t\treturn &FieldError{FieldName: \"ImageEnabledPOD\",\n\t\t\tValue: ivAnalysis.ImageEnabledPODField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.isImageViewAnalysisValid(ivAnalysis.SourceDocumentBadField()); err != nil {\n\t\treturn &FieldError{FieldName: \"SourceDocumentBad\",\n\t\t\tValue: ivAnalysis.SourceDocumentBadField(), Msg: err.Error()}\n\t}\n\tif err := ivAnalysis.validateUsabilityFields(); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "63e8aed977c16272b67d6380b40fb0ee", "score": "0.4556367", "text": "func InField(x *big.Int) bool {\n\treturn x.Sign() != -1 && x.Cmp(F) == -1\n}", "title": "" }, { "docid": "62bbc5d9abad6e0dc0836b1dc1066ab0", "score": "0.45561498", "text": "func validType(args *Args, skipIncludes bool, names ...string) bool {\n\tinclude, exclude := args.SchemaParams.Include.AsGlob(), args.SchemaParams.Exclude.AsGlob()\n\tif len(include) == 0 && len(exclude) == 0 {\n\t\treturn true\n\t}\n\ttarget := strings.Join(names, \".\")\n\tfor _, pattern := range exclude {\n\t\tif pattern.Match(target) {\n\t\t\treturn false\n\t\t}\n\t}\n\tif len(include) == 0 || skipIncludes {\n\t\treturn true\n\t}\n\tfor _, pattern := range include {\n\t\tif pattern.Match(target) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "207a68489af2f35bb4a9150e8194173e", "score": "0.45422667", "text": "func calcDigestCountsInclude(state interface{}) error {\n\tidx := state.(*SearchIndex)\n\tis := types.IncludeIgnoredTraces\n\tidx.dCounters[is] = digest_counter.New(idx.cpxTile.GetTile(is))\n\treturn nil\n}", "title": "" }, { "docid": "a283b1cff10dd3d7a5049e9e07f178c1", "score": "0.45372522", "text": "func checkValidFiledsInMap(dataJSON []byte, spec string) bool {\n\tisValid := true\n\tdataMap := make(map[string]interface{})\n\tspecMap := make(map[string]FieldDataSpec)\n\terr := json.Unmarshal(dataJSON, &dataMap)\n\tif err != nil {\n\t\t_lc_vna_logger.Errorf(\"Unable to parse data json\", err)\n\t\treturn false\n\t}\n\terr = json.Unmarshal([]byte(spec), &specMap)\n\tif err != nil {\n\t\t_lc_vna_logger.Errorf(\"Unable to specification data json\", err)\n\t\treturn false\n\t}\n\tfor filedName, fieldSpec := range specMap {\n\t\tdata, isExisting := dataMap[filedName]\n\t\tif !isExisting && fieldSpec.IsMandatory {\n\t\t\tisValid = false\n\t\t\tbreak\n\t\t}\n\t\tif !fieldSpec.ValidateType(data) {\n\t\t\tisValid = false\n\t\t\tbreak\n\t\t}\n\t}\n\treturn isValid\n}", "title": "" }, { "docid": "b016018dc970b85c913ac1261972b4b9", "score": "0.4512945", "text": "func preFetchMatch(i provider.IItem, labels []*provider.Label, fs []provider.Filter) bool {\n\tfor _, f := range fs {\n\n\t\tif f.State != \"\" && f.State != \"all\" {\n\t\t\tif i.GetState() != f.State {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.ClosedCommenters != \"\" || f.ClosedComments != \"\" {\n\t\t\tif i.GetState() != \"closed\" {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.Closed != \"\" {\n\t\t\tif ok := matchDuration(i.GetClosedAt(), f.Closed); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d closed at %s does not meet %s\", i.GetNumber(), i.GetClosedAt(), f.Closed)\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.Updated != \"\" {\n\t\t\tif ok := matchDuration(i.GetUpdatedAt(), f.Updated); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d update at %s does not meet %s\", i.GetNumber(), i.GetUpdatedAt(), f.Updated)\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.Responded != \"\" {\n\t\t\tif ok := matchDuration(i.GetUpdatedAt(), f.Responded); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d update at %s does not meet responded %s\", i.GetNumber(), i.GetUpdatedAt(), f.Responded)\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.Created != \"\" {\n\t\t\tif ok := matchDuration(i.GetCreatedAt(), f.Created); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d Created at %s does not meet %s\", i.GetNumber(), i.GetCreatedAt(), f.Created)\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.TitleRegex() != nil {\n\t\t\tif ok := matchNegateRegex(i.GetTitle(), f.TitleRegex(), f.TitleNegate()); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d title does not meet %s\", i.GetNumber(), f.TitleRegex())\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.LabelRegex() != nil {\n\t\t\tif ok := matchLabel(labels, f.LabelRegex(), f.LabelNegate()); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d labels do not meet %s\", i.GetNumber(), f.LabelRegex())\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.MilestoneRegex() != nil {\n\t\t\tif ok := matchNegateRegex(i.GetMilestone().GetTitle(), f.MilestoneRegex(), f.MilestoneNegate()); !ok {\n\t\t\t\tklog.V(2).Infof(\"#%d milestone does not meet %s\", i.GetNumber(), f.MilestoneRegex())\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\t// This state can be performed without downloading comments\n\t\tif f.TagRegex() != nil && f.TagRegex().String() == \"^assigned$\" {\n\t\t\t// If assigned and no assignee, fail\n\t\t\tif !f.TagNegate() && i.GetAssignee() == nil {\n\t\t\t\treturn false\n\t\t\t}\n\t\t\t// if !assigned and has assignee, fail\n\t\t\tif f.TagNegate() && i.GetAssignee() != nil {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tif f.Reactions != \"\" || f.ReactionsPerMonth != \"\" || f.Commenters != \"\" || f.Comments != \"\" {\n\t\t\tif !i.GetUpdatedAt().After(i.GetCreatedAt()) {\n\t\t\t\tklog.V(1).Infof(\"#%d has no updates, but need one for: %s\", i.GetNumber(), f)\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t}\n\treturn true\n}", "title": "" }, { "docid": "454dca2157f2f4fa7812cf870fcabe72", "score": "0.4499463", "text": "func containsField(line spec.Line, value string) bool {\n\treturn sliceutil.Contains(strutil.Fields(line.Text), value)\n}", "title": "" }, { "docid": "ba17c04906869b769ce4512b565ab04e", "score": "0.4498297", "text": "func isIncluded(name string, include, exclude map[string]struct{}, db string) (included bool) {\n\tif len(include) > 0 {\n\t\t_, ok := include[name]\n\t\tincluded = ok\n\t\tif !ok {\n\t\t\t_, ok := include[db+\"/\"+name]\n\t\t\tincluded = ok\n\t\t}\n\t} else {\n\t\tincluded = true\n\t}\n\tif _, ok := exclude[name]; ok {\n\t\tincluded = false\n\t} else if _, ok := exclude[db+\"/\"+name]; ok {\n\t\tincluded = false\n\t}\n\treturn\n}", "title": "" }, { "docid": "a2cf82c2d1e68bb2bbd76324744cc6b4", "score": "0.44968027", "text": "func (sf *StyledFields) CompileFields(df interface{}) {\n\tvaltyp := reflect.TypeOf(units.Value{})\n\n\tsf.Fields = make(map[string]*StyledField, 50)\n\tsf.Inherits = make([]*StyledField, 0, 50)\n\tsf.Units = make([]*StyledField, 0, 50)\n\n\tWalkStyleStruct(df, \"\", uintptr(0),\n\t\tfunc(struf reflect.StructField, vf reflect.Value, outerTag string, baseoff uintptr) {\n\t\t\tstyf := &StyledField{Field: struf, NetOff: baseoff + struf.Offset, Default: vf}\n\t\t\ttag := StyleEffTag(struf.Tag.Get(\"xml\"), outerTag)\n\t\t\tif _, ok := sf.Fields[tag]; ok {\n\t\t\t\tfmt.Printf(\"gi.StyledFileds.CompileFields: ERROR redundant tag found -- please only use unique tags! %v\\n\", tag)\n\t\t\t}\n\t\t\tsf.Fields[tag] = styf\n\t\t\tatags := struf.Tag.Get(\"alt\")\n\t\t\tif atags != \"\" {\n\t\t\t\tatag := strings.Split(atags, \",\")\n\n\t\t\t\tfor _, tg := range atag {\n\t\t\t\t\ttag = StyleEffTag(tg, outerTag)\n\t\t\t\t\tsf.Fields[tag] = styf\n\t\t\t\t}\n\t\t\t}\n\t\t\tinhs := struf.Tag.Get(\"inherit\")\n\t\t\tif inhs == \"true\" {\n\t\t\t\tsf.Inherits = append(sf.Inherits, styf)\n\t\t\t}\n\t\t\tif vf.Kind() == reflect.Struct && vf.Type() == valtyp {\n\t\t\t\tsf.Units = append(sf.Units, styf)\n\t\t\t}\n\t\t})\n\treturn\n}", "title": "" }, { "docid": "056f5258f8d22d388d33a8485c45677c", "score": "0.44961834", "text": "func (h *CefHeaderData) check_meta_FILE_TYPE() (err error) {\n \n v0_filename, err := h.getAttrFirstQuoted(\"FILE_NAME\")\n if err != nil {\n return err\n } \n \n v0_file_type, err := h.getMetaEntryFirstQuoted(\"FILE_TYPE\")\n if err != nil {\n return err\n }\n \n v0_logical, err := h.getMetaEntryFirstQuoted(\"LOGICAL_FILE_ID\")\n if err != nil {\n return err\n }\n \n v0_filename = utils.Trim_quoted_string(v0_filename)\n if len(v0_filename) == 0 {\n return errors.New(\"FILE_NAME length = 0\")\n } \n \n v0_file_type = utils.Trim_quoted_string(v0_file_type)\n if len(v0_file_type) == 0 {\n return errors.New(\"FILE_TYPE length = 0\")\n } \n \n v0_logical = utils.Trim_quoted_string(v0_logical)\n if len(v0_logical) == 0 {\n return errors.New(\"LOGICAL_FILE_ID length = 0\")\n } \n \n ix := strings.Index(v0_filename, \".\")\n if ix < 0 {\n return errors.New(\"FILE_NAME does have .cef or .cef.gz suffix\")\n } \n\n ext0 := v0_filename[ix+1:]\n if strings.HasPrefix(ext0, v0_file_type) == false {\n return errors.New(\"FILE_TYPE does not follow first '.' in actual filename\" + \"||\" + ext0 + \"||\" + v0_file_type)\n }\n \n fn := v0_logical + `.` + v0_file_type\n // allow for .gz\n if strings.HasSuffix(v0_filename, fn) == false {\n diag.Println(v0_filename)\n diag.Println(fn)\n \n return errors.New(\"FILE_NAME does not match LOGICAL_FILE_ID + FILE_TYPE || \" + v0_filename + \" || \" + fn)\n }\n \n return\n}", "title": "" }, { "docid": "be20cf2067c970734f0ab7966d8dc688", "score": "0.4490194", "text": "func (UintLit) IsDIExpressionField() {}", "title": "" }, { "docid": "31392d6edf6c81c4a6d42495c034830d", "score": "0.44881016", "text": "func hasInclude(data []string, val []string) bool {\n\tout := make(map[string]bool)\n\tif len(data) < len(val) {\n\t\treturn false\n\t}\n\n\tfor _, d := range data {\n\t\tout[d] = true\n\t}\n\n\tfor _, v := range val {\n\t\tif !out[v] {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "2eb25e68922abef8cf71b3788fb44f66", "score": "0.44810164", "text": "func multiFileTest(inputDirectory, outputDirectory string) {\n\n\tdir, err := os.Open(inputDirectory)\n\tif err != nil {\n\t\tlog.Fatal(\"multiFileTest open input directory failed: \", err)\n\t}\n\tdefer dir.Close()\n\tfiles, err := dir.Readdir(0)\n\tif err != nil {\n\t\tlog.Fatal(\"multiFileTest reading directory failed: \", err)\n\t}\n\tnumFiles := 0\n\n\tsegmentsPerFrame := make([]FileSeg, 0)\n\n\tallSegments := make([][]*LineSegment, len(files)+1)\n\n\tfor i, fileinfo := range files {\n\t\tinputFileName := path.Join(inputDirectory, fileinfo.Name())\n\t\tlog.Printf(\"----------------------------------------------\\n\")\n\t\tlog.Printf(\"%d of %d, processing: %s\\n\", numFiles, len(files), inputFileName)\n\t\tnumSeg, lineSegments := singleFileTest(inputFileName, \"\", \"\")\n\n\t\t// Store in one big fat array\n\t\tvar index int\n\t\tfmt.Sscanf(fileinfo.Name(), \"apple%d.png\", &index)\n\t\tlog.Printf(\"FileIndex: %d\\n\", index)\n\t\tallSegments[index] = lineSegments\n\t\t//\n\n\t\tfs := FileSeg{\n\t\t\tFilename: \"\", //outputFileName,\t\t// deprecated!\n\t\t\tSegments: numSeg,\n\t\t}\n\n\t\tsegmentsPerFrame = append(segmentsPerFrame, fs)\n\t\tnumFiles = numFiles + 1\n\n\t\tif glbConfig.NumFrames > 0 && (i+1) >= glbConfig.NumFrames {\n\t\t\tbreak\n\t\t}\n\n\t}\n\tlog.Printf(\"---------------------------------\\n\")\n\tlog.Printf(\"Processing completed, %d files\\n\", numFiles)\n\n\tlog.Printf(\"Dumping to one big datafile\")\n\tstripsfile, err := os.Create(glbConfig.Output)\n\tif err != nil {\n\t\tlog.Fatal(\"Created segment database failed: \", err)\n\t}\n\tdefer stripsfile.Close()\n\n\tfor _, segarray := range allSegments {\n\t\tstrips := LineSegmentsToStrips(segarray)\n\t\t// Write number of strips\n\t\tif len(strips) > 255 {\n\t\t\tlog.Fatal(\"Failed: Too many strips in segment!\")\n\t\t}\n\n\t\t// Format:\n\t\t// A bunch of lines connected together is called a strip. They are continious\n\t\t// from one point to the other\n\t\t//\n\t\t// A bunch of strips builds a frame\n\t\t//\n\t\t// Parse strips unilt EOF is hit\n\t\t//\n\t\t// Format details:\n\t\t//\n\t\t// Number of Strips\tint8\n\t\t// [strip]\n\t\t//\t\tNumber of points\tint8\n\t\t//\t\t[points]\n\t\t//\t\t\tX\t\t\t\tint8\n\t\t// Y int8\n\t\t//\n\t\t// - REPEAT UNTIL EOF\n\t\t//\n\n\t\tbinary.Write(stripsfile, binary.LittleEndian, uint8(len(strips)))\n\t\tWriteStrips(stripsfile, strips)\n\t}\n}", "title": "" }, { "docid": "657ddb188f4250016fd748ee97c3e51f", "score": "0.44771048", "text": "func BenchmarkFileIter(b *testing.B) {\n\n\tfs, _ := schema.DefaultRegistry().Schema(\"testcsvs\")\n\tb.StartTimer()\n\n\tfor i := 0; i < b.N; i++ {\n\t\tconn, _ := fs.OpenConn(\"appearances\")\n\t\tscanner := conn.(schema.Iterator)\n\n\t\tfor {\n\t\t\tmsg := scanner.Next()\n\t\t\tif msg == nil {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4f455e53bb658caf4a18c4adc504f6db", "score": "0.44714874", "text": "func (o Options) preUpload() {\n\tif o.DeprecatedWrapperOptions != nil {\n\t\t// This only fires if the prowjob controller and sidecar are at different commits\n\t\tlogrus.Warn(\"Using deprecated wrapper_options instead of entries. Please update prow/pod-utils/decorate before June 2019\")\n\t}\n\n\tif o.CensoringOptions != nil {\n\t\tif err := o.censor(); err != nil {\n\t\t\tlogrus.WithError(err).Warn(\"Failed to censor data\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3e1cc3edef2777db82331ca91a094908", "score": "0.44669273", "text": "func checkList3(t *testing.T, _ /*sharedIDs*/ bool, min, max TriceID, searchMethod string, tt testTable, extendMacroName bool, inMap, expMap TriceIDLookUp) {\n\tilu := inMap\n\tflu := ilu.reverseS()\n\tVerbose = true\n\tfor _, x := range tt {\n\t\tact0, _ := updateParamCountAndID0(os.Stdout, x.text, extendMacroName)\n\t\tlistModified := false\n\t\tact, fileModified := updateIDsUniqOrShared(os.Stdout, false /*sharedIDs*/, min, max, searchMethod, act0, ilu, flu, &listModified)\n\t\tassert.Equal(t, x.fileMod, fileModified)\n\t\tassert.Equal(t, x.listMod, listModified)\n\t\tassert.Equal(t, x.exp, act)\n\t}\n\tilu.AddFmtCount(os.Stdout)\n\teq := reflect.DeepEqual(ilu, expMap)\n\tassert.True(t, eq)\n}", "title": "" }, { "docid": "18f363e229796973bc9252c8f0788e11", "score": "0.44668725", "text": "func inputParamFile(input *cwl.Input) bool {\n\tif input.Types[0].Type == CWLFileType {\n\t\treturn true\n\t}\n\tif input.Types[0].Type == \"array\" {\n\t\tfor _, itemType := range input.Types[0].Items {\n\t\t\tif itemType.Type == CWLFileType {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "367c1c9455c0617f2bc82cbe50a2ddce", "score": "0.44659182", "text": "func calcParamsetsInclude(state interface{}) error {\n\tidx := state.(*SearchIndex)\n\tis := types.IncludeIgnoredTraces\n\tidx.paramsetSummaries[is] = paramsets.NewParamSummary(idx.cpxTile.GetTile(is), idx.dCounters[is])\n\treturn nil\n}", "title": "" }, { "docid": "5386b078b1cd7adf641473b301e663b7", "score": "0.44654298", "text": "func TestSanity(t *testing.T) {\n\tvar x FieldElement\n\tvar x2, x2sq FieldElement\n\t// var x2Go, x2sqGo FieldElement\n\n\tx = [5]uint64{1, 1, 1, 1, 1}\n\tx2.Mul(&x, &x)\n\t// FeMulGo(&x2Go, &x, &x)\n\tx2sq.Square(&x)\n\t// FeSquareGo(&x2sqGo, &x)\n\n\t// if !vartimeEqual(x2, x2Go) || !vartimeEqual(x2sq, x2sqGo) || !vartimeEqual(x2, x2sq) {\n\t// \tt.Fatalf(\"all ones failed\\nmul.s: %d\\nmul.g: %d\\nsqr.s: %d\\nsqr.g: %d\\n\", x2, x2Go, x2sq, x2sqGo)\n\t// }\n\n\tif x2 != x2sq {\n\t\tt.Fatalf(\"all ones failed\\nmul: %x\\nsqr: %x\\n\", x2, x2sq)\n\t}\n\n\tvar bytes [32]byte\n\n\t_, err := io.ReadFull(rand.Reader, bytes[:])\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tx.FromBytes(bytes[:])\n\n\tx2.Mul(&x, &x)\n\t// FeMulGo(&x2Go, &x, &x)\n\tx2sq.Square(&x)\n\t// FeSquareGo(&x2sqGo, &x)\n\n\t// if !vartimeEqual(x2, x2Go) || !vartimeEqual(x2sq, x2sqGo) || !vartimeEqual(x2, x2sq) {\n\t// \tt.Fatalf(\"random field element failed\\nfe: %x\\n\\nmul.s: %x\\nmul.g: %x\\nsqr.s: %x\\nsqr.g: %x\\n\", x, x2, x2Go, x2sq, x2sqGo)\n\t// }\n\n\tif x2 != x2sq {\n\t\tt.Fatalf(\"all ones failed\\nmul: %x\\nsqr: %x\\n\", x2, x2sq)\n\t}\n}", "title": "" }, { "docid": "79c56edfa6f4131159d3e5d9c36ad31a", "score": "0.44654065", "text": "func readFilterList(fname string, runTests bool) error {\n\tdat, err := ioutil.ReadFile(fname)\n\tif err != nil {\n\t\treturn err\n\t}\n\tlines := strings.Split(string(dat), \"\\n\")\n\tlinenr := 0\n\tmsgid := \"\"\n\tstep := 0\n\tregex := \"\"\n\ttest := \"\"\n\tparamList := []string{}\n\textras := []string{}\n\tfor _, line := range lines {\n\t\tlinenr++\n\t\tif len(line) > 1 {\n\t\t\tline = line[0 : len(line)-1]\n\t\t\tswitch line[0] {\n\t\t\tcase 35:\n\t\t\t\t// comment\n\t\t\tcase 9:\n\t\t\t\t// remove tab\n\t\t\t\tline = line[1:]\n\t\t\t\tswitch step {\n\t\t\t\tcase 0:\n\t\t\t\t\t// regex\n\t\t\t\t\tregex = line\n\t\t\t\tcase 1:\n\t\t\t\t\t// paramList\n\t\t\t\t\tparamList = strings.Split(line, \";\")\n\t\t\t\tcase 2:\n\t\t\t\t\t// extras\n\t\t\t\t\textras = strings.Split(line, \";\")\n\t\t\t\t\tnew := append(ml[msgid], LogFilter{paramList, extras, regexp.MustCompile(regex)})\n\t\t\t\t\tml[msgid] = new\n\t\t\t\tcase 3:\n\t\t\t\t\t// test syslog\n\t\t\t\t\ttest = \"%ASA-1-\" + msgid + \": \" + line\n\t\t\t\tcase 4:\n\t\t\t\t\t// test expected parameters\n\t\t\t\t\tif runTests {\n\t\t\t\t\t\tlog, err := Parse(test, 0)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn errors.New(\"error while testing \" + msgid + \" line \" + fmt.Sprintf(\"%d\", linenr) + \". \" + fmt.Sprint(err))\n\t\t\t\t\t\t}\n\t\t\t\t\t\texpected := strings.Split(line, \";\")\n\t\t\t\t\t\tfor i, key := range paramList {\n\t\t\t\t\t\t\tif log[key] != expected[i] {\n\t\t\t\t\t\t\t\tout := \"error while testing \" + msgid + \" line \" + fmt.Sprintf(\"%d\", linenr) + \"\\n\" + test + \"\\n\"\n\t\t\t\t\t\t\t\tout = out + \"parse result: \" + key + \"=\\\"\" + log[key] + \"\\\"\\n\"\n\t\t\t\t\t\t\t\tout = out + \"expected : \" + key + \"=\\\"\" + expected[i] + \"\\\"\"\n\t\t\t\t\t\t\t\treturn errors.New(out)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\t// allow another test / go back to step 2\n\t\t\t\t\tstep = 2\n\t\t\t\t}\n\t\t\t\tstep++\n\t\t\tdefault:\n\t\t\t\t// msgid go to step 0\n\t\t\t\tmsgid = line\n\t\t\t\tstep = 0\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "80870a3fae1433af65c82c5483febad9", "score": "0.44644278", "text": "func generateField(ctx *context, w io.Writer, fields []Field, i int) {\n\tfield := fields[i]\n\n\tfieldName := strings.TrimPrefix(field.Name, \"_\")\n\tfieldName = camelCaseName(fieldName)\n\n\t// generate length field for strings\n\tif field.Type == \"string\" {\n\t\tfmt.Fprintf(w, \"\\tXXX_%sLen uint32 `struc:\\\"sizeof=%s\\\"`\\n\", fieldName, fieldName)\n\t}\n\n\tdataType := convertToGoType(ctx, field.Type)\n\tfieldType := dataType\n\n\t// check if it is array\n\tif field.Length > 0 || field.SizeFrom != \"\" {\n\t\tif dataType == \"uint8\" {\n\t\t\tdataType = \"byte\"\n\t\t}\n\t\tfieldType = \"[]\" + dataType\n\t}\n\tfmt.Fprintf(w, \"\\t%s %s\", fieldName, fieldType)\n\n\tfieldTags := map[string]string{}\n\n\tif field.Length > 0 {\n\t\t// fixed size array\n\t\tfieldTags[\"struc\"] = fmt.Sprintf(\"[%d]%s\", field.Length, dataType)\n\t} else {\n\t\tfor _, f := range fields {\n\t\t\tif f.SizeFrom == field.Name {\n\t\t\t\t// variable sized array\n\t\t\t\tsizeOfName := camelCaseName(f.Name)\n\t\t\t\tfieldTags[\"struc\"] = fmt.Sprintf(\"sizeof=%s\", sizeOfName)\n\t\t\t}\n\t\t}\n\t}\n\n\tif ctx.includeBinapiNames {\n\t\tfieldTags[\"binapi\"] = field.Name\n\t}\n\tif field.Meta.Limit > 0 {\n\t\tfieldTags[\"binapi\"] = fmt.Sprintf(\"%s,limit=%d\", fieldTags[\"binapi\"], field.Meta.Limit)\n\t}\n\n\tif len(fieldTags) > 0 {\n\t\tfmt.Fprintf(w, \"\\t`\")\n\t\tvar keys []string\n\t\tfor k := range fieldTags {\n\t\t\tkeys = append(keys, k)\n\t\t}\n\t\tsort.Strings(keys)\n\t\tvar n int\n\t\tfor _, tt := range keys {\n\t\t\tt, ok := fieldTags[tt]\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif n > 0 {\n\t\t\t\tfmt.Fprintf(w, \" \")\n\t\t\t}\n\t\t\tn++\n\t\t\tfmt.Fprintf(w, `%s:\"%s\"`, tt, t)\n\t\t}\n\t\tfmt.Fprintf(w, \"`\")\n\t}\n\n\tfmt.Fprintln(w)\n}", "title": "" }, { "docid": "7b36cdcb0f44ffed3393a31d3aba862e", "score": "0.44583344", "text": "func mockADVFileControl() ADVFileControl {\n\tfc := NewADVFileControl()\n\tfc.BatchCount = 1\n\tfc.BlockCount = 1\n\tfc.EntryAddendaCount = 1\n\tfc.EntryHash = 5320001\n\treturn fc\n}", "title": "" } ]
6a8f6e651ba2d7f9914ef4e3bc0be118
IsPodFailed returns true when one of the core containers is terminated wih a nonzero exit code, or the whole pod has been failed.
[ { "docid": "8dfdf09ee07bb88e4716d31623526fc5", "score": "0.8549737", "text": "func IsPodFailed(pod *core.Pod, coreContainers utils.StringList) bool {\n\tif pod.Status.Phase == core.PodFailed {\n\t\treturn true\n\t}\n\n\tallCore, succeeded, failed := 0, 0, 0\n\tfor _, c := range pod.Status.ContainerStatuses {\n\t\tif !coreContainers.Has(c.Name) {\n\t\t\t// It is not core container, so check next one status.\n\t\t\tcontinue\n\t\t}\n\n\t\tallCore++\n\t\tif t := c.State.Terminated; t != nil {\n\t\t\t// A core container is terminated.\n\t\t\tif t.ExitCode != 0 {\n\t\t\t\tfailed++\n\t\t\t} else {\n\t\t\t\tsucceeded++\n\t\t\t}\n\t\t}\n\t}\n\n\tif failed == 0 && succeeded == 0 {\n\t\t// All core containers are not terminated.\n\t\treturn false\n\t}\n\n\tif failed > 0 {\n\t\t// Some (or all) core containers have been terminated.\n\t\t// Some other core containers can be still running or succeeded,\n\t\t// but the whole pod is considered as failed.\n\t\treturn true\n\t} else if allCore == succeeded {\n\t\t// All core containers are succeeded, so the pod is not failed.\n\t\t// The function `IsPodSucceeded` should recognize it in next iteration.\n\t\treturn false\n\t}\n\n\t// Some core containers are succeeded, but not all of them.\n\treturn true\n}", "title": "" } ]
[ { "docid": "2db96b909ca404590c523bc74db6396f", "score": "0.7606462", "text": "func IsFailedPod(pod *corev1.Pod) bool {\n\treturn pod != nil && pod.Status.Phase == corev1.PodFailed\n}", "title": "" }, { "docid": "4aa72323d0e68e195f0ca4da4fbc797a", "score": "0.74375296", "text": "func PodFailed(e watch.Event) (bool, error) { return podInPhase(e.Object, corev1.PodFailed) }", "title": "" }, { "docid": "fbedf61fcda94718c9ad500545882592", "score": "0.7316812", "text": "func IsPodSucceeded(pod *core.Pod, coreContainers utils.StringList) bool {\n\tif pod.Status.Phase == core.PodSucceeded {\n\t\treturn true\n\t}\n\n\tcore, succeeded := 0, 0\n\tfor _, c := range pod.Status.ContainerStatuses {\n\t\tif !coreContainers.Has(c.Name) {\n\t\t\t// It is not core container, so check next one status.\n\t\t\tcontinue\n\t\t}\n\n\t\tcore++\n\t\tif t := c.State.Terminated; t != nil && t.ExitCode == 0 {\n\t\t\tsucceeded++\n\t\t}\n\t}\n\n\tif core > 0 && core == succeeded {\n\t\t// If there are some core containers and all of them succeeded then return that the whole pod succeeded.\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "223b506cbca432ab0b560c8ac7740963", "score": "0.67044234", "text": "func terminatedPod(pod *v1.Pod) bool {\n\treturn pod.Status.Phase == v1.PodSucceeded || pod.Status.Phase == v1.PodFailed\n}", "title": "" }, { "docid": "4ea3fc53f9757bdd28daba6a343469a2", "score": "0.6656856", "text": "func IsContainerFailed(container *core.ContainerStatus) bool {\n\tif c := container.State.Terminated; c != nil {\n\t\tif c.ExitCode != 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "235c9d12492b8c56585f07d6301d5a92", "score": "0.66560376", "text": "func detectPodFailure(pod v1.Pod) (string, bool) {\n\tif len(pod.Status.ContainerStatuses) > 0 {\n\t\tfor _, containerStatus := range pod.Status.ContainerStatuses {\n\t\t\tif containerStatus.State.Waiting != nil {\n\t\t\t\tswitch waitingReason := containerStatus.State.Waiting.Reason; waitingReason {\n\t\t\t\tcase \"CrashLoopBackOff\", \"ImageInspectError\", \"ErrImageNeverPull\", \"RegistryUnavilable\", \"InvalidImageName\":\n\t\t\t\t\tfailmessage := fmt.Sprintf(\"Detected Pod '%s' is waiting forever because of '%s'\", pod.Name, waitingReason)\n\t\t\t\t\t// Pod is waiting forever\n\t\t\t\t\treturn failmessage, true\n\t\t\t\tdefault:\n\t\t\t\t\treturn fmt.Sprintf(\"Pod '%s' is waiting because '%s'\", pod.Name, waitingReason), false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn \"\", false\n}", "title": "" }, { "docid": "bee01f67310bc886c9364e3d3dfcedf9", "score": "0.6604712", "text": "func IsPodFinished(pod corev1.Pod) bool {\n\treturn pod.Status.Phase == corev1.PodSucceeded || pod.Status.Phase == corev1.PodFailed\n}", "title": "" }, { "docid": "78d3b9e38c368522fd8b25c7ede1da23", "score": "0.65968424", "text": "func CheckPodExitCode(files []string) (int, error) {\n\tcontainerIds, err := GetPodContainerIds(files)\n\tif err != nil {\n\t\tlog.Errorln(\"Error retrieving container ids\")\n\t\treturn 1, err\n\t}\n\n\tfor _, containerId := range containerIds {\n\t\texitCode, err := checkContainerExitCode(containerId)\n\n\t\tif err != nil {\n\t\t\treturn 1, err\n\t\t}\n\n\t\tif exitCode != 0 {\n\t\t\treturn exitCode, nil\n\t\t}\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "627c2b4717ad54a110e62d2c49e18f12", "score": "0.659308", "text": "func isRunning(pod *corev1.Pod) bool {\n\treason := string(pod.Status.Phase)\n\tif pod.Status.Reason != \"\" {\n\t\treason = pod.Status.Reason\n\t}\n\n\t// return false if all init containers have not finished.\n\tfor i := range pod.Status.InitContainerStatuses {\n\t\tinitContainer := pod.Status.InitContainerStatuses[i]\n\t\tif initContainer.State.Terminated == nil || initContainer.State.Terminated.ExitCode != 0 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\thasRunning := false\n\tfor i := len(pod.Status.ContainerStatuses) - 1; i >= 0; i-- {\n\t\tcontainer := pod.Status.ContainerStatuses[i]\n\t\tif container.Ready && container.State.Running != nil {\n\t\t\thasRunning = true\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif reason == \"Completed\" && hasRunning {\n\t\thasPodReadyCondition := false\n\t\tfor _, condition := range pod.Status.Conditions {\n\t\t\tif condition.Type == corev1.PodReady && condition.Status == corev1.ConditionTrue {\n\t\t\t\thasPodReadyCondition = true\n\t\t\t}\n\t\t}\n\t\t// change pod status back to \"Running\" if there is at least one container still reporting as \"Running\" status\n\t\tif hasPodReadyCondition {\n\t\t\treason = \"Running\"\n\t\t} else {\n\t\t\treason = \"NotReady\"\n\t\t}\n\t}\n\n\tif pod.DeletionTimestamp != nil && pod.Status.Reason == \"NodeLost\" {\n\t\treason = \"Unknown\"\n\t} else if pod.DeletionTimestamp != nil {\n\t\treason = \"Terminating\"\n\t}\n\n\treturn reason == \"Running\"\n}", "title": "" }, { "docid": "a6a200bd19bbe28dbfc6ebb45c2bf7fa", "score": "0.6574462", "text": "func isPodRunning(pod *corev1.Pod) bool {\n\treturn pod.Status.Phase == corev1.PodRunning || pod.Status.Phase == corev1.PodSucceeded\n}", "title": "" }, { "docid": "13efead56e758188c689749ab7aecb1e", "score": "0.62822914", "text": "func podRunning(pod *corev1.Pod) bool {\n\treturn pod.Status.Phase == corev1.PodRunning || pod.Status.Phase == corev1.PodSucceeded\n}", "title": "" }, { "docid": "4bb79e2cb29371903a6d9d3e50db56b1", "score": "0.6241509", "text": "func IsCompletePod(pod *corev1.Pod) bool {\n\tif pod == nil {\n\t\treturn false\n\t}\n\n\tif pod.DeletionTimestamp != nil {\n\t\treturn true\n\t}\n\n\tif pod.Status.Phase == corev1.PodSucceeded || pod.Status.Phase == corev1.PodFailed {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d7e4485ee657f6f641141f6a17e6f453", "score": "0.6148681", "text": "func IsJobPodMountFailed(job *batchv1.Job, namespace string) bool {\n\tfn := \"IsJobPodMountFailed\"\n\n\tpod, err := core.Instance().GetPodsByOwner(job.UID, namespace)\n\tif err != nil {\n\t\terrMsg := fmt.Sprintf(\"Getting pod of job [%s/%s] failed: %v\", namespace, job.Name, err)\n\t\tlogrus.Debugf(\"%s: %v\", fn, errMsg)\n\t\treturn false\n\t}\n\n\tif len(pod) > 0 && len(pod[0].Status.ContainerStatuses) != 0 {\n\t\tcontainerStatus := pod[0].Status.ContainerStatuses[0]\n\t\tif containerStatus.State.Waiting != nil &&\n\t\t\tcontainerStatus.State.Waiting.Reason == \"ContainerCreating\" {\n\t\t\topts := metav1.ListOptions{\n\t\t\t\tFieldSelector: \"involvedObject.name=\" + pod[0].Name,\n\t\t\t}\n\t\t\tevents, err := core.Instance().ListEvents(namespace, opts)\n\t\t\tif err != nil {\n\t\t\t\terrMsg := fmt.Sprintf(\"failed to fetch events for pod [%s/%s]: %v\", namespace, pod[0].Name, err)\n\t\t\t\tlogrus.Debugf(\"%s: %v\", fn, errMsg)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tfor _, event := range events.Items {\n\t\t\t\tif event.Reason == \"FailedMount\" && event.Count > 0 {\n\t\t\t\t\treturn true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a5487eb602a88e01bcbca515cf5b9b4c", "score": "0.60797024", "text": "func IsContainerRunning(pod *core.Pod, name string) bool {\n\tfor _, c := range pod.Status.ContainerStatuses {\n\t\tif c.Name != name {\n\t\t\tcontinue\n\t\t}\n\n\t\tif c.State.Running == nil {\n\t\t\treturn false\n\t\t}\n\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "5cef5fd386b9f6d1df8229e63fd64fde", "score": "0.605851", "text": "func (hypervisor *Hypervisor) IsPodRunning(clusterNamespace, clusterName, componentName string, pod podapi.Pod) (isPodRunning bool, podSandboxID string, allContainersRunning bool, runningContainers, notRunningContainers map[string]*criapi.Container, err error) {\n\tcriRuntime, err := hypervisor.CRIRuntime()\n\tif err != nil {\n\t\treturn false, \"\", false, nil, nil, err\n\t}\n\tpodSum, err := pod.SHA1Sum()\n\tif err != nil {\n\t\treturn false, \"\", false, nil, nil, err\n\t}\n\tklog.V(2).Infof(\"checking if a pod %q in hypervisor %q is running\", pod.Name, hypervisor.Name)\n\tpodSandboxList, err := criRuntime.ListPodSandbox(\n\t\tcontext.TODO(),\n\t\t&criapi.ListPodSandboxRequest{\n\t\t\tFilter: &criapi.PodSandboxFilter{\n\t\t\t\tLabelSelector: map[string]string{\n\t\t\t\t\tclusterNamespaceLabel: clusterNamespace,\n\t\t\t\t\tclusterNameLabel: clusterName,\n\t\t\t\t\tcomponentNameLabel: componentName,\n\t\t\t\t\tpodNameLabel: pod.Name,\n\t\t\t\t\tpodSandboxSHA1SumLabel: podSum,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn false, \"\", false, nil, nil, err\n\t}\n\tpodSandboxID = \"\"\n\tfor _, podSandbox := range podSandboxList.Items {\n\t\tif podSandbox.State == criapi.PodSandboxState_SANDBOX_READY {\n\t\t\tpodSandboxID = podSandbox.Id\n\t\t\tbreak\n\t\t}\n\t}\n\tif podSandboxID == \"\" {\n\t\treturn false, \"\", false, nil, nil, nil\n\t}\n\tklog.V(2).Infof(\"checking if all containers within pod %q in hypervisor %q are running\", pod.Name, hypervisor.Name)\n\tcontainerList, err := criRuntime.ListContainers(\n\t\tcontext.TODO(),\n\t\t&criapi.ListContainersRequest{\n\t\t\tFilter: &criapi.ContainerFilter{\n\t\t\t\tPodSandboxId: podSandboxID,\n\t\t\t},\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn false, podSandboxID, false, nil, nil, err\n\t}\n\tpodRunningContainers := map[string]*criapi.Container{}\n\tpodNotRunningContainers := map[string]*criapi.Container{}\n\tfor _, container := range containerList.Containers {\n\t\tcontainerStatus, err := criRuntime.ContainerStatus(\n\t\t\tcontext.TODO(),\n\t\t\t&criapi.ContainerStatusRequest{\n\t\t\t\tContainerId: container.Id,\n\t\t\t},\n\t\t)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tif containerStatus.Status.State == criapi.ContainerState_CONTAINER_RUNNING {\n\t\t\tpodRunningContainers[container.Metadata.Name] = container\n\t\t} else {\n\t\t\tpodNotRunningContainers[container.Metadata.Name] = container\n\t\t}\n\t}\n\treturn true,\n\t\tpodSandboxID,\n\t\tlen(podRunningContainers) == len(pod.Containers),\n\t\tpodRunningContainers,\n\t\tpodNotRunningContainers,\n\t\tnil\n}", "title": "" }, { "docid": "e7372e04b236dcec907e2bfe6196ac60", "score": "0.5848462", "text": "func FailedPodConditions(pod corev1.Pod) []types.PodCondition {\n\tconditions := []types.PodCondition{}\n\tfor _, condition := range pod.Status.Conditions {\n\t\tif condition.Status != corev1.ConditionTrue {\n\t\t\tconditions = append(\n\t\t\t\tconditions,\n\t\t\t\ttypes.PodCondition{\n\t\t\t\t\tType: string(condition.Type),\n\t\t\t\t\tSuccessful: false,\n\t\t\t\t\tReason: condition.Reason,\n\t\t\t\t\tMessage: condition.Message,\n\t\t\t\t},\n\t\t\t)\n\n\t\t}\n\t}\n\n\treturn conditions\n}", "title": "" }, { "docid": "ed61c49a76515ca96b4a254b34c132b7", "score": "0.5832286", "text": "func WaitForPodRunningOrFail(ctx context.Context, t feature.T, podName string) {\n\tpodClient := kubeclient.Get(ctx).CoreV1().Pods(environment.FromContext(ctx).Namespace())\n\tp := podClient\n\tinterval, timeout := PollTimings(ctx, nil)\n\terr := wait.PollImmediate(interval, timeout, func() (bool, error) {\n\t\tp, err := p.Get(ctx, podName, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn true, err\n\t\t}\n\t\treturn podRunning(p), nil\n\t})\n\tif err != nil {\n\t\tsb := strings.Builder{}\n\t\tif p, err := podClient.Get(ctx, podName, metav1.GetOptions{}); err != nil {\n\t\t\tsb.WriteString(err.Error())\n\t\t\tsb.WriteString(\"\\n\")\n\t\t} else {\n\t\t\tfor _, c := range p.Spec.Containers {\n\t\t\t\tif b, err := PodLogs(ctx, podName, c.Name, environment.FromContext(ctx).Namespace()); err != nil {\n\t\t\t\t\tsb.WriteString(err.Error())\n\t\t\t\t} else {\n\t\t\t\t\tsb.Write(b)\n\t\t\t\t}\n\t\t\t\tsb.WriteString(\"\\n\")\n\t\t\t}\n\t\t}\n\t\tt.Fatalf(\"Failed while waiting for pod %s running: %+v\", podName, errors.WithStack(err))\n\t}\n}", "title": "" }, { "docid": "8d8f24c9326dfd841aefdea89b430288", "score": "0.57716614", "text": "func PodSucceeded(e watch.Event) (bool, error) { return podInPhase(e.Object, corev1.PodSucceeded) }", "title": "" }, { "docid": "7b460b5dfbde474fa027d235ad5d038b", "score": "0.57551014", "text": "func (l *linkerdMeshWorkloadScanner) isLinkerdPod(pod *k8s_core_types.Pod) bool {\n\tfor _, container := range pod.Spec.Containers {\n\t\tif container.Name == \"linkerd-proxy\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "83f825f4e3340e3015a860e7b77a0d64", "score": "0.5725759", "text": "func getPodStatus(pod *v1.Pod) string {\n\trestarts := 0\n\t// totalContainers := len(pod.Spec.Containers)\n\treadyContainers := 0\n\n\treason := string(pod.Status.Phase)\n\tif pod.Status.Reason != \"\" {\n\t\treason = pod.Status.Reason\n\t}\n\n\tinitializing := false\n\tfor i := range pod.Status.InitContainerStatuses {\n\t\tcontainer := pod.Status.InitContainerStatuses[i]\n\t\trestarts += int(container.RestartCount)\n\t\tswitch {\n\t\tcase container.State.Terminated != nil && container.State.Terminated.ExitCode == 0:\n\t\t\tcontinue\n\t\tcase container.State.Terminated != nil:\n\t\t\t// initialization is failed\n\t\t\tif len(container.State.Terminated.Reason) == 0 {\n\t\t\t\tif container.State.Terminated.Signal != 0 {\n\t\t\t\t\treason = fmt.Sprintf(\"Init:Signal:%d\", container.State.Terminated.Signal)\n\t\t\t\t} else {\n\t\t\t\t\treason = fmt.Sprintf(\"Init:ExitCode:%d\", container.State.Terminated.ExitCode)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treason = \"Init:\" + container.State.Terminated.Reason\n\t\t\t}\n\t\t\tinitializing = true\n\t\tcase container.State.Waiting != nil && len(container.State.Waiting.Reason) > 0 && container.State.Waiting.Reason != \"PodInitializing\":\n\t\t\treason = \"Init:\" + container.State.Waiting.Reason\n\t\t\tinitializing = true\n\t\tdefault:\n\t\t\treason = fmt.Sprintf(\"Init:%d/%d\", i, len(pod.Spec.InitContainers))\n\t\t\tinitializing = true\n\t\t}\n\t\tbreak\n\t}\n\tif !initializing {\n\t\trestarts = 0\n\t\tfor i := len(pod.Status.ContainerStatuses) - 1; i >= 0; i-- {\n\t\t\tcontainer := pod.Status.ContainerStatuses[i]\n\n\t\t\trestarts += int(container.RestartCount)\n\t\t\tif container.State.Waiting != nil && container.State.Waiting.Reason != \"\" {\n\t\t\t\treason = container.State.Waiting.Reason\n\t\t\t} else if container.State.Terminated != nil && container.State.Terminated.Reason != \"\" {\n\t\t\t\treason = container.State.Terminated.Reason\n\t\t\t} else if container.State.Terminated != nil && container.State.Terminated.Reason == \"\" {\n\t\t\t\tif container.State.Terminated.Signal != 0 {\n\t\t\t\t\treason = fmt.Sprintf(\"Signal:%d\", container.State.Terminated.Signal)\n\t\t\t\t} else {\n\t\t\t\t\treason = fmt.Sprintf(\"ExitCode:%d\", container.State.Terminated.ExitCode)\n\t\t\t\t}\n\t\t\t} else if container.Ready && container.State.Running != nil {\n\t\t\t\treadyContainers++\n\t\t\t}\n\t\t}\n\t}\n\n\t// have to copy-paste this const to avoid weird issues with redefining log_dir\n\t// taken from https://godoc.org/k8s.io/kubernetes/pkg/util/node\n\tconst NodeUnreachablePodReason = \"NodeLost\"\n\tif pod.DeletionTimestamp != nil && pod.Status.Reason == NodeUnreachablePodReason {\n\t\treason = \"Unknown\"\n\t} else if pod.DeletionTimestamp != nil {\n\t\treason = \"Terminating\"\n\t}\n\n\treturn reason\n}", "title": "" }, { "docid": "1c6438d042f62c7b5afa6211a9ee0704", "score": "0.5712309", "text": "func podErrors(c *kubernetes.Clientset, pod *v1.Pod, reason, message string) error {\n\tcontainerErrors := []string{\"CrashLoopBackOff\", \"ErrImagePull\"}\n\tfor _, e := range containerErrors {\n\t\tif e == reason {\n\t\t\treturn errors.New(message)\n\t\t}\n\t}\n\n\tevents, err := podEvents(c, pod)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\teventErrors := []string{\"Failed\", \"InspectFailed\", \"ErrImageNeverPull\", \"FailedScheduling\"}\n\tfor _, event := range events.Items {\n\t\tfor _, e := range eventErrors {\n\t\t\tif e == event.Reason {\n\t\t\t\treturn errors.New(event.Message)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "acce108cf9d6e3508f112fd7ccc6c888", "score": "0.56832725", "text": "func PodRunning(e watch.Event) (bool, error) { return podInPhase(e.Object, corev1.PodRunning) }", "title": "" }, { "docid": "c87278064445cc51e3f4cc85980d3eff", "score": "0.5666822", "text": "func podRunning(ctx context.Context, c clientset.Interface, podName, namespace string) wait.ConditionFunc {\n\treturn func() (bool, error) {\n\t\tpod, err := c.CoreV1().Pods(namespace).Get(ctx, podName, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tswitch pod.Status.Phase {\n\t\tcase v1.PodRunning:\n\t\t\treturn true, nil\n\t\tcase v1.PodFailed, v1.PodSucceeded:\n\t\t\treturn false, errPodCompleted\n\t\t}\n\t\treturn false, nil\n\t}\n}", "title": "" }, { "docid": "c124200d1c0d8035f41af5cb68e3772d", "score": "0.5664629", "text": "func IsPodReady(pod corev1.Pod) bool {\n\tconditionsTrue := 0\n\tfor _, cond := range pod.Status.Conditions {\n\t\tif cond.Status == corev1.ConditionTrue && (cond.Type == corev1.ContainersReady || cond.Type == corev1.PodReady) {\n\t\t\tconditionsTrue++\n\t\t}\n\t}\n\treturn conditionsTrue == 2\n}", "title": "" }, { "docid": "8563f16660e048e766283741b7db8aee", "score": "0.5639566", "text": "func podStatusErrorMessages(pod v1.Pod) []string {\n\tresult := []string{}\n\tif isPodStillInitializing(pod) {\n\t\tfor _, container := range pod.Status.InitContainerStatuses {\n\t\t\tresult = append(result, containerStatusErrorMessages(container)...)\n\t\t}\n\t}\n\tfor i := len(pod.Status.ContainerStatuses) - 1; i >= 0; i-- {\n\t\tcontainer := pod.Status.ContainerStatuses[i]\n\t\tresult = append(result, containerStatusErrorMessages(container)...)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "1b71f67d678012ff67198af803d4ec01", "score": "0.560316", "text": "func podRunning(h *helper.H, podName, namespace string) wait.ConditionFunc {\n\treturn func() (bool, error) {\n\t\tpod, err := h.Kube().CoreV1().Pods(namespace).Get(context.TODO(), podName, metav1.GetOptions{})\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tswitch pod.Status.Phase {\n\t\tcase corev1.PodRunning:\n\t\t\treturn true, nil\n\t\tcase corev1.PodFailed, corev1.PodSucceeded:\n\t\t\treturn false, errPodCompleted\n\t\t}\n\t\treturn false, nil\n\t}\n}", "title": "" }, { "docid": "3933bc94b70c9aca1d1ab14c6914bb3f", "score": "0.5579051", "text": "func PodContainerRunning(containerName string) watch.ConditionFunc {\n\treturn func(event watch.Event) (bool, error) {\n\t\tswitch event.Type {\n\t\tcase watch.Deleted:\n\t\t\treturn false, errors.NewNotFound(schema.GroupResource{Resource: \"pods\"}, \"\")\n\t\t}\n\t\tswitch t := event.Object.(type) {\n\t\tcase *corev1.Pod:\n\t\t\tswitch t.Status.Phase {\n\t\t\tcase corev1.PodRunning, corev1.PodPending:\n\t\t\tcase corev1.PodFailed, corev1.PodSucceeded:\n\t\t\t\treturn false, kubectl.ErrPodCompleted\n\t\t\tdefault:\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tfor _, s := range t.Status.ContainerStatuses {\n\t\t\t\tif s.Name != containerName {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif s.State.Terminated != nil {\n\t\t\t\t\treturn false, kubectl.ErrContainerTerminated\n\t\t\t\t}\n\t\t\t\treturn s.State.Running != nil, nil\n\t\t\t}\n\t\t\tfor _, s := range t.Status.InitContainerStatuses {\n\t\t\t\tif s.Name != containerName {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif s.State.Terminated != nil {\n\t\t\t\t\treturn false, kubectl.ErrContainerTerminated\n\t\t\t\t}\n\t\t\t\treturn s.State.Running != nil, nil\n\t\t\t}\n\t\t\treturn false, nil\n\t\t}\n\t\treturn false, nil\n\t}\n}", "title": "" }, { "docid": "b86f15ef2b4607269218811508e23026", "score": "0.55757165", "text": "func IsPodTerminating(pod *core.Pod) bool {\n\treturn IsPodMarkedForDeletion(pod)\n}", "title": "" }, { "docid": "a5211e59ede28ebea24e174cd16d062d", "score": "0.55719316", "text": "func validateCanEvict(pod *v1.Pod, failedPodArgs *RemoveFailedPodsArgs) error {\n\tvar errs []error\n\n\tif failedPodArgs.MinPodLifetimeSeconds != nil {\n\t\tpodAgeSeconds := uint(metav1.Now().Sub(pod.GetCreationTimestamp().Local()).Seconds())\n\t\tif podAgeSeconds < *failedPodArgs.MinPodLifetimeSeconds {\n\t\t\terrs = append(errs, fmt.Errorf(\"pod does not exceed the min age seconds of %d\", *failedPodArgs.MinPodLifetimeSeconds))\n\t\t}\n\t}\n\n\tif len(failedPodArgs.ExcludeOwnerKinds) > 0 {\n\t\townerRefList := podutil.OwnerRef(pod)\n\t\tfor _, owner := range ownerRefList {\n\t\t\tif sets.New(failedPodArgs.ExcludeOwnerKinds...).Has(owner.Kind) {\n\t\t\t\terrs = append(errs, fmt.Errorf(\"pod's owner kind of %s is excluded\", owner.Kind))\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(failedPodArgs.Reasons) > 0 {\n\t\treasons := getFailedContainerStatusReasons(pod.Status.ContainerStatuses)\n\n\t\tif pod.Status.Phase == v1.PodFailed && pod.Status.Reason != \"\" {\n\t\t\treasons = append(reasons, pod.Status.Reason)\n\t\t}\n\n\t\tif failedPodArgs.IncludingInitContainers {\n\t\t\treasons = append(reasons, getFailedContainerStatusReasons(pod.Status.InitContainerStatuses)...)\n\t\t}\n\n\t\tif !sets.New(failedPodArgs.Reasons...).HasAny(reasons...) {\n\t\t\terrs = append(errs, fmt.Errorf(\"pod does not match any of the reasons\"))\n\t\t}\n\t}\n\n\treturn utilerrors.NewAggregate(errs)\n}", "title": "" }, { "docid": "6de7656fb172fc45b94f6a6230c9fdbd", "score": "0.5567626", "text": "func (p *podStatusCheck) Run(objects *kube.Objects) ([]checks.Diagnostic, error) {\n\tvar diagnostics []checks.Diagnostic\n\n\tfor _, pod := range objects.Pods.Items {\n\t\tif corev1.PodFailed == pod.Status.Phase || corev1.PodUnknown == pod.Status.Phase {\n\t\t\td := checks.Diagnostic{\n\t\t\t\tSeverity: checks.Warning,\n\t\t\t\tMessage: fmt.Sprintf(\"Unhealthy pod. State: `%s`. Pod state should be `Running`, `Pending` or `Succeeded`.\", pod.Status.Phase),\n\t\t\t\tKind: checks.Pod,\n\t\t\t\tObject: &pod.ObjectMeta,\n\t\t\t\tOwners: pod.ObjectMeta.GetOwnerReferences(),\n\t\t\t}\n\t\t\tdiagnostics = append(diagnostics, d)\n\t\t}\n\t}\n\n\treturn diagnostics, nil\n}", "title": "" }, { "docid": "d7285644a4de7ab21628c97a2fca9b5b", "score": "0.5551082", "text": "func IsJobFailed(j *batchv1.Job) bool {\n\tfor _, c := range j.Status.Conditions {\n\t\tif c.Type == batchv1.JobFailed && c.Status == corev1.ConditionTrue {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "64104056d32099a95ae6dd9989dabe53", "score": "0.5528959", "text": "func checkPodReady(client k8s.Client, podName string) (ready bool, err error) {\n\tvar p *corev1.Pod\n\tif p, err = client.Pod(podName); err != nil {\n\t\treturn false, err\n\t}\n\n\t// Pod has run to completion, either by failing or by succeeding. We don't\n\t// expect any of these to happen, as ETL containers are supposed to constantly\n\t// listen to upcoming requests and never terminate.\n\tswitch p.Status.Phase {\n\tcase corev1.PodFailed, corev1.PodSucceeded:\n\t\treturn false, fmt.Errorf(\n\t\t\t\"pod ran to completion (phase: %s), state message: %q\",\n\t\t\tp.Status.Phase, p.Status.Message,\n\t\t)\n\t}\n\n\tfor _, cond := range p.Status.Conditions {\n\t\tif cond.Type == corev1.PodReady && cond.Status == corev1.ConditionTrue {\n\t\t\treturn true, nil\n\t\t}\n\t}\n\n\treturn false, nil\n}", "title": "" }, { "docid": "f64b4cb6ea829b4ef3d94ed0082fe63e", "score": "0.5506551", "text": "func (i *istioMeshWorkloadScanner) isIstioPod(pod *k8s_core_types.Pod) bool {\n\tfor _, container := range pod.Spec.Containers {\n\t\tif strings.Contains(container.Image, \"istio\") && strings.Contains(container.Image, \"proxy\") {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f64b4cb6ea829b4ef3d94ed0082fe63e", "score": "0.5506551", "text": "func (i *istioMeshWorkloadScanner) isIstioPod(pod *k8s_core_types.Pod) bool {\n\tfor _, container := range pod.Spec.Containers {\n\t\tif strings.Contains(container.Image, \"istio\") && strings.Contains(container.Image, \"proxy\") {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2803f5acf738f101c3bd9b184191546c", "score": "0.54879475", "text": "func (c *Configuration) IsJenkinsTerminating(pod corev1.Pod) bool {\n\treturn pod.ObjectMeta.DeletionTimestamp != nil\n}", "title": "" }, { "docid": "82807256509255a7dc60546b47544753", "score": "0.5477578", "text": "func IsUnitTest(pod *v1.Pod) bool {\n\treturn len(pod.Status.Phase) == 0\n}", "title": "" }, { "docid": "20fea8fa8d2fb6ccb17ab52181a01b9f", "score": "0.5474069", "text": "func PodIsRunning(pod *kapi.Pod) bool {\n\treturn pod.Status.Phase == kapi.PodRunning\n}", "title": "" }, { "docid": "e50aca6f6a7585255477a306efffe366", "score": "0.5465902", "text": "func checkPodsState(workspace *dw.DevWorkspace,\n\tclusterAPI ClusterAPI) (stateMsg string, checkFailure error) {\n\tpodList, err := getPods(workspace, clusterAPI.Client)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tfor _, pod := range podList.Items {\n\t\tfor _, containerStatus := range pod.Status.ContainerStatuses {\n\t\t\tif !checkContainerStatusForFailure(&containerStatus) {\n\t\t\t\treturn fmt.Sprintf(\"Container %s has state %s\", containerStatus.Name, containerStatus.State.Waiting.Reason), nil\n\t\t\t}\n\t\t}\n\t\tfor _, initContainerStatus := range pod.Status.InitContainerStatuses {\n\t\t\tif !checkContainerStatusForFailure(&initContainerStatus) {\n\t\t\t\treturn fmt.Sprintf(\"Init Container %s has state %s\", initContainerStatus.Name, initContainerStatus.State.Waiting.Reason), nil\n\t\t\t}\n\t\t}\n\t\tif msg, err := checkPodEvents(&pod, clusterAPI); err != nil || msg != \"\" {\n\t\t\treturn msg, err\n\t\t}\n\t}\n\treturn \"\", nil\n}", "title": "" }, { "docid": "1ba75e47fded5b9304650a5c7954a0ad", "score": "0.54438007", "text": "func isInitContainerMissing(pod corev1.Pod) bool {\n\tfor _, initContainer := range pod.Spec.InitContainers {\n\t\tif initContainer.Name == initContainerName {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "50b3fd4ac8383b6f631c65f217472c69", "score": "0.54392284", "text": "func isPvcMountedToPod(pvc string, pod *Pod) bool {\n\tif pod.PodStatus == corev1.PodPending {\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "78e8fedd332edd985815ce3a97b49909", "score": "0.5422344", "text": "func IsPodAlive(pod *core.Pod) bool {\n\treturn IsAnyContainerAlive(pod.Status.ContainerStatuses) ||\n\t\tIsAnyContainerAlive(pod.Status.InitContainerStatuses) ||\n\t\tIsAnyContainerAlive(pod.Status.EphemeralContainerStatuses)\n}", "title": "" }, { "docid": "72834d7662c91fe63c2724323424d125", "score": "0.5405263", "text": "func ComputePodsStartupStatus(pods []*corev1.Pod, expected int, isPodUpdated func(*corev1.Pod) bool) PodsStartupStatus {\n\tstartupStatus := PodsStartupStatus{\n\t\tExpected: expected,\n\t}\n\tfor _, p := range pods {\n\t\tif p.DeletionTimestamp != nil {\n\t\t\tstartupStatus.Terminating++\n\t\t\tcontinue\n\t\t}\n\t\tstartupStatus.Created++\n\t\tif p.Status.Phase == corev1.PodRunning {\n\t\t\tready := false\n\t\t\tfor _, c := range p.Status.Conditions {\n\t\t\t\tif c.Type == corev1.PodReady && c.Status == corev1.ConditionTrue {\n\t\t\t\t\tready = true\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tif ready {\n\t\t\t\t// Only count a pod is running when it is also ready.\n\t\t\t\tstartupStatus.Running++\n\t\t\t\tif isPodUpdated == nil || isPodUpdated(p) {\n\t\t\t\t\tstartupStatus.RunningUpdated++\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tstartupStatus.RunningButNotReady++\n\t\t\t}\n\t\t} else if p.Status.Phase == corev1.PodPending {\n\t\t\tif p.Spec.NodeName == \"\" {\n\t\t\t\tstartupStatus.Waiting++\n\t\t\t} else {\n\t\t\t\tstartupStatus.Pending++\n\t\t\t}\n\t\t} else if p.Status.Phase == corev1.PodSucceeded || p.Status.Phase == corev1.PodFailed {\n\t\t\tstartupStatus.Inactive++\n\t\t} else if p.Status.Phase == corev1.PodUnknown {\n\t\t\tstartupStatus.Unknown++\n\t\t}\n\t\tif p.Spec.NodeName != \"\" {\n\t\t\tstartupStatus.Scheduled++\n\t\t}\n\t}\n\treturn startupStatus\n}", "title": "" }, { "docid": "80d08814a31f227a684ecf04c78e84db", "score": "0.540033", "text": "func isPodReady(pod corev1.Pod) bool {\n\tfor _, condition := range pod.Status.Conditions {\n\t\tif condition.Status != corev1.ConditionTrue {\n\t\t\tcontinue\n\t\t}\n\t\tif condition.Type == corev1.PodReady {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "7e43bf7e807bd9950340e4eb63d4a768", "score": "0.53989494", "text": "func TestPodLifeCycle(t *testing.T){\n\n\tnamespaces := []*coreApi.Namespace{\n\t\t//0\n\t\tmakeTestNamespace(namespaceName[3], func(namespace *coreApi.Namespace) {\n\t\t\tnamespace.Labels = map[string]string{\"ns2\":\"ns2\"}\n\t\t}),\n\t}\n\n\tpods := []*coreApi.Pod{\n\t\tmakeTestPod(namespaceName[3], \"pod1\", func(pod *coreApi.Pod) {\n\t\t\tpod.Labels = map[string]string{\"run2\":\"test2\"}\n\t\t\tpod.Status.Conditions = []coreApi.PodCondition{{Type: coreApi.PodReady, Status: coreApi.ConditionFalse}}\n\t\t\tpod.Status.Phase = coreApi.PodSucceeded\n\t\t\tpod.Status.PodIP = \"10.0.0.1\"\n\t\t}),\n\t\tmakeTestPod(namespaceName[3], \"pod2\", func(pod *coreApi.Pod) {\n\t\t\tpod.Labels = map[string]string{\"run2\":\"test2\"}\n\t\t\tpod.Status.Conditions = []coreApi.PodCondition{{Type: coreApi.PodReady, Status: coreApi.ConditionFalse}}\n\t\t\tpod.Status.Phase = coreApi.PodPending\n\t\t\tpod.Status.PodIP = \"10.0.0.2\"\n\t\t}),\n\t\tmakeTestPod(namespaceName[3], \"pod3\", func(pod *coreApi.Pod) {\n\t\t\tpod.Labels = map[string]string{\"run2\":\"test2\"}\n\t\t\tpod.Status.Conditions = []coreApi.PodCondition{{Type: coreApi.PodReady, Status: coreApi.ConditionFalse}}\n\t\t\tpod.Status.Phase = coreApi.PodFailed\n\t\t\tpod.Status.PodIP = \"10.0.0.3\"\n\t\t}),\n\t\tmakeTestPod(namespaceName[3], \"pod4\", func(pod *coreApi.Pod) {\n\t\t\tpod.Labels = map[string]string{\"run2\":\"test2\"}\n\t\t\tpod.Status.Conditions = []coreApi.PodCondition{{Type: coreApi.PodReady, Status: coreApi.ConditionTrue}}\n\t\t\tpod.Status.Phase = coreApi.PodRunning\n\t\t\tpod.Status.PodIP = \"10.0.0.4\"\n\t\t}),\n\t}\n\n\tfnp := NewFakeEnnPolicy(\"10.244.0.0/16\")\n\n\tfnp.OnNamespaceAdd(namespaces[0])\n\tfnp.OnNetworkPolicyAdd(networkPolicies[8])\n\n\tfnp.OnPodAdd(pods[0])\n\tfnp.OnPodAdd(pods[1])\n\tfnp.OnPodAdd(pods[2])\n\tfnp.OnPodAdd(pods[3])\n\n\t// should only pod[3] and pod [1] added into ipset\n\n\txLabel := make(map[string]string)\n\txLabel[\"run2\"] = \"test2\"\n\n\tok := checkPodLabelIPSet(t, fnp, namespaceName[3], \"run2\", \"test2\", \"10.0.0.2\", \"10.0.0.4\")\n\tif !ok{\n\t\tt.Errorf(\"check pod label set %s:%s=%s IPSet fail\", namespaceName[3],\"run2\",\"test2\")\n\t}\n\tok = checkPodXLabelIPSet(t, fnp, namespaceName[3], xLabel, \"10.0.0.2\", \"10.0.0.4\")\n\tif !ok{\n\t\tt.Errorf(\"check pod xLabel set namespace:%s, label:%v IPSet fail\", namespaceName[3], xLabel)\n\t}\n}", "title": "" }, { "docid": "750f058ccdb1ee1223beb7a6001eb4b4", "score": "0.5390759", "text": "func (r *Resources) CleanupTerminatedPods() (util.Interval, error) {\n\tlog := r.log\n\tnextInterval := maxPodInspectorInterval // Large by default, will be made smaller if needed in the rest of the function\n\n\tpods, err := r.context.GetOwnedPods()\n\tif err != nil {\n\t\tlog.Debug().Err(err).Msg(\"Failed to get owned pods\")\n\t\treturn 0, maskAny(err)\n\t}\n\n\t// Update member status from all pods found\n\tstatus, _ := r.context.GetStatus()\n\tfor _, p := range pods {\n\t\tif k8sutil.IsArangoDBImageIDAndVersionPod(p) {\n\t\t\t// Image ID pods are not relevant to inspect here\n\t\t\tcontinue\n\t\t}\n\n\t\t// Check pod state\n\t\tif !(k8sutil.IsPodSucceeded(&p) || k8sutil.IsPodFailed(&p) || k8sutil.IsPodTerminating(&p)) {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Find member status\n\t\tmemberStatus, group, found := status.Members.MemberStatusByPodName(p.GetName())\n\t\tif !found {\n\t\t\tlog.Debug().Str(\"pod\", p.GetName()).Msg(\"no memberstatus found for pod. Performing cleanup\")\n\t\t} else {\n\t\t\t// Check member termination condition\n\t\t\tif !memberStatus.Conditions.IsTrue(api.ConditionTypeTerminated) {\n\t\t\t\tif !group.IsStateless() {\n\t\t\t\t\t// For statefull members, we have to wait for confirmed termination\n\t\t\t\t\tlog.Debug().Str(\"pod\", p.GetName()).Msg(\"Cannot cleanup pod yet, waiting for it to reach terminated state\")\n\t\t\t\t\tnextInterval = nextInterval.ReduceTo(recheckStatefullPodCleanupInterval)\n\t\t\t\t\tcontinue\n\t\t\t\t} else {\n\t\t\t\t\t// If a stateless server does not terminate within a reasonable amount or time, we kill it.\n\t\t\t\t\tt := p.GetDeletionTimestamp()\n\t\t\t\t\tif t == nil || t.Add(statelessTerminationPeriod).After(time.Now()) {\n\t\t\t\t\t\t// Either delete timestamp is not set, or not yet waiting long enough\n\t\t\t\t\t\tnextInterval = nextInterval.ReduceTo(util.Interval(statelessTerminationPeriod))\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Ok, we can delete the pod\n\t\tlog.Debug().Str(\"pod-name\", p.GetName()).Msg(\"Cleanup terminated pod\")\n\t\tif err := r.context.CleanupPod(p); err != nil {\n\t\t\tlog.Warn().Err(err).Str(\"pod-name\", p.GetName()).Msg(\"Failed to cleanup pod\")\n\t\t}\n\t}\n\treturn nextInterval, nil\n}", "title": "" }, { "docid": "52d0e524a70376391a233663658e6525", "score": "0.53833467", "text": "func getPodReadyStatus(u *unstructuredv1.Unstructured) (string, string, error) {\n\tvar pod corev1.Pod\n\terr := runtime.DefaultUnstructuredConverter.FromUnstructured(u.UnstructuredContent(), &pod)\n\tif err != nil {\n\t\treturn \"\", \"\", err\n\t}\n\ttotalContainers := len(pod.Spec.Containers)\n\treadyContainers := 0\n\treason := string(pod.Status.Phase)\n\tif len(pod.Status.Reason) > 0 {\n\t\treason = pod.Status.Reason\n\t}\n\tinitializing := false\n\tfor i := range pod.Status.InitContainerStatuses {\n\t\tcontainer := pod.Status.InitContainerStatuses[i]\n\t\tstate := container.State\n\t\tswitch {\n\t\tcase state.Terminated != nil && state.Terminated.ExitCode == 0:\n\t\t\tcontinue\n\t\tcase state.Terminated != nil && len(state.Terminated.Reason) > 0:\n\t\t\treason = state.Terminated.Reason\n\t\tcase state.Terminated != nil && len(state.Terminated.Reason) == 0 && state.Terminated.Signal != 0:\n\t\t\treason = fmt.Sprintf(\"Signal:%d\", state.Terminated.Signal)\n\t\tcase state.Terminated != nil && len(state.Terminated.Reason) == 0 && state.Terminated.Signal == 0:\n\t\t\treason = fmt.Sprintf(\"ExitCode:%d\", state.Terminated.ExitCode)\n\t\tcase state.Waiting != nil && len(state.Waiting.Reason) > 0 && state.Waiting.Reason != \"PodInitializing\":\n\t\t\treason = state.Waiting.Reason\n\t\tdefault:\n\t\t\treason = fmt.Sprintf(\"%d/%d\", i, len(pod.Spec.InitContainers))\n\t\t}\n\t\treason = fmt.Sprintf(\"Init:%s\", reason)\n\t\tinitializing = true\n\t\tbreak\n\t}\n\tif !initializing {\n\t\thasRunning := false\n\t\tfor i := len(pod.Status.ContainerStatuses) - 1; i >= 0; i-- {\n\t\t\tcontainer := pod.Status.ContainerStatuses[i]\n\t\t\tstate := container.State\n\t\t\tswitch {\n\t\t\tcase state.Terminated != nil && len(state.Terminated.Reason) > 0:\n\t\t\t\treason = state.Terminated.Reason\n\t\t\tcase state.Terminated != nil && len(state.Terminated.Reason) == 0 && state.Terminated.Signal != 0:\n\t\t\t\treason = fmt.Sprintf(\"Signal:%d\", state.Terminated.Signal)\n\t\t\tcase state.Terminated != nil && len(state.Terminated.Reason) == 0 && state.Terminated.Signal == 0:\n\t\t\t\treason = fmt.Sprintf(\"ExitCode:%d\", state.Terminated.ExitCode)\n\t\t\tcase state.Waiting != nil && len(state.Waiting.Reason) > 0:\n\t\t\t\treason = state.Waiting.Reason\n\t\t\tcase state.Running != nil && container.Ready:\n\t\t\t\thasRunning = true\n\t\t\t\treadyContainers++\n\t\t\t}\n\t\t}\n\t\t// change pod status back to \"Running\" if there is at least one container still reporting as \"Running\" status\n\t\tif reason == \"Completed\" && hasRunning {\n\t\t\treason = \"NotReady\"\n\t\t\tfor _, condition := range pod.Status.Conditions {\n\t\t\t\tif condition.Type == corev1.PodReady && condition.Status == corev1.ConditionTrue {\n\t\t\t\t\treason = \"Running\"\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif pod.DeletionTimestamp != nil {\n\t\t// Hardcode \"k8s.io/kubernetes/pkg/util/node.NodeUnreachablePodReason\" as\n\t\t// \"NodeLost\" so we don't need import the entire k8s.io/kubernetes package\n\t\tif pod.Status.Reason == \"NodeLost\" {\n\t\t\treason = \"Unknown\"\n\t\t} else {\n\t\t\treason = \"Terminating\"\n\t\t}\n\t}\n\tready := fmt.Sprintf(\"%d/%d\", readyContainers, totalContainers)\n\n\treturn ready, reason, nil\n}", "title": "" }, { "docid": "dcfd863c1b34c6e442de635a4e1b9164", "score": "0.5369446", "text": "func isRunningOnPod() bool {\n\t_, err := os.Stat(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\")\n\treturn !os.IsNotExist(err)\n}", "title": "" }, { "docid": "2a4054947ea183b3ceb001cacaf8ec2b", "score": "0.5364964", "text": "func (status *StatusManager) CheckCrashLoopBackOffPods(name ClusteredName, selector map[string]string, kind string) []string {\n\thung := []string{}\n\tpods := &v1.PodList{}\n\terr := status.client.ClientFor(name.ClusterName).CRClient().List(context.TODO(), pods, crclient.InNamespace(name.Namespace), crclient.MatchingLabels(selector))\n\tif err != nil {\n\t\tlog.Printf(\"Error getting pods from %s %q: %v\", kind, name.String(), err)\n\t}\n\tfor _, pod := range pods.Items {\n\t\tfor _, container := range pod.Status.ContainerStatuses {\n\t\t\tif container.State.Waiting != nil {\n\t\t\t\tif container.State.Waiting.Reason == \"CrashLoopBackOff\" {\n\t\t\t\t\thung = append(hung, fmt.Sprintf(\"%s %q rollout is not making progress - pod %s is in CrashLoopBackOff State\", kind, name.String(), pod.Name))\n\t\t\t\t\t// we can break once we find at least one container crashing in this pod\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn hung\n}", "title": "" }, { "docid": "77a374ab7e2f7483bd0a8da0dd031549", "score": "0.53605324", "text": "func PodRunning(event watch.Event) (bool, error) {\n\tswitch event.Type {\n\tcase watch.Deleted:\n\t\treturn false, errors.NewNotFound(schema.GroupResource{Resource: \"pods\"}, \"\")\n\t}\n\tswitch t := event.Object.(type) {\n\tcase *v1.Pod:\n\t\tswitch t.Status.Phase {\n\t\tcase v1.PodRunning:\n\t\t\treturn true, nil\n\t\tcase v1.PodFailed, v1.PodSucceeded:\n\t\t\treturn false, ErrPodCompleted\n\t\t}\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "c4984b5834ba4eebb67da8df6507cc3e", "score": "0.53502035", "text": "func (o *IaasDeviceStatus) GetPodOk() (*string, bool) {\n\tif o == nil || o.Pod == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Pod, true\n}", "title": "" }, { "docid": "171b96062a7edb5803f5bd777df4ddba", "score": "0.5348573", "text": "func checkRunningContainers(contents []byte, opts *CliOpts) (bool, int, error) {\n\tvar containers []Container\n\n\terr := json.Unmarshal(contents, &containers)\n\tif err != nil {\n\t\treturn false, 0, err\n\t}\n\n\tisRunning := false\n\tghostCount := 0\n\tfor _, container := range containers {\n\t\tif strings.HasPrefix(container.Image, opts.ImageId+\":\") && strings.HasPrefix(container.Status, \"Up\") {\n\t\t\tisRunning = true\n\t\t} else if strings.Contains(container.Status, \"Ghost\") {\n\t\t\tghostCount += 1\n\t\t}\n\t}\n\treturn isRunning, ghostCount, nil\n}", "title": "" }, { "docid": "93d37a1e4461a7b9914f3532297e7081", "score": "0.5344814", "text": "func AreContainersReady(pod *core.Pod, coreContainers utils.StringList) bool {\n\tcondition := getPodCondition(&pod.Status, core.PodReady)\n\tif condition == nil {\n\t\treturn false\n\t}\n\n\tif condition.Status == core.ConditionTrue {\n\t\treturn true\n\t}\n\n\t// Check if all required containers are running.\n\tfor _, c := range coreContainers {\n\t\tif !IsContainerRunning(pod, c) {\n\t\t\treturn false\n\t\t}\n\t}\n\n\t// From here on all required containers are running, but unready condition must be checked additionally.\n\tswitch condition.Reason {\n\tcase ServerContainerConditionContainersNotReady:\n\t\tunreadyContainers, ok := extractContainerNamesFromConditionMessage(condition.Message)\n\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\n\t\tfor _, c := range coreContainers {\n\t\t\tif unreadyContainers.Has(c) {\n\t\t\t\t// The container is on the list with unready containers.\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ace0e016b61206557891e00fc059e7fb", "score": "0.5344011", "text": "func getStatus(pod v1.Pod) (string, int) {\n\trestarts := 0\n\n\treason := string(pod.Status.Phase)\n\tif pod.Status.Reason != \"\" {\n\t\treason = pod.Status.Reason\n\t}\n\n\tinitializing := false\n\tfor i := range pod.Status.InitContainerStatuses {\n\t\tcontainer := pod.Status.InitContainerStatuses[i]\n\t\trestarts += int(container.RestartCount)\n\t\tswitch {\n\t\tcase container.State.Terminated != nil && container.State.Terminated.ExitCode == 0:\n\t\t\tcontinue\n\t\tcase container.State.Terminated != nil:\n\t\t\t// initialization is failed\n\t\t\tif len(container.State.Terminated.Reason) == 0 {\n\t\t\t\tif container.State.Terminated.Signal != 0 {\n\t\t\t\t\treason = fmt.Sprintf(\"Init:Signal:%d\", container.State.Terminated.Signal)\n\t\t\t\t} else {\n\t\t\t\t\treason = fmt.Sprintf(\"Init:ExitCode:%d\", container.State.Terminated.ExitCode)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\treason = \"Init:\" + container.State.Terminated.Reason\n\t\t\t}\n\t\t\tinitializing = true\n\t\tcase container.State.Waiting != nil && len(container.State.Waiting.Reason) > 0 && container.State.Waiting.Reason != \"PodInitializing\":\n\t\t\treason = \"Init:\" + container.State.Waiting.Reason\n\t\t\tinitializing = true\n\t\tdefault:\n\t\t\treason = fmt.Sprintf(\"Init:%d/%d\", i, len(pod.Spec.InitContainers))\n\t\t\tinitializing = true\n\t\t}\n\t\tbreak\n\t}\n\tif !initializing {\n\t\trestarts = 0\n\t\tfor i := len(pod.Status.ContainerStatuses) - 1; i >= 0; i-- {\n\t\t\tcontainer := pod.Status.ContainerStatuses[i]\n\n\t\t\trestarts += int(container.RestartCount)\n\t\t\tif container.State.Waiting != nil && container.State.Waiting.Reason != \"\" {\n\t\t\t\treason = container.State.Waiting.Reason\n\t\t\t} else if container.State.Terminated != nil && container.State.Terminated.Reason != \"\" {\n\t\t\t\treason = container.State.Terminated.Reason\n\t\t\t} else if container.State.Terminated != nil && container.State.Terminated.Reason == \"\" {\n\t\t\t\tif container.State.Terminated.Signal != 0 {\n\t\t\t\t\treason = fmt.Sprintf(\"Signal:%d\", container.State.Terminated.Signal)\n\t\t\t\t} else {\n\t\t\t\t\treason = fmt.Sprintf(\"ExitCode:%d\", container.State.Terminated.ExitCode)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\treturn reason, restarts\n}", "title": "" }, { "docid": "e5b497542528db8fc095c534989b6fc7", "score": "0.53173816", "text": "func (r *Resources) CleanupTerminatedPods(ctx context.Context) (util.Interval, error) {\n\tlog := r.log.Str(\"section\", \"pod\")\n\tnextInterval := maxPodInspectorInterval // Large by default, will be made smaller if needed in the rest of the function\n\n\t// Update member status from all pods found\n\tstatus := r.context.GetStatus()\n\tif err := r.context.ACS().ForEachHealthyCluster(func(item sutil.ACSItem) error {\n\t\treturn item.Cache().Pod().V1().Iterate(func(pod *core.Pod) error {\n\t\t\tif info.GetPodServerGroup(pod) == api.ServerGroupImageDiscovery {\n\t\t\t\t// Image ID pods are not relevant to inspect here\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// Find member status\n\t\t\tmemberStatus, group, found := status.Members.MemberStatusByPodName(pod.GetName())\n\t\t\tif !found {\n\t\t\t\tlog.Str(\"pod\", pod.GetName()).Debug(\"no memberstatus found for pod. Performing cleanup\")\n\t\t\t} else {\n\t\t\t\tspec := r.context.GetSpec()\n\t\t\t\tcoreContainers := spec.GetCoreContainers(group)\n\t\t\t\tif !(k8sutil.IsPodSucceeded(pod, coreContainers) || k8sutil.IsPodFailed(pod, coreContainers) ||\n\t\t\t\t\tk8sutil.IsPodTerminating(pod)) {\n\t\t\t\t\t// The pod is not being terminated or failed or succeeded.\n\t\t\t\t\treturn nil\n\t\t\t\t}\n\n\t\t\t\t// Check member termination condition\n\t\t\t\tif !memberStatus.Conditions.IsTrue(api.ConditionTypeTerminated) {\n\t\t\t\t\tif !group.IsStateless() {\n\t\t\t\t\t\t// For statefull members, we have to wait for confirmed termination\n\t\t\t\t\t\tlog.Str(\"pod\", pod.GetName()).Debug(\"Cannot cleanup pod yet, waiting for it to reach terminated state\")\n\t\t\t\t\t\tnextInterval = nextInterval.ReduceTo(recheckStatefullPodCleanupInterval)\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t} else {\n\t\t\t\t\t\t// If a stateless server does not terminate within a reasonable amount or time, we kill it.\n\t\t\t\t\t\tt := pod.GetDeletionTimestamp()\n\t\t\t\t\t\tif t == nil || t.Add(statelessTerminationPeriod).After(time.Now()) {\n\t\t\t\t\t\t\t// Either delete timestamp is not set, or not yet waiting long enough\n\t\t\t\t\t\t\tnextInterval = nextInterval.ReduceTo(util.Interval(statelessTerminationPeriod))\n\t\t\t\t\t\t\treturn nil\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// Ok, we can delete the pod\n\t\t\tlog.Str(\"pod-name\", pod.GetName()).Debug(\"Cleanup terminated pod\")\n\n\t\t\toptions := meta.NewDeleteOptions(0)\n\t\t\toptions.Preconditions = meta.NewUIDPreconditions(string(pod.GetUID()))\n\t\t\terr := globals.GetGlobalTimeouts().Kubernetes().RunWithTimeout(ctx, func(ctxChild context.Context) error {\n\t\t\t\treturn item.Cache().Client().Kubernetes().CoreV1().Pods(item.Cache().Namespace()).Delete(ctxChild, pod.GetName(), *options)\n\t\t\t})\n\t\t\tif err != nil && !kerrors.IsNotFound(err) {\n\t\t\t\tlog.Err(err).Str(\"pod\", pod.GetName()).Debug(\"Failed to cleanup pod\")\n\t\t\t\treturn errors.WithStack(err)\n\t\t\t}\n\n\t\t\treturn nil\n\t\t}, podv1.FilterPodsByLabels(k8sutil.LabelsForDeployment(r.context.GetAPIObject().GetName(), \"\")))\n\t}); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn nextInterval, nil\n}", "title": "" }, { "docid": "769c3ce13be015b79471c93894182ddf", "score": "0.530068", "text": "func podRunningReady(p *core.Pod) (bool, error) {\n\t// Check the phase is running.\n\tif p.Status.Phase != core.PodRunning {\n\t\treturn false, fmt.Errorf(\"want pod '%s' on '%s' to be '%v' but was '%v'\",\n\t\t\tp.ObjectMeta.Name, p.Spec.NodeName, core.PodRunning, p.Status.Phase)\n\t}\n\t// Check the ready condition is true.\n\n\tif !isPodReady(p) {\n\t\treturn false, fmt.Errorf(\"pod '%s' on '%s' didn't have condition {%v %v}; conditions: %v\",\n\t\t\tp.ObjectMeta.Name, p.Spec.NodeName, core.PodReady, core.ConditionTrue, p.Status.Conditions)\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "8f922dd614b72570a187b4263194e0f9", "score": "0.5294974", "text": "func IsJobOrNodeFailed(j *batchv1.Job) (bool, bool) {\n\t// Get the node name from job spec.\n\tnodeName := j.Spec.Template.Spec.NodeName\n\tif nodeName != \"\" {\n\t\terr := core.Instance().IsNodeReady(nodeName)\n\t\tif err != nil {\n\t\t\treturn false, true\n\t\t}\n\t}\n\tfor _, c := range j.Status.Conditions {\n\t\tif c.Type == batchv1.JobFailed && c.Status == corev1.ConditionTrue {\n\t\t\treturn true, false\n\t\t}\n\t}\n\treturn false, false\n}", "title": "" }, { "docid": "d9b5fe731fb50328a3ddc103796134c1", "score": "0.52940744", "text": "func TestGenerateAPIPodStatusWithDifferentRestartPolicies(t *testing.T) {\n\ttestErrorReason := fmt.Errorf(\"test-error\")\n\temptyContainerID := (&kubecontainer.ContainerID{}).String()\n\ttestKubelet := newTestKubelet(t, false /* controllerAttachDetachEnabled */)\n\tdefer testKubelet.Cleanup()\n\tkubelet := testKubelet.kubelet\n\tpod := podWithUIDNameNs(\"12345678\", \"foo\", \"new\")\n\tcontainers := []v1.Container{{Name: \"succeed\"}, {Name: \"failed\"}}\n\tpodStatus := &kubecontainer.PodStatus{\n\t\tID: pod.UID,\n\t\tName: pod.Name,\n\t\tNamespace: pod.Namespace,\n\t\tContainerStatuses: []*kubecontainer.Status{\n\t\t\t{\n\t\t\t\tName: \"succeed\",\n\t\t\t\tState: kubecontainer.ContainerStateExited,\n\t\t\t\tExitCode: 0,\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"failed\",\n\t\t\t\tState: kubecontainer.ContainerStateExited,\n\t\t\t\tExitCode: 1,\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"succeed\",\n\t\t\t\tState: kubecontainer.ContainerStateExited,\n\t\t\t\tExitCode: 2,\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"failed\",\n\t\t\t\tState: kubecontainer.ContainerStateExited,\n\t\t\t\tExitCode: 3,\n\t\t\t},\n\t\t},\n\t}\n\tkubelet.reasonCache.add(pod.UID, \"succeed\", testErrorReason, \"\")\n\tkubelet.reasonCache.add(pod.UID, \"failed\", testErrorReason, \"\")\n\tfor c, test := range []struct {\n\t\trestartPolicy v1.RestartPolicy\n\t\texpectedState map[string]v1.ContainerState\n\t\texpectedLastTerminationState map[string]v1.ContainerState\n\t\t// Only set expectedInitState when it is different from expectedState\n\t\texpectedInitState map[string]v1.ContainerState\n\t\t// Only set expectedInitLastTerminationState when it is different from expectedLastTerminationState\n\t\texpectedInitLastTerminationState map[string]v1.ContainerState\n\t}{\n\t\t{\n\t\t\trestartPolicy: v1.RestartPolicyNever,\n\t\t\texpectedState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 0,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 1,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t},\n\t\t\texpectedLastTerminationState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 2,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 3,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\trestartPolicy: v1.RestartPolicyOnFailure,\n\t\t\texpectedState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 0,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Waiting: &v1.ContainerStateWaiting{Reason: testErrorReason.Error()}},\n\t\t\t},\n\t\t\texpectedLastTerminationState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 2,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 1,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\trestartPolicy: v1.RestartPolicyAlways,\n\t\t\texpectedState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Waiting: &v1.ContainerStateWaiting{Reason: testErrorReason.Error()}},\n\t\t\t\t\"failed\": {Waiting: &v1.ContainerStateWaiting{Reason: testErrorReason.Error()}},\n\t\t\t},\n\t\t\texpectedLastTerminationState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 0,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 1,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t},\n\t\t\t// If the init container is terminated with exit code 0, it won't be restarted even when the\n\t\t\t// restart policy is RestartAlways.\n\t\t\texpectedInitState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 0,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Waiting: &v1.ContainerStateWaiting{Reason: testErrorReason.Error()}},\n\t\t\t},\n\t\t\texpectedInitLastTerminationState: map[string]v1.ContainerState{\n\t\t\t\t\"succeed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 2,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t\t\"failed\": {Terminated: &v1.ContainerStateTerminated{\n\t\t\t\t\tExitCode: 1,\n\t\t\t\t\tContainerID: emptyContainerID,\n\t\t\t\t}},\n\t\t\t},\n\t\t},\n\t} {\n\t\tpod.Spec.RestartPolicy = test.restartPolicy\n\t\t// Test normal containers\n\t\tpod.Spec.Containers = containers\n\t\tapiStatus := kubelet.generateAPIPodStatus(pod, podStatus, false)\n\t\texpectedState, expectedLastTerminationState := test.expectedState, test.expectedLastTerminationState\n\t\tverifyContainerStatuses(t, apiStatus.ContainerStatuses, expectedState, expectedLastTerminationState, fmt.Sprintf(\"case %d\", c))\n\t\tpod.Spec.Containers = nil\n\n\t\t// Test init containers\n\t\tpod.Spec.InitContainers = containers\n\t\tapiStatus = kubelet.generateAPIPodStatus(pod, podStatus, false)\n\t\tif test.expectedInitState != nil {\n\t\t\texpectedState = test.expectedInitState\n\t\t}\n\t\tif test.expectedInitLastTerminationState != nil {\n\t\t\texpectedLastTerminationState = test.expectedInitLastTerminationState\n\t\t}\n\t\tverifyContainerStatuses(t, apiStatus.InitContainerStatuses, expectedState, expectedLastTerminationState, fmt.Sprintf(\"case %d\", c))\n\t\tpod.Spec.InitContainers = nil\n\t}\n}", "title": "" }, { "docid": "e617032b22e4653f00691ba5b69d913b", "score": "0.5281369", "text": "func TestToKubeContainerStatus(t *testing.T) {\n\tcid := &kubecontainer.ContainerID{Type: \"testRuntime\", ID: \"dummyid\"}\n\tmeta := &runtimeapi.ContainerMetadata{Name: \"cname\", Attempt: 3}\n\timageSpec := &runtimeapi.ImageSpec{Image: \"fimage\"}\n\tvar (\n\t\tcreatedAt int64 = 327\n\t\tstartedAt int64 = 999\n\t\tfinishedAt int64 = 1278\n\t)\n\n\tfor desc, test := range map[string]struct {\n\t\tinput *runtimeapi.ContainerStatus\n\t\texpected *kubecontainer.Status\n\t}{\n\t\t\"created container\": {\n\t\t\tinput: &runtimeapi.ContainerStatus{\n\t\t\t\tId: cid.ID,\n\t\t\t\tMetadata: meta,\n\t\t\t\tImage: imageSpec,\n\t\t\t\tState: runtimeapi.ContainerState_CONTAINER_CREATED,\n\t\t\t\tCreatedAt: createdAt,\n\t\t\t},\n\t\t\texpected: &kubecontainer.Status{\n\t\t\t\tID: *cid,\n\t\t\t\tImage: imageSpec.Image,\n\t\t\t\tState: kubecontainer.ContainerStateCreated,\n\t\t\t\tCreatedAt: time.Unix(0, createdAt),\n\t\t\t},\n\t\t},\n\t\t\"running container\": {\n\t\t\tinput: &runtimeapi.ContainerStatus{\n\t\t\t\tId: cid.ID,\n\t\t\t\tMetadata: meta,\n\t\t\t\tImage: imageSpec,\n\t\t\t\tState: runtimeapi.ContainerState_CONTAINER_RUNNING,\n\t\t\t\tCreatedAt: createdAt,\n\t\t\t\tStartedAt: startedAt,\n\t\t\t},\n\t\t\texpected: &kubecontainer.Status{\n\t\t\t\tID: *cid,\n\t\t\t\tImage: imageSpec.Image,\n\t\t\t\tState: kubecontainer.ContainerStateRunning,\n\t\t\t\tCreatedAt: time.Unix(0, createdAt),\n\t\t\t\tStartedAt: time.Unix(0, startedAt),\n\t\t\t},\n\t\t},\n\t\t\"exited container\": {\n\t\t\tinput: &runtimeapi.ContainerStatus{\n\t\t\t\tId: cid.ID,\n\t\t\t\tMetadata: meta,\n\t\t\t\tImage: imageSpec,\n\t\t\t\tState: runtimeapi.ContainerState_CONTAINER_EXITED,\n\t\t\t\tCreatedAt: createdAt,\n\t\t\t\tStartedAt: startedAt,\n\t\t\t\tFinishedAt: finishedAt,\n\t\t\t\tExitCode: int32(121),\n\t\t\t\tReason: \"GotKilled\",\n\t\t\t\tMessage: \"The container was killed\",\n\t\t\t},\n\t\t\texpected: &kubecontainer.Status{\n\t\t\t\tID: *cid,\n\t\t\t\tImage: imageSpec.Image,\n\t\t\t\tState: kubecontainer.ContainerStateExited,\n\t\t\t\tCreatedAt: time.Unix(0, createdAt),\n\t\t\t\tStartedAt: time.Unix(0, startedAt),\n\t\t\t\tFinishedAt: time.Unix(0, finishedAt),\n\t\t\t\tExitCode: 121,\n\t\t\t\tReason: \"GotKilled\",\n\t\t\t\tMessage: \"The container was killed\",\n\t\t\t},\n\t\t},\n\t\t\"unknown container\": {\n\t\t\tinput: &runtimeapi.ContainerStatus{\n\t\t\t\tId: cid.ID,\n\t\t\t\tMetadata: meta,\n\t\t\t\tImage: imageSpec,\n\t\t\t\tState: runtimeapi.ContainerState_CONTAINER_UNKNOWN,\n\t\t\t\tCreatedAt: createdAt,\n\t\t\t\tStartedAt: startedAt,\n\t\t\t},\n\t\t\texpected: &kubecontainer.Status{\n\t\t\t\tID: *cid,\n\t\t\t\tImage: imageSpec.Image,\n\t\t\t\tState: kubecontainer.ContainerStateUnknown,\n\t\t\t\tCreatedAt: time.Unix(0, createdAt),\n\t\t\t\tStartedAt: time.Unix(0, startedAt),\n\t\t\t},\n\t\t},\n\t} {\n\t\tactual := toKubeContainerStatus(test.input, cid.Type)\n\t\tassert.Equal(t, test.expected, actual, desc)\n\t}\n}", "title": "" }, { "docid": "02d57d12ca7e0677c8c5b144220ae3b3", "score": "0.5277439", "text": "func isPrivileged(pod *v1.Pod) bool {\n\tfor _, c := range pod.Spec.InitContainers {\n\t\tif c.SecurityContext == nil || c.SecurityContext.Privileged == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif *c.SecurityContext.Privileged {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor _, c := range pod.Spec.Containers {\n\t\tif c.SecurityContext == nil || c.SecurityContext.Privileged == nil {\n\t\t\tcontinue\n\t\t}\n\t\tif *c.SecurityContext.Privileged {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "3ec4a2ba972cf6bf589eb55463b74d48", "score": "0.52735466", "text": "func IsPodReady(pod *Pod) bool {\n\t// static pods are always reported as Pending, so we make an exception there\n\tif pod.Status.Phase == \"Pending\" && isPodStatic(pod) {\n\t\treturn true\n\t}\n\n\tif pod.Status.Phase != \"Running\" {\n\t\treturn false\n\t}\n\n\tif tolerate, ok := pod.Metadata.Annotations[unreadyAnnotation]; ok && tolerate == \"true\" {\n\t\treturn true\n\t}\n\tfor _, status := range pod.Status.Conditions {\n\t\tif status.Type == \"Ready\" && status.Status == \"True\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c5e454183acda2e6d444f19e02050807", "score": "0.5262924", "text": "func podReady(p *corev1.Pod) bool {\n\tfor _, cond := range p.Status.Conditions {\n\t\tif cond.Type == corev1.PodReady {\n\t\t\treturn cond.Status == corev1.ConditionTrue\n\t\t}\n\t}\n\t// No ready status, probably not even running.\n\treturn false\n}", "title": "" }, { "docid": "22c029a12a2ba053d800e927f42fcf00", "score": "0.525889", "text": "func (c *common) Failed() bool {\n\tfailed := c.failed\n\treturn failed\n}", "title": "" }, { "docid": "ee0e6e248e4b7e14df60b77121275d13", "score": "0.52576876", "text": "func (c *ContainerStatus) IsTerminated() bool {\n\treturn c.State.Terminated != nil\n}", "title": "" }, { "docid": "ff557c5ed73d1faf8655e81d1c9263b5", "score": "0.52434784", "text": "func IsPodRunningEventually(namespace, podName string) bool {\n\treturn gomega.Eventually(func() bool {\n\t\tp, err := PodClient.\n\t\t\tWithNamespace(namespace).\n\t\t\tGet(podName, metav1.GetOptions{})\n\t\tgomega.Expect(err).ShouldNot(gomega.HaveOccurred())\n\t\treturn pod.NewForAPIObject(p).\n\t\t\tIsRunning()\n\t},\n\t\t60, 5).\n\t\tShould(gomega.BeTrue())\n}", "title": "" }, { "docid": "71f9126faa65b1b703dec12424880dd3", "score": "0.52384627", "text": "func (c *controller) PodTerminated(executionID, node string, phase corev1.PodPhase) error {\n\tp, err := c.podForID(executionID, node)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif p.terminated != nil {\n\t\treturn nil\n\t}\n\tc.addProgress(1)\n\tt := time.Now()\n\tp.terminated = &t\n\tp.status = string(phase)\n\tc.prom.Duration(node, executionID, float64(t.Sub(p.started).Milliseconds()))\n\n\tl := c.log.WithValues(\n\t\t\"result \", phase,\n\t\t\"node\", node,\n\t\t\"reports\", p.reportReceived != nil,\n\t\t\"progress\", c.getProgress(),\n\t)\n\n\t// if not successful or not report received report an error\n\tif phase != corev1.PodSucceeded || p.reportReceived == nil {\n\n\t\tmsg := \"pod was not successful\"\n\t\tif p.reportReceived == nil {\n\t\t\tmsg = \"did not receive report\"\n\t\t}\n\t\tc.prom.ProcessingFinished(node, executionID, true)\n\t\tl.Info(msg)\n\t} else {\n\t\tl.Info(\"pod successful\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b4478909e2aa3bb63887a50a09452e3f", "score": "0.5224182", "text": "func IsPodReady(pod *core.Pod) (ready bool, reason string) {\n\tif pod.Status.Phase != core.PodRunning {\n\t\treturn false, fmt.Sprintf(\"pod %q in %q namespace is not Running: %+v\", pod.Name, pod.Namespace, pod.Status)\n\t}\n\tfor _, c := range pod.Status.Conditions {\n\t\tif c.Type == core.PodReady {\n\t\t\tif c.Status != core.ConditionTrue {\n\t\t\t\treturn false, fmt.Sprintf(\"pod %q in %q namespace is not Ready: %+v\", pod.Name, pod.Namespace, c)\n\t\t\t}\n\t\t\treturn true, fmt.Sprintf(\"pod %q in %q namespace is Ready: %+v\", pod.Name, pod.Namespace, c)\n\t\t}\n\t}\n\treturn false, fmt.Sprintf(\"pod %q in %q namespace does not have %q status: %+v\", pod.Name, pod.Namespace, core.PodReady, pod.Status)\n}", "title": "" }, { "docid": "a68598c9765ebd781dbd433ffebc2ea1", "score": "0.5216721", "text": "func (s *podsStatusState) waitingOnPods() bool {\n\treturn (s.readyCount < s.expectedRunningPods || s.notReadyCount > 0) && !s.havePodsWithContainerStateWaitingErrors()\n}", "title": "" }, { "docid": "50ae19db109feed1753c694af6a20d46", "score": "0.52091956", "text": "func isTerminating(pod apiv1.Pod) bool {\n\treturn pod.DeletionTimestamp != nil\n}", "title": "" }, { "docid": "fc2d0b87b069092f5b40759be6f52040", "score": "0.52091205", "text": "func podRunningReady(p *v1.Pod) (bool, error) {\n\t// Check the phase is running.\n\tif p.Status.Phase != v1.PodRunning {\n\t\treturn false, fmt.Errorf(\"want pod '%s' on '%s' to be '%v' but was '%v'\",\n\t\t\tp.ObjectMeta.Name, p.Spec.NodeName, v1.PodRunning, p.Status.Phase)\n\t}\n\t// Check the ready condition is true.\n\tif !podReady(p) {\n\t\treturn false, fmt.Errorf(\"pod '%s' on '%s' didn't have condition {%v %v}; conditions: %v\",\n\t\t\tp.ObjectMeta.Name, p.Spec.NodeName, v1.PodReady, v1.ConditionTrue, p.Status.Conditions)\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "3aad487e774d9f8de2d14488ff55af06", "score": "0.52059925", "text": "func IsPodReady(pod *corev1.Pod) bool {\n\tfor _, c := range pod.Status.Conditions {\n\t\tif c.Type == corev1.PodReady && c.Status == corev1.ConditionTrue {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "022f7707281e0ed5061833ccbe98ef20", "score": "0.52047354", "text": "func (p *Pod) Stop() error {\n\tif p.isStopped {\n\t\treturn nil\n\t}\n\n\tfor _, c := range p.containers {\n\t\terr := c.Stop(0)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not stop container %s: %v\", c.ID(), err)\n\t\t}\n\t}\n\n\terr := p.terminate(false)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not stop pod process: %v\", err)\n\t}\n\tif err := p.UpdateState(); err != nil {\n\t\treturn fmt.Errorf(\"could not update container state: %v\", err)\n\t}\n\tp.isStopped = true\n\treturn err\n}", "title": "" }, { "docid": "219c8ffc2b9a3a74e6ba67c0d2fe4fdf", "score": "0.51798195", "text": "func (dsc *Checker) cleanupOrphanedPods() error {\n\tpods, err := dsc.getAllPods()\n\tif err != nil {\n\t\tlog.Errorln(\"Error fetching pods:\", err)\n\t\treturn err\n\t}\n\n\t// loop on all the daemonsets and ensure that daemonset's creating pod exists and that the pods are not from an older run\n\t// if the creating pod does not exist, then we delete the daemonset.\n\tfor _, p := range pods {\n\t\tlog.Infoln(\"Checking if pod is orphaned:\", p.Name, \"creatingInstance:\", p.Labels[\"creatingInstance\"], \"checkRunTime:\", CheckRunTime)\n\n\t\t// fetch the creatingInstance label\n\t\tcreatingDSInstance := p.Labels[\"app\"]\n\n\t\t// if there isnt a creatingInstance label, we assume its an old generation and remove it.\n\t\tif len(creatingDSInstance) == 0 {\n\t\t\tlog.Warningln(\"Unable to find app label on pod\", p.Name, \"assuming orphaned and removing!\")\n\t\t\terr := dsc.deletePod(p.Name)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warningln(\"error when removing orphaned pod due to missing label\", p.Name+\": \", err)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\t// check if the creatingInstance exists\n\t\texists := dsc.checkIfDSExists(creatingDSInstance)\n\n\t\t// if the owning kuberhealthy pod of the DS does not exist, then we delete the daemonset\n\t\tif !exists {\n\t\t\tlog.Infoln(\"Removing orphaned pod\", p.Name, \"because kuberhealthy ds\", creatingDSInstance, \"does not exist\")\n\t\t\terr := dsc.deletePod(p.Name)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warningln(\"error when removing orphaned pod\", p.Name+\": \", err)\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\t// Check that the pod isn't from an older run\n\t\tpodCheckRunTime, err := strconv.ParseInt(p.Labels[\"checkRunTime\"], 10, 64)\n\t\tif err != nil {\n\t\t\tlog.Errorln(\"Error converting pod checkRunTime:\", podCheckRunTime, \"label to int:\", err)\n\t\t}\n\n\t\tif podCheckRunTime < CheckRunTime {\n\t\t\tlog.Warningln(\"Pod:\", p.Name, \"has an older checkRunTime than the current daemonset running. This is a rogue pod, removing now.\")\n\t\t\terr := dsc.deletePod(p.Name)\n\t\t\tif err != nil {\n\t\t\t\tlog.Warningln(\"error when removing rogue pod:\", p.Name+\": \", err)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5688871a2a846eb7914040911675fa7", "score": "0.5174136", "text": "func PodSandboxExited(p *corev1.Pod) bool {\n\tswitch p.Status.Phase {\n\tcase corev1.PodSucceeded, corev1.PodFailed:\n\t\treturn true\n\tdefault:\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "91eca645233bfb5e7dcfc35892c723a5", "score": "0.5172822", "text": "func podListHasNumPods(numPods int) func(pl *corev1.PodList) error {\n\treturn func(pl *corev1.PodList) error {\n\t\tvar runningPods int\n\t\tfor _, p := range pl.Items {\n\t\t\tif p.Status.Phase == corev1.PodRunning {\n\t\t\t\trunningPods++\n\t\t\t}\n\t\t}\n\t\tif runningPods != numPods {\n\t\t\treturn errors.Errorf(\"expected %d Running pods, got %d\", numPods, runningPods)\n\t\t}\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "637d6fcc05d676921d1978c4bcfaee53", "score": "0.5170126", "text": "func (c *AppStack) IsFailed() (failed bool, err error) {\n\tstatus, err := c.GetStatus()\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tfailed = status == Failed\n\treturn\n}", "title": "" }, { "docid": "92ef3432920b6ee65750c4df38bf2f54", "score": "0.51588947", "text": "func PodCompleted(event watch.Event) (bool, error) {\n\tswitch event.Type {\n\tcase watch.Deleted:\n\t\treturn false, errors.NewNotFound(schema.GroupResource{Resource: \"pods\"}, \"\")\n\t}\n\tswitch t := event.Object.(type) {\n\tcase *v1.Pod:\n\t\tswitch t.Status.Phase {\n\t\tcase v1.PodFailed, v1.PodSucceeded:\n\t\t\treturn true, nil\n\t\t}\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "16621d19bb6877adc003fca99ad7cba6", "score": "0.5152192", "text": "func isOperationFailed(status OperationStatus) bool {\n\treturn hasOperationCondition(status, OperationFailed)\n}", "title": "" }, { "docid": "14663a9f0bcfafae4ce281b3645ef665", "score": "0.514877", "text": "func getExitCode(dockerCli *client.DockerCli, ctx context.Context, containerID string) (bool, int, error) {\n\tc, err := dockerCli.Client().ContainerInspect(ctx, containerID)\n\tif err != nil {\n\t\t// If we can't connect, then the daemon probably died.\n\t\tif err != clientapi.ErrConnectionFailed {\n\t\t\treturn false, -1, err\n\t\t}\n\t\treturn false, -1, nil\n\t}\n\treturn c.State.Running, c.State.ExitCode, nil\n}", "title": "" }, { "docid": "e7f37357e6b21e839df63e86b745fe09", "score": "0.51329905", "text": "func NotReadyPodContainerStatus(pod corev1.Pod) []types.ContainerStatus {\n\tstatuses := []types.ContainerStatus{}\n\tfor _, containerStatus := range pod.Status.ContainerStatuses {\n\t\tif !containerStatus.Ready {\n\t\t\tstatuses = append(\n\t\t\t\tstatuses,\n\t\t\t\ttypes.ContainerStatus{\n\t\t\t\t\tName: containerStatus.Name,\n\t\t\t\t\tReady: false,\n\t\t\t\t},\n\t\t\t)\n\n\t\t}\n\t}\n\n\treturn statuses\n}", "title": "" }, { "docid": "4c42c1034b0fe90518bc0db4cdd940cc", "score": "0.5131663", "text": "func (p Package) TestMainFailed() bool {\n\treturn p.action == ActionFail && len(p.Failed) == 0\n}", "title": "" }, { "docid": "9ebe549385ec57aae495e21a57a0268f", "score": "0.5125627", "text": "func comparePods(got, want *types.Pod) bool {\n\tresult := false\n\tif compareMeta(got.Meta.Meta, want.Meta.Meta) &&\n\t\t(got.Meta.Namespace == want.Meta.Namespace) &&\n\t\t(got.Meta.Deployment == want.Meta.Deployment) &&\n\t\t(got.Meta.Service == want.Meta.Service) &&\n\t\t(got.Meta.Node == want.Meta.Node) &&\n\t\t(got.Meta.Status == want.Meta.Status) &&\n\t\t(got.Meta.Endpoint == want.Meta.Endpoint) &&\n\t\treflect.DeepEqual(got.Status, want.Status) &&\n\t\treflect.DeepEqual(got.Spec, want.Spec) {\n\t\tresult = true\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "259d973cd02573083e0b709f560f7fd9", "score": "0.5124725", "text": "func (c converter) isReadyCalicoPod(pod *kapiv1.Pod) bool {\n\tif c.isHostNetworked(pod) {\n\t\tlog.WithField(\"pod\", pod.Name).Debug(\"Pod is host networked.\")\n\t\treturn false\n\t} else if !c.hasIPAddress(pod) {\n\t\tlog.WithField(\"pod\", pod.Name).Debug(\"Pod does not have an IP address.\")\n\t\treturn false\n\t} else if !c.isScheduled(pod) {\n\t\tlog.WithField(\"pod\", pod.Name).Debug(\"Pod is not scheduled.\")\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "653654a3774a7f2551fa30ddf44e4b43", "score": "0.5112553", "text": "func (n *Namespace) IsPod() bool {\n\treturn n.NSMode == FromPod\n}", "title": "" }, { "docid": "cbf3f0b51ead78d76b70ad4b81212ccd", "score": "0.51095134", "text": "func (manager *ProjectUpdateManager) Failed() bool {\n\treturn manager.stage.Failed\n}", "title": "" }, { "docid": "c06ad59809b585690f56b9cbbbcf98ed", "score": "0.5106899", "text": "func (r *Result) Failed() bool {\n\tif r.Msg != \"\" {\n\t\treturn true\n\t}\n\tfor _, p := range r.Packages {\n\t\tif p.Failed() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a3ac3bab56db2a9286c5a80c7071a9c9", "score": "0.51048535", "text": "func rollingUpdateComplete(statuses map[string]bool, oldPodNames []string) bool {\n\n\t// Should be looking at pod and pod names NOT containers.\n\tpodList, err := client.CoreV1().Pods(checkNamespace).List(metav1.ListOptions{\n\t\t// FieldSelector: \"metadata.name=\" + checkDeploymentName,\n\t\tLabelSelector: defaultLabelKey + \"=\" + defaultLabelValueBase + strconv.Itoa(int(now.Unix())),\n\t})\n\tif err != nil {\n\t\tlog.Errorln(\"failed to list pods:\", err)\n\t\treturn false\n\t}\n\n\t// Look at each pod and see if the deployment update is complete.\n\tfor _, pod := range podList.Items {\n\t\tif containsString(pod.Name, oldPodNames) {\n\t\t\tlog.Debugln(\"Skipping\", pod.Name, \"because it was found in the blacklist.\")\n\t\t\tcontinue\n\t\t}\n\n\t\t// If the container in the pod has the correct image, add it to the status map.\n\t\tfor _, container := range pod.Spec.Containers {\n\t\t\tif container.Image == checkImageURLB {\n\t\t\t\tif _, ok := statuses[pod.Name]; !ok {\n\t\t\t\t\tstatuses[pod.Name] = false\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Check the pod conditions to see if it has finished the rolling-update.\n\t\tfor _, condition := range pod.Status.Conditions {\n\t\t\tif condition.Type == corev1.PodReady && condition.Status == corev1.ConditionTrue {\n\t\t\t\tif !statuses[pod.Name] {\n\t\t\t\t\tlog.Debugln(\"Setting status for\", pod.Name, \"to true.\")\n\t\t\t\t\tstatuses[pod.Name] = true\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tvar count int\n\tfor _, status := range statuses {\n\t\tif status {\n\t\t\tcount++\n\t\t}\n\t}\n\tlog.Infoln(count, \"/\", checkDeploymentReplicas, \"pods have been rolled.\")\n\n\t// Only return true if ALL pods are up.\n\treturn count == checkDeploymentReplicas\n}", "title": "" }, { "docid": "3460e0611178214e76e9c392affbfcb7", "score": "0.50903016", "text": "func IsBuildPod(a admission.Attributes) bool {\n\tif a.GetResource().GroupResource() != kapi.Resource(\"pods\") {\n\t\treturn false\n\t}\n\tif len(a.GetSubresource()) != 0 {\n\t\treturn false\n\t}\n\tpod, err := GetPod(a)\n\tif err != nil {\n\t\treturn false\n\t}\n\treturn hasBuildAnnotation(pod) && hasBuildEnvVar(pod)\n}", "title": "" }, { "docid": "e923d2d7738d23515579d3b638bd1cac", "score": "0.5086681", "text": "func execPodmanImageExists(image string) (bool, error) {\n\texistsArgs := []string{\"image\", \"exists\", image}\n\n\texistsCmd := exec.Command(\"podman\", existsArgs...)\n\n\tif err := existsCmd.Run(); err != nil {\n\t\tif exitError, ok := err.(*exec.ExitError); ok {\n\t\t\tswitch exitCode := exitError.ExitCode(); exitCode {\n\t\t\tcase 1:\n\t\t\t\treturn false, nil\n\t\t\tdefault:\n\t\t\t\treturn false, errors.New(\"unable to access local image store\")\n\t\t\t}\n\t\t}\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "9cf1dab333d68cde182180ba1cbc9d28", "score": "0.5086323", "text": "func waitForPodDeletion(c *Cluster, pod v1.Pod) error {\n\treturn wait.PollImmediate(2*time.Second, time.Minute, func() (bool, error) {\n\t\texistingPod, err := c.cs.CoreV1().Pods(pod.Namespace).Get(context.Background(), pod.Name, metav1.GetOptions{})\n\t\tif apierrors.IsNotFound(err) {\n\t\t\treturn true, nil // done\n\t\t}\n\t\tif err != nil {\n\t\t\treturn true, err // stop wait with error\n\t\t}\n\t\tif pod.UID != existingPod.UID {\n\t\t\treturn true, nil // also done (pod was restarted)\n\t\t}\n\t\treturn false, nil\n\t})\n}", "title": "" }, { "docid": "bf9d1e908532a0cf79163e7a71b762b0", "score": "0.5083562", "text": "func (p *Pod) Status() (map[string]define.ContainerStatus, error) {\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\n\tif !p.valid {\n\t\treturn nil, define.ErrPodRemoved\n\t}\n\tallCtrs, err := p.runtime.state.PodContainers(p)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tnoInitCtrs := make([]*Container, 0)\n\t// Do not add init containers into status\n\tfor _, ctr := range allCtrs {\n\t\tif ctrType := ctr.config.InitContainerType; len(ctrType) < 1 {\n\t\t\tnoInitCtrs = append(noInitCtrs, ctr)\n\t\t}\n\t}\n\treturn containerStatusFromContainers(noInitCtrs)\n}", "title": "" }, { "docid": "7af20116cf3b7db0a1b56391cea91ed9", "score": "0.5079277", "text": "func isPodOrSimilar(gk schema.GroupKind) bool {\n\treturn gk == gkPod ||\n\t\tgk == gkJob ||\n\t\tgk == gkDeployment ||\n\t\tgk == gkDaemonSet ||\n\t\tgk == gkStatefulSet\n}", "title": "" }, { "docid": "53302768d7d629d83dae81e510efd725", "score": "0.5076214", "text": "func IsPodUnschedulable(pod *corev1.Pod) bool {\n\tfor _, condition := range pod.Status.Conditions {\n\t\tif condition.Reason == corev1.PodReasonUnschedulable && \n\t\t\tcondition.Type == corev1.PodScheduled &&\n\t\t\tcondition.Status == corev1.ConditionFalse {\n\t\t\t\treturn true\n\t\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "ad45d4835c0945919fcc9971515c42be", "score": "0.5075636", "text": "func PodRunningAndReady(pod v1.Pod) (bool, error) {\n\tswitch pod.Status.Phase {\n\tcase v1.PodFailed, v1.PodSucceeded:\n\t\treturn false, fmt.Errorf(\"pod completed\")\n\tcase v1.PodRunning:\n\t\tfor _, cond := range pod.Status.Conditions {\n\t\t\tif cond.Type != v1.PodReady {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\treturn cond.Status == v1.ConditionTrue, nil\n\t\t}\n\t\treturn false, fmt.Errorf(\"pod ready condition not found\")\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "3e1e8083fdaeea820fdfd52303668fb8", "score": "0.50618285", "text": "func (t ResolvedPipelineTask) haveAnyCustomRunsFailed() bool {\n\tfor _, customRun := range t.CustomRuns {\n\t\tif customRun.IsFailure() {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2298185234367c0564b5dddc3b86e84b", "score": "0.50554085", "text": "func IsDaemonSetPod(pod *corev1.Pod) bool {\n\tfor _, own := range pod.GetObjectMeta().GetOwnerReferences() {\n\t\tif own.Kind == \"DaemonSet\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "854d28f5755c72dccf81c7b792bdfd7c", "score": "0.5049286", "text": "func validateAndFinalizePod(\n\tctx context.Context, taskCtx pluginsCore.TaskExecutionContext, primaryContainerName string, pod k8sv1.Pod) (*k8sv1.Pod, error) {\n\tvar hasPrimaryContainer bool\n\n\tfinalizedContainers := make([]k8sv1.Container, len(pod.Spec.Containers))\n\tresReqs := make([]k8sv1.ResourceRequirements, 0, len(pod.Spec.Containers))\n\tfor index, container := range pod.Spec.Containers {\n\t\tif container.Name == primaryContainerName {\n\t\t\thasPrimaryContainer = true\n\t\t\tcontainer.Resources = *flytek8s.ApplyResourceOverrides(ctx, container.Resources)\n\t\t\tif taskCtx.TaskExecutionMetadata().GetOverrides() != nil && taskCtx.TaskExecutionMetadata().GetOverrides().GetResources() != nil {\n\t\t\t\tresOverrides := taskCtx.TaskExecutionMetadata().GetOverrides().GetResources()\n\t\t\t\tflytek8s.MergeResources(*resOverrides, &container.Resources)\n\t\t\t}\n\t\t}\n\t\tmodifiedCommand, err := template.Render(ctx, container.Command, template.Parameters{\n\t\t\tTaskExecMetadata: taskCtx.TaskExecutionMetadata(),\n\t\t\tInputs: taskCtx.InputReader(),\n\t\t\tOutputPath: taskCtx.OutputWriter(),\n\t\t\tTask: taskCtx.TaskReader(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcontainer.Command = modifiedCommand\n\n\t\tmodifiedArgs, err := template.Render(ctx, container.Args, template.Parameters{\n\t\t\tTaskExecMetadata: taskCtx.TaskExecutionMetadata(),\n\t\t\tInputs: taskCtx.InputReader(),\n\t\t\tOutputPath: taskCtx.OutputWriter(),\n\t\t\tTask: taskCtx.TaskReader(),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcontainer.Args = modifiedArgs\n\t\tcontainer.Env = flytek8s.DecorateEnvVars(ctx, container.Env, taskCtx.TaskExecutionMetadata().GetTaskExecutionID())\n\t\tresReqs = append(resReqs, container.Resources)\n\t\tfinalizedContainers[index] = container\n\t}\n\tif !hasPrimaryContainer {\n\t\treturn nil, errors.Errorf(errors.BadTaskSpecification,\n\t\t\t\"invalid Sidecar task, primary container [%s] not defined\", primaryContainerName)\n\n\t}\n\tpod.Spec.Containers = finalizedContainers\n\tflytek8s.UpdatePod(taskCtx.TaskExecutionMetadata(), resReqs, &pod.Spec)\n\treturn &pod, nil\n}", "title": "" }, { "docid": "7bf2ac25e4aed2b5607c22b40656a4ce", "score": "0.50482976", "text": "func CheckContainerStatus(experimentsDetails *types.ExperimentDetails, clients environment.ClientSets) error {\n\terr := retry.\n\t\tTimes(90).\n\t\tWait(2 * time.Second).\n\t\tTry(func(attempt uint) error {\n\t\t\tpod, err := clients.KubeClient.CoreV1().Pods(experimentsDetails.AppNS).Get(experimentsDetails.ApplicationPod, v1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Errorf(\"Unable to get the pod, err: %v\", err)\n\t\t\t}\n\t\t\terr = nil\n\t\t\tfor _, container := range pod.Status.ContainerStatuses {\n\t\t\t\tif container.Ready != true {\n\t\t\t\t\treturn errors.Errorf(\"containers are not yet in running state\")\n\t\t\t\t}\n\t\t\t\tlog.InfoWithValues(\"The running status of container are as follows\", logrus.Fields{\n\t\t\t\t\t\"container\": container.Name, \"Pod\": pod.Name, \"Status\": pod.Status.Phase})\n\t\t\t}\n\n\t\t\treturn nil\n\t\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "773a1d7a1d1cdc935917bbd574b16d37", "score": "0.50479424", "text": "func checkContainerExitCode(containerId string) (int, error) {\n\tout, err := exec.Command(\"docker\", \"inspect\",\n\t\t\"--format='{{.State.ExitCode}}'\", containerId).Output()\n\t_out := strings.Trim(strings.Trim(string(out[:]), \"\\n\"), \"'\")\n\tlog.Printf(\"Check Pod Exit Code : Container %s ExitCode : %v\\n\", containerId, _out)\n\tif err != nil {\n\t\tlog.Errorf(\"Error retrieving container exit code of container : %s, %s\\n\", containerId, err.Error())\n\t\treturn 1, err\n\t}\n\n\texitCode, err := strconv.Atoi(_out)\n\tif err != nil {\n\t\tlog.Fatalf(\"Error converting string to int : %s\\n\", err.Error())\n\t}\n\treturn exitCode, nil\n}", "title": "" }, { "docid": "9477a49eebc36e033c04ff34799c68ce", "score": "0.5036941", "text": "func shouldIgnorePod(status corev1.PodStatus) bool {\n\tif status.Phase == corev1.PodUnknown {\n\t\treturn true\n\t}\n\treturn pod.IsEvicted(&status)\n}", "title": "" }, { "docid": "02bea54bb260b615440c67a3f784a66a", "score": "0.5025053", "text": "func podIsReady(ctx context.Context, obj *Object) (bool, error) {\n\tconditions, ok, err := unstructured.NestedSlice(obj.Object, \"status\", \"conditions\")\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"failed to get status.conditions field: %v\", err)\n\t}\n\tif !ok || len(conditions) == 0 {\n\t\treturn false, nil\n\t}\n\tfor _, c := range conditions {\n\t\tcMap, ok := c.(map[string]interface{})\n\t\tif !ok {\n\t\t\treturn false, fmt.Errorf(\"failed to convert conditions to map\")\n\t\t}\n\t\tcType, ok, err := unstructured.NestedString(cMap, \"type\")\n\t\tif err != nil {\n\t\t\treturn false, fmt.Errorf(\"failed to get type field: %v\", err)\n\t\t}\n\t\tif !ok || cType == \"\" {\n\t\t\treturn false, nil\n\t\t}\n\n\t\tswitch cType {\n\t\tcase \"Ready\":\n\t\t\tstatus, ok, err := unstructured.NestedString(cMap, \"status\")\n\t\t\tif err != nil {\n\t\t\t\treturn false, fmt.Errorf(\"failed to get status field: %v\", err)\n\t\t\t}\n\t\t\tif !ok {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tif status == \"True\" {\n\t\t\t\treturn true, nil\n\t\t\t}\n\n\t\t\treason, ok, err := unstructured.NestedString(cMap, \"reason\")\n\t\t\tif err != nil {\n\t\t\t\treturn false, fmt.Errorf(\"failed to get reason field: %v\", err)\n\t\t\t}\n\t\t\tif !ok {\n\t\t\t\treturn false, nil\n\t\t\t}\n\t\t\tif reason == \"PodCompleted\" {\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\tdefault:\n\t\t\t// Skip\n\t\t}\n\t}\n\n\treturn false, nil\n}", "title": "" } ]
f3756b626bf915cdfd70ae4cda438a24
Clear clear all headers
[ { "docid": "577260301d55984cb5fcfa856bb192c0", "score": "0.7730236", "text": "func (r *RequestHeaders) Clear() {\n\tr.headers = nil\n}", "title": "" } ]
[ { "docid": "34173d3b80d5cbd5fc5499f666f270b4", "score": "0.7081689", "text": "func (s *Suite) resetHeader() {\n\ts.Req.Header = make(map[string][]string)\n}", "title": "" }, { "docid": "bd849d5cf7554884984fc6d83c0c576f", "score": "0.66845304", "text": "func (msg *Message) Reset() {\n\tfor key := range msg.header {\n\t\tdelete(msg.header, key)\n\t}\n\tmsg.parts = nil\n\tmsg.attachments = nil\n\tmsg.embedded = nil\n}", "title": "" }, { "docid": "a706863f86b93d487d17afaf758822dd", "score": "0.64673764", "text": "func (h *ResponseHeader) Reset() {\n\th.disableNormalizing = false\n\th.SetNoDefaultContentType(false)\n\th.noDefaultDate = false\n\th.resetSkipNormalize()\n}", "title": "" }, { "docid": "00b9c1a264180b22188241afe86d64e7", "score": "0.6330496", "text": "func (h *Handlers) Clear() {\n\th.Validate.Clear()\n\th.Build.Clear()\n\th.Send.Clear()\n\th.Sign.Clear()\n\th.Unmarshal.Clear()\n\th.UnmarshalMeta.Clear()\n\th.UnmarshalError.Clear()\n\th.ValidateResponse.Clear()\n\th.Retry.Clear()\n\th.AfterRetry.Clear()\n}", "title": "" }, { "docid": "bc28b3973e164ea36dcb0b408e7251c2", "score": "0.6323151", "text": "func (h *RequestHeader) Reset() {\n\th.disableNormalizing = false\n\th.SetNoDefaultContentType(false)\n\th.resetSkipNormalize()\n}", "title": "" }, { "docid": "2951a8b043aaf30b54a471a683022fb0", "score": "0.61907786", "text": "func (ht *HashTable) Clear() {\n\tfor i := range ht.table {\n\t\tht.table[i] = hashEntry{}\n\t}\n}", "title": "" }, { "docid": "49292c3cdfbd857678b8838933c7ca07", "score": "0.61883265", "text": "func (hpack *HPACK) Reset() {\n\thpack.releaseTable()\n\thpack.releaseFields()\n\thpack.tableSize = 0\n\thpack.maxTableSize = int(defaultHeaderTableSize)\n\thpack.DisableCompression = false\n}", "title": "" }, { "docid": "f60e92429aaeb20c9aed5e4476608f55", "score": "0.6176525", "text": "func (r *WriteMultipleRequest) Clear() {\n\tr.TableName = \"\"\n\tr.Operations = nil\n}", "title": "" }, { "docid": "299786c52207061771989331825eb98f", "score": "0.61000407", "text": "func (t *Table) Clear(headers bool) *Table {\n\tif headers {\n\t\tt.Table.Clear()\n\t} else {\n\t\tcount := t.Table.GetColumnCount()\n\t\tcells := make([]*cview.TableCell, count)\n\t\tfor i := 0; i < count; i++ {\n\t\t\tcells[i] = t.Table.GetCell(0, i)\n\t\t}\n\n\t\tt.Table.Clear()\n\t\tfor i := 0; i < count; i++ {\n\t\t\tt.Table.SetCell(0, i, cells[i])\n\t\t}\n\t}\n\tt.SetOffset(1, 0)\n\treturn t\n}", "title": "" }, { "docid": "32c79fbbc5f32afdabfb23497c891380", "score": "0.6063142", "text": "func (ht *HashTable) Clear() (err error) {\n\tif err = ht.DataFile.Clear(); err != nil {\n\t\treturn\n\t}\n\tht.calculateNumBuckets()\n\treturn\n}", "title": "" }, { "docid": "ccfbf04bb67891c13c737acf758be05d", "score": "0.5971474", "text": "func (test *Test) Reset(ctx context.Context) error {\r\n\ttest.Headers.Reset()\r\n\treturn test.ResetDB(ctx)\r\n}", "title": "" }, { "docid": "23c33255d28e8080d243d23dc2626a5e", "score": "0.5909918", "text": "func Clear(r *http.Request) {}", "title": "" }, { "docid": "57e71fed58f2fc2a43d7008fa0026e8c", "score": "0.5908471", "text": "func remove_header() {\n\n}", "title": "" }, { "docid": "52ba5ad17ba50e2fab0110fc6f24ecc8", "score": "0.5854378", "text": "func (m *Message) reset() {\n\tm.words = 0\n\tm.mtype = 0\n\tm.schema = 0\n\tm.extra = 0\n\tfor i := 0; i < messageHeaderSize; i++ {\n\t\tm.header[i] = 0\n\t}\n\tm.body.Offset = 0\n}", "title": "" }, { "docid": "63c4f6a342d4551a22cdc697b404f667", "score": "0.5836545", "text": "func Clear() {\n\tfor i := 0; i < bufferLength; i++ {\n\t\tbuffer[i] = 0x00\n\t}\n}", "title": "" }, { "docid": "ea1f428999f5fa6b02c48f42dd605a3b", "score": "0.5800266", "text": "func clear(r *http.Request) {\n\tdelete(data, r)\n}", "title": "" }, { "docid": "32cf4011482fa4a9984065b50387ca5d", "score": "0.5792279", "text": "func (h *ResponseHeader) DelAllCookies() {\n\th.cookies = h.cookies[:0]\n}", "title": "" }, { "docid": "38430ed8e1109d875a7ecd78e0e659bf", "score": "0.5785647", "text": "func (w *statusInterceptor) Flush(code int) {\n\tm := w.Header()\n\tfor k, v := range w.headers {\n\t\tm[k] = v\n\t\tdelete(w.headers, k)\n\t}\n\tw.ResponseWriter.WriteHeader(code)\n\tw.ResponseWriter.Write(w.body.Bytes())\n\tw.body.Reset()\n}", "title": "" }, { "docid": "c77f43957cf32f1b66c9a66a01549735", "score": "0.57824785", "text": "func (c FileCollector) Clear() {\n\tfor k := range c {\n\t\tdelete(c, k)\n\t}\n}", "title": "" }, { "docid": "162b5aee17852c1fcc632fa5890d7ae0", "score": "0.5753253", "text": "func (r *readability) cleanHeaders(s *goquery.Selection) {\n\ts.Find(\"h1,h2,h3\").Each(func(_ int, s1 *goquery.Selection) {\n\t\tif r.getClassWeight(s1) < 0 {\n\t\t\ts1.Remove()\n\t\t}\n\t})\n}", "title": "" }, { "docid": "3e385b0bc01887e4d3a29b4c95969df6", "score": "0.5737642", "text": "func (client *MockClient) Clear() {\n\tclient.data = make(map[string]map[string]map[string]interface{})\n\tclient.stuckTerminatingObjects = nil\n}", "title": "" }, { "docid": "9318f5b656e929c646f99cd053b16589", "score": "0.57157195", "text": "func (h *RequestHeader) DelAllCookies() {\n\th.collectCookies()\n\th.cookies = h.cookies[:0]\n}", "title": "" }, { "docid": "4a2949a078743310408c42066a85dd10", "score": "0.571524", "text": "func (a *Actions) clear() {\n\ta.Send = nil\n\ta.Hash = nil\n\ta.WriteAhead = nil\n\ta.Commits = nil\n\ta.StateTransfer = nil\n}", "title": "" }, { "docid": "0f34c82d9f701a51dba7303c688f4867", "score": "0.57031703", "text": "func (ca *ClientActions) clear() {\n\tca.AllocatedRequests = nil\n\tca.StoreRequests = nil\n\tca.ForwardRequests = nil\n}", "title": "" }, { "docid": "6ae9dc19899e200a9f4b476df3bf963f", "score": "0.5701387", "text": "func (t *TxStructure) HClear(key []byte) error {\n\ttrace_util_0.Count(_hash_00000, 65)\n\tmetaKey := t.encodeHashMetaKey(key)\n\tmeta, err := t.loadHashMeta(metaKey)\n\tif err != nil || meta.IsEmpty() {\n\t\ttrace_util_0.Count(_hash_00000, 69)\n\t\treturn errors.Trace(err)\n\t}\n\n\ttrace_util_0.Count(_hash_00000, 66)\n\terr = t.iterateHash(key, func(field []byte, value []byte) error {\n\t\ttrace_util_0.Count(_hash_00000, 70)\n\t\tk := t.encodeHashDataKey(key, field)\n\t\treturn errors.Trace(t.readWriter.Delete(k))\n\t})\n\n\ttrace_util_0.Count(_hash_00000, 67)\n\tif err != nil {\n\t\ttrace_util_0.Count(_hash_00000, 71)\n\t\treturn errors.Trace(err)\n\t}\n\n\ttrace_util_0.Count(_hash_00000, 68)\n\treturn errors.Trace(t.readWriter.Delete(metaKey))\n}", "title": "" }, { "docid": "041713faeb06cc04b137a63d2e4c648b", "score": "0.5700288", "text": "func (c *Conn) Clear() {\n\tc.statsMut.Lock()\n\tdefer c.statsMut.Unlock()\n\n\tc.commands = []*Cmd{}\n\tc.queue = []queueElement{}\n\tc.replies = []replyElement{}\n\tc.stats = make(map[cmdHash]int)\n}", "title": "" }, { "docid": "2167fd367fa64cb158cfd9d4f577e845", "score": "0.5686342", "text": "func (s *Client) ClearAll() {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\n\ttx, _ := s.db.Begin()\n\ttx.Exec(`DELETE FROM user_variables;`)\n\ttx.Exec(`DELETE FROM history;`)\n\n\ts.db.Exec(`DELETE FROM users;`)\n\ttx.Commit()\n}", "title": "" }, { "docid": "4e315b402e3875bbb4ffbe02479d85e8", "score": "0.56818485", "text": "func (c MockClient) VerifyAndClearByHeader(headerName, headerValue string, matcher RequestMatcher, times Times) error {\n\terr_verify := c.Verify(matcher.WithHeader(headerName, headerValue), times)\n\terr_clear := c.Clear(RequestMatcher{}.WithHeader(headerName, headerValue))\n\tif err_verify != nil {\n\t\treturn stacktrace.Propagate(err_verify, \"could not verify\")\n\t}\n\tif err_clear != nil {\n\t\treturn stacktrace.Propagate(err_clear, \"could not clear\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b12020add44d72cdf816ee2bd55ccd2f", "score": "0.5676523", "text": "func (z *Writer) Reset(w io.Writer) {\n\tn := cap(z.c)\n\t_ = z.close()\n\tz.freeBuffers()\n\tz.Header.Reset()\n\tz.dst = w\n\tz.checksum.Reset()\n\tz.idx = 0\n\tz.err = nil\n\t// reset hashtable to ensure deterministic output.\n\tfor i := range z.hashtable {\n\t\tz.hashtable[i] = 0\n\t}\n\tz.WithConcurrency(n)\n}", "title": "" }, { "docid": "53015421a661dac95c908dc38388e837", "score": "0.5667112", "text": "func ClearFormatters() {\n\tformatters = nil\n}", "title": "" }, { "docid": "84a592075ba1fd4f5d52e36d22b9591f", "score": "0.5664852", "text": "func (v *DCHttpClient) DelCommonHeader(key string) {\n\tdelete(v.CHeader, key)\n}", "title": "" }, { "docid": "fa0d89c5a424478fb36028b3a3a2b171", "score": "0.56510717", "text": "func (d *Driver) Clear() {\n\td.Version = constant.Undefined\n\td.Files = []DriverFile{}\n\td.PackageDriver = false\n\td.FilePath = constant.Undefined\n\td.Info = nil\n}", "title": "" }, { "docid": "c4b4e43f06c216971ce104d134c62f2c", "score": "0.5609217", "text": "func (h *Histogram) Reset() {\n\th.Counter.Reset()\n\t// Leave Offset and Divider alone\n\tfor i := 0; i < len(h.Hdata); i++ {\n\t\th.Hdata[i] = 0\n\t}\n}", "title": "" }, { "docid": "de684359c1e677c50b0340aaa2f78d46", "score": "0.5606256", "text": "func ResetClientHeaders(r *http.Request) {\n\t// this must be reset when serving a request with the client\n\tr.RequestURI = \"\"\n\t// If no Accept-Encoding header exists, Transport will add the headers it can accept\n\t// and would wrap the response body with the relevant reader.\n\tr.Header.Del(\"Accept-Encoding\")\n}", "title": "" }, { "docid": "2fe9fd3d18524be33157182b133f11dc", "score": "0.5600014", "text": "func (xs *Sheet) Clear(rowFirst int, rowLast int, colFirst int, colLast int) {\n\txs.xb.lib.NewProc(\"xlSheetClearW\").\n\t\tCall(xs.self, I(rowFirst), I(rowLast), I(colFirst), I(colLast))\n}", "title": "" }, { "docid": "01c3c8af8dbe4979605e7bf07abc527e", "score": "0.55988014", "text": "func (tt *TtTable) Clear() {\n\t// Create new slice/array - garbage collections takes care of cleanup\n\ttt.data = make([]TtEntry, tt.maxNumberOfEntries, tt.maxNumberOfEntries)\n\ttt.numberOfEntries = 0\n\ttt.Stats = TtStats{}\n}", "title": "" }, { "docid": "8c48345c55aeb8d168bdd4dc313f4ac4", "score": "0.55870545", "text": "func (s *Scope) Clear() {\n\tlog.Printf(\"fixture: clear %d selected tables\", len(s.selectedTables))\n\tdb := getDB(s.tf)\n\tdefer db.Close()\n\n\tfor _, tb := range s.selectedTables {\n\t\t_, err := db.Exec(\"TRUNCATE TABLE \" + tb.name)\n\t\tif err != nil {\n\t\t\tlog.Printf(\"fixture: failed to clear table '%s': %s\", tb.name, err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e34ab757fe13e25e2981f3f94c713904", "score": "0.55787283", "text": "func (l *HandlerList) Clear() {\n\tl.list = []NamedHandler{}\n}", "title": "" }, { "docid": "3bccdc5078f5c22cca0b244331e3033c", "score": "0.5573195", "text": "func (d *Driver) Clear() {\n\tfor i := 0; i < len(d.buff); i++ {\n\t\td.buff[i] = 0\n\t}\n}", "title": "" }, { "docid": "5e67ea2113f31ad4645f44d944347e2e", "score": "0.5566932", "text": "func (db *DB) ResetMiniHeaders(newMiniHeaders []*types.MiniHeader) (err error) {\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\terr = jsutil.RecoverError(r)\n\t\t}\n\t}()\n\tstart := time.Now()\n\tdefer logQueryIfSlow(start, fmt.Sprintf(\"ResetMiniHeaders with %d newMiniHeaders\", len(newMiniHeaders)))\n\tjsNewMiniHeaders := dexietypes.MiniHeadersFromCommonType(newMiniHeaders)\n\t_, err = jsutil.AwaitPromiseContext(db.ctx, db.dexie.Call(\"resetMiniHeadersAsync\", jsNewMiniHeaders))\n\tif err != nil {\n\t\treturn convertJSError(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0061e4437d166322f0184e26a5f56f23", "score": "0.55536747", "text": "func clearCache(w http.ResponseWriter) {\n w.Header().Set(\"Cache-Control\", \"no-cache, no-store, must-revalidate\")\n w.Header().Set(\"Pragma\", \"no-cache\")\n w.Header().Set(\"Expires\", \"0\")\n}", "title": "" }, { "docid": "56f2089fee2d310aa396d2aa36f9d07a", "score": "0.5552037", "text": "func cleanRequestHeader(request *http.Request) {\n\tif request == nil {\n\t\treturn\n\t}\n\n\t//delete the header\n\trequest.Header.Del(headerXCallerID)\n\trequest.Header.Del(headerXClientID)\n}", "title": "" }, { "docid": "5db6ca6e9fe6edb5b38375bb4acd06f9", "score": "0.55479777", "text": "func (c *Client) Flushall() {\n\terr := c.client.FlushAll()\n\tif err != nil {\n\t\tfmt.Println(fmt.Sprintf(\"error flush all data %v\", err))\n\t}\n}", "title": "" }, { "docid": "3ccf19a5c6062f75ca827c984ebafbde", "score": "0.55141133", "text": "func Clear(r *http.Request) {\n\tmutex.Lock()\n\tclear(r)\n\tmutex.Unlock()\n}", "title": "" }, { "docid": "690e5a5e837a75a59d91ff1d94451005", "score": "0.54987055", "text": "func (h Header) Del(key string) {\n\ttextproto.MIMEHeader(h).Del(key)\n}", "title": "" }, { "docid": "9539fe11336af044ac467074caa85093", "score": "0.54977083", "text": "func (c *Chunk) Clear() {\n\tc.data = nil\n}", "title": "" }, { "docid": "8c402ad38dac4fe89bf3dd891950abb6", "score": "0.54786223", "text": "func cleanHeaders(s *goquery.Selection) {\n\ts.Find(\"h1,h2,h3\").Each(func(_ int, s1 *goquery.Selection) {\n\t\tif getClassWeight(s1) < 0 {\n\t\t\ts1.Remove()\n\t\t}\n\t})\n}", "title": "" }, { "docid": "9e757de0730477406419c3586e00d8ba", "score": "0.5464989", "text": "func Clear() {\n\tClearCachedPrefixes()\n\n\tnamespaces = make(map[string]Namespace)\n\tunknownNamespaces = make(map[string]struct{})\n}", "title": "" }, { "docid": "b564063a76bf614054cef05efab581b1", "score": "0.5462437", "text": "func (h *hmacsha256) Reset() {\n\th.inner.Reset()\n\th.inner.Write(h.ipad[:])\n}", "title": "" }, { "docid": "7992be6c2926982de12fd810af4ceeb9", "score": "0.54584146", "text": "func (h CommonHeader) Del(key string) {\n\tdelete(h, key)\n}", "title": "" }, { "docid": "f1305e5c8688f2279a042446c7a4f698", "score": "0.5455089", "text": "func (c DeferDirCollector) Clear() {\n\tfor k := range c {\n\t\tdelete(c, k)\n\t}\n}", "title": "" }, { "docid": "0f8b6f8d9435ca8318906efd9feadbea", "score": "0.54452294", "text": "func (c *Client) ClearNamespace() {\n\tc.modifyLock.Lock()\n\tdefer c.modifyLock.Unlock()\n\tif c.headers != nil {\n\t\tc.headers.Del(NamespaceHeaderName)\n\t}\n}", "title": "" }, { "docid": "f0909746a24abd368b37ab01a7f1ebdb", "score": "0.5425218", "text": "func (conn *Conn) Clear() {\n\tdb := conn.db\n\tfor i := 0; i < 15; i++ {\n\t\t_, err := db.Exec(\"TRUNCATE TABLE unsub_\" + strconv.Itoa(i))\n\t\tif err != nil {\n\t\t\tlog.Printf(\"Error clearing tables: %v\\n\", err)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "5e29b2723996bd06059119e07f453c48", "score": "0.5423722", "text": "func (s *Subject) Reset() {\n\ts.AuthenticationInfo = nil\n\ts.AuthorizationInfo = nil\n\ts.Session = nil\n}", "title": "" }, { "docid": "6f6f6dc232b8b47920c1981238dbb536", "score": "0.5401516", "text": "func (s *Set) Clear() error {\n\t// Clear the table\n\t_, err := s.host.db.Exec(fmt.Sprintf(\"TRUNCATE TABLE %s\", s.table))\n\treturn err\n}", "title": "" }, { "docid": "b32ffc78aaceaa1d9cf0d47a94c7c94e", "score": "0.54001504", "text": "func ClearAllData() {\n\tdoGetOrModify(\n\t\tfunc(dirMapping *DevDirMapping, pathToPack map[DevPath][]*SvcPack) error {\n\t\t\tdirMapping.PathToDefaultPackKey = map[DevPath]SvcPackKey{}\n\t\t\tdirMapping.PackToPath = map[SvcPackKey]DevPath{}\n\t\t\treturn nil\n\t\t}, false,\n\t)\n}", "title": "" }, { "docid": "acbfffd00b9dc9cd1a3722fe23b3ecd1", "score": "0.53931814", "text": "func (ctl *Controller) Clear() {\n\tfor i := 0; i < ctl.count; i++ {\n\t\tctl.SetColour(i, Off)\n\t}\n}", "title": "" }, { "docid": "0a60b3dbf9b10df1448c8825ca1afb4b", "score": "0.538921", "text": "func (b *Buffer) Clear() {\n\tb.series = make(map[string]*influxdb.Series)\n\tb.size = 0\n}", "title": "" }, { "docid": "23cd79f33ed79316ae59227e3db3ae40", "score": "0.5386706", "text": "func (b *Buffer) Clear() {\n\tb.mu.Lock()\n\tdefer b.mu.Unlock()\n\tif err := b.flushAll(); err != nil {\n\t\tb.logger.ErrorContext(context.Background(), `k-stream.changelog.buffer`, err)\n\t}\n\n}", "title": "" }, { "docid": "bbcb3470fd7039fed52155ebed58556a", "score": "0.5383546", "text": "func (l *Service) Clear(bytes []byte) ([]byte, error) {\n\tl.values = make([]string, 0)\n\treturn proto.Marshal(&ClearResponse{})\n}", "title": "" }, { "docid": "137efc2fad8e435fe3a2a66cd2291675", "score": "0.5382822", "text": "func ZeroHeader() Header {\n\treturn Header{}\n}", "title": "" }, { "docid": "9f6ce3017872b3b88b83f8737b9c787c", "score": "0.538216", "text": "func (c *Context) Empty(status int) error {\n\tc.W.WriteHeader(status)\n\treturn nil\n}", "title": "" }, { "docid": "6a05416ce31ee103c075567e02133576", "score": "0.537246", "text": "func (th *TxHistory) Clear() {\n\tfor i := 0; i < dbtypes.NumIntervals; i++ {\n\t\tth.TypeByInterval[i] = nil\n\t\tth.AmtFlowByInterval[i] = nil\n\t}\n}", "title": "" }, { "docid": "13d1871f2a53ca35ffbac8375e4cd783", "score": "0.53712714", "text": "func (cookieAuth *CookieAuth) Clear(w http.ResponseWriter) {\n\tcookie := &http.Cookie{\n\t\tName: cookieAuth.cookieName,\n\t\tValue: \"\",\n\t\tPath: \"/\",\n\t}\n\thttp.SetCookie(w, cookie)\n}", "title": "" }, { "docid": "200ae9f90c49f3c184d754609c69a046", "score": "0.5364821", "text": "func (la *Allocator) Clear() {\n\tfor lc, role := range la.allocated {\n\t\tif role != \"\" {\n\t\t\tla.Free(eal.LCoreFromID(lc))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "dd5eb312f54296b864cd42d15c7bfa19", "score": "0.5362334", "text": "func (h *HostInfo) reset() {\n\th.domain = \"\"\n\th.ip = nil\n\th.port = \"\"\n\th.hostWithPort = \"\"\n\th.targetWithPort = \"\"\n}", "title": "" }, { "docid": "bd315d1341f62a3eb84c21a81dcad210", "score": "0.53541523", "text": "func (c *Cache) Clear() {\n\tfor _, shard := range c.shards {\n\t\tshard.clear()\n\t}\n\n\tif c.filter != nil {\n\t\tc.filter.reset()\n\t}\n}", "title": "" }, { "docid": "db4788f96910597ec60d7b162a9b9f1c", "score": "0.53506994", "text": "func removeConnectionHeaders(h map[string][]string) {\n\tfor _, f := range h[\"Connection\"] {\n\t\tfor _, sf := range strings.Split(f, \",\") {\n\t\t\tif sf = textproto.TrimString(sf); sf != \"\" {\n\t\t\t\tfor k := range h {\n\t\t\t\t\tif textproto.CanonicalMIMEHeaderKey(sf) == textproto.CanonicalMIMEHeaderKey(k) {\n\t\t\t\t\t\tdelete(h, k)\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b58584922ebe94836ac78f308f5c92bf", "score": "0.53387284", "text": "func UndirtHeader(req *http.Request, header string) {\n\theader = sanitizeHeaderName(header)\n\tdirtyHeadersPtr := DirtyHeaders(req)\n\tif dirtyHeadersPtr == nil {\n\t\treturn\n\t}\n\tdirtyHeaders := *dirtyHeadersPtr\n\tdelete(dirtyHeaders, header)\n\t*dirtyHeadersPtr = dirtyHeaders\n}", "title": "" }, { "docid": "f6bda9746552a52c5b75af0c30ae0289", "score": "0.53339887", "text": "func (c *Client) FlushAll() error {\n\t_, err := c.Exec(\"flushall\")\n\treturn err\n}", "title": "" }, { "docid": "7b7763384d0fded3ee66fc80129caa5b", "score": "0.53330463", "text": "func Clear() string {\n\treturn csi(\"2J\") + csi(\"H\")\n}", "title": "" }, { "docid": "906b01d3e679c7b045a2353edcec5469", "score": "0.53259313", "text": "func (t *Token) Clear() {\n\tt.ExpiresAt = null.TimeFrom(time.Time{})\n\tt.NextAt = null.TimeFrom(time.Time{})\n\tt.Hash = nil\n}", "title": "" }, { "docid": "b7f0644ff474f7ca99b6ad606f3cc877", "score": "0.53173757", "text": "func (c *SyncCollector) Clear() {\n\tfor k := range c.c {\n\t\tc.rw.Lock()\n\t\tdelete(c.c, k)\n\t\tc.rw.Unlock()\n\t}\n}", "title": "" }, { "docid": "1823007371bc27556850cd3550e4539e", "score": "0.5309833", "text": "func (t *Table) Clear() {\r\n\r\n\tfor ri := 0; ri < len(t.rows); ri++ {\r\n\t\ttrow := t.rows[ri]\r\n\t\tt.Panel.Remove(trow)\r\n\t\ttrow.DisposeChildren(true)\r\n\t\ttrow.Dispose()\r\n\t}\r\n\tt.rows = nil\r\n\tt.firstRow = 0\r\n\tt.rowCursor = -1\r\n\tt.recalc()\r\n\tt.Dispatch(OnTableRowCount, nil)\r\n}", "title": "" }, { "docid": "b1e2506e640da43d37d7198c0854654c", "score": "0.53019506", "text": "func ClearAll() {\n\tfmt.Printf(\"\\033[2J\")\n\tMoveTo(1, 1)\n}", "title": "" }, { "docid": "b1e2506e640da43d37d7198c0854654c", "score": "0.53019506", "text": "func ClearAll() {\n\tfmt.Printf(\"\\033[2J\")\n\tMoveTo(1, 1)\n}", "title": "" }, { "docid": "7abde1854a56330ab2547caf1ce5f0d5", "score": "0.52960175", "text": "func (s *Streams) Clear() {\n\ts.Buffer.Clear()\n}", "title": "" }, { "docid": "f253ff76690799c2364cafeab6a0f5dd", "score": "0.52809274", "text": "func (m *Metadata) Reset() {\n\tC.memset(unsafe.Pointer(m), 0, C.sizeof_struct_vsw_common_metadata)\n}", "title": "" }, { "docid": "ae187581612a44106dad3fbeea99e3f1", "score": "0.5279393", "text": "func (h Headers) Del(key string) {\n\tdelete(h, strings.ToLower(key))\n}", "title": "" }, { "docid": "5707c68b6105369e3416d8c800eddd9c", "score": "0.52778316", "text": "func (s *UAA) Reset() {\n\ts.users.Clear()\n\ts.clients.Clear()\n\ts.groups.Clear()\n}", "title": "" }, { "docid": "4a701a4090349d91a65f8f35e0b7c5b4", "score": "0.52745205", "text": "func (h *RequestHeader) Del(key string) {\n\tk := getHeaderKeyBytes(&h.bufKV, key, h.disableNormalizing)\n\th.del(k)\n}", "title": "" }, { "docid": "007072ddc65cc0007fa8ce905851bfb8", "score": "0.52718776", "text": "func (h *ihash) Reset() {}", "title": "" }, { "docid": "fda907e856c3cd85a0bafee46f260b8d", "score": "0.52716964", "text": "func clearTables() {\n\tmodel.Tables = make([]*model.Table, 0)\n}", "title": "" }, { "docid": "434f396f1582bc1aeceaf03fdcd020be", "score": "0.52687925", "text": "func (msr *MockSessionRules) Clear() {\n\tmsr.localTable = make(map[uint32]SessionRules)\n\tmsr.globalTable = SessionRules{}\n\tmsr.errCount = 0\n\tmsr.reqCount = 0\n}", "title": "" }, { "docid": "685ceef12494c310fa1eb244d14ca815", "score": "0.52675563", "text": "func (v *Data) Clear() {\n\tv.Truncate(0)\n}", "title": "" }, { "docid": "9d934fca48513037c655b7195fa29d94", "score": "0.5263372", "text": "func (c *Cache) Clear() {\n\tfor _, bucket := range c.buckets {\n\t\tbucket.clear()\n\t}\n\tc.size = 0\n\tc.list = list.New()\n}", "title": "" }, { "docid": "cd947f1699d729ebbc40e7c47ab0043a", "score": "0.5255796", "text": "func clear() {\n\tos.RemoveAll(TestDir)\n}", "title": "" }, { "docid": "9eabeb15f905c96636b92b6a8849f4a7", "score": "0.5253242", "text": "func (w *Writer) clearLines() error {\n\tfor i := 0; i < w.lines; i++ {\n\t\tif _, err := fmt.Fprintf(w.w, \"\\x1b[1A\\x1b[2K\\r\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ca4a1fe6ce5e03a3f69443c7705bcfa9", "score": "0.5249237", "text": "func (buf *Buffer) reset() {\n\tbuf.DNCReports = nil\n\tbuf.DNCReports = make([]DNCReport, 0)\n\tbuf.CNIReports = nil\n\tbuf.CNIReports = make([]CNIReport, 0)\n\tbuf.NPMReports = nil\n\tbuf.NPMReports = make([]NPMReport, 0)\n\tbuf.CNSReports = nil\n\tbuf.CNSReports = make([]CNSReport, 0)\n\tpayloadSize = 0\n}", "title": "" }, { "docid": "1a814eae71b1523b6512275c4d196f8a", "score": "0.52476555", "text": "func (sshConfig *SSHConfig) Clear() {\n\tsshConfig.privateKey = \"\"\n\tsshConfig.user = \"\"\n\tsshConfig.HostIPOrAddr = \"\"\n}", "title": "" }, { "docid": "78d159dd3a56d87158bdfb48354963cd", "score": "0.5245054", "text": "func (i *Index) ClearAll() error {\n\t_, err := i.object.db.Transact(func(tr fdb.Transaction) (ret interface{}, e error) {\n\t\ti.doClearAll(tr)\n\t\treturn\n\t})\n\treturn err\n}", "title": "" }, { "docid": "8b3b855ff8d41589fd21e9735e3ea4fa", "score": "0.5244029", "text": "func (pb *PacketBuffer) Clear() {\n\tpb.numPackets = 0\n\tpb.offsets[0] = 0\n}", "title": "" }, { "docid": "dc0bddb529b5e4d04fad42e4f76c23e3", "score": "0.52368665", "text": "func clearPage() {\n\t// #nosec 204\n\tcmd := exec.Command(\"clear\")\n\tcmd.Stdout = os.Stdout\n\terr := cmd.Run()\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"Failed to clear page: %s\\n\", err)\n\t\tos.Exit(1)\n\t}\n}", "title": "" }, { "docid": "801d6cb7da55aef0f77f09f26d960185", "score": "0.5236641", "text": "func (g *Grid) Clear() { g.rows = []ui.GridBufferer{} }", "title": "" }, { "docid": "62c2eccf7513ac6419b20c0275cc6613", "score": "0.5231834", "text": "func (c Collector) Clear() {\n\tfor k := range c {\n\t\tdelete(c, k)\n\t}\n}", "title": "" }, { "docid": "87c82df2af5bb66d8c4d9899f8bc17ff", "score": "0.5226171", "text": "func (w *responseWriter) Flush() {\n\tw.WriteHeaderNow()\n\tw.ResponseWriter.(http.Flusher).Flush()\n}", "title": "" }, { "docid": "7493800246bf1b7beca775f1d8f58ab9", "score": "0.5220047", "text": "func (b *Buffer) Clear() {\n\tfor o := range b.Tiles {\n\t\tb.Tiles[o] = nil\n\t}\n}", "title": "" }, { "docid": "0f2509abecbfd686cfd9414371e7da61", "score": "0.5219638", "text": "func (b *Buffer) Clear() {\n\tb.currentSize = 0\n\tb.contents = map[entity.Key]inventoryapi.PostDeltaBody{}\n}", "title": "" }, { "docid": "1196d05d4adb99b4c255a15bfc4ea3a2", "score": "0.5219059", "text": "func (e *Event) ClearAllHandlers() {\n e.mu.Lock()\n defer e.mu.Unlock()\n e.events = make(map[string][]EventHandler)\n e.syncEvents = make(map[string][]EventHandler)\n}", "title": "" }, { "docid": "79e413baedebb80a647b443854f8a8f4", "score": "0.5209901", "text": "func Clear() {\n\tvar c *exec.Cmd\n\tswitch os := runtime.GOOS; os {\n\tcase \"darwin\", \"linux\":\n\t\tc = exec.Command(\"clear\")\n\tdefault:\n\t\tc = exec.Command(\"cls\")\n\t}\n\tc.Stdout = os.Stdout\n\tc.Run()\n}", "title": "" } ]
8028179da00cde5db3ce64a07a4fbedf
GetTimestampbyRequestIDandIndex is a free data retrieval call binding the contract method 0x77fbb663. Solidity: function getTimestampbyRequestIDandIndex(uint256 _requestID, uint256 _index) view returns(uint256)
[ { "docid": "b8a532a0301a535af827faffffe71f8d", "score": "0.8260099", "text": "func (_ITellor *ITellorCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _ITellor.contract.Call(opts, &out, \"getTimestampbyRequestIDandIndex\", _requestID, _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" } ]
[ { "docid": "100db7f282c88ceec69c11e638bcf632", "score": "0.85220635", "text": "func (_ZapGetters *ZapGettersSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetTimestampbyRequestIDandIndex(&_ZapGetters.CallOpts, _requestID, _index)\r\n}", "title": "" }, { "docid": "6331ed9a1102d4642016623f91ac7470", "score": "0.851875", "text": "func (_ZapGetters *ZapGettersCallerSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetTimestampbyRequestIDandIndex(&_ZapGetters.CallOpts, _requestID, _index)\r\n}", "title": "" }, { "docid": "c3d063a6b9b5ecf67ce414a14699f91f", "score": "0.8427485", "text": "func (_ZapGetters *ZapGettersCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"getTimestampbyRequestIDandIndex\", _requestID, _index)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "9a73c8f4d9e567638d3bf129d0ee4cde", "score": "0.8407744", "text": "func (_ITellor *ITellorCallerSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetTimestampbyRequestIDandIndex(&_ITellor.CallOpts, _requestID, _index)\n}", "title": "" }, { "docid": "a52f48b48638139b96060daef3b18d14", "score": "0.8399067", "text": "func (_ZapMaster *ZapMasterCallerSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetTimestampbyRequestIDandIndex(&_ZapMaster.CallOpts, _requestID, _index)\r\n}", "title": "" }, { "docid": "da54231f9ff452fbbaf1dae3d14ce9e5", "score": "0.8385581", "text": "func (_Oracle *OracleCallerSession) GetTimestampbyRequestIDandIndex(_requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _Oracle.Contract.GetTimestampbyRequestIDandIndex(&_Oracle.CallOpts, _requestId, _index)\n}", "title": "" }, { "docid": "2011e53815f65ac78491867de304675c", "score": "0.83769375", "text": "func (_TellorGetters *TellorGettersCallerSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetTimestampbyRequestIDandIndex(&_TellorGetters.CallOpts, _requestID, _index)\n}", "title": "" }, { "docid": "664283b208798989a87e2b7ca61c96aa", "score": "0.8368541", "text": "func (_ZapMaster *ZapMasterCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"getTimestampbyRequestIDandIndex\", _requestID, _index)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "2872b0e60bbb4ec9b0412aa213c49d89", "score": "0.8358988", "text": "func (_TellorAccess *TellorAccessCallerSession) GetTimestampbyRequestIDandIndex(_requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _TellorAccess.Contract.GetTimestampbyRequestIDandIndex(&_TellorAccess.CallOpts, _requestId, _index)\n}", "title": "" }, { "docid": "af976f39e92293f80726eb94908a9b4e", "score": "0.8358922", "text": "func (_ITellor *ITellorSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetTimestampbyRequestIDandIndex(&_ITellor.CallOpts, _requestID, _index)\n}", "title": "" }, { "docid": "d7df2c3fb569f5397b6c53a0832ecbd5", "score": "0.83563614", "text": "func (_TellorGetters *TellorGettersSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetTimestampbyRequestIDandIndex(&_TellorGetters.CallOpts, _requestID, _index)\n}", "title": "" }, { "docid": "5788ad59c6c30c9147fca3ccdcabb74b", "score": "0.8344254", "text": "func (_ZapMaster *ZapMasterSession) GetTimestampbyRequestIDandIndex(_requestID *big.Int, _index *big.Int) (*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetTimestampbyRequestIDandIndex(&_ZapMaster.CallOpts, _requestID, _index)\r\n}", "title": "" }, { "docid": "11776f8ec5bed02815488c343d31a2c4", "score": "0.83209574", "text": "func (_TellorAccess *TellorAccessCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorAccess.contract.Call(opts, &out, \"getTimestampbyRequestIDandIndex\", _requestId, _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "be95e285900f86e0077db44bebe04e11", "score": "0.8311639", "text": "func (_TellorAccess *TellorAccessSession) GetTimestampbyRequestIDandIndex(_requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _TellorAccess.Contract.GetTimestampbyRequestIDandIndex(&_TellorAccess.CallOpts, _requestId, _index)\n}", "title": "" }, { "docid": "574e077ea1f0f960cf8d403480633fb7", "score": "0.8259868", "text": "func (_TellorGetters *TellorGettersCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestID *big.Int, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorGetters.contract.Call(opts, &out, \"getTimestampbyRequestIDandIndex\", _requestID, _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "9d6d38f2b4ad6bdc53fa0c5100f56197", "score": "0.82417345", "text": "func (_Oracle *OracleSession) GetTimestampbyRequestIDandIndex(_requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\treturn _Oracle.Contract.GetTimestampbyRequestIDandIndex(&_Oracle.CallOpts, _requestId, _index)\n}", "title": "" }, { "docid": "6ed77be35ad09bd29bccd73f2f6593e1", "score": "0.81962913", "text": "func (_Oracle *OracleCaller) GetTimestampbyRequestIDandIndex(opts *bind.CallOpts, _requestId *big.Int, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Oracle.contract.Call(opts, &out, \"getTimestampbyRequestIDandIndex\", _requestId, _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "be870e4253b8082cea0ee7e01caf1c94", "score": "0.64417064", "text": "func (_ZapGetters *ZapGettersCaller) GetRequestIdByTimestamp(opts *bind.CallOpts, _timestamp *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"getRequestIdByTimestamp\", _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "db6254978ae1aa39c2255fd0c03de13d", "score": "0.64146143", "text": "func (_TellorGetters *TellorGettersCaller) GetRequestIdByTimestamp(opts *bind.CallOpts, _timestamp *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorGetters.contract.Call(opts, &out, \"getRequestIdByTimestamp\", _timestamp)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "c19ee90857c9be251e20410fe95121f1", "score": "0.6135741", "text": "func (_ZapMaster *ZapMasterCaller) GetRequestIdByTimestamp(opts *bind.CallOpts, _timestamp *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"getRequestIdByTimestamp\", _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "c710ae3d029d97279cd537140865fbdc", "score": "0.6133163", "text": "func (_ITellor *ITellorCaller) GetRequestIdByTimestamp(opts *bind.CallOpts, _timestamp *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _ITellor.contract.Call(opts, &out, \"getRequestIdByTimestamp\", _timestamp)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "5a5b6fc169b15a819d770e7012847cb5", "score": "0.6014458", "text": "func (_ZapGetters *ZapGettersCallerSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetRequestIdByTimestamp(&_ZapGetters.CallOpts, _timestamp)\r\n}", "title": "" }, { "docid": "b4b6cb5b59eb94f047ae2d9fd74eb0ac", "score": "0.60013276", "text": "func (_ZapGetters *ZapGettersSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetRequestIdByTimestamp(&_ZapGetters.CallOpts, _timestamp)\r\n}", "title": "" }, { "docid": "02054efa597467623f25bf7456102205", "score": "0.58910614", "text": "func (_TellorGetters *TellorGettersCallerSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetRequestIdByTimestamp(&_TellorGetters.CallOpts, _timestamp)\n}", "title": "" }, { "docid": "2ab9d480b5d55417eac4836f15953113", "score": "0.58513325", "text": "func (_TellorGetters *TellorGettersSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetRequestIdByTimestamp(&_TellorGetters.CallOpts, _timestamp)\n}", "title": "" }, { "docid": "8deabb287e2d848c3a07550b371f6e47", "score": "0.5768844", "text": "func (_ZapGetters *ZapGettersCaller) GetSubmissionsByTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new([5]*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"getSubmissionsByTimestamp\", _requestId, _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "c7d56368fa9e3a9ffa97c7b447efd2b8", "score": "0.5713942", "text": "func (_TellorGetters *TellorGettersCaller) GetSubmissionsByTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorGetters.contract.Call(opts, &out, \"getSubmissionsByTimestamp\", _requestId, _timestamp)\n\n\tif err != nil {\n\t\treturn *new([5]*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([5]*big.Int)).(*[5]*big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "223b3e6cc97b2309483b89101a4fc49b", "score": "0.56442297", "text": "func (_ZapGetters *ZapGettersCallerSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetSubmissionsByTimestamp(&_ZapGetters.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "9c3c66360ddf6dceb83485f0574218e7", "score": "0.56423587", "text": "func requestTimestampFromTSA(server string, h []byte, hAlg crypto.Hash) (*Timestamp, error) {\n\t// tsreq represents an timestamp request. See\n\t// https://tools.ietf.org/html/rfc3161#section-2.4.1\n\ttsreq, err := asn1.Marshal(timeStampReq{\n\t\tVersion: 1,\n\t\tMessageImprint: messageImprint{\n\t\t\tHashAlgorithm: pkix.AlgorithmIdentifier{\n\t\t\t\t// the oid for the sha256 digest algorithm\n\t\t\t\tAlgorithm: getOIDFromHashAlgorithm(hAlg),\n\t\t\t\tParameters: asn1.RawValue{\n\t\t\t\t\tTag: 5, /* ASN.1 NULL */\n\t\t\t\t},\n\t\t\t},\n\t\t\tHashedMessage: h,\n\t\t},\n\t\tCertReq: true,\n\t\tExtensions: nil,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq, err := http.NewRequest(\"POST\", server, bytes.NewReader(tsreq))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/timestamp-query\")\n\tcli := &http.Client{}\n\tresp, err := cli.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp == nil {\n\t\treturn nil, fmt.Errorf(\"tsa returned empty response\")\n\t}\n\tdefer resp.Body.Close()\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"tsa returned \\\"%d %s\\\" instead of 200 OK\", resp.StatusCode, resp.Status)\n\t}\n\t// parse it to make sure we got a valid response\n\tvar tsResp timeStampResp\n\trest, err := asn1.Unmarshal(body, &tsResp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(rest) > 0 {\n\t\treturn nil, fmt.Errorf(\"trailing data in timestamp response\")\n\t}\n\n\tif tsResp.Status.Status > 0 {\n\t\treturn nil, fmt.Errorf(\"%s: %s\", pkiFailureInfo(tsResp.Status.FailInfo).String(), tsResp.Status.StatusString)\n\t}\n\n\tif len(tsResp.TimeStampToken.FullBytes) == 0 {\n\t\treturn nil, fmt.Errorf(\"no pkcs7 data in timestamp response\")\n\t}\n\treturn parseTimestamp(tsResp.TimeStampToken.FullBytes)\n}", "title": "" }, { "docid": "b8bd2c33d48a7109b9986de55cff44b5", "score": "0.56061786", "text": "func (_ZapGetters *ZapGettersSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetSubmissionsByTimestamp(&_ZapGetters.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "d8ec7d7cc05291329892a7a7ba3cfb7d", "score": "0.5594322", "text": "func (_TellorGetters *TellorGettersCallerSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\treturn _TellorGetters.Contract.GetSubmissionsByTimestamp(&_TellorGetters.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "b1c47982c052931d951782e8b27f4f75", "score": "0.55604297", "text": "func (_ZapMaster *ZapMasterCallerSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetRequestIdByTimestamp(&_ZapMaster.CallOpts, _timestamp)\r\n}", "title": "" }, { "docid": "52298c05349343ae0c87cd82ea500bc8", "score": "0.5553495", "text": "func (_ZapMaster *ZapMasterCaller) GetSubmissionsByTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new([5]*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"getSubmissionsByTimestamp\", _requestId, _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "8c1320e3c84fa42f5a9efb71ea418daa", "score": "0.55465674", "text": "func (_TellorGetters *TellorGettersSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\treturn _TellorGetters.Contract.GetSubmissionsByTimestamp(&_TellorGetters.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "42f037934bf26e4ecbdf3c1ea3401235", "score": "0.5523767", "text": "func (_ZapMaster *ZapMasterSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetRequestIdByTimestamp(&_ZapMaster.CallOpts, _timestamp)\r\n}", "title": "" }, { "docid": "11f0fbc5e6eee63e01992980a7f7439a", "score": "0.54931206", "text": "func (_ITellor *ITellorCaller) GetSubmissionsByTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\tvar out []interface{}\n\terr := _ITellor.contract.Call(opts, &out, \"getSubmissionsByTimestamp\", _requestId, _timestamp)\n\n\tif err != nil {\n\t\treturn *new([5]*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([5]*big.Int)).(*[5]*big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "e542ecbbed86979468daa14ff65a064d", "score": "0.5451195", "text": "func (_ITellor *ITellorSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetRequestIdByTimestamp(&_ITellor.CallOpts, _timestamp)\n}", "title": "" }, { "docid": "2f552d7c87ffef0cf60ac378d5c4083a", "score": "0.5428842", "text": "func (_ITellor *ITellorCallerSession) GetRequestIdByTimestamp(_timestamp *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetRequestIdByTimestamp(&_ITellor.CallOpts, _timestamp)\n}", "title": "" }, { "docid": "23cc48603f331d52053e61669d957712", "score": "0.5383485", "text": "func (_ZapMaster *ZapMasterCallerSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetSubmissionsByTimestamp(&_ZapMaster.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "68539206b9d671210719a49f0ae591e2", "score": "0.53490704", "text": "func (_AggregatorInterface *AggregatorInterfaceCaller) GetTimestamp(opts *bind.CallOpts, roundId *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _AggregatorInterface.contract.Call(opts, &out, \"getTimestamp\", roundId)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "b152416245cf75a2a15e3ca276b1abcc", "score": "0.53466594", "text": "func (_ITellor *ITellorCallerSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\treturn _ITellor.Contract.GetSubmissionsByTimestamp(&_ITellor.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "cb164983a5e0cae1a1afcfb19ef7ae46", "score": "0.5330277", "text": "func (_TellorGetters *TellorGettersCaller) GetRequestIdByRequestQIndex(opts *bind.CallOpts, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorGetters.contract.Call(opts, &out, \"getRequestIdByRequestQIndex\", _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "0cc1683513b42e804cf73e10c3f9f588", "score": "0.5308874", "text": "func (_ZapMaster *ZapMasterSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetSubmissionsByTimestamp(&_ZapMaster.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "aafbefd455671add835161fa2ece31b5", "score": "0.5281286", "text": "func (_ITellor *ITellorSession) GetSubmissionsByTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]*big.Int, error) {\n\treturn _ITellor.Contract.GetSubmissionsByTimestamp(&_ITellor.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "da36eb73e1581d19580b7ebd98f6612d", "score": "0.5255063", "text": "func TimeLogIndex(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.WriteHeader(http.StatusOK)\n params := r.URL.Query()\n\tif err := json.NewEncoder(w).Encode(business.GetTimeLogs(params)); err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "2b29ec771298d5b39af16a95c7b08f3a", "score": "0.5230739", "text": "func (p *CommonClient) GetTimestamp() (int, error) {\n\trequest := &dtos.BaseReqModel{\n\t\tAimSite: \"HuoBi\",\n\t\tMethod: \"GET\",\n\t}\n\n\trawRsp, err := p.BuildAndPostGatewayUrl(request, \"/v1/common/timestamp\")\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tresult := common.GetTimestampResponse{}\n\tjsonErr := json.Unmarshal([]byte(rawRsp.Data), &result)\n\n\tif jsonErr != nil {\n\t\treturn 0, jsonErr\n\t}\n\tif result.Status == \"ok\" && result.Data != 0 {\n\t\treturn result.Data, nil\n\t}\n\treturn 0, errors.New(rawRsp.Data)\n}", "title": "" }, { "docid": "c06e20da2a65e179fba980e021aea3e7", "score": "0.5224743", "text": "func (_ZapGetters *ZapGettersCaller) GetMinersByRequestIdAndTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\tvar (\r\n\t\tret0 = new([5]common.Address)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"getMinersByRequestIdAndTimestamp\", _requestId, _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "da28a31debea219123812bb97bcb6e50", "score": "0.5163035", "text": "func (_AggregatorInterface *AggregatorInterfaceCallerSession) GetTimestamp(roundId *big.Int) (*big.Int, error) {\n\treturn _AggregatorInterface.Contract.GetTimestamp(&_AggregatorInterface.CallOpts, roundId)\n}", "title": "" }, { "docid": "d2c4d1e54a219b8c8d68c10e92b20f93", "score": "0.5153628", "text": "func (_TellorAccess *TellorAccessCaller) Timestamps(opts *bind.CallOpts, arg0 *big.Int, arg1 *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _TellorAccess.contract.Call(opts, &out, \"timestamps\", arg0, arg1)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "da94ccca08409a13f6ab68686ad12800", "score": "0.51460356", "text": "func (_ZapGetters *ZapGettersCaller) GetRequestIdByRequestQIndex(opts *bind.CallOpts, _index *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapGetters.contract.Call(opts, out, \"getRequestIdByRequestQIndex\", _index)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "0f77a75ee06e7938917283d496b5382f", "score": "0.5144964", "text": "func (_TellorGetters *TellorGettersCaller) GetMinersByRequestIdAndTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\tvar out []interface{}\n\terr := _TellorGetters.contract.Call(opts, &out, \"getMinersByRequestIdAndTimestamp\", _requestId, _timestamp)\n\n\tif err != nil {\n\t\treturn *new([5]common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([5]common.Address)).(*[5]common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "a8c7c71d1e76e5f6dfe4fca0c20d21d1", "score": "0.5120379", "text": "func (msg *QueryRequestMessage) GetTimestamp() int64 {\n\treturn msg.HeaderGetTimestamp()\n}", "title": "" }, { "docid": "2fb5fec784f6343a44321670ca89f361", "score": "0.51045173", "text": "func (_FilesData *FilesDataCaller) GetFileSignDataByIndex(opts *bind.CallOpts, uuid [16]byte, index *big.Int) ([32]byte, [32]byte, uint8, error) {\n\tvar (\n\t\tret0 = new([32]byte)\n\t\tret1 = new([32]byte)\n\t\tret2 = new(uint8)\n\t)\n\tout := &[]interface{}{\n\t\tret0,\n\t\tret1,\n\t\tret2,\n\t}\n\terr := _FilesData.contract.Call(opts, out, \"getFileSignDataByIndex\", uuid, index)\n\treturn *ret0, *ret1, *ret2, err\n}", "title": "" }, { "docid": "3eba872b4918e90688eda39e8b6898bf", "score": "0.5103815", "text": "func (_ITellor *ITellorCaller) GetMinersByRequestIdAndTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\tvar out []interface{}\n\terr := _ITellor.contract.Call(opts, &out, \"getMinersByRequestIdAndTimestamp\", _requestId, _timestamp)\n\n\tif err != nil {\n\t\treturn *new([5]common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new([5]common.Address)).(*[5]common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "73cf8bd056bf4de5fe80c3980bcd47d5", "score": "0.50961596", "text": "func (r *Request) getTimestamp() (time.Time, error) {\n\ti, err := strconv.ParseInt(r.Timestamp, 10, 64)\n\tif err != nil {\n\t\tlog.Errorf(\"cannot parse timestamp %s: %v\", r.Timestamp, err)\n\t\treturn time.Time{}, err\n\t}\n\tloc, err := tz.LoadLocation(r.Area)\n\tif err != nil {\n\t\tlog.Errorf(\"cannot find location: %s\", r.Area)\n\t\treturn time.Time{}, err\n\t}\n\n\treturn time.Unix(i, 0).In(loc), nil\n}", "title": "" }, { "docid": "c0f565a165bbcc7fd5cb751d3c62d0e7", "score": "0.50850815", "text": "func (_Oracle *OracleCaller) IndexRequestId(opts *bind.CallOpts) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Oracle.contract.Call(opts, &out, \"indexRequestId\")\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "2cad5b5a05fc493a7eb435e0bb7aa9c0", "score": "0.5060914", "text": "func (_ZapMaster *ZapMasterCaller) GetMinersByRequestIdAndTimestamp(opts *bind.CallOpts, _requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\tvar (\r\n\t\tret0 = new([5]common.Address)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"getMinersByRequestIdAndTimestamp\", _requestId, _timestamp)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "84f18794efad919ca055d2f3f798890b", "score": "0.5054749", "text": "func (_ZapGetters *ZapGettersCallerSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\treturn _ZapGetters.Contract.GetMinersByRequestIdAndTimestamp(&_ZapGetters.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "6032baf5cd00f6e61909e67d593b10c5", "score": "0.499562", "text": "func (_ITellor *ITellorCaller) GetRequestIdByRequestQIndex(opts *bind.CallOpts, _index *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _ITellor.contract.Call(opts, &out, \"getRequestIdByRequestQIndex\", _index)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "eddda62a64434c89be41b2ce2e9dafdd", "score": "0.49931967", "text": "func (_ZapGetters *ZapGettersSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\treturn _ZapGetters.Contract.GetMinersByRequestIdAndTimestamp(&_ZapGetters.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "45e8be188bec0b51acfb86be34d38c98", "score": "0.49846596", "text": "func (_TellorGetters *TellorGettersCallerSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetRequestIdByRequestQIndex(&_TellorGetters.CallOpts, _index)\n}", "title": "" }, { "docid": "6cc03a945b1f6efce2244f95c929fa71", "score": "0.49669763", "text": "func (_TellorGetters *TellorGettersSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\n\treturn _TellorGetters.Contract.GetRequestIdByRequestQIndex(&_TellorGetters.CallOpts, _index)\n}", "title": "" }, { "docid": "170340caa35e7368159cc22ece47af12", "score": "0.49468914", "text": "func (_TellorGetters *TellorGettersCallerSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\treturn _TellorGetters.Contract.GetMinersByRequestIdAndTimestamp(&_TellorGetters.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "62e9548c0cf9ec6f7e58aa50c47602c6", "score": "0.49215424", "text": "func (_AggregatorInterface *AggregatorInterfaceSession) GetTimestamp(roundId *big.Int) (*big.Int, error) {\n\treturn _AggregatorInterface.Contract.GetTimestamp(&_AggregatorInterface.CallOpts, roundId)\n}", "title": "" }, { "docid": "c8b940f49616e005d2e944a1eede31e3", "score": "0.4912538", "text": "func (_FilesData *FilesDataCallerSession) GetFileSignDataByIndex(uuid [16]byte, index *big.Int) ([32]byte, [32]byte, uint8, error) {\n\treturn _FilesData.Contract.GetFileSignDataByIndex(&_FilesData.CallOpts, uuid, index)\n}", "title": "" }, { "docid": "297b225e8f97517b59c0bb946cdf384b", "score": "0.48889878", "text": "func (_ZapGetters *ZapGettersCallerSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetRequestIdByRequestQIndex(&_ZapGetters.CallOpts, _index)\r\n}", "title": "" }, { "docid": "d20e3447b44e4f8de60596498cc094d8", "score": "0.4873153", "text": "func (_ZapGetters *ZapGettersSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\r\n\treturn _ZapGetters.Contract.GetRequestIdByRequestQIndex(&_ZapGetters.CallOpts, _index)\r\n}", "title": "" }, { "docid": "081bb6e9ae9ec090731c6d4303b15a1b", "score": "0.4870493", "text": "func (_TellorGetters *TellorGettersSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\treturn _TellorGetters.Contract.GetMinersByRequestIdAndTimestamp(&_TellorGetters.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "a8be4d92c642ab5814731496b43be49a", "score": "0.484848", "text": "func (e *List) GetTimestamp(tag uint32) []uint64 {\n\tres := make([]uint64, 0)\n\n\tif TypeTimestamp == e.elemType && tag == e.elemTag {\n\t\tfor _, e := range e.elements {\n\t\t\tres = append(res, e.(*rTimestamp).value)\n\t\t}\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "2f23469718e989d8a7e2344121767d8e", "score": "0.48387733", "text": "func (_ITellor *ITellorCallerSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\treturn _ITellor.Contract.GetMinersByRequestIdAndTimestamp(&_ITellor.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "3aa9fd8c33102111b4a7cbcdb4f418df", "score": "0.4820574", "text": "func (_ZapMaster *ZapMasterCaller) GetRequestIdByRequestQIndex(opts *bind.CallOpts, _index *big.Int) (*big.Int, error) {\r\n\tvar (\r\n\t\tret0 = new(*big.Int)\r\n\t)\r\n\tout := ret0\r\n\terr := _ZapMaster.contract.Call(opts, out, \"getRequestIdByRequestQIndex\", _index)\r\n\treturn *ret0, err\r\n}", "title": "" }, { "docid": "1852900368fd66089e2ca24b88ede030", "score": "0.4813058", "text": "func (_FilesData *FilesDataSession) GetFileSignDataByIndex(uuid [16]byte, index *big.Int) ([32]byte, [32]byte, uint8, error) {\n\treturn _FilesData.Contract.GetFileSignDataByIndex(&_FilesData.CallOpts, uuid, index)\n}", "title": "" }, { "docid": "ec687db675fae53ec300593235bc0609", "score": "0.47940537", "text": "func (_ZapMaster *ZapMasterCallerSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\treturn _ZapMaster.Contract.GetMinersByRequestIdAndTimestamp(&_ZapMaster.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "b3c8e0d3044198dcb37afa10cfe2903a", "score": "0.47342438", "text": "func (_ITellor *ITellorSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\n\treturn _ITellor.Contract.GetMinersByRequestIdAndTimestamp(&_ITellor.CallOpts, _requestId, _timestamp)\n}", "title": "" }, { "docid": "d9166e873e1ad53099c8844ab11e07b0", "score": "0.4708759", "text": "func (server *ArachneServer) GetTimestamp(ctx context.Context, elem *aql.GraphID) (*aql.Timestamp, error) {\n\tgraph, err := server.db.Graph(elem.Graph)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &aql.Timestamp{Timestamp: graph.GetTimestamp()}, nil\n}", "title": "" }, { "docid": "16bd9fffc3f3b874569c9437336ffebb", "score": "0.46741498", "text": "func (m *_ResponseHeader) GetTimestamp() int64 {\n\treturn m.Timestamp\n}", "title": "" }, { "docid": "fffe9629f6ca3ab10513d769eab9ea31", "score": "0.46734175", "text": "func (_TellorAccess *TellorAccessCallerSession) Timestamps(arg0 *big.Int, arg1 *big.Int) (*big.Int, error) {\n\treturn _TellorAccess.Contract.Timestamps(&_TellorAccess.CallOpts, arg0, arg1)\n}", "title": "" }, { "docid": "142762be87dbc3539ac56c317bb41b29", "score": "0.46436116", "text": "func getTimestamp(t time.Time) string {\n\treturn fmt.Sprintf(\"%02d:%02d_%04d%02d%02d\", t.Hour(), t.Minute(), t.Year(), t.Month(), t.Day())\n}", "title": "" }, { "docid": "6b8fe2420907bc79430086c4f07fa0db", "score": "0.4631727", "text": "func (_ZapMaster *ZapMasterSession) GetMinersByRequestIdAndTimestamp(_requestId *big.Int, _timestamp *big.Int) ([5]common.Address, error) {\r\n\treturn _ZapMaster.Contract.GetMinersByRequestIdAndTimestamp(&_ZapMaster.CallOpts, _requestId, _timestamp)\r\n}", "title": "" }, { "docid": "d52f873ca494d73e69ab360f78bd574d", "score": "0.46240202", "text": "func (_Oracle *OracleCallerSession) IndexRequestId() (*big.Int, error) {\n\treturn _Oracle.Contract.IndexRequestId(&_Oracle.CallOpts)\n}", "title": "" }, { "docid": "f4ba6f1b462dfb0bcc5c0efb564704d3", "score": "0.46093053", "text": "func (*GetRawTxByIndexRequest) Descriptor() ([]byte, []int) {\n\treturn file_LightWalletService_proto_rawDescGZIP(), []int{18}\n}", "title": "" }, { "docid": "3227ba9ec57794ec79ef18463421c37a", "score": "0.46041036", "text": "func (_Oracle *OracleCaller) Timestamps(opts *bind.CallOpts, arg0 *big.Int, arg1 *big.Int) (*big.Int, error) {\n\tvar out []interface{}\n\terr := _Oracle.contract.Call(opts, &out, \"timestamps\", arg0, arg1)\n\n\tif err != nil {\n\t\treturn *new(*big.Int), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(*big.Int)).(**big.Int)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "0d5be42f7f4cb375a2b1e587e831be98", "score": "0.45746037", "text": "func (_DefiOracleReferenceAggregator *DefiOracleReferenceAggregatorCaller) GetTimeStamp(opts *bind.CallOpts, token common.Address) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _DefiOracleReferenceAggregator.contract.Call(opts, out, \"getTimeStamp\", token)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "61c3ea4bcbfcbda47af9cbb1f445440c", "score": "0.45715016", "text": "func GetBlocksByTimestamp(timestamp int) (string, error) {\n\tbeOpts := blockExplorerOpts{\n\t\tOpts: api.Opts{},\n\t\tFormat: \"json\",\n\t}\n\topts := util.IntToString(timestamp) + \"?\" + client.EncodeOpts(beOpts)\n\tres, err := client.Get(\"blocks\", opts)\n\treturn res, err\n}", "title": "" }, { "docid": "7e2ebeebfc27347323d98b8f4bfba5bc", "score": "0.4564146", "text": "func (_ReporterTokenSale *ReporterTokenSaleCaller) StartTimestamp(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _ReporterTokenSale.contract.Call(opts, out, \"startTimestamp\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "23f588cd01dc22bf507fadd7e855cb33", "score": "0.45636564", "text": "func (_ITellor *ITellorCallerSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetRequestIdByRequestQIndex(&_ITellor.CallOpts, _index)\n}", "title": "" }, { "docid": "a4e4e919594d14cf9c3aa5193fbd2387", "score": "0.455933", "text": "func (_ITellor *ITellorSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\n\treturn _ITellor.Contract.GetRequestIdByRequestQIndex(&_ITellor.CallOpts, _index)\n}", "title": "" }, { "docid": "c54d0dea4945c4acdddc830ba546af7f", "score": "0.45514822", "text": "func (_TellorAccess *TellorAccessSession) Timestamps(arg0 *big.Int, arg1 *big.Int) (*big.Int, error) {\n\treturn _TellorAccess.Contract.Timestamps(&_TellorAccess.CallOpts, arg0, arg1)\n}", "title": "" }, { "docid": "e9e4f978c9f61a62f02efef1e168ef67", "score": "0.45218563", "text": "func GetTxsByTxType(c *gin.Context) {\n\tbefore := int(0)\n\tafter := int(-1)\n\tlimit := int(100)\n\n\tq := c.Request.URL.Query()\n\tif len(q[\"limit\"]) > 0 {\n\t\tlimit, _ = strconv.Atoi(q[\"limit\"][0])\n\t}\n\n\tif len(q[\"before\"]) > 0 {\n\t\tbefore, _ = strconv.Atoi(q[\"before\"][0])\n\t}\n\n\tif len(q[\"after\"]) > 0 {\n\t\tafter, _ = strconv.Atoi(q[\"after\"][0])\n\t}\n\n\tif limit > 100 {\n\t\terrors.ErrOverMaxLimit(c.Writer, http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tvar txrp models.TxRequestPayload\n\terr := json.NewDecoder(c.Request.Body).Decode(&txrp)\n\tif err != nil {\n\t\ts.l.Printf(\"failed to decode txrp: %s\\n\", err)\n\t}\n\n\t// Set the first block time if StartTime is not parsed\n\t// 2019-04-18 06:07:02.15434+00, which is 1555567622 in unix time\n\tif txrp.StartTime == 0 {\n\t\ttxrp.StartTime = 1555567622\n\t}\n\n\t// Set current unix time if EndTime is not parsed\n\tif txrp.EndTime == 0 {\n\t\ttxrp.EndTime = time.Now().Unix()\n\t}\n\n\t// Validate transaction message type\n\t// ok := models.ValidatorMsgType(txrp.TxType)\n\t// if !ok {\n\t// \terrors.ErrInvalidMessageType(c.Writer, http.StatusUnauthorized)\n\t// \treturn\n\t// }\n\n\ttxs, err := s.db.QueryTxsByType(txrp.TxType, txrp.StartTime, txrp.EndTime, before, after, limit)\n\tif err != nil {\n\t\ts.l.Printf(\"failed to query txs: %s\\n\", err)\n\t}\n\n\tif len(txs) <= 0 {\n\t\treturn\n\t}\n\n\tresult, err := setTxs(txs)\n\tif err != nil {\n\t\ts.l.Printf(\"failed to set txs: %s\\n\", err)\n\t}\n\n\ttotalTxsNum, err := s.db.CountTotalTxsNum()\n\tif err != nil {\n\t\ts.l.Printf(\"failed to query total number of txs: %s\\n\", err)\n\t}\n\n\t// Handling before and after since their ordering data is different\n\tif after >= 0 {\n\t\tresult.Paging.Total = totalTxsNum\n\t\tresult.Paging.Before = result.Data[0].ID\n\t\tresult.Paging.After = result.Data[len(result.Data)-1].ID\n\t} else {\n\t\tresult.Paging.Total = totalTxsNum\n\t\tresult.Paging.Before = result.Data[len(result.Data)-1].ID\n\t\tresult.Paging.After = result.Data[0].ID\n\t}\n\n\tmodels.Respond(c.Writer, result)\n\treturn\n}", "title": "" }, { "docid": "c9a8f0a5b93a0f36c744dbf0c66353fd", "score": "0.45172414", "text": "func (c *Client) GetTransactionByBlockNumberAndIndex(ctx context.Context, bnum string, txindex string) ([]byte, error) {\n\treturn c.apiHandler.GetTransactionByBlockNumberAndIndex(ctx, c.groupID, bnum, txindex)\n}", "title": "" }, { "docid": "18f72eb257cff8512f5264b9ceb6c732", "score": "0.45154536", "text": "func (s *ThrottledClientException) RequestID() string {\n\treturn s.RespMetadata.RequestID\n}", "title": "" }, { "docid": "18f72eb257cff8512f5264b9ceb6c732", "score": "0.45154536", "text": "func (s *ThrottledClientException) RequestID() string {\n\treturn s.RespMetadata.RequestID\n}", "title": "" }, { "docid": "ce597f42296994cc3284a834a239da42", "score": "0.44919452", "text": "func GetTimestamps(w http.ResponseWriter, r *http.Request) {\n\t// Start time of the request.\n\tstart := time.Now()\n\n\t// Connects to the database.\n\tdatabase := mongodb.DatabaseInit(Collection)\n\n\t// Gets all tracks from the DB.\n\ttracks, err := database.FindAll()\n\tif err != nil || tracks == nil {\n\t\t// Sets header content-type to application/json and status code to 204 (No content).\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.WriteHeader(http.StatusNoContent)\n\n\t\t// Outputs error.\n\t\tw.Write([]byte(\"There are no tracks in the database\"))\n\t} else {\n\t\tvar newTimestamp Timestamp\n\n\t\t// Lengt of the track slice (-1 = last index used).\n\t\tlen := len(tracks) - 1\n\n\t\t// t_latest: Siste stamp\n\t\t// t_start: Første stamp\n\t\t// t_stop: siste stamp for siste ID i array.\n\n\t\t// Last added timestamp (Last index in the DB).\n\t\tnewTimestamp.TimeLatest = tracks[len].Timestamp\n\n\t\t// Sorts the tracks by timestamps, last added in index 0, first added in last index.\n\t\tsortedTracks := mongodb.SortTrackByTimestamp(tracks)\n\n\t\t// Adds timestamps to Timestamp struct.\n\t\tnewTimestamp.TimeStart = sortedTracks[len].Timestamp\n\n\t\t// The max allowed IDs to be returned.\n\t\tvar maxLoops int\n\t\tif len+1 > CAP {\n\t\t\tmaxLoops = CAP - 1\n\t\t} else {\n\t\t\tmaxLoops = len\n\t\t}\n\n\t\t// The last added timestamp for the last ID in the slice.\n\t\tnewTimestamp.TimeStop = tracks[maxLoops].Timestamp\n\n\t\t// Adds the IDs to the slice.\n\t\tfor i := 0; i <= maxLoops; i++ {\n\t\t\tnewTimestamp.Tracks = append(newTimestamp.Tracks, tracks[i].ID)\n\t\t}\n\n\t\t// Adds the processing time.\n\t\tnewTimestamp.Processing = time.Since(start)\n\n\t\t// Converts the struct to json.\n\t\tjson, err := json.Marshal(newTimestamp)\n\t\tif err != nil {\n\t\t\t// Sets header status code to 500 \"Internal server error\" and logs the error.\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tlog.Fatal(err)\n\t\t} else {\n\t\t\t// Sets header content-type to application/json and status code to 200 (OK).\n\t\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\t\tw.WriteHeader(http.StatusOK)\n\n\t\t\t// Returns API info as json.\n\t\t\tw.Write([]byte(json))\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b9e134fb6dbee37e97d3a6e9a9d175d3", "score": "0.44884735", "text": "func (transporter *Transport) Get(uuid uuid.UUID, namespace string) (*RetTimerInfo, error) {\n\tdb, err := sql.Open(datab, connect)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer db.Close()\n\tuuidstr := uuid.String()\n\tparameter := &proto.TimerInfo{\n\t\tTimerID: uuidstr,\n\t\tNameSpace: namespace,\n\t}\n\tquery, err := transporter.BuildQuery(databName, \"get\", parameter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tresults := db.QueryRow(query)\n\n\tvar timerInfo RetTimerInfo\n\terr = results.Scan(&timerInfo.TimerID, &timerInfo.ShardID, &timerInfo.Namespace, &timerInfo.Interval, &timerInfo.Count, &timerInfo.Starttime, &timerInfo.Mostrecent,\n\t\t&timerInfo.Amountfired, &timerInfo.Timecreated)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &timerInfo, nil\n}", "title": "" }, { "docid": "aded176f669ae53e195f98b54546b1b3", "score": "0.4482606", "text": "func (m *Measurement) GetInfluxPoint(hostTags map[string]string) (int64, int64, int64, int64, []*client.Point) {\n\tvar metSent int64\n\tvar metError int64\n\tvar measSent int64\n\tvar measError int64\n\tvar ptarray []*client.Point\n\n\tswitch m.cfg.GetMode {\n\tcase \"value\":\n\t\tk := m.MetricTable.Row[\"0\"]\n\t\tvar t time.Time\n\t\tFields := make(map[string]interface{})\n\t\tfor _, v_mtr := range k.Data {\n\t\t\tif v_mtr.CookedValue == nil {\n\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has no valid data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, hostTags, v_mtr)\n\t\t\t\tmetError++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif v_mtr.Valid == false {\n\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has obsolete data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, hostTags, v_mtr)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif v_mtr.Report == metric.NeverReport {\n\t\t\t\tm.Debugf(\"REPORT is FALSE in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif v_mtr.Report == metric.OnNonZeroReport {\n\t\t\t\tif v_mtr.CookedValue == 0.0 {\n\t\t\t\t\tm.Debugf(\"REPORT on non zero in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tm.Debugf(\"generating field for %s value %f \", v_mtr.GetFieldName(), v_mtr.CookedValue)\n\t\t\tm.Debugf(\"DEBUG METRIC %+v\", v_mtr)\n\t\t\tFields[v_mtr.GetFieldName()] = v_mtr.CookedValue\n\t\t\tt = v_mtr.CurTime\n\t\t\tmetSent++\n\t\t}\n\t\tm.Debugf(\"FIELDS:%+v\", Fields)\n\n\t\tpt, err := client.NewPoint(\n\t\t\tm.cfg.Name,\n\t\t\thostTags,\n\t\t\tFields,\n\t\t\tt,\n\t\t)\n\t\tif err != nil {\n\t\t\tm.Warnf(\"error in influx point building:%s\", err)\n\t\t\tmeasError++\n\t\t} else {\n\t\t\tm.Debugf(\"GENERATED INFLUX POINT[%s] value: %+v\", m.cfg.Name, pt)\n\t\t\tptarray = append(ptarray, pt)\n\t\t\tmeasSent++\n\t\t\tk.Valid = true\n\t\t}\n\n\tcase \"indexed\", \"indexed_it\":\n\t\tvar t time.Time\n\t\tfor k_idx, v_idx := range m.MetricTable.Row {\n\t\t\tm.Debugf(\"generating influx point for indexed %s\", k_idx)\n\t\t\t//copy tags and add index tag\n\t\t\tTags := make(map[string]string)\n\t\t\tfor k_t, v_t := range hostTags {\n\t\t\t\tTags[k_t] = v_t\n\t\t\t}\n\t\t\tTags[m.cfg.IndexTag] = k_idx\n\t\t\tm.Debugf(\"IDX :%+v\", v_idx)\n\t\t\tFields := make(map[string]interface{})\n\t\t\tfor _, v_mtr := range v_idx.Data {\n\t\t\t\tv_mtr.PrintDebugCfg()\n\t\t\t\tif v_mtr.IsTag() == true {\n\t\t\t\t\tif v_mtr.CookedValue == nil {\n\t\t\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has no valid data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, Tags, v_mtr)\n\t\t\t\t\t\tmetError++ //not sure if an tag error should be count as metric\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Valid == false {\n\t\t\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has obsolete data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, hostTags, v_mtr)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Report == metric.NeverReport {\n\t\t\t\t\t\tm.Debugf(\"REPORT is FALSE in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\n\t\t\t\t\tvar tag string\n\t\t\t\t\tswitch v := v_mtr.CookedValue.(type) {\n\t\t\t\t\tcase float64:\n\t\t\t\t\t\t//most of times these will be integers\n\t\t\t\t\t\ttag = strconv.FormatInt(int64(v), 10)\n\t\t\t\t\tdefault:\n\t\t\t\t\t\t//assume string\n\t\t\t\t\t\ttag = v.(string)\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Report == metric.OnNonZeroReport {\n\t\t\t\t\t\tif tag == \"0\" {\n\t\t\t\t\t\t\tm.Debugf(\"REPORT on non zero in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tm.Debugf(\"generating Tag for Metric: %s : tagname: %s\", v_mtr.GetFieldName(), tag)\n\t\t\t\t\tTags[v_mtr.GetFieldName()] = tag\n\t\t\t\t} else {\n\t\t\t\t\tif v_mtr.CookedValue == nil {\n\t\t\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has no valid data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, Tags, v_mtr)\n\t\t\t\t\t\tmetError++\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Valid == false {\n\t\t\t\t\t\tm.Warnf(\"Warning METRIC ID [%s] from MEASUREMENT[ %s ] with TAGS [%+v] has obsolete data => See Metric Runtime [ %+v ]\", v_mtr.ID, m.cfg.ID, hostTags, v_mtr)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Report == metric.NeverReport {\n\t\t\t\t\t\tm.Debugf(\"REPORT is FALSE in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tif v_mtr.Report == metric.OnNonZeroReport {\n\t\t\t\t\t\tif v_mtr.CookedValue == 0.0 {\n\t\t\t\t\t\t\tm.Debugf(\"REPORT on non zero in METRIC ID [%s] from MEASUREMENT[ %s ] won't be reported to the output backend\", v_mtr.ID, m.cfg.ID)\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t\tm.Debugf(\"generating field for Metric: %s : value %#v\", v_mtr.GetFieldName(), v_mtr.CookedValue)\n\t\t\t\t\tm.Debugf(\"DEBUG METRIC %+v\", v_mtr)\n\t\t\t\t\tFields[v_mtr.GetFieldName()] = v_mtr.CookedValue\n\t\t\t\t}\n\t\t\t\tmetSent++\n\t\t\t\t//reported gathered time for the measurment is choosed as the last field time\n\t\t\t\tt = v_mtr.CurTime\n\t\t\t}\n\t\t\t//here we can chek Fields names prior to send data\n\t\t\tm.Debugf(\"FIELDS:%+v TAGS:%+v\", Fields, Tags)\n\t\t\tpt, err := client.NewPoint(\n\t\t\t\tm.cfg.Name,\n\t\t\t\tTags,\n\t\t\t\tFields,\n\t\t\t\tt,\n\t\t\t)\n\t\t\tif err != nil {\n\t\t\t\tm.Warnf(\"error in influx point creation :%s\", err)\n\t\t\t\tmeasError++\n\t\t\t} else {\n\t\t\t\tm.Debugf(\"GENERATED INFLUX POINT[%s] index [%s]: %+v\", m.cfg.Name, k_idx, pt)\n\t\t\t\tptarray = append(ptarray, pt)\n\t\t\t\tmeasSent++\n\t\t\t\tv_idx.Valid = true\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn metSent, metError, measSent, measError, ptarray\n\n}", "title": "" }, { "docid": "6264df1c91fa3c8ac57d08e6e31b9cc1", "score": "0.44762886", "text": "func (_Oracle *OracleSession) IndexRequestId() (*big.Int, error) {\n\treturn _Oracle.Contract.IndexRequestId(&_Oracle.CallOpts)\n}", "title": "" }, { "docid": "7daddb14d1e14085db9af603b701011b", "score": "0.44743454", "text": "func (c *Client) GetTimestamp(ctx context.Context) (uint64, error) {\n\tbo := retry.NewBackofferWithVars(ctx, transaction.TsoMaxBackoff, nil)\n\tstartTS, err := c.GetTimestampWithRetry(bo, oracle.GlobalTxnScope)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\treturn startTS, nil\n}", "title": "" }, { "docid": "ecf59b963ef9ee98683489878483ad68", "score": "0.44680768", "text": "func requestsByTraceID(req *tempopb.PushRequest, userID string, spanCount int) ([]uint32, []*tempopb.Trace, [][]byte, error) {\n\ttype traceAndID struct {\n\t\tid []byte\n\t\ttrace *tempopb.Trace\n\t}\n\n\tconst tracesPerBatch = 20 // p50 of internal env\n\ttracesByID := make(map[uint32]*traceAndID, tracesPerBatch)\n\tspansByILS := make(map[uint32]*v1.InstrumentationLibrarySpans)\n\n\tfor _, ils := range req.Batch.InstrumentationLibrarySpans {\n\t\tfor _, span := range ils.Spans {\n\t\t\ttraceID := span.TraceId\n\t\t\tif !validation.ValidTraceID(traceID) {\n\t\t\t\treturn nil, nil, nil, status.Errorf(codes.InvalidArgument, \"trace ids must be 128 bit\")\n\t\t\t}\n\n\t\t\ttraceKey := util.TokenFor(userID, traceID)\n\t\t\tilsKey := traceKey\n\t\t\tif ils.InstrumentationLibrary != nil {\n\t\t\t\tilsKey = fnv1a.AddString32(ilsKey, ils.InstrumentationLibrary.Name)\n\t\t\t\tilsKey = fnv1a.AddString32(ilsKey, ils.InstrumentationLibrary.Version)\n\t\t\t}\n\n\t\t\texistingILS, ok := spansByILS[ilsKey]\n\t\t\tif !ok {\n\t\t\t\texistingILS = &v1.InstrumentationLibrarySpans{\n\t\t\t\t\tInstrumentationLibrary: ils.InstrumentationLibrary,\n\t\t\t\t\tSpans: make([]*v1.Span, 0, spanCount/tracesPerBatch),\n\t\t\t\t}\n\t\t\t\tspansByILS[ilsKey] = existingILS\n\t\t\t}\n\t\t\texistingILS.Spans = append(existingILS.Spans, span)\n\n\t\t\t// if we found an ILS we assume its already part of a request and can go to the next span\n\t\t\tif ok {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\texistingTrace, ok := tracesByID[traceKey]\n\t\t\tif !ok {\n\t\t\t\texistingTrace = &traceAndID{\n\t\t\t\t\tid: traceID,\n\t\t\t\t\ttrace: &tempopb.Trace{\n\t\t\t\t\t\tBatches: make([]*v1.ResourceSpans, 0, spanCount/tracesPerBatch),\n\t\t\t\t\t},\n\t\t\t\t}\n\n\t\t\t\ttracesByID[traceKey] = existingTrace\n\t\t\t}\n\n\t\t\texistingTrace.trace.Batches = append(existingTrace.trace.Batches, &v1.ResourceSpans{\n\t\t\t\tResource: req.Batch.Resource,\n\t\t\t\tInstrumentationLibrarySpans: []*v1.InstrumentationLibrarySpans{existingILS},\n\t\t\t})\n\t\t}\n\t}\n\n\tmetricTracesPerBatch.Observe(float64(len(tracesByID)))\n\n\tkeys := make([]uint32, 0, len(tracesByID))\n\ttraces := make([]*tempopb.Trace, 0, len(tracesByID))\n\tids := make([][]byte, 0, len(tracesByID))\n\n\tfor k, r := range tracesByID {\n\t\tkeys = append(keys, k)\n\t\ttraces = append(traces, r.trace)\n\t\tids = append(ids, r.id)\n\t}\n\n\treturn keys, traces, ids, nil\n}", "title": "" }, { "docid": "6676138a48c2ee62830fee88d96d3593", "score": "0.4456492", "text": "func (_ZapMaster *ZapMasterCallerSession) GetRequestIdByRequestQIndex(_index *big.Int) (*big.Int, error) {\r\n\treturn _ZapMaster.Contract.GetRequestIdByRequestQIndex(&_ZapMaster.CallOpts, _index)\r\n}", "title": "" }, { "docid": "8b67d4ca53d1f2fce5e3196f05a7f5f5", "score": "0.4455164", "text": "func (ir *ImportRequest) ValidateWithTimestamp(indexCreatedAt, fieldCreatedAt int64) error {\n\tif (ir.IndexCreatedAt != 0 && ir.IndexCreatedAt != indexCreatedAt) ||\n\t\t(ir.FieldCreatedAt != 0 && ir.FieldCreatedAt != fieldCreatedAt) {\n\t\treturn ErrPreconditionFailed\n\t}\n\n\treturn nil\n}", "title": "" } ]
1936226578f8cee74465f6bc62fc538d
The description of event bus.
[ { "docid": "ece6b0cb3bb844b90559638c894ce543", "score": "0.7153448", "text": "func (o GetEventBusesBusOutput) Description() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetEventBusesBus) string { return v.Description }).(pulumi.StringOutput)\n}", "title": "" } ]
[ { "docid": "8143e6ba3341230b89913569ebc3486b", "score": "0.6964368", "text": "func (e *Event) Description() string {\n\treturn e.description\n}", "title": "" }, { "docid": "cf8c21ff8bb31a122b004856caa8d181", "score": "0.6583359", "text": "func eventDescription(event *types.Event) string {\n\treturn fmt.Sprintf(\"Server: %s, \\nCheck: %s, \\nStatus: %s, \\nCheck Output: %s, \\nAnnotation Information: %s\\n\", event.Entity.Name, event.Check.Name, formattedEventAction(event), event.Check.Output, parseAnnotations(event))\n}", "title": "" }, { "docid": "0fa18f4440990cad568044b9211e6feb", "score": "0.64123005", "text": "func (factory *SevenBeeFactory) Description() string {\n\treturn \"Sends SMS messages\"\n}", "title": "" }, { "docid": "ac51c5d216992ae7eb194db749908dbd", "score": "0.6164969", "text": "func (o EventIntegrationOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *EventIntegration) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a6c39b516e0556456d4f87e0d954f240", "score": "0.61559045", "text": "func (b EchoBot) Description() string {\n\treturn \"<something>\"\n}", "title": "" }, { "docid": "61996e7c1947b40591d12c534fcc0120", "score": "0.6109501", "text": "func (c *ELM327) Description() (string, error) {\n\treturn c.SendAT(\"@1\")\n}", "title": "" }, { "docid": "b18ae7105bf661e2a15bfd3eb1b7aec5", "score": "0.60073096", "text": "func (module *Module) Description() string {\n\treturn \"Probe for Tridium Fox\"\n}", "title": "" }, { "docid": "c2e99190ecb5c9ce65801e78cfab5255", "score": "0.59959877", "text": "func (s *SignalFx) Description() string {\n\treturn \"Send metrics to SignalFx\"\n}", "title": "" }, { "docid": "fb6db392bcb316e87804462c35ecbc78", "score": "0.59780455", "text": "func (g *Given) EventBus(text string) *Given {\n\tg.t.Helper()\n\tg.eventBus = &eventbusv1alpha1.EventBus{}\n\tg.readResource(text, g.eventBus)\n\tl := g.eventBus.GetLabels()\n\tif l == nil {\n\t\tl = map[string]string{}\n\t}\n\tl[Label] = LabelValue\n\tg.eventBus.SetLabels(l)\n\tg.eventBus.SetName(EventBusName)\n\treturn g\n}", "title": "" }, { "docid": "09c8a8d0801ca4d3b01513001ead14e7", "score": "0.59772736", "text": "func (i *InfluxDB) Description() string {\n\treturn \"Configuration for influxdb server to send metrics to\"\n}", "title": "" }, { "docid": "2da78d721bc45d2277f9af4b131cdcd0", "score": "0.5880103", "text": "func (*EventNote) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{5}\n}", "title": "" }, { "docid": "f8a9432789b9d713caee377a10ff034e", "score": "0.58762205", "text": "func (n *RemoveNewsroomWatchersTrigger) Description() string {\n\treturn \"Remove watching of newsroom events\"\n}", "title": "" }, { "docid": "01a286970e1b3bc481ae917db0a196af", "score": "0.5866208", "text": "func (systemd_units *SystemdUnits) Description() string {\n\treturn \"Gather systemd units state\"\n}", "title": "" }, { "docid": "0d911a870a854a36370596a5f431422d", "score": "0.5827508", "text": "func (n *AddNewsroomWatchersTrigger) Description() string {\n\treturn \"Start watching for newsroom events on TCR whitelisting events\"\n}", "title": "" }, { "docid": "155217e3374cf63ef63c3e7092802e48", "score": "0.58269304", "text": "func (s *SystemdTimings) Description() string {\n\treturn \"Gather systemd boot and unit timing data\"\n}", "title": "" }, { "docid": "68ddb5fb5ab2b6b44d3882aaa9a53b70", "score": "0.58256084", "text": "func (o QueueOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *Queue) pulumi.StringPtrOutput { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5f99caa72dd963c9e77e952f5f8a1dea", "score": "0.5803347", "text": "func (c *Channel) Description() string {\n\treturn c.description\n}", "title": "" }, { "docid": "03c59fed2402a158d0d4babaa03aab1f", "score": "0.5784752", "text": "func (c *ClickHouse) Description() string {\n\treturn \"clickhouse desc\"\n}", "title": "" }, { "docid": "05e5911f28df39d8b1ae8339f974cad4", "score": "0.5764564", "text": "func (n *Vspheretpgy) Description() string {\n\treturn \"Read vCenter status information\"\n}", "title": "" }, { "docid": "5ae535d55f66189a1ace4c62afa32f83", "score": "0.57598156", "text": "func (*EventNotes) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{10}\n}", "title": "" }, { "docid": "f4cef3373ee04d0c1364dd42a8bd8dc4", "score": "0.575853", "text": "func (o *OpcUA) Description() string {\n\treturn description\n}", "title": "" }, { "docid": "5b11c4f2bba9b57352d58179a7ffcd25", "score": "0.57523924", "text": "func (_AggregatorV2V3Interface *AggregatorV2V3InterfaceSession) Description() (string, error) {\n\treturn _AggregatorV2V3Interface.Contract.Description(&_AggregatorV2V3Interface.CallOpts)\n}", "title": "" }, { "docid": "a91e2e72a5b4d60e4fee13b1e41dc5be", "score": "0.5741497", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_beubo_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "fd10525e1d5419732c7fed201e045fc3", "score": "0.57253164", "text": "func (e *Event) String() string {\n\treturn e.title\n}", "title": "" }, { "docid": "1450a625f06840a9451f82ab1e29e36a", "score": "0.5724717", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "a9b797cf470553a73791ddfa80e27f41", "score": "0.57241637", "text": "func (n *EventReceiver) Event(eventName string) {\n\tfmt.Fprintf(n.W, \"eventName %q\\n\", eventName)\n}", "title": "" }, { "docid": "71e60ce82d44e1604a062ffcb1c4dcee", "score": "0.572283", "text": "func (cmd ConfigCmd) Description() string {\n\treturn \"Dolt configuration.\"\n}", "title": "" }, { "docid": "b6de1f1fbf2933b2a9ef15149adb913d", "score": "0.57080036", "text": "func (s *Systemctl) Description() string {\n\treturn \"Systemctl state monitor\"\n}", "title": "" }, { "docid": "8093caa4d8f2801a01f51f9cfb804b3d", "score": "0.5705543", "text": "func (n *EventReceiver) Event(eventName string) {\n\n}", "title": "" }, { "docid": "bd6aec9957ec2291c592013bedff5ae4", "score": "0.57024163", "text": "func (*EventComponent) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "c64f2699a983399a01611767e15beafd", "score": "0.56918716", "text": "func (i *Cassandra) Description() string {\n\treturn \"Configuration for cassandra server to send metrics to\"\n}", "title": "" }, { "docid": "cea8aa43a6c8b39c2f49a80e52679dc6", "score": "0.5670097", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_backupdr_logging_v1_eventlog_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3d54e751f0e33074f997dec4008772c6", "score": "0.56690717", "text": "func (b ExcuseBot) Description() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "6583c8cd174f293df9f91f0e3dcdce30", "score": "0.5663983", "text": "func (cfg Config) Description() string {\n\treturn cfg.description\n}", "title": "" }, { "docid": "0f98cbd43d182f2de8acfcced360329b", "score": "0.56493706", "text": "func (_AggregatorV2V3Interface *AggregatorV2V3InterfaceCallerSession) Description() (string, error) {\n\treturn _AggregatorV2V3Interface.Contract.Description(&_AggregatorV2V3Interface.CallOpts)\n}", "title": "" }, { "docid": "508e5ab7a5efbe90528eb893a614ef55", "score": "0.5638848", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_interservice_notifications_service_events_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "2ee7c40f612403a801268f1c3c266414", "score": "0.563484", "text": "func (a *CMP) Description() string {\n\treturn \"Configuration for CMP Server to send metrics to.\"\n}", "title": "" }, { "docid": "8b0d37fd86ab704c8bf99834698b782f", "score": "0.5626217", "text": "func (o *EventTypeIn) GetDescription() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Description\n}", "title": "" }, { "docid": "e7cb28c7862008de4a0ecf9b47485578", "score": "0.5624389", "text": "func (*EventComponents) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "1498e28b22bedf5d9b71c27c485f1872", "score": "0.56143147", "text": "func (*EventNoteConfig) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "a1dfa2534600d4640b227267afd4b9cc", "score": "0.55948657", "text": "func (bridge *Bridge) Description() *plutus.BridgeDescription {\n\treturn culqiDescription\n}", "title": "" }, { "docid": "4ff1559f0bb0bc4980001675bd1c2dfe", "score": "0.55829823", "text": "func (e *DriedEar) Description() {\n\tfmt.Printf(\"Hi, i'm a size %d Pork Ear\\n\", e.size)\n}", "title": "" }, { "docid": "a9dc578d279659c397561b0062436a76", "score": "0.5582154", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_ml_metadata_proto_metadata_store_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "881e06966b42fa821fe94751f81c9f91", "score": "0.55804074", "text": "func (_Erc20 *Erc20Session) Description() (string, error) {\n\treturn _Erc20.Contract.Description(&_Erc20.CallOpts)\n}", "title": "" }, { "docid": "abb2905770e396610d0c003b0ecb03c7", "score": "0.5577419", "text": "func (k *KafkaGo) Description() string {\n\treturn \"kafka consumer of topic \" + k.taskCfg.Topic\n}", "title": "" }, { "docid": "01c1c9d6884954b02d380f7b39a7cfc9", "score": "0.5576125", "text": "func (o GetEventSourcesSourceOutput) Description() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetEventSourcesSource) string { return v.Description }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "afcd8210b8ac636c9cf8cfbd576b1558", "score": "0.5550594", "text": "func (bus *Bus) String() string {\n\treturn fmt.Sprintf(\"A:%#X D:%#X\", bus.Address, bus.Data)\n}", "title": "" }, { "docid": "17bae69d056334e312b76b9f5160cb01", "score": "0.55432296", "text": "func (s *fakeState) Description() string {\n\treturn s.description\n}", "title": "" }, { "docid": "40dca3babd401e62ebd9965308b9321f", "score": "0.5542535", "text": "func (ler *LogEventReceiver) Event(eventName string) {\n\tler.log.Println(eventName)\n}", "title": "" }, { "docid": "4c7b3cb2b4664bb2cea580a8fdb4e092", "score": "0.5531668", "text": "func (e ErrDomain) Description() string {\n\treturn e.description\n}", "title": "" }, { "docid": "3113fdbdecec50d832779f44e9eef80c", "score": "0.55243737", "text": "func (ev *EventMeta) Name() string {\n\treturn \"EventMeta\"\n}", "title": "" }, { "docid": "bd87ed5936079f6a0a25b809e0fe841c", "score": "0.55150473", "text": "func (cmd *JobLogs) Description() string { return cmd.Synopsis() }", "title": "" }, { "docid": "3b789cac2d2b3480335b4bbbc277db2d", "score": "0.55125195", "text": "func (*JBoss4) Description() string {\n\treturn \"Telegraf plugin for gathering metrics from JBoss4 AS\"\n}", "title": "" }, { "docid": "fe6bbafaf78fafab978b91312395d8ff", "score": "0.550775", "text": "func (*TestStreamPayload_Event) Descriptor() ([]byte, []int) {\n\treturn file_org_apache_beam_model_pipeline_v1_beam_runner_api_proto_rawDescGZIP(), []int{22, 0}\n}", "title": "" }, { "docid": "6570216ef73f44cdc4d8be5369553180", "score": "0.54986197", "text": "func (e *basicEvent) String() string {\n\treturn fmt.Sprintf(\"[%s] %s: %s\", e.etype, e.Ident, e.Component())\n}", "title": "" }, { "docid": "c1f009205e5b4c9b239a987ca016a54e", "score": "0.5494254", "text": "func (cmd *CLI) Description() string {\n\treturn cmd.description\n}", "title": "" }, { "docid": "e16c7c6664024f8e999ec7b6a92715e8", "score": "0.5488901", "text": "func (o BackendOutput) Description() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v Backend) *string { return v.Description }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "3b346de203b8372437f2d062662b3e95", "score": "0.54851806", "text": "func (*EventDetail) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_recommendationengine_v1beta1_user_event_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "0ac86401cf6ff7190f276154198524c2", "score": "0.5484964", "text": "func (vd *Verb_Delegate) Description() string {\n\treturn \"the method will delegate to another object.\"\n}", "title": "" }, { "docid": "09279ba34b7e8bde08624e70135a60db", "score": "0.5472902", "text": "func (*TimerEventMsg) Descriptor() ([]byte, []int) {\n\treturn file_eventTimerCallback_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "38346962cf529e66cc80512c802e11bd", "score": "0.54717493", "text": "func (driver Driver) Description() string {\n\treturn driver.data.Description.String()\n}", "title": "" }, { "docid": "575b59611f37b79f9d84e742cf3f3f8c", "score": "0.5466595", "text": "func (_AggregatorV2V3Interface *AggregatorV2V3InterfaceCaller) Description(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _AggregatorV2V3Interface.contract.Call(opts, &out, \"description\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "6df609baeb56fae16b05b356dbd221ce", "score": "0.5464677", "text": "func (bas *BaseService) Description() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "edfc240f2d41aa411044c00d77a30c63", "score": "0.5456881", "text": "func (s *Service) Description() string {\n\treturn s.desc\n}", "title": "" }, { "docid": "6f4cb02fafa82b44e303db5aba8b87c4", "score": "0.5453731", "text": "func (i Init) Description(w io.Writer) {\n\tfmt.Fprintln(w, \"Setup basic configuration\")\n}", "title": "" }, { "docid": "2b00d7ce111ad83e13dfbff8b2f74fdb", "score": "0.54502475", "text": "func (v ScreenChangeNotifyEvent) String() string {\n\tfieldVals := make([]string, 0, 11)\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Sequence: %d\", v.Sequence))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Rotation: %d\", v.Rotation))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Timestamp: %d\", v.Timestamp))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"ConfigTimestamp: %d\", v.ConfigTimestamp))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Root: %d\", v.Root))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"RequestWindow: %d\", v.RequestWindow))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"SizeID: %d\", v.SizeID))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"SubpixelOrder: %d\", v.SubpixelOrder))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Width: %d\", v.Width))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Height: %d\", v.Height))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Mwidth: %d\", v.Mwidth))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Mheight: %d\", v.Mheight))\n\treturn \"ScreenChangeNotify {\" + xgb.StringsJoin(fieldVals, \", \") + \"}\"\n}", "title": "" }, { "docid": "44ccc27e0b6497e0e8dd64778b5f16a3", "score": "0.5449952", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_gateway_gateway_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "3ef0d6f11b4267a67b4f4eb05f4871ed", "score": "0.5435099", "text": "func (e Event) String() string {\n\tb := strings.Builder{}\n\tif e.OdataContext != \"\" {\n\t\tb.WriteString(\"\\n @odata.context: \" + e.OdataContext + \"\\n\")\n\t}\n\tb.WriteString(\" @odata.type: \" + e.OdataType + \"\\n\")\n\tif e.Actions != nil {\n\t\tb.WriteString(\" Actions: \" + string(e.Actions) + \"\\n\")\n\t}\n\tif e.Context != \"\" {\n\t\tb.WriteString(\" Context: \" + e.Context + \"\\n\")\n\t}\n\tb.WriteString(\" Id: \" + e.ID + \"\\n\")\n\tb.WriteString(\" Name: \" + e.Name + \"\\n\")\n\tif e.Oem != nil {\n\t\tb.WriteString(\" Oem: \" + string(e.Oem) + \"\\n\")\n\t}\n\tfor i, e := range e.Events {\n\t\tb.WriteString(\" Events[\" + strconv.Itoa(i) + \"]:\")\n\t\tb.WriteString(e.String())\n\t}\n\treturn b.String()\n}", "title": "" }, { "docid": "64ba0665c261934f9b277b5187d9e24e", "score": "0.54286104", "text": "func (e event) String() string {\n\tswitch e {\n\tcase run:\n\t\treturn \"run\"\n\tcase pause:\n\t\treturn \"pause\"\n\tcase resume:\n\t\treturn \"resume\"\n\tcase push:\n\t\treturn \"params\"\n\t}\n\treturn \"unknown\"\n}", "title": "" }, { "docid": "6093e24e598fe70172161a869a1669e6", "score": "0.54269564", "text": "func (play Play) Description() string {\n\treturn play.description\n}", "title": "" }, { "docid": "1c39d3ee3e87ba02a0464cb874c31fa8", "score": "0.54236376", "text": "func (_Erc20 *Erc20CallerSession) Description() (string, error) {\n\treturn _Erc20.Contract.Description(&_Erc20.CallOpts)\n}", "title": "" }, { "docid": "88d37f97c418b7c1be09fa7ad8a71f1f", "score": "0.5417993", "text": "func (*Events) Descriptor() ([]byte, []int) {\n\treturn file_transport_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "50d6945b1ea2f2705c393a7f27b9d614", "score": "0.54135656", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_go_chromium_org_luci_cipd_api_cipd_v1_events_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "2fb254f4e19ccb355007bbe8bc72d625", "score": "0.54131556", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_tm_replay_proto_rawDescGZIP(), []int{7}\n}", "title": "" }, { "docid": "bd64bccfc3086fc7d843b3e019c2fdca", "score": "0.5407118", "text": "func (*EventBlock) Descriptor() ([]byte, []int) {\n\treturn file_eth_v1_events_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "69f78b037e790c2b186e7868c89421b1", "score": "0.539871", "text": "func (e *EventMessage) String() string {\n\treturn fmt.Sprintf(\"[EventMessage %v]\", e.Event)\n}", "title": "" }, { "docid": "820da61c35c3711477373f1d21a9d7a7", "score": "0.53972095", "text": "func (w *DebugModule) Description(info *GuildInfo) string {\n\treturn \"Contains various debugging commands and checks for updates. Some of these commands can only be run by the bot owner. If you are selfhosting sweetie bot, these commands can be used to debug the bot.\"\n}", "title": "" }, { "docid": "b16bf820516208b375f0dc7f901c743d", "score": "0.53892255", "text": "func (*EventRead) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "dd8b69af8edcfeb74dad108e5b6dbb2b", "score": "0.5381049", "text": "func (o GetEventBusesBusOutput) EventBusName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetEventBusesBus) string { return v.EventBusName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "28da455ec78bb9f19c6b8c26fb24c818", "score": "0.5379613", "text": "func (*EventNotesConfig) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{8}\n}", "title": "" }, { "docid": "57abb81ef56caa68be55474ebd4834ed", "score": "0.53773296", "text": "func (_Erc20 *Erc20Caller) Description(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _Erc20.contract.Call(opts, out, \"description\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a09b2d39ef44f27298f1eabf785c1f28", "score": "0.5364437", "text": "func (s *Base) Description() string {\n\treturn s.desc\n}", "title": "" }, { "docid": "78b6e2fad4b9bcb14b2484a8e609274f", "score": "0.5361257", "text": "func GenerateDescription(region *string) string {\n\treturn fmt.Sprintf(\"Bigshot lambda worker in %s\", *region)\n}", "title": "" }, { "docid": "73f0d1590ec7ec230bd09df34d504dfa", "score": "0.5360706", "text": "func (v NotifyEvent) String() string {\n\tfieldVals := make([]string, 0, 2)\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"Sequence: %d\", v.Sequence))\n\tfieldVals = append(fieldVals, xgb.Sprintf(\"SubCode: %d\", v.SubCode))\n\treturn \"Notify {\" + xgb.StringsJoin(fieldVals, \", \") + \"}\"\n}", "title": "" }, { "docid": "18d83edefe695ae61c90212b18c89d30", "score": "0.5355549", "text": "func (w *ConfigModule) Description(info *GuildInfo) string { return \"Manages the configuration file.\" }", "title": "" }, { "docid": "30541ff64873710c05381b02668a81ed", "score": "0.53545505", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_proto_alert_alert_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "25d362dfb095f6b26c327752c021eb7f", "score": "0.53542084", "text": "func (*EventAck) Descriptor() ([]byte, []int) {\n\treturn file_arista_event_v1_event_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "7a7dfdf024f983ada3d3a97b5af452bc", "score": "0.5352501", "text": "func (*EventHead) Descriptor() ([]byte, []int) {\n\treturn file_eth_v1_events_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "48eb1f3c5212e439797883635066ef74", "score": "0.5352177", "text": "func (sb *SetBalancer) Description() string {\n\treturn sb.Name()\n}", "title": "" }, { "docid": "a15a452cac20abdd237c279384d8de2f", "score": "0.53519446", "text": "func (w *DebugModule) Description() string {\n\treturn \"Contains various debugging commands. Some of these commands can only be run by the bot owner.\"\n}", "title": "" }, { "docid": "9f81c481110d5479db0c03f791469313", "score": "0.53472966", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_protobuf_index_proto_rawDescGZIP(), []int{23}\n}", "title": "" }, { "docid": "1337259ef2d94a40dbdf9870f0e27a6f", "score": "0.5344128", "text": "func (c Channel) Description() string {\n\treturn fmt.Sprintf(\"%s %s %s\", c.Make, strings.Split(strings.Fields(c.Model)[0], \"/\")[0], c.Type)\n}", "title": "" }, { "docid": "80e19b63c634069d5f52092d165833f8", "score": "0.5343102", "text": "func (*TelemetrySelfDefinedEvent) Descriptor() ([]byte, []int) {\n\treturn file_huawei_telemetry_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "de853c0a93661b326a1c5ed43d94066b", "score": "0.5339228", "text": "func (e *Event) String() string {\n\treturn e.event.String()\n}", "title": "" }, { "docid": "18d71099cf95d93607a8c3dce4131bc1", "score": "0.5336681", "text": "func (*Event) Descriptor() ([]byte, []int) {\n\treturn file_event_service_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "52bd82961fa014765b8418b30036cb8f", "score": "0.5326497", "text": "func (sh *ShellJob) Description() string {\n\treturn fmt.Sprintf(\"ShellJob: %s\", sh.Cmd)\n}", "title": "" }, { "docid": "d129eb887883dcb22135bfef9b6f6359", "score": "0.53239435", "text": "func (*CMsgPlaceDecalEvent) Descriptor() ([]byte, []int) {\n\treturn file_gameevents_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "d7d580b69d33abd0b8ca5fd4c216871e", "score": "0.5322426", "text": "func (c *CurrentTrackCommand) Description() string {\n\treturn viper.GetString(\"commands.currenttrack.description\")\n}", "title": "" }, { "docid": "ccc873f2b9efc757e4f5d3d19cb29b5a", "score": "0.532162", "text": "func (client *Client) DescribeEventDetail(request *DescribeEventDetailRequest) (response *DescribeEventDetailResponse, err error) {\n\tresponse = CreateDescribeEventDetailResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "title": "" }, { "docid": "ca2b9abebd1a762e84af230156aaeb86", "score": "0.53207475", "text": "func (b *BaseEvent) String() string {\n\treturn fmt.Sprintf(\"BaseEvent[source = %#v]\", b.Source)\n}", "title": "" } ]
e9be57313823cbf32a1863aed03485b4
elementInScope is like popUntil, except that it doesn't modify the stack of open elements.
[ { "docid": "7f9da5c4b5291744ea74624c812f1011", "score": "0.6225554", "text": "func (p *parser) elementInScope(s scope, matchTags ...a.Atom) bool {\n\treturn p.indexOfElementInScope(s, matchTags...) != -1\n}", "title": "" } ]
[ { "docid": "5cfa02b9d6d3849a6854b6dc350d6e5a", "score": "0.6437573", "text": "func (p *parser) popUntil(s scope, matchTags ...a.Atom) bool {\n\tif i := p.indexOfElementInScope(s, matchTags...); i != -1 {\n\t\tp.oe = p.oe[:i]\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "f18a9c88552ca687b9f543536ee02a00", "score": "0.5410829", "text": "func (d *Decoder) popElement(t *EndElement) bool {\n\ts := d.pop()\n\tname := t.Name\n\tswitch {\n\tcase s == nil || s.kind != stkStart:\n\t\td.err = d.syntaxError(\"unexpected end element </\" + name.Local + \">\")\n\t\treturn false\n\tcase s.name.Local != name.Local:\n\t\tif !d.Strict {\n\t\t\td.needClose = true\n\t\t\td.toClose = t.Name\n\t\t\tt.Name = s.name\n\t\t\treturn true\n\t\t}\n\t\td.err = d.syntaxError(\"element <\" + s.name.Local + \"> closed by </\" + name.Local + \">\")\n\t\treturn false\n\tcase s.name.Space != name.Space:\n\t\td.err = d.syntaxError(\"element <\" + s.name.Local + \"> in space \" + s.name.Space +\n\t\t\t\"closed by </\" + name.Local + \"> in space \" + name.Space)\n\t\treturn false\n\t}\n\n\t// Pop stack until a Start or EOF is on the top, undoing the\n\t// translations that were associated with the element we just closed.\n\tfor d.stk != nil && d.stk.kind != stkStart && d.stk.kind != stkEOF {\n\t\ts := d.pop()\n\t\tif s.ok {\n\t\t\td.ns[s.name.Local] = s.name.Space\n\t\t} else {\n\t\t\tdelete(d.ns, s.name.Local)\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "4ceb4c0925dbb01739864651f8ff3400", "score": "0.51328003", "text": "func (h *ElementHolder) Pop() interface{} {\n\tif len(h.elements) == 0 {\n\t\treturn nil\n\t}\n\titem := h.elements[h.Len()-1]\n\th.elements = h.elements[:h.Len()-1]\n\treturn item\n}", "title": "" }, { "docid": "a5807a7192fa280f62f1127a21723eaf", "score": "0.50822806", "text": "func (eh *ElementHolder) Pop() interface{} {\n\tif len(eh.elements) == 0 {\n\t\treturn nil\n\t}\n\told := eh.elements\n\tn := eh.Len()\n\telement := old[n-1]\n\told[n-1] = nil // avoid memory leak\n\telement.Index = -1 // for safety\n\teh.elements = old[:n-1]\n\treturn element\n}", "title": "" }, { "docid": "09b5d614e6627b507f9f0b611d950651", "score": "0.4997038", "text": "func (p *parser) indexOfElementInScope(s scope, matchTags ...a.Atom) int {\n\tfor i := len(p.oe) - 1; i >= 0; i-- {\n\t\ttagAtom := p.oe[i].DataAtom\n\t\tif p.oe[i].Namespace == \"\" {\n\t\t\tfor _, t := range matchTags {\n\t\t\t\tif t == tagAtom {\n\t\t\t\t\treturn i\n\t\t\t\t}\n\t\t\t}\n\t\t\tswitch s {\n\t\t\tcase defaultScope:\n\t\t\t\t// No-op.\n\t\t\tcase listItemScope:\n\t\t\t\tif tagAtom == a.Ol || tagAtom == a.Ul {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\tcase buttonScope:\n\t\t\t\tif tagAtom == a.Button {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\tcase tableScope:\n\t\t\t\tif tagAtom == a.Html || tagAtom == a.Table || tagAtom == a.Template {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\tcase selectScope:\n\t\t\t\tif tagAtom != a.Optgroup && tagAtom != a.Option {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tpanic(\"unreachable\")\n\t\t\t}\n\t\t}\n\t\tswitch s {\n\t\tcase defaultScope, listItemScope, buttonScope:\n\t\t\tfor _, t := range defaultScopeStopTags[p.oe[i].Namespace] {\n\t\t\t\tif t == tagAtom {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "2ae2aa77a179ce969f576d68c482f914", "score": "0.4906979", "text": "func (c *Context) pop() {\n\tc.scope[len(c.scope)-1] = nil // Do not hold on to old frames.\n\tc.scope = c.scope[:len(c.scope)-1]\n}", "title": "" }, { "docid": "8a800609c4d600f32bf9d3e11a037506", "score": "0.48386303", "text": "func (p *Pool) Pop() Element {\n\tp.wg.Add(1)\n\tcount := atomic.AddUint64(&(p.count), 1)\n\tindex := count % p.length\n\tpointer := (*unsafe.Pointer)(unsafe.Pointer(&(p.list[index])))\n\tfor {\n\t\tselect {\n\t\tcase <-p.ctx.Done():\n\t\t\tp.wg.Done()\n\t\t\treturn nil\n\t\tcase <-*p.pause:\n\t\t\tcontinue\n\t\tcase <-*p.subtract:\n\t\t\tindex = count % p.length\n\t\t\tpointer = (*unsafe.Pointer)(unsafe.Pointer(&(p.list[index])))\n\t\t\tcontinue\n\t\tdefault:\n\t\t\telem := atomic.SwapPointer(pointer, nil)\n\t\t\tif elem == nil {\n\t\t\t\truntime.Gosched()\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tep := (*Element)(elem)\n\t\t\treturn *ep\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2bd36676b86b23eeb8cdd83ac7df9b8e", "score": "0.48302448", "text": "func (i *Funny) PopScope() {\n\ti.Vars = i.Vars[:len(i.Vars)-1]\n}", "title": "" }, { "docid": "35581a13e3741446b1289860f278d236", "score": "0.47860464", "text": "func (p *parser) discardScopesUpTo(scopeIndex int) {\n\t// Remove any direct children from their parent\n\tchildren := p.currentScope.Children\n\tfor _, child := range p.scopesInOrder[scopeIndex:] {\n\t\tif child.scope.Parent == p.currentScope {\n\t\t\tfor i := len(children) - 1; i >= 0; i-- {\n\t\t\t\tif children[i] == child.scope {\n\t\t\t\t\tchildren = append(children[:i], children[i+1:]...)\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tp.currentScope.Children = children\n\n\t// Truncate the scope order where we started to pretend we never saw this scope\n\tp.scopesInOrder = p.scopesInOrder[:scopeIndex]\n}", "title": "" }, { "docid": "f755b9b1c0a02ca05196891cdceefb82", "score": "0.4756579", "text": "func ScopeInnermost(s *types.Scope, pos token.Pos) *types.Scope", "title": "" }, { "docid": "fc02efc801d822a3affd794e28d88b61", "score": "0.47453326", "text": "func (xb *XmlBase) Pop() {\n\tn := len(xb.baseUri) - 1\n\tif n <= 0 {\n\t\tif n == 0 && xb.depth[n] > 0 {\n\t\t\txb.depth[n]--\n\t\t}\n\t\treturn\n\t}\n\txb.depth[n]--\n\tif xb.depth[n] <= 0 {\n\t\txb.baseUri = xb.baseUri[0:n]\n\t\txb.depth = xb.depth[0:n]\n\t}\n\treturn\n}", "title": "" }, { "docid": "6d94ad3b6be9cd4b4b9aedab24f8b829", "score": "0.46931988", "text": "func UnwrapExpressionUntil(expr Expression, until func(Expression) bool) Expression {\n\tfor {\n\t\tif until(expr) {\n\t\t\treturn expr\n\t\t}\n\t\tunwrap, wrapped := expr.(unwrapExpression)\n\t\tif !wrapped {\n\t\t\treturn nil\n\t\t}\n\t\texpr = unwrap.UnwrapExpression()\n\t\tif expr == nil {\n\t\t\treturn nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "526c7c62631ce3e6a859f0aaa9af7863", "score": "0.46686754", "text": "func (s *Stack) Pop() Element {\n\tl := len(s.elems)\n\te := s.elems[l-1]\n\ts.elems = s.elems[:l-1]\n\ts.refs.Remove(e.value)\n\treturn e\n}", "title": "" }, { "docid": "2e7c78a74670d1353042269a48c1cf9d", "score": "0.46644863", "text": "func (s *Scope) GetElement(name string) ScopeElement {\n\tif e, ok := s.Elements[name]; ok {\n\t\treturn e\n\t}\n\tif s.Parent != nil {\n\t\treturn s.Parent.GetElement(name)\n\t}\n\tpanic(\"element does not exist \" + name)\n}", "title": "" }, { "docid": "b953e53eff50c9a2c17ec0f54d12688d", "score": "0.46566805", "text": "func globalElement(id string) bool {\n\tif NeverScopedElements[id] || NeverScopedSelectors[id] {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "7b59f12cdad2dbf2425157019dabe3c0", "score": "0.46358046", "text": "func (m *Miner) popFromOverflow() *mapElement {\n\treturn m.overflowMapHeap.pop()\n}", "title": "" }, { "docid": "15917b1ae39815e41c146ec56669d25b", "score": "0.4615131", "text": "func (u *Unbound) Pull(ctx context.Context) terminalapi.Event {\n\tif e := u.Pop(); e != nil {\n\t\treturn e\n\t}\n\n\tu.cond.L.Lock()\n\tdefer u.cond.L.Unlock()\n\tfor {\n\t\tselect {\n\t\tcase <-ctx.Done():\n\t\t\treturn nil\n\t\tdefault:\n\t\t}\n\n\t\tif e := u.Pop(); e != nil {\n\t\t\treturn e\n\t\t}\n\t\tu.cond.Wait()\n\t}\n}", "title": "" }, { "docid": "fd87546ce46106286624e39153aa1bea", "score": "0.45607534", "text": "func (u *Unbound) Pop() terminalapi.Event {\n\tu.mu.Lock()\n\tdefer u.mu.Unlock()\n\n\tif u.empty() {\n\t\treturn nil\n\t}\n\n\tn := u.first\n\tu.first = u.first.next\n\n\tif u.empty() {\n\t\tu.last = nil\n\t}\n\treturn n.event\n}", "title": "" }, { "docid": "74133be56f8f35c5db7757d85578731f", "score": "0.45307824", "text": "func (c *Cursor) element() *leafPageElement {\n\tref := c.stack[len(c.stack)-1]\n\treturn ref.page.leafPageElement(ref.index)\n}", "title": "" }, { "docid": "981aa5614e694585f121a84b18c44e49", "score": "0.45100236", "text": "func (s *Scope) HasElement(name string) ScopeElement {\n\tif e, ok := s.Elements[name]; ok {\n\t\treturn e\n\t}\n\tif s.Parent != nil {\n\t\treturn s.Parent.HasElement(name)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "57aef8bf2ed1e1ddbfa679e0a6e339dc", "score": "0.44766158", "text": "func (c *Compiler) leaveScope() code.Instructions {\n\tinst := c.currentInstructions()\n\n\tc.scopes = c.scopes[:len(c.scopes)-1]\n\tc.scopeIndex--\n\tc.symbolTable = c.symbolTable.Outer\n\treturn inst\n}", "title": "" }, { "docid": "7183b2687d6d51828cad6be70ba589f1", "score": "0.44353727", "text": "func (pq *PriorityQueue) Pop() *Element {\n\tpq.locker.Lock()\n\tdefer pq.locker.Unlock()\n\n\treturn heap.Pop(pq.holder).(*Element)\n}", "title": "" }, { "docid": "cb3e457b9370091b7ae9157117679a78", "score": "0.44074386", "text": "func (t *Token) InScope(needle []string) bool {\n\tallInScope := true\n\n\tfor _, s := range needle {\n\t\tif _, ok := t.tokenScopeMap[s]; !ok {\n\t\t\tallInScope = false\n\t\t}\n\t}\n\n\treturn allInScope\n}", "title": "" }, { "docid": "6d46ba0d7c575bf9f9c693f2cb523a8a", "score": "0.4385157", "text": "func (vp *EmbedViewport) IsInScope(node ki.Ki, popup bool) bool {\n\treturn true // no popups for embedded\n}", "title": "" }, { "docid": "254ed58701a554edbf9d2183f4df5471", "score": "0.4366353", "text": "func (me *XsdGoPkgHasElem_In) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_In; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif err = me.In.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "0d3fec1ae67786eb503d88c92bc68c65", "score": "0.4304484", "text": "func (s *BasePlSqlParserListener) ExitWindowing_elements(ctx *Windowing_elementsContext) {}", "title": "" }, { "docid": "966f0607dd105356cfda688c56a707f7", "score": "0.4291818", "text": "func (t *ScopedSymbolTable) leave() {\n\tl := len(*t)\n\tif l == 0 {\n\t\tpanic(fmt.Errorf(\"Scope imbalance, leave() called more times than enter()\"))\n\t}\n\t(*t) = (*t)[:l-1]\n}", "title": "" }, { "docid": "c467bbd8ebb9a7603c3498f93d7ee4b4", "score": "0.42665276", "text": "func (cpp *Cpp) pop() {\n\tcpp.onstack[cpp.top().path] = false\n\tcpp.top().file.Close()\n\tif len(cpp.files) == 1 {\n\t\tcpp.files = []file{}\n\t} else {\n\t\tcpp.files = cpp.files[:len(cpp.files)-1]\n\t}\n}", "title": "" }, { "docid": "2c36a2cd6d4a719779548ddc7e0bb920", "score": "0.42659336", "text": "func (g *Group) In() *Statement {\n\t// notest\n\ts := In()\n\tg.items = append(g.items, s)\n\treturn s\n}", "title": "" }, { "docid": "206d3105d76fa8117122146e9ade4df6", "score": "0.42637327", "text": "func (m *Miner) popFromBlock() *mapElement {\n\telem := m.blockMapHeap.pop()\n\tm.removeSplitSetFromUnsolvedBlock(elem.id)\n\treturn elem\n}", "title": "" }, { "docid": "a5d1a8f88b16bf5e4eacda38c8deb41a", "score": "0.4258717", "text": "func (f *Frontier) Pop() common.Finder {\n\tminRef := math.MaxFloat64\n\n\tvar minIndex int\n\tfor i := range f.Nodes {\n\t\tif minRef > f.Nodes[i].GetLabel() {\n\t\t\tminRef = f.Nodes[i].GetLabel()\n\t\t\tminIndex = i\n\t\t}\n\t}\n\n\tnode := f.Nodes[minIndex]\n\tf.Nodes = append(f.Nodes[:minIndex], f.Nodes[minIndex+1:]...)\n\n\treturn node\n}", "title": "" }, { "docid": "52ebc5086f63b6c743f632009e38cbe7", "score": "0.42548868", "text": "func (rs *RuneStack) pop() (string, error){\n l := len(rs.items) - 1\n if l < 0{\n return \"\", errors.New(\"pop empty stack nothing to remove\")\n }\n item := rs.items[l]\n rs.items = rs.items[:l]\n return item, nil\n}", "title": "" }, { "docid": "b2565a82666a56dc5640d6e92172068b", "score": "0.42510024", "text": "func (s *BasePlSqlParserListener) ExitReferencing_element(ctx *Referencing_elementContext) {}", "title": "" }, { "docid": "d9286051aa6e1d179fff6930bd8656e3", "score": "0.42506206", "text": "func (t *trunkENI) popENIFromDeleteQueue() (eni *ENIDetails, hasENI bool) {\n\tt.lock.Lock()\n\tdefer t.lock.Unlock()\n\n\tif len(t.deleteQueue) > 0 {\n\t\teni = t.deleteQueue[0]\n\t\thasENI = true\n\t\tt.deleteQueue = t.deleteQueue[1:]\n\t}\n\n\treturn eni, hasENI\n}", "title": "" }, { "docid": "efe4ecff07e421dbbf7003313d417cb0", "score": "0.4245162", "text": "func (s *BasePlSqlParserListener) ExitIn_elements(ctx *In_elementsContext) {}", "title": "" }, { "docid": "6698d7f8efe8757140936360fe4c697e", "score": "0.42351663", "text": "func (p *Pool) Push(elem *Element) {\n\tvar count uint64\n\tif !(*elem).Check() {\n\t\t(*elem).Clean()\n\t\tne := p.newFunc()\n\t\telem = &ne\n\t}\n\telemPointer := *(*unsafe.Pointer)(unsafe.Pointer(&elem))\n\tfor {\n\t\tselect {\n\t\tcase <-p.ctx.Done():\n\t\t\t(*elem).Clean()\n\t\t\tp.wg.Done()\n\t\t\treturn\n\t\tcase <-*p.pause:\n\t\t\tcontinue\n\t\tcase <-*p.subtract:\n\t\t\t(*elem).Clean()\n\t\t\tp.wg.Done()\n\t\t\treturn\n\t\tdefault:\n\t\t\tindex := count % p.length\n\t\t\toldPointer := (*unsafe.Pointer)(unsafe.Pointer(&(p.list[index])))\n\t\t\tok := atomic.CompareAndSwapPointer(oldPointer, unsafe.Pointer(nil), elemPointer)\n\t\t\tif !ok {\n\t\t\t\tcount += 1\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tp.wg.Done()\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "981774d98711042d513dfef5f2d5b7b5", "score": "0.42303583", "text": "func (s *Stack) Pop() (interface{}, error) {\n\tif s.IsEmpty() {\n\t\treturn \"\", fmt.Errorf(\"The stack is empty\")\n\t}\n\n\telement := s.stack[s.top]\n\ts.stack = s.stack[:s.top]\n\ts.top--\n\n\treturn element, nil\n}", "title": "" }, { "docid": "22a5a9e38fccbfbc7032423e499d2e30", "score": "0.420696", "text": "func (v *varDefs) pop() *varDefs {\n\treturn v.up\n}", "title": "" }, { "docid": "807a33e33ab89bb09977149618bf2bc4", "score": "0.4203866", "text": "func (h *ElementHolder) Push(element interface{}) {\n\th.elements = append(h.elements, element)\n}", "title": "" }, { "docid": "e6631e1a90127159384d9d54d846d520", "score": "0.42035013", "text": "func (w *RecvWindow) Pop() []interface{} {\n\treturn w.Range(func(nonce uint64, v interface{}) bool {\n\t\treturn v != nil\n\t})\n}", "title": "" }, { "docid": "1239f12c3451ac2f5d12c9354370c08a", "score": "0.42010435", "text": "func (p *parser) clearStackToContext(s scope) {\n\tfor i := len(p.oe) - 1; i >= 0; i-- {\n\t\ttagAtom := p.oe[i].DataAtom\n\t\tswitch s {\n\t\tcase tableScope:\n\t\t\tif tagAtom == a.Html || tagAtom == a.Table || tagAtom == a.Template {\n\t\t\t\tp.oe = p.oe[:i+1]\n\t\t\t\treturn\n\t\t\t}\n\t\tcase tableRowScope:\n\t\t\tif tagAtom == a.Html || tagAtom == a.Tr || tagAtom == a.Template {\n\t\t\t\tp.oe = p.oe[:i+1]\n\t\t\t\treturn\n\t\t\t}\n\t\tcase tableBodyScope:\n\t\t\tif tagAtom == a.Html || tagAtom == a.Tbody || tagAtom == a.Tfoot || tagAtom == a.Thead || tagAtom == a.Template {\n\t\t\t\tp.oe = p.oe[:i+1]\n\t\t\t\treturn\n\t\t\t}\n\t\tdefault:\n\t\t\tpanic(\"unreachable\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "23e9cfaa10accf9f055ab3cb3bca7979", "score": "0.41824463", "text": "func (cw *NonEmptyStack[T]) PopAll() {\n\tcw.stack = cw.stack[:1]\n}", "title": "" }, { "docid": "ec1d1171a60bd160964345b6eec234a7", "score": "0.41488072", "text": "func (s *Stack) Top() Element {\n\tif len(s.elems) == 0 {\n\t\treturn Element{}\n\t}\n\treturn s.elems[len(s.elems)-1]\n}", "title": "" }, { "docid": "16d0c0a0ffaae4b947054cd0b27d2929", "score": "0.41446885", "text": "func (d *Decoder) pushElement(name Name) {\n\ts := d.push(stkStart)\n\ts.name = name\n}", "title": "" }, { "docid": "2ca73e0b27d55da511a8e01ba66b67a1", "score": "0.41437176", "text": "func Pop() {\n\n}", "title": "" }, { "docid": "5ef016e6db8f54da56540e3f5fe7378a", "score": "0.41410202", "text": "func (itr *elementIterator) Element() *Element { return itr.elem }", "title": "" }, { "docid": "650f451b09d827a8ec11522bc8cf4f81", "score": "0.4136661", "text": "func (*pendCentre) pop() (*task) {\n\treturn nil\n}", "title": "" }, { "docid": "fa6cced3ad6f5a0466fb75a30a0b9e97", "score": "0.4134586", "text": "func (s *PyStack) pop() PyObject {\n\tif s.length > 0 {\n\t\tvar value PyObject\n\t\tvalue, s.topElem = s.topElem.value, s.topElem.next\n\t\ts.length--\n\t\treturn value\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0b82412d5c945af4080f119647138918", "score": "0.4134058", "text": "func (wa WebActivity) AsUntilActivity() (*UntilActivity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "95cbd0be61262733323242c200ca1ced", "score": "0.4132052", "text": "func (o *Container) Pop() string {\n\tthings := o.things\n\tl := len(things)\n\tthing := things[l-1:][0]\n\to.things = things[l:]\n\treturn thing\n}", "title": "" }, { "docid": "0ceb56b698efadecbf00bfda61003998", "score": "0.41291794", "text": "func (q *queue) dequeueElement() {\n\tq.transferElements()\n\tq.messenger = q.messenger[:len(q.messenger)-1]\n}", "title": "" }, { "docid": "6c55a55c77c29aca4afc80b9d1818a24", "score": "0.4125915", "text": "func (s *ScopeStack) Pop() (map[string]*Variable, bool) {\n\tif s.IsEmpty() {\n\t\treturn nil, false\n\t}\n\tindex := len(*s) - 1 // Get the index of the top most element.\n\telement := (*s)[index] // Index into the slice and obtain the element.\n\t*s = (*s)[:index] // Remove it from the stack by slicing it off.\n\treturn element, true\n}", "title": "" }, { "docid": "922c188c7e12e44a6869e64cae5f2d64", "score": "0.41143373", "text": "func (this *MyStack) Pop() int {\n\tele := this.container[len(this.container)-1]\n\tthis.container = this.container[0 : len(this.container)-1]\n\treturn ele\n}", "title": "" }, { "docid": "66dc93e37eea0af5129cc667741409f3", "score": "0.4109191", "text": "func (m *Filter) In(elem interface{}) {\n\tm.in <- elem\n}", "title": "" }, { "docid": "ac36831d330e971b44bde0bd6ca594ca", "score": "0.41054752", "text": "func (s *Stack) Pop() interface{} { //*Item {\n\tif s.count == 0 {\n\t\treturn nil\n\t}\n\tdefer func() {\n\t\ts.count--\n\t\ts.items = s.items[:s.count]\n\t}()\n\treturn s.items[s.count-1]\n}", "title": "" }, { "docid": "5072a3ec8cf3ab0c44593a698db42c4b", "score": "0.41025588", "text": "func (l *List) RangeElement(f func(v interface{}) bool) {\n\tl.lock.RLock()\n\tdefer l.lock.RUnlock()\n\tfor e := l.l.Front(); e != nil; e = e.Next() {\n\t\tif !f(e) {\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a6c5c9223867260fdbe5cbad093ff9df", "score": "0.41008502", "text": "func (c *BoundedLocalCache) evictFromWindow() int {\n\tcandidateNum := 0\n\tnode := c.accessOrderWindowDeque().GetFront()\n\tfor c.windowWeightedSize > c.windowMaximum {\n\t\tif node == nil {\n\t\t\tbreak\n\t\t}\n\t\tnext := node.next\n\t\tc.accessOrderWindowDeque().Remove(node)\n\t\tc.accessOrderProbationDeque().PushBack(node)\n\t\tcandidateNum++\n\t\tc.windowWeightedSize = c.windowWeightedSize - node.weight\n\t\tnode = next\n\t}\n\treturn candidateNum\n}", "title": "" }, { "docid": "8e9b1da06330638f1d1ff6985bf0cbf5", "score": "0.40997308", "text": "func (p *PriorityQ) Pop() (popped interface{}) {\n\tutils.Logger.Debug(\"pop item\")\n\tn := len(p.q)\n\tpopped = p.q[n-1]\n\tp.q[n-1] = nil // avoid memory leak\n\tp.q = p.q[:n-1]\n\treturn popped\n}", "title": "" }, { "docid": "387d9f8f13ccb66ba0eed88dc6d7c4b5", "score": "0.40935", "text": "func (s *ItemStack) Pull() Item {\n\tif len(s.items) == 0 {\n\t\treturn nil\n\t}\n\tret := s.items[len(s.items)-1]\n\ts.items = s.items[0 : len(s.items)-1]\n\treturn ret\n}", "title": "" }, { "docid": "91b744dc498a549526dc4b68c6df7035", "score": "0.4087455", "text": "func (s *Scope) inComponent() *ComponentType {\n\tfor ; s != nil; s = s.Parent {\n\t\tif s.Kind == ComponentScope {\n\t\t\treturn s.Component\n\t\t}\n\t\tif s.Kind == FunctionScope {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c2f243b8e8247af9d61af9b0b1b60d2d", "score": "0.4083648", "text": "func (f factotum) Pop() upspin.Factotum {\n\t// Arbitrarily keep f.previous unchanged, so Pop() is idempotent.\n\t// We don't yet have any need to go further back in time.\n\treturn &factotum{current: f.previous, previous: f.previous, keys: f.keys}\n}", "title": "" }, { "docid": "8c03370b470d17e92b812b1bc0e8084f", "score": "0.40834963", "text": "func (q BitfieldQueue) PopUntil(until abi.ChainEpoch) (values bitfield.BitField, modified bool, err error) {\n\tvar poppedValues []bitfield.BitField\n\tvar poppedKeys []uint64\n\n\tstopErr := fmt.Errorf(\"stop\")\n\tif err = q.ForEach(func(epoch abi.ChainEpoch, bf bitfield.BitField) error {\n\t\tif epoch > until {\n\t\t\treturn stopErr\n\t\t}\n\t\tpoppedKeys = append(poppedKeys, uint64(epoch))\n\t\tpoppedValues = append(poppedValues, bf)\n\t\treturn err\n\t}); err != nil && err != stopErr {\n\t\treturn bitfield.BitField{}, false, err\n\t}\n\n\t// Nothing expired.\n\tif len(poppedKeys) == 0 {\n\t\treturn bitfield.New(), false, nil\n\t}\n\n\tif err = q.BatchDelete(poppedKeys, true); err != nil {\n\t\treturn bitfield.BitField{}, false, err\n\t}\n\tmerged, err := bitfield.MultiMerge(poppedValues...)\n\tif err != nil {\n\t\treturn bitfield.BitField{}, false, err\n\t}\n\n\treturn merged, true, nil\n}", "title": "" }, { "docid": "245f35ba5f828850dc0caaa6622c424a", "score": "0.4079467", "text": "func (c *Context) PopProjectorFromStack(name string) {\n\tc.stackDepth--\n\tc.stackProjectorCounts[name]--\n\tc.projectorStack = c.projectorStack[:len(c.projectorStack)-1]\n}", "title": "" }, { "docid": "66afb8562319603f33f2726737742714", "score": "0.40697005", "text": "func (n *Neighbors) Pop() interface{} {\n\told := *n\n\tneighbor := old[len(old)-1]\n\tneighbor.index = -1 // for safety\n\t*n = old[:len(old)-1]\n\treturn neighbor\n}", "title": "" }, { "docid": "903a080167c2981e8269de27757e5f9d", "score": "0.40673345", "text": "func (rlf *RateLimitedFunction) RunUntil(stopCh <-chan struct{}) {\n\tgo utilwait.Until(rlf.pop, 0, stopCh)\n}", "title": "" }, { "docid": "d7b591d1379a0929641b85e4fe47b30e", "score": "0.406448", "text": "func (r *rcvBuffer) popRange(localAck uint16) (packets []UserPacket, ack uint16) {\n\n\tpackets = make([]UserPacket, r.pQueue.Size())\n\tindex := 0\n\tack = localAck\n\n\tseen := int(localAck)\n\tr.mu.Lock()\n\tfor !r.pQueue.Empty() {\n\t\t_, id := r.pQueue.Head()\n\n\t\tif id <= seen {\n\t\t\ttemp, _ := r.pQueue.Pop()\n\t\t\tdelete(r.contains, temp.(UserPacket).Id)\n\n\t\t}\n\t\tif id > seen+1 {\n\t\t\treturn packets, ack\n\t\t}\n\n\t\tif id == seen+1 {\n\t\t\ttemp, _ := r.pQueue.Pop()\n\t\t\tpackets[index] = temp.(UserPacket)\n\t\t\tdelete(r.contains, temp.(UserPacket).Id)\n\t\t\tack = packets[index].Id\n\t\t\tseen++\n\t\t\tindex++\n\t\t}\n\t}\n\tr.mu.Unlock()\n\n\treturn packets, ack\n}", "title": "" }, { "docid": "5714eed3835df6380be32c59f1dcfc9d", "score": "0.40582076", "text": "func (h Heap[T]) Pop() any {\n\tv := *h.slice\n\tx := v[len(v)-1]\n\t*h.slice = v[:len(v)-1]\n\treturn x\n}", "title": "" }, { "docid": "20cfecb39e11fbbd56ba52bfb5257f13", "score": "0.40556973", "text": "func (b *box) pop() (message *boxMessage) {\n\tb.cond.L.Lock()\n\tdefer b.cond.L.Unlock()\n\tfor {\n\t\tif b.first == nil {\n\t\t\tb.cond.Wait()\n\t\t} else {\n\t\t\tmessage = b.first.message\n\t\t\tb.first = b.first.next\n\t\t\tbreak\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "d2089a378ba5e812a5078147d8d3068e", "score": "0.4050791", "text": "func (s *BasebcplListener) ExitElement(ctx *ElementContext) {}", "title": "" }, { "docid": "05ad81e6ddb9e4cebd8e23f548b12394", "score": "0.40422985", "text": "func (wa WaitActivity) AsUntilActivity() (*UntilActivity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d2c7bb5ef885ea30b76db4fd04318226", "score": "0.40385905", "text": "func (this *Formalizer) PopBindings() {\n\n\tcurrLevelAllowed := this.Allowed().GetValue().Fields()\n\tcurrLevelIndentfiers := this.Identifiers().GetValue().Fields()\n\n\tthis.allowed = this.allowed.Parent().(*value.ScopeValue)\n\tthis.identifiers = this.identifiers.Parent().(*value.ScopeValue)\n\tthis.aliases = this.aliases.Parent().(*value.ScopeValue)\n\n\t// Identifiers that are used in current level but not defined in the current level scope move to parent\n\tfor ident, _ := range currLevelIndentfiers {\n\t\tif currLevelAllowed != nil {\n\t\t\tif ident_val, ok := currLevelAllowed[ident]; !ok {\n\t\t\t\tthis.identifiers.SetField(ident, ident_val)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "81110418f0bfc0180f0a66c9c14ccd47", "score": "0.40383673", "text": "func (l *list) PopBack() *element {\n\te := predecessor(&l.tail)\n\te.mutex.Unlock()\n\tif e == &l.head {\n\t\treturn nil // list empty. Note: async insertions can still be pending\n\t}\n\tif _, ok := l.remove(e, true, nil); ok {\n\t\treturn e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "27dc1b79184cfef65a30ad4893daf9c3", "score": "0.40375757", "text": "func ScopeChild(s *types.Scope, i int) *types.Scope", "title": "" }, { "docid": "32881c4a997747c023233a013f23c6a8", "score": "0.4035177", "text": "func (ll *LimitedList) Pop() interface{} {\n\treturn ll.list.Pop()\n}", "title": "" }, { "docid": "fd5f2e8477495cda96c22cffda9d3db5", "score": "0.40340808", "text": "func (l *List) Pop() interface{} {\n\tif l.length == 0 {\n\t\treturn nil\n\t}\n\treturn l.root.next.Detach().Value\n}", "title": "" }, { "docid": "d60d2848edc765b71dc9410e3807e27c", "score": "0.4032022", "text": "func (l *Slice) Pop() (a Atom, exists bool) {\n\ti := len(*l) - 1\n\tif exists = i >= 0; exists {\n\t\ta = (*l)[i]\n\t\t*l = (*l)[:i]\n\t}\n\treturn\n}", "title": "" }, { "docid": "b08cf248c44f25a02a2197421f4e7328", "score": "0.40285432", "text": "func (s *Stack) pop() interface{} {\n\tif s.isEmpty() {\n\t\treturn nil\n\t}\n\ti := len(s.items) - 1\n\tremoval := s.items[i]\n\ts.items[i] = nil\n\ts.items = s.items[:i]\n\treturn removal\n}", "title": "" }, { "docid": "e30385645e1d7836f93bcb13651045f0", "score": "0.40266472", "text": "func (this *MyStack) Pop() int {\n\ttopElement := this.Top()\n\tthis.Stack = this.Stack[:len(this.Stack)-1]\n\treturn topElement\n}", "title": "" }, { "docid": "f6f257a602d14382bc03b53a657c01a4", "score": "0.4024058", "text": "func (q *Queue) Pop() (v Elem, ok bool) {\n\tif q.Empty() {\n\t\t// Queue is empty, reset to recover space.\n\t\tq.Reset()\n\t\treturn\n\t}\n\n\tv, ok = q.buf[q.off], true\n\tresetSlice(q.buf[q.off : q.off+1]) // avoid memory leaks\n\tq.off++\n\treturn\n}", "title": "" }, { "docid": "cbe0aa5c7834e59b30c3d05753188a78", "score": "0.40213427", "text": "func (this *MyStack) Pop() int {\n\tsize := len(this.enqueue)\n\tfor i := 0; i < size-1; i++ {\n\t\tthis.dequeue = append(this.dequeue, this.enqueue[0])\n\t\tthis.enqueue = this.enqueue[1:]\n\t}\n\n\ttopEle := this.enqueue[0]\n\tthis.enqueue = this.dequeue\n\tthis.dequeue = nil\n\n\treturn topEle\n}", "title": "" }, { "docid": "4ea89e84482750d79f80d6288b84c965", "score": "0.40213218", "text": "func (fea ForEachActivity) AsUntilActivity() (*UntilActivity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "03d14ac6fe76a6788a6939578e513561", "score": "0.40150085", "text": "func (q *Quadtree) InBound(b *geo.Bound, buf ...[]geo.Pointer) []geo.Pointer {\n\treturn q.InBoundMatching(b, nil, buf...)\n}", "title": "" }, { "docid": "c6f78604c70ceaf7a86dea2fe1dbaeeb", "score": "0.40134597", "text": "func (t *TreeBuilder) Close() (*Element, error) {\n\tif len(t.elem) != 0 {\n\t\treturn nil, fmt.Errorf(\"missing end tags\")\n\t}\n\tif t.last == nil {\n\t\treturn nil, fmt.Errorf(\"missing top level element\")\n\t}\n\treturn t.last, nil\n}", "title": "" }, { "docid": "7fdb8c23e8c0df564859e1a43054a0fe", "score": "0.39925617", "text": "func (s *stack) pop() {\n\ts.arr = s.arr[:len(s.arr)-1]\n}", "title": "" }, { "docid": "775ad9e884c685314074facbef8512e4", "score": "0.39918122", "text": "func (s *Stack) RemoveAt(n int) Element {\n\tl := len(s.elems)\n\te := s.elems[l-1-n]\n\ts.elems = append(s.elems[:l-1-n], s.elems[l-n:]...)\n\ts.refs.Remove(e.value)\n\treturn e\n}", "title": "" }, { "docid": "bb346768350b42267ea2debfd2c3e8a6", "score": "0.3991421", "text": "func (q ExpirationQueue) PopUntil(until abi.ChainEpoch) (*ExpirationSet, error) {\n\tvar onTimeSectors []bitfield.BitField\n\tvar earlySectors []bitfield.BitField\n\tactivePower := NewPowerPairZero()\n\tfaultyPower := NewPowerPairZero()\n\tonTimePledge := big.Zero()\n\n\tvar poppedKeys []uint64\n\tvar thisValue ExpirationSet\n\tstopErr := fmt.Errorf(\"stop\")\n\tif err := q.Array.ForEach(&thisValue, func(i int64) error {\n\t\tif abi.ChainEpoch(i) > until {\n\t\t\treturn stopErr\n\t\t}\n\t\tpoppedKeys = append(poppedKeys, uint64(i))\n\t\tonTimeSectors = append(onTimeSectors, thisValue.OnTimeSectors)\n\t\tearlySectors = append(earlySectors, thisValue.EarlySectors)\n\t\tactivePower = activePower.Add(thisValue.ActivePower)\n\t\tfaultyPower = faultyPower.Add(thisValue.FaultyPower)\n\t\tonTimePledge = big.Add(onTimePledge, thisValue.OnTimePledge)\n\t\treturn nil\n\t}); err != nil && err != stopErr {\n\t\treturn nil, err\n\t}\n\n\tif err := q.Array.BatchDelete(poppedKeys, true); err != nil {\n\t\treturn nil, err\n\t}\n\n\tallOnTime, err := bitfield.MultiMerge(onTimeSectors...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tallEarly, err := bitfield.MultiMerge(earlySectors...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn NewExpirationSet(allOnTime, allEarly, onTimePledge, activePower, faultyPower), nil\n}", "title": "" }, { "docid": "0db72f5d0a912ffc743e7a22ec06b1aa", "score": "0.3990917", "text": "func (me *XsdGoPkgHasElem_Holder) Walk() (err error) {\r\n\tif fn := WalkHandlers.XsdGoPkgHasElem_Holder; me != nil {\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, true); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t\tif err = me.Holder.Walk(); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\treturn\r\n\t\t}\r\n\t\tif fn != nil {\r\n\t\t\tif err = fn(me, false); xsdt.OnWalkError(&err, &WalkErrors, WalkContinueOnError, WalkOnError) {\r\n\t\t\t\treturn\r\n\t\t\t}\r\n\t\t}\r\n\t}\r\n\treturn\r\n}", "title": "" }, { "docid": "999a979114a8ea1bba43427c60484cd1", "score": "0.3990511", "text": "func (stk *stack) pop() (interface{}, error) {\n\tvalue, err := stk.peek()\n\tif err == nil {\n\t\t*stk = (*stk)[:len(*stk)-1] // resizing the slice\n\t}\n\treturn value, err\n}", "title": "" }, { "docid": "fe66eb8e737fb2cd70be389a6072e084", "score": "0.39897093", "text": "func (n *Ident) Scope() *Scope { return n.scope }", "title": "" }, { "docid": "09c150872cad3e6aa68bd279e4991762", "score": "0.39817816", "text": "func (h *Heap) pop(lessFunc func(i, j int) bool) interface{} {\n\tif h.IsEmpty() {\n\t\treturn -1\n\t}\n\tret := h.items[0]\n\th.items[0] = h.items[h.size-1]\n\th.size--\n\th.items = h.items[1:]\n\th.down(0, lessFunc)\n\treturn ret.Val\n}", "title": "" }, { "docid": "34f4cddefe12faaa0f0b83a5c048868d", "score": "0.39775583", "text": "func (os *openSet) Pop() *node {\n\tnext := os.items.Front()\n\tif next == nil {\n\t\treturn nil\n\t}\n\tos.items.Remove(next)\n\n\treturn next.Value.(*node)\n}", "title": "" }, { "docid": "8e65cd80e2349c5fe57c81f63e96f3a4", "score": "0.3976359", "text": "func unbounded(root *node) {\n\tvar wg sync.WaitGroup\n\twg.Add(1)\n\tgo unboundedWorker(root, &wg)\n\twg.Wait()\n}", "title": "" }, { "docid": "8222a684c79ff7e2d815d943071666d4", "score": "0.3975588", "text": "func (list *ItemList) Pop() *Item {\n\titem := list.Items[0]\n\tlist.Items = list.Items[1:]\n\n\treturn item\n}", "title": "" }, { "docid": "6912bec20acbec4a508bda889553c7c5", "score": "0.39738324", "text": "func (q *PriorityQueue) Pop() interface{} {\n\tx := (*q)[len(*q)-1]\n\t*q = (*q)[:len(*q)-1]\n\treturn x\n}", "title": "" }, { "docid": "98b74c66a538e98b9181d6a8cf9a7b94", "score": "0.39736328", "text": "func (s *listStack) pop() *types.List {\n\tif len(s.stack) == 0 {\n\t\treturn nil\n\t}\n\tl := s.stack[len(s.stack)-1]\n\ts.stack = s.stack[:len(s.stack)-1]\n\treturn l\n}", "title": "" }, { "docid": "8e06deba6928c3ea0aa8ba3b519e31a8", "score": "0.39732426", "text": "func (ea ExecutionActivity) AsUntilActivity() (*UntilActivity, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a73067ecaf58052df60a0ba85bc9cbe4", "score": "0.39694056", "text": "func (c *Commander) Pop() []bind.Bindable {\n\tc.lock.Lock()\n\tdefer c.lock.Unlock()\n\n\tc.menuBar.Clear()\n\tdefer c.mapMenu()\n\n\tc.commands = make(map[gxui.KeyboardEvent]bind.Command)\n\tdefer c.mapBindings()\n\n\tend := len(c.stack) - 1\n\ttop := c.stack[end]\n\tc.stack = c.stack[:end]\n\n\tc.bindStack()\n\treturn top\n}", "title": "" }, { "docid": "8f630feefd15efd9818ebd7049e554af", "score": "0.39673048", "text": "func (l *State) Pop(n int) { l.SetTop(-n - 1) }", "title": "" }, { "docid": "d2c83dcd5ac3b7768020daada4f754ae", "score": "0.39581257", "text": "func (s *PyStack) push(value PyObject) {\n\ts.topElem = &elem{\n\t\tvalue: value,\n\t\tnext: s.topElem,\n\t}\n\ts.length++\n}", "title": "" }, { "docid": "34afd77319473c0c2a7bd8584e6170b9", "score": "0.3954007", "text": "func (l *List) Back() *Element {\n\tif l.IsEmpty() {\n\t\treturn nil\n\t}\n\treturn l.back\n}", "title": "" } ]
85e161970edc7ecff33c8b8718c62fa0
ProtoToGuestPolicyPackageRepositoriesZypper converts a GuestPolicyPackageRepositoriesZypper object from its proto representation.
[ { "docid": "c35c6ebd4c11d458cddcdfa0a5ecd3a0", "score": "0.7473321", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositoriesZypper(p *betapb.OsconfigBetaGuestPolicyPackageRepositoriesZypper) *beta.GuestPolicyPackageRepositoriesZypper {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackageRepositoriesZypper{\n\t\tId: dcl.StringOrNil(p.GetId()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tBaseUrl: dcl.StringOrNil(p.GetBaseUrl()),\n\t}\n\tfor _, r := range p.GetGpgKeys() {\n\t\tobj.GpgKeys = append(obj.GpgKeys, r)\n\t}\n\treturn obj\n}", "title": "" } ]
[ { "docid": "9e92d8351fbbde6e546ef0f949d432d1", "score": "0.71787596", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesZypperToProto(o *beta.GuestPolicyPackageRepositoriesZypper) *betapb.OsconfigBetaGuestPolicyPackageRepositoriesZypper {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackageRepositoriesZypper{}\n\tp.SetId(dcl.ValueOrEmptyString(o.Id))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(o.DisplayName))\n\tp.SetBaseUrl(dcl.ValueOrEmptyString(o.BaseUrl))\n\tsGpgKeys := make([]string, len(o.GpgKeys))\n\tfor i, r := range o.GpgKeys {\n\t\tsGpgKeys[i] = r\n\t}\n\tp.SetGpgKeys(sGpgKeys)\n\treturn p\n}", "title": "" }, { "docid": "6129246c2fbc78e5703b070b6f158286", "score": "0.63562244", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesToProto(o *beta.GuestPolicyPackageRepositories) *betapb.OsconfigBetaGuestPolicyPackageRepositories {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackageRepositories{}\n\tp.SetApt(OsconfigBetaGuestPolicyPackageRepositoriesAptToProto(o.Apt))\n\tp.SetYum(OsconfigBetaGuestPolicyPackageRepositoriesYumToProto(o.Yum))\n\tp.SetZypper(OsconfigBetaGuestPolicyPackageRepositoriesZypperToProto(o.Zypper))\n\tp.SetGoo(OsconfigBetaGuestPolicyPackageRepositoriesGooToProto(o.Goo))\n\treturn p\n}", "title": "" }, { "docid": "7341ca5fdc8e0b77acc5a46d7824b45e", "score": "0.6202942", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositories(p *betapb.OsconfigBetaGuestPolicyPackageRepositories) *beta.GuestPolicyPackageRepositories {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackageRepositories{\n\t\tApt: ProtoToOsconfigBetaGuestPolicyPackageRepositoriesApt(p.GetApt()),\n\t\tYum: ProtoToOsconfigBetaGuestPolicyPackageRepositoriesYum(p.GetYum()),\n\t\tZypper: ProtoToOsconfigBetaGuestPolicyPackageRepositoriesZypper(p.GetZypper()),\n\t\tGoo: ProtoToOsconfigBetaGuestPolicyPackageRepositoriesGoo(p.GetGoo()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "cfa61d846c7741f15cc80eb59c60cc78", "score": "0.6038797", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositoriesYum(p *betapb.OsconfigBetaGuestPolicyPackageRepositoriesYum) *beta.GuestPolicyPackageRepositoriesYum {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackageRepositoriesYum{\n\t\tId: dcl.StringOrNil(p.GetId()),\n\t\tDisplayName: dcl.StringOrNil(p.GetDisplayName()),\n\t\tBaseUrl: dcl.StringOrNil(p.GetBaseUrl()),\n\t}\n\tfor _, r := range p.GetGpgKeys() {\n\t\tobj.GpgKeys = append(obj.GpgKeys, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "da1f04ed8c415de68b614b4f022ca962", "score": "0.6030617", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositoriesGoo(p *betapb.OsconfigBetaGuestPolicyPackageRepositoriesGoo) *beta.GuestPolicyPackageRepositoriesGoo {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackageRepositoriesGoo{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tUrl: dcl.StringOrNil(p.GetUrl()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "257d868d4c5706ee6b79dfbe178c2213", "score": "0.6016784", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesYumToProto(o *beta.GuestPolicyPackageRepositoriesYum) *betapb.OsconfigBetaGuestPolicyPackageRepositoriesYum {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackageRepositoriesYum{}\n\tp.SetId(dcl.ValueOrEmptyString(o.Id))\n\tp.SetDisplayName(dcl.ValueOrEmptyString(o.DisplayName))\n\tp.SetBaseUrl(dcl.ValueOrEmptyString(o.BaseUrl))\n\tsGpgKeys := make([]string, len(o.GpgKeys))\n\tfor i, r := range o.GpgKeys {\n\t\tsGpgKeys[i] = r\n\t}\n\tp.SetGpgKeys(sGpgKeys)\n\treturn p\n}", "title": "" }, { "docid": "6b4c3b17ecddf3148da6888ba7acbd17", "score": "0.574068", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesGooToProto(o *beta.GuestPolicyPackageRepositoriesGoo) *betapb.OsconfigBetaGuestPolicyPackageRepositoriesGoo {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackageRepositoriesGoo{}\n\tp.SetName(dcl.ValueOrEmptyString(o.Name))\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\treturn p\n}", "title": "" }, { "docid": "b8e056320c3a2d69cb6feef0a6ef3289", "score": "0.5379835", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositoriesApt(p *betapb.OsconfigBetaGuestPolicyPackageRepositoriesApt) *beta.GuestPolicyPackageRepositoriesApt {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackageRepositoriesApt{\n\t\tArchiveType: ProtoToOsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum(p.GetArchiveType()),\n\t\tUri: dcl.StringOrNil(p.GetUri()),\n\t\tDistribution: dcl.StringOrNil(p.GetDistribution()),\n\t\tGpgKey: dcl.StringOrNil(p.GetGpgKey()),\n\t}\n\tfor _, r := range p.GetComponents() {\n\t\tobj.Components = append(obj.Components, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "49387c747b8209790cd3d4f9f569f76c", "score": "0.5367974", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesAptToProto(o *beta.GuestPolicyPackageRepositoriesApt) *betapb.OsconfigBetaGuestPolicyPackageRepositoriesApt {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackageRepositoriesApt{}\n\tp.SetArchiveType(OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnumToProto(o.ArchiveType))\n\tp.SetUri(dcl.ValueOrEmptyString(o.Uri))\n\tp.SetDistribution(dcl.ValueOrEmptyString(o.Distribution))\n\tp.SetGpgKey(dcl.ValueOrEmptyString(o.GpgKey))\n\tsComponents := make([]string, len(o.Components))\n\tfor i, r := range o.Components {\n\t\tsComponents[i] = r\n\t}\n\tp.SetComponents(sComponents)\n\treturn p\n}", "title": "" }, { "docid": "620e3047ca530ab7910202acd2b32d06", "score": "0.5007055", "text": "func OsconfigBetaGuestPolicyPackagesToProto(o *beta.GuestPolicyPackages) *betapb.OsconfigBetaGuestPolicyPackages {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyPackages{}\n\tp.SetName(dcl.ValueOrEmptyString(o.Name))\n\tp.SetDesiredState(OsconfigBetaGuestPolicyPackagesDesiredStateEnumToProto(o.DesiredState))\n\tp.SetManager(OsconfigBetaGuestPolicyPackagesManagerEnumToProto(o.Manager))\n\treturn p\n}", "title": "" }, { "docid": "4620d3d9b1928c29528f8371ae6f2360", "score": "0.48603448", "text": "func OsconfigPatchDeploymentPatchConfigZypperToProto(o *osconfig.PatchDeploymentPatchConfigZypper) *osconfigpb.OsconfigPatchDeploymentPatchConfigZypper {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &osconfigpb.OsconfigPatchDeploymentPatchConfigZypper{}\n\tp.SetWithOptional(dcl.ValueOrEmptyBool(o.WithOptional))\n\tp.SetWithUpdate(dcl.ValueOrEmptyBool(o.WithUpdate))\n\tsCategories := make([]string, len(o.Categories))\n\tfor i, r := range o.Categories {\n\t\tsCategories[i] = r\n\t}\n\tp.SetCategories(sCategories)\n\tsSeverities := make([]string, len(o.Severities))\n\tfor i, r := range o.Severities {\n\t\tsSeverities[i] = r\n\t}\n\tp.SetSeverities(sSeverities)\n\tsExcludes := make([]string, len(o.Excludes))\n\tfor i, r := range o.Excludes {\n\t\tsExcludes[i] = r\n\t}\n\tp.SetExcludes(sExcludes)\n\tsExclusivePatches := make([]string, len(o.ExclusivePatches))\n\tfor i, r := range o.ExclusivePatches {\n\t\tsExclusivePatches[i] = r\n\t}\n\tp.SetExclusivePatches(sExclusivePatches)\n\treturn p\n}", "title": "" }, { "docid": "a86ebd57232bccf579f17a3c9ed29605", "score": "0.4769661", "text": "func ProtoToOsconfigBetaGuestPolicyPackages(p *betapb.OsconfigBetaGuestPolicyPackages) *beta.GuestPolicyPackages {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyPackages{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDesiredState: ProtoToOsconfigBetaGuestPolicyPackagesDesiredStateEnum(p.GetDesiredState()),\n\t\tManager: ProtoToOsconfigBetaGuestPolicyPackagesManagerEnum(p.GetManager()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "4949b62f812dc78324a55094443dd831", "score": "0.4727443", "text": "func ProtoToOsconfigPatchDeploymentPatchConfigZypper(p *osconfigpb.OsconfigPatchDeploymentPatchConfigZypper) *osconfig.PatchDeploymentPatchConfigZypper {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &osconfig.PatchDeploymentPatchConfigZypper{\n\t\tWithOptional: dcl.Bool(p.GetWithOptional()),\n\t\tWithUpdate: dcl.Bool(p.GetWithUpdate()),\n\t}\n\tfor _, r := range p.GetCategories() {\n\t\tobj.Categories = append(obj.Categories, r)\n\t}\n\tfor _, r := range p.GetSeverities() {\n\t\tobj.Severities = append(obj.Severities, r)\n\t}\n\tfor _, r := range p.GetExcludes() {\n\t\tobj.Excludes = append(obj.Excludes, r)\n\t}\n\tfor _, r := range p.GetExclusivePatches() {\n\t\tobj.ExclusivePatches = append(obj.ExclusivePatches, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "d639705096ab6c1e0070f8469b4192e2", "score": "0.4429959", "text": "func OsconfigBetaGuestPolicyRecipesArtifactsRemoteToProto(o *beta.GuestPolicyRecipesArtifactsRemote) *betapb.OsconfigBetaGuestPolicyRecipesArtifactsRemote {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesArtifactsRemote{}\n\tp.SetUri(dcl.ValueOrEmptyString(o.Uri))\n\tp.SetChecksum(dcl.ValueOrEmptyString(o.Checksum))\n\treturn p\n}", "title": "" }, { "docid": "a4cc5ce05123c318d9b8061de6811244", "score": "0.43087053", "text": "func NewZypperPackageCommander() PackageCommander {\n\treturn &zypperCmder\n}", "title": "" }, { "docid": "3f3f5fdfe9c78c0aa6dc1a7f842fda40", "score": "0.42729065", "text": "func OsconfigBetaGuestPolicyRecipesArtifactsGcsToProto(o *beta.GuestPolicyRecipesArtifactsGcs) *betapb.OsconfigBetaGuestPolicyRecipesArtifactsGcs {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesArtifactsGcs{}\n\tp.SetBucket(dcl.ValueOrEmptyString(o.Bucket))\n\tp.SetObject(dcl.ValueOrEmptyString(o.Object))\n\tp.SetGeneration(dcl.ValueOrEmptyInt64(o.Generation))\n\treturn p\n}", "title": "" }, { "docid": "7b26cbe1bb6635a07cc0a0918dc0d93a", "score": "0.42701045", "text": "func OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnumToProto(e *beta.GuestPolicyPackageRepositoriesAptArchiveTypeEnum) betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum {\n\tif e == nil {\n\t\treturn betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum(0)\n\t}\n\tif v, ok := betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum_value[\"GuestPolicyPackageRepositoriesAptArchiveTypeEnum\"+string(*e)]; ok {\n\t\treturn betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum(v)\n\t}\n\treturn betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum(0)\n}", "title": "" }, { "docid": "f094d94e0db5afe385d72d216f470c20", "score": "0.4178618", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesArtifactsRemote(p *betapb.OsconfigBetaGuestPolicyRecipesArtifactsRemote) *beta.GuestPolicyRecipesArtifactsRemote {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesArtifactsRemote{\n\t\tUri: dcl.StringOrNil(p.GetUri()),\n\t\tChecksum: dcl.StringOrNil(p.GetChecksum()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "7d1006710ce34c59b121a587064e47bf", "score": "0.41624352", "text": "func ProtoToOsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum(e betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum) *beta.GuestPolicyPackageRepositoriesAptArchiveTypeEnum {\n\tif e == 0 {\n\t\treturn nil\n\t}\n\tif n, ok := betapb.OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum_name[int32(e)]; ok {\n\t\te := beta.GuestPolicyPackageRepositoriesAptArchiveTypeEnum(n[len(\"OsconfigBetaGuestPolicyPackageRepositoriesAptArchiveTypeEnum\"):])\n\t\treturn &e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d636e908c5a3e0e6dea0db91c0922b7d", "score": "0.415102", "text": "func OsconfigBetaGuestPolicyRecipesToProto(o *beta.GuestPolicyRecipes) *betapb.OsconfigBetaGuestPolicyRecipes {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipes{}\n\tp.SetName(dcl.ValueOrEmptyString(o.Name))\n\tp.SetVersion(dcl.ValueOrEmptyString(o.Version))\n\tp.SetDesiredState(OsconfigBetaGuestPolicyRecipesDesiredStateEnumToProto(o.DesiredState))\n\tsArtifacts := make([]*betapb.OsconfigBetaGuestPolicyRecipesArtifacts, len(o.Artifacts))\n\tfor i, r := range o.Artifacts {\n\t\tsArtifacts[i] = OsconfigBetaGuestPolicyRecipesArtifactsToProto(&r)\n\t}\n\tp.SetArtifacts(sArtifacts)\n\tsInstallSteps := make([]*betapb.OsconfigBetaGuestPolicyRecipesInstallSteps, len(o.InstallSteps))\n\tfor i, r := range o.InstallSteps {\n\t\tsInstallSteps[i] = OsconfigBetaGuestPolicyRecipesInstallStepsToProto(&r)\n\t}\n\tp.SetInstallSteps(sInstallSteps)\n\tsUpdateSteps := make([]*betapb.OsconfigBetaGuestPolicyRecipesUpdateSteps, len(o.UpdateSteps))\n\tfor i, r := range o.UpdateSteps {\n\t\tsUpdateSteps[i] = OsconfigBetaGuestPolicyRecipesUpdateStepsToProto(&r)\n\t}\n\tp.SetUpdateSteps(sUpdateSteps)\n\treturn p\n}", "title": "" }, { "docid": "48ed53b5786748661693a30d922cb6c7", "score": "0.41291615", "text": "func OsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallationToProto(o *beta.GuestPolicyRecipesUpdateStepsRpmInstallation) *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallation {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallation{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\treturn p\n}", "title": "" }, { "docid": "049487f78b2b033e38d6b296736cac9b", "score": "0.4105591", "text": "func ProtoToOsconfigBetaGuestPolicyRecipes(p *betapb.OsconfigBetaGuestPolicyRecipes) *beta.GuestPolicyRecipes {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipes{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tVersion: dcl.StringOrNil(p.GetVersion()),\n\t\tDesiredState: ProtoToOsconfigBetaGuestPolicyRecipesDesiredStateEnum(p.GetDesiredState()),\n\t}\n\tfor _, r := range p.GetArtifacts() {\n\t\tobj.Artifacts = append(obj.Artifacts, *ProtoToOsconfigBetaGuestPolicyRecipesArtifacts(r))\n\t}\n\tfor _, r := range p.GetInstallSteps() {\n\t\tobj.InstallSteps = append(obj.InstallSteps, *ProtoToOsconfigBetaGuestPolicyRecipesInstallSteps(r))\n\t}\n\tfor _, r := range p.GetUpdateSteps() {\n\t\tobj.UpdateSteps = append(obj.UpdateSteps, *ProtoToOsconfigBetaGuestPolicyRecipesUpdateSteps(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "250a5520afa9073a9491db3bdb82ff69", "score": "0.40857768", "text": "func ProtoToComputeInstanceGroupManagerVersions(p *computepb.ComputeInstanceGroupManagerVersions) *compute.InstanceGroupManagerVersions {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.InstanceGroupManagerVersions{\n\t\tName: dcl.StringOrNil(p.Name),\n\t\tInstanceTemplate: dcl.StringOrNil(p.InstanceTemplate),\n\t\tTargetSize: ProtoToComputeInstanceGroupManagerVersionsTargetSize(p.GetTargetSize()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "091ee738c0dfe5525ca0bd2e50737756", "score": "0.40740597", "text": "func NewZypper() *Zypper {\n\tzypp := new(Zypper)\n\tzypp.exec = \"zypper\"\n\tzypp.packages = make([]string, 0)\n\tzypp.opts = make([]string, 0)\n\treturn zypp\n}", "title": "" }, { "docid": "1fb9fa962937e811d21c2fac29b373f5", "score": "0.4063015", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesArtifactsGcs(p *betapb.OsconfigBetaGuestPolicyRecipesArtifactsGcs) *beta.GuestPolicyRecipesArtifactsGcs {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesArtifactsGcs{\n\t\tBucket: dcl.StringOrNil(p.GetBucket()),\n\t\tObject: dcl.StringOrNil(p.GetObject()),\n\t\tGeneration: dcl.Int64OrNil(p.GetGeneration()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "7316bcd852f4b7d38a91b11b8dd47542", "score": "0.40529588", "text": "func OsconfigBetaGuestPolicyRecipesArtifactsToProto(o *beta.GuestPolicyRecipesArtifacts) *betapb.OsconfigBetaGuestPolicyRecipesArtifacts {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesArtifacts{}\n\tp.SetId(dcl.ValueOrEmptyString(o.Id))\n\tp.SetRemote(OsconfigBetaGuestPolicyRecipesArtifactsRemoteToProto(o.Remote))\n\tp.SetGcs(OsconfigBetaGuestPolicyRecipesArtifactsGcsToProto(o.Gcs))\n\tp.SetAllowInsecure(dcl.ValueOrEmptyBool(o.AllowInsecure))\n\treturn p\n}", "title": "" }, { "docid": "e4aa8ed08d4e8d475ce8d7251fc9ab4f", "score": "0.404687", "text": "func (in *PGBackRestRepo) DeepCopy() *PGBackRestRepo {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PGBackRestRepo)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "b2b7805ef5b520f5a785e391fc388003", "score": "0.40184042", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesArtifacts(p *betapb.OsconfigBetaGuestPolicyRecipesArtifacts) *beta.GuestPolicyRecipesArtifacts {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesArtifacts{\n\t\tId: dcl.StringOrNil(p.GetId()),\n\t\tRemote: ProtoToOsconfigBetaGuestPolicyRecipesArtifactsRemote(p.GetRemote()),\n\t\tGcs: ProtoToOsconfigBetaGuestPolicyRecipesArtifactsGcs(p.GetGcs()),\n\t\tAllowInsecure: dcl.Bool(p.GetAllowInsecure()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "b94619ad0ca9fccd56c529a7a8785603", "score": "0.40149632", "text": "func OsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallationToProto(o *beta.GuestPolicyRecipesInstallStepsRpmInstallation) *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallation {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallation{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\treturn p\n}", "title": "" }, { "docid": "5b02fd0a22782f049d6a92a4d10f2380", "score": "0.39821526", "text": "func OsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallationToProto(o *beta.GuestPolicyRecipesUpdateStepsDpkgInstallation) *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallation {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallation{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\treturn p\n}", "title": "" }, { "docid": "276d2bf77568795dbc74a36935c8c955", "score": "0.3980563", "text": "func ConvertToRPCPkgs(pkgs []ftypes.Package) []*common.Package {\n\tvar rpcPkgs []*common.Package\n\tfor _, pkg := range pkgs {\n\t\trpcPkgs = append(rpcPkgs, &common.Package{\n\t\t\tId: pkg.ID,\n\t\t\tName: pkg.Name,\n\t\t\tVersion: pkg.Version,\n\t\t\tRelease: pkg.Release,\n\t\t\tEpoch: int32(pkg.Epoch),\n\t\t\tArch: pkg.Arch,\n\t\t\tDev: pkg.Dev,\n\t\t\tSrcName: pkg.SrcName,\n\t\t\tSrcVersion: pkg.SrcVersion,\n\t\t\tSrcRelease: pkg.SrcRelease,\n\t\t\tSrcEpoch: int32(pkg.SrcEpoch),\n\t\t\tLicenses: pkg.Licenses,\n\t\t\tLayer: ConvertToRPCLayer(pkg.Layer),\n\t\t\tFilePath: pkg.FilePath,\n\t\t\tDependsOn: pkg.DependsOn,\n\t\t\tDigest: pkg.Digest.String(),\n\t\t\tIndirect: pkg.Indirect,\n\t\t})\n\t}\n\treturn rpcPkgs\n}", "title": "" }, { "docid": "164457fb67ef22361db70a4e26d18708", "score": "0.3966269", "text": "func OsconfigBetaGuestPolicyAssignmentGroupLabelsToProto(o *beta.GuestPolicyAssignmentGroupLabels) *betapb.OsconfigBetaGuestPolicyAssignmentGroupLabels {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyAssignmentGroupLabels{}\n\tmLabels := make(map[string]string, len(o.Labels))\n\tfor k, r := range o.Labels {\n\t\tmLabels[k] = r\n\t}\n\tp.SetLabels(mLabels)\n\treturn p\n}", "title": "" }, { "docid": "e8d4354ec53254d1441b63b686499a21", "score": "0.3962266", "text": "func ComputeInstanceGroupManagerVersionsToProto(o *compute.InstanceGroupManagerVersions) *computepb.ComputeInstanceGroupManagerVersions {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputeInstanceGroupManagerVersions{\n\t\tName: dcl.ValueOrEmptyString(o.Name),\n\t\tInstanceTemplate: dcl.ValueOrEmptyString(o.InstanceTemplate),\n\t\tTargetSize: ComputeInstanceGroupManagerVersionsTargetSizeToProto(o.TargetSize),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "f595ce488a5d2db35a4bdab79682478f", "score": "0.3915865", "text": "func ComputeInstanceGroupManagerDistributionPolicyZonesToProto(o *compute.InstanceGroupManagerDistributionPolicyZones) *computepb.ComputeInstanceGroupManagerDistributionPolicyZones {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputeInstanceGroupManagerDistributionPolicyZones{\n\t\tZone: dcl.ValueOrEmptyString(o.Zone),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "802ff7e3d43050f5772f27cc5531104d", "score": "0.39081055", "text": "func NewPgxRepository(conn *pgx.Conn) user.Repository {\n\treturn &pgxRepository{conn: conn}\n}", "title": "" }, { "docid": "09710656dae1a43232610ebd933d23c5", "score": "0.39039153", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallation(p *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallation) *beta.GuestPolicyRecipesUpdateStepsRpmInstallation {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesUpdateStepsRpmInstallation{\n\t\tArtifactId: dcl.StringOrNil(p.GetArtifactId()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "e22898d5fccdc3f3797aabe23d9ae308", "score": "0.38833216", "text": "func OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRunToProto(o *beta.GuestPolicyRecipesUpdateStepsScriptRun) *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRun {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRun{}\n\tp.SetScript(dcl.ValueOrEmptyString(o.Script))\n\tp.SetInterpreter(OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRunInterpreterEnumToProto(o.Interpreter))\n\tsAllowedExitCodes := make([]int64, len(o.AllowedExitCodes))\n\tfor i, r := range o.AllowedExitCodes {\n\t\tsAllowedExitCodes[i] = r\n\t}\n\tp.SetAllowedExitCodes(sAllowedExitCodes)\n\treturn p\n}", "title": "" }, { "docid": "b6d7a00b0879e9b7bfdcda8d668a28ab", "score": "0.3846628", "text": "func ProtoToOsconfigBetaGuestPolicyAssignmentGroupLabels(p *betapb.OsconfigBetaGuestPolicyAssignmentGroupLabels) *beta.GuestPolicyAssignmentGroupLabels {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyAssignmentGroupLabels{}\n\treturn obj\n}", "title": "" }, { "docid": "6d76ec1ed5881e9c31713c914c56519f", "score": "0.38409367", "text": "func (s *Server) GetPackageRepositories(ctx context.Context, request *v1alpha1.GetPackageRepositoriesRequest) (*v1alpha1.GetPackageRepositoriesResponse, error) {\n\tlog.Infof(\"+kapp-controller GetPackageRepositories\")\n\n\tnamespace := request.GetContext().GetNamespace()\n\tcluster := request.GetContext().GetCluster()\n\tif cluster == \"\" {\n\t\tcluster = s.globalPackagingCluster\n\t}\n\n\t// retrieve the list of installed packages\n\tpkgRepositories, err := s.getPkgRepositories(ctx, cluster, namespace)\n\tif err != nil {\n\t\treturn nil, statuserror.FromK8sError(\"get\", \"PackageRepository\", \"\", err)\n\t}\n\n\t// convert the Carvel PackageRepository to our API PackageRepository struct\n\tresponseRepos := []*v1alpha1.PackageRepository{}\n\tfor _, repo := range pkgRepositories {\n\t\trepo, err := getPackageRepository(repo)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to create the PackageRepository: %v\", err)\n\t\t}\n\t\tresponseRepos = append(responseRepos, repo)\n\t}\n\n\treturn &v1alpha1.GetPackageRepositoriesResponse{\n\t\tRepositories: responseRepos,\n\t}, nil\n}", "title": "" }, { "docid": "2c2f695983bf4e0ace222ab6e8f4c16b", "score": "0.38382757", "text": "func NewGetAllRepositoriesUsingGETOK() *GetAllRepositoriesUsingGETOK {\n\treturn &GetAllRepositoriesUsingGETOK{}\n}", "title": "" }, { "docid": "13ec62c19f1fea70364f120ad6532e5d", "score": "0.3834048", "text": "func OsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallationToProto(o *beta.GuestPolicyRecipesInstallStepsDpkgInstallation) *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallation {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallation{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\treturn p\n}", "title": "" }, { "docid": "59643c04f10b6203f7a2c7452e01b81c", "score": "0.38328698", "text": "func DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegexToProto(o *beta.InspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex) *betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex{}\n\tp.SetPattern(dcl.ValueOrEmptyString(o.Pattern))\n\tsGroupIndexes := make([]int64, len(o.GroupIndexes))\n\tfor i, r := range o.GroupIndexes {\n\t\tsGroupIndexes[i] = r\n\t}\n\tp.SetGroupIndexes(sGroupIndexes)\n\treturn p\n}", "title": "" }, { "docid": "140841a6eb4cf49a597ac6699c1289ad", "score": "0.38254967", "text": "func OsconfigBetaGuestPolicyRecipesInstallStepsScriptRunToProto(o *beta.GuestPolicyRecipesInstallStepsScriptRun) *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsScriptRun {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesInstallStepsScriptRun{}\n\tp.SetScript(dcl.ValueOrEmptyString(o.Script))\n\tp.SetInterpreter(OsconfigBetaGuestPolicyRecipesInstallStepsScriptRunInterpreterEnumToProto(o.Interpreter))\n\tsAllowedExitCodes := make([]int64, len(o.AllowedExitCodes))\n\tfor i, r := range o.AllowedExitCodes {\n\t\tsAllowedExitCodes[i] = r\n\t}\n\tp.SetAllowedExitCodes(sAllowedExitCodes)\n\treturn p\n}", "title": "" }, { "docid": "20ed9d8016ecfaf9ba0018fc7725278f", "score": "0.38230157", "text": "func OsconfigPatchDeploymentPatchConfigYumToProto(o *osconfig.PatchDeploymentPatchConfigYum) *osconfigpb.OsconfigPatchDeploymentPatchConfigYum {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &osconfigpb.OsconfigPatchDeploymentPatchConfigYum{}\n\tp.SetSecurity(dcl.ValueOrEmptyBool(o.Security))\n\tp.SetMinimal(dcl.ValueOrEmptyBool(o.Minimal))\n\tsExcludes := make([]string, len(o.Excludes))\n\tfor i, r := range o.Excludes {\n\t\tsExcludes[i] = r\n\t}\n\tp.SetExcludes(sExcludes)\n\tsExclusivePackages := make([]string, len(o.ExclusivePackages))\n\tfor i, r := range o.ExclusivePackages {\n\t\tsExclusivePackages[i] = r\n\t}\n\tp.SetExclusivePackages(sExclusivePackages)\n\treturn p\n}", "title": "" }, { "docid": "b32b7ac45dec5742108b849389de2195", "score": "0.37944427", "text": "func (p *PackageDownloads) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", p, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"authorizedDevicesImportTemplate\":\n\t\t\terr = unpopulate(val, \"AuthorizedDevicesImportTemplate\", &p.AuthorizedDevicesImportTemplate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"centralManager\":\n\t\t\terr = unpopulate(val, \"CentralManager\", &p.CentralManager)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"deviceInformationUpdateImportTemplate\":\n\t\t\terr = unpopulate(val, \"DeviceInformationUpdateImportTemplate\", &p.DeviceInformationUpdateImportTemplate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sensor\":\n\t\t\terr = unpopulate(val, \"Sensor\", &p.Sensor)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"snmp\":\n\t\t\terr = unpopulate(val, \"Snmp\", &p.Snmp)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"threatIntelligence\":\n\t\t\terr = unpopulate(val, \"ThreatIntelligence\", &p.ThreatIntelligence)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"wmiTool\":\n\t\t\terr = unpopulate(val, \"WmiTool\", &p.WmiTool)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", p, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "30caa651d0f49150fce2d31fd2cb0189", "score": "0.37875253", "text": "func (pp *PluginPackage) UnmarshalJSON(data []byte) error {\n\tvar values struct {\n\t\tName string\n\t\tDescription string\n\t\tAuthor string\n\t\tTags []string\n\t\tVersions PluginVersions\n\t}\n\tif err := json5.Unmarshal(data, &values); err != nil {\n\t\treturn err\n\t}\n\tpp.Name = values.Name\n\tpp.Description = values.Description\n\tpp.Author = values.Author\n\tpp.Tags = values.Tags\n\tpp.Versions = values.Versions\n\tfor _, v := range pp.Versions {\n\t\tv.pack = pp\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5e23edfa9abc3af0c1bc01bb91fc841b", "score": "0.3785486", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallation(p *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallation) *beta.GuestPolicyRecipesInstallStepsRpmInstallation {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesInstallStepsRpmInstallation{\n\t\tArtifactId: dcl.StringOrNil(p.GetArtifactId()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "68afae903aaa8ac882d54a12fcd8da85", "score": "0.37827227", "text": "func (*ListRepositoriesResponse) Descriptor() ([]byte, []int) {\n\treturn file_seankhliao_archrepo_v1alpha2_archrepo_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "333c7b618dd5a27fc59d8b3359307f19", "score": "0.37670702", "text": "func ProtoToComputeInstanceGroupManagerDistributionPolicyZones(p *computepb.ComputeInstanceGroupManagerDistributionPolicyZones) *compute.InstanceGroupManagerDistributionPolicyZones {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.InstanceGroupManagerDistributionPolicyZones{\n\t\tZone: dcl.StringOrNil(p.Zone),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "57925206b519c39a6627bf37f27768d0", "score": "0.37518018", "text": "func (in *OwnedRepositories) DeepCopy() *OwnedRepositories {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(OwnedRepositories)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "6e049a613316f8e1b623cd6ed4f3844d", "score": "0.37366098", "text": "func OsconfigBetaGuestPolicyPackagesManagerEnumToProto(e *beta.GuestPolicyPackagesManagerEnum) betapb.OsconfigBetaGuestPolicyPackagesManagerEnum {\n\tif e == nil {\n\t\treturn betapb.OsconfigBetaGuestPolicyPackagesManagerEnum(0)\n\t}\n\tif v, ok := betapb.OsconfigBetaGuestPolicyPackagesManagerEnum_value[\"GuestPolicyPackagesManagerEnum\"+string(*e)]; ok {\n\t\treturn betapb.OsconfigBetaGuestPolicyPackagesManagerEnum(v)\n\t}\n\treturn betapb.OsconfigBetaGuestPolicyPackagesManagerEnum(0)\n}", "title": "" }, { "docid": "2e1891742cb767f054b5a220456c3070", "score": "0.37365115", "text": "func OsconfigBetaGuestPolicyRecipesUpdateStepsToProto(o *beta.GuestPolicyRecipesUpdateSteps) *betapb.OsconfigBetaGuestPolicyRecipesUpdateSteps {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesUpdateSteps{}\n\tp.SetFileCopy(OsconfigBetaGuestPolicyRecipesUpdateStepsFileCopyToProto(o.FileCopy))\n\tp.SetArchiveExtraction(OsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtractionToProto(o.ArchiveExtraction))\n\tp.SetMsiInstallation(OsconfigBetaGuestPolicyRecipesUpdateStepsMsiInstallationToProto(o.MsiInstallation))\n\tp.SetDpkgInstallation(OsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallationToProto(o.DpkgInstallation))\n\tp.SetRpmInstallation(OsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallationToProto(o.RpmInstallation))\n\tp.SetFileExec(OsconfigBetaGuestPolicyRecipesUpdateStepsFileExecToProto(o.FileExec))\n\tp.SetScriptRun(OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRunToProto(o.ScriptRun))\n\treturn p\n}", "title": "" }, { "docid": "74529e65232e0e8306887cc39c36b33c", "score": "0.373254", "text": "func GuestPolicyToProto(resource *beta.GuestPolicy) *betapb.OsconfigBetaGuestPolicy {\n\tp := &betapb.OsconfigBetaGuestPolicy{}\n\tp.SetName(dcl.ValueOrEmptyString(resource.Name))\n\tp.SetDescription(dcl.ValueOrEmptyString(resource.Description))\n\tp.SetCreateTime(dcl.ValueOrEmptyString(resource.CreateTime))\n\tp.SetUpdateTime(dcl.ValueOrEmptyString(resource.UpdateTime))\n\tp.SetAssignment(OsconfigBetaGuestPolicyAssignmentToProto(resource.Assignment))\n\tp.SetEtag(dcl.ValueOrEmptyString(resource.Etag))\n\tp.SetProject(dcl.ValueOrEmptyString(resource.Project))\n\tsPackages := make([]*betapb.OsconfigBetaGuestPolicyPackages, len(resource.Packages))\n\tfor i, r := range resource.Packages {\n\t\tsPackages[i] = OsconfigBetaGuestPolicyPackagesToProto(&r)\n\t}\n\tp.SetPackages(sPackages)\n\tsPackageRepositories := make([]*betapb.OsconfigBetaGuestPolicyPackageRepositories, len(resource.PackageRepositories))\n\tfor i, r := range resource.PackageRepositories {\n\t\tsPackageRepositories[i] = OsconfigBetaGuestPolicyPackageRepositoriesToProto(&r)\n\t}\n\tp.SetPackageRepositories(sPackageRepositories)\n\tsRecipes := make([]*betapb.OsconfigBetaGuestPolicyRecipes, len(resource.Recipes))\n\tfor i, r := range resource.Recipes {\n\t\tsRecipes[i] = OsconfigBetaGuestPolicyRecipesToProto(&r)\n\t}\n\tp.SetRecipes(sRecipes)\n\n\treturn p\n}", "title": "" }, { "docid": "d8f4c0fe50c0f2e2b77bc9d2c046bec6", "score": "0.3722056", "text": "func DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleToProto(o *beta.InspectTemplateInspectConfigRuleSetRulesExclusionRule) *betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRule {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRule{}\n\tp.SetDictionary(DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleDictionaryToProto(o.Dictionary))\n\tp.SetRegex(DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegexToProto(o.Regex))\n\tp.SetExcludeInfoTypes(DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleExcludeInfoTypesToProto(o.ExcludeInfoTypes))\n\tp.SetMatchingType(DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleMatchingTypeEnumToProto(o.MatchingType))\n\treturn p\n}", "title": "" }, { "docid": "fb7d44d9ff6ec7d4789bb50a587b546f", "score": "0.37112907", "text": "func NewPackagesCalculator() *PackagesCalculatorBuilder {\n\treturn &PackagesCalculatorBuilder{}\n}", "title": "" }, { "docid": "644831ebe986093739563cac64d5248f", "score": "0.36820954", "text": "func ParseSearchRepositoriesResponse(rsp *http.Response) (*SearchRepositoriesResponse, error) {\n\tbodyBytes, err := ioutil.ReadAll(rsp.Body)\n\tdefer rsp.Body.Close()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &SearchRepositoriesResponse{\n\t\tBody: bodyBytes,\n\t\tHTTPResponse: rsp,\n\t}\n\n\tswitch {\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 200:\n\t\tvar dest []Repository\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON200 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 401:\n\t\tvar dest Error\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON401 = &dest\n\n\tcase strings.Contains(rsp.Header.Get(\"Content-Type\"), \"json\") && rsp.StatusCode == 500:\n\t\tvar dest Error\n\t\tif err := json.Unmarshal(bodyBytes, &dest); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresponse.JSON500 = &dest\n\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "20fb58936b19624dd9b2bc86e97c5fd1", "score": "0.36650914", "text": "func OsconfigBetaGuestPolicyRecipesInstallStepsToProto(o *beta.GuestPolicyRecipesInstallSteps) *betapb.OsconfigBetaGuestPolicyRecipesInstallSteps {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesInstallSteps{}\n\tp.SetFileCopy(OsconfigBetaGuestPolicyRecipesInstallStepsFileCopyToProto(o.FileCopy))\n\tp.SetArchiveExtraction(OsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtractionToProto(o.ArchiveExtraction))\n\tp.SetMsiInstallation(OsconfigBetaGuestPolicyRecipesInstallStepsMsiInstallationToProto(o.MsiInstallation))\n\tp.SetDpkgInstallation(OsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallationToProto(o.DpkgInstallation))\n\tp.SetRpmInstallation(OsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallationToProto(o.RpmInstallation))\n\tp.SetFileExec(OsconfigBetaGuestPolicyRecipesInstallStepsFileExecToProto(o.FileExec))\n\tp.SetScriptRun(OsconfigBetaGuestPolicyRecipesInstallStepsScriptRunToProto(o.ScriptRun))\n\treturn p\n}", "title": "" }, { "docid": "d313c5c6ce831574b33d183c469d622a", "score": "0.36528662", "text": "func ComputeInstanceGroupManagerVersionsTargetSizeToProto(o *compute.InstanceGroupManagerVersionsTargetSize) *computepb.ComputeInstanceGroupManagerVersionsTargetSize {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &computepb.ComputeInstanceGroupManagerVersionsTargetSize{\n\t\tFixed: dcl.ValueOrEmptyInt64(o.Fixed),\n\t\tPercent: dcl.ValueOrEmptyInt64(o.Percent),\n\t\tCalculated: dcl.ValueOrEmptyInt64(o.Calculated),\n\t}\n\treturn p\n}", "title": "" }, { "docid": "9d5eb722929216277b1f78f783c4f869", "score": "0.3643949", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesInstallSteps(p *betapb.OsconfigBetaGuestPolicyRecipesInstallSteps) *beta.GuestPolicyRecipesInstallSteps {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesInstallSteps{\n\t\tFileCopy: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsFileCopy(p.GetFileCopy()),\n\t\tArchiveExtraction: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtraction(p.GetArchiveExtraction()),\n\t\tMsiInstallation: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsMsiInstallation(p.GetMsiInstallation()),\n\t\tDpkgInstallation: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallation(p.GetDpkgInstallation()),\n\t\tRpmInstallation: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsRpmInstallation(p.GetRpmInstallation()),\n\t\tFileExec: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsFileExec(p.GetFileExec()),\n\t\tScriptRun: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsScriptRun(p.GetScriptRun()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "604baab6c9d63c4281b968ec59ccc9a0", "score": "0.36423624", "text": "func NewPruner(prunerClient client.Client, gvk schema.GroupVersionKind, strategy StrategyFunc, opts ...PrunerOption) (*Pruner, error) {\n\n\tif gvk.Empty() {\n\t\treturn nil, fmt.Errorf(\"error when creating a new Pruner: gvk parameter can not be empty\")\n\t}\n\n\tpruner := Pruner{\n\t\tregistry: defaultRegistry,\n\t\tclient: prunerClient,\n\t\tgvk: gvk,\n\t\tstrategy: strategy,\n\t}\n\n\tfor _, opt := range opts {\n\t\topt(&pruner)\n\t}\n\n\treturn &pruner, nil\n}", "title": "" }, { "docid": "f8a96f9eef2d184036ad696e7a075e87", "score": "0.36420482", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsScriptRun(p *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsScriptRun) *beta.GuestPolicyRecipesUpdateStepsScriptRun {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesUpdateStepsScriptRun{\n\t\tScript: dcl.StringOrNil(p.GetScript()),\n\t\tInterpreter: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsScriptRunInterpreterEnum(p.GetInterpreter()),\n\t}\n\tfor _, r := range p.GetAllowedExitCodes() {\n\t\tobj.AllowedExitCodes = append(obj.AllowedExitCodes, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "e908c7f44ee43a9f3db35951b86daf38", "score": "0.36362824", "text": "func ProtoToGuestPolicy(p *betapb.OsconfigBetaGuestPolicy) *beta.GuestPolicy {\n\tobj := &beta.GuestPolicy{\n\t\tName: dcl.StringOrNil(p.GetName()),\n\t\tDescription: dcl.StringOrNil(p.GetDescription()),\n\t\tCreateTime: dcl.StringOrNil(p.GetCreateTime()),\n\t\tUpdateTime: dcl.StringOrNil(p.GetUpdateTime()),\n\t\tAssignment: ProtoToOsconfigBetaGuestPolicyAssignment(p.GetAssignment()),\n\t\tEtag: dcl.StringOrNil(p.GetEtag()),\n\t\tProject: dcl.StringOrNil(p.GetProject()),\n\t}\n\tfor _, r := range p.GetPackages() {\n\t\tobj.Packages = append(obj.Packages, *ProtoToOsconfigBetaGuestPolicyPackages(r))\n\t}\n\tfor _, r := range p.GetPackageRepositories() {\n\t\tobj.PackageRepositories = append(obj.PackageRepositories, *ProtoToOsconfigBetaGuestPolicyPackageRepositories(r))\n\t}\n\tfor _, r := range p.GetRecipes() {\n\t\tobj.Recipes = append(obj.Recipes, *ProtoToOsconfigBetaGuestPolicyRecipes(r))\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "e5d3e87a324251b4a477d01cd071d260", "score": "0.36350584", "text": "func GetPvbRepositoryType(pvb *velerov1api.PodVolumeBackup) string {\n\treturn getRepositoryType(pvb.Spec.UploaderType)\n}", "title": "" }, { "docid": "8f7abcbc6c6ed9dec14c19b8749ea3d4", "score": "0.36316937", "text": "func DlpBetaInspectTemplateInspectConfigRuleSetRulesHotwordRuleHotwordRegexToProto(o *beta.InspectTemplateInspectConfigRuleSetRulesHotwordRuleHotwordRegex) *betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesHotwordRuleHotwordRegex {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesHotwordRuleHotwordRegex{}\n\tp.SetPattern(dcl.ValueOrEmptyString(o.Pattern))\n\tsGroupIndexes := make([]int64, len(o.GroupIndexes))\n\tfor i, r := range o.GroupIndexes {\n\t\tsGroupIndexes[i] = r\n\t}\n\tp.SetGroupIndexes(sGroupIndexes)\n\treturn p\n}", "title": "" }, { "docid": "a9fbef10164c321e877faedf48229b0f", "score": "0.36309177", "text": "func LoadRepositories(c *configv1alpha1.ClientConfig) []Repository {\n\trepos := []Repository{}\n\tif c.ClientOptions == nil {\n\t\tc.ClientOptions = &configv1alpha1.ClientOptions{}\n\t}\n\tif c.ClientOptions.CLI == nil {\n\t\tc.ClientOptions.CLI = &configv1alpha1.CLIOptions{}\n\t}\n\n\tvs := LoadVersionSelector(c.ClientOptions.CLI.UnstableVersionSelector)\n\tfor _, repo := range c.ClientOptions.CLI.Repositories {\n\t\tif repo.GCPPluginRepository == nil {\n\t\t\tcontinue\n\t\t}\n\t\trepos = append(repos, loadRepository(repo, vs))\n\t}\n\treturn repos\n}", "title": "" }, { "docid": "cdea657451669fc96485b69349c332a6", "score": "0.36267447", "text": "func (in *PostgresProxySpec) DeepCopy() *PostgresProxySpec {\n\tif in == nil {\n\t\treturn nil\n\t}\n\tout := new(PostgresProxySpec)\n\tin.DeepCopyInto(out)\n\treturn out\n}", "title": "" }, { "docid": "4c59216ce17da220aa7cb022c4b52b41", "score": "0.3626024", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallation(p *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallation) *beta.GuestPolicyRecipesUpdateStepsDpkgInstallation {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesUpdateStepsDpkgInstallation{\n\t\tArtifactId: dcl.StringOrNil(p.GetArtifactId()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "219193926b30af1d99d8d0ce93e3b0b1", "score": "0.36162636", "text": "func NewGetExtensionRepoVersionsUnauthorized() *GetExtensionRepoVersionsUnauthorized {\n\treturn &GetExtensionRepoVersionsUnauthorized{}\n}", "title": "" }, { "docid": "649293466eba1ee06c987091dc1baac7", "score": "0.36157846", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesUpdateSteps(p *betapb.OsconfigBetaGuestPolicyRecipesUpdateSteps) *beta.GuestPolicyRecipesUpdateSteps {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesUpdateSteps{\n\t\tFileCopy: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsFileCopy(p.GetFileCopy()),\n\t\tArchiveExtraction: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtraction(p.GetArchiveExtraction()),\n\t\tMsiInstallation: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsMsiInstallation(p.GetMsiInstallation()),\n\t\tDpkgInstallation: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsDpkgInstallation(p.GetDpkgInstallation()),\n\t\tRpmInstallation: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsRpmInstallation(p.GetRpmInstallation()),\n\t\tFileExec: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsFileExec(p.GetFileExec()),\n\t\tScriptRun: ProtoToOsconfigBetaGuestPolicyRecipesUpdateStepsScriptRun(p.GetScriptRun()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "40fe9a1b8b6a9a23c0ea8267d8bb4766", "score": "0.35954309", "text": "func CloudfunctionsFunctionSourceRepositoryToProto(o *cloudfunctions.FunctionSourceRepository) *cloudfunctionspb.CloudfunctionsFunctionSourceRepository {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &cloudfunctionspb.CloudfunctionsFunctionSourceRepository{}\n\tp.SetUrl(dcl.ValueOrEmptyString(o.Url))\n\tp.SetDeployedUrl(dcl.ValueOrEmptyString(o.DeployedUrl))\n\treturn p\n}", "title": "" }, { "docid": "037db9a291351393e8342d16f12b0033", "score": "0.35904106", "text": "func (o WorkerPoolResponseOutput) Packages() PackageResponseArrayOutput {\n\treturn o.ApplyT(func(v WorkerPoolResponse) []PackageResponse { return v.Packages }).(PackageResponseArrayOutput)\n}", "title": "" }, { "docid": "57272c0869b251dca8a7cf7bdd09a2c9", "score": "0.35757917", "text": "func DefaultRepositories() *Repositories {\n\tdefaultRepo := Repository{\n\t\tName: \"universe\",\n\t\tLoc: \"github.com/ashwanthkumar/marathonctl-universe\",\n\t}\n\tvar DefaultRepo Repositories\n\tDefaultRepo = []Repository{defaultRepo}\n\treturn &DefaultRepo\n}", "title": "" }, { "docid": "6e0fc3fab5884288eccc596c588df23f", "score": "0.3570925", "text": "func NewRepository(pool *pgxpool.Pool) *Repository {\n\treturn &Repository{\n\t\tpool: pool,\n\t}\n}", "title": "" }, { "docid": "3f47de812267be76d35446df79efe198", "score": "0.35694373", "text": "func ProtoToComputeInstanceGroupManagerVersionsTargetSize(p *computepb.ComputeInstanceGroupManagerVersionsTargetSize) *compute.InstanceGroupManagerVersionsTargetSize {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &compute.InstanceGroupManagerVersionsTargetSize{\n\t\tFixed: dcl.Int64OrNil(p.Fixed),\n\t\tPercent: dcl.Int64OrNil(p.Percent),\n\t\tCalculated: dcl.Int64OrNil(p.Calculated),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "87fd1b36d2fdaffd018461a109def484", "score": "0.35549164", "text": "func ProtoToOsconfigPatchDeploymentInstanceFilterGroupLabels(p *osconfigpb.OsconfigPatchDeploymentInstanceFilterGroupLabels) *osconfig.PatchDeploymentInstanceFilterGroupLabels {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &osconfig.PatchDeploymentInstanceFilterGroupLabels{}\n\treturn obj\n}", "title": "" }, { "docid": "510973d27889a0bbddc7c1022b6d52aa", "score": "0.35526982", "text": "func OsconfigBetaGuestPolicyAssignmentToProto(o *beta.GuestPolicyAssignment) *betapb.OsconfigBetaGuestPolicyAssignment {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyAssignment{}\n\tsGroupLabels := make([]*betapb.OsconfigBetaGuestPolicyAssignmentGroupLabels, len(o.GroupLabels))\n\tfor i, r := range o.GroupLabels {\n\t\tsGroupLabels[i] = OsconfigBetaGuestPolicyAssignmentGroupLabelsToProto(&r)\n\t}\n\tp.SetGroupLabels(sGroupLabels)\n\tsZones := make([]string, len(o.Zones))\n\tfor i, r := range o.Zones {\n\t\tsZones[i] = r\n\t}\n\tp.SetZones(sZones)\n\tsInstances := make([]string, len(o.Instances))\n\tfor i, r := range o.Instances {\n\t\tsInstances[i] = r\n\t}\n\tp.SetInstances(sInstances)\n\tsInstanceNamePrefixes := make([]string, len(o.InstanceNamePrefixes))\n\tfor i, r := range o.InstanceNamePrefixes {\n\t\tsInstanceNamePrefixes[i] = r\n\t}\n\tp.SetInstanceNamePrefixes(sInstanceNamePrefixes)\n\tsOSTypes := make([]*betapb.OsconfigBetaGuestPolicyAssignmentOSTypes, len(o.OSTypes))\n\tfor i, r := range o.OSTypes {\n\t\tsOSTypes[i] = OsconfigBetaGuestPolicyAssignmentOSTypesToProto(&r)\n\t}\n\tp.SetOsTypes(sOSTypes)\n\treturn p\n}", "title": "" }, { "docid": "acf9e9da6c8cf65a0330a720a2c8bf64", "score": "0.35520774", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsScriptRun(p *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsScriptRun) *beta.GuestPolicyRecipesInstallStepsScriptRun {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesInstallStepsScriptRun{\n\t\tScript: dcl.StringOrNil(p.GetScript()),\n\t\tInterpreter: ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsScriptRunInterpreterEnum(p.GetInterpreter()),\n\t}\n\tfor _, r := range p.GetAllowedExitCodes() {\n\t\tobj.AllowedExitCodes = append(obj.AllowedExitCodes, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "9a340db659d74b068d63311e5e497a47", "score": "0.35508466", "text": "func (client *ClientImpl) GetDeletedRepositories(ctx context.Context, args GetDeletedRepositoriesArgs) (*[]GitDeletedRepository, error) {\n\trouteValues := make(map[string]string)\n\tif args.Project == nil || *args.Project == \"\" {\n\t\treturn nil, &azuredevops.ArgumentNilOrEmptyError{ArgumentName: \"args.Project\"}\n\t}\n\trouteValues[\"project\"] = *args.Project\n\n\tlocationId, _ := uuid.Parse(\"2b6869c4-cb25-42b5-b7a3-0d3e6be0a11a\")\n\tresp, err := client.Client.Send(ctx, http.MethodGet, locationId, \"5.1-preview.1\", routeValues, nil, nil, \"\", \"application/json\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar responseValue []GitDeletedRepository\n\terr = client.Client.UnmarshalCollectionBody(resp, &responseValue)\n\treturn &responseValue, err\n}", "title": "" }, { "docid": "f895cf7f6f9489fb96721137482942fd", "score": "0.35482714", "text": "func ProtoToOsconfigBetaGuestPolicyAssignmentOSTypes(p *betapb.OsconfigBetaGuestPolicyAssignmentOSTypes) *beta.GuestPolicyAssignmentOSTypes {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyAssignmentOSTypes{\n\t\tOSShortName: dcl.StringOrNil(p.GetOsShortName()),\n\t\tOSVersion: dcl.StringOrNil(p.GetOsVersion()),\n\t\tOSArchitecture: dcl.StringOrNil(p.GetOsArchitecture()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "f9f8807e16cddb1ed03af3d1991cc337", "score": "0.35404348", "text": "func ProtoToOsconfigPatchDeploymentPatchConfigYum(p *osconfigpb.OsconfigPatchDeploymentPatchConfigYum) *osconfig.PatchDeploymentPatchConfigYum {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &osconfig.PatchDeploymentPatchConfigYum{\n\t\tSecurity: dcl.Bool(p.GetSecurity()),\n\t\tMinimal: dcl.Bool(p.GetMinimal()),\n\t}\n\tfor _, r := range p.GetExcludes() {\n\t\tobj.Excludes = append(obj.Excludes, r)\n\t}\n\tfor _, r := range p.GetExclusivePackages() {\n\t\tobj.ExclusivePackages = append(obj.ExclusivePackages, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "4b8f367019e1f53b38ad40525731095a", "score": "0.35344326", "text": "func OsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtractionToProto(o *beta.GuestPolicyRecipesUpdateStepsArchiveExtraction) *betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtraction {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtraction{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\tp.SetDestination(dcl.ValueOrEmptyString(o.Destination))\n\tp.SetType(OsconfigBetaGuestPolicyRecipesUpdateStepsArchiveExtractionTypeEnumToProto(o.Type))\n\treturn p\n}", "title": "" }, { "docid": "49b886987b9a66f55deab02dfd752e4d", "score": "0.35338843", "text": "func ProtoToDlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex(p *betapb.DlpBetaInspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex) *beta.InspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.InspectTemplateInspectConfigRuleSetRulesExclusionRuleRegex{\n\t\tPattern: dcl.StringOrNil(p.GetPattern()),\n\t}\n\tfor _, r := range p.GetGroupIndexes() {\n\t\tobj.GroupIndexes = append(obj.GroupIndexes, r)\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "ebff917073d0bd8c26803ddb26f9baaf", "score": "0.35334927", "text": "func ContainerazureBetaNodePoolConfigProxyConfigToProto(o *beta.NodePoolConfigProxyConfig) *betapb.ContainerazureBetaNodePoolConfigProxyConfig {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.ContainerazureBetaNodePoolConfigProxyConfig{}\n\tp.SetResourceGroupId(dcl.ValueOrEmptyString(o.ResourceGroupId))\n\tp.SetSecretId(dcl.ValueOrEmptyString(o.SecretId))\n\treturn p\n}", "title": "" }, { "docid": "badeb1d4ae35bf803d0b620ca85fe235", "score": "0.35259175", "text": "func NewPublicationsRepository(db *sql.DB) *Publications {\r\n\treturn &Publications{db}\r\n}", "title": "" }, { "docid": "b582cb4603b5705cf34d78b51fadac94", "score": "0.35137957", "text": "func OsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtractionToProto(o *beta.GuestPolicyRecipesInstallStepsArchiveExtraction) *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtraction {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &betapb.OsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtraction{}\n\tp.SetArtifactId(dcl.ValueOrEmptyString(o.ArtifactId))\n\tp.SetDestination(dcl.ValueOrEmptyString(o.Destination))\n\tp.SetType(OsconfigBetaGuestPolicyRecipesInstallStepsArchiveExtractionTypeEnumToProto(o.Type))\n\treturn p\n}", "title": "" }, { "docid": "49dc97df79b7038748c81bebec6fc609", "score": "0.35068032", "text": "func OsconfigPatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObjectToProto(o *osconfig.PatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject) *osconfigpb.OsconfigPatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &osconfigpb.OsconfigPatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject{}\n\tp.SetBucket(dcl.ValueOrEmptyString(o.Bucket))\n\tp.SetObject(dcl.ValueOrEmptyString(o.Object))\n\tp.SetGenerationNumber(dcl.ValueOrEmptyInt64(o.GenerationNumber))\n\treturn p\n}", "title": "" }, { "docid": "349ed1698bac5e4ec60f933f86a2df92", "score": "0.35036188", "text": "func (s *Satis) GetRepositoriesAsSlice() []SatisRepository {\n\tc := make([]SatisRepository, 0, len(s.repositories))\n\tfor _, value := range s.repositories {\n\t\tc = append(c, value)\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "8cab6534079458de2dccde9f1a93ca98", "score": "0.35019314", "text": "func NewRepositoryRegistry(db *sql.DB) domain.RepositoryRegistry {\n\treturn &pgRegistry{\n\t\tlog: common.Logger().WithField(\"source\", \"pgRegistry\"),\n\t\tdb: db,\n\t}\n}", "title": "" }, { "docid": "ea3e1d468ae6819930e81ea026929657", "score": "0.3497295", "text": "func (o WorkerPoolOutput) Packages() PackageArrayOutput {\n\treturn o.ApplyT(func(v WorkerPool) []Package { return v.Packages }).(PackageArrayOutput)\n}", "title": "" }, { "docid": "a63b2a51254780f5ff4f1164b9b694f2", "score": "0.3490611", "text": "func OsconfigPatchDeploymentPatchConfigPostStepLinuxExecStepConfigGcsObjectToProto(o *osconfig.PatchDeploymentPatchConfigPostStepLinuxExecStepConfigGcsObject) *osconfigpb.OsconfigPatchDeploymentPatchConfigPostStepLinuxExecStepConfigGcsObject {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &osconfigpb.OsconfigPatchDeploymentPatchConfigPostStepLinuxExecStepConfigGcsObject{}\n\tp.SetBucket(dcl.ValueOrEmptyString(o.Bucket))\n\tp.SetObject(dcl.ValueOrEmptyString(o.Object))\n\tp.SetGenerationNumber(dcl.ValueOrEmptyInt64(o.GenerationNumber))\n\treturn p\n}", "title": "" }, { "docid": "6524bb3a375c4c2a9125cc5406f374d0", "score": "0.34901035", "text": "func (p *geo) ZalozNavrhZPG(ZalozNavrhZPGRequest *ZalozNavrhZPGRequest) (*ZalozNavrhZPGResponse, error) {\n\tα := struct {\n\t\tOperationZalozNavrhZPGRequest `xml:\"tns:zalozNavrhZPG\"`\n\t}{\n\t\tOperationZalozNavrhZPGRequest{\n\t\t\tZalozNavrhZPGRequest,\n\t\t},\n\t}\n\n\tγ := struct {\n\t\tOperationZalozNavrhZPGResponse `xml:\"zalozNavrhZPGResponse\"`\n\t}{}\n\tif err := p.cli.RoundTripWithAction(\"http://katastr.cuzk.cz/geows/zalozNavrhZPG\", α, &γ); err != nil {\n\t\treturn nil, err\n\t}\n\treturn γ.ZalozNavrhZPGResponse, nil\n}", "title": "" }, { "docid": "45e97a3bb5fca7335be482aa2ca8a51b", "score": "0.34815675", "text": "func ProtoToOsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallation(p *betapb.OsconfigBetaGuestPolicyRecipesInstallStepsDpkgInstallation) *beta.GuestPolicyRecipesInstallStepsDpkgInstallation {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &beta.GuestPolicyRecipesInstallStepsDpkgInstallation{\n\t\tArtifactId: dcl.StringOrNil(p.GetArtifactId()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "bf2a0f666a83e6a8a567920a0f916cb5", "score": "0.3475592", "text": "func (p *Packages) UnmarshalJSON(b []byte) error {\n\ts := new(packagesJSON)\n\n\tif err := json.Unmarshal(b, &s); err != nil {\n\t\treturn err\n\t}\n\n\tp.Dependencies = make(map[string][]Package)\n\tfor k, v := range s.Dependencies {\n\t\tfor _, vv := range v {\n\t\t\tp.Dependencies[k] = append(p.Dependencies[k], Package{ImportPath: vv})\n\t\t}\n\t}\n\n\tfor _, v := range s.Changes {\n\t\tp.Changes = append(p.Changes, Package{ImportPath: v})\n\t}\n\n\tfor _, v := range s.AllChanges {\n\t\tp.AllChanges = append(p.AllChanges, Package{ImportPath: v})\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "87d1f8baa45d992dd27e29f28730e734", "score": "0.34749216", "text": "func ProtoToOsconfigPatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject(p *osconfigpb.OsconfigPatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject) *osconfig.PatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &osconfig.PatchDeploymentPatchConfigPreStepLinuxExecStepConfigGcsObject{\n\t\tBucket: dcl.StringOrNil(p.GetBucket()),\n\t\tObject: dcl.StringOrNil(p.GetObject()),\n\t\tGenerationNumber: dcl.Int64OrNil(p.GetGenerationNumber()),\n\t}\n\treturn obj\n}", "title": "" }, { "docid": "fd0713903608198a54648c8ac6ea1c4d", "score": "0.3469472", "text": "func OsconfigPatchDeploymentInstanceFilterGroupLabelsToProto(o *osconfig.PatchDeploymentInstanceFilterGroupLabels) *osconfigpb.OsconfigPatchDeploymentInstanceFilterGroupLabels {\n\tif o == nil {\n\t\treturn nil\n\t}\n\tp := &osconfigpb.OsconfigPatchDeploymentInstanceFilterGroupLabels{}\n\tmLabels := make(map[string]string, len(o.Labels))\n\tfor k, r := range o.Labels {\n\t\tmLabels[k] = r\n\t}\n\tp.SetLabels(mLabels)\n\treturn p\n}", "title": "" }, { "docid": "89e69b69e83044a2ca891e7429bb2f25", "score": "0.3469045", "text": "func (r *Repositories) Serialize() ([]byte, error) {\n\treturn json.Marshal(r)\n}", "title": "" }, { "docid": "fbf6fe59f1783d0e211f1bc2c5f60403", "score": "0.34634137", "text": "func ProtoToOsconfigBetaGuestPolicyPackagesManagerEnum(e betapb.OsconfigBetaGuestPolicyPackagesManagerEnum) *beta.GuestPolicyPackagesManagerEnum {\n\tif e == 0 {\n\t\treturn nil\n\t}\n\tif n, ok := betapb.OsconfigBetaGuestPolicyPackagesManagerEnum_name[int32(e)]; ok {\n\t\te := beta.GuestPolicyPackagesManagerEnum(n[len(\"OsconfigBetaGuestPolicyPackagesManagerEnum\"):])\n\t\treturn &e\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "213fb485298c33f07db7425a5927db72", "score": "0.34588176", "text": "func (*ListRepositoriesRequest) Descriptor() ([]byte, []int) {\n\treturn file_seankhliao_archrepo_v1alpha2_archrepo_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "7324b631c4ff34d8105a7d00c56f6573", "score": "0.34515306", "text": "func NewGetExtensionRepoVersionsNotFound() *GetExtensionRepoVersionsNotFound {\n\treturn &GetExtensionRepoVersionsNotFound{}\n}", "title": "" }, { "docid": "3d1aaa7e6c1b6d08b46983ac26279865", "score": "0.34490547", "text": "func ProtoToOsconfigPatchDeploymentPatchConfigGoo(p *osconfigpb.OsconfigPatchDeploymentPatchConfigGoo) *osconfig.PatchDeploymentPatchConfigGoo {\n\tif p == nil {\n\t\treturn nil\n\t}\n\tobj := &osconfig.PatchDeploymentPatchConfigGoo{}\n\treturn obj\n}", "title": "" } ]
baff1efeb4f8667bc03a0ee18de247f9
UnmarshalJSON implements the json.Unmarshaller interface for type BackupRequestResource.
[ { "docid": "96ecf2639a2db1df610aa51881e70edb", "score": "0.8352582", "text": "func (b *BackupRequestResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &b.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &b.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &b.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &b.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tb.Properties, err = unmarshalBackupRequestClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &b.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &b.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "3e889333ac778bd88a5aad3d67732ae1", "score": "0.76344556", "text": "func (a *AzureWorkloadBackupRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"backupType\":\n\t\t\terr = unpopulate(val, &a.BackupType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"enableCompression\":\n\t\t\terr = unpopulate(val, &a.EnableCompression)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointExpiryTimeInUTC\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.RecoveryPointExpiryTimeInUTC)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "29075246ab590e253acff97be31e173d", "score": "0.7291972", "text": "func (a *AzureFileShareBackupRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointExpiryTimeInUTC\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.RecoveryPointExpiryTimeInUTC)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7c97671539afb62684a4fdef981fe8ce", "score": "0.7153104", "text": "func (r *BackupResource) UnmarshalJSON(b []byte) error {\n\ttype tmp BackupResource\n\tvar s struct {\n\t\ttmp\n\t\tExtraInfo interface{} `json:\"extra_info\"`\n\t}\n\terr := json.Unmarshal(b, &s)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t*r = BackupResource(s.tmp)\n\n\tswitch t := s.ExtraInfo.(type) {\n\tcase float64:\n\t\tr.ID = strconv.FormatFloat(t, 'f', -1, 64)\n\tcase string:\n\t\tr.ID = t\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "8c950d9825950aae03e57bdf8c5e8a15", "score": "0.68192214", "text": "func (r *Backup) UnmarshalJSON(b []byte) error {\n\ttype tmp Backup\n\tvar s struct {\n\t\ttmp\n\t\tCreatedAt golangsdk.JSONRFC3339MilliNoZ `json:\"created_at\"`\n\t\tUpdatedAt golangsdk.JSONRFC3339MilliNoZ `json:\"updated_at\"`\n\t}\n\terr := json.Unmarshal(b, &s)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*r = Backup(s.tmp)\n\n\tr.CreatedAt = time.Time(s.CreatedAt)\n\tr.UpdatedAt = time.Time(s.UpdatedAt)\n\n\treturn err\n}", "title": "" }, { "docid": "7690e76ef2adbb2a23e2f50836ee4c91", "score": "0.6779971", "text": "func (b *BackupEngineBaseResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &b.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &b.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &b.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &b.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tb.Properties, err = unmarshalBackupEngineBaseClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &b.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &b.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fba607ee90bca28d7cf97c08e79a12b6", "score": "0.65115374", "text": "func (r *RestoreRequestResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &r.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tr.Properties, err = unmarshalRestoreRequestClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8caf1947b76a33196a50e7afd537623d", "score": "0.62484646", "text": "func (response *BackupCodeResponse) UnmarshalJSON(j []byte) error {\n\tvar jsonResponse = &jsonBackupCodeResponse{}\n\n\terr := json.Unmarshal(j, &jsonResponse)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn response.copyFrom(jsonResponse)\n}", "title": "" }, { "docid": "285105a93d6fb3d9c2bd3aa3acf128bc", "score": "0.6194444", "text": "func (j *BidRequest) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "285105a93d6fb3d9c2bd3aa3acf128bc", "score": "0.6194444", "text": "func (j *BidRequest) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "ea34e7fa412d4c35c2b616eaf3e34c95", "score": "0.61189187", "text": "func (a *AzureWorkloadSQLRestoreWithRehydrateRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"alternateDirectoryPaths\":\n\t\t\terr = unpopulate(val, &a.AlternateDirectoryPaths)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isNonRecoverable\":\n\t\t\terr = unpopulate(val, &a.IsNonRecoverable)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointRehydrationInfo\":\n\t\t\terr = unpopulate(val, &a.RecoveryPointRehydrationInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shouldUseAlternateTargetLocation\":\n\t\t\terr = unpopulate(val, &a.ShouldUseAlternateTargetLocation)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "add27dd41d6ab4404ccd1af36f4aa854", "score": "0.61046827", "text": "func (a *AzureWorkloadRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eac6663705ffb09b5b2e09fe51c3328c", "score": "0.6103695", "text": "func (i *IaasVMBackupRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &i.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointExpiryTimeInUTC\":\n\t\t\terr = unpopulateTimeRFC3339(val, &i.RecoveryPointExpiryTimeInUTC)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a058e6c50e3445110ac5ee3621704271", "score": "0.6101237", "text": "func (b *BackupKeyResult) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"value\":\n\t\t\terr = runtime.DecodeByteArray(string(val), &b.Value, runtime.Base64URLFormat)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "040946d7a6f23f6b95f322c9b7434d0b", "score": "0.60959154", "text": "func (v *BidRequest) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjson777f8b91DecodeGithubComApplifierGoOpenrtbOpenrtb2(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "8c0104efe0de1b750131d0d90bf1fe86", "score": "0.60720086", "text": "func (v *BidRequest) UnmarshalJSON(data []byte) error {\n\tr := jlexer.Lexer{Data: data}\n\teasyjson777f8b91DecodeGithubComMxmCherryOpenrtb(&r, v)\n\treturn r.Error()\n}", "title": "" }, { "docid": "2dc555e243780e2b5c31ad8dd532cc2f", "score": "0.6040228", "text": "func (b BackupRequestResource) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"eTag\", b.ETag)\n\tpopulate(objectMap, \"id\", b.ID)\n\tpopulate(objectMap, \"location\", b.Location)\n\tpopulate(objectMap, \"name\", b.Name)\n\tpopulate(objectMap, \"properties\", b.Properties)\n\tpopulate(objectMap, \"tags\", b.Tags)\n\tpopulate(objectMap, \"type\", b.Type)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "30792d280ea7ad42937dd5cbbcbd9c28", "score": "0.59141695", "text": "func (a *AzureWorkloadSAPHanaRestoreWithRehydrateRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointRehydrationInfo\":\n\t\t\terr = unpopulate(val, &a.RecoveryPointRehydrationInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7eb7ef92cec76a2d9b153d216a52a09c", "score": "0.5911936", "text": "func (r *Resource) UnmarshalJSON(b []byte) error {\n\tvar tmp struct {\n\t\tName string\n\t\tLocation string\n\t}\n\tvar err error\n\tif err = json.Unmarshal(b, &tmp); err != nil {\n\t\treturn err\n\t}\n\tif r.Location, err = url.Parse(tmp.Location); err != nil {\n\t\treturn err\n\t}\n\tr.Name = tmp.Name\n\treturn nil\n}", "title": "" }, { "docid": "6f87d68ae030bd9c43aabbe34c25ddf7", "score": "0.590112", "text": "func (a *AzureBackupGoalFeatureSupportRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"featureType\":\n\t\t\terr = unpopulate(val, &a.FeatureType)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c316dbced7f9096bf10ac18df2bdbc82", "score": "0.5871281", "text": "func (b *BackupSecretResult) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", b, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"value\":\n\t\t\terr = runtime.DecodeByteArray(string(val), &b.Value, runtime.Base64URLFormat)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", b, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "888068d36263cf240bf08e17be32f6a7", "score": "0.5841462", "text": "func (a *AzureWorkloadSQLPointInTimeRestoreWithRehydrateRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"alternateDirectoryPaths\":\n\t\t\terr = unpopulate(val, &a.AlternateDirectoryPaths)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isNonRecoverable\":\n\t\t\terr = unpopulate(val, &a.IsNonRecoverable)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"pointInTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.PointInTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointRehydrationInfo\":\n\t\t\terr = unpopulate(val, &a.RecoveryPointRehydrationInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shouldUseAlternateTargetLocation\":\n\t\t\terr = unpopulate(val, &a.ShouldUseAlternateTargetLocation)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2d37312d63f4d6e3940be9efe54c4797", "score": "0.5841092", "text": "func (a *AzureWorkloadSQLRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"alternateDirectoryPaths\":\n\t\t\terr = unpopulate(val, &a.AlternateDirectoryPaths)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isNonRecoverable\":\n\t\t\terr = unpopulate(val, &a.IsNonRecoverable)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shouldUseAlternateTargetLocation\":\n\t\t\terr = unpopulate(val, &a.ShouldUseAlternateTargetLocation)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e8d33575ca08a7d537bcb2d4df45177", "score": "0.583082", "text": "func (s *SwitchBillingRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"azureResourceId\":\n\t\t\terr = unpopulate(val, \"AzureResourceID\", &s.AzureResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"organizationId\":\n\t\t\terr = unpopulate(val, \"OrganizationID\", &s.OrganizationID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"planData\":\n\t\t\terr = unpopulate(val, \"PlanData\", &s.PlanData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"userEmail\":\n\t\t\terr = unpopulate(val, \"UserEmail\", &s.UserEmail)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", s, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bbdc2f4d94a4423f43a69c036a0be1ec", "score": "0.58231634", "text": "func (w *WorkloadProtectableItemResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &w.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &w.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &w.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &w.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tw.Properties, err = unmarshalWorkloadProtectableItemClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &w.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &w.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0a1c3adfabe66e17754765a6eabcaff9", "score": "0.5822025", "text": "func (i *IaasVMRestoreWithRehydrationRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"affinityGroup\":\n\t\t\terr = unpopulate(val, &i.AffinityGroup)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"createNewCloudService\":\n\t\t\terr = unpopulate(val, &i.CreateNewCloudService)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"diskEncryptionSetId\":\n\t\t\terr = unpopulate(val, &i.DiskEncryptionSetID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"encryptionDetails\":\n\t\t\terr = unpopulate(val, &i.EncryptionDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identityBasedRestoreDetails\":\n\t\t\terr = unpopulate(val, &i.IdentityBasedRestoreDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identityInfo\":\n\t\t\terr = unpopulate(val, &i.IdentityInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &i.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"originalStorageAccountOption\":\n\t\t\terr = unpopulate(val, &i.OriginalStorageAccountOption)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointId\":\n\t\t\terr = unpopulate(val, &i.RecoveryPointID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointRehydrationInfo\":\n\t\t\terr = unpopulate(val, &i.RecoveryPointRehydrationInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &i.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"region\":\n\t\t\terr = unpopulate(val, &i.Region)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreDiskLunList\":\n\t\t\terr = unpopulate(val, &i.RestoreDiskLunList)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreWithManagedDisks\":\n\t\t\terr = unpopulate(val, &i.RestoreWithManagedDisks)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &i.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"storageAccountId\":\n\t\t\terr = unpopulate(val, &i.StorageAccountID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"subnetId\":\n\t\t\terr = unpopulate(val, &i.SubnetID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetDomainNameId\":\n\t\t\terr = unpopulate(val, &i.TargetDomainNameID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetResourceGroupId\":\n\t\t\terr = unpopulate(val, &i.TargetResourceGroupID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &i.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"virtualNetworkId\":\n\t\t\terr = unpopulate(val, &i.VirtualNetworkID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"zones\":\n\t\t\terr = unpopulate(val, &i.Zones)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cf0529cecbc8b172cf0251ca08d3685e", "score": "0.5781166", "text": "func (m *MarketplaceSaaSResourceDetailsRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", m, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"tenantId\":\n\t\t\terr = unpopulate(val, \"TenantID\", &m.TenantID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", m, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f9f394fcb614e5adc6092b22ab9d17f0", "score": "0.57705784", "text": "func (a *RequestMemoryDumpArgs) UnmarshalJSON(b []byte) error {\n\ttype Copy RequestMemoryDumpArgs\n\tc := &Copy{}\n\terr := json.Unmarshal(b, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*a = RequestMemoryDumpArgs(*c)\n\treturn nil\n}", "title": "" }, { "docid": "c653b8fcc70ae77430cd6bb4e82a9606", "score": "0.57644266", "text": "func (a *AzureFileShareRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"copyOptions\":\n\t\t\terr = unpopulate(val, &a.CopyOptions)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreFileSpecs\":\n\t\t\terr = unpopulate(val, &a.RestoreFileSpecs)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreRequestType\":\n\t\t\terr = unpopulate(val, &a.RestoreRequestType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetDetails\":\n\t\t\terr = unpopulate(val, &a.TargetDetails)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c0b4fe974069dc2a74fcbe435c4cfa21", "score": "0.5762822", "text": "func (r *DescribeBaseBackupsRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"MinFinishTime\")\n\tdelete(f, \"MaxFinishTime\")\n\tdelete(f, \"Filters\")\n\tdelete(f, \"Limit\")\n\tdelete(f, \"Offset\")\n\tdelete(f, \"OrderBy\")\n\tdelete(f, \"OrderByType\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeBaseBackupsRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "df62e0de51d731a9a7a33da737191958", "score": "0.57379186", "text": "func (f *FarmBeatsUpdateRequestModel) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"identity\":\n\t\t\terr = unpopulate(val, \"Identity\", &f.Identity)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &f.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &f.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &f.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", f, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f282b32a71323a892c2f5c55e1f2a007", "score": "0.5727983", "text": "func (i *IaasVMRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"affinityGroup\":\n\t\t\terr = unpopulate(val, &i.AffinityGroup)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"createNewCloudService\":\n\t\t\terr = unpopulate(val, &i.CreateNewCloudService)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"diskEncryptionSetId\":\n\t\t\terr = unpopulate(val, &i.DiskEncryptionSetID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"encryptionDetails\":\n\t\t\terr = unpopulate(val, &i.EncryptionDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identityBasedRestoreDetails\":\n\t\t\terr = unpopulate(val, &i.IdentityBasedRestoreDetails)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identityInfo\":\n\t\t\terr = unpopulate(val, &i.IdentityInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &i.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"originalStorageAccountOption\":\n\t\t\terr = unpopulate(val, &i.OriginalStorageAccountOption)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointId\":\n\t\t\terr = unpopulate(val, &i.RecoveryPointID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &i.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"region\":\n\t\t\terr = unpopulate(val, &i.Region)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreDiskLunList\":\n\t\t\terr = unpopulate(val, &i.RestoreDiskLunList)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreWithManagedDisks\":\n\t\t\terr = unpopulate(val, &i.RestoreWithManagedDisks)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &i.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"storageAccountId\":\n\t\t\terr = unpopulate(val, &i.StorageAccountID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"subnetId\":\n\t\t\terr = unpopulate(val, &i.SubnetID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetDomainNameId\":\n\t\t\terr = unpopulate(val, &i.TargetDomainNameID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetResourceGroupId\":\n\t\t\terr = unpopulate(val, &i.TargetResourceGroupID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &i.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"virtualNetworkId\":\n\t\t\terr = unpopulate(val, &i.VirtualNetworkID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"zones\":\n\t\t\terr = unpopulate(val, &i.Zones)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e119cefec7b41512613d6ba8aeebba35", "score": "0.56923455", "text": "func (a *AzureWorkloadSAPHanaPointInTimeRestoreWithRehydrateRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"pointInTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.PointInTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointRehydrationInfo\":\n\t\t\terr = unpopulate(val, &a.RecoveryPointRehydrationInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0cfb7c21a3e12d107a6a2af78648bb63", "score": "0.568654", "text": "func (i *ILRRequestResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &i.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &i.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &i.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &i.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\ti.Properties, err = unmarshalILRRequestClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &i.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &i.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a298da70456bd6296cba62188bb52054", "score": "0.5670569", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sku\":\n\t\t\terr = unpopulate(val, \"SKU\", &r.SKU)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"zones\":\n\t\t\terr = unpopulate(val, \"Zones\", &r.Zones)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b6bc61b919ba5031d7e31c668b89012", "score": "0.5661926", "text": "func (b *BackupManagementUsage) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"currentValue\":\n\t\t\terr = unpopulate(val, &b.CurrentValue)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"limit\":\n\t\t\terr = unpopulate(val, &b.Limit)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &b.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"nextResetTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, &b.NextResetTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"quotaPeriod\":\n\t\t\terr = unpopulate(val, &b.QuotaPeriod)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"unit\":\n\t\t\terr = unpopulate(val, &b.Unit)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "41e8c7fe515a1c2527d2a52c3e01a334", "score": "0.5643215", "text": "func (r *DescribeBackupsRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"StartTime\")\n\tdelete(f, \"EndTime\")\n\tdelete(f, \"InstanceId\")\n\tdelete(f, \"Limit\")\n\tdelete(f, \"Offset\")\n\tdelete(f, \"BackupName\")\n\tdelete(f, \"Strategy\")\n\tdelete(f, \"BackupWay\")\n\tdelete(f, \"BackupId\")\n\tdelete(f, \"DatabaseName\")\n\tdelete(f, \"Group\")\n\tdelete(f, \"Type\")\n\tdelete(f, \"BackupFormat\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeBackupsRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "92c5645fa53588ece0dc1876ebe18785", "score": "0.5638662", "text": "func (r *DescribeBackupsResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "85522bcd95e7e6adfc747ab3be1cfe52", "score": "0.5626638", "text": "func (c *CalculateRefundRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &c.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &c.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e9def9729d23008ed8d8e03b3e8b59f4", "score": "0.56180066", "text": "func (r *DescribeBaseBackupsResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "5590956637f7d48e8be2bc084db14b94", "score": "0.56077284", "text": "func (a *AzureFileShareProvisionILRRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryPointId\":\n\t\t\terr = unpopulate(val, &a.RecoveryPointID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "738951ff6c2869b058ab3f42b2f0bc7d", "score": "0.56001306", "text": "func (a *RequestMemoryDumpReply) UnmarshalJSON(b []byte) error {\n\ttype Copy RequestMemoryDumpReply\n\tc := &Copy{}\n\terr := json.Unmarshal(b, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*a = RequestMemoryDumpReply(*c)\n\treturn nil\n}", "title": "" }, { "docid": "1f8cb7ea1831293d6ee129c283d5d734", "score": "0.5598684", "text": "func (r *RefundRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &r.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d551c201a9cbccad0ce79448b4026dfe", "score": "0.55912435", "text": "func (a AzureWorkloadBackupRequest) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"backupType\", a.BackupType)\n\tpopulate(objectMap, \"enableCompression\", a.EnableCompression)\n\tobjectMap[\"objectType\"] = \"AzureWorkloadBackupRequest\"\n\tpopulateTimeRFC3339(objectMap, \"recoveryPointExpiryTimeInUTC\", a.RecoveryPointExpiryTimeInUTC)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "048c35b5a30a851ed159c5b3fc2e985a", "score": "0.55807793", "text": "func (r *DescribeDBBackupsRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"DBInstanceId\")\n\tdelete(f, \"Type\")\n\tdelete(f, \"StartTime\")\n\tdelete(f, \"EndTime\")\n\tdelete(f, \"Limit\")\n\tdelete(f, \"Offset\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeDBBackupsRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "269d655d7b1d3764dd7f1f6fae6374f3", "score": "0.5579746", "text": "func (a *AcceptOwnershipRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &a.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2445c9a4e0f0eabbfe270090c1829748", "score": "0.55698043", "text": "func (a *AzureWorkloadPointInTimeRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"pointInTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.PointInTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6111d66793977820943b5a1973edf80f", "score": "0.5560713", "text": "func (a *AccountResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &a.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &a.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &a.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &a.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &a.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6188573ecf9fe49cdfb5e8156c0a322f", "score": "0.5559534", "text": "func (l *LinkableEnvironmentRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", l, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"region\":\n\t\t\terr = unpopulate(val, \"Region\", &l.Region)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tenantId\":\n\t\t\terr = unpopulate(val, \"TenantID\", &l.TenantID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"userPrincipal\":\n\t\t\terr = unpopulate(val, \"UserPrincipal\", &l.UserPrincipal)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", l, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ef87cae2b28726797825b3737f71c9e6", "score": "0.55437016", "text": "func (j *JobResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &j.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &j.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &j.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &j.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tj.Properties, err = unmarshalJobClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &j.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &j.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a7838967534b50ffb9732e9533b883db", "score": "0.5539793", "text": "func (this *ReportRequest) UnmarshalJSON(b []byte) error {\n\treturn MixerUnmarshaler.Unmarshal(bytes.NewReader(b), this)\n}", "title": "" }, { "docid": "e6cf8cc60e5fd19f57bab75732aa5997", "score": "0.5538632", "text": "func (sr *SecretRequest) UnmarshalJSON(b []byte) error {\n\tvar alias struct {\n\t\tBaseRequest\n\t\tSecretName string\n\t\tSecretData []SecretDataKeyValue\n\t}\n\n\tif err := json.Unmarshal(b, &alias); err != nil {\n\t\treturn errors.NewCommonEdgeX(errors.KindContractInvalid, \"Failed to unmarshal SecretRequest body as JSON.\", err)\n\t}\n\n\t*sr = SecretRequest(alias)\n\n\t// validate SecretRequest DTO\n\tif err := sr.Validate(); err != nil {\n\t\treturn errors.NewCommonEdgeX(errors.KindContractInvalid, \"SecretRequest validation failed.\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "394f947be766f963644b9f3ac1cd00d1", "score": "0.5531274", "text": "func (r *DescribeLogBackupsRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"MinFinishTime\")\n\tdelete(f, \"MaxFinishTime\")\n\tdelete(f, \"Filters\")\n\tdelete(f, \"Limit\")\n\tdelete(f, \"Offset\")\n\tdelete(f, \"OrderBy\")\n\tdelete(f, \"OrderByType\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeLogBackupsRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "36595d72d50bf669b40deab4fc471655", "score": "0.55289084", "text": "func (ms ExportRequest) UnmarshalJSON(data []byte) error {\n\tmd, err := jsonUnmarshaler.UnmarshalMetrics(data)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*ms.orig = *internal.GetOrigMetrics(internal.Metrics(md))\n\treturn nil\n}", "title": "" }, { "docid": "79b92a0ddf813355937a183453543cb8", "score": "0.55282557", "text": "func (e *EligibleChildResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", e, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &e.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &e.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &e.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", e, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dda0f71b79a3be1d2ac835e391b29d80", "score": "0.55152565", "text": "func (c *CalculateRefundRequestProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"reservationToReturn\":\n\t\t\terr = unpopulate(val, \"ReservationToReturn\", &c.ReservationToReturn)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"scope\":\n\t\t\terr = unpopulate(val, \"Scope\", &c.Scope)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "171e39d0c193ffab17a03692475aaab8", "score": "0.55089605", "text": "func (r *DescribeDBBackupsResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "8bc2cb92ff5b2abf1605202d842db9be", "score": "0.54990995", "text": "func (r *RecoveryPointResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &r.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tr.Properties, err = unmarshalRecoveryPointClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6db7a666e7d9baba17eb588e14c5fb34", "score": "0.54976463", "text": "func (a *AzureBackupServerContainer) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"backupManagementType\":\n\t\t\terr = unpopulate(val, &a.BackupManagementType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"canReRegister\":\n\t\t\terr = unpopulate(val, &a.CanReRegister)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"containerId\":\n\t\t\terr = unpopulate(val, &a.ContainerID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"containerType\":\n\t\t\terr = unpopulate(val, &a.ContainerType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dpmAgentVersion\":\n\t\t\terr = unpopulate(val, &a.DpmAgentVersion)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dpmServers\":\n\t\t\terr = unpopulate(val, &a.DpmServers)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"extendedInfo\":\n\t\t\terr = unpopulate(val, &a.ExtendedInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"friendlyName\":\n\t\t\terr = unpopulate(val, &a.FriendlyName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"healthStatus\":\n\t\t\terr = unpopulate(val, &a.HealthStatus)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"protectableObjectType\":\n\t\t\terr = unpopulate(val, &a.ProtectableObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"protectedItemCount\":\n\t\t\terr = unpopulate(val, &a.ProtectedItemCount)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"protectionStatus\":\n\t\t\terr = unpopulate(val, &a.ProtectionStatus)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"registrationStatus\":\n\t\t\terr = unpopulate(val, &a.RegistrationStatus)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"upgradeAvailable\":\n\t\t\terr = unpopulate(val, &a.UpgradeAvailable)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ad89206c35a5a2a7865f64abd79bb5c7", "score": "0.54973406", "text": "func (r *DescribeBackupDownloadURLRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"DBInstanceId\")\n\tdelete(f, \"BackupType\")\n\tdelete(f, \"BackupId\")\n\tdelete(f, \"URLExpireTime\")\n\tdelete(f, \"BackupDownloadRestriction\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeBackupDownloadURLRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "05fdccab18a82c55b5751550cb8ebc27", "score": "0.54809177", "text": "func (b *BackupRequest) GetBackupRequest() *BackupRequest { return b }", "title": "" }, { "docid": "8de39f23d8be8eed60ac50fc05967ee7", "score": "0.5478377", "text": "func (a *AzureWorkloadSAPHanaRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bf58a975b561659934bc32b85c3130cf", "score": "0.5459349", "text": "func (gbp *GeoBackupPolicy) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor k, v := range m {\n\t\tswitch k {\n\t\tcase \"properties\":\n\t\t\tif v != nil {\n\t\t\t\tvar geoBackupPolicyProperties GeoBackupPolicyProperties\n\t\t\t\terr = json.Unmarshal(*v, &geoBackupPolicyProperties)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.GeoBackupPolicyProperties = &geoBackupPolicyProperties\n\t\t\t}\n\t\tcase \"kind\":\n\t\t\tif v != nil {\n\t\t\t\tvar kind string\n\t\t\t\terr = json.Unmarshal(*v, &kind)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.Kind = &kind\n\t\t\t}\n\t\tcase \"location\":\n\t\t\tif v != nil {\n\t\t\t\tvar location string\n\t\t\t\terr = json.Unmarshal(*v, &location)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.Location = &location\n\t\t\t}\n\t\tcase \"id\":\n\t\t\tif v != nil {\n\t\t\t\tvar ID string\n\t\t\t\terr = json.Unmarshal(*v, &ID)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.ID = &ID\n\t\t\t}\n\t\tcase \"name\":\n\t\t\tif v != nil {\n\t\t\t\tvar name string\n\t\t\t\terr = json.Unmarshal(*v, &name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.Name = &name\n\t\t\t}\n\t\tcase \"type\":\n\t\t\tif v != nil {\n\t\t\t\tvar typeVar string\n\t\t\t\terr = json.Unmarshal(*v, &typeVar)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tgbp.Type = &typeVar\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cb41bca72b5f2c14595462e4a8f067d1", "score": "0.54561746", "text": "func (r *DescribeBackupFilesRequest) FromJsonString(s string) error {\n\tf := make(map[string]interface{})\n\tif err := json.Unmarshal([]byte(s), &f); err != nil {\n\t\treturn err\n\t}\n\tdelete(f, \"InstanceId\")\n\tdelete(f, \"GroupId\")\n\tdelete(f, \"Limit\")\n\tdelete(f, \"Offset\")\n\tdelete(f, \"DatabaseName\")\n\tdelete(f, \"OrderBy\")\n\tif len(f) > 0 {\n\t\treturn tcerr.NewTencentCloudSDKError(\"ClientError.BuildRequestError\", \"DescribeBackupFilesRequest has unknown keys!\", \"\")\n\t}\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "6b3cf17b151d237d21f52cee3f3ee848", "score": "0.5455281", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &r.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6b3cf17b151d237d21f52cee3f3ee848", "score": "0.5455281", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &r.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6b3cf17b151d237d21f52cee3f3ee848", "score": "0.5455281", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &r.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d69e9ea9c0f5ca3174b68426f1a6239c", "score": "0.5446029", "text": "func (j *Request) UnmarshalJSON(input []byte) error {\n\tfs := fflib.NewFFLexer(input)\n\treturn j.UnmarshalJSONFFLexer(fs, fflib.FFParse_map_start)\n}", "title": "" }, { "docid": "1b29d1d167768c6fb75d0db763f87668", "score": "0.5444549", "text": "func (a *ActivatedResourceReference) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &a.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isActive\":\n\t\t\terr = unpopulate(val, \"IsActive\", &a.IsActive)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "51623973a0db765c44fb2a4da681e518", "score": "0.5438296", "text": "func (w *WorkloadItemResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"eTag\":\n\t\t\terr = unpopulate(val, &w.ETag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, &w.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, &w.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, &w.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\tw.Properties, err = unmarshalWorkloadItemClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, &w.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, &w.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7b1f3a53397ce5328c76c49fd6a6beb1", "score": "0.5432276", "text": "func (r *ReservationToReturnForExchange) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"billingInformation\":\n\t\t\terr = unpopulate(val, \"BillingInformation\", &r.BillingInformation)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"billingRefundAmount\":\n\t\t\terr = unpopulate(val, \"BillingRefundAmount\", &r.BillingRefundAmount)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"quantity\":\n\t\t\terr = unpopulate(val, \"Quantity\", &r.Quantity)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"reservationId\":\n\t\t\terr = unpopulate(val, \"ReservationID\", &r.ReservationID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"status\":\n\t\t\terr = unpopulate(val, \"Status\", &r.Status)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8f2b03694d82063f456cd2f7713551de", "score": "0.54301715", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &r.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c0e47f45378487545f2e405801de2dcd", "score": "0.5425721", "text": "func (a *AccountKeyRegenerateRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"serial\":\n\t\t\terr = unpopulate(val, \"Serial\", &a.Serial)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", a, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4349621633a22df735a3624a8e42c635", "score": "0.5424888", "text": "func (a AzureFileShareBackupRequest) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tobjectMap[\"objectType\"] = \"AzureFileShareBackupRequest\"\n\tpopulateTimeRFC3339(objectMap, \"recoveryPointExpiryTimeInUTC\", a.RecoveryPointExpiryTimeInUTC)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "c9099ad28855fd6c8ab6ab57d7cf1350", "score": "0.5423613", "text": "func (this *CheckRequest_QuotaParams) UnmarshalJSON(b []byte) error {\n\treturn MixerUnmarshaler.Unmarshal(bytes.NewReader(b), this)\n}", "title": "" }, { "docid": "49ace41f896c7a918540d2df24d8671f", "score": "0.5422589", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sku\":\n\t\t\terr = unpopulate(val, \"SKU\", &r.SKU)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c1f8219856ac73924f4c1c6e80a89ef9", "score": "0.5418392", "text": "func (r *DeleteBaseBackupResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "319aa71806eb8b88917fbf52e596a6fe", "score": "0.54149896", "text": "func (v *ValidateIaasVMRestoreOperationRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &v.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreRequest\":\n\t\t\tv.RestoreRequest, err = unmarshalRestoreRequestClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8bd5bd6bf67ee26fe73d58e30d25cf7d", "score": "0.5409967", "text": "func (v *ValidateRestoreOperationRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &v.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"restoreRequest\":\n\t\t\tv.RestoreRequest, err = unmarshalRestoreRequestClassification(val)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d0aefabdae2a915a7ca6f982a8940f0a", "score": "0.54073083", "text": "func (a *AzureVMResourceFeatureSupportRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"featureType\":\n\t\t\terr = unpopulate(val, &a.FeatureType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"vmSku\":\n\t\t\terr = unpopulate(val, &a.VMSKU)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"vmSize\":\n\t\t\terr = unpopulate(val, &a.VMSize)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "62b35f03690ff1814f590efc3659d021", "score": "0.5406727", "text": "func (k *KeyRestoreParameters) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"value\":\n\t\t\terr = runtime.DecodeByteArray(string(val), &k.KeyBundleBackup, runtime.Base64URLFormat)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "48a97f4825173db5a8bdee8d90d91fca", "score": "0.5392325", "text": "func (a *AzureWorkloadSQLPointInTimeRestoreRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"alternateDirectoryPaths\":\n\t\t\terr = unpopulate(val, &a.AlternateDirectoryPaths)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isNonRecoverable\":\n\t\t\terr = unpopulate(val, &a.IsNonRecoverable)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"objectType\":\n\t\t\terr = unpopulate(val, &a.ObjectType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"pointInTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, &a.PointInTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"propertyBag\":\n\t\t\terr = unpopulate(val, &a.PropertyBag)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryMode\":\n\t\t\terr = unpopulate(val, &a.RecoveryMode)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"recoveryType\":\n\t\t\terr = unpopulate(val, &a.RecoveryType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"shouldUseAlternateTargetLocation\":\n\t\t\terr = unpopulate(val, &a.ShouldUseAlternateTargetLocation)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetInfo\":\n\t\t\terr = unpopulate(val, &a.TargetInfo)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"targetVirtualMachineId\":\n\t\t\terr = unpopulate(val, &a.TargetVirtualMachineID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "238cbc845dc29df6f85bfc01670af3db", "score": "0.5390627", "text": "func (r *RunRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"agentPoolName\":\n\t\t\terr = unpopulate(val, \"AgentPoolName\", &r.AgentPoolName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"isArchiveEnabled\":\n\t\t\terr = unpopulate(val, \"IsArchiveEnabled\", &r.IsArchiveEnabled)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"logTemplate\":\n\t\t\terr = unpopulate(val, \"LogTemplate\", &r.LogTemplate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "85ee14f96710633e02929b91fa82ad88", "score": "0.5387828", "text": "func (r *DescribeLogBackupsResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "92fd2165d51d4e3d9199c224766e8f96", "score": "0.5386489", "text": "func (x *UpdateUserRequest) UnmarshalJSON(b []byte) error {\n\treturn jsonplugin.DefaultUnmarshalerConfig.Unmarshal(b, x)\n}", "title": "" }, { "docid": "6cc15f96dac5cbf8bdb7b5f42448749b", "score": "0.5385849", "text": "func (a *ScreenshotRequestedReply) UnmarshalJSON(b []byte) error {\n\ttype Copy ScreenshotRequestedReply\n\tc := &Copy{}\n\terr := json.Unmarshal(b, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*a = ScreenshotRequestedReply(*c)\n\treturn nil\n}", "title": "" }, { "docid": "1a20ea48d4044cf62d2ede124f2a8953", "score": "0.5373471", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &r.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &r.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f6df94078cc417efdff0d874e29b4419", "score": "0.53708994", "text": "func (r *Resource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &r.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &r.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &r.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "293846cc2dcbf59423a6a1231b53350c", "score": "0.5364879", "text": "func (rpa *RecoveryPlanAction) UnmarshalJSON(body []byte) error {\n\tvar m map[string]*json.RawMessage\n\terr := json.Unmarshal(body, &m)\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar v *json.RawMessage\n\n\tv = m[\"actionName\"]\n\tif v != nil {\n\t\tvar actionName string\n\t\terr = json.Unmarshal(*m[\"actionName\"], &actionName)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trpa.ActionName = &actionName\n\t}\n\n\tv = m[\"failoverTypes\"]\n\tif v != nil {\n\t\tvar failoverTypes []ReplicationProtectedItemOperation\n\t\terr = json.Unmarshal(*m[\"failoverTypes\"], &failoverTypes)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trpa.FailoverTypes = &failoverTypes\n\t}\n\n\tv = m[\"failoverDirections\"]\n\tif v != nil {\n\t\tvar failoverDirections []PossibleOperationsDirections\n\t\terr = json.Unmarshal(*m[\"failoverDirections\"], &failoverDirections)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trpa.FailoverDirections = &failoverDirections\n\t}\n\n\tv = m[\"customDetails\"]\n\tif v != nil {\n\t\tcustomDetails, err := unmarshalRecoveryPlanActionDetails(*m[\"customDetails\"])\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trpa.CustomDetails = customDetails\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cbf03ac63b8d62fd4744f4ff6b432d77", "score": "0.5358499", "text": "func (r *DescribeBackupFilesResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "84f78d9d3ddb4f08d7179ff3cc5fd2b3", "score": "0.53516597", "text": "func (m *MonitorResource) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", m, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"id\":\n\t\t\terr = unpopulate(val, \"ID\", &m.ID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"identity\":\n\t\t\terr = unpopulate(val, \"Identity\", &m.Identity)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"location\":\n\t\t\terr = unpopulate(val, \"Location\", &m.Location)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"name\":\n\t\t\terr = unpopulate(val, \"Name\", &m.Name)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"properties\":\n\t\t\terr = unpopulate(val, \"Properties\", &m.Properties)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"systemData\":\n\t\t\terr = unpopulate(val, \"SystemData\", &m.SystemData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"tags\":\n\t\t\terr = unpopulate(val, \"Tags\", &m.Tags)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &m.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", m, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9edb50f3196e3ec6754a3fac22d4bfdd", "score": "0.53471684", "text": "func (c *ChangeDirectoryRequest) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"destinationTenantId\":\n\t\t\terr = unpopulate(val, \"DestinationTenantID\", &c.DestinationTenantID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eee3ed56454c12b70004e635b8a1d9f2", "score": "0.5343388", "text": "func (r *CreateBaseBackupResponse) FromJsonString(s string) error {\n\treturn json.Unmarshal([]byte(s), &r)\n}", "title": "" }, { "docid": "fff38c91e6e778dec1ca43c78ec01ffd", "score": "0.534113", "text": "func (a *AzureResourceProtectionIntent) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"backupManagementType\":\n\t\t\terr = unpopulate(val, &a.BackupManagementType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"friendlyName\":\n\t\t\terr = unpopulate(val, &a.FriendlyName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"itemId\":\n\t\t\terr = unpopulate(val, &a.ItemID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"policyId\":\n\t\t\terr = unpopulate(val, &a.PolicyID)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"protectionIntentItemType\":\n\t\t\terr = unpopulate(val, &a.ProtectionIntentItemType)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"protectionState\":\n\t\t\terr = unpopulate(val, &a.ProtectionState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sourceResourceId\":\n\t\t\terr = unpopulate(val, &a.SourceResourceID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c5db4774b925de66bdbf363bff768924", "score": "0.53356457", "text": "func (r *RefundRequestProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"reservationToReturn\":\n\t\t\terr = unpopulate(val, \"ReservationToReturn\", &r.ReservationToReturn)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"returnReason\":\n\t\t\terr = unpopulate(val, \"ReturnReason\", &r.ReturnReason)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"scope\":\n\t\t\terr = unpopulate(val, \"Scope\", &r.Scope)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"sessionId\":\n\t\t\terr = unpopulate(val, \"SessionID\", &r.SessionID)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", r, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8c437522fc2b11931362032aa94af1fb", "score": "0.5329976", "text": "func (i *IaasVMBackupRequest) GetBackupRequest() *BackupRequest {\n\treturn &BackupRequest{\n\t\tObjectType: i.ObjectType,\n\t}\n}", "title": "" } ]
4e7b3556925f83ac8b19bbf35e6bea4b
GetTokenAddressBySymbol is a free data retrieval call binding the contract method 0x3550b6d9. Solidity: function getTokenAddressBySymbol(_symbol string) constant returns(address)
[ { "docid": "44dd56692876850b43b712bd9005e07b", "score": "0.81958175", "text": "func (_TokenRegistry *TokenRegistrySession) GetTokenAddressBySymbol(_symbol string) (common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddressBySymbol(&_TokenRegistry.CallOpts, _symbol)\n}", "title": "" } ]
[ { "docid": "e6f6ec010d2ef92a32facd4521c248ef", "score": "0.8289809", "text": "func (_TokenRegistry *TokenRegistryCaller) GetTokenAddressBySymbol(opts *bind.CallOpts, _symbol string) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _TokenRegistry.contract.Call(opts, out, \"getTokenAddressBySymbol\", _symbol)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "32a32feee51685fcd64b73df1b6f706d", "score": "0.82266665", "text": "func (_TokenRegistry *TokenRegistryCallerSession) GetTokenAddressBySymbol(_symbol string) (common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddressBySymbol(&_TokenRegistry.CallOpts, _symbol)\n}", "title": "" }, { "docid": "2bcdfa7c28305e101049ed1dee60b1b3", "score": "0.7673264", "text": "func (_TokenRegistry *TokenRegistryCaller) GetTokenBySymbol(opts *bind.CallOpts, _symbol string) (common.Address, string, string, uint8, []byte, []byte, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t\tret1 = new(string)\n\t\tret2 = new(string)\n\t\tret3 = new(uint8)\n\t\tret4 = new([]byte)\n\t\tret5 = new([]byte)\n\t)\n\tout := &[]interface{}{\n\t\tret0,\n\t\tret1,\n\t\tret2,\n\t\tret3,\n\t\tret4,\n\t\tret5,\n\t}\n\terr := _TokenRegistry.contract.Call(opts, out, \"getTokenBySymbol\", _symbol)\n\treturn *ret0, *ret1, *ret2, *ret3, *ret4, *ret5, err\n}", "title": "" }, { "docid": "a8e2d02c33d464553b5b5edd3f3bdc35", "score": "0.7408929", "text": "func (_TokenRegistry *TokenRegistrySession) GetTokenBySymbol(_symbol string) (common.Address, string, string, uint8, []byte, []byte, error) {\n\treturn _TokenRegistry.Contract.GetTokenBySymbol(&_TokenRegistry.CallOpts, _symbol)\n}", "title": "" }, { "docid": "1e5d65dd3ea247d3d6ddf00cbeef86c8", "score": "0.73535454", "text": "func (_TokenRegistry *TokenRegistryCallerSession) GetTokenBySymbol(_symbol string) (common.Address, string, string, uint8, []byte, []byte, error) {\n\treturn _TokenRegistry.Contract.GetTokenBySymbol(&_TokenRegistry.CallOpts, _symbol)\n}", "title": "" }, { "docid": "2eed7d9e9715ea5c8d710856c70cb561", "score": "0.7353137", "text": "func (_EthereumBank *EthereumBankSession) GetToken2address(_symbol string) (common.Address, error) {\n\treturn _EthereumBank.Contract.GetToken2address(&_EthereumBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "08ba92eaaa07ce1b5dd264c75ea9b39b", "score": "0.7238177", "text": "func (_EthereumBank *EthereumBankCallerSession) GetToken2address(_symbol string) (common.Address, error) {\n\treturn _EthereumBank.Contract.GetToken2address(&_EthereumBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "bc1fb0222efc56ec320f723c9424a432", "score": "0.6945579", "text": "func (_ReserveContract *ReserveContractCallerSession) ETH_TOKEN_ADDRESS() (common.Address, error) {\n\treturn _ReserveContract.Contract.ETH_TOKEN_ADDRESS(&_ReserveContract.CallOpts)\n}", "title": "" }, { "docid": "4163b3a8fc077cc157ea9a8d3845b3fb", "score": "0.6901595", "text": "func (_EthereumBank *EthereumBankCaller) GetToken2address(opts *bind.CallOpts, _symbol string) (common.Address, error) {\n\tvar out []interface{}\n\terr := _EthereumBank.contract.Call(opts, &out, \"getToken2address\", _symbol)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "9233bdae92ea72ac0f52a4d32c1eb76f", "score": "0.68516606", "text": "func (_BridgeBank *BridgeBankSession) GetToken2address(_symbol string) (common.Address, error) {\n\treturn _BridgeBank.Contract.GetToken2address(&_BridgeBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "2695751a886722508a11ca448d3cb477", "score": "0.6838461", "text": "func (_ReserveContract *ReserveContractSession) ETH_TOKEN_ADDRESS() (common.Address, error) {\n\treturn _ReserveContract.Contract.ETH_TOKEN_ADDRESS(&_ReserveContract.CallOpts)\n}", "title": "" }, { "docid": "31f06640d5afc418227792f668eddd72", "score": "0.6837622", "text": "func (_ReserveContract *ReserveContractCaller) ETH_TOKEN_ADDRESS(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _ReserveContract.contract.Call(opts, out, \"ETH_TOKEN_ADDRESS\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "b3a0d96ca8bce06c5c88438c641047eb", "score": "0.68332267", "text": "func (_BridgeBank *BridgeBankCallerSession) GetToken2address(_symbol string) (common.Address, error) {\n\treturn _BridgeBank.Contract.GetToken2address(&_BridgeBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "8a83dd2e689117e9a0214330cc5be7f5", "score": "0.6718568", "text": "func (_Chain33Bank *Chain33BankSession) GetLockedTokenAddress(_symbol string) (common.Address, error) {\n\treturn _Chain33Bank.Contract.GetLockedTokenAddress(&_Chain33Bank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "24e78116daf99a8818f8c8d6f2f29af3", "score": "0.6714432", "text": "func (_BridgeBank *BridgeBankCaller) GetToken2address(opts *bind.CallOpts, _symbol string) (common.Address, error) {\n\tvar out []interface{}\n\terr := _BridgeBank.contract.Call(opts, &out, \"getToken2address\", _symbol)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7c26c1bb365ab03c3bcd4ef013f9d146", "score": "0.67095673", "text": "func (_BridgeBank *BridgeBankCaller) GetLockedTokenAddress(opts *bind.CallOpts, _symbol string) (common.Address, error) {\n\tvar out []interface{}\n\terr := _BridgeBank.contract.Call(opts, &out, \"getLockedTokenAddress\", _symbol)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "c7580220b9bf14d4b35d3505cfe9cfde", "score": "0.6689924", "text": "func (_Chain33Bank *Chain33BankCaller) GetLockedTokenAddress(opts *bind.CallOpts, _symbol string) (common.Address, error) {\n\tvar out []interface{}\n\terr := _Chain33Bank.contract.Call(opts, &out, \"getLockedTokenAddress\", _symbol)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "a638d79d8a7fb01691f09b570f4a1400", "score": "0.6662426", "text": "func (_Chain33Bank *Chain33BankCallerSession) GetLockedTokenAddress(_symbol string) (common.Address, error) {\n\treturn _Chain33Bank.Contract.GetLockedTokenAddress(&_Chain33Bank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "58df0c2abfa05f57dd46cf5d4a82a42a", "score": "0.6627963", "text": "func (_BridgeBank *BridgeBankSession) GetLockedTokenAddress(_symbol string) (common.Address, error) {\n\treturn _BridgeBank.Contract.GetLockedTokenAddress(&_BridgeBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "f9cc2caf0ca5e860f7b22d7eaf7a0caf", "score": "0.66148096", "text": "func (_BridgeBank *BridgeBankCallerSession) GetLockedTokenAddress(_symbol string) (common.Address, error) {\n\treturn _BridgeBank.Contract.GetLockedTokenAddress(&_BridgeBank.CallOpts, _symbol)\n}", "title": "" }, { "docid": "3996648c80941fdcd69867d003f4a418", "score": "0.6609578", "text": "func (_TobaToken *TobaTokenSession) Symbol() (string, error) {\n\treturn _TobaToken.Contract.Symbol(&_TobaToken.CallOpts)\n}", "title": "" }, { "docid": "3f116f1e9c0ce90913d9486e1a27621b", "score": "0.6578608", "text": "func (c *tokenContractorV0) tokenAddress() common.Address {\n\treturn c.tokenAddr\n}", "title": "" }, { "docid": "c108e0d2f2bd8b8dd9ec0ff912627603", "score": "0.6552434", "text": "func (_TobaToken *TobaTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _TobaToken.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "16f792a978fb4ba755ea9986a919fd13", "score": "0.63997954", "text": "func (_TobaToken *TobaTokenCallerSession) Symbol() (string, error) {\n\treturn _TobaToken.Contract.Symbol(&_TobaToken.CallOpts)\n}", "title": "" }, { "docid": "975e89f173d1730a7b2b7a5dd8fbff13", "score": "0.6334987", "text": "func (s *SymbolTable) GetAddress(symbol string) (int, error) {\n\tif !s.Contains(symbol) {\n\t\treturn 0, fmt.Errorf(\"could not resolve symbol: %s\", symbol)\n\t}\n\treturn s.symbols[symbol], nil\n}", "title": "" }, { "docid": "0780573ec757633317c333c84df14947", "score": "0.62981325", "text": "func (_GovernanceToken *GovernanceTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _GovernanceToken.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "045a50ea01cc1a6d24646434458b99db", "score": "0.62977934", "text": "func (_BridgeToken *BridgeTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _BridgeToken.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "89ff963656f3fd500eb02bda395d34d8", "score": "0.6248137", "text": "func (_Vesting *VestingSession) TOKENADDRESS() (common.Address, error) {\n\treturn _Vesting.Contract.TOKENADDRESS(&_Vesting.CallOpts)\n}", "title": "" }, { "docid": "60162d7bc285ff489d662985f87b1079", "score": "0.6236611", "text": "func (_EthereumBank *EthereumBankSession) Token2address(arg0 [32]byte) (common.Address, error) {\n\treturn _EthereumBank.Contract.Token2address(&_EthereumBank.CallOpts, arg0)\n}", "title": "" }, { "docid": "fe050e3473fe9264d41ac1249364f9a0", "score": "0.62295717", "text": "func (_Token *TokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _Token.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "f21e8b39a998b82891c34b590d883f39", "score": "0.62015957", "text": "func (_BaasIncentives *BaasIncentivesSession) TokenAddress() (common.Address, error) {\n\treturn _BaasIncentives.Contract.TokenAddress(&_BaasIncentives.CallOpts)\n}", "title": "" }, { "docid": "c7b1c04104a7ede8b6d9c37ad7ad6853", "score": "0.6189209", "text": "func (_StableToken *StableTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _StableToken.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "c4dd22be8dfdd07c4b006e4372778a3f", "score": "0.6183726", "text": "func (_TokenRegistry *TokenRegistryCaller) GetTokenAddressByName(opts *bind.CallOpts, _name string) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _TokenRegistry.contract.Call(opts, out, \"getTokenAddressByName\", _name)\n\treturn *ret0, err\n}", "title": "" }, { "docid": "6f64774f4ca7a9a187fc1f60992ad90e", "score": "0.6183419", "text": "func (_TokenRegistry *TokenRegistryCallerSession) GetTokenAddressByName(_name string) (common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddressByName(&_TokenRegistry.CallOpts, _name)\n}", "title": "" }, { "docid": "93e2c95c604dee3cdbd318a5256f71c9", "score": "0.6179422", "text": "func (_SampleERC721MintableToken *SampleERC721MintableTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _SampleERC721MintableToken.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a86af0932bf615c07457f7e3d3b76c82", "score": "0.61635935", "text": "func (_TokenRegistry *TokenRegistrySession) GetTokenAddressByName(_name string) (common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddressByName(&_TokenRegistry.CallOpts, _name)\n}", "title": "" }, { "docid": "607bfe58368ae230eb122009ec3a2365", "score": "0.61474836", "text": "func (_IxoERC20Token *IxoERC20TokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _IxoERC20Token.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "2d382c36296d168a20b588ecdacbacec", "score": "0.61446315", "text": "func (_EthereumBank *EthereumBankCallerSession) Token2address(arg0 [32]byte) (common.Address, error) {\n\treturn _EthereumBank.Contract.Token2address(&_EthereumBank.CallOpts, arg0)\n}", "title": "" }, { "docid": "2f425a3f08e827f3999854d843fe1574", "score": "0.61376935", "text": "func (_BridgeToken *BridgeTokenSession) Symbol() (string, error) {\n\treturn _BridgeToken.Contract.Symbol(&_BridgeToken.CallOpts)\n}", "title": "" }, { "docid": "6398eb67b4a1deb2903330428daac56e", "score": "0.6122874", "text": "func (_Vesting *VestingCallerSession) TOKENADDRESS() (common.Address, error) {\n\treturn _Vesting.Contract.TOKENADDRESS(&_Vesting.CallOpts)\n}", "title": "" }, { "docid": "33b77d1e6b4ef819a8efe05a30fc1c09", "score": "0.60950017", "text": "func (_Vesting *VestingCaller) TOKENADDRESS(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Vesting.contract.Call(opts, out, \"TOKENADDRESS\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "d2cd87e2d86150f73e067b39ddeb5bd3", "score": "0.60852766", "text": "func (_EthereumBank *EthereumBankCaller) Token2address(opts *bind.CallOpts, arg0 [32]byte) (common.Address, error) {\n\tvar out []interface{}\n\terr := _EthereumBank.contract.Call(opts, &out, \"token2address\", arg0)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "e6de53d5a4b66e354de71f2d802e2ed2", "score": "0.6067297", "text": "func (_BaasIncentives *BaasIncentivesCaller) TokenAddress(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _BaasIncentives.contract.Call(opts, out, \"tokenAddress\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "65884af85d7595b63bb22b6b8ea0d898", "score": "0.6044231", "text": "func (_IxoERC20Token *IxoERC20TokenSession) Symbol() (string, error) {\n\treturn _IxoERC20Token.Contract.Symbol(&_IxoERC20Token.CallOpts)\n}", "title": "" }, { "docid": "4c2ce2f55265ecc07344d54831b94fb9", "score": "0.60360014", "text": "func (p *Pair) GetAddress() common.Address {\n\treturn _PairAddressCache.GetAddress(p.TokenAmounts[0].Token.Address, p.TokenAmounts[1].Token.Address)\n}", "title": "" }, { "docid": "42ab0c030bce0322189eb26d472ad9f3", "score": "0.6028811", "text": "func (_BaasIncentives *BaasIncentivesCallerSession) TokenAddress() (common.Address, error) {\n\treturn _BaasIncentives.Contract.TokenAddress(&_BaasIncentives.CallOpts)\n}", "title": "" }, { "docid": "b2b9ce9c2b46d935c938b882ea770bee", "score": "0.60232383", "text": "func (_DIAToken *DIATokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _DIAToken.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "9de6aef9a904be13f60f9e42a5fea448", "score": "0.6018271", "text": "func (_GovernanceToken *GovernanceTokenSession) Symbol() (string, error) {\n\treturn _GovernanceToken.Contract.Symbol(&_GovernanceToken.CallOpts)\n}", "title": "" }, { "docid": "a37972a8ae357c85bccfbeb783f1564c", "score": "0.6015647", "text": "func GetBalanceByTokenAddress(w rest.ResponseWriter, r *rest.Request) {\n\tvar resp *dto.APIResponse\n\tdefer func() {\n\t\tlog.Trace(fmt.Sprintf(\"Restful Api Call ----> GetBalanceByTokenAddress ,err=%s\", resp.ToFormatString()))\n\t\twritejson(w, resp)\n\t}()\n\ttokenAddressStr := r.PathParam(\"tokenaddress\")\n\tvar tokenAddress common.Address\n\tif tokenAddressStr == \"\" {\n\t\ttokenAddress = utils.EmptyAddress\n\t} else {\n\t\ttokenAddress = common.HexToAddress(tokenAddressStr)\n\t}\n\tresult, err := API.GetBalanceByTokenAddress(tokenAddress)\n\tresp = dto.NewAPIResponse(err, result)\n}", "title": "" }, { "docid": "ac5a2545a27efe36b1f87566f654e166", "score": "0.5983259", "text": "func (_StableToken *StableTokenSession) Symbol() (string, error) {\n\treturn _StableToken.Contract.Symbol(&_StableToken.CallOpts)\n}", "title": "" }, { "docid": "2d93f2261a75994292f60f99aabfea94", "score": "0.59687847", "text": "func (_MarketToken *MarketTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _MarketToken.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "76078c26b0b4aaaf5ce4a51de3d664db", "score": "0.59597194", "text": "func (_DJTERC721Implementation *DJTERC721ImplementationCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _DJTERC721Implementation.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "a131dbd40f4d31a1cce0bc423329e963", "score": "0.595406", "text": "func (_TokenRegistry *TokenRegistryCaller) GetTokenAddresses(opts *bind.CallOpts) ([]common.Address, error) {\n\tvar (\n\t\tret0 = new([]common.Address)\n\t)\n\tout := ret0\n\terr := _TokenRegistry.contract.Call(opts, out, \"getTokenAddresses\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "c9cb1ae6a6b4b4bc1174b887583f3870", "score": "0.59531885", "text": "func (_DIAToken *DIATokenSession) Symbol() (string, error) {\n\treturn _DIAToken.Contract.Symbol(&_DIAToken.CallOpts)\n}", "title": "" }, { "docid": "70ef56b81e7b1af2b19e207b084707a5", "score": "0.5950337", "text": "func (_BridgeBank *BridgeBankCaller) Token2address(opts *bind.CallOpts, arg0 [32]byte) (common.Address, error) {\n\tvar out []interface{}\n\terr := _BridgeBank.contract.Call(opts, &out, \"token2address\", arg0)\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "cab5ed157e9abb43a7fdc301ee8a57a6", "score": "0.59286284", "text": "func (p *proxy) Erc20Symbol(token *common.Address) (string, error) {\n\ttk, err := p.Erc20Token(token)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn tk.Symbol, nil\n}", "title": "" }, { "docid": "73289a8f537bea010d76ea0fd6b1103d", "score": "0.59210354", "text": "func (_CBAT *CBATSession) Symbol() (string, error) {\n\treturn _CBAT.Contract.Symbol(&_CBAT.CallOpts)\n}", "title": "" }, { "docid": "7a2476249e1192bde911191c995d7959", "score": "0.591865", "text": "func (_CBAT *CBATCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _CBAT.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "94ec2243b134d8f432e212c1626b99c8", "score": "0.59171444", "text": "func (_SampleERC721MintableToken *SampleERC721MintableTokenSession) Symbol() (string, error) {\n\treturn _SampleERC721MintableToken.Contract.Symbol(&_SampleERC721MintableToken.CallOpts)\n}", "title": "" }, { "docid": "7fff00cd6c5b9752468eb8b31b0277ce", "score": "0.5909311", "text": "func (_TellorMaster *TellorMasterCaller) GetSymbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _TellorMaster.contract.Call(opts, out, \"getSymbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "cb3b1286c3d742839e2e275eb21e4da3", "score": "0.5908461", "text": "func (_GoldToken *GoldTokenCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _GoldToken.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fd14e13f2408eaf07587f0f514f66e3d", "score": "0.5901239", "text": "func (_DJTERC721Implementation *DJTERC721ImplementationSession) Symbol() (string, error) {\n\treturn _DJTERC721Implementation.Contract.Symbol(&_DJTERC721Implementation.CallOpts)\n}", "title": "" }, { "docid": "c1e8e6be3d18d49fe06b9ccceb4c03fd", "score": "0.5864928", "text": "func (_BridgeToken *BridgeTokenCallerSession) Symbol() (string, error) {\n\treturn _BridgeToken.Contract.Symbol(&_BridgeToken.CallOpts)\n}", "title": "" }, { "docid": "eb510cee70e7902c23ffea232fba0e5a", "score": "0.5863479", "text": "func (_IERC721Metadata *IERC721MetadataCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _IERC721Metadata.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "3d12cf93764dab0194462334ba3efbbf", "score": "0.5851232", "text": "func (t *Token) Address() string {\n\treturn address.Uint160ToString(t.Hash)\n}", "title": "" }, { "docid": "0e0123955ee16f0968e93d44cfb6518b", "score": "0.58501834", "text": "func (_ImmutableAPI *ImmutableAPICaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _ImmutableAPI.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "313fd4a733d1b01a6a4162c1aa04bbb0", "score": "0.5848484", "text": "func (_MarketToken *MarketTokenSession) Symbol() (string, error) {\n\treturn _MarketToken.Contract.Symbol(&_MarketToken.CallOpts)\n}", "title": "" }, { "docid": "cf10e57c9f3e0c15651f1ddaa74159bb", "score": "0.58462125", "text": "func (m NoMDEntries) GetSymbol() (f field.SymbolField, err quickfix.MessageRejectError) {\n\terr = m.Get(&f)\n\treturn\n}", "title": "" }, { "docid": "d08c90341917e36f07b2bc1dc6cb2e0f", "score": "0.58313173", "text": "func (_BridgeBank *BridgeBankCallerSession) Token2address(arg0 [32]byte) (common.Address, error) {\n\treturn _BridgeBank.Contract.Token2address(&_BridgeBank.CallOpts, arg0)\n}", "title": "" }, { "docid": "8f331a480b64d3299453a5c681cfc477", "score": "0.5829563", "text": "func (_DJTERC721Implementation *DJTERC721ImplementationCaller) GetToken(opts *bind.CallOpts, _tokenId *big.Int) (struct {\n\tMintedBy common.Address\n\tMintedAt uint64\n}, error) {\n\tret := new(struct {\n\t\tMintedBy common.Address\n\t\tMintedAt uint64\n\t})\n\tout := ret\n\terr := _DJTERC721Implementation.contract.Call(opts, out, \"getToken\", _tokenId)\n\treturn *ret, err\n}", "title": "" }, { "docid": "20c03519cc860b6bfd70b0225d40d924", "score": "0.58152163", "text": "func (_StableToken *StableTokenCallerSession) Symbol() (string, error) {\n\treturn _StableToken.Contract.Symbol(&_StableToken.CallOpts)\n}", "title": "" }, { "docid": "e475c834848f95a4a5302fc18b4555a5", "score": "0.5813806", "text": "func (_TellorMaster *TellorMasterSession) GetSymbol() (string, error) {\n\treturn _TellorMaster.Contract.GetSymbol(&_TellorMaster.CallOpts)\n}", "title": "" }, { "docid": "a690efa52c5c596a4a4704d5f44fd067", "score": "0.58070934", "text": "func (_BridgeBank *BridgeBankSession) Token2address(arg0 [32]byte) (common.Address, error) {\n\treturn _BridgeBank.Contract.Token2address(&_BridgeBank.CallOpts, arg0)\n}", "title": "" }, { "docid": "b6562aad68f4ab044222ae7e0939dae7", "score": "0.58019155", "text": "func (_GoldToken *GoldTokenSession) Symbol() (string, error) {\n\treturn _GoldToken.Contract.Symbol(&_GoldToken.CallOpts)\n}", "title": "" }, { "docid": "59e33dbfe924402f5c293014823f964f", "score": "0.57800436", "text": "func (_TokenRegistry *TokenRegistrySession) GetTokenAddresses() ([]common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddresses(&_TokenRegistry.CallOpts)\n}", "title": "" }, { "docid": "41137771877114aa00d9826b6915a70d", "score": "0.57666546", "text": "func (_GovernanceToken *GovernanceTokenCallerSession) Symbol() (string, error) {\n\treturn _GovernanceToken.Contract.Symbol(&_GovernanceToken.CallOpts)\n}", "title": "" }, { "docid": "8e02c1845cb6d168ba37868b52cd4301", "score": "0.5763075", "text": "func (_DIAToken *DIATokenCallerSession) Symbol() (string, error) {\n\treturn _DIAToken.Contract.Symbol(&_DIAToken.CallOpts)\n}", "title": "" }, { "docid": "fd24f9685e8c22761b49703f87bb5574", "score": "0.5741361", "text": "func (_Eth *EthSession) Symbol() (string, error) {\n\treturn _Eth.Contract.Symbol(&_Eth.CallOpts)\n}", "title": "" }, { "docid": "e67dde327eb20979d3919029d982f920", "score": "0.57395864", "text": "func (self *Fetcher) getTokenFromAddress(addr ethereum.Address) (common.Token, error) {\n\tself.mu.RLock()\n\tvar err error\n\ttoken, ok := self.addressLookup[addr]\n\tself.mu.RUnlock()\n\tif !ok {\n\t\ttoken, err = self.setting.GetTokenByAddress(addr)\n\t\tif err != nil {\n\t\t\treturn token, err\n\t\t}\n\t\tself.mu.Lock()\n\t\t//update in-mem lookup\n\t\tself.addressLookup[addr] = token\n\t\tself.mu.Unlock()\n\t}\n\treturn token, nil\n}", "title": "" }, { "docid": "7d8d31b8672f67733dd0b9f9eeb946af", "score": "0.5738461", "text": "func (_TokenRegistry *TokenRegistryCallerSession) GetTokenAddresses() ([]common.Address, error) {\n\treturn _TokenRegistry.Contract.GetTokenAddresses(&_TokenRegistry.CallOpts)\n}", "title": "" }, { "docid": "bd14efa68edd76dec7398824d8b8360f", "score": "0.5724048", "text": "func (_IERC721Metadata *IERC721MetadataSession) Symbol() (string, error) {\n\treturn _IERC721Metadata.Contract.Symbol(&_IERC721Metadata.CallOpts)\n}", "title": "" }, { "docid": "37b618daa671606bd1dcaa506ea51d32", "score": "0.5723924", "text": "func (_IxoERC20Token *IxoERC20TokenCallerSession) Symbol() (string, error) {\n\treturn _IxoERC20Token.Contract.Symbol(&_IxoERC20Token.CallOpts)\n}", "title": "" }, { "docid": "ea5c9464f43f6d4112c905ef179a0174", "score": "0.5718053", "text": "func (_TellorGetters *TellorGettersCaller) GetSymbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _TellorGetters.contract.Call(opts, out, \"getSymbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "fb8b274f3bf8629563d1b79db2a5bf9e", "score": "0.57158804", "text": "func (_Eth *EthCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _Eth.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "55ce8924f518c40df9079cc204e3b8b3", "score": "0.5715423", "text": "func (_PMintysale *PMintysaleCaller) Token(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _PMintysale.contract.Call(opts, &out, \"token\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "666955352c76d519a975074d7833329a", "score": "0.5715304", "text": "func (_Swap *SwapCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _Swap.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "39726de16f211d31617e3ce2573bab54", "score": "0.5714054", "text": "func (_Epk *EpkCaller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar out []interface{}\n\terr := _Epk.contract.Call(opts, &out, \"symbol\")\n\n\tif err != nil {\n\t\treturn *new(string), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(string)).(*string)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "7fb6400f1a7c2a65ddcf3ba8bd09c290", "score": "0.5702945", "text": "func GetTokenByName(client Client, name string) (types.Address, error) {\n\tif strings.ToLower(name) == \"bcb\" {\n\t\tt := GetGenesisToken(client)\n\t\treturn t.Address, nil\n\t}\n\tb := client.Query(std.KeyOfTokenWithName(name))\n\tif b == nil {\n\t\treturn \"\", errors.New(\"Query token failed,key:\" + std.KeyOfTokenWithName(name))\n\t}\n\n\tvar tokenAddr types.Address\n\terr := jsoniter.Unmarshal(b, &tokenAddr)\n\treturn tokenAddr, err\n}", "title": "" }, { "docid": "6243e6549b764d2c4a896a47d44fe020", "score": "0.570136", "text": "func (_TellorMaster *TellorMasterCallerSession) GetSymbol() (string, error) {\n\treturn _TellorMaster.Contract.GetSymbol(&_TellorMaster.CallOpts)\n}", "title": "" }, { "docid": "1a43daa54ccd257369f5a3d65bd78735", "score": "0.5686128", "text": "func (_CBAT *CBATCallerSession) Symbol() (string, error) {\n\treturn _CBAT.Contract.Symbol(&_CBAT.CallOpts)\n}", "title": "" }, { "docid": "499a6845cc0a5622728bac4b3e7785c1", "score": "0.5666704", "text": "func (_MarketToken *MarketTokenCallerSession) Symbol() (string, error) {\n\treturn _MarketToken.Contract.Symbol(&_MarketToken.CallOpts)\n}", "title": "" }, { "docid": "259e3a97161df197603a3428b6d55373", "score": "0.5658445", "text": "func (m Message) GetSymbol(f *field.SymbolField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "259e3a97161df197603a3428b6d55373", "score": "0.5658445", "text": "func (m Message) GetSymbol(f *field.SymbolField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "259e3a97161df197603a3428b6d55373", "score": "0.5658445", "text": "func (m Message) GetSymbol(f *field.SymbolField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "259e3a97161df197603a3428b6d55373", "score": "0.5658445", "text": "func (m Message) GetSymbol(f *field.SymbolField) quickfix.MessageRejectError {\n\treturn m.Body.Get(f)\n}", "title": "" }, { "docid": "616c04a66bda1848161aae359addfdad", "score": "0.56513137", "text": "func (_TellorGetters *TellorGettersSession) GetSymbol() (string, error) {\n\treturn _TellorGetters.Contract.GetSymbol(&_TellorGetters.CallOpts)\n}", "title": "" }, { "docid": "65a5fafd2b140b199cfb199a38250bb0", "score": "0.564526", "text": "func (_DJTERC721Implementation *DJTERC721ImplementationCallerSession) Symbol() (string, error) {\n\treturn _DJTERC721Implementation.Contract.Symbol(&_DJTERC721Implementation.CallOpts)\n}", "title": "" }, { "docid": "9473d215f410bbc7e1bf26aaf231b2d9", "score": "0.5643046", "text": "func (_TestERC20 *TestERC20Session) Symbol() (string, error) {\n\treturn _TestERC20.Contract.Symbol(&_TestERC20.CallOpts)\n}", "title": "" }, { "docid": "5edc2e0ea52e216b587d75d63d2adaaa", "score": "0.56420016", "text": "func (b *clientBackend) Symbol() string {\n\treturn api.TokenSymbol\n}", "title": "" }, { "docid": "82ecfb014a0008f3bf5e03ad72c20623", "score": "0.56385195", "text": "func (_TestERC20 *TestERC20Caller) Symbol(opts *bind.CallOpts) (string, error) {\n\tvar (\n\t\tret0 = new(string)\n\t)\n\tout := ret0\n\terr := _TestERC20.contract.Call(opts, out, \"symbol\")\n\treturn *ret0, err\n}", "title": "" } ]
751130d0f8a47111942d3c43c9a37e72
WithReturnRecords adds the returnRecords to the network ip bgp peer groups get params
[ { "docid": "2ae1d84ef5c2f67f7e9b0ef59c326da7", "score": "0.7366041", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithReturnRecords(returnRecords *bool) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" } ]
[ { "docid": "6e4c731234c0e7295b04f173d2592d34", "score": "0.6926581", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "fa7c918ba9ad3e43e769501ef103f6e8", "score": "0.5986396", "text": "func (o *NfsClientsMapGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "a3366c731c51846c88c14298cfaf1391", "score": "0.5922816", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithReturnTimeout(returnTimeout *int64) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetReturnTimeout(returnTimeout)\n\treturn o\n}", "title": "" }, { "docid": "75f9d63d2ccdef61018645f45ecacafd", "score": "0.5918224", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithMaxRecords(maxRecords *int64) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetMaxRecords(maxRecords)\n\treturn o\n}", "title": "" }, { "docid": "f4ae0f4a4df23cb8bd5c6cf80192f0c8", "score": "0.58146405", "text": "func (o *StoragePoolCreateParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "15ea5d529087757499af0b734cbdfd87", "score": "0.5785188", "text": "func (o *NvmeSubsystemCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "e31c2fa9ec5ad37cf2bff4edd61c09fa", "score": "0.5753205", "text": "func (o *StoragePoolCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "5fa40f2cc3c0dcebbe64c1074d1df3fc", "score": "0.56881", "text": "func (o *FileMoveCreateParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "a23b03930e80bb4f1d54ad65c0a3b4be", "score": "0.5680601", "text": "func (o *MetroclusterOperationCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "1f64a985995ab0573a1b4c49205636db", "score": "0.56799036", "text": "func (o *DiskCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "f17e405781c4399bfcf477eacc7a4f3d", "score": "0.5660321", "text": "func (o *VolumeMetricsCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "550fab1b30e61f3cdef9ccd7c4c12796", "score": "0.5643313", "text": "func (o *VolumeCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "9a1df0ab605227502c4a6e9c27493b64", "score": "0.56251717", "text": "func (o *NdmpNodeSessionsCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "ad08475b6cc9147cc2932910bb313396", "score": "0.5608751", "text": "func (o *ExportRuleCollectionGetParams) WithReturnRecords(returnRecords *bool) *ExportRuleCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "ac47867cd693d767c5417e4262406427", "score": "0.558466", "text": "func (o *FirmwareHistoryCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "c3c1e086e5edb3ad257e42c32683996e", "score": "0.55846494", "text": "func (o *ChassisCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "5eec65c54975fe4d3de60f2df111f819", "score": "0.5522051", "text": "func (o *ExportRuleCollectionGetParams) SetReturnRecords(returnRecords *bool) {\n\to.ReturnRecords = returnRecords\n}", "title": "" }, { "docid": "acb78b5a1a225fa84acc89587228f047", "score": "0.5512681", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) SetReturnTimeout(returnTimeout *int64) {\n\to.ReturnTimeout = returnTimeout\n}", "title": "" }, { "docid": "71b2fe7fe32eac378ad1c2578a473b08", "score": "0.5352818", "text": "func (o *DiskCollectionGetParams) WithReturnRecords(returnRecords *bool) *DiskCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "6096d2e5bc59207b2a8cbcb3bff51d09", "score": "0.5350248", "text": "func (o *NfsClientsMapGetParams) WithReturnRecords(returnRecords *bool) *NfsClientsMapGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "b18bc5faf24f21e37fb383e91e6ec13c", "score": "0.52688205", "text": "func (o *VolumeMetricsCollectionGetParams) WithReturnRecords(returnRecords *bool) *VolumeMetricsCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "2052a9deef6cc0d8cd1e82ec0e0da659", "score": "0.5254037", "text": "func (o *FileMoveCreateParams) WithReturnRecords(returnRecords *bool) *FileMoveCreateParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "d260e9eb28f3e6214d7daf7e09c05b61", "score": "0.524125", "text": "func (o *VolumeCollectionGetParams) WithReturnRecords(returnRecords *bool) *VolumeCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "90306cf8f7c3fc68aa29cfece8926c72", "score": "0.5181951", "text": "func (o *StoragePoolCollectionGetParams) WithReturnRecords(returnRecords *bool) *StoragePoolCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "a7f00d6af20a93cf9d2b1016f4290c2f", "score": "0.5152259", "text": "func (o *StoragePoolCreateParams) WithReturnRecords(returnRecords *bool) *StoragePoolCreateParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "e9d885e1e078bfbd93311973f2d97769", "score": "0.5118052", "text": "func (o *ChassisCollectionGetParams) WithReturnRecords(returnRecords *bool) *ChassisCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "00d196d15e52238347cf1152f323e8f3", "score": "0.5072304", "text": "func (o *NdmpNodeSessionsCollectionGetParams) WithReturnRecords(returnRecords *bool) *NdmpNodeSessionsCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "3987ffeedba1fb0506713b644b2a954b", "score": "0.50463074", "text": "func (o *FirmwareHistoryCollectionGetParams) WithReturnRecords(returnRecords *bool) *FirmwareHistoryCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "00d705d7bba7fec8c512823ecbec8f46", "score": "0.49901968", "text": "func (o *MetroclusterOperationCollectionGetParams) WithReturnRecords(returnRecords *bool) *MetroclusterOperationCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "e2a76aa419f21b1380979b434318f433", "score": "0.49714628", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) SetMaxRecords(maxRecords *int64) {\n\to.MaxRecords = maxRecords\n}", "title": "" }, { "docid": "4daf5096e7426b634b5cf2fe3187b5aa", "score": "0.492409", "text": "func GetUserRecords(APIstub shim.ChaincodeStubInterface, args []string, currentUser user.User) sc.Response {\n\trecords := []PopulatedRecord{}\n\tfor i := 0; i < len(currentUser.RecordIDs); i++ {\n\t\trecordAsResponse := GetKYCRecordDetails(APIstub, []string{currentUser.RecordIDs[i]})\n\t\trecord := PopulatedRecord{}\n\t\terr := json.Unmarshal(recordAsResponse.GetPayload(), &record)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\trecords = append(records, record)\n\t}\n\trecordsAsBytes, err := json.Marshal(records)\n\treturn eh.SystemError(err, recordsAsBytes)\n}", "title": "" }, { "docid": "a0ebcbf032e60777f0ce489f537953b4", "score": "0.47491074", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) SetDefaults() {\n\tvar (\n\t\treturnRecordsDefault = bool(true)\n\n\t\treturnTimeoutDefault = int64(15)\n\t)\n\n\tval := NetworkIPBgpPeerGroupsGetParams{\n\t\tReturnRecords: &returnRecordsDefault,\n\t\tReturnTimeout: &returnTimeoutDefault,\n\t}\n\n\tval.timeout = o.timeout\n\tval.Context = o.Context\n\tval.HTTPClient = o.HTTPClient\n\t*o = val\n}", "title": "" }, { "docid": "da2b31c05b7aa880f22f097298e7da48", "score": "0.4745341", "text": "func (s *Server) GetRecords(ctx context.Context, req *feedback.GetRequest,\n\trsp *feedback.RecordsResponse) error {\n\trows, err := db.Query(`SELECT id, title, content, img, status FROM feedback \n\tWHERE uid = ? ORDER BY id DESC LIMIT ?, ?`, req.Uid,\n\t\treq.Seq, req.Num)\n\tif err != nil {\n\t\tlog.Printf(\"GetRecords query failed:%v\", err)\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\tvar infos []*feedback.Info\n\tfor rows.Next() {\n\t\tvar info feedback.Info\n\t\terr = rows.Scan(&info.Id, &info.Title, &info.Content,\n\t\t\t&info.Img, &info.Status)\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tinfos = append(infos, &info)\n\t}\n\trsp.Infos = infos\n\treturn nil\n}", "title": "" }, { "docid": "65b39f6ec1ab1ff3f7ba4e51f073519d", "score": "0.47217113", "text": "func (o *NvmeSubsystemCollectionGetParams) WithReturnRecords(returnRecords *bool) *NvmeSubsystemCollectionGetParams {\n\to.SetReturnRecords(returnRecords)\n\treturn o\n}", "title": "" }, { "docid": "515aa5f4e42355d4b00d3ec036d0a102", "score": "0.47100386", "text": "func (_class GPUGroupClass) GetAllRecords(sessionID SessionRef) (_retval map[GPUGroupRef]GPUGroupRecord, _err error) {\n\tif IsMock {\n\t\treturn _class.GetAllRecordsMock(sessionID)\n\t}\t\n\t_method := \"GPU_group.get_all_records\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertGPUGroupRefToGPUGroupRecordMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "7d1ab1dc3147cb0e2fa7a7954b3396ec", "score": "0.4659601", "text": "func (c *DeviceController) GetRecords(w http.ResponseWriter, r *http.Request) {\n\tvars := mux.Vars(r)\n\tres := r53.GetRecordSets(vars[\"id\"])\n\tc.SendJSON(\n\t\tw,\n\t\tr,\n\t\tres,\n\t\thttp.StatusOK,\n\t)\n}", "title": "" }, { "docid": "4f2a41411b94ef428379b4615ce9d0ea", "score": "0.4620303", "text": "func getRecords(roundFrom int, roundTo int, year int, kind string) Records {\n\tvar records Records\n\n\trecords.Score = determineRecord(roundFrom, roundTo, year, kind, \"rs_score\")\n\trecords.Kicks = determineRecord(roundFrom, roundTo, year, kind, \"rs_kicks\")\n\trecords.Handballs = determineRecord(roundFrom, roundTo, year, kind, \"rs_handballs\")\n\trecords.Marks = determineRecord(roundFrom, roundTo, year, kind, \"rs_marks\")\n\trecords.Hitouts = determineRecord(roundFrom, roundTo, year, kind, \"rs_hitouts\")\n\trecords.Tackles = determineRecord(roundFrom, roundTo, year, kind, \"rs_tackles\")\n\trecords.DisposalEfficiency = determineRecordFloat(roundFrom, roundTo, year, kind, \"rs_disposal_efficiency\")\n\trecords.ContestedPosessions = determineRecord(roundFrom, roundTo, year, kind, \"rs_contested_posessions\")\n\trecords.Rebounds = determineRecord(roundFrom, roundTo, year, kind, \"rs_rebound_50s\")\n\trecords.Clearances = determineRecord(roundFrom, roundTo, year, kind, \"rs_clearances\")\n\trecords.Spoils = determineRecord(roundFrom, roundTo, year, kind, \"rs_spoils\")\n\n\treturn records\n}", "title": "" }, { "docid": "3c41fc5f6da63f15ac39a2f3e9d16873", "score": "0.4614647", "text": "func (client *providerClient) GetZoneRecords(domain string) (models.Records, error) {\n\trecords, err := client.getZoneRecordsAll(domain)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Convert them to DNScontrol's native format:\n\n\texistingRecords := []*models.RecordConfig{}\n\n\t// Option 1: One long list. If your provider returns one long list,\n\t// convert each one to RecordType like this:\n\t// for _, rr := range records {\n\t// \texistingRecords = append(existingRecords, nativeToRecord(rr, domain))\n\t//}\n\n\t// Option 2: Grouped records. Sometimes the provider returns one item per\n\t// label. Each item contains a list of all the records at that label.\n\t// You'll need to split them out into one RecordConfig for each record. An\n\t// example of this is the ROUTE53 provider.\n\t// for _, rg := range records {\n\t// \tfor _, rr := range rg {\n\t// \t\texistingRecords = append(existingRecords, nativeToRecords(rg, rr, domain)...)\n\t// \t}\n\t// }\n\n\t// Option 3: Something else. In this case, we get a big massive structure\n\t// which needs to be broken up. Still, we're generating a list of\n\t// RecordConfig structures.\n\tdefaultTTL := records.Soa.TTL\n\tfor _, rr := range records.A {\n\t\texistingRecords = append(existingRecords, nativeToRecordA(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Cname {\n\t\texistingRecords = append(existingRecords, nativeToRecordCNAME(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Aaaa {\n\t\texistingRecords = append(existingRecords, nativeToRecordAAAA(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Txt {\n\t\texistingRecords = append(existingRecords, nativeToRecordTXT(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Mx {\n\t\texistingRecords = append(existingRecords, nativeToRecordMX(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Ns {\n\t\texistingRecords = append(existingRecords, nativeToRecordNS(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Srv {\n\t\texistingRecords = append(existingRecords, nativeToRecordSRV(rr, domain, defaultTTL))\n\t}\n\tfor _, rr := range records.Caa {\n\t\texistingRecords = append(existingRecords, nativeToRecordCAA(rr, domain, defaultTTL))\n\t}\n\n\treturn existingRecords, nil\n}", "title": "" }, { "docid": "fda067c17f4145840c5356aec9f0b544", "score": "0.4604952", "text": "func groupRecords(records []libdns.Record) map[string]googleDNSRecord {\n\tgdrs := make(map[string]googleDNSRecord)\n\tfor _, record := range records {\n\t\tif gdr, ok := gdrs[record.Name]; !ok {\n\t\t\tgdrs[record.Name] = googleDNSRecord{\n\t\t\t\trecordType: record.Type,\n\t\t\t\tvalues: []libdns.Record{record},\n\t\t\t}\n\t\t} else {\n\t\t\tgdr.values = append(gdr.values, record)\n\t\t\tgdrs[record.Name] = gdr\n\t\t}\n\t}\n\treturn gdrs\n}", "title": "" }, { "docid": "14bd0ed889780f7e231f16465d8a96af", "score": "0.45982307", "text": "func (i IGMPv3Report) GroupAddressRecords() IGMPv3ReportGroupAddressRecordIterator {\n\treturn IGMPv3ReportGroupAddressRecordIterator{\n\t\trecordsLeft: binary.BigEndian.Uint16(i[igmpv3ReportNumberOfGroupAddressRecordsOffset:]),\n\t\tbuf: bytes.NewBuffer(i[igmpv3ReportGroupAddressRecordsOffset:]),\n\t}\n}", "title": "" }, { "docid": "584ecceab108b318d5f64908f3268748", "score": "0.4579892", "text": "func (p *Provider) AppendRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\treturn p.applyRecords(ctx, zone, records, false)\n}", "title": "" }, { "docid": "b80be3592d22564a5e2abc8710128c54", "score": "0.45586798", "text": "func (function *FunctionDescriptor) AddReturn(retn *AttributeDescriptor) {\r\n\tfunction.Returns = append(function.Returns, retn)\r\n}", "title": "" }, { "docid": "9946fb3f8fbfa9f3e9873632079abb5f", "score": "0.45126057", "text": "func (im *InMemoryProvider) Records(zone string) ([]endpoint.Endpoint, error) {\n\tif _, exists := im.zones[zone]; !exists {\n\t\treturn nil, ErrZoneNotFound\n\t}\n\treturn im.endpoints(zone), nil\n}", "title": "" }, { "docid": "e18e7fbf0fee490ee5fd828ed5d27860", "score": "0.44557828", "text": "func (d *dynProviderState) Records(ctx context.Context) ([]*endpoint.Endpoint, error) {\n\tclient, err := d.login()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer client.Logout()\n\n\tlog.Debugf(\"Using DynAPI@%s\", d.DynVersion)\n\n\tvar result []*endpoint.Endpoint\n\n\tzones := d.zones(client)\n\tlog.Infof(\"Configured zones: %+v\", zones)\n\tfor _, zone := range zones {\n\t\tserial, err := d.fetchZoneSerial(client, zone)\n\t\tif err != nil {\n\t\t\tif strings.Contains(err.Error(), \"404 Not Found\") {\n\t\t\t\tlog.Infof(\"Ignore zone %s as it does not exist\", zone)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\treturn nil, err\n\t\t}\n\n\t\trelevantRecords := d.ZoneSnapshot.GetRecordsForSerial(zone, serial)\n\t\tif relevantRecords != nil {\n\t\t\tlog.Infof(\"Using %d cached records for zone %s@%d\", len(relevantRecords), zone, serial)\n\t\t\tresult = append(result, relevantRecords...)\n\t\t\tcontinue\n\t\t}\n\n\t\t// Fetch All Records\n\t\trecords, err := d.fetchAllRecordsInZone(zone)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\trelevantRecords = d.allRecordsToEndpoints(records)\n\n\t\tlog.Debugf(\"Relevant records %+v\", relevantRecords)\n\n\t\td.ZoneSnapshot.StoreRecordsForSerial(zone, serial, relevantRecords)\n\t\tlog.Infof(\"Stored %d records for %s@%d\", len(relevantRecords), zone, serial)\n\t\tresult = append(result, relevantRecords...)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "6522f7936b706c3a172ecfcdc41d1b03", "score": "0.44460952", "text": "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\trecords, err := p.getRecords(ctx, zone)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn records, nil\n}", "title": "" }, { "docid": "15d8bc9aeb07163c645abde360554a84", "score": "0.44280866", "text": "func (p *BluecatProvider) Records(ctx context.Context) (endpoints []*endpoint.Endpoint, err error) {\n\tzones, err := p.zones()\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"could not fetch zones\")\n\t}\n\n\t// Parsing Text records first, so we can get the owner from them.\n\tfor _, zone := range zones {\n\t\tlog.Debugf(\"fetching records from zone '%s'\", zone)\n\n\t\tvar resT []api.BluecatTXTRecord\n\t\terr = p.gatewayClient.GetTXTRecords(zone, &resT)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"could not fetch TXT records for zone: %v\", zone)\n\t\t}\n\t\tfor _, rec := range resT {\n\t\t\ttempEndpoint := endpoint.NewEndpoint(rec.Name, endpoint.RecordTypeTXT, rec.Properties)\n\t\t\ttempEndpoint.Labels[endpoint.OwnerLabelKey], err = extractOwnerfromTXTRecord(rec.Properties)\n\t\t\tif err != nil {\n\t\t\t\tlog.Debugf(\"External DNS Owner %s\", err)\n\t\t\t}\n\t\t\tendpoints = append(endpoints, tempEndpoint)\n\t\t}\n\n\t\tvar resH []api.BluecatHostRecord\n\t\terr = p.gatewayClient.GetHostRecords(zone, &resH)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"could not fetch host records for zone: %v\", zone)\n\t\t}\n\t\tvar ep *endpoint.Endpoint\n\t\tfor _, rec := range resH {\n\t\t\tpropMap := api.SplitProperties(rec.Properties)\n\t\t\tips := strings.Split(propMap[\"addresses\"], \",\")\n\t\t\tfor _, ip := range ips {\n\t\t\t\tif _, ok := propMap[\"ttl\"]; ok {\n\t\t\t\t\tttl, err := strconv.Atoi(propMap[\"ttl\"])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, errors.Wrapf(err, \"could not parse ttl '%d' as int for host record %v\", ttl, rec.Name)\n\t\t\t\t\t}\n\t\t\t\t\tep = endpoint.NewEndpointWithTTL(propMap[\"absoluteName\"], endpoint.RecordTypeA, endpoint.TTL(ttl), ip)\n\t\t\t\t} else {\n\t\t\t\t\tep = endpoint.NewEndpoint(propMap[\"absoluteName\"], endpoint.RecordTypeA, ip)\n\t\t\t\t}\n\t\t\t\tfor _, txtRec := range resT {\n\t\t\t\t\tif strings.Compare(p.TxtPrefix+rec.Name+p.TxtSuffix, txtRec.Name) == 0 {\n\t\t\t\t\t\tep.Labels[endpoint.OwnerLabelKey], err = extractOwnerfromTXTRecord(txtRec.Properties)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlog.Debugf(\"External DNS Owner %s\", err)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tendpoints = append(endpoints, ep)\n\t\t\t}\n\t\t}\n\n\t\tvar resC []api.BluecatCNAMERecord\n\t\terr = p.gatewayClient.GetCNAMERecords(zone, &resC)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"could not fetch CNAME records for zone: %v\", zone)\n\t\t}\n\n\t\tfor _, rec := range resC {\n\t\t\tpropMap := api.SplitProperties(rec.Properties)\n\t\t\tif _, ok := propMap[\"ttl\"]; ok {\n\t\t\t\tttl, err := strconv.Atoi(propMap[\"ttl\"])\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, errors.Wrapf(err, \"could not parse ttl '%d' as int for CNAME record %v\", ttl, rec.Name)\n\t\t\t\t}\n\t\t\t\tep = endpoint.NewEndpointWithTTL(propMap[\"absoluteName\"], endpoint.RecordTypeCNAME, endpoint.TTL(ttl), propMap[\"linkedRecordName\"])\n\t\t\t} else {\n\t\t\t\tep = endpoint.NewEndpoint(propMap[\"absoluteName\"], endpoint.RecordTypeCNAME, propMap[\"linkedRecordName\"])\n\t\t\t}\n\t\t\tfor _, txtRec := range resT {\n\t\t\t\tif strings.Compare(p.TxtPrefix+rec.Name+p.TxtSuffix, txtRec.Name) == 0 {\n\t\t\t\t\tep.Labels[endpoint.OwnerLabelKey], err = extractOwnerfromTXTRecord(txtRec.Properties)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Debugf(\"External DNS Owner %s\", err)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tendpoints = append(endpoints, ep)\n\t\t}\n\t}\n\n\tlog.Debugf(\"fetched %d records from Bluecat\", len(endpoints))\n\treturn endpoints, nil\n}", "title": "" }, { "docid": "65d98d439213a75665ff7e7ae52dfc8d", "score": "0.44261688", "text": "func (c *Client) GetRecords(zoneID string, options *RecordsListOptions) (*ListResp, error) {\n\t// Get Records (GET https://dns.hetzner.com/api/v1/records?zone_id=1)\n\tlimit := 100\n\tpage := 1\n\tif options != nil {\n\t\tlimit = options.ItemsPerPage\n\t\tpage = options.Page\n\t}\n\n\t// Create request\n\treq, err := http.NewRequest(\"GET\", fmt.Sprintf(\"%s/records?zone_id=%s&per_page=%d&page=%d\", c.baseURL, zoneID, limit, page), nil)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres := ListResp{}\n\tif err := c.sendRequest(req, &res); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &res, nil\n}", "title": "" }, { "docid": "b6f5b96a661ab6929b70fbc487a11ffa", "score": "0.44239643", "text": "func GetGPRecords() ([]GPRecord) {\n\treturn records\n}", "title": "" }, { "docid": "6ca7a5898efbe543a0862f2856835718", "score": "0.43900663", "text": "func GetAllRecords(APIstub shim.ChaincodeStubInterface, args []string, currentUserOrg org.Organization) sc.Response {\n\trecords := []PopulatedRecord{}\n\tfor i := 0; i < len(currentUserOrg.RecordIDs); i++ {\n\t\trecordAsResponse := GetKYCRecordDetails(APIstub, []string{currentUserOrg.RecordIDs[i]})\n\t\trecord := PopulatedRecord{}\n\t\terr := json.Unmarshal(recordAsResponse.GetPayload(), &record)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\n\t\trecords = append(records, record)\n\t}\n\trecordsAsBytes, err := json.Marshal(records)\n\treturn eh.SystemError(err, recordsAsBytes)\n}", "title": "" }, { "docid": "e0f8ddb1a73fc8f534879b0ff7fe7582", "score": "0.43740222", "text": "func (dnsSvcs *DnsSvcsV1) ListResourceRecordsWithContext(ctx context.Context, listResourceRecordsOptions *ListResourceRecordsOptions) (result *ListResourceRecords, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(listResourceRecordsOptions, \"listResourceRecordsOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(listResourceRecordsOptions, \"listResourceRecordsOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpathParamsMap := map[string]string{\n\t\t\"instance_id\": *listResourceRecordsOptions.InstanceID,\n\t\t\"dnszone_id\": *listResourceRecordsOptions.DnszoneID,\n\t}\n\n\tbuilder := core.NewRequestBuilder(core.GET)\n\tbuilder = builder.WithContext(ctx)\n\tbuilder.EnableGzipCompression = dnsSvcs.GetEnableGzipCompression()\n\t_, err = builder.ResolveRequestURL(dnsSvcs.Service.Options.URL, `/instances/{instance_id}/dnszones/{dnszone_id}/resource_records`, pathParamsMap)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range listResourceRecordsOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"dns_svcs\", \"V1\", \"ListResourceRecords\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\tif listResourceRecordsOptions.XCorrelationID != nil {\n\t\tbuilder.AddHeader(\"X-Correlation-ID\", fmt.Sprint(*listResourceRecordsOptions.XCorrelationID))\n\t}\n\n\tif listResourceRecordsOptions.Offset != nil {\n\t\tbuilder.AddQuery(\"offset\", fmt.Sprint(*listResourceRecordsOptions.Offset))\n\t}\n\tif listResourceRecordsOptions.Limit != nil {\n\t\tbuilder.AddQuery(\"limit\", fmt.Sprint(*listResourceRecordsOptions.Limit))\n\t}\n\tif listResourceRecordsOptions.Type != nil {\n\t\tbuilder.AddQuery(\"type\", fmt.Sprint(*listResourceRecordsOptions.Type))\n\t}\n\tif listResourceRecordsOptions.Name != nil {\n\t\tbuilder.AddQuery(\"name\", fmt.Sprint(*listResourceRecordsOptions.Name))\n\t}\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = dnsSvcs.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\tif rawResponse != nil {\n\t\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalListResourceRecords)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tresponse.Result = result\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "471a86bf6b7e1f9ad0ed652058d1710e", "score": "0.4368896", "text": "func (c Client) GetRecords(ctx context.Context, zoneID string, params *GetRecordsParameters) (*GetRecordsResponse, error) {\n\tendpoint := c.baseURL.JoinPath(\"zones\", zoneID, \"dnsrecords\")\n\n\tv, err := querystring.Values(params)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tendpoint.RawQuery = v.Encode()\n\n\treq, err := newJSONRequest(ctx, http.MethodGet, endpoint, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := &GetRecordsResponse{}\n\terr = c.do(req, response)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "aadf0979c93de7212b0519fe06c70bb8", "score": "0.43643808", "text": "func (c *Client) GetRecords(ctx context.Context, quote string, base string, interval string, startTime int64, endTime int64, limit int64) ([]model.Record, error) {\n\tv := url.Values{}\n\tv.Set(\"symbol\", strings.ToUpper(quote)+strings.ToUpper(base))\n\tv.Set(\"interval\", interval)\n\n\tif startTime != 0 {\n\t\tv.Set(\"startTime\", strconv.FormatInt(startTime, 10))\n\t}\n\n\tif endTime != 0 {\n\t\tv.Set(\"startTime\", strconv.FormatInt(endTime, 10))\n\t}\n\n\tif limit != 0 {\n\t\tv.Set(\"limit\", strconv.FormatInt(limit, 10))\n\t}\n\n\treq, err := c.newRequest(ctx, \"GET\", \"klines\", v, nil, ApiV1)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := c.getResponse(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlog.Debugf(\"Response body: %v\", string(body))\n\n\tvar record model.Record\n\tvar records []model.Record\n\n\tgjson.ParseBytes(body).ForEach(func(key, value gjson.Result) bool {\n\t\trecord.Open = cast.ToFloat64(value.Array()[1].String())\n\t\trecord.High = cast.ToFloat64(value.Array()[2].String())\n\t\trecord.Low = cast.ToFloat64(value.Array()[3].String())\n\t\trecord.Close = cast.ToFloat64(value.Array()[4].String())\n\t\trecord.Vol = cast.ToFloat64(value.Array()[5].String())\n\t\trecord.Time = cast.ToTime(value.Array()[0].Int() / 1000)\n\t\trecord.Raw = value.String()\n\t\trecords = append(records, record)\n\t\treturn true // keep iterating\n\t})\n\treturn records, nil\n}", "title": "" }, { "docid": "32a12551de88b30c7195879530a5ab9a", "score": "0.4363569", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WriteToRequest(r runtime.ClientRequest, reg strfmt.Registry) error {\n\n\tif err := r.SetTimeout(o.timeout); err != nil {\n\t\treturn err\n\t}\n\tvar res []error\n\n\tif o.Fields != nil {\n\n\t\t// binding items for fields\n\t\tjoinedFields := o.bindParamFields(reg)\n\n\t\t// query array param fields\n\t\tif err := r.SetQueryParam(\"fields\", joinedFields...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.IpspaceName != nil {\n\n\t\t// query param ipspace.name\n\t\tvar qrIpspaceName string\n\n\t\tif o.IpspaceName != nil {\n\t\t\tqrIpspaceName = *o.IpspaceName\n\t\t}\n\t\tqIpspaceName := qrIpspaceName\n\t\tif qIpspaceName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"ipspace.name\", qIpspaceName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.IpspaceUUID != nil {\n\n\t\t// query param ipspace.uuid\n\t\tvar qrIpspaceUUID string\n\n\t\tif o.IpspaceUUID != nil {\n\t\t\tqrIpspaceUUID = *o.IpspaceUUID\n\t\t}\n\t\tqIpspaceUUID := qrIpspaceUUID\n\t\tif qIpspaceUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"ipspace.uuid\", qIpspaceUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalInterfaceIPAddress != nil {\n\n\t\t// query param local.interface.ip.address\n\t\tvar qrLocalInterfaceIPAddress string\n\n\t\tif o.LocalInterfaceIPAddress != nil {\n\t\t\tqrLocalInterfaceIPAddress = *o.LocalInterfaceIPAddress\n\t\t}\n\t\tqLocalInterfaceIPAddress := qrLocalInterfaceIPAddress\n\t\tif qLocalInterfaceIPAddress != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.interface.ip.address\", qLocalInterfaceIPAddress); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalInterfaceName != nil {\n\n\t\t// query param local.interface.name\n\t\tvar qrLocalInterfaceName string\n\n\t\tif o.LocalInterfaceName != nil {\n\t\t\tqrLocalInterfaceName = *o.LocalInterfaceName\n\t\t}\n\t\tqLocalInterfaceName := qrLocalInterfaceName\n\t\tif qLocalInterfaceName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.interface.name\", qLocalInterfaceName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalInterfaceUUID != nil {\n\n\t\t// query param local.interface.uuid\n\t\tvar qrLocalInterfaceUUID string\n\n\t\tif o.LocalInterfaceUUID != nil {\n\t\t\tqrLocalInterfaceUUID = *o.LocalInterfaceUUID\n\t\t}\n\t\tqLocalInterfaceUUID := qrLocalInterfaceUUID\n\t\tif qLocalInterfaceUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.interface.uuid\", qLocalInterfaceUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalPortName != nil {\n\n\t\t// query param local.port.name\n\t\tvar qrLocalPortName string\n\n\t\tif o.LocalPortName != nil {\n\t\t\tqrLocalPortName = *o.LocalPortName\n\t\t}\n\t\tqLocalPortName := qrLocalPortName\n\t\tif qLocalPortName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.port.name\", qLocalPortName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalPortNodeName != nil {\n\n\t\t// query param local.port.node.name\n\t\tvar qrLocalPortNodeName string\n\n\t\tif o.LocalPortNodeName != nil {\n\t\t\tqrLocalPortNodeName = *o.LocalPortNodeName\n\t\t}\n\t\tqLocalPortNodeName := qrLocalPortNodeName\n\t\tif qLocalPortNodeName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.port.node.name\", qLocalPortNodeName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.LocalPortUUID != nil {\n\n\t\t// query param local.port.uuid\n\t\tvar qrLocalPortUUID string\n\n\t\tif o.LocalPortUUID != nil {\n\t\t\tqrLocalPortUUID = *o.LocalPortUUID\n\t\t}\n\t\tqLocalPortUUID := qrLocalPortUUID\n\t\tif qLocalPortUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"local.port.uuid\", qLocalPortUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.MaxRecords != nil {\n\n\t\t// query param max_records\n\t\tvar qrMaxRecords int64\n\n\t\tif o.MaxRecords != nil {\n\t\t\tqrMaxRecords = *o.MaxRecords\n\t\t}\n\t\tqMaxRecords := swag.FormatInt64(qrMaxRecords)\n\t\tif qMaxRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"max_records\", qMaxRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.Name != nil {\n\n\t\t// query param name\n\t\tvar qrName string\n\n\t\tif o.Name != nil {\n\t\t\tqrName = *o.Name\n\t\t}\n\t\tqName := qrName\n\t\tif qName != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"name\", qName); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.OrderBy != nil {\n\n\t\t// binding items for order_by\n\t\tjoinedOrderBy := o.bindParamOrderBy(reg)\n\n\t\t// query array param order_by\n\t\tif err := r.SetQueryParam(\"order_by\", joinedOrderBy...); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif o.PeerAddress != nil {\n\n\t\t// query param peer.address\n\t\tvar qrPeerAddress string\n\n\t\tif o.PeerAddress != nil {\n\t\t\tqrPeerAddress = *o.PeerAddress\n\t\t}\n\t\tqPeerAddress := qrPeerAddress\n\t\tif qPeerAddress != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"peer.address\", qPeerAddress); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.PeerAsn != nil {\n\n\t\t// query param peer.asn\n\t\tvar qrPeerAsn int64\n\n\t\tif o.PeerAsn != nil {\n\t\t\tqrPeerAsn = *o.PeerAsn\n\t\t}\n\t\tqPeerAsn := swag.FormatInt64(qrPeerAsn)\n\t\tif qPeerAsn != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"peer.asn\", qPeerAsn); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.PeerIsNextHop != nil {\n\n\t\t// query param peer.is_next_hop\n\t\tvar qrPeerIsNextHop bool\n\n\t\tif o.PeerIsNextHop != nil {\n\t\t\tqrPeerIsNextHop = *o.PeerIsNextHop\n\t\t}\n\t\tqPeerIsNextHop := swag.FormatBool(qrPeerIsNextHop)\n\t\tif qPeerIsNextHop != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"peer.is_next_hop\", qPeerIsNextHop); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.ReturnRecords != nil {\n\n\t\t// query param return_records\n\t\tvar qrReturnRecords bool\n\n\t\tif o.ReturnRecords != nil {\n\t\t\tqrReturnRecords = *o.ReturnRecords\n\t\t}\n\t\tqReturnRecords := swag.FormatBool(qrReturnRecords)\n\t\tif qReturnRecords != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_records\", qReturnRecords); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.ReturnTimeout != nil {\n\n\t\t// query param return_timeout\n\t\tvar qrReturnTimeout int64\n\n\t\tif o.ReturnTimeout != nil {\n\t\t\tqrReturnTimeout = *o.ReturnTimeout\n\t\t}\n\t\tqReturnTimeout := swag.FormatInt64(qrReturnTimeout)\n\t\tif qReturnTimeout != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"return_timeout\", qReturnTimeout); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.State != nil {\n\n\t\t// query param state\n\t\tvar qrState string\n\n\t\tif o.State != nil {\n\t\t\tqrState = *o.State\n\t\t}\n\t\tqState := qrState\n\t\tif qState != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"state\", qState); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif o.UUID != nil {\n\n\t\t// query param uuid\n\t\tvar qrUUID string\n\n\t\tif o.UUID != nil {\n\t\t\tqrUUID = *o.UUID\n\t\t}\n\t\tqUUID := qrUUID\n\t\tif qUUID != \"\" {\n\n\t\t\tif err := r.SetQueryParam(\"uuid\", qUUID); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tif len(res) > 0 {\n\t\treturn errors.CompositeValidationError(res...)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cac89a1dd9539cd162d055d2768c517f", "score": "0.4345499", "text": "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\tparam := url.Values{}\n\tparam.Set(\"domain-name\", zone)\n\terr := p.setAuthQuery(param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar response *http.Response\n\tresponse, err = p.getResponse(ctx, \"dns/records.json\", param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tm := make(map[string]Record)\n\tif err = Unmarshal(response.Body, &m); err != nil {\n\t\treturn nil, err\n\t}\n\tvar records []libdns.Record\n\tfor _, v := range m {\n\t\trecords = append(records, libdns.Record{\n\t\t\tID: v.Id,\n\t\t\tType: v.Type,\n\t\t\tName: v.Host,\n\t\t\tValue: v.Record,\n\t\t\tTTL: v.Ttl,\n\t\t})\n\t}\n\treturn records, nil\n}", "title": "" }, { "docid": "6476d4cc84e58187d78604d279fef3a6", "score": "0.43198097", "text": "func Return(results ...Expr) *ReturnStmt {\n\treturn &ReturnStmt{Results: results}\n}", "title": "" }, { "docid": "55a86a5d7e1038afa965ac4912349da3", "score": "0.4315998", "text": "func (p *Provider) AppendRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tvar createdRecords []libdns.Record\n\n\tfor _, record := range records {\n\t\tcreatedRecord, err := p.createRecord(ctx, zone, record)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tcreatedRecords = append(createdRecords, createdRecord)\n\t}\n\n\treturn createdRecords, nil\n}", "title": "" }, { "docid": "0a93551ae085dd731c0f336c572a3cb9", "score": "0.43038964", "text": "func (mmDetails *mReportMockDetails) Return(pa1 []interface{}) *ReportMock {\n\tif mmDetails.mock.funcDetails != nil {\n\t\tmmDetails.mock.t.Fatalf(\"ReportMock.Details mock is already set by Set\")\n\t}\n\n\tif mmDetails.defaultExpectation == nil {\n\t\tmmDetails.defaultExpectation = &ReportMockDetailsExpectation{mock: mmDetails.mock}\n\t}\n\tmmDetails.defaultExpectation.results = &ReportMockDetailsResults{pa1}\n\treturn mmDetails.mock\n}", "title": "" }, { "docid": "597e3ea92d6cdc21d463584e0d9326aa", "score": "0.42965814", "text": "func (c *Client) GetRecords(ctx context.Context, zoneID string, recordsetID string) ([]Record, error) {\n\t// https://api.hyperone.com/v2/dns/{locationId}/project/{projectId}/zone/{zoneId}/recordset/{recordsetId}/record\n\tendpoint := c.baseURL.JoinPath(\"zone\", zoneID, \"recordset\", recordsetID, \"record\")\n\n\treq, err := newJSONRequest(ctx, http.MethodGet, endpoint, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar records []Record\n\n\terr = c.do(req, &records)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get records from server: %w\", err)\n\t}\n\n\treturn records, err\n}", "title": "" }, { "docid": "5715896efce8bda2b87f0ac375b940ad", "score": "0.4293471", "text": "func (a *Allowed) AndReturn(results ...interface{}) {\n\ta.Return(results...)\n}", "title": "" }, { "docid": "68ff01b630c5c0398a8bb21e65ac2074", "score": "0.42928377", "text": "func (p *Provider) AppendRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\tparam := url.Values{}\n\tparam.Set(\"domain-name\", zone)\n\terr := p.setAuthQuery(param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar rls []libdns.Record\n\tfor _, r := range records {\n\t\tparam.Set(\"record-type\", r.Type)\n\t\tparam.Set(\"host\", r.Name)\n\t\tparam.Set(\"record\", r.Value)\n\t\tparam.Set(\"ttl\", strconv.FormatInt(int64(r.TTL), 10))\n\t\tres, err := p.getResponse(ctx, \"dns/add-record.json\", param)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdata, err := ioutil.ReadAll(res.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstatus := checkStatus(data)\n\t\tif status.IsError() {\n\t\t\treturn nil, status\n\t\t}\n\t\tvar id Id\n\t\tif err = json.Unmarshal(status.Data, &id); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tr.ID = id.Id\n\t\trls = append(rls, r)\n\t}\n\treturn rls, nil\n}", "title": "" }, { "docid": "6586aeda3eb78333196b47507910e60b", "score": "0.4281668", "text": "func (app *codeBuilder) WithReturn(ret string) CodeBuilder {\n\tapp.ret = ret\n\treturn app\n}", "title": "" }, { "docid": "7319b376a3012e7c50a2af1c18f25bbb", "score": "0.4280165", "text": "func (_class PoolUpdateClass) GetAllRecords(sessionID SessionRef) (_retval map[PoolUpdateRef]PoolUpdateRecord, _err error) {\n\tif IsMock {\n\t\treturn _class.GetAllRecordsMock(sessionID)\n\t}\t\n\t_method := \"pool_update.get_all_records\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertPoolUpdateRefToPoolUpdateRecordMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "3e6877a6f7acdfff28c65ae5da6e5477", "score": "0.42772838", "text": "func (k Keeper) GetRecords(ctx sdk.Context, scopeAddress types.MetadataAddress, name string) ([]*types.Record, error) {\n\trecords := []*types.Record{}\n\terr := k.IterateRecords(ctx, scopeAddress, func(r types.Record) (stop bool) {\n\t\tif name == \"\" {\n\t\t\trecords = append(records, &r)\n\t\t} else if name == r.Name {\n\t\t\trecords = append(records, &r)\n\t\t}\n\t\treturn false\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn records, nil\n}", "title": "" }, { "docid": "823604e74b45badea33c618ebfd18427", "score": "0.4271865", "text": "func (p *Provider) SetRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tp.lock.Lock()\n\tdefer p.lock.Unlock()\n\tparam := url.Values{}\n\tparam.Set(\"domain-name\", zone)\n\terr := p.setAuthQuery(param)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, r := range records {\n\t\tparam.Set(\"record-id\", r.ID)\n\t\tparam.Set(\"host\", r.Name)\n\t\tparam.Set(\"record\", r.Value)\n\t\tparam.Set(\"ttl\", strconv.FormatInt(int64(r.TTL), 10))\n\t\tres, err := p.getResponse(ctx, \"dns/mod-record.json\", param)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdata, err := ioutil.ReadAll(res.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tstatus := checkStatus(data)\n\t\tif status.IsError() {\n\t\t\treturn nil, status\n\t\t}\n\t}\n\treturn records, nil\n}", "title": "" }, { "docid": "e066e055b6ba882f14f5a1dadc8bab2f", "score": "0.42635262", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithTimeout(timeout time.Duration) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "35820f68400eedd53ef16aa94bd4a495", "score": "0.4258586", "text": "func GetKYCRecordDetails(APIstub shim.ChaincodeStubInterface, args []string) sc.Response {\n\tfmt.Println(\"GetKYCRecordDetails Starts\")\n\tfmt.Println(args)\n\targAsResponse := eh.ArgumentError(1, args)\n\tif argAsResponse.GetMessage() != \"\" {\n\t\treturn argAsResponse\n\t}\n\tpopulatedRecord := PopulatedRecord{}\n\n\trecordAsResponse := eh.AbsentError(APIstub, args[0])\n\tif recordAsResponse.GetMessage() != \"\" {\n\t\treturn recordAsResponse\n\t}\n\trecord := kyc.Record{}\n\terr := json.Unmarshal(recordAsResponse.GetPayload(), &record)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\taddresses := []kyc.Address{}\n\taddressIDs := record.AddressIDs\n\tfor i := 0; i < len(addressIDs); i++ {\n\t\taddress := kyc.Address{}\n\t\taddressResponse := GetAddressDetails(APIstub, []string{addressIDs[i]})\n\t\tif addressResponse.GetMessage() != \"\" {\n\t\t\treturn addressResponse\n\t\t}\n\t\terr = json.Unmarshal(addressResponse.GetPayload(), &address)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\taddresses = append(addresses, address)\n\n\t}\n\n\tpopulatedRecord.Addresses = addresses\n\tverificationRecordAsResponse := GetVerificationRecordByKYCID(APIstub, args)\n\tif verificationRecordAsResponse.GetMessage() != \"\" {\n\t\tpopulatedRecord.Status = \"Unprocessed\"\n\t\tpopulatedRecord.Record = record\n\t} else {\n\t\tverificationRecord := kyc.VerificationRecord{}\n\t\terr = json.Unmarshal(verificationRecordAsResponse.GetPayload(), &verificationRecord)\n\t\tif err != nil {\n\t\t\treturn shim.Error(err.Error())\n\t\t}\n\t\tpopulatedRecord.Status = verificationRecord.Status\n\t\tpopulatedRecord.Record = record\n\t}\n\tpopulatedRecordAsBytes, err := json.Marshal(populatedRecord)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\tfmt.Println(\"Ends\")\n\tfmt.Println(string(populatedRecordAsBytes))\n\treturn shim.Success(populatedRecordAsBytes)\n}", "title": "" }, { "docid": "3a2238fa632587add8e8faada757152f", "score": "0.42575896", "text": "func (o *NfsClientsMapGetParams) SetReturnTimeout(returnTimeout *int64) {\n\to.ReturnTimeout = returnTimeout\n}", "title": "" }, { "docid": "1acb3dff1560df1eab968f2b82731c00", "score": "0.4254196", "text": "func (o *FirmwareHistoryCollectionGetParams) SetReturnTimeout(returnTimeout *int64) {\n\to.ReturnTimeout = returnTimeout\n}", "title": "" }, { "docid": "e5880adca648b11c886463ae24619e4c", "score": "0.4245842", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) bindParamFields(formats strfmt.Registry) []string {\n\tfieldsIR := o.Fields\n\n\tvar fieldsIC []string\n\tfor _, fieldsIIR := range fieldsIR { // explode []string\n\n\t\tfieldsIIV := fieldsIIR // string as string\n\t\tfieldsIC = append(fieldsIC, fieldsIIV)\n\t}\n\n\t// items.CollectionFormat: \"csv\"\n\tfieldsIS := swag.JoinByFormat(fieldsIC, \"csv\")\n\n\treturn fieldsIS\n}", "title": "" }, { "docid": "c2dbd42a534bbe617802c7c001fa4736", "score": "0.42426425", "text": "func (p *Provider) AppendRecords(ctx context.Context, zone string, records []libdns.Record) ([]libdns.Record, error) {\n\tif err := p.login(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar appendedRecords []libdns.Record\n\n\tfor _, record := range records {\n\t\tnewRecord, err := createRecord(ctx, p.cookieJar, unFQDN(zone), record)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tappendedRecords = append(appendedRecords, newRecord)\n\t}\n\n\treturn appendedRecords, nil\n}", "title": "" }, { "docid": "4dfd8ee7d752910951f1a9947ce8e763", "score": "0.42197233", "text": "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\tif err := p.login(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\n\trecords, err := getAllRecords(ctx, p.cookieJar, unFQDN(zone))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn records, nil\n}", "title": "" }, { "docid": "499201ee8774611c699cd36f8860cfe9", "score": "0.420667", "text": "func (s *ShopeeClient) GetReturnList(req *GetReturnListRequest) (resp *GetReturnListResponse, err error) {\n\tb, err := s.post(\"GetReturnList\", req)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = json.Unmarshal(b, &resp)\n\tif err != nil {\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "422dce993eeff529fc704e878775c7d7", "score": "0.42060387", "text": "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\tdomain := formatDomain(zone)\n\treq := NewQueryRecordsRequest(domain)\n\tresp, err := p.Client.QueryRecords(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresult := make([]libdns.Record, 0, len(resp.Records))\n\tfor _, rec := range resp.Records {\n\t\tresult = append(result, rec.libdnsRecord())\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "fd521f92290700ee8be91d4c46fbc11b", "score": "0.41985524", "text": "func getRecords(rec mongo.DASRecord, pkey string) []mongo.DASRecord {\n\tvar out []mongo.DASRecord\n\tswitch records := rec[pkey].(type) {\n\tcase []mongo.DASRecord:\n\t\tfor _, r := range records {\n\t\t\tout = append(out, r)\n\t\t}\n\tcase []interface{}:\n\t\tfor _, r := range records {\n\t\t\tif r != nil {\n\t\t\t\tout = append(out, r.(mongo.DASRecord))\n\t\t\t}\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "d831cfd6e8dce185c3770232770c242b", "score": "0.41926074", "text": "func (_class PIFClass) GetAllRecords(sessionID SessionRef) (_retval map[PIFRef]PIFRecord, _err error) {\n\tif IsMock {\n\t\treturn _class.GetAllRecordsMock(sessionID)\n\t}\t\n\t_method := \"PIF.get_all_records\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertPIFRefToPIFRecordMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "70d7f033f9aa664d02860d0dac921aff", "score": "0.41919184", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithOrderBy(orderBy []string) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetOrderBy(orderBy)\n\treturn o\n}", "title": "" }, { "docid": "f7dfc028f12733b6da498638499f0afb", "score": "0.4190877", "text": "func (o *ExportRuleCollectionGetParams) SetReturnTimeout(returnTimeout *int64) {\n\to.ReturnTimeout = returnTimeout\n}", "title": "" }, { "docid": "a55bea31bb104afd8a092e5692a62751", "score": "0.4189515", "text": "func ToTestRecords(searchResp *frontend.SearchResponse, imgBaseURL string) []*TestRecord {\n\t// Group the results by test.\n\tretMap := map[types.TestName]*TestRecord{}\n\tfor _, oneDigest := range searchResp.Results {\n\t\ttestNameVal := oneDigest.ParamSet[types.PrimaryKeyField]\n\t\tif len(testNameVal) == 0 {\n\t\t\tsklog.Errorf(\"Error: Digest '%s' has no primaryKey in paramset\", oneDigest.Digest)\n\t\t\tcontinue\n\t\t}\n\n\t\tdigestInfo := &DigestInfo{\n\t\t\tSearchResult: oneDigest,\n\t\t\tURL: digestURL(imgBaseURL, oneDigest.Digest),\n\t\t}\n\n\t\ttestName := types.TestName(oneDigest.ParamSet[types.PrimaryKeyField][0])\n\t\tif found, ok := retMap[testName]; ok {\n\t\t\tfound.Digests = append(found.Digests, digestInfo)\n\t\t} else {\n\t\t\tretMap[testName] = &TestRecord{\n\t\t\t\tTestName: testName,\n\t\t\t\tDigests: []*DigestInfo{digestInfo},\n\t\t\t}\n\t\t}\n\t}\n\n\t// Put the records into an array and return them.\n\tret := make([]*TestRecord, 0, len(retMap))\n\tfor _, oneTestRec := range retMap {\n\t\tret = append(ret, oneTestRec)\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "086d052bbbc39f49a4cf3edff1cc91ac", "score": "0.41819263", "text": "func (b *Backend) getRecords(ctx context.Context, startKey, endKey string, limit int, lastEvaluatedKey map[string]*dynamodb.AttributeValue) (*getResult, error) {\n\tquery := \"HashKey = :hashKey AND FullPath BETWEEN :fullPath AND :rangeEnd\"\n\tattrV := map[string]interface{}{\n\t\t\":fullPath\": startKey,\n\t\t\":hashKey\": hashKey,\n\t\t\":timestamp\": b.clock.Now().UTC().Unix(),\n\t\t\":rangeEnd\": endKey,\n\t}\n\n\t// filter out expired items, otherwise they might show up in the query\n\t// http://docs.aws.amazon.com/amazondynamodb/latest/developerguide/howitworks-ttl.html\n\tfilter := \"attribute_not_exists(Expires) OR Expires >= :timestamp\"\n\tav, err := dynamodbattribute.MarshalMap(attrV)\n\tif err != nil {\n\t\treturn nil, convertError(err)\n\t}\n\tinput := dynamodb.QueryInput{\n\t\tKeyConditionExpression: aws.String(query),\n\t\tTableName: &b.TableName,\n\t\tExpressionAttributeValues: av,\n\t\tFilterExpression: aws.String(filter),\n\t\tConsistentRead: aws.Bool(true),\n\t\tExclusiveStartKey: lastEvaluatedKey,\n\t}\n\tif limit > 0 {\n\t\tinput.Limit = aws.Int64(int64(limit))\n\t}\n\tout, err := b.svc.QueryWithContext(ctx, &input)\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tvar result getResult\n\tfor _, item := range out.Items {\n\t\tvar r record\n\t\tif err := dynamodbattribute.UnmarshalMap(item, &r); err != nil {\n\t\t\treturn nil, trace.Wrap(err)\n\t\t}\n\t\tresult.records = append(result.records, r)\n\t}\n\tsort.Sort(records(result.records))\n\tresult.records = removeDuplicates(result.records)\n\tresult.lastEvaluatedKey = out.LastEvaluatedKey\n\treturn &result, nil\n}", "title": "" }, { "docid": "b55ae6f1e1ee0dfa8f114556b41ab553", "score": "0.41779107", "text": "func (f *MockFunction) Return(v ...interface{}) *MockFunction {\n\tf.ReturnValues = append(f.ReturnValues, v...)\n\treturn f\n}", "title": "" }, { "docid": "ee578ecffed4b093afb3433751796d00", "score": "0.41734007", "text": "func getRecords(c *godo.Client, zoneName string) ([]godo.DomainRecord, error) {\n\tallRecords := []godo.DomainRecord{}\n\n\topt := &godo.ListOptions{}\n\tfor {\n\t\trecords, resp, err := c.Domains.Records(context.TODO(), zoneName, opt)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tallRecords = append(allRecords, records...)\n\n\t\tif resp.Links == nil || resp.Links.IsLastPage() {\n\t\t\tbreak\n\t\t}\n\n\t\tpage, err := resp.Links.CurrentPage()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\topt.Page = page + 1\n\t}\n\n\treturn allRecords, nil\n}", "title": "" }, { "docid": "23c84e2b9cfc9a9e669913cc204fad0e", "score": "0.41723785", "text": "func (k Keeper) GetRecords(ctx sdk.Context, scopeAddress types.MetadataAddress, name string) ([]*types.Record, error) {\n\trecords := []*types.Record{}\n\tvar iterator func(r types.Record) (stop bool)\n\tif len(name) == 0 {\n\t\titerator = func(r types.Record) (stop bool) {\n\t\t\trecords = append(records, &r)\n\t\t\treturn false\n\t\t}\n\t} else {\n\t\tname = strings.ToLower(name)\n\t\titerator = func(r types.Record) (stop bool) {\n\t\t\tif name == strings.ToLower(r.Name) {\n\t\t\t\trecords = append(records, &r)\n\t\t\t\treturn true\n\t\t\t}\n\t\t\treturn false\n\t\t}\n\t}\n\terr := k.IterateRecords(ctx, scopeAddress, iterator)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn records, nil\n}", "title": "" }, { "docid": "cec4ef74c80cb7767ec0fa730e1060d6", "score": "0.41712627", "text": "func (mr *MockKinesisAPIMockRecorder) GetRecords(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"GetRecords\", reflect.TypeOf((*MockKinesisAPI)(nil).GetRecords), arg0)\n}", "title": "" }, { "docid": "0656d56f3cf415a53b2583f98088244c", "score": "0.41675526", "text": "func (f *GitserverClientListFilesFunc) PushReturn(r0 []string, r1 error) {\n\tf.PushHook(func(context.Context, int, string, *regexp.Regexp) ([]string, error) {\n\t\treturn r0, r1\n\t})\n}", "title": "" }, { "docid": "38911fd376ae41b0061323005c564a21", "score": "0.41631085", "text": "func (f *QueryResolverDiagnosticsFunc) PushReturn(r0 []resolvers.AdjustedDiagnostic, r1 int, r2 error) {\n\tf.PushHook(func(context.Context, int) ([]resolvers.AdjustedDiagnostic, int, error) {\n\t\treturn r0, r1, r2\n\t})\n}", "title": "" }, { "docid": "e97dbacce6e3afd5ebdbc12eca295680", "score": "0.41616458", "text": "func (p *VultrProvider) Records(ctx context.Context) ([]*endpoint.Endpoint, error) {\n\tzones, err := p.Zones(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar endpoints []*endpoint.Endpoint\n\n\tfor _, zone := range zones {\n\t\trecords, err := p.fetchRecords(ctx, zone.Domain)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfor _, r := range records {\n\t\t\tif provider.SupportedRecordType(r.Type) {\n\t\t\t\tname := fmt.Sprintf(\"%s.%s\", r.Name, zone.Domain)\n\n\t\t\t\t// root name is identified by the empty string and should be\n\t\t\t\t// translated to zone name for the endpoint entry.\n\t\t\t\tif r.Name == \"\" {\n\t\t\t\t\tname = zone.Domain\n\t\t\t\t}\n\n\t\t\t\tendpoints = append(endpoints, endpoint.NewEndpointWithTTL(name, r.Type, endpoint.TTL(r.TTL), r.Data))\n\t\t\t}\n\t\t}\n\t}\n\n\treturn endpoints, nil\n}", "title": "" }, { "docid": "f414e11f09a12165b1af0af33b98d7ba", "score": "0.41569787", "text": "func (p *Provider) GetRecords(ctx context.Context, zone string) ([]libdns.Record, error) {\n\treturn p.getCloudDNSRecords(ctx, zone)\n}", "title": "" }, { "docid": "af840b721e71dd9c7a1cf5712e02c4ae", "score": "0.415281", "text": "func MultipleReturnsWithParams(firstname string, lastname string) (string, string) {\n\treturn firstname, lastname\n}", "title": "" }, { "docid": "1595ba3a6f84dcf5f389cc1d85359a88", "score": "0.41458908", "text": "func (f *PolicyMatcherCommitsDescribedByPolicyFunc) PushReturn(r0 map[string][]enterprise.PolicyMatch, r1 error) {\n\tf.PushHook(func(context.Context, int, []dbstore.ConfigurationPolicy, time.Time, ...string) (map[string][]enterprise.PolicyMatch, error) {\n\t\treturn r0, r1\n\t})\n}", "title": "" }, { "docid": "3eebe970711b715b6e663d662d0cbcad", "score": "0.4145175", "text": "func (s *NiftyModifyKeyPairAttributeOutput) SetReturn(v bool) *NiftyModifyKeyPairAttributeOutput {\n\ts.Return = &v\n\treturn s\n}", "title": "" }, { "docid": "9e9d8e58083cbbd5bb15dec1436b33f6", "score": "0.41445884", "text": "func (o *NetworkIPBgpPeerGroupsGetParams) WithHTTPClient(client *http.Client) *NetworkIPBgpPeerGroupsGetParams {\n\to.SetHTTPClient(client)\n\treturn o\n}", "title": "" }, { "docid": "6a0d21a4a33bc2f9c8e0eac313ddd459", "score": "0.4140433", "text": "func (m *MockKinesisAPI) GetRecords(arg0 *kinesis.GetRecordsInput) (*kinesis.GetRecordsOutput, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetRecords\", arg0)\n\tret0, _ := ret[0].(*kinesis.GetRecordsOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "0fb7f40137c50b9991673f28c4077ff4", "score": "0.41386476", "text": "func (o *ExportRuleCollectionGetParams) WithReturnTimeout(returnTimeout *int64) *ExportRuleCollectionGetParams {\n\to.SetReturnTimeout(returnTimeout)\n\treturn o\n}", "title": "" }, { "docid": "b334265553301567588e3099d78478a3", "score": "0.41335946", "text": "func (g *Gateio) GetWithdrawalRecords(ctx context.Context, ccy currency.Code, from, to time.Time, offset, limit uint64) ([]WithdrawalResponse, error) {\n\tparams := url.Values{}\n\tif !ccy.IsEmpty() {\n\t\tparams.Set(\"currency\", ccy.String())\n\t}\n\tif limit > 0 {\n\t\tparams.Set(\"limit\", strconv.FormatUint(limit, 10))\n\t}\n\tif offset > 0 {\n\t\tparams.Set(\"offset\", strconv.FormatUint(offset, 10))\n\t}\n\tif !from.IsZero() {\n\t\tparams.Set(\"from\", strconv.FormatInt(from.Unix(), 10))\n\t\tif err := common.StartEndTimeCheck(from, to); err != nil && !to.IsZero() {\n\t\t\treturn nil, err\n\t\t} else if !to.IsZero() {\n\t\t\tparams.Set(\"to\", strconv.FormatInt(to.Unix(), 10))\n\t\t}\n\t}\n\tvar withdrawals []WithdrawalResponse\n\treturn withdrawals, g.SendAuthenticatedHTTPRequest(ctx, exchange.RestSpot, walletEPL,\n\t\thttp.MethodGet, walletWithdrawals, params, nil, &withdrawals)\n}", "title": "" }, { "docid": "58ce6164814aee1c66cac4272dffef9a", "score": "0.41284874", "text": "func (o *VolumeMetricsCollectionGetParams) SetReturnTimeout(returnTimeout *int64) {\n\to.ReturnTimeout = returnTimeout\n}", "title": "" }, { "docid": "ef9650e500ce2eefa7640816a7106531", "score": "0.41214383", "text": "func (_class NetworkSriovClass) GetAllRecords(sessionID SessionRef) (_retval map[NetworkSriovRef]NetworkSriovRecord, _err error) {\n\t_method := \"network_sriov.get_all_records\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertNetworkSriovRefToNetworkSriovRecordMapToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "375ba0a746d87341729bc7b9bb5c812f", "score": "0.4109546", "text": "func (l *Level) Records(filter *LeaderboardFilter, embeds string) (*LeaderboardCollection, *Error) {\n\treturn fetchLeaderboardsLink(firstLink(l, \"records\"), filter, nil, embeds)\n}", "title": "" }, { "docid": "10b8985123518d328bba3b333d97eb04", "score": "0.41032273", "text": "func (f *GraphManagerAddEdgeLabelsFunc) PushReturn(r0 []int64, r1 error) {\n\tf.PushHook(func(...interface{}) ([]int64, error) {\n\t\treturn r0, r1\n\t})\n}", "title": "" }, { "docid": "83a63a86c6ab0b69d1dd270c2197004d", "score": "0.40941432", "text": "func (conn *Connection) ReturnImportParams(returnImportParams bool) *Connection {\n\tconn.returnImportParams = returnImportParams\n\treturn conn\n}", "title": "" }, { "docid": "4252c16fa841590ec541f1d7fecd7149", "score": "0.40923345", "text": "func (f *GraphManagerAddVertexLabelsFunc) PushReturn(r0 []model.Vertex, r1 error) {\n\tf.PushHook(func(...string) ([]model.Vertex, error) {\n\t\treturn r0, r1\n\t})\n}", "title": "" } ]
86aa83c955579cb594df5bee06808aa8
Deletes a topic and all its subscriptions. Deleting a topic might prevent some messages previously sent to the topic from being delivered to subscribers. This action is idempotent, so deleting a topic that does not exist does not result in an error.
[ { "docid": "369d0f4dd13c07484174438c55fbd91c", "score": "0.6667775", "text": "func (sns *SNS) DeleteTopic(topicArn string) (*DeleteTopicResponse, error) {\n\tparams := aws.MakeParams(\"DeleteTopic\")\n\tparams[\"TopicArn\"] = topicArn\n\n\tresponse := &DeleteTopicResponse{}\n\terr := sns.query(\"POST\", params, response)\n\n\treturn response, err\n}", "title": "" } ]
[ { "docid": "982fba959d29b92febb65dc5abc93688", "score": "0.7435994", "text": "func (broker *PubSub) DeleteTopic(topic string) {\n broker.Lock()\n defer broker.Unlock()\n\n for _, subKey := range broker.topics[topic] {\n close(broker.subs[subKey].Data())\n }\n delete(broker.topics, topic)\n}", "title": "" }, { "docid": "5d930f2d9782980e923e76e360e08aab", "score": "0.73690987", "text": "func (h *KafkaTopicsHandler) Delete(ctx context.Context, project, service, topic string) error {\n\tpath := buildPath(\"project\", project, \"service\", service, \"topic\", topic)\n\tbts, err := h.client.doDeleteRequest(ctx, path, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn checkAPIResponse(bts, nil)\n}", "title": "" }, { "docid": "dd2d6656982b6d32590ad672e87a83ce", "score": "0.7363171", "text": "func TopicDelete(w http.ResponseWriter, r *http.Request) {\n\n\t// Init output\n\toutput := []byte(\"\")\n\n\t// Add content type header to the response\n\tcontentType := \"application/json\"\n\tcharset := \"utf-8\"\n\tw.Header().Add(\"Content-Type\", fmt.Sprintf(\"%s; charset=%s\", contentType, charset))\n\n\t// Grab url path variables\n\turlVars := mux.Vars(r)\n\n\t// Grab context references\n\trefStr := gorillaContext.Get(r, \"str\").(stores.Store)\n\trefBrk := gorillaContext.Get(r, \"brk\").(brokers.Broker)\n\tprojectUUID := gorillaContext.Get(r, \"auth_project_uuid\").(string)\n\n\t// Get Result Object\n\n\terr := topics.RemoveTopic(projectUUID, urlVars[\"topic\"], refStr)\n\tif err != nil {\n\t\tif err.Error() == \"not found\" {\n\t\t\terr := APIErrorNotFound(\"Topic\")\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\t\terr := APIErrGenericInternal(err.Error())\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\tfullTopic := projectUUID + \".\" + urlVars[\"topic\"]\n\terr = refBrk.DeleteTopic(fullTopic)\n\tif err != nil {\n\t\tlog.Errorf(\"Couldn't delete topic %v from broker, %v\", fullTopic, err.Error())\n\t}\n\n\t// Write empty response if anything ok\n\trespondOK(w, output)\n}", "title": "" }, { "docid": "49b2bd40ffa6c135921640834c88a33c", "score": "0.7317676", "text": "func (t *Topic) Delete(ctx context.Context) error {\n\treturn t.s.deleteTopic(ctx, t.ID)\n}", "title": "" }, { "docid": "79d1044411670c3e0311ef342f4c48ff", "score": "0.72475606", "text": "func (c *Client) DeleteTopic(topic string) error {\n\treq, err := http.NewRequest(http.MethodDelete, c.url+\"/topics/\"+topic, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresp, err := c.c.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif resp.StatusCode != http.StatusNoContent {\n\t\terr = headers.ReadErrors(resp.Header)\n\t\treturn errors.Wrap(err, \"error deleting topic\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f80a581bf40cfbc31315ffb0824f42bb", "score": "0.7229415", "text": "func (datahub *DataHub) DeleteTopic(name, project_name string) error {\n\tt := &models.Topic{\n\t\tName: name,\n\t\tProjectName: project_name,\n\t}\n\terr := datahub.Client.Delete(t)\n\treturn err\n}", "title": "" }, { "docid": "c59c8b7dda34e82702f383a765921d22", "score": "0.7154085", "text": "func (client *SmnClient) DeleteTopic(request *DeleteTopicRequest) (response *DeleteTopicResponse, err error) {\n\tresponse = &DeleteTopicResponse{\n\t\tBaseResponse: &BaseResponse{},\n\t}\n\terr = client.SendRequest(request, response)\n\treturn\n}", "title": "" }, { "docid": "04fd17a4d829f294e08715b205b964db", "score": "0.7088202", "text": "func (c *ClusterInfo) DeleteTopic(topicName string, lookupdHTTPAddrs []LookupdAddressDC, nsqdHTTPAddrs []string) error {\n\tvar errs []error\n\n\tlookupdNodesDC, err := c.ListAllLookupdNodes(lookupdHTTPAddrs)\n\tif err != nil {\n\t\tc.logf(\"failed to list lookupd nodes while delete topic: %v\", err)\n\t\treturn err\n\t}\n\tleaderAddr := make([]string, 0)\n\tfor _, lookupdNodes := range lookupdNodesDC {\n\t\tleaderAddr = append(leaderAddr, net.JoinHostPort(lookupdNodes.LeaderNode.NodeIP, lookupdNodes.LeaderNode.HttpPort))\n\t}\n\n\tqs := fmt.Sprintf(\"topic=%s&partition=**\", url.QueryEscape(topicName))\n\t// remove the topic from all the nsqlookupd\n\terr = c.versionPivotNSQLookupd(leaderAddr, \"delete_topic\", \"topic/delete\", qs)\n\tif err != nil {\n\t\tpe, ok := err.(PartialErr)\n\t\tif !ok {\n\t\t\treturn err\n\t\t}\n\t\terrs = append(errs, pe.Errors()...)\n\t}\n\n\tif len(errs) > 0 {\n\t\treturn ErrList(errs)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cdec73dc2bfd8810fe38b35cbfdaf956", "score": "0.7056586", "text": "func (d *AwsDriver) Delete_Topic(params map[string]interface{}) (interface{}, error) {\n\tinput := &sns.DeleteTopicInput{}\n\tvar err error\n\n\t// Required params\n\terr = setFieldWithType(params[\"arn\"], input, \"TopicArn\", awsstr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstart := time.Now()\n\tvar output *sns.DeleteTopicOutput\n\toutput, err = d.sns.DeleteTopic(input)\n\toutput = output\n\tif err != nil {\n\t\td.logger.Errorf(\"delete topic error: %s\", err)\n\t\treturn nil, err\n\t}\n\td.logger.ExtraVerbosef(\"sns.DeleteTopic call took %s\", time.Since(start))\n\td.logger.Verbose(\"delete topic done\")\n\treturn output, nil\n}", "title": "" }, { "docid": "3d17f062d8981ded1bcf1146f8dfdb8c", "score": "0.6953942", "text": "func (s *TopicsService) DeleteTopic(topic int, options ...RequestOptionFunc) (*Response, error) {\n\tu := fmt.Sprintf(\"topics/%d\", topic)\n\n\treq, err := s.client.NewRequest(http.MethodDelete, u, nil, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.client.Do(req, nil)\n}", "title": "" }, { "docid": "d876e09a7a89fb09d62987dbf7db0f13", "score": "0.6925478", "text": "func deleteTopic(ctx context.Context, topicName string, ns *servicebus.Namespace) error {\n\ttm := ns.NewTopicManager()\n\tte, _ := tm.Get(ctx, topicName)\n\tif te != nil {\n\t\treturn tm.Delete(ctx, topicName)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "384fe5ada674735fee820a3e46543427", "score": "0.6879853", "text": "func (s *SNSService) DeleteTopic(req *DeleteTopicRequest) (result *DeleteTopicResponse, err error) {\n\n\tresult = new(DeleteTopicResponse)\n\terr = s.wrapperSignAndDo(\"DeleteTopic\", req, result)\n\treturn\n}", "title": "" }, { "docid": "1cf5777b067f67f65209b84a5513d055", "score": "0.68689543", "text": "func (m TopicPubSub) Del(topic string) {\n\tdelete(m, topic)\n}", "title": "" }, { "docid": "5a36a0326e0203c5579848580ec3721f", "score": "0.6853777", "text": "func (t *Topic) Delete() error {\n\terr := mongoDB.C(collection).RemoveId(t.ID)\n\treturn err\n}", "title": "" }, { "docid": "a2ff74e923321ade1216350a474493c1", "score": "0.6664355", "text": "func (b *Broker) DeleteSubscription(s *Subscriber, topics ...string) {\n\tfor _, topic := range topics {\n\t\tb.topicsLock.Lock()\n\t\tif nil == b.topics[topic] {\n\t\t\tb.topicsLock.Unlock()\n\t\t\tcontinue\n\t\t}\n\t\tdelete(b.topics[topic], s.id)\n\t\tb.topicsLock.Unlock()\n\t\ts.DeleteTopic(topic)\n\t}\n}", "title": "" }, { "docid": "63a719c2777c137514d16ee1a8e81d72", "score": "0.66495484", "text": "func (s *topicStore) Delete(id int64) error {\n\t_, err := s.db.Exec(`update topics set deleted=true where id=$1`, id)\n\treturn err\n}", "title": "" }, { "docid": "bb65669b62edaf5504c5ab838333b074", "score": "0.66428626", "text": "func (s *StreamsApiService) DeleteTopic(ctx context.Context, streamId int32, topicName string) (ImplResponse, error) {\n\t// TODO - update DeleteTopic with the required logic for this service method.\n\t// Add api_streams_service.go to the .openapi-generator-ignore to avoid overwriting this service implementation when updating open api generation.\n\n\t//TODO: Uncomment the next line to return response Response(200, JsonSuccess{}) or use other options such as http.Ok ...\n\t//return Response(200, JsonSuccess{}), nil\n\n\t//TODO: Uncomment the next line to return response Response(400, JsonError{}) or use other options such as http.Ok ...\n\t//return Response(400, JsonError{}), nil\n\n\treturn Response(http.StatusNotImplemented, nil), errors.New(\"DeleteTopic method not implemented\")\n}", "title": "" }, { "docid": "805a60e93f6d3b348d3cb8366f810041", "score": "0.66385114", "text": "func (s *Server) DeleteTopic(ctx context.Context, req *pb.TopicRequest) (*pb.Empty, error) {\n\tempty := &pb.Empty{}\n\n\tctx, cancel, err := s.ValidateRequest(ctx, req, writeRequest)\n\tif err != nil {\n\t\treturn empty, err\n\t}\n\n\tif cancel != nil {\n\t\tdefer cancel()\n\t}\n\n\tif err := s.Locking.Lock(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tdefer s.Locking.UnlockLogError(ctx)\n\n\tif req.Name == \"\" {\n\t\treturn nil, ErrTopicNameEmpty\n\t}\n\n\t// Ensure that the topic exists.\n\treqParams := &pb.TopicRequest{Name: req.Name}\n\tresp, err := s.ListTopics(ctx, reqParams)\n\tif err != nil {\n\t\treturn empty, err\n\t}\n\n\tif len(resp.Names) == 0 {\n\t\treturn empty, ErrTopicNotExist\n\t}\n\n\t// Make the delete request.\n\treturn empty, s.kafkaadmin.DeleteTopic(ctx, req.Name)\n}", "title": "" }, { "docid": "daf2ded0b2e6fb4070b700b78b6ff84c", "score": "0.65495026", "text": "func (s *TopicsService) DeleteTopic(ctx context.Context, topicID int) (*Topic, *shared.Response, error) {\n\tu := fmt.Sprintf(\"topics/%d\", topicID)\n\tvar result *Topic\n\tresp, err := s.client.Delete(ctx, u, &result)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn result, resp, nil\n}", "title": "" }, { "docid": "023959a50d21d0bb37816bdd851ef688", "score": "0.65296274", "text": "func (c *Conn) deleteTopics(request deleteTopicsRequestV1) (deleteTopicsResponseV1, error) {\n\tvar response deleteTopicsResponseV1\n\terr := c.writeOperation(\n\t\tfunc(deadline time.Time, id int32) error {\n\t\t\tif request.Timeout == 0 {\n\t\t\t\tnow := time.Now()\n\t\t\t\tdeadline = adjustDeadlineForRTT(deadline, now, defaultRTT)\n\t\t\t\trequest.Timeout = milliseconds(deadlineToTimeout(deadline, now))\n\t\t\t}\n\t\t\treturn c.writeRequest(deleteTopicsRequest, v1, id, request)\n\t\t},\n\t\tfunc(deadline time.Time, size int) error {\n\t\t\treturn expectZeroSize(func() (remain int, err error) {\n\t\t\t\treturn (&response).readFrom(&c.rbuf, size)\n\t\t\t}())\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn deleteTopicsResponseV1{}, err\n\t}\n\tfor _, c := range response.TopicErrorCodes {\n\t\tif c.ErrorCode != 0 {\n\t\t\treturn response, Error(c.ErrorCode)\n\t\t}\n\t}\n\treturn response, nil\n}", "title": "" }, { "docid": "44980e3e003baff002ac08a61face377", "score": "0.6458599", "text": "func (c *EventHubAdminClient) DeleteTopic(ctx context.Context, topicName string) *sarama.TopicError {\n\n\t// Azure EventHub Delete API Does NOT Accept Any Parameters So The Kafka DeleteTopicsAdminOptions Are Ignored\n\n\t// If The HubManager Is Not Valid Then Return Error\n\tif c.hubManager == nil {\n\t\tc.logger.Warn(\"Failed To Find EventHub Namespace With Valid HubManager - Skipping Topic Deletion\", zap.String(\"Topic\", topicName))\n\t\treturn util.NewTopicError(sarama.ErrInvalidConfig, fmt.Sprintf(\"azure namespace has invalid HubManager - unable to delete EventHub '%s'\", topicName))\n\t}\n\n\t// Delete The Specified Topic (EventHub)\n\terr := c.hubManager.Delete(ctx, topicName)\n\tif err != nil {\n\n\t\t// Delete API Returns Success For Non-Existent Topics - Nothing To Map - Just Return Error\n\t\tc.logger.Error(\"Failed To Delete EventHub\", zap.String(\"TopicName\", topicName), zap.Error(err))\n\t\treturn util.NewTopicError(sarama.ErrUnknown, err.Error())\n\t}\n\n\t// Return Success!\n\treturn util.NewTopicError(sarama.ErrNoError, \"successfully deleted topic\")\n}", "title": "" }, { "docid": "bfdf4e7d89faa12729280f3231824a97", "score": "0.64149594", "text": "func (ac *AdminClient) DeleteTopic(ctx context.Context, topic TopicPath) error {\n\treturn ac.admin.DeleteTopic(ctx, &pb.DeleteTopicRequest{Name: topic.String()})\n}", "title": "" }, { "docid": "f8e8a020cbc8eb8f0067acb971f2b375", "score": "0.63865596", "text": "func (c MockClusterAdmin) DeleteTopic(topic string) error {\n\targs := c.Called(topic)\n\treturn args.Error(0)\n}", "title": "" }, { "docid": "e0d74450c1ff17cac91320a675f8b3ed", "score": "0.6382873", "text": "func DeleteTopic(snsClient snsiface.SNSAPI, arn string) {\n\ttopic := &sns.DeleteTopicInput{\n\t\tTopicArn: &arn,\n\t}\n\n\tif _, err := snsClient.DeleteTopic(topic); err != nil {\n\t\tframework.FailfWithOffset(2, \"Failed to delete topic %q: %s\", *topic.TopicArn, err)\n\t}\n}", "title": "" }, { "docid": "7697d46a7f2ecde1931ae74558dffeeb", "score": "0.628216", "text": "func (s *Server) DeleteTopicTags(ctx context.Context, req *pb.TopicRequest) (*pb.TagResponse, error) {\n\tctx, cancel, err := s.ValidateRequest(ctx, req, writeRequest)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif cancel != nil {\n\t\tdefer cancel()\n\t}\n\n\tif err := s.Locking.Lock(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tdefer s.Locking.UnlockLogError(ctx)\n\n\tif req.Name == \"\" {\n\t\treturn nil, ErrTopicNameEmpty\n\t}\n\n\tif len(req.Tag) == 0 {\n\t\treturn nil, ErrNilTags\n\t}\n\n\t// Ensure the topic exists.\n\t_, err = s.kafkaadmin.DescribeTopics(ctx, []string{req.Name})\n\tswitch err {\n\tcase nil:\n\tcase kafkaadmin.ErrNoData:\n\t\treturn nil, ErrTopicNotExist\n\tdefault:\n\t\treturn nil, err\n\t}\n\n\t// Delete the tags.\n\terr = s.Tags.Store.DeleteTags(KafkaObject{Type: \"topic\", ID: req.Name}, Tags(req.Tag).Keys())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &pb.TagResponse{Message: \"success\"}, nil\n}", "title": "" }, { "docid": "8ef7f4226748137acaf6ef70992f213b", "score": "0.624849", "text": "func (s *Service) DeleteEventTopic(id int64, name string, uid int64) (err error) {\n\tif err = s.showDao.EventTopicDelete(id); err != nil {\n\t\treturn\n\t}\n\tif err = util.AddLogs(common.LogEventTopic, name, uid, id, ActionDelCEventTopic, id); err != nil {\n\t\tlog.Error(\"popularSvc.DeleteEventTopic AddLog error(%v)\", err)\n\t\treturn\n\t}\n\treturn\n}", "title": "" }, { "docid": "9961a7de9893313b6a77760afe28d308", "score": "0.6218605", "text": "func (b *Backend) Del(topic string) error {\n\treturn b.db.DelKV(topic)\n}", "title": "" }, { "docid": "3dfc11fcc6a2e00907fde960cdfac1b9", "score": "0.6215465", "text": "func DeleteTopicMetrics(cluster, topic string) {\n\tlabels := map[string]string{\n\t\t\"cluster\": cluster,\n\t\t\"topic\": topic,\n\t}\n\n\ttopicPartitionOffsetGauge.DeletePartialMatch(labels)\n\n\t// If a topic is deleted there cannot be any consumers, so delete all consumer metrics too\n\t// Not strictly necessary as Kafka will delete the consumer groups, which will eventually trigger DeleteConsumerMetrics\n\tconsumerPartitionLagGauge.DeletePartialMatch(labels)\n\tconsumerPartitionCurrentOffset.DeletePartialMatch(labels)\n\tconsumerTotalLagGauge.DeletePartialMatch(labels)\n\tconsumerStatusGauge.DeletePartialMatch(labels)\n}", "title": "" }, { "docid": "86cc06bc856d4aca4fdcd6670fd17e64", "score": "0.61821324", "text": "func Delete(client *golangsdk.ServiceClient, instanceID string, topics []string) (*DeleteResponse, error) {\n\tvar delOpts = struct {\n\t\tTopics []string `json:\"topics\" required:\"true\"`\n\t}{Topics: topics}\n\n\tb, err := build.RequestBody(delOpts, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\traw, err := client.Post(deleteURL(client, instanceID), b, nil, &golangsdk.RequestOpts{\n\t\tOkCodes: []int{200},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar res DeleteResponse\n\terr = extract.Into(raw.Body, &res)\n\treturn &res, err\n}", "title": "" }, { "docid": "0002c23c1cf44ea28ccd7866d9e06246", "score": "0.61067504", "text": "func (suite *KafkaAdapterTestSuite) DestroyTopic(topic string) error {\n\tcmd := exec.Command(\"docker\", \"exec\", \"broker\", \"kafka-topics\", \"--zookeeper\", suite.Zookeeper, \"--delete\", \"--topic\", topic)\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn err\n\t} else {\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "72d5a5bba9662ba80d88ec9691adf130", "score": "0.6020047", "text": "func (m *MockAdminClient) DeleteTopics(ctx context.Context, topics []string, options ...kafka.DeleteTopicsAdminOption) (result []kafka.TopicResult, err error) {\n\tm.deleteTopicsCalled = true\n\tif m.MockDeleteTopicFunc != nil {\n\t\treturn m.MockDeleteTopicFunc(ctx, topics, options...)\n\t}\n\treturn []kafka.TopicResult{}, nil\n}", "title": "" }, { "docid": "83e2d14fd5761567309f67f399f33b63", "score": "0.5990199", "text": "func (mong *MongoStore) RemoveTopic(projectUUID string, name string) error {\n\ttopic := bson.M{\"project_uuid\": projectUUID, \"name\": name}\n\treturn mong.RemoveResource(\"topics\", topic)\n}", "title": "" }, { "docid": "7696c5b8432df274ff66b4d994a58ec1", "score": "0.595175", "text": "func (s *Server) HandleDeleteTopic(w http.ResponseWriter, r *http.Request) {\n\tif r.Body != nil {\n\t\t_ = r.Body.Close()\n\t}\n\n\ttopic, err := getTopic(r)\n\tif err != nil {\n\t\ts.logger.Warnf(\"%s:%s:topic error: %s\", r.Method, r.URL.Path, err.Error())\n\t\theaders.SetError(w, err)\n\t\treturn\n\t}\n\n\taddr, err := s.distributor.GetTopicOwner(topic)\n\tif err != nil {\n\t\ts.logger.Warnf(\"%s:%s:get topic owner: %s\", r.Method, r.URL.Path, err.Error())\n\t\theaders.SetError(w, headers.ErrInvalidBodyJSON)\n\t\treturn\n\t}\n\tif addr != \"\" && addr != s.publicAddr {\n\t\ts.handleProxy(w, r, addr)\n\t\treturn\n\t}\n\n\terr = s.q.DeleteTopic(topic)\n\tif err != nil {\n\t\ts.logger.Warnf(\"%s:%s:delete topic: %s\", r.Method, r.URL.Path, err.Error())\n\t\theaders.SetError(w, err)\n\t\treturn\n\t}\n\tw.Header()[headers.ContentType] = []string{\"text/plain\"}\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "e4dfdb590b21ec71bb28a8cae1acd222", "score": "0.5851432", "text": "func (c *InMemoryCache) Delete(topic string) error {\n\tc.m.Lock()\n\tdefer c.m.Unlock()\n\n\titem, ok := c.c[topic]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\titem.timer.Stop()\n\n\tdelete(c.c, topic)\n\treturn nil\n}", "title": "" }, { "docid": "e879097900da42ad18572341cecb0ff6", "score": "0.58231175", "text": "func (b *Batch) Delete(id, topic []byte) error {\n\treturn b.DeleteEntry(NewEntry(topic, nil).WithID(id))\n}", "title": "" }, { "docid": "483b1718ccfed467d561ce836fa74ba5", "score": "0.57872784", "text": "func (d *AwsDriver) Delete_Topic_DryRun(params map[string]interface{}) (interface{}, error) {\n\tif _, ok := params[\"arn\"]; !ok {\n\t\treturn nil, errors.New(\"delete topic: missing required params 'arn'\")\n\t}\n\n\td.logger.Verbose(\"params dry run: delete topic ok\")\n\treturn nil, nil\n}", "title": "" }, { "docid": "63c1a532d0fc6bfe4d39adef9f8cecbc", "score": "0.5764264", "text": "func (sp *SubscribePacket) RemoveTopic(topic []byte) {\n\tfor i, t := range sp.topics {\n\t\tif bytes.Equal(t, topic) {\n\t\t\tsp.topics = append(sp.topics[:i], sp.topics[i+1:]...)\n\t\t\tsp.qos = append(sp.qos[:i], sp.qos[i+1:]...)\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "19f9dfb2a388d9c086cc888122092bc8", "score": "0.57296884", "text": "func UnsubscribeFromTopic(ctx context.Context, subscriber *pubsub.Subscriber) {\n\tsubscriber.UnsubscribeAll()\n}", "title": "" }, { "docid": "b6febb4728c2188f6be05b831ec6b6aa", "score": "0.56974673", "text": "func (s *TopicServer) DeletePubsubAlphaTopic(ctx context.Context, request *alphapb.DeletePubsubAlphaTopicRequest) (*emptypb.Empty, error) {\n\n\tcl, err := createConfigTopic(ctx, request.GetServiceAccountFile())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &emptypb.Empty{}, cl.DeleteTopic(ctx, ProtoToTopic(request.GetResource()))\n\n}", "title": "" }, { "docid": "1ceb26821c5c681e5c157bf8dada952e", "score": "0.56849384", "text": "func (c *Client) DeleteTopic(ctx context.Context, params *DeleteTopicInput, optFns ...func(*Options)) (*DeleteTopicOutput, error) {\n\tif params == nil {\n\t\tparams = &DeleteTopicInput{}\n\t}\n\n\tresult, metadata, err := c.invokeOperation(ctx, \"DeleteTopic\", params, optFns, c.addOperationDeleteTopicMiddlewares)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := result.(*DeleteTopicOutput)\n\tout.ResultMetadata = metadata\n\treturn out, nil\n}", "title": "" }, { "docid": "6058f71a72b7fb42e936b2bccf341364", "score": "0.5653179", "text": "func RemoveTopic(projectUUID string, name string, store stores.Store) error {\n\tif HasTopic(projectUUID, name, store) == false {\n\t\treturn errors.New(\"not found\")\n\t}\n\n\treturn store.RemoveTopic(projectUUID, name)\n}", "title": "" }, { "docid": "1683048188eb14f94380115c0a04bdcd", "score": "0.5644626", "text": "func ExampleTopicsClient_BeginDelete() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armeventgrid.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tpoller, err := clientFactory.NewTopicsClient().BeginDelete(ctx, \"examplerg1\", \"exampletopic1\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t_, err = poller.PollUntilDone(ctx, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to pull the result: %v\", err)\n\t}\n}", "title": "" }, { "docid": "6077ae0c94838db1ba8cb1d7d1270134", "score": "0.562814", "text": "func (n *Node) UnregisterTopic(lA *LinkActive, topic string) {\n\n\tlog.Debugf(\"func UnregisterTopic() %s for link=[%s]\", topic, lA.LinkActiveID)\n\tn.CommandCh <- &NodeCommandTopic{\n\t\tNodeCommand: NodeCommand{Cmd: unregisterTopic},\n\t\ttopicName: topic,\n\t\tactive: lA,\n\t}\n}", "title": "" }, { "docid": "2eb78f19154a21426d9be2aea9a608c3", "score": "0.5615964", "text": "func (a *Admin) DeleteTopicInBroker(addr, topic string) (err error) {\n\terr = a.rpc.DeleteTopicInBroker(addr, topic, 3*time.Second)\n\tif err != nil {\n\t\ta.Logger.Errorf(\"delete topic %s in broker:%s error:%s\", topic, addr, err)\n\t\treturn\n\t}\n\n\ta.Logger.Debugf(\"DELETE topic %s suc at broker %s\", topic, addr)\n\treturn\n}", "title": "" }, { "docid": "c118e05a9cc4ac283ded097ba39e93d5", "score": "0.5554688", "text": "func (group *Group) Delete(user *User) error {\n\tif len(group.Users) > 0 {\n\t\treturn fmt.Errorf(\"Could not delete this group, this group have Users\")\n\t}\n\tif len(group.AdminUsers) > 0 {\n\t\treturn fmt.Errorf(\"Could not delete this group, this group have Admin Users\")\n\t}\n\n\tc := TopicCriteria{}\n\tc.Skip = 0\n\tc.Limit = 10\n\tc.Group = group.Name\n\n\tcount, topics, err := ListTopics(&c, user)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while getting topics associated to group %s:%s\", group.Name, err.Error())\n\t\treturn fmt.Errorf(\"Error while getting topics associated to group\")\n\t}\n\n\tif len(topics) > 0 {\n\t\te := fmt.Sprintf(\"Group %s associated to %d topic, you can't delete it\", group.Name, count)\n\t\tlog.Errorf(e)\n\t\treturn fmt.Errorf(e)\n\t}\n\n\treturn Store().clGroups.Remove(bson.M{\"_id\": group.ID})\n}", "title": "" }, { "docid": "f6ca580d2b70cbbdac513b75a44a0397", "score": "0.55462307", "text": "func deleteSubscription(ctx context.Context, topicName string, subscriptionName string, ns *servicebus.Namespace) error {\n\tsm, err := ns.NewSubscriptionManager(topicName)\n\tif err != nil {\n\t\treturn nil\n\t}\n\tse, _ := sm.Get(ctx, subscriptionName)\n\tif se != nil {\n\t\t_ = sm.Delete(ctx, subscriptionName)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a635d239d81099e3789fdf1a69800eea", "score": "0.54932576", "text": "func (client *Client) Unsubscribe(topic string) {\n\tif subscription, exists := client.subscriptions[topic]; exists {\n\t\tclose(subscription.close)\n\t\tdelete(client.subscriptions, topic)\n\t\tif client.running {\n\t\t\tclient.makeUnsubscribeRequeast(subscription)\n\t\t}\n\t} else {\n\t\tlog.Printf(\"Cannot unsubscribe, %s doesn't exist.\", topic)\n\t}\n}", "title": "" }, { "docid": "9777e4c3aceb468a8e4dbcfafc7be936", "score": "0.5473092", "text": "func (g *GroupsController) Delete(ctx *gin.Context) {\n\tgroupName, err := GetParam(ctx, \"group\")\n\tif err != nil {\n\t\tctx.JSON(http.StatusBadRequest, gin.H{\"error\": \"Invalid Group in query\"})\n\t\treturn\n\t}\n\n\tgroupToDelete, err := groupDB.FindByName(groupName)\n\tif err != nil {\n\t\tctx.JSON(http.StatusNotFound, gin.H{\"error\": \"Invalid Group\"})\n\t\treturn\n\t}\n\n\tuser, err := PreCheckUser(ctx)\n\tif err != nil {\n\t\tctx.JSON(http.StatusBadRequest, gin.H{\"error\": \"Error while fetching user\"})\n\t\treturn\n\t}\n\n\tc := tat.TopicCriteria{}\n\tc.Skip = 0\n\tc.Limit = 10\n\tc.Group = groupToDelete.Name\n\n\tcount, topics, err := topicDB.ListTopics(&c, &user, false, false, false)\n\tif err != nil {\n\t\tlog.Errorf(\"Error while getting topics associated to group %s:%s\", groupToDelete.Name, err.Error())\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": fmt.Errorf(\"Error while getting topics associated to group\")})\n\t\treturn\n\t}\n\n\tif len(topics) > 0 {\n\t\te := fmt.Sprintf(\"Group %s associated to %d topic, you can't delete it\", groupToDelete.Name, count)\n\t\tlog.Errorf(e)\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": fmt.Errorf(e)})\n\t\treturn\n\t}\n\n\tif err = groupDB.Delete(groupToDelete, &user); err != nil {\n\t\tctx.JSON(http.StatusInternalServerError, gin.H{\"error\": fmt.Sprintf(\"Error while deleting Group: %s\", err.Error())})\n\t\treturn\n\t}\n\tctx.JSON(http.StatusOK, \"\")\n}", "title": "" }, { "docid": "2f2993c88e0181ebee8922a66853377b", "score": "0.5469499", "text": "func (client *SmnClient) NewDeleteTopicRequest() (request *DeleteTopicRequest) {\n\trequest = &DeleteTopicRequest{\n\t\tBaseRequest: &BaseRequest{Headers: make(map[string]string)},\n\t}\n\treturn\n}", "title": "" }, { "docid": "ab10fac13d95b24e0467fb8994910fce", "score": "0.5326481", "text": "func NewDeleteTopicByTopicNameNoContent() *DeleteTopicByTopicNameNoContent {\n\treturn &DeleteTopicByTopicNameNoContent{}\n}", "title": "" }, { "docid": "485ff6f7dc230cb316bd45e0f76709b1", "score": "0.5310809", "text": "func (client SubscriptionsClient) Delete(ctx context.Context, groupID string, subscriptionID string, cacheControl string) (result autorest.Response, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/SubscriptionsClient.Delete\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.Response != nil {\n\t\t\t\tsc = result.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\treq, err := client.DeletePreparer(ctx, groupID, subscriptionID, cacheControl)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"managementgroups.SubscriptionsClient\", \"Delete\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.DeleteSender(req)\n\tif err != nil {\n\t\tresult.Response = resp\n\t\terr = autorest.NewErrorWithError(err, \"managementgroups.SubscriptionsClient\", \"Delete\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.DeleteResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"managementgroups.SubscriptionsClient\", \"Delete\", resp, \"Failure responding to request\")\n\t\treturn\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6e07a48e1b9e63aabf9cd3e3666b8066", "score": "0.5292025", "text": "func (d *AwsDriver) Delete_Subscription(params map[string]interface{}) (interface{}, error) {\n\tinput := &sns.UnsubscribeInput{}\n\tvar err error\n\n\t// Required params\n\terr = setFieldWithType(params[\"arn\"], input, \"SubscriptionArn\", awsstr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tstart := time.Now()\n\tvar output *sns.UnsubscribeOutput\n\toutput, err = d.sns.Unsubscribe(input)\n\toutput = output\n\tif err != nil {\n\t\td.logger.Errorf(\"delete subscription error: %s\", err)\n\t\treturn nil, err\n\t}\n\td.logger.ExtraVerbosef(\"sns.Unsubscribe call took %s\", time.Since(start))\n\td.logger.Verbose(\"delete subscription done\")\n\treturn output, nil\n}", "title": "" }, { "docid": "103248043635dd8e66b78c6b7aa2dab0", "score": "0.52900165", "text": "func (srv *ServerNode) removeTopic(topic ConfigTopic) error {\n\t// Remove the topic from our list\n\tsrv.lock.Lock()\n\tnode := srv.topics[topic.Name]\n\tdelete(srv.topics, topic.Name)\n\t// Update the sorted list of topic names\n\tsrv.updateTopicNameListHoldingLock()\n\tsrv.lock.Unlock()\n\t// Ask the node to shutdown\n\tnotifier := utils.NewShutdownNotifier(1)\n\tnode.Shutdown(notifier)\n\tnotifier.WaitForAllDone()\n\tsrv_log(\"Topic %v removed - data can now be deleted.\\n\", topic.Name)\n\treturn nil\n}", "title": "" }, { "docid": "8c356108974439834868ac31150c1c31", "score": "0.5266324", "text": "func (a *Admin) DeleteTopicInAllNamesrv(topic string) (err error) {\n\tfor _, addr := range a.NameServerAddrs {\n\t\terr = a.rpc.DeleteTopicInNamesrv(addr, topic, 3*time.Second)\n\t\tif err != nil {\n\t\t\ta.Logger.Errorf(\"delete topic %s in namesrv:%s error:%s\", topic, addr, err)\n\t\t\tcontinue\n\t\t}\n\t\ta.Logger.Debugf(\"DELETE topic %s suc at namesrv %s\", topic, addr)\n\t}\n\treturn\n}", "title": "" }, { "docid": "60e29b74a876ef19ca23d596cadb9302", "score": "0.5253549", "text": "func (repo *Repository) Delete(ctx context.Context, claims auth.Claims, req DeleteRequest) error {\n\tspan, ctx := tracer.StartSpanFromContext(ctx, \"internal.subscription.Delete\")\n\tdefer span.Finish()\n\n\t// Validate the request.\n\tv := webcontext.Validator()\n\terr := v.Struct(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif claims.Audience == \"\" {\n\t\treturn errors.WithStack(ErrForbidden)\n\t}\n\t// Admin users can update Categories they have access to.\n\tif !claims.HasRole(auth.RoleAdmin) {\n\t\treturn errors.WithStack(ErrForbidden)\n\t}\n\n\t_, err = models.Subscriptions(models.SubscriptionWhere.ID.EQ(req.ID)).DeleteAll(ctx, repo.DbConn)\n\tif err != nil {\n\t\treturn errors.WithStack(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "39f4733cb7a267e18075153e5b5f9607", "score": "0.52497655", "text": "func (cli *Client) DeleteKafka(name, namespace string) error {\n\tgroupresources, err := restmapper.GetAPIGroupResources(cli.Discovery)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trmapper := restmapper.NewDiscoveryRESTMapper(groupresources)\n\tdynamicclientpool := dynamic.NewClientPool(cli.config, rmapper, dynamic.LegacyAPIPathResolverFunc)\n\n\tdynamicclient, err := dynamicclientpool.ClientForGroupVersionKind(kafkaClusterGVK)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trestmapping, err := rmapper.RESTMapping(kafkaClusterGVK.GroupKind(), kafkaClusterGVK.Version)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tapiresource := &metav1.APIResource{\n\t\tName: restmapping.Resource.Resource,\n\t\tNamespaced: restmapping.Scope.Name() == meta.RESTScopeNameNamespace,\n\t}\n\n\treturn dynamicclient.Resource(apiresource, namespace).Delete(name, nil)\n}", "title": "" }, { "docid": "a8c8cf63522c545da3d3150413db31b9", "score": "0.52181005", "text": "func UnsubscribeTopic(topic string) (err error) {\n\tif connectedServer == nil {\n\t\treturn errors.New(\"No server connected\")\n\t}\n\tch := make(chan error)\n\tunsub := &UnsubscribeObject{Object: js.Global.Get(\"Object\").New()}\n\tunsub.Topic = topic\n\tunsub.Success = func(obj *js.Object) {\n\t\tclose(ch)\n\t}\n\tunsub.Error = func(obj *js.Object) {\n\t\terr = errors.New(obj.String())\n\t\tclose(ch)\n\t}\n\tmo().Call(\"unsubscribe\", unsub)\n\treturn\n}", "title": "" }, { "docid": "fa3a3f63b2382842a8ca0cf5cb448257", "score": "0.52177817", "text": "func NewDeleteTopicByTopicNameUnauthorized() *DeleteTopicByTopicNameUnauthorized {\n\treturn &DeleteTopicByTopicNameUnauthorized{}\n}", "title": "" }, { "docid": "3eda93be801c06b52cc6b5750c835ce8", "score": "0.5209194", "text": "func (self *Retain) Remove(topic []byte) (err error) {\n\treturn self.rremove(topic)\n}", "title": "" }, { "docid": "ff6b749593530179f868276b2bed228a", "score": "0.5137908", "text": "func (_e *MockRocksMQ_Expecter) DestroyTopic(topicName interface{}) *MockRocksMQ_DestroyTopic_Call {\n\treturn &MockRocksMQ_DestroyTopic_Call{Call: _e.mock.On(\"DestroyTopic\", topicName)}\n}", "title": "" }, { "docid": "a55e6004f4b7449b80a3269cb1cc4294", "score": "0.5125466", "text": "func TestReconcileTopic(t *testing.T) {\n\n\t// Define & Initialize The TopicTestCases\n\ttopicTestCases := []TopicTestCase{\n\t\t{\n\t\t\tName: \"Skip Deleted Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithDeletionTimestamp,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: false,\n\t\t\tWantDelete: false,\n\t\t},\n\t\t{\n\t\t\tName: \"Create New Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: true,\n\t\t\tWantDelete: false,\n\t\t\tWantTopicDetail: &sarama.TopicDetail{\n\t\t\t\tNumPartitions: controllertesting.NumPartitions,\n\t\t\t\tReplicationFactor: controllertesting.ReplicationFactor,\n\t\t\t\tConfigEntries: map[string]*string{commonconstants.KafkaTopicConfigRetentionMs: &controllertesting.RetentionMillisString},\n\t\t\t},\n\t\t},\n\t\t{\n\t\t\tName: \"Create Preexisting Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: true,\n\t\t\tWantDelete: false,\n\t\t\tWantTopicDetail: &sarama.TopicDetail{\n\t\t\t\tNumPartitions: controllertesting.NumPartitions,\n\t\t\t\tReplicationFactor: controllertesting.ReplicationFactor,\n\t\t\t\tConfigEntries: map[string]*string{commonconstants.KafkaTopicConfigRetentionMs: &controllertesting.RetentionMillisString},\n\t\t\t},\n\t\t\tMockErrorCode: sarama.ErrTopicAlreadyExists,\n\t\t},\n\t\t{\n\t\t\tName: \"Error Creating Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: true,\n\t\t\tWantDelete: false,\n\t\t\tWantTopicDetail: &sarama.TopicDetail{\n\t\t\t\tNumPartitions: controllertesting.NumPartitions,\n\t\t\t\tReplicationFactor: controllertesting.ReplicationFactor,\n\t\t\t\tConfigEntries: map[string]*string{commonconstants.KafkaTopicConfigRetentionMs: &controllertesting.RetentionMillisString},\n\t\t\t},\n\t\t\tMockErrorCode: sarama.ErrBrokerNotAvailable,\n\t\t\tWantError: sarama.ErrBrokerNotAvailable.Error() + \" - \" + controllertesting.ErrorString,\n\t\t},\n\t\t{\n\t\t\tName: \"Delete Existing Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: false,\n\t\t\tWantDelete: true,\n\t\t},\n\t\t{\n\t\t\tName: \"Delete Nonexistent Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: false,\n\t\t\tWantDelete: true,\n\t\t\tMockErrorCode: sarama.ErrUnknownTopicOrPartition,\n\t\t},\n\t\t{\n\t\t\tName: \"Error Deleting Topic\",\n\t\t\tChannel: controllertesting.NewKafkaChannel(\n\t\t\t\tcontrollertesting.WithFinalizer,\n\t\t\t\tcontrollertesting.WithAddress,\n\t\t\t\tcontrollertesting.WithInitializedConditions,\n\t\t\t\tcontrollertesting.WithKafkaChannelServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverServiceReady,\n\t\t\t\tcontrollertesting.WithReceiverDeploymentReady,\n\t\t\t\tcontrollertesting.WithDispatcherDeploymentReady,\n\t\t\t),\n\t\t\tWantCreate: false,\n\t\t\tWantDelete: true,\n\t\t\tMockErrorCode: sarama.ErrBrokerNotAvailable,\n\t\t\tWantError: sarama.ErrBrokerNotAvailable.Error() + \" - \" + controllertesting.ErrorString,\n\t\t},\n\t}\n\n\t// Run All The TopicTestCases\n\tfor _, tc := range topicTestCases {\n\t\tt.Run(tc.Name, topicTestCaseFactory(tc))\n\t}\n}", "title": "" }, { "docid": "d84fc2798f1866e57ee6c42cff7bf524", "score": "0.5115035", "text": "func (m *SubscriptionManager) Delete(s *Subscription) {\n\tm.Lock()\n\tdefer m.Unlock()\n\tdelete(m.subscriptionsByID, s.id)\n\tif m.server.serverDiagnostics {\n\t\tm.removeDiagnosticsNode(s)\n\t\tm.server.serverDiagnosticsSummary.CurrentSubscriptionCount = uint32(len(m.subscriptionsByID))\n\t}\n}", "title": "" }, { "docid": "a522f58a1cf9db5f3440ed2022700340", "score": "0.5098611", "text": "func TopicDetachSchema(w http.ResponseWriter, r *http.Request) {\n\n\t// Init output\n\toutput := []byte(\"\")\n\n\t// Add content type header to the response\n\tcontentType := \"application/json\"\n\tcharset := \"utf-8\"\n\tw.Header().Add(\"Content-Type\", fmt.Sprintf(\"%s; charset=%s\", contentType, charset))\n\n\t// Grab url path variables\n\turlVars := mux.Vars(r)\n\n\t// Grab context references\n\trefStr := gorillaContext.Get(r, \"str\").(stores.Store)\n\tprojectUUID := gorillaContext.Get(r, \"auth_project_uuid\").(string)\n\n\tresults, err := topics.Find(projectUUID, \"\", urlVars[\"topic\"], \"\", 0, refStr)\n\n\tif err != nil {\n\t\terr := APIErrGenericBackend()\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\t// If not found\n\tif results.Empty() {\n\t\terr := APIErrorNotFound(\"Topic\")\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\terr = topics.DetachSchemaFromTopic(projectUUID, urlVars[\"topic\"], refStr)\n\tif err != nil {\n\t\terr := APIErrGenericInternal(err.Error())\n\t\trespondErr(w, err)\n\t}\n\n\t// Write response\n\toutput = []byte(\"\")\n\trespondOK(w, output)\n}", "title": "" }, { "docid": "235dcabf6c9340d46a62f3c2d58a572e", "score": "0.50949", "text": "func (mqc *MQClient) Terminate() error {\n\t// here we need to close everything down\n\t// disconnect from the subscriptions we have created\n\t// delete the subscription which is unique to this instance of the service\n\n\t// close all the outbound channels,\n\tfor _, topic := range mqc.topicEvents {\n\t\tctx, cancel := context.WithTimeout(context.Background(), time.Duration(time.Second*5))\n\t\tdefer cancel()\n\n\t\tsm, err := mqc.ns.NewSubscriptionManager(topic)\n\t\tif err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t\tsm.Delete(ctx, mqc.id)\n\t}\n\n\t// no errors? Hurrah!\n\treturn nil\n}", "title": "" }, { "docid": "90ff1657b98e1a116bfedd13735e16bf", "score": "0.5084044", "text": "func TestTopic(\n\tt *testing.T,\n\ttCtx TestContext,\n\tpubSubConstructor PubSubConstructor,\n) {\n\tpub, sub := pubSubConstructor(t)\n\tdefer closePubSub(t, pub, sub)\n\n\ttopic1 := testTopicName(tCtx.TestID) + \"_1\"\n\ttopic2 := testTopicName(tCtx.TestID) + \"_2\"\n\n\tif subscribeInitializer, ok := sub.(message.SubscribeInitializer); ok {\n\t\trequire.NoError(t, subscribeInitializer.SubscribeInitialize(topic1))\n\t}\n\tif subscribeInitializer, ok := sub.(message.SubscribeInitializer); ok {\n\t\trequire.NoError(t, subscribeInitializer.SubscribeInitialize(topic2))\n\t}\n\n\ttopic1Msg := message.NewMessage(watermill.NewUUID(), nil)\n\ttopic2Msg := message.NewMessage(watermill.NewUUID(), nil)\n\n\trequire.NoError(t, publishWithRetry(pub, topic1, topic1Msg))\n\trequire.NoError(t, publishWithRetry(pub, topic2, topic2Msg))\n\n\tmessagesTopic1, err := sub.Subscribe(context.Background(), topic1)\n\trequire.NoError(t, err)\n\n\tmessagesTopic2, err := sub.Subscribe(context.Background(), topic2)\n\trequire.NoError(t, err)\n\n\tmessagesConsumedTopic1, received := bulkRead(tCtx, messagesTopic1, 1, defaultTimeout)\n\trequire.True(t, received, \"no messages received in topic %s\", topic1)\n\n\tmessagesConsumedTopic2, received := bulkRead(tCtx, messagesTopic2, 1, defaultTimeout)\n\trequire.True(t, received, \"no messages received in topic %s\", topic2)\n\n\tassert.Equal(t, messagesConsumedTopic1.IDs()[0], topic1Msg.UUID)\n\tassert.Equal(t, messagesConsumedTopic2.IDs()[0], topic2Msg.UUID)\n}", "title": "" }, { "docid": "ca36a93b71bce3bca0160c3fc7d85601", "score": "0.5083484", "text": "func (m *MockPublisher) DeleteTopic(ctx context.Context, topicID string) error {\n\tret := m.ctrl.Call(m, \"DeleteTopic\", ctx, topicID)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "61ae38c145ec2271e1c74e8b9c8dcc20", "score": "0.50641114", "text": "func (mong *MongoStore) DeleteSchema(schemaUUID string) error {\n\n\tdb := mong.Session.DB(mong.Database)\n\tc := db.C(\"schemas\")\n\n\tselector := bson.M{\"uuid\": schemaUUID}\n\n\terr := c.Remove(selector)\n\n\tif err != nil {\n\t\tlog.WithFields(\n\t\t\tlog.Fields{\n\t\t\t\t\"type\": \"backend_log\",\n\t\t\t\t\"backend_service\": \"mongo\",\n\t\t\t\t\"backend_hosts\": mong.Server,\n\t\t\t},\n\t\t).Fatal(err.Error())\n\t}\n\n\ttopics := db.C(\"topics\")\n\n\ttopicSelector := bson.M{\"schema_uuid\": schemaUUID}\n\tchange := bson.M{\n\t\t\"$set\": bson.M{\n\t\t\t\"schema_uuid\": \"\",\n\t\t},\n\t}\n\ttopics.UpdateAll(topicSelector, change)\n\n\tif err != nil {\n\t\tlog.WithFields(\n\t\t\tlog.Fields{\n\t\t\t\t\"type\": \"backend_log\",\n\t\t\t\t\"backend_service\": \"mongo\",\n\t\t\t\t\"backend_hosts\": mong.Server,\n\t\t\t},\n\t\t).Fatal(err.Error())\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "ac4cb6d7426c7b1e13a96be032e39d2a", "score": "0.5063104", "text": "func (s *SubscriptionsService) Delete(id string) error {\n\t_, err := s.client.Delete(\"/v1/subscriptions/\"+id, nil)\n\n\treturn err\n}", "title": "" }, { "docid": "27e8c5ab37ebf22ae50a62f02934f79d", "score": "0.5051359", "text": "func (s *ticketStore) removeRegisterTopic(topic Topic) {\n\tlog.Trace(\"Removing discovery topic\", \"topic\", topic)\n\tif s.tickets[topic] == nil {\n\t\tlog.Warn(\"Removing non-existent discovery topic\", \"topic\", topic)\n\t\treturn\n\t}\n\tfor _, list := range s.tickets[topic].buckets {\n\t\tfor _, ref := range list {\n\t\t\tref.t.refCnt--\n\t\t\tif ref.t.refCnt == 0 {\n\t\t\t\tdelete(s.nodes, ref.t.node)\n\t\t\t\tdelete(s.nodeLastReq, ref.t.node)\n\t\t\t}\n\t\t}\n\t}\n\tdelete(s.tickets, topic)\n}", "title": "" }, { "docid": "54efb367b86f6a4ccaaf2a2c3fb19e9e", "score": "0.49815932", "text": "func deleteIndex(topic string, unindex *UnIndex) error {\n\twhere_map := make(map[string]interface{})\n\twhere_map[\"topic\"] = topic\n\twhere_map[\"word\"] = unindex.Word\n\twhere_map[\"shard\"] = unindex.Shard\n\twhere_map[\"sentence_id\"] = unindex.Sentence_id\n\treturn db.Cassandra.ExecuteWithRetry(db.Cassandra.Delete(\"word_index\", where_map))\n}", "title": "" }, { "docid": "1d17cf9b97cf188cf26d3501346795d6", "score": "0.49789748", "text": "func DeleteReplication(topic string, realUserId *service_def.RealUserId) error {\n\tlogger_rm.Infof(\"Deleting replication %s\\n\", topic)\n\n\t// delete replication spec\n\tspec, err := ReplicationSpecService().DelReplicationSpec(topic)\n\tif err == nil {\n\t\tlogger_rm.Infof(\"Replication specification %s is deleted\\n\", topic)\n\t} else {\n\t\tlogger_rm.Errorf(\"%v\\n\", err)\n\t\treturn err\n\t}\n\n\tgo writeGenericReplicationEvent(service_def.CancelReplicationEventId, spec, realUserId)\n\n\tlogger_rm.Infof(\"Pipeline %s is deleted\\n\", topic)\n\n\treturn nil\n}", "title": "" }, { "docid": "812d2d27dde6132cdbb9e6a4142901dc", "score": "0.49768052", "text": "func (mong *MongoStore) RemoveProjectTopics(projectUUID string) error {\n\ttopicMatch := bson.M{\"project_uuid\": projectUUID}\n\treturn mong.RemoveAll(\"topics\", topicMatch)\n}", "title": "" }, { "docid": "c49c6aa2d92bb398e7a4ae0fc9a57ab9", "score": "0.49659967", "text": "func (c Client) Terminate() {\n\tlog.Debug(\"Terminate subscriptions\")\n\tc.mutex.Lock()\n\tdefer c.mutex.Unlock()\n\n\tfor name, topics := range c.Topics {\n\t\tfor _, ch := range topics {\n\t\t\tclose(ch)\n\t\t}\n\t\tdelete(c.Topics, name)\n\t}\n\n\tc.Client.Terminate()\n}", "title": "" }, { "docid": "99302e379d6974f544dba146f92100bc", "score": "0.49523297", "text": "func (ac *AdminClient) TopicSubscriptions(ctx context.Context, topic TopicPath) *SubscriptionPathIterator {\n\treturn &SubscriptionPathIterator{\n\t\tit: ac.admin.ListTopicSubscriptions(ctx, &pb.ListTopicSubscriptionsRequest{Name: topic.String()}),\n\t}\n}", "title": "" }, { "docid": "5022bebb0dd8d1c3bb1526253044dbe0", "score": "0.49511245", "text": "func (o *SyslogDestination) Delete() *bambou.Error {\n\n\treturn bambou.CurrentSession().DeleteEntity(o)\n}", "title": "" }, { "docid": "e7603f9562fdc8b1f6a274e2ff856d14", "score": "0.49345776", "text": "func (o GoogleCloudContentwarehouseV1PublishActionOutput) TopicId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GoogleCloudContentwarehouseV1PublishAction) *string { return v.TopicId }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cc186df39ff2648338071e39524ec1e7", "score": "0.4921368", "text": "func (s *AuthService) DeleteSubscription(ctx context.Context, subscription string) error {\n\tvar reply struct {\n\t\tError struct {\n\t\t\tCode int `json:\"code\"`\n\t\t} `json:\"error\"`\n\t}\n\treq := internal.Request{\n\t\tMethod: \"DELETE\",\n\t\tURL: s.pubSubURL(subscription),\n\t\tScopes: s.oauthScopes(),\n\t\tOut: &reply,\n\t}\n\tif err := req.Do(ctx); err != nil && reply.Error.Code != 404 {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "aecafea2b38abcc673e4827570307344", "score": "0.49021623", "text": "func (o GoogleCloudContentwarehouseV1PublishActionResponseOutput) TopicId() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudContentwarehouseV1PublishActionResponse) string { return v.TopicId }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0718d9d991a4407b05a47b6e06943e7a", "score": "0.48876536", "text": "func TopicPublish(w http.ResponseWriter, r *http.Request) {\n\t// Init output\n\toutput := []byte(\"\")\n\n\t// Add content type header to the response\n\tcontentType := \"application/json\"\n\tcharset := \"utf-8\"\n\tw.Header().Add(\"Content-Type\", fmt.Sprintf(\"%s; charset=%s\", contentType, charset))\n\n\t// Get url path variables\n\turlVars := mux.Vars(r)\n\turlTopic := urlVars[\"topic\"]\n\n\t// Grab context references\n\n\trefBrk := gorillaContext.Get(r, \"brk\").(brokers.Broker)\n\trefStr := gorillaContext.Get(r, \"str\").(stores.Store)\n\trefUserUUID := gorillaContext.Get(r, \"auth_user_uuid\").(string)\n\trefRoles := gorillaContext.Get(r, \"auth_roles\").([]string)\n\trefAuthResource := gorillaContext.Get(r, \"auth_resource\").(bool)\n\t// Get project UUID First to use as reference\n\tprojectUUID := gorillaContext.Get(r, \"auth_project_uuid\").(string)\n\n\tresults, err := topics.Find(projectUUID, \"\", urlVars[\"topic\"], \"\", 0, refStr)\n\n\tif err != nil {\n\t\terr := APIErrGenericBackend()\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\t// If not found\n\tif results.Empty() {\n\t\terr := APIErrorNotFound(\"Topic\")\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\tres := results.Topics[0]\n\n\t// Check Authorization per topic\n\t// - if enabled in config\n\t// - if user has only publisher role\n\n\tif refAuthResource && auth.IsPublisher(refRoles) {\n\n\t\tif auth.PerResource(projectUUID, \"topics\", urlTopic, refUserUUID, refStr) == false {\n\t\t\terr := APIErrorForbidden()\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Read POST JSON body\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\terr := APIErrorInvalidRequestBody()\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\t// Create Message List from Post JSON\n\tmsgList, err := messages.LoadMsgListJSON(body)\n\tif err != nil {\n\t\terr := APIErrorInvalidArgument(\"Message\")\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\t// check if the topic has a schema associated with it\n\tif res.Schema != \"\" {\n\n\t\t// retrieve the schema\n\t\t_, schemaName, err := schemas.ExtractSchema(res.Schema)\n\t\tif err != nil {\n\t\t\tlog.WithFields(\n\t\t\t\tlog.Fields{\n\t\t\t\t\t\"type\": \"service_log\",\n\t\t\t\t\t\"schema_name\": res.Schema,\n\t\t\t\t\t\"topic_name\": res.Name,\n\t\t\t\t\t\"error\": err.Error(),\n\t\t\t\t},\n\t\t\t).Error(\"Could not extract schema name\")\n\t\t\terr := APIErrGenericInternal(schemas.GenericError)\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\n\t\tsl, err := schemas.Find(projectUUID, \"\", schemaName, refStr)\n\n\t\tif err != nil {\n\t\t\tlog.WithFields(\n\t\t\t\tlog.Fields{\n\t\t\t\t\t\"type\": \"service_log\",\n\t\t\t\t\t\"schema_name\": schemaName,\n\t\t\t\t\t\"topic_name\": res.Name,\n\t\t\t\t\t\"error\": err.Error(),\n\t\t\t\t},\n\t\t\t).Error(\"Could not retrieve schema from the store\")\n\t\t\terr := APIErrGenericInternal(schemas.GenericError)\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\n\t\tif !sl.Empty() {\n\t\t\terr := schemas.ValidateMessages(sl.Schemas[0], msgList)\n\t\t\tif err != nil {\n\t\t\t\tif err.Error() == \"500\" {\n\t\t\t\t\terr := APIErrGenericInternal(schemas.GenericError)\n\t\t\t\t\trespondErr(w, err)\n\t\t\t\t\treturn\n\t\t\t\t} else {\n\t\t\t\t\terr := APIErrorInvalidData(err.Error())\n\t\t\t\t\trespondErr(w, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t} else {\n\t\t\tlog.WithFields(\n\t\t\t\tlog.Fields{\n\t\t\t\t\t\"type\": \"service_log\",\n\t\t\t\t\t\"schema_name\": res.Schema,\n\t\t\t\t\t\"topic_name\": res.Name,\n\t\t\t\t},\n\t\t\t).Error(\"List of schemas was empty\")\n\t\t\terr := APIErrGenericInternal(schemas.GenericError)\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Init message ids list\n\tmsgIDs := messages.MsgIDs{IDs: []string{}}\n\n\t// For each message in message list\n\tfor _, msg := range msgList.Msgs {\n\t\t// Get offset and set it as msg\n\t\tfullTopic := projectUUID + \".\" + urlTopic\n\n\t\tmsgID, rTop, _, _, err := refBrk.Publish(fullTopic, msg)\n\n\t\tif err != nil {\n\t\t\tif err.Error() == \"kafka server: Message was too large, server rejected it to avoid allocation error.\" {\n\t\t\t\terr := APIErrTooLargeMessage(\"Message size too large\")\n\t\t\t\trespondErr(w, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\terr := APIErrGenericBackend()\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\n\t\tmsg.ID = msgID\n\t\t// Assertions for Succesfull Publish\n\t\tif rTop != fullTopic {\n\t\t\terr := APIErrGenericInternal(\"Broker reports wrong topic\")\n\t\t\trespondErr(w, err)\n\t\t\treturn\n\t\t}\n\n\t\t// Append the MsgID of the successful published message to the msgIds list\n\t\tmsgIDs.IDs = append(msgIDs.IDs, msg.ID)\n\t}\n\n\t// timestamp of the publish event\n\tpublishTime := time.Now().UTC()\n\n\t// amount of messages published\n\tmsgCount := int64(len(msgList.Msgs))\n\n\t// increment topic number of message metric\n\trefStr.IncrementTopicMsgNum(projectUUID, urlTopic, msgCount)\n\n\t// increment daily count of topic messages\n\tyear, month, day := publishTime.Date()\n\trefStr.IncrementDailyTopicMsgCount(projectUUID, urlTopic, msgCount, time.Date(year, month, day, 0, 0, 0, 0, time.UTC))\n\n\t// increment topic total bytes published\n\trefStr.IncrementTopicBytes(projectUUID, urlTopic, msgList.TotalSize())\n\n\t// update latest publish date for the given topic\n\trefStr.UpdateTopicLatestPublish(projectUUID, urlTopic, publishTime)\n\n\t// count the rate of published messages per sec between the last two publish events\n\tvar dt float64 = 1\n\t// if its the first publish to the topic\n\t// skip the subtraction that computes the DT between the last two publish events\n\tif !res.LatestPublish.IsZero() {\n\t\tdt = publishTime.Sub(res.LatestPublish).Seconds()\n\t}\n\trefStr.UpdateTopicPublishRate(projectUUID, urlTopic, float64(msgCount)/dt)\n\n\t// Export the msgIDs\n\tresJSON, err := msgIDs.ExportJSON()\n\tif err != nil {\n\t\terr := APIErrExportJSON()\n\t\trespondErr(w, err)\n\t\treturn\n\t}\n\n\t// Write response\n\toutput = []byte(resJSON)\n\trespondOK(w, output)\n}", "title": "" }, { "docid": "9d688260c5bffe9484b1fdf1ee09ec48", "score": "0.48737222", "text": "func (s *Service) GetTopicsOverview() ([]*TopicOverview, error) {\n\tlistedTopics, err := s.kafkaSvc.ListTopics()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttopics := make([]*sarama.TopicMetadata, 0, len(listedTopics))\n\tfor _, topic := range listedTopics {\n\t\t_, isBlacklisted := s.topicsBlacklist[topic.Name]\n\t\tif !isBlacklisted {\n\t\t\ttopics = append(topics, topic)\n\t\t}\n\t}\n\n\t// 3. Get log dir sizes for each topic\n\tsizeByTopic, err := s.logDirSizeByTopic()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// 3. Create config resources request objects for all topics\n\ttopicNames := make([]string, len(topics))\n\tfor i, topic := range topics {\n\t\tif topic.Err != sarama.ErrNoError {\n\t\t\ts.logger.Error(\"failed to get topic metadata while listing topics\",\n\t\t\t\tzap.String(\"topic_name\", topic.Name),\n\t\t\t\tzap.Error(topic.Err))\n\t\t\treturn nil, topic.Err\n\t\t}\n\n\t\ttopicNames[i] = topic.Name\n\t}\n\n\tconfigs, err := s.GetTopicsConfigs(topicNames, []string{\"cleanup.policy\"})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// x. Merge information from all requests and construct the TopicOverview object\n\tres := make([]*TopicOverview, len(topicNames))\n\tfor i, topic := range topics {\n\t\tsize := int64(-1)\n\t\tif value, ok := sizeByTopic[topic.Name]; ok {\n\t\t\tsize = value\n\t\t}\n\n\t\tpolicy := \"unknown\"\n\t\tif val, ok := configs[topic.Name]; ok {\n\t\t\tentry := val.GetConfigEntryByName(\"cleanup.policy\")\n\t\t\tif entry != nil {\n\t\t\t\tpolicy = entry.Value\n\t\t\t}\n\t\t}\n\n\t\tres[i] = &TopicOverview{\n\t\t\tTopicName: topic.Name,\n\t\t\tIsInternal: topic.IsInternal,\n\t\t\tPartitionCount: len(topic.Partitions),\n\t\t\tReplicationFactor: len(topic.Partitions[0].Replicas),\n\t\t\tCleanupPolicy: policy,\n\t\t\tLogDirSize: size,\n\t\t}\n\t}\n\n\t// 5. Return map as array which is sorted by topic name\n\tsort.Slice(res, func(i, j int) bool {\n\t\treturn res[i].TopicName < res[j].TopicName\n\t})\n\n\treturn res, nil\n}", "title": "" }, { "docid": "818183663559bb0edc7c54d3e87eeddb", "score": "0.4873042", "text": "func DeleteServiceSubscriptions(appId string) error {\n\tlog.Info(\"DeleteServiceSubscriptions\")\n\n\t// Get App instance info\n\tappInfo, err := getAppInfo(appId)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn err\n\t}\n\n\t// Validate App info\n\t_, _, err = validateAppInfo(appInfo)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn err\n\t}\n\n\t// Delete app support subscriptions\n\terr = subMgr.DeleteFilteredSubscriptions(appId, SER_AVAILABILITY_NOTIF_SUB_TYPE)\n\tif err != nil {\n\t\tlog.Error(err.Error())\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4e2ef20cb989a60a4ea8d60155cb579c", "score": "0.48720223", "text": "func (datahub *DataHub) UpdateTopic(name, project_name string, lifecycle int, comment string) error {\n\tt := &models.Topic{\n\t\tName: name,\n\t\tProjectName: project_name,\n\t\tLifecycle: lifecycle,\n\t\tComment: comment,\n\t}\n\terr := datahub.Client.Put(t)\n\treturn err\n}", "title": "" }, { "docid": "b60c263b7141b12de5ca7ebb38b73dcf", "score": "0.4863501", "text": "func (o *DeleteNotificationTopicV1AdminParams) WithTopicName(topicName string) *DeleteNotificationTopicV1AdminParams {\n\to.SetTopicName(topicName)\n\treturn o\n}", "title": "" }, { "docid": "5a803aaa48ee41c9d4e4a1d23b85446d", "score": "0.4830477", "text": "func (subscription *GoogleSubscription) Delete() (err error) {\n\ta := subscription.calendar.GetAccount()\n\tlog.Debugln(\"Delete google subscription\")\n\n\troute, err := util.CallAPIRoot(\"google/calendars/subscription/stop\")\n\tif err != nil {\n\t\treturn errors.New(fmt.Sprintf(\"error generating URL: %s\", err.Error()))\n\t}\n\n\theaders := make(map[string]string)\n\theaders[\"Authorization\"] = a.AuthorizationRequest()\n\theaders[\"X-AnchorMailbox\"] = a.Mail()\n\tdata, err := json.Marshal(subscription)\n\tif err != nil {\n\t\treturn errors.New(fmt.Sprintf(\"error marshalling event data: %s\", err.Error()))\n\t}\n\n\tcontents, err := util.DoRequest(http.MethodPost,\n\t\troute,\n\t\tbytes.NewBuffer(data),\n\t\theaders, nil)\n\tlog.Warningf(\"RESPONSE: %s\", contents)\n\n\tif len(contents) != 0 {\n\t\terr = createGoogleResponseError(contents)\n\t\tlog.Errorf(\"error deleting subscription: %s\", err.Error())\n\t}\n\treturn\n}", "title": "" }, { "docid": "7ecd73016a4e0e57d01d0f9715431a48", "score": "0.48249626", "text": "func CmdRemoveTopic(topic string) ([]byte, error) {\n\tif len(topic) == 0 {\n\t\treturn nil, errors.New(\"topic must not be empty\")\n\t}\n\n\tcmd := append([]byte{RemoveTopic}, e4crypto.HashTopic(topic)...)\n\n\treturn cmd, nil\n}", "title": "" }, { "docid": "1362a076f0d3ad70a41952edd96ead19", "score": "0.48201072", "text": "func (a *Client) DeleteAllSubscriptions(params *DeleteAllSubscriptionsParams) (*DeleteAllSubscriptionsOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteAllSubscriptionsParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteAllSubscriptions\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/installedapps/{installedAppId}/subscriptions\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"https\"},\n\t\tParams: params,\n\t\tReader: &DeleteAllSubscriptionsReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*DeleteAllSubscriptionsOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\tunexpectedSuccess := result.(*DeleteAllSubscriptionsDefault)\n\treturn nil, runtime.NewAPIError(\"unexpected success response: content available as default response in error\", unexpectedSuccess, unexpectedSuccess.Code())\n}", "title": "" }, { "docid": "4703bf58f9064e86117abff62e6f9983", "score": "0.48116094", "text": "func EnsureTopic(client *pubsub.Client, projectID, topicID string) {\n\tctx := context.Background()\n\n\t// See if our topic already exists\n\ttopic := client.Topic(topicID)\n\n\t// Create the topic if needed\n\texists, err := topic.Exists(ctx)\n\tif !exists || err != nil {\n\t\tt, err := client.CreateTopic(ctx, topicID)\n\t\tif err != nil {\n\t\t\t// Probably it already exists, so just log it and return\n\t\t\tlog.Printf(\"Error creating topic: %v\", err)\n\t\t}\n\t\ttopic = t\n\t\tlog.Printf(\"Topic created: %v\\n\", topic)\n\t} else {\n\t\tlog.Printf(\"Topic found: %v\\n\", topic)\n\t}\n}", "title": "" }, { "docid": "d3eb0d5839578bca07135ecf847d313a", "score": "0.48097593", "text": "func (o GoogleCloudContentwarehouseV1PublishActionPtrOutput) TopicId() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *GoogleCloudContentwarehouseV1PublishAction) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.TopicId\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "20ceddfd495a43f29af0e91a34a9f5a0", "score": "0.47886297", "text": "func (broker *PubSub) Unsubscribe(topic, subKey string) {\n broker.Lock()\n defer broker.Unlock()\n\n for i, k := range broker.topics[topic] {\n if k == subKey {\n // Fast delete from slice without preserving order\n broker.topics[topic][i] = broker.topics[topic][len(broker.topics[topic])-1]\n broker.topics[topic] = broker.topics[topic][:len(broker.topics[topic])-1]\n break\n }\n }\n delete(broker.subs, subKey)\n}", "title": "" }, { "docid": "ecc83382b9fc028d14337e1f1404638d", "score": "0.47883505", "text": "func (s *Service) DeleteStreams(ctx context.Context, orgID platform.ID, delete influxdb.BasicStream) error {\n\ts.store.Mu.Lock()\n\tdefer s.store.Mu.Unlock()\n\n\tq := sq.Delete(\"streams\").\n\t\tWhere(sq.Eq{\"org_id\": orgID}).\n\t\tWhere(sq.Eq{\"name\": delete.Names})\n\n\tquery, args, err := q.ToSql()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = s.store.DB.ExecContext(ctx, query, args...)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6aeb81da8e2cc9eedb46cfe2e8a00e77", "score": "0.47883204", "text": "func (o *Link) RemoveParentTopics(ctx context.Context, exec boil.ContextExecutor, related ...*Topic) error {\n\tvar err error\n\tquery := fmt.Sprintf(\n\t\t\"delete from \\\"link_topics\\\" where \\\"child_id\\\" = $1 and \\\"parent_id\\\" in (%s)\",\n\t\tstrmangle.Placeholders(dialect.UseIndexPlaceholders, len(related), 2, 1),\n\t)\n\tvalues := []interface{}{o.ID}\n\tfor _, rel := range related {\n\t\tvalues = append(values, rel.ID)\n\t}\n\n\tif boil.DebugMode {\n\t\tfmt.Fprintln(boil.DebugWriter, query)\n\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t}\n\n\t_, err = exec.ExecContext(ctx, query, values...)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to remove relationships before set\")\n\t}\n\tremoveParentTopicsFromChildLinksSlice(o, related)\n\tif o.R == nil {\n\t\treturn nil\n\t}\n\n\tfor _, rel := range related {\n\t\tfor i, ri := range o.R.ParentTopics {\n\t\t\tif rel != ri {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tln := len(o.R.ParentTopics)\n\t\t\tif ln > 1 && i < ln-1 {\n\t\t\t\to.R.ParentTopics[i] = o.R.ParentTopics[ln-1]\n\t\t\t}\n\t\t\to.R.ParentTopics = o.R.ParentTopics[:ln-1]\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6a9008aaf2609e9da9d0effbe3c59a16", "score": "0.4782391", "text": "func (wmc *WsubMessagesCfg) Delete(db XODB) error {\n\tvar err error\n\n\t// if doesn't exist, bail\n\tif !wmc._exists {\n\t\treturn nil\n\t}\n\n\t// if deleted, bail\n\tif wmc._deleted {\n\t\treturn nil\n\t}\n\n\t// sql query with composite primary key\n\tconst sqlstr = `DELETE FROM jlabo.wsub_messages_cfg WHERE user_id = ? AND cfg_name = ?`\n\n\t// run query\n\tXOLog(sqlstr, wmc.UserID, wmc.CfgName)\n\t_, err = db.Exec(sqlstr, wmc.UserID, wmc.CfgName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// set deleted\n\twmc._deleted = true\n\n\treturn nil\n}", "title": "" }, { "docid": "ef1b67723cf468a5e35f9a0eb285057b", "score": "0.47406048", "text": "func Delete(msg []byte) {\n\tvar del kafka.DeleteTodoMessage\n\tif err := unmarshal(msg, &del); err != nil {\n\t\treturn\n\t}\n\n\tlog.Printf(\"deleting todo with id: %v\", del.ID)\n\tstorage.S.Del(del.ID)\n}", "title": "" }, { "docid": "b68aca0f7c4cd30ea07b49db6523fbf4", "score": "0.47376367", "text": "func (bot *Bot) Topic(c, topic string) {\n\tstr := fmt.Sprintf(\"TOPIC %s :%s\", c, topic)\n\tbot.Send(str)\n}", "title": "" }, { "docid": "05617b43363b03ee354ff233ff504556", "score": "0.47367978", "text": "func PublishTopic(topic string, qos byte, msg []byte) error{\n\n\tif client == nil || !client.IsConnected() {\n\t\tlog.Println(\"(publish)Not connected\")\n\t\treturn nil\n\t}\n\n\ttoken := client.Publish(topic, qos, false, msg)\n\tif token.WaitTimeout(5*time.Second) == false {\n\t\treturn token.Error()\n\t}\n\n\tfmt.Printf(\"PublishTopic parameter %s\\n\", string(msg))\n\n\treturn nil\n}", "title": "" }, { "docid": "d5400a0bc8c69986e96d2b2a062c9fa7", "score": "0.47299278", "text": "func DeleteKafkaConsumer(triggerObjName, funcName, ns, topic string) error {\n\tconsumerID := generateUniqueConsumerGroupID(triggerObjName, funcName, ns, topic)\n\tif consumerM[consumerID] {\n\t\tlogrus.Infof(\"Stopping consumer for the function %s associated with for trigger %s\", funcName, triggerObjName)\n\t\t// delete consumer process\n\t\tclose(stopM[consumerID])\n\t\t<-stoppedM[consumerID]\n\t\tconsumerM[consumerID] = false\n\t\tlogrus.Infof(\"Stopped consumer for the function %s associated with for trigger %s\", funcName, triggerObjName)\n\t} else {\n\t\tlogrus.Infof(\"Consumer for function %s associated with trigger does n't exists. Good enough to skip the stop\", funcName, triggerObjName)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "29fc6b44930df6696c2640f6f7a4f516", "score": "0.47265854", "text": "func (ps *PubSub) Unsub(ch chan interface{}, topics ...string) {\n\tif len(topics) == 0 {\n\t\tps.cmdChan <- cmd{op: unsubAll, ch: ch}\n\t\treturn\n\t}\n\n\tps.cmdChan <- cmd{op: unsub, topics: topics, ch: ch}\n}", "title": "" }, { "docid": "cefaa370294e0d505b2bf16c1212f0d5", "score": "0.4723656", "text": "func (c *session) Unsubscribe(topic string) error {\n\tsubscriptionID, _, ok := bindingForEndpoint(c.events, topic)\n\n\tif !ok {\n\t\treturn fmt.Errorf(\"Domain %s is not registered with this client.\", topic)\n\t}\n\n\tid := newID()\n\tc.registerListener(id)\n\n\tsub := &unsubscribe{\n\t\tRequest: id,\n\t\tSubscription: subscriptionID,\n\t}\n\n\tif err := c.Send(sub); err != nil {\n\t\treturn err\n\t}\n\n\t// wait to receive uNSUBSCRIBED message\n\tmsg, err := c.waitOnListener(id)\n\tif err != nil {\n\t\treturn err\n\t} else if e, ok := msg.(*errorMessage); ok {\n\t\treturn fmt.Errorf(\"error unsubscribing to topic '%v': %v\", topic, e.Error)\n\t} else if _, ok := msg.(*unsubscribed); !ok {\n\t\treturn fmt.Errorf(formatUnexpectedMessage(msg, uNSUBSCRIBED))\n\t}\n\n\tdelete(c.events, subscriptionID)\n\treturn nil\n}", "title": "" }, { "docid": "aa814d53f79ccc18c113403a4a994da5", "score": "0.47022456", "text": "func (psm *pubsubMessageAPI) Topics() []string {\n\tif psm.Message.Topic == nil {\n\t\treturn nil\n\t}\n\treturn []string{*psm.Message.Topic}\n}", "title": "" }, { "docid": "070bfb65f0ad0a890baa609c8d76f206", "score": "0.46963662", "text": "func (m *Manager) DeleteConsumer(stream string, consumer string) error {\n\tif stream == \"\" || strings.ContainsAny(stream, \".>*\") {\n\t\treturn fmt.Errorf(\"invalid stream name\")\n\t}\n\tif consumer == \"\" || strings.ContainsAny(consumer, \".>*\") {\n\t\treturn fmt.Errorf(\"invalid consumer name\")\n\t}\n\n\tvar resp api.JSApiConsumerDeleteResponse\n\terr := m.jsonRequest(fmt.Sprintf(api.JSApiConsumerDeleteT, stream, consumer), nil, &resp)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !resp.Success {\n\t\treturn fmt.Errorf(\"deleting consumer %s > %s failed\", stream, consumer)\n\t}\n\n\treturn nil\n}", "title": "" } ]
862a33a8b8208487abcc8d67b5fb47fd
/ ParseArgs parse the provided arguments
[ { "docid": "4a59c80a82e34f1d4976f9403aebafdf", "score": "0.58756346", "text": "func ParseArgs(args []string) (subreddits []string, opts Options, err error) {\n\topts = findOptions(acceptedOptions, args)\n\n\tprovidedOptions := 0\n\tfor _, optProvided := range opts {\n\t\tif optProvided {\n\t\t\tprovidedOptions++\n\t\t}\n\t}\n\n\t// validating\n\tif providedOptions > 1 {\n\t\treturn nil, nil, fmt.Errorf(\"You cannot use the %s and %s options at the same time\", Cache, EmptyCache)\n\t}\n\n\t// filtering subreddits from args\n\tfor _, arg := range args {\n\t\tif !opts[arg] {\n\t\t\tsubreddits = append(subreddits, arg)\n\t\t}\n\t}\n\n\tif len(subreddits) > 0 && opts[EmptyCache] {\n\t\treturn nil, nil, fmt.Errorf(\"You cannot provide any subreddits with the %s option\", EmptyCache)\n\t} else if len(subreddits) > 0 && opts[Undo] {\n\t\treturn nil, nil, fmt.Errorf(\"You cannot provide any subreddits with the %s option\", Undo)\n\t} else if len(subreddits) == 0 && opts[Cache] {\n\t\treturn nil, nil, fmt.Errorf(\"You must provide at least one subreddit with the %s option\", Cache)\n\t} else if len(subreddits) == 0 && providedOptions == 0 {\n\t\treturn nil, nil, fmt.Errorf(\"You must provide at least one subreddit\")\n\t}\n\treturn subreddits, opts, nil\n}", "title": "" } ]
[ { "docid": "ce127c37b7c7390455c834b54d4f6ce7", "score": "0.74083453", "text": "func (c *Commands) parseArgs(args string) []string {\n\ttokens := strings.Split(args, c.ParamSep)\n\tfor index, token := range tokens {\n\t\ttokens[index] = strings.TrimSpace(token)\n\t}\n\treturn tokens\n}", "title": "" }, { "docid": "52486548cd4e6d941f9b6e6ffa95c84d", "score": "0.73553646", "text": "func parseArgs() {\n\tflag.StringVar(&cmdline.Config, \"config\", cmdline.Config, \"Path to configutation file\")\n\tflag.StringVar(&cmdline.Host, \"host\", cmdline.Host, \"Host IP or name to bind to\")\n\tflag.IntVar(&cmdline.Port, \"port\", cmdline.Port, \"Port to bind to\")\n\tflag.StringVar(&cmdline.Maildirs, \"maildirs\", cmdline.Maildirs, \"Path to the top level of the user Maildirs\")\n\tflag.StringVar(&cmdline.Logfile, \"log\", cmdline.Logfile, \"Path to logfile\")\n\tflag.BoolVar(&cmdline.Debug, \"debug\", cmdline.Debug, \"Log debugging information\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "a29afb70531918b884905225a2eed617", "score": "0.7256236", "text": "func parseArgs() {\n\tflag.StringVar(&masterPhrase, \"master\", \"\", \"The master phrase to use for password generation. Do NOT forget to escape any special characters contained in the master phrase (e.g. $, space etc).\")\n\tflag.StringVar(&masterPhraseFile, \"master-file\", \"\", \"The path to a file, containing the master phrase.\")\n\n\tflag.StringVar(&domain, \"domain\", \"\", \"The domain for which this password is intended\")\n\tflag.StringVar(&additionalInfo, \"additional-info\", \"\", \"Free text to add (e.g. index/timestamp/username if the previous password was compromized)\")\n\tflag.IntVar(&passLength, \"password-length\", 12, \"Define the length of the password.\")\n\tflag.BoolVar(&addSpecialChars, \"special-characters\", true, \"Whether to add a known set of special characters to the password\")\n\tflag.BoolVar(&addInfoToLog, \"log-info\", false, \"Whether to log the parameters that were used for generation to a file. Note that the password itself will NOT be stored!\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "54b9672195435429eedc8b4b9c2fe43c", "score": "0.72295433", "text": "func ParseArgs(args []string) ([]string, string, error) {\n\tlog.Infof(\"Parsing arguments\")\n\n\tif len(args) < 2 {\n\t\treturn args, \"\", nil\n\t}\n\n\tvar lastPositionalArg int\n\tfor i, arg := range args {\n\t\tif strings.HasPrefix(arg, \"-\") {\n\t\t\tbreak\n\t\t}\n\t\tlastPositionalArg = i\n\t}\n\n\tif lastPositionalArg == 0 {\n\t\treturn args, \"\", nil\n\t}\n\n\tif lastPositionalArg == 1 {\n\t\treturn append([]string{args[0]}, args[2:]...), args[1], nil\n\t}\n\n\treturn nil, \"\", fmt.Errorf(\"unexpected positional argument(s) %v\", args[2:lastPositionalArg+1])\n}", "title": "" }, { "docid": "87585ce97e10490e6550f15d66a1ea61", "score": "0.7218126", "text": "func parseArgs(args []string) (*arguments, error) {\n\tif len(args) == 0 {\n\t\treturn nil, errors.Errorf(\"required input \\\" --src <Src_File> \\\" not found !\")\n\t}\n\n\tapp := kingpin.New(\"mircat\", \"Utility for processing Mir state event logs.\")\n\tsrc := app.Flag(\"src\", \"The input file to read (defaults to stdin).\").Default(os.Stdin.Name()).File()\n\t_, err := app.Parse(args)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &arguments{\n\t\tsrcFile: *src,\n\t}, nil\n}", "title": "" }, { "docid": "3a81816fc75626c8ac5fa5c9b6ee64f8", "score": "0.71833307", "text": "func ParseArgs() Order {\n\tvar operation int\n\tvar snapshot string\n\tvar apk string\n\ttakeCmd := flag.NewFlagSet(\"take\", flag.ExitOnError)\n\tscanCmd := flag.NewFlagSet(\"scan\", flag.ExitOnError)\n\ttakeSnapshotVal := takeCmd.String(\"snapshot\", \"./permissions.json\", \"The permission snapshot file.\")\n\ttakeApkVal := takeCmd.String(\"apk\", \"\", \"The APK file to analyze.\")\n\tscanSnapshotVal := scanCmd.String(\"snapshot\", \"./permissions.json\", \"The permission snapshot file.\")\n\tscanApkVal := scanCmd.String(\"apk\", \"\", \"The APK file to analyze.\")\n\tif len(os.Args) < 2 {\n\t\tfmt.Println(\"Require sub-command: 'take' or 'scan'\")\n\t\tos.Exit(2)\n\t}\n\tswitch os.Args[1] {\n\tcase \"take\":\n\t\toperation = Take\n\t\ttakeCmd.Parse(os.Args[2:])\n\tcase \"scan\":\n\t\toperation = Scan\n\t\tscanCmd.Parse(os.Args[2:])\n\tdefault:\n\t\tfmt.Println(\"Supported sub-commands: 'take' or 'scan'\")\n\t\tos.Exit(2)\n\t}\n\tif takeCmd.Parsed() {\n\t\tif *takeApkVal == \"\" {\n\t\t\ttakeCmd.PrintDefaults()\n\t\t\tos.Exit(2)\n\t\t}\n\t\tsnapshot = *takeSnapshotVal\n\t\tapk = *takeApkVal\n\t}\n\tif scanCmd.Parsed() {\n\t\tif *scanApkVal == \"\" {\n\t\t\tscanCmd.PrintDefaults()\n\t\t\tos.Exit(2)\n\t\t}\n\t\tsnapshot = *scanSnapshotVal\n\t\tapk = *scanApkVal\n\t}\n\treturn Order{operation, snapshot, apk}\n}", "title": "" }, { "docid": "63b89da27db7d0a19da0f335dbd0421c", "score": "0.7134856", "text": "func parseArgs(conf *Config) {\n\tvar parser = flags.NewParser(conf, flags.Default)\n\n\t/*\n\t Input validation. Don't silently fail. Print the usage instead.\n\t We might do something with \"unparsed\" later, but the Args nested\n\t struct in Config slurps the rest of the arguments into command.\n\n\t There seems to be a bug where --help prints twice... I tried to\n\t mitigate it by overriding with my own --help. I think it's caused\n\t by the fact that I have required args? Not worth investing any more\n\t time\n\t*/\n\n\tunparsed, err := parser.Parse()\n\tif err != nil || len(unparsed) > 1 || conf.Help {\n\t\tprintHelp(parser)\n\t}\n}", "title": "" }, { "docid": "b861fd10c2bdec26da1092e62495bf6c", "score": "0.71120346", "text": "func (j *DSGitHub) ParseArgs(ctx *Ctx) (err error) {\n\tj.DS = GitHub\n\tprefix := \"DA_GITHUB_\"\n\tj.Org = os.Getenv(prefix + \"ORG\")\n\tj.Repo = os.Getenv(prefix + \"REPO\")\n\tj.Category = os.Getenv(prefix + \"CATEGORY\")\n\tj.Tokens = os.Getenv(prefix + \"TOKENS\")\n\treturn\n}", "title": "" }, { "docid": "4bb44b3a5c61eb8a01e4de8358042f28", "score": "0.7101037", "text": "func (c *cli) parseArgs(args []string) (*cliArgs, error) {\n\tparsedArgs := &cliArgs{}\n\n\tapp := kingpin.New(appName, \"\")\n\n\t// Do not call os.Exit\n\tapp.Terminate(nil)\n\n\t// Write output to stderr\n\tapp.Writer(c.stderr)\n\n\t// Add --version flag with to display build info\n\tapp.Version(fmt.Sprintf(\"%s version %s (%s) built on %s\", appName, version, commitHash, buildDate))\n\n\t// Add --config flag to specify path to the config\n\tapp.Flag(\"config\", \"Set the configuration file path\").\n\t\tShort('c').\n\t\tPlaceHolder(\"PATH\").\n\t\tDefault(filepath.Join(filepath.Dir(os.Args[0]), \"gevulot.toml\")).\n\t\tStringVar(&parsedArgs.configPath)\n\n\t// Add --verbose flag to enable debug output\n\tapp.Flag(\"verbose\", \"Enable debug output\").\n\t\tShort('v').\n\t\tBoolVar(&parsedArgs.isVerbose)\n\n\t// Expose --help and --version flags to our struct\n\tapp.HelpFlag.BoolVar(&parsedArgs.isHelp)\n\tapp.VersionFlag.BoolVar(&parsedArgs.isHelp)\n\n\t_, err := app.Parse(args)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn parsedArgs, nil\n}", "title": "" }, { "docid": "b77eee1e52cdbf9adc012d0541642f3b", "score": "0.70175266", "text": "func ParseArgs(args []string) error {\n\tif len(args) < 1 {\n\t\tfmt.Println(argDropletFailMsg)\n\t\tos.Exit(1)\n\t}\n\tswitch args[0] {\n\tcase \"list\":\n\t\tParseArgsListDrop(args[1:])\n\tcase \"create\":\n\t\tif err := ParseArgsCreateDrop(args[1:]); err != nil {\n\t\t\treturn err\n\t\t}\n\tcase \"delete\":\n\t\tif err := ParseArgsDeleteDrop(args[1:]); err != nil {\n\t\t\treturn err\n\t\t}\n\n\tdefault:\n\t\tfmt.Print(\"Incorrect arg: \")\n\t\tsupport.RedBold.Println(args[0])\n\t\tfmt.Println(argDropletFailMsg)\n\t\tos.Exit(1)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6cb98f20f79f39836c495fab0723fb8b", "score": "0.6997013", "text": "func ParseArgs() {\n\tflag.Var(&color, \"color\", \"Background and border color\")\n\tflag.Var(&paddingTop, \"padding-top\", \"Value of top padding\")\n\tflag.Var(&paddingBottom, \"padding-bottom\", \"Value of bottom padding\")\n\tflag.Var(&borderWidth, \"border-width\", \"Border width of focused window\")\n\tflag.Var(&nameLimit, \"name-limit\", \"Maximum length of workspace name\")\n\tflag.Var(&commands, \"exec\", \"Commands to execute at startup\")\n\tflag.StringVar(&terminal, \"term\", \"xterm\", \"A command to launch terminal emulator\")\n\tflag.StringVar(&launcher, \"launcher\", \"rofi -show run\", \"A command to show application launcher\")\n\tflag.StringVar(&locker, \"lock\", \"slock\", \"A command to lock screen\")\n\tflag.BoolVar(\n\t\t&debug, \"debug\", false,\n\t\t\"Outputs debug information to Stderr\",\n\t)\n\tflag.Parse()\n}", "title": "" }, { "docid": "d8669a93efb03c8f0bec69a243c93291", "score": "0.6882662", "text": "func ParseArgs(cfg any, args []string, allArgs map[string]reflect.Value, errNotFound bool) ([]string, error) {\n\tvar nonFlags []string\n\tvar err error\n\tfor len(args) > 0 {\n\t\ts := args[0]\n\t\targs = args[1:]\n\t\tif len(s) == 0 || s[0] != '-' || len(s) == 1 {\n\t\t\tnonFlags = append(nonFlags, s)\n\t\t\tcontinue\n\t\t}\n\n\t\tif s[1] == '-' && len(s) == 2 { // \"--\" terminates the flags\n\t\t\t// f.argsLenAtDash = len(f.args)\n\t\t\tnonFlags = append(nonFlags, args...)\n\t\t\tbreak\n\t\t}\n\t\targs, err = ParseArg(s, args, allArgs, errNotFound)\n\t\tif err != nil {\n\t\t\treturn nonFlags, err\n\t\t}\n\t}\n\treturn nonFlags, nil\n}", "title": "" }, { "docid": "c1c29bf5e95a03ae89af1bd459e9bcc7", "score": "0.6876907", "text": "func ParseArgs(ap *argparser.ArgParser, args []string, usagePrinter UsagePrinter) (*argparser.ArgParseResults, error) {\n\tapr, err := ap.Parse(args)\n\n\tif err != nil {\n\t\t// --help param\n\t\tif usagePrinter != nil {\n\t\t\tusagePrinter()\n\t\t}\n\n\t\treturn nil, err\n\t}\n\n\treturn apr, nil\n}", "title": "" }, { "docid": "58bfcdd544b1dc4e2c5deb00a5681809", "score": "0.6856675", "text": "func parseArgs() {\n\tfirstArgWithDash := 1\n\tfor i := 1; i < len(os.Args); i++ {\n\t\tfirstArgWithDash = i\n\n\t\tif len(os.Args[i]) > 0 && os.Args[i][0] == '-' {\n\t\t\tbreak\n\t\t} else {\n\t\t\tfilePaths = append(filePaths, os.Args[i])\n\t\t}\n\t}\n\n\tflag.CommandLine.Parse(os.Args[firstArgWithDash:])\n}", "title": "" }, { "docid": "ab19f47528001ab9182be3f76cb189b3", "score": "0.6848624", "text": "func ProcessArgs(cfg *Config) (u []string) {\n\tflag.Usage = func() {\n\t\tfmt.Println(\"Usage:\\nkdevpije user1,user2,alias3... [default|week|sprint]\")\n\t\tflag.PrintDefaults()\n\t}\n\tvar debugFlag = flag.Bool(\"debug\", false, \"Print logs to stderr\")\n\tvar reloadData = flag.Bool(\"reloadData\", false, \"Download list of employees again\")\n\tflag.Parse() // Scan the arguments list\n\n\tif !*debugFlag {\n\t\tlog.SetOutput(ioutil.Discard)\n\t}\n\tlog.Println(\"Processing arguments\")\n\tcfg.ReloadData = *reloadData\n\temps := flag.Arg(0)\n\tif emps == \"\" {\n\t\tflag.PrintDefaults()\n\t\treturn\n\t}\n\tu = strings.Split(emps, \",\")\n\tu = employees.ExpandFiveTimes(u, cfg.Aliases)\n\n\ttimeframe := flag.Arg(1)\n\tif timeframe == \"\" {\n\t\ttimeframe = \"default\"\n\t}\n\ttf, ok := cfg.Intervals[timeframe]\n\tif !ok {\n\t\ttf = 1\n\t}\n\tcfg.TimeFrame = tf\n\tcfg.PDConfig.TimeFrame = cfg.TimeFrame\n\tlog.Println(\"Processed config:\", cfg)\n\treturn\n}", "title": "" }, { "docid": "18188ef57c6a7fa87367b9978e80c9c2", "score": "0.6837887", "text": "func Parse(args []string) Arguments {\n\tnargs := make([]string, 0)\n\tfor _, arg := range args {\n\t\tif !strings.HasPrefix(arg, \"-\") {\n\t\t\tnargs = append(nargs, arg)\n\t\t}\n\t}\n\treturn Arguments{bin: nargs[0], args: nargs[1:]}\n}", "title": "" }, { "docid": "e32d5519b2e8dea01cf653a167cb10d8", "score": "0.68177915", "text": "func ParseArguments() {\n\t/** Initializing system */\n\tconfigParams := InitSystem()\n\n\t/** Parse arguments */\n\tglobalFlags()\n\tkubectl(configParams)\n\tdockerBuild(configParams)\n\thelm(configParams)\n\n\t/** Default behavior */\n\tAlert(\"ERR\", \"This command doesn't exists!\", false)\n\tos.Exit(1)\n}", "title": "" }, { "docid": "ded1b0f08ee313a837b3d400005594b1", "score": "0.6815792", "text": "func (opts *ToolOptions) ParseArgs(args []string) ([]string, error) {\n\tLogSensitiveOptionWarnings(args)\n\n\tif err := opts.ParseConfigFile(args); err != nil {\n\t\treturn []string{}, err\n\t}\n\n\targs, err := opts.CallArgParser(args)\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\tif opts.SSLAllowInvalidCert || opts.SSLAllowInvalidHost {\n\t\tlog.Logvf(log.Always, deprecationWarningSSLAllow)\n\t}\n\n\tif opts.parsePositionalArgsAsURI {\n\t\targs, err = opts.setURIFromPositionalArg(args)\n\t\tif err != nil {\n\t\t\treturn []string{}, err\n\t\t}\n\t}\n\n\tfailpoint.ParseFailpoints(opts.Failpoints)\n\n\terr = opts.NormalizeOptionsAndURI()\n\tif err != nil {\n\t\treturn []string{}, err\n\t}\n\n\treturn args, err\n}", "title": "" }, { "docid": "180fb0c1f242d4ebe723e00be9865a55", "score": "0.6811688", "text": "func ParseArgs() {\n\t// Set function to be called if parsing fails.\n\tflag.Usage = usage\n\n\t// Parse CLI arguments.\n\tflag.Parse()\n\n\t// Print usage text and exit if:\n\t// - browser is neither \"chrome\" or \"firefox\",\n\t// - env is neither \"dev\", \"uat\" or \"preprod\",\n\t// - headless is neither \"false\" or \"true\",\n\t// - displayAddress is not valid IP address,\n\t// - port is not a number between 1024-65535\n\tisHeadless, err := strconv.ParseBool(*headless)\n\tif !(validBrowserArg() && validEnvArg() && err == nil && validDisplayArg() && (*port >= 1024 && *port <= 65535)) {\n\t\tusage()\n\t\tos.Exit(2)\n\t}\n\n\t// Set conf global variable.\n\tconf = Conf{\n\t\tBrowser: Browser(*browser),\n\t\tEnv: Env(*env),\n\t\tHeadless: isHeadless,\n\t\tDisplayAddress: *displayAddress,\n\t\tPort: *port,\n\t\tWidth: *width,\n\t\tHeight: *height,\n\t}\n\n\t// Set caps global variable.\n\tSetCaps(conf)\n}", "title": "" }, { "docid": "8268ef5fde4762b4e6240341b66d3185", "score": "0.67591476", "text": "func parseFlagsAndArgs() error {\n\t// parse flags\n\tflag.Parse()\n\tif cfg.Path == \"\" {\n\t\treturn errors.New(\"no config path given\")\n\t}\n\tif cfg.ServerID == \"\" {\n\t\treturn errors.New(\"no server identifier given\")\n\t}\n\n\t// parse positional args\n\n\tcfg.Endpoints = flag.Args()\n\tif len(cfg.Endpoints) < 1 {\n\t\treturn errors.New(\"at least one etcd endpoint has to be given\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f1f8fd18da600e5514ae0f8c99ebf4f7", "score": "0.674336", "text": "func parseArguments() (port int, userAgent string, cacheCapacity int, cacheExpiration time.Duration, apiOnly bool) {\n\tflag.BoolVar(&apiOnly, \"api-only\", false, \"Expose only the API end points\")\n\tflag.IntVar(&port, \"port\", 8080, \"Bind webserver to given port.\")\n\tflag.StringVar(&userAgent, \"user-agent\",\n\t\t\"Mozilla/5.0 (compatible; UrlExpander/1.0)\",\n\t\t\" User agent string used when translating shortened url.\")\n\tflag.IntVar(&cacheCapacity, \"cache-capacity\",\n\t\t100000,\n\t\t\"Expanded urls are cached for repeated queries. Using this option cache capacity can be set.\")\n\n\tvar cacheExpirationMinutes int\n\tflag.IntVar(&cacheExpirationMinutes, \"cache-expiration\",\n\t\t60,\n\t\t\"Set cache expiration time in minutes.\")\n\n\thelp := flag.Bool(\"help\", false, \"Print usage.\")\n\tflag.Parse()\n\n\tcacheExpiration = time.Duration(cacheExpirationMinutes) * time.Minute\n\n\t// print usage\n\tif *help {\n\t\tfmt.Fprintf(os.Stderr, \"Usage of %s:\\n\", os.Args[0])\n\t\tflag.PrintDefaults()\n\t\tsyscall.Exit(0)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "56c3f2fde9bb25f9b86117dac7a2aae5", "score": "0.67140037", "text": "func (f *Flags) ParseArgs(args []string) {\n\tf.StringVarP(&f.ConfigFile, \"config\", \"c\", os.Getenv(DefaultEnvPrefix+\"_CONFIG_FILE\"), f.Name()+\" Config File\")\n\tf.BoolVar(&f.testSnaps, \"snaps\", false, f.Name()+\"Test Snapshots\")\n\tf.StringVarP(&f.Mode, \"mode\", \"m\", \"prod\", \"Selects Notifiarr URL: test, dev, prod\")\n\tf.StringVarP(&f.EnvPrefix, \"prefix\", \"p\", DefaultEnvPrefix, \"Environment Variable Prefix\")\n\tf.BoolVarP(&f.verReq, \"version\", \"v\", false, \"Print the version and exit.\")\n\tf.BoolVar(&f.pslist, \"ps\", false, \"Print the system process list; useful for 'process' service checks\")\n\n\tif runtime.GOOS == windows {\n\t\tf.BoolVar(&f.restart, \"restart\", false, \"This is used by auto-update, do not call it\")\n\t\tf.BoolVar(&f.updated, \"updated\", false, \"This flags causes the app to print an updated message\")\n\t}\n\n\tf.Parse(args) // nolint: errcheck\n}", "title": "" }, { "docid": "b8692305cc79a01a3172ab0c1836fb27", "score": "0.66486675", "text": "func ParseArgs(args []string) Args {\n\tif len(args) == 1 {\n\t\treturn Args{false, false}\n\t}\n\tcfg := Args{false, false}\n\tfor i := 1; i < len(args); i++ {\n\t\targ := args[i]\n\t\tif arg == \"-n\" || arg == \"--nohup\" {\n\t\t\tcfg.IgnoreHangups = true\n\t\t} else if arg == \"-h\" || arg == \"--help\" {\n\t\t\tprintHelp()\n\t\t\tos.Exit(0)\n\t\t} else if arg == \"-v\" || arg == \"--version\" {\n\t\t\tfmt.Printf(\"shego %s\\n\", Version)\n\t\t\tos.Exit(0)\n\t\t} else if arg == \"-V\" || arg == \"--verbose\" {\n\t\t\tcfg.IsVerbose = true\n\t\t} else {\n\t\t\tfmt.Fprintf(os.Stderr, \"error: unknown option \\\"%s\\\"\\n\", arg)\n\t\t\tos.Exit(0)\n\t\t}\n\t}\n\treturn cfg\n}", "title": "" }, { "docid": "3f5c8c4cffdd891f85212b7ee0e9a224", "score": "0.6641841", "text": "func (flag *Flags) ParseArgs(args []string) {\n\t*flag = Flags{FlagSet: pflag.NewFlagSet(Binary, pflag.ExitOnError)}\n\tflag.Usage = func() {\n\t\tfmt.Printf(\"Usage: %s [--config=filepath] [--version] [--debug]\", Binary)\n\t\tflag.PrintDefaults()\n\t}\n\tflag.StringVarP(&flag.ConfigFile, \"config\", \"c\", \"/usr/local/etc/\"+Binary+\".conf\", \"Config File\")\n\tflag.BoolVarP(&flag.VersionReq, \"version\", \"v\", false, \"Print the version and exit\")\n\t_ = flag.Parse(args) // flag.ExitOnError means this will never return != nil\n}", "title": "" }, { "docid": "465a4b94dd39eaeb2e43e81fdac179a1", "score": "0.6638518", "text": "func ParseArguments() (err error) {\n\targuments := os.Args[1:]\n\tif len(arguments) == 6 {\n\t\tgenesisHash = arguments[0]\n\t\tnumLeadingZeroes, err = strconv.Atoi(arguments[1])\n\t\tcheckError(\"Error in ParseArguments(), strconv.Atoi(arguments[1]):\", err, true)\n\t\tnodeIpAndStatuses = parseNodeFile(arguments[2])\n\t\tmyNodeID, err = strconv.Atoi(arguments[3])\n\t\tcheckError(\"Error in ParseArguments(), strconv.Atoi(arguments[3]):\", err, true)\n\t\tlistenKVNodeIpPort = arguments[4]\n\t\tlistenClientIpPort = arguments[5]\n\t} else {\n\t\tusage := \"Usage: {go run kvnode.go [ghash] [num-zeroes] [nodesFile] [nodeID]\" +\n\t\t\t\" [listen-node-in IP:port] [listen-client-in IP:port]}\"\n\t\terr = fmt.Errorf(usage)\n\t}\n\treturn\n}", "title": "" }, { "docid": "a9b2b2559ec686a1a970d652a78bcd74", "score": "0.66261923", "text": "func (mr *messageResponse) ParseArgs(Groups GroupMgr) (args Arguments, msg string, ok bool) {\n\tmr.FromMaster = false\n\t//The admin of the bot can be changed via configs, but they are defined by\n\t//the id google gives them, incase their name changes, and how they reach out.\n\t//i.e. The bot will only recognize the admin if messaged via DM. an admin\n\t//shouldn't be doing admin things in front of the common folk.\n\tif mr.Room.Type == \"DM\" && mr.Message.Sender.GID == MasterID {\n\t\tmr.FromMaster = true\n\t\t//This prepends the botname to the message so that the admin doesn't have to\n\t\t//@ the bot when DM-ing it. The conditional allows you to do either.\n\t\tif !strings.HasPrefix(mr.Message.Text, BotName) {\n\t\t\tmr.Message.Text = BotName + \" \" + mr.Message.Text\n\t\t}\n\t}\n\n\ttempArgs := strings.Fields(mr.Message.Text)\n\tnArgs := len(tempArgs)\n\tif nArgs < 2 {\n\t\tmsg = BotName + \" seems to have been called with no params. Just a heads up.\"\n\t\tok = false\n\n\t\treturn\n\t}\n\n\targs = make(Arguments)\n\tok = true\n\tmsg = \"\"\n\n\tif tempArgs[0] == BotName {\n\t\toption := strings.ToLower(tempArgs[1])\n\n\t\t//I'd like to find a cleaner way to triage the string, but this seems\n\t\t//to be the best as of now. I do worry, that this could get hard to maintain.\n\t\tif option != \"create\" &&\n\t\t\toption != \"add\" &&\n\t\t\toption != \"remove\" &&\n\t\t\toption != \"disband\" &&\n\t\t\toption != \"restrict\" &&\n\t\t\toption != \"list\" &&\n\t\t\toption != \"syncgroup\" &&\n\t\t\toption != \"syncallgroups\" &&\n\t\t\toption != \"schedule\" &&\n\t\t\toption != \"usage\" &&\n\t\t\toption != \"help\" {\n\t\t\tif Groups.IsGroup(tempArgs[1]) {\n\t\t\t\targs[\"action\"] = \"notify\"\n\t\t\t\targs[\"groupName\"] = tempArgs[1]\n\t\t\t} else {\n\t\t\t\tmsg = fmt.Sprintf(\"Invalid option received. I'm not sure what to do about %q.\", tempArgs[1])\n\t\t\t\tok = false\n\t\t\t}\n\t\t} else {\n\t\t\targs[\"action\"] = option\n\t\t}\n\t} else {\n\t\targs[\"action\"] = \"notify\"\n\t}\n\n\tif args[\"action\"] == \"schedule\" {\n\t\terr := parseScheduleArgs(Groups, tempArgs, &args)\n\t\tif err != nil {\n\t\t\tok = false\n\t\t\tmsg = err.Error()\n\t\t\treturn\n\t\t}\n\t} else {\n\t\tif nArgs < 3 {\n\t\t\targs[\"groupName\"] = \"\"\n\t\t} else {\n\t\t\targs[\"groupName\"] = tempArgs[2]\n\t\t}\n\t}\n\n\t//Logic introduced for adding/removing yourself from a group\n\tif args[\"action\"] == \"add\" || args[\"action\"] == \"remove\" || args[\"action\"] == \"create\" {\n\t\tfor _, item := range tempArgs {\n\t\t\tif strings.ToLower(item) == \"self\" {\n\t\t\t\targs[\"self\"] = \"self\"\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\t//This one is a bit jank, I'll admit (PR's Welcome :D). What's happening is gi\n\t//is a value set to be arbitrarily high, it stands for group index. The for loop\n\t//loops through the words given by the message text, separated by whitespace. When\n\t//When it identified the bot name, it sets gi. After gi is set, the next thing should\n\t//be the group name. So the loop just sets the next item to be the group name and\n\t//proceeds\n\tif args[\"action\"] == \"notify\" {\n\t\tgi := 100000\n\n\t\tfor i, v := range tempArgs {\n\t\t\tif v == BotName {\n\t\t\t\tgi = i\n\t\t\t}\n\n\t\t\tif i == gi+1 {\n\t\t\t\targs[\"groupName\"] = v\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "0bf26881c84ddc4f3f7525330f0eea31", "score": "0.66065246", "text": "func (j *DSGit) ParseArgs(ctx *Ctx) (err error) {\n\tj.DS = Git\n\tprefix := \"DA_GIT_\"\n\tj.URL = os.Getenv(prefix + \"URL\")\n\tj.SingleOrigin = StringToBool(os.Getenv(prefix + \"SINGLE_ORIGIN\"))\n\tj.PairProgramming = StringToBool(os.Getenv(prefix + \"PAIR_PROGRAMMING\"))\n\tif os.Getenv(prefix+\"REPOS_PATH\") != \"\" {\n\t\tj.ReposPath = os.Getenv(prefix + \"REPOS_PATH\")\n\t} else {\n\t\tj.ReposPath = GitDefaultReposPath\n\t}\n\tif os.Getenv(prefix+\"CACHE_PATH\") != \"\" {\n\t\tj.CachePath = os.Getenv(prefix + \"REPOS_PATH\")\n\t} else {\n\t\tj.CachePath = GitDefaultCachePath\n\t}\n\tj.NoSSLVerify = StringToBool(os.Getenv(prefix + \"NO_SSL_VERIFY\"))\n\tif j.NoSSLVerify {\n\t\tNoSSLVerify()\n\t}\n\treturn\n}", "title": "" }, { "docid": "4bf04d4b4ea235021488a91a825a71f1", "score": "0.66020316", "text": "func parseArgs() string {\n\tflag.BoolVar(&Verbose, \"v\", false, \"verbose output\")\n\tflag.Parse()\n\n\t// Validate input args\n\tif flag.NArg() == 1 {\n\t\treturn flag.Arg(0)\n\t} else if flag.NArg() < 1 {\n\t\tfmt.Println(\"Error: missing URL\")\n\t\tcliUsage()\n\t\tos.Exit(1)\n\t} else {\n\t\tfmt.Printf(\"Error: too many arguments. Expected 1, got %d\\n\", flag.NArg())\n\t\tcliUsage()\n\t\tos.Exit(1)\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "b7576cac955062f2522c317de161115d", "score": "0.6573838", "text": "func parseArguments() service.Arguments {\n args := service.ParseArguments()\n _, err := args.IsValid()\n\n if err == nil {\n return args\n }\n\n if service.IsUnknownArgumentsError(err) {\n flag.Usage()\n os.Exit(ERR_WRONG_USAGE)\n return args\n }\n\n StdErr.Write([]byte(err.Error() + \"\\n\"))\n os.Exit(ERR_WRONG_USAGE)\n\n return args\n}", "title": "" }, { "docid": "318a4cdeb2ae073328a51c6076cb4adb", "score": "0.65686446", "text": "func parseArgs(args []string) CmdLineArgs {\n\tif len(args) == 0 {\n\t\tfmt.Fprintln(os.Stderr, \"Group and actions not specified\")\n\t\tUsage()\n\t\tos.Exit(1)\n\t} else if len(args) == 1 {\n\t\tfmt.Fprintln(os.Stderr, \"Action on group must be specified\")\n\t\tUsage()\n\t\tos.Exit(1)\n\t}\n\n\tvar actionType GroupActionType\n\tvar action GroupAction\n\tvar credentialsPath string\n\tvar tokenPath string\n\tvar groupName string\n\n\tgroupName = args[0]\n\n\tswitch strings.ToLower(args[1]) {\n\tcase \"check\":\n\t\tactionType = CHECK\n\tcase \"stat\":\n\t\tactionType = STAT\n\tcase \"get\":\n\t\tactionType = GET\n\tcase \"send\":\n\t\tactionType = SEND\n\tdefault:\n\t\tfmt.Fprintf(os.Stderr, \"%s is not a known argument\\n\", args[1])\n\t\tUsage()\n\t\tos.Exit(1)\n\t}\n\n\tif (actionType == CHECK || actionType == STAT) && len(args) > 2 {\n\t\tfmt.Fprintln(os.Stderr, \"Ignoring trailing junk after argument\",\n\t\t\tstrings.Join(args[2:], \" \"))\n\t} else if actionType == GET || actionType == SEND {\n\t\tif len(args) > 2 {\n\t\t\tswitch strings.ToLower(args[2]) {\n\t\t\tcase \"email\":\n\t\t\t\taction = EMAIL\n\t\t\tcase \"text\":\n\t\t\t\taction = TEXT\n\t\t\tdefault:\n\t\t\t\tfmt.Fprintf(os.Stderr, \"%s not not a know argument for get or send\\n\",\n\t\t\t\t\targs[2])\n\t\t\t}\n\t\t} else {\n\t\t\tfmt.Fprintln(os.Stderr, \"get and send actions required additional arguments\")\n\t\t\tUsage()\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\tif len(args) > 3 {\n\t\tcredentialsSet := false\n\t\ttokenSet := false\n\t\tfor _, arg := range args[3:] {\n\t\t\tif strings.HasPrefix(arg, \"--credentials\") {\n\t\t\t\tif !credentialsSet {\n\t\t\t\t\tcredentialsSet = true\n\t\t\t\t\tcredentialsPath = strings.TrimPrefix(\"--credentials\", arg)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"Credentials path is already set\")\n\t\t\t\t\tUsage()\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t} else if strings.HasPrefix(arg, \"-c\") {\n\t\t\t\tif !credentialsSet {\n\t\t\t\t\tcredentialsSet = true\n\t\t\t\t\tcredentialsPath = strings.TrimPrefix(\"-c\", arg)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"Credentials path is already set\")\n\t\t\t\t\tUsage()\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t} else if strings.HasPrefix(arg, \"--Token\") {\n\t\t\t\tif !tokenSet {\n\t\t\t\t\ttokenSet = true\n\t\t\t\t\tcredentialsPath = strings.TrimPrefix(\"--Token\", arg)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"Token path is already set\")\n\t\t\t\t\tUsage()\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t} else if strings.HasPrefix(arg, \"-t\") {\n\t\t\t\tif !tokenSet {\n\t\t\t\t\ttokenSet = true\n\t\t\t\t\tcredentialsPath = strings.TrimPrefix(\"-t\", arg)\n\t\t\t\t} else {\n\t\t\t\t\tfmt.Fprintf(os.Stderr, \"Token path is already set\")\n\t\t\t\t\tUsage()\n\t\t\t\t\tos.Exit(1)\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tfmt.Fprintf(os.Stderr, \"%s is not a known option\\n\", arg)\n\t\t\t\tUsage()\n\t\t\t\tos.Exit(1)\n\t\t\t}\n\t\t}\n\t} else {\n\t\tcredentialsPath = \"credentials.json\"\n\t\ttokenPath = \"token.json\"\n\t}\n\n\treturn CmdLineArgs{\n\t\tGroupName: groupName,\n\t\tActionType: actionType,\n\t\tAction: action,\n\t\tCredentialsPath: credentialsPath,\n\t\tTokenPath: tokenPath,\n\t}\n}", "title": "" }, { "docid": "2a360666e2146ea78abc8467c75fe4a8", "score": "0.65185636", "text": "func (p *argParser) Parse(args interface{}) (interface{}, error) {\n\tif p == nil {\n\t\treturn nilParseArguments(args)\n\t}\n\tparsed := reflect.New(p.Type).Elem()\n\tif err := p.FromJSON(args, parsed); err != nil {\n\t\treturn nil, err\n\t}\n\treturn parsed.Interface(), nil\n}", "title": "" }, { "docid": "c8bca5a63ab8da5fec96791cb0318e4a", "score": "0.6516273", "text": "func parseArgs(q *dany.Query, args []string, typeMap map[string]bool, testMode bool) ([]string, error) {\n\t// Regexps\n\treAtPrefix := regexp.MustCompile(\"^@\")\n\treDot := regexp.MustCompile(\"\\\\.\")\n\treComma := regexp.MustCompile(\",\")\n\n\t// Args: 1 domain (required); 1 @-prefixed server ip (optional); 1 comma-separated list of types (optional)\n\tvar newargs []string\n\tfor _, arg := range args {\n\t\targIsRRType := false\n\t\t// Check whether non-dotted args are bare RRtypes\n\t\tif !reDot.MatchString(arg) {\n\t\t\tif _, ok := typeMap[arg]; ok {\n\t\t\t\targIsRRType = true\n\t\t\t}\n\t\t}\n\t\t// Check for @<ip> server argument\n\t\t// Deprecated: use -s <ip> option instead\n\t\tif reAtPrefix.MatchString(arg) {\n\t\t\tif q.Server != \"\" {\n\t\t\t\terr := fmt.Errorf(\"Error: argument %q looks like `@<ip>`, but we already have %q\",\n\t\t\t\t\targ, q.Server)\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif !testMode {\n\t\t\t\t// Deprecation warning\n\t\t\t\tfmt.Fprintln(os.Stderr, \"Warning: the @<ip> server argument is deprecated and will be removed in a future release\")\n\t\t\t\tfmt.Fprintln(os.Stderr, \"Please use the '-s/--server <ip>' option instead\")\n\t\t\t}\n\t\t\tserverIP := net.ParseIP(arg[1:])\n\t\t\tif serverIP == nil {\n\t\t\t\terr := fmt.Errorf(\"Error: argument %q looks like `@<ip>`, but unable to parse ip address\",\n\t\t\t\t\targ)\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tq.Server = net.JoinHostPort(serverIP.String(), dnsPort)\n\t\t\tcontinue\n\t\t}\n\t\t// Check for <RR>[,<RR>...] types argument\n\t\t// Deprecated: use -t <types> option instead\n\t\tif argIsRRType || reComma.MatchString(arg) {\n\t\t\tif len(q.Types) != 0 {\n\t\t\t\terr := fmt.Errorf(\"Error: argument %q looks like types list, but we already have %q\",\n\t\t\t\t\targ, q.Types)\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tif !testMode {\n\t\t\t\t// Deprecation warning\n\t\t\t\tfmt.Fprintln(os.Stderr, \"Warning: the [Types] argument is deprecated and will be removed in a future release\")\n\t\t\t\tfmt.Fprintln(os.Stderr, \"Please use the '-t/--types <types>' option instead\")\n\t\t\t}\n\t\t\t// Check all types are valid\n\t\t\ttypes := strings.Split(arg, \",\")\n\t\t\terr := checkValidTypes(types, typeMap)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tq.Types = types\n\t\t\tcontinue\n\t\t}\n\t\t// Otherwise assume hostname\n\t\tnewargs = append(newargs, arg)\n\t}\n\n\treturn newargs, nil\n}", "title": "" }, { "docid": "7f070f8c3a30dca3153fac272e179e76", "score": "0.6494212", "text": "func Parse() *Args {\n\treturn New(os.Args)\n}", "title": "" }, { "docid": "fdcf445bd44ed7fcc2cda9feb67602d6", "score": "0.64905834", "text": "func ParseArgs(c *cli.Context) error {\n\tMHConfigFile = c.String(MHConfigFileStr)\n\tb, err := ioutil.ReadFile(MHConfigFile)\n\tif err != nil {\n\t\tlog.Fatalln(\"config file read error \", err)\n\t}\n\tconfig := ConfigOptions{\n\t\tVerbose: Verbose,\n\t\tKafkaBrokerList: KafkaBrokerList,\n\t\tDataMgrIpAddress: DataMgrIpAddress,\n\t\tDataMgrPort: DataMgrPort,\n\t\tLogFile: LogFile,\n\t\tKafkaTopic: KafkaTopic,\n\t\tSendToDM: SendToDM,\n\t\tSendToQA: SendToQA,\n\t}\n\terr = yaml.Unmarshal(b, &config)\n\tif err != nil {\n\t\tlog.Fatalf(\"Config file %v parse error: %v\", MHConfigFile, err)\n\t}\n\tKafkaBrokerList = config.KafkaBrokerList\n\tDataMgrIpAddress = config.DataMgrIpAddress\n\tDataMgrPort = config.DataMgrPort\n\tVerbose = config.Verbose\n\tLogFile = config.LogFile\n\tKafkaTopic = config.KafkaTopic\n\tSendToDM = config.SendToDM\n\tSendToQA = config.SendToQA\n\tif LogFile != \"\" {\n\t\tLogger = log.New(os.Stderr, \"[jFlow] \", log.Ldate|log.Ltime)\n\t\tf, err := os.OpenFile(LogFile, os.O_RDWR|os.O_CREATE|os.O_APPEND, 0666)\n\t\tif err != nil {\n\t\t\tLogger.Println(err)\n\t\t} else {\n\t\t\tLogger.SetOutput(f)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f457155fc9e6b3952e54f28156408601", "score": "0.6475698", "text": "func ParseArgs(jsonArr []byte, args ...interface{}) (count int, err error) {\n\td := json.NewDecoder(bytes.NewReader(jsonArr))\n\tt, err := d.Token()\n\tif t != json.Delim('[') {\n\t\treturn 0, errors.New(\"jsonArr must be a JSON array\")\n\t}\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tfor _, arg := range args {\n\t\tif !d.More() {\n\t\t\tbreak\n\t\t}\n\n\t\tif err := d.Decode(arg); err != nil {\n\t\t\treturn count, err\n\t\t}\n\t\tcount++\n\t}\n\treturn count, nil\n}", "title": "" }, { "docid": "4ffe448cdb72b058afcaf2ef4d1878ef", "score": "0.6450021", "text": "func parseArgs(args []string) (cmd uint16, input []string, err error) {\n\thasArgs := len(args) > 1\n\n\tif !hasArgs {\n\t\terr = errors.New(\"no command supplied\")\n\t\treturn 0, nil, err\n\t}\n\n\tinput = strings.Split(args[1], \",\")\n\tvar cmd64 uint64\n\tcmd64, err = strconv.ParseUint(input[0], 10, 16)\n\tcmd = uint16(cmd64)\n\tinput = input[1:]\n\n\treturn cmd, input, err\n}", "title": "" }, { "docid": "ed04baccd6ad73ef4e96a8ffcbcb1048", "score": "0.6447361", "text": "func (r Root) Args(_ *cobra.Command, args []string) error {\n\tnumberOfArgs := 1\n\tnumberOfFields := 6\n\n\tif len(args) > numberOfArgs {\n\t\treturn ErrTooManyArgs\n\t}\n\n\tif len(args) < numberOfArgs {\n\t\treturn ErrTooLittleArgs\n\t}\n\n\tfields := strings.Split(args[0], \" \")\n\tif len(fields) != numberOfFields {\n\t\treturn ErrInvalidExpression\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e4d67467e0a99db386cb5a42ff28dab2", "score": "0.64177984", "text": "func PluginArgsParse(rawArgs string) []string {\n\tss := strings.Split(rawArgs, \"\\\\,\")\n\n\tout := [][]string{}\n\tfor _, s := range ss {\n\t\tcleanArgs := []string{}\n\t\tfor _, arg := range strings.Split(s, \",\") {\n\t\t\targ = strings.Trim(arg, \" \")\n\t\t\targ = strings.Trim(arg, \"\\\"\")\n\t\t\targ = strings.Trim(arg, \"'\")\n\t\t\tcleanArgs = append(cleanArgs, arg)\n\t\t}\n\t\tout = append(out, cleanArgs)\n\t}\n\n\tret := []string{}\n\ttail := \"\"\n\n\tfor _, x := range out {\n\t\tfor j, y := range x {\n\t\t\tif j == 0 {\n\t\t\t\tif tail != \"\" {\n\t\t\t\t\tret = append(ret, tail+\",\"+y)\n\t\t\t\t\ttail = \"\"\n\t\t\t\t} else {\n\t\t\t\t\tret = append(ret, y)\n\t\t\t\t}\n\t\t\t} else if j == len(x)-1 {\n\t\t\t\ttail = y\n\t\t\t} else {\n\t\t\t\tret = append(ret, y)\n\t\t\t}\n\t\t}\n\t}\n\n\tif tail != \"\" {\n\t\tret = append(ret, tail)\n\t}\n\n\treturn ret\n}", "title": "" }, { "docid": "9e4cf735c4909812f584a671596dc1e0", "score": "0.6369441", "text": "func (j *DSRocketchat) ParseArgs(ctx *Ctx) (err error) {\n\tj.DS = Rocketchat\n\tprefix := \"DA_ROCKETCHAT_\"\n\tj.URL = os.Getenv(prefix + \"URL\")\n\tj.Channel = os.Getenv(prefix + \"CHANNEL\")\n\tj.User = os.Getenv(prefix + \"USER\")\n\tj.Token = os.Getenv(prefix + \"TOKEN\")\n\tAddRedacted(j.User, false)\n\tAddRedacted(j.Token, false)\n\tif ctx.Env(\"MAX_ITEMS\") != \"\" {\n\t\tmaxItems, err := strconv.Atoi(ctx.Env(\"MAX_ITEMS\"))\n\t\tFatalOnError(err)\n\t\tif maxItems > 0 {\n\t\t\tj.MaxItems = maxItems\n\t\t}\n\t} else {\n\t\tj.MaxItems = RocketchatDefaultMaxItems\n\t}\n\tif ctx.Env(\"MIN_RATE\") != \"\" {\n\t\tminRate, err := strconv.Atoi(ctx.Env(\"MIN_RATE\"))\n\t\tFatalOnError(err)\n\t\tif minRate > 0 {\n\t\t\tj.MinRate = minRate\n\t\t}\n\t} else {\n\t\tj.MinRate = RocketchatDefaultMinRate\n\t}\n\tj.WaitRate = StringToBool(os.Getenv(prefix + \"WAIT_RATE\"))\n\tj.NoSSLVerify = StringToBool(os.Getenv(prefix + \"NO_SSL_VERIFY\"))\n\tif j.NoSSLVerify {\n\t\tNoSSLVerify()\n\t}\n\tj.SingleOrigin = StringToBool(os.Getenv(prefix + \"SINGLE_ORIGIN\"))\n\treturn\n}", "title": "" }, { "docid": "13e053cba0681a9f1833e0812c9887a2", "score": "0.6355011", "text": "func process_arguments() {\n\tfmt.Println(\"Processing arguments\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "abe508cba8fb0f2ec28353e8c6f038e7", "score": "0.6341772", "text": "func ParseArgs() bool {\n\tflag.Usage = usage\n\tflag.Parse()\n\tif *help {\n\t\tflag.Usage()\n\t\treturn false\n\t}\n\n\tif *clientType != \"subscriber\" && *clientType != \"publisher\" {\n\t\tfmt.Printf(\"Need to specify a client type: publisher or subscriber.\\n\")\n\t\treturn false\n\t}\n\n\tif *configFile == \"\" {\n\t\tfmt.Printf(\"Need to specify a config file.\\n\")\n\t\treturn false\n\t}\n\n\tif *clientType == \"publisher\" {\n\n\t\tswitch *pubType {\n\t\tcase \"AB\":\n\t\t\tpublicationType = common.AB\n\t\tcase \"BRB\":\n\t\t\tpublicationType = common.BRB\n\t\tcase \"Chain\":\n\t\t\tpublicationType = common.Chain\n\t\tdefault:\n\t\t\tpublicationType = common.AB\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "28c1bf62901da89f3a785c8d86582d7c", "score": "0.6337407", "text": "func Parse(args *[]string) {\n\tif hasParsed == true {\n\t\treturn\n\t}\n\n\thasParsed = true\n\tflag.Parse()\n\n\tflagArgs := flag.Args()\n\treflect.ValueOf(args).Elem().Set(reflect.ValueOf(flagArgs))\n}", "title": "" }, { "docid": "b2d57973279be22570699c192f4e94f7", "score": "0.633547", "text": "func parseArguments() (int, int, int) {\n\tcontracts.Require(func() bool {\n\t\treturn len(os.Args) > 3\n\t}, \"The program receives number of producers, consumers and buffer size.\"+np+help)\n\n\tvar nProd, errProd = strconv.Atoi(os.Args[1])\n\tvar nCons, errCons = strconv.Atoi(os.Args[2])\n\tvar bufferSize, errBuffer = strconv.Atoi(os.Args[3])\n\n\tcontracts.Require(func() bool {\n\t\tif errProd == nil && errCons == nil && errBuffer == nil {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}, \"Arguments must be int.\"+np+help)\n\n\treturn nProd, nCons, bufferSize\n}", "title": "" }, { "docid": "0ee42736b0849cb9ed788677f0c67a28", "score": "0.63322276", "text": "func (a *addIntTask) ParseKwargs(kwargs map[string]interface{}) error {\n\tkwargA, ok := kwargs[\"a\"]\n\tif !ok {\n\t\treturn fmt.Errorf(\"undefined kwarg a\")\n\t}\n\tkwargAFloat, ok := kwargA.(float64)\n\tif !ok {\n\t\treturn fmt.Errorf(\"malformed kwarg a\")\n\t}\n\ta.a = int(kwargAFloat)\n\tkwargB, ok := kwargs[\"b\"]\n\tif !ok {\n\t\treturn fmt.Errorf(\"undefined kwarg b\")\n\t}\n\tkwargBFloat, ok := kwargB.(float64)\n\tif !ok {\n\t\treturn fmt.Errorf(\"malformed kwarg b\")\n\t}\n\ta.b = int(kwargBFloat)\n\treturn nil\n}", "title": "" }, { "docid": "3ee4194ecc64342b176d32a7c241f11c", "score": "0.6310982", "text": "func ParseArgs() (*Arguments, error) {\n\tvar (\n\t\toldCSVFile string\n\t\tnewCSVFile string\n\t\touputCSVFile string\n\t\tshowVersion bool\n\t)\n\n\tflag.StringVar(&oldCSVFile, \"old\", \"old.csv\", \"old CSV file\")\n\n\tflag.StringVar(&newCSVFile, \"new\", \"new.csv\", \"new CSV file\")\n\n\tflag.StringVar(&ouputCSVFile, \"output\", \"output_diff.csv\", \"output CSV file\")\n\tflag.StringVar(&ouputCSVFile, \"o\", \"output_diff.csv\", \"output CSV file\")\n\n\tflag.BoolVar(&showVersion, \"version\", false, \"show version\")\n\tflag.BoolVar(&showVersion, \"v\", false, \"show version\")\n\n\tflag.Usage = func() {\n\n\t\tfmt.Fprintln(os.Stderr, \"\t-old | --old\", \"old CSV file\")\n\t\tfmt.Fprintln(os.Stderr, \"\t-new | --new\", \"new CSV file\")\n\t\tfmt.Fprintln(os.Stderr, \"\t-o | --o\", \"output CSV file\")\n\t\tfmt.Fprintln(os.Stderr, \"\t-v | --version\", \"show ngos version\")\n\n\t}\n\n\tflag.Parse()\n\n\tif len(oldCSVFile) <= 0 {\n\t\treturn &Arguments{Help: flag.Usage}, errors.New(\"\t(-old) arg required\")\n\t}\n\n\tif len(newCSVFile) <= 0 {\n\t\treturn &Arguments{Help: flag.Usage}, errors.New(\"\t(-new) arg required\")\n\t}\n\n\treturn &Arguments{\n\t\tOldCSVFile: oldCSVFile,\n\t\tNewCSVFile: newCSVFile,\n\t\tOutputCSVFile: ouputCSVFile,\n\t\tShowVersion: showVersion,\n\t\tHelp: flag.Usage,\n\t}, nil\n}", "title": "" }, { "docid": "7d235be4a6b7f1038ba1326e1f1b631c", "score": "0.63025653", "text": "func ParseArgs() (*WorkerConfig, error) {\n\t// Two modes\n\tdirectCommand := flag.NewFlagSet(\"direct\", flag.ExitOnError)\n\tindirectCommand := flag.NewFlagSet(\"indirect\", flag.ExitOnError)\n\n\t// Direct mode args\n\tdirectBlock := directCommand.String(\"block\", \"COMSM0010cloud\", \"block of data the nonce is appended to\")\n\tdirectLeadingZeros := directCommand.Int(\"d\", 20, \"number of leading zeros\")\n\tdirectTimeout := directCommand.Int(\"timeout\", 360, \"timeout in seconds\")\n\tdirectWorkers := directCommand.Int(\"n\", 1, \"number of workers\")\n\tdirectECS := directCommand.Bool(\"use-ecs\", false, \"use ecs as a task scheduler\")\n\n\t// Indirect mode args\n\tindirectBlock := indirectCommand.String(\"block\", \"COMSM0010cloud\", \"block of data the nonce is appended to\")\n\tindirectLeadingZeros := indirectCommand.Int(\"d\", 20, \"number of leading zeros\")\n\tindirectTimeout := indirectCommand.Int(\"timeout\", 360, \"timeout in seconds\")\n\tindirectConfidence := indirectCommand.Int(\"confidence\", 95, \"confidence in finding the result, as a percentage\")\n\tindirectECS := indirectCommand.Bool(\"use-ecs\", false, \"use ecs as a task scheduler\")\n\n\tif len(os.Args) < 2 {\n\t\tfmt.Println(\"direct or indirect subcommand is required\")\n\t\tos.Exit(1)\n\t}\n\n\tswitch os.Args[1] {\n\tcase \"direct\":\n\t\tdirectCommand.Parse(os.Args[2:])\n\tcase \"indirect\":\n\t\tindirectCommand.Parse(os.Args[2:])\n\tdefault:\n\t\tfmt.Println(\"[direct] mode\")\n\t\tdirectCommand.PrintDefaults()\n\t\tfmt.Println(\"\\n[indirect] mode\")\n\t\tindirectCommand.PrintDefaults()\n\t\tos.Exit(1)\n\t}\n\n\t// Validate results\n\tif directCommand.Parsed() {\n\t\tif len(*directBlock) == 0 {\n\t\t\treturn nil, errors.New(\"Invalid data block, must be non empty\")\n\t\t} else if *directLeadingZeros <= 0 {\n\t\t\treturn nil, errors.New(\"Invalid leading zeros, must be greater than 0\")\n\t\t} else if *directTimeout <= 0 {\n\t\t\treturn nil, errors.New(\"Invalid timeout, must be greater than 0\")\n\t\t} else if *directWorkers <= 0 || *directWorkers >= 32 {\n\t\t\treturn nil, errors.New(\"Invalid number of workers, must be in range [0, 32)\")\n\t\t}\n\n\t\treturn &WorkerConfig{\n\t\t\tBlock: directBlock,\n\t\t\tLeadingZeros: *directLeadingZeros,\n\t\t\tTimeout: *directTimeout,\n\t\t\tWorkers: *directWorkers,\n\t\t\tConfidence: 100,\n\t\t\tUseECS: *directECS,\n\t\t}, nil\n\t}\n\n\tif indirectCommand.Parsed() {\n\t\tif len(*indirectBlock) == 0 {\n\t\t\treturn nil, errors.New(\"Invalid data block, must be non empty\")\n\t\t} else if *indirectLeadingZeros <= 0 {\n\t\t\treturn nil, errors.New(\"Invalid leading zeros, must be greater than 0\")\n\t\t} else if *indirectTimeout <= 0 {\n\t\t\treturn nil, errors.New(\"Invalid timeout, must be greater than 0\")\n\t\t} else if *indirectConfidence <= 0 || *indirectConfidence > 100 {\n\t\t\treturn nil, errors.New(\"Invalid number of workers, must be in range [0, 100]\")\n\t\t}\n\n\t\tworkers := calculateWorkers(*indirectTimeout, *indirectConfidence)\n\t\tif workers >= 32 {\n\t\t\treturn nil, errors.New(\"Unable to satisfy constraints without using more than 32 workers\")\n\t\t}\n\n\t\treturn &WorkerConfig{\n\t\t\tBlock: indirectBlock,\n\t\t\tLeadingZeros: *indirectLeadingZeros,\n\t\t\tTimeout: *indirectTimeout,\n\t\t\tConfidence: *indirectConfidence,\n\t\t\tWorkers: workers,\n\t\t\tUseECS: *indirectECS,\n\t\t}, nil\n\t}\n\n\treturn nil, errors.New(\"Unable to parse CLI args\")\n}", "title": "" }, { "docid": "6a210d232f8b36dff901a692b052a454", "score": "0.6268883", "text": "func (p *CLIPacker) ParseArgs() bool {\n\n\tif p.Dir != nil && p.TargetBinary != nil && p.EntryFile != \"\" {\n\t\treturn false\n\t}\n\n\tbinname, err := filepath.Abs(osArgs[0])\n\terrorutil.AssertOk(err)\n\n\twd, _ := os.Getwd()\n\n\tp.Dir = flag.String(\"dir\", wd, \"Root directory for ECAL interpreter\")\n\tp.SourceBinary = flag.String(\"source\", binname, \"Filename for source binary\")\n\tp.TargetBinary = flag.String(\"target\", \"out.bin\", \"Filename for target binary\")\n\tshowHelp := flag.Bool(\"help\", false, \"Show this help message\")\n\n\tflag.Usage = func() {\n\t\tfmt.Fprintln(flag.CommandLine.Output())\n\t\tfmt.Fprintln(flag.CommandLine.Output(), fmt.Sprintf(\"Usage of %s pack [options] [entry file]\", os.Args[0]))\n\t\tfmt.Fprintln(flag.CommandLine.Output())\n\t\tflag.PrintDefaults()\n\t\tfmt.Fprintln(flag.CommandLine.Output())\n\t\tfmt.Fprintln(flag.CommandLine.Output(), \"This tool will collect all files in the root directory and \"+\n\t\t\t\"build a standalone executable from the given source binary and the collected files.\")\n\t\tfmt.Fprintln(flag.CommandLine.Output())\n\t}\n\n\tif len(os.Args) >= 2 {\n\t\tflag.CommandLine.Parse(osArgs[2:])\n\n\t\tif cargs := flag.Args(); len(cargs) > 0 {\n\t\t\tp.EntryFile = flag.Arg(0)\n\t\t} else {\n\t\t\t*showHelp = true\n\t\t}\n\n\t\tif *showHelp {\n\t\t\tflag.Usage()\n\t\t}\n\t}\n\n\treturn *showHelp\n}", "title": "" }, { "docid": "6a7f81e99aed0639933bcab38c48f1d9", "score": "0.62678593", "text": "func parseArgs(args []string) {\n\n\tvar i int\n\tvar arg string\n\nFORLOOP:\n\tfor i, arg = range args {\n\n\t\tswitch {\n\t\tcase arg == \"-h\":\n\t\t\tusage()\n\t\tcase arg == \"-v\":\n\t\t\tfmt.Println(Progname + \" version \" + Version)\n\t\t\tos.Exit(1)\n\t\tcase arg == \"+tcp\":\n\t\t\tOptions.tcp = true\n\t\tcase arg == \"+ignore\":\n\t\t\tOptions.ignore = true\n\t\tcase arg == \"+dnssec\":\n\t\t\tOptions.dnssec = true\n\t\t\tOptions.edns = true\n\t\tcase arg == \"+nocreate\":\n\t\t\tOptions.nocreate = true\n\t\tcase strings.HasPrefix(arg, \"@\"):\n\t\t\tOptions.servers = []string{arg[1:]}\n\t\tcase strings.HasPrefix(arg, \"-p\"):\n\t\t\tn, err := strconv.Atoi(arg[2:])\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid port (-p): %s\\n\", arg[2:])\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tOptions.port = n\n\t\tcase strings.HasPrefix(arg, \"+bufsize=\"):\n\t\t\tn, err := strconv.Atoi(strings.TrimPrefix(arg, \"+bufsize=\"))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid bufsize: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tOptions.bufsize = uint16(n)\n\t\t\tOptions.edns = true\n\t\tcase strings.HasPrefix(arg, \"+ednsflags=\"):\n\t\t\tn, err := strconv.Atoi(strings.TrimPrefix(arg, \"+ednsflags=\"))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid ednsflags: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tOptions.edns = true\n\t\t\tOptions.edns_flags = uint16(n)\n\t\tcase strings.HasPrefix(arg, \"+ednsopt=\"):\n\t\t\ts := strings.SplitN(strings.TrimPrefix(arg, \"+ednsopt=\"), \":\", 2)\n\t\t\tn, err := strconv.Atoi(s[0])\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid ednsopt: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\to := new(EdnsoptStruct)\n\t\t\to.code = uint16(n)\n\t\t\tif len(s) == 2 {\n\t\t\t\to.data = s[1]\n\t\t\t}\n\t\t\tOptions.edns = true\n\t\t\tOptions.edns_opt = append(Options.edns_opt, o)\n\t\tcase strings.HasPrefix(arg, \"+retry=\"):\n\t\t\tn, err := strconv.Atoi(strings.TrimPrefix(arg, \"+retry=\"))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid retry parameter: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tOptions.retries = n\n\t\tcase strings.HasPrefix(arg, \"+time=\"):\n\t\t\tn, err := strconv.Atoi(strings.TrimPrefix(arg, \"+time=\"))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid timeout parameter: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tOptions.itimeout = time.Duration(n) * time.Second\n\t\t\tOptions.tcptimeout = time.Duration(n) * time.Second\n\t\tcase strings.HasPrefix(arg, \"+parallel=\"):\n\t\t\tn, err := strconv.Atoi(strings.TrimPrefix(arg, \"+parallel=\"))\n\t\t\tif err != nil {\n\t\t\t\tfmt.Printf(\"Invalid #parallel queries: %s\\n\", arg)\n\t\t\t\tusage()\n\t\t\t}\n\t\t\tnumParallel = uint16(n)\n\t\tcase strings.HasPrefix(arg, \"-\"):\n\t\t\tfmt.Printf(\"Invalid option: %s\\n\", arg)\n\t\t\tusage()\n\t\tcase strings.HasPrefix(arg, \"+\"):\n\t\t\tfmt.Printf(\"Invalid option: %s\\n\", arg)\n\t\t\tusage()\n\t\tdefault:\n\t\t\tbreak FORLOOP\n\t\t}\n\n\t}\n\n\tif len(args)-i != 2 {\n\t\tfmt.Printf(\"ERROR: Exactly 2 arguments required: batchfile dbfile.\\n\")\n\t\tusage()\n\t}\n\n\tOptions.batchfile = args[i]\n\tOptions.dbfile = args[i+1]\n\treturn\n}", "title": "" }, { "docid": "479a59dc19dd51ebf56fa5e81f96fe85", "score": "0.6242832", "text": "func LoadArgs(argConfs []snlapi.Arg, cliArgs []string) (map[string]*string, error) {\n\targRes := map[string]*string{}\n\n\tam := map[string]snlapi.Arg{}\n\tposSl := []snlapi.Arg{}\n\tfor _, ac := range argConfs {\n\t\tif ac.Type == \"\" || ac.Type == \"bool\" || ac.Type == \"named\" {\n\t\t\tam[ac.Name] = ac\n\t\t\tcontinue\n\t\t}\n\t\tif ac.Type == \"pos\" {\n\t\t\tposSl = append(posSl, ac)\n\t\t\tcontinue\n\t\t}\n\t\t//TODO: Validation\n\t\treturn nil, fmt.Errorf(\"unknown argument type: name: '%s', type: '%s' should be one of: pos, bool, named\", ac.Name, ac.Type)\n\t}\n\n\tprevHandled := false\n\tpassedPosArg := 0\n\tfor i, cliArg := range cliArgs {\n\t\tif prevHandled {\n\t\t\tprevHandled = false\n\t\t\tcontinue\n\t\t}\n\t\t// Whitespace separated named or bool flag\n\t\tif match := argWsSeparatedRegex.MatchString(cliArg); match {\n\t\t\targName := strings.TrimLeft(cliArg, \"-\")\n\t\t\tc, exists := am[argName]\n\t\t\tif !exists {\n\t\t\t\treturn nil, fmt.Errorf(\"named argument does not exist: name '%s'\", argName)\n\t\t\t}\n\t\t\t// Bool flag\n\t\t\tif c.Type != \"\" && c.Type == \"bool\" {\n\t\t\t\ttrueVal := \"1\"\n\t\t\t\targRes[argName] = &trueVal\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif c.Type == \"\" || c.Type == \"named\" {\n\t\t\t\t// Named flag whitespace separated\n\t\t\t\tif i+1 >= len(cliArgs) {\n\t\t\t\t\treturn nil, fmt.Errorf(\"missing value after last named argument: name '%s'\", cliArg)\n\t\t\t\t}\n\t\t\t\targRes[argName] = &cliArgs[i+1]\n\t\t\t\tprevHandled = true\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\t// Equal sign separated named argument\n\t\tif match := argEqSeparatedRegex.MatchString(cliArg); match {\n\t\t\ttmpS := strings.TrimLeft(cliArg, \"-\")\n\t\t\tspl := strings.SplitN(tmpS, \"=\", 2)\n\t\t\targName, argValue := spl[0], spl[1]\n\t\t\tc, exists := am[argName]\n\t\t\tif !exists {\n\t\t\t\treturn nil, fmt.Errorf(\"named argument does not exist: '%s'\", argName)\n\t\t\t}\n\t\t\tif !(c.Type == \"\" || c.Type == \"named\") {\n\t\t\t\treturn nil, fmt.Errorf(\"value provided for non-named argument %s: '%s'\", argName, cliArg)\n\t\t\t}\n\t\t\targRes[argName] = &argValue\n\t\t\tcontinue\n\t\t}\n\n\t\t// Positional arguments\n\t\tif len(posSl) > passedPosArg {\n\t\t\ta := posSl[passedPosArg]\n\t\t\targRes[a.Name] = &cliArgs[i]\n\t\t\tpassedPosArg++\n\t\t} else {\n\t\t\treturn nil, fmt.Errorf(\"too many positional arguments given: '%s'\", cliArg)\n\t\t}\n\t}\n\n\tfor i := range argConfs {\n\t\targName := argConfs[i].Name\n\t\tif _, exists := argRes[argName]; !exists {\n\t\t\tif argConfs[i].FromEnvVar != nil {\n\t\t\t\tvalue, isSet := os.LookupEnv(argName)\n\t\t\t\tif isSet {\n\t\t\t\t\targRes[argName] = &value\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif argConfs[i].Default != nil {\n\t\t\t\targRes[argName] = argConfs[i].Default\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif argConfs[i].Type == \"bool\" {\n\t\t\t\tfalseVal := \"0\"\n\t\t\t\targRes[argName] = &falseVal\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif argConfs[i].Type == \"pos\" {\n\t\t\t\treturn nil, fmt.Errorf(\"value for positional argument missing: '%s'\", argName)\n\t\t\t}\n\t\t\treturn nil, fmt.Errorf(\"value for argument missing: not given via parameter, environment variable or default value: '%s'\", argName)\n\t\t}\n\t}\n\tlogrus.Trace(\"parsed args\", argRes)\n\n\treturn argRes, nil\n}", "title": "" }, { "docid": "97df886ce29a56e7925f4a00e6903647", "score": "0.6238601", "text": "func (m *maxArrLenTask) ParseKwargs(kwargs map[string]interface{}) error {\n\tkwargA, ok := kwargs[\"a\"]\n\tif !ok {\n\t\treturn fmt.Errorf(\"undefined kwarg a\")\n\t}\n\tm.a, ok = kwargA.([]string)\n\tif !ok {\n\t\treturn fmt.Errorf(\"malformed kwarg a\")\n\t}\n\tkwargB, ok := kwargs[\"b\"]\n\tif !ok {\n\t\treturn fmt.Errorf(\"undefined kwarg b\")\n\t}\n\tm.b, ok = kwargB.([]string)\n\tif !ok {\n\t\treturn fmt.Errorf(\"malformed kwarg b\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "867060b7fdaf3394512c6c9300693133", "score": "0.6230441", "text": "func ParseArgs(args ...string) (Attrs, error) {\n\tvar attrs Attrs\n\tparsed := map[string]string{}\n\n\tfor _, arg := range args {\n\t\ta, err := Parse(arg)\n\t\tif err != nil {\n\t\t\treturn attrs, errors.WithStack(err)\n\t\t}\n\n\t\tkey := a.Name.Underscore().String()\n\t\tif parsed[key] != \"\" {\n\t\t\treturn attrs, ErrRepeatedAttr\n\t\t}\n\n\t\tparsed[key] = arg\n\t\tattrs = append(attrs, a)\n\t}\n\n\treturn attrs, nil\n}", "title": "" }, { "docid": "b130488e8c7c17768e76cd24a48b07c8", "score": "0.62201893", "text": "func (mr *mockCommandMockRecorder) ParseArgs(strings interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"ParseArgs\", reflect.TypeOf((*mockCommand)(nil).ParseArgs), strings)\n}", "title": "" }, { "docid": "8a5535f1574334c1f487bfc5d9799afd", "score": "0.62200445", "text": "func ParseArguments() Options {\n\toptions := Options{}\n\tflags.ParseArgs(&options, os.Args[1:])\n\treturn options\n}", "title": "" }, { "docid": "b382f7df43646e2e98fd1f7c3052bd04", "score": "0.6199505", "text": "func (p *Parser) Parse(args []string) (remainder []string) {\n\n\tif p.ParseHelp && !p.helpAdded {\n\t\tdescription := p.HelpOptDescription\n\t\tif description == \"\" {\n\t\t\tdescription = \"Show this help and exit\"\n\t\t}\n\t\tif p.HideHelpOpt {\n\t\t\tp.Hidden()\n\t\t}\n\t\tp.Flags(\"-h\", \"--help\").Bool(description)\n\t\tp.helpAdded = true\n\t}\n\n\tif p.ParseVersion && !p.versionAdded {\n\t\tdescription := p.VersionOptDescription\n\t\tif description == \"\" {\n\t\t\tdescription = \"Show the version and exit\"\n\t\t}\n\t\tif p.HideVersionOpt {\n\t\t\tp.Hidden()\n\t\t}\n\t\tp.Flags(\"-v\", \"--version\").Bool(description)\n\t\tp.versionAdded = true\n\t}\n\n\targLength := len(args) - 1\n\tcomplete, words, compWord, prefix := getCompletionData()\n\n\t// Command-line auto-completion support.\n\tif complete {\n\n\t\tseenLong := []string{}\n\t\tseenShort := []string{}\n\n\t\tsubcommands, err := shlex.Split(args[0])\n\t\tif err != nil {\n\t\t\tprocess.Exit(1)\n\t\t}\n\n\t\twords = words[len(subcommands):]\n\t\tcompWord -= len(subcommands)\n\n\t\targWords := []string{}\n\t\tskipNext := false\n\t\toptCount := 0\n\n\t\tfor _, word := range words {\n\t\t\tif skipNext {\n\t\t\t\tskipNext = false\n\t\t\t\toptCount += 1\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif strings.HasPrefix(word, \"--\") && word != \"--\" {\n\t\t\t\top, ok := p.long2options[word]\n\t\t\t\tif ok {\n\t\t\t\t\tseenLong = append(seenLong, op.longFlag)\n\t\t\t\t\tseenShort = append(seenShort, op.shortFlag)\n\t\t\t\t\tif op.label != \"\" {\n\t\t\t\t\t\tskipNext = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\toptCount += 1\n\t\t\t} else if strings.HasPrefix(word, \"-\") && !(word == \"-\" || word == \"--\") {\n\t\t\t\top, ok := p.short2options[word]\n\t\t\t\tif ok {\n\t\t\t\t\tseenLong = append(seenLong, op.longFlag)\n\t\t\t\t\tseenShort = append(seenShort, op.shortFlag)\n\t\t\t\t\tif op.label != \"\" {\n\t\t\t\t\t\tskipNext = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\toptCount += 1\n\t\t\t} else {\n\t\t\t\targWords = append(argWords, word)\n\t\t\t\tif p.haltFlagParsing {\n\t\t\t\t\tif p.haltFlagParsingString != \"\" {\n\t\t\t\t\t\tif word == p.haltFlagParsingString {\n\t\t\t\t\t\t\tprocess.Exit(1)\n\t\t\t\t\t\t}\n\t\t\t\t\t} else if (compWord - optCount) == p.haltFlagParsingN {\n\t\t\t\t\t\tprocess.Exit(1)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Pass to the shell completion if the previous word was a flag\n\t\t// expecting some parameter.\n\t\tif compWord >= 1 {\n\t\t\tvar completer Completer\n\t\t\tprev := words[compWord-1]\n\t\t\tif prev != \"--\" && prev != \"-\" {\n\t\t\t\tif strings.HasPrefix(prev, \"--\") {\n\t\t\t\t\top, ok := p.long2options[prev]\n\t\t\t\t\tif ok && op.label != \"\" {\n\t\t\t\t\t\tif op.completer == nil {\n\t\t\t\t\t\t\tprocess.Exit(1)\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tcompleter = op.completer\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t} else if strings.HasPrefix(prev, \"-\") {\n\t\t\t\t\top, ok := p.short2options[prev]\n\t\t\t\t\tif ok && op.label != \"\" {\n\t\t\t\t\t\tif op.completer == nil {\n\t\t\t\t\t\t\tprocess.Exit(1)\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tcompleter = op.completer\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t\tif completer != nil {\n\t\t\t\tcompletions := make([]string, 0)\n\t\t\t\tfor _, item := range completer.Complete(argWords, compWord) {\n\t\t\t\t\tif strings.HasPrefix(item, prefix) {\n\t\t\t\t\t\tcompletions = append(completions, item)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\tfmt.Print(strings.Join(completions, \" \"))\n\t\t\t\tprocess.Exit(1)\n\t\t\t}\n\t\t}\n\n\t\tcompletions := make([]string, 0)\n\n\t\tif p.Completer != nil {\n\t\t\tfor _, item := range p.Completer.Complete(argWords, compWord-optCount) {\n\t\t\t\tif strings.HasPrefix(item, prefix) {\n\t\t\t\t\tcompletions = append(completions, item)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor flag, op := range p.long2options {\n\t\t\tif !(contains(seenLong, op.longFlag) || contains(seenShort, op.shortFlag) || op.hidden) {\n\t\t\t\tif strings.HasPrefix(flag, prefix) {\n\t\t\t\t\tcompletions = append(completions, flag)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfor flag, op := range p.short2options {\n\t\t\tif !(contains(seenLong, op.longFlag) || contains(seenShort, op.shortFlag) || op.hidden) {\n\t\t\t\tif strings.HasPrefix(flag, prefix) {\n\t\t\t\t\tcompletions = append(completions, flag)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tfmt.Print(strings.Join(completions, \" \"))\n\t\tprocess.Exit(1)\n\n\t}\n\n\tif argLength == 0 {\n\t\treturn\n\t}\n\n\tvar op *option\n\tvar ok bool\n\n\tidx := 1\n\taddNext := false\n\n\tfor {\n\t\targ := args[idx]\n\t\tnoOpt := true\n\t\tif addNext {\n\t\t\tremainder = append(remainder, arg)\n\t\t\tif idx == argLength {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tidx += 1\n\t\t\tcontinue\n\t\t} else if strings.HasPrefix(arg, \"--\") && arg != \"--\" {\n\t\t\top, ok = p.long2options[arg]\n\t\t\tif ok {\n\t\t\t\tnoOpt = false\n\t\t\t}\n\t\t} else if strings.HasPrefix(arg, \"-\") && !(arg == \"-\" || arg == \"--\") {\n\t\t\top, ok = p.short2options[arg]\n\t\t\tif ok {\n\t\t\t\tnoOpt = false\n\t\t\t}\n\t\t} else {\n\t\t\tremainder = append(remainder, arg)\n\t\t\tif p.haltFlagParsing {\n\t\t\t\tif arg == p.haltFlagParsingString {\n\t\t\t\t\taddNext = true\n\t\t\t\t} else if len(remainder) == p.haltFlagParsingN {\n\t\t\t\t\taddNext = true\n\t\t\t\t}\n\t\t\t}\n\t\t\tif idx == argLength {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tidx += 1\n\t\t\tcontinue\n\t\t}\n\t\tif noOpt {\n\t\t\texit(\"%s: no such option: %s\", args[0], arg)\n\t\t}\n\t\tif op.label != \"\" {\n\t\t\tif idx == argLength {\n\t\t\t\texit(\"%s: %s option requires an argument\", args[0], arg)\n\t\t\t}\n\t\t}\n\t\tif op.valueType == boolValue {\n\t\t\tif op.longFlag == \"--help\" && p.ParseHelp {\n\t\t\t\tp.PrintUsage()\n\t\t\t\tprocess.Exit(1)\n\t\t\t} else if op.longFlag == \"--version\" && p.ParseVersion {\n\t\t\t\tfmt.Printf(\"%s\\n\", p.version())\n\t\t\t\tprocess.Exit(0)\n\t\t\t}\n\t\t\tv := op.value.(*bool)\n\t\t\t*v = true\n\t\t\top.defined = true\n\t\t\tidx += 1\n\t\t} else if op.valueType == durationValue {\n\t\t\tif idx == argLength {\n\t\t\t\texit(\"%s: no value specified for %s\", args[0], arg)\n\t\t\t}\n\t\t\tdurationValue, err := time.ParseDuration(args[idx+1])\n\t\t\tif err != nil {\n\t\t\t\texit(\"%s: couldn't convert %s value '%s' to a duration\", args[0], arg, args[idx+1])\n\t\t\t}\n\t\t\tv := op.value.(*time.Duration)\n\t\t\t*v = durationValue\n\t\t\top.defined = true\n\t\t\tidx += 2\n\t\t} else if op.valueType == stringValue {\n\t\t\tif idx == argLength {\n\t\t\t\texit(\"%s: no value specified for %s\", args[0], arg)\n\t\t\t}\n\t\t\tv := op.value.(*string)\n\t\t\t*v = args[idx+1]\n\t\t\top.defined = true\n\t\t\tidx += 2\n\t\t} else if op.valueType == intValue {\n\t\t\tif idx == argLength {\n\t\t\t\texit(\"%s: no value specified for %s\", args[0], arg)\n\t\t\t}\n\t\t\tintValue, err := strconv.Atoi(args[idx+1])\n\t\t\tif err != nil {\n\t\t\t\texit(\"%s: couldn't convert %s value '%s' to an integer\", args[0], arg, args[idx+1])\n\t\t\t}\n\t\t\tv := op.value.(*int)\n\t\t\t*v = intValue\n\t\t\top.defined = true\n\t\t\tidx += 2\n\t\t} else if op.valueType == floatValue {\n\t\t\tif idx == argLength {\n\t\t\t\texit(\"%s: no value specified for %s\", args[0], arg)\n\t\t\t}\n\t\t\tfloatValue, err := strconv.ParseFloat(args[idx+1], 64)\n\t\t\tif err != nil {\n\t\t\t\texit(\"%s: couldn't convert %s value '%s' to a float\", args[0], arg, args[idx+1])\n\t\t\t}\n\t\t\tv := op.value.(*float64)\n\t\t\t*v = floatValue\n\t\t\top.defined = true\n\t\t\tidx += 2\n\t\t}\n\t\tif idx > argLength {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tfor _, op := range p.options {\n\t\tif op.required && !op.defined {\n\t\t\texit(\"%s: required: %s\", args[0], op)\n\t\t}\n\t}\n\n\treturn\n\n}", "title": "" }, { "docid": "a232f75ab6e183b03252a963ff571699", "score": "0.6194552", "text": "func parseArgs() *string {\n\tyamlFile := flag.String(\"yamlPath\", \"email_details.yaml\", \"Path to the YAML file with the details for the email.\")\n\tflag.Parse()\n\treturn yamlFile\n}", "title": "" }, { "docid": "3841503cad65cd397f8bd7fb263c9298", "score": "0.61921555", "text": "func ParseArguments() Args {\n\tscriptType := flag.String(\"script-type\", \"python\", \"Script type. Available values are: {python, bash}\")\n\tscriptFile := flag.String(\"script-file\", \"./myscript.sh\", \"Script file\")\n\tbinaryFile := flag.String(\"binary-file\", \"./mybinary\", \"Compiled binary\")\n\tgoos := flag.String(\"goos\", \"linux\", \"GO Target Operating System (GOOS env var)\")\n\tgoarch := flag.String(\"goarch\", \"amd64\", \"GO Target Architecture (GOARCH env var)\")\n\tencrypt := flag.Bool(\"encrypt\", false, \"Generate an encrypted binary with random key\")\n\n\tflag.Parse()\n\tvar args Args = Args{scriptType, scriptFile, binaryFile, goos, goarch, encrypt}\n\treturn args\n}", "title": "" }, { "docid": "f9c8c19b9fec9a83fdf8d931b161860c", "score": "0.61633426", "text": "func argsParse(argv []string) (nrtupdater.Args, resourcemonitor.Args, resourcetopologyexporter.Args, localArgs, error) {\n\tvar nrtupdaterArgs nrtupdater.Args\n\tvar resourcemonitorArgs resourcemonitor.Args\n\tvar rteArgs resourcetopologyexporter.Args\n\tvar localArgs localArgs\n\n\tusage, err := getUsage()\n\tif err != nil {\n\t\treturn nrtupdaterArgs, resourcemonitorArgs, rteArgs, localArgs, err\n\t}\n\n\targuments, _ := docopt.ParseArgs(usage, argv, fmt.Sprintf(\"%s %s\", ProgramName, \"TBD\"))\n\n\t// Parse argument values as usable types.\n\tnrtupdaterArgs.NoPublish = arguments[\"--no-publish\"].(bool)\n\tnrtupdaterArgs.Oneshot = arguments[\"--oneshot\"].(bool)\n\tif ns, ok := arguments[\"--export-namespace\"].(string); ok {\n\t\tnrtupdaterArgs.Namespace = ns\n\t}\n\tif hostname, ok := arguments[\"--hostname\"].(string); ok {\n\t\tnrtupdaterArgs.Hostname = hostname\n\t}\n\tif nrtupdaterArgs.Hostname == \"\" {\n\t\tvar err error\n\t\tnrtupdaterArgs.Hostname = os.Getenv(\"NODE_NAME\")\n\t\tif nrtupdaterArgs.Hostname == \"\" {\n\t\t\tnrtupdaterArgs.Hostname, err = os.Hostname()\n\t\t\tif err != nil {\n\t\t\t\treturn nrtupdaterArgs, resourcemonitorArgs, rteArgs, localArgs, fmt.Errorf(\"error getting the host name: %w\", err)\n\t\t\t}\n\t\t}\n\t}\n\n\trteArgs.SleepInterval, err = time.ParseDuration(arguments[\"--sleep-interval\"].(string))\n\tif err != nil {\n\t\treturn nrtupdaterArgs, resourcemonitorArgs, rteArgs, localArgs, fmt.Errorf(\"invalid --sleep-interval specified: %w\", err)\n\t}\n\tif ns, ok := arguments[\"--watch-namespace\"].(string); ok {\n\t\tresourcemonitorArgs.Namespace = ns\n\t}\n\tif kubeletConfigPath, ok := arguments[\"--kubelet-config-file\"].(string); ok {\n\t\trteArgs.KubeletConfigFile = kubeletConfigPath\n\t}\n\tresourcemonitorArgs.SysfsRoot = arguments[\"--sysfs\"].(string)\n\tif path, ok := arguments[\"--podresources-socket\"].(string); ok {\n\t\trteArgs.PodResourcesSocketPath = path\n\t}\n\n\tif kubeletStateDirs, ok := arguments[\"--kubelet-state-dir\"].([]string); ok {\n\t\trteArgs.KubeletStateDirs = kubeletStateDirs\n\t}\n\n\trteArgs.Debug = arguments[\"--debug\"].(bool)\n\tif refCnt, ok := arguments[\"--reference-container\"].(string); ok {\n\t\trteArgs.ReferenceContainer, err = podrescli.ContainerIdentFromString(refCnt)\n\t\tif err != nil {\n\t\t\treturn nrtupdaterArgs, resourcemonitorArgs, rteArgs, localArgs, err\n\t\t}\n\t}\n\tif rteArgs.ReferenceContainer == nil {\n\t\trteArgs.ReferenceContainer = podrescli.ContainerIdentFromEnv()\n\t}\n\n\tif configPath, ok := arguments[\"--config\"].(string); ok {\n\t\tconf, err := config.ReadConfig(configPath)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"error reading the configuration file: %v\", err)\n\t\t}\n\t\tresourcemonitorArgs.ExcludeList.ExcludeList = conf.ExcludeList\n\t\tlocalArgs.SysConf = conf.Resources\n\t\t// do not overwrite with empty an existing value (e.g. from opts)\n\t\tif rteArgs.TopologyManagerPolicy == \"\" {\n\t\t\trteArgs.TopologyManagerPolicy = conf.TopologyManagerPolicy\n\t\t}\n\t}\n\n\tif tmPolicy, ok := arguments[\"--topology-manager-policy\"].(string); ok {\n\t\trteArgs.TopologyManagerPolicy = tmPolicy\n\t}\n\n\treturn nrtupdaterArgs, resourcemonitorArgs, rteArgs, localArgs, nil\n}", "title": "" }, { "docid": "673c34b2500ec064d60198b3e4263031", "score": "0.6157057", "text": "func tokenizeArgs(args string) []string {\n\treturn tokenizeRegex.FindAllString(args, -1)\n}", "title": "" }, { "docid": "0811d9ce7e9f49d296bd6649d0035a1d", "score": "0.6147677", "text": "func parseProgramArgs() {\n\tLocalFolderPath = flag.String(\"l\", \".\", \"Path to local directory to open, default is '.'\")\n\tdpRestURL = flag.String(\"r\", \"\", \"DataPower REST URL\")\n\tdpSomaURL = flag.String(\"s\", \"\", \"DataPower SOMA URL\")\n\tdpUsername = flag.String(\"u\", \"\", \"DataPower user username\")\n\tpassword := flag.String(\"p\", \"\", \"DataPower user password\")\n\tdpDomain = flag.String(\"d\", \"\", \"DataPower domain name\")\n\tproxy = flag.String(\"x\", \"\", \"URL of proxy server for DataPower connection\")\n\tdpConfigName = flag.String(\"c\", \"\", \"Name of DataPower connection configuration to save with given configuration params\")\n\tDebugLogFile = flag.Bool(\"debug\", false, \"Write debug dpcmder.log file in current dir\")\n\tTraceLogFile = flag.Bool(\"trace\", false, \"Write trace dpcmder.log file in current dir\")\n\thelpUsage = flag.Bool(\"h\", false, \"Show dpcmder usage with examples\")\n\thelpFull = flag.Bool(\"help\", false, \"Show dpcmder in-program help on console\")\n\tversion = flag.Bool(\"v\", false, \"Show dpcmder version\")\n\n\tflag.Parse()\n\tsetDpPasswordPlain(*password)\n}", "title": "" }, { "docid": "d9b171f3c1116a1f52b09319b471fb7b", "score": "0.61141217", "text": "func parseArgs() (host, port string) {\n\targs := os.Args[1:]\n\tif len(args) != 2 {\n\t\tlog.Fatalln(\"Error: dashert requires two arguments <host> and <port>\\n\")\n\t}\n\th := args[0]\n\tp := args[1]\n\treturn h, p\n}", "title": "" }, { "docid": "66967270effc880672c793fc7ad1eefe", "score": "0.610297", "text": "func FromArgs(args []string) (Config, error) {\n\tm := make(map[string]interface{})\n\n\tfor _, f := range args {\n\t\tif f == \"--\" {\n\t\t\tcontinue\n\t\t}\n\t\tassign := strings.SplitN(strings.TrimLeft(f, \"-\"), \"=\", 2)\n\t\tif len(assign) != 2 {\n\t\t\treturn nil, errors.Errorf(\"expected assignment, got: %s\", f)\n\t\t}\n\t\tm[assign[0]] = assign[1]\n\t}\n\n\treturn flatMap(m), nil\n}", "title": "" }, { "docid": "5fd5d25aece80a7aa25a553ea3b37cb3", "score": "0.60998017", "text": "func (n *SoupNode) parseFindArgs(args starlark.Tuple, kwargs []starlark.Tuple) ([]string, error) {\n\tparams := []string{}\n\thaveTagName := false\n\n\t// Convert positional arguments to a string list. Each argument may be a string (for a tagName),\n\t// or a dictionary, which will get flatteneed. Only one tagName is allowed.\n\tfor _, arg := range args {\n\t\tif tagName, ok := arg.(starlark.String); ok {\n\t\t\tif haveTagName {\n\t\t\t\treturn nil, fmt.Errorf(\"only one tagName parameter is allowed, found %s\", tagName)\n\t\t\t}\n\t\t\tstr, err := AsString(tagName)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tparams = append(params, str)\n\t\t\thaveTagName = true\n\t\t\tcontinue\n\t\t}\n\t\tif dict, ok := arg.(*starlark.Dict); ok {\n\t\t\tfor _, k := range dict.Keys() {\n\t\t\t\tkey, err := AsString(k)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tparams = append(params, key)\n\t\t\t\tv, _, err := dict.Get(k)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tval, err := AsString(v)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, err\n\t\t\t\t}\n\t\t\t\tparams = append(params, val)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\t\treturn nil, fmt.Errorf(\"invalid parameter %v\", arg)\n\t}\n\t// If no tagName was given, prepend a blank string, meaning any tagName.\n\tif !haveTagName {\n\t\tparams = append([]string{\"\"}, params...)\n\t}\n\n\t// Convert keyword arguments to a string list, by flattening them.\n\t// TODO(dlong): Handle meaningful keywords: name, attrs, recurive, string, limit, class_\n\tfor _, kw := range kwargs {\n\t\tkey, err := AsString(kw[0])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tparams = append(params, key)\n\t\tval, err := AsString(kw[1])\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tparams = append(params, val)\n\t}\n\n\treturn params, nil\n}", "title": "" }, { "docid": "24f66564f5b71c72dd368aa3f0c0f1d0", "score": "0.6099162", "text": "func ParseArgs(args []string) (*ParserArguments, error) {\n\tflags := flag.NewFlagSet(\"zero-downtime-push\", flag.ContinueOnError)\n\n\tvar envs stringSlice\n\n\tpta := &ParserArguments{}\n\tflags.StringVar(&pta.ManifestPath, \"f\", \"\", \"path to an application manifest\")\n\tflags.StringVar(&pta.AppPath, \"p\", \"\", \"path to application files\")\n\tflags.StringVar(&pta.StackName, \"s\", \"\", \"name of the stack to use\")\n\tflags.StringVar(&pta.HealthCheckType, \"health-check-type\", \"port\", \"type of health check to perform\")\n\tflags.StringVar(&pta.HealthCheckHTTPEndpoint, \"health-check-http-endpoint\", \"\", \"endpoint for the 'http' health check type\")\n\tflags.IntVar(&pta.Timeout, \"t\", 0, \"push timeout in seconds (default 60 seconds)\")\n\tflags.IntVar(&pta.InvocationTimeout, \"invocation-timeout\", -1, \"health check invocation timeout in seconds\")\n\tflags.StringVar(&pta.Process, \"process\", \"\", \"use health check type process\")\n\tflags.BoolVar(&pta.ShowCrashLogs, \"show-crash-log\", false, \"Show recent logs when applications crashes while the deployment\")\n\tflags.StringVar(&pta.VenerableAction, \"venerable-action\", \"delete\", \"option to delete,stop,none application action on venerable app default is delete\")\n\tflags.Var(&envs, \"env\", \"Variable key value pair for adding dynamic environment variables; can specify multiple times\")\n\tflags.BoolVar(&pta.LegacyPush, \"legacy-push\", false, \"use legacy push instead of new v3 api\")\n\tflags.BoolVar(&pta.NoRoute, \"no-route\", false, \"deploy new application without adding routes\")\n\tflags.BoolVar(&pta.AddRoutes, \"route-only\", false, \"only add routes from manifest to the application\")\n\tflags.BoolVar(&pta.NoStart, \"no-start\", false, \"don't start application after deployment; venerable action is none\")\n\tflags.StringVar(&pta.VarsFile, \"vars-file\", \"\", \"path to a variable substitution file for manifest\")\n\tflags.StringVar(&pta.DockerImage, \"docker-image\", \"\", \"docker image url\")\n\tflags.StringVar(&pta.DockerUserName, \"docker-username\", \"\", \"docker repository username; used with password from env CF_DOCKER_PASSWORD\")\n\tdockerPass := os.Getenv(\"CF_DOCKER_PASSWORD\")\n\n\t//first check if argument was passed\n\tif len(args) < 2 {\n\t\treturn pta, ErrNoArgument\n\t}\n\n\t//default start index of parameters is 2 because 1 is the appName\n\targumentStartIndex := 2\n\t//if first argument is not the appName we have to read the appName out of the manifest\n\tnoAppNameProvided, _ := regexp.MatchString(\"^-[a-z]{0,3}\", args[1])\n\n\tif noAppNameProvided {\n\t\targumentStartIndex = 1\n\t}\n\n\terr := flags.Parse(args[argumentStartIndex:])\n\tif err != nil {\n\t\treturn pta, err\n\t}\n\n\tif pta.ManifestPath == \"\" {\n\t\treturn pta, ErrNoManifest\n\t}\n\n\t//parse manifest\n\tparsedManifest, noRouteManifestPath, err := manifest.ParseApplicationManifest(pta.ManifestPath, pta.VarsFile)\n\tif err != nil {\n\t\treturn pta, err //ErrManifest\n\t}\n\n\tif strings.ContainsAny(parsedManifest.ApplicationManifests[0].Path, \"*\") && pta.LegacyPush == false {\n\t\treturn pta, ErrNoWildcardSupport\n\t}\n\n\tpta.Manifest = parsedManifest\n\tpta.NoRouteManifestPath = noRouteManifestPath\n\n\t//check if a docker image shouldbe pushed and verify passed args combination\n\tif len(pta.DockerUserName) > 0 && (len(dockerPass) == 0 || len(pta.DockerImage) == 0) {\n\t\treturn nil, ErrWrongPrivateDockerRepoCombination\n\t}\n\n\t//set timeout\n\tmanifestTimeout, _ := strconv.Atoi(parsedManifest.ApplicationManifests[0].Timeout)\n\tif manifestTimeout > 0 && pta.Timeout <= 0 {\n\t\tpta.Timeout = manifestTimeout\n\t} else if manifestTimeout <= 0 && pta.Timeout <= 0 {\n\t\tpta.Timeout = 60\n\t}\n\n\t//parse first argument as appName\n\tpta.AppName = args[1]\n\tif noAppNameProvided {\n\t\tpta.AppName = parsedManifest.ApplicationManifests[0].Name\n\t}\n\n\t//check that health check works without legacy push only\n\tif pta.LegacyPush && ((argPassed(flags, \"health-check-type\") && pta.HealthCheckType != \"\") || (argPassed(flags, \"health-check-http-endpoint\") && pta.HealthCheckHTTPEndpoint != \"\")) {\n\t\treturn nil, ErrWrongCombination\n\t}\n\n\t// get health check settings from manifest if nothing else was specified in the command line\n\tif argPassed(flags, \"health-check-type\") == false {\n\t\tif parsedManifest.ApplicationManifests[0].HealthCheckType == \"\" {\n\t\t\tpta.HealthCheckType = \"port\"\n\t\t} else {\n\t\t\tpta.HealthCheckType = parsedManifest.ApplicationManifests[0].HealthCheckType\n\t\t}\n\n\t}\n\tif pta.HealthCheckHTTPEndpoint == \"\" {\n\t\tpta.HealthCheckHTTPEndpoint = parsedManifest.ApplicationManifests[0].HealthCheckHTTPEndpoint\n\t}\n\n\t//validate envs format\n\tif len(envs) > 0 {\n\t\tfor _, envPair := range envs {\n\t\t\tif strings.Contains(envPair, \"=\") == false {\n\t\t\t\treturn pta, ErrWrongEnvFormat\n\t\t\t}\n\t\t}\n\t\t//convert variables to use them later in set-ent\n\t\tpta.Envs = env.Convert(envs)\n\t}\n\n\t//no-route set venerable-action to delete as default - but can be overwritten\n\tif (pta.NoRoute || pta.NoStart) && argPassed(flags, \"venerable-action\") == false {\n\t\tpta.VenerableAction = \"none\"\n\t}\n\n\treturn pta, nil\n}", "title": "" }, { "docid": "3459d32aba811dcdb382863c3d178643", "score": "0.60991156", "text": "func parsePositionalArguments(rawArgs json.RawMessage, types []reflect.Type) ([]reflect.Value, error) {\n\tdec := json.NewDecoder(bytes.NewReader(rawArgs))\n\tvar args []reflect.Value\n\ttok, err := dec.Token()\n\tswitch {\n\tcase err == io.EOF || (err == nil && tok == nil):\n\t\t// \"params\" is optional and may be empty. Also allow \"params\":null even though it's\n\t\t// not in the spec because our own client used to send it.\n\tcase err != nil:\n\t\treturn nil, err\n\tcase tok == json.Delim('['):\n\t\t// Read argument array.\n\t\tif args, err = parseArgumentArray(dec, types); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tdefault:\n\t\treturn nil, errors.New(\"non-array args\")\n\t}\n\t// Set any missing args to nil.\n\tfor i := len(args); i < len(types); i++ {\n\t\tctp := types[i]\n\t\taddVal := reflect.Zero(ctp)\n\t\tif ctp.Kind() == reflect.Ptr {\n\t\t\t//addVal = reflect.New(ctp).Elem()\n\t\t\taddVal = reflect.New(ctp.Elem())\n\t\t}\n\t\targs = append(args, addVal)\n\t}\n\treturn args, nil\n}", "title": "" }, { "docid": "6e021c98a8d8f3aeb848444e13eb42aa", "score": "0.6092013", "text": "func (b *Base) Parse(args []string) (newArgs []string, err error) {\n\tif err = b.Flags.Parse(args); err != nil {\n\t\terr = fmt.Errorf(\"usage: c14 %s: %s\", b.UsageLine, err)\n\t\treturn\n\t}\n\tif *b.flHelp {\n\t\tb.PrintUsage()\n\t\tos.Exit(1)\n\t\treturn\n\t}\n\tnewArgs = b.Flags.Args()\n\treturn\n}", "title": "" }, { "docid": "5405e29b2b83086a89c64f8f174e0d8d", "score": "0.6084501", "text": "func ParseVariadicArguments(\n\tresult map[string][]string, // provided result map\n\tmultKeys []string, // keys that may appear multiple times\n\tuniqKeys []string, // keys that are allowed at most once\n\treqKeys []string, // keys that are required at least one\n\targs []string, // arguments to parse\n) error {\n\t// used to hold found errors, so if three keywords are missing they can\n\t// all be mentioned in one call\n\terrors := []string{}\n\n\t// merge key slices\n\tkeys := append(multKeys, uniqKeys...)\n\n\t// helper to skip over next value in args slice\n\tskip := false\n\n\tfor pos, val := range args {\n\t\t// skip current arg if last argument was a keyword\n\t\tif skip {\n\t\t\tskip = false\n\t\t\tcontinue\n\t\t}\n\n\t\tif sliceContainsString(val, keys) {\n\t\t\t// there must be at least one arguments left\n\t\t\tif len(args[pos+1:]) < 1 {\n\t\t\t\terrors = append(errors,\n\t\t\t\t\t`Syntax error, incomplete key/value specification (too few items left to parse)`,\n\t\t\t\t)\n\t\t\t\tgoto abort\n\t\t\t}\n\t\t\t// check for back-to-back keyswords\n\t\t\tif err := checkStringNotAKeyword(args[pos+1], keys); err != nil {\n\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\tgoto abort\n\t\t\t}\n\n\t\t\t// append value of current keyword into result map\n\t\t\tresult[val] = append(result[val], args[pos+1])\n\t\t\tskip = true\n\t\t\tcontinue\n\t\t}\n\t\t// keywords trigger continue before this\n\t\t// values after keywords are skip'ed\n\t\t// reaching this is an error\n\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, erroneus argument: %s\", val))\n\t}\n\n\t// check if we managed to collect all required keywords\n\tfor _, key := range reqKeys {\n\t\t// ok is false if slice is nil\n\t\tif _, ok := result[key]; !ok {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, missing keyword: %s\", key))\n\t\t}\n\t}\n\n\t// check if unique keywords were only specified once\n\tfor _, key := range uniqKeys {\n\t\tif sl, ok := result[key]; ok && (len(sl) > 1) {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, keyword must only be provided once: %s\", key))\n\t\t}\n\t}\n\nabort:\n\tif len(errors) > 0 {\n\t\tresult = nil\n\t\treturn fmt.Errorf(combineStrings(errors...))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c102e8769074b3f73c2350b50f6a7624", "score": "0.60776055", "text": "func parseVariadic(token Token, argCount int) (bool, int, int) {\n\tif !strings.HasPrefix(token.Text, \"{args[\") {\n\t\treturn false, 0, 0\n\t}\n\tif !strings.HasSuffix(token.Text, \"]}\") {\n\t\treturn false, 0, 0\n\t}\n\n\targRange := strings.TrimSuffix(strings.TrimPrefix(token.Text, \"{args[\"), \"]}\")\n\tif argRange == \"\" {\n\t\tcaddy.Log().Named(\"caddyfile\").Warn(\n\t\t\t\"Placeholder \"+token.Text+\" cannot have an empty index\",\n\t\t\tzap.String(\"file\", token.File+\":\"+strconv.Itoa(token.Line)), zap.Strings(\"import_chain\", token.imports))\n\t\treturn false, 0, 0\n\t}\n\n\tstart, end, found := strings.Cut(argRange, \":\")\n\n\t// If no \":\" delimiter is found, this is not a variadic.\n\t// The replacer will pick this up.\n\tif !found {\n\t\treturn false, 0, 0\n\t}\n\n\tvar (\n\t\tstartIndex = 0\n\t\tendIndex = argCount\n\t\terr error\n\t)\n\tif start != \"\" {\n\t\tstartIndex, err = strconv.Atoi(start)\n\t\tif err != nil {\n\t\t\tcaddy.Log().Named(\"caddyfile\").Warn(\n\t\t\t\t\"Variadic placeholder \"+token.Text+\" has an invalid start index\",\n\t\t\t\tzap.String(\"file\", token.File+\":\"+strconv.Itoa(token.Line)), zap.Strings(\"import_chain\", token.imports))\n\t\t\treturn false, 0, 0\n\t\t}\n\t}\n\tif end != \"\" {\n\t\tendIndex, err = strconv.Atoi(end)\n\t\tif err != nil {\n\t\t\tcaddy.Log().Named(\"caddyfile\").Warn(\n\t\t\t\t\"Variadic placeholder \"+token.Text+\" has an invalid end index\",\n\t\t\t\tzap.String(\"file\", token.File+\":\"+strconv.Itoa(token.Line)), zap.Strings(\"import_chain\", token.imports))\n\t\t\treturn false, 0, 0\n\t\t}\n\t}\n\n\t// bound check\n\tif startIndex < 0 || startIndex > endIndex || endIndex > argCount {\n\t\tcaddy.Log().Named(\"caddyfile\").Warn(\n\t\t\t\"Variadic placeholder \"+token.Text+\" indices are out of bounds, only \"+strconv.Itoa(argCount)+\" argument(s) exist\",\n\t\t\tzap.String(\"file\", token.File+\":\"+strconv.Itoa(token.Line)), zap.Strings(\"import_chain\", token.imports))\n\t\treturn false, 0, 0\n\t}\n\treturn true, startIndex, endIndex\n}", "title": "" }, { "docid": "b0a6374be34cf81444a2437ad0ba6848", "score": "0.60684615", "text": "func (c *CmdSimpleFSPs) ParseArgv(ctx *cli.Context) error {\n\n\tc.recurse = ctx.Bool(\"recurse\")\n\n\treturn nil\n}", "title": "" }, { "docid": "08a132a4fb49267143ae98cfbcbb61cb", "score": "0.60572237", "text": "func parseArgList(msgArgs []string) (map[string]string, error) {\n\t// Validate that it has an appropriate number of arguments.\n\tnumOfArgs := len(msgArgs)\n\tif numOfArgs < 1 || numOfArgs > 2 {\n\t\terr := errors.New(\"invalid number of arguments\")\n\t\treturn nil, err\n\t}\n\t// Start making the map that represents this media item.\n\tm := make(map[string]string)\n\t// The URL should be the first argument. If the first argument isn't a URL,\n\t// it will be determined and handled elsewhere.\n\tm[\"url\"] = msgArgs[0]\n\t// Get the end passed for this media item (if it was passed).\n\tend, err := getEnd(msgArgs)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// Insert the end into the map.\n\tm[\"end\"] = end\n\t// Return the completed map.\n\treturn m, nil\n}", "title": "" }, { "docid": "a843ba02c4a2b4af6c3bb71e66dd0e7b", "score": "0.60199696", "text": "func (cmd *Android) Parse(args []string) error {\n\tcommonFlags, err := newCommonFlags()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tflags := &androidFlags{\n\t\tCommonFlags: commonFlags,\n\t}\n\n\tflagSet.Usage = cmd.Usage\n\tflagSet.Parse(args)\n\n\tctx, err := makeAndroidContext(flags, flagSet.Args())\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcmd.Context = ctx\n\treturn nil\n}", "title": "" }, { "docid": "c1fdef6f950b50b11c3c66d13b4553aa", "score": "0.6003148", "text": "func Parse(line string) []Arg {\n\tvar args []Arg\n\tfor {\n\t\targ, after := next(line)\n\t\tif arg.Text != \"\" {\n\t\t\targs = append(args, arg)\n\t\t}\n\t\tline = after\n\t\tif line == \"\" {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn args\n}", "title": "" }, { "docid": "2488a3aa7015b2b72f50c284bc0532d3", "score": "0.5981598", "text": "func Parse() {\n\tfor i := 1; i < len(os.Args); {\n\t\tok, next := flags.parseOne(i);\n\t\tif next > 0 {\n\t\t\tflags.first_arg = next;\n\t\t\ti = next;\n\t\t}\n\t\tif !ok {\n\t\t\tbreak\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b13f9f32f01412d44ab585ae56732c7c", "score": "0.59788245", "text": "func parseArgs() []string {\n\targs := os.Args[1:]\n\tif len(args) != 3 {\n\t\tlog.Fatalln(\"Format ./coreader 200727 0 190(date start end)\")\n\t}\n\tformat := args[0]\n\tstart, err := strconv.Atoi(args[1])\n\tif err != nil {\n\t\tlog.Fatalln(\"Format ./coreader 200727 0 190(date start end)\")\n\t}\n\tend, err := strconv.Atoi(args[2])\n\tif err != nil {\n\t\tlog.Fatalln(\"Format ./coreader 200727 0 190(date start end)\")\n\t}\n\n\tfList := make([]string, 0)\n\tfor i := start; i < end; i++ {\n\t\ts := fmt.Sprintf(format, i)\n\t\tfList = append(fList, s)\n\t}\n\treturn fList\n}", "title": "" }, { "docid": "cf8dc66e6db9edcf846bde89a0a37b5b", "score": "0.5957831", "text": "func (a *Arg) parse() {\n\tif len(a.Text) == 0 {\n\t\treturn\n\t}\n\n\t// A pure value, no flag.\n\tif a.Text[0] != '-' {\n\t\ta.Value = a.Text\n\t\ta.HasValue = true\n\t\treturn\n\t}\n\n\t// Seprate the dashes from the flag name.\n\tdahsI := 1\n\tif len(a.Text) > 1 && a.Text[1] == '-' {\n\t\tdahsI = 2\n\t}\n\ta.Dashes = a.Text[:dahsI]\n\ta.HasFlag = true\n\ta.Flag = a.Text[dahsI:]\n\n\t// Empty flag\n\tif a.Flag == \"\" {\n\t\treturn\n\t}\n\t// Third dash or empty flag with equal is forbidden.\n\tif a.Flag[0] == '-' || a.Flag[0] == '=' {\n\t\ta.Parsed = Parsed{}\n\t\treturn\n\t}\n\t// The flag is valid.\n\n\t// Check if flag has a value.\n\tif equal := strings.IndexRune(a.Flag, '='); equal != -1 {\n\t\ta.Flag, a.Value = a.Flag[:equal], a.Flag[equal+1:]\n\t\ta.HasValue = true\n\t\treturn\n\t}\n\n}", "title": "" }, { "docid": "68418d8f5237aeab24f3e7f47df9f2b6", "score": "0.5911531", "text": "func (this *Command) Parse(args []string) error {\n\targNum := 0\n\tvar lastArg *Argument\n\targc := len(args)\n\tla := len(this.Arguments)\n\tfor i := 0; i < argc; i++ {\n\t\ta := args[i]\n\t\t//l := len(a)\n\t\tif a[0:1] == \"-\" {\n\t\t\tn := strings.TrimLeft(a, \"-\")\n\t\t\tv := \"\"\n\t\t\tvv := false\n\n\t\t\t// is --opt=foo format\n\t\t\tif p := strings.Index(n, \"=\"); p > -1 {\n\t\t\t\tvv = true\n\t\t\t\tif p == 0 {\n\t\t\t\t\treturn fmt.Errorf(\"Malformed option \\\"%s\\\"\", a)\n\t\t\t\t}\n\t\t\t\tpp := strings.SplitN(n, \"=\", 2)\n\t\t\t\tn = pp[0]\n\t\t\t\tif len(pp) == 2 {\n\t\t\t\t\tv = pp[1]\n\t\t\t\t}\n\t\t\t}\n\t\t\to := this.Option(n)\n\t\t\tif o == nil {\n\t\t\t\treturn fmt.Errorf(\"Unrecognized option \\\"%s\\\"\", a)\n\t\t\t}\n\n\t\t\t// not a flag: must have value\n\t\t\t// is a flag: must not have non-flag value\n\t\t\tif !o.Flag && !vv {\n\t\t\t\tif i+1 == argc || args[i+1][0:1] == \"-\" {\n\t\t\t\t\treturn fmt.Errorf(\"Missing value for option \\\"%s\\\"\", a)\n\t\t\t\t} else {\n\t\t\t\t\ti++\n\t\t\t\t\tv = args[i]\n\t\t\t\t}\n\t\t\t} else if o.Flag && vv && !rxFlag.MatchString(v) {\n\t\t\t\treturn fmt.Errorf(\"Flag \\\"%s\\\" cannot have value\", a)\n\t\t\t} else if o.Flag {\n\t\t\t\tv = \"true\"\n\t\t\t}\n\t\t\tif err := o.Assign(v); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tif lastArg == nil || !lastArg.Multiple {\n\t\t\t\tif argNum+1 > la {\n\t\t\t\t\treturn fmt.Errorf(\"Too many arguments. Expected (at most) %d, got %d\", la, argNum+1)\n\t\t\t\t} else {\n\t\t\t\t\tlastArg = this.Arguments[argNum]\n\t\t\t\t}\n\t\t\t}\n\t\t\tif err := lastArg.Assign(a); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\targNum++\n\t\t}\n\t}\n\n\tfor _, a := range this.Arguments {\n\t\tif len(a.Values) == 0 && a.Default != \"\" {\n\t\t\ta.Values = []string{a.Default}\n\t\t}\n\t\tif a.Required && len(a.Values) == 0 {\n\t\t\treturn fmt.Errorf(\"Argument \\\"%s\\\" is required but missing\", a.Name)\n\t\t}\n\t}\n\tfor _, o := range this.Options {\n\t\tif len(o.Values) == 0 && o.Default != \"\" {\n\t\t\to.Values = []string{o.Default}\n\t\t}\n\t\tif o.Required && len(o.Values) == 0 {\n\t\t\treturn fmt.Errorf(\"Option \\\"%s\\\" is required but missing\", o.Name)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "445542573876c13d97ca6377b9c3d545", "score": "0.5906478", "text": "func (p *parser) parseFuncArgs() (args tree.Args) {\n\tswitch p.tok {\n\tcase token.LPAREN:\n\t\ta := &tree.ListArgs{}\n\t\ta.LParenToken = p.tokenNext()\n\t\tfor p.tok != token.RPAREN {\n\t\t\tif a.Values == nil {\n\t\t\t\ta.Values = &tree.ExprList{}\n\t\t\t}\n\t\t\ta.Values.Items = append(a.Values.Items, p.parseExpr())\n\t\t\tif p.tok == token.COMMA {\n\t\t\t\ta.Values.Seps = append(a.Values.Seps, p.tokenNext())\n\t\t\t} else {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t\ta.RParenToken = p.expectToken(token.RPAREN)\n\t\targs = a\n\tcase token.LBRACE:\n\t\ta := &tree.TableArg{}\n\t\ta.Value = *p.parseTableCtor()\n\t\targs = a\n\tcase token.STRING, token.LONGSTRING:\n\t\ta := &tree.StringArg{}\n\t\ta.Value = *p.parseString()\n\t\targs = a\n\tdefault:\n\t\tp.error(p.off, \"function arguments expected\")\n\t}\n\treturn args\n}", "title": "" }, { "docid": "933dec847fc46066b6bc38c1d7be8fe2", "score": "0.5905179", "text": "func TestParseArguments(t *testing.T) {\n\n\t// Set our expectations\n\texpectedConfig := `.\\fake.yaml`\n\texpectedVerbose := true\n\texpectedDebug := true\n\texpectedCheckOnly := true\n\n\t// Save the original arguments\n\torigArgs := os.Args\n\tdefer func() { os.Args = origArgs }()\n\n\t// Override with our input\n\tos.Args = []string{\"gorilla.exe\", \"--verbose\", \"--debug\", \"--checkonly\", \"--config\", `.\\fake.yaml`}\n\n\t// Run code\n\tconfigArg, verboseArg, debugArg, checkonlyArg := parseArguments()\n\n\t// Compare config\n\tif have, want := configArg, expectedConfig; have != want {\n\t\tt.Errorf(\"have %s, want %s\", have, want)\n\t}\n\n\t// Compare checkonly\n\tif have, want := checkonlyArg, expectedCheckOnly; have != want {\n\t\tt.Errorf(\"have %v, want %v\", have, want)\n\t}\n\n\t// Compare verbose\n\tif have, want := verboseArg, expectedVerbose; have != want {\n\t\tt.Errorf(\"have %v, want %v\", have, want)\n\t}\n\n\t// Compare debug\n\tif have, want := debugArg, expectedDebug; have != want {\n\t\tt.Errorf(\"have %v, want %v\", have, want)\n\t}\n}", "title": "" }, { "docid": "55f59b74bda83aa8d9e2b23dbe41aef4", "score": "0.5889986", "text": "func parseArgs() config {\n\tcfg := config{}\n\tvar timeout string\n\tflag.StringVar(&cfg.address, \"address\", \"127.0.0.1:9000\", \"string, address, default is 127.0.0.1:8080\")\n\tflag.StringVar(&timeout, \"timeout\", \"0ms\", \"string, timeout of ticker, default is 0ms (without ticker)\")\n\tflag.Parse()\n\n\t// parse string timeout to duration\n\td, err := time.ParseDuration(timeout)\n\tif err != nil {\n\t\td = 0\n\t}\n\tcfg.timeout = d\n\n\treturn cfg\n}", "title": "" }, { "docid": "133e508fe05c78563270b3be6577596e", "score": "0.5889726", "text": "func Args() []string\t{ return os.Args[flags.first_arg:len(os.Args)] }", "title": "" }, { "docid": "1922a46097ea3b5f66760ad0922cef39", "score": "0.5882098", "text": "func parseArgv(l *linter) {\n\tconst enableAll = \"all\"\n\n\tflag.Usage = func() {\n\t\tlog.Printf(\"usage: [flags] package...\")\n\t\tflag.PrintDefaults()\n\t}\n\n\tenable := flag.String(\"enable\", enableAll,\n\t\t`comma-separated list of enabled checkers`)\n\tflag.BoolVar(&l.withExperimental, `withExperimental`, false,\n\t\t`only for -enable=all, include experimental checks`)\n\tflag.BoolVar(&l.withOpinionated, `withOpinionated`, false,\n\t\t`only for -enable=all, include very opinionated checks`)\n\tflag.IntVar(&l.failureExitCode, \"failcode\", 1,\n\t\t`exit code to be used when lint issues are found`)\n\tflag.BoolVar(&l.checkGenerated, \"checkGenerated\", false,\n\t\t`whether to check machine-generated files`)\n\n\tflag.Parse()\n\n\tl.packages = flag.Args()\n\n\tif len(l.packages) == 0 {\n\t\tblame(\"no packages specified\\n\")\n\t}\n\tif *enable != enableAll && l.withExperimental {\n\t\tblame(\"-withExperimental used with -enable=%q\", *enable)\n\t}\n\tif *enable != enableAll && l.withOpinionated {\n\t\tblame(\"-withOpinionated used with -enable=%q\", *enable)\n\t}\n\n\tswitch *enable {\n\tcase enableAll:\n\t\t// Special case. l.enabledCheckers remains nil.\n\tcase \"\":\n\t\t// Empty slice. Semantically \"disable-all\".\n\t\t// Can be used to run all pipelines without actual checkers.\n\t\tl.enabledCheckers = []string{}\n\tdefault:\n\t\t// Comma-separated list of names.\n\t\tl.enabledCheckers = strings.Split(*enable, \",\")\n\t}\n}", "title": "" }, { "docid": "31f6a7d7b39f9cebe1ade0dfd6d4b095", "score": "0.58763015", "text": "func analysisArgs() bool {\n\t//没有选项的情况显示帮助信息\n\tif len(os.Args) <= 1 {\n\t\tfor _, v := range gCommandItems {\n\t\t\tlog(v.mBuilder.getCommandDesc())\n\t\t}\n\t\treturn false\n\t}\n\n\t//解析指令\n\targs := os.Args[1:]\n\tvar pItem *sCommandItem = nil\n\tfor i := 0; i < len(args); i++ {\n\t\tparm := args[i]\n\t\tif parm[0] == '-' {\n\t\t\tpItem = findCommandItem(parm)\n\t\t\tif pItem == nil {\n\t\t\t\tlogErr(\"illegal command:\" + parm)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tpItem.mCanExecute = true\n\t\t} else {\n\t\t\tif pItem == nil {\n\t\t\t\tlogErr(\"illegal command:\" + parm)\n\t\t\t\treturn false\n\t\t\t}\n\t\t\tpItem.mParm = append(pItem.mParm, parm)\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "f5c000a344bcf15646b5e310cdc8e822", "score": "0.5871848", "text": "func ArgParse(confPath, tmplPath, emailTmplPath, staticTmplPath *string) (*commandLineArgs, error) {\n\tvar args commandLineArgs\n\targs.isProdFlag = flag.Bool(\"production\", false, \"use this flag to run the production executable\")\n\targs.basePath = flag.String(\"base\", \"\", \"base path (that contains client and server files) of the web application\")\n\tflag.Parse()\n\tif *args.isProdFlag {\n\t\t*confPath = filepath.Join(*args.basePath, *confPath)\n\t\t*tmplPath = filepath.Join(*args.basePath, *tmplPath)\n\t\t*emailTmplPath = filepath.Join(*args.basePath, *emailTmplPath)\n\t\t*staticTmplPath = filepath.Join(*args.basePath, *staticTmplPath)\n\t} else {\n\t\tbasePath, err := filepath.Abs(filepath.Dir(os.Args[0]))\n\t\tif err != nil {\n\t\t\treturn &args, err\n\t\t}\n\t\tvar (\n\t\t\tintermediateTmplPath string\n\t\t\tintermediateEmailTmplPath string\n\t\t\tintermediateStaticTmplPath string\n\t\t\tintermediateConfPath string\n\t\t)\n\t\tfor {\n\t\t\tintermediateTmplPath = filepath.Join(basePath, *tmplPath)\n\t\t\tintermediateEmailTmplPath = filepath.Join(basePath, *emailTmplPath)\n\t\t\tintermediateStaticTmplPath = filepath.Join(basePath, *staticTmplPath)\n\t\t\tintermediateConfPath = filepath.Join(basePath, *confPath)\n\t\t\tif _, err = os.Stat(intermediateConfPath); err == nil {\n\t\t\t\t*tmplPath, *emailTmplPath, *staticTmplPath, *confPath = intermediateTmplPath, intermediateEmailTmplPath, intermediateStaticTmplPath, intermediateConfPath\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tbasePath = filepath.Dir(basePath)\n\t\t}\n\t}\n\treturn &args, nil\n}", "title": "" }, { "docid": "9bf96f5f2b9849f6700c8e9d8e4250b8", "score": "0.58707464", "text": "func Parse(a interface{}, args []string) error {\n\trv := reflect.ValueOf(a)\n\trt := reflect.TypeOf(a)\n\tif rv.Kind() != reflect.Ptr || rv.Elem().Kind() != reflect.Struct {\n\t\treturn &InvalidParseError{rt}\n\t}\n\trv = rv.Elem()\n\trt = rt.Elem()\n\n\tfor i, arg := range args {\n\t\tif rt.Field(i).Name != extract(arg) {\n\t\t\treturn &InvalidArgumentError{arg}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e61d4bc08edc222cb7277ad90c900661", "score": "0.58650774", "text": "func (c *CmdGitMdget) ParseArgv(ctx *cli.Context) error {\n\tif len(ctx.Args()) > 1 {\n\t\treturn fmt.Errorf(\"mdget takes one optional argument\")\n\t}\n\tif len(ctx.Args()) == 1 {\n\t\tc.folder = ctx.Args()[0]\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4f00fcbeb6d8ea7e9c968a77815ccb97", "score": "0.5859987", "text": "func Args() []string { return CommandLine.args }", "title": "" }, { "docid": "bae0c339b03b0b4d7b495dc8f96f531b", "score": "0.5856881", "text": "func (this *Command) Parse(args []string) error {\n\targNum := 0\n\tvar lastArg *Argument\n\targc := len(args)\n\tla := len(this.Arguments)\n\tfor i := 0; i < argc; i++ {\n\t\ta := args[i]\n\t\tif len(a) > 0 && a[0:1] == \"-\" {\n\t\t\tn := strings.TrimLeft(a, \"-\")\n\t\t\tv := \"\"\n\t\t\tvv := false\n\n\t\t\t// is --opt=foo format\n\t\t\tif p := strings.Index(n, \"=\"); p > -1 {\n\t\t\t\tvv = true\n\t\t\t\tif p == 0 {\n\t\t\t\t\treturn fmt.Errorf(\"Malformed option \\\"%s\\\"\", a)\n\t\t\t\t}\n\t\t\t\tpp := strings.SplitN(n, \"=\", 2)\n\t\t\t\tn = pp[0]\n\t\t\t\tif len(pp) == 2 {\n\t\t\t\t\tv = pp[1]\n\t\t\t\t}\n\t\t\t}\n\t\t\to := this.Option(n)\n\t\t\tif o == nil {\n\t\t\t\treturn fmt.Errorf(\"Unrecognized option \\\"%s\\\"\", a)\n\t\t\t}\n\n\t\t\t// not a flag: must have value\n\t\t\t// is a flag: must not have non-flag value\n\t\t\tif !o.Flag && !vv {\n\t\t\t\tif i+1 == argc || args[i+1][0:1] == \"-\" {\n\t\t\t\t\treturn fmt.Errorf(\"Missing value for option \\\"%s\\\"\", a)\n\t\t\t\t} else {\n\t\t\t\t\ti++\n\t\t\t\t\tv = args[i]\n\t\t\t\t}\n\t\t\t} else if o.Flag && vv && !rxFlag.MatchString(v) {\n\t\t\t\treturn fmt.Errorf(\"Flag \\\"%s\\\" cannot have value\", a)\n\t\t\t} else if o.Flag {\n\t\t\t\tv = \"true\"\n\t\t\t}\n\t\t\tif err := o.Assign(v); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tif lastArg == nil || !lastArg.Multiple {\n\t\t\t\tif argNum+1 > la {\n\t\t\t\t\treturn fmt.Errorf(\"Too many arguments. Expected (at most) %d, got %d\", la, argNum+1)\n\t\t\t\t} else {\n\t\t\t\t\tlastArg = this.Arguments[argNum]\n\t\t\t\t}\n\t\t\t}\n\t\t\tif err := lastArg.Assign(a); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\targNum++\n\t\t}\n\t}\n\n\tfor _, a := range this.Arguments {\n\t\tif err := this.postSetupParam(a, \"Argument\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tfor _, o := range this.Options {\n\t\tif err := this.postSetupParam(o, \"Option\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "30f187c970382b06e6d72f6bb65372df", "score": "0.5823705", "text": "func (o *Options) Parse() error {\n\terr := o.flags.Parse(os.Args)\n\treturn err\n}", "title": "" }, { "docid": "ccd2c5b353cc4944deb7c7e822a717ed", "score": "0.5820886", "text": "func (app *App) Parse(arguments []string) error {\n\t// reset the requested command\n\tapp.invoked = nil\n\n\tif arguments == nil || len(arguments) == 0 {\n\t\treturn app.usageFailf(\"no arguments\")\n\t}\n\tout := app.Output()\n\n\tinitFlagSet := func(name, usage string) *flag.FlagSet {\n\t\tfs := flag.NewFlagSet(name, app.ErrorHandling)\n\t\tfs.SetOutput(out)\n\t\tfs.Usage = func() {\n\t\t\tfmt.Fprintln(out, usage)\n\t\t}\n\t\treturn fs\n\t}\n\n\tcmdName := arguments[0]\n\tif strings.HasPrefix(cmdName, \"-\") {\n\t\t// TODO: make app like command interface and use (cmd *Command) FlagSet\n\t\tfs := initFlagSet(\"\", app.Usage)\n\t\treturn fs.Parse(arguments)\n\t}\n\n\tcmd := app.findCommandByName(cmdName)\n\tif cmd == nil {\n\t\treturn app.usageFailf(\"unknown command %q\", cmdName)\n\t}\n\n\tfs := cmd.FlagSet(out)\n\n\terr := fs.Parse(arguments[1:])\n\n\tif err == nil {\n\t\t// save the requested command\n\t\tapp.invoked = cmd\n\t}\n\treturn err\n}", "title": "" }, { "docid": "e19f51d19c9d42988e80cc44f3d08743", "score": "0.5813252", "text": "func parse_args() {\n // Parsing arguments\n flag.Var(&QueuesIgnoreFlags, \"queue-ignore\", \"You need to specify the queues that should be excluded from monitoring, otherwise they will be monitored, e.g. --queue-ignore queue1 --queue-ignore queue2\")\n flag.Var(&QueuesFlags, \"queue\", \"This is a queue name for monitoring. You can add multiple queues, e.g. --queue queueA --queue queueB\")\n\n flag.Var(&WarningThresholdFlag, \"threshold-warning\", \"This is a warning threshold. If you have specified multiple queues, you need multiple --threshold-warning parameters, e.g. --threshold-warning 10 --threshold-warning 20\")\n flag.Var(&CriticalThresholdFlag, \"threshold-critical\", \"This is a critical threshold. If you have specified multiple queues, you need multiple --threshold-critical parameters, e.g. --threshold-critical 20 --threshold-critical 20\")\n\n flag.StringVar(&URLFlag, \"api-url\", \"\", \"This is RabbitMQ URL, e.g. --api-url 'http://localhost:15672/api/queues'\")\n flag.StringVar(&UsernameFlag, \"api-username\", \"\", \"This is RabbitMQ API username, e.g. --api-username monitoring\")\n flag.StringVar(&PasswordFlag, \"api-password\", \"\", \"This is RabbitMQ API password, e.g. --api-password MyPassword\")\n flag.StringVar(&VHostFlag, \"vhost\", \"\", \"This is your target RabbitMQ virtual host, but IMPORTANT that other virtual hosts will not be monitored\")\n flag.StringVar(&DebugFlag, \"debug\", \"no\", \"For more verbose output use --debug yes\")\n\n flag.IntVar(&DefaultWarningThresholdFlag, \"threshold-warning-default\", 40, \"If you didn't specify the queue it's still monitored and has warning threshold\")\n flag.IntVar(&DefaultCriticalThresholdFlag, \"threshold-critical-default\", 50, \"If you didn't specify the queue it's still monitored and has critical threshold\")\n\n // Parse all arguments in\n flag.Parse()\n\n // Check whether the same count of arguments passed for each queue\n if len(QueuesFlags) != len(WarningThresholdFlag) || len(QueuesFlags) != len(CriticalThresholdFlag) {\n fmt.Println(\"It seems you have passed different count of arguments for queues and queues thresholds, please check --help\")\n os.Exit(3)\n }\n\n // Debug mode\n if DebugFlag == \"yes\" {\n fmt.Println(\"---- Arguments ----\")\n fmt.Printf(\"%v queue(s) to be ignored: %v\\n\", len(QueuesIgnoreFlags), QueuesIgnoreFlags)\n fmt.Printf(\"%v queue(s) to be monitored: %v\\n\", len(QueuesFlags), QueuesFlags)\n fmt.Printf(\"%v warning threshold(s) for the queue(s): %v\\n\", len(WarningThresholdFlag), WarningThresholdFlag)\n fmt.Printf(\"%v critical threshold(s) for the queue(s): %v\\n\", len(CriticalThresholdFlag), CriticalThresholdFlag)\n\n fmt.Println(\"URL:\", URLFlag)\n fmt.Println(\"Username:\", UsernameFlag)\n fmt.Println(\"Password:\", PasswordFlag)\n fmt.Println(\"Virtual host:\", VHostFlag)\n\n fmt.Println(\"Default warning threshold:\", DefaultWarningThresholdFlag)\n fmt.Println(\"Default critical threshold:\", DefaultCriticalThresholdFlag)\n fmt.Println(\"---- ---- ---- ----\")\n }\n}", "title": "" }, { "docid": "6d404165fd653213bb6353df9b434831", "score": "0.5810588", "text": "func getArgs() (string, string) {\n\tvar filePath = flag.String(\"file\", \"\", \"Bestand dat je wilt openen\")\n\tvar fields = flag.String(\"fields\", \"\", \"De velden die je wilt hebben\")\n\tflag.Parse()\n\treturn *filePath, *fields\n}", "title": "" }, { "docid": "3a4b91b2cfe7bd992140ebd1926e1aa5", "score": "0.580664", "text": "func (c *Command) Parse(args []string) error {\n\treturn c.flagSet.Parse(args)\n}", "title": "" }, { "docid": "a96b1a3dbcb8de5c1b99f3a0f0b192be", "score": "0.5805976", "text": "func ParseArgs(args []string) (*EnvFlags, error) {\n\tvar (\n\t\tfeature string\n\t\tassess string\n\t\tnamespace string\n\t\tkubeconfig string\n\t\tskipFeature string\n\t\tskipAssessment string\n\t\tparallelTests bool\n\t\tdryRun bool\n\t\tfailFast bool\n\t\tdisableGracefulTeardown bool\n\t\tkubeContext string\n\t)\n\n\tlabels := make(LabelsMap)\n\tskipLabels := make(LabelsMap)\n\n\tif flag.Lookup(featureFlag.Name) == nil {\n\t\tflag.StringVar(&feature, featureFlag.Name, featureFlag.DefValue, featureFlag.Usage)\n\t}\n\n\tif flag.Lookup(assessFlag.Name) == nil {\n\t\tflag.StringVar(&assess, assessFlag.Name, assessFlag.DefValue, assessFlag.Usage)\n\t}\n\n\tif flag.Lookup(kubecfgFlag.Name) == nil {\n\t\tflag.StringVar(&kubeconfig, kubecfgFlag.Name, kubecfgFlag.DefValue, kubecfgFlag.Usage)\n\t}\n\n\tif flag.Lookup(kubeNSFlag.Name) == nil {\n\t\tflag.StringVar(&namespace, kubeNSFlag.Name, kubeNSFlag.DefValue, kubeNSFlag.Usage)\n\t}\n\n\tif flag.Lookup(labelsFlag.Name) == nil {\n\t\tflag.Var(&labels, labelsFlag.Name, labelsFlag.Usage)\n\t}\n\n\tif flag.Lookup(skipLabelsFlag.Name) == nil {\n\t\tflag.Var(&skipLabels, skipLabelsFlag.Name, skipLabelsFlag.Usage)\n\t}\n\n\tif flag.Lookup(skipAssessmentFlag.Name) == nil {\n\t\tflag.StringVar(&skipAssessment, skipAssessmentFlag.Name, skipAssessmentFlag.DefValue, skipAssessmentFlag.Usage)\n\t}\n\n\tif flag.Lookup(skipFeatureFlag.Name) == nil {\n\t\tflag.StringVar(&skipFeature, skipFeatureFlag.Name, skipFeatureFlag.DefValue, skipFeatureFlag.Usage)\n\t}\n\n\tif flag.Lookup(parallelTestsFlag.Name) == nil {\n\t\tflag.BoolVar(&parallelTests, parallelTestsFlag.Name, false, parallelTestsFlag.Usage)\n\t}\n\n\tif flag.Lookup(dryRunFlag.Name) == nil {\n\t\tflag.BoolVar(&dryRun, dryRunFlag.Name, false, dryRunFlag.Usage)\n\t}\n\n\tif flag.Lookup(failFastFlag.Name) == nil {\n\t\tflag.BoolVar(&failFast, failFastFlag.Name, false, failFastFlag.Usage)\n\t}\n\n\tif flag.Lookup(disableGracefulTeardownFlag.Name) == nil {\n\t\tflag.BoolVar(&disableGracefulTeardown, disableGracefulTeardownFlag.Name, false, disableGracefulTeardownFlag.Usage)\n\t}\n\n\tif flag.Lookup(contextFlag.Name) == nil {\n\t\tflag.StringVar(&kubeContext, contextFlag.Name, contextFlag.DefValue, contextFlag.Usage)\n\t}\n\n\t// Enable klog/v2 flag integration\n\tklog.InitFlags(nil)\n\n\tif err := flag.CommandLine.Parse(args); err != nil {\n\t\treturn nil, fmt.Errorf(\"flags parsing: %w\", err)\n\t}\n\n\t// Hook into the default test.list of the `go test` and integrate that with the `--dry-run` behavior. Treat them the same way\n\tif !dryRun && flag.Lookup(\"test.list\") != nil && flag.Lookup(\"test.list\").Value.String() == \"true\" {\n\t\tklog.V(2).Info(\"Enabling dry-run mode as the tests were invoked in list mode\")\n\t\tdryRun = true\n\t}\n\n\tif failFast && parallelTests {\n\t\tpanic(fmt.Errorf(\"--fail-fast and --parallel are mutually exclusive options\"))\n\t}\n\n\treturn &EnvFlags{\n\t\tfeature: feature,\n\t\tassess: assess,\n\t\tlabels: labels,\n\t\tnamespace: namespace,\n\t\tkubeconfig: kubeconfig,\n\t\tskiplabels: skipLabels,\n\t\tskipFeatures: skipFeature,\n\t\tskipAssessments: skipAssessment,\n\t\tparallelTests: parallelTests,\n\t\tdryRun: dryRun,\n\t\tfailFast: failFast,\n\t\tdisableGracefulTeardown: disableGracefulTeardown,\n\t\tkubeContext: kubeContext,\n\t}, nil\n}", "title": "" }, { "docid": "853ec84d2e60824ae1c79d00ae69fa97", "score": "0.58032525", "text": "func ParseUserFromArgs(arg string, isFile bool) (userID int64, name string, err error) {\n\tif isFile {\n\t\treturn userFromStdin(arg)\n\t}\n\treturn userFromArg(arg)\n}", "title": "" }, { "docid": "f22f687c87d2429467bf4b4c3517d5e8", "score": "0.57960707", "text": "func Args(cmd, prefix, sep string) []string {\n\targs := make([]string, 0)\n\tfor _, part := range strings.SplitN(cmd, sep, -1) {\n\t\tif part != prefix && strings.HasPrefix(part, prefix) {\n\t\t\targs = append(args, part)\n\t\t}\n\t}\n\treturn args\n}", "title": "" }, { "docid": "0ca757437f630f3a87a223439c9887b4", "score": "0.57734257", "text": "func ParseArgs() (string, *Options) {\n\topts := (&Options{}).init()\n\troot := rootFlagSet(opts)\n\n\troot.Parse(os.Args[1:])\n\n\tsubArgs := root.Args()\n\tif len(subArgs) == 0 {\n\t\tfmt.Fprintf(os.Stderr, \"%s error: must supply a subcommand. one of: %s\\n\", PROG_NAME, strings.Join(subCommandKeys(), \",\"))\n\t\tos.Exit(1)\n\t}\n\n\tif subCmd, ok := subCommands[subArgs[0]]; ok {\n\t\tsubCmd.flagSet(opts).Parse(subArgs[1:])\n\t} else {\n\t\tfmt.Fprintf(os.Stderr, \"%s error: unknown subcommand: %s\\n\", PROG_NAME, subArgs[0])\n\t\tos.Exit(1)\n\t}\n\n\tif root, err := fp.Abs(opts.RootDir); err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%s error: unable to find root directory: %s\", PROG_NAME, opts.RootDir)\n\t} else {\n\t\topts.RootDir = fp.FromSlash(root)\n\t}\n\n\treturn subArgs[0], opts\n}", "title": "" }, { "docid": "6fe05242121e6530c7f4abe578a66ca3", "score": "0.5767029", "text": "func Parse() error {\n\treturn CommandLine.Parse(os.Args[1:])\n}", "title": "" }, { "docid": "92000a6f395be23193836a49ed786388", "score": "0.5759972", "text": "func Parse(config interface{}) { Define(config); flag.Parse() }", "title": "" }, { "docid": "dc9c122d3283bd9e49407d1537a5c1d4", "score": "0.5757931", "text": "func parseArgs(x string) []string {\n\t// TODO: Use strings.Cut\n\tvar out []string\n\tx = strings.Trim(x, \" \")\n\tfor len(x) > 0 {\n\t\tif x[0] == '\"' {\n\t\t\tx = x[1:]\n\t\t\ti := strings.Index(x, \"\\\"\")\n\t\t\tif i < 0 {\n\t\t\t\tpanic(\"missing \\\"\")\n\t\t\t}\n\t\t\tout = append(out, x[:i])\n\t\t\tx = strings.TrimLeft(x[i+1:], \" \")\n\t\t} else if i := strings.Index(x, \" \"); i < 0 {\n\t\t\tout = append(out, x)\n\t\t\tx = \"\"\n\t\t} else {\n\t\t\tout = append(out, x[:i])\n\t\t\tx = strings.TrimLeft(x[i+1:], \" \")\n\t\t}\n\t}\n\treturn out\n}", "title": "" }, { "docid": "0d0d29d53314fa0b688e7a514817207f", "score": "0.57575357", "text": "func ParseVariadicCheckArguments(\n\tresult map[string][]string,\n\tconstraints []proto.CheckConfigConstraint,\n\tthresholds []proto.CheckConfigThreshold,\n\targs []string,\n) error {\n\t// used to hold found errors, so if three keywords are missing they can\n\t// all be mentioned in one call\n\terrors := []string{}\n\n\tmultiple := []string{\n\t\t`threshold`,\n\t\t`constraint`}\n\tunique := []string{\n\t\t`in`,\n\t\t`on`,\n\t\t`with`,\n\t\t`interval`,\n\t\t`inheritance`,\n\t\t`childrenonly`,\n\t\t`extern`}\n\trequired := []string{\n\t\t`in`,\n\t\t`on`,\n\t\t`with`,\n\t\t`interval`}\n\n\t// merge key slices\n\tkeys := append(multiple, unique...)\n\n\t// iteration helper\n\tskip := false\n\tskipcount := 0\n\nargloop:\n\tfor pos, val := range args {\n\t\t// skip current arg if it was already consumed\n\t\tif skip {\n\t\t\tskipcount--\n\t\t\tif skipcount == 0 {\n\t\t\t\tskip = false\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t\tif sliceContainsString(val, keys) {\n\t\t\t// there must be at least one arguments left\n\t\t\tif len(args[pos+1:]) < 1 {\n\t\t\t\terrors = append(errors, `Syntax error, incomplete`+\n\t\t\t\t\t` key/value specification (too few items left`+\n\t\t\t\t\t` to parse)`,\n\t\t\t\t)\n\t\t\t\tgoto abort\n\t\t\t}\n\t\t\t// check for back-to-back keyswords\n\t\t\tif err := checkStringNotAKeyword(\n\t\t\t\targs[pos+1], keys,\n\t\t\t); err != nil {\n\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\tgoto abort\n\t\t\t}\n\n\t\t\tswitch val {\n\t\t\tcase `threshold`:\n\t\t\t\tif len(args[pos+1:]) < 6 {\n\t\t\t\t\terrors = append(errors, `Syntax error, incomplete`+\n\t\t\t\t\t\t`threshold specification`)\n\t\t\t\t\tgoto abort\n\t\t\t\t}\n\t\t\t\tthr := proto.CheckConfigThreshold{}\n\t\t\t\tif err := parseThresholdChain(\n\t\t\t\t\tthr,\n\t\t\t\t\targs[pos+1:pos+7],\n\t\t\t\t); err != nil {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t} else {\n\t\t\t\t\tthresholds = append(thresholds, thr)\n\t\t\t\t}\n\t\t\t\tskip = true\n\t\t\t\tskipcount = 6\n\t\t\t\tcontinue argloop\n\n\t\t\tcase `constraint`:\n\t\t\t\t// argument is the start of a constraint specification.\n\t\t\t\t// check we have enough arguments left\n\t\t\t\tif len(args[pos+1:]) < 3 {\n\t\t\t\t\terrors = append(errors, `Syntax error, incomplete`+\n\t\t\t\t\t\t` constraint specification`)\n\t\t\t\t}\n\t\t\t\tconstr := proto.CheckConfigConstraint{}\n\t\t\t\tif err := parseConstraintChain(\n\t\t\t\t\tconstr,\n\t\t\t\t\targs[pos+1:pos+3],\n\t\t\t\t); err != nil {\n\t\t\t\t\terrors = append(errors, err.Error())\n\t\t\t\t} else {\n\t\t\t\t\tconstraints = append(constraints, constr)\n\t\t\t\t}\n\t\t\t\tskip = true\n\t\t\t\tskipcount = 3\n\t\t\t\tcontinue argloop\n\n\t\t\tcase `on`:\n\t\t\t\tresult[`on/type`] = append(result[`on/type`],\n\t\t\t\t\targs[pos+1])\n\t\t\t\tresult[`on/object`] = append(result[`on/object`],\n\t\t\t\t\targs[pos+2])\n\t\t\t\t// set for required+unique checks\n\t\t\t\tresult[val] = append(result[val], fmt.Sprintf(\n\t\t\t\t\t\"%s::%s\", args[pos+1], args[pos+2]))\n\t\t\t\tskip = true\n\t\t\t\tskipcount = 2\n\t\t\t\tcontinue argloop\n\n\t\t\tdefault:\n\t\t\t\t// regular key/value keyword\n\t\t\t\tresult[val] = append(result[val], args[pos+1])\n\t\t\t\tskip = true\n\t\t\t\tskipcount = 1\n\t\t\t\tcontinue argloop\n\t\t\t}\n\t\t}\n\t\t// error is reached if argument was not skipped and not a\n\t\t// recognized keyword\n\t\terrors = append(errors, fmt.Sprintf(\"Syntax error, erroneus\"+\n\t\t\t\" argument: %s\", val))\n\t}\n\n\t// check if all required keywords were collected\n\tfor _, key := range required {\n\t\tif _, ok := result[key]; !ok {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error,\"+\n\t\t\t\t\" missing keyword: %s\", key))\n\t\t}\n\t}\n\n\t// check if unique keywords were only specuified once\n\tfor _, key := range unique {\n\t\t// check ok since unique may still be optional\n\t\tif sl, ok := result[key]; ok && (len(sl) > 1) {\n\t\t\terrors = append(errors, fmt.Sprintf(\"Syntax error,\"+\n\t\t\t\t\" keyword must only be provided once: %s\", key))\n\t\t}\n\t}\n\nabort:\n\tif len(errors) > 0 {\n\t\treturn fmt.Errorf(combineStrings(errors...))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "11bf9c03c86ca2b3db6de7185dcea1c1", "score": "0.57292986", "text": "func Parse() {\n\tCommandLine.Complete()\n\tCommandLine.Parse(os.Args[1:])\n}", "title": "" } ]
588a91f6264f1aebce9ad13807cb666b
JSONString returns path representation is JSON convention
[ { "docid": "ab2f5a8e682e59622b7fd0995e3e7deb", "score": "0.0", "text": "func (fp *UpdateRoleBindingRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" } ]
[ { "docid": "0fe9322608d7172faa304f73d9899f3c", "score": "0.7509377", "text": "func (fpm *MonitoredResourceMetadata_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "378917e495706a2c7043e32a3fdee2e2", "score": "0.7499903", "text": "func (fpm *MonitoredResource_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "6912119595cad67e08867498e4130e2f", "score": "0.7444574", "text": "func (fps *Distribution_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "50a22bd4adf2120291aae52501e76d7b", "score": "0.740757", "text": "func (fpm *MonitoredResourceSelector_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "e1675363cab1a168b4774e3eccc05049", "score": "0.73864913", "text": "func (fp *Distribution_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f29b1c5d42be2cf07e3a935e3df7aeae", "score": "0.73404217", "text": "func (fps *Invitation_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "fbb05ec33d1bbfdecfed342cf171fd3c", "score": "0.7336917", "text": "func (fp *Invitation_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "562493f368d1099077eb21e90b58e232", "score": "0.73102087", "text": "func (fps *CreateResourceRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "f995dd87296765fe3a3740351f648a66", "score": "0.73048925", "text": "func (fps *UpdateResourceRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "da55712029b0638fd40cf65a5d41f899", "score": "0.7300483", "text": "func (fp *Aggregation_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "3c4f5a2774e50aab159aded1f1d3a424", "score": "0.7260828", "text": "func (fp *TimeInterval_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "1caa878fd36f40b96c67a5545d28f9a9", "score": "0.7251719", "text": "func (fp *MonitoredResource_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ab73700531120896eee4b52c7cf8236d", "score": "0.7248794", "text": "func (fps *Alert_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "d630e387f58383cbe13cc0e064470afb", "score": "0.72479045", "text": "func (fps *UpdateResourceRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "823ac53c731ed2e4d61fae63a433b8c9", "score": "0.72449285", "text": "func (fp *Actor_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "237bb6993c27febeac5836695a3206b5", "score": "0.72379196", "text": "func (fpm *AlertInfoObservedValues_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "486ed3ee4487f6f9caedc01969e45b92", "score": "0.723311", "text": "func (fp *LabelDescriptor_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "0ab940e12e8c2eb033fd4bfab6f5d275", "score": "0.7204491", "text": "func (fp *TimeSeriesSelector_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "18fca973342c8485a43ccef6b4f9b2df", "score": "0.72006863", "text": "func (fp *Alert_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "640bfbb576fd24b00d4be3f14ea86099", "score": "0.72006357", "text": "func JSON(path string) ([]byte, error) {\n\n\tif strings.HasSuffix(path, \"/\") {\n\t\tpath = strings.TrimSuffix(path, \"/\")\n\t}\n\n\tresult, err := processDirectory(path)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn []byte(result.Json()), nil\n\n}", "title": "" }, { "docid": "ad995077e0dbc706cdb184bd8bde3f35", "score": "0.72002375", "text": "func (fps *AlertInfo_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "f3135e00e19555302b683436b7a4610d", "score": "0.7199581", "text": "func (fps *DistributionBucketOptions_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "801e022477d1eed09f019ea09be5b59e", "score": "0.7199403", "text": "func (fps *AlertState_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "8bddfa7dee5de446f81994a830f4ddb2", "score": "0.71838844", "text": "func (fp *WatchResourcesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "cfe85bec8c9d71360524a78e5943e99c", "score": "0.7179656", "text": "func (fp *Metric_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "cc6e63a14fdf4ad3af7577377f9c6c22", "score": "0.7177979", "text": "func (fp *MonitoredResourceMetadata_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "6df6d7f22b53873d06004cfa9215e8fd", "score": "0.71763587", "text": "func (fp *AlertState_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f1f977fdd61660d47ad99f0f61c62ca8", "score": "0.7175746", "text": "func (fps *BatchGetResourcesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "0001ea1e3936292363e3247967532693", "score": "0.71718323", "text": "func (fpm *Metric_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "bd82c2ecc302de0d4ecd7973bb4149af", "score": "0.71654636", "text": "func JSONPath(fields []string) string {\n\treturn \".\" + strings.Join(fields, \".\")\n}", "title": "" }, { "docid": "940aa2de4bdf86fccac63dd4b28858c8", "score": "0.7164862", "text": "func (fp *UpdateResourceRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "cba8a2988b2220e791613e1a1f00acc4", "score": "0.7163055", "text": "func (fpm *MetricSelector_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "54f1dfdf2f65eb69e89685b7d5b0a2eb", "score": "0.715079", "text": "func (fps *TypedValue_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "cc9c33302348660e417978ebc82b9157", "score": "0.7148609", "text": "func (fp *WatchResourceRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b39be96187edafb07c02014a5935c94a", "score": "0.714704", "text": "func (fps *CreateProvisioningPolicyRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "0d2ab42b33b9604252a0d4bf3b18da34", "score": "0.71460897", "text": "func (fp *BatchGetResourcesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "492ab982131c8102e8de4db55877860d", "score": "0.7145033", "text": "func (fp *MonitoredResourceSelector_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "eddc75a6d527cf6875238ed594f89b88", "score": "0.7140558", "text": "func (fps *TimeSeriesSelector_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "e6db0b7f39f8983f7be8bc1de9fac43e", "score": "0.7136801", "text": "func (fp *LabelKeySet_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "65ab69bec28945d6f8c6e51e3acc6b90", "score": "0.7136798", "text": "func (fp *AlertInfo_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "91be5a7d53ff8c01a3fa04afd11a9fd9", "score": "0.71337444", "text": "func (fp *DistributionRange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9e55a3a9718cd273c8dcc5674b0cd1f4", "score": "0.71296686", "text": "func (fps *ListResourcesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "eaa4b1a5ba6a62452da054c15d3829dc", "score": "0.712872", "text": "func (fps *WatchResourcesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "23454c32aab06349f112d7c25ed4d329", "score": "0.7125863", "text": "func (fp *ListResourcesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "1c69dd396fdb67cecfa568f6920b78b9", "score": "0.71167684", "text": "func (fp *WatchResourcesResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9a16144381d4ff705058ce6d1e7e69de", "score": "0.71160597", "text": "func (fp *GetResourceRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ea0bfa8ec5065758edb84f69b10d2a90", "score": "0.71087384", "text": "func (fp *MethodDescriptor_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ba7524c16d383d8d24145b87efa6fbf0", "score": "0.71050143", "text": "func (fp *Strings_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "fd3af5457a46663358e711eb435fd2ac", "score": "0.70947087", "text": "func (fps *AlertInfoTimeSerie_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "36cfd1cdc9f7bf36de18c6e61a594f5f", "score": "0.7089432", "text": "func (fp *DistributionBucketOptions_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f3c5627dcd5932e44ca9fd20ad732123", "score": "0.70891815", "text": "func (fp *CreateResourceRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "6424942bc82d7ab6a7e2398d7bf6f8ff", "score": "0.7081708", "text": "func (fp *TypedValue_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "b2cb5b3e68a785b3b28517b9199e792c", "score": "0.70772356", "text": "func (fp *WatchResourcesResponsePageTokenChange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ee6d8495df1c3665d1ace728a2bda4ad", "score": "0.70666295", "text": "func (fps *UpdateProvisioningPolicyRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "2673722c94a30b3229cf846606b42633", "score": "0.7066405", "text": "func (fp *WatchResourceResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "f0f1f0f61028569f47392cfd57a3c8ab", "score": "0.7065321", "text": "func (fps *MethodDescriptor_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "48d7efe1fc60bde2b5108838b3aa8407", "score": "0.7063282", "text": "func (fp *ListResourcesResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d9ad4285af33f699b6c07f0d8451374f", "score": "0.7060588", "text": "func (fp *BatchGetResourcesResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ced79b00f5a6e5311be8a434438ef65b", "score": "0.7060235", "text": "func (fps *BatchGetRoleBindingsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "156f5ebd2c096f2bf2c675128038fa45", "score": "0.70539665", "text": "func (fp *TimeRange_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "71eadafa169bbadd8f43bd8fbb4ce2d0", "score": "0.7050758", "text": "func (fp *DistributionBucketOptionsLinear_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "ffb7442fdd39e1a2e430dde508352ae3", "score": "0.70428395", "text": "func (fps *CreatePhantomTimeSerieRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "41bb798d9bdf1b46ce68b1c9a81b78dd", "score": "0.7041222", "text": "func (fps *UpdateProvisioningPolicyRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "443a4a0851b7b168fb0af22c19a66aad", "score": "0.70369947", "text": "func (fps *CreateAlertingPolicyRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "26191740fa36049e6319e439c63f3de2", "score": "0.7033897", "text": "func (fp *MetricSelector_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9ef87c1d7a487d7440c6444c65728c32", "score": "0.7023095", "text": "func (fp *AlertInfoTimeSerie_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9573fc71248065d181546b952e0e596a", "score": "0.70198816", "text": "func (fps *CreateRoleBindingRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "cad3b66cc9d3992af15fe6fbbe49a8a9", "score": "0.7010631", "text": "func (fp *UpdateResourceRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "7b831d184a0c7018071f93dffb667b80", "score": "0.70098585", "text": "func (fps *UpdatePhantomTimeSerieRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "69adbaaa8d922450021e5e6e22eba745", "score": "0.7009465", "text": "func (fp *DeleteResourceRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "32a771427454b5e0f2bde91e819dfc5c", "score": "0.70083106", "text": "func (fp *DistributionBucketOptionsExponential_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "e1312078f3156164b37ca200652b373d", "score": "0.7002203", "text": "func (fps *UpdateAlertingPolicyRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "d18870890cf3fbf9f6ba32855dcf5e13", "score": "0.69976586", "text": "func (fps *ProvisionDeviceForApprovedRequestRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "684b2978488eca97d304634cd765f211", "score": "0.69968903", "text": "func (fps *WatchRoleBindingsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "0caa068887772db1a319ae1ec77ed89d", "score": "0.6994834", "text": "func (fps *UpdateRoleBindingRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "3a3671217f9dbe29ef40c5ab20dcf541", "score": "0.6991285", "text": "func GetJSONPath(path string) string {\n\tparts := strings.Split(path, \".\")\n\tif strings.HasPrefix(parts[0], \"$\") {\n\t\tparts = parts[1:]\n\t}\n\tif len(parts) == 0 {\n\t\treturn \"\"\n\t}\n\tfound := false\n\tfor _, v := range gripql.ReservedFields {\n\t\tif parts[0] == v {\n\t\t\tfound = true\n\t\t\tparts[0] = strings.TrimPrefix(parts[0], \"_\")\n\t\t}\n\t}\n\n\tif !found {\n\t\tparts = append([]string{\"data\"}, parts...)\n\t}\n\n\tparts = append([]string{\"$\"}, parts...)\n\treturn strings.Join(parts, \".\")\n}", "title": "" }, { "docid": "72a9d88306d1ffd4c8cd5aea617c8eb7", "score": "0.69890594", "text": "func (fps *UpdateRoleBindingRequest_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "48aef2b4cc64f3178cb8faa8a0195346", "score": "0.6976834", "text": "func (fp *DistributionBucketOptionsExplicit_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "d7cabfbb6f32d15d708d65e1163ee52a", "score": "0.69729847", "text": "func (fps *UpdateAlertingPolicyRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "2ab748f2212b5f85d673af4806fc3d1e", "score": "0.6971785", "text": "func (fps *UpdatePhantomTimeSerieRequestCAS_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "ae702fc3b2809eb31db8912e64db8661", "score": "0.69690436", "text": "func (fp *AlertInfoObservedValues_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "603e8caa4e38187b54abdcdfd2849304", "score": "0.69677436", "text": "func (fps *ListRoleBindingsResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "458fa5ad43cf8f285e8f7bcc99ceaa39", "score": "0.69672126", "text": "func (fps *BatchGetPhantomTimeSeriesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "7f28484cc57110c0e7ac79c8688ad8ec", "score": "0.696103", "text": "func (fp *DistributionBucketOptionsDynamic_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "1552dec11bf2b34b52b92dbec7fd3151", "score": "0.6944706", "text": "func (fp *WatchAlertingPoliciesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "dbb0d13bc3fec4e38cc00ee88e0827c0", "score": "0.69385076", "text": "func (fp *WatchRoleBindingsRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "96c5018bf7c674c9f4d7622938166526", "score": "0.69382375", "text": "func (fp *WatchRoleBindingsResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "4666508c9d7016159456c29001c8d7eb", "score": "0.6937294", "text": "func (fp *WatchProvisioningPolicyRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "1f1eacdf95270065f54ca6fe35e3e255", "score": "0.6936947", "text": "func (fp *WatchProvisioningPoliciesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "487f47839628c42e1be83e6ec77f6be7", "score": "0.6926002", "text": "func (fp *TestNotificationChannelRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "a03e7718d249aa99fbaa7fb305312889", "score": "0.69258374", "text": "func (fp *WatchRoleBindingRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "09254f5d909e69f502d4a25078e58724", "score": "0.69249666", "text": "func (fp *WatchRoleBindingResponse_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "e48f5dc51b1359b6ba65612820568c3f", "score": "0.6924001", "text": "func (fps *WatchProvisioningPoliciesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "0f761fd5369a3858d5c5dfdbb8448731", "score": "0.6923088", "text": "func (fp *UpdatePhantomTimeSerieRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "3d98dc53bc761a452abe1fa8ed1850ba", "score": "0.69190925", "text": "func (fp *UpdateAlertingPolicyRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "5dacf70188604b2b662c9218f23c9ba2", "score": "0.69189924", "text": "func (fpm *AlertStateCombineThresholdPerMetric_FieldPathMap) JSONString() string {\n\treturn strcase.ToLowerCamel(fpm.selector.String()) + \".\" + fpm.key\n}", "title": "" }, { "docid": "998a20ed0ce7f8f15b08467a95a5c865", "score": "0.6917935", "text": "func (fp *UpdateProvisioningPolicyRequestCAS_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "508599c8bbda0deff8ce64ec927dc0f2", "score": "0.6912098", "text": "func (fps *BatchGetProvisioningPoliciesResponse_FieldSubPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fps.selector.String()) + \".\" + fps.subPath.JSONString()\n}", "title": "" }, { "docid": "368a2f155b99aea305664b3de3ee32ce", "score": "0.69088864", "text": "func (fp *WatchAlertingPolicyRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "9f12fdf3ea9aec3b26a59d4cb183613e", "score": "0.6906027", "text": "func (fp *WatchPhantomTimeSeriesRequest_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" }, { "docid": "63617f1909b04d430c3ec5d7dab6d57b", "score": "0.6903595", "text": "func (fp *AlertStateThreshold_FieldTerminalPath) JSONString() string {\n\treturn strcase.ToLowerCamel(fp.String())\n}", "title": "" } ]
25a8a241154a88630348a0b41f37d50b
ItemByURL gets an Item at this location with the specified URL.
[ { "docid": "d762863edb8719be270acd4827f50e57", "score": "0.84776074", "text": "func (l *location) ItemByURL(url *url.URL) (stow.Item, error) {\n\treturn nil, errors.New(\"unsupported\")\n}", "title": "" } ]
[ { "docid": "73d6e17909145c93e900e3e5591d3f70", "score": "0.81766874", "text": "func (l *Location) ItemByURL(url *url.URL) (stow.Item, error) {\n\n\tif url.Scheme != Kind {\n\t\treturn nil, errors.New(\"not valid google storage URL\")\n\t}\n\n\t// /download/storage/v1/b/stowtesttoudhratik/o/a_first%2Fthe%20item\n\tpieces := strings.SplitN(url.Path, \"/\", 8)\n\n\tc, err := l.Container(pieces[5])\n\tif err != nil {\n\t\treturn nil, stow.ErrNotFound\n\t}\n\n\ti, err := c.Item(pieces[7])\n\tif err != nil {\n\t\treturn nil, stow.ErrNotFound\n\t}\n\n\treturn i, nil\n}", "title": "" }, { "docid": "44b268cd99433e7493765507c6285c13", "score": "0.6408811", "text": "func GetbyURL(URL string) (Article, error) {\n\titem := Article{}\n\trows, err := config.DB.Query(\"SELECT Id, Title, Teaser, Body, Image, Tags, Author, Url, Changed, Created FROM articles WHERE Url = ?\", URL)\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\trows.Scan(&item.ID, &item.Title, &item.Teaser, &item.Body, &item.Image, &item.Tags, &item.Author, &item.URL, &item.Changed, &item.Created)\n\t}\n\treturn item, err\n}", "title": "" }, { "docid": "824c126868ab252d1149f975caffbfba", "score": "0.62405634", "text": "func CreateItemFromURL(w http.ResponseWriter, r *http.Request) {\n\tdata := &payloads.ItemRequest{}\n\tif err := render.Bind(r, data); err != nil {\n\t\trender.Render(w, r, payloads.ErrInvalidRequest(err))\n\t\treturn\n\t}\n\titem := data.Item\n\n\tpath, err := url.Parse(item.URL)\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrInvalidRequest(err))\n\t\treturn\n\t}\n\n\t// Get new Item\n\tif correspondingScraper, ok := scraper.Instance().Scrapers[path.Host]; ok {\n\t\t*item, err = correspondingScraper.ScrapeInfo(path)\n\t\tif err != nil {\n\t\t\trender.Render(w, r, payloads.ErrInternalError(err))\n\t\t\treturn\n\t\t}\n\t} else {\n\t\trender.Render(w, r, payloads.ErrNotImplemented)\n\t\treturn\n\t}\n\n\tif err := render.Render(w, r, payloads.NewItemResponse(item)); err != nil {\n\t\trender.Render(w, r, payloads.ErrRender(err))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "79770cdb013cfefbae17d606d61a7f1f", "score": "0.61963445", "text": "func (w *Client) Item(in string) (*Item, error) {\n\tresults, err := w.Search(Id(in)).Or(Uri(in)).FindItems(Limit(1))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif len(results) == 1 {\n\t\treturn results[0], nil\n\t}\n\treturn nil, errors.New(fmt.Sprintf(\"Expected 1 result, got %d\", len(results)))\n}", "title": "" }, { "docid": "17dacc4746faa70c12a5ffc7e93d8738", "score": "0.5993506", "text": "func getItem(id int, apiURL string) (Item, error) {\n\treqURL := fmt.Sprintf(\"%s/%s/%d\", apiURL, \"item\", id) + jsonSuffix\n\n\tresp, err := getBody(reqURL)\n\n\tvar item Item\n\n\tif err != nil {\n\t\treturn item, err\n\t}\n\n\terr = json.Unmarshal(resp, &item)\n\treturn item, err\n}", "title": "" }, { "docid": "fd5dd9875fb01b6d8b93ac7ccaa23b91", "score": "0.5923641", "text": "func (h HNClient) Item(ctx context.Context, id int) (res ItemResponse, err error) {\n\tbody, err := h.doGet(ctx, fmt.Sprintf(\"item/%d.json\", id))\n\tif err != nil {\n\t\treturn ItemResponse{}, fmt.Errorf(\"fetch item %d: %w\", id, err)\n\t}\n\n\tif err := json.Unmarshal(body, &res); err != nil {\n\t\treturn ItemResponse{}, fmt.Errorf(\"unmarshal item %d: %w\", id, err)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "2cbaf8c13d40c7e48204bd078feea6ad", "score": "0.57654095", "text": "func (item Item) URL() string {\n\turl := item.ResolvedURL\n\tif url == \"\" {\n\t\turl = item.GivenURL\n\t}\n\treturn url\n}", "title": "" }, { "docid": "adf5624e402dd2704349fa3ff0e9f416", "score": "0.57105315", "text": "func (m *Map) Item(loc Location) Item {\n\treturn m.itemGrid[loc]\n}", "title": "" }, { "docid": "8ad84153b092e696822033c7bc4edeeb", "score": "0.5709017", "text": "func (c *Container) Item(id string) (stow.Item, error) {\n\tobj := c.client.Bucket(c.name).Object(id)\n\tres, err := obj.Attrs(context.Background())\n\tif err != nil {\n\t\treturn nil, stow.ErrNotFound\n\t}\n\n\tu, err := prepUrl(res.MediaLink)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmdParsed, err := parseMetadata(res.Metadata)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ti := &Item{\n\t\tname: id,\n\t\tcontainer: c,\n\t\tclient: c.client,\n\t\tsize: int64(res.Size),\n\t\thash: fmt.Sprintf(\"%x\", res.MD5),\n\t\tlastModified: res.Updated,\n\t\turl: u,\n\t\tmetadata: mdParsed,\n\t\tobject: obj,\n\t}\n\n\treturn i, nil\n}", "title": "" }, { "docid": "1ad095fe441d30b2214f336117659f7f", "score": "0.5691538", "text": "func New(URL string) domain.ItemRepository {\n\treturn &itemRepository{\n\t\tAPIURL: URL,\n\t}\n}", "title": "" }, { "docid": "0cef66df9cd75ba0b7ec56d681a00993", "score": "0.5604791", "text": "func GetItem(id string) (*Item, error) {\n\tdoc, err := itemCol.Read(util.MustAtoi(id))\n\tif err != nil {\n\t\treturn nil, errors.NewModelsError(\"not_found\", errors.M{\n\t\t\t\"resource\": \"item\",\n\t\t\t\"id\": id,\n\t\t\t\"internal\": err.Error(),\n\t\t})\n\t}\n\n\tdata, err := json.Marshal(doc)\n\tif err != nil {\n\t\treturn nil, errors.NewModelsError(\"unexpected\", errors.M{\n\t\t\t\"reason\": \"Could not blobize found item\",\n\t\t\t\"action\": \"marshalize\",\n\t\t\t\"details\": err.Error(),\n\t\t})\n\t}\n\n\tvar item Item\n\tif err = json.Unmarshal(data, &item); err != nil {\n\t\treturn nil, errors.NewModelsError(\"unexpected\", errors.M{\n\t\t\t\"reason\": \"Could not blobize found item\",\n\t\t\t\"action\": \"unmarshalize\",\n\t\t\t\"details\": err.Error(),\n\t\t})\n\t}\n\treturn &item, nil\n}", "title": "" }, { "docid": "53cf1d1d71237b07cab574ad3797a6ba", "score": "0.55867773", "text": "func GetItem(w http.ResponseWriter, r *http.Request) {\n\tvar item models.Item\n\tvar err error\n\titemIDParam := chi.URLParam(r, \"itemID\")\n\titemID, err := uuid.Parse(itemIDParam)\n\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrNotFound)\n\t\treturn\n\t}\n\n\titem, err = models.LayerInstance().Item.GetByID(itemID)\n\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrNotFound)\n\t\treturn\n\t}\n\n\tif err := render.Render(w, r, payloads.NewItemResponse(&item)); err != nil {\n\t\trender.Render(w, r, payloads.ErrRender(err))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "f770040274ecc9b5e1b47d0ba20dd39b", "score": "0.55771595", "text": "func (c Client) Item(ctx context.Context, id int) (Item, error) {\n\titem := Item{\n\t\tremote: remote{\n\t\t\tpath: fmt.Sprintf(ItemPath, id),\n\t\t},\n\t}\n\n\t_, err := c.Update(ctx, &item)\n\n\treturn item, err\n}", "title": "" }, { "docid": "00320c84808ba86d4d1151f04c6da2da", "score": "0.5575814", "text": "func (recv *RecentManager) LookupItem(uri string) (*RecentInfo, error) {\n\tc_uri := C.CString(uri)\n\tdefer C.free(unsafe.Pointer(c_uri))\n\n\tvar cThrowableError *C.GError\n\n\tretC := C.gtk_recent_manager_lookup_item((*C.GtkRecentManager)(recv.native), c_uri, &cThrowableError)\n\tvar retGo (*RecentInfo)\n\tif retC == nil {\n\t\tretGo = nil\n\t} else {\n\t\tretGo = RecentInfoNewFromC(unsafe.Pointer(retC))\n\t}\n\n\tvar goError error = nil\n\tif cThrowableError != nil {\n\t\tgoThrowableError := glib.ErrorNewFromC(unsafe.Pointer(cThrowableError))\n\t\tgoError = goThrowableError\n\n\t\tC.g_error_free(cThrowableError)\n\t}\n\n\treturn retGo, goError\n}", "title": "" }, { "docid": "ec564f7268ac7b94b238aa1000d70dbe", "score": "0.5575684", "text": "func (i *Item) GetURL() (string, error) {\n\tif i.Attrs == nil || i.Attrs[\"guid\"] == \"\" {\n\t\treturn \"\", fmt.Errorf(\"No guid available for item\")\n\t}\n\n\tq := url.Values{\n\t\t\"t\": {\"get\"},\n\t\t\"id\": {i.Attrs[\"guid\"]},\n\t\t\"apikey\": {config.Geek.APIKey},\n\t}\n\n\treturn fmt.Sprintf(\"%s/api?%s\", config.Geek.URL, q.Encode()), nil\n}", "title": "" }, { "docid": "d0d9470aab73128700a455405a0c4ee6", "score": "0.55669194", "text": "func (i *Items) Get(id, token string) (*Item, error) {\n\tpath := fmt.Sprintf(\"%s/%s\", i.EndpointURL, idToURL(id, token))\n\n\tvar result Item\n\tif err := apiClient.get(path, &result); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &result, nil\n}", "title": "" }, { "docid": "d1febb06fe50df33834de7ea97ece203", "score": "0.55323905", "text": "func (d *Dao) GetItem(c context.Context, itemsID int64) (item model.Item, err error) {\n\trow := d.dbMall.QueryRow(c, _getItem, itemsID)\n\tif err = row.Scan(&item.ItemsID, &item.Name, &item.Brief, &item.Img); err != nil {\n\t\tlog.Error(\"Get item %d error,err(%v)\", itemsID, err)\n\t\treturn\n\t}\n\tif item.Brief == \"\" {\n\t\titem.Brief = item.Name\n\t\titem.Name = \"\"\n\t}\n\tvar imgListArr []string\n\tif err = json.Unmarshal([]byte(item.Img), &imgListArr); err != nil {\n\t\tlog.Error(\"get first img err[%s] (%v)\", item.Img, err)\n\t\treturn\n\t}\n\titem.Img = imgListArr[0]\n\treturn\n}", "title": "" }, { "docid": "393a43dfb3827ec100dee976c30fcd8e", "score": "0.543152", "text": "func (s *BrowseService) GetItem(ctx context.Context, itemID string, opts ...Opt) (Item, error) {\n\tu := fmt.Sprintf(\"buy/browse/v1/item/%s?fieldgroups=PRODUCT\", itemID)\n\treq, err := s.client.NewRequest(http.MethodGet, u, nil, opts...)\n\tif err != nil {\n\t\treturn Item{}, err\n\t}\n\tvar it Item\n\treturn it, s.client.Do(ctx, req, &it)\n}", "title": "" }, { "docid": "d58794ae33910de829b9deb7a1895598", "score": "0.5419057", "text": "func GetItem(itemId string) (*domain.Item, error) {\n\td, err := util.GetConnection()\n\tdefer func() {\n\t\t_ = d.Close()\n\t}()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ti := new(domain.Item)\n\tp := new(domain.Product)\n\ti.Product = p\n\terr = d.Get(i, getItemByIdSQL, itemId)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn i, nil\n}", "title": "" }, { "docid": "f029a9737c1d8b64a8bafcd9a0b889e4", "score": "0.5413322", "text": "func (m *MongoDBAccesser) GetItem(id string) Item {\n\tif m.connection == nil {\n\t\tlog.Fatal(\"DBAccesser is not connected to a database\")\n\t}\n\n\trecord := bson.M{}\n\n\t_id, err := primitive.ObjectIDFromHex(id)\n\tutils.FailOnError(err, \"Invalid id\")\n\n\tf := bson.M{\"_id\": _id}\n\tresult := m.connection.Database(m.dbName).Collection(\"items\").FindOne(context.TODO(), f)\n\terr = result.Decode(&record)\n\tif err != nil {\n\t\tlog.Printf(\"Error decoding document: %s\", err)\n\t\treturn Item{}\n\t}\n\n\treturn Item{\n\t\tID: record[\"_id\"].(primitive.ObjectID).Hex(),\n\t\tName: record[\"name\"].(string),\n\t}\n}", "title": "" }, { "docid": "64555fd8bf3b55e6ffd05e507f319d13", "score": "0.54062825", "text": "func (r *Repository) GetItemByName(itemName string) (*Item, error) {\n item := new(Item)\n if result := r.Db.Take(item, &Item{Name: itemName}); result.Error != nil {\n return nil, result.Error\n }\n return item, nil\n}", "title": "" }, { "docid": "1cf5818518bb82aecb1e354512fe4cb8", "score": "0.5394872", "text": "func (m *MiniURLModel) GetByURL(URL string) (*models.MiniURL, error) {\n\tstmt := `SELECT id, url, visits FROM mini_urls WHERE url = $1`\n\tminiURL := &models.MiniURL{}\n\terr := m.DB.QueryRow(stmt, URL).Scan(&miniURL.ID, &miniURL.URL, &miniURL.Visits)\n\tif err != nil {\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn nil, models.ErrNoRecord\n\t\t}\n\t\treturn nil, err\n\t}\n\treturn miniURL, nil\n}", "title": "" }, { "docid": "59d6eaf2482211549060e958a72e42e1", "score": "0.53390986", "text": "func GetItem(id int) (*ItemDB, *response.Error) {\n\titem := ItemDB{}\n\n\terr := stmtMap[\"itemSelect\"].QueryRow(id).Scan(&item.HuntID, &item.ID, &item.Name, &item.Points)\n\tif err != nil {\n\t\treturn nil, response.NewErrorf(http.StatusInternalServerError, \"error getting item with id %d: %s\", id, err.Error())\n\t}\n\n\treturn &item, nil\n}", "title": "" }, { "docid": "0e57e001770c632c5662cda5d65be18a", "score": "0.53273743", "text": "func GetItem(id int64, get chan Request, put chan Response, c appengine.Context) (lapi.Item, error) {\n\tif id <= 0 {\n\t\t// Return empty champion if there is no champion.\n\t\treturn lapi.Item{}, nil\n\t}\n\titemResponse, fErr := goGet(Request{Type: \"item\", Key: id}, get)\n\tif fErr != nil {\n\t\t// TODO: Fetch item from LAPI and cache\n\t\treturn lapi.Item{}, CacheError{message: \"Failed to retrieve item.\"}\n\t}\n\titem, _ := itemResponse.(lapi.Item)\n\treturn item, nil\n\n}", "title": "" }, { "docid": "cf3c9fc4e042f35de6b51d73e15961c3", "score": "0.53212535", "text": "func GetItem(itemID string) (*ItemInfo, bool, error) {\n\tu := &ItemInfo{}\n\td := DB.Self.Where(\"item_id=?\", itemID).First(&u)\n\treturn u, d.RecordNotFound(), d.Error\n}", "title": "" }, { "docid": "4c65cfbbee732ad3b7670d284a60a005", "score": "0.53037375", "text": "func (c *Client) FetchItem(id string) (*Item, error) {\n\tvar u, err = url.Parse(string(c.Endpoint))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu.Path = \"/v3/company/\" + c.RealmID + \"/item/\" + id\n\tvar v = url.Values{}\n\tv.Add(\"minorversion\", minorVersion)\n\tu.RawQuery = v.Encode()\n\n\tvar req *http.Request\n\treq, err = http.NewRequest(\"GET\", u.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Add(\"Accept\", \"application/json\")\n\tvar res *http.Response\n\tres, err = c.Client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer res.Body.Close()\n\n\tif res.StatusCode != http.StatusOK {\n\t\treturn nil, parseFailure(res)\n\t}\n\n\tvar r struct {\n\t\tItem Item\n\t\tTime Date\n\t}\n\terr = json.NewDecoder(res.Body).Decode(&r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &r.Item, nil\n}", "title": "" }, { "docid": "f8649eda97116a1a047e01991cfe3e0c", "score": "0.52817863", "text": "func GetItem(key string) (Item, error) {\n\titems, err := GetItemList()\n\tif err != nil {\n\t\treturn Item{}, err\n\t}\n\treturn items.GetItem(key)\n}", "title": "" }, { "docid": "adbf2ad1b443b7537a3fd1ba4db734db", "score": "0.52587503", "text": "func (parser PttParser) GetFeedItem(url string) (feedItem *feeds.Item, err error) {\n\tre := regexp.MustCompile(`(?s)<div id=\"main-content\" class=\"bbs-screen bbs-content\"><div class=\"article-metaline\"><span class=\"article-meta-tag\">作者</span><span class=\"article-meta-value\">(.+?)</span></div>(<div class=\"article-metaline-right\"><span class=\"article-meta-tag\">看板</span><span class=\"article-meta-value\">(.+?)</span></div>)?<div class=\"article-metaline\"><span class=\"article-meta-tag\">標題</span><span class=\"article-meta-value\">(.+?)</span></div>(<div class=\"article-metaline\"><span class=\"article-meta-tag\">時間</span><span class=\"article-meta-value\">(.+?)</span></div>)?(.+?)<span class=\"f2\">※ (發信站|編輯)`)\n\tre2 := regexp.MustCompile(`(?s)class=\"bbs-screen bbs-content\">(.+?)<span class=\"f2\">※ (發信站|編輯)`)\n\tre3 := regexp.MustCompile(`404 - Not Found`)\n\tclient := &http.Client{}\n\tcookie := http.Cookie{Name: \"over18\", Value: \"1\"}\n\treq, err := http.NewRequest(\"GET\", url, nil)\n\treq.AddCookie(&cookie)\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tauthor := \"null\"\n\tboard := \"null\"\n\ttitle := \"null\"\n\tcreated := time.Now()\n\tdescription := \"null\"\n\n\tmatch := re.FindSubmatch(body)\n\tif match == nil {\n\t\tmatch = re2.FindSubmatch(body)\n\t\tif match == nil {\n\t\t\tmatch = re3.FindSubmatch(body)\n\t\t\tif match == nil {\n\t\t\t\t// err = &feedgen.PageContentFetchError{url}\n\t\t\t\tdescription = \"<pre>\" + string(body) + \"</pre>\"\n\t\t\t} else {\n\t\t\t\terr = &feedgen.PageContentNotFoundError{url}\n\t\t\t\treturn\n\t\t\t}\n\n\t\t} else {\n\t\t\tdescription = \"<pre>\" + string(match[1]) + \"</pre>\"\n\t\t}\n\t} else {\n\t\tauthor = string(match[1])\n\t\tboard = string(match[3])\n\t\ttitle = string(match[4])\n\t\tconst timeForm = \"Mon Jan 2 15:04:05 2006\"\n\t\tdate := string(match[6])\n\t\tcreated, _ = time.Parse(timeForm, date)\n\t\tcontent := string(match[7])\n\t\tcontent = regexp.MustCompile(`(?s)<div class=\"richcontent\"><blockquote.+?</script></div>`).ReplaceAllString(content, \"\")\n\t\tcontent = regexp.MustCompile(`(?s)<div class=\"richcontent\"><div class=\"resize-container\"><div class=\"resize-content\"><iframe.+</iframe></div></div></div>`).ReplaceAllString(content, \"\")\n\t\tcontent = regexp.MustCompile(`(?s)<div class=\"richcontent\"><img src=\".+?\" alt=\"\" /></div>`).ReplaceAllString(content, \"\")\n\t\tcontent = regexp.MustCompile(`(?s)<div.+?>(.+?)</div>`).ReplaceAllString(content, \"$1\")\n\t\tcontent = regexp.MustCompile(`(?s)<span.+?>(.+?)</span>`).ReplaceAllString(content, \"$1\")\n\t\tcontent = regexp.MustCompile(`(?s)<a.+?>(.+?)</a>`).ReplaceAllString(content, \"$1\")\n\t\tdescription = \"<pre>\"\n\t\tif board != \"\" {\n\t\t\tdescription += \"看板:\" + board + \"\\n\"\n\t\t}\n\t\tdescription += \"作者:\" + author + \"\\n\" + \"標題:\" + title + \"\\n\"\n\t\tif date != \"\" {\n\t\t\tdescription += \"時間:\" + date + \"\\n\"\n\t\t}\n\t\tdescription += content + \"</pre>\"\n\t}\n\n\tfeedItem = &feeds.Item{\n\t\tId: url,\n\t\tTitle: title,\n\t\tLink: &feeds.Link{Href: url},\n\t\tDescription: description,\n\t\tAuthor: &feeds.Author{Name: author},\n\t\tCreated: created,\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7da8394aa00cb5d1298872e95a84956e", "score": "0.5251614", "text": "func ItemGET(w http.ResponseWriter, _ *http.Request, ps httprouter.Params) {\n\tkind := item.Kind(ps.ByName(\"kind\"))\n\tif !kind.IsValid() {\n\t\ts := &Status{}\n\t\ts.NotFound(\"Kind not found\").Render(w)\n\t\treturn\n\t}\n\n\ti, err := item.GetByID(ps.ByName(\"id\"), kind)\n\tif err != nil {\n\t\thandleError(err, w)\n\t\treturn\n\t}\n\n\tview.RenderJSON(i, http.StatusOK, w)\n}", "title": "" }, { "docid": "7da8394aa00cb5d1298872e95a84956e", "score": "0.5251614", "text": "func ItemGET(w http.ResponseWriter, _ *http.Request, ps httprouter.Params) {\n\tkind := item.Kind(ps.ByName(\"kind\"))\n\tif !kind.IsValid() {\n\t\ts := &Status{}\n\t\ts.NotFound(\"Kind not found\").Render(w)\n\t\treturn\n\t}\n\n\ti, err := item.GetByID(ps.ByName(\"id\"), kind)\n\tif err != nil {\n\t\thandleError(err, w)\n\t\treturn\n\t}\n\n\tview.RenderJSON(i, http.StatusOK, w)\n}", "title": "" }, { "docid": "04427adaeafbfd56b4145574778ca676", "score": "0.5244879", "text": "func GetItem(id int64) (item *models.Item, err error) {\n\titemsLock.Lock()\n\tdefer itemsLock.Unlock()\n\titem, exists := items[id]\n\tif exists {\n\t\treturn item, nil\n\t}\n\treturn nil, errors.NotFound(\"not found: item %d\", id)\n}", "title": "" }, { "docid": "ea8c85180472534810e576319266ddc1", "score": "0.52353865", "text": "func (c Controller) Item(mydb models.MyDb, id int) (image modelName, err error) {\n\n\trepo := repository.Repository{}\n\timage, err = repo.GetRow(mydb, id, 0)\n\n\treturn image, err\n}", "title": "" }, { "docid": "e07647cef219dd98f68e22c9cbd5d20b", "score": "0.52205366", "text": "func (p ProjectItem) URL() string {\n\tswitch p.Content.TypeName {\n\tcase \"Issue\":\n\t\treturn p.Content.Issue.URL\n\tcase \"PullRequest\":\n\t\treturn p.Content.PullRequest.URL\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "11b2feb3d34818caa1d1459f1d1f5b8e", "score": "0.5215622", "text": "func (c *container) Item(id string) (stow.Item, error) {\n\tit, err := c.wrapped.Item(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &item{wrapped: it}, nil\n}", "title": "" }, { "docid": "f30c8e5f4821ee2a16bcd2a1be0cd830", "score": "0.52083576", "text": "func (is *ItemStorage) GetById(id int64) (*Item, error) {\n\trow := is.DB.QueryRow(\"select * from items where id=?\", id)\n\titem := &Item{}\n\tif err := row.Scan(&item.ID, &item.UserID, &item.ItemName, &item.Price); err != nil {\n\t\treturn nil, fmt.Errorf(\"%v: %v\", ErrItemNotFound, err)\n\t}\n\treturn item, nil\n}", "title": "" }, { "docid": "736e2f8be7f3ff938edabacdbc34b512", "score": "0.5176807", "text": "func (c *Chromium) GetItem(itemName string) (data.Item, error) {\n\titemName = strings.ToLower(itemName)\n\tif item, ok := chromiumItems[itemName]; ok {\n\t\tm, err := getItemPath(c.profilePath, item.mainFile)\n\t\tif err != nil {\n\t\t\tlog.Debugf(\"%s find %s file failed, ERR:%s\", c.name, item.mainFile, err)\n\t\t}\n\t\ti := item.newItem(m, \"\")\n\t\treturn i, nil\n\t} else {\n\t\treturn nil, errItemNotSupported\n\t}\n}", "title": "" }, { "docid": "fa5b433ac43a622a9e5363f61449943f", "score": "0.51529706", "text": "func (u *shortURLInMemoryRepository) ByURL(URL string) (*shortURL, error) {\n\n\tfor _, mapping := range u.shortURLRepository {\n\t\tif mapping.URL == URL {\n\t\t\treturn mapping, nil\n\t\t}\n\t}\n\treturn nil, errURLNotFound\n}", "title": "" }, { "docid": "4cddb4dd6879b4edb1700ed7bd47c64d", "score": "0.5138361", "text": "func GetItemImageURL(name string) string {\n\tif len(name) >= 6 && name[:6] == \"recipe\" {\n\t\treturn \"http://cdn.dota2.com/apps/dota2/images/items/recipe_lg.png\"\n\t}\n\treturn fmt.Sprintf(\"http://cdn.dota2.com/apps/dota2/images/items/%s_lg.png\", name)\n}", "title": "" }, { "docid": "3ccbf59f791c1f28b5b3b80b78f386e5", "score": "0.51353616", "text": "func (bd *BaseItems) GetItem(item string) float64 {\n\tdd := *bd\n\td, ok := dd[item]\n\tif !ok {\n\t\tfmt.Printf(\"item %s did not exist - terminating program\\n\", item)\n\t\tos.Exit(2)\n\t}\n\treturn d.Value\n}", "title": "" }, { "docid": "f917606fd6924cf16f57f1b409332ddb", "score": "0.5127769", "text": "func (o *BaseItem) GetItem() Item {\n\treturn o\n}", "title": "" }, { "docid": "427c9bfe8584c96c736162473e8b0aed", "score": "0.5124526", "text": "func (r *HMockDB) GetItem(id int) (models.Item, error) {\n\t// return pointer to mock item\n\tmockItem := models.Item{\n\t\tID: id,\n\t\tName: \"STUFF\" + fmt.Sprint(rand.Intn(10)),\n\t\tDescription: \"THIS IS MY STUFF.\",\n\t\tPrice: math.Round(rand.Float64()*10000) / 100,\n\t\tTimestamp: time.Now().Unix(),\n\t\tCount: rand.Intn(10),\n\t\tStatus: 1,\n\t}\n\treturn mockItem, nil\n}", "title": "" }, { "docid": "443cd4a88e3bd5c864047c881ac55783", "score": "0.51130015", "text": "func (c *Cursor) Item() Item {\n\treturn c.item\n}", "title": "" }, { "docid": "2316830678a5d7c5d04a0b83c9cee9c3", "score": "0.510946", "text": "func (o *AioCheckOutGeneralOption) SetItemURL(v string) {\n\to.ItemURL = &v\n}", "title": "" }, { "docid": "93c53555270e0b7fed38c86ca540ff0a", "score": "0.51077074", "text": "func LookupByURL(ipsws []api.IPSW, dlURL string) (api.IPSW, error) {\n\tfor _, i := range ipsws {\n\t\tif strings.EqualFold(dlURL, i.URL) {\n\t\t\treturn i, nil\n\t\t}\n\t}\n\treturn api.IPSW{}, fmt.Errorf(\"unable to find %s in ipsws\", dlURL)\n}", "title": "" }, { "docid": "9f21a4b2dc11308839a6eb70135d822b", "score": "0.50960994", "text": "func GetRegistryByURL(url string) (*models.Registry, error) {\n\to := dao.GetOrmer()\n\tr := models.Registry{URL: url}\n\terr := o.Read(&r, \"URL\")\n\tif err == orm.ErrNoRows {\n\t\treturn nil, nil\n\t}\n\treturn &r, err\n}", "title": "" }, { "docid": "e2864c7df45629648f31f285965efce4", "score": "0.5086845", "text": "func (c *Client) Get(ctx context.Context) (string, error) {\n\tss, err := c.getStories(ctx)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tid := ss.IDs[rand.Intn(len(ss.IDs))]\n\tu := fmt.Sprintf(\"%s/%d.json\", c.Config.ItemAddr, id)\n\tresp, err := http.Get(u)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tvar itm *Item\n\tif err := json.NewDecoder(resp.Body).Decode(&itm); err != nil {\n\t\treturn \"\", errors.Wrap(err, \"JSON decode failed\")\n\t}\n\tdefer resp.Body.Close()\n\treturn itm.Title, nil\n}", "title": "" }, { "docid": "e8b4ad343759f3e34009311c43bf8edb", "score": "0.507409", "text": "func (client *Client) ItemGet(id int) (result *Item, err error) {\n\tpath := client.buildPath(fmt.Sprintf(\"/universe/types/%v/\", id))\n\terr = client.get(path, &result)\n\treturn\n}", "title": "" }, { "docid": "2401287691959ba6dbc7f55071c22efc", "score": "0.507007", "text": "func (s *StoragePacker) GetItem(itemID string) (*Item, error) {\n\tif itemID == \"\" {\n\t\treturn nil, fmt.Errorf(\"empty item ID\")\n\t}\n\n\tbucketKey := s.BucketKey(itemID)\n\tbucketPath := s.BucketPath(bucketKey)\n\n\t// Fetch the bucket entry\n\tbucket, err := s.GetBucket(bucketPath)\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"failed to read packed storage item: {{err}}\", err)\n\t}\n\tif bucket == nil {\n\t\treturn nil, nil\n\t}\n\n\t// Look for a matching storage entry in the bucket items\n\tfor _, item := range bucket.Items {\n\t\tif item.ID == itemID {\n\t\t\treturn item, nil\n\t\t}\n\t}\n\n\treturn nil, nil\n}", "title": "" }, { "docid": "a5be6b1a0c476957309db2e0b0ef3185", "score": "0.5067021", "text": "func LoadByURL(url string) {\n\tdoc, err := htmlquery.LoadURL(url)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\titem := &Item{URL: url}\n\n\tuserNode := htmlquery.FindOne(doc, \"/html/body/div[1]/div/div[3]/div[1]/div/div[2]/div[1]/div[1]/div[2]/a\")\n\titem.Username = htmlquery.InnerText(userNode)\n\n\tpriceNode := htmlquery.FindOne(doc, \"/html/body/div[1]/div/div[3]/div[1]/div/div[2]/div[2]/h2\")\n\titem.Price = htmlquery.InnerText(priceNode)\n\n\ttitleNode := htmlquery.FindOne(doc, \"/html/body/div[1]/div/div[3]/div[1]/div/div[2]/div[4]/h1\")\n\titem.Name = htmlquery.InnerText(titleNode)\n\n\tcategoryNode := htmlquery.FindOne(doc, \"/html/body/div[1]/div/div[3]/div[1]/div/div[2]/section/div[1]/div[6]/div/div/div/a\")\n\titem.Category = strings.TrimSpace(htmlquery.InnerText(categoryNode))\n\t// categoryUrl := htmlquery.SelectAttr(categoryNode, \"href\")\n\n\tdescNode := htmlquery.FindOne(doc, \"/html/body/div[1]/div/div[3]/div[1]/div/div[2]/section/div[1]/div[5]/div\")\n\titem.Description = strings.TrimSpace(htmlquery.InnerText(descNode))\n\n\titem.PrintInfo()\n\n\t// fmt.Printf(\">>> [%s] %s (%s)\\n%s\\n\", category, title, price, desc)\n\n\t// for _, attr := range categoryNode.Attr {\n\t// fmt.Println(\" >\", attr.Key, \"=\", attr.Val)\n\t// }\n\n\t// fmt.Println(\">>>>\",\n\t// \tcategoryNode,\n\t// \thtmlquery.SelectAttr(categoryNode, \"href\"),\n\t// \thtmlquery.SelectAttr(categoryNode, \"outterText\"),\n\t// \thtmlquery.SelectAttr(categoryNode, \"hostname\"),\n\t// )\n}", "title": "" }, { "docid": "11e2f7c5474dae4a0353bbb8263398d7", "score": "0.50553274", "text": "func (i *item) URL() *url.URL {\n\tif i.container.customEndpoint == \"\" {\n\t\tgenericURL := fmt.Sprintf(\"https://s3.dualstack.%s.amazonaws.com/%s/%s\", i.container.Region(), i.container.Name(), i.Name())\n\n\t\treturn &url.URL{\n\t\t\tScheme: \"s3\",\n\t\t\tPath: genericURL,\n\t\t}\n\t}\n\n\tgenericURL := fmt.Sprintf(\"%s/%s\", i.container.Name(), i.Name())\n\treturn &url.URL{\n\t\tScheme: \"s3\",\n\t\tPath: genericURL,\n\t}\n}", "title": "" }, { "docid": "248f8643c73aa6c9f74a44327a391264", "score": "0.50446856", "text": "func (s *Store) Get(key string) (i *Item) {\n\ts.mu.RLock()\n\ti = s.items[key]\n\ts.mu.RUnlock()\n\treturn i\n}", "title": "" }, { "docid": "c8b395808a50a3a06bbac95374fdfc4f", "score": "0.5042337", "text": "func (c *container) Item(id string) (stow.Item, error) {\n\tit, err := c.base.Item(id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &item{overlay: c.overlay, base: it}, nil\n}", "title": "" }, { "docid": "37285f4260877c9ba23598b43d9c8ce7", "score": "0.5028337", "text": "func (svc *Service) ItemByID(id ulid.ULID) (Item, error) {\n\tsvc.reqMu.RLock()\n\tdefer svc.reqMu.RUnlock()\n\n\tsvc.resMu.RLock()\n\tdefer svc.resMu.RUnlock()\n\n\titem := Item{}\n\tfound := false\n\n\tif req, ok := svc.requests[id]; ok {\n\t\titem.Request = req.req\n\t\tfound = true\n\t}\n\n\tif res, ok := svc.responses[id]; ok {\n\t\titem.Response = res.res\n\t\tfound = true\n\t}\n\n\tif !found {\n\t\treturn Item{}, ErrRequestNotFound\n\t}\n\n\treturn item, nil\n}", "title": "" }, { "docid": "8ca79ca4cb791e63fda3166180376687", "score": "0.49881506", "text": "func (h *StoreHandler) GetItem(rw http.ResponseWriter, req *http.Request) {\n\tvar bind struct {\n\t\tID string `mux:\"id\"`\n\t}\n\tapi.Check(api.Bind(req, &bind))\n\tlogger := logging.Logger()\n\tlogger.Info(\"Get item\", zap.String(\"ID\", bind.ID))\n\th.JSON(rw, h.storeItems[bind.ID])\n}", "title": "" }, { "docid": "ce46d7a1c108c792d8d5170b5ee5f32e", "score": "0.49759653", "text": "func (folder *Folder) GetItem() (*Item, error) {\n\tscoped := NewFolder(folder.client, folder.endpoint, folder.config)\n\tdata, err := scoped.Conf(HeadersPresets.Verbose).Select(\"Id\").ListItemAllFields()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres := &struct {\n\t\tMetadata struct {\n\t\t\tURI string `json:\"uri\"`\n\t\t} `json:\"__metadata\"`\n\t}{}\n\n\terr = json.Unmarshal(data, &res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\titem := NewItem(\n\t\tfolder.client,\n\t\tres.Metadata.URI,\n\t\tfolder.config,\n\t)\n\treturn item, nil\n}", "title": "" }, { "docid": "88460c99578b1e99c3ccc0e005813eab", "score": "0.4973578", "text": "func (c *Client) GetItem(accessToken string) (res *ItemResponse, err error) {\n\tvar response ItemResponse\n\terr = c.post(\"/item/get\", itemRequest{AccessToken: accessToken}, &response)\n\treturn &response, err\n}", "title": "" }, { "docid": "ad5fba14f32aabee24a8a63bdf6c97bf", "score": "0.49673367", "text": "func (item *Item) GetByID(id int) (Item, error) {\n\t// We lock when doing file operations\n\titemsMutex.Lock()\n\n\t// When the function is done executing we unlock\n\tdefer itemsMutex.Unlock()\n\n\titemData, err := ioutil.ReadFile(itemsFile)\n\tif err != nil {\n\t\treturn Item{}, err\n\t}\n\n\tvar items []Item\n\n\t// Here while doing the json Unmarshal we pass a pointer of\n\t// our items array, so items is now filled\n\tif err := json.Unmarshal(itemData, &items); err != nil {\n\t\treturn Item{}, err\n\t}\n\n\tfor _, itm := range items {\n\t\tif itm.ID == id {\n\t\t\treturn itm, nil\n\t\t}\n\t}\n\n\treturn Item{}, errors.New(\"I cannot give you the item with that ID traveler,\" +\n\t\t\" my strongest items would kill you\")\n}", "title": "" }, { "docid": "1ecb536a934baa0b3a136c756496c060", "score": "0.49599573", "text": "func (dao *ItemDao) GetItem(id int) (item models.Item, err error) {\n\tquery := `SELECT * FROM items AS i\n\tRIGHT JOIN stocks AS s ON i.id = s.item_id\n\tWHERE i.id = ?`\n\tcatQuery := `SELECT c.id, c.name, c.parentID\n\tFROM categories AS c RIGHT JOIN categories_map AS m\n\tON c.id = m.category_id WHERE m.item_id = ?;`\n\n\trows, err := dao.Db.Query(query, id)\n\tdefer rows.Close()\n\n\tif err != nil {\n\t\treturn item, err\n\t}\n\n\tfor rows.Next() {\n\t\terr = rows.Scan(&item.ID, &item.Name, &item.Description, &item.Stock.ID, &item.Stock.ItemID, &item.Stock.Quantity)\n\n\t\tif err != nil {\n\t\t\treturn item, err\n\t\t}\n\t}\n\n\trows, err = dao.Db.Query(catQuery, id)\n\n\tif err != nil {\n\t\treturn item, err\n\t}\n\n\tfor rows.Next() {\n\t\tvar cat models.ItemCategory\n\n\t\terr = rows.Scan(&cat.ID, &cat.Name, &cat.ParentID)\n\n\t\tif err != nil {\n\t\t\treturn item, err\n\t\t}\n\n\t\titem.Categories = append(item.Categories, cat)\n\t}\n\n\treturn item, nil\n}", "title": "" }, { "docid": "7f2d4c825e3a134b0f5b22fe735f0b97", "score": "0.49549496", "text": "func GetItem(itemID int) (models.Item, error) {\n\treturn InventoryRepo.GetItem(itemID)\n}", "title": "" }, { "docid": "4011d88e2a9d55b8ce4e61a3d2cc1382", "score": "0.49504387", "text": "func GetItemWithPrice(w http.ResponseWriter, r *http.Request) {\n\tvar err error\n\titemIDParam := chi.URLParam(r, \"itemID\")\n\titemID, err := uuid.Parse(itemIDParam)\n\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrNotFound)\n\t\treturn\n\t}\n\n\titemWithPrice, err := models.LayerInstance().Item.GetWithPrice(itemID)\n\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrNotFound)\n\t\treturn\n\t}\n\n\tif err := render.Render(w, r, payloads.NewItemWithPriceResponse(&itemWithPrice)); err != nil {\n\t\trender.Render(w, r, payloads.ErrRender(err))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "af041d4146580d70ab83092f613f6768", "score": "0.4947865", "text": "func (bi *batchItem) GetUrl() *string {\n\treturn bi.Url\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "d5f7b2e2273e4ddd49fda7d8aa3cc472", "score": "0.49364716", "text": "func Item(code string, lang codes.Language) (codes.Item, error) {\n\titem, ok := all[code]\n\tif !ok {\n\t\treturn codes.Item{}, fmt.Errorf(\"no item with code: %q\", code)\n\t}\n\tif lang == codes.Norwegian {\n\t\treturn codes.Item{Code: code, Label: item.labelNo, Notes: item.notesNo}, nil\n\t}\n\treturn codes.Item{Code: code, Label: item.labelEn, Notes: item.notesEn}, nil\n}", "title": "" }, { "docid": "0d66d30929d2d2343fb05f77f3a1fc61", "score": "0.49304348", "text": "func (c *gomlCollection) Item(index int) Element {\n\tif index >= 0 && index < c.Length() {\n\t\treturn c.list[index]\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b1228179cfa7b575207c42cffb39b3f2", "score": "0.49291855", "text": "func GetItem(id int64) (*ItemType, error) {\n\tref := ItemType{}\n\tif err := database.QueryRowx(`\n\t\tSELECT \n\t\t\ttypeID, \n\t\t typeName, \n\t\t T.description, \n\t\t mass, \n\t\t volume, \n\t\t capacity, \n\t\t portionSize, \n\t\t IFNULL(T.raceID, 0) AS raceID,\n\t\t IFNULL(raceName, \"None\") AS raceName,\n\t\t IFNULL(basePrice, 0) AS basePrice, \n\t\t IFNULL(T.iconID, 0) AS iconID, \n\t\t IFNULL(soundID, 0) AS soundID,\n\t\t graphicID\n\t\t FROM invTypes T\n\t\t LEFT OUTER JOIN chrRaces R ON T.raceID = R.raceID\n\t\t WHERE typeID = ? LIMIT 1\n\t\t\t`, id).StructScan(&ref); err != nil {\n\t\treturn nil, err\n\t}\n\treturn &ref, nil\n}", "title": "" }, { "docid": "87c7a81924079084896ed2883204bc69", "score": "0.49283776", "text": "func (m *SalesQuoteLine) GetItem()(Itemable) {\n val, err := m.GetBackingStore().Get(\"item\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(Itemable)\n }\n return nil\n}", "title": "" }, { "docid": "c315b860aa9f28d5cfcda01d5debd304", "score": "0.49272197", "text": "func HTTPGetByURL(url string, collection interface{}) error {\n\n\tclient := &http.Client{\n\t\tTransport: http.DefaultTransport,\n\t}\n\n\tresponse, err := client.Get(url)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = readResponse(response, &collection)\n\n\treturn err\n}", "title": "" }, { "docid": "275760cf2018ef36fb1640a9f97a3324", "score": "0.49270016", "text": "func item(expect News) assay.Arrow {\n\tvar item News\n\n\treturn http.Join(\n\t\tø.GET(\"%s/news/%s\", host, expect.ID),\n\t\tƒ.Code(http.StatusCodeOK),\n\t\tƒ.ServedJSON(),\n\t\tƒ.Recv(&item),\n\t).Then(\n\t\tc.Value(&item).Is(&expect),\n\t)\n}", "title": "" }, { "docid": "e6bf48d179f1b8b71074ab119a7c3a24", "score": "0.4922666", "text": "func (u *urlStore) Get(ctx context.Context, id string) (model.URL, error) {\n\turl := model.URL{}\n\n\tdocID, err := primitive.ObjectIDFromHex(id)\n\tif err != nil {\n\t\treturn url, err\n\t}\n\n\tif err := u.db.Collection(\"urls\").FindOne(ctx, bson.M{\"_id\": docID}).Decode(&url); err != nil {\n\t\treturn url, err\n\t}\n\n\treturn url, nil\n}", "title": "" }, { "docid": "326599fa8ac8570766cbab2364a4c178", "score": "0.4921041", "text": "func (s *Service) FetchItem(id int) (*db.ItemModel, error) {\n\tctx := context.Background()\n\treturn s.client.Item.FindUnique(\n\t\tdb.Item.ID.Equals(id),\n\t).With(\n\t\tdb.Item.Tags.Fetch(),\n\t).Exec(ctx)\n}", "title": "" }, { "docid": "2932f02e29e353559793107d76cce952", "score": "0.4910209", "text": "func (s *Stock) URL() *url.URL {\n\treturn s.url\n}", "title": "" }, { "docid": "20327766b7b4dac534f8096934ccfd28", "score": "0.49059427", "text": "func (this *Spider) Get(url string, respType string) *pageItems.PageItems {\n\treq := request.NewRequest(url, respType, \"\", \"GET\", \"\", nil, nil, nil, nil)\n\treturn this.GetByRequest(req)\n}", "title": "" }, { "docid": "4a6774b75def612557ead3089219c6fc", "score": "0.48868185", "text": "func (a *PlaidApiService) ItemGet(ctx _context.Context) ApiItemGetRequest {\n\treturn ApiItemGetRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "bab47f095c80e0b0fe217d3ca1fdc0dc", "score": "0.488236", "text": "func (c *Cache[T]) maybeFetchItem(ctx context.Context, key string) *itemWithExp[T] {\n\tg := caching.GlobalCache(ctx, c.params.GlobalNamespace)\n\tif g == nil {\n\t\treturn nil\n\t}\n\n\tblob, err := g.Get(ctx, key)\n\tif err != nil {\n\t\tif err != caching.ErrCacheMiss {\n\t\t\tlogging.WithError(err).Errorf(ctx, \"Failed to read item %q from the global cache\", key)\n\t\t}\n\t\treturn nil\n\t}\n\n\titem, err := c.deserializeItem(blob)\n\tif err != nil {\n\t\tlogging.WithError(err).Errorf(ctx, \"Failed to deserialize item %q\", key)\n\t\treturn nil\n\t}\n\treturn item\n}", "title": "" }, { "docid": "df3cca951c28177f9824346ce4027783", "score": "0.4882288", "text": "func (h Handle) GetItem(item Item) (string, error) {\n\tvar ret unsafe.Pointer\n\n\te := C.pam_get_item(h.pamh, C.int(item), &ret)\n\tif Value(e) != Success {\n\t\treturn \"\", pamError{h.pamh, e}\n\t}\n\n\treturn C.GoString((*C.char)(ret)), nil\n}", "title": "" }, { "docid": "de39fa5db8b7e310d6c82da1cb39634f", "score": "0.48822314", "text": "func (store *Store) GetFeedItem(item *FeedItem) error {\n\tquery := store.db.Select(\"items\")\n\tquery.Limit(1)\n\n\tif item.ID != 0 {\n\t\tquery.Where(\"id = ?\", item.ID)\n\t} else if item.URL != \"\" {\n\t\tquery.Where(\"url = ?\", item.URL)\n\t} else {\n\t\treturn errors.New(\"Missing FeedItem.ID or FeedItem.URL\")\n\t}\n\n\tif err := query.LoadValue(item); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4ed5dcce1138aee7828ea49c106681ed", "score": "0.48778617", "text": "func (c *Cache) GetItem(key string) (item Item, ok bool) {\n\td, ok := c.Data.Load(key)\n\tif !ok {\n\t\treturn\n\t}\n\titem, ok = d.(Item)\n\treturn\n}", "title": "" }, { "docid": "c795d30f2bb137a269de226cbd7d4265", "score": "0.48776692", "text": "func (s *FakeStorage) GetItem(id int) (Gif, error) {\n\tresult, ok := s.Gifs[id]\n\n\tif ok {\n\t\treturn result, nil\n\t}\n\treturn Gif{}, NotFoundError(id)\n}", "title": "" }, { "docid": "06ae07ac8ab1953630035a144bf8b743", "score": "0.48485595", "text": "func (ind *Index) Get(title string) *IndexItem {\n\tk := NormalizeArticleTitle(title)\n\tind.itemIndexMut.RLock()\n\tdefer ind.itemIndexMut.RUnlock()\n\treturn ind.itemIndex[k]\n}", "title": "" }, { "docid": "30077825f9b9c8d0a5656d7abb3c5450", "score": "0.48391062", "text": "func (d *DB) Get(id string) (url *db.URL, err error) {\n\ttx, err := d.db.Begin(false)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to open database for reading: %v\", err)\n\t}\n\n\tdefer func() {\n\t\tif rErr := tx.Rollback(); rErr != nil && err == nil {\n\t\t\terr = fmt.Errorf(\"Unable to rollback read-only transaction: %v\", rErr)\n\t\t}\n\t}()\n\n\tub := tx.Bucket(urlsBucket)\n\tif ub == nil {\n\t\treturn nil, fmt.Errorf(`Unable to open database \"%s\" bucket: bucket is nil`, urlsBucket)\n\t}\n\n\tb := ub.Bucket([]byte(id))\n\tif b == nil {\n\t\treturn nil, nil\n\t}\n\n\turl, err = getURL(b)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to unmarshal URL: %v\", err)\n\t}\n\n\t//check for deleted URL\n\tif b.Get(deletedKey) != nil {\n\t\treturn nil, nil\n\t}\n\n\turl.ID = id\n\n\treturn url, err\n}", "title": "" }, { "docid": "84dc6dbc12407afc87f6e552b89589fa", "score": "0.4836521", "text": "func GetItemWithID(id string, db *gorm.DB) (Item, bool) {\n\tvar item Item\n\tif err := db.Where(\"uuid = ?\", id).First(&item).Error; err != nil {\n\t\treturn item, false\n\t}\n\n\treturn item, true\n}", "title": "" }, { "docid": "a76c727f7f3a7aacdde550ab85dd9df1", "score": "0.48159823", "text": "func (p *ItemFilterWithItemFinder) PickUpItem(name string) (*domain.Item, error) {\n\tis, err := p.itemFinder.FindAll()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, i := range is {\n\t\tif i.Name == name {\n\t\t\treturn i, nil\n\t\t}\n\t}\n\treturn nil, nil\n}", "title": "" }, { "docid": "d3fc26476eff2f53f6c83f88d2fa2644", "score": "0.47976178", "text": "func (c *ItemClient) Get(ctx context.Context, id uuid.UUID) (*Item, error) {\n\treturn c.Query().Where(item.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "3df023d77306c9fa419da7c4bb889af9", "score": "0.4794158", "text": "func (i *item) Open() (io.ReadCloser, error) {\n\tparams := &s3.GetObjectInput{\n\t\tBucket: aws.String(i.container.Name()),\n\t\tKey: aws.String(i.ID()),\n\t}\n\n\tresponse, err := i.client.GetObject(params)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"Open, getting the object\")\n\t}\n\treturn response.Body, nil\n}", "title": "" }, { "docid": "c4efbb80ac601c015b41a0ec7d4a66c8", "score": "0.4792513", "text": "func GetImageByUrl(url string) (*image.Image, error) {\n\tpixels, err := GetBytesByURL(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\timg, err := BytesToImage(pixels)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn img, nil\n}", "title": "" }, { "docid": "7c1e5ca8bfb1af79d0346be810153a48", "score": "0.4775742", "text": "func URL(key string) (*url.URL, error) {\n\treturn c.URL(key)\n}", "title": "" }, { "docid": "68b7700bc7bc2645bbde62dac6df520b", "score": "0.4774972", "text": "func (s *Shortener) SearchByURL() error {\n\tc := store.bucket.Cursor()\n\n\tfor k, v := c.First(); k != nil; k, v = c.Next() {\n\t\tts := &Shortener{}\n\t\tif err := json.Unmarshal(v, &ts); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif ts.LongURL == s.LongURL {\n\t\t\ts.ShortURL = ts.ShortURL\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "cf74a044652e73e2887d06190b7b1bf4", "score": "0.47668105", "text": "func (m *MongoStorage) GetByName(ctx context.Context, name string) (*Item, error) {\n\tc := m.Session.DB(m.DB).C(m.Collection)\n\tvar i Item\n\tif err := c.Find(bson.M{\"name\": name}).One(&i); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &i, nil\n}", "title": "" }, { "docid": "80f8c6c0468351536d598720548f5299", "score": "0.47637984", "text": "func (f *Factory) Item() (*Item, error) {\n\tr, err := f.randomRecipe()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts, err := f.prepare(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdesc, err := compose(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tval, err := appraise(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &Item{Description: desc, Value: val}, nil\n}", "title": "" }, { "docid": "f0e1c97128e629c7d6ff98568668149e", "score": "0.4761891", "text": "func (m *MongoStorage) GetByName(ctx context.Context, name string) (*Item, error) {\n\tc := m.Client.Database(m.DB).Collection(m.Collection)\n\tvar i Item\n\tif err := c.FindOne(ctx, bson.M{\"name\": name}).Decode(&i); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &i, nil\n}", "title": "" }, { "docid": "8ee7a3a48ec28a05308fb5234345c210", "score": "0.47609985", "text": "func (cli *S3) GetFromS3URL(rawURL string, style URLStyle) (io.ReadCloser, *int64, error) {\n\treturn cli.doGetFromS3URL(rawURL, style, nil)\n\n}", "title": "" }, { "docid": "0c74e09f95149d47a30716dd3dfe843c", "score": "0.47542056", "text": "func LookupContentLibraryItem(ctx *pulumi.Context, args *LookupContentLibraryItemArgs, opts ...pulumi.InvokeOption) (*LookupContentLibraryItemResult, error) {\n\tvar rv LookupContentLibraryItemResult\n\terr := ctx.Invoke(\"vsphere:index/getContentLibraryItem:getContentLibraryItem\", args, &rv, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &rv, nil\n}", "title": "" }, { "docid": "7a5179b629cfbabfb6c1b14c8fdc59bd", "score": "0.47504953", "text": "func NewItem(cfg SourceGeneratorConfig) Sourcer {\n\treturn &Item{}\n}", "title": "" }, { "docid": "59aa9424673e8c3231482a0ff1cfc954", "score": "0.47446612", "text": "func NewItem(param ItemRepoParam) ItemRepo {\n\titemMap := &sync.Map{}\n\tr := &itemRepo{\n\t\tdb: param.DB,\n\t\titemMap: itemMap,\n\t}\n\tr.buildCache()\n\n\treturn r\n}", "title": "" }, { "docid": "f381ea4a58b0beb8ea5a2815629dd8b7", "score": "0.47445348", "text": "func NewFromURL(url string) (Tile, error) {\n\titems := reTile.FindStringSubmatch(url)\n\tif len(items) == 0 {\n\t\treturn Tile{}, fmt.Errorf(\"could not parse url string to Tile struct\")\n\t}\n\n\t// we can ignore errors because regexp contains `\\d+`\n\tzoom, _ := strconv.Atoi(items[2])\n\tx, _ := strconv.Atoi(items[3])\n\ty, _ := strconv.Atoi(items[4])\n\n\treturn Tile{\n\t\tMap: items[1],\n\t\tZoom: zoom,\n\t\tX: x,\n\t\tY: y,\n\t\tExt: items[5],\n\t}, nil\n}", "title": "" }, { "docid": "69bb0b0b55b6f8ced278bfe5507326ff", "score": "0.47380248", "text": "func (i Item) GetItemByOrder(db *gorm.DB, order string) (*Item, error) {\n\tlogger := &Log{}\n\tout := &Item{}\n\terr := db.Model(&i).Preload(\"Status\").Where(\"item_id = ?\", strings.ToUpper(order)).First(&out).Error\n\n\tif err != nil {\n\t\tlogger.TrackAction(db, \"find-or-create-error\", err.Error())\n\t\treturn nil, err\n\t}\n\treturn out, nil\n}", "title": "" } ]
34797c8f3d478f64546237ee96d718c6
DeployApplication Deploy the given application in the given environment using the given orchestrator if location is empty, the first matching location will be used
[ { "docid": "5b0c09ec4704434894e7909b6c8821a3", "score": "0.74179256", "text": "func (d *deploymentService) DeployApplication(ctx context.Context, appID string, envID string, location string) error {\n\n\t// get locations matching this application\n\ttopologyID, err := d.client.topologyService.GetTopologyID(ctx, appID, envID)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Unable to get application topology for app %s and env %s\", appID, envID)\n\t}\n\n\tlocationsMatch, err := d.GetLocationsMatching(ctx, topologyID, envID)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"Failed to get locations matching app %s env %s\",\n\t\t\tappID, envID)\n\t}\n\n\tlocationID := \"\"\n\torchestratorID := \"\"\n\tfor _, locationMatch := range locationsMatch {\n\t\tif location == \"\" || locationMatch.Location.Name == location {\n\t\t\tlocationID = locationMatch.Location.ID\n\t\t\torchestratorID = locationMatch.Location.OrchestratorID\n\t\t\tbreak\n\t\t}\n\t}\n\tif locationID == \"\" {\n\t\t// Return the list of possible locations names\n\t\tvar locationNames []string\n\t\tfor _, locationMatch := range locationsMatch {\n\t\t\tlocationNames = append(locationNames, locationMatch.Location.Name)\n\t\t}\n\t\treturn errors.Errorf(\"Location %q not found in list of matching locations: %+v\", location, locationNames)\n\t}\n\t// Set location policy for deployment\n\tvar locationPolicies LocationPoliciesPostRequestIn\n\tlocationPolicies.GroupsToLocations.A4CAll = locationID\n\tlocationPolicies.OrchestratorID = orchestratorID\n\n\tbody, err := json.Marshal(locationPolicies)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Cannot marshal an a4cLocationPoliciesPostRequestIn structure\")\n\t}\n\trequest, err := d.client.NewRequest(ctx,\n\t\t\"POST\",\n\t\tfmt.Sprintf(\"%s/applications/%s/environments/%s/deployment-topology/location-policies\", a4CRestAPIPrefix, appID, envID),\n\t\tbytes.NewReader(body),\n\t)\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Unable to send a request to set the location in order to deploy an application\")\n\t}\n\tresponse, err := d.client.Do(request)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Unable to send a request to set the location in order to deploy an application\")\n\t}\n\n\terr = ReadA4CResponse(response, nil)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Unable to set the location in order to deploy an application\")\n\t}\n\n\t// Deploy the application a4cApplicationDeployhRequestIn\n\tappDeployBody, err := json.Marshal(\n\t\tApplicationDeployRequest{\n\t\t\tenvID,\n\t\t\tappID,\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Failed to marshal application deployment request\")\n\t}\n\n\trequest, err = d.client.NewRequest(ctx,\n\t\t\"POST\",\n\t\tfmt.Sprintf(\"%s/applications/deployment\", a4CRestAPIPrefix),\n\t\tbytes.NewReader(appDeployBody),\n\t)\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Unable to send a request to deploy the application\")\n\t}\n\tresponse, err = d.client.Do(request)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"Unable to send a request to deploy the application\")\n\t}\n\terr = ReadA4CResponse(response, nil)\n\treturn errors.Wrap(err, \"Unable to deploy the application\")\n}", "title": "" } ]
[ { "docid": "05943b16e706fed635ddd4e39a11ba38", "score": "0.627397", "text": "func (hc ApplicationsController) Deploy(w http.ResponseWriter, r *http.Request) APIErrors {\n\tctx := r.Context()\n\tlog := tracelog.Logger(ctx)\n\n\tp := httprouter.ParamsFromContext(ctx)\n\torg := p.ByName(\"org\")\n\tname := p.ByName(\"app\")\n\tusername, err := GetUsername(r)\n\tif err != nil {\n\t\treturn UserNotFound()\n\t}\n\n\tdefer r.Body.Close()\n\tbodyBytes, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn InternalError(err)\n\t}\n\n\treq := models.DeployRequest{}\n\tif err := json.Unmarshal(bodyBytes, &req); err != nil {\n\t\treturn NewBadRequest(\"Failed to unmarshal deploy request \", err.Error())\n\t}\n\n\tif name != req.App.Name {\n\t\treturn NewBadRequest(\"name parameter from URL does not match name param in body\")\n\t}\n\tif org != req.App.Org {\n\t\treturn NewBadRequest(\"org parameter from URL does not match org param in body\")\n\t}\n\n\tcluster, err := kubernetes.GetCluster(ctx)\n\tif err != nil {\n\t\treturn InternalError(err, \"failed to get access to a kube client\")\n\t}\n\n\t// check application resource\n\tapplicationCR, err := application.Get(ctx, cluster, req.App)\n\tif err != nil {\n\t\tif apierrors.IsNotFound(err) {\n\t\t\treturn AppIsNotKnown(\"cannot deploy app, application resource is missing\")\n\t\t}\n\t\treturn InternalError(err, \"failed to get the application resource\")\n\t}\n\towner := metav1.OwnerReference{\n\t\tAPIVersion: applicationCR.GetAPIVersion(),\n\t\tKind: applicationCR.GetKind(),\n\t\tName: applicationCR.GetName(),\n\t\tUID: applicationCR.GetUID(),\n\t}\n\n\t// determine number of desired instances\n\tinstances, err := application.Scaling(ctx, cluster, req.App)\n\tif err != nil {\n\t\treturn InternalError(err, \"failed to access application's desired instances\")\n\t}\n\n\t// determine runtime environment, if any\n\tenvironment, err := application.Environment(ctx, cluster, req.App)\n\tif err != nil {\n\t\treturn InternalError(err, \"failed to access application's runtime environment\")\n\t}\n\n\t// determine bound services, if any\n\tservices, err := application.BoundServices(ctx, cluster, req.App)\n\tif err != nil {\n\t\treturn InternalError(err, \"failed to access application's bound services\")\n\t}\n\n\tbindings, err := application.ToBinds(ctx, services, req.App.Name, owner, username)\n\tif err != nil {\n\t\treturn InternalError(err, \"failed to process application's bound services\")\n\t}\n\n\troute, err := domain.AppDefaultRoute(ctx, req.App.Name)\n\tif err != nil {\n\t\treturn InternalError(err)\n\t}\n\n\tdeployParams := deployParam{\n\t\tAppRef: req.App,\n\t\tOwner: owner,\n\t\tEnvironment: environment,\n\t\tServices: bindings,\n\t\tInstances: instances,\n\t\tImageURL: req.ImageURL,\n\t\tUsername: username,\n\t}\n\n\tlog.Info(\"deploying app\", \"org\", org, \"app\", req.App)\n\tdeployment := newAppDeployment(req.Stage.ID, deployParams)\n\tdeployment.SetOwnerReferences([]metav1.OwnerReference{owner})\n\tif _, err := cluster.Kubectl.AppsV1().Deployments(req.App.Org).Create(ctx, deployment, metav1.CreateOptions{}); err != nil {\n\t\tif apierrors.IsAlreadyExists(err) {\n\t\t\tif _, err := cluster.Kubectl.AppsV1().Deployments(req.App.Org).Update(ctx, deployment, metav1.UpdateOptions{}); err != nil {\n\t\t\t\treturn InternalError(err)\n\t\t\t}\n\t\t} else {\n\t\t\treturn InternalError(err)\n\t\t}\n\t}\n\n\tlog.Info(\"deploying app service\", \"org\", org, \"app\", req.App)\n\n\tsvc := newAppService(req.App, username)\n\n\tlog.Info(\"app service\", \"name\", svc.ObjectMeta.Name)\n\n\tsvc.SetOwnerReferences([]metav1.OwnerReference{owner})\n\tif _, err := cluster.Kubectl.CoreV1().Services(req.App.Org).Create(ctx, svc, metav1.CreateOptions{}); err != nil {\n\t\tif apierrors.IsAlreadyExists(err) {\n\t\t\tservice, err := cluster.Kubectl.CoreV1().Services(req.App.Org).Get(ctx, svc.Name, metav1.GetOptions{})\n\t\t\tif err != nil {\n\t\t\t\treturn InternalError(err)\n\t\t\t}\n\n\t\t\tsvc.ResourceVersion = service.ResourceVersion\n\t\t\tsvc.Spec.ClusterIP = service.Spec.ClusterIP\n\t\t\tif _, err := cluster.Kubectl.CoreV1().Services(req.App.Org).Update(ctx, svc, metav1.UpdateOptions{}); err != nil {\n\t\t\t\treturn InternalError(err)\n\t\t\t}\n\t\t} else {\n\t\t\treturn InternalError(err)\n\t\t}\n\t}\n\n\tlog.Info(\"deploying app ingress\", \"org\", org, \"app\", req.App, \"\", route)\n\n\ting := newAppIngress(req.App, route, username)\n\n\tlog.Info(\"app ingress\", \"name\", ing.ObjectMeta.Name)\n\n\ting.SetOwnerReferences([]metav1.OwnerReference{owner})\n\tif _, err := cluster.Kubectl.NetworkingV1().Ingresses(req.App.Org).Create(ctx, ing, metav1.CreateOptions{}); err != nil {\n\t\tif apierrors.IsAlreadyExists(err) {\n\t\t\tif _, err := cluster.Kubectl.NetworkingV1().Ingresses(req.App.Org).Update(ctx, ing, metav1.UpdateOptions{}); err != nil {\n\t\t\t\treturn InternalError(err)\n\t\t\t}\n\t\t} else {\n\t\t\treturn InternalError(err)\n\t\t}\n\t}\n\n\t// Delete previous pipelineruns except for the current one\n\tif req.Stage.ID != \"\" {\n\t\tif err := application.Unstage(ctx, cluster, req.App, req.Stage.ID); err != nil {\n\t\t\treturn InternalError(err)\n\t\t}\n\t}\n\n\tresp := models.DeployResponse{\n\t\tRoute: route,\n\t}\n\terr = jsonResponse(w, resp)\n\tif err != nil {\n\t\treturn InternalError(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "eaa90552d1dbd90c0f2b19c8b94e4017", "score": "0.59677374", "text": "func Deploy(c *gin.Context) apierror.APIErrors {\n\tctx := c.Request.Context()\n\n\tnamespace := c.Param(\"namespace\")\n\tname := c.Param(\"app\")\n\tusername := requestctx.User(ctx).Username\n\n\treq := models.DeployRequest{}\n\tif err := c.BindJSON(&req); err != nil {\n\t\treturn apierror.NewBadRequestError(err.Error()).WithDetails(\"failed to unmarshal deploy request\")\n\t}\n\n\tif name != req.App.Name {\n\t\treturn apierror.NewBadRequestError(\"name parameter from URL does not match name param in body\")\n\t}\n\tif namespace != req.App.Namespace {\n\t\treturn apierror.NewBadRequestError(\"namespace parameter from URL does not match namespace param in body\")\n\t}\n\n\t// validate provider reference, if actually present (git origin, and specified)\n\tif req.Origin.Git != nil && req.Origin.Git.Provider != \"\" {\n\t\tprovider := req.Origin.Git.Provider\n\t\tif _, err := models.GitProviderFromString(string(provider)); err != nil {\n\t\t\treturn apierror.NewBadRequestErrorf(\"bad git provider `%s`\", provider)\n\t\t}\n\n\t\tif err := provider.ValidateURL(req.Origin.Git.URL); err != nil {\n\t\t\treturn apierror.NewBadRequestErrorf(\"validating git url: `%s`\", err.Error())\n\t\t}\n\t}\n\n\tcluster, err := kubernetes.GetCluster(ctx)\n\tif err != nil {\n\t\treturn apierror.InternalError(err, \"failed to get access to a kube client\")\n\t}\n\n\tapplicationCR, err := application.Get(ctx, cluster, req.App)\n\tif err != nil {\n\t\tif apierrors.IsNotFound(err) {\n\t\t\treturn apierror.AppIsNotKnown(\"cannot deploy app, application resource is missing\")\n\t\t}\n\t\treturn apierror.InternalError(err, \"failed to get the application resource\")\n\t}\n\n\terr = deploy.UpdateImageURL(ctx, cluster, applicationCR, req.ImageURL)\n\tif err != nil {\n\t\treturn apierror.InternalError(err, \"failed to set application's image url\")\n\t}\n\n\tdesiredRoutes, found, err := unstructured.NestedStringSlice(applicationCR.Object, \"spec\", \"routes\")\n\tif err != nil {\n\t\treturn apierror.InternalError(err, \"failed to get the application routes\")\n\t}\n\tif !found {\n\t\t// [NO-ROUTES] See other places bearing this marker for explanations.\n\t\tdesiredRoutes = []string{}\n\t}\n\n\tapierr := validateRoutes(ctx, cluster, name, namespace, desiredRoutes)\n\tif apierr != nil {\n\t\treturn apierr\n\t}\n\n\troutes, apierr := deploy.DeployApp(ctx, cluster, req.App, username, req.Stage.ID)\n\tif apierr != nil {\n\t\treturn apierr\n\t}\n\n\terr = application.SetOrigin(ctx, cluster, req.App, req.Origin)\n\tif err != nil {\n\t\treturn apierror.InternalError(err, \"saving the app origin\")\n\t}\n\n\tresponse.OKReturn(c, models.DeployResponse{\n\t\tRoutes: routes,\n\t})\n\treturn nil\n}", "title": "" }, { "docid": "c09fb09cd5f3c27f76946093a96a9dbe", "score": "0.5852357", "text": "func (a *Application) Deploy() (*Application, *http.Response, []error) {\n\tk := kumoru.New()\n\n\tk.Post(fmt.Sprintf(\"%s/v1/applications/%s/deployments/?deployment_token=%s\", k.EndPoint.Application, a.UUID, a.DeploymentToken))\n\tk.SignRequest(true)\n\n\tresp, _, errs := k.End()\n\n\tif len(errs) > 0 {\n\t\treturn a, resp, errs\n\t}\n\n\tif resp.StatusCode >= 400 {\n\t\terrs = append(errs, fmt.Errorf(\"%s\", resp.Status))\n\t}\n\n\treturn a, resp, nil\n}", "title": "" }, { "docid": "46b09ed3a0db44dee302e7eaa7b8a5be", "score": "0.58293486", "text": "func (c *ApplicationDeploymentServiceClient) Deploy(\n\tctx context.Context,\n\tapp *cce.App,\n) error {\n\tvar err error\n\tswitch app.Type {\n\tcase \"container\":\n\t\t_, err = c.PBCli.DeployContainer(ctx, toPBApp(app))\n\tcase \"vm\":\n\t\t_, err = c.PBCli.DeployVM(ctx, toPBApp(app))\n\t}\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"error deploying application\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "722ab874e1586152404a8ef8445c03d6", "score": "0.5788283", "text": "func (d Deployer) Deploy(req *http.Request, environment, org, space, appName, contentType string, response io.ReadWriter) (statusCode int, err error) {\n\tvar (\n\t\tdeploymentInfo = S.DeploymentInfo{}\n\t\tenvironments = d.Config.Environments\n\t\tauthenticationRequired = environments[environment].Authenticate\n\t\tdeployEventData = S.DeployEventData{}\n\t\tmanifest []byte\n\t\tappPath string\n\t)\n\tdefer func() { d.FileSystem.RemoveAll(appPath) }()\n\n\te, ok := environments[environment]\n\tif !ok {\n\t\tfmt.Fprintln(response, EnvironmentNotFoundError{environment}.Error())\n\t\treturn http.StatusInternalServerError, EnvironmentNotFoundError{environment}\n\t}\n\n\td.Log.Debug(\"prechecking the foundations\")\n\terr = d.Prechecker.AssertAllFoundationsUp(environments[environment])\n\tif err != nil {\n\t\td.Log.Error(err)\n\t\treturn http.StatusInternalServerError, err\n\t}\n\n\td.Log.Debug(\"checking for basic auth\")\n\tusername, password, ok := req.BasicAuth()\n\tif !ok {\n\t\tif authenticationRequired {\n\t\t\treturn http.StatusUnauthorized, BasicAuthError{}\n\t\t}\n\t\tusername = d.Config.Username\n\t\tpassword = d.Config.Password\n\t}\n\n\tif isJSON(contentType) {\n\t\td.Log.Debug(\"deploying from json request\")\n\t\td.Log.Debug(\"building deploymentInfo\")\n\t\tdeploymentInfo, err = getDeploymentInfo(req.Body)\n\t\tif err != nil {\n\t\t\td.Log.Error(err)\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\tif deploymentInfo.Manifest != \"\" {\n\t\t\tmanifest, err = base64.StdEncoding.DecodeString(deploymentInfo.Manifest)\n\t\t\tif err != nil {\n\t\t\t\td.Log.Error(err)\n\t\t\t\treturn http.StatusBadRequest, ManifestError{err}\n\t\t\t}\n\t\t}\n\n\t\tappPath, err = d.Fetcher.Fetch(deploymentInfo.ArtifactURL, string(manifest))\n\t\tif err != nil {\n\t\t\td.Log.Error(err)\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t} else if isZip(contentType) {\n\t\td.Log.Debug(\"deploying from zip request\")\n\t\tappPath, err = d.Fetcher.FetchZipFromRequest(req)\n\t\tif err != nil {\n\t\t\treturn http.StatusInternalServerError, err\n\t\t}\n\n\t\tmanifest, _ = d.FileSystem.ReadFile(appPath + \"/manifest.yml\")\n\n\t\tdeploymentInfo.ArtifactURL = appPath\n\t} else {\n\t\treturn http.StatusBadRequest, InvalidContentTypeError{}\n\t}\n\n\tdeploymentInfo.Username = username\n\tdeploymentInfo.Password = password\n\tdeploymentInfo.Environment = environment\n\tdeploymentInfo.Org = org\n\tdeploymentInfo.Space = space\n\tdeploymentInfo.AppName = appName\n\tdeploymentInfo.UUID = d.Randomizer.StringRunes(10)\n\tdeploymentInfo.SkipSSL = environments[environment].SkipSSL\n\tdeploymentInfo.Manifest = string(manifest)\n\tdeploymentInfo.Domain = environments[environment].Domain\n\tdeploymentInfo.AppPath = appPath\n\n\tinstances := manifestro.GetInstances(deploymentInfo.Manifest)\n\tif instances != nil {\n\t\tdeploymentInfo.Instances = *instances\n\t} else {\n\t\tdeploymentInfo.Instances = environments[environment].Instances\n\t}\n\n\te, found := environments[deploymentInfo.Environment]\n\tif !found {\n\t\terr = d.EventManager.Emit(S.Event{Type: C.DeployErrorEvent, Data: deployEventData})\n\t\tif err != nil {\n\t\t\td.Log.Error(err)\n\t\t}\n\n\t\terr = fmt.Errorf(\"environment not found: %s\", deploymentInfo.Environment)\n\t\td.Log.Error(err)\n\t\treturn http.StatusInternalServerError, err\n\t}\n\n\tdeploymentMessage := fmt.Sprintf(deploymentOutput, deploymentInfo.ArtifactURL, deploymentInfo.Username, deploymentInfo.Environment, deploymentInfo.Org, deploymentInfo.Space, deploymentInfo.AppName)\n\td.Log.Info(deploymentMessage)\n\tfmt.Fprintln(response, deploymentMessage)\n\n\tdeployEventData = S.DeployEventData{Response: response, DeploymentInfo: &deploymentInfo, RequestBody: req.Body}\n\n\tdefer emitDeployFinish(d, deployEventData, response, &err, &statusCode)\n\n\td.Log.Debugf(\"emitting a %s event\", C.DeployStartEvent)\n\terr = d.EventManager.Emit(S.Event{Type: C.DeployStartEvent, Data: deployEventData})\n\tif err != nil {\n\t\td.Log.Error(err)\n\t\treturn http.StatusInternalServerError, EventError{C.DeployStartEvent, err}\n\t}\n\n\tdefer emitDeploySuccess(d, deployEventData, response, &err, &statusCode)\n\n\terr = d.BlueGreener.Push(e, appPath, deploymentInfo, response)\n\tif err != nil {\n\t\tif matched, _ := regexp.MatchString(\"login failed\", err.Error()); matched {\n\t\t\treturn http.StatusBadRequest, err\n\t\t}\n\t\treturn http.StatusInternalServerError, err\n\t}\n\n\td.Log.Infof(\"successfully deployed application %s\", deploymentInfo.AppName)\n\tfmt.Fprintf(response, \"\\n%s\", successfulDeploy)\n\treturn http.StatusOK, err\n}", "title": "" }, { "docid": "09e1ccdc9cc5b6884b96e0ec575d1798", "score": "0.57733685", "text": "func (cli *CLI) AppDeploy(opts *AppDeployInput) (string, error) {\n\treturn cli.exec(\n\t\texec.Command(cli.path, \"app\", \"deploy\",\n\t\t\t\"--name\", opts.AppName,\n\t\t\t\"--env\", opts.EnvName,\n\t\t\t\"--tag\", opts.ImageTag))\n}", "title": "" }, { "docid": "4bd39b7350bea75773906752cf3dc49a", "score": "0.5748955", "text": "func (opts *appDeployOpts) Execute() error {\n\tenv, err := opts.targetEnv()\n\tif err != nil {\n\t\treturn err\n\t}\n\topts.targetEnvironment = env\n\n\tif err := opts.configureClients(); err != nil {\n\t\treturn err\n\t}\n\n\trepoName := fmt.Sprintf(\"%s/%s\", opts.projectName, opts.AppName)\n\n\turi, err := opts.ecrService.GetRepository(repoName)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get ECR repository URI: %w\", err)\n\t}\n\n\tappDockerfilePath, err := opts.getAppDockerfilePath()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := opts.dockerService.Build(uri, opts.ImageTag, appDockerfilePath); err != nil {\n\t\treturn fmt.Errorf(\"build Dockerfile at %s with tag %s: %w\", appDockerfilePath, opts.ImageTag, err)\n\t}\n\n\tauth, err := opts.ecrService.GetECRAuth()\n\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get ECR auth data: %w\", err)\n\t}\n\n\topts.dockerService.Login(uri, auth.Username, auth.Password)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err = opts.dockerService.Push(uri, opts.ImageTag); err != nil {\n\t\treturn err\n\t}\n\n\ttemplate, err := opts.getAppDeployTemplate()\n\n\tid, err := uuid.NewRandom()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to generate random id for changeSet: %w\", err)\n\t}\n\tstackName := stack.NameForApp(opts.ProjectName(), opts.targetEnvironment.Name, opts.AppName)\n\tchangeSetName := fmt.Sprintf(\"%s-%s\", stackName, id)\n\n\topts.spinner.Start(\n\t\tfmt.Sprintf(\"Deploying %s to %s.\",\n\t\t\tfmt.Sprintf(\"%s:%s\", color.HighlightUserInput(opts.AppName), color.HighlightUserInput(opts.ImageTag)),\n\t\t\tcolor.HighlightUserInput(opts.targetEnvironment.Name)))\n\n\t// TODO Use the Tags() method defined in deploy/cloudformation/stack/lb_fargate_app.go\n\ttags := map[string]string{\n\t\tstack.ProjectTagKey: opts.ProjectName(),\n\t\tstack.EnvTagKey: opts.targetEnvironment.Name,\n\t\tstack.AppTagKey: opts.AppName,\n\t}\n\tif err := opts.applyAppDeployTemplate(template, stackName, changeSetName, opts.targetEnvironment.ExecutionRoleARN, tags); err != nil {\n\t\topts.spinner.Stop(\"Error!\")\n\t\treturn err\n\t}\n\topts.spinner.Stop(\"\")\n\n\tidentifier, err := describe.NewWebAppDescriber(opts.ProjectName(), opts.AppName)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"create identifier for application %s in project %s: %w\", opts.AppName, opts.ProjectName(), err)\n\t}\n\tloadBalancerURI, err := identifier.URI(opts.targetEnvironment.Name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cannot retrieve the URI from environment %s: %w\", opts.EnvName, err)\n\t}\n\tlog.Successf(\"Deployed %s, you can access it at %s\\n\", color.HighlightUserInput(opts.AppName), loadBalancerURI.String())\n\treturn nil\n}", "title": "" }, { "docid": "5ff345b563d1b82fde15a17c26725c45", "score": "0.57437825", "text": "func DeployCollateralApp(auth *bind.TransactOpts, backend bind.ContractBackend, _adjudicator common.Address) (common.Address, *types.Transaction, *CollateralApp, error) {\n\tparsed, err := abi.JSON(strings.NewReader(CollateralAppABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(CollateralAppBin), backend, _adjudicator)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &CollateralApp{CollateralAppCaller: CollateralAppCaller{contract: contract}, CollateralAppTransactor: CollateralAppTransactor{contract: contract}, CollateralAppFilterer: CollateralAppFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "7297b8fdc255c9380558ee352aa71942", "score": "0.5723804", "text": "func DeployApp(ctx context.Context, cluster *kubernetes.Cluster, app models.AppRef, username, expectedStageID string) ([]string, apierror.APIErrors) {\n\treturn deployApp(ctx, cluster, app, username, expectedStageID, false)\n}", "title": "" }, { "docid": "eface32729540a4f3adc2097433f0d9d", "score": "0.5684003", "text": "func DeployApp(spec *AppDeploymentSpec, client client.Interface) error {\n\tlog.Printf(\"Deploying %s application into %s namespace\", spec.Name, spec.Namespace)\n\n\tannotations := map[string]string{}\n\tif spec.Description != nil {\n\t\tannotations[DescriptionAnnotationKey] = *spec.Description\n\t}\n\n\tlabels := getLabelsMap(spec.Labels)\n\tobjectMeta := metaV1.ObjectMeta{\n\t\tName: spec.Name,\n\t\t//Namespace: spec.Namespace,\n\t\tLabels: labels,\n\t\tAnnotations: annotations,\n\t}\n\tcontainerSpec := api.Container{\n\t\tName: spec.Name,\n\t\tImage: spec.ContainerImage,\n\t\tEnv: convertEnvVarsSpec(spec.Variables),\n\t\tResources: api.ResourceRequirements{\n\t\t\tRequests: map[api.ResourceName]resource.Quantity{},\n\t\t},\n\t\tSecurityContext: &api.SecurityContext{\n\t\t\tPrivileged: &spec.RunAsPrivileged,\n\t\t},\n\t}\n\tpodSpec := api.PodSpec{\n\t\tContainers: []api.Container{containerSpec},\n\t}\n\n\tpodTemplate := api.PodTemplateSpec{\n\t\tObjectMeta: objectMeta,\n\t\tSpec: podSpec,\n\t}\n\n\tdeployment := &apps.Deployment{\n\t\tObjectMeta: objectMeta,\n\t\tSpec: apps.DeploymentSpec{\n\t\t\tReplicas: &spec.Replicas,\n\t\t\tSelector: &metaV1.LabelSelector{\n\t\t\t\tMatchLabels: labels,\n\t\t\t},\n\t\t\tTemplate: podTemplate,\n\t\t},\n\t}\n\n\t_, err := client.AppsV1().Deployments(spec.Namespace).Create(deployment)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(spec.PortMappings) > 0 {\n\t\t// create service associated with the deployment\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0535bc1791d2f64f959697f5c2be7c61", "score": "0.5660064", "text": "func (s Step) AsDeployApplication() (*sdk.Action, bool, error) {\n\tif !s.IsValid() {\n\t\treturn nil, false, sdk.WithStack(sdk.ErrMalformattedStep)\n\t}\n\tbI, ok := s[\"deploy\"]\n\tif !ok {\n\t\treturn nil, false, nil\n\t}\n\n\tbS, ok := bI.(string)\n\tif !ok {\n\t\treturn nil, true, sdk.NewErrorFrom(sdk.ErrMalformattedStep, \"deploy must be a string\")\n\t}\n\ta := sdk.NewDeployApplication(bS)\n\n\tvar err error\n\ta.StepName, err = s.Name()\n\tif err != nil {\n\t\treturn nil, true, err\n\t}\n\ta.Enabled, err = s.IsFlagged(\"enabled\")\n\tif err != nil {\n\t\treturn nil, true, err\n\t}\n\ta.Optional, err = s.IsFlagged(\"optional\")\n\tif err != nil {\n\t\treturn nil, true, err\n\t}\n\ta.AlwaysExecuted, err = s.IsFlagged(\"always_executed\")\n\tif err != nil {\n\t\treturn nil, true, err\n\t}\n\n\treturn &a, true, nil\n}", "title": "" }, { "docid": "24cb8dfd934f6bd454561d1b1fd3a0a6", "score": "0.5498719", "text": "func (p *deploycmd) deploy(c *cli.Context) error {\n\tappName := \"\"\n\tdir := common.GetDir(c)\n\n\tappf, err := common.LoadAppfile(dir)\n\tif err != nil {\n\t\tif _, ok := err.(*common.NotFoundError); ok {\n\t\t\tif p.all {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\t// otherwise, it's ok\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tappName = appf.Name\n\t}\n\tif p.appName != \"\" {\n\t\t// flag overrides all\n\t\tappName = p.appName\n\t}\n\n\tif appName == \"\" {\n\t\treturn errors.New(\"App name must be provided, try `--app APP_NAME`\")\n\t}\n\n\t// appfApp is used to create/update app, with app file additions if provided\n\tappfApp := models.App{\n\t\tName: appName,\n\t}\n\tif appf != nil {\n\t\t// set other fields from app file\n\t\tappfApp.Config = appf.Config\n\t\tappfApp.Annotations = appf.Annotations\n\t\tif appf.SyslogURL != \"\" {\n\t\t\t// TODO consistent with some other fields (config), unsetting in app.yaml doesn't unset on server. undecided policy for all fields\n\t\t\tappfApp.SyslogURL = &appf.SyslogURL\n\t\t}\n\t}\n\n\t// find and create/update app if required\n\tapp, err := apps.GetAppByName(p.clientV2, appName)\n\tif _, ok := err.(apps.NameNotFoundError); ok && p.createApp {\n\t\tapp, err = apps.CreateApp(p.clientV2, &appfApp)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if err != nil {\n\t\treturn err\n\t} else if appf != nil {\n\t\t// app exists, but we need to update it if we have an app file\n\t\tapp, err = apps.PutApp(p.clientV2, app.ID, &appfApp)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed to update app config: %v\", err)\n\t\t}\n\t}\n\n\tif app == nil {\n\t\tpanic(\"app should not be nil here\") // tests should catch... better than panic later\n\t}\n\n\t// deploy functions\n\tif p.all {\n\t\treturn p.deployAll(c, app)\n\t}\n\treturn p.deploySingle(c, app)\n}", "title": "" }, { "docid": "3d42af4518e510cf302bf7ef0984c47f", "score": "0.54642427", "text": "func DeployOrFail(t *testing.T, appDir, dockerTag, environment string) {\n\tDeployArgsOrFail(t, appDir, dockerTag, environment)\n}", "title": "" }, { "docid": "889873e23be2e99d1044f072674ee22a", "score": "0.5453513", "text": "func (a *Client) DeployCloudTowerApplication(params *DeployCloudTowerApplicationParams, opts ...ClientOption) (*DeployCloudTowerApplicationOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeployCloudTowerApplicationParams()\n\t}\n\top := &runtime.ClientOperation{\n\t\tID: \"DeployCloudTowerApplication\",\n\t\tMethod: \"POST\",\n\t\tPathPattern: \"/deploy-cloudtower-application\",\n\t\tProducesMediaTypes: []string{\"application/json\"},\n\t\tConsumesMediaTypes: []string{\"application/json\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeployCloudTowerApplicationReader{formats: a.formats},\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t}\n\tfor _, opt := range opts {\n\t\topt(op)\n\t}\n\n\tresult, err := a.transport.Submit(op)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsuccess, ok := result.(*DeployCloudTowerApplicationOK)\n\tif ok {\n\t\treturn success, nil\n\t}\n\t// unexpected success response\n\t// safeguard: normally, absent a default response, unknown success responses return an error above: so this is a codegen issue\n\tmsg := fmt.Sprintf(\"unexpected success response for DeployCloudTowerApplication: API contract not enforced by server. Client expected to get an error, but got: %T\", result)\n\tpanic(msg)\n}", "title": "" }, { "docid": "63463261d1eadff97edd798c9675c95c", "score": "0.5338981", "text": "func newAppDeployCmd(params *deploy.Services, configDefaultBuilder string) *cobra.Command {\n\tvar options deploy.Options\n\n\tcmd := &cobra.Command{\n\t\tUse: \"deploy APPNAME [SOURCE DIRECTORY]\",\n\t\tShort: \"Deploy an app.\",\n\t\tLong: appDeployHelp,\n\t\tArgs: cobra.RangeArgs(1, 2),\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\toptions.AppName = args[0]\n\t\t\tif len(args) == 2 {\n\t\t\t\toptions.AppSourcePath = args[1]\n\t\t\t}\n\t\t\tif configDefaultBuilder != \"\" {\n\t\t\t\tdeploy.DefaultBuilder = configDefaultBuilder\n\t\t\t}\n\t\t\treturn deploy.New(options.GetChangeSet(cmd.Flags())).Run(cmd.Context(), params)\n\t\t},\n\t}\n\n\tcmd.Flags().StringVarP(&options.Image, deploy.FlagImage, deploy.FlagImageShort, \"\", \"Name of the image to be deployed.\")\n\tcmd.Flags().StringVar(&options.KetchYamlFileName, deploy.FlagKetchYaml, \"\", \"Path to ketch.yaml.\")\n\n\tcmd.Flags().StringVar(&options.ProcfileFileName, deploy.FlagProcFile, \"\", \"Path to procfile.\")\n\tcmd.Flags().BoolVar(&options.StrictKetchYamlDecoding, deploy.FlagStrict, false, \"Enforces strict decoding of ketch.yaml.\")\n\tcmd.Flags().IntVar(&options.Steps, deploy.FlagSteps, 0, \"Number of steps for a canary deployment.\")\n\tcmd.Flags().StringVar(&options.StepTimeInterval, deploy.FlagStepInterval, \"\", \"Time interval between canary deployment steps. Supported min: m, hour:h, second:s. ex. 1m, 60s, 1h.\")\n\tcmd.Flags().BoolVar(&options.Wait, deploy.FlagWait, false, \"If true blocks until deploy completes or a timeout occurs.\")\n\tcmd.Flags().StringVar(&options.Timeout, deploy.FlagTimeout, \"20s\", \"Defines the length of time to block waiting for deployment completion. Supported min: m, hour:h, second:s. ex. 1m, 60s, 1h.\")\n\n\tcmd.Flags().StringVarP(&options.Description, deploy.FlagDescription, deploy.FlagDescriptionShort, \"\", \"App description.\")\n\tcmd.Flags().StringSliceVarP(&options.Envs, deploy.FlagEnvironment, deploy.FlagEnvironmentShort, []string{}, \"App env variables.\")\n\tcmd.Flags().StringVarP(&options.Framework, deploy.FlagFramework, deploy.FlagFrameworkShort, \"\", \"Framework to deploy your app.\")\n\tcmd.Flags().StringVarP(&options.DockerRegistrySecret, deploy.FlagRegistrySecret, \"\", \"\", \"A name of a Secret with docker credentials. This secret must be created in the same namespace of the framework.\")\n\tcmd.Flags().StringVar(&options.Builder, deploy.FlagBuilder, \"\", \"Builder to use when building from source.\")\n\tcmd.Flags().StringSliceVar(&options.BuildPacks, deploy.FlagBuildPacks, nil, \"A list of build packs\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "91f1feee638b702cc8da5ed025278c53", "score": "0.53299254", "text": "func Deploy(s *model.Service, e *model.Environment, log *logger.Logger) error {\n\tif e.Provider.IsTestProvider() {\n\t\treturn nil\n\t}\n\tc, err := client.Get(e.Provider)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif err := namespace.Create(e, c, log); err != nil {\n\t\treturn err\n\t}\n\tif err := user.Create(e, c, log); err != nil {\n\t\treturn err\n\t}\n\tif err := secret.Create(e, c, log); err != nil {\n\t\treturn err\n\t}\n\tfor _, v := range s.Volumes {\n\t\tif v.Persistent {\n\t\t\tif err := k8Volume.Deploy(s, v, e, c, log); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\tif err := k8Deployment.Deploy(s, e, c, log); err != nil {\n\t\treturn err\n\t}\n\tif len(s.GetPrivatePorts()) == 0 {\n\t\treturn nil\n\t}\n\tif err := k8service.Deploy(s, e, c, log); err != nil {\n\t\treturn err\n\t}\n\tif !e.Provider.IsIngress() || len(s.GetIngressRules(true)) == 0 {\n\t\treturn nil\n\t}\n\tif err := k8Ingress.Deploy(s, e, c, log); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c4a8212ec605b4b20deb8ba49ab40b5a", "score": "0.5314533", "text": "func (h *Hermes) Deploy(ctx context.Context, target infra.AppTarget) error {\n\tbin := h.config.BinDir + \"/hermes\"\n\thermesHome := h.config.AppDir + \"/\" + h.name\n\tconfigFile := hermesHome + \"/config.toml\"\n\thermes := func(args ...string) *osexec.Cmd {\n\t\treturn osexec.Command(bin, append([]string{\"--config\", configFile}, args...)...)\n\t}\n\n\treturn target.DeployBinary(ctx, infra.Binary{\n\t\tPath: bin,\n\t\tRequiresIP: true,\n\t\tAppBase: infra.AppBase{\n\t\t\tName: h.name,\n\t\t\tArgs: []string{\n\t\t\t\t\"--config\", configFile,\n\t\t\t\t\"start\",\n\t\t\t},\n\t\t\tFiles: []infra.File{\n\t\t\t\t{\n\t\t\t\t\tPath: configFile,\n\t\t\t\t\tContentFunc: h.generateConfig,\n\t\t\t\t\tPreprocess: true,\n\t\t\t\t},\n\t\t\t},\n\t\t\tCopy: []string{\n\t\t\t\tbin,\n\t\t\t\thermesHome,\n\t\t\t},\n\t\t\tRequires: infra.Prerequisites{\n\t\t\t\tTimeout: 10 * time.Second,\n\t\t\t\tDependencies: []infra.HealthCheckCapable{\n\t\t\t\t\th.chainA,\n\t\t\t\t\th.chainB,\n\t\t\t\t},\n\t\t\t},\n\t\t\tPreFunc: func(ctx context.Context) error {\n\t\t\t\treturn exec.Run(ctx,\n\t\t\t\t\thermes(\"keys\", \"add\", h.chainA.ID(), \"--file\", h.config.AppDir+\"/\"+h.chainA.ID()+\"/master.json\"),\n\t\t\t\t\thermes(\"keys\", \"add\", h.chainB.ID(), \"--file\", h.config.AppDir+\"/\"+h.chainB.ID()+\"/master.json\"),\n\t\t\t\t\thermes(\"create\", \"channel\", h.chainA.ID(), h.chainB.ID(), \"--port-a\", \"transfer\", \"--port-b\", \"transfer\"),\n\t\t\t\t)\n\t\t\t},\n\t\t\tPostFunc: func(ctx context.Context, deployment infra.Deployment) error {\n\t\t\t\th.appDesc.IP = deployment.IP\n\t\t\t\th.appDesc.AddEndpoint(\"telemetry\", fmt.Sprintf(\"%s:3001\", deployment.IP))\n\t\t\t\treturn nil\n\t\t\t},\n\t\t},\n\t})\n}", "title": "" }, { "docid": "7a3c8d8ec813ef83f6099907bdf6e8e9", "score": "0.5282698", "text": "func (o *initOpts) deployEnv() error {\n\tif o.promptForShouldDeploy {\n\t\tlog.Infoln(\"All right, you're all set for local development.\")\n\t\tif err := o.askShouldDeploy(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif !o.ShouldDeploy {\n\t\t// User chose not to deploy the service, exit.\n\t\treturn nil\n\t}\n\tif initEnvCmd, ok := o.initEnvCmd.(*initEnvOpts); ok {\n\t\t// Set the application name from app init to the env init command. Set an env name if available.\n\t\tinitEnvCmd.appName = *o.appName\n\t\tinitEnvCmd.name = o.initVars.envName\n\t}\n\n\tif err := o.askEnvNameAndMaybeInit(); err != nil {\n\t\treturn err\n\t}\n\n\tif deployEnvCmd, ok := o.deployEnvCmd.(*deployEnvOpts); ok {\n\t\t// Set the application name from app init to the env deploy command.\n\t\tdeployEnvCmd.appName = *o.appName\n\t\tdeployEnvCmd.name = *o.envName\n\t}\n\n\tif err := o.deployEnvCmd.Execute(); err != nil {\n\t\tvar errEmptyChangeSet *awscfn.ErrChangeSetEmpty\n\t\tif !errors.As(err, &errEmptyChangeSet) {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2cf94b5c091f859fb3c997b831f3835e", "score": "0.5278011", "text": "func (s *CanaryDeploy) deploy() (err error) {\n\tappName := s.args.NewApp\n\n\tdeployArgs := []string{\"push\", appName, \"-f\", s.args.ManifestPath, \"-p\", s.args.ApplicationPath}\n\tdeployArgsNoroute := append(deployArgs, \"-i\", \"1\", \"--no-route\", \"--no-start\")\n\n\tfmt.Printf(\"Calling with deploy args: %v\\n\", deployArgsNoroute)\n\t_, err = s.args.Conn.CliCommand(deployArgsNoroute...)\n\n\tdomains := s.getDomain()\n\tfor _, val := range domains {\n\t\tdeployArgsMapRoute := []string{\"map-route\", appName, val, \"-n\", CreateCanaryRouteName(appName)}\n\t\tfmt.Printf(\"Calling with deploy args: %v\\n\", deployArgsMapRoute)\n\t\t_, err = s.args.Conn.CliCommand(deployArgsMapRoute...)\n\t}\n\tif err != nil {\n\t\tfmt.Println(err.Error())\n\t}\n\tstartArgs := []string{\"start\", appName}\n\t_, err = s.args.Conn.CliCommand(startArgs...)\n\n\treturn\n}", "title": "" }, { "docid": "2cd5d3b5e8b28cb176146ff0f8aa6a4d", "score": "0.52735865", "text": "func DeployAppMocked(t *testing.T, appIn *types.WizardApp) *types.Server {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewAppService(cs)\n\tassert.Nil(err, \"Couldn't load app service\")\n\tassert.NotNil(ds, \"App service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*appIn)\n\tassert.Nil(err, \"App test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(appIn)\n\tassert.Nil(err, \"App test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", fmt.Sprintf(APIPathWizardAppDeploy, appIn.ID), mapIn).Return(dOut, 200, nil)\n\tserverOut, err := ds.DeployApp(appIn.ID, mapIn)\n\tassert.Nil(err, \"Error deploying app\")\n\n\treturn serverOut\n}", "title": "" }, { "docid": "0cc6098bbcb2e33ce01ee82b8f1f2d48", "score": "0.5260848", "text": "func (a *APIRouter) environmentApplication(authToken string, c *config, envName, appName string) (map[string]interface{}, error) {\n\tif c.GitOpsURL == \"\" {\n\t\treturn nil, nil\n\t}\n\tenv := c.findEnvironment(envName)\n\tif env == nil {\n\t\treturn nil, fmt.Errorf(\"failed to find environment %#v\", envName)\n\t}\n\tco := &git.CloneOptions{\n\t\tAuth: &http.BasicAuth{\n\t\t\tUsername: \"gitops\",\n\t\t\tPassword: authToken,\n\t\t},\n\t\tURL: c.GitOpsURL,\n\t}\n\tres, err := a.resourceParser(pathForApplication(appName, envName), co)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tservices, err := parseServicesFromResources(env, res)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tappEnv := map[string]interface{}{\n\t\t\"environment\": envName,\n\t\t\"cluster\": c.findEnvironment(envName).Cluster,\n\t\t\"services\": services,\n\t}\n\treturn appEnv, nil\n}", "title": "" }, { "docid": "a3143baf32d36d1e36e1334d94756f01", "score": "0.52434283", "text": "func DeployAppMocked(t *testing.T, appIn *types.WizardApp) *types.Server {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewAppService(cs)\n\tassert.Nil(err, \"Couldn't load app service\")\n\tassert.NotNil(ds, \"App service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*appIn)\n\tassert.Nil(err, \"App test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(appIn)\n\tassert.Nil(err, \"App test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", fmt.Sprintf(\"/wizard/apps/%s/deploy\", appIn.ID), mapIn).Return(dOut, 200, nil)\n\tserverOut, err := ds.DeployApp(mapIn, appIn.ID)\n\tassert.Nil(err, \"Error deploying app\")\n\n\treturn serverOut\n}", "title": "" }, { "docid": "93108a2b7ffa118e103af22ad62bdc24", "score": "0.52377045", "text": "func bootstrapAppImageDeploy(c *cli.Context) error {\n\t// make sure the user provided one and one only desktop\n\tif c.NArg() != 1 {\n\t\tlog.Println(\"Please supply the path to a desktop file in an FHS-like AppDir\")\n\t\tlog.Println(\"a FHS-like structure, e.g.:\")\n\t\tlog.Println(os.Args[0], \"appdir/usr/share/applications/myapp.desktop\")\n\t\tlog.Fatal(\"Terminated.\")\n\t}\n\toptions = DeployOptions{\n\t\tstandalone: c.Bool(\"standalone\"),\n\t\tlibAppRunHooks: c.Bool(\"libapprun_hooks\"),\n\t}\n\tAppDirDeploy(c.Args().Get(0))\n\treturn nil\n}", "title": "" }, { "docid": "e5e8cba1de19db5b20f749de7412eb42", "score": "0.5200328", "text": "func newAppDeployment(stageID string, deployParams deployParam) *appsv1.Deployment {\n\tautomountServiceAccountToken := true\n\tlabels := map[string]string{\n\t\t\"app.kubernetes.io/name\": deployParams.Name,\n\t\t\"app.kubernetes.io/part-of\": deployParams.Org,\n\t\t\"app.kubernetes.io/component\": \"application\",\n\t\t\"app.kubernetes.io/managed-by\": \"epinio\",\n\t\t\"app.kubernetes.io/created-by\": deployParams.Username,\n\t}\n\tif stageID != \"\" {\n\t\tlabels[\"epinio.suse.org/stage-id\"] = stageID\n\t}\n\n\treturn &appsv1.Deployment{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: deployParams.AppRef.Name,\n\t\t\tLabels: map[string]string{\n\t\t\t\t\"app.kubernetes.io/name\": deployParams.Name,\n\t\t\t\t\"app.kubernetes.io/part-of\": deployParams.Org,\n\t\t\t\t\"app.kubernetes.io/component\": \"application\",\n\t\t\t\t\"app.kubernetes.io/managed-by\": \"epinio\",\n\t\t\t\t\"app.kubernetes.io/created-by\": deployParams.Username,\n\t\t\t},\n\t\t},\n\t\tSpec: appsv1.DeploymentSpec{\n\t\t\tReplicas: &deployParams.Instances,\n\t\t\tSelector: &metav1.LabelSelector{\n\t\t\t\tMatchLabels: map[string]string{\n\t\t\t\t\t\"app.kubernetes.io/name\": deployParams.Name,\n\t\t\t\t},\n\t\t\t},\n\t\t\tTemplate: v1.PodTemplateSpec{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tLabels: labels,\n\t\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\t\t\"app.kubernetes.io/name\": deployParams.Name,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t\tSpec: v1.PodSpec{\n\t\t\t\t\tServiceAccountName: deployParams.Org,\n\t\t\t\t\tAutomountServiceAccountToken: &automountServiceAccountToken,\n\t\t\t\t\tVolumes: deployParams.Services.ToVolumesArray(),\n\t\t\t\t\tContainers: []v1.Container{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: deployParams.Name,\n\t\t\t\t\t\t\tImage: deployParams.ImageURL,\n\t\t\t\t\t\t\tPorts: []v1.ContainerPort{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tContainerPort: 8080,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tEnv: deployParams.Environment.ToEnvVarArray(deployParams.AppRef),\n\t\t\t\t\t\t\tVolumeMounts: deployParams.Services.ToMountsArray(),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1fe71dc8afe237ce8c7b9cba04baacd3", "score": "0.51990575", "text": "func (i *Internal) VICELaunchApp(writer http.ResponseWriter, request *http.Request) {\n\tjob := &model.Job{}\n\n\tbuf, err := ioutil.ReadAll(request.Body)\n\tif err != nil {\n\t\thttp.Error(writer, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif err = json.Unmarshal(buf, job); err != nil {\n\t\thttp.Error(writer, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tif err = i.validateJob(job); err != nil {\n\t\thttp.Error(writer, err.Error(), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t// Create the excludes file ConfigMap for the job.\n\tif err = i.UpsertExcludesConfigMap(job); err != nil {\n\t\tif err != nil {\n\t\t\thttp.Error(\n\t\t\t\twriter,\n\t\t\t\terr.Error(),\n\t\t\t\thttp.StatusInternalServerError,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Create the input path list config map\n\tif err = i.UpsertInputPathListConfigMap(job); err != nil {\n\t\tif err != nil {\n\t\t\thttp.Error(\n\t\t\t\twriter,\n\t\t\t\terr.Error(),\n\t\t\t\thttp.StatusInternalServerError,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Create the deployment for the job.\n\tif err = i.UpsertDeployment(job); err != nil {\n\t\tif err != nil {\n\t\t\thttp.Error(\n\t\t\t\twriter,\n\t\t\t\terr.Error(),\n\t\t\t\thttp.StatusInternalServerError,\n\t\t\t)\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "78f4bf4e701c3a7d13bb5433623069bf", "score": "0.51837194", "text": "func (tu *Utils) ApplyApplication(applicationBuilder utils.ApplicationBuilder) (*v1.RadixApplication, error) {\n\tregBuilder := applicationBuilder.GetRegistrationBuilder()\n\tvar rr *v1.RadixRegistration\n\n\tif regBuilder != nil {\n\t\trr, _ = tu.ApplyRegistration(regBuilder)\n\t}\n\n\tra := applicationBuilder.BuildRA()\n\tappNamespace := CreateAppNamespace(tu.client, ra.GetName())\n\t_, err := tu.radixclient.RadixV1().RadixApplications(appNamespace).Create(context.TODO(), ra, metav1.CreateOptions{})\n\tif err != nil {\n\t\tif errors.IsAlreadyExists(err) {\n\t\t\treturn tu.ApplyApplicationUpdate(applicationBuilder)\n\t\t}\n\n\t\treturn ra, err\n\t}\n\n\t// Note: rr may be nil if not found but that is fine\n\tfor _, env := range ra.Spec.Environments {\n\t\ttu.ApplyEnvironment(utils.NewEnvironmentBuilder().\n\t\t\tWithAppName(ra.GetName()).\n\t\t\tWithAppLabel().\n\t\t\tWithEnvironmentName(env.Name).\n\t\t\tWithRegistrationOwner(rr).\n\t\t\tWithOrphaned(false))\n\t}\n\n\treturn ra, nil\n}", "title": "" }, { "docid": "91f0da9789b74d22966dfc1847bf4834", "score": "0.51642793", "text": "func (o *OCRSoakTest) DeployEnvironment(customChainlinkNetworkTOML string) {\n\tnetwork := networks.SelectedNetwork // Environment currently being used to soak test on\n\tnsPre := \"soak-ocr-\"\n\tif o.OperatorForwarderFlow {\n\t\tnsPre = fmt.Sprintf(\"%sforwarder-\", nsPre)\n\t}\n\tnsPre = fmt.Sprintf(\"%s%s\", nsPre, strings.ReplaceAll(strings.ToLower(network.Name), \" \", \"-\"))\n\tbaseEnvironmentConfig := &environment.Config{\n\t\tTTL: time.Hour * 720, // 30 days,\n\t\tNamespacePrefix: nsPre,\n\t\tTest: o.t,\n\t}\n\n\tcd, err := chainlink.NewDeployment(6, map[string]any{\n\t\t\"toml\": client.AddNetworkDetailedConfig(config.BaseOCRP2PV1Config, customChainlinkNetworkTOML, network),\n\t\t\"db\": map[string]any{\n\t\t\t\"stateful\": true, // stateful DB by default for soak tests\n\t\t},\n\t})\n\trequire.NoError(o.t, err, \"Error creating chainlink deployment\")\n\ttestEnvironment := environment.New(baseEnvironmentConfig).\n\t\tAddHelm(mockservercfg.New(nil)).\n\t\tAddHelm(mockserver.New(nil)).\n\t\tAddHelm(ethereum.New(&ethereum.Props{\n\t\t\tNetworkName: network.Name,\n\t\t\tSimulated: network.Simulated,\n\t\t\tWsURLs: network.URLs,\n\t\t})).\n\t\tAddHelmCharts(cd)\n\terr = testEnvironment.Run()\n\trequire.NoError(o.t, err, \"Error launching test environment\")\n\to.testEnvironment = testEnvironment\n\to.namespace = testEnvironment.Cfg.Namespace\n}", "title": "" }, { "docid": "091e3552d9b91be0b425e7a3f8f14437", "score": "0.5146361", "text": "func DeployDelegator(auth *bind.TransactOpts, backend bind.ContractBackend, _logic common.Address, _admin common.Address, _data []byte) (common.Address, *types.Transaction, *Delegator, error) {\n\tparsed, err := abi.JSON(strings.NewReader(DelegatorABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(DelegatorBin), backend, _logic, _admin, _data)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Delegator{DelegatorCaller: DelegatorCaller{contract: contract}, DelegatorTransactor: DelegatorTransactor{contract: contract}, DelegatorFilterer: DelegatorFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "ea63b33445cb617d095f583c9f0f681f", "score": "0.51283747", "text": "func Deploy(u *module.User) (addr common.Address, err error) {\n\t// ****************************************************\n\t//////// INSERT MODULE DEPLOYMENT CODE HERE ////////\n\t// ***************************************************\n\treturn addr, err\n}", "title": "" }, { "docid": "6a2a49dae94d607c41367a7cea0ab48d", "score": "0.5124115", "text": "func createSlugRunnerDeploy(p *deployParams, a *storage.Application) (deploy *extensions.Deployment, err error) {\n\tlog.Printf(\"creating k8s deploy [%s/%s]\\n\", p.namespace, p.appName)\n\t// check for env vars\n\tenv := make(map[string]string)\n\tfor _, e := range a.EnvVars {\n\t\tenv[e.Key] = e.Value\n\t}\n\td := k8s.BuildSlugRunnerDeployment(p.appName, p.namespace, 1, 1, int(a.Scale), p.appName, p.slugPath, env)\n\t// deployment change-cause\n\td.Annotations = map[string]string{\n\t\t\"kubernetes.io/change-cause\": fmt.Sprintf(\"deployUUID:%s\", p.id),\n\t}\n\tdeploy, err = k8sClient.Deployments(p.namespace).Create(d)\n\tif err != nil {\n\t\tlog.Printf(\"error creating deployment. Err: %s\\n\", err.Error())\n\t}\n\treturn\n}", "title": "" }, { "docid": "d3d4903bcedca110f42b48c644e6e4de", "score": "0.5112958", "text": "func (e *EchoSecure) Deploy(ns, name string) func() {\n\tvalOrDefault := func(val, defaultVal string) string {\n\t\tif val != \"\" {\n\t\t\treturn val\n\t\t}\n\t\treturn defaultVal\n\t}\n\n\tns = valOrDefault(ns, \"default\")\n\tname = valOrDefault(name, \"ingress-conformance-echo-tls\")\n\n\tdeployment := &appsv1.Deployment{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t},\n\t\tSpec: appsv1.DeploymentSpec{\n\t\t\tSelector: &metav1.LabelSelector{\n\t\t\t\tMatchLabels: map[string]string{\"app.kubernetes.io/name\": name},\n\t\t\t},\n\t\t\tTemplate: corev1.PodTemplateSpec{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tLabels: map[string]string{\"app.kubernetes.io/name\": name},\n\t\t\t\t},\n\t\t\t\tSpec: corev1.PodSpec{\n\t\t\t\t\tContainers: []corev1.Container{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"conformance-echo\",\n\t\t\t\t\t\t\tImage: \"gcr.io/k8s-staging-ingressconformance/echoserver@sha256:dc59c3e517399b436fa9db58f16506bd37f3cd831a7298eaf01bd5762ec514e1\",\n\t\t\t\t\t\t\tEnv: []corev1.EnvVar{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"INGRESS_NAME\",\n\t\t\t\t\t\t\t\t\tValue: name,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"SERVICE_NAME\",\n\t\t\t\t\t\t\t\t\tValue: name,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"POD_NAME\",\n\t\t\t\t\t\t\t\t\tValueFrom: &corev1.EnvVarSource{\n\t\t\t\t\t\t\t\t\t\tFieldRef: &corev1.ObjectFieldSelector{\n\t\t\t\t\t\t\t\t\t\t\tFieldPath: \"metadata.name\",\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"NAMESPACE\",\n\t\t\t\t\t\t\t\t\tValueFrom: &corev1.EnvVarSource{\n\t\t\t\t\t\t\t\t\t\tFieldRef: &corev1.ObjectFieldSelector{\n\t\t\t\t\t\t\t\t\t\t\tFieldPath: \"metadata.namespace\",\n\t\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"TLS_SERVER_CERT\",\n\t\t\t\t\t\t\t\t\tValue: \"/run/secrets/certs/tls.crt\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"TLS_SERVER_PRIVKEY\",\n\t\t\t\t\t\t\t\t\tValue: \"/run/secrets/certs/tls.key\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"TLS_CLIENT_CACERTS\",\n\t\t\t\t\t\t\t\t\tValue: \"/run/secrets/certs/ca.crt\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tPorts: []corev1.ContainerPort{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"http-api\",\n\t\t\t\t\t\t\t\t\tContainerPort: 3000,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tName: \"https-api\",\n\t\t\t\t\t\t\t\t\tContainerPort: 8443,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tReadinessProbe: &corev1.Probe{\n\t\t\t\t\t\t\t\tProbeHandler: corev1.ProbeHandler{\n\t\t\t\t\t\t\t\t\tHTTPGet: &corev1.HTTPGetAction{\n\t\t\t\t\t\t\t\t\t\tPath: \"/health\",\n\t\t\t\t\t\t\t\t\t\tPort: intstr.FromInt(3000),\n\t\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\tVolumeMounts: []corev1.VolumeMount{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tMountPath: \"/run/secrets/certs\",\n\t\t\t\t\t\t\t\t\tName: \"backend-server-cert\",\n\t\t\t\t\t\t\t\t\tReadOnly: true,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tVolumes: []corev1.Volume{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tName: \"backend-server-cert\",\n\t\t\t\t\t\t\tVolumeSource: corev1.VolumeSource{\n\t\t\t\t\t\t\t\tSecret: &corev1.SecretVolumeSource{\n\t\t\t\t\t\t\t\t\tSecretName: \"backend-server-cert\",\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\trequire.NoError(e.t, e.client.Create(context.TODO(), deployment))\n\n\tservice := &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t\tAnnotations: map[string]string{\n\t\t\t\t\"projectcontour.io/upstream-protocol.tls\": \"443\",\n\t\t\t},\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tName: \"http\",\n\t\t\t\t\tPort: 80,\n\t\t\t\t\tTargetPort: intstr.FromString(\"http-api\"),\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tName: \"https\",\n\t\t\t\t\tPort: 443,\n\t\t\t\t\tTargetPort: intstr.FromString(\"https-api\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSelector: map[string]string{\"app.kubernetes.io/name\": name},\n\t\t},\n\t}\n\trequire.NoError(e.t, e.client.Create(context.TODO(), service))\n\n\treturn func() {\n\t\trequire.NoError(e.t, e.client.Delete(context.TODO(), service))\n\t\trequire.NoError(e.t, e.client.Delete(context.TODO(), deployment))\n\t}\n}", "title": "" }, { "docid": "c2fdd7a985e04306487606a312668a9e", "score": "0.50945514", "text": "func (x *SpotOceanController) Deploy() (err error) {\n\tlogger.Debug(\"ocean: installing controller\")\n\n\tdefer func() {\n\t\tif r := recover(); r != nil {\n\t\t\tif ae, ok := r.(*assetutil.Error); ok {\n\t\t\t\terr = ae\n\t\t\t} else {\n\t\t\t\tpanic(r)\n\t\t\t}\n\t\t}\n\t}()\n\n\t// Deploy a ConfigMap to store the controller configuration.\n\tif err := x.applyConfigMap(); err != nil {\n\t\treturn fmt.Errorf(\"error creating configmap: %w\", err)\n\t}\n\n\t// Deploy a Secret to store the controller credentials.\n\tif err := x.applySecret(); err != nil {\n\t\treturn fmt.Errorf(\"error creating secret: %w\", err)\n\t}\n\n\t// Deploy the controller and its resources (RBAC, etc.).\n\tif err := x.applyResources(spotOceanControllerYamlBytes); err != nil {\n\t\treturn fmt.Errorf(\"error creating resources: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4b07f8763c3e48c60c581467ef6adbe0", "score": "0.50705004", "text": "func (orch *DockerOrchestrator) Deploy(ctx context.Context, stack *thrapb.Stack, opts RequestOptions) (resp interface{}, job interface{}, err error) {\n\t// Create an isolated network for all running containers\n\terr = orch.crt.CreateNetwork(ctx, stack.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\tif err != nil {\n\t\t\torch.Destroy(ctx, stack)\n\t\t}\n\t}()\n\n\t// Deploy services like db's etc\n\terr = orch.startServices(ctx, stack)\n\tif err != nil {\n\t\treturn\n\t}\n\tfmt.Printf(\"\\nApplication:\\n\\n\")\n\n\t// Deploy non-head containers\n\tfor _, comp := range stack.Components {\n\t\tif !comp.IsBuildable() {\n\t\t\tcontinue\n\t\t}\n\n\t\tif comp.Head {\n\t\t\tcontinue\n\t\t}\n\n\t\terr = orch.startContainer(ctx, stack.ID, comp)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tfmt.Printf(\" - %s:%s\\n\", comp.ID, comp.Version)\n\t}\n\n\t// Start head containers\n\tfor _, comp := range stack.Components {\n\t\tif !comp.IsBuildable() {\n\t\t\tcontinue\n\t\t}\n\t\tif !comp.Head {\n\t\t\tcontinue\n\t\t}\n\n\t\terr = orch.startContainer(ctx, stack.ID, comp)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\tfmt.Printf(\" - %s:%s\\n\", comp.ID, comp.Version)\n\t}\n\tfmt.Println()\n\n\treturn\n}", "title": "" }, { "docid": "e6a891b94def1de464fa1148cc8f19fc", "score": "0.50610775", "text": "func BuildAppDeployCmd() *cobra.Command {\n\topts := &appDeployOpts{\n\t\tGlobalOpts: NewGlobalOpts(),\n\t\tspinner: termprogress.NewSpinner(),\n\t\tdockerService: docker.New(),\n\t\trunner: command.New(),\n\t\tsessProvider: session.NewProvider(),\n\t}\n\n\tcmd := &cobra.Command{\n\t\tUse: \"deploy\",\n\t\tShort: \"Deploys an application to an environment.\",\n\t\tLong: `Deploys an application to an environment.`,\n\t\tExample: `\n Deploys an application named \"frontend\" to the \"dev\" environment.\n /code $ dw_run.sh app deploy --name frontend --env dev`,\n\t\tRunE: runCmdE(func(cmd *cobra.Command, args []string) error {\n\t\t\tif err := opts.init(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.Validate(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.Ask(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err := opts.Execute(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\treturn nil\n\t\t}),\n\t\tPostRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\tif opts.targetEnvironment.Name == \"prod\" {\n\t\t\t\tlog.Infoln()\n\t\t\t\tlog.Infoln(\"Recommended follow-up actions:\")\n\t\t\t\tfor _, followup := range opts.RecommendedActions() {\n\t\t\t\t\tlog.Infof(\"- %s\\n\", followup)\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn nil\n\t\t},\n\t}\n\tcmd.Flags().StringVarP(&opts.AppName, nameFlag, nameFlagShort, \"\", appFlagDescription)\n\tcmd.Flags().StringVarP(&opts.EnvName, envFlag, envFlagShort, \"\", envFlagDescription)\n\tcmd.Flags().StringVar(&opts.ImageTag, imageTagFlag, \"\", imageTagFlagDescription)\n\n\treturn cmd\n}", "title": "" }, { "docid": "61c0b26c01e58258feb28e9e7449744c", "score": "0.5055253", "text": "func (cli *CLI) EnvDeploy(opts *EnvDeployRequest) (string, error) {\n\tcommands := []string{\"env\", \"deploy\",\n\t\t\"--name\", opts.Name,\n\t\t\"--app\", opts.AppName,\n\t}\n\treturn cli.exec(exec.Command(cli.path, commands...))\n}", "title": "" }, { "docid": "a49578d45de0a97be1c1c97536a86570", "score": "0.5036027", "text": "func deploymentForUwsgiApp(u *v1alpha1.UwsgiApp) *appsv1.Deployment {\n\tls := labelsForUwsgiApp(u.Name)\n\treplicas := u.Spec.Replicas\n\tvar command []string\n\tswitch {\n\tcase u.Spec.Command != nil:\n\t\tcommand = u.Spec.Command\n\tdefault:\n\t\tcommand = append(command, \"uwsgi\", \"--ini\", \"/etc/uwsgi.ini\")\n\t}\n\n\tdep := &appsv1.Deployment{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"apps/v1\",\n\t\t\tKind: \"Deployment\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: u.Name,\n\t\t\tNamespace: u.Namespace,\n\t\t},\n\t\tSpec: appsv1.DeploymentSpec{\n\t\t\tReplicas: &replicas,\n\t\t\tSelector: &metav1.LabelSelector{\n\t\t\t\tMatchLabels: ls,\n\t\t\t},\n\t\t\tTemplate: corev1.PodTemplateSpec{\n\t\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\t\tLabels: ls,\n\t\t\t\t},\n\t\t\t\tSpec: corev1.PodSpec{\n\t\t\t\t\tContainers: []corev1.Container{{\n\t\t\t\t\t\tImage: u.Spec.Image,\n\t\t\t\t\t\tName: u.Spec.ApplicationName,\n\t\t\t\t\t\tCommand: command,\n\t\t\t\t\t\tPorts: u.Spec.Ports,\n\t\t\t\t\t}},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\taddOwnerRefToObject(dep, asOwner(u))\n\treturn dep\n}", "title": "" }, { "docid": "d96753838f326e865feda232d83f8007", "score": "0.5026896", "text": "func DeployOptionDeployer(o operation) Option {\n\treturn func(d *Deploy) {\n\t\td.worker.deploy = o\n\t}\n}", "title": "" }, { "docid": "3156c97125b77474001ca17faea23389", "score": "0.50061464", "text": "func StackDeploy() {\n\n\t// /opt/rwo/Application_name/docker-compose.yml\n\t// /opt/rwo/ := Base path where RWO searches for Application compose files.\n\t// Application_name := Name of the application for which service needs to deployed.\n\n\t// Check the base dir for any application Directories.\n\tpath := \"/opt/stacks\"\n\tapps, err := ioutil.ReadDir(path)\n\tif err != nil {\n\t\trwolog.Error(err)\n\t\treturn\n\t}\n\n\tfor _, app := range apps {\n\n\t\tif app.IsDir() {\n\n\t\t\tappPath := filepath.Join(path, app.Name())\n\t\t\tfiles, _ := ioutil.ReadDir(appPath)\n\n\t\t\tfor _, file := range files {\n\t\t\t\tfilePath := filepath.Join(appPath, file.Name())\n\n\t\t\t\t// Check for symlink.\n\t\t\t\tisSymlink, symPath, err := CheckForSymlink(filePath)\n\t\t\t\tif err != nil {\n\t\t\t\t\trwolog.Error(\"Error while checking Symlink, \", err.Error())\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tif isSymlink == true {\n\t\t\t\t\trwolog.Debug(\"Encountered a Symlink, Assigning the Absolute path before deploying....\")\n\t\t\t\t\tfilePath = symPath\n\t\t\t\t}\n\n\t\t\t\tif strings.HasSuffix(filePath, \".yml\") {\n\t\t\t\t\t// Create a buffer.\n\t\t\t\t\tvar buf bytes.Buffer\n\t\t\t\t\tbuf.WriteString(\"docker stack deploy -c \")\n\t\t\t\t\tbuf.WriteString(filePath)\n\t\t\t\t\tbuf.WriteString(\" \")\n\t\t\t\t\tbuf.WriteString(app.Name())\n\t\t\t\t\tcommand := buf.String()\n\t\t\t\t\trwolog.Debug(\"command:\", command)\n\n\t\t\t\t\tcommandop, _ := exec.Command(\"sh\", \"-c\", command).CombinedOutput()\n\t\t\t\t\trwolog.Debug(\"Output for stack deploy: \", string(commandop))\n\t\t\t\t}\n\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "1f3877d4043539d34c8f5d36fa7066ae", "score": "0.4997315", "text": "func (d *envDeployer) DeployEnvironment(in *DeployEnvironmentInput) error {\n\tstackInput, err := d.buildStackInput(in)\n\tif err != nil {\n\t\treturn err\n\t}\n\toldParams, err := d.envDeployer.DeployedEnvironmentParameters(d.app.Name, d.env.Name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"describe environment stack parameters: %w\", err)\n\t}\n\tlastForceUpdateID, err := d.envDeployer.ForceUpdateOutputID(d.app.Name, d.env.Name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"retrieve environment stack force update ID: %w\", err)\n\t}\n\topts := []awscloudformation.StackOption{\n\t\tawscloudformation.WithRoleARN(d.env.ExecutionRoleARN),\n\t}\n\tif in.DisableRollback {\n\t\topts = append(opts, awscloudformation.WithDisableRollback())\n\t}\n\tstack, err := d.newStack(stackInput, lastForceUpdateID, oldParams)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn d.envDeployer.UpdateAndRenderEnvironment(stack, stackInput.ArtifactBucketARN, in.Detach, opts...)\n}", "title": "" }, { "docid": "8a8804c53818b28ac84651a7bb378bcb", "score": "0.49951068", "text": "func Deploy(args ...string) *RunBuilder {\n\treturn withDefaults(\"deploy\", args)\n}", "title": "" }, { "docid": "79c9024703baa2a2ac5c5359484d59a7", "score": "0.49735802", "text": "func (c *DetaClient) Deploy(r *DeployRequest) (*DeployResponse, error) {\n\theaders := make(map[string]string)\n\tc.injectResourceHeader(headers, r.Account, r.Region)\n\n\ti := &requestInput{\n\t\tPath: fmt.Sprintf(\"/%s/\", patcherPath),\n\t\tMethod: \"POST\",\n\t\tHeaders: headers,\n\t\tBody: r,\n\t\tNeedsAuth: true,\n\t}\n\to, err := c.request(i)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif o.Status != 200 {\n\t\tmsg := o.Error.Message\n\t\tif msg == \"\" {\n\t\t\tmsg = o.Error.Errors[0]\n\t\t}\n\t\treturn nil, fmt.Errorf(\"failed to deploy: %v\", msg)\n\t}\n\n\tvar resp DeployResponse\n\terr = json.Unmarshal(o.Body, &resp)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to deploy: %v\", err)\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "b4696ba1a29c5e3c4c0a314597765c5f", "score": "0.49622142", "text": "func Apply(application *entity.ApplicationBag) (string, error) {\n\n\turl := baseURL + fmt.Sprintf(\"/user/uid/projects/%s/applications\", application.PID)\n\tjsonStr, err := json.MarshalIndent(application, \"\", \"\\t\\t\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tres, err := http.Post(url, \"application/json\", bytes.NewBuffer(jsonStr))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif res.StatusCode == http.StatusNotFound {\n\t\treturn \"\", errors.New(\"not found\")\n\t}\n\n\tlocationStr := res.Header.Get(\"Location\")\n\treturn locationStr, nil\n}", "title": "" }, { "docid": "8b3278b8dfe723f4da56de337b254516", "score": "0.4961727", "text": "func CreateApplicationDeployment(env helm_env.EnvSettings, am *model.Application, options []pkgCatalog.ApplicationOptions, catalogInfo *catalog.CatalogDetails, kubeConfig []byte) error {\n\n\treleaseName, err := getReleaseName(kubeConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Generate secrets for spotguide\n\tsecretTag := fmt.Sprintf(\"application:%d\", am.ID)\n\n\tfor name, s := range catalogInfo.Spotguide.Secrets {\n\n\t\trequest := secret.CreateSecretRequest{\n\t\t\tName: releaseName + \"-\" + name,\n\t\t\tTags: []string{secretTag},\n\t\t}\n\n\t\tif s.TLS != nil {\n\t\t\trequest.Type = pkgSecret.TLSSecretType\n\t\t\trequest.Values[pkgSecret.TLSHosts] = s.TLS.Hosts\n\t\t\trequest.Values[pkgSecret.TLSValidity] = s.TLS.Validity\n\t\t}\n\n\t\tif s.Password != nil {\n\t\t\trequest.Type = pkgSecret.PasswordSecretType\n\t\t\trequest.Values[pkgSecret.Username] = s.Password.Username\n\t\t\trequest.Values[pkgSecret.Password] = s.Password.Password\n\t\t}\n\n\t\tif _, err := secret.Store.Store(am.OrganizationId, &request); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Install secrets into cluster for spotguide\n\tsecretQuery := pkgSecret.ListSecretsQuery{Type: pkgSecret.AllSecrets, Tag: secretTag}\n\t_, err = cluster.InstallSecretsByK8SConfig(kubeConfig, am.OrganizationId, &secretQuery, helm.DefaultNamespace)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, dependency := range catalogInfo.Spotguide.Depends {\n\t\tdeployment := &model.Deployment{\n\t\t\tStatus: PENDING,\n\t\t\tName: dependency.Name,\n\t\t\tChart: dependency.Chart.Name,\n\t\t}\n\t\tconfig.DB().Save(&deployment)\n\t\tam.Deployments = append(am.Deployments, deployment)\n\t}\n\t// Add the catalog itself\n\tdeployment := &model.Deployment{\n\t\tStatus: PENDING,\n\t\tName: catalogInfo.Chart.Name,\n\t\tChart: am.CatalogName,\n\t}\n\tconfig.DB().Save(deployment)\n\tam.Deployments = append(am.Deployments, deployment)\n\tam.Save()\n\n\t// Ensure dependencies\n\tfor _, dependency := range catalogInfo.Spotguide.Depends {\n\t\td, err := GetDeploymentByName(am, dependency.Name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treleaseName, err := EnsureDependency(env, dependency, kubeConfig, releaseName)\n\t\tif err != nil {\n\t\t\td.Update(model.Deployment{Status: FAILED, Message: err.Error()})\n\t\t\tbreak\n\t\t}\n\t\td.Update(model.Deployment{Status: READY, ReleaseName: releaseName})\n\t}\n\t// Install application\n\tchart := catalog.CatalogRepository + \"/\" + am.CatalogName\n\tvalues, err := catalog.CreateValuesFromOption(options)\n\tif err != nil {\n\t\tam.Update(model.Application{Status: FAILED, Message: err.Error()})\n\t\treturn err\n\t}\n\tok, releaseName, err := ChartPresented(am.CatalogName, kubeConfig)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !ok {\n\t\tresp, err := helm.CreateDeployment(chart, \"\", helm.DefaultNamespace, releaseName, values, kubeConfig, env)\n\t\tif err != nil {\n\t\t\tdeployment.Update(model.Deployment{Status: FAILED, Message: err.Error()})\n\t\t\treturn err\n\t\t}\n\t\treleaseName = resp.Release.Name\n\t}\n\tdeployment.Update(model.Deployment{Status: READY, ReleaseName: releaseName})\n\tam.Update(model.Application{Status: DEPLOYED})\n\treturn nil\n}", "title": "" }, { "docid": "146c64fb83beaa53cdd1fe06c4f7f8b7", "score": "0.49585196", "text": "func (hc *HelmClient) Deploy(appPkgRecord *models.AppPackage, appInsId, ak, sk string, db pgdb.Database) (string, error) {\n\tlog.Info(\"Inside helm client\")\n\n\thelmChart, err := hc.getHelmChart(appPkgRecord.TenantId, appPkgRecord.HostIp, appPkgRecord.PackageId)\n\ttarFile, err := os.Open(helmChart)\n\tif err != nil {\n\t\tlog.Error(\"Failed to open helm chart tar file\")\n\t\treturn \"\", err\n\t}\n\tdefer tarFile.Close()\n\n\tappAuthCfg := config.NewBuildAppAuthConfig(appInsId, ak, sk)\n\tdirName, err := appAuthCfg.AddValues(tarFile)\n\tif err != nil {\n\t\tlog.Error(\"Failed to add values in values file\")\n\t\treturn \"\", err\n\t}\n\tdefer os.Remove(dirName + \".tar.gz\")\n\tdefer os.RemoveAll(dirName)\n\n\tlog.WithFields(log.Fields{\n\t\t\"helm_chart\": dirName,\n\t\t\"app_instance_id\": appInsId,\n\t}).Info(\"deployment chart\")\n\n\t// Load the file to chart\n\tchart, err := loader.Load(dirName + \".tar.gz\")\n\tif err != nil {\n\t\tlog.Error(\"Unable to load chart from file\")\n\t\treturn \"\", err\n\t}\n\n\t// Release name will be taken from the name in chart's metadata\n\trelName := chart.Metadata.Name\n\n\tappInstanceRecord := &models.AppInstanceInfo{\n\t\tWorkloadId: relName,\n\t}\n\n\treadErr := db.ReadData(appInstanceRecord, \"workload_id\")\n\tif readErr == nil {\n\t\treturn \"\", errors.New(\"application is already deployed with this release name\")\n\t}\n\n\t// Get release namespace\n\treleaseNamespace := util.GetReleaseNamespace()\n\n\t// Initialize action config\n\tactionConfig := new(action.Configuration)\n\tif err := actionConfig.Init(kube.GetConfig(hc.Kubeconfig, \"\", releaseNamespace), releaseNamespace,\n\t\tutil.HelmDriver, func(format string, v ...interface{}) {\n\t\t\t_ = fmt.Sprintf(format, v)\n\t\t}); err != nil {\n\t\tlog.Error(util.ActionConfig)\n\t\treturn \"\", err\n\t}\n\n\t// Prepare chart install action and install chart\n\tinstaller := action.NewInstall(actionConfig)\n\tinstaller.Namespace = releaseNamespace\n\tinstaller.ReleaseName = relName\n\trel, err := installer.Run(chart, nil)\n\tif err != nil {\n\t\tui := action.NewUninstall(actionConfig)\n\t\t_, uninstallErr := ui.Run(relName)\n\t\tif uninstallErr != nil {\n\t\t\tlog.Infof(\"Unable to uninstall chart. Err: %s\", uninstallErr)\n\t\t}\n\t\tlog.Errorf(\"Unable to install chart. Err: %s\", err)\n\t\treturn \"\", err\n\t}\n\tlog.Info(\"Successfully created chart\")\n\treturn rel.Name, err\n}", "title": "" }, { "docid": "e553714c3ec0b9f68357dedb57341a55", "score": "0.49377334", "text": "func (fuzzyArgs *FuzzyArgs) GetFuzzyDeploy(env string, arg string) (app string, err error) {\n\tfor i := range fuzzyArgs.LegalDeployList {\n\t\tif fuzzyArgs.LegalDeployList[i].EnvName == env {\n\t\t\t// First check for exact math\n\t\t\tif fuzzyArgs.LegalDeployList[i].AppName == arg {\n\t\t\t\tapp = arg\n\t\t\t\treturn app, nil\n\t\t\t}\n\t\t\tif strings.Contains(fuzzyArgs.LegalDeployList[i].AppName, arg) {\n\t\t\t\tif app != \"\" {\n\t\t\t\t\terr = errors.New(arg + \": Not a unique application identifier, matching \" + app + \" and \" + fuzzyArgs.LegalDeployList[i].AppName)\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\tapp = fuzzyArgs.LegalDeployList[i].AppName\n\t\t\t}\n\t\t}\n\t}\n\n\treturn app, nil\n}", "title": "" }, { "docid": "269825bcc0812ddd15bebe423071617f", "score": "0.49356213", "text": "func DeployInstance(appContext *AppContext) bool {\n\turl := fmt.Sprintf(\n\t\t\"http://backend-orchestration:80/api/%s\",\n\t\tappContext.Instance,\n\t)\n\n\tres, _ := http.Get(url)\n\n\tif res.StatusCode == http.StatusOK {\n\t\tregistry[appContext.Instance] = struct{}{}\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "24650e03b76a9ea4fd3dcc8b4114c363", "score": "0.4935354", "text": "func (k *KubernetesExecutor) PrepareEnvironmentForDeployment(metadata entities.DeploymentMetadata,\n\tnetworkDecorator executor.NetworkDecorator) (executor.Deployable, error) {\n\tlog.Debug().Str(\"fragmentId\", metadata.FragmentId).Msg(\"prepare environment for deployment\")\n\n\t// Create a Namespace\n\tnamespaceDeployable := NewDeployableNamespace(k.Client, metadata, networkDecorator)\n\terr := namespaceDeployable.Build()\n\tif err != nil {\n\t\tlog.Error().Err(err).Msgf(\"impossible to build Namespace %s\", metadata.Namespace)\n\t\treturn nil, err\n\t}\n\n\tif !namespaceDeployable.exists() {\n\t\tlog.Debug().Str(\"Namespace\", metadata.Namespace).Msg(\"create Namespace...\")\n\t\t// TODO Check if Namespace already exists...\n\t\terr = namespaceDeployable.Deploy(k.Controller)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msgf(\"impossible to deploy Namespace %s\", metadata.Namespace)\n\t\t\treturn nil, err\n\t\t}\n\t\tlog.Debug().Str(\"Namespace\", metadata.Namespace).Msg(\"Namespace... created\")\n\n\t\t// NP-766. create the nalej-public-registry on the user Namespace\n\t\tnalejSecret := NewDeployableNalejSecret(k.Client, metadata)\n\t\terr = nalejSecret.Build()\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msg(\"impossible to build nalej-public-registry secret\")\n\t\t}\n\t\terr = nalejSecret.Deploy(k.Controller)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).Msg(\"impossible to deploy nalej-public-registry secret\")\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tlog.Debug().Str(\"Namespace\", metadata.Namespace).Msg(\"Namespace already exists... skip\")\n\t}\n\n\tvar toReturn executor.Deployable\n\ttoReturn = namespaceDeployable\n\n\treturn toReturn, nil\n}", "title": "" }, { "docid": "30ffb4718c0ee769a37d322105806a09", "score": "0.49317774", "text": "func InjectDeployment(app string, ports Ports, backend string) (map[string]string, error) {\n\tvar deployment *extensions.Deployment\n\tvar selector map[string]string\n\n\tesp, volumes, err := MakeContainer(svc.Name, ports, backend)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif containerType == \"tight\" {\n\t\t// retrieve selector from the original service\n\t\tselector = svc.Spec.Selector\n\n\t\t// find deployment by service name\n\t\tdeployment, err = clientset.Extensions().Deployments(namespace).Get(svc.Name)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// update deployment\n\t\ttemplate := &deployment.Spec.Template\n\t\ttemplate.Spec.Containers = append(\n\t\t\tfilterContainers(template.Spec.Containers), *esp)\n\t\ttemplate.Spec.Volumes = append(\n\t\t\tfilterVolumes(template.Spec.Volumes), volumes...)\n\t\ttemplate.Labels[AnnotationManagedService] = svc.Name\n\t\ttemplate.Labels[AnnotationEndpointsService] = app\n\n\t\t// commit updates\n\t\t_, err = clientset.Extensions().Deployments(namespace).Update(deployment)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tlog.Println(\"Updated deployment\", deployment.Name)\n\t} else {\n\t\treplicas := int32(defaultReplicas)\n\t\tselector = map[string]string{\n\t\t\tAnnotationManagedService: svc.Name,\n\t\t\tAnnotationEndpointsService: app,\n\t\t}\n\n\t\t// Create replication controller\n\t\tdeployment = &extensions.Deployment{\n\t\t\tObjectMeta: api.ObjectMeta{\n\t\t\t\tName: app,\n\t\t\t},\n\t\t\tSpec: extensions.DeploymentSpec{\n\t\t\t\tReplicas: &replicas,\n\t\t\t\tTemplate: api.PodTemplateSpec{\n\t\t\t\t\tObjectMeta: api.ObjectMeta{\n\t\t\t\t\t\tLabels: selector,\n\t\t\t\t\t},\n\t\t\t\t\tSpec: api.PodSpec{\n\t\t\t\t\t\tContainers: []api.Container{*esp},\n\t\t\t\t\t\tVolumes: volumes,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\n\t\t// check if it exists\n\t\t_, err = clientset.Extensions().Deployments(namespace).Get(app)\n\t\tif err == nil {\n\t\t\tdeployment, err = clientset.Extensions().Deployments(namespace).Update(deployment)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tlog.Println(\"Updated deployment\", deployment.Name)\n\t\t} else {\n\t\t\tdeployment, err = clientset.Extensions().Deployments(namespace).Create(deployment)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tlog.Println(\"Created deployment\", deployment.Name)\n\n\t\t}\n\t}\n\treturn selector, nil\n}", "title": "" }, { "docid": "faa4c4a264601e44bdba6cb742baf411", "score": "0.49200675", "text": "func DeployEventer(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Eventer, error) {\n\tparsed, err := abi.JSON(strings.NewReader(EventerABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(EventerBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Eventer{EventerCaller: EventerCaller{contract: contract}, EventerTransactor: EventerTransactor{contract: contract}, EventerFilterer: EventerFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "1a9c79985b7db12892ed244a776c7b2e", "score": "0.4916232", "text": "func (tu *Utils) ApplyEnvironment(environmentBuilder utils.EnvironmentBuilder) (*v1.RadixEnvironment, error) {\n\tre := environmentBuilder.BuildRE()\n\tlog.Debugf(\"%s\", re.GetObjectMeta().GetCreationTimestamp())\n\n\tnewRe, err := tu.radixclient.RadixV1().RadixEnvironments().Create(context.TODO(), re, metav1.CreateOptions{})\n\tif err != nil {\n\t\tif errors.IsAlreadyExists(err) {\n\t\t\treturn tu.ApplyEnvironmentUpdate(environmentBuilder)\n\t\t}\n\t\treturn nil, err\n\t}\n\n\treturn newRe, nil\n}", "title": "" }, { "docid": "5b050be77725fc584dbe51c91bb05e47", "score": "0.4905644", "text": "func (k *K8S) Deploy(\n\tctx context.Context,\n\tfn string,\n\tname string,\n\timage string,\n\tports []types.PortBinding,\n) error {\n\tdata := map[string]string{}\n\tdata[ConfigMap.AppMetaEnvName] = fn\n\tif _, err := k.CreateOrUpdateConfigMap(namespace, name, data); err != nil {\n\t\treturn err\n\t}\n\n\tselector := map[string]string{\n\t\t\"app\": \"fx-app-\" + name,\n\t}\n\n\tconst replicas = int32(3)\n\tif _, err := k.GetDeployment(namespace, name); err != nil {\n\t\t// TODO enable passing replica from fx CLI\n\t\tif os.Getenv(\"K3S\") != \"\" {\n\t\t\t// NOTE Doing docker build in initial container will fail when cluster is created by K3S\n\t\t\tif _, err := k.CreateDeployment(\n\t\t\t\tnamespace,\n\t\t\t\tname,\n\t\t\t\timage,\n\t\t\t\tports,\n\t\t\t\treplicas,\n\t\t\t\tselector,\n\t\t\t); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tif _, err := k.CreateDeploymentWithInitContainer(\n\t\t\t\tnamespace,\n\t\t\t\tname,\n\t\t\t\tports,\n\t\t\t\treplicas,\n\t\t\t\tselector,\n\t\t\t); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t} else {\n\t\tif _, err := k.UpdateDeployment(\n\t\t\tnamespace,\n\t\t\tname,\n\t\t\tname,\n\t\t\tports,\n\t\t\treplicas,\n\t\t\tselector,\n\t\t); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// TODO fx should be able to know what's the target Kubernetes service platform\n\t// it's going to deploy to\n\ttyp := \"LoadBalancer\"\n\tif os.Getenv(\"SERVICE_TYPE\") != \"\" {\n\t\ttyp = os.Getenv(\"SERVICE_TYPE\")\n\t}\n\n\tif _, err := k.GetService(namespace, name); err != nil {\n\t\tif _, err := k.CreateService(\n\t\t\tnamespace,\n\t\t\tname,\n\t\t\ttyp,\n\t\t\tports,\n\t\t\tselector,\n\t\t); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif _, err := k.UpdateService(\n\t\t\tnamespace,\n\t\t\tname,\n\t\t\ttyp,\n\t\t\tports,\n\t\t\tselector,\n\t\t); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fe636a4fc91849c4ef80a3cfe85ea7b9", "score": "0.48964718", "text": "func AppEnvironment(ctx context.Context, ag *agentconfig.Container) (map[string]string, error) {\n\tosEnv := dos.Environ(ctx)\n\tprefix := agentconfig.EnvPrefixApp + ag.EnvPrefix\n\tfullEnv := make(map[string]string, len(osEnv))\n\n\t// Add prefixed variables separately last, so that we can\n\t// ensure that they have higher precedence.\n\tfor _, env := range osEnv {\n\t\tif !strings.HasPrefix(env, agentconfig.EnvPrefix) {\n\t\t\tpair := strings.SplitN(env, \"=\", 2)\n\t\t\tif len(pair) == 2 {\n\t\t\t\tk := pair[0]\n\t\t\t\tif _, skip := skipKeys[k]; !skip {\n\t\t\t\t\tfullEnv[k] = pair[1]\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tfor _, env := range osEnv {\n\t\tif strings.HasPrefix(env, prefix) {\n\t\t\tpair := strings.SplitN(env, \"=\", 2)\n\t\t\tif len(pair) == 2 {\n\t\t\t\tk := pair[0][len(prefix):]\n\t\t\t\tfullEnv[k] = pair[1]\n\t\t\t}\n\t\t}\n\t}\n\tfullEnv[agentconfig.EnvInterceptContainer] = ag.Name\n\tif len(ag.Mounts) > 0 {\n\t\tfullEnv[agentconfig.EnvInterceptMounts] = strings.Join(ag.Mounts, \":\")\n\t}\n\treturn fullEnv, nil\n}", "title": "" }, { "docid": "cf7562a261915fc3e92eeabd42896f72", "score": "0.48963735", "text": "func (h *DeviceDriverHooks) Deploy(ctx context.Context, nn ndddvrv1.Nn, c *corev1.Container) error {\n\tcm := buildConfigMap(nn, h.namespace)\n\tif err := h.client.Apply(ctx, cm); err != nil {\n\t\treturn errors.Wrap(err, errApplyConfigMap)\n\t}\n\n\ts := buildService(nn, h.namespace)\n\tif err := h.client.Apply(ctx, s); err != nil {\n\t\treturn errors.Wrap(err, errApplyService)\n\t}\n\n\tsa := buildServiceAccount(nn, h.namespace)\n\tif err := h.client.Apply(ctx, sa); err != nil {\n\t\treturn errors.Wrap(err, errApplyServiceAccount)\n\t}\n\n\td := buildDeployment(nn, c, h.namespace)\n\tif err := h.client.Apply(ctx, d); err != nil {\n\t\treturn errors.Wrap(err, errApplyDeployment)\n\t}\n\n\tb := buildClusterRoleBinding(nn, h.namespace)\n\tif err := h.client.Apply(ctx, b); err != nil {\n\t\treturn errors.Wrap(err, errAppyClusterRoleBinding)\n\t}\n\tnn.SetControllerReference(nddv1.Reference{Name: d.GetName()})\n\n\tfor _, c := range d.Status.Conditions {\n\t\tif c.Type == appsv1.DeploymentAvailable {\n\t\t\tif c.Status == corev1.ConditionTrue {\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn errors.Errorf(\"%s: %s\", errUnavailableDeployment, c.Message)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "783d4dad35abe5ac3d8047dba8882d16", "score": "0.48819718", "text": "func (e *eksOperatorController) deployEKSOperator() error {\n\ttemplate, err := e.templateCache.Get(namespace.GlobalNamespace, eksOperatorTemplate)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlatestTemplateVersion, err := e.catalogManager.LatestAvailableTemplateVersion(template, \"local\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tlatestVersionID := latestTemplateVersion.ExternalID\n\n\tsystemProject, err := project.GetSystemProject(localCluster, e.projectCache)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsystemProjectID := ref.Ref(systemProject)\n\t_, systemProjectName := ref.Parse(systemProjectID)\n\n\tvaluesYaml, err := generateValuesYaml()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tapp, err := e.appLister.Get(systemProjectName, eksOperator)\n\tif err != nil {\n\t\tif !errors.IsNotFound(err) {\n\t\t\treturn err\n\t\t}\n\t\tlogrus.Info(\"deploying EKS operator into local cluster's system project\")\n\t\tcreator, err := e.systemAccountManager.GetSystemUser(localCluster)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tappProjectName, err := utils2.EnsureAppProjectName(e.nsClient, systemProjectName, localCluster, systemNS, creator.Name)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tdesiredApp := &apiprojv3.App{\n\t\t\tObjectMeta: v1.ObjectMeta{\n\t\t\t\tName: eksOperator,\n\t\t\t\tNamespace: systemProjectName,\n\t\t\t\tAnnotations: map[string]string{\n\t\t\t\t\trbac.CreatorIDAnn: creator.Name,\n\t\t\t\t},\n\t\t\t},\n\t\t\tSpec: apiprojv3.AppSpec{\n\t\t\t\tDescription: \"Operator for provisioning EKS clusters\",\n\t\t\t\tExternalID: latestVersionID,\n\t\t\t\tProjectName: appProjectName,\n\t\t\t\tTargetNamespace: systemNS,\n\t\t\t},\n\t\t}\n\n\t\tdesiredApp.Spec.ValuesYaml = valuesYaml\n\n\t\t// k3s upgrader doesn't exist yet, so it will need to be created\n\t\tif _, err = e.appClient.Create(desiredApp); err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tif app.Spec.ExternalID == latestVersionID && app.Spec.ValuesYaml == valuesYaml {\n\t\t\t// app is up to date, no action needed\n\t\t\treturn nil\n\t\t}\n\t\tlogrus.Info(\"updating EKS operator in local cluster's system project\")\n\t\tdesiredApp := app.DeepCopy()\n\t\tdesiredApp.Spec.ExternalID = latestVersionID\n\t\tdesiredApp.Spec.ValuesYaml = valuesYaml\n\t\t// new version of k3s upgrade available, update app\n\t\tif _, err = e.appClient.Update(desiredApp); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0cf4861f84df3a39f55eb77fa7a0da92", "score": "0.48722252", "text": "func (tu *Utils) ApplyDeployment(deploymentBuilder utils.DeploymentBuilder) (*v1.RadixDeployment, error) {\n\tif deploymentBuilder.GetApplicationBuilder() != nil {\n\t\ttu.ApplyApplication(deploymentBuilder.GetApplicationBuilder())\n\t}\n\n\trd := deploymentBuilder.BuildRD()\n\tlog.Debugf(\"%s\", rd.GetObjectMeta().GetCreationTimestamp())\n\n\tenvNamespace := CreateEnvNamespace(tu.client, rd.Spec.AppName, rd.Spec.Environment)\n\ttu.applyRadixDeploymentEnvVarsConfigMaps(rd)\n\tnewRd, err := tu.radixclient.RadixV1().RadixDeployments(envNamespace).Create(context.TODO(), rd, metav1.CreateOptions{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn newRd, nil\n}", "title": "" }, { "docid": "04071ef9d7575786514b3b2e70b95300", "score": "0.48688877", "text": "func (e *Echo) Deploy(ns, name string) func() {\n\treturn e.DeployN(ns, name, 1)\n}", "title": "" }, { "docid": "3706ece8125698f4c106786fefc497f1", "score": "0.48571447", "text": "func (ctx ScFuncContext) Deploy(programHash ScHash, name, description string, params *ScMutableMap) {\n\tencode := NewBytesEncoder()\n\tencode.Hash(programHash)\n\tencode.String(name)\n\tencode.String(description)\n\tif params != nil {\n\t\tencode.Int32(params.objID)\n\t} else {\n\t\tencode.Int32(0)\n\t}\n\tRoot.GetBytes(KeyDeploy).SetValue(encode.Data())\n}", "title": "" }, { "docid": "12b9019fe4970427b28e62c6d43bb972", "score": "0.48409167", "text": "func deploy() {\n\t//os.Chdir(args[1])\n\t//curr_dir,_ := os.Getwd()\n //fmt.Println(curr_dir)\n out,_ :=exec.Command(\"where\",\"-R\",\".\",\"*-debug.apk\").Output()\n //fmt.Printf(\"%s,error=%s\\n\",out,erro)\n\n apks := strings.Fields(string(out[:]))\n\t//fmt.Println(apks)\n for i:=0;i<len(apks);i++ {\n deploy := exec.Command(\"adb\",\"install\",apks[i])\n\t\tRedirector(deploy)\n\t\tif err := deploy.Run(); err != nil {\n }\n\n }\n exec.Command(\"adb\",\"kill-server\")\n Redirector(exec.Command(\"taskkill\",\"/F\",\"/IM\",\"adb.exe\"))\n\tfmt.Println(\"##########finish install apk\")\n}", "title": "" }, { "docid": "604b88191391188e089c1529bf3c2bed", "score": "0.4827204", "text": "func SyncApp(ctx context.Context, req SyncRequest) error {\n\terr := req.CheckAndSetDefaults()\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\n\tapplication, err := req.AppService.GetApp(req.Package)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\n\t// sync base app\n\tbase := application.Manifest.Base()\n\tif base != nil {\n\t\terr = SyncApp(ctx, SyncRequest{\n\t\t\tPackService: req.PackService,\n\t\t\tAppService: req.AppService,\n\t\t\tImageService: req.ImageService,\n\t\t\tPackage: *base,\n\t\t\tProgress: req.Progress,\n\t\t\tScanConfig: req.ScanConfig,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t}\n\n\t// sync dependencies\n\tfor _, dep := range application.Manifest.Dependencies.Apps {\n\t\terr = SyncApp(ctx, SyncRequest{\n\t\t\tPackService: req.PackService,\n\t\t\tAppService: req.AppService,\n\t\t\tImageService: req.ImageService,\n\t\t\tPackage: dep.Locator,\n\t\t\tProgress: req.Progress,\n\t\t\tScanConfig: req.ScanConfig,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn trace.Wrap(err)\n\t\t}\n\t}\n\n\t// the app will be unpacked at this dir\n\tdir, err := ioutil.TempDir(\"\", \"sync\")\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\tdefer func() {\n\t\terr := os.RemoveAll(dir)\n\t\tif err != nil {\n\t\t\tlog.Warningf(\"failed to remove %v: %v\", dir, trace.DebugReport(err))\n\t\t}\n\t}()\n\n\t// unpack the app and sync its registry with the local registry\n\tunpackedPath := pack.PackagePath(dir, req.Package)\n\tctx, cancel := context.WithTimeout(context.Background(), defaults.TransientErrorTimeout)\n\tdefer cancel()\n\terr = unpackRemotePackage(ctx, req.PackService, req.Package, unpackedPath)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\n\tsyncPath := filepath.Join(unpackedPath, \"registry\")\n\n\t// check if the registry dir exists at all\n\tif exists, _ := utils.IsDirectory(syncPath); !exists {\n\t\tlog.Warningf(\"registry dir does not exist, skipping sync: %v\", syncPath)\n\t\treturn nil\n\t}\n\n\t// registry dir exists, check if it has any contents\n\tempty, err := utils.IsDirectoryEmpty(syncPath)\n\tif err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\tif empty {\n\t\tlog.Warningf(\"registry directory is empty, skipping sync: %v\", syncPath)\n\t\treturn nil\n\t}\n\n\tlog.Infof(\"Syncing %v.\", req.Package)\n\n\tif _, err = req.ImageService.Sync(ctx, syncPath, req.Progress); err != nil {\n\t\treturn trace.Wrap(err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8606e740470f9bbd08e8e3c55977d610", "score": "0.48207176", "text": "func (ctx ScFuncContext) Deploy(programHash *ScHash, name string, description string, params *ScMutableMap) {\n\tencode := NewBytesEncoder()\n\tencode.Hash(programHash)\n\tencode.String(name)\n\tencode.String(description)\n\tif params != nil {\n\t\tencode.Int(int64(params.objId))\n\t} else {\n\t\tencode.Int(0)\n\t}\n\tRoot.GetBytes(KeyDeploy).SetValue(encode.Data())\n}", "title": "" }, { "docid": "610948fbc51d94af3958641a270283ee", "score": "0.48143482", "text": "func (op *OpenGo) DeployEthereumScaffold(ctx context.Context, scaffold EthereumScaffold) (EthereumScaffold, error) {\n\top.baseURL.Path = \"/api/ethereum-scaffolds/doDeploy\"\n\tscaffoldJSON, _ := json.Marshal(scaffold)\n\tresponse, err := op.SendRequest(ctx, \"POST\", scaffoldJSON)\n\n\tif err != nil {\n\t\treturn EthereumScaffold{}, fmt.Errorf(\"The HTTP request failed with error %s\\n\", err)\n\t}\n\tdata, _ := ioutil.ReadAll(response.Body)\n\tjson.Unmarshal(data, scaffold)\n\treturn scaffold, nil\n}", "title": "" }, { "docid": "717ae93a7e6ea1dc52278f81274e99b0", "score": "0.48141935", "text": "func runDeploy(cmd *cobra.Command, args []string) error {\n\t// Get the cloud provider & service type\n\tcloudProvider, err := clouds.GetCloudProvider(deploymentConfig.Settings.CloudProvider)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tservice, err := cloudProvider.GetService(deploymentConfig.Settings.DeploymentType)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Store the current directory before changing away from it\n\trootDir, err := os.Getwd()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Change to the directory where the function to deploy is implemented\n\t// and run the deployment command\n\tos.Chdir(deploymentPath)\n\tif err := service.Deploy(deploymentPath, deploymentConfig); err != nil {\n\t\tfmt.Println(err)\n\t\treturn err\n\t}\n\n\t// Write the config back, as it may have been updated\n\tdeploymentConfig.Deployed = time.Now().UTC().String()\n\terr = config.WriteConfig(deploymentConfig, deploymentPath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Write the settings back (they may have been changed)\n\t_ = config.WriteSettings(deploymentConfig.Settings)\n\n\t// Return to the original root directory\n\tos.Chdir(rootDir)\n\n\tfmt.Println(\"✅ Deployed!\")\n\treturn nil\n}", "title": "" }, { "docid": "230f135c1692bc42edd7d049a8367207", "score": "0.48129594", "text": "func (c *Command) Deploy(tag string) error {\n\tout, err := exec.Command(\"git\", \"tag\", tag).CombinedOutput()\n\tif err != nil {\n\t\treturn errors.New(string(out))\n\t}\n\n\tout, err = exec.Command(\"git\", \"push\", \"origin\", tag).CombinedOutput()\n\tif err != nil {\n\t\treturn errors.New(string(out))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a202190824203d76c671f78f4cb1acbe", "score": "0.4812218", "text": "func Deploy(context *installbase.StageContext) error {\n\terr := installbase.BatchDeployResources(context.Cmd, context.Client, context.Flags, []installbase.InstallFunc{\n\t\tconfigMapSpec(context.Flags),\n\t\tserviceSpec(context.Flags),\n\t\troleSpec(context.Flags),\n\t\tclusterRoleSpec(context.Flags),\n\t\troleBindingSpec(context.Flags),\n\t\tclusterRoleBindingSpec(context.Flags),\n\t\toperatorDeploymentSpec(context.Flags),\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn checkOperatorStatus(context.Client, context.Flags)\n}", "title": "" }, { "docid": "44c2b6a86eead34a5b899bcf7c6e0bf8", "score": "0.48092893", "text": "func main() {\n\tlog.SetFlags(log.Lshortfile)\n\tvar binaryName = \"app\"\n\tvar appName = \"sdapp\"\n\n\t// todo add \"STATUS\" section\n\tapp := cli.NewApp()\n\tapp.Name = \"Simple Deploy\"\n\tapp.Usage = \"Fast and simple deploy to unix server\"\n\tapp.Version = \"0.7.1\"\n\tapp.Action = func(c *cli.Context) error {\n\t\tif c.Args().Get(0) == \"logs\" {\n\t\t\tif len(c.Args()) < 2 {\n\t\t\t\treturn cli.NewExitError(\"Error: missing host address\\nUsage: simple-deploy logs <host>\\nExample: simple-deploy logs joe@example.com\", 1)\n\t\t\t}\n\t\t\tuser, address := deploy.GetSSHArgs(c.Args().Get(1))\n\t\t\tbuddy := deploy.SetupClient(user, address)\n\t\t\tbuddy.RunCmdRemotely(\"supervisorctl tail -5000 goapp stdout; supervisorctl tail -5000 goapp stderr\")\n\t\t\treturn nil\n\t\t}\n\t\tif c.Args().Get(0) == \"upload-supervisor-config\" {\n\t\t\tif len(c.Args()) < 3 {\n\t\t\t\treturn cli.NewExitError(\"Error: missing host address\\nUsage: simple-deploy upload-supervisor-config <host> <config>\\nExample: simple-deploy upload-supervisor-config joe@example.com configs/app.conf\", 1)\n\t\t\t}\n\t\t\tuser, address := deploy.GetSSHArgs(c.Args().Get(1))\n\t\t\tbuddy := deploy.SetupClient(user, address)\n\t\t\tbuddy.CopySupervisorConfigToRemote(c.Args().Get(2))\n\t\t\treturn nil\n\t\t}\n\t\tif c.Args().Get(0) == \"docker\" {\n\t\t\tif len(c.Args()) < 3 {\n\t\t\t\treturn cli.NewExitError(\"Error: missing host address\\nUsage: simple-deploy docker <host> <images>\\nExample: simple-deploy docker joe@example.com redis,mysql\", 1)\n\t\t\t}\n\t\t\tuser, address := deploy.GetSSHArgs(c.Args().Get(1))\n\t\t\tbuddy := deploy.SetupClient(user, address)\n\t\t\timages := strings.Split(c.Args().Get(2), \",\")\n\n\t\t\tbuddy.InstallDockerOnUbuntu(images)\n\t\t\treturn nil\n\t\t}\n\t\tuser, address := deploy.GetSSHArgs(c.Args().Get(0))\n\t\tbuddy := deploy.SetupClient(user, address)\n\t\tpaths := strings.Split(c.Args().Get(1), \",\")\n\n\t\tbuddy.Deploy(binaryName, appName, user, address, paths)\n\t\treturn nil\n\t}\n\n\terr := app.Run(os.Args)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n}", "title": "" }, { "docid": "9d16e359100d8dd6c15dc19035f19ba3", "score": "0.48065984", "text": "func NewEnvDeployer(in *NewEnvDeployerInput) (*envDeployer, error) {\n\tdefaultSession, err := in.SessionProvider.Default()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"get default session: %w\", err)\n\t}\n\tenvRegionSession, err := in.SessionProvider.DefaultWithRegion(in.Env.Region)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"get default session in env region %s: %w\", in.Env.Region, err)\n\t}\n\tenvManagerSession, err := in.SessionProvider.FromRole(in.Env.ManagerRoleARN, in.Env.Region)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"get env session: %w\", err)\n\t}\n\tenvDescriber, err := describe.NewEnvDescriber(describe.NewEnvDescriberConfig{\n\t\tApp: in.App.Name,\n\t\tEnv: in.Env.Name,\n\t\tConfigStore: in.ConfigStore,\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"initialize env describer: %w\", err)\n\t}\n\toverrider := in.Overrider\n\tif overrider == nil {\n\t\toverrider = new(override.Noop)\n\t}\n\tcfnClient := deploycfn.New(envManagerSession, deploycfn.WithProgressTracker(os.Stderr))\n\tdeployer := &envDeployer{\n\t\tapp: in.App,\n\t\tenv: in.Env,\n\n\t\ttemplateFS: template.New(),\n\t\ts3: awss3.New(envManagerSession),\n\t\tprefixListGetter: ec2.New(envRegionSession),\n\n\t\tappCFN: deploycfn.New(defaultSession, deploycfn.WithProgressTracker(os.Stderr)),\n\t\tenvDeployer: cfnClient,\n\t\ttmplGetter: cfnClient,\n\t\tpatcher: &patch.EnvironmentPatcher{\n\t\t\tProg: termprogress.NewSpinner(log.DiagnosticWriter),\n\t\t\tTemplatePatcher: cfnClient,\n\t\t\tEnv: in.Env,\n\t\t},\n\t\tnewStack: func(in *cfnstack.EnvConfig, lastForceUpdateID string, oldParams []*awscfn.Parameter) (deploycfn.StackConfiguration, error) {\n\t\t\tstack, err := cfnstack.NewEnvConfigFromExistingStack(in, lastForceUpdateID, oldParams)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treturn deploycfn.WrapWithTemplateOverrider(stack, overrider), nil\n\t\t},\n\t\tenvDescriber: envDescriber,\n\t\tlbDescriber: elbv2.New(envManagerSession),\n\t\tnewServiceStackDescriber: func(svc string) stackDescriber {\n\t\t\treturn stack.NewStackDescriber(cfnstack.NameForWorkload(in.App.Name, in.Env.Name, svc), envManagerSession)\n\t\t},\n\n\t\tws: in.Workspace,\n\t}\n\tdeployer.parseAddons = func() (stackBuilder, error) {\n\t\tdeployer.parseAddonsOnce.Do(func() {\n\t\t\tdeployer.addons.stack, deployer.addons.err = addon.ParseFromEnv(deployer.ws)\n\t\t})\n\t\treturn deployer.addons.stack, deployer.addons.err\n\t}\n\treturn deployer, nil\n}", "title": "" }, { "docid": "88303134dfb1f15088b19f4f3e18b65f", "score": "0.48047522", "text": "func (p Pusher) Push(appPath string, deploymentInfo S.DeploymentInfo, response io.Writer) error {\n\n\ttempAppWithUUID := deploymentInfo.AppName + TemporaryNameSuffix + deploymentInfo.UUID\n\n\tif !p.appExists {\n\t\tp.Log.Infof(\"new app detected\")\n\t}\n\n\tp.Log.Debugf(\"pushing app %s to %s\", tempAppWithUUID, deploymentInfo.Domain)\n\tp.Log.Debugf(\"tempdir for app %s: %s\", tempAppWithUUID, appPath)\n\n\tpushOutput, err := p.Courier.Push(tempAppWithUUID, appPath, deploymentInfo.AppName, deploymentInfo.Instances)\n\tresponse.Write(pushOutput)\n\tif err != nil {\n\t\tlogs, newErr := p.Courier.Logs(tempAppWithUUID)\n\t\tfmt.Fprintf(response, \"\\n%s\", string(logs))\n\t\tif newErr != nil {\n\t\t\treturn CloudFoundryGetLogsError{err, newErr}\n\t\t}\n\n\t\treturn PushError{}\n\t}\n\n\tp.Log.Infof(fmt.Sprintf(\"output from Cloud Foundry:\\n%s\\n%s\\n%s\", strings.Repeat(\"-\", 60), string(pushOutput), strings.Repeat(\"-\", 60)))\n\tp.Log.Debugf(\"mapping route for %s to %s\", deploymentInfo.AppName, deploymentInfo.Domain)\n\n\tif deploymentInfo.Domain != \"\" {\n\t\tmapRouteOutput, err := p.Courier.MapRoute(tempAppWithUUID, deploymentInfo.Domain, deploymentInfo.AppName)\n\t\tresponse.Write(mapRouteOutput)\n\t\tif err != nil {\n\t\t\tlogs, newErr := p.Courier.Logs(tempAppWithUUID)\n\t\t\tfmt.Fprintf(response, \"\\n%s\", string(logs))\n\t\t\tif newErr != nil {\n\t\t\t\treturn CloudFoundryGetLogsError{err, newErr}\n\t\t\t}\n\n\t\t\treturn MapRouteError{}\n\t\t}\n\t\tp.Log.Debugf(string(mapRouteOutput))\n\t\tp.Log.Infof(\"application route created at %s.%s\", deploymentInfo.AppName, deploymentInfo.Domain)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "de3826a7bc28ee2ced794af001a32553", "score": "0.47856", "text": "func (m *MockCommand) DeployApp(nodeId, body string, query map[string]interface{}) (int, map[string]interface{}, error) {\n\tret := m.ctrl.Call(m, \"DeployApp\", nodeId, body, query)\n\tret0, _ := ret[0].(int)\n\tret1, _ := ret[1].(map[string]interface{})\n\tret2, _ := ret[2].(error)\n\treturn ret0, ret1, ret2\n}", "title": "" }, { "docid": "f51365cb5d90f2da8d5b8c7cca5f1853", "score": "0.47813046", "text": "func (o *deploySvcOpts) Execute() error {\n\tif !o.clientConfigured {\n\t\tif err := o.configureClients(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif !o.allowWkldDowngrade {\n\t\tif err := validateWkldVersion(o.svcVersionGetter, o.name, o.templateVersion); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tmft, err := workloadManifest(&workloadManifestInput{\n\t\tname: o.name,\n\t\tappName: o.appName,\n\t\tenvName: o.envName,\n\t\tinterpolator: o.newInterpolator(o.appName, o.envName),\n\t\tws: o.ws,\n\t\tunmarshal: o.unmarshal,\n\t\tsess: o.envSess,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\tif o.forceNewUpdate && o.svcType == manifestinfo.StaticSiteType {\n\t\treturn fmt.Errorf(\"--%s is not supported for service type %q\", forceFlag, manifestinfo.StaticSiteType)\n\t}\n\to.appliedDynamicMft = mft\n\tif err := validateWorkloadManifestCompatibilityWithEnv(o.ws, o.envFeaturesDescriber, mft, o.envName); err != nil {\n\t\treturn err\n\t}\n\tdeployer, err := o.newSvcDeployer()\n\tif err != nil {\n\t\treturn err\n\t}\n\tserviceInRegion, err := deployer.IsServiceAvailableInRegion(o.targetEnv.Region)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"check if %s is available in region %s: %w\", o.svcType, o.targetEnv.Region, err)\n\t}\n\tif !serviceInRegion {\n\t\tlog.Warningf(`%s might not be available in region %s; proceed with caution.\n`, o.svcType, o.targetEnv.Region)\n\t}\n\tuploadOut, err := deployer.UploadArtifacts()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"upload deploy resources for service %s: %w\", o.name, err)\n\t}\n\ttargetApp, err := o.getTargetApp()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif o.showDiff {\n\t\toutput, err := deployer.GenerateCloudFormationTemplate(&clideploy.GenerateCloudFormationTemplateInput{\n\t\t\tStackRuntimeConfiguration: clideploy.StackRuntimeConfiguration{\n\t\t\t\tRootUserARN: o.rootUserARN,\n\t\t\t\tTags: targetApp.Tags,\n\t\t\t\tEnvFileARNs: uploadOut.EnvFileARNs,\n\t\t\t\tImageDigests: uploadOut.ImageDigests,\n\t\t\t\tAddonsURL: uploadOut.AddonsURL,\n\t\t\t\tCustomResourceURLs: uploadOut.CustomResourceURLs,\n\t\t\t\tStaticSiteAssetMappingURL: uploadOut.StaticSiteAssetMappingLocation,\n\t\t\t\tVersion: o.templateVersion,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"generate the template for workload %q against environment %q: %w\", o.name, o.envName, err)\n\t\t}\n\t\tif err := diff(deployer, output.Template, o.diffWriter); err != nil {\n\t\t\tvar errHasDiff *errHasDiff\n\t\t\tif !errors.As(err, &errHasDiff) {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tcontd, err := o.skipDiffPrompt, nil\n\t\tif !o.skipDiffPrompt {\n\t\t\tcontd, err = o.prompt.Confirm(continueDeploymentPrompt, \"\")\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"ask whether to continue with the deployment: %w\", err)\n\t\t}\n\t\tif !contd {\n\t\t\to.noDeploy = true\n\t\t\treturn nil\n\t\t}\n\t}\n\tdeployRecs, err := deployer.DeployWorkload(&clideploy.DeployWorkloadInput{\n\t\tStackRuntimeConfiguration: clideploy.StackRuntimeConfiguration{\n\t\t\tImageDigests: uploadOut.ImageDigests,\n\t\t\tEnvFileARNs: uploadOut.EnvFileARNs,\n\t\t\tAddonsURL: uploadOut.AddonsURL,\n\t\t\tRootUserARN: o.rootUserARN,\n\t\t\tTags: tags.Merge(targetApp.Tags, o.resourceTags),\n\t\t\tCustomResourceURLs: uploadOut.CustomResourceURLs,\n\t\t\tStaticSiteAssetMappingURL: uploadOut.StaticSiteAssetMappingLocation,\n\t\t\tVersion: o.templateVersion,\n\t\t},\n\t\tOptions: clideploy.Options{\n\t\t\tForceNewUpdate: o.forceNewUpdate,\n\t\t\tDisableRollback: o.disableRollback,\n\t\t\tDetach: o.detach,\n\t\t},\n\t})\n\tif err != nil {\n\t\tvar errStackDeletedOnInterrupt *deploycfn.ErrStackDeletedOnInterrupt\n\t\tvar errStackUpdateCanceledOnInterrupt *deploycfn.ErrStackUpdateCanceledOnInterrupt\n\t\tvar errEmptyChangeSet *awscfn.ErrChangeSetEmpty\n\t\tif errors.As(err, &errStackDeletedOnInterrupt) {\n\t\t\to.noDeploy = true\n\t\t\treturn nil\n\t\t}\n\t\tif errors.As(err, &errStackUpdateCanceledOnInterrupt) {\n\t\t\tlog.Successf(\"Successfully rolled back service %s to the previous configuration.\\n\", color.HighlightUserInput(o.name))\n\t\t\to.noDeploy = true\n\t\t\treturn nil\n\t\t}\n\t\tif o.disableRollback {\n\t\t\tstackName := stack.NameForWorkload(o.targetApp.Name, o.targetEnv.Name, o.name)\n\t\t\trollbackCmd := fmt.Sprintf(\"aws cloudformation rollback-stack --stack-name %s --role-arn %s\", stackName, o.targetEnv.ExecutionRoleARN)\n\t\t\tlog.Infof(`It seems like you have disabled automatic stack rollback for this deployment. To debug, you can:\n* Run %s to inspect the service log.\n* Visit the AWS console to inspect the errors.\nAfter fixing the deployment, you can:\n1. Run %s to rollback the deployment.\n2. Run %s to make a new deployment.\n`, color.HighlightCode(\"copilot svc logs\"), color.HighlightCode(rollbackCmd), color.HighlightCode(\"copilot svc deploy\"))\n\t\t}\n\t\tif errors.As(err, &errEmptyChangeSet) {\n\t\t\treturn &errNoInfrastructureChanges{parentErr: err}\n\t\t}\n\t\treturn fmt.Errorf(\"deploy service %s to environment %s: %w\", o.name, o.envName, err)\n\t}\n\tif o.detach {\n\t\treturn nil\n\t}\n\tlog.Successf(\"Deployed service %s.\\n\", color.HighlightUserInput(o.name))\n\to.deployRecs = deployRecs\n\treturn nil\n}", "title": "" }, { "docid": "4614f2f0e941e70146247e7fa40ef4ef", "score": "0.47757098", "text": "func (depb *DeployBean) Execute(stringArgs []string, env *map[string]interface{}) error{\n\treturn depb.deploy(stringArgs[0], stringArgs[1], stringArgs[2], stringArgs[3])\n}", "title": "" }, { "docid": "03ec9a794c14fb2a9a5147f0f80c0cdb", "score": "0.47756305", "text": "func (st *Stack) Deploy(stack *thrapb.Stack, opts orchestrator.RequestOptions) error {\n\tif errs := stack.Validate(); len(errs) > 0 {\n\t\treturn utils.FlattenErrors(errs)\n\t}\n\n\t// Evaluate variables\n\tsvars := st.scopeVars(stack)\n\tfor _, comp := range stack.Components {\n\t\tif err := st.evalComponent(comp, svars); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tprintScopeVarsWithVals(svars)\n\n\t// TODO: check artifact existence\n\tfmt.Printf(\"\\nArtifacts:\\n\\n\")\n\terr := st.checkArtifactsExist(stack)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tctx := context.Background()\n\n\t_, j, err := st.orch.Deploy(ctx, stack, opts)\n\tif err != nil {\n\t\tst.orch.Destroy(ctx, stack)\n\t\treturn err\n\t}\n\n\tif opts.Dryrun {\n\t\tb, _ := json.MarshalIndent(j, \"\", \" \")\n\t\tfmt.Printf(\"%s\\n\", b)\n\t}\n\t// fmt.Printf(\"%+v\\n\", resp)\n\t// fmt.Printf(\"%+v\\n\", obj)\n\t// return err\n\treturn nil\n}", "title": "" }, { "docid": "ab5d7ed6cd666ca6396942c426114f5f", "score": "0.4769422", "text": "func (o *Options) DeployInternalDeployers(ctx context.Context, log logr.Logger, kubeClient client.Client, config *config.LandscaperConfiguration) error {\n\trepoCtx, err := cdv2.NewUnstructured(cdv2.NewOCIRegistryRepository(\"eu.gcr.io/gardener-project/development\", \"\"))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to parse repository context: %w\", err)\n\t}\n\tcommonCompDescRef := &lsv1alpha1.ComponentDescriptorDefinition{\n\t\tReference: &lsv1alpha1.ComponentDescriptorReference{\n\t\t\tRepositoryContext: &repoCtx,\n\t\t\tComponentName: \"\",\n\t\t\tVersion: o.Version,\n\t\t},\n\t}\n\n\t// read oci credentials and add them to the deployers\n\tvalues := make(map[string]interface{})\n\tif config.Registry.OCI != nil {\n\t\tociAuthConfig := make(map[string]interface{})\n\t\tfor _, file := range config.Registry.OCI.ConfigFiles {\n\t\t\tdata, err := os.ReadFile(file)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unable to read docker auth Config from %q: %w\", file, err)\n\t\t\t}\n\t\t\tvar auth interface{}\n\t\t\tif err := json.Unmarshal(data, &auth); err != nil {\n\t\t\t\treturn fmt.Errorf(\"unable to parse oci configuration from %q: %w\", file, err)\n\t\t\t}\n\n\t\t\tociAuthConfig[path.Base(file)] = auth\n\t\t}\n\t\tvalues[\"deployer\"] = map[string]interface{}{\n\t\t\t\"oci\": map[string]interface{}{\n\t\t\t\t\"allowPlainHttp\": config.Registry.OCI.AllowPlainHttp,\n\t\t\t\t\"insecureSkipVerify\": config.Registry.OCI.InsecureSkipVerify,\n\t\t\t\t\"secrets\": ociAuthConfig,\n\t\t\t},\n\t\t}\n\t}\n\n\tapply := func(reg *lsv1alpha1.DeployerRegistration, args DeployerApplyArgs) error {\n\t\tif args.Registration.Spec.InstallationTemplate.ComponentDescriptor == nil {\n\t\t\targs.Registration.Spec.InstallationTemplate.ComponentDescriptor = commonCompDescRef.DeepCopy()\n\t\t}\n\t\tif len(args.Registration.Spec.DeployItemTypes) == 0 && len(args.Type) != 0 {\n\t\t\targs.Registration.Spec.DeployItemTypes = []lsv1alpha1.DeployItemType{args.Type}\n\t\t}\n\t\tif len(args.Registration.Spec.InstallationTemplate.ComponentDescriptor.Reference.ComponentName) == 0 && len(args.ComponentName) != 0 {\n\t\t\targs.Registration.Spec.InstallationTemplate.ComponentDescriptor.Reference.ComponentName = args.ComponentName\n\t\t}\n\t\tif (args.Registration.Spec.InstallationTemplate.Blueprint.Reference == nil ||\n\t\t\tlen(args.Registration.Spec.InstallationTemplate.Blueprint.Reference.ResourceName) == 0) &&\n\t\t\tlen(args.ResourceName) != 0 {\n\t\t\targs.Registration.Spec.InstallationTemplate.Blueprint.Reference = &lsv1alpha1.RemoteBlueprintReference{\n\t\t\t\tResourceName: args.ResourceName,\n\t\t\t}\n\t\t}\n\n\t\tvaluesBytes, err := json.Marshal(utils.MergeMaps(values, args.Values))\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unable to create deployer values: %w\", err)\n\t\t}\n\t\tif args.Registration.Spec.InstallationTemplate.ImportDataMappings == nil {\n\t\t\targs.Registration.Spec.InstallationTemplate.ImportDataMappings = map[string]lsv1alpha1.AnyJSON{}\n\t\t}\n\t\targs.Registration.Spec.InstallationTemplate.ImportDataMappings[\"values\"] = lsv1alpha1.NewAnyJSON(valuesBytes)\n\n\t\t// apply args registrations values to registration\n\t\treg.Spec.InstallationTemplate = args.Registration.Spec.InstallationTemplate\n\t\treg.Spec.DeployItemTypes = args.Registration.Spec.DeployItemTypes\n\t\treturn nil\n\t}\n\n\tfor _, deployerName := range o.EnabledDeployers {\n\t\tif err := o.deployInternalDeployer(ctx, log, deployerName, kubeClient, apply); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a285f4dbb7cb6348be69f179cfa0595e", "score": "0.4769368", "text": "func DeployVRFCoordinator(auth *bind.TransactOpts, backend bind.ContractBackend, _link common.Address, _blockHashStore common.Address) (common.Address, *types.Transaction, *VRFCoordinator, error) {\n\tparsed, err := abi.JSON(strings.NewReader(VRFCoordinatorABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(VRFCoordinatorBin), backend, _link, _blockHashStore)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &VRFCoordinator{VRFCoordinatorCaller: VRFCoordinatorCaller{contract: contract}, VRFCoordinatorTransactor: VRFCoordinatorTransactor{contract: contract}, VRFCoordinatorFilterer: VRFCoordinatorFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "5ad2fdd9814cc61ec7fbb3c284ace735", "score": "0.47584978", "text": "func DeployAddress(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Address, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(AddressBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "5ad2fdd9814cc61ec7fbb3c284ace735", "score": "0.47584978", "text": "func DeployAddress(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Address, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(AddressBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "5ad2fdd9814cc61ec7fbb3c284ace735", "score": "0.47584978", "text": "func DeployAddress(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *Address, error) {\n\tparsed, err := abi.JSON(strings.NewReader(AddressABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(AddressBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &Address{AddressCaller: AddressCaller{contract: contract}, AddressTransactor: AddressTransactor{contract: contract}, AddressFilterer: AddressFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "b4e75c67c4a268d5da2edd9219f22845", "score": "0.47522706", "text": "func (_PMintyMultiToken *PMintyMultiTokenCaller) Deployer(opts *bind.CallOpts) (common.Address, error) {\n\tvar out []interface{}\n\terr := _PMintyMultiToken.contract.Call(opts, &out, \"deployer\")\n\n\tif err != nil {\n\t\treturn *new(common.Address), err\n\t}\n\n\tout0 := *abi.ConvertType(out[0], new(common.Address)).(*common.Address)\n\n\treturn out0, err\n\n}", "title": "" }, { "docid": "be27ec277aab7b27463b44fe75215d4d", "score": "0.47502914", "text": "func (c *Client) Deploy(ctx context.Context, opts DeployOpts, p Provider) (*Deployment, error) {\n\treturn deploy(ctx, opts, p, c)\n}", "title": "" }, { "docid": "3e838d25eb0d6287acb0c3bc64f34641", "score": "0.47495145", "text": "func (fn InstallFunc) Deploy(ctx *StageContext) error {\n\treturn fn(ctx)\n}", "title": "" }, { "docid": "7b713658609716bfa85ecb576c0aab88", "score": "0.47358763", "text": "func DeployEthoFSController(auth *bind.TransactOpts, backend bind.ContractBackend) (common.Address, *types.Transaction, *EthoFSController, error) {\n\tparsed, err := abi.JSON(strings.NewReader(EthoFSControllerABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(EthoFSControllerBin), backend)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &EthoFSController{EthoFSControllerCaller: EthoFSControllerCaller{contract: contract}, EthoFSControllerTransactor: EthoFSControllerTransactor{contract: contract}, EthoFSControllerFilterer: EthoFSControllerFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "706eccb3eb2a3f82aac58c8a4e1de273", "score": "0.47349617", "text": "func (ctx *sensorContext) deploymentBuilder() (*appv1.Deployment, error) {\n\tdeploymentSpec, err := ctx.makeDeploymentSpec()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdeployment := &appv1.Deployment{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ctx.sensor.Namespace,\n\t\t\tGenerateName: fmt.Sprintf(\"%s-sensor-\", ctx.sensor.Name),\n\t\t\tLabels: deploymentSpec.Template.Labels,\n\t\t},\n\t\tSpec: *deploymentSpec,\n\t}\n\tenvVars := []corev1.EnvVar{\n\t\t{\n\t\t\tName: common.SensorName,\n\t\t\tValue: ctx.sensor.Name,\n\t\t},\n\t\t{\n\t\t\tName: common.SensorNamespace,\n\t\t\tValue: ctx.sensor.Namespace,\n\t\t},\n\t\t{\n\t\t\tName: common.EnvVarControllerInstanceID,\n\t\t\tValue: ctx.controller.Config.InstanceID,\n\t\t},\n\t}\n\tfor i, container := range deployment.Spec.Template.Spec.Containers {\n\t\tcontainer.Env = append(container.Env, envVars...)\n\t\tdeployment.Spec.Template.Spec.Containers[i] = container\n\t}\n\tif err := controllerscommon.SetObjectMeta(ctx.sensor, deployment, v1alpha1.SchemaGroupVersionKind); err != nil {\n\t\treturn nil, err\n\t}\n\treturn deployment, nil\n}", "title": "" }, { "docid": "bbaa78d3f45f3b8edffb539a0c17af52", "score": "0.47300997", "text": "func (d *KubernetesDeployer) Deploy(containerTag string) error {\n\tif d.Endpoint == \"\" || d.Namespace == \"\" {\n\t\treturn fmt.Errorf(\"missing Endpoint or Namespace information\")\n\t}\n\n\turl := fmt.Sprintf(\"https://%s/apis/extensions/v1beta1/namespaces/%s/deployments/%s\", d.Endpoint, d.Namespace, d.DeploymentName)\n\timage := fmt.Sprintf(`{\"spec\":{\"template\":{\"spec\":{\"containers\":[{\"name\":\"%s\",\"image\":\"%s:%s\"}]}}}}`, d.ContainerName, d.ContainerImage, containerTag)\n\tpayload := bytes.NewBuffer([]byte(image))\n\n\treq, err := http.NewRequest(http.MethodPatch, url, payload)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/strategic-merge-patch+json\")\n\n\treq.Header.Add(\"Authorization\", fmt.Sprintf(\"Bearer %s\", d.BearerTokenService.RetrieveToken()))\n\tres, err := d.Client.Do(req)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer res.Body.Close()\n\tbody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tpodDeployResponse := &PodDeployResponse{}\n\terr = json.Unmarshal([]byte(body), &podDeployResponse)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4bbc2c8ec5970b0bf5a26660496a9698", "score": "0.47228792", "text": "func (f *Function) Deploy() error {\n\tzip, err := f.ZipBytes()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tinfo, err := f.Info()\n\n\tif e, ok := err.(awserr.Error); ok {\n\t\tif e.Code() == \"ResourceNotFoundException\" {\n\t\t\treturn f.Create(zip)\n\t\t}\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tremoteHash := *info.Configuration.CodeSha256\n\tlocalHash := utils.Sha256(zip)\n\n\tif localHash == remoteHash {\n\t\treturn ErrUnchanged\n\t}\n\n\treturn f.Update(zip)\n}", "title": "" }, { "docid": "ab2fb7c07a398260668ce5e0312acbaa", "score": "0.47171402", "text": "func (g *Galaxy) Apply() error {\n\tvar e *Environment\n\tvar envName string\n\tvar v *VaultHandler\n\tvar err error\n\n\tg.logger.Infof(\"DRY-RUN: '%v', Environment: '%s'\", g.cfg.DryRun, g.cfg.GetEnvironments())\n\n\tif envName, err = g.probeSingleEnv(); err != nil {\n\t\treturn err\n\t}\n\n\tlogger := g.logger.WithFields(log.Fields{\"env\": envName, \"dryRun\": g.cfg.DryRun})\n\tlogger.Infof(\"Applying changes for environment...\")\n\n\tif e, err = g.dotGalaxy.GetEnvironment(envName); err != nil {\n\t\treturn err\n\t}\n\n\tif !g.cfg.SkipSecrets {\n\t\tv = NewVaultHandler(g.cfg.VaultHandlerConfig, g.cfg.KubernetesConfig, g.Modified[envName])\n\t}\n\n\tl := NewLandscaper(g.cfg.LandscaperConfig, g.cfg.KubernetesConfig, e, g.Modified[envName], g.cfg.Raw)\n\tfor ns, originalNs := range g.envOriginalNs[envName] {\n\t\tif !g.cfg.SkipSecrets {\n\t\t\tlogger.Infof(\"Handling secrets for '%s' namespace\", ns)\n\t\t\tif err = v.Bootstrap(ns, g.cfg.DryRun); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif err = v.Apply(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tlogger.Infof(\"Handling namespace '%s', original name '%s'\", ns, originalNs)\n\t\tif err = l.Bootstrap(ns, originalNs, g.cfg.DryRun); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err = l.Apply(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "af15f905e4be90d8291f71f1c1271c57", "score": "0.47167325", "text": "func CreateApp(todoCtx context.Context, t *testing.T, ctx *framework.TestCtx, f *framework.Framework, namespacedName types.NamespacedName, matchLabels map[string]string) appsv1.Deployment {\n\tns := namespacedName.Namespace\n\tappName := namespacedName.Name\n\tt.Log(\"Creating Deployment mock object...\")\n\td := mocks.DeploymentMock(ns, appName, matchLabels)\n\trequire.Nil(t, f.Client.Create(todoCtx, &d, cleanUpOptions(ctx)))\n\n\t// waiting for application deployment to reach one replica\n\tt.Log(\"Waiting for application deployment reach one replica...\")\n\trequire.Nil(t, e2eutil.WaitForDeployment(t, f.KubeClient, ns, appName, 1, retryInterval, timeout))\n\n\t// retrieveing deployment, to inspect its contents\n\n\tt.Logf(\"Reading application deployment '%s'\", appName)\n\trequire.Nil(t, f.Client.Get(todoCtx, namespacedName, &d))\n\n\treturn d\n}", "title": "" }, { "docid": "ec6932c739386819682a242aac6a7904", "score": "0.47158802", "text": "func deploy() error {\n\tif len(os.Args) < 3 {\n\t\treturn errors.New(\"invalid number of arguments\")\n\t}\n\n\tpluginID := os.Args[1]\n\tbundlePath := os.Args[2]\n\n\tsiteURL := os.Getenv(\"MM_SERVICESETTINGS_SITEURL\")\n\tadminToken := os.Getenv(\"MM_ADMIN_TOKEN\")\n\tadminUsername := os.Getenv(\"MM_ADMIN_USERNAME\")\n\tadminPassword := os.Getenv(\"MM_ADMIN_PASSWORD\")\n\tcopyTargetDirectory, _ := filepath.Abs(\"../mattermost-server\")\n\n\tif siteURL != \"\" {\n\t\tclient := model.NewAPIv4Client(siteURL)\n\n\t\tif adminToken != \"\" {\n\t\t\tlog.Printf(\"Authenticating using token against %s.\", siteURL)\n\t\t\tclient.SetToken(adminToken)\n\n\t\t\treturn uploadPlugin(client, pluginID, bundlePath)\n\t\t}\n\n\t\tif adminUsername != \"\" && adminPassword != \"\" {\n\t\t\tclient := model.NewAPIv4Client(siteURL)\n\t\t\tlog.Printf(\"Authenticating as %s against %s.\", adminUsername, siteURL)\n\t\t\t_, _, err := client.Login(adminUsername, adminPassword)\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrapf(err, \"failed to login as %s\", adminUsername)\n\t\t\t}\n\n\t\t\treturn uploadPlugin(client, pluginID, bundlePath)\n\t\t}\n\t}\n\n\t_, err := os.Stat(copyTargetDirectory)\n\tif os.IsNotExist(err) {\n\t\treturn errors.New(\"no supported deployment method available, please install plugin manually\")\n\t} else if err != nil {\n\t\treturn errors.Wrapf(err, \"failed to stat %s\", copyTargetDirectory)\n\t}\n\n\tlog.Printf(\"Installing plugin to mattermost-server found in %s.\", copyTargetDirectory)\n\tlog.Print(\"Server restart required to load updated plugin.\")\n\treturn copyPlugin(pluginID, copyTargetDirectory, bundlePath)\n}", "title": "" }, { "docid": "5b6b864e4b2de8d13c7e702dc0192b97", "score": "0.47117874", "text": "func (r TEnvironmentHooksOnEnvironmentHooksHolder) Deploy() THook {\n\treturn CreateTHookForHook(r.h.Deploy)\n}", "title": "" }, { "docid": "e9f9c2838629b70d7e76abdfa43e337a", "score": "0.47097903", "text": "func Deploy(installdir string) {\n\n\tout := find(filepath.Join(installdir, \"Samples\"), \"-debug.apk\")\n\tapks := strings.Split(out, \",\")\n\tif Global_OS == \"darwin\" {\n\t\tGlobal_OS = \"macosx\"\n\t}\n\tadb_path := filepath.Join(installdir, \"android-sdk-\"+Global_OS, \"platform-tools\", \"adb\")\n\tvar deploy_command, console string\n\tif Global_OS == \"windows\" {\n\t\tconsole = filepath.Join(installdir, \"console.exe\")\n\t\tdeploy_command = \"cmd /c echo Deploy Samples;cmd /c echo Waiting for device...;\"\n\t} else {\n\t\tif Global_OS == \"macosx\" {\n\t\t\tconsole = filepath.Join(installdir, \"console.app\", \"Contents\", \"MacOS\", \"console\")\n\t\t} else {\n\t\t\tconsole = filepath.Join(installdir, \"console\")\n\t\t}\n\n\t\tdeploy_command = \"echo Deploy Samples;echo Waiting for device...;\"\n\t}\n\n\tfor i := 0; i < len(apks); i++ {\n\n\t\tif apks[i] == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tdeploy_command = deploy_command + adb_path + \" install -r \" + apks[i] + \";\"\n\t}\n\n\tdeploy_log := filepath.Join(installdir, \"_installer/deploy.log\")\n\n\t//fmt.Println(deploy_log)\n\tvar cuda_samples string\n\tgloabal_path = \"\"\n\n\tif Global_OS == \"linux-x64\" {\n\t\tif Detect_devices(installdir) {\n\t\t\tcuda_samples = find(filepath.Join(installdir, \"CUDA_Samples\", \"7.0\"), \"-debug.apk\")\n\n\t\t} else {\n\t\t\tcuda_samples = find(filepath.Join(installdir, \"CUDA_Samples\", \"6.5\"), \"-debug.apk\")\n\n\t\t}\n\n\t\tcudaapks := strings.Split(cuda_samples, \",\")\n\n\t\tfor i := 0; i < len(cudaapks); i++ {\n\t\t\t//deploying cuda samples\n\t\t\tif cudaapks[i] == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tdeploy_command = deploy_command + adb_path + \" install -r \" + cudaapks[i] + \";\"\n\t\t}\n\t}\n\n\te := exec.Command(console, \"-t\", \"Deploy Samples\", \"-l\", deploy_log, deploy_command).Run()\n\tif e != nil {\n\t\tfmt.Println(\"Deploy Samples Failed.\")\n\t\tos.Exit(2)\n\t}\n\n\texec.Command(adb_path, \"kill-server\")\n\tif Global_OS == \"windows\" {\n\t\tRedirector(exec.Command(\"taskkill\", \"/F\", \"/IM\", \"adb.exe\"))\n\t} else {\n\t\tcmd := exec.Command(\"/bin/sh\", \"-c\", `ps -e|grep \"adb\"|awk '{print $1}'`)\n\t\tpid, err := cmd.Output()\n\t\tif err != nil {\n\t\t\tfmt.Println(\"failed\")\n\t\t}\n\n\t\tpids := strings.Fields(string(pid[:]))\n\n\t\tif len(pids) > 0 {\n\t\t\tfor i := 0; i < len(pids); i++ {\n\t\t\t\texec.Command(\"kill\", pids[i]).Start()\n\t\t\t\t//fmt.Println(\"Success\")\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "59541a2b5189d39575c5d138a0fbac0b", "score": "0.47067544", "text": "func (o *appUpgradeOpts) Execute() error {\n\tversion, err := o.versionGetter.Version()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get template version of application %s: %v\", o.name, err)\n\t}\n\tif !shouldUpgradeApp(o.name, version) {\n\t\treturn nil\n\t}\n\tapp, err := o.store.GetApplication(o.name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get application %s: %w\", o.name, err)\n\t}\n\to.prog.Start(fmt.Sprintf(fmtAppUpgradeStart, color.HighlightUserInput(o.name), color.Emphasize(version), color.Emphasize(deploy.LatestAppTemplateVersion)))\n\tdefer func() {\n\t\tif err != nil {\n\t\t\to.prog.Stop(log.Serrorf(fmtAppUpgradeFailed, color.HighlightUserInput(o.name), color.Emphasize(deploy.LatestAppTemplateVersion)))\n\t\t\treturn\n\t\t}\n\t\to.prog.Stop(log.Ssuccessf(fmtAppUpgradeComplete, color.HighlightUserInput(o.name), color.Emphasize(deploy.LatestAppTemplateVersion)))\n\t}()\n\terr = o.upgradeApplication(app, version, deploy.LatestAppTemplateVersion)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "25a34cc53c4a199396191a2e785172c2", "score": "0.47030246", "text": "func Deploy(step_fn *string, releaseFile *string) error {\n\tregion, accountID := to.RegionAccount()\n\n\tif is.EmptyStr(region) || is.EmptyStr(accountID) {\n\t\treturn fmt.Errorf(\"AWS_REGION and AWS_ACCOUNT_ID envars, maybe use assume-role\")\n\t}\n\n\trelease, err := releaseFromFile(releaseFile, region, accountID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdeployerARN := to.StepArn(region, accountID, step_fn)\n\n\treturn deploy(&aws.ClientsStr{}, release, deployerARN, releaseFile)\n}", "title": "" }, { "docid": "a280992e3614ae6c8ae66c698e8946b1", "score": "0.46978465", "text": "func (client *Client) DeployApi(request *DeployApiRequest) (_result *DeployApiResponse, _err error) {\n\truntime := &util.RuntimeOptions{}\n\t_result = &DeployApiResponse{}\n\t_body, _err := client.DeployApiWithOptions(request, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_result = _body\n\treturn _result, _err\n}", "title": "" }, { "docid": "40fd6745a90f6109348168135a3a57c4", "score": "0.4692108", "text": "func (o *Operation) deployOrTrigger(ctx context.Context, item executionItem) error {\n\tif item.DeployItem == nil {\n\t\titem.DeployItem = &lsv1alpha1.DeployItem{}\n\t\titem.DeployItem.GenerateName = fmt.Sprintf(\"%s-%s-\", o.exec.Name, item.Info.Name)\n\t\titem.DeployItem.Namespace = o.exec.Namespace\n\t}\n\titem.DeployItem.Spec.RegistryPullSecrets = o.exec.Spec.RegistryPullSecrets\n\n\tif _, err := kutil.CreateOrUpdate(ctx, o.Client(), item.DeployItem, func() error {\n\t\tApplyDeployItemTemplate(item.DeployItem, item.Info)\n\t\tkutil.SetMetaDataLabel(&item.DeployItem.ObjectMeta, lsv1alpha1.ExecutionManagedByLabel, o.exec.Name)\n\t\treturn controllerutil.SetControllerReference(o.exec, item.DeployItem, o.Scheme())\n\t}); err != nil {\n\t\treturn err\n\t}\n\n\tref := lsv1alpha1.VersionedNamedObjectReference{}\n\tref.Name = item.Info.Name\n\tref.Reference.Name = item.DeployItem.Name\n\tref.Reference.Namespace = item.DeployItem.Namespace\n\tref.Reference.ObservedGeneration = item.DeployItem.Generation\n\n\told := o.exec.DeepCopy()\n\to.exec.Status.DeployItemReferences = lsv1alpha1helper.SetVersionedNamedObjectReference(o.exec.Status.DeployItemReferences, ref)\n\to.exec.Status.Phase = lsv1alpha1.ExecutionPhaseProgressing\n\treturn o.Client().Status().Patch(ctx, o.exec, client.MergeFrom(old))\n}", "title": "" }, { "docid": "9f855718e24f918760c6bf2070119b18", "score": "0.46884143", "text": "func DeployContractExtender(auth *bind.TransactOpts, backend bind.ContractBackend, contractAddress common.Address, recipientAddress common.Address, recipientPTMKey string) (common.Address, *types.Transaction, *ContractExtender, error) {\n\tparsed, err := abi.JSON(strings.NewReader(ContractExtenderABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(ContractExtenderBin), backend, contractAddress, recipientAddress, recipientPTMKey)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &ContractExtender{ContractExtenderCaller: ContractExtenderCaller{contract: contract}, ContractExtenderTransactor: ContractExtenderTransactor{contract: contract}, ContractExtenderFilterer: ContractExtenderFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "8f82e68edebe623c029e611be1f5c50e", "score": "0.46881804", "text": "func (h *PullRequestEventHandler) CreateEnvironmentOnOpenshift(event *github.Event) (*openshift.NewAppOutput, error) {\n\ttemplate := h.RepositoryConfig.Template\n\tlabels := buildLabelsFromEvent(event)\n\tparams := buildTemplateParamsFromEvent(event)\n\n\toutput, err := h.Openshift.NewAppFromTemplate(template, params, labels)\n\tif err != nil {\n\t\treturn output, err\n\t}\n\n\tLogger.Println(output.Raw)\n\treturn output, nil\n}", "title": "" }, { "docid": "852ac9a7043cd516f3a0ce47dbca39cb", "score": "0.46830094", "text": "func (p *deploycmd) deploySingle(c *cli.Context, app *models.App) error {\n\tvar dir string\n\twd := common.GetWd()\n\n\tif c.String(\"working-dir\") != \"\" {\n\t\tdir = c.String(\"working-dir\")\n\t} else {\n\t\t// if we're in the context of an app, first arg is path to the function\n\t\tpath := c.Args().First()\n\t\tif path != \"\" {\n\t\t\tfmt.Printf(\"Deploying function at: /%s\\n\", path)\n\t\t}\n\t\tdir = filepath.Join(wd, path)\n\t}\n\n\terr := os.Chdir(dir)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer os.Chdir(wd)\n\n\tfpath, ff, err := common.FindAndParseFuncFileV20180708(dir)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn p.deployFuncV20180708(c, app, fpath, ff)\n}", "title": "" }, { "docid": "82c86746e4acefb2f18f39ace2687bd4", "score": "0.46757716", "text": "func (p *k8sPlatform) DeploySecret(ctx context.Context, options *deployment.DeploySecretOptions) error {\n\tsecretClient := p.cli.CoreV1().Secrets(options.EnvironmentID)\n\t_, err := secretClient.Create(&apiv1.Secret{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: options.ID,\n\t\t},\n\t\tData: map[string][]byte{\"value\": options.Value},\n\t})\n\treturn err\n}", "title": "" }, { "docid": "d8d56853cee73a4d2f7b9ee2e174bf9a", "score": "0.46692148", "text": "func NewWebAppDeployment(ctx *pulumi.Context,\n\tname string, args *WebAppDeploymentArgs, opts ...pulumi.ResourceOption) (*WebAppDeployment, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.Name == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'Name'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20180201:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20150801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20150801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20160801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20160801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20181101:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20181101:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20190801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20190801:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20200601:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20200601:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20200901:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20200901:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20201001:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20201001:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20201201:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20201201:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20210101:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20210101:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:web/v20210115:WebAppDeployment\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:web/v20210115:WebAppDeployment\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource WebAppDeployment\n\terr := ctx.RegisterResource(\"azure-native:web/v20180201:WebAppDeployment\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "08aeee614568e8a5fae5b0870a471417", "score": "0.46688852", "text": "func (s *Strategy) Deploy(ctx context.Context, round sim.Round) error {\n\tw, err := s.engine.CreateDeployment()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed creating deployment: %v\", err)\n\t}\n\n\terr = s.engine.WaitDeployment(w)\n\tw.Stop()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed waiting deployment: %v\", err)\n\t}\n\n\tpods, err := s.engine.FetchPods()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed fetching pods: %v\", err)\n\t}\n\n\terr = s.engine.StreamLogs(ctx)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed streaming logs: %v\", err)\n\t}\n\n\terr = s.engine.UploadConfig()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed uploading config: %v\", err)\n\t}\n\n\ts.pods = pods\n\n\tw, err = s.engine.DeployRouter(pods)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed deploying router: %v\", err)\n\t}\n\n\tport, host, err := s.engine.WaitRouter(w)\n\tw.Stop()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed waiting router: %v\", err)\n\t}\n\n\tcertificates, err := s.engine.FetchCertificates()\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed fetching certs: %v\", err)\n\t}\n\n\terr = s.tun.Start(\n\t\tsim.WithPort(port.NodePort),\n\t\tsim.WithHost(host),\n\t\tsim.WithCertificate(certificates),\n\t\tsim.WithCommand(s.options.VPNExecutable),\n\t)\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed starting tunnel: %v\", err)\n\t}\n\n\t// Before is run at the end of the deployment so that the Execute\n\t// step can be run multiple times.\n\terr = round.Before(s.engine, s.makeContext())\n\tif err != nil {\n\t\treturn xerrors.Errorf(\"failed running 'Before': %v\", err)\n\t}\n\n\ts.updated = true\n\n\treturn nil\n}", "title": "" }, { "docid": "545ea674c1b9a30565946792440a6c60", "score": "0.4666806", "text": "func DeployChallengeTester(auth *bind.TransactOpts, backend bind.ContractBackend, _executors []common.Address) (common.Address, *types.Transaction, *ChallengeTester, error) {\n\tparsed, err := abi.JSON(strings.NewReader(ChallengeTesterABI))\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\n\taddress, tx, contract, err := bind.DeployContract(auth, parsed, common.FromHex(ChallengeTesterBin), backend, _executors)\n\tif err != nil {\n\t\treturn common.Address{}, nil, nil, err\n\t}\n\treturn address, tx, &ChallengeTester{ChallengeTesterCaller: ChallengeTesterCaller{contract: contract}, ChallengeTesterTransactor: ChallengeTesterTransactor{contract: contract}, ChallengeTesterFilterer: ChallengeTesterFilterer{contract: contract}}, nil\n}", "title": "" }, { "docid": "c3792ec0bf880efd32ddc23bedff3f99", "score": "0.46608528", "text": "func (adapter *rancherAppMgrAdapter) CreateApp(req *appmanager.CreateAppRequest) (*appmanager.Response, error) {\n\t// Synchronize cache\n\tif err := syncCache(); err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// Refresh catalog\n\tif err := apiclient.RefreshCatalog(adapter.mc, viper.GetString(rancher.EnvApphcAdaptersRancherAppsCatalogName)); err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// Construct Application temporary data\n\tapps := NewAppsData()\n\tif err := apps.AppendRunningAppsData(adapter.mc, req, req.Cycle, req.AppState); err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// Identify application type\n\tchartType, err := appmgrcommon.AppTypeToAppCycle(req.Cycle)\n\tif err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// Create the temporary data for the new applications\n\tapps.AppendNewAppInstances(req, chartType, req.Description, req.AppState)\n\n\t// Check if the requested application name and version already exist\n\tif apps.NewAppInstancesDataEmpty() {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_NOT_FOUND, \"Nothing to deploy\", nil)\n\t}\n\n\tnamespace := apps.NewAppInstancesData[0].TargetNamespace\n\tif err := apiclient.CreateNamespace(adapter.mc, namespace); err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// If shared storage requested\n\tif req.SharedStorage > 0 {\n\t\tkubeConvAppName := namespace\n\t\tif err := apiclient.CreateSharedStorage(adapter.mc, req.Name, kubeConvAppName, namespace, int(req.SharedStorage)); err != nil {\n\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t}\n\t}\n\n\t// Check if the requested application instances already exist\n\trunAppInstances := apps.GetRunningAppData(req.Name)\n\n\tif runAppInstances != nil {\n\t\t// Check if the requested application already exists\n\t\tfor _, newAppInstance := range apps.NewAppInstancesData {\n\t\t\tfor _, runAppInstance := range runAppInstances {\n\t\t\t\t// We do not allow to spin up multiple versions of a particular application instance\n\t\t\t\tif newAppInstance.InstanceName == runAppInstance.InstanceName /*&& n.Version == r.Version*/ {\n\t\t\t\t\tnewAppInstance.NextAction = appmgrcommon.AppInstanceDataNextActionNone\n\t\t\t\t\tnewAppInstance.TemplateAvailable = true\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\t// Check if appropriate template available\n\t\t\t\tvalue, err := apiclient.TemplateAvailable(adapter.mc, appcommon.MapGet(newAppInstance.Annotations,\n\t\t\t\t\tappmgrcommon.AppInstanceAnnotationTemplateName), newAppInstance.RequestedVersion,\n\t\t\t\t\tviper.GetString(rancher.EnvApphcAdaptersRancherAppsCatalogName))\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t\t\t}\n\t\t\t\tnewAppInstance.TemplateAvailable = value\n\t\t\t}\n\t\t}\n\t}\n\n\tlimits := req.GetSpec().GetResources().GetLimits()\n\n\tif limits != nil {\n\t\tif err := apiclient.CheckAvailableResources(adapter.mc, apps.GetNumberOfNewInstances(), req.Spec.Resources.Limits); err != nil {\n\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t}\n\t}\n\n\t// if from_catalog property is not set or set to \"false\"\n\t// create a new chart for the application instance\n\tif !req.FromCatalog {\n\t\tcreatedEntries := 0\n\t\tfor _, newAppInstance := range apps.NewAppInstancesData {\n\t\t\tif !newAppInstance.TemplateAvailable {\n\t\t\t\tchartTemplate := filepath.Join(viper.GetString(appcommon.EnvApphcCachePath), appmgrcommon.CatalogNameTemplates, chartType)\n\t\t\t\tdstChart := filepath.Join(viper.GetString(appcommon.EnvApphcCachePath), appmgrcommon.CatalogAppsRepo,\n\t\t\t\t\treq.Name, appcommon.MapGet(newAppInstance.Annotations, appmgrcommon.AppInstanceAnnotationTemplateName),\n\t\t\t\t\tnewAppInstance.RequestedVersion)\n\t\t\t\tif err := chartutils.SetChartData(newAppInstance, req, dstChart, nil); err != nil {\n\t\t\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t\t\t}\n\t\t\t\tif err := chartutils.CreateChart(chartTemplate, dstChart, chartType, req.Name, newAppInstance); err != nil {\n\t\t\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t\t\t}\n\t\t\t\tcreatedEntries++\n\t\t\t}\n\t\t}\n\n\t\t// Update the chart store only if necessary\n\t\tif createdEntries > 0 {\n\t\t\tif err := syncCatalog(adapter.mc, apps.NewAppInstancesData, req.Description); err != nil {\n\t\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t\t}\n\t\t}\n\t}\n\n\tif limits == nil {\n\t\tif err := resourcemgr.DeleteLimitRange(adapter.kc, namespace); err != nil {\n\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t}\n\n\t} else {\n\n\t\tif err := resourcemgr.CreateUpdateLimitRange(adapter.kc, namespace, req.GetSpec().GetResources().GetLimits().GetCpu(),\n\t\t\treq.GetSpec().GetResources().GetLimits().GetMemory(), appmgrcommon.AppInstanceDefaultCpuRequest,\n\t\t\tappmgrcommon.AppInstanceDefaultMemoryRequest); err != nil {\n\t\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t\t}\n\t}\n\n\t// Create application instance\n\tdoneList, err := createUpgradeApps(adapter.mc, apps.NewAppInstancesData, viper.GetString(rancher.EnvApphcAdaptersRancherAppsCatalogName))\n\tif err != nil {\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_ERROR, err.Error(), nil)\n\t}\n\n\t// If nothing is added print appropriate message\n\tif len(doneList) == 0 {\n\t\terr := fmt.Errorf(\"application %s already deployed\", req.Name)\n\t\treturn appmgrcommon.GenerateResponse(appmanager.Status_UNCHANGED, err.Error(), nil)\n\t}\n\n\tvar msg string\n\tif req.GetAppState() == appmanager.AppStateAfterDeployment_enabled {\n\t\tmsg = \"Application deployed successfully\"\n\t} else {\n\t\tmsg = \"Application deployed successfully but disabled\"\n\t}\n\t// Generate response\n\treturn appmgrcommon.GenerateResponse(appmanager.Status_SUCCESS, msg, &appmanager.App{Name: req.Name,\n\t\tCycle: req.Cycle, Instances: doneList})\n}", "title": "" } ]
2e1979ec7557a3a0abc27c49014c1951
CreateChannelMembershipWithContext is the same as CreateChannelMembership with the addition of the ability to pass a context and additional request options. See CreateChannelMembership for details on how to use this API operation. The context must be nonnil and will be used for request cancellation. If the context is nil a panic will occur. In the future the SDK may create subcontexts for http.Requests. See for more information on using Contexts. Deprecated: Replaced by CreateChannelMembership in the Amazon Chime SDK Messaging Namespace
[ { "docid": "a0c03d4c2d550d74f352a2b2f82f5af4", "score": "0.8850586", "text": "func (c *Chime) CreateChannelMembershipWithContext(ctx aws.Context, input *CreateChannelMembershipInput, opts ...request.Option) (*CreateChannelMembershipOutput, error) {\n\treq, out := c.CreateChannelMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" } ]
[ { "docid": "c146429fe0e3938974eace375eb5637d", "score": "0.7602881", "text": "func (c *Chime) BatchCreateChannelMembershipWithContext(ctx aws.Context, input *BatchCreateChannelMembershipInput, opts ...request.Option) (*BatchCreateChannelMembershipOutput, error) {\n\treq, out := c.BatchCreateChannelMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7d82e0e548d568e92ff6e4d9f9e8a8a8", "score": "0.75598323", "text": "func (c *Chime) CreateRoomMembershipWithContext(ctx aws.Context, input *CreateRoomMembershipInput, opts ...request.Option) (*CreateRoomMembershipOutput, error) {\n\treq, out := c.CreateRoomMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "46f865675a86d757cd383bb20a5e7659", "score": "0.7155304", "text": "func (c *CloudTrail) CreateChannelWithContext(ctx aws.Context, input *CreateChannelInput, opts ...request.Option) (*CreateChannelOutput, error) {\n\treq, out := c.CreateChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7a71085381c1610f090a1fe720fb4cf6", "score": "0.7044591", "text": "func (c *Chime) CreateChannelWithContext(ctx aws.Context, input *CreateChannelInput, opts ...request.Option) (*CreateChannelOutput, error) {\n\treq, out := c.CreateChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "1b94c44c25fd3dc4e84a70dc137b3c22", "score": "0.6377569", "text": "func (c *Chime) DescribeChannelMembershipWithContext(ctx aws.Context, input *DescribeChannelMembershipInput, opts ...request.Option) (*DescribeChannelMembershipOutput, error) {\n\treq, out := c.DescribeChannelMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "a4ed936e8effc42e2880fbc3ed153096", "score": "0.6308851", "text": "func (c *Chime) BatchCreateRoomMembershipWithContext(ctx aws.Context, input *BatchCreateRoomMembershipInput, opts ...request.Option) (*BatchCreateRoomMembershipOutput, error) {\n\treq, out := c.BatchCreateRoomMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "43edee3887a2947e43d1387982393eab", "score": "0.6052019", "text": "func (c *Chime) CreateChannelBanWithContext(ctx aws.Context, input *CreateChannelBanInput, opts ...request.Option) (*CreateChannelBanOutput, error) {\n\treq, out := c.CreateChannelBanRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7087c5aed2b956b030db605551682a64", "score": "0.58201945", "text": "func (c *SecurityHub) CreateMembersWithContext(ctx aws.Context, input *CreateMembersInput, opts ...request.Option) (*CreateMembersOutput, error) {\n\treq, out := c.CreateMembersRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "bf60e762c67c7a6be26cbb82689115d7", "score": "0.56508255", "text": "func (c *Chime) DeleteChannelMembershipWithContext(ctx aws.Context, input *DeleteChannelMembershipInput, opts ...request.Option) (*DeleteChannelMembershipOutput, error) {\n\treq, out := c.DeleteChannelMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "f805ea48b82bed677f1071435ab8ae89", "score": "0.56500876", "text": "func (c *Chime) CreateChannelModeratorWithContext(ctx aws.Context, input *CreateChannelModeratorInput, opts ...request.Option) (*CreateChannelModeratorOutput, error) {\n\treq, out := c.CreateChannelModeratorRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "a4a25d412768952560fb4b1d482b9633", "score": "0.54510796", "text": "func (c *Chime) DescribeChannelMembershipForAppInstanceUserWithContext(ctx aws.Context, input *DescribeChannelMembershipForAppInstanceUserInput, opts ...request.Option) (*DescribeChannelMembershipForAppInstanceUserOutput, error) {\n\treq, out := c.DescribeChannelMembershipForAppInstanceUserRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "e500a0834165b69f5f31641712ec1aac", "score": "0.5208588", "text": "func (c *CodeStarNotifications) CreateNotificationRuleWithContext(ctx aws.Context, input *CreateNotificationRuleInput, opts ...request.Option) (*CreateNotificationRuleOutput, error) {\n\treq, out := c.CreateNotificationRuleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "39779b1522c716fd3be2a31a4eb254a4", "score": "0.5170097", "text": "func (s *DescribeChannelMembershipOutput) SetChannelMembership(v *ChannelMembership) *DescribeChannelMembershipOutput {\n\ts.ChannelMembership = v\n\treturn s\n}", "title": "" }, { "docid": "f72a9d27dc941034ad510dfcd814f997", "score": "0.513791", "text": "func (c *Chime) ListChannelMembershipsForAppInstanceUserWithContext(ctx aws.Context, input *ListChannelMembershipsForAppInstanceUserInput, opts ...request.Option) (*ListChannelMembershipsForAppInstanceUserOutput, error) {\n\treq, out := c.ListChannelMembershipsForAppInstanceUserRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "2f488c8b3e14db100e8f89641081c4f8", "score": "0.50961065", "text": "func (c *Chime) UpdateRoomMembershipWithContext(ctx aws.Context, input *UpdateRoomMembershipInput, opts ...request.Option) (*UpdateRoomMembershipOutput, error) {\n\treq, out := c.UpdateRoomMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "fe754fb402903efc03a40d0d45b7fa1f", "score": "0.5086307", "text": "func (s *DescribeChannelMembershipForAppInstanceUserOutput) SetChannelMembership(v *ChannelMembershipForAppInstanceUserSummary) *DescribeChannelMembershipForAppInstanceUserOutput {\n\ts.ChannelMembership = v\n\treturn s\n}", "title": "" }, { "docid": "b31eb5ba1b0fcb63c784c91ee53bf7d0", "score": "0.50849384", "text": "func NewPostChannelCreateParamsWithContext(ctx context.Context) *PostChannelCreateParams {\n\tvar ()\n\treturn &PostChannelCreateParams{\n\n\t\tContext: ctx,\n\t}\n}", "title": "" }, { "docid": "3f8ee8145bce9f4b86f5d9aabbddd25c", "score": "0.5080479", "text": "func (c *Chime) CreateVoiceConnectorGroupWithContext(ctx aws.Context, input *CreateVoiceConnectorGroupInput, opts ...request.Option) (*CreateVoiceConnectorGroupOutput, error) {\n\treq, out := c.CreateVoiceConnectorGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "e527803abb5771e65fc9f8f6c925924d", "score": "0.50081885", "text": "func (c *CustomerProfiles) CreateProfileWithContext(ctx aws.Context, input *CreateProfileInput, opts ...request.Option) (*CreateProfileOutput, error) {\n\treq, out := c.CreateProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "3fd74a5a05b2e244b1f0b2f0211769ba", "score": "0.49754596", "text": "func (c *ConfigService) PutDeliveryChannelWithContext(ctx aws.Context, input *PutDeliveryChannelInput, opts ...request.Option) (*PutDeliveryChannelOutput, error) {\n\treq, out := c.PutDeliveryChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "4120a0cf00bf50e783b96365de2537c4", "score": "0.49739555", "text": "func (c *Transfer) CreateProfileWithContext(ctx aws.Context, input *CreateProfileInput, opts ...request.Option) (*CreateProfileOutput, error) {\n\treq, out := c.CreateProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "54bcade80822430354557981261a651b", "score": "0.49548846", "text": "func (c *Transfer) CreateConnectorWithContext(ctx aws.Context, input *CreateConnectorInput, opts ...request.Option) (*CreateConnectorOutput, error) {\n\treq, out := c.CreateConnectorRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "fd6c0f15eb7dd23db087f58121f24242", "score": "0.4901644", "text": "func (c *RAM) CreatePermissionWithContext(ctx aws.Context, input *CreatePermissionInput, opts ...request.Option) (*CreatePermissionOutput, error) {\n\treq, out := c.CreatePermissionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "88a0eea7c3285cd5ea56acdb04dab79b", "score": "0.48732033", "text": "func (c *Chime) CreateAccountWithContext(ctx aws.Context, input *CreateAccountInput, opts ...request.Option) (*CreateAccountOutput, error) {\n\treq, out := c.CreateAccountRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "495b7d6178ecb2b8bbf5ccc59e80ac00", "score": "0.48458838", "text": "func (c *Chime) CreateRoomWithContext(ctx aws.Context, input *CreateRoomInput, opts ...request.Option) (*CreateRoomOutput, error) {\n\treq, out := c.CreateRoomRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "433686bf445f787da7e26bed2da11cff", "score": "0.48060855", "text": "func (c *Chime) DeleteRoomMembershipWithContext(ctx aws.Context, input *DeleteRoomMembershipInput, opts ...request.Option) (*DeleteRoomMembershipOutput, error) {\n\treq, out := c.DeleteRoomMembershipRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "f83f6381970a5c11428f03810a9be32c", "score": "0.48000392", "text": "func (c *Computing) CreateSecurityGroupWithContext(ctx nifcloud.Context, input *CreateSecurityGroupInput, opts ...request.Option) (*CreateSecurityGroupOutput, error) {\n\treq, out := c.CreateSecurityGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "1771a805e508de9eac7260567f50a3cc", "score": "0.47687587", "text": "func (c *Iam) CreateRoleWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateRoleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "5186356e81d3b35687df79d61b6dee16", "score": "0.47629264", "text": "func (c *Chime) CreateVoiceConnectorWithContext(ctx aws.Context, input *CreateVoiceConnectorInput, opts ...request.Option) (*CreateVoiceConnectorOutput, error) {\n\treq, out := c.CreateVoiceConnectorRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "cf66082434dceb173926bced73f25a22", "score": "0.47561872", "text": "func (c *CloudTrail) UpdateChannelWithContext(ctx aws.Context, input *UpdateChannelInput, opts ...request.Option) (*UpdateChannelOutput, error) {\n\treq, out := c.UpdateChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "b64b71a9974ef99acd25b0d4f303a6f1", "score": "0.47380698", "text": "func (c *Iam) CreateLoginProfileWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateLoginProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "636b251ce113f8f5ff1705981a434af7", "score": "0.4737892", "text": "func (c *Neptune) CreateEventSubscriptionWithContext(ctx aws.Context, input *CreateEventSubscriptionInput, opts ...request.Option) (*CreateEventSubscriptionOutput, error) {\n\treq, out := c.CreateEventSubscriptionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "6f7db1f75e60b4db44430e3c4ed77379", "score": "0.47337404", "text": "func (c *Chime) ListChannelMembershipsWithContext(ctx aws.Context, input *ListChannelMembershipsInput, opts ...request.Option) (*ListChannelMembershipsOutput, error) {\n\treq, out := c.ListChannelMembershipsRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "f3f71ba9c068915c9725bf6dec1f42f7", "score": "0.47326002", "text": "func (c *NetworkManager) CreateConnectPeerWithContext(ctx aws.Context, input *CreateConnectPeerInput, opts ...request.Option) (*CreateConnectPeerOutput, error) {\n\treq, out := c.CreateConnectPeerRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "e21e6489ed760866ba3c173e4b585fcb", "score": "0.4652378", "text": "func (c *Iam) CreateAccountWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateAccountRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7fc271e3b5c0e3f167d3e4ede76fdebe", "score": "0.46448466", "text": "func (c *Slb) CreateListenersWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateListenersRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "d140aaea1c37e59eed97377322648792", "score": "0.4637223", "text": "func (c *Iam) CreateGroupWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "ccd87669fce708bd429ed5f5eebb4d94", "score": "0.46178472", "text": "func (c *ChimeSDKMediaPipelines) CreateMediaLiveConnectorPipelineWithContext(ctx aws.Context, input *CreateMediaLiveConnectorPipelineInput, opts ...request.Option) (*CreateMediaLiveConnectorPipelineOutput, error) {\n\treq, out := c.CreateMediaLiveConnectorPipelineRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "cdf73f96d850b9d6aa3c5edadcebd781", "score": "0.4606697", "text": "func (c *Chime) DescribeChannelWithContext(ctx aws.Context, input *DescribeChannelInput, opts ...request.Option) (*DescribeChannelOutput, error) {\n\treq, out := c.DescribeChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "3671d82047f622500b6fa18f1c59153f", "score": "0.46009836", "text": "func (c *IoTWireless) CreateServiceProfileWithContext(ctx aws.Context, input *CreateServiceProfileInput, opts ...request.Option) (*CreateServiceProfileOutput, error) {\n\treq, out := c.CreateServiceProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "e79f7f9ff3d90ad03dd0762dcab8f5dd", "score": "0.4595042", "text": "func (c *DeviceFarm) CreateNetworkProfileWithContext(ctx aws.Context, input *CreateNetworkProfileInput, opts ...request.Option) (*CreateNetworkProfileOutput, error) {\n\treq, out := c.CreateNetworkProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "168194e0955d0c5650d3d4c016b74dbc", "score": "0.4564977", "text": "func (c *Chime) UpdateChannelWithContext(ctx aws.Context, input *UpdateChannelInput, opts ...request.Option) (*UpdateChannelOutput, error) {\n\treq, out := c.UpdateChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "b9bab51ee7e03d22a1b4df06f8fe5574", "score": "0.45501766", "text": "func (c *Rdb) CreateEventSubscriptionWithContext(ctx nifcloud.Context, input *CreateEventSubscriptionInput, opts ...request.Option) (*CreateEventSubscriptionOutput, error) {\n\treq, out := c.CreateEventSubscriptionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "9efdea7d670605138e128eaa3ec8d974", "score": "0.45450014", "text": "func (c *NetworkManager) CreateConnectAttachmentWithContext(ctx aws.Context, input *CreateConnectAttachmentInput, opts ...request.Option) (*CreateConnectAttachmentOutput, error) {\n\treq, out := c.CreateConnectAttachmentRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "dfdeddaacd37e61c4ce43c2ac927c6bb", "score": "0.45255536", "text": "func (c *SecurityHub) InviteMembersWithContext(ctx aws.Context, input *InviteMembersInput, opts ...request.Option) (*InviteMembersOutput, error) {\n\treq, out := c.InviteMembersRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "90edfe3d5754606c7c2c51faca073bce", "score": "0.4525447", "text": "func (c Client) CreateWithContext(context context.Context, input *CreateCompositionInput) (*CreateCompositionResponse, error) {\n\top := client.Operation{\n\t\tMethod: http.MethodPost,\n\t\tURI: \"/Compositions\",\n\t\tContentType: client.URLEncoded,\n\t}\n\n\tif input == nil {\n\t\tinput = &CreateCompositionInput{}\n\t}\n\n\tresponse := &CreateCompositionResponse{}\n\tif err := c.client.Send(context, op, input, response); err != nil {\n\t\treturn nil, err\n\t}\n\treturn response, nil\n}", "title": "" }, { "docid": "522d88c8cce3da67fed1a6b11ee59e6c", "score": "0.45226917", "text": "func (c *Chime) CreateMeetingWithContext(ctx aws.Context, input *CreateMeetingInput, opts ...request.Option) (*CreateMeetingOutput, error) {\n\treq, out := c.CreateMeetingRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "6ba0e1b17852d9aa14892a940a7c5dd2", "score": "0.4509794", "text": "func (c *OpenSearchServerless) CreateCollectionWithContext(ctx aws.Context, input *CreateCollectionInput, opts ...request.Option) (*CreateCollectionOutput, error) {\n\treq, out := c.CreateCollectionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "3b73ff5ac76277d393c2e9f76bda818a", "score": "0.45029774", "text": "func (c *Client) CreateWebhookWithContext(ctx context.Context, u string) (out *Webhook, err error) {\n\treq := &createWebhookRequest{Webhook: &Webhook{URL: u}}\n\terr = c.post(ctx, \"webhooks\", req, &out)\n\treturn\n}", "title": "" }, { "docid": "4eea75bb52b9969f3117108946bb245a", "score": "0.44954896", "text": "func (c *IoTWireless) CreateDeviceProfileWithContext(ctx aws.Context, input *CreateDeviceProfileInput, opts ...request.Option) (*CreateDeviceProfileOutput, error) {\n\treq, out := c.CreateDeviceProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "572b49228a65964268d5345a64c26fae", "score": "0.44547716", "text": "func (c *DeviceFarm) CreateInstanceProfileWithContext(ctx aws.Context, input *CreateInstanceProfileInput, opts ...request.Option) (*CreateInstanceProfileOutput, error) {\n\treq, out := c.CreateInstanceProfileRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "2b7ad08c579d40e20b8add940f681a07", "score": "0.4430573", "text": "func (c *CloudTrail) CreateTrailWithContext(ctx aws.Context, input *CreateTrailInput, opts ...request.Option) (*CreateTrailOutput, error) {\n\treq, out := c.CreateTrailRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "b8c0ac889f1df8b91457fca601fe78b0", "score": "0.44111764", "text": "func (c *CustomerProfiles) CreateIntegrationWorkflowWithContext(ctx aws.Context, input *CreateIntegrationWorkflowInput, opts ...request.Option) (*CreateIntegrationWorkflowOutput, error) {\n\treq, out := c.CreateIntegrationWorkflowRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "352a499023d2871e2e726265d4eb8908", "score": "0.44024876", "text": "func (c *NetworkManager) CreateConnectionWithContext(ctx aws.Context, input *CreateConnectionInput, opts ...request.Option) (*CreateConnectionOutput, error) {\n\treq, out := c.CreateConnectionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "a2d716ec0183980c9489c919552e47a9", "score": "0.4399227", "text": "func (c *Neptune) CreateGlobalClusterWithContext(ctx aws.Context, input *CreateGlobalClusterInput, opts ...request.Option) (*CreateGlobalClusterOutput, error) {\n\treq, out := c.CreateGlobalClusterRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "ac2bbcedbeedff118d3c6b54ddee9299", "score": "0.4396285", "text": "func (c *SecurityHub) CreateAutomationRuleWithContext(ctx aws.Context, input *CreateAutomationRuleInput, opts ...request.Option) (*CreateAutomationRuleOutput, error) {\n\treq, out := c.CreateAutomationRuleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7f9733614fb8b3b99121833ccaa75333", "score": "0.43814445", "text": "func (c *Computing) NiftyCreateWebProxyWithContext(ctx nifcloud.Context, input *NiftyCreateWebProxyInput, opts ...request.Option) (*NiftyCreateWebProxyOutput, error) {\n\treq, out := c.NiftyCreateWebProxyRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "ffefc4657e142d577d42e670b55f5540", "score": "0.43779802", "text": "func (c *Chime) CreateAttendeeWithContext(ctx aws.Context, input *CreateAttendeeInput, opts ...request.Option) (*CreateAttendeeOutput, error) {\n\treq, out := c.CreateAttendeeRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "7b7a9c322d9a81bb3cfb2b8a8f99a0cb", "score": "0.43736747", "text": "func NewOrgMembershipListParamsWithContext(ctx context.Context) *OrgMembershipListParams {\n\tvar ()\n\treturn &OrgMembershipListParams{\n\n\t\tContext: ctx,\n\t}\n}", "title": "" }, { "docid": "9449ac7b8d50fd69826755fc4a3f9ccf", "score": "0.43643907", "text": "func (c *Client) CreateUserContactMethodWithContext(ctx context.Context, userID string, cm ContactMethod) (*ContactMethod, error) {\n\td := map[string]ContactMethod{\n\t\t\"contact_method\": cm,\n\t}\n\n\tresp, err := c.post(ctx, \"/users/\"+userID+\"/contact_methods\", d, nil)\n\treturn getContactMethodFromResponse(c, resp, err)\n}", "title": "" }, { "docid": "19d784d4d373e67fc4eaf3c32c9a31df", "score": "0.4362291", "text": "func (c *LexModelBuildingService) GetBotChannelAssociationWithContext(ctx aws.Context, input *GetBotChannelAssociationInput, opts ...request.Option) (*GetBotChannelAssociationOutput, error) {\n\treq, out := c.GetBotChannelAssociationRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "c4a4c131a59a422ba83b97f6fbb3eecf", "score": "0.43405098", "text": "func (c *Client) CreateUserNotificationRuleWithContext(ctx context.Context, userID string, rule NotificationRule) (*NotificationRule, error) {\n\td := map[string]NotificationRule{\n\t\t\"notification_rule\": rule,\n\t}\n\n\tresp, err := c.post(ctx, \"/users/\"+userID+\"/notification_rules\", d, nil)\n\treturn getUserNotificationRuleFromResponse(c, resp, err)\n}", "title": "" }, { "docid": "3ce3b576fc09da37e3cefee10400ff5d", "score": "0.4305409", "text": "func (c *OAM) CreateSinkWithContext(ctx aws.Context, input *CreateSinkInput, opts ...request.Option) (*CreateSinkOutput, error) {\n\treq, out := c.CreateSinkRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "9ea6c7570bb5c269028267944f4582df", "score": "0.42729804", "text": "func (o *PostChannelCreateParams) WithContext(ctx context.Context) *PostChannelCreateParams {\n\to.SetContext(ctx)\n\treturn o\n}", "title": "" }, { "docid": "3126a626a59822a56a75d426a606dc26", "score": "0.4264558", "text": "func (c *CustomerProfiles) CreateEventStreamWithContext(ctx aws.Context, input *CreateEventStreamInput, opts ...request.Option) (*CreateEventStreamOutput, error) {\n\treq, out := c.CreateEventStreamRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "9f6f4823b0c21cb8da22351eb30f6b25", "score": "0.42644677", "text": "func (c *Chime) CreateBotWithContext(ctx aws.Context, input *CreateBotInput, opts ...request.Option) (*CreateBotOutput, error) {\n\treq, out := c.CreateBotRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "9543cd7f417105d540e21ad45bb2fa58", "score": "0.42427585", "text": "func (c *Computing) CreateRouteWithContext(ctx nifcloud.Context, input *CreateRouteInput, opts ...request.Option) (*CreateRouteOutput, error) {\n\treq, out := c.CreateRouteRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "af127e64ad014d5e100f68727a525a97", "score": "0.42403823", "text": "func (c *Computing) NiftyCreateNatRuleWithContext(ctx nifcloud.Context, input *NiftyCreateNatRuleInput, opts ...request.Option) (*NiftyCreateNatRuleOutput, error) {\n\treq, out := c.NiftyCreateNatRuleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "896a65bd36353dbcdc9c97315b85c18e", "score": "0.42192855", "text": "func (c *CloudTrail) GetChannelWithContext(ctx aws.Context, input *GetChannelInput, opts ...request.Option) (*GetChannelOutput, error) {\n\treq, out := c.GetChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "1274173f39c68c915de39e42626d345e", "score": "0.42107108", "text": "func (c *DeviceFarm) CreateProjectWithContext(ctx aws.Context, input *CreateProjectInput, opts ...request.Option) (*CreateProjectOutput, error) {\n\treq, out := c.CreateProjectRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "61dc655ca5f60b9204df9a2fec57448e", "score": "0.42056948", "text": "func (c *Chime) InviteUsersWithContext(ctx aws.Context, input *InviteUsersInput, opts ...request.Option) (*InviteUsersOutput, error) {\n\treq, out := c.InviteUsersRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "b617dd71ada340b63884f4fc9dd540d4", "score": "0.41973042", "text": "func (c *IoT1ClickProjects) CreateProjectWithContext(ctx aws.Context, input *CreateProjectInput, opts ...request.Option) (*CreateProjectOutput, error) {\n\treq, out := c.CreateProjectRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "2090367aa66bb953a406c279c894a555", "score": "0.41955358", "text": "func (c *Computing) CreateCustomerGatewayWithContext(ctx nifcloud.Context, input *CreateCustomerGatewayInput, opts ...request.Option) (*CreateCustomerGatewayOutput, error) {\n\treq, out := c.CreateCustomerGatewayRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "bb99cc6bb23151dd6af1d264caadee2a", "score": "0.41795373", "text": "func (c *Iam) CreateProjectWithContext(ctx aws.Context, input *map[string]interface{}, opts ...request.Option) (*map[string]interface{}, error) {\n\treq, out := c.CreateProjectRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "687d7b60ada04c2db5887f1eff373353", "score": "0.41736722", "text": "func (c *Transfer) CreateWorkflowWithContext(ctx aws.Context, input *CreateWorkflowInput, opts ...request.Option) (*CreateWorkflowOutput, error) {\n\treq, out := c.CreateWorkflowRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "2e5d3c47afa27b678f7762cba9881e4f", "score": "0.4167544", "text": "func (c *NetworkManager) CreateCoreNetworkWithContext(ctx aws.Context, input *CreateCoreNetworkInput, opts ...request.Option) (*CreateCoreNetworkOutput, error) {\n\treq, out := c.CreateCoreNetworkRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "1e1816b5e3941f0c4658a5a75ebc4fc1", "score": "0.41512173", "text": "func (c *CloudTrail) DeleteChannelWithContext(ctx aws.Context, input *DeleteChannelInput, opts ...request.Option) (*DeleteChannelOutput, error) {\n\treq, out := c.DeleteChannelRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "2ea2f88ab44daef046d9a982f235ab3c", "score": "0.41311112", "text": "func (c *MWAA) CreateWebLoginTokenWithContext(ctx aws.Context, input *CreateWebLoginTokenInput, opts ...request.Option) (*CreateWebLoginTokenOutput, error) {\n\treq, out := c.CreateWebLoginTokenRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "a2e5507ad92e89a7ceb96317e41ead5a", "score": "0.41226238", "text": "func NewTeamMembershipUpdateParamsWithContext(ctx context.Context) *TeamMembershipUpdateParams {\n\tvar ()\n\treturn &TeamMembershipUpdateParams{\n\n\t\tContext: ctx,\n\t}\n}", "title": "" }, { "docid": "cdef5aa6b71fc3bc1bfec49e45fa25b5", "score": "0.41179132", "text": "func (c *Client) CreateQRCodeWithContext(ctx context.Context, data *CreateQRCodeParams) (*xendit.QRCode, *xendit.Error) {\n\tif err := validator.ValidateRequired(ctx, data); err != nil {\n\t\treturn nil, validator.APIValidatorErr(err)\n\t}\n\n\tresponse := &xendit.QRCode{}\n\theader := &http.Header{}\n\n\tif data.ForUserID != \"\" {\n\t\theader.Add(\"for-user-id\", data.ForUserID)\n\t}\n\n\terr := c.APIRequester.Call(\n\t\tctx,\n\t\t\"POST\",\n\t\tfmt.Sprintf(\"%s/qr_codes\", c.Opt.XenditURL),\n\t\tc.Opt.SecretKey,\n\t\theader,\n\t\tdata,\n\t\tresponse,\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "cf907edbe2ac1a6e6d734e5b3141093d", "score": "0.4105325", "text": "func (s *ListChannelMembershipsForAppInstanceUserOutput) SetChannelMemberships(v []*ChannelMembershipForAppInstanceUserSummary) *ListChannelMembershipsForAppInstanceUserOutput {\n\ts.ChannelMemberships = v\n\treturn s\n}", "title": "" }, { "docid": "d0b495d160465ca0079e0e0722cc1f68", "score": "0.4094447", "text": "func (c *Computing) CreateVpnConnectionWithContext(ctx nifcloud.Context, input *CreateVpnConnectionInput, opts ...request.Option) (*CreateVpnConnectionOutput, error) {\n\treq, out := c.CreateVpnConnectionRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "9d53a55949f450259dbb3cc058c34690", "score": "0.40923262", "text": "func (c *Chime) CreateSipRuleWithContext(ctx aws.Context, input *CreateSipRuleInput, opts ...request.Option) (*CreateSipRuleOutput, error) {\n\treq, out := c.CreateSipRuleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "c6dc72b281c6c4aa3564ab569a980ed3", "score": "0.4083132", "text": "func (s *CreateRoomMembershipOutput) SetRoomMembership(v *RoomMembership) *CreateRoomMembershipOutput {\n\ts.RoomMembership = v\n\treturn s\n}", "title": "" }, { "docid": "f6e2fa0409e2a9e4bcc01aad0f3b86bc", "score": "0.40784317", "text": "func (c *NetworkManager) CreateTransitGatewayPeeringWithContext(ctx aws.Context, input *CreateTransitGatewayPeeringInput, opts ...request.Option) (*CreateTransitGatewayPeeringOutput, error) {\n\treq, out := c.CreateTransitGatewayPeeringRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "5c484f812d773c24a7fde6226d0f32ef", "score": "0.405281", "text": "func (c *OpenSearchServerless) CreateSecurityPolicyWithContext(ctx aws.Context, input *CreateSecurityPolicyInput, opts ...request.Option) (*CreateSecurityPolicyOutput, error) {\n\treq, out := c.CreateSecurityPolicyRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "abb832c842c14c7a54babe5fae6fd25b", "score": "0.40505153", "text": "func (c *Chime) RedactChannelMessageWithContext(ctx aws.Context, input *RedactChannelMessageInput, opts ...request.Option) (*RedactChannelMessageOutput, error) {\n\treq, out := c.RedactChannelMessageRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "02a44c1b7eda7a2100c3d31f1b5c8455", "score": "0.4042005", "text": "func (c *Route53Resolver) CreateResolverRuleWithContext(ctx aws.Context, input *CreateResolverRuleInput, opts ...request.Option) (*CreateResolverRuleOutput, error) {\n\treq, out := c.CreateResolverRuleRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "f04d63762824f9d63b4dabe8fa65c61b", "score": "0.40388316", "text": "func (c *Inspector) CreateResourceGroupWithContext(ctx aws.Context, input *CreateResourceGroupInput, opts ...request.Option) (*CreateResourceGroupOutput, error) {\n\treq, out := c.CreateResourceGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "470dfebd7ba1aface8ca3684b6a12ca0", "score": "0.4033048", "text": "func (c *Rdb) CreateDBSecurityGroupWithContext(ctx nifcloud.Context, input *CreateDBSecurityGroupInput, opts ...request.Option) (*CreateDBSecurityGroupOutput, error) {\n\treq, out := c.CreateDBSecurityGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "42ca598e17e6508d009b9d5b67c8a493", "score": "0.40321106", "text": "func (s *ListChannelMembershipsOutput) SetChannelMemberships(v []*ChannelMembershipSummary) *ListChannelMembershipsOutput {\n\ts.ChannelMemberships = v\n\treturn s\n}", "title": "" }, { "docid": "307fbeff78acc900b5b9565b98fd2717", "score": "0.40287095", "text": "func (o *PostChannelCreateParams) WithBody(body *models.ChannelCreateTx) *PostChannelCreateParams {\n\to.SetBody(body)\n\treturn o\n}", "title": "" }, { "docid": "82ab80154a587bb5c5c176e0eba0204a", "score": "0.40249637", "text": "func (c *Chime) CreateMediaCapturePipelineWithContext(ctx aws.Context, input *CreateMediaCapturePipelineInput, opts ...request.Option) (*CreateMediaCapturePipelineOutput, error) {\n\treq, out := c.CreateMediaCapturePipelineRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "981c0be5ddf86e5395a5e694fe737c04", "score": "0.40246496", "text": "func (c *Chime) CreateUserWithContext(ctx aws.Context, input *CreateUserInput, opts ...request.Option) (*CreateUserOutput, error) {\n\treq, out := c.CreateUserRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "39d0bca1527c9395b1d990d28507dc76", "score": "0.40177652", "text": "func (c *SecurityHub) CreateInsightWithContext(ctx aws.Context, input *CreateInsightInput, opts ...request.Option) (*CreateInsightOutput, error) {\n\treq, out := c.CreateInsightRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "887bb76af91a241e73bfa919e4edde96", "score": "0.40106115", "text": "func (c *DeviceFarm) CreateTestGridProjectWithContext(ctx aws.Context, input *CreateTestGridProjectInput, opts ...request.Option) (*CreateTestGridProjectOutput, error) {\n\treq, out := c.CreateTestGridProjectRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "f73d3bfafaebb965245956a4842eeb2e", "score": "0.40044096", "text": "func (c *Chime) CreateSipMediaApplicationCallWithContext(ctx aws.Context, input *CreateSipMediaApplicationCallInput, opts ...request.Option) (*CreateSipMediaApplicationCallOutput, error) {\n\treq, out := c.CreateSipMediaApplicationCallRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "868ba6591b134c48610f0dd72e5680f5", "score": "0.3996588", "text": "func (s *UpdateRoomMembershipOutput) SetRoomMembership(v *RoomMembership) *UpdateRoomMembershipOutput {\n\ts.RoomMembership = v\n\treturn s\n}", "title": "" }, { "docid": "5511335a21b770ce8286bec7b9f9ca81", "score": "0.39951938", "text": "func (c *NetworkManager) CreateGlobalNetworkWithContext(ctx aws.Context, input *CreateGlobalNetworkInput, opts ...request.Option) (*CreateGlobalNetworkOutput, error) {\n\treq, out := c.CreateGlobalNetworkRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" }, { "docid": "62f9f78cf4a2767c934b58dfbef4bbfd", "score": "0.3985058", "text": "func (c *Route53RecoveryReadiness) CreateRecoveryGroupWithContext(ctx aws.Context, input *CreateRecoveryGroupInput, opts ...request.Option) (*CreateRecoveryGroupOutput, error) {\n\treq, out := c.CreateRecoveryGroupRequest(input)\n\treq.SetContext(ctx)\n\treq.ApplyOptions(opts...)\n\treturn out, req.Send()\n}", "title": "" } ]
0d4ccd0abce4dbc7498eef43c23aaf94
HitFromModel creates Hit based on model.Hit
[ { "docid": "6bb32a5fca78011ae2a6e80567d3431f", "score": "0.7885234", "text": "func HitFromModel(m model.Hit) (h Hit, err error) {\n\terr = h.HitID.decodeID(m.HitID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = h.ShortID.decodeID(m.ShortID)\n\tif err != nil {\n\t\treturn\n\t}\n\tfrom, err := parseShort(m.From)\n\tif err != nil {\n\t\treturn\n\t}\n\th.From = from\n\tto, err := newOriginal(m.To)\n\tif err != nil {\n\t\treturn\n\t}\n\th.To = to\n\terr = h.Address.parse(m.Address)\n\th.WasCached = m.WasCached\n\th.Took = m.Took\n\th.Timestamp = m.Timestamp\n\treturn\n}", "title": "" } ]
[ { "docid": "135dd42188508153365075d4da0a3d99", "score": "0.664959", "text": "func (h Hit) ToModel() (m model.Hit, err error) {\n\tm.HitID = h.HitID.encodeID()\n\tm.ShortID = h.ShortID.encodeID()\n\tm.From = h.From.string()\n\tm.To = h.To.string()\n\tm.Address = h.Address.string()\n\tm.WasCached = h.WasCached\n\tm.Took = h.Took\n\tm.Timestamp = h.Timestamp\n\treturn\n}", "title": "" }, { "docid": "dba9fe39424d7b906aff768c1d33e8b1", "score": "0.53232414", "text": "func (t *Tag) FromModel(tag *models.Tag) {\n\tt.ID = tag.ID\n\tt.Value = tag.Value\n}", "title": "" }, { "docid": "936488ac45173c6e241f6955116ed70f", "score": "0.51370126", "text": "func NewInnerHit() *InnerHit {\n\treturn &InnerHit{source: NewSearchSource()}\n}", "title": "" }, { "docid": "3be8a980fc928313f7bc5bb4a5baa39d", "score": "0.49110758", "text": "func HitFromAPI(remoteAddr string) (h Hit, err error) {\n\th.HitID, err = NewID()\n\tif err != nil {\n\t\treturn\n\t}\n\terr = h.Address.parse(remoteAddr)\n\tif err != nil {\n\t\treturn\n\t}\n\th.Timestamp = time.Now()\n\treturn\n}", "title": "" }, { "docid": "d4812a83cba84832a1769d6eb74bbcd3", "score": "0.48369262", "text": "func (x *DataAuditResult) SetHit(v uint32) {\n\tif x != nil {\n\t\tx.Hit = v\n\t}\n}", "title": "" }, { "docid": "6c1089e2de15ef3117b73ff3e3d9eea3", "score": "0.4609694", "text": "func handleModel(swagDoc *specs.SwagDoc, docs []string) error {\n\tvar def = make(map[string]specs.SwagSchema)\n\tfor _, doc := range docs {\n\t\tvar model map[string]specs.SwagSchema\n\t\ty := []byte(doc)\n\t\t// for some reason yaml.Unmarshal throws error: \"panic: reflect: reflect.Value.Set using unaddressable value\"\n\t\t// with structs that have nested pointers\n\t\t// as a workaround, convert yaml string to json string and unmarshal\n\t\tj, err := yaml.YAMLToJSON(y)\n\t\terr = json.Unmarshal(j, &model)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor k, v := range model {\n\t\t\tdef[k] = v\n\t\t}\n\t}\n\tswagDoc.Definitions = &def\n\treturn nil\n}", "title": "" }, { "docid": "9091064ad56e287ad164044c37dcae98", "score": "0.45385474", "text": "func (l *Organization) FromModel(m model.Organization) Location {\n\treturn Location{\n\t\t// Code omitted.\n\t}\n}", "title": "" }, { "docid": "17945f5b04157397671d8e2eae1743bf", "score": "0.45350018", "text": "func CreateTableFromModel(model interface{}, tableName string, hashKey string) error {\n\tvar AttributeDefinitions []*dynamodb.AttributeDefinition\n\tvar GlobalSecondaryIndexes []*dynamodb.GlobalSecondaryIndex\n\tvar rangeString string\n\n\tl := reflect.ValueOf(model).NumField()\n\n\tfor i := 0; i < l; i++ {\n\t\tv := reflect.ValueOf(model)\n\t\tk := v.Field(i).Kind()\n\n\t\tif k != reflect.Ptr {\n\t\t\tt := v.Type()\n\n\t\t\tfieldname := t.Field(i).Name\n\t\t\tr, _ := t.Field(i).Tag.Lookup(\"json\")\n\t\t\tu, _ := t.Field(i).Tag.Lookup(\"unique\")\n\t\t\trangeKey, _ := t.Field(i).Tag.Lookup(\"sort\")\n\t\t\tif r != \"\" {\n\t\t\t\tfieldname = strings.Split(r, \",\")[0]\n\t\t\t}\n\n\t\t\tif rangeKey != \"\" && rangeKey == \"true\" {\n\t\t\t\trangeString = rangeKey\n\t\t\t}\n\n\t\t\tif u != \"\" && u == \"true\" {\n\t\t\t\t// add attribute definition\n\t\t\t\tdefinition := &dynamodb.AttributeDefinition{\n\t\t\t\t\tAttributeName: aws.String(fieldname),\n\t\t\t\t\tAttributeType: aws.String(\"S\"),\n\t\t\t\t}\n\n\t\t\t\tAttributeDefinitions = append(AttributeDefinitions, definition)\n\n\t\t\t\t// build global secondary index\n\t\t\t\tindexName := fmt.Sprintf(\"%sIndex\", strings.Title(fieldname))\n\t\t\t\tgsi := &dynamodb.GlobalSecondaryIndex{\n\t\t\t\t\tIndexName: aws.String(indexName),\n\t\t\t\t\tKeySchema: []*dynamodb.KeySchemaElement{\n\t\t\t\t\t\t&dynamodb.KeySchemaElement{\n\t\t\t\t\t\t\tAttributeName: aws.String(fieldname),\n\t\t\t\t\t\t\tKeyType: aws.String(\"HASH\"),\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tProjection: &dynamodb.Projection{\n\t\t\t\t\t\tProjectionType: aws.String(\"ALL\"),\n\t\t\t\t\t},\n\t\t\t\t\tProvisionedThroughput: &dynamodb.ProvisionedThroughput{\n\t\t\t\t\t\tReadCapacityUnits: aws.Int64(2),\n\t\t\t\t\t\tWriteCapacityUnits: aws.Int64(2),\n\t\t\t\t\t},\n\t\t\t\t}\n\n\t\t\t\tGlobalSecondaryIndexes = append(GlobalSecondaryIndexes, gsi)\n\t\t\t}\n\t\t}\n\t}\n\n\tindexDefinition := &dynamodb.AttributeDefinition{\n\t\tAttributeName: aws.String(hashKey),\n\t\tAttributeType: aws.String(\"S\"),\n\t}\n\n\tAttributeDefinitions = append(AttributeDefinitions, indexDefinition)\n\n\treturn CreateTable(tableName, hashKey, rangeString, AttributeDefinitions, GlobalSecondaryIndexes)\n}", "title": "" }, { "docid": "48550b656d9b745bf9c5eae52b2b6a7c", "score": "0.45215398", "text": "func (t *TableCache) CreateModel(tableName string, row *ovsdb.Row, uuid string) (model.Model, error) {\n\ttable := t.mapper.Schema.Table(tableName)\n\tif table == nil {\n\t\treturn nil, fmt.Errorf(\"table %s not found\", tableName)\n\t}\n\tmodel, err := t.dbModel.NewModel(tableName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = t.mapper.GetRowData(tableName, row, model)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif uuid != \"\" {\n\t\tmapperInfo, err := mapper.NewMapperInfo(table, model)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif err := mapperInfo.SetField(\"_uuid\", uuid); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn model, nil\n}", "title": "" }, { "docid": "f508d7667d94a513980fc9ea65903eda", "score": "0.4344112", "text": "func addModel(endpoint string, obj minio.ObjectInfo) (mdl *model, err kv.Error) {\n\t// Deep copy the original minio object information and place it into the model collection\n\tcpy, errGo := copystructure.Copy(obj)\n\tif errGo != nil {\n\t\treturn nil, kv.Wrap(errGo).With(\"stack\", stack.Trace().TrimRuntime())\n\t}\n\tnewObj, ok := cpy.(minio.ObjectInfo)\n\tif !ok {\n\t\treturn nil, kv.NewError(\"unable to copy object info\").With(\"stack\", stack.Trace().TrimRuntime())\n\t}\n\n\t// To trigger a load clear out the ETag to invalidate the blobs etc\n\tnewObj.ETag = \"\"\n\n\tmdl = &model{\n\t\tobj: &newObj,\n\t\tblobs: map[string]*minio.ObjectInfo{},\n\t}\n\n\tGetModelIndex().Add(endpoint, newObj.Key, mdl)\n\n\treturn mdl, nil\n}", "title": "" }, { "docid": "d88de2628b108be0743d1bdf4e7fe00a", "score": "0.43440375", "text": "func (p *Point) Hit() map[string]any {\n\treturn p.point\n}", "title": "" }, { "docid": "c837d583fbd28de0d36ca1cda6a4f171", "score": "0.42921507", "text": "func NewModel(features ...*Feature) *Model {\n\tm := &Model{Features: make(map[string]*Feature, len(features))}\n\tfor _, f := range features {\n\t\tm.Features[f.Name] = f\n\t}\n\treturn m\n}", "title": "" }, { "docid": "4d726bc251313779711af844a7d9ace9", "score": "0.4260934", "text": "func ServiceClassModelToEntity(m *v1.ServiceClass) *ServiceClass {\n\ttags := make(map[string]string)\n\tfor _, t := range m.Tags {\n\t\ttags[t.Key] = t.Value\n\t}\n\te := ServiceClass{\n\t\tBaseEntity: entitystore.BaseEntity{\n\t\t\tName: *m.Name,\n\t\t\tTags: tags,\n\t\t\tStatus: statusMap[m.Status],\n\t\t\tReason: m.Reason,\n\t\t},\n\t}\n\treturn &e\n}", "title": "" }, { "docid": "eac359f93cf2d5f74857b01615aa931a", "score": "0.42597005", "text": "func (b *OpenAPI3Builder) buildModel(document *openapiv3.Document, sourceName string) (*Model, error) {\n\tb.model.Types = make([]*Type, 0)\n\tb.model.Methods = make([]*Method, 0)\n\t// Set model properties from passed-in document.\n\tb.model.Name = document.Info.Title\n\tb.buildFromDocument(document)\n\terr := b.buildSymbolicReferences(document, sourceName)\n\tif err != nil {\n\t\tlog.Printf(\"Error while building symbolic references. This might cause the plugin to fail: %v\", err)\n\t}\n\treturn b.model, nil\n}", "title": "" }, { "docid": "e5a11ac1edd9def6fb4a28093c9f2ae7", "score": "0.42556325", "text": "func NewScanModelHandler(fieldNames []string, model Model) ReplyHandler {\n\t// Create a modelRef that wraps the given model.\n\tcollection, err := getCollectionForModel(model)\n\tif err != nil {\n\t\treturn newAlwaysErrorHandler(err)\n\t}\n\tmr := &modelRef{\n\t\tcollection: collection,\n\t\tmodel: model,\n\t\tspec: collection.spec,\n\t}\n\t// Create and return a reply handler using newScanModelRefHandler\n\treturn newScanModelRefHandler(fieldNames, mr)\n}", "title": "" }, { "docid": "757445cd297c355c0390fd5aaa35e62e", "score": "0.4244253", "text": "func NewTeamFromModel(team model.Team, includeMembers bool) *apipb.Team {\n\tret := &apipb.Team{\n\t\tTeamId: &wrappers.StringValue{Value: team.ID.String()},\n\t\tTags: team.TagData(),\n\t}\n\tif includeMembers {\n\t\tret.Members = make([]*apipb.Member, 0)\n\t\tfor _, v := range team.Members {\n\t\t\tret.Members = append(ret.Members, NewMemberFromModel(team.ID, v))\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "4fc374b3c845becc8277b5e6596e9613", "score": "0.4227813", "text": "func (t *ToyKernel) GetModel(_type reflect.Type) *Model {\n\tif model, ok := t.CacheModels[_type]; ok == false {\n\t\tmodel = NewModel(_type)\n\t\tt.CacheModels[_type] = model\n\t}\n\treturn t.CacheModels[_type]\n}", "title": "" }, { "docid": "2945eac810d25370a2867ccf614ceaf1", "score": "0.4226069", "text": "func LoadModelFromMesh(data Mesh) Model {\n\treturn newModelFromPointer(unsafe.Pointer(js.Global.Get(\"Module\").Call(\"_LoadModelFromMesh\", data).Unsafe()))\n}", "title": "" }, { "docid": "171cb5a17b56670a506979081a411667", "score": "0.4196739", "text": "func (s *Selector) hit(x, y float64, m Mx) bool {\n\tm.Invert()\n\ttx, ty := m.Apply(x, y)\n\treturn tx >= -0.5 && tx <= 0.5 && ty >= -0.5 && ty <= 0.5\n}", "title": "" }, { "docid": "cb6ed7285686815190fd3977d0756609", "score": "0.4190633", "text": "func (dbc *MockDbContext) InsertModel(model interface{}) bool {\n\tnm := model.(*models.Key)\n\tnm.ID = 1\n\n\treturn true\n}", "title": "" }, { "docid": "59f16c86d455eb200db2424af5f026dc", "score": "0.41811493", "text": "func ServiceInstanceModelToEntity(m *v1.ServiceInstance) (*ServiceInstance, *ServiceBinding) {\n\ttags := make(map[string]string)\n\tfor _, t := range m.Tags {\n\t\ttags[t.Key] = t.Value\n\t}\n\te := ServiceInstance{\n\t\tBaseEntity: entitystore.BaseEntity{\n\t\t\tName: *m.Name,\n\t\t\tTags: tags,\n\t\t},\n\t\tServiceClass: *m.ServiceClass,\n\t\tServicePlan: *m.ServicePlan,\n\t\tParameters: m.Parameters,\n\t\tSecretParameters: m.SecretParameters,\n\t}\n\tb := ServiceBinding{\n\t\tBaseEntity: entitystore.BaseEntity{\n\t\t\tName: *m.Name,\n\t\t},\n\t}\n\tif m.Binding != nil {\n\t\tb.Parameters = m.Binding.Parameters\n\t\tb.SecretParameters = m.Binding.SecretParameters\n\t\tb.BindingSecret = m.Binding.BindingSecret\n\t}\n\treturn &e, &b\n}", "title": "" }, { "docid": "b054f807d9c13ae7e6a9cf08e2a943c6", "score": "0.41742876", "text": "func newModelRef(ref unsafe.Pointer) *gModel {\n\tif ref == nil {\n\t\treturn nil\n\t}\n\tobj := new(gModel)\n\tobj.ref16545ddd = (*C.Model)(unsafe.Pointer(ref))\n\treturn obj\n}", "title": "" }, { "docid": "188317aaabc79dedd852812008fb8a94", "score": "0.41441104", "text": "func CreateAWSClusterFromModel(clusterModel *model.ClusterModel) (*AWSCluster, error) {\n\tlog := logger.WithFields(logrus.Fields{\"action\": constants.TagGetCluster})\n\tlog.Debug(\"Create ClusterModel struct from the request\")\n\tawsCluster := AWSCluster{\n\t\tmodelCluster: clusterModel,\n\t}\n\tif awsCluster.modelCluster.Status == constants.Running {\n\t\t_, err := awsCluster.GetKubicornCluster()\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\treturn &awsCluster, nil\n}", "title": "" }, { "docid": "22d2bd27c648332d79957b52f74d3c13", "score": "0.41327333", "text": "func GetDocumentFromModel(model interface{}) (*bsonx.Doc, error) {\n\n\t// model to bytes\n\tbytes, marshalErr := bson.Marshal(model)\n\tif marshalErr != nil {\n\t\treturn nil, marshalErr\n\t}\n\n\t// bytes to bson document\n\tdoc, docErr := bsonx.ReadDoc(bytes)\n\tif docErr != nil {\n\t\treturn nil, docErr\n\t}\n\treturn &doc, nil\n}", "title": "" }, { "docid": "85debb148429a60df306dbc376f2adf3", "score": "0.41238466", "text": "func (i *Intersection) PrepareHit(ray Ray) {\n\ti.Point = *ray.Position(i.Time)\n\ti.EyeV = ray.Direction.Negate()\n\ti.NormalV = *i.Object.NormalAt(i.Point)\n\tif i.NormalV.Dot(i.EyeV) < 0 {\n\t\ti.Inside = true\n\t\ti.NormalV = i.NormalV.Negate()\n\t} else {\n\t\ti.Inside = false\n\t}\n}", "title": "" }, { "docid": "83d1ee73190e45358c1ca46ea64737c1", "score": "0.41046783", "text": "func NewModel() *Model {\n\treturn &Model{\n\t\tmodels: make(map[string]reflect.Value),\n\t}\n}", "title": "" }, { "docid": "b07d639771aab94fdd2f174f890eae65", "score": "0.40964615", "text": "func DrawModel(model Model, position Vector3, scale float32, tint Color) {\n\tjs.Global.Get(\"Module\").Call(\"_DrawModel\", model, position, scale, tint)\n}", "title": "" }, { "docid": "9594ee8ab76d032b4b5dfaa06e65b0d5", "score": "0.40859836", "text": "func (statement *LoadStatement) Model(model *models.EntityModel) *LoadStatement {\n\treturn statement.From(model)\n}", "title": "" }, { "docid": "2e35bcb020f646d318c8c2cfd2891bb8", "score": "0.40802395", "text": "func New(file, code, vuln string, line int) Hit {\n\treturn Hit{file, line, code, vuln}\n}", "title": "" }, { "docid": "cc4481e66b6c937375ae4faf9215b5a1", "score": "0.4078172", "text": "func (a *ActionCreateModel) ApplyToMetric(metric *data_receiver.Metric) (*data_receiver.Model, error) {\n\tdropMetadataKeysMap := make(map[string]interface{}, len(a.DropMetadataKeys))\n\tfor _, key := range a.DropMetadataKeys {\n\t\tdropMetadataKeysMap[key] = nil\n\t}\n\n\tdimensions := make(map[string]string)\n\tfor k, v := range metric.Dimensions {\n\t\tdimensions[k] = v\n\t}\n\n\tmetadataFields := metadata.FromStringMap(nil)\n\tfor k, v := range metric.GetMetadataFields().GetFields() {\n\t\tif _, ok := dropMetadataKeysMap[k]; !ok {\n\t\t\tmetadataFields.Fields[k] = v\n\t\t}\n\t}\n\n\tif a.ParsedNameTemplate != nil {\n\t\tmustache.AllowMissingVariables = false\n\t\tr, err := a.ParsedNameTemplate.Render(getTemplateContext(metric))\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tmetadataFields.Fields[\"name\"] = metadata.FromString(r)\n\t}\n\n\treturn &data_receiver.Model{\n\t\tTimestamp: metric.Timestamp,\n\t\tDimensions: dimensions,\n\t\tMetadataFields: metadataFields,\n\t}, nil\n}", "title": "" }, { "docid": "705326fdee0e797e1e262ff45587b7a7", "score": "0.40738952", "text": "func NewModel(ctx *pulumi.Context,\n\tname string, args *ModelArgs, opts ...pulumi.ResourceOption) (*Model, error) {\n\tif args == nil || args.ContentType == nil {\n\t\treturn nil, errors.New(\"missing required argument 'ContentType'\")\n\t}\n\tif args == nil || args.RestApi == nil {\n\t\treturn nil, errors.New(\"missing required argument 'RestApi'\")\n\t}\n\tif args == nil {\n\t\targs = &ModelArgs{}\n\t}\n\tvar resource Model\n\terr := ctx.RegisterResource(\"aws:apigateway/model:Model\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "51e0d0a48dc9268c6823c406f3f47230", "score": "0.4029207", "text": "func NewTokenFromModel(token model.Token) *apipb.Token {\n\treturn &apipb.Token{\n\t\tResource: &wrappers.StringValue{Value: token.Resource},\n\t\tWrite: &wrappers.BoolValue{Value: token.Write},\n\t\tToken: &wrappers.StringValue{Value: token.Token},\n\t\tTags: token.TagData(),\n\t}\n}", "title": "" }, { "docid": "df7da61fef6959539c22bf04e5534788", "score": "0.40120745", "text": "func (m *Model) Predict(r ModelReq) Prediction {\n\t// should find a way to do this w/o re-encoding\n\tvar buf bytes.Buffer\n\terr := json.NewEncoder(&buf).Encode(r)\n\tif err != nil {\n\t\tlog.Error(\"error encoding prediction \", err)\n\t\treturn Prediction{}\n\t}\n\n\tif m.req == nil {\n\t\tlog.Errorf(\"request chan for model %v is nil\", m.ID)\n\t\treturn Prediction{}\n\t}\n\tm.req <- buf.Bytes()\n\tresp := <-m.rep\n\n\tvar pred []map[string]float64\n\terr = json.NewDecoder(bytes.NewReader(resp)).Decode(&pred)\n\tif err != nil {\n\t\tlog.Error(\"error decoding prediction \", err)\n\t}\n\n\tprediction := Prediction{\n\t\tModelID: r.ModelID,\n\t\tLabels: pred,\n\t}\n\n\treturn prediction\n}", "title": "" }, { "docid": "82745b0d3a2d226413a6c21e4c558eb8", "score": "0.40059856", "text": "func CreateEKSClusterFromModel(clusterModel *model.ClusterModel) (*EKSCluster, error) {\n\tdb := global.DB()\n\n\tm := eksmodel.EKSClusterModel{\n\t\tClusterID: clusterModel.ID,\n\t}\n\n\terr := db.Where(m).Preload(\"Cluster\").Preload(\"NodePools\").Preload(\"Subnets\").First(&m).Error\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trepository, err := NewDBEKSClusterRepository(db)\n\tif err != nil {\n\t\treturn nil, errors.WrapIf(err, \"failed to create DB EKS cluster repository\")\n\t}\n\n\tlog := log.WithFields(logrus.Fields{\"cluster\": clusterModel.Name, \"clusterID\": m.Cluster.ID})\n\n\treturn &EKSCluster{\n\t\trepository: repository,\n\t\tmodel: &m,\n\t\tlog: log.WithField(\"cluster\", clusterModel.Name),\n\t}, nil\n}", "title": "" }, { "docid": "1a666fdc3dfb5082785c35a8b59b3a32", "score": "0.40046087", "text": "func createEs(id int64, model interface{}) error {\n modelName := getModelName(model)\n es := *connection.es\n index := dbSettings.ElasticSearch.Index\n key := modelName + \":\" + strconv.FormatInt(id, 10)\n\n reflect.ValueOf(model).Elem().FieldByName(\"ID\").SetInt(id)\n\n _, err := es.Index().\n Index(index).\n Type(modelName).\n Refresh(true).\n Id(key).\n BodyJson(model).Do()\n\n if err != nil {\n return err\n }\n\n return nil\n}", "title": "" }, { "docid": "2799259a4ca694813b4d4999f0c07af7", "score": "0.39986286", "text": "func NewSpkModel() {\n\t// TODO\n}", "title": "" }, { "docid": "d7ac695d74812b67e4f9c2ea85c62f75", "score": "0.39975137", "text": "func (l SurfaceList) Hit(r *util.Ray, tMin, tMax float64) *pathcaster.Hit {\n\tminDistanceHit := new(pathcaster.Hit)\n\tminDistance := tMax\n\tfor _, surf := range l {\n\t\thit := surf.Hit(r, tMin, minDistance)\n\t\tif hit != nil {\n\t\t\tdistance := hit.Position.Sub(r.Position).Mag()\n\t\t\tif distance > tMin && distance < minDistance {\n\t\t\t\tminDistanceHit = hit\n\t\t\t\tminDistance = distance\n\t\t\t}\n\t\t}\n\t}\n\tif minDistance == tMax {\n\t\treturn nil\n\t}\n\treturn minDistanceHit\n}", "title": "" }, { "docid": "8f4e2ed25912aca939f075e8279db252", "score": "0.3997176", "text": "func HostInfoToHostModel(hostModels []*models_v0.Host) []*hostsvc.HostInfo {\n\thInfos := make([]*hostsvc.HostInfo, 0, len(hostModels))\n\tfor _, hModel := range hostModels {\n\t\thInfos = append(hInfos, hModel.Host)\n\t}\n\treturn hInfos\n}", "title": "" }, { "docid": "66c97ffddd34ed257f9902b0c02b6504", "score": "0.39825332", "text": "func NewDictionaryFromModelDefinition(estimator, prefix string) Dictionary {\n\tisXGBoostModel := strings.HasPrefix(estimator, \"xgboost\")\n\tre := regexp.MustCompile(\"[^a-z]\")\n\n\tvar d = Dictionary{}\n\tfor param, doc := range PremadeModelParamsDocs[estimator] {\n\t\tdesc := &description{unknownType, nil, doc, nil}\n\t\td[prefix+param] = desc\n\n\t\tif !isXGBoostModel {\n\t\t\tcontinue\n\t\t}\n\n\t\t// Fill typ field according to the model parameter doc\n\t\t// The doc would be like: \"int Maximum tree depth for base learners\"\n\t\tpieces := strings.SplitN(strings.TrimSpace(desc.doc), \" \", 2)\n\t\tif len(pieces) != 2 {\n\t\t\tcontinue\n\t\t}\n\n\t\tmaybeType := re.ReplaceAllString(pieces[0], \"\")\n\t\tswitch strings.ToLower(maybeType) {\n\t\tcase \"float\":\n\t\t\tdesc.typ = floatType\n\t\t\tdesc.doc = pieces[1]\n\t\tcase \"int\":\n\t\t\tdesc.typ = intType\n\t\t\tdesc.doc = pieces[1]\n\t\tcase \"string\":\n\t\t\tdesc.typ = stringType\n\t\t\tdesc.doc = pieces[1]\n\t\tcase \"boolean\":\n\t\t\tdesc.typ = boolType\n\t\t\tdesc.doc = pieces[1]\n\t\t}\n\t}\n\treturn d\n}", "title": "" }, { "docid": "cd3d40eb7ff4eb1af5f238be49c1f41c", "score": "0.39736277", "text": "func NewModel(cTransform Matrix, cMeshCount int32, cMaterialCount int32, cMeshes []Mesh, cMaterials []Material, cMeshMaterial []int32, cBoneCount int32, cBones []BoneInfo, cBindPose []Transform) Model {\n\tobj := *new(gModel)\n\tobj.gTransform = *newMatrixRef(unsafe.Pointer(&cTransform))\n\tobj.gMeshCount = cMeshCount\n\tobj.gMaterialCount = cMaterialCount\n\n\tvar meshes0 []gMesh\n\tfor i0 := range cMeshes {\n\t\tp0 := *newMeshRef(unsafe.Pointer(&cMeshes[i0]))\n\t\tmeshes0 = append(meshes0, p0)\n\t}\n\tobj.gMeshes = meshes0\n\n\tvar materials0 []gMaterial\n\tfor i0 := range cMaterials {\n\t\tp0 := *newMaterialRef(unsafe.Pointer(&cMaterials[i0]))\n\t\tmaterials0 = append(materials0, p0)\n\t}\n\tobj.gMaterials = materials0\n\tobj.gMeshMaterial = cMeshMaterial\n\tobj.gBoneCount = cBoneCount\n\n\tvar bones0 []gBoneInfo\n\tfor i0 := range cBones {\n\t\tp0 := *newBoneInfoRef(unsafe.Pointer(&cBones[i0]))\n\t\tbones0 = append(bones0, p0)\n\t}\n\tobj.gBones = bones0\n\n\tvar bindPose0 []gTransform\n\tfor i0 := range cBindPose {\n\t\tp0 := *newTransformRef(unsafe.Pointer(&cBindPose[i0]))\n\t\tbindPose0 = append(bindPose0, p0)\n\t}\n\tobj.gBindPose = bindPose0\n\n\tret0, alloc0 := obj.passRef()\n\n\tif len(alloc0.m) > 0 {\n\t\tpanic(\"Cgo memory alloced, please use func AllocModel.\")\n\t}\n\treturn *(*Model)(unsafe.Pointer(ret0))\n}", "title": "" }, { "docid": "91fef7e8d02ad1f819602563976e5420", "score": "0.39674628", "text": "func (s *RouteStats) Hit(res Response, t time.Duration) {\n\thits := atomic.AddInt64(&s.hits, 1)\n\tstatus := res.Status()\n\tif status > 499 {\n\t\tatomic.AddInt64(&s.failures, 1)\n\t} else if status > 399 {\n\t\tatomic.AddInt64(&s.errors, 1)\n\t} else {\n\t\tatomic.AddInt64(&s.oks, 1)\n\t}\n\tif t > s.Treshold {\n\t\tatomic.AddInt64(&s.slow, 1)\n\t}\n\tif res.Cached() {\n\t\tatomic.AddInt64(&s.cached, 1)\n\t} else {\n\t\t//don't sample cache hits it'll make us look too good\n\t\ts.sample(hits, t)\n\t}\n}", "title": "" }, { "docid": "88710378edbf85f4538699c7e92dc0d5", "score": "0.39537305", "text": "func EntityToModel(e *Entity, m *Model) {\n\tm.ID = e.ID\n\tm.Category = e.Category\n\tm.CreatedAt = e.CreatedAt\n\tm.UpdatedAt = e.UpdatedAt\n}", "title": "" }, { "docid": "0bfb46d4a186f6ecbbb76b3e166b1afe", "score": "0.39511973", "text": "func NewMockHitMiss(ctrl *gomock.Controller) *MockHitMiss {\n\tmock := &MockHitMiss{ctrl: ctrl}\n\tmock.recorder = &MockHitMissMockRecorder{mock}\n\treturn mock\n}", "title": "" }, { "docid": "5c50a9c6012ea1d7d3a936f294a86290", "score": "0.39494285", "text": "func (a *ModelActivity) Eval(context activity.Context) (done bool, err error) {\r\n\r\n\tvar i1 = C.double(float64(context.GetInput(\"_x__\").(float64)))\r\n\tvar i2 = C.double(float64(context.GetInput(\"_y__\").(float64)))\r\n\tvar i3 = C.double(float64(context.GetInput(\"_z__\").(float64)))\r\n\tvar i4 = C.double(float64(context.GetInput(\"_x1__\").(float64)))\r\n\tvar i5 = C.double(float64(context.GetInput(\"_x2__\").(float64)))\r\n\tvar i6 = C.double(float64(context.GetInput(\"_x3__\").(float64)))\r\n\tvar i7 = C.double(float64(context.GetInput(\"_x4__\").(float64)))\r\n\tvar i8 = C.double(float64(context.GetInput(\"_x5__\").(float64)))\r\n\tvar i9 = C.double(float64(context.GetInput(\"_x6__\").(float64)))\r\n\tvar i10 = C.double(float64(context.GetInput(\"_x7__\").(float64)))\r\n\tvar i11 = C.double(float64(context.GetInput(\"_x8__\").(float64)))\r\n\tvar i12 = C.double(float64(context.GetInput(\"_x9__\").(float64)))\r\n\tvar i13 = C.double(float64(context.GetInput(\"_x10__\").(float64)))\r\n\tvar i14 = C.double(float64(context.GetInput(\"_y1__\").(float64)))\r\n\tvar i15 = C.double(float64(context.GetInput(\"_y2__\").(float64)))\r\n\tvar i16 = C.double(float64(context.GetInput(\"_y3__\").(float64)))\r\n\tvar i17 = C.double(float64(context.GetInput(\"_y4__\").(float64)))\r\n\tvar i18 = C.double(float64(context.GetInput(\"_y5__\").(float64)))\r\n\tvar i19 = C.double(float64(context.GetInput(\"_y6__\").(float64)))\r\n\tvar i20 = C.double(float64(context.GetInput(\"_y7__\").(float64)))\r\n\tvar i21 = C.double(float64(context.GetInput(\"_y8__\").(float64)))\r\n\tvar i22 = C.double(float64(context.GetInput(\"_y9__\").(float64)))\r\n\tvar i23 = C.double(float64(context.GetInput(\"_y10__\").(float64)))\r\n\tvar i24 = C.double(float64(context.GetInput(\"_z1__\").(float64)))\r\n\tvar i25 = C.double(float64(context.GetInput(\"_z2__\").(float64)))\r\n\tvar i26 = C.double(float64(context.GetInput(\"_z3__\").(float64)))\r\n\tvar i27 = C.double(float64(context.GetInput(\"_z4__\").(float64)))\r\n\tvar i28 = C.double(float64(context.GetInput(\"_z5__\").(float64)))\r\n\tvar i29 = C.double(float64(context.GetInput(\"_z6__\").(float64)))\r\n\tvar i30 = C.double(float64(context.GetInput(\"_z7__\").(float64)))\r\n\tvar i31 = C.double(float64(context.GetInput(\"_z8__\").(float64)))\r\n\tvar i32 = C.double(float64(context.GetInput(\"_z9__\").(float64)))\r\n\tvar i33 = C.double(float64(context.GetInput(\"_z10__\").(float64)))\r\n\r\n\tvar result C.char\r\n\tC._BTrees_Prediction_T16_25_1(&i1, &i2, &i3, &i4, &i5, &i6, &i7, &i8, &i9, &i10, &i11, &i12, &i13, &i14, &i15, &i16, &i17, &i18, &i19, &i20, &i21, &i22, &i23, &i24, &i25, &i26, &i27, &i28, &i29, &i30, &i31, &i32, &i33, &result)\r\n\r\n\tcontext.SetOutput(\"result\", C.GoString(&result))\r\n\r\n\treturn true, nil\r\n}", "title": "" }, { "docid": "e2f1758bad9c2ddab8f428500e727256", "score": "0.39480558", "text": "func (s *Shot) OnHit() {\n\ts.isActive = false\n\tif rand.Float64() > 0.5 {\n\t\teffect.CreateHitEffect(s.x, s.y)\n\t} else {\n\t\teffect.CreateHitLargeEffect(s.x, s.y)\n\t}\n}", "title": "" }, { "docid": "0170761d4db1d6b8151aa1bac438ffeb", "score": "0.3947869", "text": "func CreateModel(obj interface{}, inputString string) error {\n\t// fmt.Printf(\"CreateModel inputString: %s\", inputString)\n\terr := json.Unmarshal([]byte(inputString), &obj)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error in creating asset %s\", err.Error())\n\t}\n\tif err = defaults.Set(obj); err != nil {\n\t\treturn fmt.Errorf(\"Failure in default setting %s \", err.Error())\n\t}\n\terr = validators.ValidateStruct(obj)\n\tif err != nil {\n\t\tfmt.Println(\"Validation Failed\")\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "719fc00538dd999dea5b2317c988ccfe", "score": "0.39355087", "text": "func GetDeviceForModel(model string) (*Device, error) {\n\n\tdevices, err := GetDevices()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfor _, device := range devices {\n\t\tif device.Target == model {\n\t\t\treturn &device, nil\n\t\t}\n\t}\n\n\treturn nil, fmt.Errorf(\"device not found\")\n}", "title": "" }, { "docid": "1df03eb7cc16955e4375a56931cf10d9", "score": "0.39065114", "text": "func newGatewayFromModel(gateway model.Gateway) apiGateway {\n\treturn apiGateway{\n\t\tGatewayEUI: gateway.GatewayEUI.String(),\n\t\tIP: gateway.IP.String(),\n\t\tStrictIP: gateway.StrictIP,\n\t\tLatitude: gateway.Latitude,\n\t\tLongitude: gateway.Longitude,\n\t\tAltitude: gateway.Altitude,\n\t\tTags: gateway.Tags.Tags(),\n\t}\n}", "title": "" }, { "docid": "85164fffa61a62096ab222ca5ad9189a", "score": "0.38916692", "text": "func NewModel() *Model {\n\tm := &Model{\n\t\tPC: 0x0600,\n\t\tMemory: NewMemory(),\n\t\tRegisters: NewRegisters(),\n\t\tFlags: NewFlags(),\n\t}\n\tm.opcodes = InitOpcodes(m)\n\treturn m\n\n}", "title": "" }, { "docid": "d47d855bdc5ce64dbc68bd6cf3388a14", "score": "0.3876995", "text": "func NewHitTracker(historySize, avgThreshold uint64) *HitTracker {\n\treturn &HitTracker{\n\t\tHits: make([]uint64, historySize),\n\t\tAvgThreshold: uint64(avgThreshold),\n\t}\n}", "title": "" }, { "docid": "cb96ba04d43c7a7e7a2134134b399001", "score": "0.38715678", "text": "func NewTagModel(tag string) *TagModel {\n\tthis := TagModel{}\n\tthis.Tag = tag\n\treturn &this\n}", "title": "" }, { "docid": "eb8e0438a9fb8930daa98cf3d6994633", "score": "0.3857765", "text": "func New(modelPath string) *Detector {\n\treturn &Detector{modelPath: modelPath, modelTags: []string{\"serve\"}}\n}", "title": "" }, { "docid": "26538644b0473c4d223e3ca361f643de", "score": "0.38538864", "text": "func (a *Forj) Model(object_name, instance_name, key string) *ForjModel {\n\tffd := a.f.InMemForjfile()\n\tdata := ForjModel{\n\t\tForjfile: forjfile.NewDeployForgeModel(ffd),\n\t\tDeployments: forjfile.NewDeploymentsModel(a.f.GetDeployments()),\n\t\tCurrent: ForjCurrentModel{\n\t\t\tType: object_name,\n\t\t\tName: instance_name,\n\t\t\tDeployment: a.f.GetDeployment(),\n\t\t\tData: ffd.GetObjectInstance(object_name, instance_name),\n\t\t\tCreds: a.s.GetObjectInstance(object_name, instance_name),\n\t\t},\n\t}\n\tdata.Secret = \"\"\n\tif v, found := data.Current.Creds[key]; found {\n\t\tdata.Secret, _ = v.GetString()\n\t}\n\treturn &data\n}", "title": "" }, { "docid": "633d78cf6a680794abcaec9e0d45700c", "score": "0.38415992", "text": "func NewModelFromOpenAPI3(document *openapiv3.Document, sourceName string) (*Model, error) {\n\treturn newOpenAPI3Builder(document).buildModel(document, sourceName)\n}", "title": "" }, { "docid": "f435e90be83b2a84ebb8bff54ddd1cd4", "score": "0.38335449", "text": "func newDeviceFromModel(device *model.Device) apiDevice {\n\tvar state = deviceTypeOTAA\n\tif device.State == model.PersonalizedDevice {\n\t\tstate = deviceTypeABP\n\t}\n\treturn apiDevice{\n\t\tDeviceEUI: device.DeviceEUI.String(),\n\t\teui: device.DeviceEUI,\n\t\tDevAddr: device.DevAddr.String(),\n\t\tda: device.DevAddr,\n\t\takey: device.AppKey,\n\t\tAppKey: device.AppKey.String(),\n\t\tAppSKey: device.AppSKey.String(),\n\t\taskey: device.AppSKey,\n\t\tNwkSKey: device.NwkSKey.String(),\n\t\tnskey: device.NwkSKey,\n\t\tFCntDn: device.FCntDn,\n\t\tFCntUp: device.FCntUp,\n\t\tRelaxedCounter: device.RelaxedCounter,\n\t\tDeviceType: state,\n\t\tKeyWarning: device.KeyWarning,\n\t\tTags: device.Tags.Tags(),\n\t}\n}", "title": "" }, { "docid": "8a9404ba8e67397f44b3004aa37adb5b", "score": "0.38278344", "text": "func (s *visitlogserver) handleHit() http.HandlerFunc {\n\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\t// parse out the cannonical URI\n\t\turi := r.FormValue(\"uri\")\n\n\t\t// sanity check\n\t\tif uri == \"\" {\n\t\t\thttp.Error(w, \"No Uri\", http.StatusBadRequest)\n\t\t\tlog.Print(\"BAD REQUEST - No uri\")\n\t\t\treturn\n\t\t}\n\t\trealURI, err := canonicalizeURI(uri)\n\t\tif err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\tlog.Print(\"BAD REQUEST - bad uri - \" + uri)\n\t\t\treturn\n\t\t}\n\n\t\tvar record logrecord\n\t\tif r.Method == \"POST\" {\n\t\t\trecord = s.db.updateURI(realURI, \"hit\")\n\t\t} else {\n\t\t\trecord, _ = s.db.getURI(realURI, \"hit\")\n\t\t}\n\n\t\tlog.Print(fmt.Sprintf(\"%s %d\", realURI, record.Count))\n\n\t\tresult := vistresult{CannonicalURI: realURI,\n\t\t\tCount: record.Count}\n\t\tb, _ := json.Marshal(result)\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\tw.Write(b)\n\t}\n}", "title": "" }, { "docid": "15e7e7a5722390384a9736276549290f", "score": "0.38186917", "text": "func (c *converter) ToEntity(apiModel *model.APIDefinition) *Entity {\n\tvisibility := apiModel.Visibility\n\tif visibility == nil {\n\t\tvisibility = str.Ptr(\"public\")\n\t}\n\n\treturn &Entity{\n\t\tApplicationID: repo.NewNullableString(apiModel.ApplicationID),\n\t\tApplicationTemplateVersionID: repo.NewNullableString(apiModel.ApplicationTemplateVersionID),\n\t\tPackageID: repo.NewNullableString(apiModel.PackageID),\n\t\tName: apiModel.Name,\n\t\tDescription: repo.NewNullableString(apiModel.Description),\n\t\tGroup: repo.NewNullableString(apiModel.Group),\n\t\tTargetURLs: repo.NewNullableStringFromJSONRawMessage(apiModel.TargetURLs),\n\t\tOrdID: repo.NewNullableString(apiModel.OrdID),\n\t\tLocalTenantID: repo.NewNullableString(apiModel.LocalTenantID),\n\t\tShortDescription: repo.NewNullableString(apiModel.ShortDescription),\n\t\tSystemInstanceAware: repo.NewNullableBool(apiModel.SystemInstanceAware),\n\t\tPolicyLevel: repo.NewNullableString(apiModel.PolicyLevel),\n\t\tCustomPolicyLevel: repo.NewNullableString(apiModel.CustomPolicyLevel),\n\t\tAPIProtocol: repo.NewNullableString(apiModel.APIProtocol),\n\t\tTags: repo.NewNullableStringFromJSONRawMessage(apiModel.Tags),\n\t\tCountries: repo.NewNullableStringFromJSONRawMessage(apiModel.Countries),\n\t\tLinks: repo.NewNullableStringFromJSONRawMessage(apiModel.Links),\n\t\tAPIResourceLinks: repo.NewNullableStringFromJSONRawMessage(apiModel.APIResourceLinks),\n\t\tReleaseStatus: repo.NewNullableString(apiModel.ReleaseStatus),\n\t\tSunsetDate: repo.NewNullableString(apiModel.SunsetDate),\n\t\tSuccessors: repo.NewNullableStringFromJSONRawMessage(apiModel.Successors),\n\t\tChangeLogEntries: repo.NewNullableStringFromJSONRawMessage(apiModel.ChangeLogEntries),\n\t\tLabels: repo.NewNullableStringFromJSONRawMessage(apiModel.Labels),\n\t\tVisibility: *visibility,\n\t\tDisabled: repo.NewNullableBool(apiModel.Disabled),\n\t\tPartOfProducts: repo.NewNullableStringFromJSONRawMessage(apiModel.PartOfProducts),\n\t\tLineOfBusiness: repo.NewNullableStringFromJSONRawMessage(apiModel.LineOfBusiness),\n\t\tIndustry: repo.NewNullableStringFromJSONRawMessage(apiModel.Industry),\n\t\tImplementationStandard: repo.NewNullableString(apiModel.ImplementationStandard),\n\t\tCustomImplementationStandard: repo.NewNullableString(apiModel.CustomImplementationStandard),\n\t\tCustomImplementationStandardDescription: repo.NewNullableString(apiModel.CustomImplementationStandardDescription),\n\t\tVersion: c.convertVersionToEntity(apiModel.Version),\n\t\tExtensible: repo.NewNullableStringFromJSONRawMessage(apiModel.Extensible),\n\t\tResourceHash: repo.NewNullableString(apiModel.ResourceHash),\n\t\tHierarchy: repo.NewNullableStringFromJSONRawMessage(apiModel.Hierarchy),\n\t\tDocumentationLabels: repo.NewNullableStringFromJSONRawMessage(apiModel.DocumentationLabels),\n\t\tSupportedUseCases: repo.NewNullableStringFromJSONRawMessage(apiModel.SupportedUseCases),\n\t\tCorrelationIDs: repo.NewNullableStringFromJSONRawMessage(apiModel.CorrelationIDs),\n\t\tBaseEntity: &repo.BaseEntity{\n\t\t\tID: apiModel.ID,\n\t\t\tReady: apiModel.Ready,\n\t\t\tCreatedAt: apiModel.CreatedAt,\n\t\t\tUpdatedAt: apiModel.UpdatedAt,\n\t\t\tDeletedAt: apiModel.DeletedAt,\n\t\t\tError: repo.NewNullableString(apiModel.Error),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "d18363cad5e0290939cb7282635679a9", "score": "0.3818686", "text": "func AllocModel(cTransform Matrix, cMeshCount int32, cMaterialCount int32, cMeshes []Mesh, cMaterials []Material, cMeshMaterial []int32, cBoneCount int32, cBones []BoneInfo, cBindPose []Transform) (*Model, *cgoAllocMap) {\n\tobj := *new(gModel)\n\tobj.gTransform = *newMatrixRef(unsafe.Pointer(&cTransform))\n\tobj.gMeshCount = cMeshCount\n\tobj.gMaterialCount = cMaterialCount\n\n\tvar meshes0 []gMesh\n\tfor i0 := range cMeshes {\n\t\tp0 := *newMeshRef(unsafe.Pointer(&cMeshes[i0]))\n\t\tmeshes0 = append(meshes0, p0)\n\t}\n\tobj.gMeshes = meshes0\n\n\tvar materials0 []gMaterial\n\tfor i0 := range cMaterials {\n\t\tp0 := *newMaterialRef(unsafe.Pointer(&cMaterials[i0]))\n\t\tmaterials0 = append(materials0, p0)\n\t}\n\tobj.gMaterials = materials0\n\tobj.gMeshMaterial = cMeshMaterial\n\tobj.gBoneCount = cBoneCount\n\n\tvar bones0 []gBoneInfo\n\tfor i0 := range cBones {\n\t\tp0 := *newBoneInfoRef(unsafe.Pointer(&cBones[i0]))\n\t\tbones0 = append(bones0, p0)\n\t}\n\tobj.gBones = bones0\n\n\tvar bindPose0 []gTransform\n\tfor i0 := range cBindPose {\n\t\tp0 := *newTransformRef(unsafe.Pointer(&cBindPose[i0]))\n\t\tbindPose0 = append(bindPose0, p0)\n\t}\n\tobj.gBindPose = bindPose0\n\n\tret0, alloc0 := obj.passRef()\n\tret1 := (*Model)(unsafe.Pointer(ret0))\n\treturn ret1, alloc0\n}", "title": "" }, { "docid": "d0b058800a9ba38ebac898de5013f901", "score": "0.38170937", "text": "func (_m *EventAPIDefinitionConverter) ToEntity(apiModel *model.EventDefinition) *eventdef.Entity {\n\tret := _m.Called(apiModel)\n\n\tvar r0 *eventdef.Entity\n\tif rf, ok := ret.Get(0).(func(*model.EventDefinition) *eventdef.Entity); ok {\n\t\tr0 = rf(apiModel)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*eventdef.Entity)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "a4ae325ab52d91ba30a7ff91742c8d60", "score": "0.3815584", "text": "func NewDeviceFromModel(d model.Device, c model.Collection) *apipb.Device {\n\tret := &apipb.Device{\n\t\tDeviceId: &wrappers.StringValue{Value: d.ID.String()},\n\t\tCollectionId: &wrappers.StringValue{Value: d.CollectionID.String()},\n\t\tImsi: &wrappers.StringValue{Value: fmt.Sprintf(\"%d\", d.IMSI)},\n\t\tImei: &wrappers.StringValue{Value: fmt.Sprintf(\"%d\", d.IMEI)},\n\t\tTags: d.Tags.TagMap,\n\t\tNetwork: NewNetworkMetadataFromModel(d.Network, c.FieldMask),\n\t\tFirmware: NewFirmwareMetadataFromModel(d.Firmware),\n\t}\n\n\tif c.FieldMask.IsSet(model.IMEIMask) {\n\t\tret.Imei = nil\n\t}\n\tif c.FieldMask.IsSet(model.IMSIMask) {\n\t\tret.Imsi = nil\n\t}\n\t// override with values from collection if collection management is used.\n\tif c.Firmware.Management == model.CollectionManagement {\n\t\tret.Firmware.CurrentFirmwareId = nil\n\t\tif c.Firmware.CurrentFirmwareID != 0 {\n\t\t\tret.Firmware.CurrentFirmwareId = &wrappers.StringValue{Value: c.Firmware.CurrentFirmwareID.String()}\n\t\t}\n\t\tret.Firmware.TargetFirmwareId = nil\n\t\tif c.Firmware.TargetFirmwareID != 0 {\n\t\t\tret.Firmware.TargetFirmwareId = &wrappers.StringValue{Value: c.Firmware.TargetFirmwareID.String()}\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "ca51c657d99937b4565d29b633533ade", "score": "0.38140473", "text": "func NewFirmwareMetadataFromModel(m model.DeviceFirmwareMetadata) *apipb.FirmwareMetadata {\n\tstate := apipb.FirmwareMetadata_Current\n\tswitch m.State {\n\tcase model.Current:\n\t\tstate = apipb.FirmwareMetadata_Current\n\tcase model.Initializing:\n\t\tstate = apipb.FirmwareMetadata_Initializing\n\tcase model.Pending:\n\t\tstate = apipb.FirmwareMetadata_Pending\n\tcase model.Downloading:\n\t\tstate = apipb.FirmwareMetadata_Downloading\n\tcase model.Completed:\n\t\tstate = apipb.FirmwareMetadata_Completed\n\tcase model.UpdateFailed:\n\t\tstate = apipb.FirmwareMetadata_UpdateFailed\n\tcase model.TimedOut:\n\t\tstate = apipb.FirmwareMetadata_TimedOut\n\tcase model.Reverted:\n\t\tstate = apipb.FirmwareMetadata_Reverted\n\tdefault:\n\t\t// Unknown state - set to current\n\t\tstate = apipb.FirmwareMetadata_Current\n\t}\n\treturn &apipb.FirmwareMetadata{\n\t\tCurrentFirmwareId: &wrappers.StringValue{Value: m.CurrentFirmwareID.String()},\n\t\tTargetFirmwareId: &wrappers.StringValue{Value: m.TargetFirmwareID.String()},\n\t\tSerialNumber: &wrappers.StringValue{Value: m.SerialNumber},\n\t\tModelNumber: &wrappers.StringValue{Value: m.ModelNumber},\n\t\tManufacturer: &wrappers.StringValue{Value: m.Manufacturer},\n\t\tFirmwareVersion: &wrappers.StringValue{Value: m.FirmwareVersion},\n\t\tStateMessage: &wrappers.StringValue{Value: m.StateMessage},\n\t\tState: &wrappers.StringValue{Value: state.String()},\n\t}\n}", "title": "" }, { "docid": "6b40b7f0c174492cedf8842ca50547ba", "score": "0.37955388", "text": "func (db *Database) CreateModel(model *Model) {\n\tresult, err := db.Collections.Models.InsertOne(context.TODO(), model)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tmodel.ID = result.InsertedID.(primitive.ObjectID)\n}", "title": "" }, { "docid": "d6b1a8f224e10180200882d92048673b", "score": "0.37929463", "text": "func (x *gRayHitInfo) convert() *RayHitInfo {\n\tif x.refb8de43a9 != nil {\n\t\treturn (*RayHitInfo)(unsafe.Pointer(x.refb8de43a9))\n\t}\n\tx.passRef()\n\treturn (*RayHitInfo)(unsafe.Pointer(x.refb8de43a9))\n}", "title": "" }, { "docid": "a42a58d3737befeeecdd0656463c7974", "score": "0.37913477", "text": "func (xs Intersections) Hit() *Intersection {\n\tif len(xs) == 0 {\n\t\treturn nil\n\t}\n\tminIndex := -1\n\tfor i := 0; i < len(xs); i++ {\n\t\tx := xs[i]\n\t\tif x.Time > 0 {\n\t\t\tif minIndex < 0 {\n\t\t\t\tminIndex = i\n\t\t\t} else {\n\t\t\t\tif xs[minIndex].Time > xs[i].Time {\n\t\t\t\t\tminIndex = i\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif minIndex < 0 {\n\t\treturn nil\n\t}\n\treturn xs[minIndex]\n}", "title": "" }, { "docid": "e7094a8b2dfb408ff4d07140fe78f256", "score": "0.37905377", "text": "func NewNetworkMetadataFromModel(m model.DeviceNetworkMetadata, fieldMask model.FieldMask) *apipb.NetworkMetadata {\n\tallocTime := timeToMillis(m.AllocatedAt)\n\tif allocTime < 0 {\n\t\tallocTime = 0\n\t}\n\tret := &apipb.NetworkMetadata{\n\t\tAllocatedIp: &wrappers.StringValue{Value: m.AllocatedIP},\n\t\tAllocatedAt: &wrappers.DoubleValue{Value: allocTime},\n\t\tCellId: &wrappers.Int64Value{Value: m.CellID},\n\t}\n\tif fieldMask.IsSet(model.LocationMask) {\n\t\tret.CellId = nil\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "0b6271602ce0114b073ac317174e8c4a", "score": "0.37825662", "text": "func NewModel(model types.ModelType) Model {\n\tresult := Model{}\n\tresult.AppDb = model.AppDb\n\tresult.TableName = model.TableName\n\tresult.RecordDesc = model.RecordDesc\n\tresult.TimeStamp = model.TimeStamp\n\tresult.ActorStamp = model.ActorStamp\n\tresult.ActiveStamp = model.ActiveStamp\n\tresult.Relations = model.Relations\n\tresult.ComputedMethods = model.ComputedMethods\n\tresult.ValidateMethods = model.ValidateMethods\n\tresult.AlterSyncTable = model.AlterSyncTable\n\n\t// Default values\n\tif !result.TimeStamp {\n\t\tresult.TimeStamp = true\n\t}\n\tif !result.ActiveStamp {\n\t\tresult.ActiveStamp = true\n\t}\n\tif !result.ActorStamp {\n\t\tresult.ActorStamp = true\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "f15b4fa2886865bc396802d00a510001", "score": "0.37773797", "text": "func ConvertModel(r io.ReadSeeker) *Model {\n\tmodel := &Model{}\n\n\t// Skip the first 36 bytes.\n\t// I don't know what these bytes are for.\n\tr.Seek(36, 1)\n\n\t// Read the number of materials used by the model.\n\t// Materials are in separate files which reference the textures and shaders used by a rendered 3D model.\n\tvar materialCount uint16\n\tif err := binary.Read(r, binary.LittleEndian, &materialCount); err != nil {\n\t\tpanic(err)\n\t}\n\tmaterials := make([]string, materialCount)\n\n\t// Read the names of the materials.\n\tfor i := range materials {\n\t\tb := make([]byte, 1)\n\t\tbuf := bytes.NewBuffer(nil)\n\t\t// The names are separated by zero bytes.\n\t\t// Read characters until a zero byte is reached.\n\t\tfor {\n\t\t\t_, err := r.Read(b)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\t\t\tif b[0] == 0x00 {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tbuf.Write(b)\n\t\t}\n\t\tmaterials[i] = string(buf.Bytes())\n\t}\n\n\t// Set the name of the model to the name of the first material that is referenced.\n\tmodel.Name = materials[0]\n\n\t// Read the number of objects in the file.\n\t// Each object is it's own 3D model made of a collection of faces.\n\tvar objectCount uint16\n\tif err := binary.Read(r, binary.LittleEndian, &objectCount); err != nil {\n\t\tpanic(err)\n\t}\n\tmodel.Objects = make([]Object, objectCount)\n\n\t// Skip 2 bytes.\n\t// I don't know what these bytes are for (Maybe texture count).\n\tr.Seek(2, 1)\n\n\t// Read the number of face indices that each object has.\n\t// Each face has three indices.\n\t// Each index corresponds to a vertex.\n\tfor i := range model.Objects {\n\t\t// Skip 4 bytes.\n\t\t// I don't know what these bytes are for.\n\t\tr.Seek(4, 1)\n\n\t\tvar faces uint32\n\t\tif err := binary.Read(r, binary.LittleEndian, &faces); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\t// Create the face index buffer.\n\t\t// Every three indices represents a face.\n\t\tmodel.Objects[i].Faces = make([]int, int(faces))\n\n\t\t// Skip 63 bytes.\n\t\t// I don't know what these bytes are for.\n\t\tr.Seek(63, 1)\n\t}\n\n\t// Skip 28 bytes.\n\t// I don't know what these bytes are for.\n\tr.Seek(28, 1)\n\n\t// Read the number of vertices in the model.\n\tvar vertexCount uint32\n\tif err := binary.Read(r, binary.LittleEndian, &vertexCount); err != nil {\n\t\tpanic(err)\n\t}\n\tmodel.Verts = make([]float32, int(vertexCount)*3)\n\tmodel.UVs = make([]float32, int(vertexCount)*2)\n\tmodel.Norms = make([]float32, int(vertexCount)*3)\n\n\t// Skip 6 bytes.\n\t// I don't know what these bytes are for.\n\tr.Seek(6, 1)\n\n\t// Read the size of each vertex.\n\t// A vertex is made of multiple vectors.\n\tvar vertexSize uint32\n\tif err := binary.Read(r, binary.LittleEndian, &vertexSize); err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Read the number of vectors used in each vertex.\n\tvar vectorCount uint8\n\tif err := binary.Read(r, binary.LittleEndian, &vectorCount); err != nil {\n\t\tpanic(err)\n\t}\n\tvectorHeaders := make([]vectorHeader, int(vectorCount))\n\n\t// Fill in the values for each vector header.\n\tfor i := range vectorHeaders {\n\t\tb := make([]byte, 4)\n\t\tif _, err := r.Read(b); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tvectorHeaders[i].usage = b[0]\n\t\t// I don't know what b[1] is used for.\n\t\tvectorHeaders[i].storedAs = b[2]\n\t\tvectorHeaders[i].valueCount = int(uint8(b[3]))\n\t\tvar offset uint32\n\t\tif err := binary.Read(r, binary.LittleEndian, &offset); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\tvectorHeaders[i].offset = int64(offset)\n\t}\n\n\t// Read the vertices.\n\tfor i := 0; i < int(vertexCount); i++ {\n\t\tvertexOffset, _ := r.Seek(0, 1)\n\t\tfor _, vector := range vectorHeaders {\n\t\t\tr.Seek(vertexOffset+vector.offset, 0)\n\t\t\tswitch vector.usage {\n\t\t\t// This vector defines the position of the vertex.\n\t\t\tcase VertexChunkUsagePosition:\n\t\t\t\tswitch vector.storedAs {\n\t\t\t\tcase VertexChunkStoredAsFloat32:\n\t\t\t\t\tif err := binary.Read(r, binary.LittleEndian, model.Verts[i*3+0:i*3+3]); err != nil {\n\t\t\t\t\t\tpanic(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t// This vector defines the direction of the normal of the vertex.\n\t\t\tcase VertexChunkUsageNormal:\n\t\t\t\tswitch vector.storedAs {\n\t\t\t\tcase VertexChunkStoredAsFloat32:\n\t\t\t\t\tif err := binary.Read(r, binary.LittleEndian, model.Norms[i*3+0:i*3+3]); err != nil {\n\t\t\t\t\t\tpanic(err)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t// This vector defines the UV position of the vertex.\n\t\t\tcase VertexChunkUsageUV:\n\t\t\t\tswitch vector.storedAs {\n\t\t\t\tcase VertexChunkStoredAsFloat32:\n\t\t\t\t\tif err := binary.Read(r, binary.LittleEndian, model.UVs[i*2+0:i*2+2]); err != nil {\n\t\t\t\t\t\tpanic(err)\n\t\t\t\t\t}\n\t\t\t\t\tmodel.UVs[i*2+1] = 1 - model.UVs[i*2+1]\n\t\t\t\tcase VertexChunkStoredAsUint8:\n\t\t\t\t\tb := make([]uint8, 2)\n\t\t\t\t\tif err := binary.Read(r, binary.LittleEndian, b); err != nil {\n\t\t\t\t\t\tpanic(err)\n\t\t\t\t\t}\n\t\t\t\t\tmodel.UVs[i*2+0] = float32(b[0]) / 255\n\t\t\t\t\tmodel.UVs[i*2+1] = 1 - float32(b[1])/255\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\t// Skip to the next vertex.\n\t\tr.Seek(vertexOffset+int64(vertexSize), 0)\n\t}\n\n\t// Read the face indices of each object.\n\t// Each face index is a reference to a vertex.\n\tfor i, object := range model.Objects {\n\t\tfor face := range object.Faces {\n\t\t\t// The number of bytes used to store the index is dependent on the number of vertices.\n\t\t\tif vertexCount <= 255 {\n\t\t\t\tvar b uint8\n\t\t\t\tif err := binary.Read(r, binary.LittleEndian, &b); err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tmodel.Objects[i].Faces[face] = int(b)\n\t\t\t} else if vertexCount <= 65535 {\n\t\t\t\tvar b uint16\n\t\t\t\tif err := binary.Read(r, binary.LittleEndian, &b); err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tmodel.Objects[i].Faces[face] = int(b)\n\t\t\t} else {\n\t\t\t\tvar b uint32\n\t\t\t\tif err := binary.Read(r, binary.LittleEndian, &b); err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\tmodel.Objects[i].Faces[face] = int(b)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn model\n}", "title": "" }, { "docid": "41f0eed926222c08c7804215520f4601", "score": "0.3774391", "text": "func (m *Fido2AuthenticationMethod) SetModel(value *string)() {\n m.model = value\n}", "title": "" }, { "docid": "f79909ff8b3b562e04455536f83220da", "score": "0.37742218", "text": "func (b *BillingModelItemBuilder) Model(value string) *BillingModelItemBuilder {\n\tb.model = value\n\tb.bitmap_ |= 8\n\treturn b\n}", "title": "" }, { "docid": "9ad34aaea8bfebc1031fee91eb24d6ef", "score": "0.37734935", "text": "func (x *gModel) convert() *Model {\n\tif x.ref16545ddd != nil {\n\t\treturn (*Model)(unsafe.Pointer(x.ref16545ddd))\n\t}\n\tx.passRef()\n\treturn (*Model)(unsafe.Pointer(x.ref16545ddd))\n}", "title": "" }, { "docid": "283c0f24f27a7278d39108380ac44fe8", "score": "0.37723425", "text": "func NewInviteFromModel(invite model.Invite) *apipb.Invite {\n\treturn &apipb.Invite{\n\t\tCode: &wrappers.StringValue{Value: invite.Code},\n\t\tCreatedAt: &wrappers.DoubleValue{Value: timeToMillis(invite.Created)},\n\t}\n}", "title": "" }, { "docid": "d6ae0337f984f43f717d771a021dee58", "score": "0.3768452", "text": "func (handler BooksHandler) populateModelFromHandler(r *http.Request, model interface{}) error {\n\tbody, err := ioutil.ReadAll(io.LimitReader(r.Body, 1048576))\n\tdefer r.Body.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err := json.Unmarshal(body, model); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c088443d5b250115b4c935ebfdacea56", "score": "0.376774", "text": "func NewModel(faces []*Polygon) (*Model, error) {\n\tif faces == nil {\n\t\treturn nil, errors.New(\"Can not have nil faces\")\n\t}\n\treturn &Model{faces}, nil\n}", "title": "" }, { "docid": "6cbb6ee3147ac25c18b73efae231036f", "score": "0.37655452", "text": "func (s Sphere) Hit(r Ray, tMin float64, tMax float64) []HitRecord {\n\trecs := make([]HitRecord, 0, 2)\n\toc := r.Origin().Sub(s.Center)\n\ta := r.Direction().Dot(r.Direction())\n\tb := oc.Dot(r.Direction())\n\tc := oc.Dot(oc) - s.Radius*s.Radius\n\tdiscriminant := b*b - a*c\n\t// If the discriminant is positive, we have one or\n\t// two intersections:\n\tif discriminant > 0 {\n\t\ttemp := (-b - math.Sqrt(b*b-a*c)) / a\n\t\tif temp < tMax && temp > tMin {\n\t\t\tp := r.PointAtParameter(temp)\n\t\t\tnormal := r.PointAtParameter(temp).Sub(s.Center).Mul(1.0 / s.Radius)\n\t\t\thit := HitRecord{T: temp, P: p, Normal: normal, Mat: s.Mat}\n\t\t\trecs = append(recs, hit)\n\t\t}\n\t\ttemp = (-b + math.Sqrt(b*b-a*c)) / a\n\t\tif temp < tMax && temp > tMin {\n\t\t\tp := r.PointAtParameter(temp)\n\t\t\tnormal := r.PointAtParameter(temp).Sub(s.Center).Mul(1.0 / s.Radius)\n\t\t\thit := HitRecord{T: temp, P: p, Normal: normal, Mat: s.Mat}\n\t\t\trecs = append(recs, hit)\n\t\t}\n\t}\n\treturn recs\n}", "title": "" }, { "docid": "dad0f3f1b1baee75bb51e0919ca4aa4f", "score": "0.3763699", "text": "func (app *Bouquins) NewModel(title, page string, req *http.Request) *Model {\n\treturn &Model{\n\t\tTitle: title,\n\t\tPage: page,\n\t\tVersion: Version,\n\t\tUsername: app.Username(req),\n\t}\n}", "title": "" }, { "docid": "56b146cde555eb882a8a78601918f31b", "score": "0.37591553", "text": "func NewCollectionFromModel(c model.Collection) *apipb.Collection {\n\treturn &apipb.Collection{\n\t\tCollectionId: &wrappers.StringValue{Value: c.ID.String()},\n\t\tTeamId: &wrappers.StringValue{Value: c.TeamID.String()},\n\t\tFieldMask: NewFieldMaskFromModel(c.FieldMask),\n\t\tFirmware: NewCollectionFirmwareConfigFromModel(c.Firmware),\n\t\tTags: c.Tags.TagMap,\n\t}\n}", "title": "" }, { "docid": "4a5f6802cf0577f4e36945a584bcbe43", "score": "0.3758389", "text": "func (m *Gateway) BeforeAppendModel(ctx context.Context, query bun.Query) error {\n\tif err := m.Model.BeforeAppendModel(ctx, query); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11020b0a9041cfedf70d4d4baf83e70c", "score": "0.37440282", "text": "func loadCustomModel(filepath string) error {\n\t// make sure the model file exists\n\tgombzBytes, err := ioutil.ReadFile(filepath)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to read the GOMBZ file specified.\\n%v\", err)\n\t}\n\n\t// load the mesh from the binary file\n\tmeshData, err := gombz.DecodeMesh(gombzBytes)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to deocde the binary file (%s) for the model.\\n%v\", filepath, err)\n\t}\n\n\t// create the renderable for the mesh\n\tcustomObj = fizzle.CreateFromGombz(meshData)\n\tcustomObj.Material = fizzle.NewMaterial()\n\tcustomObj.Material.Shader = basicShader\n\n\treturn nil\n}", "title": "" }, { "docid": "0e9bb66407f21dbca90cce538c42ab0e", "score": "0.3743946", "text": "func (o *Track) Clone() datamodel.Model {\n\tc := new(Track)\n\tc.FromMap(o.ToMap())\n\treturn c\n}", "title": "" }, { "docid": "20e93279b5c0fd2d105fd3f6b219c29e", "score": "0.3743256", "text": "func (r Result) Hit() string {\n\treturn r.hit\n}", "title": "" }, { "docid": "211f76f9565577563ef78b73e175e7b4", "score": "0.37381136", "text": "func newDeviceDataFromModel(data model.DeviceData, appEUI protocol.EUI) apiDeviceData {\n\treturn apiDeviceData{\n\t\tAppEUI: appEUI.String(),\n\t\tDeviceEUI: data.DeviceEUI.String(),\n\t\tTimestamp: ToUnixMillis(data.Timestamp),\n\t\tDevAddr: data.DevAddr.String(),\n\t\tData: hex.EncodeToString(data.Data),\n\t\tGatewayEUI: data.GatewayEUI.String(),\n\t\tRSSI: data.RSSI,\n\t\tSNR: data.SNR,\n\t\tFrequency: data.Frequency,\n\t\tDataRate: data.DataRate,\n\t}\n}", "title": "" }, { "docid": "ff14224a78adbfc10411e75dc9605bbd", "score": "0.37244686", "text": "func (table *table) SetByKVModel(model KVModel, data interface{}) error {\n\treturn table.Set(model, []byte(model.GetKey()), data)\n}", "title": "" }, { "docid": "7d603b345d58d68f7fc5436bd71123f6", "score": "0.37157184", "text": "func (m *TeamworkHardwareDetail) SetModel(value *string)() {\n err := m.GetBackingStore().Set(\"model\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "5011031fd59e804fc90299ac1e1222e7", "score": "0.36987045", "text": "func (b *OpenAPIGeneratorBuilder) Model(value *concepts.Model) *OpenAPIGeneratorBuilder {\n\tb.model = value\n\treturn b\n}", "title": "" }, { "docid": "fc817e85f31629f36c0e621d4fc4ca5b", "score": "0.3689386", "text": "func NewMemberFromModel(teamID model.TeamKey, member model.Member) *apipb.Member {\n\tret := &apipb.Member{\n\t\tUserId: &wrappers.StringValue{Value: member.User.ID.String()},\n\t\tTeamId: &wrappers.StringValue{Value: teamID.String()},\n\t\tRole: &wrappers.StringValue{Value: member.Role.String()},\n\t\tName: &wrappers.StringValue{Value: member.User.Name},\n\t\tEmail: &wrappers.StringValue{Value: member.User.Email},\n\t\tVerifiedEmail: &wrappers.BoolValue{Value: member.User.VerifiedEmail},\n\t\tPhone: &wrappers.StringValue{Value: member.User.Phone},\n\t\tVerifiedPhone: &wrappers.BoolValue{Value: member.User.VerifiedPhone},\n\t\tAvatarUrl: &wrappers.StringValue{Value: member.User.AvatarURL},\n\t}\n\n\tif member.User.AuthType == model.AuthConnectID {\n\t\tret.AuthType = &wrappers.StringValue{Value: \"connect\"}\n\t\tret.ConnectId = &wrappers.StringValue{Value: member.User.ExternalID}\n\t\tret.GitHubLogin = nil\n\t} else {\n\t\tret.AuthType = &wrappers.StringValue{Value: \"github\"}\n\t\tret.ConnectId = nil\n\t\tret.GitHubLogin = &wrappers.StringValue{Value: member.User.ExternalID}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "c37fc5d42428c8d7f043d7d5295f194f", "score": "0.36877513", "text": "func (i Index) Hit(name string) {\n\tentry, ok := i.entries[name]\n\tif !ok {\n\t\treturn\n\t}\n\tentry.Hits++\n\tentry.HitsSinceLastReset++\n\ti.entries[name] = entry\n}", "title": "" }, { "docid": "dd01e00650fdf5cd3b3634252c066d09", "score": "0.36864254", "text": "func (_m *FormationTemplateConverter) FromModelInputToModel(in *model.FormationTemplateInput, id string, tenantID string) *model.FormationTemplate {\n\tret := _m.Called(in, id, tenantID)\n\n\tvar r0 *model.FormationTemplate\n\tif rf, ok := ret.Get(0).(func(*model.FormationTemplateInput, string, string) *model.FormationTemplate); ok {\n\t\tr0 = rf(in, id, tenantID)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*model.FormationTemplate)\n\t\t}\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "8b2677b277bf386cd913c452d83838c7", "score": "0.368409", "text": "func GetModelFromDocument(doc *bsonx.Doc, model interface{}) error {\n\n\t// bson document to bytes\n\tbytes, errDoc := doc.MarshalBSON()\n\tif errDoc != nil {\n\t\treturn errDoc\n\t}\n\n\t// bytes to interface model\n\tunmarshalErr := bson.Unmarshal(bytes, model)\n\tif unmarshalErr != nil {\n\t\treturn unmarshalErr\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "94403148394c304de75dc0700ae178c8", "score": "0.36833656", "text": "func (model *OverlappingModel) Generate() (image.Image, bool) {\n\tmodel.BaseModel.Generate(model)\n\treturn model.Render(), model.IsGenerationSuccessful()\n}", "title": "" }, { "docid": "f0270c7912950c6128756d65e9eea33e", "score": "0.36797678", "text": "func (_m *Targets) Hit(team *teams.Team) {\n\t_m.Called(team)\n}", "title": "" }, { "docid": "208fbf11a12d5aa1cf6092abafef63a8", "score": "0.36694264", "text": "func NewObject(id int, img *ebiten.Image, x, y, z int, v Vector, rx, ry, rw, rh int, solid bool, c color.RGBA) Object {\n\n\t// hit rect image (centered in image)\n\trectImg, _ := ebiten.NewImage(rw, rh, ebiten.FilterNearest)\n\trectImg.Fill(sha.Red50)\n\tif img == nil {\n\t\t// create visual image, when bitmap is nil\n\t\t// the size of the image is hit rect + the offsets on both sides\n\t\timg, _ = ebiten.NewImage(rw+(rx*2), rh+(ry*2), ebiten.FilterNearest)\n\t\timg.Fill(c)\n\t}\n\treturn Object{\n\t\tSprite: NewSprite(id, img, x, y, z, v),\n\t\tHitShape: HitShape{\n\t\t\trx: rx,\n\t\t\try: ry,\n\t\t\trect: Rect{x + rx, y + ry, rw, rh},\n\t\t\trectImg: rectImg,\n\t\t\trectColor: c,\n\t\t\tsolid: solid,\n\t\t},\n\t\tdebug: false,\n\t}\n}", "title": "" }, { "docid": "c93ef71bca4dc1c457c179b053e377d4", "score": "0.36686477", "text": "func createIndexedPointersModel() *indexedPointersModel {\n\tUint := uint(randomInt())\n\tUint8 := uint8(randomInt())\n\tUint16 := uint16(randomInt())\n\tUint32 := uint32(randomInt())\n\tUint64 := uint64(randomInt())\n\tInt := randomInt()\n\tInt8 := int8(randomInt())\n\tInt16 := int16(randomInt())\n\tInt32 := int32(randomInt())\n\tInt64 := int64(randomInt())\n\tFloat32 := float32(randomInt())\n\tFloat64 := float64(randomInt())\n\tByte := []byte(randomString())[0]\n\tRune := []rune(randomString())[0]\n\tString := randomString()\n\tBool := randomBool()\n\treturn &indexedPointersModel{\n\t\tUint: &Uint,\n\t\tUint8: &Uint8,\n\t\tUint16: &Uint16,\n\t\tUint32: &Uint32,\n\t\tUint64: &Uint64,\n\t\tInt: &Int,\n\t\tInt8: &Int8,\n\t\tInt16: &Int16,\n\t\tInt32: &Int32,\n\t\tInt64: &Int64,\n\t\tFloat32: &Float32,\n\t\tFloat64: &Float64,\n\t\tByte: &Byte,\n\t\tRune: &Rune,\n\t\tString: &String,\n\t\tBool: &Bool,\n\t}\n}", "title": "" }, { "docid": "e79d324c599a6311a8cf9887eb1dc3d6", "score": "0.36650142", "text": "func LoadModel(path string) (model *Model, err error) {\n\tdefer essentials.AddCtxTo(\"load model\", &err)\n\tmodel = &Model{}\n\tif err := serializer.LoadAny(path, &model.Embedding, &model.HMM); err != nil {\n\t\treturn nil, err\n\t}\n\treturn model, nil\n}", "title": "" }, { "docid": "1cd09851fcbd861e3c667fbf2e882220", "score": "0.36644307", "text": "func CreateDetectHipKeypointXRayRequest() (request *DetectHipKeypointXRayRequest) {\n\trequest = &DetectHipKeypointXRayRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"imageprocess\", \"2020-03-20\", \"DetectHipKeypointXRay\", \"imageprocess\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "34537aa1d3f138e8ec7d0c0c2e4dbcbe", "score": "0.3657624", "text": "func (cli *HostWrapper) GetModel() model.Model {\n\treturn cli.host.GetModel()\n}", "title": "" }, { "docid": "c56796aa8827fd1b8e4487d1f44e0f5a", "score": "0.3655953", "text": "func (obj *hudNodeContent) Model() Model {\n\treturn obj.model\n}", "title": "" }, { "docid": "41d5b3b643e30d8aac0196c2e8ca309e", "score": "0.36512083", "text": "func (r *Response) AddModel(models ...Model) {\n\tr.Results = append(r.Results, models...)\n}", "title": "" }, { "docid": "75b1d0d68a77922fc14c31ad6f8a1f94", "score": "0.36494607", "text": "func applyTranformToModel(\n\tmodelName, transformAppName, viewName string,\n\tmodel, transform *sysl.Module,\n) (*sysl.Value, error) {\n\tmodelApp := model.Apps[modelName]\n\tview := transform.Apps[transformAppName].Views[viewName]\n\tif view == nil {\n\t\treturn nil, errors.Errorf(\"Cannot execute missing view: %s, in app %s\", viewName, transformAppName)\n\t}\n\ts := eval.Scope{}\n\ts.AddApp(\"app\", modelApp)\n\tvar result *sysl.Value\n\t// assume args are\n\t// app <: sysl.App and\n\t// type <: sysl.Type\n\tif len(view.Param) >= 2 {\n\t\tresult = eval.MakeValueList()\n\t\tvar tNames []string\n\t\tfor tName := range modelApp.Types {\n\t\t\ttNames = append(tNames, tName)\n\t\t}\n\t\tsort.Strings(tNames)\n\t\tfor _, tName := range tNames {\n\t\t\tt := modelApp.Types[tName]\n\t\t\ts[\"typeName\"] = eval.MakeValueString(tName)\n\t\t\ts[\"type\"] = eval.TypeToValue(t)\n\t\t\teval.AppendItemToValueList(result.GetList(), eval.EvaluateView(transform, transformAppName, viewName, s))\n\t\t}\n\t} else {\n\t\tresult = eval.EvaluateView(transform, transformAppName, viewName, s)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "6e1b3ffafbbb56fcac43710af9e0bb0c", "score": "0.36466777", "text": "func NewDetector(modelFilePath string) (*Detector, error) {\n\tcModelFilePath := C.CString(modelFilePath)\n\tdefer C.free(unsafe.Pointer(cModelFilePath))\n\n\tresult := C.detector_init(cModelFilePath)\n\tdefer C.free(unsafe.Pointer(result))\n\n\tif result.error_message != nil {\n\t\tdefer C.free(unsafe.Pointer(result.error_message))\n\t\treturn nil, errors.New(C.GoString(result.error_message))\n\t}\n\n\treturn &Detector{detector: unsafe.Pointer(result.detector)}, nil\n}", "title": "" }, { "docid": "0afb5eeeb6c12c4f1971c3359bbb6412", "score": "0.3639958", "text": "func NewModel(dst Backend) *Model {\n\treturn &Model{\n\t\tdbByName: make(map[string]graph.Node, 0),\n\t\tbackend: dst,\n\t}\n}", "title": "" } ]
66afc653f717db5276e60726658ba5ee
TODO Add interface for worker createFileChannelAndExecutePlugin creates file channel using channel name and initiates communication between master agent process and session worker process
[ { "docid": "6771618395c692a4ef38fdad9ed4d2f4", "score": "0.8378484", "text": "func createFileChannelAndExecutePlugin(context context.T, channelName string) {\n\tlog := context.Log()\n\tlog.Infof(\"document: %v worker started\", channelName)\n\t//create channel from the given handle identifier by master\n\tipc, err, _ := filewatcherbasedipc.CreateFileWatcherChannel(log, context.Identity(), filewatcherbasedipc.ModeWorker, channelName, false)\n\tif err != nil {\n\t\tlog.Errorf(\"failed to create channel: %v\", err)\n\t\treturn\n\t}\n\n\t//initialize SessionPluginRegistry\n\trunpluginutil.SSMPluginRegistry = plugin.RegisteredSessionWorkerPlugins()\n\n\t//TODO add command timeout\n\tstopTimer := make(chan bool)\n\tpipeline := messaging.NewWorkerBackend(context, sessionPluginRunner)\n\t//TODO wait for sigterm or send fail message to the channel?\n\tif err = messaging.Messaging(log, ipc, pipeline, stopTimer); err != nil {\n\t\tlog.Errorf(\"messaging worker encountered error: %v\", err)\n\t\t//If ipc messaging broke, there's nothing session worker process can do, exit immediately\n\t\treturn\n\t}\n}", "title": "" } ]
[ { "docid": "71d2e42a3305bf944c9d91b8e30f9680", "score": "0.58243704", "text": "func main() {\n\targs := os.Args\n\n\tcontext, channelName, err := initialize(args)\n\tlog := context.Log()\n\tlog.Infof(\"ssm-session-worker - %v\", version.String())\n\t//ensure logs are flushed\n\tdefer log.Close()\n\tif err != nil {\n\t\tlog.Errorf(\"Session worker failed to initialize: %s\", err)\n\t\treturn\n\t}\n\n\tcreateFileChannelAndExecutePlugin(context, channelName)\n\tlog.Info(\"Session worker closed\")\n}", "title": "" }, { "docid": "2d6777496583114830e88827dcce434c", "score": "0.58153164", "text": "func (r *SimpleRunnable) RunPlugin(path string, ac chan *plugin.ReattachConfig) {\n\t// We don't want to see the plugin logs.\n\n\t//log.SetOutput(ioutil.Discard)\n\t/* \tlogger := hclog.New(&hclog.LoggerOptions{\n\t\tName: \"plugin\",\n\t\tOutput: os.Stdout,\n\t\tLevel: hclog.Debug,\n\t}) */\n\n\tif _, err := os.Stat(path); os.IsNotExist(err) {\n\t\tlog.Errorf(\"path %s does not exists\", path)\n\t\treturn\n\t}\n\n\tpluginExec := path\n\n\tlog.Infof(\"create Command with path %s\", path)\n\tprocess := exec.Command(pluginExec)\n\tprocess.SysProcAttr = &syscall.SysProcAttr{Setsid: true}\n\t//process.Stdout = os.Stdout\n\t//process.SysProcAttr.Setsid = true\n\t//syscall.Umask(0)\n\tlog.Info(\"running \", process)\n\n\t// We're a host. Start by launching the plugin process.\n\tclient := plugin.NewClient(&plugin.ClientConfig{\n\t\tHandshakeConfig: shared.Handshake,\n\t\tPlugins: shared.PluginMap,\n\t\tCmd: process,\n\t\tAllowedProtocols: []plugin.Protocol{\n\t\t\tplugin.ProtocolGRPC},\n\t\t//\t\tLogger: logger,\n\t})\n\n\t// Start and connect via RPC\n\trpcClient, err := client.Client()\n\tr.Client = client\n\tif err != nil {\n\t\tlog.Errorln(\"error in client.Client():\", err.Error())\n\t\t//ac <- &plugin.ReattachConfig{}\n\t\t//return\n\t}\n\n\t// Request the plugin\n\tif rpcClient == nil {\n\t\tlog.Errorln(\"rpcClient is nil\")\n\t\t//ac <- &plugin.ReattachConfig{}\n\t\t//return\n\t}\n\traw, err := rpcClient.Dispense(\"kv_grpc\")\n\tif err != nil {\n\t\tlog.Errorln(\"Error:\", err.Error())\n\t}\n\n\t// We should have a KV store now! This feels like a normal interface\n\t// implementation but is in fact over an RPC connection.\n\tkv := raw.(shared.KV)\n\tr.KV = kv\n\n\t// Get ReattachConfig and send it back to outer goroutine to store for reattach to plugin later.\n\treAttachConfig := client.ReattachConfig()\n\n\tac <- reAttachConfig\n\n\tc := make(chan struct{})\n\t<-c\n\t//os.Exit(0)\n}", "title": "" }, { "docid": "5492f0e20b743cd7ec3cc87fa045685f", "score": "0.5662209", "text": "func NewChannel(ServerVars *Variables, ch string, a string, k string, c *Client, t time.Time) {\n\tServerVars.ChannelListMu.Lock()\n\tdefer ServerVars.ChannelListMu.Unlock()\n\n\tif c == nil { // If the admin of the server wants to create a channel\n\t\tServerVars.ChannelList[ch] = &Channels{ch, \"Admin\", t, make(map[string]*net.Conn), a, k, make(chan (*Data), 100), &sync.Mutex{}}\n\t\tServerVars.ActivityLogsChannel <- fmt.Sprintf(ServerVars.LogActivityFormat, \"Channel creation \", strings.ToUpper(a), ch, \"Admin\", t.Format(\"2006-01-02 15:04:05\"))\n\t\tgo ServerVars.ChannelList[ch].WriteMsgHistory(ServerVars)\n\t\treturn\n\t}\n\n\tif (a != \"public\") && (a != \"private\") { // Checking if the access type specified by the client is correct or not\n\t\tConnWrite(ServerVars, c, Colors[\"Red\"](\"Invalid access type\\n\"))\n\t\treturn\n\t}\n\n\t_, exists := ServerVars.ChannelList[ch]\n\tif exists { // Checking if the channel already exists\n\t\tConnWrite(ServerVars, c, \"%s %s\\n\", Colors[\"Red\"](\"Channel exists with the name:\"), ch)\n\t\treturn\n\t}\n\n\tvar d []Data // Type of data stored for retrieving message history\n\tbt, err := json.Marshal(d)\n\tCheckError(ServerVars, err)\n\n\terr = ioutil.WriteFile(fmt.Sprintf(\"%s/%s.json\", ServerVars.Conf.ChDataFolder, ch), bt, 0766) // Creating a json file for storing all the message history of a channel\n\tCheckError(ServerVars, err)\n\n\tif a == \"public\" {\n\t\tk = \"nil\" // Setting the key to be nil if the channel is public\n\t}\n\n\tc.Channels = append(c.Channels, ch) // Adding the channel to the client's list of subscribed channels\n\tServerVars.ChannelList[ch] = &Channels{ch, c.Username, t, make(map[string]*net.Conn), a, k, make(chan (*Data), 100), &sync.Mutex{}} // Adding the channel to the list of all channels\n\tgo ServerVars.ChannelList[ch].WriteMsgHistory(ServerVars)\n\n\tConnWrite(ServerVars, c, \"%s %s %s %s %s\\n\", Colors[\"Green\"](\"New \"), Colors[\"Green\"](a), Colors[\"Green\"](\" channel\"), Colors[\"Cyan\"](ch), Colors[\"Green\"](\"created\"))\n\tServerVars.ChannelList[ch].UserList[c.Username] = c.Conn // Adding the client to the members list of the channel\n\tServerVars.ActivityLogsChannel <- fmt.Sprintf(ServerVars.LogActivityFormat, \"Channel creation \", strings.ToUpper(a), ch, c.Username, t.Format(\"2006-01-02 15:04:05\"))\n}", "title": "" }, { "docid": "158b24d5d3852cfb70e3abe6602b20a8", "score": "0.5469625", "text": "func createWorkerChans() * WorkerChannels {\n\treturn &WorkerChannels{\n\t\treqChan: make(chan *os.File),\n\t\trespChan : make(chan *songWorker),\n\t\tdoneChan : make(chan bool),\n\t}\n}", "title": "" }, { "docid": "c5cce6e3742e1eb1190f8ce1f2c4bccf", "score": "0.5276966", "text": "func (c *chaninterface) OnFileReceived(address, path, name string) {\n\t// NOTE: no lock check so that locks don't have to stay on for long file transfers\n\t// no matter what, remove temp file\n\tdefer func() {\n\t\terr := os.Remove(path)\n\t\tif err != nil {\n\t\t\tlog.Println(\"OnFileReceived: failed to remove temp file:\", err)\n\t\t}\n\t\t// remove from allowedTransfers\n\t\tc.mutex.Lock()\n\t\tdelete(c.allowedTransfers, name)\n\t\tc.mutex.Unlock()\n\t}()\n\t// fetch push message for file\n\tc.mutex.Lock()\n\tpm, exists := c.allowedTransfers[name]\n\tc.mutex.Unlock()\n\tif !exists {\n\t\tlog.Println(\"OnFileReceived: no associated push message found!\")\n\t\treturn\n\t}\n\t// read data\n\tdata, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\tlog.Println(\"OnFileReceived: failed to read file:\", err)\n\t\treturn\n\t}\n\t// depending on the object type write the file to different locations:\n\tswitch pm.ObjType {\n\tcase shared.OtModel:\n\t\t// model is not written to storage but to disk directly\n\t\tpath := c.enc.RootPath + \"/\" + shared.IDMODEL\n\t\terr = ioutil.WriteFile(path, data, shared.FILEPERMISSIONMODE)\n\t\t// log.Println(\"DEBUG: wrote model.\")\n\tcase shared.OtPeer:\n\t\t// peers are written to disk too, but in correct dir with pm.Name\n\t\tpath := c.enc.RootPath + \"/\" + shared.ORGDIR + \"/\" + shared.PEERSDIR + \"/\" + pm.Identification\n\t\terr = ioutil.WriteFile(path, data, shared.FILEPERMISSIONMODE)\n\t\t// log.Println(\"DEBUG: wrote peer.\")\n\tcase shared.OtAuth:\n\t\t// auth is also special case\n\t\tpath := c.enc.RootPath + \"/\" + shared.ORGDIR + \"/\" + shared.AUTHJSON\n\t\terr = ioutil.WriteFile(path, data, shared.FILEPERMISSIONMODE)\n\t\t// log.Println(\"DEBUG: wrote auth.\")\n\tcase shared.OtObject:\n\t\t// write to storage\n\t\terr = c.enc.storage.Store(pm.Identification, data)\n\tdefault:\n\t\tlog.Println(\"OnFileReceived: unknown ObjType for received file!\", pm.ObjType)\n\t\treturn\n\t}\n\t// this means something failed\n\tif err != nil {\n\t\tlog.Println(\"OnFileReceived: writing file failed:\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "7712344112483ff6bf118a76ca7dd8ad", "score": "0.5266529", "text": "func NewChannel(topicName string, channelName string, chEnd BackendQueueEnd,\n\tctx *context, maxWin int64, deleteCallback func(*Channel)) *Channel {\n\n\tc := &Channel{\n\t\ttopicName: topicName,\n\t\tname: channelName,\n\t\tclientMsgChan: make(chan *Message),\n\t\tclientCheckBackChan: make(chan *Message),\n\t\texitChan: make(chan int),\n\t\tclients: make(map[int64]Consumer),\n\t\tconfirmedMsgs: NewIntervalTree(),\n\t\tupdateBackendQueueEndChan: make(chan bool),\n\t\ttryReadOneChan: make(chan bool, 1),\n\t\tdeleteCallback: deleteCallback,\n\t\tctx: ctx,\n\t\tmaxWin: maxWin,\n\t}\n\tif len(ctx.nsqd.getOpts().E2EProcessingLatencyPercentiles) > 0 {\n\t\tc.e2eProcessingLatencyStream = quantile.New(\n\t\t\tctx.nsqd.getOpts().E2EProcessingLatencyWindowTime,\n\t\t\tctx.nsqd.getOpts().E2EProcessingLatencyPercentiles,\n\t\t)\n\t}\n\n\tc.initPQ()\n\n\tif strings.HasSuffix(channelName, \"#ephemeral\") {\n\t\tc.ephemeral = true\n\t\tc.backend = newDummyBackendQueueReader()\n\t} else {\n\t\t// backend names, for uniqueness, automatically include the topic...\n\t\tbackendReaderName := getBackendReaderName(c.topicName, 0, channelName)\n\t\tbackendWriterName := getBackendWriterName(c.topicName, 0)\n\n\t\tc.backend = newDiskQueueReader(\n\t\t\tbackendWriterName,\n\t\t\tbackendReaderName,\n\t\t\tctx.nsqd.getOpts().DataPath,\n\t\t\tctx.nsqd.getOpts().MaxBytesPerFile,\n\t\t\tint32(minValidMsgLength),\n\t\t\tint32(ctx.nsqd.getOpts().MaxMsgSize)+minValidMsgLength,\n\t\t\tctx,\n\t\t\tctx.nsqd.getOpts().SyncEvery,\n\t\t\tctx.nsqd.getOpts().SyncTimeout,\n\t\t\tchEnd,\n\t\t)\n\t}\n\n\tif len(channelName) > 0 && channelName[0] == '_' {\n\t\tc.innerDt = true\n\t}\n\n\tc.waitGroup.Wrap(c.messagePump)\n\tc.ctx.nsqd.Notify(c)\n\n\treturn c\n}", "title": "" }, { "docid": "932e7abf7e094b6063901688275951d0", "score": "0.52361834", "text": "func createChannel(w http.ResponseWriter, r *http.Request) {\n\t_, uid := checkSession(w,r)\n\tisDesktopClient := false\n\tFL_DESKTOP := checkDesktop(w,r)\n\tif FL_DESKTOP == true {\n\t\tisDesktopClient = true\n\t}\n\tif SYS_STATELESS_SERVER == true {\t\n\t\tChanID := fmt.Sprintf(\"%v\", r.FormValue(\"UID\"))\n\t\ttok := newChannelPut(w,r,ChanID,uid,isDesktopClient,\"\")\n\t\tdata,_ := json.Marshal(tok)\n\t\tw.Write(data)\n\t\treturn\t\t\n\t}\n\t//c := appengine.NewContext(r)\n c, cancel := context.WithTimeout(context.Background(), 30*time.Second)\n defer cancel()\n\t\n\tif FL_PROC_OK := countryChecker(w,r); FL_PROC_OK != true {return}\n\t\n\tfunc_code := r.FormValue(\"func_code\")\n\tif func_code != \"NEW_INSTALL\" {\n\t\tcheckReferrer(w,r)\n\t}\n \n ChanID := fmt.Sprintf(\"%v\", r.FormValue(\"user\"))\n \n if r.Header.Get(\"X-Goog-Authenticated-User-Email\") == \"\" && uid == \"\" {\n\tuid = randSeq(6)\n }\n \n if ChanID == \"\" {\n\tChanID = uid\n }\n \n var e Channelstore\n FL_CHAN_EXIST := true\n tok := \"\"\n //D0086\n datastoreClient := createClientDS()\n //log.Printf(\"datastoreClient.Get() [5539]\")\n if err := datastoreClient.Get(c, getKeyChannel(c,ChanID), &e); err != nil {\n\t\tFL_CHAN_EXIST = false\n } else {\n\t\ttimeFormat := \"20060102150405\"\n\t\tthen, err := time.Parse(timeFormat, e.DateCreated)\n\t\tif err != nil {\n\t\t\t panic(err)\n\t\t\t//return\n\t\t}\n\t\tduration := time.Since(then)\n\t\tif duration.Hours() > CHAN_HOURS_EXPR {\n\t\t\tIS_ACTIVE := getActiveStatus(w,r,e.ChanID)\n\t\t\tif IS_ACTIVE == \"N\" {\n\t\t\t\t//delete old channel here\n\t\t\t\tFL_CHAN_EXIST = false\n\t\t\t\tdatastoreClient.Delete(c, getKeyChannel(c,e.ChanID))\n\t\t\t}\n\t\t}\n }\n \n if FL_CHAN_EXIST == false {\n\t\t\n\t\ttokNew := newChannelPut(w,r,ChanID,uid,isDesktopClient,\"\")\n\t\ttok = tokNew\n\t} else {\n\t\ttok = e.TokenID\n\t}\n \n\tdata,_ := json.Marshal(tok)\n\tw.Write(data)\n\treturn\n}", "title": "" }, { "docid": "1d1648d71e0fad15e1fd793008fda50a", "score": "0.5229252", "text": "func newChannel(c *Client, id, name string) *channel {\n\tch := &channel{ID: id, ChannelName: name}\n\tinitChannel(c, ch)\n\treturn ch\n}", "title": "" }, { "docid": "0c50eafcef8c641cb0b31aa1f3c8760c", "score": "0.52215916", "text": "func Channel(id string) chan interface{} {\n\tch, _ := channels.LoadOrStore(id, make(chan interface{}, channelBuffer))\n\treturn ch.(chan interface{})\n}", "title": "" }, { "docid": "3ef10a09afc2350338cfd326c8405786", "score": "0.52187073", "text": "func (a *PublishSubscribeApiService) CreateChannelExecute(r ApiCreateChannelRequest) (SingleChannel, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SingleChannel\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"PublishSubscribeApiService.CreateChannel\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/channels\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\tif r.P_channelProposal == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"channelProposal is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.P_channelProposal\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "97936c9bf2148e27e2af4b312c9b9dd0", "score": "0.5182005", "text": "func createPathChannel(base_path string) (chan FileData) {\n channel := make(chan FileData)\n\n // Walks files, pushes results to channel, then closes channel.\n go walkFiles(base_path, channel)\n\n return channel\n}", "title": "" }, { "docid": "1dff320f7835b225d8193ec18856505c", "score": "0.51413935", "text": "func NewChannel(cli, svr int) *Channel {\n\tc := new(Channel)\n\tc.CliProto.Init(cli)\n\tc.signal = make(chan *grpc.Proto, svr)\n\tc.watchOps = make(map[int32]struct{})\n\treturn c\n}", "title": "" }, { "docid": "80f41a703be620d7056276dc8881877f", "score": "0.51267296", "text": "func (api *Api) createChannel(w http.ResponseWriter, r *http.Request) {\n\tvar ch model.Channel\n\t// Gets JSON object from request body.\n\tdecoder := json.NewDecoder(r.Body)\n\tif err := decoder.Decode(&ch); err != nil {\n\t\tutils.RespondWithError(w, http.StatusBadRequest, \"Invalid request payload\")\n\t\treturn\n\t}\n\n\tdefer r.Body.Close()\n\n\tif err := ch.CreateChannel(d.Database); err != nil {\n\t\tutils.RespondWithError(w, http.StatusInternalServerError, err.Error())\n\t\treturn\n\t}\n\t// Respond with newly created channel.\n\tutils.RespondWithJSON(w, http.StatusCreated, ch)\n}", "title": "" }, { "docid": "bbbf7273666c87b5d09115e74b0a2dcb", "score": "0.5117085", "text": "func NewChannel(rw io.ReadWriteCloser) *Channel {\n\treturn &Channel{\n\t\ttarget: rw,\n\t}\n}", "title": "" }, { "docid": "76bf3c378b34974fee7098c66f4b8a68", "score": "0.50898695", "text": "func startFile_server() *File_Server {\n\ttemp := File_Server{}\n\ttemp.Channels = make(map[int](chan *fs.Msg))\n\treturn &temp\n}", "title": "" }, { "docid": "136ba227a14277948df9f4de7953aa60", "score": "0.50737345", "text": "func (p *Plugin) Execute() error {\n\tattachment := slack.Attachment{\n\t\tColor: p.settings.Color,\n\t\tImageURL: p.settings.ImageURL,\n\t\tMarkdownIn: []string{\"text\", \"fallback\"},\n\t}\n\tif p.settings.Color == \"\" {\n\t\tattachment.Color = color(p.pipeline.Build)\n\t}\n\n\tif p.settings.Fallback != \"\" {\n\t\tf, err := templateMessage(p.settings.Fallback, p.pipeline)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not create fallback message: %w\", err)\n\t\t}\n\t\tattachment.Fallback = f\n\t} else {\n\t\tattachment.Fallback = fallback(p.pipeline)\n\t}\n\n\tmsg := slack.WebhookMessage{\n\t\tUsername: p.settings.Username,\n\t\tAttachments: []slack.Attachment{attachment},\n\t\tIconURL: p.settings.IconURL,\n\t\tIconEmoji: p.settings.IconEmoji,\n\t}\n\n\tif p.settings.Recipient != \"\" {\n\t\tmsg.Channel = prepend(\"@\", p.settings.Recipient)\n\t} else if p.settings.Channel != \"\" {\n\t\tmsg.Channel = prepend(\"#\", p.settings.Channel)\n\t}\n\n\tif p.settings.Template != \"\" {\n\t\tvar err error\n\t\tattachment.Text, err = templateMessage(p.settings.Template, p.pipeline)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"could not create template message: %w\", err)\n\t\t}\n\t} else {\n\t\tattachment.Text = message(p.pipeline)\n\t}\n\n\tlogrus.WithFields(logrus.Fields{\n\t\t\"channel\": msg.Channel,\n\t\t\"username\": msg.Username,\n\t}).Info(\"sending message\")\n\terr := slack.PostWebhookCustomHTTPContext(p.network.Context, p.settings.Webhook, p.network.Client, &msg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"could not send webhook: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f4951c9bea6ec64c563c9b2d0d66b0dc", "score": "0.50673777", "text": "func NewChannel(underlying reflect.Type, buffer int) *Channel {\n\treturn &Channel{\n\t\tUnderlying: underlying,\n\t\tChannel: reflect.MakeChan(reflect.ChanOf(reflect.BothDir, underlying), buffer).Interface(),\n\t}\n}", "title": "" }, { "docid": "8212c7adffd266bca5b644ca0830d846", "score": "0.5053426", "text": "func (s *SSHServer) handleChannel(ch ssh.Channel, reqs <-chan *ssh.Request) {\n\tdefer ch.Close()\n\n\tfor req := range reqs {\n\t\tswitch req.Type {\n\t\tcase \"exec\":\n\t\t\tif cmd, err := readStringPayload(req.Payload); err != nil {\n\t\t\t\tlog.Print(\"Failed to read command: \", err)\n\t\t\t\treq.Reply(false, nil)\n\t\t\t} else if s.execHandler == nil {\n\t\t\t\tlog.Print(\"No exec handler configured\")\n\t\t\t\treq.Reply(false, nil)\n\t\t\t} else {\n\t\t\t\ter := ExecReq{cmd, ch, req, false}\n\t\t\t\ts.execHandler(&er)\n\t\t\t\tif er.success {\n\t\t\t\t\t// Only one \"exec\" request can succeed per channel (see RFC 4254 6.5).\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tlog.Printf(\"Unhandled request of type %q\", req.Type)\n\t\t\treq.Reply(false, nil)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "2af47b9435225af8dfccd5026732c8b1", "score": "0.5016985", "text": "func SetupChannels() {\n\n}", "title": "" }, { "docid": "e20fda02337351741363c0e44e2e8e40", "score": "0.50161356", "text": "func (client *Client) CreateFileSystemWithChan(request *CreateFileSystemRequest) (<-chan *CreateFileSystemResponse, <-chan error) {\n\tresponseChan := make(chan *CreateFileSystemResponse, 1)\n\terrChan := make(chan error, 1)\n\terr := client.AddAsyncTask(func() {\n\t\tdefer close(responseChan)\n\t\tdefer close(errChan)\n\t\tresponse, err := client.CreateFileSystem(request)\n\t\tif err != nil {\n\t\t\terrChan <- err\n\t\t} else {\n\t\t\tresponseChan <- response\n\t\t}\n\t})\n\tif err != nil {\n\t\terrChan <- err\n\t\tclose(responseChan)\n\t\tclose(errChan)\n\t}\n\treturn responseChan, errChan\n}", "title": "" }, { "docid": "1f74ca81ae8831841ed4215e812276e6", "score": "0.50152874", "text": "func CreateRunAction(cfg setting.Config) func(args []string, options map[string]string) int {\n\tjsonfy := util.CreateJsonfy(cfg)\n\tclient := broker.GetClient(cfg)\n\n\tprocessPayloads := func(payloads []map[string]string, prettyPrintJson bool) {\n\t\tvar payload []byte\n\t\tvar err error\n\n\t\tfor _, j := range payloads {\n\n\t\t\tif prettyPrintJson {\n\t\t\t\tpayload, err = json.MarshalIndent(j, \"\", \"\\t\")\n\t\t\t} else {\n\t\t\t\tpayload, err = json.Marshal(j)\n\t\t\t}\n\n\t\t\tif err == nil {\n\t\t\t\ttoken := client.Publish(cfg.Mqtt.Topic, 0, false, string(payload))\n\t\t\t\ttoken.Wait()\n\t\t\t} else {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn func(args []string, options map[string]string) int {\n\n\t\tprettyPrintJson, _ := strconv.ParseBool(options[\"pretty\"])\n\t\twatch, _ := strconv.ParseBool(options[\"watch\"])\n\n\t\tsrcDir := options[\"src\"]\n\t\tif !strings.HasSuffix(srcDir, string(os.PathSeparator)) {\n\t\t\tsrcDir += string(os.PathSeparator)\n\t\t}\n\n\t\tfiles, err := ioutil.ReadDir(srcDir)\n\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tprocessFile := func(filePath string) {\n\t\t\tconst trackingFilename string = \".c2m\"\n\n\t\t\tparts := strings.Split(filePath, string(os.PathSeparator))\n\t\t\tfilename := parts[len(parts)-1]\n\n\t\t\tcontents, _ := ioutil.ReadFile(trackingFilename)\n\t\t\ttrackingMap := make(map[string]ProcessedFileInfo)\n\t\t\tjson.Unmarshal(contents, &trackingMap)\n\n\t\t\tif _, ok := trackingMap[filename]; ok {\n\t\t\t\tlog.Printf(\"Skipping already processed file %s\\n\", filename)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tstartTime := time.Now()\n\t\t\tjsons := jsonfy(filePath)\n\t\t\tprocessPayloads(jsons, prettyPrintJson)\n\t\t\tendTime := time.Now()\n\n\t\t\tif numRecords := len(jsons); numRecords > 0 {\n\t\t\t\ttrackingMap[filename] = ProcessedFileInfo{startTime, endTime, numRecords}\n\t\t\t}\n\n\t\t\tdata, _ := json.MarshalIndent(trackingMap, \"\", \"\\t\")\n\t\t\tioutil.WriteFile(trackingFilename, data, os.ModePerm)\n\t\t}\n\n\t\tfor _, file := range files {\n\t\t\tprocessFile(srcDir + file.Name())\n\t\t}\n\n\t\tif watch {\n\t\t\tutil.WatchDirectory(srcDir, processFile)\n\t\t}\n\n\t\ttime.Sleep(5 * time.Second)\n\n\t\treturn 0\n\t}\n}", "title": "" }, { "docid": "dee48480b21664db4bd4a9df3e4ed87b", "score": "0.4986581", "text": "func (_m *ISessionPlugin) Execute(config contracts.Configuration, cancelFlag task.CancelFlag, output iohandler.IOHandler, dataChannel datachannel.IDataChannel) {\n\t_m.Called(config, cancelFlag, output, dataChannel)\n}", "title": "" }, { "docid": "035dbbc42a34d5d38d269165d5346ef8", "score": "0.49819943", "text": "func NewChannel(name string, ts int64) (c *Channel) {\n\tc = &Channel{\n\t\tName: name,\n\t\tTs: ts,\n\t\tLists: make(map[int][]string),\n\t\tClients: make(map[string]*ChanUser),\n\t\tModes: 0,\n\t\tGauge: metrics.NewGauge(),\n\t\tMetadata: make(map[string]string),\n\t\tslock: &sync.Mutex{},\n\t}\n\n\tEtcd.CreateDir(\"/tetra/channels/\"+c.Name, 0)\n\n\tChannels[c.Target()] = c\n\n\tmetrics.Register(strings.ToUpper(name)+\"_stats\", c.Gauge)\n\n\treturn\n}", "title": "" }, { "docid": "0a1e4f70c684760933402dc02700d648", "score": "0.49675807", "text": "func startWorker(chans *WorkerChannels, handler fileHandler, i int) {\n\tlogTag := fmt.Sprintf(\"startWorker%d():\", i)\n\n\tfor v := range chans.reqChan {\n\t\tsw, err := handler(v)\n\t\tif err != nil {\n\t\t\tlog.Println(logTag, \"ERR: \", err)\n\t\t\tcontinue\n\t\t}\n\n\t\tchans.respChan <- sw\n\t}\n\n\tchans.doneChan <- true\n}", "title": "" }, { "docid": "bc66d7023f9635a3f920fea26a862a5a", "score": "0.4953604", "text": "func newChannelCommand(cmd *cobra.Command, args []string, components *Components) (command Command, err error) {\n\tchannelId, err := getPaymentChannelId(cmd)\n\tif err != nil {\n\t\treturn\n\t}\n\tcommand = &channelCommand{\n\t\tstorage: *components.LockerStorage(),\n\t\tpaymentChannelId: channelId,\n\t}\n\treturn\n}", "title": "" }, { "docid": "92606b36608226ca364e81c0ca912889", "score": "0.49416658", "text": "func (f *MockInfraProvider) CreateChannelCfg(ctx fab.ClientContext, name string) (fab.ChannelCfg, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "33a3c46cc0cb2a32ad232be4f854adac", "score": "0.49362174", "text": "func (n *nmq) AddChannel(name string) error {\n\tn.channels = append(n.channels, name)\n\treturn nil\n}", "title": "" }, { "docid": "b2bf7a77a6ffc6270b19c57345487151", "score": "0.4932176", "text": "func (src *Chain) CreateChannel(dst *Chain, ordered bool, to time.Duration, cmd *cobra.Command) error {\n\tvar order chanState.Order\n\tif ordered {\n\t\torder = chanState.ORDERED\n\t} else {\n\t\torder = chanState.UNORDERED\n\t}\n\n\tticker := time.NewTicker(to)\n\tfor ; true; <-ticker.C {\n\t\tchanSteps, err := src.CreateChannelStep(dst, order)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif !chanSteps.Ready() {\n\t\t\tbreak\n\t\t}\n\n\t\tif err = chanSteps.Send(src, dst, cmd); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6df56bb7663112dc14f28f617ffc9632", "score": "0.49105132", "text": "func CreateOrUpdateChannel(client fab.FabricClient, ordererUser ca.User, orgUser ca.User, channel fab.Channel, channelConfig string) error {\n\tlogger.Debugf(\"***** Creating or updating channel: %s *****\\n\", channel.Name())\n\n\tcurrentUser := client.UserContext()\n\tdefer client.SetUserContext(currentUser)\n\n\tclient.SetUserContext(orgUser)\n\n\tconfigTx, err := ioutil.ReadFile(channelConfig)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error reading config file: %v\", err)\n\t}\n\n\tconfig, err := client.ExtractChannelConfig(configTx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error extracting channel config: %v\", err)\n\t}\n\n\tconfigSignature, err := client.SignChannelConfig(config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error signing configuration: %v\", err)\n\t}\n\n\tvar configSignatures []*common.ConfigSignature\n\tconfigSignatures = append(configSignatures, configSignature)\n\n\trequest := fab.CreateChannelRequest{\n\t\tName: channel.Name(),\n\t\tOrderer: channel.Orderers()[0],\n\t\tConfig: config,\n\t\tSignatures: configSignatures,\n\t}\n\n\tclient.SetUserContext(ordererUser)\n\t_, err = client.CreateChannel(request)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"CreateChannel returned error: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0612012b12a4fce14ae99cb51197717c", "score": "0.4904825", "text": "func Create(orderOrgName, orderOrgUser, orderURL, orgName, orgUser, channelID, channelConfigPath string, configBytes []byte,\n\tsdkOpts ...fabsdk.Option) (txID string, err error) {\n\t// Resource management client is responsible for managing channels (create/update channel)\n\t// Supply user that has privileges to create channel (in this case orderer admin)\n\tresMgmtClient, sdk, err := resMgmtOrdererClient(orderOrgName, orderOrgUser, configBytes, sdkOpts...)\n\tif err != nil {\n\t\tgnomon.Log().Error(\"Create\", gnomon.Log().Err(err))\n\t\treturn \"\", err\n\t}\n\tdefer sdk.Close()\n\treturn createChannel(orderURL, orgName, orgUser, channelID, channelConfigPath, sdk, resMgmtClient)\n}", "title": "" }, { "docid": "c986ede175b1dbc972a1b6d96d6c6bc1", "score": "0.490289", "text": "func (f *Frontend) NewChannel(name string, handler cmd.Handler) irc.Channel {\n\tf.channels = append(f.channels, NewChannel(name, handler))\n\treturn f.channels[len(f.channels)-1]\n}", "title": "" }, { "docid": "09582f093d1091a9c288538807ade9bc", "score": "0.48988977", "text": "func (p *publisher) createChannel() (err error) {\n\tp.ch, err = p.Connection.Open()\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// put channel in confirm mode\n\terr = p.ch.Confirm(false)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// subscribe to error notifications\n\tp.err = make(chan *amqp.Error, 1)\n\tp.ch.NotifyClose(p.err)\n\n\t// subscribe to publishing confirmations\n\tp.confirms = make(chan amqp.Confirmation, p.MaxPublishingsInFlight)\n\tp.ch.NotifyPublish(p.confirms)\n\n\tp.publishings = make(map[uint64]publishing, p.MaxPublishingsInFlight)\n\tp.tag = 0\n\treturn\n}", "title": "" }, { "docid": "e9dce08c430d22334491c0bddabe513e", "score": "0.4896486", "text": "func initChannels() {\n\tendCh = make(chan bool)\n\tplBufCh = make(chan Payload, 10)\n\tlastPlCh = make(chan Payload)\n\tdelFCh = make(chan drive.File)\n}", "title": "" }, { "docid": "43dc255d7a29b0fee0355ec0ac437df8", "score": "0.48768786", "text": "func (d *dispatcherChans) ChannelCreate() <-chan *ChannelCreate {\n\treturn d.channelCreateChan\n}", "title": "" }, { "docid": "0d5f7dfa95d2bdc0d14e00692e6dbbbc", "score": "0.48669624", "text": "func generateChannel(channelType string, guildID primitive.ObjectID) interface{} {\n\tvar channelVals channel\n\n\tif channelType == \"post\" {\n\t\tchannelVals.Name = \"主频道\"\n\t\tchannelVals.Type = \"post\"\n\t\tchannelVals.GuildID = guildID\n\t}\n\n\tctx, cancel := context.WithTimeout(context.Background(), 5*time.Second)\n\tdefer cancel()\n\n\tchannelCollection := ConnectDB(\"channel\")\n\n\tchannelRes, err := channelCollection.InsertOne(ctx, channelVals)\n\thandleError(err)\n\n\treturn channelRes.InsertedID\n}", "title": "" }, { "docid": "a77904f545a13c776d523de30c5a446e", "score": "0.4859158", "text": "func handleFileCreation(c *Command) {\n\tfor _, f := range c.Config.Creates {\n\t\tfinfo, err := os.Stat(f)\n\t\tswitch {\n\t\tcase os.IsNotExist(err):\n\t\t\tc.mutex.Lock()\n\t\t\tc.Success = false\n\t\t\tc.Messages = append(c.Messages, fmt.Sprintf(\"file not created: %s\", f))\n\t\t\tc.ReportReason = proto.FileNotCreated\n\t\t\tc.mutex.Unlock()\n\t\t\tgo c.report.Send(c, proto.FileNotCreated)\n\t\tcase err == nil:\n\t\t\tc.mutex.Lock()\n\t\t\tc.Created = append(c.Created, File{\n\t\t\t\tPath: finfo.Name(),\n\t\t\t\tTime: finfo.ModTime(),\n\t\t\t\tSize: finfo.Size(),\n\t\t\t})\n\t\t\tc.mutex.Unlock()\n\t\tdefault:\n\t\t\tcontinue\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "a78b2cdbe030620135fd1344f84f56c1", "score": "0.4854884", "text": "func (flow *Flow) Channel(ch chan interface{}) (ret *Dataset) {\n\tret = flow.NewNextDataset(1)\n\tstep := flow.AddOneToOneStep(nil, ret)\n\tstep.IsOnDriverSide = true\n\tstep.Name = \"Channel\"\n\tstep.Function = func(readers []io.Reader, writers []io.Writer, stat *pb.InstructionStat) error {\n\t\tfor data := range ch {\n\t\t\tstat.InputCounter++\n\t\t\terr := util.NewRow(util.Now(), data).WriteTo(writers[0])\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tstat.OutputCounter++\n\t\t}\n\t\treturn nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "bcbb4251afa81715f17e361959979042", "score": "0.4852114", "text": "func (r *customCommandResolver) Channel(ctx context.Context, obj *models.CustomCommand) (*models.Channel, error) {\n\ttx := txFromContext(ctx)\n\treturn obj.Channel().One(ctx, tx)\n}", "title": "" }, { "docid": "8554cbfd3c063a8d09817a9e93864d98", "score": "0.4835344", "text": "func (a *PublishSubscribeApiService) GetChannelExecute(r ApiGetChannelRequest) (SingleChannel, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SingleChannel\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"PublishSubscribeApiService.GetChannel\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/channels/{channel_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"channel_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_channelId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tif r.P_lang != nil {\n\t\tlocalVarQueryParams.Add(\"lang\", parameterToString(*r.P_lang, \"\"))\n\t}\n\tif r.P_isDev != nil {\n\t\tlocalVarQueryParams.Add(\"is_dev\", parameterToString(*r.P_isDev, \"\"))\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "661518f9a6da709f90e026e467a22d5d", "score": "0.48295856", "text": "func (wtc *Watcher) RegisterChannel(channelID string) error {\n\tregisered, err := wtc.IsRegistered(channelID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif regisered {\n\t\treturn nil\n\t}\n\n\tf, err := os.OpenFile(wtc.ChannelsFilePath, os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0666)\n\tif err != nil {\n\t\tlogger.Printf(\"register channel open %s, %s\", wtc.ChannelsFilePath, err)\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tif _, err = f.WriteString(fmt.Sprintf(\"%s\\n\", channelID)); err != nil {\n\t\tlogger.Print(err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "19b0599393f1d38ea07d637b199f4f74", "score": "0.48168644", "text": "func NewChannel() *Channel {\n\treturn NewChannelWithSize(DefaultChanBufferSize)\n}", "title": "" }, { "docid": "19b0599393f1d38ea07d637b199f4f74", "score": "0.48168644", "text": "func NewChannel() *Channel {\n\treturn NewChannelWithSize(DefaultChanBufferSize)\n}", "title": "" }, { "docid": "26126e920c7d59648c14d8bac2e75865", "score": "0.48144928", "text": "func createTokenChan(w http.ResponseWriter, r *http.Request, thisChan chan Token, chanDone chan bool, ChanID, recType string) {\n\tif SYS_STATELESS_SERVER == true {\n\t\treturn\n\t}\n\tisDesktopClient := false\n\tFL_DESKTOP := checkDesktop(w,r)\n\tif FL_DESKTOP == true {\n\t\tisDesktopClient = true\n\t}\n uid := \"\"\n tok := \"\"\n //c := appengine.NewContext(r)\n c, cancel := context.WithTimeout(context.Background(), 30*time.Second)\n defer cancel()\n //u := user.Current(c)\n if r.Header.Get(\"X-Goog-Authenticated-User-Email\") != \"\" && ChanID == \"\" {\n\t//ChanID = uid\n\t_, uid := checkSession(w,r)\n\tChanID = uid\n }\n //if uid == \"\" {\n if r.Header.Get(\"X-Goog-Authenticated-User-Email\") == \"\" && ChanID == \"\" {\n\tipAdd := getIpAdd(w,r)\n\tgeoStr := getGeoString(w,r)\n\tif geoStr == \"\" {\n\t\tuid = fmt.Sprintf(\"guest-%v@%v\", randSeq(6), ipAdd)\n\t} else {\n\t\tuid = fmt.Sprintf(\"guest-%v@%v\", geoStr, ipAdd)\n\t}\n\tChanID = uid\n\t\n }\n //use existing channel id\n if uid == \"\" {\n \t uid = ChanID\n }\n var e Channelstore\n FL_CHAN_EXIST := true\n //D0086\n datastoreClient := createClientDS()\n //log.Printf(\"datastoreClient.Get() [5694]\")\n if err := datastoreClient.Get(c, getKeyChannel(c,ChanID), &e); err != nil {\n\t FL_CHAN_EXIST = false\n } else {\n\tif e.DateCreated == \"\" {\n\t\t//if no date found\n\t\te.DateCreated = \"20150101000000\"\n\t}\n \ttimeFormat := \"20060102150405\"\n\tthen, err := time.Parse(timeFormat, e.DateCreated)\n\tif err != nil {\n\t\t panic(err)\n\t\t//return\n\t}\n\tduration := time.Since(then)\n\tif duration.Hours() > CHAN_HOURS_EXPR {\n\t\tIS_ACTIVE := getActiveStatus(w,r,e.ChanID)\n\t\tif IS_ACTIVE == \"N\" {\n\t\t\t//delete old channel here\n\t\t\tFL_CHAN_EXIST = false\n\t\t\tdatastoreClient.Delete(c, getKeyChannel(c,e.ChanID))\n\t\t}\n\t}\n }\n if FL_CHAN_EXIST == false {\n \n\t\ttokNew := newChannelPut(w,r,ChanID,uid,isDesktopClient,recType)\n\t\ttok = tokNew\n } else {\n\t\ttok = e.TokenID\n }\n //return uid, tok\n t := Token{\n\t User: uid,\n\t Token: tok,\n }\n thisChan <- t\n chanDone <- true\n}", "title": "" }, { "docid": "33cce5569d4687a3f84d440afb4b97bd", "score": "0.47945908", "text": "func NewChannel(name string, p *v1alpha1.Parallel) (*unstructured.Unstructured, error) {\n\t// Set the name of the resource we're creating as well as the namespace, etc.\n\ttemplate := eventingduck.ChannelTemplateSpecInternal{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: p.Spec.ChannelTemplate.Kind,\n\t\t\tAPIVersion: p.Spec.ChannelTemplate.APIVersion,\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tOwnerReferences: []metav1.OwnerReference{\n\t\t\t\t*kmeta.NewControllerRef(p),\n\t\t\t},\n\t\t\tName: name,\n\t\t\tNamespace: p.Namespace,\n\t\t},\n\t\tSpec: p.Spec.ChannelTemplate.Spec,\n\t}\n\traw, err := json.Marshal(template)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu := &unstructured.Unstructured{}\n\terr = json.Unmarshal(raw, u)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn u, nil\n}", "title": "" }, { "docid": "a4068da40b0f25d2ca4f606e31aac7f6", "score": "0.4793409", "text": "func (fc *FlowContext) Channel(ch chan interface{}) (ret *Dataset) {\n\tret = fc.newNextDataset(1)\n\tstep := fc.AddOneToOneStep(nil, ret)\n\tstep.IsOnDriverSide = true\n\tstep.Name = \"Channel\"\n\tstep.Function = func(readers []io.Reader, writers []io.Writer, stats *instruction.Stats) error {\n\t\tfor data := range ch {\n\t\t\terr := util.WriteRow(writers[0], data)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tstats.Count++\n\t\t}\n\t\treturn nil\n\t}\n\treturn\n}", "title": "" }, { "docid": "a9f5d359c5680bdfebdea5e36d1c509f", "score": "0.4788676", "text": "func newResourceChannel() *resourceChannel {\n\tvar resourceChannel = &resourceChannel{\n\t\tbatchResourceChan: make(chan *batchResources, 1024),\n\t\tdone: false,\n\t}\n\treturn resourceChannel\n}", "title": "" }, { "docid": "c8d215dedd9d69bd6cbf89b73663e2b7", "score": "0.47722688", "text": "func newChannel(name string) *channel {\n\treturn &channel{\n\t\tname: name,\n\t\tmodes: new(ChanMode),\n\t\tnicks: make(map[*nick]*ChanPrivs),\n\t\tlookup: make(map[string]*nick),\n\t}\n}", "title": "" }, { "docid": "595a4291994d531913c3e99b00df165e", "score": "0.47684002", "text": "func newChannelContext(executor Executor, name string, pipeline ChannelPipeline, handler interface{}) *ChannelContext {\n\tctx := &ChannelContext{name: name, executor: executor}\n\tctx.init(pipeline, handler)\n\tif name == \"HeadContext\" {\n\t\tlog.Debugf(\"+--------------------ChannelHandler list------------------------+\")\n\t} else if name == \"TailContext\" {\n\t\tlog.Debugf(\"+---------------------------------------------------------------+\")\n\t} else {\n\t\tlog.Debugf(\"+------ name:%-22s isInbound: %-4v isOutbound: %-4v\", name, ctx.inbound, ctx.outbound)\n\t}\n\treturn ctx\n}", "title": "" }, { "docid": "37795a4b467d65d78f7a6d3f222f2978", "score": "0.47642326", "text": "func (m *ChannelsManager) Init(cfg *channels.Channels, version string) error {\n\tif cfg == nil {\n\t\treturn nil\n\t}\n\n\tfor idx := range cfg.Email {\n\t\tmodule, err := email.New(cfg.Email[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init email channel %s, %w\", cfg.Email[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Slack {\n\t\tmodule, err := slack.New(cfg.Slack[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init slack channel %s, %w\", cfg.Slack[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Telegram {\n\t\tmodule, err := telegram.New(cfg.Telegram[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init telegram channel %s, %w\", cfg.Telegram[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Syslog {\n\t\tmodule, err := syslog.New(cfg.Syslog[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init syslog channel %s, %w\", cfg.Syslog[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Notify {\n\t\tmodule, err := notify.New(cfg.Notify[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init syslog channel %s, %w\", cfg.Notify[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Discord {\n\t\tmodule, err := discord.New(cfg.Discord[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init discord channel %s, %w\", cfg.Discord[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Webhook {\n\t\tmodule, err := webhook.New(cfg.Webhook[idx], version, m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init webhook channel %s, %w\", cfg.Webhook[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Alertmanager {\n\t\tmodule, err := alertmanager.New(cfg.Alertmanager[idx], version, m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init alertmanager channel %s, %w\", cfg.Alertmanager[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.AlertmanagerReceiver {\n\t\tmodule, err := alertmanagerreceiver.New(cfg.AlertmanagerReceiver[idx], version, m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init alertmanager_receiver channel %s, %w\", cfg.AlertmanagerReceiver[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.TwilioVoice {\n\t\tmodule, err := twiliovoice.New(cfg.TwilioVoice[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init twilio channel %s, %w\", cfg.AlertmanagerReceiver[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\tfor idx := range cfg.Log {\n\t\tmodule, err := log.New(cfg.Log[idx], m.logger)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error init log channel %s, %w\", cfg.Log[idx].Name, err)\n\t\t}\n\n\t\tm.channels[module.Name()] = module\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5f00578d99162d53e31e09a5623d29e1", "score": "0.47640634", "text": "func (setup *MySetupImpl) Initialize(sdk *fabsdk.FabricSDK) error {\n\n\tmspClient, err := mspclient.New(sdk.Context(), mspclient.WithOrg(setup.PeerOrgID))\n\tadminIdentity, err := mspClient.GetSigningIdentity(setup.PeerAdminUser)\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to get client context\")\n\t}\n\tsetup.Identity = adminIdentity\n\n\tconfig, err := sdk.Config()\n\tif err != nil {\n\t\treturn errors.WithMessage(err, \"failed to get client config\")\n\t}\n\n\tallTargets, err := allTargetPeers(config, \"\")\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"loading all target peers from config failed\")\n\t}\n\tsetup.AllTargets = allTargets\n\n\ttargets, err := getTargetsByOrg(allTargets, []string{strings.ToLower(setup.PeerOrgID)})\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"loading target peers from config failed\")\n\t}\n\tsetup.Targets = targets\n\n\t// r, err := os.Open(setup.ChannelConfigFile)\n\t// if err != nil {\n\t// \treturn errors.Wrapf(err, \"opening channel config file failed\")\n\t// }\n\t// defer func() {\n\t// \tif err = r.Close(); err != nil {\n\t// \t\tfmt.Printf(\"close error %v\\n\", err)\n\t// \t}\n\t// }()\n\n\t// // Create channel for tests\n\t// req := resmgmt.SaveChannelRequest{ChannelID: setup.ChannelID, ChannelConfig: r, SigningIdentities: []msp.SigningIdentity{adminIdentity}}\n\t// if err = InitializeChannel(sdk, setup.PeerAdminUser, setup.PeerOrgID, setup.OrdererAdminUser, setup.OrdererOrgID, req, targets); err != nil {\n\t// \treturn errors.WithMessage(err, \"failed to initialize channel\")\n\t// }\n\n\treturn nil\n}", "title": "" }, { "docid": "080705ea034ca31601b53997f296b1da", "score": "0.47626978", "text": "func NewChannel(channelName string) *Channel {\n\ts := strings.Split(channelName, channelDelimiter)\n\treturn &Channel{\n\t\tMessengerID: s[0],\n\t\tChannelID: strings.Join(s[1:], \"\")}\n}", "title": "" }, { "docid": "55b8f78e4d6ac0e9fc4123df8fe17946", "score": "0.47460723", "text": "func (h *grpcChannelzHandler) writeSubchannel(w io.Writer, subchannel int64) {\n\tif err := subChannelTemplate.Execute(w, h.getSubchannel(subchannel)); err != nil {\n\t\tlog.Errorf(\"channelz: executing template: %v\", err)\n\t}\n}", "title": "" }, { "docid": "bbf3cdff6f266caa8dcf0dbbbda1e0ae", "score": "0.47432542", "text": "func NewFileChan(addr string, nameOK func(string) bool, cleanup bool) <-chan struct {\n\tFile Filer\n\tError error\n} {\n\tvar (\n\t\tpipe = make(chan struct {\n\t\t\tFile Filer\n\t\t\tError error\n\t\t})\n\t\tmakeResult = func(f Filer, err error) struct {\n\t\t\tFile Filer\n\t\t\tError error\n\t\t} {\n\t\t\treturn struct {\n\t\t\t\tFile Filer\n\t\t\t\tError error\n\t\t\t}{\n\t\t\t\tf,\n\t\t\t\terr,\n\t\t\t}\n\t\t}\n\t)\n\tgo func() {\n\t\tdefer func() { close(pipe) }()\n\n\t\tvar (\n\t\t\tc *ftp.ServerConn\n\t\t\tl []*ftp.Entry\n\t\t\tr io.ReadCloser\n\t\t\tb *bytes.Buffer\n\t\t\terr error\n\t\t)\n\n\t\tc, err = newFTP(addr)\n\t\tif err != nil {\n\t\t\tgoto fail\n\t\t}\n\t\tdefer func() { _ = c.Quit() }()\n\n\t\tl, err = c.List(\".\")\n\t\tif err != nil {\n\t\t\tgoto fail\n\t\t}\n\n\t\tfor _, v := range l {\n\t\t\tif skipFile(v, nameOK) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tr, err = c.Retr(v.Name)\n\t\t\tif err != nil {\n\t\t\t\tgoto fail\n\t\t\t}\n\n\t\t\tb = new(bytes.Buffer)\n\t\t\terr = copyFileAndClose(b, r)\n\t\t\tif err != nil {\n\t\t\t\tgoto fail\n\t\t\t}\n\n\t\t\tif cleanup {\n\t\t\t\terr = c.Delete(v.Name)\n\t\t\t\tif err != nil {\n\t\t\t\t\tgoto fail\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tpipe <- makeResult(\n\t\t\t\tfile{\n\t\t\t\t\tr: b,\n\t\t\t\t\tname: v.Name,\n\t\t\t\t\ttime: v.Time,\n\t\t\t\t},\n\t\t\t\tnil,\n\t\t\t)\n\t\t}\n\n\t\treturn // success\n\tfail:\n\t\tpipe <- makeResult(nil, err)\n\t}()\n\n\treturn pipe\n}", "title": "" }, { "docid": "99d305021363eaa2285b376d3f5cca13", "score": "0.4742817", "text": "func (s *Session) ChannelFileSend(channelID int64, name string, r io.Reader, options ...RequestOption) (*Message, error) {\n\treturn s.ChannelMessageSendComplex(channelID, &MessageSend{File: &File{Name: name, Reader: r}}, options...)\n}", "title": "" }, { "docid": "384b175dc8cbdeffbeab6038761f0003", "score": "0.47427553", "text": "func (b *Bot) SendFile(fileName string, reader io.Reader) error {\n\n\tpipeReader, pipeWriter := io.Pipe()\n\tmultipartWriter := multipart.NewWriter(pipeWriter)\n\tgo func() {\n\t\tdefer pipeWriter.Close()\n\n\t\t// start write field in multipartWriter\n\t\tif err := multipartWriter.WriteField(\"chat_id\", b.ChatId); err != nil {\n\t\t\t_ = pipeWriter.CloseWithError(err)\n\t\t\treturn\n\t\t}\n\n\t\tconst disableNotification = \"true\"\n\t\tif err := multipartWriter.WriteField(\"disable_notification\", disableNotification); err != nil {\n\t\t\t_ = pipeWriter.CloseWithError(err)\n\t\t\treturn\n\t\t}\n\n\t\tpart, err := multipartWriter.CreateFormFile(\"document\", fileName)\n\t\tif err != nil {\n\t\t\t_ = pipeWriter.CloseWithError(err)\n\t\t\treturn\n\t\t}\n\n\t\tlog.Printf(\"[send file] start copy %s\", fileName)\n\t\tif _, err := io.Copy(part, reader); err != nil {\n\t\t\t_ = pipeWriter.CloseWithError(err)\n\t\t\treturn\n\t\t}\n\t\tlog.Printf(\"[send file] sucess copy %s\", fileName)\n\n\t\tif err := multipartWriter.Close(); err != nil {\n\t\t\t_ = pipeWriter.CloseWithError(err)\n\t\t\treturn\n\t\t}\n\n\t}()\n\n\tresp, err := client.Post(b.ConstructUrlForSend(), multipartWriter.FormDataContentType(), pipeReader)\n\tif err != nil {\n\t\t_ = pipeReader.CloseWithError(err)\n\t\treturn err\n\t}\n\n\tresp.Close = true\n\tdefer resp.Body.Close()\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn fmt.Errorf(\"[send file] bad HTTP response: %v, %s\", resp.StatusCode, data)\n\t}\n\tlog.Printf(\"[send file] sucess send file %s\", fileName)\n\n\treturn nil\n}", "title": "" }, { "docid": "295444a4e8ebda10a74e863aaee8ab92", "score": "0.47426718", "text": "func ChannelHandle(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != \"GET\" {\n\t\thttp.Error(w, \"Method Not Allowed\", 405)\n\t\treturn\n\t}\n\n\tparams := r.URL.Query()\n\tkey := params.Get(\"key\")\n\ttoken := params.Get(\"token\")\n\tif key == \"\" || token == \"\" {\n\t\tif err := retWrite(w, \"param error\", retParamErr); err != nil {\n\t\t\tLog.Printf(\"retWrite failed (%s)\", err.Error())\n\t\t}\n\n\t\treturn\n\t}\n\n\tLog.Printf(\"device %s: add channel, token = %s\", key, token)\n\tc, err := channel.New(key)\n\tif err != nil {\n\t\tLog.Printf(\"device %s: can't create channle\", key)\n\t\tif err = retWrite(w, \"create channel failed\", retCreateChannel); err != nil {\n\t\t\tLog.Printf(\"retWrite failed (%s)\", err.Error())\n\t\t}\n\n\t\treturn\n\t}\n\n\tif err = c.AddToken(token, key); err != nil {\n\t\tLog.Printf(\"device %s: can't add token %s\", key, token)\n\t\tif err = retWrite(w, \"add token failed\", retAddToken); err != nil {\n\t\t\tLog.Printf(\"retWrite failed (%s)\", err.Error())\n\t\t\treturn\n\t\t}\n\t}\n\n\tif err = retWrite(w, \"ok\", retOK); err != nil {\n\t\tLog.Printf(\"retWrite() failed (%s)\", err.Error())\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "53e025da077fe49b81c579caf9658bbb", "score": "0.474144", "text": "func CreateKafkaWorker(statuschan chan string, filename string) KafkaWorker {\n // Create, and return the worker.\n worker := Worker{\n StatusChan: statuschan,\n NumRetries: 2,\n messages: []string{},\n Filename: filename,\n }\n kafka_worker := KafkaWorker{\n Worker: worker,\n Producer: Getkafkaproducer(),\n Count: 0,\n QuitChan: make(chan bool),\n }\n return kafka_worker\n}", "title": "" }, { "docid": "774e39a59208d0d12b68689a2982e3cd", "score": "0.4740843", "text": "func Exec(ctx context.Context) error {\n\tfor _, name := range []string{dfv1.PathKill, dfv1.PathPreStop} {\n\t\tlogger.Info(\"copying binary\", \"name\", name)\n\t\ta := filepath.Join(\"/bin\", filepath.Base(name))\n\t\tsrc, err := os.Open(a)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to open %s: %w\", a, err)\n\t\t}\n\t\tdst, err := os.OpenFile(name, os.O_RDWR|os.O_CREATE, 0o500)\n\t\tif sharedutil.IgnorePermission(sharedutil.IgnoreExist(err)) != nil {\n\t\t\treturn fmt.Errorf(\"failed to open %s: %w\", name, err)\n\t\t} else if err == nil {\n\t\t\tif _, err := io.Copy(dst, src); sharedutil.IgnoreExist(err) != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to create input FIFO: %w\", err)\n\t\t\t}\n\t\t}\n\t}\n\tstep := dfv1.Step{}\n\tsharedutil.MustUnJSON(os.Getenv(dfv1.EnvStep), &step)\n\tlogger.Info(\"creating authorization file\")\n\tif err := os.WriteFile(dfv1.PathAuthorization, []byte(sharedutil.RandString()), 0o600); sharedutil.IgnoreExist(err) != nil {\n\t\treturn fmt.Errorf(\"failed to create authorization file: %w\", err)\n\t}\n\tif step.Spec.GetIn().FIFO {\n\t\tlogger.Info(\"creating in fifo\")\n\t\tif err := syscall.Mkfifo(dfv1.PathFIFOIn, 0o600); sharedutil.IgnoreExist(err) != nil {\n\t\t\treturn fmt.Errorf(\"failed to create input FIFO: %w\", err)\n\t\t}\n\t}\n\tlogger.Info(\"creating out fifo\")\n\tif err := syscall.Mkfifo(dfv1.PathFIFOOut, 0o600); sharedutil.IgnoreExist(err) != nil {\n\t\treturn fmt.Errorf(\"failed to create output FIFO: %w\", err)\n\t}\n\tif g := step.Spec.Git; g != nil {\n\t\tlogger.Info(\"cloning\", \"url\", g.URL, \"checkout\", dfv1.PathCheckout)\n\t\tvar auth transport.AuthMethod\n\n\t\tif k := g.UsernameSecret; k != nil {\n\t\t\tif v := g.PasswordSecret; v != nil {\n\t\t\t\tlogger.Info(\"getting secret for auth\", \"UsernameSecret\", k, \"PasswordSecret\", v)\n\t\t\t\tsecretInterface := kubernetes.NewForConfigOrDie(ctrl.GetConfigOrDie()).CoreV1().Secrets(os.Getenv(dfv1.EnvNamespace))\n\n\t\t\t\tif usernameSecret, err := secretInterface.Get(ctx, k.Name, metav1.GetOptions{}); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to get secret %q: %w\", k.Name, err)\n\t\t\t\t} else {\n\t\t\t\t\tif pwdSecret, err := secretInterface.Get(ctx, v.Name, metav1.GetOptions{}); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"failed to get secret %q: %w\", v.Name, err)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tauth = &http.BasicAuth{\n\t\t\t\t\t\t\tUsername: string(usernameSecret.Data[k.Key]),\n\t\t\t\t\t\t\tPassword: string(pwdSecret.Data[v.Key]),\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif k := g.SSHPrivateKeySecret; k != nil {\n\t\t\tlogger.Info(\"getting secret for auth\", \"SSHPrivateKeySecret\", k)\n\t\t\tsecretInterface := kubernetes.NewForConfigOrDie(ctrl.GetConfigOrDie()).CoreV1().Secrets(os.Getenv(dfv1.EnvNamespace))\n\n\t\t\tif sshPrivateKey, err := secretInterface.Get(ctx, k.Name, metav1.GetOptions{}); err != nil {\n\t\t\t\treturn fmt.Errorf(\"failed to get secret %q: %w\", k.Name, err)\n\t\t\t} else {\n\t\t\t\tif v, err := ssh.NewPublicKeys(\"git\", sshPrivateKey.Data[k.Key], \"\"); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to get create public keys: %w\", err)\n\t\t\t\t} else {\n\t\t\t\t\tauth = v\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif _, err := git.PlainClone(dfv1.PathCheckout, false, &git.CloneOptions{\n\t\t\tAuth: auth,\n\t\t\tDepth: 1, // checkout faster\n\t\t\tProgress: os.Stdout,\n\t\t\tReferenceName: plumbing.NewBranchReferenceName(g.Branch),\n\t\t\tSingleBranch: true, // checkout faster\n\t\t\tURL: g.URL,\n\t\t}); IgnoreErrRepositoryAlreadyExists(err) != nil {\n\t\t\treturn fmt.Errorf(\"failed to clone repo: %w\", err)\n\t\t}\n\t\tpath := filepath.Join(dfv1.PathCheckout, g.Path)\n\t\tif _, err := os.Stat(path); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to stat %s: %w\", path, err)\n\t\t}\n\t\tlogger.Info(\"moving checked out code\", \"path\", path, \"wd\", dfv1.PathWorkingDir)\n\t\tif err := os.Rename(path, dfv1.PathWorkingDir); sharedutil.IgnoreExist(err) != nil {\n\t\t\treturn fmt.Errorf(\"failed to moved checked out path to working dir: %w\", err)\n\t\t}\n\t} else if h := step.Spec.Code; h != nil {\n\t\tlogger.Info(\"setting up handler\", \"runtime\", h.Runtime, \"code\", strings.ShortenString(h.Source, 32)+\"...\")\n\t\tif err := ioutil.WriteFile(dfv1.PathHandlerFile, []byte(h.Source), 0o600); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to create code file: %w\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4ccf0814b5251c090ed4ca8ce1889aea", "score": "0.47278705", "text": "func NewChannel(channels are_hub.ChannelRepo) Channel {\n\treturn Channel{channels}\n}", "title": "" }, { "docid": "141c34e841df82c9e4e9bc43f76a15ef", "score": "0.4723214", "text": "func (engine *MRCPEngine) MRCPEngineSinkChannelCreate(channelVTable *MRCPEngineChannelMethodVTable, streamVTable *mpf.AudioStreamVTable,\n\tmethodObj interface{}, codecDescriptor *mpf.CodecDescriptor) *MRCPEngineChannel {\n\treturn nil\n}", "title": "" }, { "docid": "bc68383e5603f571555538f18527796d", "score": "0.47213262", "text": "func (*CreateChannelRequest) Descriptor() ([]byte, []int) {\n\treturn file_channel_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "18214654e74491b7821a3a5ef5489a72", "score": "0.47139788", "text": "func (cs *CryptoStore) CreateChannel(channel string) (*Channel, error) {\n\tcs.Lock()\n\tdefer cs.Unlock()\n\n\tc, err := cs.Store.CreateChannel(channel)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.Msgs = cs.newCryptoMsgStore(c.Msgs)\n\treturn c, nil\n}", "title": "" }, { "docid": "6d319d2d9bbc399172b454a8fe045813", "score": "0.47017387", "text": "func (filewatcher *fileWatcher) RegisterForFileNotifications() <-chan *File {\n\tchannel := make(chan *File, 10)\n\tfilewatcher.Lock()\n\tdefer filewatcher.Unlock()\n\tfilewatcher.outgoingFileNotificationChannels = append(filewatcher.outgoingFileNotificationChannels, channel)\n\treturn channel\n}", "title": "" }, { "docid": "afed95b3efde2e9ef84359875a98f003", "score": "0.47008112", "text": "func CreateAndJoinChannel(client api.FabricClient, ordererUser api.User, orgUser api.User, channel api.Channel, channelConfig string) error {\n\t// Check if primary peer has joined this channel\n\tvar foundChannel bool\n\tprimaryPeer := channel.GetPrimaryPeer()\n\tclient.SetUserContext(orgUser)\n\tresponse, err := client.QueryChannels(primaryPeer)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error querying channels for primary peer: %s\", err)\n\t}\n\tfor _, responseChannel := range response.Channels {\n\t\tif responseChannel.ChannelId == channel.GetName() {\n\t\t\tfoundChannel = true\n\t\t}\n\t}\n\n\tif foundChannel {\n\t\t// There's no need to create a channel, initialize the channel from the orderer and return\n\t\tif err := channel.Initialize(nil); err != nil {\n\t\t\treturn fmt.Errorf(\"Error initializing channel: %v\", err)\n\t\t}\n\t\treturn nil\n\t}\n\n\tlogger.Infof(\"***** Creating and Joining channel: %s *****\\n\", channel.GetName())\n\n\tconfigTx, err := ioutil.ReadFile(channelConfig)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error reading config file: %v\", err)\n\t}\n\n\tconfig, err := client.ExtractChannelConfig(configTx)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error extracting channel config: %v\", err)\n\t}\n\n\tconfigSignature, err := client.SignChannelConfig(config)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error signing configuration: %v\", err)\n\t}\n\n\tvar configSignatures []*common.ConfigSignature\n\tconfigSignatures = append(configSignatures, configSignature)\n\n\tcreator, err := client.GetIdentity()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error getting creator: %v\", err)\n\t}\n\tnonce, err := generateRandomNonce()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute nonce: %s\", err)\n\t}\n\ttxID, err := computeTxID(nonce, creator)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute TxID: %s\", err)\n\t}\n\n\trequest := api.CreateChannelRequest{\n\t\tName: channel.GetName(),\n\t\tOrderer: channel.GetOrderers()[0],\n\t\tConfig: config,\n\t\tSignatures: configSignatures,\n\t\tTxID: txID,\n\t\tNonce: nonce,\n\t}\n\n\tclient.SetUserContext(ordererUser)\n\terr = client.CreateChannel(&request)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"CreateChannel returned error\")\n\t}\n\n\t// Wait for orderer to process channel metadata\n\ttime.Sleep(time.Second * 3)\n\n\tclient.SetUserContext(orgUser)\n\n\tnonce, err = generateRandomNonce()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute nonce: %s\", err)\n\t}\n\ttxID, err = computeTxID(nonce, creator)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute TxID: %s\", err)\n\t}\n\n\tgenesisBlockRequest := &api.GenesisBlockRequest{\n\t\tTxID: txID,\n\t\tNonce: nonce,\n\t}\n\tgenesisBlock, err := channel.GetGenesisBlock(genesisBlockRequest)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error getting genesis block: %v\", err)\n\t}\n\n\tnonce, err = generateRandomNonce()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute nonce: %s\", err)\n\t}\n\ttxID, err = computeTxID(nonce, creator)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not compute TxID: %s\", err)\n\t}\n\tjoinChannelRequest := &api.JoinChannelRequest{\n\t\tTargets: channel.GetPeers(),\n\t\tGenesisBlock: genesisBlock,\n\t\tTxID: txID,\n\t\tNonce: nonce,\n\t}\n\terr = channel.JoinChannel(joinChannelRequest)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error joining channel: %s\", err)\n\t}\n\n\tlogger.Infof(\"***** Created and Joined channel: %s *****\\n\", channel.GetName())\n\n\treturn nil\n}", "title": "" }, { "docid": "7a69d5819e6a0c08680c09feea88c076", "score": "0.4696464", "text": "func Add_Agent_To_api_Channel() (channel api.Channel) {\n\tchannel.Type = \"unix\"\n\t// let libvirt decide which path to use\n\tchannel.Source = nil\n\tchannel.Target = &api.ChannelTarget{\n\t\tName: \"org.qemu.guest_agent.0\",\n\t\tType: v1.VirtIO,\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ef653788e17843ef7ba5787541647ad3", "score": "0.46917883", "text": "func NewJWorker(file string, wg *sync.WaitGroup, wsChan chan string) (*JWorker, error) {\n\tw := &JWorker{}\n\n\tsignalch := make(chan os.Signal)\n\tstatusch := make(chan struct{})\n\tdataCh := make(chan *gnmi.SubscribeResponse, 20000)\n\tjctx := JCtx{\n\t\tfile: file,\n\t\twg: wg,\n\t\tpExporter: exporter,\n\t\tstats: statsCtx{\n\t\t\tstartTime: time.Now(),\n\t\t},\n\t}\n\tw.jctx = &jctx\n\tw.signalch = signalch\n\n\tif *genTestData {\n\t\ttestSetup(&jctx)\n\t}\n\n\terr := ConfigRead(&jctx, true, nil)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn w, err\n\t}\n\tlog.Printf(\"%v, jctx.config.Kafka.producer: %v\", jctx.config.Host, jctx.config.Kafka)\n\tif alias, err := NewAlias(jctx.config.Alias); err == nil {\n\t\tjctx.alias = alias\n } else {\n\t\tjLog(&jctx, fmt.Sprintf(\"New alias creation failed for %v, err: %v\", jctx.config.Host, err))\n }\n\tgo func() {\n\t\tif *dialOut {\n\t\t\t// Publish the initial config for dial-out\n\t\t\treq := getDialOutRequest(&jctx)\n\t\t\tctxPayload, err := proto.Marshal(req)\n\t\t\tif err != nil {\n\t\t\t\t// TODO: Vivek Will jctx.config.Host reflect the right host ?\n\t\t\t\tjLog(&jctx, fmt.Sprintf(\"Marshalling dial-out context failed for %v, err: %v\", jctx.config.Host, err))\n\t\t\t}\n\t\t\t// TODO: Vivek Make topic configurable.\n\t\t\ttopic := \"gnmi-config\"\n\t\t\tp, o, err := (*jctx.config.Kafka.producer).SendMessage(\n\t\t\t\t&sarama.ProducerMessage{\n\t\t\t\t\tTopic: topic,\n\t\t\t\t\tValue: sarama.ByteEncoder(ctxPayload),\n\t\t\t\t},\n\t\t\t)\n\t\t\tjLog(&jctx, fmt.Sprintf(\"Initial configuration for %v published to topic %v, partition %v, offset %v, err: %v\", jctx.config.Host, topic, p, o, err))\n\t\t}\n\t\tfor {\n\t\t\tselect {\n\t\t\tcase sig := <-signalch:\n\t\t\t\tswitch sig {\n\t\t\t\tcase os.Interrupt:\n\t\t\t\t\t// we are asked to stop\n\t\t\t\t\tprintSummary(&jctx)\n\t\t\t\t\tjLog(&jctx, fmt.Sprintf(\"Streaming for host %s will be stopped (SIGINT)\", jctx.config.Host))\n\t\t\t\t\tif *genTestData {\n\t\t\t\t\t\ttestTearDown(&jctx)\n\t\t\t\t\t}\n\t\t\t\t\tjctx.wg.Done()\n\t\t\t\t\t// let the downstream subscribe go routines know we are done and no need to restart\n\t\t\t\t\tjctx.control <- os.Interrupt\n\t\t\t\t\tlogStop(&jctx)\n\t\t\t\t\treturn\n\t\t\t\tcase syscall.SIGHUP:\n\t\t\t\t\t// handle SIGHUP if the streaming is happening.\n\t\t\t\t\t// running will not be set when the connection is\n\t\t\t\t\t// not establihsed and it is trying to connect.\n\t\t\t\t\t// ConfigRead will re-parse the config and updates jctx so\n\t\t\t\t\t// when we retry Dial, it will do it with updated config\n\t\t\t\t\trestart := false\n\t\t\t\t\terr := ConfigRead(&jctx, false, &restart)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tjLog(&jctx, fmt.Sprintln(err))\n\t\t\t\t\t}\n\t\t\t\t\tif !*dialOut {\n\t\t\t\t\t\tif restart {\n\t\t\t\t\t\t\tjctx.control <- syscall.SIGHUP\n\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\tjLog(&jctx, fmt.Sprintf(\"config re-parse, data streaming has not started yet\"))\n\t\t\t\t\t\t}\n\t\t\t\t\t} else {\n\t\t\t\t\t\treq := getDialOutRequest(&jctx)\n\t\t\t\t\t\tctxPayload, err := proto.Marshal(req)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\t// TODO: Vivek Will jctx.config.Host reflect the right host ?\n\t\t\t\t\t\t\tjLog(&jctx, fmt.Sprintf(\"Marshalling dial-out context failed for %v, err: %v\", jctx.config.Host, err))\n\t\t\t\t\t\t}\n\t\t\t\t\t\t// TODO: Vivek Make topic configurable.\n\t\t\t\t\t\ttopic := \"gnmi-config\"\n\t\t\t\t\t\tp, o, err := (*jctx.config.Kafka.producer).SendMessage(\n\t\t\t\t\t\t\t&sarama.ProducerMessage{\n\t\t\t\t\t\t\t\tTopic: topic,\n\t\t\t\t\t\t\t\tValue: sarama.ByteEncoder(ctxPayload),\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t)\n\t\t\t\t\t\tjLog(&jctx, fmt.Sprintf(\"Configuration for %v published to topic %v, partition %v, offset %v, err: %v\", jctx.config.Host, topic, p, o, err))\n\t\t\t\t\t}\n\t\t\t\tcase syscall.SIGCONT:\n\t\t\t\t\t// Do not start the subscribe worker for dialout..\n\t\t\t\t\tif !*dialOut {\n\t\t\t\t\t\tgo work(&jctx, statusch)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\tcase <-statusch:\n\t\t\t\t// worker must have encountered error\n\t\t\t\tprintSummary(&jctx)\n\t\t\t\twsChan <- jctx.file\n\t\t\t\tjctx.wg.Done()\n\t\t\t\tlogStop(&jctx)\n\t\t\t\treturn\n\t\t\tcase rsp := <-dataCh:\n\t\t\t\terr := gnmiHandleResponse(&jctx, rsp)\n\t\t\t\tif err != nil && strings.Contains(err.Error(), gGnmiJtimonIgnoreErrorSubstr) {\n\t\t\t\t\tjLog(&jctx, fmt.Sprintf(\"gnmiHandleResponse failed: %v\", err))\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}()\n\treturn w, nil\n}", "title": "" }, { "docid": "f9a9e0de7ce2652778fdbe1345c96266", "score": "0.46905792", "text": "func GenerateBuildAndJoinChannelScriptV2x(configBytes []byte) bool {\n\tfmt.Println(\"Generating fabric 2.2.x complaint build and join channel scripts \")\n\tvar netConf NetworkConfig\n\terr := json.Unmarshal(configBytes, &netConf)\n\tif err != nil {\n\t\tfmt.Println(\"Error is generating build and join script\")\n\t\treturn false\n\t}\n\torgMap := netConf.GetOrgMap()\n\torderer := fmt.Sprintf(\"%s:7050\", netConf.Orderer.GetFQDNList()[0])\n\tvar outputBuf bytes.Buffer\n\tfor _, channelInfo := range netConf.Channels {\n\n\t\theader := fmt.Sprintf(buildAndJoinChannelScriptHeaderP1, channelInfo.Name, channelInfo.Name)\n\t\toutputBuf.WriteString(header)\n\t\t//Channel register\n\t\tchannelReg := fmt.Sprintf(channelRegister, channelInfo.Orgs[0], orderer, channelInfo.Name)\n\t\toutputBuf.WriteString(channelReg)\n\t\t//Now run joinchannels\n\n\t\tfor _, org := range channelInfo.Orgs {\n\t\t\toutputBuf.WriteString(fmt.Sprintf(\"\\n# Joining %s for org peers of %s\\n\", channelInfo.Name, org))\n\t\t\torgDetails, _ := orgMap[org]\n\t\t\tfor index := 0; index < orgDetails.Peers; index++ {\n\t\t\t\tjoinChan := fmt.Sprintf(joinChannel, orgDetails.Name, index)\n\t\t\t\toutputBuf.WriteString(joinChan)\n\t\t\t}\n\t\t\t//Perform the anchor peer update\n\t\t\tanchorPeerUpd := fmt.Sprintf(anchoPeerUpdate, org, org, orderer, channelInfo.Name, orgDetails.MSPID)\n\t\t\toutputBuf.WriteString(anchorPeerUpd)\n\t\t}\n\n\t}\n\tioutil.WriteFile(\"./buildandjoinchannel.sh\", outputBuf.Bytes(), 0777)\n\treturn true\n}", "title": "" }, { "docid": "031297f6fe55eca5abcc12eaf79fcd96", "score": "0.46673256", "text": "func (c *Client) NewUserChannel(chanType serverpb.ChannelType) (ch *Channel, err error) {\n\n\t// Instantiation & data (ID, name, etc)\n\n\t// Send Request to implant, wait acknowledge.\n\t// This means the ghost implant has called Accept(), blocking for him.\n\n\t// Stream multiplexing: we mux the main stream, add to chan object\n\tif ch.stream, err = c.Multiplexer.Open(); err != nil { // BLOCKING\n\t\treturn\n\t}\n\n\t// Add RPC layer code if necessary\n\tif chanType == serverpb.ChannelType_CORE_CHAN {\n\t\tch = c.GetChannelCore(ch)\n\t}\n\n\t// Add channel to Session, and potentially register things needed.\n\tc.mutex.Lock()\n\tc.Channels[ch.ID] = ch\n\tc.mutex.Unlock()\n\n\treturn\n}", "title": "" }, { "docid": "a4eeb87febc9944d7e3710c69729840d", "score": "0.46610487", "text": "func (server Server) AddChannel(name string) (channel *Channel) {\n\tchannel = NewChannel(server.nextChannelID, name)\n\tserver.Channels[channel.ID] = channel\n\t// TODO: Itd be nicer to use non-consecutive/iteratable\n\tserver.nextChannelID += 1\n\n\treturn\n}", "title": "" }, { "docid": "1a7d2fec3d344f76ed385d780a3c5832", "score": "0.46548784", "text": "func fileHandler(workerChan chan FileInfo, noticeChan chan NoticeMsg, doneChan chan bool) {\n\tfor {\n\t\tfileInfo, ok := <-workerChan // recieve the work to do and if work was recieved\n\t\tif !ok { // ok is set to false when workerChan is closed\n\t\t\tbreak\n\t\t}\n\n\t\tnotice := FileParse(fileInfo.path, fileInfo.info)\n\t\tif notice != nil {\n\t\t\tnoticeChan <- NoticeMsg{path: fileInfo.path, notice: notice}\n\t\t}\n\t}\n\tdoneChan <- true\n}", "title": "" }, { "docid": "cfd4c69dd0597ef6c36765904af1a2fc", "score": "0.4651464", "text": "func (setups OrgSetupArray) CreateChannel(w http.ResponseWriter, r *http.Request) {\n\tif err := r.ParseForm(); err != nil {\n\t\tfmt.Fprintf(w, \"ParseForm() err: %v\", err)\n\t\treturn\n\t}\n\torgName := r.FormValue(\"orgname\")\n\tchannelID := r.FormValue(\"channelid\")\n\tchannelConfigPath := r.FormValue(\"configpath\")\n\tcurrentSetup := sdkconnector.LoadSetup(orgName, setups)\n\tif currentSetup == nil {\n\t\thttp.Error(w, \"Organization '\"+orgName+\"' does not exist!\", 500)\n\t}\n\terr := sdkconnector.CreateChannel(currentSetup, channelID, channelConfigPath)\n\tif err != nil {\n\t\tfmt.Fprintf(w, err.Error())\n\t\treturn\n\t}\n\tfmt.Fprintf(w, \"Successfully created channel '%s'\", channelID)\n}", "title": "" }, { "docid": "0f348b23a7fb30e6598d6fbad6d2ee75", "score": "0.4647", "text": "func NewProxychannel(hconf *HandlerConfig, sconf *ServerConfig, m map[string]Extension) *Proxychannel {\n\tpc := &Proxychannel{\n\t\textensionManager: NewExtensionManager(m),\n\t\twaitGroup: &sync.WaitGroup{},\n\t\tserverDone: make(chan bool),\n\t}\n\tpc.server = NewServer(hconf, sconf, pc.extensionManager)\n\treturn pc\n}", "title": "" }, { "docid": "bd353f3d6a6dbcc293b4f2d55a899165", "score": "0.46463403", "text": "func (p *Plugin) Execute(config contracts.Configuration, cancelFlag task.CancelFlag, output iohandler.IOHandler) {\n\tlog := p.Context.Log()\n\tlog.Infof(\"%v started with configuration %v\", p.Name, config)\n\tlog.Debugf(\"DefaultWorkingDirectory %v\", config.DefaultWorkingDirectory)\n\n\trunCommandID, err := messageContracts.GetCommandID(config.MessageId)\n\n\tif err != nil {\n\t\tlog.Warnf(\"Error extracting RunCommandID from config %v: Error: %v\", config, err)\n\t\trunCommandID = \"\"\n\t}\n\n\tif cancelFlag.ShutDown() {\n\t\toutput.MarkAsShutdown()\n\t} else if cancelFlag.Canceled() {\n\t\toutput.MarkAsCancelled()\n\t} else {\n\t\tp.runCommandsRawInput(config.PluginID, config.Properties, config.OrchestrationDirectory, config.DefaultWorkingDirectory, cancelFlag, output, runCommandID)\n\t}\n}", "title": "" }, { "docid": "cc5fdb120ccfb775925201988d85a5b2", "score": "0.46444595", "text": "func moduleCustom() {\n\tgo func() {\n\t\tstart_sh := WWWRoot + CurrentMod + \".sh\"\n\t\tconfig, exists := ModuleConfigs[CurrentMod]\n\t\tif !exists {\n\t\t\tCliPrintError(\"Config of %s does not exist\", CurrentMod)\n\t\t\treturn\n\t\t}\n\t\tfor opt, val := range config.Options {\n\t\t\tval[0] = Options[opt].Val\n\t\t}\n\n\t\t// most of the time, start.sh is the only file changing\n\t\t// and it's very small, so we host it for agents to download\n\t\terr = genStartScript(&config, start_sh)\n\t\tif err != nil {\n\t\t\tCliPrintError(\"Generating start.sh: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tif config.IsInteractive {\n\t\t\t// empty out start.sh\n\t\t\t// we will run the module as shell\n\t\t\terr = os.WriteFile(start_sh, []byte(\"echo emp3r0r-interactive-module\\n\"), 0600)\n\t\t\tif err != nil {\n\t\t\t\tCliPrintError(\"write %s: %v\", start_sh, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\t// compress module files\n\t\ttarball := WWWRoot + CurrentMod + \".tar.xz\"\n\t\tCliPrintInfo(\"Compressing %s with xz...\", CurrentMod)\n\t\tpath := fmt.Sprintf(\"%s/%s\", config.Path, CurrentMod)\n\t\terr = util.TarXZ(path, tarball)\n\t\tif err != nil {\n\t\t\tCliPrintError(\"Compressing %s: %v\", CurrentMod, err)\n\t\t\treturn\n\t\t}\n\t\tCliPrintInfo(\"Created %.4fMB archive (%s) for module '%s'\",\n\t\t\tfloat64(util.FileSize(tarball))/1024/1024, tarball, CurrentMod)\n\n\t\t// tell agent to download and execute this module\n\t\tchecksum := tun.SHA256SumFile(tarball)\n\t\tcmd := fmt.Sprintf(\"%s %s %s\", emp3r0r_data.C2CmdCustomModule, CurrentMod, checksum)\n\t\tcmd_id := uuid.NewString()\n\t\terr = SendCmdToCurrentTarget(cmd, cmd_id)\n\t\tif err != nil {\n\t\t\tCliPrintError(\"Sending command %s to %s: %v\", cmd, CurrentTarget.Tag, err)\n\t\t}\n\n\t\t// interactive module\n\t\tif config.IsInteractive {\n\t\t\topt, exits := config.Options[\"args\"]\n\t\t\tif !exits {\n\t\t\t\tconfig.Options[\"args\"] = []string{\"--\", \"No args\"}\n\t\t\t}\n\t\t\targs := opt[0]\n\t\t\tport := strconv.Itoa(util.RandInt(1024, 65535))\n\n\t\t\t// wait until the module is ready\n\t\t\tfor i := 0; i < 10; i++ {\n\t\t\t\tif strings.Contains(CmdResults[cmd_id], \"emp3r0r-interactive-module\") {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\ttime.Sleep(time.Second)\n\t\t\t}\n\t\t\tif !strings.Contains(CmdResults[cmd_id], \"emp3r0r-interactive-module\") {\n\t\t\t\tCliPrintError(\"%s failed to upload\", CurrentMod)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// do it\n\t\t\terr := SSHClient(fmt.Sprintf(\"%s/%s/%s\",\n\t\t\t\tRuntimeConfig.AgentRoot, CurrentMod, config.Exec),\n\t\t\t\targs, port, false)\n\t\t\tif err != nil {\n\t\t\t\tCliPrintError(\"module %s: %v\", config.Name, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}()\n}", "title": "" }, { "docid": "630f52d841939a72420f54bcb0bab855", "score": "0.46443126", "text": "func NewChannel(ctx *pulumi.Context,\n\tname string, args *ChannelArgs, opts ...pulumi.ResourceOption) (*Channel, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ChannelId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ChannelId'\")\n\t}\n\treplaceOnChanges := pulumi.ReplaceOnChanges([]string{\n\t\t\"channelId\",\n\t\t\"location\",\n\t\t\"project\",\n\t})\n\topts = append(opts, replaceOnChanges)\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Channel\n\terr := ctx.RegisterResource(\"google-native:eventarc/v1:Channel\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "d9c814610b884526a8d660fce9fc6c00", "score": "0.4643752", "text": "func anyToRemote_file(jptm IJobPartTransferMgr, info TransferInfo, p pipeline.Pipeline, pacer pacer, senderFactory senderFactory, sipf sourceInfoProviderFactory) {\n\n\tpseudoId := common.NewPseudoChunkIDForWholeFile(info.Source)\n\tjptm.LogChunkStatus(pseudoId, common.EWaitReason.XferStart())\n\tdefer jptm.LogChunkStatus(pseudoId, common.EWaitReason.ChunkDone())\n\n\tsrcSize := info.SourceSize\n\n\t// step 1. perform initial checks\n\tif jptm.WasCanceled() {\n\t\t/* This is the earliest we detect jptm has been cancelled before scheduling chunks */\n\t\tjptm.SetStatus(common.ETransferStatus.Cancelled())\n\t\tjptm.ReportTransferDone()\n\t\treturn\n\t}\n\n\t// step 2a. Create sender\n\tsrcInfoProvider, err := sipf(jptm)\n\tif err != nil {\n\t\tjptm.LogSendError(info.Source, info.Destination, err.Error(), 0)\n\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\tjptm.ReportTransferDone()\n\t\treturn\n\t}\n\tif srcInfoProvider.EntityType() != common.EEntityType.File() {\n\t\tpanic(\"configuration error. Source Info Provider does not have File entity type\")\n\t}\n\n\ts, err := senderFactory(jptm, info.Destination, p, pacer, srcInfoProvider)\n\tif err != nil {\n\t\tjptm.LogSendError(info.Source, info.Destination, err.Error(), 0)\n\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\tjptm.ReportTransferDone()\n\t\treturn\n\t}\n\n\t// step 2b. Read chunk size and count from the sender (since it may have applied its own defaults and/or calculations to produce these values\n\tnumChunks := s.NumChunks()\n\tif jptm.ShouldLog(pipeline.LogInfo) {\n\t\tjptm.LogTransferStart(info.Source, info.Destination, fmt.Sprintf(\"Specified chunk size %d\", s.ChunkSize()))\n\t}\n\tif s.NumChunks() == 0 {\n\t\tpanic(\"must always schedule one chunk, even if file is empty\") // this keeps our code structure simpler, by using a dummy chunk for empty files\n\t}\n\n\t// step 3: check overwrite option\n\t// if the force Write flags is set to false or prompt\n\t// then check the file exists at the remote location\n\t// if it does, react accordingly\n\tif jptm.GetOverwriteOption() != common.EOverwriteOption.True() {\n\t\texists, dstLmt, existenceErr := s.RemoteFileExists()\n\t\tif existenceErr != nil {\n\t\t\tjptm.LogSendError(info.Source, info.Destination, \"Could not check destination file existence. \"+existenceErr.Error(), 0)\n\t\t\tjptm.SetStatus(common.ETransferStatus.Failed()) // is a real failure, not just a SkippedFileAlreadyExists, in this case\n\t\t\tjptm.ReportTransferDone()\n\t\t\treturn\n\t\t}\n\t\tif exists {\n\t\t\tshouldOverwrite := false\n\n\t\t\t// if necessary, prompt to confirm user's intent\n\t\t\tif jptm.GetOverwriteOption() == common.EOverwriteOption.Prompt() {\n\t\t\t\t// remove the SAS before prompting the user\n\t\t\t\tparsed, _ := url.Parse(info.Destination)\n\t\t\t\tparsed.RawQuery = \"\"\n\t\t\t\tshouldOverwrite = jptm.GetOverwritePrompter().ShouldOverwrite(parsed.String(), common.EEntityType.File())\n\t\t\t} else if jptm.GetOverwriteOption() == common.EOverwriteOption.IfSourceNewer() {\n\t\t\t\t// only overwrite if source lmt is newer (after) the destination\n\t\t\t\tif jptm.LastModifiedTime().After(dstLmt) {\n\t\t\t\t\tshouldOverwrite = true\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !shouldOverwrite {\n\t\t\t\t// logging as Warning so that it turns up even in compact logs, and because previously we use Error here\n\t\t\t\tjptm.LogAtLevelForCurrentTransfer(pipeline.LogWarning, \"File already exists, so will be skipped\")\n\t\t\t\tjptm.SetStatus(common.ETransferStatus.SkippedEntityAlreadyExists())\n\t\t\t\tjptm.ReportTransferDone()\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\t// step 4: Open the local Source File (if any)\n\tcommon.GetLifecycleMgr().E2EAwaitAllowOpenFiles()\n\tjptm.LogChunkStatus(pseudoId, common.EWaitReason.OpenLocalSource())\n\tvar sourceFileFactory func() (common.CloseableReaderAt, error)\n\tsrcFile := (common.CloseableReaderAt)(nil)\n\tif srcInfoProvider.IsLocal() {\n\t\tsourceFileFactory = srcInfoProvider.(ILocalSourceInfoProvider).OpenSourceFile // all local providers must implement this interface\n\t\tsrcFile, err = sourceFileFactory()\n\t\tif err != nil {\n\t\t\tsuffix := \"\"\n\t\t\tif strings.Contains(err.Error(), \"Access is denied\") && runtime.GOOS == \"windows\" {\n\t\t\t\tsuffix = \" See --\" + common.BackupModeFlagName + \" flag if you need to read all files regardless of their permissions\"\n\t\t\t}\n\t\t\tjptm.LogSendError(info.Source, info.Destination, \"Couldn't open source. \"+err.Error()+suffix, 0)\n\t\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\t\tjptm.ReportTransferDone()\n\t\t\treturn\n\t\t}\n\t\tdefer srcFile.Close() // we read all the chunks in this routine, so can close the file at the end\n\t}\n\n\t// We always to LMT verification after the transfer. Also do it here, before transfer, when:\n\t// 1) Source is local, and source's size is > 1 chunk. (why not always? Since getting LMT is not \"free\" at very small sizes)\n\t// 2) Source is remote, i.e. S2S copy case. And source's size is larger than one chunk. So verification can possibly save transfer's cost.\n\tjptm.LogChunkStatus(pseudoId, common.EWaitReason.ModifiedTimeRefresh())\n\tif _, isS2SCopier := s.(s2sCopier); numChunks > 1 &&\n\t\t(srcInfoProvider.IsLocal() || isS2SCopier && info.S2SSourceChangeValidation) {\n\t\tlmt, err := srcInfoProvider.GetFreshFileLastModifiedTime()\n\t\tif err != nil {\n\t\t\tjptm.LogSendError(info.Source, info.Destination, \"Couldn't get source's last modified time-\"+err.Error(), 0)\n\t\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\t\tjptm.ReportTransferDone()\n\t\t\treturn\n\t\t}\n\t\tif !lmt.Equal(jptm.LastModifiedTime()) {\n\t\t\tjptm.LogSendError(info.Source, info.Destination, \"File modified since transfer scheduled\", 0)\n\t\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\t\tjptm.ReportTransferDone()\n\t\t\treturn\n\t\t}\n\t}\n\n\t// step 5a: lock the destination\n\t// (is safe to do it relatively early here, before we run the prologue, because its just a internal lock, within the app)\n\t// But must be after all of the early returns that are above here (since\n\t// if we succeed here, we need to know the epilogue will definitely run to unlock later)\n\tjptm.LogChunkStatus(pseudoId, common.EWaitReason.LockDestination())\n\terr = jptm.WaitUntilLockDestination(jptm.Context())\n\tif err != nil {\n\t\tjptm.LogSendError(info.Source, info.Destination, err.Error(), 0)\n\t\tjptm.SetStatus(common.ETransferStatus.Failed())\n\t\tjptm.ReportTransferDone()\n\t\treturn\n\t}\n\n\t// *****\n\t// Error-handling rules change here.\n\t// ABOVE this point, we end the transfer using the code as shown above\n\t// BELOW this point, this routine always schedules the expected number\n\t// of chunks, even if it has seen a failure, and the\n\t// workers (the chunkfunc implementations) must use\n\t// jptm.FailActiveSend when there's an error)\n\t// TODO: are we comfortable with this approach?\n\t// DECISION: 16 Jan, 2019: for now, we are leaving in place the above rule than number of of completed chunks must\n\t// eventually reach numChunks, since we have no better short-term alternative.\n\t// ******\n\n\t// step 5b: tell jptm what to expect, and how to clean up at the end\n\tjptm.SetNumberOfChunks(numChunks)\n\tjptm.SetActionAfterLastChunk(func() { epilogueWithCleanupSendToRemote(jptm, s, srcInfoProvider) })\n\n\t// stop tracking pseudo id (since real chunk id's will be tracked from here on)\n\tjptm.LogChunkStatus(pseudoId, common.EWaitReason.ChunkDone())\n\n\t// Step 6: Go through the file and schedule chunk messages to send each chunk\n\tscheduleSendChunks(jptm, info.Source, srcFile, srcSize, s, sourceFileFactory, srcInfoProvider)\n}", "title": "" }, { "docid": "fcbc8f7ea89e360bdb6119ea8a975136", "score": "0.46416742", "text": "func (f *InfraProvider) CreateChannelCfg(ctx fab.ClientContext, channelID string) (fab.ChannelCfg, error) {\n\tif channelID == \"\" {\n\t\t// System channel\n\t\treturn chconfig.NewChannelCfg(\"\"), nil\n\t}\n\tchCfgRef, err := f.loadChannelCfgRef(ctx, channelID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tchCfg, err := chCfgRef.Get()\n\tif err != nil {\n\t\treturn nil, errors.WithMessage(err, \"could not get chConfig cache reference\")\n\t}\n\treturn chCfg.(fab.ChannelCfg), nil\n}", "title": "" }, { "docid": "368a0a1b07d2551733f3c15e4f7aa8c4", "score": "0.46376836", "text": "func (chatterHandler ChatterHandler) createChatter(w http.ResponseWriter, r *http.Request) {\n ws, err := upgrader.Upgrade(w, r, nil)\n if err != nil {\n log.Fatal(err)\n }\n chatter := &Chatter{Send: make(chan []byte, 256), Ws: ws, Room: chatterHandler.Room, Username: chatterHandler.Username, Id: chatterHandler.Id}\n chatter.Room.Register <- chatter\n\n fmt.Println(\"Created chatter \" + strconv.Itoa(chatter.Id) + \" in room \" + strconv.Itoa(chatter.Room.Id))\n\n defer func() { chatter.Room.Unregister <- chatter }()\n go chatter.writer() //perform writes asynchronously\n chatter.reader()\n}", "title": "" }, { "docid": "788edd86de3d353f6943b003a146c395", "score": "0.4637572", "text": "func NewChannel(input TL) *Channel {\n channel := new(Channel)\n switch ch := input.(type) {\n case TL_channelFull:\n channel._State = CHANNEL_DATA_FULL\n channel.ID = ch.Id\n channel.About = ch.About\n channel.PinnedMessageID = ch.Pinned_msg_id\n channel.Counters.Admins = ch.Admins_count\n channel.Counters.Banned = ch.Banned_count\n channel.Counters.Kicked = ch.Kicked_count\n channel.Counters.Unread = ch.Unread_count\n channel.Counters.Participants = ch.Participants_count\n channel.Flags.loadFlags(ch.Flags)\n case TL_channelForbidden:\n channel._State = CHANNEL_DATA_EMPTY\n case TL_channel:\n channel._State = CHANNEL_DATA_REGULAR\n channel.ID = ch.Id\n channel.Title = ch.Title\n channel.AccessHash = ch.Access_hash\n channel.Username = ch.Username\n channel.Date = ch.Date\n channel.RestrictionReason = ch.Restriction_reason\n channel.Flags.loadFlags(ch.Flags)\n if channel.Flags.AdminRightsSet && ch.Admin_rights != nil {\n channel.AdminRights.loadFlags(ch.Admin_rights.(TL_channelAdminRights).Flags)\n }\n if channel.Flags.BannedRightsSet && ch.Banned_rights != nil {\n channel.BannedRights.UntilDate = ch.Banned_rights.(TL_channelBannedRights).Until_date\n channel.BannedRights.loadFlags(ch.Banned_rights.(TL_channelBannedRights).Flags)\n }\n default:\n log.Println(\"NewChannel::ERROR::\", reflect.TypeOf(ch))\n return nil\n }\n return channel\n}", "title": "" }, { "docid": "836419d22729ad9909788a2900899c54", "score": "0.46373", "text": "func (h *HarnessRPC) OpenChannel(req *lnrpc.OpenChannelRequest) OpenChanClient {\n\tstream, err := h.LN.OpenChannel(h.runCtx, req)\n\th.NoError(err, \"OpenChannel\")\n\n\treturn stream\n}", "title": "" }, { "docid": "9f6d6a755fc3de32c2fed80ecff714e9", "score": "0.46357772", "text": "func (a *PublishSubscribeApiService) DeleteChannelExecute(r ApiDeleteChannelRequest) (*_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.Ctx, \"PublishSubscribeApiService.DeleteChannel\")\n\tif localBasePath == \"/\" {\n\t localBasePath = \"\"\n\t}\n\tif err != nil {\n\t\treturn nil, GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v2/channels/{channel_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"channel_id\"+\"}\", _neturl.PathEscape(parameterToString(r.P_channelId, \"\")) , -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.Ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\treturn localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "5c8e16fee740b16c9314bf698a643723", "score": "0.4629061", "text": "func New(FileName string, PidArg int) *Raftserver { //To create the server object\n\t//File read starts ....\n\tconfigFile, err := os.Open(FileName)\n\tif err != nil {\n\t\tfmt.Println(\"opening config file: \", FileName, \"..\", err.Error())\n\t}\n\tjsonParser := json.NewDecoder(configFile)\n\tif err = jsonParser.Decode(&settings); err != nil {\n\t\tfmt.Println(\"Error in parsing config file \", err.Error())\n\t}\n\ttemp := strings.Split(settings.PeersPid, \",\")\n\trfs := new(Raftserver) //Instatiate a private server object\n\tj := 0\n\tfor i := 0; i < len(temp); i++ {\n\t\ttm, _ := strconv.Atoi(temp[i])\n\t\tif tm != PidArg {\n\t\t\trfs.PeersPid[j] = tm\n\t\t\tj++\n\t\t}\n\t}\n\t//File data read ended ....\n\trfs.MyPid = PidArg\n\trfs.TotalPeer = len(temp) - 1\n\t//\tfmt.Println(\"[Instantiate]Total Peer: \",rfs.TotalPeer)\n\t//Read Peer nethandle form file\n\trfs.StartAddr = settings.StartAddr\n\t//\tfmt.Println(\"[New]:startaddr\", rfs.StartAddr)\n\trfs.PeerHandle = settings.PeersHandle\n\trfs.OwnEnd = string(settings.SelfHandle + strconv.Itoa(rfs.StartAddr+rfs.MyPid)) //read from file\n\t//\tfmt.Println(\"Own End point =\",rfs.OwnEnd)\n\t//Do configure the netowork setup portion here\n\trfs.Server, _ = zmq.NewSocket(zmq.PULL)\n\trfs.Server.Bind(rfs.OwnEnd)\n\trfs.Fin.Add(1)\n\t//Make the receive and send channels ..\n\t//\tfmt.Println(\"Server Instantion done .. returning..\")\n\trfs.RecChan = make(chan *Envelope, 1)\n\tgo rfs.recRoutine()\n\n\treturn rfs\n}", "title": "" }, { "docid": "e3b343f7461979ec323b3b8b926c7eb0", "score": "0.46254998", "text": "func (server *Server) NewChannel(id int, name string) (channel *Channel) {\n\t_, exists := server.Channels[id]\n\tif exists {\n\t\t// fime(mkrautz): Handle duplicates\n\t\treturn nil\n\t}\n\n\tchannel = NewChannel(id, name)\n\tserver.Channels[id] = channel\n\n\tif id > server.chanid {\n\t\tserver.chanid = id + 1\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c62933d996d1ed78f6c445697526ad3f", "score": "0.46254164", "text": "func makeChannels(){\n\t//chan is type.\n\t//have a channel of some type. In these cases, channel of integers, and channel of pointers to files.\n\t//use make keyword with optional int param for buffer size\n\n\tci := make(chan int) // unbuffered channel of integers\n\tcj := make(chan int, 0) // unbuffered channel of integers\n\tcs := make(chan *os.File, 100) // buffered channel of pointers to Files\n\n\n\t//this here is not part of given code. this is just to use ci,cj,cs.\n\tgo func(){\n\t\tci <- 1\n\t\tcj <- 1\n\t\tcs <- nil\n\t}()\n\n}", "title": "" }, { "docid": "bb32d80e10b29fff03d3c8c70ec4ec86", "score": "0.46241286", "text": "func (worker *worker) setChannel(channel wabbit.Channel) {\n\tworker.Lock()\n\tworker.channel = channel\n\tworker.Unlock()\n}", "title": "" }, { "docid": "c2b3c1aaccff32cc6df9f8b3f45955e6", "score": "0.46207643", "text": "func New_DirectArg(PidArg int, ArgPeersPid string,ArgStartAddr int, ArgSelfHandle string, ArgPeersHandle string) *Raftserver { //To create the server object\n\ttemp := strings.Split(ArgPeersPid, \",\")\n\trfs := new(Raftserver) //Instatiate a private server object\n\tj := 0\n\tfor i := 0; i < len(temp); i++ {\n\t\ttm, _ := strconv.Atoi(temp[i])\n\t\tif tm != PidArg {\n\t\t\trfs.PeersPid[j] = tm\n\t\t\tj++\n\t\t}\n\t}\n\t//File data read ended ....\n\trfs.MyPid = PidArg\n\trfs.TotalPeer = len(temp) - 1\n\t//\tfmt.Println(\"[Instantiate]Total Peer: \",rfs.TotalPeer)\n\t//Read Peer nethandle form file\n\trfs.StartAddr = ArgStartAddr\n\t//\tfmt.Println(\"[New]:startaddr\", rfs.StartAddr)\n\trfs.PeerHandle = ArgPeersHandle\n\trfs.OwnEnd = string(ArgSelfHandle + strconv.Itoa(rfs.StartAddr+rfs.MyPid)) //read from file\n\t//\tfmt.Println(\"Own End point =\",rfs.OwnEnd)\n\t//Do configure the netowork setup portion here\n\trfs.Server, _ = zmq.NewSocket(zmq.PULL)\n\trfs.Server.Bind(rfs.OwnEnd)\n\trfs.Fin.Add(1)\n\t//Make the receive and send channels ..\n\t//\tfmt.Println(\"Server Instantion done .. returning..\")\n\trfs.RecChan = make(chan *Envelope, 1)\n\tgo rfs.recRoutine()\n\n\treturn rfs\n}", "title": "" }, { "docid": "91eaff20f8ecdcc72ac0f7ee011b0711", "score": "0.4615512", "text": "func (s *mockSDK) CreateChannels(channels []mfSDK.Channel, token string) ([]mfSDK.Channel, error) {\n\tpanic(\"CreateChannels not implemented\")\n}", "title": "" }, { "docid": "8fd8c8b5cca498b6b3ef8e0ed07335d3", "score": "0.46143872", "text": "func (f FileWatcher) run(filename string, matchChannel chan<- string) {\n\tlog.Debug(\"Starting filewatcher\")\n\thostname, err := os.Hostname()\n\tif err != nil {\n\t\thostname = \"unknown\"\n\t}\n\n\ttailConfig := tail.Config{Location: &tail.SeekInfo{Offset: 0, Whence: os.SEEK_END}, ReOpen: true,\n\t\tMustExist: true, Follow: true, Logger: tail.DiscardingLogger}\n\tt, err := tail.TailFile(filename, tailConfig)\n\tif err != nil {\n\t\tlog.WithError(err).Error(\"Failed to tail \" + filename)\n\t\treturn\n\t}\n\n\tdefer t.Cleanup()\n\nLoop:\n\tfor {\n\t\tselect {\n\t\tcase line := <-t.Lines:\n\t\t\tif sshStart, err := ParseStartLine(line.Text); err == nil {\n\t\t\t\tsessionID := GetSession(sshStart.PID)\n\t\t\t\tf.PidSessionMap[sshStart.PID] = sessionID\n\n\t\t\t\t// Ignoring error, as PID is \\d+\n\t\t\t\tpidInt, _ := strconv.ParseUint(sshStart.PID, 10, 64)\n\n\t\t\t\tjsonEvent := events.SSHStartEvent{\n\t\t\t\t\tTime: time.Now().UnixNano(),\n\t\t\t\t\tEvent: \"session.start\",\n\t\t\t\t\tHostname: hostname,\n\t\t\t\t\tUsername: sshStart.User,\n\t\t\t\t\tUID: GetUID(sshStart.User),\n\t\t\t\t\tAddressRemote: sshStart.FromIP,\n\t\t\t\t\tPid: pidInt,\n\t\t\t\t\tSessionID: sessionID,\n\t\t\t\t\tSSHFingerprint: sshStart.PublicKeyFP,\n\t\t\t\t}\n\t\t\t\tjsonString, err := json.Marshal(jsonEvent)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.WithError(err).Error(fmt.Sprintf(\"Failed to convert SSH Start Event: %#v\", jsonEvent))\n\t\t\t\t} else {\n\t\t\t\t\tselect {\n\t\t\t\t\tcase matchChannel <- string(jsonString):\n\t\t\t\t\t\tlog.Debug(\"SSH Start: \" + string(jsonString))\n\t\t\t\t\tcase <-time.After(5 * time.Second):\n\t\t\t\t\t\tlog.Warn(\"Failed to emit event for 5 seconds, giving up\")\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t} else if sshEnd, err := ParseEndLine(line.Text); err == nil {\n\t\t\t\t// Ignoring error, as PID is \\d+\n\t\t\t\tpidInt, _ := strconv.ParseUint(sshEnd.PID, 10, 64)\n\n\t\t\t\tsessionID, keyExists := f.PidSessionMap[sshEnd.PID]\n\t\t\t\tif !keyExists {\n\t\t\t\t\tsessionID = -1\n\t\t\t\t} else {\n\t\t\t\t\t// Remove the SessionID from the map as its no longer needed\n\t\t\t\t\tdelete(f.PidSessionMap, sshEnd.PID)\n\t\t\t\t}\n\n\t\t\t\tjsonEvent := events.SSHEndEvent{\n\t\t\t\t\tTime: time.Now().UnixNano(),\n\t\t\t\t\tEvent: \"session.end\",\n\t\t\t\t\tHostname: hostname,\n\t\t\t\t\tUsername: sshEnd.User,\n\t\t\t\t\tUID: GetUID(sshEnd.User),\n\t\t\t\t\tPid: pidInt,\n\t\t\t\t\tSessionID: sessionID,\n\t\t\t\t}\n\t\t\t\tjsonString, err := json.Marshal(jsonEvent)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.WithError(err).Error(fmt.Sprintf(\"Failed to convert SSH Stop Event: %#v\", jsonEvent))\n\t\t\t\t} else {\n\t\t\t\t\tselect {\n\t\t\t\t\tcase matchChannel <- string(jsonString):\n\t\t\t\t\t\tlog.Debug(\"SSH End: \" + string(jsonString))\n\t\t\t\t\tcase <-time.After(5 * time.Second):\n\t\t\t\t\t\tlog.Warn(\"Failed to emit event for 5 seconds, giving up\")\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase <-f.StopChannel:\n\t\t\tlog.Info(\"Caught exit signal from channel\")\n\t\t\tbreak Loop\n\t\t}\n\t}\n\n\tlog.Debug(\"Exiting filewatcher\")\n\tf.StopChannel <- true\n\tlog.Debug(\"Exited filewatcher\")\n}", "title": "" }, { "docid": "e5741c5cc54c874b65bfed5c14471adb", "score": "0.46137977", "text": "func NewChannel() *Channel {\n\tchannel := &Channel{\n\t\tmessages: make([]IMessage, 0),\n\t\tinSequenceCounter: 0,\n\t\toutSequenceCounter: 1,\n\t\toutSequenceAcknowledgedCounter: 0,\n\t\tinReliableState: 0,\n\t\tchallengeValueInStream: false,\n\t\tchallengeValue: 0,\n\t}\n\n\tfor i := 0; i < maxSubChannels; i++ {\n\t\tchannel.subChannels[i].Index = int32(i)\n\t\tchannel.subChannels[i].Free()\n\t}\n\n\treturn channel\n}", "title": "" }, { "docid": "c6187ae53332aa5f08fbcab4a519069d", "score": "0.46134174", "text": "func ChannelReceiveTask(w http.ResponseWriter, r *http.Request) {\n\tlog.Println(\"!!!Uragsha!!!\")\n}", "title": "" }, { "docid": "5117150c22a157d2aaf9c2dc1785d24a", "score": "0.46113616", "text": "func (e *ExternalInterface) sendRequest(ctx context.Context, uuid, sessionUserName, taskID, serverURI string, requestBody []byte,\n\tsubTaskChannel chan<- int32) {\n\n\tvar percentComplete int32\n\tvar resp response.RPC\n\tsubTaskURI, err := e.External.CreateChildTask(ctx, sessionUserName, taskID)\n\tif err != nil {\n\t\tsubTaskChannel <- http.StatusInternalServerError\n\t\tl.LogWithFields(ctx).Warn(\"Unable to create sub task: \" + err.Error())\n\t\treturn\n\t}\n\tvar subTaskID string\n\tstrArray := strings.Split(subTaskURI, \"/\")\n\tif strings.HasSuffix(subTaskURI, \"/\") {\n\t\tsubTaskID = strArray[len(strArray)-2]\n\t} else {\n\t\tsubTaskID = strArray[len(strArray)-1]\n\t}\n\n\ttaskInfo := &common.TaskUpdateInfo{Context: ctx, TaskID: subTaskID, TargetURI: serverURI, UpdateTask: e.External.UpdateTask, TaskRequest: string(requestBody)}\n\n\tvar contactRequest model.PluginContactRequest\n\n\t// Get target device Credentials from using device UUID\n\ttarget, targetErr := e.External.GetTarget(uuid)\n\tif targetErr != nil {\n\t\tsubTaskChannel <- http.StatusNotFound\n\t\terrMsg := targetErr.Error()\n\t\tl.LogWithFields(ctx).Error(errMsg)\n\t\tcommon.GeneralError(http.StatusNotFound, response.ResourceNotFound, errMsg, []interface{}{\"target\", uuid}, taskInfo)\n\t\treturn\n\t}\n\n\tdecryptedPasswordByte, err := e.External.DevicePassword(target.Password)\n\tif err != nil {\n\t\tsubTaskChannel <- http.StatusInternalServerError\n\t\terrMsg := \"error while trying to decrypt device password: \" + err.Error()\n\t\tl.LogWithFields(ctx).Error(errMsg)\n\t\treturn\n\t}\n\ttarget.Password = decryptedPasswordByte\n\n\t// Get the Plugin info\n\tplugin, errs := e.External.GetPluginData(target.PluginID)\n\tif errs != nil {\n\t\tsubTaskChannel <- http.StatusNotFound\n\t\terrMsg := \"error while getting plugin data: \" + errs.Error()\n\t\tl.LogWithFields(ctx).Error(errMsg)\n\t\tcommon.GeneralError(http.StatusNotFound, response.ResourceNotFound, errMsg, []interface{}{\"PluginData\", target.PluginID}, taskInfo)\n\t\treturn\n\t}\n\tl.LogWithFields(ctx).Info(\"Plugin info: \", plugin)\n\n\tcontactRequest.Plugin = *plugin\n\tcontactRequest.ContactClient = e.External.ContactClient\n\tcontactRequest.Plugin.ID = target.PluginID\n\tcontactRequest.HTTPMethodType = http.MethodPost\n\n\tif strings.EqualFold(plugin.PreferredAuthType, \"XAuthToken\") {\n\t\tcontactRequest.DeviceInfo = map[string]interface{}{\n\t\t\t\"UserName\": plugin.Username,\n\t\t\t\"Password\": string(plugin.Password),\n\t\t}\n\t\tcontactRequest.OID = \"/ODIM/v1/Sessions\"\n\t\tl.LogWithFields(ctx).Debugf(\"plugin contact request data for %s: %s\", contactRequest.OID, string(requestBody))\n\t\t_, token, _, getResponse, err := lcommon.ContactPlugin(ctx, contactRequest, \"error while logging in to plugin: \")\n\t\tif err != nil {\n\t\t\tsubTaskChannel <- getResponse.StatusCode\n\t\t\terrMsg := err.Error()\n\t\t\tl.LogWithFields(ctx).Error(errMsg)\n\t\t\tcommon.GeneralError(getResponse.StatusCode, getResponse.StatusMessage, errMsg, getResponse.MsgArgs, taskInfo)\n\t\t\treturn\n\t\t}\n\t\tcontactRequest.Token = token\n\t} else {\n\t\tcontactRequest.LoginCredentials = map[string]string{\n\t\t\t\"UserName\": plugin.Username,\n\t\t\t\"Password\": string(plugin.Password),\n\t\t}\n\n\t}\n\ttarget.PostBody = []byte(requestBody)\n\tcontactRequest.DeviceInfo = target\n\tcontactRequest.OID = \"/ODIM/v1/LicenseService/Licenses\"\n\tcontactRequest.PostBody = requestBody\n\tl.LogWithFields(ctx).Debugf(\"plugin contact request data for %s: %s\", contactRequest.OID, string(requestBody))\n\t_, _, pluginTaskInfo, getResponse, err := e.External.ContactPlugin(ctx, contactRequest, \"error while installing license: \")\n\tif err != nil {\n\t\tsubTaskChannel <- getResponse.StatusCode\n\t\terrMsg := err.Error()\n\t\tl.LogWithFields(ctx).Error(errMsg)\n\t\tcommon.GeneralError(getResponse.StatusCode, getResponse.StatusMessage, errMsg, getResponse.MsgArgs, taskInfo)\n\t\treturn\n\t}\n\tl.LogWithFields(ctx).Debugf(\"Install license response: status code : %v, message: %s\",\n\t\tgetResponse.StatusCode, getResponse.StatusMessage)\n\n\tif getResponse.StatusCode == http.StatusAccepted {\n\t\tservices.SavePluginTaskInfo(ctx, pluginTaskInfo.PluginIP, plugin.IP,\n\t\t\tsubTaskID, pluginTaskInfo.Location)\n\t\tsubTaskChannel <- http.StatusAccepted\n\t\treturn\n\t}\n\n\tif getResponse.StatusCode > http.StatusMultipleChoices {\n\t\tresp.StatusCode = getResponse.StatusCode\n\t\tsubTaskChannel <- getResponse.StatusCode\n\t\tpercentComplete = 100\n\t\ttask := fillTaskData(subTaskID, serverURI, string(requestBody), resp, common.Completed, common.Warning, percentComplete, http.MethodPost)\n\t\te.External.UpdateTask(ctx, task)\n\t\treturn\n\t}\n\n\tresp.StatusCode = http.StatusOK\n\tpercentComplete = 100\n\n\tsubTaskChannel <- http.StatusOK\n\tvar task = fillTaskData(subTaskID, serverURI, string(requestBody), resp, common.Completed, common.OK, percentComplete, http.MethodPost)\n\terr = e.External.UpdateTask(ctx, task)\n\tif err != nil && err.Error() == common.Cancelling {\n\t\tvar task = fillTaskData(subTaskID, serverURI, string(requestBody), resp, common.Cancelled, common.Critical, percentComplete, http.MethodPost)\n\t\te.External.UpdateTask(ctx, task)\n\t}\n\treturn\n}", "title": "" }, { "docid": "8fe9ffc7598754302092bc3d0216cc8e", "score": "0.4609125", "text": "func (c *Client) WatchChannel(shortChanID uint64, fundingTxIn *wire.TxIn,\n\tlocalChanCfg, remoteChanCfg *channeldb.ChannelConfig,\n\tfeeRate uint64, outputScript []byte) error {\n\n\tc.actSesMtx.RLock()\n\tif _, ok := c.activeSessions[shortChanID]; ok {\n\t\tc.actSesMtx.RUnlock()\n\t\treturn fmt.Errorf(\"already watching channel\")\n\t}\n\tc.actSesMtx.RUnlock()\n\n\tchannelInfo := &chanInfo{\n\t\tfeeRate: feeRate,\n\t\toutputScript: outputScript,\n\t\tlocalChanCfg: localChanCfg,\n\t\tremoteChanCfg: remoteChanCfg,\n\t\tfundingTxIn: fundingTxIn,\n\t}\n\n\tsessions, err := c.newWatchSessions(shortChanID, channelInfo)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.actSesMtx.Lock()\n\tc.activeSessions[shortChanID] = sessions\n\tc.actSesMtx.Unlock()\n\n\t// Launch a goroutine responisble for handling each sesison.\n\tfor _, s := range sessions {\n\t\tc.wg.Add(1)\n\t\tgo func() {\n\t\t\tdefer c.wg.Done()\n\n\t\t\t// We start and run a watch session. If this\n\t\t\t// fails at some point, we must restart it,\n\t\t\t// to make sure we have enough towers watching\n\t\t\t// the channel.\n\t\t\tfor {\n\t\t\t\tif err := c.runWatchSession(s); err != nil {\n\t\t\t\t\tfmt.Println(err)\n\n\t\t\t\t\t// If we failed, and we are not quitting,\n\t\t\t\t\t// start a new run.\n\t\t\t\t\tselect {\n\t\t\t\t\tcase <-c.quit:\n\t\t\t\t\t\treturn\n\t\t\t\t\tdefault:\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fe12d9de3227a832066eb54dc3337c62", "score": "0.46067888", "text": "func CreateChannel(name string) (*Channel, error) {\n\tc := Channel{}\n\tc.Init()\n\tif len(name) > 0 {\n\t\tif Channels == nil {\n\t\t\tChannels = make(map[string]*Channel)\n\t\t}\n\t\tif _, ok := Channels[name]; ok {\n\t\t\treturn nil, errors.New(\"Channel already exists\")\n\t\t}\n\t\tChannels[name] = &c\n\t}\n\treturn &c, nil\n}", "title": "" }, { "docid": "758e53bf6b8a2a032c700211954bf0e7", "score": "0.45972472", "text": "func main(){\n\tmy_channel := make(chan string) //Create a channel\n\n\t//Go Routine function that will call the procedure parallely.\n\n\tgo SampleRoutine(\"Testing the Channel Message\", my_channel)\n\n\tfor i := 0; i < 5; i++ {\n\t\tfmt.Printf(\"Message received for me: %q \\n\", <- my_channel)\n\t}\n\n\tfmt.Println(\"Finished processing the messaage\")\n}", "title": "" }, { "docid": "ee5a303941662d8877244cb4a70908ed", "score": "0.45946997", "text": "func (ch *channel) Channel() *Channel {\n\tc := &Channel{\n\t\tName: ch.name,\n\t\tTopic: ch.topic,\n\t\tModes: ch.modes.Copy(),\n\t\tNicks: make(map[string]*ChanPrivs),\n\t}\n\tfor n, cp := range ch.nicks {\n\t\tc.Nicks[n.nick] = cp.Copy()\n\t}\n\treturn c\n}", "title": "" }, { "docid": "60959dc34314687bd172873dd323c504", "score": "0.45873383", "text": "func main() {\n\tvar (\n\t\tconfig common.PluginConfig\n\t\terr error\n\t)\n\n\tconfig.Version = version\n\treportManager := &telemetry.CNIReportManager{\n\t\tReportManager: &telemetry.ReportManager{\n\t\t\tHostNetAgentURL: hostNetAgentURL,\n\t\t\tReportType: reportType,\n\t\t},\n\t\tIpamQueryURL: ipamQueryURL,\n\t\tReport: &telemetry.CNIReport{},\n\t}\n\n\treportManager.GetReport(pluginName, config.Version)\n\treportManager.Report.Context = \"AzureCNI\"\n\n\tif !reportManager.Report.GetReportState() {\n\t\tlog.Printf(\"GetReport state file didn't exist. Setting flag to true\")\n\n\t\terr = reportManager.SendReport()\n\t\tif err != nil {\n\t\t\tlog.Printf(\"SendReport failed due to %v\", err)\n\t\t} else {\n\t\t\tmarkSendReport(reportManager)\n\t\t}\n\t}\n\n\tnetPlugin, err := network.NewPlugin(&config)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to create network plugin, err:%v.\\n\", err)\n\t\treportPluginError(reportManager, err)\n\t\tos.Exit(1)\n\t}\n\n\tnetPlugin.SetReportManager(reportManager)\n\n\tif err = netPlugin.Plugin.InitializeKeyValueStore(&config); err != nil {\n\t\tlog.Printf(\"Failed to initialize key-value store of network plugin, err:%v.\\n\", err)\n\t\treportPluginError(reportManager, err)\n\t\tos.Exit(1)\n\t}\n\n\tdefer func() {\n\t\tif errUninit := netPlugin.Plugin.UninitializeKeyValueStore(); errUninit != nil {\n\t\t\tlog.Printf(\"Failed to uninitialize key-value store of network plugin, err:%v.\\n\", err)\n\t\t}\n\n\t\tif recover() != nil {\n\t\t\tos.Exit(1)\n\t\t}\n\t}()\n\n\tif err = netPlugin.Start(&config); err != nil {\n\t\tlog.Printf(\"Failed to start network plugin, err:%v.\\n\", err)\n\t\treportPluginError(reportManager, err)\n\t\tpanic(\"network plugin fatal error\")\n\t}\n\n\tif err = netPlugin.Execute(cni.PluginApi(netPlugin)); err != nil {\n\t\tlog.Printf(\"Failed to execute network plugin, err:%v.\\n\", err)\n\t\treportPluginError(reportManager, err)\n\t}\n\n\tnetPlugin.Stop()\n\n\tif err != nil {\n\t\tpanic(\"network plugin fatal error\")\n\t}\n\n\t// Report CNI successfully finished execution.\n\treportManager.Report.CniSucceeded = true\n\tif err = reportManager.SendReport(); err != nil {\n\t\tlog.Printf(\"SendReport failed due to %v\", err)\n\t} else {\n\t\tmarkSendReport(reportManager)\n\t}\n}", "title": "" }, { "docid": "089a210d6ad389cdd63a43ba3adb0149", "score": "0.4586338", "text": "func (s *SmartContract) createFile(APIstub shim.ChaincodeStubInterface, args []string) sc.Response {\n\n uname, err := s.testCertificate(APIstub, nil)\n if err != nil {\n return shim.Error(err.Error())\n }\n\n //check if exist a file with same name\n //haven't tested\n resultsIterator, err := APIstub.GetStateByPartialCompositeKey(\"File\",[]string{args[0]})\n if err != nil {\n return shim.Error(err.Error())\n }\n defer resultsIterator.Close()\n\n if resultsIterator.HasNext(){\n return shim.Error(\"already exist a file having the same name\")\n }\n\n // create an object\n //var file = File{Name: args[0], Hash: args[1], Keyword: args[2], Summary: args[3], Owner: uname, Locktime: 0,Magnet:args[4]}\n var file = File{Name: args[0], Hash: args[1], Keyword: args[2], Summary: args[3], Owner: uname, Locktime: 0,Magnet:args[4],AESKey:args[5]}\n fileAsBytes, _ := json.Marshal(file)\n\n // we need a relational database as an addition to leveldb\n // edit here when custom interface is ready\n // we currently use composite key with keyword name and owner.\n\n //args[2]: keyword\n //args[0]: Name\n //uname:\n keys := []string{args[2], args[0], uname}\n ckey, err := APIstub.CreateCompositeKey(\"File\", keys)\n if err != nil {\n return shim.Error(err.Error())\n }\n APIstub.PutState(ckey, fileAsBytes)\n\n APIstub.SetEvent(\"createFile\", fileAsBytes);\n return shim.Success([]byte(uname))\n}", "title": "" }, { "docid": "69b44359c15e7da445ee0bcf22c20585", "score": "0.45781064", "text": "func initCommand() {\n\t// Parse flags\n\tinitFlag := flag.NewFlagSet(\"\", flag.ExitOnError)\n\tServerArg := initFlag.String(\"s\", \"localhost\", \"IP address or name of FTP server\")\n\tPortArg := initFlag.Int(\"P\", 21, \"Port to connect to FTP server on\")\n\tUserArg := initFlag.String(\"u\", \"Username\", \"Username for login\")\n\tPwdArg := initFlag.String(\"p\", \"Password\", \"Password for login\")\n\tRemoteDirArg := initFlag.String(\"d\", \"/\", \"Remote directory to upload files to\")\n\tMaxConnectionsArg := initFlag.Int(\"c\", 3, \"Maximum concurrent connections to be opened\")\n\tVersionControlArg := initFlag.String(\"v\", \"false\", \"Should gitf.toml and gitf.log file be commited to Git\")\n\n\tinitFlag.Parse(os.Args[2:])\n\n\t// Pass to configuration structs\n\twriteConf.FTP.Server = *ServerArg\n\twriteConf.FTP.Port = *PortArg\n\twriteConf.FTP.User = *UserArg\n\twriteConf.FTP.Pwd = *PwdArg\n\twriteConf.FTP.RemoteDir = *RemoteDirArg\n\twriteConf.FTP.MaxConnections = *MaxConnectionsArg\n\tversionControl := *VersionControlArg\n\n\t// Test for all files\n\t_, err1 := os.Stat(configFile)\n\t_, err2 := os.Stat(logFile)\n\n\tif err1 != nil && err2 != nil {\n\t\tvar wg sync.WaitGroup\n\t\tif versionControl == \"false\" {\n\t\t\twg.Add(3)\n\t\t\tgo addGitignore(&wg)\n\t\t} else {\n\t\t\twg.Add(2)\n\t\t}\n\n\t\tgo writeConfig(&wg)\n\t\tgo createLog(&wg)\n\n\t\twg.Wait()\n\n\t\t// Test for all files\n\t\t_, err3 := os.Stat(configFile)\n\t\t_, err4 := os.Stat(logFile)\n\n\t\tif versionControl == \"false\" {\n\t\t\t_, err5 := os.Stat(\".gitignore\")\n\t\t\tif err3 == nil && err4 == nil && err5 == nil {\n\t\t\t\taddLog(\"Init\", \"OK\")\n\t\t\t} else {\n\t\t\t\taddLog(\"Init\", \"FAIL - could not write log and/or config files\")\n\t\t\t}\n\t\t} else {\n\t\t\tif err3 == nil && err4 == nil {\n\t\t\t\taddLog(\"Init\", \"OK\")\n\t\t\t} else {\n\t\t\t\taddLog(\"Init\", \"FAIL - could not write log and/or config files\")\n\t\t\t}\n\t\t}\n\t} else {\n\t\t// Already initialised, print message\n\t\tfmt.Println(\"!gitf already initialised for this repository/directory\")\n\t\taddLog(\"Init\", \"FAIL - already initialised\")\n\t}\n}", "title": "" }, { "docid": "a1605db77fd47bcc4a89633a3ef3c45b", "score": "0.456884", "text": "func (pc *Proxychannel) Run() {\n\tpc.waitGroup.Add(1)\n\tgo pc.runExtensionManager()\n\tpc.runServer()\n\tpc.waitGroup.Wait()\n}", "title": "" }, { "docid": "3fd285af1a725785586e32b1bd85a2ff", "score": "0.45632577", "text": "func (p *Plugin) Exec() error {\n\tif p.Config.WebhookID == \"\" || p.Config.WebhookToken == \"\" {\n\t\treturn errors.New(\"missing discord config\")\n\t}\n\n\tif len(p.Config.Message) == 0 {\n\t\tobject := p.Template()\n\t\tp.Payload.Embeds = []EmbedObject{object}\n\t\terr := p.SendMessage()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif len(p.Config.Message) > 0 {\n\t\tfor _, m := range p.Config.Message {\n\t\t\ttxt, err := templateMessage(m, *p)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tif len(p.Config.Color) != 0 {\n\t\t\t\tobject := p.DefaultTemplate(txt)\n\t\t\t\tp.Payload.Embeds = append(p.Payload.Embeds, object)\n\t\t\t} else {\n\t\t\t\tp.Payload.Content = txt\n\t\t\t\terr = p.SendMessage()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif len(p.Payload.Embeds) > 0 {\n\t\t\terr := p.SendMessage()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\tfor _, f := range p.Config.File {\n\t\tif f == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\terr := p.SendFile(f)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" } ]
512fec2a19ad8f2252a7b4dd7b21a479
NewPostRepositoriesRepoNameTagsTagScanNotFound creates a PostRepositoriesRepoNameTagsTagScanNotFound with default headers values
[ { "docid": "5bff668b02ff10da413f5291ecb87d0f", "score": "0.6167681", "text": "func NewPostRepositoriesRepoNameTagsTagScanNotFound() *PostRepositoriesRepoNameTagsTagScanNotFound {\n\treturn &PostRepositoriesRepoNameTagsTagScanNotFound{}\n}", "title": "" } ]
[ { "docid": "4c621e04a18402e7196462eeb3c447cb", "score": "0.5448709", "text": "func NewPostRepositoriesRepoNameTagsTagScanForbidden() *PostRepositoriesRepoNameTagsTagScanForbidden {\n\treturn &PostRepositoriesRepoNameTagsTagScanForbidden{}\n}", "title": "" }, { "docid": "3063d5549f95ce0c93534a5c04928cf3", "score": "0.5322035", "text": "func NewPostRepositoriesRepoNameTagsTagScanUnauthorized() *PostRepositoriesRepoNameTagsTagScanUnauthorized {\n\treturn &PostRepositoriesRepoNameTagsTagScanUnauthorized{}\n}", "title": "" }, { "docid": "bd1b394bf04c3af0dced08734d1c1845", "score": "0.52495044", "text": "func NewListRepoTagsNotFound() *ListRepoTagsNotFound {\n\treturn &ListRepoTagsNotFound{}\n}", "title": "" }, { "docid": "dece16ae85eb0ca0cd5b57bad2176690", "score": "0.52099496", "text": "func NewNotFound() error {\n\treturn NewNotFoundR(http.StatusText(http.StatusNotFound))\n}", "title": "" }, { "docid": "5721b54441cfbf0874c661a5e9a1f090", "score": "0.520048", "text": "func NewPostRepositoriesRepoNameTagsTagScanUnsupportedMediaType() *PostRepositoriesRepoNameTagsTagScanUnsupportedMediaType {\n\treturn &PostRepositoriesRepoNameTagsTagScanUnsupportedMediaType{}\n}", "title": "" }, { "docid": "cdd64f6434a5906c9fa1943bdb62428f", "score": "0.51291126", "text": "func NewPostRepositoriesRepoNameTagsTagScanServiceUnavailable() *PostRepositoriesRepoNameTagsTagScanServiceUnavailable {\n\treturn &PostRepositoriesRepoNameTagsTagScanServiceUnavailable{}\n}", "title": "" }, { "docid": "3835b4b88fd1308d3582fe488f97abb8", "score": "0.5070934", "text": "func NewPatchTagNotFound() *PatchTagNotFound {\n\treturn &PatchTagNotFound{}\n}", "title": "" }, { "docid": "e1fc16d92eb485a45319a71b45c5a77a", "score": "0.5046627", "text": "func NewMetaNotFound(body *MetaNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "686755fe5206cd9f54074e9d9552a7b9", "score": "0.49470145", "text": "func NewNotFound(format string, args ...interface{}) error {\n\treturn &notFound{errors.Errorf(format, args...)}\n}", "title": "" }, { "docid": "20205d664d1b148cffb0a2c006bc56e5", "score": "0.49043325", "text": "func NewPostDevicesDeviceidInterfacesLagNotFound() *PostDevicesDeviceidInterfacesLagNotFound {\n\treturn &PostDevicesDeviceidInterfacesLagNotFound{}\n}", "title": "" }, { "docid": "2e2a5f8877beaa6dc65719045740c685", "score": "0.48796833", "text": "func NewPostAPIV10WorksNotFound() *PostAPIV10WorksNotFound {\n\treturn &PostAPIV10WorksNotFound{}\n}", "title": "" }, { "docid": "f181309d84c95a06abbf9ee10408caaf", "score": "0.48752576", "text": "func TestGetNewResourceIndexResourceNotFound(t *testing.T) {\n\tresource1Id := \"resource1\"\n\tindexTag := \"indexTag\"\n\tresource1 := cloud.Resource{\n\t\tProvider: \"testProvider\",\n\t\tID: resource1Id,\n\t\tLocation: \"eu-central-1a\",\n\t\tLaunchTime: time.Now(),\n\t\tTags: map[string]string{indexTag: \"0\"},\n\t\tProperties: map[string]string{}}\n\t_, err := GetNewResourceIndex(\n\t\t&resource1Id,\n\t\t&indexTag,\n\t\t[]*cloud.Resource{&resource1})\n\tif err == nil {\n\t\tt.Errorf(\"Error for resource1 = nil; want != nil\")\n\t}\n}", "title": "" }, { "docid": "c38c7269146407037736e21919d1d40b", "score": "0.48416755", "text": "func (a *DefaultApiService) GetTag(projectKey, repositorySlug string, name string) (*APIResponse, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/1.0/projects/{projectKey}/repos/{repositorySlug}/tags/{name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"projectKey\"+\"}\", fmt.Sprintf(\"%v\", projectKey), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"repositorySlug\"+\"}\", fmt.Sprintf(\"%v\", repositorySlug), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", fmt.Sprintf(\"%v\", name), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(a.client.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, nil, err)\n\t}\n\tdefer localVarHTTPResponse.Body.Close()\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := io.ReadAll(localVarHTTPResponse.Body)\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, bodyBytes, reportError(\"Status: %v, Body: %s\", localVarHTTPResponse.Status, bodyBytes))\n\t}\n\n\treturn NewBitbucketAPIResponse(localVarHTTPResponse)\n}", "title": "" }, { "docid": "f3c1f876809c5c77ae74976963a85544", "score": "0.47909883", "text": "func NewListTagsNotFound() *ListTagsNotFound {\n\treturn &ListTagsNotFound{}\n}", "title": "" }, { "docid": "cab204e80108a0eb7c8b3b777127cb7f", "score": "0.47567362", "text": "func NewPostRepositoriesRepoNameTagsTagScanOK() *PostRepositoriesRepoNameTagsTagScanOK {\n\treturn &PostRepositoriesRepoNameTagsTagScanOK{}\n}", "title": "" }, { "docid": "cd3038e240bd180c2b9dedc198dc740e", "score": "0.47519797", "text": "func NewNotFoundR(reason string) error {\n\treturn NewError(http.StatusNotFound, reason)\n}", "title": "" }, { "docid": "2e086a8139f746eade82857f55a701e5", "score": "0.4750957", "text": "func NewDeleteRepositoriesRepoNameTagsTagNotFound() *DeleteRepositoriesRepoNameTagsTagNotFound {\n\treturn &DeleteRepositoriesRepoNameTagsTagNotFound{}\n}", "title": "" }, { "docid": "999ce796ca50c6ed6eaf4ac59bbeba38", "score": "0.4717285", "text": "func NewPostServices2NotFound() *PostServices2NotFound {\n\treturn &PostServices2NotFound{}\n}", "title": "" }, { "docid": "47da7c8728e5a21ed6555e73364ebdc8", "score": "0.46851206", "text": "func NewListTagImagesNotFound() *ListTagImagesNotFound {\n\treturn &ListTagImagesNotFound{}\n}", "title": "" }, { "docid": "7024d249b47ad18562c487950fa95611", "score": "0.462773", "text": "func NewPostsCreateNotFound() *PostsCreateNotFound {\n\treturn &PostsCreateNotFound{}\n}", "title": "" }, { "docid": "99953c0c03cde14adcce2e5fcffea717", "score": "0.46275118", "text": "func NewResubmitPPMShipmentDocumentationNotFound() *ResubmitPPMShipmentDocumentationNotFound {\n\n\treturn &ResubmitPPMShipmentDocumentationNotFound{}\n}", "title": "" }, { "docid": "3447a8eab72e6e0f9bc9d5ea79794253", "score": "0.462696", "text": "func NewPostServicePortsNotFound() *PostServicePortsNotFound {\n\treturn &PostServicePortsNotFound{}\n}", "title": "" }, { "docid": "efffce306662f5b4ff1d7e4e7dabf907", "score": "0.46220356", "text": "func NewSubmitUpdateVariableRegistryRequestNotFound() *SubmitUpdateVariableRegistryRequestNotFound {\n\treturn &SubmitUpdateVariableRegistryRequestNotFound{}\n}", "title": "" }, { "docid": "e388f2f4fee7b881d3b143f0c4b8ac60", "score": "0.46182024", "text": "func NewNotFound(err error) error {\n\treturn &EC2Error{\n\t\terr: err,\n\t\tCode: http.StatusNotFound,\n\t}\n}", "title": "" }, { "docid": "2b702be4a812524a7b4a16ee04cc2795", "score": "0.4610626", "text": "func TestGetIdTagMissing(t *testing.T) {\n\tr, err := http.NewRequest(\"GET\", idTagsBaseUrl+\"/\"+\"test\", nil)\n\tassert.Nil(t, err)\n\tres, err := http.DefaultClient.Do(r)\n\tassert.Nil(t, err)\n\tassert.Equal(t, 404, res.StatusCode)\n}", "title": "" }, { "docid": "db03064c66473c13e0585e1d8d6ec4aa", "score": "0.4597587", "text": "func NewPostAccountsNotFound() *PostAccountsNotFound {\n\treturn &PostAccountsNotFound{}\n}", "title": "" }, { "docid": "2d6fe722bc8ec575e4880279c7031cd7", "score": "0.4595848", "text": "func NewNotFound(message string) NotFound {\n\treturn NotFound{\n\t\tname: \"Not Found\",\n\t\tmessage: message,\n\t\tstatusCode: 404,\n\t}\n}", "title": "" }, { "docid": "e6bd6a8cf09b3c9eda91183301d54ef5", "score": "0.4594311", "text": "func registerSnapshotRepository(k8sClient kubernetes.Interface, params PluginParameters, mode string) error {\n\t// crate an Elasticsearch client\n\tesClient, err := NewElasticsearchClient(k8sClient, params.Elasticsearch)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to get Elasticsearch client\")\n\t}\n\n\t// configure request body\n\tbody := RepoCreateRequestBody{\n\t\tType: params.Repository.Type,\n\t\tSettings: RepositorySettings{\n\t\t\tBucket: params.Repository.Bucket,\n\t\t},\n\t}\n\tif params.Repository.Prefix != \"\" {\n\t\tbody.Settings.BasePath = params.Repository.Prefix\n\t}\n\tif params.Repository.Endpoint != \"\" {\n\t\tbody.Settings.Endpoint = params.Repository.Endpoint\n\t}\n\tif params.Repository.Scheme != \"\" {\n\t\tbody.Settings.Protocol = params.Repository.Scheme\n\t}\n\tif mode != EngineModeActive {\n\t\tbody.Settings.ReadOnly = \"true\"\n\t}\n\n\tjsonBody, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to marshal RepoCreateRequestBody\")\n\t}\n\n\t// configure snapshot repository create request\n\trepoRequest := esapi.SnapshotCreateRepositoryRequest{\n\t\tRepository: params.Repository.Name,\n\t\tBody: bytes.NewReader(jsonBody),\n\t\tPretty: true,\n\t}\n\n\tfmt.Println(\"Registering repository..................\")\n\t// register repository\n\tresp, err := repoRequest.Do(context.Background(), esClient)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to send SnapshotCreateRepositoryRequest\")\n\t}\n\tdefer resp.Body.Close()\n\n\tfmt.Println(\"Response: \", resp.String())\n\n\tif resp.StatusCode != http.StatusOK {\n\t\trootCause, err := parseErrorCause(resp.Body)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"failed to register Snapshot Repository to the Elasticsearch.\\n\"+\n\t\t\t\t\"Also, failed to parse the error info. Reason: %s\", err.Error())\n\t\t}\n\t\treturn fmt.Errorf(\"failed to register Snapshot Repository to the Elasticsearch.\\n\"+\n\t\t\t\"Error Type: %s, Reason: %s\", rootCause.Type, rootCause.Reason)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "75a864c497e5c4e801773a8cdc19790e", "score": "0.45738477", "text": "func CreateNotFoundJSONMessage(message string) gin.H {\n\tresult := gin.H{\"message\": message, \"status\": http.StatusNotFound}\n\treturn result\n}", "title": "" }, { "docid": "9411c5fdaa21f92b17f4c429e7a8b9b8", "score": "0.45724544", "text": "func NewNotFound(message ...string) *HTTPError {\n\treturn New(http.StatusNotFound, message...)\n}", "title": "" }, { "docid": "71f683427c9d8ad3b298eb0cfac24874", "score": "0.4572072", "text": "func NewReleaseBlueprintVersionUsingPOST1NotFound() *ReleaseBlueprintVersionUsingPOST1NotFound {\n\treturn &ReleaseBlueprintVersionUsingPOST1NotFound{}\n}", "title": "" }, { "docid": "67140b7d618c9e116d0f842d26c0fb53", "score": "0.4568276", "text": "func NewErrNotFound(msg string, args ...interface{}) *APIError {\n\treturn NewAPIError(http.StatusNotFound, msg, args...)\n}", "title": "" }, { "docid": "83d2c5013406fdbb40d83374c0e02c46", "score": "0.4562111", "text": "func defaultNotFound(ctx *Context) {\n\tif ctx.WantsJSON() {\n\t\tctx.Response().Header().Set(\"Content-Type\", \"application/json\")\n\t} else {\n\t\tctx.Response().Header().Set(\"Content-Type\", \"text/html\")\n\t}\n\tctx.Status(http.StatusNotFound)\n\n\t// JSON\n\tif ctx.WantsJSON() {\n\t\t// Json response\n\t\tctx.JSON(struct {\n\t\t\tError int `json:\"error\"`\n\t\t\tMessage string `json:\"message\"`\n\t\t}{http.StatusNotFound, \"404 Not Found\"})\n\t\treturn\n\t}\n\n\t// HTML\n\t// Validate if the template exists\n\tif ctx.ViewExists(\"errors/404\") {\n\t\terr := ctx.View(\"errors/404\")\n\t\tif err != nil {\n\t\t\tctx.Error(err)\n\t\t}\n\t} else {\n\t\tctx.WriteHTML(\"<!DOCTYPE html><html><head><title>404 Not Found</title></head><body>404 Not Found</body></html>\")\n\t}\n}", "title": "" }, { "docid": "62a627b55b2e732811908ed008bc61ae", "score": "0.4555295", "text": "func NewNotFound(message string) *NotFound {\n\terr := new(NotFound)\n\terr.Code = \"NOT_FOUND\"\n\terr.Title = message\n\terr.Status = http.StatusNotFound\n\treturn err\n}", "title": "" }, { "docid": "4807b8ff3b7377f3c0ead9168ba1f4d1", "score": "0.45459718", "text": "func NotFound(message string) error {\n\treturn create(404, message, nil, nil)\n}", "title": "" }, { "docid": "0a8aa46cb673a1e1e91e12d1205d2dec", "score": "0.4542532", "text": "func NewPostLookupsDefault(code int) *PostLookupsDefault {\n\treturn &PostLookupsDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "7e08ff2708e974a389c8fa0e360739e9", "score": "0.45312643", "text": "func NewGetNodeByNameNotFound() *GetNodeByNameNotFound {\n\n\treturn &GetNodeByNameNotFound{}\n}", "title": "" }, { "docid": "acad5781ac63c77db0814b6b13743ab2", "score": "0.4511575", "text": "func NewDeleteRepositoriesRepoNameTagsTagBadRequest() *DeleteRepositoriesRepoNameTagsTagBadRequest {\n\treturn &DeleteRepositoriesRepoNameTagsTagBadRequest{}\n}", "title": "" }, { "docid": "3361239fe0b16dc7366391a3af61675d", "score": "0.45115745", "text": "func (a *DefaultApiService) RetryCreateRepository(projectKey, repositorySlug string) (*APIResponse, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/1.0/projects/{projectKey}/repos/{repositorySlug}/recreate\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"projectKey\"+\"}\", fmt.Sprintf(\"%v\", projectKey), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"repositorySlug\"+\"}\", fmt.Sprintf(\"%v\", repositorySlug), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(a.client.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, nil, err)\n\t}\n\tdefer localVarHTTPResponse.Body.Close()\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := io.ReadAll(localVarHTTPResponse.Body)\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, bodyBytes, reportError(\"Status: %v, Body: %s\", localVarHTTPResponse.Status, bodyBytes))\n\t}\n\n\treturn NewBitbucketAPIResponse(localVarHTTPResponse)\n}", "title": "" }, { "docid": "b5f8c64dac790fd2e027cf8275e70abd", "score": "0.44998366", "text": "func NewNotFoundError(text string) error {\n\treturn &NotFoundError{s: text}\n}", "title": "" }, { "docid": "a47b2b5868cea28bfe883aede670318b", "score": "0.44952202", "text": "func NewGetAcrV1NameTagsNotFound() *GetAcrV1NameTagsNotFound {\n\treturn &GetAcrV1NameTagsNotFound{}\n}", "title": "" }, { "docid": "35d0371a46e0f0a44a2a0bcd1e3af279", "score": "0.4476039", "text": "func (err *Error) notFound(rw http.ResponseWriter, r *http.Request) {\n\tt, _ := template.New(\"cellgoerrortemp\").Parse(errtpl)\n\tdata := map[string]interface{}{\n\t\t\"Title\": http.StatusText(404),\n\t\t\"Version\": VERSION,\n\t}\n\tdata[\"Content\"] = template.HTML(\"<br>The page you have requested has flown the coop.\" +\n\t\t\"<br>Perhaps you are here because:\" +\n\t\t\"<br><br><ul>\" +\n\t\t\"<br>The page has moved\" +\n\t\t\"<br>The page no longer exists\" +\n\t\t\"<br>You were looking for your puppy and got lost\" +\n\t\t\"<br>You like 404 pages\" +\n\t\t\"</ul>\")\n\tt.Execute(rw, data)\n}", "title": "" }, { "docid": "1c02752c13415494e1a77794eac1f286", "score": "0.44665185", "text": "func NewPostDevicesDeviceidInterfacesBridgeNotFound() *PostDevicesDeviceidInterfacesBridgeNotFound {\n\treturn &PostDevicesDeviceidInterfacesBridgeNotFound{}\n}", "title": "" }, { "docid": "76c965f4e678077a19e9031bcc79c24c", "score": "0.44623756", "text": "func NotFound(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"text/html\")\n\ttmpl, err := template.ParseFiles(\"templates/_head.tmpl.html\", \"templates/404.tmpl.html\")\n\tif err != nil {\n\t\tlibhttp.HandleErrorJson(w, err)\n\t\treturn\n\t}\n\tvar data string\n\ttmpl.Execute(w, data)\n\tip := r.RemoteAddr\n\tpath := r.RequestURI\n\tlogrus.Infoln(\"GET \" + path + \" from \" + ip + \"(404)\")\n}", "title": "" }, { "docid": "018ee1ac32e2c48e32c0e09e3d13d57c", "score": "0.44615614", "text": "func NewPingRegistryNotFound() *PingRegistryNotFound {\n\treturn &PingRegistryNotFound{}\n}", "title": "" }, { "docid": "37eadf79186eb2d19f71f3d9728f1702", "score": "0.44498414", "text": "func TestTagExistedNameWithoutForce(t *testing.T) {\n\tdefer setupTest(t)()\n\tclient := testEnv.APIClient()\n\tctx := context.Background()\n\n\terr := client.ImageTag(ctx, \"busybox:latest\", \"busybox:test\")\n\tassert.NilError(t, err)\n}", "title": "" }, { "docid": "c2020d4d83916e4e4d31b73e13fc206d", "score": "0.44384056", "text": "func (ctx *CreateBookContext) NotFound(r error) error {\n\tif ctx.ResponseData.Header().Get(\"Content-Type\") == \"\" {\n\t\tctx.ResponseData.Header().Set(\"Content-Type\", \"application/vnd.goa.error\")\n\t}\n\treturn ctx.ResponseData.Service.Send(ctx.Context, 404, r)\n}", "title": "" }, { "docid": "79f3d2387d63c24e3637432a2edcd314", "score": "0.44326246", "text": "func NewDescribeUpstreamNotFound() *DescribeUpstreamNotFound {\n\treturn &DescribeUpstreamNotFound{}\n}", "title": "" }, { "docid": "b78808c57ca8038ce324bc7aed708630", "score": "0.44285718", "text": "func notFound(w http.ResponseWriter, r *http.Request) {\n\tt, _ := template.ParseFiles(\"404.html\")\n\n\tt.Execute(w, nil)\n}", "title": "" }, { "docid": "0fb1d3015e51f326ab4017df9b92e280", "score": "0.44284725", "text": "func Notfound(w http.ResponseWriter) {\n\tJSON(w, &H{\"message\": http.StatusText(http.StatusNotFound)}, http.StatusNotFound)\n}", "title": "" }, { "docid": "0c358276096bf7c95ca12c16a8909fca", "score": "0.44211698", "text": "func NewPostBacsNotFound() *PostBacsNotFound {\n\treturn &PostBacsNotFound{}\n}", "title": "" }, { "docid": "03beba408c34ead93eb4452355acd0b8", "score": "0.44061407", "text": "func defaultNotFoundPage(w http.ResponseWriter, r *http.Request) {\n\tw.WriteHeader(http.StatusNotFound)\n\tfmt.Fprint(w, \"404! Not Found Page!!\")\n}", "title": "" }, { "docid": "8295fd315c091a035c968b3b66de74c5", "score": "0.43982527", "text": "func NewFirmwareStatisticsNotFound(body *FirmwareStatisticsNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "4fa12bfd5cb0b354c72672f4ee282c4e", "score": "0.4394225", "text": "func NewPostUpdateNotFound() *PostUpdateNotFound {\n\n\treturn &PostUpdateNotFound{}\n}", "title": "" }, { "docid": "27ff0d03091f84290369813818ae0c6f", "score": "0.43865392", "text": "func NewPostServiceDetailsNotFound() *PostServiceDetailsNotFound {\n\treturn &PostServiceDetailsNotFound{}\n}", "title": "" }, { "docid": "d9baf398ca09cacc9ff984615677751f", "score": "0.4382444", "text": "func NewCreateVCenterUsingPOSTNotFound() *CreateVCenterUsingPOSTNotFound {\n\treturn &CreateVCenterUsingPOSTNotFound{}\n}", "title": "" }, { "docid": "83a568de8270ddefc94932755a950d78", "score": "0.43715882", "text": "func FindPendingTags(g osgraph.Graph) []osgraph.Marker {\n\tmarkers := []osgraph.Marker{}\n\n\tfor _, uncastIstNode := range g.NodesByKind(imagegraph.ImageStreamTagNodeKind) {\n\t\tistNode := uncastIstNode.(*imagegraph.ImageStreamTagNode)\n\t\tif bcNode, points := buildPointsToTag(g, uncastIstNode); points && !istNode.Found() {\n\t\t\tlatestBuild := latestBuild(g, bcNode)\n\n\t\t\t// A build config points to the non existent tag but no current build exists.\n\t\t\tif latestBuild == nil {\n\t\t\t\tmarkers = append(markers, osgraph.Marker{\n\t\t\t\t\tNode: graph.Node(bcNode),\n\t\t\t\t\tRelatedNodes: []graph.Node{uncastIstNode},\n\n\t\t\t\t\tSeverity: osgraph.WarningSeverity,\n\t\t\t\t\tKey: TagNotAvailableWarning,\n\t\t\t\t\tMessage: fmt.Sprintf(\"%s needs to be imported or created by a build.\", istNode.ResourceString()),\n\t\t\t\t\tSuggestion: osgraph.Suggestion(fmt.Sprintf(\"oc start-build %s\", bcNode.ResourceString())),\n\t\t\t\t})\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// A build config points to the non existent tag but something is going on with\n\t\t\t// the latest build.\n\t\t\t// TODO: Handle other build phases.\n\t\t\tswitch latestBuild.Build.Status.Phase {\n\t\t\tcase buildapi.BuildPhaseCancelled:\n\t\t\t\t// TODO: Add a warning here.\n\t\t\tcase buildapi.BuildPhaseError:\n\t\t\t\t// TODO: Add a warning here.\n\t\t\tcase buildapi.BuildPhaseComplete:\n\t\t\t\t// We should never hit this. The output of our build is missing but the build is complete.\n\t\t\t\t// Most probably the user has messed up?\n\t\t\tcase buildapi.BuildPhaseFailed:\n\t\t\t\t// Since the tag hasn't been populated yet, we assume there hasn't been a successful\n\t\t\t\t// build so far.\n\t\t\t\tmarkers = append(markers, osgraph.Marker{\n\t\t\t\t\tNode: graph.Node(latestBuild),\n\t\t\t\t\tRelatedNodes: []graph.Node{uncastIstNode, graph.Node(bcNode)},\n\n\t\t\t\t\tSeverity: osgraph.ErrorSeverity,\n\t\t\t\t\tKey: LatestBuildFailedErr,\n\t\t\t\t\tMessage: fmt.Sprintf(\"%s has failed.\", latestBuild.ResourceString()),\n\t\t\t\t\tSuggestion: osgraph.Suggestion(fmt.Sprintf(\"Inspect the build failure with 'oc logs %s'\", latestBuild.ResourceString())),\n\t\t\t\t})\n\t\t\tdefault:\n\t\t\t\t// Do nothing when latest build is new, pending, or running.\n\t\t\t}\n\t\t}\n\t}\n\n\treturn markers\n}", "title": "" }, { "docid": "fae55986e04b5c0258b67ddcca506e4c", "score": "0.43669522", "text": "func NewPostProjectProjectNameResourceDefault(code int) *PostProjectProjectNameResourceDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &PostProjectProjectNameResourceDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "150c545d7582c9480525d3304e408610", "score": "0.4363854", "text": "func (a *IssueTrackerApiService) RepositoriesUsernameRepoSlugIssuesPost(ctx context.Context, username string, repoSlug string, body Issue) (Issue, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t \tsuccessPayload Issue\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/repositories/{username}/{repo_slug}/issues\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"username\"+\"}\", fmt.Sprintf(\"%v\", username), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"repo_slug\"+\"}\", fmt.Sprintf(\"%v\", repoSlug), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn successPayload, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\tdefer localVarHttpResponse.Body.Close()\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := ioutil.ReadAll(localVarHttpResponse.Body)\n\t\treturn successPayload, localVarHttpResponse, reportError(\"Status: %v, Body: %s\", localVarHttpResponse.Status, bodyBytes)\n\t}\n\n\tif err = json.NewDecoder(localVarHttpResponse.Body).Decode(&successPayload); err != nil {\n\t\treturn successPayload, localVarHttpResponse, err\n\t}\n\n\n\treturn successPayload, localVarHttpResponse, err\n}", "title": "" }, { "docid": "a5b411dede4b3fee11142ff42e49b7ac", "score": "0.43504208", "text": "func (img *CustomImage) FindMissingTags(tags []string, present ...[]string) []string {\n\tvar filteredTags []string\n\tfor _, tag := range tags {\n\t\ttagIsMissing := false\n\n\t\tdestinationTag := tag\n\t\tif img.AddTagSuffix != \"\" {\n\t\t\tdestinationTag = tag + \"-\" + img.AddTagSuffix\n\t\t}\n\t\tif img.Semver != \"\" && img.StripSemverPrefix {\n\t\t\tdestinationTag = strings.TrimPrefix(destinationTag, \"v\")\n\t\t}\n\n\t\tfor _, existingTags := range present {\n\t\t\tif !slices.Contains(existingTags, destinationTag) {\n\t\t\t\ttagIsMissing = true\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\n\t\t// We always want to attempt to sync these mutable tags\n\t\tif tag == \"latest\" || tag == \"develop\" || tag == \"debug\" {\n\t\t\tlogrus.Tracef(\"image %s has a mutable tag (%s) so considering it missing\", img.Image, tag)\n\t\t\ttagIsMissing = true\n\t\t}\n\n\t\tif tagIsMissing {\n\t\t\tfilteredTags = append(filteredTags, tag)\n\t\t}\n\t}\n\treturn filteredTags\n}", "title": "" }, { "docid": "4209bdd59ca9c02780e6468da0a3eb39", "score": "0.43483704", "text": "func NewPostServiceLevelNotFound() *PostServiceLevelNotFound {\n\treturn &PostServiceLevelNotFound{}\n}", "title": "" }, { "docid": "7445f7a68d5da3061eb650cb8d60fcb3", "score": "0.43467152", "text": "func NewUploadHostLogsNotFound() *UploadHostLogsNotFound {\n\treturn &UploadHostLogsNotFound{}\n}", "title": "" }, { "docid": "e10cdbe04b76d33d95468af6a4f44715", "score": "0.4346038", "text": "func NewRemoveTagNotFound() *RemoveTagNotFound {\n\treturn &RemoveTagNotFound{}\n}", "title": "" }, { "docid": "154daa05fe2a460f29a5d543b262af5d", "score": "0.43285748", "text": "func NewTemplatesLibPutNotFound() *TemplatesLibPutNotFound {\n\treturn &TemplatesLibPutNotFound{}\n}", "title": "" }, { "docid": "cc444c1e83e7b61221828712ed75107f", "score": "0.43216592", "text": "func NewDeleteRepositoriesRepoNameTagsTagLabelsLabelIDNotFound() *DeleteRepositoriesRepoNameTagsTagLabelsLabelIDNotFound {\n\treturn &DeleteRepositoriesRepoNameTagsTagLabelsLabelIDNotFound{}\n}", "title": "" }, { "docid": "85013a9f37da336d1c65320c1adef221", "score": "0.43204275", "text": "func NotFound(c *gin.Context) {\n\te := responses.NewError().\n\t\tSetCode(responses.NotFound).\n\t\tSetTitleByCode(responses.NotFound).\n\t\tSetTarget(responses.TargetCommon).\n\t\tSetDetails(\"Not Found.\")\n\tr := responses.NewResponse().SetStatusByCode(responses.NotFound).AddError(e)\n\tc.AbortWithStatusJSON(r.Status, r)\n\treturn\n}", "title": "" }, { "docid": "e24dab8f6a572ac73a0748d93d408009", "score": "0.43169567", "text": "func NotFound(c *gin.Context) {\n\tc.JSON(404, gin.H{\"error\": \"Not Found\"})\n}", "title": "" }, { "docid": "2b5aee0122d6712c663c099269b225bd", "score": "0.43159238", "text": "func NewPcloudV2ImagesExportPostNotFound() *PcloudV2ImagesExportPostNotFound {\n\treturn &PcloudV2ImagesExportPostNotFound{}\n}", "title": "" }, { "docid": "0a53addd2b336d65b89e4e255fedd33d", "score": "0.43100673", "text": "func NewPostBasketsNotFound() *PostBasketsNotFound {\n\treturn &PostBasketsNotFound{}\n}", "title": "" }, { "docid": "56e9a057905d34b0c9db1920f31cf6f3", "score": "0.43069902", "text": "func TestTagUnprefixedRepoByNameOrName(t *testing.T) {\n\tdefer setupTest(t)()\n\tclient := testEnv.APIClient()\n\tctx := context.Background()\n\n\t// By name\n\terr := client.ImageTag(ctx, \"busybox:latest\", \"testfoobarbaz\")\n\tassert.NilError(t, err)\n\n\t// By ID\n\tinsp, _, err := client.ImageInspectWithRaw(ctx, \"busybox\")\n\tassert.NilError(t, err)\n\terr = client.ImageTag(ctx, insp.ID, \"testfoobarbaz\")\n\tassert.NilError(t, err)\n}", "title": "" }, { "docid": "a3b1651ffcad09c902537ac73cfa44da", "score": "0.4302671", "text": "func NotFound(w http.ResponseWriter) error {\n\tw.WriteHeader(http.StatusNotFound)\n\t_, err := w.Write([]byte(`{}` + \"\\n\"))\n\treturn err\n}", "title": "" }, { "docid": "4a9254168e7e9f28bbacfa79308b7051", "score": "0.43005884", "text": "func NewGetDynamicScanRequestTemplateOfProjectVersionNotFound() *GetDynamicScanRequestTemplateOfProjectVersionNotFound {\n\treturn &GetDynamicScanRequestTemplateOfProjectVersionNotFound{}\n}", "title": "" }, { "docid": "e01397e778b5999560a3b4e4e24a2ab6", "score": "0.42992294", "text": "func NewPostUsingPOST2NotFound() *PostUsingPOST2NotFound {\n\treturn &PostUsingPOST2NotFound{}\n}", "title": "" }, { "docid": "abd8d617b7d95fef3eec6bb7aa9ef8cb", "score": "0.42977262", "text": "func NotFound(w http.ResponseWriter) {\n\tw.WriteHeader(http.StatusNotFound)\n\tw.Write([]byte(`{}` + \"\\n\"))\n}", "title": "" }, { "docid": "dfa0944c4d899ff39482d85851648a7a", "score": "0.42961383", "text": "func (a *DefaultApiService) GetDefaultBranch(projectKey, repositorySlug string) (*APIResponse, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = strings.ToUpper(\"Get\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/1.0/projects/{projectKey}/repos/{repositorySlug}/branches/default\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"projectKey\"+\"}\", fmt.Sprintf(\"%v\", projectKey), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"repositorySlug\"+\"}\", fmt.Sprintf(\"%v\", repositorySlug), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(a.client.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, nil, err)\n\t}\n\tdefer localVarHTTPResponse.Body.Close()\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := io.ReadAll(localVarHTTPResponse.Body)\n\t\treturn NewAPIResponseWithError(localVarHTTPResponse, bodyBytes, reportError(\"Status: %v, Body: %s\", localVarHTTPResponse.Status, bodyBytes))\n\t}\n\n\treturn NewBitbucketAPIResponse(localVarHTTPResponse)\n}", "title": "" }, { "docid": "4d1fa5e83a84e3ee384464a58196f4c9", "score": "0.42952344", "text": "func (c *Client) fallbackGetReleaseByTag(owner, repo string, tag string) (*Release, *Response, error) {\n\tfor i := 1; ; i++ {\n\t\trl, resp, err := c.ListReleases(owner, repo, ListReleasesOptions{ListOptions: ListOptions{Page: i}})\n\t\tif err != nil {\n\t\t\treturn nil, resp, err\n\t\t}\n\t\tif len(rl) == 0 {\n\t\t\treturn nil,\n\t\t\t\t&Response{&http.Response{StatusCode: 404}},\n\t\t\t\tfmt.Errorf(\"release with tag '%s' not found\", tag)\n\t\t}\n\t\tfor _, r := range rl {\n\t\t\tif r.TagName == tag {\n\t\t\t\treturn r, resp, nil\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b4c91397c5f06df73a5f5b138e2cae23", "score": "0.42905653", "text": "func ResolveNewestPullSpecForTag(stream *imagev1.ImageStream, tag string, defaultExternal bool) (pullSpec string, hasStatus, isTagEmpty bool, err error) {\n\tpullSpec, _, hasStatus, isTagEmpty, err = resolvePullSpecForTag(stream, tag, defaultExternal, true)\n\treturn pullSpec, hasStatus, isTagEmpty, err\n}", "title": "" }, { "docid": "080471086c4c0d75f53c28c20b0ae6e8", "score": "0.4288528", "text": "func NewPostCustomFieldsNotFound() *PostCustomFieldsNotFound {\n\treturn &PostCustomFieldsNotFound{}\n}", "title": "" }, { "docid": "f37e11edc9a2c71281d0db6d2b2c7e7a", "score": "0.4285104", "text": "func NewListInternalCustomTagNotFound() *ListInternalCustomTagNotFound {\n\treturn &ListInternalCustomTagNotFound{}\n}", "title": "" }, { "docid": "dd0ccd3c562e0df8b23a8d52cb8217b5", "score": "0.42685786", "text": "func NewDataNotFound(body *DataNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "5c0aad3b9bdb994e404b4162bd859fee", "score": "0.4266669", "text": "func NewGetNodeNotFound() *GetNodeNotFound {\n\treturn &GetNodeNotFound{}\n}", "title": "" }, { "docid": "48bbfc17166f55869a77dbb0c7ba8180", "score": "0.42662713", "text": "func New404Response(body io.ReadCloser) Response {\n\treturn Response{Response: http.Response{\n\t\tStatusCode: 404,\n\t\tBody: populateBody(body),\n\t}}\n}", "title": "" }, { "docid": "ea239e90376e7e25cb4377f7d6ebee62", "score": "0.42588654", "text": "func TestTagValidPrefixedRepo(t *testing.T) {\n\tdefer setupTest(t)()\n\tclient := testEnv.APIClient()\n\tctx := context.Background()\n\n\tvalidRepos := []string{\"fooo/bar\", \"fooaa/test\", \"foooo:t\", \"HOSTNAME.DOMAIN.COM:443/foo/bar\"}\n\n\tfor _, repo := range validRepos {\n\t\trepo := repo\n\t\tt.Run(repo, func(t *testing.T) {\n\t\t\tt.Parallel()\n\t\t\terr := client.ImageTag(ctx, \"busybox\", repo)\n\t\t\tassert.NilError(t, err)\n\t\t})\n\t}\n}", "title": "" }, { "docid": "798ecdcc5d73d3f77b5bb19cbaa3c608", "score": "0.42562842", "text": "func NewPostAccountRoutingsNotFound() *PostAccountRoutingsNotFound {\n\treturn &PostAccountRoutingsNotFound{}\n}", "title": "" }, { "docid": "ca581f43596878bbc2c3a3df68a120cb", "score": "0.42559057", "text": "func NewNrActivityTagListDefault(code int) *NrActivityTagListDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &NrActivityTagListDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "14ddb2235666663a82ea23e820bfc3c1", "score": "0.42494595", "text": "func NewPatchTagDefault(code int) *PatchTagDefault {\n\treturn &PatchTagDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "46f35e2e1e171782db27502cda15341d", "score": "0.42470226", "text": "func (c *DefaultController) Create(r *Request) (int, interface{}) { return 404, \"\" }", "title": "" }, { "docid": "fcd2653265285809d1b306a5e3aa828e", "score": "0.42435104", "text": "func NewTemplateInspectNotFound() *TemplateInspectNotFound {\n\treturn &TemplateInspectNotFound{}\n}", "title": "" }, { "docid": "e5aa519855f6a3b183d33989f5548eb0", "score": "0.4240114", "text": "func WrapNotFound(err error, format string, args ...interface{}) error {\n\treturn &notFound{errors.Wrapf(err, format, args...)}\n}", "title": "" }, { "docid": "9c9ac7d3bd3a1b5da51f2c327da6653a", "score": "0.4239902", "text": "func NewGetAllConnectorsUsingPOSTNotFound() *GetAllConnectorsUsingPOSTNotFound {\n\treturn &GetAllConnectorsUsingPOSTNotFound{}\n}", "title": "" }, { "docid": "fac54c40450453650deb7d5940dce6bc", "score": "0.42335743", "text": "func Create(config *config.Options) error {\n\tvar ghc github.GitHub\n\tvar err error\n\tvar ctx = context.TODO()\n\tvar indexFile = &repo.IndexFile{}\n\tvar toAdd []string\n\n\t// Create a GitHub client\n\tghc, err = github.NewGitHubClient(config.Owner, config.Repo, config.Token)\n\tif err != nil {\n\t\tfmt.Println(\"failed to log into github\")\n\t\tos.Exit(1)\n\t}\n\n\t// if path doesn't end with index.yaml we can try and fix it\n\tif path.Base(config.Path) != \"index.yaml\" {\n\t\t// if path is a directory then add index.yaml\n\t\tif stat, err := os.Stat(config.Path); err == nil && stat.IsDir() {\n\t\t\tconfig.Path = path.Join(config.Path, \"index.yaml\")\n\t\t\t// otherwise error out\n\t\t} else {\n\t\t\tfmt.Printf(\"path (%s) should be a directory or a file called index.yaml\\n\", config.Path)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// Load up Index file (or create new one)\n\tif _, err := os.Stat(config.Path); err == nil {\n\t\tfmt.Printf(\"====> Using existing index at %s\\n\", config.Path)\n\t\tindexFile, err = repo.LoadIndexFile(config.Path)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tfmt.Printf(\"====> Create new index at %s\\n\", config.Path)\n\t\tindexFile = repo.NewIndexFile()\n\t}\n\n\t// Get list of releases for given github repo\n\treleases, err := ghc.ListReleases(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// Check if release has a package\n\tfmt.Println(\"--> Checking for releases with helm chart packages\")\n\tfor _, r := range releases {\n\t\t//fmt.Printf(\"found release %s\\n\", *r.TagName)\n\t\tvar packageName, packageVersion, packageURL string\n\t\tfor _, f := range r.Assets {\n\t\t\ttagParts := splitPackageNameAndVersion(*r.TagName)\n\t\t\tif len(tagParts) == 2 && *f.Name == fmt.Sprintf(\"%s-%s.tgz\", tagParts[0], tagParts[1]) {\n\t\t\t\tp := strings.TrimSuffix(*f.Name, filepath.Ext(*f.Name))\n\t\t\t\tps := splitPackageNameAndVersion(p)\n\t\t\t\tpackageName, packageVersion = ps[0], ps[1]\n\t\t\t\tpackageURL = *f.BrowserDownloadURL\n\n\t\t\t\tfmt.Printf(\"====> Found %s-%s.tgz\\n\", packageName, packageVersion)\n\t\t\t\t// check if index file already has an entry for current package\n\t\t\t\tif _, err := indexFile.Get(packageName, packageVersion); err != nil {\n\t\t\t\t\ttoAdd = append(toAdd, packageURL)\n\t\t\t\t}\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\tfor _, u := range toAdd {\n\t\taddToIndexFile(indexFile, u)\n\t}\n\tfmt.Printf(\"--> Updating index %s\", config.Path)\n\tindexFile.SortEntries()\n\treturn indexFile.WriteFile(config.Path, 0644)\n\n}", "title": "" }, { "docid": "d5a2d6e53927e4b15413d820c94d6fa0", "score": "0.42290893", "text": "func NewCreateImageNotFound() *CreateImageNotFound {\n\treturn &CreateImageNotFound{}\n}", "title": "" }, { "docid": "d66fdf4e9b9afb2cb5be8bf0f3d017de", "score": "0.42231426", "text": "func NotFound() gin.HandlerFunc {\n\treturn func(c *gin.Context) {\n\t\tnfResp := &ErrorResponseBody{\n\t\t\tRet: -1,\n\t\t\tCode: int32(codes.NotFound),\n\t\t\tMsg: http.StatusText(http.StatusNotFound),\n\t\t}\n\n\t\tc.JSON(http.StatusNotFound, nfResp)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "c3ffb2301529813d0084710acb662da0", "score": "0.42210478", "text": "func NewRegistryUpdateNotFound() *RegistryUpdateNotFound {\n\treturn &RegistryUpdateNotFound{}\n}", "title": "" }, { "docid": "fcc6ce4ff0b6e76cf841f8a4af377f7d", "score": "0.42206973", "text": "func NotFound(reason, format string, a ...interface{}) error {\n\treturn &StatusError{\n\t\tCode: 5,\n\t\tMessage: \"NotFound\",\n\t\tDetails: []interface{}{\n\t\t\t&ErrorItem{Reason: reason, Message: fmt.Sprintf(format, a)},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "758c47d8df21ff7aed8442cace05e8ee", "score": "0.4212892", "text": "func ErrNotFound(msg string) sdk.Error {\n\treturn sdk.NewError(DefaultCodespace, CodeNotFound, fmt.Sprintf(\"not found: %s\", msg))\n}", "title": "" }, { "docid": "05f71235ea136402e4f2fb9b3231c69b", "score": "0.42101163", "text": "func NotFound(message string, errors []map[string]interface{}) {\n\tresponse := map[string]interface{}{\n\t\t\"status\": http.StatusNotFound,\n\t\t\"message\": message,\n\t\t\"data\": nil,\n\t\t\"errors\": errors,\n\t}\n\tpanic(response)\n}", "title": "" }, { "docid": "26f39cf27bce1b52dbe374bc56973d08", "score": "0.42059433", "text": "func NewNotFound(notFoundObject string) *AgentError {\n\treturn &AgentError{\n\t\tmessage: fmt.Sprintf(\"%q not found\", notFoundObject),\n\t\terrorReason: notFoundError,\n\t}\n}", "title": "" }, { "docid": "26f39cf27bce1b52dbe374bc56973d08", "score": "0.42059433", "text": "func NewNotFound(notFoundObject string) *AgentError {\n\treturn &AgentError{\n\t\tmessage: fmt.Sprintf(\"%q not found\", notFoundObject),\n\t\terrorReason: notFoundError,\n\t}\n}", "title": "" }, { "docid": "7ee4a2fe1244ad77bcf4da68b7ceead2", "score": "0.42020774", "text": "func (enfe EndpointNotFoundError) NotFound() {}", "title": "" } ]
c4329d4739a6fbb16a65171c0b71e203
Logger returns aliceAddr modulespecific logger.
[ { "docid": "139abb5023b95cbf9b3ab63d4ff42c80", "score": "0.5847922", "text": "func (k Keeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", fmt.Sprintf(\"x/%s\", types.ModuleName))\n}", "title": "" } ]
[ { "docid": "1e3a5daeb2d8fd9784248275b19f75af", "score": "0.6548388", "text": "func (_Rollup *RollupCaller) Logger(opts *bind.CallOpts) (common.Address, error) {\n\tvar (\n\t\tret0 = new(common.Address)\n\t)\n\tout := ret0\n\terr := _Rollup.contract.Call(opts, out, \"logger\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "dbf436a8e24543a6887862f3d95ac748", "score": "0.6458451", "text": "func (cfg *config) logger() logger {\n\treturn logger(cfg.id)\n}", "title": "" }, { "docid": "3d6bd51498b6a7f493786c185beecf10", "score": "0.6410513", "text": "func (p *Provider) GetLogger(module string) api.Logger {\n\tnewDefLogger := log.New(os.Stdout, fmt.Sprintf(logPrefixFormatter, module), log.Ldate|log.Ltime|log.LUTC)\n\treturn &Log{deflogger: newDefLogger, module: module}\n}", "title": "" }, { "docid": "2f764dce32d44af2edbfd7f3b228a098", "score": "0.63609344", "text": "func (_Rollup *RollupCallerSession) Logger() (common.Address, error) {\n\treturn _Rollup.Contract.Logger(&_Rollup.CallOpts)\n}", "title": "" }, { "docid": "6ca2c387c53cdd93e0e8194c0d4f3c51", "score": "0.6360835", "text": "func (ctx Context) Logger(module ...Module) *zap.Logger {\n\tif len(module) > 1 {\n\t\tpanic(\"more than 1 module passed in\")\n\t}\n\tif ctx.cfg == nil {\n\t\t// often the case in tests; just use a dev logger\n\t\tl, err := zap.NewDevelopment()\n\t\tif err != nil {\n\t\t\tpanic(\"config missing, unable to create dev logger: \" + err.Error())\n\t\t}\n\t\treturn l\n\t}\n\tmod := ctx.Module()\n\tif len(module) > 0 {\n\t\tmod = module[0]\n\t}\n\tif mod == nil {\n\t\treturn Log()\n\t}\n\treturn ctx.cfg.Logging.Logger(mod)\n}", "title": "" }, { "docid": "a912789406525b5c24034afc4918146a", "score": "0.63317716", "text": "func (k Keeper) Logger(ctx sdk.Context) log.Logger {\r\n\treturn ctx.Logger().With(\"module\", \"x/\"+host.ModuleName+\"-\"+types.ModuleName)\r\n}", "title": "" }, { "docid": "27997a66e2b04c078873ccba9744a907", "score": "0.6272452", "text": "func (k Keeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", \"x/\"+host.ModuleName+\"/\"+types.SubModuleName)\n}", "title": "" }, { "docid": "4a089ad122b63aeb4c8b7ad08ad4747c", "score": "0.6271234", "text": "func Logger() *zap.Logger {\n\treturn l\n}", "title": "" }, { "docid": "1cd7fd3f32a6c9c04c04a79b9d026045", "score": "0.62689716", "text": "func getLogger() *zap.Logger {\n\tloggerOnce.Do(func() {\n\t\tvar err error\n\t\tlogger, err = zap.Config{\n\t\t\tEncoding: \"console\",\n\t\t\tLevel: zap.NewAtomicLevelAt(zapcore.DebugLevel),\n\t\t\tOutputPaths: []string{\"stdout\"},\n\t\t\tEncoderConfig: zapcore.EncoderConfig{\n\t\t\t\tTimeKey: \"time\",\n\t\t\t\tEncodeTime: zapcore.RFC3339TimeEncoder,\n\t\t\t\tLevelKey: \"level\",\n\t\t\t\tEncodeLevel: zapcore.CapitalColorLevelEncoder,\n\t\t\t\tMessageKey: \"message\",\n\t\t\t\tNameKey: \"name\",\n\t\t\t\tEncodeName: zapcore.FullNameEncoder,\n\t\t\t},\n\t\t}.Build()\n\t\tif err != nil {\n\t\t\tlog.Fatalln(\"Error loading logger:\", err)\n\t\t} else {\n\t\t\tlogger = logger.Named(\"AUTHLIB\")\n\t\t}\n\t})\n\treturn logger\n}", "title": "" }, { "docid": "5352c186641761f348ee58da5262d20e", "score": "0.6257914", "text": "func (_Rollup *RollupSession) Logger() (common.Address, error) {\n\treturn _Rollup.Contract.Logger(&_Rollup.CallOpts)\n}", "title": "" }, { "docid": "cc8e70d4c4b54d4286854443ae1d5438", "score": "0.6213127", "text": "func GetLogger(bind string, port, verbosity int, logJSON bool) logrus.FieldLogger {\n\tlog := logrus.New()\n\n\tswitch verbosity {\n\tcase 0:\n\t\tlog.Level = logrus.ErrorLevel\n\tcase 1:\n\t\tlog.Level = logrus.WarnLevel\n\tcase 2:\n\t\tlog.Level = logrus.InfoLevel\n\tcase 3:\n\t\tlog.Level = logrus.DebugLevel\n\tdefault:\n\t\tlog.Level = logrus.InfoLevel\n\t}\n\t\n\tif logJSON {\n\t\tlog.Formatter = new(logrus.JSONFormatter)\n\t}\n\t\n\tfieldLogger := log.WithFields(logrus.Fields{\n\t\t\"source\": constants.AppInfo.Name,\n\t\t\"version\": constants.AppInfo.Version,\n\t\t\"bind\": bind,\n\t\t\"port\": port,\n\t})\n\t\n\treturn fieldLogger\n}", "title": "" }, { "docid": "f8511235338204c8c930e025293c2fc0", "score": "0.61969405", "text": "func (p *loggingProvider) GetLogger(module string) apilogging.Logger {\r\n\tnewLogger := log.New(os.Stdout, fmt.Sprintf(logPrefixFormatter, module), log.Ldate|log.Ltime|log.LUTC)\r\n\treturn &Logger{logger: newLogger, module: module}\r\n}", "title": "" }, { "docid": "dc6348def19bf36746d8a0ba224d3bec", "score": "0.61852604", "text": "func GetLogger(module string) *logrus.Entry {\n\tlogger := logrus.New()\n\tlogger.Formatter = &fileFormatter\n\tlogger.SetLevel(logLevel)\n\tsetPrimaryOutStream()\n\n\tlogger.AddHook(appLogHook)\n\tlogger.AddHook(warnLogHook)\n\tlogger.AddHook(errorLogHook)\n\n\tswitch strings.ToLower(module) {\n\tcase \"core\", \"main\":\n\t\tlogger.AddHook(coreLogHook)\n\tcase \"datastore\":\n\t\tlogger.AddHook(datastoreLogHook)\n\tcase \"server\", \"api\":\n\t\tlogger.AddHook(serverLogHook)\n\tcase \"apiRequest\":\n\t\tlogger.AddHook(apiRequestLogHook)\n\t}\n\n\treturn logger.WithField(\"prefix\", module)\n}", "title": "" }, { "docid": "ab2535e5db4c2a9628226a054be7d6ad", "score": "0.6182946", "text": "func NewLogger() *Logger { return &Logger{prefix: \"[anirip] \"} }", "title": "" }, { "docid": "9b6799f2f39c4823dbb74f1d2e9a106d", "score": "0.61710685", "text": "func L() Logger {\n\treturn Default()\n}", "title": "" }, { "docid": "5e9d9602408b10536a46c61bd4b6745e", "score": "0.61402994", "text": "func getLoggerInternal(name string) Logger {\n\timpl, found := modules[name]\n\tif found {\n\t\treturn Logger{impl}\n\t}\n\tparentName := \"\"\n\tif i := strings.LastIndex(name, \".\"); i >= 0 {\n\t\tparentName = name[0:i]\n\t}\n\tparent := getLoggerInternal(parentName).impl\n\timpl = &module{name, UNSPECIFIED, parent}\n\tmodules[name] = impl\n\treturn Logger{impl}\n}", "title": "" }, { "docid": "a3a561777e5792cf0f0a9e788cf22ce3", "score": "0.6137776", "text": "func (k Keeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", fmt.Sprintf(\"x/%s/%s\", host.ModuleName, types.SubModuleName))\n}", "title": "" }, { "docid": "a3a561777e5792cf0f0a9e788cf22ce3", "score": "0.6137776", "text": "func (k Keeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", fmt.Sprintf(\"x/%s/%s\", host.ModuleName, types.SubModuleName))\n}", "title": "" }, { "docid": "37fd9fce51a132c440f16c1ab09f28cf", "score": "0.61187935", "text": "func GetLogger() *Logger {\n\tvar pc [1]uintptr\n\t_ = runtime.Callers(2, pc[:])\n\ts := ParseStack(pc[0])\n\treturn newLogger(&s.Package)\n}", "title": "" }, { "docid": "6c06b393510774b8f4926572602cde7e", "score": "0.60841215", "text": "func Logger() *zap.SugaredLogger {\n\treturn lg\n}", "title": "" }, { "docid": "082d6cd95a2cbf095a11c652414ef8fc", "score": "0.60467714", "text": "func GetLogger() *logrus.Logger {\n\n\tvar (\n\t\t// Setting log level\n\t\tlogLevel = logrus.Level(uint32(env.GetInt(\"services.log.logrus.log_level\")))\n\n\t\t// Instantiation the logger\n\t\tl = logrus.StandardLogger()\n\n\t\t// Service debug mode\n\t\tdebug = env.GetBool(\"debug\")\n\t)\n\n\t// Check for debug level\n\tif debug {\n\t\tlogLevel = logrus.DebugLevel\n\t}\n\n\t// File rotator init\n\t// Setting up a file as logger with custom attributes which comes from config file\n\trotateFileHook, err := rotate.NewRotateFileHook(rotate.RotateFileConfig{\n\t\tFilename: env.GetString(\"services.log.logrus.log_file\"),\n\t\tMaxSize: env.GetInt(\"services.log.logrus.max_size\"),\n\t\tMaxBackups: env.GetInt(\"services.log.logrus.max_backup\"),\n\t\tMaxAge: env.GetInt(\"services.log.logrus.max_age\"),\n\t\tLevel: logLevel,\n\t\tFormatter: &logrus.JSONFormatter{\n\t\t\tDisableHTMLEscape: true,\n\t\t\tPrettyPrint: env.GetBool(\"services.log.logrus.pretty_format\"),\n\t\t},\n\t})\n\tif err != nil {\n\t\tlogrus.Fatalf(\"Failed to initialize file rotate hook: %v\", err)\n\t}\n\n\t// RotateFileHook for logrus\n\t// Which streams the log data into the provided file hook\n\tl.AddHook(rotateFileHook)\n\n\t// Set level for main logger instance\n\tl.SetLevel(logLevel)\n\n\t// Set report caller which reports the caller function of logger operation\n\tl.SetReportCaller(false)\n\n\t// Print to StdOut only in debug mode\n\tif debug {\n\t\tl.SetOutput(colorable.NewColorableStdout())\n\t}\n\n\t// Stream to elastic and logstash\n\t// only in production mode\n\tif !debug {\n\t\t// Adding logstash hook which streams the log data to the logstash engine\n\t\tlogstashHook := getLogstashHook(\"tcp\",\n\t\t\tenv.GetString(\"services.log.logrus.logstash.address\"),\n\t\t\tenv.GetString(\"name\"))\n\t\tif logstashHook != nil {\n\t\t\tl.AddHook(logstashHook)\n\t\t}\n\n\t\t// Adding elastic hook which streams the log data to the elastic dataset\n\t\telasticHook, err := getElasticHook(env.GetString(\"services.log.logrus.elastic.address\"),\n\t\t\tenv.GetString(\"name\"))\n\t\tif err != nil {\n\t\t\tlogrus.Warningf(\"Failed to initialize elastic hook: %v \\n\", err)\n\t\t\treturn l\n\t\t}\n\n\t\t// Adding elastic hook\n\t\tl.AddHook(elasticHook)\n\t}\n\n\treturn l\n}", "title": "" }, { "docid": "59cc8857f01b5adb708a356503c65984", "score": "0.6046223", "text": "func GetLogInstance() log.Logger {\n\tonceForLog.Do(func() {\n\t\tlogInstance = log.New(\"port\", Port, \"ip\", IP)\n\t})\n\treturn logInstance\n}", "title": "" }, { "docid": "b40d3c506cc637ace3f5175172e3ce3c", "score": "0.604573", "text": "func L() *zap.Logger {\n\treturn _globalL.Load().(*zap.Logger)\n}", "title": "" }, { "docid": "a16f1ad57ba4294c40e101030842461d", "score": "0.6030732", "text": "func Logger() *zap.Logger {\n\treturn logger\n}", "title": "" }, { "docid": "2b6c908aaa88e5e92b1f4ab81f0635bc", "score": "0.60205877", "text": "func L() *zap.Logger {\n\treturn global.L()\n}", "title": "" }, { "docid": "edc78a1dad525ea7147b0c4012e220b5", "score": "0.59878737", "text": "func Logger() *Log {\n\t_, name, _ := info(2)\n\tlog, ok := logmap[name]\n\tif !ok {\n\t\tmutex.Lock()\n\t\tlog = newlog()\n\t\tlogmap[name] = log\n\t\tmutex.Unlock()\n\t}\n\treturn log\n}", "title": "" }, { "docid": "b2f99eafb6deaf83ae07c17c9703b560", "score": "0.59754574", "text": "func Logger(ctx context.Context) (log *zap.Logger) {\n\tvar ok bool\n\tlog, ok = ctx.Value(logKeyCtx{}).(*zap.Logger)\n\tif !ok {\n\t\treturn zap.NewNop()\n\t}\n\n\treturn log\n}", "title": "" }, { "docid": "2abfeb15dc3658b4cc3316bbf5fb28e9", "score": "0.5965687", "text": "func Logger() zerolog.Logger {\n\treturn log\n}", "title": "" }, { "docid": "b1f35d3059a07cf4142ba2d01adeca68", "score": "0.5963113", "text": "func (k Keeper) Logger(ctx context.Context) log.Logger {\n\tsdkCtx := sdk.UnwrapSDKContext(ctx)\n\treturn sdkCtx.Logger().With(\"module\", \"x/\"+types.ModuleName)\n}", "title": "" }, { "docid": "7c68adf00d40c53f539233c58b7a9f5c", "score": "0.5960641", "text": "func Expose() *Logger {\n\treturn defaultLogger\n}", "title": "" }, { "docid": "92e9f23b0406897995b37380cca66d7e", "score": "0.59201425", "text": "func LoggerProvider() apilogging.LoggerProvider {\r\n\treturn &loggingProvider{}\r\n}", "title": "" }, { "docid": "655a13d1f47b9d816e74230a59975e9a", "score": "0.59187585", "text": "func getDefaultLogger(module string) apilogging.Logger {\n\tnewLogger := log.New(os.Stdout, fmt.Sprintf(logPrefixFormatter, module), log.Ldate|log.Ltime|log.LUTC)\n\treturn &DefaultLogger{defaultLogger: newLogger}\n}", "title": "" }, { "docid": "092c014ddadaaf39c32f1c5ff61d42df", "score": "0.59130263", "text": "func (f *Flags) Logger() (*zap.Logger, error) {\n\tlogger, err := f.RootLogger()\n\tif len(f.Name) > 0 && logger != nil {\n\t\tlogger = logger.Named(f.Name)\n\t}\n\treturn logger, err\n}", "title": "" }, { "docid": "2072188fafa8776a8c94cb4fceb01ae7", "score": "0.59107375", "text": "func Logger() framework.GlobalMiddleware {\n\treturn &logger{}\n}", "title": "" }, { "docid": "acecabd3aac7c7ddf8b5e64c15724e22", "score": "0.5908875", "text": "func (s *Ship) GetLogger() Logger { return s.Logger }", "title": "" }, { "docid": "220791765e9966fcb524b434051bf846", "score": "0.58967507", "text": "func Logger(next http.HandlerFunc) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\tlog.Printf(\"\\n %s %s %s\", r.Method, r.RequestURI, r.Host)\n\t\tnext(w, r)\n\t}\n}", "title": "" }, { "docid": "474c36a8bbdc3f1855ccd6dad8393c87", "score": "0.5895008", "text": "func Logger(ctx context.Context) *zap.Logger {\n\tif ctx == nil {\n\t\tpanic(\"nil context passed to Logger\")\n\t}\n\tif logger, _ := ctx.Value(loggerKey{}).(*zap.Logger); logger != nil {\n\t\treturn logger\n\t}\n\treturn Default\n}", "title": "" }, { "docid": "e6bae5fb6e0c0eb5eda75fee85ac824a", "score": "0.5886473", "text": "func (l *Loader) log() Logger {\n\tif l.debug {\n\t\treturn l.logger\n\t}\n\n\treturn NopLogger()\n}", "title": "" }, { "docid": "a832d6e62953a73cd2a65722fc828f01", "score": "0.5882594", "text": "func (l *Logging) L() *zap.Logger {\n\treturn l.logger\n}", "title": "" }, { "docid": "fb7083bcf2f4c9de094a97ff4d226599", "score": "0.5879297", "text": "func (c *gencommon) Logger() zerolog.Logger {\n\treturn c.logger\n}", "title": "" }, { "docid": "da79e8c48665245c8ecc618a4f48393c", "score": "0.58774394", "text": "func Logger(ctx context.Context) *zap.SugaredLogger {\n\tif ctx == nil {\n\t\treturn log.AccessLogger()\n\t}\n\n\t//取出ctxStore\n\tl, ok := ctx.Value(ctxStoreMarkerKey).(*ctxStore)\n\tif !ok || l == nil {\n\t\t//todo 如何提醒调用方?\n\n\t\treturn log.AccessLogger()\n\t}\n\n\telapsed := time.Since(l.startTime).Milliseconds()\n\tfields := append(l.logFields, zap.Int64(\"elapsed\", elapsed))\n\tfields = append(fields, zap.String(\"requestId\", l.requestID))\n\n\t//如果不是debug模式,将日志写入访问日志文件\n\tif l.debugModeLogs == nil {\n\t\treturn l.logger.Desugar().With(fields...).Sugar()\n\t} else { //否则,写入context的logs字段,最终返回给前端\n\t\tfor _, field := range log.DefaultAccessLogFields() {\n\t\t\tfields = append(fields, field)\n\t\t}\n\t\treturn log.NewDebugModeLogger(l.debugModeLogs).With(fields...).Sugar()\n\t}\n\n}", "title": "" }, { "docid": "11189a3e76292ca69ddc815cc1a9f724", "score": "0.5876114", "text": "func GetLogger(names ...string) Logger {\n\tif len(names) == 0 {\n\t\tpkg, ok := getCallerPackage()\n\t\tif !ok {\n\t\t\tpanic(\"could not retrieve logger package\")\n\t\t}\n\t\tnames = []string{pkg}\n\t}\n\treturn root.GetLogger(names...)\n}", "title": "" }, { "docid": "d7179f3653cc6fceb3c1a971213cbf2e", "score": "0.5874498", "text": "func (k *Keeper) Logger(ctx context.Context) log.Logger {\n\tsdkCtx := sdk.UnwrapSDKContext(ctx)\n\treturn sdkCtx.Logger().With(\"module\", \"x/\"+types.ModuleName)\n}", "title": "" }, { "docid": "5f8fc17717a9a68ec4f60c0daa48fb2c", "score": "0.5873142", "text": "func (b Backend) Logger() *zap.Logger {\n\treturn b.logger\n}", "title": "" }, { "docid": "c4578b1ad85676f8cf88e81bc6622109", "score": "0.5865749", "text": "func (k Keeper) Logger(ctx sdk.Ctx) log.Logger {\n\treturn ctx.Logger().With(\"module\", fmt.Sprintf(\"x/%s\", types.ModuleName))\n}", "title": "" }, { "docid": "494d5d9e0de6e928a6b1c7d1bd641b59", "score": "0.58616215", "text": "func GetLogger() *logrus.Entry {\n\tvar logger = logrus.New()\n\n\tlogger.SetFormatter(&logrus.JSONFormatter{})\n\n\tlogger.SetOutput(os.Stdout)\n\n\tloggerWithFields := logger.WithFields(logrus.Fields{\n\t\t\"service\": \"url-shortener\",\n\t\t\"env\": os.Getenv(\"ENV\"),\n\t})\n\n\treturn loggerWithFields\n}", "title": "" }, { "docid": "841185b2a4fff2ce3792ac508c8675c3", "score": "0.58574754", "text": "func (svc *Service) Logger() Logger {\n\treturn svc.logger\n}", "title": "" }, { "docid": "93da8438b80e222d7809b46259005c24", "score": "0.5852906", "text": "func GetLogger(module string) logrus.FieldLogger {\n\treturn logrus.WithFields(logrus.Fields{\n\t\t\"module\": module,\n\t})\n}", "title": "" }, { "docid": "5a066eeb6267da7e736e9200cca9c35e", "score": "0.58479077", "text": "func ProvideLogger(config *zap.Config) (*zap.Logger, error) {\n\treturn config.Build()\n}", "title": "" }, { "docid": "f18823dc90ac5cb359887070875e58e5", "score": "0.58421665", "text": "func logger() *logrus.Logger {\n\tloggerMu.RLock()\n\tlogger := packageLogger\n\tloggerMu.RUnlock()\n\treturn logger\n}", "title": "" }, { "docid": "bdf857c8d6b96197de4fb616998cdf66", "score": "0.58404005", "text": "func Logger() *logrus.Entry {\n\treturn log\n}", "title": "" }, { "docid": "dcf14ccb895d9a4aaccb3c5e7527e729", "score": "0.5836036", "text": "func logger() *logrus.Entry {\n\tinitOnce.Do(func() {\n\t\tif fieldLogger == nil {\n\t\t\tInit(logrus.Fields{})\n\t\t}\n\t})\n\n\treturn fieldLogger\n}", "title": "" }, { "docid": "d3ed8c4cab0c2d76d3959e72e1225f5a", "score": "0.58349127", "text": "func Base() Logger {\n\treturn baseLogger\n}", "title": "" }, { "docid": "d3ed8c4cab0c2d76d3959e72e1225f5a", "score": "0.58349127", "text": "func Base() Logger {\n\treturn baseLogger\n}", "title": "" }, { "docid": "079070d1e15cf9a903f6a981f4b9031c", "score": "0.58300155", "text": "func (k *Keeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", \"x/\"+types.ModuleName)\n}", "title": "" }, { "docid": "b484b92e71d6e17e269a531131ecfa65", "score": "0.5826654", "text": "func getLoggerInstance() *AppLogger {\n\tonce.Do(func () {\n\t\t// Lazy create logger on first call\n\t\tfmt.Println(\"Creating logger instance\")\n\t\tlogger = &AppLogger{}\t\n\t})\n\t\t\n\tfmt.Println(\"Providing logger instance\")\n\treturn logger\n}", "title": "" }, { "docid": "9e1cd2d9ec8ac8db1ae76ed929ada95e", "score": "0.58228666", "text": "func (m *Manager) Logger() *zap.Logger {\n\tif m.logger == nil {\n\t\tl, err := zap.NewDevelopment()\n\t\tif err != nil {\n\t\t\tpanic(fmt.Errorf(\"failed to initialize group manager logger: %s\", err))\n\t\t}\n\n\t\tm.logger = l\n\t}\n\n\treturn m.logger\n}", "title": "" }, { "docid": "7d88d6e2f97ca4a1c0183636ed7371fd", "score": "0.5814832", "text": "func (s *Server) enableLogger() *zap.Logger {\n\tw := zapcore.AddSync(&lumberjack.Logger{\n\t\tFilename: viper.GetString(\"zap.log.logfile\"),\n\t\tMaxSize: viper.GetInt(\"zap.log.maxsize\"), // megabytes\n\t\tMaxAge: viper.GetInt(\"zap.log.maxage\"), // days\n\t\tLocalTime: viper.GetBool(\"zap.log.localtime\"),\n\t\tCompress: viper.GetBool(\"zap.log.compress\"),\n\t})\n\tcore := zapcore.NewCore(\n\t\tzapcore.NewJSONEncoder(zap.NewProductionEncoderConfig()),\n\t\tw,\n\t\tzap.InfoLevel,\n\t)\n\tlogger := zap.New(core)\n\treturn logger\n}", "title": "" }, { "docid": "faf48c9ac4f3e84b60efaa7e400b3068", "score": "0.5814613", "text": "func Logger() *log.Logger {\n\tonce.Do(func() {\n\t\tl := ConfigureLogger(level.AllowDebug())\n\t\tinstance = &l\n\t})\n\treturn instance\n}", "title": "" }, { "docid": "37e40d72fff3e0425699776de35bfe31", "score": "0.58118826", "text": "func interceptorLogger(l zerolog.Logger) logging.Logger {\n\treturn logging.LoggerFunc(func(ctx context.Context, lvl logging.Level, msg string, fields ...any) {\n\t\tl = l.With().Fields(fields).Logger()\n\n\t\tswitch lvl {\n\t\tcase logging.LevelDebug:\n\t\t\tl.Debug().Msg(msg)\n\t\tcase logging.LevelInfo:\n\t\t\tl.Info().Msg(msg)\n\t\tcase logging.LevelWarn:\n\t\t\tl.Warn().Msg(msg)\n\t\tcase logging.LevelError:\n\t\t\tl.Error().Msg(msg)\n\t\tdefault:\n\t\t\tpanic(fmt.Sprintf(\"unknown level %v\", lvl))\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ed1f27129cce0a2d092bdf50b41da40d", "score": "0.5797786", "text": "func NewLogger() Logger {\n\treturn &appLog{}\n}", "title": "" }, { "docid": "981f09f042019295aef1de26384f0d29", "score": "0.57937926", "text": "func Logger() logr.Logger {\n\treturn logger\n}", "title": "" }, { "docid": "6b66af406d86b9922fd56c1864a6c1fd", "score": "0.5792829", "text": "func (b *Baa) Logger() Logger {\n\treturn b.logger\n}", "title": "" }, { "docid": "64d1bba7b443ff1a9c7ee1af2d67f2a4", "score": "0.579056", "text": "func (fc *firecracker) Logger() *logrus.Entry {\n\treturn virtLog.WithField(\"subsystem\", \"firecracker\")\n}", "title": "" }, { "docid": "991f3a94a289ac487fea9adf58938cc7", "score": "0.5788272", "text": "func getPanicLogger() *zap.Logger {\n\tpanicLoggerOnce.Do(func() {\n\t\tpanicLogger = influxlogger.New(os.Stderr)\n\t\tpanicLogger = panicLogger.With(zap.String(\"handler\", \"panic\"))\n\t})\n\n\treturn panicLogger\n}", "title": "" }, { "docid": "caf8bd94a86e16b380f553503adb8067", "score": "0.5787568", "text": "func Logger() echo.MiddlewareFunc {\n\treturn LoggerWithConfig(&DefaultLoggerConfig)\n}", "title": "" }, { "docid": "a436606acac59f837cf491bdcfe9bee6", "score": "0.57779235", "text": "func LoggerProvider() api.LoggerProvider {\n\treturn &Provider{}\n}", "title": "" }, { "docid": "dd316e8e4c08b9fecfee8082dc9d5db4", "score": "0.5759894", "text": "func (j *Jaeger) Logger() logr.Logger {\n\treturn logf.Log.WithValues(\n\t\t\"instance\", j.Name,\n\t\t\"namespace\", j.Namespace,\n\t)\n}", "title": "" }, { "docid": "e165c6379d11bd4805e5b7d02d5cb6cc", "score": "0.57592225", "text": "func Logger(ctx context.Context) Adapter {\n\tcanceled := false\n\tselect {\n\tcase <-ctx.Done():\n\t\tcanceled = true\n\tdefault:\n\t}\n\tvar keyvals []interface{}\n\tif v := ctx.Value(logKey); v != nil {\n\t\tif false {\n\t\t\tif f, ok := fnName(1); ok {\n\t\t\t\tkeyvals = []interface{}{\"from\", f}\n\t\t\t} else {\n\t\t\t\tkeyvals = []interface{}{\"from_file\", caller(1)}\n\t\t\t}\n\t\t}\n\t\tif canceled {\n\t\t\treturn ErrorToInfo(v.(Adapter).New(keyvals...), \"Context cancelled:\")\n\t\t}\n\t\treturn v.(Adapter).New(keyvals...)\n\t}\n\ta := DefaultLogger().New(keyvals)\n\ta.Error(\"no logger in context\", caller(1))\n\treturn a\n}", "title": "" }, { "docid": "fcb063da2d87999609a31bff9e7b2425", "score": "0.57582706", "text": "func GetLogger(name string) Logger {\n\t// Lowercase the module name, and look for it in the modules map.\n\tname = strings.ToLower(name)\n\tmodulesMutex.Lock()\n\tdefer modulesMutex.Unlock()\n\treturn getLoggerInternal(name)\n}", "title": "" }, { "docid": "12c3eaca756dcb065dbaed718543e7c6", "score": "0.5752073", "text": "func GetLogger(context string) *logrus.Entry {\n\treturn log.WithFields(logrus.Fields{\"context\": context})\n}", "title": "" }, { "docid": "5b6164e38c20cf87c9a3121ada21079d", "score": "0.5743882", "text": "func MaskLogger(logger Logger) Logger {\n\tif logger != nil {\n\t\treturn logger\n\t}\n\treturn NullLogger{}\n}", "title": "" }, { "docid": "725d685dcd6bfe2e4bdbeb38ae41d826", "score": "0.5740976", "text": "func GetLogger() log.Logger {\n\tvar logger log.Logger\n\t{\n\t\tlogger = log.NewLogfmtLogger(os.Stderr)\n\t\tlogger = log.With(logger, \"ts\", log.DefaultTimestampUTC)\n\t\tlogger = log.With(logger, \"caller\", log.DefaultCaller)\n\t}\n\n\treturn logger\n}", "title": "" }, { "docid": "9c28b089ee2811f1e71a99d4e2870541", "score": "0.5738055", "text": "func (c *DriverTracer) Logger() *zap.Logger {\n\tif !c.config.IsLoggingEnabled() {\n\t\treturn zap.NewNop()\n\t}\n\treturn c.logger\n}", "title": "" }, { "docid": "6bc0541b6ded9f35d627e458173ba20f", "score": "0.5737402", "text": "func GetLogger(prefix string) *logrus.Entry {\n\tif prefix == \"\" {\n\t\tprefix = \"<no prefix>\"\n\t}\n\tif globalLogger == nil {\n\t\tgetLoggerMutex.Lock()\n\t\tdefer getLoggerMutex.Unlock()\n\t\tlogger := logrus.New()\n\t\tlogger.SetFormatter(&log_prefixed.TextFormatter{\n\t\t\tFullTimestamp: true,\n\t\t})\n\t\tglobalLogger = logger\n\t}\n\treturn globalLogger.WithField(\"prefix\", prefix)\n}", "title": "" }, { "docid": "5be1b58c220a247b083113f36ba66b22", "score": "0.5734751", "text": "func NewLogger(cfg Config) logrus.FieldLogger {\n\tlogger := logrus.WithFields(logrus.Fields{\n\t\t\"app\": cfg.AppName,\n\t\t\"deploy\": cfg.Deploy,\n\t})\n\tif cfg.SpaceID != \"\" {\n\t\tlogger = logger.WithField(\"space\", cfg.SpaceID)\n\t}\n\tif cfg.Dyno != \"\" {\n\t\tlogger = logger.WithField(\"dyno\", cfg.Dyno)\n\t}\n\n\tif l, err := logrus.ParseLevel(cfg.LogLevel); err == nil {\n\t\tlogrus.SetLevel(l)\n\t}\n\treturn logger\n}", "title": "" }, { "docid": "4c5b7bb53cd770a995d8d997192e8b98", "score": "0.5729184", "text": "func Logger() Middleware {\n\treturn func(next ship.Handler) ship.Handler {\n\t\treturn func(ctx *ship.Context) (err error) {\n\t\t\tstart := time.Now()\n\t\t\terr = next(ctx)\n\t\t\tcost := time.Since(start)\n\n\t\t\tcode := ctx.StatusCode()\n\t\t\tif err != nil && !ctx.IsResponded() {\n\t\t\t\tif hse, ok := err.(ship.HTTPServerError); ok {\n\t\t\t\t\tcode = hse.Code\n\t\t\t\t} else {\n\t\t\t\t\tcode = http.StatusInternalServerError\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tvar logf func(string, ...interface{})\n\t\t\tif code < 400 {\n\t\t\t\tlogf = ctx.Infof\n\t\t\t} else if code < 500 {\n\t\t\t\tlogf = ctx.Warnf\n\t\t\t} else {\n\t\t\t\tlogf = ctx.Errorf\n\t\t\t}\n\n\t\t\treq := ctx.Request()\n\t\t\tlogf(logfmt, req.RemoteAddr, req.Method, req.URL.RequestURI(),\n\t\t\t\tcode, start.Unix(), cost, err)\n\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d953b46d11ff9cbc4ed30b49bc26e771", "score": "0.5728152", "text": "func (fw *Framework) Logger(component string) *log.Entry {\n\treturn fw.log.WithFields(log.Fields{\"component\": component})\n}", "title": "" }, { "docid": "6e9ac125da039db5dfa2b784504b6a90", "score": "0.57259184", "text": "func (l PostmarkedLogger) Logger() Logger {\n\treturn l.log\n}", "title": "" }, { "docid": "d20c17a82c05a4a02f16c26f1efa7ccf", "score": "0.5725236", "text": "func GetLogger(module string) *Logger {\n\tlogger := &Logger{\n\t\tLogger: log.New(os.Stdout, \"\", 0),\n\t\tLevel: DefaultLogLevel,\n\t\tModule: module,\n\t}\n\n\treturn logger\n}", "title": "" }, { "docid": "cf75d0594f5d01fa9b489fc6d501f333", "score": "0.57167804", "text": "func (b *Builder) Logger() *logrus.Entry {\n\treturn logrus.WithField(util.LogKeySessionID, b.ctx.Value(util.LogFieldKey(util.LogKeySessionID)))\n}", "title": "" }, { "docid": "5c2238ed8b8f4860dbdfe827f882f884", "score": "0.57071507", "text": "func (c *Config) Logger() *log.Logger {\n\treturn c.log\n}", "title": "" }, { "docid": "b0648c2fbf3aece82ee96d1e820d9dd5", "score": "0.5693682", "text": "func (ck CUKeeper) Logger(ctx sdk.Context) log.Logger {\n\treturn ctx.Logger().With(\"module\", fmt.Sprintf(\"x/%s\", types.ModuleName))\n}", "title": "" }, { "docid": "a97727ec27fbb3c5a5eb4a973d146cf5", "score": "0.5679376", "text": "func NewLogger(a Adapter) Logger {\n\treturn Logger{adapter: a}\n}", "title": "" }, { "docid": "71dbdab976db2c247dd1f612805cb3d5", "score": "0.56777793", "text": "func Logger(ctx context.Context) logr.Logger {\n\treturn ctx.Value(LoggerKey).(logr.Logger)\n}", "title": "" }, { "docid": "5a8558176ed14a4140f1ca30fb3265fb", "score": "0.56761825", "text": "func Logger(ctx context.Context) log.Logger {\n\treturn ctx.Value(loggerContextKey{}).(log.Logger)\n}", "title": "" }, { "docid": "cbba54d4a28792c4e51ea5daec0b82d5", "score": "0.56704664", "text": "func getLogrusLogger(ctx context.Context, keys ...interface{}) *logrus.Entry {\n\tvar logger *logrus.Entry\n\n\t// Get a logger, if it is present.\n\tloggerInterface := ctx.Value(loggerKey{})\n\tif loggerInterface != nil {\n\t\tif lgr, ok := loggerInterface.(*logrus.Entry); ok {\n\t\t\tlogger = lgr\n\t\t}\n\t}\n\n\tif logger == nil {\n\t\tfields := logrus.Fields{}\n\n\t\t// Fill in the instance id, if we have it.\n\t\tinstanceID := ctx.Value(\"instance.id\")\n\t\tif instanceID != nil {\n\t\t\tfields[\"instance.id\"] = instanceID\n\t\t}\n\n\t\tfields[\"go.version\"] = runtime.Version()\n\t\t// If no logger is found, just return the standard logger.\n\t\tlogger = logrus.StandardLogger().WithFields(fields)\n\t}\n\n\tfields := logrus.Fields{}\n\tfor _, key := range keys {\n\t\tv := ctx.Value(key)\n\t\tif v != nil {\n\t\t\tfields[fmt.Sprint(key)] = v\n\t\t}\n\t}\n\n\treturn logger.WithFields(fields)\n}", "title": "" }, { "docid": "5e02f6826752ea6ebf59aab10234af31", "score": "0.5669468", "text": "func Logger(ctx context.Context) (l *zap.Logger) {\n\tl, _ = ctx.Value(ctxKey(\"logger\")).(*zap.Logger)\n\treturn\n}", "title": "" }, { "docid": "442a4e224abb5cd8c21854101989963c", "score": "0.5668717", "text": "func New() Logger {\n\treturn logger{entry: logrus.NewEntry(origLogger)}\n}", "title": "" }, { "docid": "442a4e224abb5cd8c21854101989963c", "score": "0.5668717", "text": "func New() Logger {\n\treturn logger{entry: logrus.NewEntry(origLogger)}\n}", "title": "" }, { "docid": "a96c46b6d74e3b8990d0e8fd709c80ff", "score": "0.5668006", "text": "func ElevatorLogger() *StandardLogger {\n\tvar baseLogger = logrus.New()\n\n\tvar standardLogger = &StandardLogger{baseLogger}\n\n\tstandardLogger.Formatter = &logrus.JSONFormatter{}\n\n\treturn standardLogger\n}", "title": "" }, { "docid": "030f01592bfe9c3295c5c9d8ea876c1d", "score": "0.5663657", "text": "func Log(name string) Logger {\n\tlogger, ok := adapters[name]\n\tif ok {\n\t\treturn logger\n\t}\n\n\treturn nil\n}", "title": "" } ]
160de5977d75a957621900f9f8fb1411
Send will just log the email.
[ { "docid": "ad091ba17de93d5f4c95d02b77dd6b94", "score": "0.71003795", "text": "func (s *LogSender) Send(to, subject, html, text string) error {\n\ttoAddr := mail.Address{Address: to}\n\tb, err := buildBody(s.From, toAddr, subject, html, text)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.Logger.Logf(\"\\n\\n%s\\n\\n\", string(b))\n\treturn nil\n}", "title": "" } ]
[ { "docid": "f87e8ffafdbe883cb44a50e18d78f2c9", "score": "0.70027643", "text": "func (m *Manager) send(_ context.Context, eml, subj, data string) {\n\te := email.NewEmail()\n\te.From = m.from\n\te.To = []string{eml}\n\te.Subject = subj\n\te.HTML = []byte(data)\n\n\terr := e.Send(m.host, smtp.PlainAuth(\"\", m.username, m.password, m.host))\n\tif err != nil {\n\t\tlogutil.Critical(m.log, err).Msg(\"cannot send an email\")\n\t}\n}", "title": "" }, { "docid": "b4a1d66cc72df1b82983f61fdaa7fe29", "score": "0.6870874", "text": "func (e *email) send() error {\n\t//setup auth\n\tauth := smtp.PlainAuth(\"\", e.authEmail, e.authPassword, e.authHost)\n\n\tmime := \"MIME-version: 1.0;\\nContent-Type: text/html; charset=\\\"UTF-8\\\";\\n\\n\"\n\tsubject := \"Subject: \" + e.subject + \"!\\n\"\n\tmsg := []byte(subject + mime + \"\\n\" + e.body)\n\n\tif err := smtp.SendMail(e.address, auth, e.from, e.to, msg); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d872cc989b03988f4d92f3f1e070f167", "score": "0.6757307", "text": "func (logger exportLogger) Send(log log.Log) {\n\tif log.Error != nil {\n\t\tlog.Text = fmt.Sprintf(\"%s - %s\", log.Text, log.Error.Error())\n\t}\n\n\tfmt.Println(log.Text)\n}", "title": "" }, { "docid": "8c292137f18b9bde35618d885633e73f", "score": "0.67182964", "text": "func (l LogExporter) Send(msg *formatter.Message) error {\n\tfmt.Println(msg.Title)\n\tfmt.Println(msg.Body)\n\tfmt.Println(msg.Link)\n\treturn nil\n}", "title": "" }, { "docid": "363402b30a6b6b0c643793a93423dce5", "score": "0.6683492", "text": "func (e *Email) Send(to, message string) {\n\te.to = to\n\te.message = message\n\tfmt.Printf(\"to %s: \\tmessage: %s\", e.to, e.message)\n}", "title": "" }, { "docid": "ab427a2b2aba1dde1b37833b32c70317", "score": "0.6579042", "text": "func (e *Email) Send(to, text string) error {\n\te.Logf(\"[DEBUG] send %q to %s\", text, to)\n\treturn e.sender.Send(text, email.Params{\n\t\tFrom: e.From,\n\t\tTo: []string{to},\n\t\tSubject: e.Subject,\n\t})\n}", "title": "" }, { "docid": "dc672829847fc93d01f86b2372a887d8", "score": "0.6448084", "text": "func (c *controlConn) logSend(msg string) {\n\tfmt.Fprintf(c.logger, \"%s: Sent %s\\n\", time.Now().Format(time.StampMicro), msg)\n}", "title": "" }, { "docid": "655e74f690de8cc30dad75a029168897", "score": "0.6446868", "text": "func (m *Mail) Send() error {\n\n\t// validate\n\tif err := m.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\t// return if APP_ENV is local\n\tif env, found := os.LookupEnv(\"APP_ENV\"); found && env == \"local\" {\n\t\treturn nil\n\t}\n\t// func main() {\n\t// Create a new session in the us-west-2 region.\n\t// Replace us-west-2 with the AWS Region you're using for Amazon SES.\n\tsess, err := session.NewSession(&aws.Config{\n\t\tRegion: aws.String(\"us-west-2\")},\n\t)\n\n\t// Create an SES session.\n\tsvc := ses.New(sess)\n\t// Recipient := email\n\tRecipient := m.Recipient\n\n\t// Assemble the email.\n\tinput := &ses.SendEmailInput{\n\t\tDestination: &ses.Destination{\n\t\t\tCcAddresses: []*string{},\n\t\t\tToAddresses: []*string{\n\t\t\t\taws.String(m.Recipient),\n\t\t\t},\n\t\t},\n\t\tMessage: &ses.Message{\n\t\t\tBody: &ses.Body{\n\t\t\t\tHtml: &ses.Content{\n\t\t\t\t\tCharset: aws.String(CharSet),\n\t\t\t\t\tData: aws.String(m.HTMLBody),\n\t\t\t\t},\n\t\t\t\tText: &ses.Content{\n\t\t\t\t\tCharset: aws.String(CharSet),\n\t\t\t\t\tData: aws.String(m.TextBody),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSubject: &ses.Content{\n\t\t\t\tCharset: aws.String(CharSet),\n\t\t\t\tData: aws.String(m.Subject),\n\t\t\t},\n\t\t},\n\t\tSource: aws.String(Sender),\n\t\t// Uncomment to use a configuration set\n\t\t//ConfigurationSetName: aws.String(ConfigurationSet),\n\t}\n\n\t// Attempt to send the email.\n\tresult, err := svc.SendEmail(input)\n\n\t// Display error messages if they occur.\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase ses.ErrCodeMessageRejected:\n\t\t\t\tfmt.Println(ses.ErrCodeMessageRejected, aerr.Error())\n\t\t\tcase ses.ErrCodeMailFromDomainNotVerifiedException:\n\t\t\t\tfmt.Println(ses.ErrCodeMailFromDomainNotVerifiedException, aerr.Error())\n\t\t\tcase ses.ErrCodeConfigurationSetDoesNotExistException:\n\t\t\t\tfmt.Println(ses.ErrCodeConfigurationSetDoesNotExistException, aerr.Error())\n\t\t\tdefault:\n\t\t\t\tfmt.Println(aerr.Error())\n\t\t\t}\n\t\t} else {\n\t\t\t// Print the error, cast err to awserr.Error to get the Code and\n\t\t\t// Message from an error.\n\t\t\tfmt.Println(err.Error())\n\t\t}\n\n\t\treturn err\n\t}\n\n\tfmt.Println(\"Email Sent to address: \" + Recipient)\n\tfmt.Println(result)\n\n\treturn nil\n}", "title": "" }, { "docid": "1be561d90f340f45e185c9dd70867548", "score": "0.64092255", "text": "func (m *Sendgrid) Send(em *EmailContent) error {\n\tif err := em.Validate(); err != nil {\n\t\treturn err\n\t}\n\n\tfmt.Println(\"Sending email: \", em)\n\treturn nil\n}", "title": "" }, { "docid": "3a6a977d724ebad8347fa69835db2f4d", "score": "0.6361542", "text": "func (s *Service) send(UserName string, UserEmail string, Subject string, Body string) error {\n\tif !viper.GetBool(\"smtp.enabled\") {\n\t\treturn nil\n\t}\n\n\tto := mail.Address{\n\t\tName: UserName,\n\t\tAddress: UserEmail,\n\t}\n\n\t// Setup headers\n\theaders := make(map[string]string)\n\theaders[\"From\"] = smtpFrom.String()\n\theaders[\"To\"] = to.String()\n\theaders[\"Subject\"] = Subject\n\theaders[\"MIME-version\"] = \"1.0\"\n\theaders[\"Content-Type\"] = \"text/html\"\n\n\t// Setup message\n\tmessage := \"\"\n\tfor k, v := range headers {\n\t\tmessage += fmt.Sprintf(\"%s: %s\\r\\n\", k, v)\n\t}\n\tmessage += \"\\r\\n\" + Body\n\n\tc, err := smtp.Dial(smtpServerConfig.Address())\n\tif err != nil {\n\t\ts.Logger.Error(\"Error dialing SMTP\", zap.Error(err))\n\t\treturn err\n\t}\n\n\ttlsErr := c.StartTLS(tlsConfig)\n\tif tlsErr != nil {\n\t\ts.Logger.Error(\"Error starting TLS\", zap.Error(tlsErr))\n\t}\n\n\t// Auth\n\tif s.Config.smtpSecure {\n\t\tif err = c.Auth(smtpAuth); err != nil {\n\t\t\ts.Logger.Error(\"Error authenticating SMTP\", zap.Error(err))\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// To && From\n\tif err = c.Mail(smtpFrom.Address); err != nil {\n\t\ts.Logger.Error(\"Error setting SMTP from\", zap.Error(err))\n\t\treturn err\n\t}\n\n\tif err = c.Rcpt(to.Address); err != nil {\n\t\ts.Logger.Error(\"Error setting SMTP to\", zap.Error(err))\n\t\treturn err\n\t}\n\n\t// Data\n\tw, err := c.Data()\n\tif err != nil {\n\t\ts.Logger.Error(\"Error setting SMTP data\", zap.Error(err))\n\t\treturn err\n\t}\n\n\t_, err = w.Write([]byte(message))\n\tif err != nil {\n\t\ts.Logger.Error(\"Error sending email\", zap.Error(err))\n\t\treturn err\n\t}\n\n\terr = w.Close()\n\tif err != nil {\n\t\ts.Logger.Error(\"Error closing SMTP\", zap.Error(err))\n\t\treturn err\n\t}\n\n\tquitErr := c.Quit()\n\tif quitErr != nil {\n\t\ts.Logger.Error(\"Error quitting smtp server connection\", zap.Error(quitErr))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "245727e951f3c153aae8fb6a8177d487", "score": "0.6310478", "text": "func (le *Logger) Send(msg string) {\n\tgo le.driver.Println(msg)\n\tlog.Println(msg)\n}", "title": "" }, { "docid": "dfc75974e17c7cbe8b38fa21aacaff86", "score": "0.6300088", "text": "func (c *NullNotifier) Send(to []string, subject string, msg string, tags map[string]string) (int, string) {\n\tvar toAddress = to[0]\n\tlog.Printf(\"Not sending mail to %s, disabled by server configuration: %s\\n\", toAddress, subject)\n\treturn 200, \"OK\"\n}", "title": "" }, { "docid": "81f229e5988174f8bfbeb8836fcc62de", "score": "0.62949836", "text": "func (mail MailMessage) send(client *smtp.Client, host, port string) error {\n\tmessageBody, err := mail.buildMessage()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif err = client.Mail(mail.From); err != nil {\n\t\treturn err\n\t}\n\tif err = client.Rcpt(mail.To); err != nil {\n\t\treturn err\n\t}\n\tw, err := client.Data()\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = w.Write(messageBody)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = w.Close()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6f62e6a0b48d8a58f47c0b71bc13ab9c", "score": "0.6290705", "text": "func (c *smtpClient) send(from, to, subject, body string) error {\n\tif err := c.Mail(from); err != nil {\n\t\treturn err\n\t}\n\n\tif err := c.Rcpt(to); err != nil {\n\t\treturn err\n\t}\n\n\twc, err := c.Data()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer wc.Close()\n\n\theaders := map[string]string{\n\t\t\"From\": c.m.from,\n\t\t\"To\": to,\n\t\t\"Subject\": subject,\n\t}\n\n\tif from != \"\" {\n\t\theaders[\"From\"] = from\n\t}\n\n\tmsg := makeHeaders(headers)\n\n\tmsg += \"\\r\\n\" + body\n\n\tif _, err := wc.Write([]byte(msg)); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ae7012d43e3768413d132b065ceba094", "score": "0.6265467", "text": "func sendMail(c appengine.Context, story Story) {\n\tif story.Complete {\n\t\treturn\n\t}\n\tvar subject, text string\n\tpart := story.LastPart()\n\turl := fmt.Sprintf(serverUrl, story.Id, story.NextId)\n\tif part != nil {\n\t\tsubject = \"Please write the next part of this story.\"\n\t\ttext = fmt.Sprintf(\"%s, %s wrote:\\n> %s\\n\\nPlease visit %s to write the next part.\",\n\t\t\tcapital(fuzzyTime(part.Written)), getFullEmail(c, part.Author), part.Visible, url)\n\t} else {\n\t\tsubject = \"Please write the first part of this story.\"\n\t\ttext = fmt.Sprintf(\"%s, %s initiated a new story.\\n\\nPlease visit %s to write the beginning.\",\n\t\t\tcapital(fuzzyTime(story.Created)), getFullEmail(c, story.Creator), url)\n\t}\n\n\tmsg := &mail.Message{\n\t\tSender: sender,\n\t\tTo: []string{story.NextAuthor},\n\t\tSubject: subject,\n\t\tBody: text,\n\t}\n\tif err := mail.Send(c, msg); err != nil {\n\t\tc.Errorf(\"Couldn't send email: %v\", err)\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "95be0b74dde768a2a246de7e9ac7031b", "score": "0.62494165", "text": "func Send(subject, msg string, from EmailAddress, to ...EmailAddress) {\n\tm := gomail.NewMessage()\n\tm.SetAddressHeader(\"From\", from.Email, from.Name)\n\tm.SetHeader(\"Subject\", subject)\n\tm.SetBody(\"text/html\", msg)\n\n\ttoString := make([]string, len(to))\n\tfor i := range to {\n\t\ttoString[i] = m.FormatAddress(to[i].Email, to[i].Name)\n\t}\n\tm.SetHeader(\"To\", toString...)\n\n\t// No need to wait for result. its better to have the user and just record the\n\t// exception here :)\n\tsafe.GoRoutine(context.Background(), func() {\n\t\tassert.Nil(dialer.DialAndSend(m))\n\t})\n}", "title": "" }, { "docid": "db23380f823a7e83e27280a155d6caa0", "score": "0.6229037", "text": "func SendEmail(w http.ResponseWriter, r *http.Request, t *tools.Tools) {\n\t// Get body into a byte array\n\tbody, ioerr := ioutil.ReadAll(io.LimitReader(r.Body, 104857600))\n\tif ioerr != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Error reading body %s\", ioerr.Error()), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//handle errors in closing request body\n\tif err := r.Body.Close(); err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Error closing body %s\", err.Error()), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//transform body into map[string]string\n\tvar emailbody EmailBody\n\tif err := json.Unmarshal(body, &emailbody); err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Error unmarshalling input into map : %s\", err.Error()), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\t//Email a user\n\tfrom := mail.NewEmail(\"noreply user\", \"noreply@morakeholdings.com\")\n\tto := mail.NewEmail(\"system user\", emailbody.Email)\n\n\tmessage := mail.NewSingleEmail(from, emailbody.Subject, to, emailbody.Body, \"\")\n\tclient := sendgrid.NewSendClient(os.Getenv(\"SENDGRID_API_KEY\"))\n\tresponse, err := client.Send(message)\n\tif err != nil {\n\t\thttp.Error(w, fmt.Sprintf(\"Error sending email to %s : %s\", emailbody.Email, err.Error()), http.StatusBadRequest)\n\t\treturn\n\t} else {\n\t\t//connect to Postgres db\n\t\tif err := t.OpenDB(w); err != nil {\n\t\t\thttp.Error(w, fmt.Sprintf(\"Error opening database : %s\", err.Error()), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\t//execute sql\n\t\tsqlStatement := \"INSERT INTO logs (logtype, email, subject, body) VALUES ($1, $2, $3, $4)\"\n\t\tstatementValues := []interface{\"INFO\",emailbody.Email, emailbody.Subject, emailbody.Body}\n\t\t\n\t\tif err = t.ExecuteSQL(sqlStatement, statementValues); err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\n\t\t//Send response to user\n\t\tw.Header().Set(\"Content-Type\", \"text/json; charset=utf-8\")\n\t\tw.WriteHeader(http.StatusOK)\n\t\tif err := json.NewEncoder(w).Encode(response); err != nil {\n\t\t\thttp.Error(w, err.Error(), http.StatusBadRequest)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "4607280ef00f88e7360367a3814d0fec", "score": "0.61711174", "text": "func Send(data Form) error {\n\tsess, err := session.NewSession(&aws.Config{\n\t\tRegion: aws.String(region)},\n\t)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tsvc := ses.New(sess)\n\n\tinput := &ses.SendEmailInput{\n\t\tDestination: &ses.Destination{\n\t\t\tCcAddresses: []*string{},\n\t\t\tToAddresses: []*string{\n\t\t\t\taws.String(data.To),\n\t\t\t},\n\t\t},\n\t\tMessage: &ses.Message{\n\t\t\tBody: &ses.Body{\n\t\t\t\tHtml: &ses.Content{\n\t\t\t\t\tCharset: aws.String(charset),\n\t\t\t\t\tData: aws.String(data.Body),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSubject: &ses.Content{\n\t\t\t\tCharset: aws.String(charset),\n\t\t\t\tData: aws.String(data.Subject),\n\t\t\t},\n\t\t},\n\t\tSource: aws.String(sender),\n\t}\n\n\tresult, err := svc.SendEmail(input)\n\n\tfmt.Println(result)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "200b3930ca5d5001f6e5d655957eff64", "score": "0.61566186", "text": "func (e *Client) Send(from string, to []string, subject, body string) error {\n\terr := smtp.SendMail(\"smtp.gmail.com:587\",\n\t\tsmtp.PlainAuth(\"\", e.Email, e.Password, \"smtp.gmail.com\"),\n\t\te.Email, to, []byte(body))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"falha ao enviar email, erro %q\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c13f7a10d08941d48d1ad3b1f04dfb1c", "score": "0.61471", "text": "func (c *core) Send(emailRequest EmailRequest) (err error) {\n\t// accessToken, err := c.tokenGeneratorEmail.GetAccessToken(5)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbody, err := json.Marshal(EmailRequest{\n\t\tSubject: emailRequest.Subject,\n\t\tTo: emailRequest.To,\n\t\tHTML: emailRequest.HTML,\n\t\tFrom: emailRequest.From,\n\t\tText: emailRequest.Text,\n\t\tAttachments: emailRequest.Attachments,\n\t})\n\n\t// var url = c.apiBaseURL + \"/v1/email/send\"\n\tvar url = c.apiBaseURL + \"/send\"\n\n\trequest, err := http.NewRequest(\"POST\", url, bytes.NewBuffer(body))\n\tif err != nil {\n\t\treturn err\n\t}\n\trequest.Header.Add(\"Content-Type\", \"application/json\")\n\t// request.Header.Add(\"Authorization\", \"Bearer \"+accessToken)\n\n\tresponse, err := httpClient.Do(request)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode != 200 {\n\t\treturn err\n\t}\n\tfmt.Printf(\"Email Sent To : %s\", emailRequest.To)\n\treturn\n}", "title": "" }, { "docid": "98a23fb3894b728d7b03607c714438b4", "score": "0.61429864", "text": "func (a App) Send(email, name, subject, buf string, files []string) (err error) {\n\n\tif a.Config.From == \"\" {\n\t\ta.Log.Printf(\"warn: Mail config field FROM does not set. Skip mailing\")\n\t\treturn\n\t}\n\tmsg := gomail.NewMessage()\n\tif a.Config.FromName == \"\" {\n\t\tmsg.SetHeader(\"From\", a.Config.From)\n\t} else {\n\t\tmsg.SetAddressHeader(\"From\", a.Config.From, a.Config.FromName)\n\t}\n\tmsg.SetHeader(\"To\", email)\n\tif a.Config.Copy != \"\" {\n\t\tmsg.SetHeader(\"Bcc\", a.Config.Copy)\n\t}\n\tmsg.SetHeader(\"Subject\", subject)\n\n\tmsg.SetBody(\"text/html\", buf)\n\n\tfor _, name := range files {\n\t\tmsg.Attach(name)\n\t}\n\tmailer := gomail.NewDialer(a.Config.Host, a.Config.Port, a.Config.Login, a.Config.Pass)\n\n\tif a.Config.NoTLS {\n\t\tmailer.TLSConfig = &tls.Config{InsecureSkipVerify: true}\n\t}\n\terr = mailer.DialAndSend(msg)\n\treturn\n}", "title": "" }, { "docid": "a6708fac9cc7588ce9b71ed01b9ee05d", "score": "0.61281425", "text": "func Send(w http.ResponseWriter, r *http.Request) {\n\tif os.Getenv(\"CUSTOM_TOKEN\") != \"\" && r.Header.Get(\"custom-token\") != os.Getenv(\"CUSTOM_TOKEN\") {\n\t\tErrorResponse(w, r, http.StatusNonAuthoritativeInfo, nil, \"auth wrong\")\n\t\treturn\n\t}\n\tctx := r.Context()\n\tlog.Infof(ctx, \"POST /send\")\n\n\tct := r.Header.Get(\"Content-Type\")\n\tlog.Infof(ctx, \"Content-Type is: %s\", ct)\n\n\tcontentType, pass, isDataUpload := checkContentType(ctx, ct)\n\tif !pass {\n\t\tErrorResponse(w, r, http.StatusNonAuthoritativeInfo, nil, \"Content-Type error, shoud be multipart/form-data, application/x-www-form-urlencoded or application/json\")\n\t\treturn\n\t}\n\tform, err := makeMailParams(r, contentType)\n\tif err != nil {\n\t\tErrorResponse(w, r, http.StatusUnprocessableEntity, err, \"parse form params error\")\n\t\treturn\n\t}\n\n\tlog.Infof(ctx, \"url values is %+v\", form)\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tlog.Infof(ctx, \"send to %s\", form.To)\n\tlog.Infof(ctx, \"isDataUpload is %v\", isDataUpload)\n\n\tvar attachments []mail.Attachment\n\tif isDataUpload {\n\t\tattachments, err = createAttachments(r)\n\n\t\tif err != nil {\n\t\t\tErrorResponse(w, r, http.StatusUnprocessableEntity, err, \"upload file failed\")\n\t\t}\n\t}\n\n\tgaeMail := makeGaeMail(ctx, &form, attachments)\n\tsendErr := gaeMail.Send()\n\tif sendErr != nil {\n\t\tErrorResponse(w, r, http.StatusUnprocessableEntity, sendErr, \"send mail failed\")\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tfmt.Fprintf(w, \"%s\", `{\"result\": \"sent success\"}`)\n}", "title": "" }, { "docid": "0ad5aaabb89400f5b98c1b30180c4e76", "score": "0.61140114", "text": "func (c *SendgridService) Send(ctx service.RequestContext) error {\n\tname := os.Getenv(\"EMAIL_FROM\")\n\temail := os.Getenv(\"EMAIL_FROM_ADDRESS\")\n\tfromUser := mail.NewEmail(name, email)\n\n\tto := mail.NewEmail(\"\", ctx.To)\n\n\tmsg := ToHTML(ctx.Metadata)\n\tmessage := mail.NewSingleEmail(fromUser, ctx.Subject, to, \"\", msg)\n\tresp, err := c.service.Send(message)\n\n\tif err != nil {\n\t\tlog.Printf(\"failed to send email: %v\", err)\n\t\treturn err\n\t}\n\n\tif resp.StatusCode == http.StatusTooManyRequests {\n\t\treturn errors.New(\"too many requests\")\n\t}\n\n\tif resp.StatusCode > http.StatusNoContent {\n\t\tlog.Printf(\"error from sendgrid: %v\", resp.Body)\n\t\treturn errors.New(\"error encountered (\" + strconv.Itoa(resp.StatusCode) + \")\")\n\t}\n\n\tlog.Printf(\"email sent successfully to: %v\", ctx.To)\n\treturn nil\n}", "title": "" }, { "docid": "cb8b65b8e3d005466d3e7fb96afcf809", "score": "0.61092716", "text": "func sendmail(payload []byte, sendto string) {\n\tvar err error\n\tauth := smtp.PlainAuth(\"\", cfg.Mail.Smtpusername, cfg.Mail.Smtppassword, cfg.Mail.Smtprelay)\n\trelay := fmt.Sprintf(\"%s:%d\", cfg.Mail.Smtprelay, cfg.Mail.Smtpport)\n\terr = smtp.SendMail(relay, auth, cfg.Mail.Envsender, []string{sendto}, payload)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "d122b709c7b78984aad8dec05d011bca", "score": "0.6087377", "text": "func Send(receiverFname, receiverLname, receiverEmail, subject, textBody, htmlBody string) {\n\tfrom := mail.NewEmail(\"Example User\", \"test@example.com\")\n\tto := mail.NewEmail(receiverFname+\" \"+receiverLname, receiverEmail)\n\tmessage := mail.NewSingleEmail(from, subject, to, textBody, htmlBody)\n\t_, err := mailClient.Send(message)\n\tif err != nil {\n\t\tgolog.Errorf(\"Error in sending mail: %s\", err)\n\t}\n}", "title": "" }, { "docid": "86388219ccfabefd7ce57451e6205751", "score": "0.60701585", "text": "func (p *MailSender) Send(to, subject, body string) error {\n\treturn p.Jobber.Push(\n\t\t\"emails\",\n\t\tmap[string]string{\"to\": to, \"subject\": subject, \"body\": body},\n\t)\n}", "title": "" }, { "docid": "3e14b1e9fe2d6ed5b95d4745ce10624f", "score": "0.6044663", "text": "func (m DebugMailer) Email(recepient, subject, html, text string) error {\n\tif m.Destination == nil {\n\t\tm.Destination = os.Stdout\n\t}\n\n\tfmt.Fprintf(m.Destination,\n\t\t`TO: %s\\nSUBJECT: %s\n\t\t%s\\n`, recepient, subject, text)\n\n\treturn nil\n}", "title": "" }, { "docid": "59186ae9205b6d9e661abae14e8ba920", "score": "0.60389346", "text": "func (e EmailSMTPSender) Send(from string, to []string, body []byte) error {\n\taddr := e.config.Host + \":\" + e.config.Port\n\tauth := smtp.CRAMMD5Auth(e.config.User, e.config.Password)\n\treturn e.sendEmail(addr, auth, from, to, body)\n}", "title": "" }, { "docid": "565d832cae0aa62a9699d2744b34d3f3", "score": "0.6036305", "text": "func SendEmail(email string) {\n\tmail := Mail{}\n\tmail.senderID = os.Getenv(\"email_account\")\n\tmail.toIds = []string{email}\n\tmail.subject = \"Wellcome \" + email\n\tmail.body = \"Hello \" + email + \". Thank you for registering. Please wait for next steps\"\n\n\tmessageBody := mail.BuildMessage()\n\n\tsmtpServer := SMPTServer{host: \"smtp.gmail.com\", port: \"465\"}\n\n\tlog.Println(smtpServer.host)\n\t//build an auth\n\tauth := smtp.PlainAuth(\"\", mail.senderID, os.Getenv(\"email_password\"), smtpServer.host)\n\n\t// Gmail will reject connection if it's not secure\n\t// TLS config\n\ttlsconfig := &tls.Config{\n\t\tInsecureSkipVerify: true,\n\t\tServerName: smtpServer.host,\n\t}\n\n\tconn, err := tls.Dial(\"tcp\", smtpServer.ServerName(), tlsconfig)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tclient, err := smtp.NewClient(conn, smtpServer.host)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\t// step 1: Use Auth\n\tif err = client.Auth(auth); err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\t// step 2: add all from and to\n\tif err = client.Mail(mail.senderID); err != nil {\n\t\tlog.Panic(err)\n\t}\n\tfor _, k := range mail.toIds {\n\t\tif err = client.Rcpt(k); err != nil {\n\t\t\tlog.Panic(err)\n\t\t}\n\t}\n\n\t// Data\n\tw, err := client.Data()\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\t_, err = w.Write([]byte(messageBody))\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\terr = w.Close()\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tclient.Quit()\n\n\tlog.Println(\"Mail sent successfully\")\n}", "title": "" }, { "docid": "c83a7c938e90ab2192eb916c3978eba1", "score": "0.60361284", "text": "func Send(e types.Email) error {\n\tmessage := &m.Message{}\n\tmessage.AddRecipient(e.To.Address, e.To.Name, \"to\")\n\tmessage.FromEmail = e.From.Address\n\tmessage.FromName = e.From.Name\n\tmessage.Subject = e.Subject\n\tif e.Body.HTML != \"\" {\n\t\tmessage.HTML = e.Body.HTML\n\t} else {\n\t\tmessage.HTML = e.Body.Text\n\t}\n\tmessage.Text = e.Body.Text\n\n\t_, err := client.MessagesSend(message)\n\treturn err\n}", "title": "" }, { "docid": "789f0155de151729fbeef846cfbef3df", "score": "0.6030808", "text": "func (t *Handler) sendEmail(userCopy *apps_v1alpha.User, authorityName, emailVerificationCode, subject string) {\n\t// Set the HTML template variables\n\tvar contentData interface{}\n\tvar collective = mailer.CommonContentData{}\n\tcollective.CommonData.Authority = authorityName\n\tcollective.CommonData.Username = userCopy.GetName()\n\tcollective.CommonData.Name = fmt.Sprintf(\"%s %s\", userCopy.Spec.FirstName, userCopy.Spec.LastName)\n\tcollective.CommonData.Email = []string{userCopy.Spec.Email}\n\tif subject == \"user-email-verification-update\" {\n\t\tverifyContent := mailer.VerifyContentData{}\n\t\tverifyContent.Code = emailVerificationCode\n\t\tverifyContent.CommonData = collective.CommonData\n\t\tcontentData = verifyContent\n\t} else {\n\t\tcontentData = collective\n\t}\n\tmailer.Send(subject, contentData)\n}", "title": "" }, { "docid": "2856821c4cbb2b012d717671223d8bb8", "score": "0.60288274", "text": "func (c *Controller) sendMail(ctx context.Context, addresses []string, msg []byte) error {\n\tlogger := logging.FromContext(ctx).Named(\"sendMail\")\n\n\taddrs := make([]*mail.Address, 0, len(addresses))\n\tfor _, s := range addresses {\n\t\taddr, err := mail.ParseAddress(s)\n\t\tif err != nil {\n\t\t\t// We do input validation on all email addresses, so this should\n\t\t\t// theoretically never happen.\n\t\t\tlogger.Errorw(\"failed to parse to address\",\n\t\t\t\t\"address\", s,\n\t\t\t\t\"error\", err)\n\t\t\tcontinue\n\t\t}\n\t\taddrs = append(addrs, addr)\n\t}\n\n\tfrom := c.config.FromAddress\n\tfromAddr, err := mail.ParseAddress(from)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse from address %q: %w\", from, err)\n\t}\n\n\tclient, err := smtp.Dial(c.config.SMTPRelayHost + \":\" + c.config.SMTPRelayPort)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to dial connection: %w\", err)\n\t}\n\tdefer client.Close()\n\n\tif err := client.Hello(c.config.MailDomain); err != nil {\n\t\treturn fmt.Errorf(\"failed to HELLO: %w\", err)\n\t}\n\n\tif err := client.StartTLS(&tls.Config{\n\t\tServerName: c.config.SMTPRelayHost,\n\t\tMinVersion: tls.VersionTLS13,\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"failed to start tls: %w\", err)\n\t}\n\n\tif err := client.Mail(fromAddr.Address); err != nil {\n\t\treturn fmt.Errorf(\"failed to set FROM: %w\", err)\n\t}\n\n\tfor _, addr := range addrs {\n\t\tif err := client.Rcpt(addr.Address); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to set TO: %w\", err)\n\t\t}\n\t}\n\n\tw, err := client.Data()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to create data stream: %w\", err)\n\t}\n\n\tif _, err := w.Write(msg); err != nil {\n\t\treturn fmt.Errorf(\"failed to write body: %w\", err)\n\t}\n\n\tif err := w.Close(); err != nil {\n\t\treturn fmt.Errorf(\"failed to close connection: %w\", err)\n\t}\n\n\tif err := client.Quit(); err != nil {\n\t\treturn fmt.Errorf(\"failed to quit client: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "13d7d756da641301cd16cd5153920e45", "score": "0.60127777", "text": "func Send(m *Message) error {\n\tvar err error\n\n\t// Get the settings pointer.\n\ts := &settings.Settings\n\n\t// Create a new message.\n\tmsg := gomail.NewMessage()\n\tmsg.SetHeader(\"From\", s.MailFrom)\n\tmsg.SetHeader(\"To\", m.To...)\n\tmsg.SetHeader(\"Subject\", m.Subject)\n\tmsg.SetBody(\"text/html\", m.Body)\n\n\tif len(m.ReplyTo) > 0 {\n\t\tmsg.SetHeader(\"Reply-To\", m.ReplyTo...)\n\t}\n\n\t// Add all attachments.\n\tfor _, a := range m.Attachments {\n\t\tf, err := gomail.OpenFile(a)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"utils.SendEMail: failed to add attachment: %v\", err)\n\t\t}\n\t\tmsg.Attach(f)\n\t}\n\n\t// Create the mailer.\n\tvar mailer *gomail.Mailer\n\tif s.MailSkipCertificateVerify {\n\t\tmailer = gomail.NewMailer(s.MailSMTPHost, s.MailUsername, s.MailPassword, s.MailSMTPPort, gomail.SetTLSConfig(&tls.Config{InsecureSkipVerify: true}))\n\t} else {\n\t\tmailer = gomail.NewMailer(s.MailSMTPHost, s.MailUsername, s.MailPassword, s.MailSMTPPort)\n\t}\n\n\t// Send the email.\n\tif err = mailer.Send(msg); err != nil {\n\t\treturn fmt.Errorf(\"utils.SendEmail: failed to send message: %v\", err)\n\t}\n\n\treturn nil\n\n}", "title": "" }, { "docid": "a4a223b79dd8d477fa7c179a99d0d7e9", "score": "0.6007471", "text": "func (c *fileChangelog) send(ctx context.Context, ee eventErr) {\n\tselect {\n\tcase c.events <- ee:\n\tcase <-ctx.Done():\n\t}\n}", "title": "" }, { "docid": "39ad4ba7cd5a3cc3649d9fe7bed5bdfd", "score": "0.5980314", "text": "func Send(mail *Email, server *SMTPServer) (err error) {\n\n\t// Connect to SMTP server\n\tc, err := smtp.Dial(server.serverName())\n\tif err != nil {\n\t\tlog.Printf(\"Error connecting to SMTP server: %v\", err)\n\t\treturn\n\t}\n\n\t// Set the sender and recipients\n\tif err = c.Mail(mail.From); err != nil {\n\t\tlog.Printf(\"Error setting sender: %v\", err)\n\t\treturn\n\t}\n\n\tfor _, t := range mail.To {\n\t\tif err = c.Rcpt(t); err != nil {\n\t\t\tlog.Printf(\"Error setting recipients: %v\", err)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// Send the email body.\n\twc, err := c.Data()\n\tif err != nil {\n\t\tlog.Printf(\"Error sending the DATA command: %v\", err)\n\t\treturn\n\t}\n\n\t// build the message\n\tmessage, err := mail.buildMessage()\n\tif err != nil {\n\t\tlog.Printf(\"Error building message: %v\", err)\n\t\treturn\n\t}\n\n\t// write the message\n\tif _, err = wc.Write([]byte(message)); err != nil {\n\t\tlog.Printf(\"Error writing email body: %v\", err)\n\t\treturn\n\t}\n\n\t// close the writer\n\tif err = wc.Close(); err != nil {\n\t\tlog.Printf(\"Error closing WriteCloser: %v\", err)\n\t\treturn\n\t}\n\n\t// quit connection with server\n\tif err = c.Quit(); err != nil {\n\t\tlog.Printf(\"Error closing connection with SMTP server: %v\", err)\n\t\treturn\n\t}\n\n\treturn\n\n}", "title": "" }, { "docid": "58c313166344d505b937df959df4b390", "score": "0.5960736", "text": "func (module *EmailNotifier) sendEmail(m *gomail.Message) error {\n\tif err := module.smtpDialer.DialAndSend(m); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "50ea0df26af92566e6fb1f773667298e", "score": "0.592905", "text": "func SendEmail(user *User, subject string, formattedTemplate Template) {\n\tfrom := mail.NewEmail(\"Deepseen\", os.Getenv(\"SENDGRID_FROM_ADDRESS\"))\n\tto := mail.NewEmail(user.FirstName+\" \"+user.LastName, user.Email)\n\n\tmessage := mail.NewSingleEmail(\n\t\tfrom,\n\t\tsubject,\n\t\tto,\n\t\tformattedTemplate.Plain,\n\t\tformattedTemplate.Html,\n\t)\n\n\tclient := sendgrid.NewSendClient(os.Getenv(\"SENDGRID_API_KEY\"))\n\tresponse, emailError := client.Send(message)\n\n\t// show log\n\tif emailError == nil {\n\t\tfmt.Println(\"-- SENDGRID: sent to\", user.Email, \"[\", response.StatusCode, response.Body, \"]\")\n\t} else {\n\t\tfmt.Println(\"-- SENDGRID: error\", emailError, \"[\", user.Email, \"]\")\n\t}\n}", "title": "" }, { "docid": "4cbe41706208a2bb3139fcccfb0802d2", "score": "0.59256893", "text": "func (m *knifeMailer) SendMail(from, to, subject, body string) error {\r\n\tmsg := gomail.NewMessage()\r\n\tmsg.SetHeader(\"From\", from)\r\n\tmsg.SetHeader(\"To\", to)\r\n\tmsg.SetHeader(\"Subject\", subject)\r\n\tmsg.SetBody(\"text/html\", body)\r\n\t//m.SetAddressHeader(\"Cc\", \"dan@example.com\", \"Dan\")\r\n\t//m.Attach(\"/home/Alex/lolcat.jpg\")\r\n\r\n\t// Send to the channel in a select as the thread might be blocked if buffer is full\r\n\tselect {\r\n\tcase m.sendMailChannel <- msg:\r\n\tdefault:\r\n\t\treturn errors.New(\"Email MaxQueueSize reached. Could not send email\")\r\n\t}\r\n\treturn nil\r\n}", "title": "" }, { "docid": "d69b4a6e8ee29165e78206315be76ac4", "score": "0.5911842", "text": "func (g *Gmail) Send(to []string, subject, msg string) error {\n\t// Check we have what we need\n\tif err := g.WeOK(); err != nil {\n\t\treturn err\n\t}\n\n\tbody := \"To: \" + to[0] + \"\\r\\nSubject: \" + subject + \"\\r\\n\\r\\n\" + msg\n\tauth := smtp.PlainAuth(\"\", g.Address, g.Password, \"smtp.gmail.com\")\n\terr := smtp.SendMail(\"smtp.gmail.com:587\", auth, g.Address,\n\t\tto, []byte(body))\n\tif err != nil {\n\t\tfmt.Printf(\"FF err %+v \", err)\n\t\tfmt.Println(\" \")\n\t\tlog.Fatal(err)\n\t}\n\t//\n\t// auth := smtp.PlainAuth(\n\t// \t\"\",\n\t// \tg.Address,\n\t// \tg.Password,\n\t// \tg.SMTP,\n\t// )\n\t//\n\t// // sender := \"fromwho@gmail.com\" // change here\n\t//\n\t// // send out the email\n\t// err := smtp.SendMail(\n\t// \tg.SMTP+\":\"+g.Port,\n\t// \tauth,\n\t// \tg.Address,\n\t// \tto,\n\t// \t[]byte(msg),\n\t// )\n\n\tif err != nil {\n\t\tfmt.Println(\"gosendemail ERROR: \", err)\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "92a77df3367e8806b4d0f6ed407c9271", "score": "0.5910095", "text": "func (sender *NullMailSender) SendMail(m *gomail.Message) error {\n\tsender.Count++\n\tlogrus.Infof(\"NullMailer faked sending mail: %s to %v\", m.GetHeader(\"From\"), m.GetHeader(\"To\"))\n\treturn nil\n}", "title": "" }, { "docid": "5a362ba53365ff29f3d50fe7b2506d12", "score": "0.58932805", "text": "func (a *Airflow) Send() error {\n\treturn nil\n}", "title": "" }, { "docid": "64ef1371ce12987a7b08d6967143a80a", "score": "0.58845335", "text": "func (p SESEmailProvider) Send(from, to People, subject, rawBody, htmlBody string) error {\n\tcharset := \"UTF-8\"\n\tmail := &ses.SendEmailInput{\n\t\tSource: toAWSAddressString(from),\n\t\tDestination: &ses.Destination{\n\t\t\tCcAddresses: []*string{},\n\t\t\tToAddresses: []*string{\n\t\t\t\ttoAWSAddressString(to),\n\t\t\t},\n\t\t},\n\t\tMessage: &ses.Message{\n\t\t\tBody: &ses.Body{\n\t\t\t\tHtml: &ses.Content{\n\t\t\t\t\tCharset: aws.String(charset),\n\t\t\t\t\tData: aws.String(htmlBody),\n\t\t\t\t},\n\t\t\t\tText: &ses.Content{\n\t\t\t\t\tCharset: aws.String(charset),\n\t\t\t\t\tData: aws.String(rawBody),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSubject: &ses.Content{\n\t\t\t\tCharset: aws.String(charset),\n\t\t\t\tData: aws.String(subject),\n\t\t\t},\n\t\t},\n\t}\n\n\t_, err := p.service.SendEmail(mail)\n\tif err != nil {\n\t\treturn errors.Wrap(err, errors.ErrorUnknown, \"\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "20fa3c1ba294e6d8b21d18259289f89a", "score": "0.5884516", "text": "func SendMail(config, params, data, trace string) error {\r\n\tc := Config{}\r\n\terr := json.Unmarshal([]byte(config), &c)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\tp := Params{}\r\n\terr = json.Unmarshal([]byte(params), &p)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\td := map[string]interface{}{}\r\n\terr = json.Unmarshal([]byte(data), &d)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\r\n\tm := &Mail{}\r\n\tm.Sender = p.Sender\r\n\tm.To = p.Receiver.receivers(d)\r\n\tif m.To == nil {\r\n\t\treturn errors.New(\"no receivers\")\r\n\t}\r\n\tm.Subject = \"New \" + d[\"StoreTitle\"].(string)\r\n\tif p.hasSubject() {\r\n\t\tif subject, err := p.parseSubjectTemplate(d); err == nil {\r\n\t\t\tm.Subject = subject\r\n\t\t}\r\n\t}\r\n\tbody, err := p.parseTemplate(d)\r\n\tif err != nil {\r\n\t\treturn err\r\n\t}\r\n\tm.Body = body\r\n\tif c.Mailgun != nil {\r\n\t\treturn c.Mailgun.sendMail(m)\r\n\t}\r\n\tif c.Smtp != nil {\r\n\t\treturn c.Smtp.sendMail(m)\r\n\t}\r\n\treturn defaultServer.sendMail(m)\r\n}", "title": "" }, { "docid": "cb9e10d2661f10c741e1066ab732ea8c", "score": "0.58438694", "text": "func Send(r spotify.Response) error {\n\ttype TemplateData struct {\n\t\tName string\n\t\tImage string\n\t\tArtist string\n\t\tTrack string\n\t\tURI string\n\t}\n\ttrack := r.Tracks.Items[0]\n\tfrom := os.Getenv(\"SONG_EMAIL\")\n\tpass := os.Getenv(\"SONG_EMAIL_PASS\")\n\tto := os.Getenv(\"PERSONAL_EMAIL\")\n\n\tdata := TemplateData{\n\t\tName: os.Getenv(\"CURRENT_USER\"),\n\t\tImage: track.Album.Images[1].URL,\n\t\tArtist: track.Artists[0].Name,\n\t\tTrack: track.Name,\n\t\tURI: strings.Split(track.URI, \":\")[2],\n\t}\n\n\tt, err := template.ParseFiles(\"templates/template.html\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tvar tpl bytes.Buffer\n\tif err := t.Execute(&tpl, data); err != nil {\n\t\treturn err\n\t}\n\tresult := tpl.String()\n\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", from)\n\tm.SetHeader(\"To\", to)\n\tm.SetHeader(\"Subject\", fmt.Sprintf(\"%v:%s\", time.Now().Format(\"01-02-2006\"), track.Name))\n\tm.SetBody(\"text/html\", result)\n\n\td := gomail.NewPlainDialer(\"smtp.gmail.com\", 587, from, pass)\n\n\tif err := d.DialAndSend(m); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "89ac771f2b5aaf227fed9bbe6a4018ef", "score": "0.58395267", "text": "func send(to, body string) bool {\n\n\tfrom := \"asgor.ice@gmail.com\" //yourusername@gmail.com\n\tpass := \"pgqycyiqdlgesuvq\" //app specific password yourAppPassword\n\t//to := \"i.asgor91@gmail.com\" //receiver\n\n\tmsg := \"From: \" + from + \"\\n\" +\n\t\t\"To: \" + to + \"\\n\" +\n\t\t\"Subject: Hello\\n\\n\" +\n\t\tbody\n\n\terr := smtp.SendMail(\"smtp.gmail.com:587\",\n\t\tsmtp.PlainAuth(\"\", from, pass, \"smtp.gmail.com\"),\n\t\tfrom, []string{to}, []byte(msg))\n\n\tif err != nil {\n\t\tfmt.Println(\"SMTP error\", err.Error())\n\t\treturn false\n\t}\n\tfmt.Println(\"email successfully sent\")\n\treturn true\n}", "title": "" }, { "docid": "8ef5920c2ffec3c6042c531c8fdc50c6", "score": "0.5837", "text": "func (s *Sender) Send(msg notification.Message) error {\n\tfrom := mail.NewEmail(msg.FromPretty, msg.From)\n\tfor _, r := range msg.To {\n\t\tto := mail.NewEmail(r, r)\n\t\tm := mail.NewSingleEmail(from, msg.Subject, to, msg.Body, msg.BodyHTML)\n\t\t_, err := s.client.Send(m)\n\t\tif err != nil {\n\t\t\treturn errors.Wrap(err, \"sending email with SendGrid\")\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ce7156896cb9f85200f76ad2d687ee9a", "score": "0.5826243", "text": "func (c *Client) Send(from, subject, message string, to ...string) error {\n\tmsg := mailgun.NewMessage(from, subject, message, to...)\n\t_, _, err := c.mailgunC.Send(msg)\n\tif err != nil {\n\t\treturn errInternal.WithError(err).Wrap(\"failed to send mailgun email\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c74340c2306293a935c6c04d58907b90", "score": "0.5812611", "text": "func SendMail() {\n\t// Get values from DB and config.\n\tdb := InitializeDB()\n\tconfig := LoadConfig()\n\n\tserverHost, _, _ := net.SplitHostPort(config.Server)\n\tconn, err := TLSDial(config.Server)\n\tif err != nil {\n\t\tfmt.Printf(\"Error sending mail: %s\", err)\n\t}\n\n\tclient, err := smtp.NewClient(conn, serverHost)\n\tif err != nil {\n\t\tfmt.Printf(\"Client error: %s\", err)\n\t}\n\n\t// Set up auth necessary to send email. Uses values from config.\n\tauth := smtp.PlainAuth(\"\", config.Email, config.Password, serverHost)\n\tauthErr := client.Auth(auth)\n\tif authErr != nil {\n\t\tfmt.Printf(\"Auth error: %s\\n\", authErr)\n\t}\n\n\tif err != nil {\n\t\tfmt.Printf(\"Writer error: %s\\n\", err)\n\t}\n\n\tsubject := \"A new show is about to start!\"\n\n\tfrom := mail.Address{\"\", config.Email}\n\t// In this for range, because k is just the auto-increment PK ID, it is not needed here.\n\tfor range time.NewTicker(config.UpdateInterval * time.Second).C {\n\t\tcurrentReminders := QueryDB()\n\t\tfor k, v := range currentReminders {\n\n\t\t\tdate := time.Now()\n\t\t\tformat := \"2006-01-02\"\n\n\t\t\tsystemDate, _ := time.Parse(format, v.ShowDate)\n\n\t\t\tdiff := date.Sub(systemDate)\n\n\t\t\tif math.Abs(diff.Hours()/24) <= float64(v.ReminderInterval) {\n\n\t\t\t\tfmt.Println(\"Reminder for \" + v.ShowName + \" sent to \" + v.UserEmail)\n\n\t\t\t\tto := mail.Address{\"\", v.UserEmail}\n\n\t\t\t\terr = client.Mail(from.Address)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"From address error: %s\", err)\n\t\t\t\t}\n\n\t\t\t\terr = client.Rcpt(to.Address)\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Rcpt error: %s\\n\", err)\n\t\t\t\t}\n\n\t\t\t\twriter, err := client.Data()\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Writer error: %s\\n\", err)\n\t\t\t\t}\n\n\t\t\t\tbody := \"Hey that show \" + v.ShowName + \" is about to start!\"\n\t\t\t\t// Build the email to send to user.\n\t\t\t\tmessage := MakeMessage(config.Email, v.UserEmail, subject, body)\n\t\t\t\t_, err = writer.Write([]byte(message))\n\t\t\t\tif err != nil {\n\t\t\t\t\tfmt.Printf(\"Error sending mail: %s\", err)\n\n\t\t\t\t\tfmt.Println(\"Successful email sent to: \" + v.UserEmail)\n\n\t\t\t\t}\n\n\t\t\t\t// After reminder is sent out, delete record so it does not repeat later.\n\t\t\t\tdb.Exec(\"DELETE FROM Reminders where ShowID = ?\", k)\n\t\t\t\twriter.Close()\n\t\t\t}\n\n\t\t}\n\t\t// Close writer in current loop so the next loop doesn't error out.\n\n\t}\n\t// Once loop is done, close smtp client.\n\tclient.Quit()\n\n}", "title": "" }, { "docid": "6ab2860c8abacc82ff80180c9a19b869", "score": "0.58084327", "text": "func (message Message) Send(sessionData *types.Session) {\n\n\tmsg := tgbotapi.NewMessage(sessionData.TgBotAPIChatID, message.Text)\n\n\tif _, err := sessionData.TgBotAPI.Send(msg); err != nil {\n\n\t\tlogger.LogEntry{\n\t\t\tConfig: nil,\n\t\t\tMarket: nil,\n\t\t\tSession: sessionData,\n\t\t\tOrder: &types.Order{},\n\t\t\tMessage: functions.GetFunctionName() + \" - \" + err.Error(),\n\t\t\tLogLevel: \"DebugLevel\",\n\t\t}.Do()\n\t}\n\n}", "title": "" }, { "docid": "2cc2ed24e618914444672c9760ca9df0", "score": "0.5803035", "text": "func Send(msg *Message) (int, error) {\n\tlog.Trace(\"Sending mails to: %s\", strings.Join(msg.To, \"; \"))\n\n\t// get message body\n\tcontent := msg.Content()\n\n\tif len(msg.To) == 0 {\n\t\treturn 0, fmt.Errorf(\"empty receive emails\")\n\t} else if len(msg.Body) == 0 {\n\t\treturn 0, fmt.Errorf(\"empty email body\")\n\t}\n\n\tif msg.Massive {\n\t\t// send mail to multiple emails one by one\n\t\tnum := 0\n\t\tfor _, to := range msg.To {\n\t\t\tbody := []byte(\"To: \" + to + \"\\r\\n\" + content)\n\t\t\terr := sendMail(setting.MailService, []string{to}, body)\n\t\t\tif err != nil {\n\t\t\t\treturn num, err\n\t\t\t}\n\t\t\tnum++\n\t\t}\n\t\treturn num, nil\n\t} else {\n\t\tbody := []byte(\"To: \" + strings.Join(msg.To, \";\") + \"\\r\\n\" + content)\n\n\t\t// send to multiple emails in one message\n\t\terr := sendMail(setting.MailService, msg.To, body)\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t} else {\n\t\t\treturn 1, nil\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0afbdd6757248b036e09e24bea83fc85", "score": "0.5783341", "text": "func Send(params *Parameters) error {\n\tif config.Domain == \"\" || config.SiteID == \"\" {\n\t\treturn errors.New(\"either domain or site id are not provided\")\n\t}\n\treturn SendToSite(config.SiteID, params)\n}", "title": "" }, { "docid": "3e64b4760afc4a31c0017a4441be26ce", "score": "0.57734764", "text": "func sendEmail(emailBody []byte, emailAddress string) {\n\tgo sendEmailGoroutine(emailBody, emailAddress)\n}", "title": "" }, { "docid": "e2dd41d870a348af4b32a9fcc66228ee", "score": "0.5772263", "text": "func (s SMTP) Send(subject, body string, attach []string, to string) error {\n\tif localConf == nil {\n\t\tif err := Configure(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tdialer := gomail.NewDialer(localConf.Host, localConf.Port, localConf.User, localConf.Password)\n\tcon, err := dialer.Dial()\n\tif err != nil {\n\t\treturn err\n\t}\n\tfrom := localConf.DefaultFrom\n\tif s.from != \"\" {\n\t\tfrom = s.from\n\t}\n\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", from)\n\tm.SetAddressHeader(\"To\", to, to)\n\tm.SetHeader(\"Subject\", subject)\n\tm.SetBody(\"text/html\", body)\n\n\tif len(attach) > 0 {\n\t\tfor _, p := range attach {\n\t\t\tm.Attach(p)\n\t\t}\n\t}\n\treturn gomail.Send(con, m)\n}", "title": "" }, { "docid": "d51869bef98d1868584199fbe2eac4bb", "score": "0.57639855", "text": "func (e *EmailNotifier) Send(msg Message) error {\n\tvar emailService EmailService\n\n\temailServiceType := domain.Env.EmailService\n\tswitch emailServiceType {\n\tcase EmailServiceSendGrid:\n\t\temailService = &SendGridService{}\n\tcase EmailServiceSES:\n\t\temailService = &SES{}\n\tcase EmailServiceDummy:\n\t\temailService = &TestEmailService\n\tdefault:\n\t\temailService = &TestEmailService\n\t}\n\n\temailMessage := Message{\n\t\tFromName: msg.FromName,\n\t\tFromEmail: msg.FromEmail,\n\t\tToName: msg.ToName,\n\t\tToEmail: msg.ToEmail,\n\t\tTemplate: msg.Template,\n\t\tData: msg.Data,\n\t\tSubject: msg.Subject,\n\t}\n\n\treturn emailService.Send(emailMessage)\n}", "title": "" }, { "docid": "c6ca71951ec01b248b0695e5b5c48a04", "score": "0.57606226", "text": "func (m *MockMessage) Send(email, subject string, body []byte) error {\n\tm.email = email\n\tm.subject = subject\n\tm.body = body\n\treturn nil\n}", "title": "" }, { "docid": "b6158b08fea51fdc19a9632d15e6f485", "score": "0.57562107", "text": "func (s *smtpClient) Send(ctx context.Context, from string, to []string, data io.WriterTo) error {\n\t//from smtp.SendMail()\n\n\tvar (\n\t\te error\n\t\tc *smtp.Client\n\t\tw io.WriteCloser\n\t)\n\n\ts.mut.Lock()\n\n\tdefer func() {\n\t\tif w != nil {\n\t\t\t_ = w.Close()\n\t\t}\n\n\t\t//mandatory for SMTP protocol\n\t\ts._close()\n\n\t\ts.mut.Unlock()\n\t}()\n\n\tif e = s._ValidateLine(from); e != nil {\n\t\treturn e\n\t}\n\n\tfor _, recp := range to {\n\t\tif e = s._ValidateLine(recp); e != nil {\n\t\t\treturn e\n\t\t}\n\t}\n\n\tif c, e = s._client(ctx); e != nil {\n\t\treturn ErrorSMTPClientInit.Error(e)\n\t}\n\n\tif e = c.Noop(); e != nil {\n\t\treturn ErrorSMTPClientNoop.Error(e)\n\t}\n\n\tif e = c.Mail(from); e != nil {\n\t\treturn ErrorSMTPClientMail.Error(e)\n\t}\n\n\tfor _, addr := range to {\n\t\tif e = c.Rcpt(addr); e != nil {\n\t\t\treturn ErrorSMTPClientRcpt.Error(e)\n\t\t}\n\t}\n\n\tif w, e = c.Data(); e != nil {\n\t\treturn ErrorSMTPClientData.Error(e)\n\t}\n\n\tif _, e = data.WriteTo(w); e != nil {\n\t\treturn ErrorSMTPClientWrite.Error(e)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ae12402fc4719a7ea15752296ac8f928", "score": "0.5751906", "text": "func Send(msg Message, recipients Recipients) error {\n\tif errInit != nil {\n\t\treturn errInit\n\t}\n\tif len(recipients.To) == 0 {\n\t\treturn errors.New(\"email: recipients can't be empty\")\n\t}\n\tch <- &sendJob{1, msg, recipients}\n\treturn nil\n}", "title": "" }, { "docid": "f86704e15801ab2c34dcb5ca65f5a779", "score": "0.5739642", "text": "func SendMailNotif(notif *sdk.Notif) {\n\tdb := database.DB()\n\tif db == nil {\n\t\treturn\n\t}\n\tInsert(db, notif, \"email\")\n\tlog.Notice(\"notification.SendMailNotif> Send notif '%s'\", notif.Title)\n\terrors := []string{}\n\tfor _, recipient := range notif.Recipients {\n\t\tif err := mail.SendEmail(notif.Title, bytes.NewBufferString(notif.Message), recipient); err != nil {\n\t\t\terrors = append(errors, err.Error())\n\t\t}\n\t}\n\tif len(errors) > 0 {\n\t\tUpdate(db, notif, \"ERROR : \"+strings.Join(errors, \", \"))\n\t} else {\n\t\tUpdate(db, notif, \"SUCCESS\")\n\t}\n\n}", "title": "" }, { "docid": "de5075c48a0209f8a53f1005bb209477", "score": "0.5733916", "text": "func (s *Client) Send(mail EmailData) error {\n\terr := mail.parseTemplate()\n\tif err != nil {\n\t\tlog.Printf(\"Could not parse email template: %s\\n\", mail.TemplateName)\n\t\treturn err\n\t}\n\terr = s.sendMail(&mail)\n\tif err != nil {\n\t\tlog.Printf(\"Failed to send '%s' the email to %s\\n\", mail.Subject, mail.To)\n\t\treturn err\n\t}\n\tlog.Printf(\"Email '%s' has been sent to %s\\n\", mail.Subject, mail.To)\n\treturn nil\n}", "title": "" }, { "docid": "7d588b788596ba5714e78a234481165a", "score": "0.57285523", "text": "func (d *Dao) Send(c context.Context, msg string) (err error) {\n\tparams := url.Values{}\n\tparams.Set(\"phone\", monitor.Tels)\n\tparams.Set(\"message\", msg)\n\tparams.Set(\"token\", \"f5a658b2-5926-4b71-96c3-7d3777b7d256\")\n\td.client.Get(c, d.uri, \"\", params, nil)\n\treturn\n}", "title": "" }, { "docid": "10251440b7f167cdf926ff8698eb96e8", "score": "0.5725671", "text": "func (s *Server) sender() {\n\t// TODO: HANDLE MESSAGES IN PARALLEL WITH RATE LIMITING.\n\tfor {\n\t\tev := <-s.muxCh\n\n\t\tlog.Info().\n\t\t\tStr(\"topic\", ev.topic).\n\t\t\tStr(\"event\", string(ev.data)).\n\t\t\tMsg(\"email send event\")\n\t\ttopicName := ev.topic\n\t\ttopic, ok := s.topics[topicName]\n\t\tif !ok {\n\t\t\tlog.Error().\n\t\t\t\tStr(\"topic\", topicName).\n\t\t\t\tMsg(\"unknown email topic\")\n\t\t\tcontinue\n\t\t}\n\t\tfields := make(map[string]interface{})\n\t\terr := transform.Unmarshal(topicName, ev.data, fields)\n\t\tif err != nil {\n\t\t\tlog.Error().\n\t\t\t\tStr(\"topic\", topicName).\n\t\t\t\tErr(err).\n\t\t\t\tMsg(\"could't unmarshal message data as map\")\n\t\t\tcontinue\n\t\t}\n\t\tsitename := fields[\"site\"].(string)\n\t\tif sitename == \"\" {\n\t\t\tsitename = \"unknown\"\n\t\t}\n\t\tsite := s.siteSvc.Sites()[sitename]\n\t\tlanguage := fields[\"language\"].(string)\n\t\tif language == \"\" {\n\t\t\tlanguage = \"en\"\n\t\t}\n\t\t//TODO: language is being used for nothing.\n\t\t// check what was the idea behind it\n\t\terr = s.mailer.Send(topic, site, language, fields)\n\t\tif err != nil {\n\t\t\tlog.Error().Err(err).\n\t\t\t\tStr(\"topic\", topicName).\n\t\t\t\tStr(\"site\", sitename).\n\t\t\t\tStr(\"message\", string(ev.data)).\n\t\t\t\tMsg(\"mailer couldn't send email\")\n\t\t\tcontinue\n\t\t}\n\t\tlog.Info().\n\t\t\tStr(\"topic\", topicName).\n\t\t\tStr(\"site\", sitename).\n\t\t\tStr(\"message\", string(ev.data)).\n\t\t\tMsg(\"email sent\")\n\t}\n}", "title": "" }, { "docid": "a9b5d2f525a64cb03335f3eb5018c5d2", "score": "0.5723132", "text": "func sendEmail(authinfo authdata, emails []string, body []byte) error {\n\tauth := smtp.PlainAuth(\"\", authinfo.username, authinfo.password, authinfo.authhost)\n\treturn smtp.SendMail(authinfo.sendhost, auth, authinfo.username, emails, body)\n}", "title": "" }, { "docid": "c4a7a9ec04af9a3e695ddbd05d5c6ff6", "score": "0.57180405", "text": "func (s SMPTService) Send(mail mailservice.Mail) error {\n\t// SMTP information\n\tsmtpHost := \"smtp.sendgrid.net\" // Change this for a valid one\n\tsmtpPort := \"587\"\n\n\t// SMTP Auth\n\tusername := os.Getenv(\"SENDGRID_USER\")\n\tpassword := os.Getenv(\"SENDGRID_PASSWORD\")\n\tauth := smtp.PlainAuth(\"\", username, password, smtpHost)\n\n\t// Parse passed template\n\ttemp, err := template.ParseFiles(mail.Template)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Add headers and subject\n\tmimeHeaders := make(map[string]string)\n\tmimeHeaders[\"From\"] = mail.From\n\tmimeHeaders[\"Subject\"] = mail.Subject\n\tmimeHeaders[\"MIME-Version\"] = \"1.0\"\n\tmimeHeaders[\"Content-Type\"] = \"text/html; charset=\\\"utf-8\\\"\"\n\n\theadersMessage := \"\"\n\tfor k, v := range mimeHeaders {\n\t\theadersMessage += fmt.Sprintf(\"%s: %s\\r\\n\", k, v)\n\t}\n\n\tvar emailBody bytes.Buffer\n\temailBody.Write([]byte(fmt.Sprintf(\"%s\\n\\n\", headersMessage)))\n\n\terr = temp.Execute(&emailBody, mail.Body)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn smtp.SendMail(smtpHost+\":\"+smtpPort, auth, mail.From, mail.To, emailBody.Bytes())\n}", "title": "" }, { "docid": "7ede42744ec698144770be6bfec10436", "score": "0.5716883", "text": "func (m *MockMessage) Send(email, subject string, body []byte) error {\n\tm.body = body\n\tm.email = email\n\tm.subject = subject\n\n\treturn nil\n}", "title": "" }, { "docid": "a83ab2fecd7506fe790021f95a44cf44", "score": "0.5715977", "text": "func SendMail(subject string, to string, name string, price string) bool {\n\tlog.Println(\"Trying to Send Mail....\")\n\t//Use Gomail Package\n\tm := gomail.NewMessage()\n\tm.SetHeader(\"From\", fromEmail)\n\tm.SetHeader(\"To\", to)\n\tm.SetAddressHeader(\"BCc\", adminEmail, adminName)\n\tm.SetHeader(\"Subject\", subject)\n\tm.SetBody(\"text/html\", fmt.Sprintf(WinnerMailTPL, name, price))\n\n\td := gomail.NewDialer(smtpConfig.server, smtpConfig.port, smtpConfig.username, smtpConfig.password)\n\n\t// Send the email to Bob, Cora and Dan.\n\tif err := d.DialAndSend(m); err != nil {\n\t\tlog.Println(\"Error Sending Mail: \", err)\n\t\treturn false\n\t}\n\treturn true\n}", "title": "" }, { "docid": "3af612d6c31d1c7e3f5dc3e0ab58fabd", "score": "0.57032835", "text": "func (c *Client) Send(email Email) chan error {\n\tvar err error\n\tconst CRLF = \"\\r\\n\"\n\tconst rfc2822 = \"Mon, 02 Jan 2006 15:04:05 -0700\"\n\tvar errs = make(chan error, 1)\n\tsmtpAuth := New()\n\tdefer close(errs)\n\tauth := smtp.CRAMMD5Auth(c.User, c.Password)\n\tmime := \"MIME-version: 1.0;\" + CRLF\n\ttomsg := \"To: \" + strings.Join(email.To, \",\") + CRLF\n\tfrommsg := \"From: \" + strings.Join(email.From, \",\") + CRLF\n\tsubjectmsg := \"Subject: \" + email.Subject + CRLF\n\tdate := \"Date: \" + time.Now().Format(rfc2822) + CRLF\n\tmessageID := \"Message-ID: <\" + uuid.UUIDv4() + \"@\" + c.Domain + \">\" + CRLF\n\tcontentTransferEncoding := \"Content-Transfer-Encoding: 8bit\" + CRLF\n\tcontentType := \"Content-Type: text/html; charset=\\\"UTF-8\\\";\" + CRLF\n\tfullBody := fmt.Sprintf(\"%s%s%s%s%s%s%s%s%s\",\n\t\tdate,\n\t\ttomsg,\n\t\tfrommsg,\n\t\tsubjectmsg,\n\t\tmessageID,\n\t\tmime,\n\t\tcontentTransferEncoding,\n\t\tcontentType,\n\t\temail.Body,\n\t)\n\tlogmsg := fmt.Sprintf(\"Will send mail size %v via %s:%s from %s to %s\",\n\t\tlen(email.Body),\n\t\tsmtpAuth.Host,\n\t\tsmtpAuth.Port,\n\t\temail.From,\n\t\temail.To,\n\t)\n\tfmt.Printf(\"Info(SendEmail): %s\\n\", logmsg)\n\tif err = smtp.SendMail(\n\t\tc.Host+\":\"+c.Port,\n\t\tauth,\n\t\tc.User,\n\t\temail.To,\n\t\t[]byte(fullBody)); err != nil {\n\t\tfmt.Printf(\"Error(SendEmail): %s\\n\", err.Error())\n\t\terrs <- err\n\t}\n\treturn errs\n}", "title": "" }, { "docid": "b1361e19dcc73ae22de23f021b2f9492", "score": "0.5691095", "text": "func sendMail(to, from, cc, subject, body string) (string, string, error) {\n\tif mgDomain == \"\" || mgKey == \"\" {\n\t\treturn \"\", \"\", errors.New(\"mailgun not configured\")\n\t}\n\tmg := mailgun.NewMailgun(mgDomain, mgKey)\n\tmessage := mg.NewMessage(\n\t\tfrom,\n\t\tsubject,\n\t\tbody)\n\tmessage.AddRecipient(to)\n\tif cc != \"\" {\n\t\tmessage.AddCC(cc)\n\t}\n\tmessage.SetReplyTo(from)\n\n\treturn mg.Send(message)\n}", "title": "" }, { "docid": "d88d2bffb0f96d870f04db55225438ea", "score": "0.5687562", "text": "func (m *Mailer) Send(msg *Message) error {\n\tfrom := mail.NewEmail(\"No Reply\", msg.From)\n\tif msg.From == \"\" {\n\t\tfrom = mail.NewEmail(\"No Reply\", m.DefaultFrom)\n\t}\n\n\tto := mail.NewEmail(msg.To, msg.To)\n\tif msg.From == \"\" {\n\t\tto = mail.NewEmail(m.DefaultTo, m.DefaultTo)\n\t}\n\n\tcontent := mail.NewContent(\"text/html\", msg.Body)\n\temail := mail.NewV3MailInit(from, msg.Subject, to, content)\n\temail.SetTemplateID(msg.TemplateID)\n\n\tfor k, v := range msg.Vars {\n\t\temail.Personalizations[0].SetSubstitution(k, v)\n\t}\n\n\trequest := sendgrid.GetRequest(m.APIKey, \"/v3/mail/send\", \"https://api.sendgrid.com\")\n\trequest.Method = \"POST\"\n\t_, err := sendgrid.API(request)\n\n\treturn err\n}", "title": "" }, { "docid": "9787e7515783eef3be0173a1ae915baf", "score": "0.5687461", "text": "func (target *NATSTarget) send(eventData event.Event) error {\n\tobjectName, err := url.QueryUnescape(eventData.S3.Object.Key)\n\tif err != nil {\n\t\treturn err\n\t}\n\tkey := eventData.S3.Bucket.Name + \"/\" + objectName\n\n\tdata, err := json.Marshal(event.Log{EventName: eventData.EventName, Key: key, Records: []event.Event{eventData}})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif target.stanConn != nil {\n\t\tif target.args.Streaming.Async {\n\t\t\t_, err = target.stanConn.PublishAsync(target.args.Subject, data, nil)\n\t\t} else {\n\t\t\terr = target.stanConn.Publish(target.args.Subject, data)\n\t\t}\n\t} else {\n\t\terr = target.natsConn.Publish(target.args.Subject, data)\n\t}\n\treturn err\n}", "title": "" }, { "docid": "7e030d937ca61c26020ad0ce9dcf3136", "score": "0.568585", "text": "func (c *client) Send(tos []string, title, content string) error {\n\tmsg := Message{\n\t\tToUser: strings.Join(tos, \"|\"),\n\t\tMsgType: defaultMsgType,\n\t\tText: Content{\n\t\t\tContent: title + \"\\n\" + content,\n\t\t},\n\t\tAgentID: c.AgentID,\n\t}\n\terr := c.send(msg)\n\tif err != nil {\n\t\treturn err\n\n\t}\n\treturn nil\n\n}", "title": "" }, { "docid": "d6275d27fde10b5c275e782bad4ac23c", "score": "0.5680049", "text": "func (m *Msg) Send(target string) {\n fmt.Printf(\"Send %s to %s\\n\", m.Note, target)\n}", "title": "" }, { "docid": "d443e2c653c99118fc4d9d13f27fdaec", "score": "0.5674267", "text": "func (a *AlertHandler) Send(subject, message, alertTopic string) error {\n\t// Verifies if the alert activated too recently\n\tif a.activationTimes != 0 && time.Now().UTC().Sub(a.lastAlert) < a.timeout {\n\t\ta.activationTimes += 1\n\t\treturn nil\n\t}\n\n\ta.activationTimes += 1\n\ta.lastAlert = time.Now().UTC()\n\ta.lastMessage = message\n\ta.lastSubject = subject\n\n\t// Formatting the request body with the relevant info for our request\n\treqBody, _ := json.Marshal(map[string]string{\n\t\t\"subject\": subject,\n\t\t\"mailBody\": fmt.Sprintf(\n\t\t\t\"%s\\nActivated: %d times.\\nTimestamp:%s\",\n\t\t\tmessage,\n\t\t\ta.activationTimes,\n\t\t\ta.lastAlert.Format(time.RFC1123),\n\t\t),\n\t\t\"topic\": fmt.Sprintf(\"arn:aws:sns:us-east-2:406163507813:%s\", alertTopic),\n\t})\n\n\t// Execution of the post requests with the follow URL\n\t_, err := http.Post(a.requestUrl, \"application/json\", bytes.NewBuffer(reqBody))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failure sending Post request for sending email alert, err: %s\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f643de4a11da0b08515d5d49044f0ba9", "score": "0.56488293", "text": "func (m Mailer) Send() []error {\n\tvar errs []error\n\n\tfor index, person := range m.People {\n\t\tfrom := mail.NewEmail(\"Chennai Gophers\", m.Credential.Email)\n\t\tsubject := m.Subject\n\t\tto := mail.NewEmail(person.Name, person.Email)\n\n\t\tvar body bytes.Buffer\n\t\terr := m.Template.Execute(&body, person)\n\n\t\tif err != nil {\n\t\t\terrs = append(errs, err)\n\t\t\tcontinue\n\t\t}\n\n\t\tplainTextContent := body.String()\n\n\t\tlog.Debug(plainTextContent)\n\n\t\tmessage := mail.NewSingleEmail(from, subject, to, \"\", \"\")\n\n\t\tmessage.Content = []*mail.Content{mail.NewContent(\"text/plain\", plainTextContent)}\n\n\t\tresponse, err := m.Client.Send(message)\n\n\t\tlog.Infof(\"\\tStatus Code: %d\", response.StatusCode)\n\t\tlog.Infof(\"\\tBody: %s\", response.Body)\n\n\t\tif !(response.StatusCode < 400) {\n\t\t\tresErr := fmt.Errorf(\"unable to send email index: %d ; to: %v ; body: %s ; error: %v\", index, person, response.Body, err)\n\t\t\tlog.Error(resErr)\n\t\t\terrs = append(errs, resErr)\n\t\t} else if err != nil {\n\t\t\tlog.Error(\"unable to send email:\", err)\n\t\t\terrs = append(errs, err)\n\t\t}\n\t}\n\n\treturn errs\n}", "title": "" }, { "docid": "10119a5c7c627a1f936ca8389e4ca5ce", "score": "0.56414676", "text": "func sendMailgun(payload *EmailPayload) error {\n // Nasty dirty, should keep one mailgun but my Mailago instantiation won't support it\n mg, err := newMailgun()\n if err != nil {\n msg := fmt.Sprintf(\"There was an error in setting up the Mailgun connection: %v\", err.Error())\n log.Print(msg)\n return fmt.Errorf(\"Mailgun connection failed: %v\", msg)\n }\n\n msg, id, err := mg.Send(mg.NewMessage(payload.From, payload.Subject, payload.Body, payload.To))\n if err != nil {\n msg := fmt.Sprintf(\"Could not send message: %v, ID %v, %+v\", err, id, msg)\n log.Print(msg)\n return fmt.Errorf(\"Mailgun send failed: %v\", msg)\n }\n\n return nil\n}", "title": "" }, { "docid": "dab03a9774d933300a9208c5b2da76de", "score": "0.5637235", "text": "func (mg *MailGunEmailClient) Send() {\n\tsender := \"sender@example.com\"\n\tsubject := \"Fancy subject!\"\n\tbody := \"Hello from Mailgun Go!\"\n\trecipient := \"recipient@example.com\"\n\n\t// The message object allows you to add attachments and Bcc recipients\n\tmessage := mg.client.NewMessage(sender, subject, body, recipient)\n\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*10)\n\tdefer cancel()\n\n\t// Send the message\twith a 10 second timeout\n\tresp, id, err := mg.client.Send(ctx, message)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tfmt.Printf(\"ID: %s Resp: %s\\n\", id, resp)\n}", "title": "" }, { "docid": "f422f721b4add62a1116ceb569995aa2", "score": "0.5618931", "text": "func (h *Target) Send(entry interface{}, errKind string) error {\n\tselect {\n\tcase h.logCh <- entry:\n\tdefault:\n\t\t// log channel is full, do not wait and return\n\t\t// an error immediately to the caller\n\t\treturn errors.New(\"log buffer full\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "76a0e619688783c7b7fc8f7864717fe6", "score": "0.5618525", "text": "func EmailGo(username string, password string, ip string, port int, tos string, subject string, content string) error {\n address := ip + \":\" + strconv.Itoa(port)\n body := \"<html><body><h3>\" + content + \"</h3></body></html>\"\n if err := SendEmail(username, password, address, tos, subject, body, \"html\"); err != nil {\n log.Println(\"fail to send email\")\n return err\n }\n return nil\n}", "title": "" }, { "docid": "87709d999f723175ab317c805bfc31b9", "score": "0.5615268", "text": "func (sink *influxSink) send(ctx context.Context, m Metric, fields map[string]interface{}) error {\n\tif fc.DebugLogEnabled() {\n\t\t// only build string if debugging is on so as to not waste string interpolation of there\n\t\t// isn't going to be a write\n\t\tfc.Debug.Printf(\"sending %s -> %v\", m.Name, fields)\n\t}\n\tp := influxdb2.NewPoint(m.Name, m.Tags, fields, m.Time)\n\treturn sink.api.WritePoint(ctx, p)\n}", "title": "" }, { "docid": "2eb31f2add5be3aad9211c068aa785c4", "score": "0.56099534", "text": "func send(job *RequestJob) {\n\tpLogger.Info(\"EXT_O %s\\n\", job.Message)\n\tpStats.IncServerOutPktAcc()\n\tpStats.DecReguestQueuePadding()\n\t// simulate the execution time of sending request\n\ttime.Sleep(20 * time.Millisecond)\n}", "title": "" }, { "docid": "8c501b9821ee99b269922645838f8be5", "score": "0.56049323", "text": "func (e *Engine) SendEmail(req *CreateEmailRequest) (err error) {\n\t// base64でエンコード済みの透過gifを本文に追加\n\temailTemplate, err := e.createEmailTemplate(req)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = e.sqlClient.CreateEmailTemplate(emailTemplate)\n\tif err != nil {\n\t\treturn\n\t}\n\tgo (func() {\n\t\tfor _, email := range emailTemplate.BatchEmail.Emails {\n\t\t\topenConfirmationCode := fmt.Sprintf(`<img style=\"width: 1px; height: 1px; display: none\" src=\"https://%s/%d/read\">`, os.Getenv(\"EMAIL_DOMAIN\"), email.ID)\n\t\t\temail.Body = email.Body + openConfirmationCode\n\t\t\terr = e.awsClient.SendEmail(email, emailTemplate.BatchEmail.Sender)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t\tlog.Printf(\"sent an email(id: %d) to: %s\\n\", email.ID, email.To)\n\t\t\ttime.Sleep(1 * time.Second)\n\t\t}\n\t})()\n\t\n\treturn\n}", "title": "" }, { "docid": "43f3fdb0a19235cdc0a6d28a6648fa8f", "score": "0.56047076", "text": "func (n *EmailMailgun) Send(ctx context.Context, toEmail, subject, templateName string, data map[string]interface{}) error {\n\thtmlDat, txtDat, err := parseEmailTemplates(n.templateDir, templateName, data)\n\tif err != nil {\n\t\treturn errors.Errorf(\"Error in sending email: %+v\", err)\n\t}\n\n\tmg := mailgun.NewMailgun(n.domain, n.apiKey)\n\tm := mg.NewMessage(\n\t\tn.senderEmailAddress,\n\t\tsubject,\n\t\tstring(txtDat),\n\t\ttoEmail,\n\t)\n\n\tm.SetHtml(string(htmlDat))\n\n\tctx, cancel := context.WithTimeout(ctx, time.Second*30)\n\tdefer cancel()\n\n\t_, _, err = mg.Send(ctx, m)\n\treturn err\n}", "title": "" }, { "docid": "af40c1db882631d4bfb516daba928802", "score": "0.56039536", "text": "func (a *App) Send(m *structs.Message) error {\n\treturn nil\n}", "title": "" }, { "docid": "ca9c0e603bb0c49a3f426f73a972069a", "score": "0.5602077", "text": "func (this Email) Send(to, subject, message string) error {\n\tmsg := []byte(\"From: \" + this.from + \"\\r\\n\" +\n\t\t\"To: \" + to + \"\\r\\n\" +\n\t\t\"Subject: \" + subject + \"\\r\\n\" +\n\t\t\"\\r\\n\" +\n\t\tmessage + \"\\r\\n\")\n\t//recv := []string{to}\n\n\t//err := smtp.SendMail(this.host+\":25\", this.auth, this.from, recv, msg)\n\terr := this.sendTlsMail(this.from, to, msg)\n\treturn err\n}", "title": "" }, { "docid": "f56bd19baf552e4d8a643fbac14d4d79", "score": "0.5600475", "text": "func (s *Service) SendMailM(c context.Context, mailType int, linkMail string, params ...string) (err error) {\n\tsubject, body, err := buildMailData(false, mailType, params...)\n\tif err != nil {\n\t\tlog.Error(\"SendMailLog err(%v)\", err)\n\t\treturn\n\t}\n\n\tcontent := fmt.Sprintf(\"<html><body>\"+\n\t\t\"</body>\"+\n\t\t\" %s \"+\n\t\t\"</html>\",\n\t\tbody,\n\t)\n\n\tif s.d.SendMail(content, subject, linkMail); err != nil {\n\t\terr = errors.New(\"send mial fail\")\n\t\tlog.Error(\"SendMail fail,mailType=%d\", mailType)\n\t}\n\treturn\n}", "title": "" }, { "docid": "d83701ad7c65f0a687748b00148f3c1d", "score": "0.5599278", "text": "func (n *SMTPNotifier) Send(ctx context.Context, recipient mail.Address, subject string, et *templates.EmailTemplate, data any) (err error) {\n\tmsg := gomail.NewMsg(\n\t\tgomail.WithMIMEVersion(gomail.Mime10),\n\t\tgomail.WithBoundary(n.random.StringCustom(30, random.CharSetAlphaNumeric)),\n\t)\n\n\tn.setMessageID(msg, n.domain)\n\n\tif err = msg.From(n.config.Sender.String()); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to set from address: %w\", err)\n\t}\n\n\tif err = msg.AddTo(recipient.String()); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to set to address: %w\", err)\n\t}\n\n\tmsg.Subject(strings.ReplaceAll(n.config.Subject, \"{title}\", subject))\n\n\tswitch {\n\tcase n.config.DisableHTMLEmails:\n\t\tif err = msg.SetBodyTextTemplate(et.Text, data); err != nil {\n\t\t\treturn fmt.Errorf(\"notifier: smtp: failed to set body: text template errored: %w\", err)\n\t\t}\n\tdefault:\n\t\tif err = msg.AddAlternativeTextTemplate(et.Text, data); err != nil {\n\t\t\treturn fmt.Errorf(\"notifier: smtp: failed to set body: text template errored: %w\", err)\n\t\t}\n\n\t\tif err = msg.AddAlternativeHTMLTemplate(et.HTML, data); err != nil {\n\t\t\treturn fmt.Errorf(\"notifier: smtp: failed to set body: html template errored: %w\", err)\n\t\t}\n\t}\n\n\tvar client *gomail.Client\n\n\tif client, err = gomail.NewClient(n.config.Address.Hostname(), n.opts...); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to establish client: %w\", err)\n\t}\n\n\tif auth := NewOpportunisticSMTPAuth(n.config); auth != nil {\n\t\tclient.SetSMTPAuthCustom(auth)\n\t}\n\n\tif err = client.DialWithContext(ctx); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to dial connection: %w\", err)\n\t}\n\n\tif err = client.Send(msg); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to send message: %w\", err)\n\t}\n\n\tif err = client.Close(); err != nil {\n\t\treturn fmt.Errorf(\"notifier: smtp: failed to close connection: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "90f516d4647e7955247eadd8dd782c7a", "score": "0.55898523", "text": "func (s *SSEClient) Send(data []byte, flush bool) error {\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"http.SSEClient.Send\", \"Started : {%+q}\", data)\n\n\ts.notifications <- data\n\n\ts.instruments.Log(octo.LOGINFO, s.info.UUID, \"http.SSEClient.Send\", \"Completed\")\n\treturn nil\n}", "title": "" }, { "docid": "8684b12e8028b6cf82886722a2a55290", "score": "0.55826056", "text": "func (s *service) Send(ctx context.Context, msg *auth.Message) error {\n\tif !contactchecker.Validator(msg.Delivery)(msg.Address) {\n\t\treturn fmt.Errorf(\"invalid message delivery method\")\n\t}\n\n\tif err := s.setMessageFields(msg); err != nil {\n\t\treturn err\n\t}\n\n\tif err := s.messageRepo.Publish(ctx, msg); err != nil {\n\t\treturn fmt.Errorf(\"failed to publish to repository: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "33336a03d3fae921acd127903f71c34d", "score": "0.5578607", "text": "func (m *Mail) Send() {\n\t//Setup Headers\n\tmessage := makeHeaders(m) + m.Body.Build() + m.Attachment.Build()\n\n\thost, _, _ := net.SplitHostPort(m.Conf.ServerName)\n\ttlsconfig := &tls.Config{\n\t\tInsecureSkipVerify: true,\n\t\tServerName: host,\n\t}\n\n\tconn, err := tls.Dial(\"tcp\", m.Conf.ServerName, tlsconfig)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tc, err := smtp.NewClient(conn, host)\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tif err = c.Auth(smtp.PlainAuth(\"\", m.Conf.From, m.Conf.Password, host)); err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tif err = c.Mail(m.Conf.From); err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tif err = c.Rcpt(m.Conf.To); err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tw, err := c.Data()\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\t_, err = w.Write([]byte(message))\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\terr = w.Close()\n\tif err != nil {\n\t\tlog.Panic(err)\n\t}\n\n\tc.Quit()\n}", "title": "" }, { "docid": "625d0412a72c68d95ede021382d141b9", "score": "0.5568962", "text": "func (sender *LocalMTASender) SendMail(msg *gomail.Message) error {\n\ts := gomail.SendFunc(func(from string, to []string, msg io.WriterTo) error {\n\t\tb := bytes.NewBuffer([]byte{})\n\t\tmsg.WriteTo(b)\n\t\treturn sender.Runner.Run(from, to, b.Bytes())\n\t})\n\n\terr := gomail.Send(s, msg)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error running command %s\", err.Error())\n\t}\n\tlogrus.Infof(\"mail: successfully sent mail: %v to %v\", msg.GetHeader(\"From\"), msg.GetHeader(\"To\"))\n\treturn nil\n}", "title": "" }, { "docid": "121c412b8d0ed5730ec9d5d195910382", "score": "0.55679494", "text": "func (me *MailExporter) SendMail(msg mailer.Message) error {\n\tfor _, m := range me.mailers {\n\t\tvar configuredMailer mailer.Mailer\n\t\tvar err error\n\n\t\tif !m.Configured() {\n\t\t\tconfiguredMailer, err = m.Configure()\n\t\t\tif err != nil {\n\t\t\t\treturn errors.Wrap(err, fmt.Sprintf(\"failed to initialize %v mailer\", m.Name()))\n\t\t\t}\n\t\t}\n\n\t\terr = configuredMailer.Send(msg)\n\t\tif err != nil {\n\t\t\tme.logger.Warnf(\"mail-exporter: failed to send mail using %v\", configuredMailer.Name())\n\t\t\tcontinue\n\t\t} else {\n\t\t\tme.logger.Infof(\"mail sent - using [%v] mailer\", configuredMailer.Name())\n\t\t\treturn nil\n\t\t}\n\t}\n\n\treturn fmt.Errorf(\"failed to send mail - out of usable backend\")\n}", "title": "" }, { "docid": "729636244e9503832ea5dd7c3d8c44a9", "score": "0.5562701", "text": "func send(req *model.MessageRequest) error {\n\tswitch req.IdentifierType {\n\tcase model.IdentifierTypeSMS:\n\t\treturn sta.Send(req)\n\tcase model.IdentifierTypeEmail:\n\t\treturn mta.Send(req)\n\tdefault:\n\t\treturn errors.New(\"unsupported identifier type\")\n\t}\n}", "title": "" }, { "docid": "04bd35b7470b60f31cb718b51297f789", "score": "0.55608803", "text": "func Send(fromMobile, toMobile string, amount int) {\n\tfmt.Printf(\"Send %d from %s to %s via paypal transfer\\n\", amount, fromMobile, toMobile)\n}", "title": "" }, { "docid": "7c02bf388cd85f463024fd1dfcd5c6c2", "score": "0.55606586", "text": "func (ss Server) SendLog(_ context.Context, request *Empty) (*Empty, error) {\n\tlog.Logf(DebugLevel, \"(ss Server) SendLog\")\n\n\tss.logMu.Lock()\n\tdefer ss.logMu.Unlock()\n\n\tvar name = make([]uint8, len(request.Name))\n\tcopy(name, request.Name)\n\n\tss.log.Name = ss.log.Name + string(name)\n\n\treply := &Empty{}\n\treturn reply, nil\n}", "title": "" }, { "docid": "264599f760dbe2c908fb81cac5eb308e", "score": "0.5559504", "text": "func (e Mail) Send(to mail.Address, subject, msg string) error {\n\tc, err := smtp.Dial(fmt.Sprintf(\"%s:%d\", e.host, e.port))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"couldn't dial mail server: %v\", err)\n\t}\n\tdefer c.Close()\n\tif err := c.Mail(e.from); err != nil {\n\t\treturn err\n\t}\n\tif err := c.Rcpt(to.String()); err != nil {\n\t\treturn err\n\t}\n\twc, err := c.Data()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"problem sending mail: %v\", err)\n\t}\n\tbuf := bytes.NewBufferString(\"Subject: \" + subject + \"\\n\\n\" + msg)\n\tbuf.WriteTo(wc)\n\tif err := c.Quit(); err != nil {\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "cf11198e0bfb9896ba64974e7dfdd2e7", "score": "0.5554683", "text": "func (c *Client) send(pkt packet.Generic, async bool) error {\n\t// send packet\n\terr := c.conn.Send(pkt, async)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tc.backend.Log(PacketSent, c, pkt, nil, nil)\n\n\treturn nil\n}", "title": "" }, { "docid": "c0a0a7d5fd079a09634a941dfb3c7cb0", "score": "0.5548879", "text": "func (mr *MockEmailServiceMockRecorder) Send(to, subject, body interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"Send\", reflect.TypeOf((*MockEmailService)(nil).Send), to, subject, body)\n}", "title": "" }, { "docid": "c77702ab7a239d0cf77721e0853eca3d", "score": "0.55243963", "text": "func (d *driver) Send(cid int, msg string) error {\n\tfmt.Printf(\"Sending SMS to client with id=%d: `%s`\\n\", cid, msg)\n\treturn nil\n}", "title": "" }, { "docid": "d3f36ba1e14ba68a393238068eaef227", "score": "0.5522473", "text": "func sendFailMail(c appengine.Context, com *Commit, builder, logHash string) {\n\t// get Log\n\tk := datastore.NewKey(c, \"Log\", logHash, 0, nil)\n\tl := new(Log)\n\tif err := datastore.Get(c, k, l); err != nil {\n\t\tc.Errorf(\"finding Log record %v: %v\", logHash, err)\n\t\treturn\n\t}\n\tlogText, err := l.Text()\n\tif err != nil {\n\t\tc.Errorf(\"unpacking Log record %v: %v\", logHash, err)\n\t\treturn\n\t}\n\n\t// prepare mail message\n\tvar body bytes.Buffer\n\terr = sendFailMailTmpl.Execute(&body, map[string]interface{}{\n\t\t\"Builder\": builder, \"Commit\": com, \"LogHash\": logHash, \"LogText\": logText,\n\t\t\"Hostname\": domain,\n\t})\n\tif err != nil {\n\t\tc.Errorf(\"rendering mail template: %v\", err)\n\t\treturn\n\t}\n\tsubject := fmt.Sprintf(\"%s broken by %s\", builder, shortDesc(com.Desc))\n\tmsg := &mail.Message{\n\t\tSender: mailFrom,\n\t\tTo: []string{failMailTo},\n\t\tReplyTo: failMailTo,\n\t\tSubject: subject,\n\t\tBody: body.String(),\n\t}\n\n\t// send mail\n\tif err := mail.Send(c, msg); err != nil {\n\t\tc.Errorf(\"sending mail: %v\", err)\n\t}\n}", "title": "" }, { "docid": "0456f6f9081412eccfd0bdefda647c01", "score": "0.5518516", "text": "func Send(errmsg interface{}, errStr string) error {\n\tif ok, err := validateCanSend(); !ok && err != nil {\n\t\treturn err\n\t}\n\tparams := slack.PostMessageParameters{}\n\n\tchanID, _, err := SlackToken.PostMessage(LogChannel,\n\t\tfmt.Sprintf(\"```error %v\\n ====\\n %v ```\", errmsg, errStr),\n\t\tparams)\n\tif err != nil {\n\t\terrMsg := fmt.Errorf(\"error sending to slack %v\", err)\n\t\tfmt.Println(errMsg)\n\t\treturn errMsg\n\t}\n\n\tfmt.Printf(\"Message Sent to channel %v\", chanID)\n\treturn nil\n}", "title": "" }, { "docid": "c0efc61301c796ee8f4f2e7d728c325d", "score": "0.55174357", "text": "func (mp MailingProvider) SendEmail(m mailspree.Message) error {\n\tfrom := mail.NewEmail(m.From.Name, m.From.Address)\n\tcontent := mail.NewContent(\"text/plain\", m.Body)\n\tp := mail.NewPersonalization()\n\tfor _, e := range m.To {\n\t\tp.AddTos(mail.NewEmail(e.Name, e.Address))\n\t}\n\n\tsgm := mail.NewV3Mail()\n\tsgm.SetFrom(from)\n\tsgm.AddPersonalizations(p)\n\tsgm.Subject = m.Subject\n\tsgm.AddContent(content)\n\n\treq := sendgrid.GetRequest(mp.APIKey, \"/v3/mail/send\", \"https://api.sendgrid.com\")\n\treq.Method = \"POST\"\n\treq.Body = mail.GetRequestBody(sgm)\n\t_, err := sendgrid.API(req)\n\tif err != nil {\n\t\tmsg := \"Sendgrid mailing provider failed\"\n\t\tlog.Printf(msg)\n\t\treturn errors.New(msg)\n\t}\n\treturn nil\n}", "title": "" } ]
68c8063f6ddb4e2e73e261e178a3c68d
get machine singlecore Frequency, in Khz
[ { "docid": "8a205a0c6ac28ffda5d9ab7173dedba8", "score": "0.65440893", "text": "func (kc *KubeletClient) GetMachineCpuFrequency(host string) (uint64, error) {\n\tminfo, err := kc.GetMachineInfo(host)\n\tif err != nil {\n\t\tglog.Errorf(\"failed to get machine[%s] cpu.frequency: %v\", host, err)\n\t\treturn 0, err\n\t}\n\n\treturn minfo.CpuFrequency, nil\n}", "title": "" } ]
[ { "docid": "ac76707b01347451d4f5733f4dc53d6c", "score": "0.7184542", "text": "func GetCpuFreq() uint64 {\n\tlines, err := pyfile.ReadAllLines(\"/proc/cpuinfo\")\n\tif err != nil {\n\t\treturn 0\n\t}\n\tfor _, line := range lines {\n\t\tarray := strings.Split(line, \":\")\n\t\tif len(array) < 2 {\n\t\t\tcontinue\n\t\t}\n\t\tkey := strings.TrimSpace(array[0])\n\t\tvalue := strings.TrimSpace(array[1])\n\t\tif key == \"cpu MHz\" {\n\t\t\tif t, err := strconv.ParseFloat(strings.Replace(value, \"MHz\", \"\", 1), 64); err == nil {\n\t\t\t\treturn uint64(t * 1000.0 * 1000.0)\n\t\t\t}\n\t\t}\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "851e9afdcf285e8efb08e7ff2fd00fae", "score": "0.69149446", "text": "func CPUFrequency() uint32 {\n\treturn 16000000\n}", "title": "" }, { "docid": "608373a0d6d72db3349fee679e82ef3a", "score": "0.6439365", "text": "func Freq() float32 {\n\treturn global.Freq()\n}", "title": "" }, { "docid": "35c01d5564cec89b0b8a8fc43e3d667e", "score": "0.61131644", "text": "func (m *Mixer) Frequency() uint {\n\treturn uint(C.al_get_mixer_frequency((*C.ALLEGRO_MIXER)(m)))\n}", "title": "" }, { "docid": "57a27f050fc5fb728e87207da09e7b8d", "score": "0.609677", "text": "func getCNTFRQ() TSCValue", "title": "" }, { "docid": "dad145f609c71e955700be1967c6786c", "score": "0.6071685", "text": "func (r AKC695X) GetFreq() (kHz uint32) {\n\treturn r.channelToFreq(r.getChannel())\n}", "title": "" }, { "docid": "e04bfaf021295d2e8be16210a07b201a", "score": "0.5992223", "text": "func (p *ProbeManager) SystemKernelHz() (int, error) {\n\tconfig := p.features.SystemConfig\n\tif config.ConfigKernelHz == \"\" {\n\t\treturn p.probeSystemKernelHz()\n\t}\n\thz, err := strconv.Atoi(string(config.ConfigKernelHz))\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tif hz > 0 && hz < 100000 {\n\t\treturn hz, nil\n\t}\n\treturn 0, fmt.Errorf(\"Invalid CONFIG_HZ value\")\n}", "title": "" }, { "docid": "082ac67a7108b3e4d0e05460eb711c47", "score": "0.5978385", "text": "func (o *V0037JobProperties) GetCpuFrequency() string {\n\tif o == nil || o.CpuFrequency == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.CpuFrequency\n}", "title": "" }, { "docid": "71882fca53f391c59cb2ee8b4630e4f2", "score": "0.59756553", "text": "func (r *Radio) Frequency() uint32 {\n\treturn r.freq\n}", "title": "" }, { "docid": "cd4eee1de9ec3ff6ae8c414f4ea62e45", "score": "0.58526194", "text": "func tickspersecond() int64", "title": "" }, { "docid": "89205094d7ae4485698eee90daf1fae6", "score": "0.5839987", "text": "func scaledTSC(rawFreq uintptr) int64 {\n\tscale := int64(1 << bitsForScaling)\n\tratio := big.NewInt(scale / int64(rawFreq))\n\tratio.Mul(ratio, big.NewInt(int64(ktime.Rdtsc())))\n\tratio.Div(ratio, big.NewInt(scale))\n\treturn ratio.Int64()\n}", "title": "" }, { "docid": "161b77b23082fbb235722cc4bdd5cbfe", "score": "0.5781726", "text": "func frequencyFromSemitone(semitone int) float32 {\n\t// A4 is 440 Hz, 12 semitones per octave\n\treturn float32(440 * math.Pow(2, float64(semitone-69)/12))\n}", "title": "" }, { "docid": "440e25a64aff7cf477c0fade1991444d", "score": "0.5759798", "text": "func (c *Config) GetFrequency() time.Duration {\n\tif c.FrequencyInMS == 0 {\n\t\treturn time.Second\n\t}\n\n\treturn time.Duration(c.FrequencyInMS) * time.Millisecond\n}", "title": "" }, { "docid": "ee81b736fa5c3b9b0f3cd32b9011bfc7", "score": "0.5698909", "text": "func GetCpuCount() float64 {\n return float64(procStatCpuCount)\n}", "title": "" }, { "docid": "07f90b3b9e7cb39c75dfb9d36c0696d1", "score": "0.5695033", "text": "func (m *TermsExpiration) GetFrequency()(*i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ISODuration) {\n return m.frequency\n}", "title": "" }, { "docid": "4e2726df709d775c94833338e1014cc7", "score": "0.5664504", "text": "func CPUTicks() int64", "title": "" }, { "docid": "47db75e1d5a5d2db5dd27832ec5a199d", "score": "0.5576593", "text": "func CpuProc() {\n\tticker := time.NewTicker(time.Millisecond * 250)\n\tdefer func() {\n\t\tticker.Stop()\n\t\tif err := recover(); err != nil {\n\t\t\tfmt.Println(\"cpuProc fail, e:\", err)\n\t\t\tgo CpuProc()\n\t\t}\n\t}()\n\n\t// EMA algorithm: https://blog.csdn.net/m0_38106113/article/details/81542863\n\tfor range ticker.C {\n\t\tstat := &internal.Stat{}\n\t\tinternal.LoadStat(stat)\n\t\tpreCpu := atomic.LoadInt64(&cpu)\n\n\t\t// cpu = cpuᵗ⁻¹ * decay + cpuᵗ * (1 - decay)\n\t\tcurCpu := int64(float64(preCpu)*decay + float64(stat.Usage)*(1.0-decay))\n\n\t\tatomic.StoreInt64(&cpu, curCpu)\n\t\tfmt.Printf(\"old-self-cpu: %v, now-self-cpu:%v \\n\", preCpu, curCpu)\n\t}\n\n}", "title": "" }, { "docid": "dc0e7381810784518e4f5adc28e0b1e7", "score": "0.5555766", "text": "func (l *Load) CPU() float32 {\n\tx := atomic.LoadUint32(&l.currentCPULoad)\n\n\tx1 := math.Float32frombits(x)\n\treturn x1\n}", "title": "" }, { "docid": "2b53b0a14987ad41f560d68136a17503", "score": "0.55533254", "text": "func (o KubernetesClusterMaintenanceWindowNodeOsOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v KubernetesClusterMaintenanceWindowNodeOs) string { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "cbd25fc470184b9121b79c5e82a063c4", "score": "0.5549738", "text": "func (d *device) mpsseClock(f physic.Frequency) (physic.Frequency, error) {\n\t// TODO(maruel): Memory clock and skip if the same value.\n\tclk := clock30MHz\n\tbase := 30 * physic.MegaHertz\n\tdiv := base / f\n\tif div >= 65536 {\n\t\tclk = clock6MHz\n\t\tbase /= 5\n\t\tdiv = base / f\n\t\tif div >= 65536 {\n\t\t\treturn 0, errors.New(\"d2xx: clock frequency is too low\")\n\t\t}\n\t}\n\tb := [...]byte{clk, clockSetDivisor, byte(div - 1), byte((div - 1) >> 8)}\n\treturn base / div, d.writeAll(b[:])\n}", "title": "" }, { "docid": "4608eb2e63761bd8c15d29f4e1fbf10f", "score": "0.55354464", "text": "func CPUUsage() {\r\n usage, err := cpu.Percent(0, perCPU)\r\n for i, value := range usage {\r\n fmt.Printf(\"CPU%d: %f \", i, value)\r\n }\r\n check(err)\r\n}", "title": "" }, { "docid": "67914744c3aa639a6c2c23158cbec40e", "score": "0.5531925", "text": "func CPU(index int32) Device {\n return Device{KDLCPU, index}\n}", "title": "" }, { "docid": "c5dc6c273fd991dadddcbd828bbdc18a", "score": "0.5517504", "text": "func cpuFX018() {\n\tx := getx()\n\tsoundTimer = _V[x]\n\tpc += 2\n}", "title": "" }, { "docid": "b08fab250f0b2f0bc741651404afe20f", "score": "0.54977286", "text": "func cpuC() {\n\tx, kk := xkk()\n\n\trandomByte := uint8(rand.Intn(255))\n\n\t_V[x] = kk & randomByte\n\tpc += 2\n}", "title": "" }, { "docid": "a796726731f2af42f5fcedcacbc321bb", "score": "0.5491449", "text": "func TicksPerSecond() int64 {\n\treturn tickspersecond()\n}", "title": "" }, { "docid": "dc8c8cbd7b80ec7ae2cb886801dd318a", "score": "0.5469126", "text": "func (l DNA8List) BaseFreq() (b [4]float64) {\n\tvar n [7]int\n\tfor _, s := range l {\n\t\tfor _, b := range s {\n\t\t\tn[b&6]++\n\t\t}\n\t}\n\tc := 1 / float64(n[0]+n[2]+n[4]+n[6])\n\tfor i := range b {\n\t\tb[i] = float64(n[i*2]) * c\n\t}\n\treturn\n}", "title": "" }, { "docid": "a75aa28970a5c1c4ebaea2bbca76eb2d", "score": "0.54459697", "text": "func (this *Device) GetClockFrequencyHertz() (map[string]uint64, error) {\n\t// retrieve values as text\n\tcommand := strings.Split(GENCMD_MEASURE_CLOCK, \" \")\n\tclocks := make(map[string]uint64, len(command))\n\tfor _, name := range command[1:] {\n\n\t\t// Retrieve clock value\n\t\tvalue, err := this.GeneralCommand(command[0] + \" \" + name)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Find value within text\n\t\tmatch := REGEXP_CLOCK.FindStringSubmatch(value)\n\t\tif len(match) != 3 {\n\t\t\treturn nil, this.log.Error(\"Bad Response from %v\", command[0])\n\t\t}\n\n\t\t// Convert to uint64\n\t\tvalue2, err := strconv.ParseUint(match[2], 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Set value\n\t\tclocks[name] = value2\n\t}\n\n\treturn clocks, nil\n}", "title": "" }, { "docid": "00c3d47a2e096c0c6b73c0b3d93b0562", "score": "0.544214", "text": "func (db *AppDB) MachineSetFreq(begin time.Time, end time.Time) ([]MacSetFreq, error) {\n\tq := query.NewQuery().\n\t\tSelect(\"results\", \"bmac\", \"bset\", \"COUNT(bmac) as bcount\").\n\t\tWhere(\"date BETWEEN ? AND ?\", begin.Format(fmtSqlite), end.Format(fmtSqlite)).\n\t\tGroup(\"bmac, bset\").\n\t\tOrder(\"bcount\")\n\n\tstmt, err := db.Prepare(q.SQL.String())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trows, err := stmt.Query(q.Args...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar res []MacSetFreq\n\tfor rows.Next() {\n\t\tvar r MacSetFreq\n\t\trows.Scan(&r.Machine, &r.Set, &r.Freq)\n\t\tres = append(res, r)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "2713a516e38561c6ebe00561c11c6286", "score": "0.5419453", "text": "func cpuUsage() (int64, error) {\n\tcmd := exec.Command(\"ps\", \"aux\")\n\tvar out bytes.Buffer\n\tcmd.Stdout = &out\n\terr := cmd.Run()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tcurrentPID := os.Getpid()\n\tfor {\n\t\tline, err := out.ReadString('\\n')\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ttokens := strings.Split(line, \" \")\n\t\tvar ft []string\n\t\tfor _, t := range tokens {\n\t\t\tif t != \"\" && t != \"\\t\" {\n\t\t\t\tft = append(ft, t)\n\t\t\t}\n\t\t}\n\t\tpid, err := strconv.Atoi(ft[1])\n\t\tif err != nil {\n\t\t\tcontinue\n\t\t}\n\t\tif pid != currentPID {\n\t\t\tcontinue\n\t\t}\n\t\tcpu, err := strconv.ParseFloat(ft[2], 64)\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\treturn int64(cpu), nil\n\t}\n\treturn 0, errors.New(\"no cpu info found\")\n}", "title": "" }, { "docid": "2d6bcf443a5a12ba5745aadd6a117407", "score": "0.5398602", "text": "func (o *CloudInstanceTypeAllOf) GetCpuSpeed() int64 {\n\tif o == nil || o.CpuSpeed == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.CpuSpeed\n}", "title": "" }, { "docid": "b309e33a2f0fd819ac3aef854eaf7e8d", "score": "0.53960055", "text": "func (c *Context) GetTimerFrequency() uint64 {\n\treturn uint64(C.glfwGetTimerFrequency())\n}", "title": "" }, { "docid": "b309e33a2f0fd819ac3aef854eaf7e8d", "score": "0.53960055", "text": "func (c *Context) GetTimerFrequency() uint64 {\n\treturn uint64(C.glfwGetTimerFrequency())\n}", "title": "" }, { "docid": "c279b9c5d4a1dafa9d32ba713964a8f1", "score": "0.5364165", "text": "func (r AKC695X) GetFreqString() (freq string) {\n\tif f := r.GetFreq(); f < 30000 {\n\t\tfreq = strconv.FormatUint(uint64(r.GetFreq()), 10) + `kHz`\n\t} else {\n\t\tfreq = strconv.FormatFloat(float64(r.GetFreq())/1000, 'f', 1, 32) + `MHz`\n\t}\n\treturn\n}", "title": "" }, { "docid": "9d27002af53d316bf1d45176dfaf691f", "score": "0.535904", "text": "func GetSystemCpuUsage() (uint64, error) {\n\tvar (\n\t\tline string\n\t\tf *os.File\n\t\tusage uint64 = 0\n\t\terr error\n\t)\n\tif f, err = os.Open(\"/proc/stat\"); err != nil {\n\t\treturn 0, err\n\t}\n\tbufReader := bufio.NewReaderSize(nil, 128)\n\tdefer func() {\n\t\tbufReader.Reset(nil)\n\t\tf.Close()\n\t}()\n\tbufReader.Reset(f)\n\tfor err == nil {\n\t\tif line, err = bufReader.ReadString('\\n'); err != nil {\n\t\t\terr = errors.WithStack(err)\n\t\t\treturn 0, err\n\t\t}\n\t\tarray := strings.Fields(line)\n\t\tswitch array[0] {\n\t\tcase \"cpu\": //只统计cpu那行的数据\n\t\t\tif len(array) < 8 {\n\t\t\t\terr = errors.WithStack(fmt.Errorf(\"bad format of cpu stats\"))\n\t\t\t\treturn 0, err\n\t\t\t}\n\t\t\tvar totalClockTicks uint64\n\t\t\tfor _, i := range array[1:8] {\n\t\t\t\tvar v uint64\n\t\t\t\tif v, err = strconv.ParseUint(i, 10, 64); err != nil {\n\t\t\t\t\terr = errors.WithStack(fmt.Errorf(\"error parsing cpu stats\"))\n\t\t\t\t\treturn 0, err\n\t\t\t\t}\n\t\t\t\ttotalClockTicks += v\n\t\t\t}\n\t\t\tusage = (totalClockTicks * nanoSecondsPerSecond) / clockTicksPerSecond\n\t\t\treturn usage, nil\n\t\t}\n\t}\n\terr = errors.Errorf(\"bad stats format\")\n\treturn 0, err\n}", "title": "" }, { "docid": "cf99c1be1f8f4afef93253726a2f19ba", "score": "0.53585625", "text": "func cpuFX01E() {\n\tx := getx()\n\t_I = _I + uint16(_V[x])\n\tpc += 2\n}", "title": "" }, { "docid": "5177abd1e5267ce275abdc0db5b54103", "score": "0.53510004", "text": "func (p *Periph) LoadFREQUENCY() Freq {\n\treturn Freq(p.frequency.Load())\n}", "title": "" }, { "docid": "9852f76c18d0b8d334bdd98df39aa4c7", "score": "0.53493637", "text": "func GetSystemCPUUsage() (uint64, error) {\n\tvar line string\n\tf, err := os.Open(\"/proc/stat\")\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tbufReader := bufio.NewReaderSize(nil, 128)\n\tdefer func() {\n\t\tbufReader.Reset(nil)\n\t\tf.Close()\n\t}()\n\tbufReader.Reset(f)\n\terr = nil\n\tfor err == nil {\n\t\tline, err = bufReader.ReadString('\\n')\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\tparts := strings.Fields(line)\n\t\tswitch parts[0] {\n\t\tcase \"cpu\":\n\t\t\tif len(parts) < 8 {\n\t\t\t\treturn 0, fmt.Errorf(\"bad format of cpu stats\")\n\t\t\t}\n\t\t\tvar totalClockTicks uint64\n\t\t\tfor _, i := range parts[1:8] {\n\t\t\t\tv, err := strconv.ParseUint(i, 10, 64)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn 0, fmt.Errorf(\"error parsing cpu stats\")\n\t\t\t\t}\n\t\t\t\ttotalClockTicks += v\n\t\t\t}\n\t\t\treturn (totalClockTicks * nanoSecondsPerSecond) /\n\t\t\t\tclockTicksPerSecond, nil\n\t\t}\n\t}\n\treturn 0, fmt.Errorf(\"bad stats format\")\n}", "title": "" }, { "docid": "beb320a85a21ba12b196d1252d0abe26", "score": "0.53461355", "text": "func getCPUUtilization() (*define.CPUUsage, error) {\n\tbuf, err := unix.SysctlRaw(\"kern.cp_time\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"reading sysctl kern.cp_time: %w\", err)\n\t}\n\n\tvar total uint64 = 0\n\tvar times [unix.CPUSTATES]uint64\n\n\tfor i := 0; i < unix.CPUSTATES; i++ {\n\t\tval := *(*uint64)(unsafe.Pointer(&buf[8*i]))\n\t\ttimes[i] = val\n\t\ttotal += val\n\t}\n\treturn &define.CPUUsage{\n\t\tUserPercent: timeToPercent(times[unix.CP_USER], total),\n\t\tSystemPercent: timeToPercent(times[unix.CP_SYS], total),\n\t\tIdlePercent: timeToPercent(times[unix.CP_IDLE], total),\n\t}, nil\n}", "title": "" }, { "docid": "4a6a56ad457cb4718f9f1e5b0efd8873", "score": "0.530899", "text": "func (data *Data) GetSembeiPerSecond() float64 {\n\tret := 0.0\n\tfor _, tmp := range data.facilities {\n\t\tret += tmp.GetProductionEfficiency()\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "3a4fd88e98d31ee0e5c3a4707ce60315", "score": "0.5281168", "text": "func cpuFX015() {\n\tx := getx()\n\tdelayTimer = _V[x]\n\tpc += 2\n}", "title": "" }, { "docid": "0dcd69a00b00cda2cca0aed7050aedd5", "score": "0.5280978", "text": "func (o AnomalySubscriptionOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *AnomalySubscription) pulumi.StringOutput { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "624bb115d9d0b2c7517d98190347e5de", "score": "0.5263171", "text": "func getEntropy() ([]byte, error) {\n\td, err := time.ParseDuration(\"1s\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tinfo, err := cpu.Percent(d, false)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar infoTotal int\n\tfor i := range info {\n\t\tusage := info[i]\n\t\tvar intVal int\n\t\tintVal = int(usage)\n\t\tinfoTotal = infoTotal + intVal\n\t}\n\thash := sha256.New()\n\tinfoString := strconv.Itoa(infoTotal)\n\trandInt := getRandomInt(0, 99999999)\n\tintString := strconv.Itoa(randInt)\n\trandString := intString + infoString\n\thash.Write([]byte(randString))\n\tentropyValue := hash.Sum(nil)\n\treturn entropyValue, nil\n}", "title": "" }, { "docid": "57fe917a5d5477b36eda05d7dbced991", "score": "0.52479935", "text": "func (m *CloudPcRestorePointSetting) GetFrequencyInHours()(*int32) {\n val, err := m.GetBackingStore().Get(\"frequencyInHours\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*int32)\n }\n return nil\n}", "title": "" }, { "docid": "bd62fb5b3e5ea05421867df33581898e", "score": "0.5239618", "text": "func (p *Periph) StoreFREQUENCY(f Freq) {\n\tp.frequency.Store(uint32(f))\n}", "title": "" }, { "docid": "df2aea793681f9b5cd2c6e01eb35ffca", "score": "0.52322507", "text": "func (r *TTNRandom) Freq() float32 {\n\treturn freqs[r.Interface.Intn(len(freqs))]\n}", "title": "" }, { "docid": "1a58c194978e30aa5e8d15946a14bf65", "score": "0.52278596", "text": "func (s *Stats) GetCPUTimes() {\n\n if s.CPUInfo == nil {\n s.CPUInfo = new(CPUInfo)\n }\n\n s.CPUInfo.PrevCPUTimes = s.CPUInfo.PerCPUTimes\n s.CPUInfo.PerCPUTimes, _ = cpu.Times(true)\n\n if len(s.CPUInfo.PrevCPUTimes) == 0 {\n s.CPUInfo.PrevCPUTimes = s.CPUInfo.PerCPUTimes\n }\n}", "title": "" }, { "docid": "94b8d54a9b23cd3509a669a9fcb8f0b5", "score": "0.5222609", "text": "func (o BeanstalkScheduledTaskOutput) Frequency() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BeanstalkScheduledTask) *string { return v.Frequency }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5139ae1215471929d8c40e5a761ba9de", "score": "0.5218579", "text": "func getAvgCpuUsage(period int64) (cpuUsage float64, err error) {\n\tprevTicks, err := getCPUTicks()\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// sleep for a while\n\ttime.Sleep(time.Duration(period) * time.Millisecond)\n\n\tticks, err := getCPUTicks()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor i := 0; i < 8; i++ {\n\t\tticks[i] = ticks[i] - prevTicks[i]\n\t}\n\n\tvar total uint64\n\tfor i := 0; i < 8; i++ {\n\t\ttotal += ticks[i]\n\t}\n\n\tidle := ticks[3] + ticks[4]\n\tcpuUsage = 1.0 - float64(idle)/float64(total)\n\treturn\n}", "title": "" }, { "docid": "525cc42bb6e574231ec000a24547b4c2", "score": "0.52166086", "text": "func CPUUsage() (idle float64, e error) {\n\tvar ps []float64\n\tps, e = cpu.Percent(0, false)\n\tif e != nil {\n\t\treturn\n\t}\n\treturn ps[0], e\n}", "title": "" }, { "docid": "c86e218315d2766b1767d89ca459f3d0", "score": "0.5216137", "text": "func (o KubernetesClusterMaintenanceWindowNodeOsPtrOutput) Frequency() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KubernetesClusterMaintenanceWindowNodeOs) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Frequency\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ebfa769326eac7f9f0bf2f953990773d", "score": "0.52086383", "text": "func (r *RAM) FreqTuningWord() uint32 {\n\treturn binary.BigEndian.Uint32(r[0:4])\n}", "title": "" }, { "docid": "c5d9abf5ffa47cad55b3818085fa4b2b", "score": "0.5208579", "text": "func GetCPUUsage()int{\n\t// Loop not run, launch it\n\tif cpuStatsRun == false {\n\t\tcpuStatsRun = true\n\t\tgo runCPUUsageStats()\n\t}\n\treturn currentUsage\n}", "title": "" }, { "docid": "8bd6c591b9f67cf4c9549293f59065db", "score": "0.52052766", "text": "func (this *Device) GetCoreTemperatureCelcius() (float64, error) {\n\t// retrieve value as text\n\tvalue, err := this.GeneralCommand(GENCMD_MEASURE_TEMP)\n\tif err != nil {\n\t\treturn 0.0, err\n\t}\n\n\t// Find value within text\n\tmatch := REGEXP_TEMP.FindStringSubmatch(value)\n\tif len(match) != 2 {\n\t\treturn 0.0, this.log.Error(\"Bad Response from %v\", GENCMD_MEASURE_TEMP)\n\t}\n\n\t// Convert to float64\n\tvalue2, err := strconv.ParseFloat(match[1], 64)\n\tif err != nil {\n\t\treturn 0.0, err\n\t}\n\n\t// Return value as float64\n\treturn value2, nil\n}", "title": "" }, { "docid": "74d63c6122b351d2a3a990ecd9722226", "score": "0.51980335", "text": "func hwinfo() string {\n\tb1, err := exec.Command(\"vcgencmd\", \"measure_clock\", \"arm\").Output()\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tb2, err := exec.Command(\"vcgencmd\", \"measure_clock\", \"core\").Output()\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\tif len(b1) < 17 || len(b2) < 17 {\n\t\treturn \"bad len\"\n\t}\n\treturn fmt.Sprintf(\"arm=%sMhz core=%sMHz\", b1[14:17], b2[13:16])\n}", "title": "" }, { "docid": "2a33d551850a2773bd449789ce1d5260", "score": "0.5178436", "text": "func (hwFlavor) Speed() int {\n\treturn spiSpeed\n}", "title": "" }, { "docid": "de510bade369bee4e7929d100873e8d4", "score": "0.5170266", "text": "func (o KubernetesClusterMaintenanceWindowAutoUpgradeOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v KubernetesClusterMaintenanceWindowAutoUpgrade) string { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "27bb1688ad96e5dead91c35b84a4f8f3", "score": "0.5166177", "text": "func cpuTemperature() string {\n\tb, err := exec.Command(\"vcgencmd\", \"measure_temp\").Output()\n\tif err != nil {\n\t\tlog.Println(err)\n\t}\n\treturn string(b)\n}", "title": "" }, { "docid": "4b321fc19795658e5f608a0e9d1e4b61", "score": "0.5155254", "text": "func (h *handle) MPSSEClock(f physic.Frequency) (physic.Frequency, error) {\n\t// TODO(maruel): Memory clock and skip if the same value.\n\tclk := clock30MHz\n\tbase := 30 * physic.MegaHertz\n\tdiv := base / f\n\tif div >= 65536 {\n\t\tclk = clock6MHz\n\t\tbase /= 5\n\t\tdiv = base / f\n\t\tif div >= 65536 {\n\t\t\treturn 0, errors.New(\"ftdi: clock frequency is too low\")\n\t\t}\n\t}\n\tb := [...]byte{clk, clockSetDivisor, byte(div - 1), byte((div - 1) >> 8)}\n\t_, err := h.Write(b[:])\n\treturn base / div, err\n}", "title": "" }, { "docid": "84c065cefcefc1d82df4ec2334b04be8", "score": "0.5153615", "text": "func (hw *I2C) getRootClock() uint32 {\n\tvar freq uint32\n\n\tif reg.Get(CCM_CSCMR1, CSCMR1_PERCLK_SEL, 1) == 1 {\n\t\tfreq = OSC_FREQ\n\t} else {\n\t\t// IPG_CLK_ROOT derived from AHB_CLK_ROOT which is 132 MHz\n\t\tipg_podf := reg.Get(CCM_CBCDR, CBCDR_IPG_PODF, 0b11)\n\t\tfreq = 132000000 / (ipg_podf + 1)\n\t}\n\n\tpodf := reg.Get(CCM_CSCMR1, CSCMR1_PERCLK_PODF, 0x3f)\n\n\treturn freq / (podf + 1)\n}", "title": "" }, { "docid": "79b433237b72fbb4f959a5325b56f9ee", "score": "0.5144331", "text": "func GetRWBytesPerSecond(partition string) (uint64, uint64) {\n // IOCountersStat\n first_ret, err := disk.IOCounters(partition)\n dealwithErr(err)\n\n var firstReadBytes, firstWriteBytes uint64\n for _, io := range first_ret {\n firstReadBytes = io.ReadBytes\n firstWriteBytes = io.WriteBytes\n } // end of for\n\ttime.Sleep(time.Second)\t\n\n // IOCountersStat\n second_ret, err := disk.IOCounters(partition)\n dealwithErr(err)\n\n var secondReadBytes, secondWriteBytes uint64\n for _, io := range second_ret {\n secondReadBytes = io.ReadBytes\n secondWriteBytes = io.WriteBytes\n } // end of for\n time.Sleep(time.Second)\n\n return secondReadBytes-firstReadBytes, secondWriteBytes-firstWriteBytes\n }", "title": "" }, { "docid": "2da28dfb36657a8697a839e569a57ccf", "score": "0.5141786", "text": "func cpuEXA1() {\n\tif key[_V[getx()]] == 0 {\n\t\tpc += 4\n\t} else {\n\t\tpc += 2\n\t}\n}", "title": "" }, { "docid": "b9e8cdb8df74cef59cf6288ebc77548c", "score": "0.51385254", "text": "func (o *HostMetrics) GetCpu() float64 {\n\tif o == nil || o.Cpu == nil {\n\t\tvar ret float64\n\t\treturn ret\n\t}\n\treturn *o.Cpu\n}", "title": "" }, { "docid": "9ce8e5c8623b93cbbfcac6432ed8d3dd", "score": "0.51289153", "text": "func (o AnomalySubscriptionOutput) Frequency() AnomalySubscriptionFrequencyOutput {\n\treturn o.ApplyT(func(v *AnomalySubscription) AnomalySubscriptionFrequencyOutput { return v.Frequency }).(AnomalySubscriptionFrequencyOutput)\n}", "title": "" }, { "docid": "7f73e623ae77d7c736352aa5bdab54cc", "score": "0.5124552", "text": "func cpuperf() (int64, error) {\n\tvar diff time.Duration = 0\n\tvar i int64 = 0\n\tstart := time.Now()\n\n\tfor {\n\t\tif _, err := scrypt.Key(nil, nil, 128, 1, 1, 0); err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\ti += 512\n\t\tdiff = time.Since(start)\n\t\tif diff > 10*time.Millisecond {\n\t\t\tbreak\n\t\t}\n\t}\n\n\treturn i * int64(time.Second) / int64(diff), nil\n}", "title": "" }, { "docid": "00f3bd9d92e856eec8e21e078076bd30", "score": "0.51121736", "text": "func (o ElastigroupScheduledTaskOutput) Frequency() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ElastigroupScheduledTask) *string { return v.Frequency }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5f3818e67a27df8ab74110497c44195c", "score": "0.51102155", "text": "func (o *PerCPU) Kernel() float64 {\n\ts := o.System.ComputeRate()\n\tt := o.Total.ComputeRate()\n\tif s != math.NaN() && t != math.NaN() && t > 0 {\n\t\treturn (s / t)\n\t}\n\treturn math.NaN()\n}", "title": "" }, { "docid": "31b8a5ae998af3270dde08709d38fa23", "score": "0.5108777", "text": "func (k *K8sEventResolver) FirstTimeMs() float64 {\n\treturn float64(k.firstTimeNS) / 1e6\n}", "title": "" }, { "docid": "29c30169485f827d72489f4b15b347a4", "score": "0.51078165", "text": "func (o *SyntheticMonitorUpdate) GetFrequencyMin() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.FrequencyMin\n}", "title": "" }, { "docid": "99d1aa8ef69751146abe125e2fd4561a", "score": "0.5107571", "text": "func toFreq(s semi, tonic freq) freq {\n\treturn tonic * freq(math.Pow(root12, float64(s)))\n}", "title": "" }, { "docid": "99cd241bfadeb0798c45d94dc0f51c47", "score": "0.50926447", "text": "func (p *Posting) Frequency() uint64 {\n\treturn p.freq\n}", "title": "" }, { "docid": "f69b7dd82a55bc3c7d8089ee982ee3de", "score": "0.50841606", "text": "func (_OracleMgr *OracleMgrSession) SyncFrequency() (*big.Int, error) {\n\treturn _OracleMgr.Contract.SyncFrequency(&_OracleMgr.CallOpts)\n}", "title": "" }, { "docid": "299037e593d71a5a5422c1dbc06bb722", "score": "0.50658476", "text": "func (o InventoryScheduleOutput) Frequency() pulumi.StringOutput {\n\treturn o.ApplyT(func(v InventorySchedule) string { return v.Frequency }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "208303d4bece1c82539d780cddf1fde3", "score": "0.50653917", "text": "func (o KubernetesClusterMaintenanceWindowAutoUpgradePtrOutput) Frequency() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *KubernetesClusterMaintenanceWindowAutoUpgrade) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Frequency\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4e035f6ad738c4a09e1d66a4ac638247", "score": "0.5063501", "text": "func (o ScheduledAuditOutput) Frequency() ScheduledAuditFrequencyOutput {\n\treturn o.ApplyT(func(v *ScheduledAudit) ScheduledAuditFrequencyOutput { return v.Frequency }).(ScheduledAuditFrequencyOutput)\n}", "title": "" }, { "docid": "34961ca2df79781078386ce974490969", "score": "0.5057103", "text": "func cpuFX033() {\n\tvalue := _V[getx()]\n\tones := value % 10\n\tvalue = value / 10\n\ttens := value % 10\n\thundreds := value / 10\n\tmemory[_I] = hundreds\n\tmemory[_I+1] = tens\n\tmemory[_I+2] = ones\n\tpc += 2\n}", "title": "" }, { "docid": "96bd1f942130dc26101d4353bdf60f68", "score": "0.5053599", "text": "func (br *BandwidthMeter) Bandwidth() (bytesPerSec float64) {\n deltaSecs := br.lastRead.Sub(br.start).Seconds()\n bytesPerSec = float64(br.bytesRead) / deltaSecs\n return\n}", "title": "" }, { "docid": "fb57828f6fbd6900b74adc72ce5f79ea", "score": "0.5042627", "text": "func (h *PCPHistogram) High() int64 { return h.h.LowestTrackableValue() }", "title": "" }, { "docid": "c79c79e399a0cc7f22bd5db0337255a6", "score": "0.5038453", "text": "func CPUUsage() CPUUsageStruct {\n\tc1, _ := exec.Command(\"sar\", \"1\", \"1\").Output()\n\n\tsarOutput := string(c1)\n\tsarLines := strings.Split(sarOutput, \"\\n\")\n\theader := []string{}\n\tvalues := []float64{}\n\n\tresult := make(map[string]float64)\n\n\t// Get the header\n\tfor _, line := range sarLines {\n\t\t// Replace the regex with something faster\n\t\tmatches := headerRE.FindAllStringSubmatch(line, -1)\n\n\t\tfor _, m := range matches {\n\t\t\tif len(m) == 2 {\n\t\t\t\tresult := strings.Replace(m[0], \"%\", \"\", -1) // replace % in idle (%idle)\n\t\t\t\tresult = strings.Trim(result, \" \") // remove white space\n\t\t\t\theader = append(header, result)\n\t\t\t}\n\t\t}\n\t}\n\n\t// Get values\n\tfor _, line := range sarLines {\n\t\tif strings.Contains(line, \"Average\") {\n\t\t\tmatches := valueRE.FindAllStringSubmatch(line, -1)\n\t\t\tfor _, m := range matches {\n\t\t\t\tif len(m) == 1 {\n\t\t\t\t\tvalueFloat, _ := strconv.ParseFloat(m[0], 64)\n\t\t\t\t\tvalueDecimal, _ := util.FloatDecimalPoint(valueFloat, 2)\n\t\t\t\t\tvalues = append(values, valueDecimal)\n\t\t\t\t}\n\n\t\t\t}\n\t\t}\n\n\t}\n\n\tif len(header) == len(values) {\n\t\tfor i := range header {\n\t\t\tresult[header[i]] = values[i]\n\t\t}\n\n\t}\n\n\tc := CPUUsageStruct{\n\t\tUser: result[\"user\"],\n\t\tIdle: result[\"idle\"],\n\t\tNice: result[\"nice\"],\n\t\tSteal: result[\"steal\"],\n\t\tSystem: result[\"system\"],\n\t\tIOWait: result[\"iowait\"],\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "23070f4b280fd59276fef80ddba93a80", "score": "0.50080603", "text": "func (p *Proc) CPU() (float64, error) {\n\tvar totalCPU float64\n\terr := p.walkProcessTree(p.proc, func(p *process.Process) error {\n\t\tcpu, err := p.Percent(0)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\ttotalCPU += cpu\n\t\treturn nil\n\t})\n\n\treturn totalCPU, err\n}", "title": "" }, { "docid": "55873f77af655f4518a44b1459274f71", "score": "0.5003743", "text": "func (c *Context) GetCenterFreq() (freq int) {\n\treturn int(C.rtlsdr_get_center_freq((*C.rtlsdr_dev_t)(c.dev)))\n}", "title": "" }, { "docid": "9508d0fa8d6d52e486b09e50347e433f", "score": "0.50006396", "text": "func (cpu *CPU) S_C() int {\r\n\treturn int(cpu.Sr() & 1)\r\n}", "title": "" }, { "docid": "c272de7de5d62aa7f5127b9f7e77ec99", "score": "0.49998832", "text": "func (o *V0037JobProperties) GetGpuFrequency() string {\n\tif o == nil || o.GpuFrequency == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.GpuFrequency\n}", "title": "" }, { "docid": "caeae63eb10ddb5201d3cf02bf96d8f1", "score": "0.49981502", "text": "func (s *Stats) GetTotalCPUTimes() {\n\n if s.CPUInfo == nil {\n s.CPUInfo = new(CPUInfo)\n }\n\n s.CPUInfo.PrevTotalTimes = s.CPUInfo.TotalTimes\n s.CPUInfo.TotalTimes, _ = cpu.Times(false)\n\n if len(s.CPUInfo.PrevTotalTimes) == 0 {\n s.CPUInfo.PrevTotalTimes = s.CPUInfo.TotalTimes\n }\n}", "title": "" }, { "docid": "5a27d68af94f88c48fd9b759da358a4c", "score": "0.49980146", "text": "func currCPUUse() int {\n\trawData, err := ioutil.ReadFile(\"/proc/stat\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdata := string(rawData)\n\tcpuData := strings.Fields(strings.Split(data, \"\\n\")[0]) // CPU is the 1st line\n\tif cpuData[0] != \"cpu\" {\n\t\tlog.Fatal(\"Incorrectly parsed `/proc/stat`\")\n\t}\n\tvar total, idle float64\n\tfor i, v := range cpuData[1:] {\n\t\tval, err := strconv.ParseFloat(v, 64)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\t\ttotal += val\n\t\tif i == 3 { // 4th field is idle\n\t\t\tidle = val\n\t\t}\n\t}\n\treturn int(100 * ((total - idle) / total))\n}", "title": "" }, { "docid": "c50433612a9de6f603d357d5a77b7c17", "score": "0.49971732", "text": "func (o InventorySchedulePtrOutput) Frequency() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *InventorySchedule) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Frequency\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b3b38f9f1653c5886de533fc7f7e313a", "score": "0.4991833", "text": "func (m Meter) NoteToFreq(noteVal notes.Duration) float64 {\n\tduration := m.NoteToTime(noteVal)\n\treturn 1 / float64(duration.Seconds())\n}", "title": "" }, { "docid": "1108fea9efb5f14a9c6b54397eb5507c", "score": "0.49871725", "text": "func (h *HashTable) getLoadFactor() float64 {\n\treturn float64(*h.size) / float64(len(h.table.buckets))\n}", "title": "" }, { "docid": "59cb69d7cd547b8a8a0c33d5884503e6", "score": "0.49857822", "text": "func (_OracleMgr *OracleMgrCaller) SyncFrequency(opts *bind.CallOpts) (*big.Int, error) {\n\tvar (\n\t\tret0 = new(*big.Int)\n\t)\n\tout := ret0\n\terr := _OracleMgr.contract.Call(opts, out, \"syncFrequency\")\n\treturn *ret0, err\n}", "title": "" }, { "docid": "709ae574284a960f5f770a84d778aad3", "score": "0.4984239", "text": "func (s *PerProcessStat) CPUUsage() float64 {\n\to := s.Metrics\n\trateNs := o.UserTime.ComputeRate() + o.SystemTime.ComputeRate()\n\treturn (rateNs / float64(nanoSecond))\n}", "title": "" }, { "docid": "23bad948fc35f6ed7b621da930852aab", "score": "0.4978066", "text": "func TestGetFrequencyFromDataAllZeros(t *testing.T) {\n\tdata := make([]float64, 1000)\n\tfreq := GetFrequencyFromData(data, 48000)\n\tif math.Abs(freq - -1) > 1e-12 {\n\t\tt.Fatalf(\"Result incorrect. expect:-1, got:%f\", freq)\n\t}\n}", "title": "" }, { "docid": "fa2b713fe67a3a2caae06170f8befaa8", "score": "0.49721947", "text": "func GetCpuUsage() ([]float64, error) {\n\n currProcStat := getProcStats()\n usage := make([]float64, len(currProcStat))\n for i := 0; i < len(currProcStat); i++ {\n\n // Get Difference\n dIdle := float64(currProcStat[i].GetIdle() - prevProcStat[i].GetIdle())\n dTotal := float64(currProcStat[i].GetTotal() - prevProcStat[i].GetTotal())\n\n // Get Usage\n usage[i] = (dTotal - dIdle) / dTotal * 100.0\n\n }\n\n // Assign Previous Value\n prevProcStat = currProcStat\n return usage, nil\n}", "title": "" }, { "docid": "ad758207f803638ce1551bc3b701bdb9", "score": "0.49701864", "text": "func ConvertNanosecondsToHz(val float64) float64 {\n\treturn val / 1e7\n}", "title": "" }, { "docid": "a2d88aef55cba86185326243e9a33590", "score": "0.49685678", "text": "func cpuFX007() {\n\tx := getx()\n\t_V[x] = delayTimer\n\tpc += 2\n}", "title": "" }, { "docid": "33b4cdcbd1333461c984a6ae3715ea3c", "score": "0.49631995", "text": "func cpuEX9E() {\n\tif key[_V[getx()]] != 0 {\n\t\tpc += 4\n\t} else {\n\t\tpc += 2\n\t}\n}", "title": "" }, { "docid": "1f335b2505ff6d51f6b4116f8eab28af", "score": "0.49590534", "text": "func getMegabitsPerSecond(data *speedTestData) float64 {\n\treturn getMegabits(data) / getSeconds(data)\n}", "title": "" }, { "docid": "c63df08eb9a0b046aef9a91a55526a09", "score": "0.4954748", "text": "func (m *UserExperienceAnalyticsDeviceStartupHistory) GetCoreBootTimeInMs()(*int32) {\n val, err := m.GetBackingStore().Get(\"coreBootTimeInMs\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*int32)\n }\n return nil\n}", "title": "" }, { "docid": "a2257dfbb2e3e7f258b9203d6ffa56bf", "score": "0.49520463", "text": "func cpuThread(iter int) {\n\trand.Seed(time.Now().Unix())\n\tvar temp uint64\n\n\tstartTime := time.Now()\n\n\tfor j := 1; j <= iter; j++ {\n\t\ttemp = rand.Uint64()\n\t\tUseless = temp\n\t}\n\n\tfmt.Printf(\"Final useless value is : %v\\n\", Useless)\n\tendTime := time.Now().Sub(startTime)\n\tfmt.Printf(\"Total running time for cpuThread : %v\", endTime)\n}", "title": "" }, { "docid": "3705acc809e8095efeac22dfcc10565f", "score": "0.4940212", "text": "func (_OracleMgr *OracleMgrCallerSession) SyncFrequency() (*big.Int, error) {\n\treturn _OracleMgr.Contract.SyncFrequency(&_OracleMgr.CallOpts)\n}", "title": "" }, { "docid": "5feb84cddc92a784b0f652d9d51771ff", "score": "0.4926644", "text": "func toSpeedSysfs(speed float64) Speed {\n\ts := int(speed)\n\tswitch s {\n\tcase 1: // truncated from 1.5, which is low speed\n\t\treturn SpeedLow\n\tcase 12:\n\t\treturn SpeedFull\n\tcase 480:\n\t\treturn SpeedHigh\n\tcase 5000:\n\t\treturn SpeedSuper\n\tcase 10000:\n\t\treturn SpeedSuperPlus\n\t}\n\treturn SpeedUnknown\n}", "title": "" }, { "docid": "33100f2ddfeac94bcfb7ac593a24ec43", "score": "0.49251255", "text": "func GetTimeFrequency(lines []string) (timeFrequence map[string]int) {\n\ttimeFrequence = map[string]int{\n\t\t\"Morning\": 0,\n\t\t\"Noon\": 0,\n\t\t\"Afternoon\": 0,\n\t\t\"Evening\": 0,\n\t\t\"Night\": 0,\n\t}\n\n\tfor _, line := range lines {\n\t\thourTime := getHourTime(parseHour(line))\n\t\tif _, ok := timeFrequence[hourTime]; ok {\n\t\t\ttimeFrequence[hourTime]++\n\t\t}\n\t}\n\n\treturn\n}", "title": "" } ]
869a687f314723af129dc669b3e1ec6e
DeleteCollection deletes a collection of objects.
[ { "docid": "cb8a2c59a97df5476f1ed1df20708eb5", "score": "0.0", "text": "func (c *FakeClusterCIDRs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(clustercidrsResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ClusterCIDRList{})\n\treturn err\n}", "title": "" } ]
[ { "docid": "5eeb55f728dc679417b7925f9f146350", "score": "0.76606876", "text": "func (c *cakes) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"cakes\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "b12a8e1170d5548cbddb09705f4433ad", "score": "0.76378083", "text": "func (c *resourceSets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tResource(\"resourcesets\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "d1ba35984a260d8ffd05f60dc2c051c8", "score": "0.7629418", "text": "func (c *idGenerates) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"idgenerates\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "d88af5608b63bf5783ec84a34f830391", "score": "0.7595522", "text": "func (c *client) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\t// See comment on Delete\n\tdeleteOptionsByte, err := runtime.Encode(deleteOptionsCodec.LegacyCodec(schema.GroupVersion{Version: \"v1\"}), &opts)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tresult := c.client.client.\n\t\tDelete().\n\t\tAbsPath(c.makeURLSegments(\"\")...).\n\t\tSetHeader(\"Content-Type\", runtime.ContentTypeJSON).\n\t\tBody(deleteOptionsByte).\n\t\tSpecificallyVersionedParams(&listOptions, dynamicParameterCodec, versionV1).\n\t\tDo(ctx)\n\treturn result.Error()\n}", "title": "" }, { "docid": "a5f4ce5bcdc2134fe5abcedba89d0edf", "score": "0.75902826", "text": "func (c *serviceDiscoveries) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"servicediscoveries\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "4d50a880eb99540ff641d4df39190bc7", "score": "0.757262", "text": "func (c *preBackupPods) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"prebackuppods\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "4e29e5d70ef270fbea5b4dca2e29fbd0", "score": "0.75710857", "text": "func (r *REST) DeleteCollection(ctx context.Context, deleteValidation rest.ValidateObjectFunc, options *metav1.DeleteOptions, listOptions *metainternal.ListOptions) (runtime.Object, error) {\n\tif !authentication.IsAdministrator(ctx, r.privilegedUsername) {\n\t\treturn nil, apierrors.NewMethodNotSupported(auth.Resource(\"roles\"), \"delete collection\")\n\t}\n\n\tif listOptions == nil {\n\t\tlistOptions = &metainternal.ListOptions{}\n\t} else {\n\t\tlistOptions = listOptions.DeepCopy()\n\t}\n\n\tlistObj, err := r.Store.List(ctx, listOptions)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\titems, err := meta.ExtractList(listObj)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Spawn a number of goroutines, so that we can issue requests to storage\n\t// in parallel to speed up deletion.\n\t// TODO: Make this proportional to the number of items to delete, up to\n\t// DeleteCollectionWorkers (it doesn't make much sense to spawn 16\n\t// workers to delete 10 items).\n\tworkersNumber := r.Store.DeleteCollectionWorkers\n\tif workersNumber < 1 {\n\t\tworkersNumber = 1\n\t}\n\twg := sync.WaitGroup{}\n\ttoProcess := make(chan int, 2*workersNumber)\n\terrs := make(chan error, workersNumber+1)\n\n\tgo func() {\n\t\tdefer utilruntime.HandleCrash(func(panicReason interface{}) {\n\t\t\terrs <- fmt.Errorf(\"DeleteCollection distributor panicked: %v\", panicReason)\n\t\t})\n\t\tfor i := 0; i < len(items); i++ {\n\t\t\ttoProcess <- i\n\t\t}\n\t\tclose(toProcess)\n\t}()\n\n\twg.Add(workersNumber)\n\tfor i := 0; i < workersNumber; i++ {\n\t\tgo func() {\n\t\t\t// panics don't cross goroutine boundaries\n\t\t\tdefer utilruntime.HandleCrash(func(panicReason interface{}) {\n\t\t\t\terrs <- fmt.Errorf(\"DeleteCollection goroutine panicked: %v\", panicReason)\n\t\t\t})\n\t\t\tdefer wg.Done()\n\n\t\t\tfor index := range toProcess {\n\t\t\t\taccessor, err := meta.Accessor(items[index])\n\t\t\t\tif err != nil {\n\t\t\t\t\terrs <- err\n\t\t\t\t\treturn\n\t\t\t\t}\n\n\t\t\t\ttmpOpt := options\n\t\t\t\ttmpOpt.Preconditions = nil\n\n\t\t\t\tif _, _, err := r.Delete(ctx, accessor.GetName(), deleteValidation, tmpOpt); err != nil && !apierrors.IsNotFound(err) {\n\t\t\t\t\tlog.Warnf(\"Delete %s in DeleteCollection failed: %v\", accessor.GetName(), err)\n\t\t\t\t\terrs <- err\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t}\n\twg.Wait()\n\tselect {\n\tcase err := <-errs:\n\t\treturn nil, err\n\tdefault:\n\t\treturn listObj, nil\n\t}\n}", "title": "" }, { "docid": "6a1a67f8d3ee73f2769df6660e347a72", "score": "0.7502202", "text": "func (c *podWatchs) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"podwatchs\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "1984d658c875777aea239dd62f747626", "score": "0.7498702", "text": "func (c *podjennies) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"podjennies\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "6d5aee7df7213da30da74b65462fc0db", "score": "0.7452838", "text": "func (c *funcdeves) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"funcdeves\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "399127f22bbad08f67e21dcd43192cd2", "score": "0.74480146", "text": "func (c *fileSyncs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"filesyncs\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "6cdf8c313d72b3287552a8373b24efc6", "score": "0.742645", "text": "func (c *jackpots) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"jackpots\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "12a93590d0b92457065067710101658f", "score": "0.7421346", "text": "func (c *galeraBackups) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"galerabackups\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "0cbe065cf7105f5ef461e70e7bcb91ef", "score": "0.7411739", "text": "func (c *mSJobs) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"msjobs\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "d6a3e250dd5ea188ca50cf3fb05eb166", "score": "0.7388028", "text": "func (c *autoDeployUnits) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"autodeployunits\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "2440f6c0e06d710e0f12489eb30db823", "score": "0.73740077", "text": "func (c *proxies) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tResource(\"proxies\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "d9eb1aaa517821e2071c67421b898cb0", "score": "0.7373552", "text": "func (c *streamProcessors) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"streamprocessors\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "7a3d9d16071d2d5eeefc412a18c6855b", "score": "0.7363887", "text": "func (c *debugAttachments) DeleteCollection(options *meta_v1.DeleteOptions, listOptions meta_v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"debugattachments\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "9018d1171af6805a87e5a192a36af95b", "score": "0.73547924", "text": "func (c *FakeGenerics) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(genericsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.GenericList{})\n\treturn err\n}", "title": "" }, { "docid": "61ab55b38435e4eaf66e5b424c9ac7a0", "score": "0.7346003", "text": "func (c *meshGateways) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"meshgateways\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "f908c44bbc7ad5f7f3366e34de0c0922", "score": "0.734116", "text": "func (c *FakeObjectSyncs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(objectsyncsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ObjectSyncList{})\n\treturn err\n}", "title": "" }, { "docid": "0f807cdf3eba7ca931f5ec6f5febdf4e", "score": "0.7340698", "text": "func (c *infraTargets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"infratargets\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "4a8573dc53fc4b5e2d9d74f37de6a05c", "score": "0.7327962", "text": "func (c *amqpSources) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"amqpsources\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "5e8121176c12c7fd6e4d5ab68e9f6f30", "score": "0.73269045", "text": "func (c *FakeEchos) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(echosResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.EchoList{})\n\treturn err\n}", "title": "" }, { "docid": "de9f4768d44a191b23d30bccec80aa60", "score": "0.7300962", "text": "func (c *consoleServices) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"consoleservices\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "2a132ceeba40ccabc8f57f02160cb3cd", "score": "0.72989357", "text": "func (c *bareMetalJobs) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"baremetaljobs\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "76a56a5de0122160190da1302c54a579", "score": "0.7275863", "text": "func (c *buildPacks) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"buildpacks\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "1eebb101c46c0d2ff5370d3007c905fc", "score": "0.7271393", "text": "func (c *trainingSets) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"trainingsets\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "6dfeba874417f1ae802ec766d114c8e7", "score": "0.7270784", "text": "func (c *FakeServiceBrokers) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(servicebrokersResource, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &prd.ServiceBrokerList{})\n\treturn err\n}", "title": "" }, { "docid": "f467690a72aee52d2157fd846535983e", "score": "0.72666705", "text": "func (c *imageStreams) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"imagestreams\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "66cfed2d2f40c579a8b3eba8cc318ced", "score": "0.7256515", "text": "func (c *scalers) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"scalers\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "ddbcad14f621b22eaf545ffa7546f976", "score": "0.7255344", "text": "func (c *FakeProxies) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(proxiesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &gloosoloiov1.ProxyList{})\n\treturn err\n}", "title": "" }, { "docid": "8ea2e4693176115031a43aacef7671ab", "score": "0.7254056", "text": "func (c *statusSyncs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"statussyncs\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "b32381300a781e7819b17e8716c57a3e", "score": "0.7247423", "text": "func (c *deepPacketInspections) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"deeppacketinspections\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "e7655e932f009bad476023d81c891845", "score": "0.72446793", "text": "func (c *FakeDebugRequests) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(debugrequestsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &squash_v1.DebugRequestList{})\n\treturn err\n}", "title": "" }, { "docid": "8bb98a1fe8630a23ae2ab33956f243da", "score": "0.7236741", "text": "func (c *serviceMeshControlPlanes) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"servicemeshcontrolplanes\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "d44ce1dc97a4442174c6429f8819a6aa", "score": "0.72351336", "text": "func (c *users) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\n\treturn c.client.Delete().\n\t\tResource(\"users\").\n\t\tVersionedParams(listOpts).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "e5bbeec750ec54f1bf661bd7e46e7e25", "score": "0.7227041", "text": "func (c *hTTPChecks) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"httpchecks\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "a39a8454798b0145c8200174e9c27c25", "score": "0.72242075", "text": "func (c *storageOSUpgrades) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"storageosupgrades\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "ce84d95a2e33854b4ffc19e428532b6c", "score": "0.7223381", "text": "func (c *helmApps) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"helmapps\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "384dd9ffdb3a1dd90ffe98b0508b3c85", "score": "0.721481", "text": "func (c *FakeFuncinsts) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(funcinstsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1beta3.FuncinstList{})\n\treturn err\n}", "title": "" }, { "docid": "dca411db09aa4fddd0c1840409354b34", "score": "0.72118086", "text": "func (c *quarksStatefulSets) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"quarksstatefulsets\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "b173103dabfd30b64b0ece3e7c236dbc", "score": "0.7206849", "text": "func (c *awsIamGroupMemberships) DeleteCollection(options *meta_v1.DeleteOptions, listOptions meta_v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"awsiamgroupmemberships\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "24488a03110b5f43b47bd0752be56dcc", "score": "0.72039187", "text": "func (c *rioInfos) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tResource(\"rioinfos\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "7ef653004fec3798b176e36a88ed8dda", "score": "0.71927327", "text": "func (c *etcdStorages) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tResource(\"etcdstorages\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "279071bce2423b7d37d2fbf303abcbd6", "score": "0.7168181", "text": "func (c *FakeKubeSerials) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(kubeserialsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.KubeSerialList{})\n\treturn err\n}", "title": "" }, { "docid": "4f6fa2b575b0d3db14c0132d48801f0b", "score": "0.7156322", "text": "func (c *FakePlays) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(playsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.PlayList{})\n\treturn err\n}", "title": "" }, { "docid": "848a9d3d42a14fb98e67e1ee88b45e40", "score": "0.71497554", "text": "func (c *FakePodLogses) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(podlogsesResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &podlogsv1.PodLogsList{})\n\treturn err\n}", "title": "" }, { "docid": "8d0bce26b56bf3a17cb1cfdaaa9f7ffc", "score": "0.7147314", "text": "func (c *kuberhealthyJobs) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"khjobs\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo(context.TODO()).\n\t\tError()\n}", "title": "" }, { "docid": "900a1b631691a92679b4a8ee56230568", "score": "0.7129012", "text": "func (c *gitWebHookExecutions) DeleteCollection(options *metav1.DeleteOptions, listOptions metav1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"gitwebhookexecutions\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "72f26934eed6993f2800b41c6da892e4", "score": "0.7127818", "text": "func (c *FakeGitTemplates) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(gittemplatesResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &lattice_v1.GitTemplateList{})\n\treturn err\n}", "title": "" }, { "docid": "e7ec1abdeba6bd1cc902ab733c44eac5", "score": "0.7123739", "text": "func (c *gPUs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tResource(\"gpus\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "e1069c1b2f81a919469be1d99e395f59", "score": "0.7115833", "text": "func (c *FakeIPSecVpnTunnels) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(ipsecvpntunnelsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &contivppiov1.IPSecVpnTunnelList{})\n\treturn err\n}", "title": "" }, { "docid": "b2bdda408241246b9d54f2be53bb085e", "score": "0.7115495", "text": "func (c *FakeOLMs) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(olmsResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.OLMList{})\n\treturn err\n}", "title": "" }, { "docid": "e05734c02405d95fb8a4904de87c6f8d", "score": "0.7112173", "text": "func (c *FakeReboots) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(rebootsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.RebootList{})\n\treturn err\n}", "title": "" }, { "docid": "76b4c91432f714ddea8fc2b96ca19ab2", "score": "0.7112025", "text": "func (c *FakeOpenShiftControllerManagers) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(openshiftcontrollermanagersResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &operatorv1.OpenShiftControllerManagerList{})\n\treturn err\n}", "title": "" }, { "docid": "608a9be73ab7a5d986e65b8736e598f9", "score": "0.71091366", "text": "func (c *passboltSecrets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"passboltsecrets\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "73af790c22be2a0351326a3ea751c1dd", "score": "0.71039563", "text": "func (c *FakeCognitoIdentityPools) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(cognitoidentitypoolsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.CognitoIdentityPoolList{})\n\treturn err\n}", "title": "" }, { "docid": "e04860d5c66bcd39ff166ea3b6296003", "score": "0.71009845", "text": "func (c *FakeApplicationInsightsWebTests) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(applicationinsightswebtestsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ApplicationInsightsWebTestList{})\n\treturn err\n}", "title": "" }, { "docid": "b2a977e61cd9a702834ee08907a7ee3b", "score": "0.70952386", "text": "func (c *customMetrics) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"custommetrics\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "84e4c8349aec9b33ebc24f5095b5d309", "score": "0.7084356", "text": "func (c *FakeBucketClaims) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(bucketclaimsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.BucketClaimList{})\n\treturn err\n}", "title": "" }, { "docid": "8eea511005e3a4066fa462238f3e3430", "score": "0.70807207", "text": "func (c *cRD2s) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"crd2s\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "d16228643bc0442062c4de55a6605f70", "score": "0.7079574", "text": "func (c *FakeDNSLoadBalancers) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(dnsloadbalancersResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &rednsv1.DNSLoadBalancerList{})\n\treturn err\n}", "title": "" }, { "docid": "6d5a52c44f157897eb329242132563fa", "score": "0.7071557", "text": "func (c *indicators) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"indicators\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "1efb2a4d57632d10770f8813b88ea2c0", "score": "0.7069878", "text": "func (k *KubeClient) DeleteCollection(listOpts metav1.ListOptions, deleteOpts *metav1.DeleteOptions) error {\n\tcli, err := k.getClientsetOrCached()\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to delete the collection of pods\")\n\t}\n\treturn k.delCollection(cli, k.namespace, listOpts, deleteOpts)\n}", "title": "" }, { "docid": "21e84f57202104b98530b5f82f92bdb1", "score": "0.70551014", "text": "func (f *FakeSecretsInterface) DeleteCollection(*api.DeleteOptions, api.ListOptions) error {\n\treturn nil\n}", "title": "" }, { "docid": "315c275c4439342459a219d68bbbe247", "score": "0.70519006", "text": "func (c *FakePMDRoutes) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(pmdroutesResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &pmd_v1.PMDRouteList{})\n\treturn err\n}", "title": "" }, { "docid": "d2a0f42928d1d2c99a2f3caa6fc9d244", "score": "0.7041677", "text": "func (c *FakeAWSS3Targets) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(awss3targetsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.AWSS3TargetList{})\n\treturn err\n}", "title": "" }, { "docid": "883240c0b081b4a697a6131af64c83b2", "score": "0.70280963", "text": "func (c *dLPStoredInfoTypes) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOpts.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOpts.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"dlpstoredinfotypes\").\n\t\tVersionedParams(&listOpts, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(&opts).\n\t\tDo(ctx).\n\t\tError()\n}", "title": "" }, { "docid": "8b07102759efe3364b077b6970bb3310", "score": "0.7022905", "text": "func (c *FakeShimInstances) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(shiminstancesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ShimInstanceList{})\n\treturn err\n}", "title": "" }, { "docid": "4853a4972c6f55eef136b554be7be3ec", "score": "0.7021393", "text": "func (c *FakeTelemetries) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(telemetriesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.TelemetryList{})\n\treturn err\n}", "title": "" }, { "docid": "4200953199c9e404eca5f9b69366f677", "score": "0.7012148", "text": "func (c *FakeTrafficManagerEndpoints) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(trafficmanagerendpointsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.TrafficManagerEndpointList{})\n\treturn err\n}", "title": "" }, { "docid": "a0d1ccbdccbd464e0ec14b7f83eef382", "score": "0.70028603", "text": "func (c *FakeWafregionalSQLInjectionMatchSets) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(wafregionalsqlinjectionmatchsetsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.WafregionalSQLInjectionMatchSetList{})\n\treturn err\n}", "title": "" }, { "docid": "467109d533acbca713c6788df7887fd6", "score": "0.6992531", "text": "func (c *authenticationServices) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"authenticationservices\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "66ba73bdab00fe29c90b2a98c6a9005c", "score": "0.6979056", "text": "func (c *FakeServiceConnections) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(serviceconnectionsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ServiceConnectionList{})\n\treturn err\n}", "title": "" }, { "docid": "2941c5783fbb5abfc0d2a85b5e05af7f", "score": "0.6972268", "text": "func (c *FakeAccessControlPolicies) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(accesscontrolpoliciesResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.AccessControlPolicyList{})\n\treturn err\n}", "title": "" }, { "docid": "d1ad1a7825dd8dc254d35cd4e6b763bd", "score": "0.6958211", "text": "func (c *FakeWafregionalXssMatchSets) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(wafregionalxssmatchsetsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.WafregionalXssMatchSetList{})\n\treturn err\n}", "title": "" }, { "docid": "996cab76cad0998289a91a2e72bad1e3", "score": "0.6956582", "text": "func (c *FakeIPReservations) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(ipreservationsResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v3.IPReservationList{})\n\treturn err\n}", "title": "" }, { "docid": "3d6ca00af6f6101cc41b513e68c4a85f", "score": "0.6951755", "text": "func (c *FakeServices) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(servicesResource, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &creatorv1.ServiceList{})\n\treturn err\n}", "title": "" }, { "docid": "7fc29b98db22fec772a792cf0720c420", "score": "0.6950856", "text": "func (c *polarisBuildSteps) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"polarisbuildsteps\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "d59d5edda53ecf8723669d0f60a07401", "score": "0.6948513", "text": "func (c *FakeApiManagementOpenidConnectProviders) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(apimanagementopenidconnectprovidersResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ApiManagementOpenidConnectProviderList{})\n\treturn err\n}", "title": "" }, { "docid": "a6aff19fc5a91a17bf18d11c1056ea39", "score": "0.694509", "text": "func (c *FakeHTTPLoadBalancers) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(httploadbalancersResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.HTTPLoadBalancerList{})\n\treturn err\n}", "title": "" }, { "docid": "f0d0ef04702b60f83e1cae526ba414dc", "score": "0.694235", "text": "func (c *FakeHttpFilters) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(httpfiltersResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1beta1.HttpFilterList{})\n\treturn err\n}", "title": "" }, { "docid": "3cf81c8dac7880dc955d9a1c2c9e851b", "score": "0.69417405", "text": "func (c *FakeActiveOperands) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(activeoperandsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.ActiveOperandList{})\n\treturn err\n}", "title": "" }, { "docid": "018cb5d774106fafcda44c942265a079", "score": "0.69373876", "text": "func (c *FakeFooBindings) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(foobindingsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.FooBindingList{})\n\treturn err\n}", "title": "" }, { "docid": "80e0090c83563996c52256d03e3c6cc7", "score": "0.69326437", "text": "func (c *FakeVpnGatewayAttachments) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(vpngatewayattachmentsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.VpnGatewayAttachmentList{})\n\treturn err\n}", "title": "" }, { "docid": "07ce96dbbe48e34deb1c46c5868a1d4c", "score": "0.69276613", "text": "func (c *FakeOpenShiftWebConsoleConfigs) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(openshiftwebconsoleconfigsResource, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.OpenShiftWebConsoleConfigList{})\n\treturn err\n}", "title": "" }, { "docid": "a8b0d8edb140125054a671c22a5f1fee", "score": "0.69272864", "text": "func (c *FakeNetworkAttachments) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(networkattachmentsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &network.NetworkAttachmentList{})\n\treturn err\n}", "title": "" }, { "docid": "91fccd62535faef0c99e6c836bfeae73", "score": "0.6921468", "text": "func (c *FakeServiceAccounts) DeleteCollection(ctx context.Context, opts metav1.DeleteOptions, listOpts metav1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(serviceaccountsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1.ServiceAccountList{})\n\treturn err\n}", "title": "" }, { "docid": "f467f0690513a7b9754f48eb6bba1281", "score": "0.6921248", "text": "func (c *FakeUsageKinds) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewRootDeleteCollectionAction(usagekindsResource, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.UsageKindList{})\n\treturn err\n}", "title": "" }, { "docid": "3ad69a74a760c0754f71fbbbc59f4c5f", "score": "0.69181174", "text": "func (c *FakeWarmImages) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(warmimagesResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v2.WarmImageList{})\n\treturn err\n}", "title": "" }, { "docid": "a08375e75f6ab244c8894b0824c0fa39", "score": "0.6914121", "text": "func (c *clusterWorkflowTemplates) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\tvar timeout time.Duration\n\tif listOptions.TimeoutSeconds != nil {\n\t\ttimeout = time.Duration(*listOptions.TimeoutSeconds) * time.Second\n\t}\n\treturn c.client.Delete().\n\t\tResource(\"clusterworkflowtemplates\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tTimeout(timeout).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "6a5c3f9dd5002cee6034548e4894bd31", "score": "0.6913191", "text": "func (c *FakeNetworkTopologies) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(networktopologiesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.NetworkTopologyList{})\n\treturn err\n}", "title": "" }, { "docid": "a109021ac66ff31bc68de71bfb81cf29", "score": "0.691214", "text": "func (c *FakeIoTTenants) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(iottenantsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &iotv1.IoTTenantList{})\n\treturn err\n}", "title": "" }, { "docid": "d23dc5c5752eefdac9a65eda5a714d57", "score": "0.69030905", "text": "func (c *FakeAzureServiceBusSources) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(azureservicebussourcesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.AzureServiceBusSourceList{})\n\treturn err\n}", "title": "" }, { "docid": "b990cf41fb4932194015562f7e206fdd", "score": "0.68955785", "text": "func (c *FakeWasmPlugins) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(wasmpluginsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.WasmPluginList{})\n\treturn err\n}", "title": "" }, { "docid": "96614bdced04a027d72476f226412460", "score": "0.6879249", "text": "func (c *federationPlacements) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\treturn c.client.Delete().\n\t\tNamespace(c.ns).\n\t\tResource(\"federationplacements\").\n\t\tVersionedParams(&listOptions, scheme.ParameterCodec).\n\t\tBody(options).\n\t\tDo().\n\t\tError()\n}", "title": "" }, { "docid": "7f38f9e684e984e5f83f633dd297352b", "score": "0.6871261", "text": "func (c *FakeAdvancedDeployments) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(advanceddeploymentsResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.AdvancedDeploymentList{})\n\treturn err\n}", "title": "" }, { "docid": "4e3555e2f681d4c2c7058e2b38187796", "score": "0.6851453", "text": "func (c *FakeMultiNetworkPolicies) DeleteCollection(ctx context.Context, opts v1.DeleteOptions, listOpts v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(multinetworkpoliciesResource, c.ns, listOpts)\n\n\t_, err := c.Fake.Invokes(action, &v1beta1.MultiNetworkPolicyList{})\n\treturn err\n}", "title": "" }, { "docid": "eebd6b7f3d5fc0ed12e0bec1451965f6", "score": "0.6840028", "text": "func (c *FakeIamOpenidConnectProviders) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(iamopenidconnectprovidersResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.IamOpenidConnectProviderList{})\n\treturn err\n}", "title": "" }, { "docid": "952d6755028dca44220a9177d1e0a1e6", "score": "0.6834445", "text": "func (c *FakeGoogleCloudSQLBindings) DeleteCollection(options *v1.DeleteOptions, listOptions v1.ListOptions) error {\n\taction := testing.NewDeleteCollectionAction(googlecloudsqlbindingsResource, c.ns, listOptions)\n\n\t_, err := c.Fake.Invokes(action, &v1alpha1.GoogleCloudSQLBindingList{})\n\treturn err\n}", "title": "" } ]
a53614df252c3e196306fbb0e3619907
/ SlidesApiServiceTests Set footer the slide. Test for SlidesApi.SetSlideHeaderFooter method with invalid slideIndex
[ { "docid": "fc449c837cbff96868a0cc0f96220ae9", "score": "0.65559417", "text": "func TestSetSlideHeaderFooterInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetSlideHeaderFooter\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" } ]
[ { "docid": "9985f0fa2b0bf46578ae9881559ffae4", "score": "0.7118856", "text": "func TestSetSlideHeaderFooter(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetSlideHeaderFooter\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "8e1e5472dd2d61a820a28f1d74ba951f", "score": "0.6743028", "text": "func TestSetPresentationHeaderFooter(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "35a0becb36e35215035db97a2fc7cf50", "score": "0.6461652", "text": "func TestGetSlideHeaderFooter(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n e := InitializeTest(\"GetSlideHeaderFooter\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "4771ebe213ecf34a90a1eb71c51efcee", "score": "0.6419133", "text": "func TestSetNotesSlideHeaderFooter(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "a476e483572c2847e24ce05cd9ff02d6", "score": "0.61091167", "text": "func TestSetNotesSlideHeaderFooterInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "79118ea44d235c593365b49fa3dfa229", "score": "0.5916877", "text": "func TestGetSlideHeaderFooterInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"GetSlideHeaderFooter\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"GetSlideHeaderFooter\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetSlideHeaderFooter\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "59dcd21578f97a3364268f04814bdcb4", "score": "0.59036046", "text": "func TestGetNotesSlideHeaderFooter(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "46e4ed60e1724cdd36e4956ea0835186", "score": "0.58846146", "text": "func TestSetSlideHeaderFooterInvalidName(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testname, \"SetSlideHeaderFooter\", \"name\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testname = nullValue\n } else {\n testname, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"name\", testname)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"name\", \"string\", testname, int32(statusCode), e)\n}", "title": "" }, { "docid": "315cf66ec2fa79fb3450aee55aa83c07", "score": "0.57131124", "text": "func footer(currentPage int, totalPages int, bonduaries int, around int) string {\n\taroundCurPag := aroundCurrent(currentPage, around)\n\tbonduary := bonduary(totalPages, bonduaries)\n\n\tif totalPages == 1 {\n\t\treturn \"1\"\n\t}\n\n\treturn createFooterString(aroundCurPag, bonduary)\n}", "title": "" }, { "docid": "44d558b61cce748326fe204bbb7b2bfb", "score": "0.5663139", "text": "func (a *WordsApiService) InsertHeaderFooter(ctx context.Context, data *models.InsertHeaderFooterRequest) (models.HeaderFooterResponse, *http.Response, error) {\n var (\n successPayload models.HeaderFooterResponse\n )\n\n requestData, err := data.CreateRequestData();\n if err != nil {\n return successPayload, nil, err\n }\n\n requestData.Path = a.client.cfg.BaseUrl + requestData.Path;\n\n r, err := a.client.prepareRequest(ctx, requestData)\n if err != nil {\n return successPayload, nil, err\n }\n\n response, err := a.client.callAPI(r)\n defer response.Body.Close()\n\n if err != nil || response == nil {\n return successPayload, response, err\n }\n if response.StatusCode == 401 {\n return successPayload, nil, errors.New(\"Access is denied\")\n }\n if response.StatusCode >= 300 {\n var apiError models.WordsApiErrorResponse;\n\n if err = json.NewDecoder(response.Body).Decode(&apiError); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, &apiError\n }\n if err = json.NewDecoder(response.Body).Decode(&successPayload); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, err\n}", "title": "" }, { "docid": "abea7e6174dec432ec53e1f1cf66845a", "score": "0.56605613", "text": "func (a *WordsApiService) DeleteHeaderFooter(ctx context.Context, data *models.DeleteHeaderFooterRequest) (*http.Response, error) {\n var (\n )\n\n requestData, err := data.CreateRequestData();\n if err != nil {\n return nil, err\n }\n\n requestData.Path = a.client.cfg.BaseUrl + requestData.Path;\n\n r, err := a.client.prepareRequest(ctx, requestData)\n if err != nil {\n return nil, err\n }\n\n response, err := a.client.callAPI(r)\n defer response.Body.Close()\n\n if err != nil || response == nil {\n return response, err\n }\n if response.StatusCode == 401 {\n return nil, errors.New(\"Access is denied\")\n }\n if response.StatusCode >= 300 {\n var apiError models.WordsApiErrorResponse;\n\n if err = json.NewDecoder(response.Body).Decode(&apiError); err != nil {\n return response, err\n }\n\n return response, &apiError\n }\n return response, err\n}", "title": "" }, { "docid": "85eac8e61c146f32da2ace4d49158229", "score": "0.5626201", "text": "func TestGetNotesSlideHeaderFooterInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "310282b4dd1846a176ee724148a324ee", "score": "0.56198585", "text": "func (e *Embed) SetFooter(Text, IconURL string) error {\n\tif len(e.Embeds) < 1 {\n\t\treturn errors.New(\"Invalid Embed passed in, Embed.Embeds must have at least one EmbedElement\")\n\t}\n\te.Embeds[0].Footer = Footer{Text, IconURL}\n\treturn nil\n}", "title": "" }, { "docid": "b6340575241bc75f9cc525427b89388b", "score": "0.55778146", "text": "func TestSetSlideHeaderFooterInvalidPassword(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testpassword, \"SetSlideHeaderFooter\", \"password\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testpassword = nullValue\n } else {\n testpassword, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"password\", testpassword)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"password\", \"string\", testpassword, int32(statusCode), e)\n}", "title": "" }, { "docid": "039c8be8b92d4fc89f362c9d63b48525", "score": "0.555831", "text": "func TestSetSlideHeaderFooterInvalidStorage(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(teststorage, \"SetSlideHeaderFooter\", \"storage\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n teststorage = nullValue\n } else {\n teststorage, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"storage\", teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"storage\", \"string\", teststorage, int32(statusCode), e)\n}", "title": "" }, { "docid": "5c2fe268c09ecde939ab9789b145186e", "score": "0.55271626", "text": "func TestSetSlideHeaderFooterInvalidFolder(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testfolder, \"SetSlideHeaderFooter\", \"folder\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testfolder = nullValue\n } else {\n testfolder, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"folder\", testfolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"folder\", \"string\", testfolder, int32(statusCode), e)\n}", "title": "" }, { "docid": "b948e20853aae4453ce2cd934e265a22", "score": "0.54783213", "text": "func TestSetPresentationHeaderFooterInvalidName(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testname, \"SetPresentationHeaderFooter\", \"name\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testname = nullValue\n } else {\n testname, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"name\", testname)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetPresentationHeaderFooter\", \"name\", \"string\", testname, int32(statusCode), e)\n}", "title": "" }, { "docid": "bd657c5ac39c3916d61074b90956e90f", "score": "0.5472532", "text": "func TestSetNotesSlideHeaderFooterInvalidName(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testname, \"SetNotesSlideHeaderFooter\", \"name\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testname = nullValue\n } else {\n testname, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"name\", testname)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"name\", \"string\", testname, int32(statusCode), e)\n}", "title": "" }, { "docid": "19b9b22f177bbe3069842d8ffd87de73", "score": "0.54713", "text": "func (a *WordsApiService) GetHeaderFooterOfSection(ctx context.Context, data *models.GetHeaderFooterOfSectionRequest) (models.HeaderFooterResponse, *http.Response, error) {\n var (\n successPayload models.HeaderFooterResponse\n )\n\n requestData, err := data.CreateRequestData();\n if err != nil {\n return successPayload, nil, err\n }\n\n requestData.Path = a.client.cfg.BaseUrl + requestData.Path;\n\n r, err := a.client.prepareRequest(ctx, requestData)\n if err != nil {\n return successPayload, nil, err\n }\n\n response, err := a.client.callAPI(r)\n defer response.Body.Close()\n\n if err != nil || response == nil {\n return successPayload, response, err\n }\n if response.StatusCode == 401 {\n return successPayload, nil, errors.New(\"Access is denied\")\n }\n if response.StatusCode >= 300 {\n var apiError models.WordsApiErrorResponse;\n\n if err = json.NewDecoder(response.Body).Decode(&apiError); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, &apiError\n }\n if err = json.NewDecoder(response.Body).Decode(&successPayload); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, err\n}", "title": "" }, { "docid": "7fb3c986399befacf30f95eb5310eece", "score": "0.54305434", "text": "func TestSetSlideHeaderFooterInvalidDto(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testdto, \"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\")\n if (invalidValue == nil) {\n testdto = nil\n } else {\n testdto, _ = invalidValue.(IHeaderFooter)\n }\n\n e := InitializeTest(\"SetSlideHeaderFooter\", \"dto\", testdto)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSlideHeaderFooter\", \"dto\", \"HeaderFooter\", testdto, int32(statusCode), e)\n}", "title": "" }, { "docid": "8889e117262dfb80f726fb0b7a792995", "score": "0.53988606", "text": "func (m *MockOutputFileSegmenter) AppendFooter(arg0 string, arg1 ...interface{}) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0}\n\tfor _, a := range arg1 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tm.ctrl.Call(m, \"AppendFooter\", varargs...)\n}", "title": "" }, { "docid": "79b73362445ab78203994daea3173168", "score": "0.5359544", "text": "func (a *WordsApiService) GetHeaderFooter(ctx context.Context, data *models.GetHeaderFooterRequest) (models.HeaderFooterResponse, *http.Response, error) {\n var (\n successPayload models.HeaderFooterResponse\n )\n\n requestData, err := data.CreateRequestData();\n if err != nil {\n return successPayload, nil, err\n }\n\n requestData.Path = a.client.cfg.BaseUrl + requestData.Path;\n\n r, err := a.client.prepareRequest(ctx, requestData)\n if err != nil {\n return successPayload, nil, err\n }\n\n response, err := a.client.callAPI(r)\n defer response.Body.Close()\n\n if err != nil || response == nil {\n return successPayload, response, err\n }\n if response.StatusCode == 401 {\n return successPayload, nil, errors.New(\"Access is denied\")\n }\n if response.StatusCode >= 300 {\n var apiError models.WordsApiErrorResponse;\n\n if err = json.NewDecoder(response.Body).Decode(&apiError); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, &apiError\n }\n if err = json.NewDecoder(response.Body).Decode(&successPayload); err != nil {\n return successPayload, response, err\n }\n\n return successPayload, response, err\n}", "title": "" }, { "docid": "63d9f2c2a6a59fa65df730c9dd1e85b1", "score": "0.5357156", "text": "func (doc *DocumentBuilder) SetFooter(footer string) {\n\tdoc.footer = footer\n}", "title": "" }, { "docid": "02df5e98fd9e6e5c0f4af56c32d77151", "score": "0.53014743", "text": "func (d *Document) SetPageFooter(template string) {\n\td.subTemplates.pageFooter = template\n\tif template == \"\" {\n\t\td.fpdf.SetFooterFunc(func() {})\n\t\treturn\n\t}\n\td.fpdf.SetFooterFunc(func() {\n\t\td.params[\"_page\"] = d.fpdf.PageNo()\n\t\tfinalMarkdown, err := templateSubstitution(d.t, \"_footer\", d.subTemplates.pageFooter, d.params, d.extensions)\n\t\tif err != nil {\n\t\t\td.fpdf.SetError(err)\n\t\t\treturn\n\t\t}\n\t\tstrWd := d.fpdf.GetStringWidth(finalMarkdown)\n\t\tpgWd, pgHt := d.fpdf.GetPageSize()\n\t\tfootHeight := strWd / pgWd\n\t\t_, _, _, bMarg := d.fpdf.GetMargins()\n\t\tif d.fpdf.GetY() <= pgHt-(bMarg+2*d.lineHeight+footHeight) {\n\t\t\td.fpdf.SetY(pgHt - (bMarg + 2*d.lineHeight + footHeight))\n\t\t\td.fpdf.Write(d.lineHeight, \"\\n\\n\")\n\t\t}\n\t\ttokens := d.parser.Parse([]byte(finalMarkdown))\n\t\tfor _, tok := range tokens {\n\t\t\td.render(tok)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "ad463368c15c8ec7b096875a2340fcd0", "score": "0.52762115", "text": "func TestGetSlideHeaderFooterInvalidName(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testname, \"GetSlideHeaderFooter\", \"name\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testname = nullValue\n } else {\n testname, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetSlideHeaderFooter\", \"name\", testname)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetSlideHeaderFooter\", \"name\", \"string\", testname, int32(statusCode), e)\n}", "title": "" }, { "docid": "0456774248ddc7ce6146ca2574cb1268", "score": "0.52706504", "text": "func (w *Writer) OnFooter(h plumbing.Hash) error {\n\tw.checksum = h\n\tw.finished = true\n\t_, err := w.createIndex()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "5f411a69d89d37c01839a71c8ad1576f", "score": "0.52171683", "text": "func TestSetPresentationHeaderFooterInvalidStorage(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(teststorage, \"SetPresentationHeaderFooter\", \"storage\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n teststorage = nullValue\n } else {\n teststorage, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"storage\", teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetPresentationHeaderFooter\", \"storage\", \"string\", teststorage, int32(statusCode), e)\n}", "title": "" }, { "docid": "23dcfcdf9e6571e04db43e1c20f93017", "score": "0.5212346", "text": "func (r *MarkdownRenderer) RenderFooter(w io.Writer, ast *Node) {\n}", "title": "" }, { "docid": "0daa1cd0a202da5dec39244b5b1b7c8b", "score": "0.51985097", "text": "func TestSetPresentationHeaderFooterInvalidPassword(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testpassword, \"SetPresentationHeaderFooter\", \"password\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testpassword = nullValue\n } else {\n testpassword, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"password\", testpassword)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetPresentationHeaderFooter\", \"password\", \"string\", testpassword, int32(statusCode), e)\n}", "title": "" }, { "docid": "ccac3e00aad03c3b27663ddb45588044", "score": "0.5137642", "text": "func TestSetPresentationHeaderFooterInvalidFolder(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testfolder, \"SetPresentationHeaderFooter\", \"folder\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testfolder = nullValue\n } else {\n testfolder, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"folder\", testfolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetPresentationHeaderFooter\", \"folder\", \"string\", testfolder, int32(statusCode), e)\n}", "title": "" }, { "docid": "9d12804c5243e650ae28a1b6c5cc2ade", "score": "0.51278955", "text": "func (t *Table) SetFooter(row ...string) *Table {\n\tt.footer = append([]string{}, row...)\n\treturn t\n}", "title": "" }, { "docid": "24ede13f09d847d4509b44b64fcbd14d", "score": "0.5096816", "text": "func TestSetPresentationHeaderFooterInvalidDto(t *testing.T) {\n testname, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"name\", \"string\").(string)\n testdto, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\").(IHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetPresentationHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testdto, \"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\")\n if (invalidValue == nil) {\n testdto = nil\n } else {\n testdto, _ = invalidValue.(IHeaderFooter)\n }\n\n e := InitializeTest(\"SetPresentationHeaderFooter\", \"dto\", testdto)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetPresentationHeaderFooter(testname, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetPresentationHeaderFooter\", \"dto\", \"HeaderFooter\", testdto, int32(statusCode), e)\n}", "title": "" }, { "docid": "460537098f5020d23022c92a9b617a56", "score": "0.50954133", "text": "func TestSetNotesSlideHeaderFooterInvalidPassword(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testpassword, \"SetNotesSlideHeaderFooter\", \"password\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testpassword = nullValue\n } else {\n testpassword, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"password\", testpassword)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"password\", \"string\", testpassword, int32(statusCode), e)\n}", "title": "" }, { "docid": "dc703329fd5efc2af5428e7f64903b32", "score": "0.50943476", "text": "func (r *Renderer) RenderFooter(w io.Writer, ast ast.Node) {\n\n}", "title": "" }, { "docid": "1acc3ea68dc29b570b90e0d7c811fe89", "score": "0.50829107", "text": "func TestSetNotesSlideHeaderFooterInvalidStorage(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(teststorage, \"SetNotesSlideHeaderFooter\", \"storage\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n teststorage = nullValue\n } else {\n teststorage, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"storage\", teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"storage\", \"string\", teststorage, int32(statusCode), e)\n}", "title": "" }, { "docid": "5def0c653363a1c06b8e860d9ecea669", "score": "0.50754607", "text": "func TestSetNotesSlideHeaderFooterInvalidFolder(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testfolder, \"SetNotesSlideHeaderFooter\", \"folder\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testfolder = nullValue\n } else {\n testfolder, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"folder\", testfolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"folder\", \"string\", testfolder, int32(statusCode), e)\n}", "title": "" }, { "docid": "afc4210ef1f7962840dc1e882ba1cf70", "score": "0.5049394", "text": "func TestSetNotesSlideHeaderFooterInvalidDto(t *testing.T) {\n testname, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\").(INotesSlideHeaderFooter)\n testpassword, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testdto, \"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\")\n if (invalidValue == nil) {\n testdto = nil\n } else {\n testdto, _ = invalidValue.(INotesSlideHeaderFooter)\n }\n\n e := InitializeTest(\"SetNotesSlideHeaderFooter\", \"dto\", testdto)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetNotesSlideHeaderFooter(testname, testslideIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetNotesSlideHeaderFooter\", \"dto\", \"NotesSlideHeaderFooter\", testdto, int32(statusCode), e)\n}", "title": "" }, { "docid": "1cad789f44c903108477dfb6e82c41bb", "score": "0.50134414", "text": "func TestGetNotesSlideHeaderFooterInvalidName(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testname, \"GetNotesSlideHeaderFooter\", \"name\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testname = nullValue\n } else {\n testname, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"name\", testname)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetNotesSlideHeaderFooter\", \"name\", \"string\", testname, int32(statusCode), e)\n}", "title": "" }, { "docid": "cea57a952297733933db6548d48df017", "score": "0.49669912", "text": "func TestGetSlideHeaderFooterInvalidStorage(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(teststorage, \"GetSlideHeaderFooter\", \"storage\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n teststorage = nullValue\n } else {\n teststorage, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetSlideHeaderFooter\", \"storage\", teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetSlideHeaderFooter\", \"storage\", \"string\", teststorage, int32(statusCode), e)\n}", "title": "" }, { "docid": "19c6a111a44bdf4aba9ebd852af7f9ac", "score": "0.4947707", "text": "func TestGetSlideHeaderFooterInvalidPassword(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testpassword, \"GetSlideHeaderFooter\", \"password\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testpassword = nullValue\n } else {\n testpassword, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetSlideHeaderFooter\", \"password\", testpassword)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetSlideHeaderFooter\", \"password\", \"string\", testpassword, int32(statusCode), e)\n}", "title": "" }, { "docid": "72c170b5d3a5a6b4b72813ffd640f734", "score": "0.4940575", "text": "func addFooter(ctx context.Context, request *models.RenderRequest, parent *html.Node) {\n\tfooter := h.CreateNode(\"footer\", atom.Footer,\n\t\th.Attr(\"class\", \"figure__footer\"),\n\t\t\"\\n\")\n\tif len(request.Units) > 0 {\n\t\tfooter.AppendChild(h.CreateNode(\"p\", atom.P,\n\t\t\th.Attr(\"class\", \"figure__units\"),\n\t\t\tparseValue(ctx, request, unitsText+request.Units)))\n\t\tfooter.AppendChild(h.Text(\"\\n\"))\n\t}\n\tif len(request.Source) > 0 {\n\t\tfooter.AppendChild(h.CreateNode(\"p\", atom.P,\n\t\t\th.Attr(\"class\", \"figure__source\"),\n\t\t\tparseValue(ctx, request, sourceText+request.Source)))\n\t\tfooter.AppendChild(h.Text(\"\\n\"))\n\t}\n\tif len(request.Footnotes) > 0 {\n\t\tfooter.AppendChild(h.CreateNode(\"p\", atom.P,\n\t\t\th.Attr(\"class\", \"figure__notes\"),\n\t\t\tnotesText))\n\t\tfooter.AppendChild(h.Text(\"\\n\"))\n\n\t\tol := h.CreateNode(\"ol\", atom.Ol,\n\t\t\th.Attr(\"class\", \"figure__footnotes\"),\n\t\t\t\"\\n\")\n\t\taddFooterItemsToList(ctx, request, ol)\n\t\tfooter.AppendChild(ol)\n\t\tfooter.AppendChild(h.Text(\"\\n\"))\n\t}\n\tparent.AppendChild(footer)\n\tparent.AppendChild(h.Text(\"\\n\"))\n}", "title": "" }, { "docid": "892a16cffff78b9c11a97f31095be5b9", "score": "0.49402732", "text": "func (o *WhatsAppTemplateTemplateStructureApiData) HasFooter() bool {\n\tif o != nil && o.Footer != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "90c997e869e683c6a94a6a50ebe6d055", "score": "0.49343485", "text": "func TestGetSlideHeaderFooterInvalidFolder(t *testing.T) {\n testname, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testfolder, \"GetSlideHeaderFooter\", \"folder\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testfolder = nullValue\n } else {\n testfolder, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetSlideHeaderFooter\", \"folder\", testfolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetSlideHeaderFooter\", \"folder\", \"string\", testfolder, int32(statusCode), e)\n}", "title": "" }, { "docid": "78ec99be2204bb9c8ed5159e25c08ada", "score": "0.48917615", "text": "func (i Intellijel) FooterLocation() panel.Point {\n\treturn panel.Point{X: i.Width() / 2.0, Y: i.MountingHoleBottomY()}\n}", "title": "" }, { "docid": "33c8edc4983843bedcaa830e33d22eac", "score": "0.48762766", "text": "func (p *Paginator) SetPageFooters() {\n\tfor i := range p.Pages {\n\t\tp.Pages[i].Footer = &discord.EmbedFooter{\n\t\t\tText: fmt.Sprintf(\"#[%d / %d]\", i+1, len(p.Pages)),\n\t\t}\n\t}\n}", "title": "" }, { "docid": "415261eb74d85bcb573d935c5e315c4e", "score": "0.48603025", "text": "func (p PageMarginFooter) setPageMargins(pm *xlsxPageMargins) {\n\tpm.Footer = float64(p)\n}", "title": "" }, { "docid": "37201cf853a282be4b4702e7a5ad4858", "score": "0.48471987", "text": "func NewFooter() FooterBuilder {\n\treturn &footerBuilder{}\n}", "title": "" }, { "docid": "14ce403cfe15dd36f77b31201d7aed24", "score": "0.48091036", "text": "func footerHandler(todos app.Todos, rsp treetop.Response, req *http.Request) interface{} {\n\tdata := struct {\n\t\tPage string\n\t\tActiveCount int\n\t\tCompletedCount int\n\t\tLabel string\n\t}{\n\t\tActiveCount: todos.ActiveCount(),\n\t\tCompletedCount: todos.CompletedCount(),\n\t}\n\tif data.ActiveCount == 1 {\n\t\tdata.Label = \"item left\"\n\t} else {\n\t\tdata.Label = \"items left\"\n\t}\n\tif strings.HasPrefix(req.RequestURI, \"/active\") {\n\t\tdata.Page = \"active\"\n\t} else if strings.HasPrefix(req.RequestURI, \"/completed\") {\n\t\tdata.Page = \"completed\"\n\t} else {\n\t\tdata.Page = \"all\"\n\t}\n\treturn data\n}", "title": "" }, { "docid": "f040b93d03c1dba1d5dac1a18ef10620", "score": "0.48087236", "text": "func (r *Renderer) RenderFooter(w io.Writer, _ ast.Node) {\n\tr.sectionClose(w, nil)\n\n\tswitch r.documentMatter {\n\tcase ast.DocumentMatterFront:\n\t\tr.outs(w, \"\\n</front>\\n\")\n\tcase ast.DocumentMatterMain:\n\t\tr.outs(w, \"\\n</middle>\\n\")\n\tcase ast.DocumentMatterBack:\n\t\tr.outs(w, \"\\n</back>\\n\")\n\t}\n\n\tif r.title != nil {\n\t\tio.WriteString(w, \"\\n</rfc>\")\n\t}\n}", "title": "" }, { "docid": "da7a2941d807d2eaaf099989a5b528d4", "score": "0.47709435", "text": "func (o *WhatsAppTemplateTemplateStructureApiData) SetFooter(v string) {\n\to.Footer = &v\n}", "title": "" }, { "docid": "ee477b0cf24a9a80071fff8f5c0c600d", "score": "0.47673708", "text": "func TestSetChartLegendInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetChartLegend\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetChartLegend\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"SetChartLegend\", \"shapeIndex\", \"int32\").(int32)\n testlegend, _ := createTestParamValue(\"SetChartLegend\", \"legend\", \"Legend\").(ILegend)\n testpassword, _ := createTestParamValue(\"SetChartLegend\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetChartLegend\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetChartLegend\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetChartLegend\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetChartLegend\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetChartLegend(testname, testslideIndex, testshapeIndex, testlegend, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetChartLegend\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "e3b8f922c3ff369a1b3bbc5bf871ca27", "score": "0.47317556", "text": "func (sc ServiceChecks) WriteFooter(stream *jsoniter.Stream) error {\n\tstream.WriteArrayEnd()\n\treturn stream.Flush()\n}", "title": "" }, { "docid": "a06f57ccb122fd93e9a9daf0a3018fd0", "score": "0.47198886", "text": "func (embed *Embed) SetFooter(footer string) *Embed {\n\tembed.Footer = &discordgo.MessageEmbedFooter{\n\t\tText: footer,\n\t}\n\treturn embed\n}", "title": "" }, { "docid": "71d49d6c1584ecfdaa87c315ec662891", "score": "0.47006422", "text": "func (o GoogleCloudDialogflowV2beta1IntentMessageBrowseCarouselCardBrowseCarouselCardItemResponseOutput) Footer() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudDialogflowV2beta1IntentMessageBrowseCarouselCardBrowseCarouselCardItemResponse) string {\n\t\treturn v.Footer\n\t}).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "4ebbecfea38246df0dcf796cb6eb92be", "score": "0.46653253", "text": "func (a *Attachment) SetFooter(text, iconURL string) *Attachment {\n\ta.Footer = text\n\ta.FooterIcon = iconURL\n\treturn a\n}", "title": "" }, { "docid": "7e8c49d4ac41703f0ea021886269aa0b", "score": "0.4664078", "text": "func (e Eurorack) FooterLocation() panel.Point {\n\treturn panel.Point{X: e.Width() / 2, Y: e.MountingHoleBottomY()}\n}", "title": "" }, { "docid": "3e31c984003cb23666694443846e6456", "score": "0.46410725", "text": "func TestGetNotesSlideHeaderFooterInvalidStorage(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(teststorage, \"GetNotesSlideHeaderFooter\", \"storage\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n teststorage = nullValue\n } else {\n teststorage, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"storage\", teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetNotesSlideHeaderFooter\", \"storage\", \"string\", teststorage, int32(statusCode), e)\n}", "title": "" }, { "docid": "7d584e9e80055192ec7469a2f52b4ef3", "score": "0.46120644", "text": "func TestGetNotesSlideHeaderFooterInvalidFolder(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testfolder, \"GetNotesSlideHeaderFooter\", \"folder\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testfolder = nullValue\n } else {\n testfolder, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"folder\", testfolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetNotesSlideHeaderFooter\", \"folder\", \"string\", testfolder, int32(statusCode), e)\n}", "title": "" }, { "docid": "442c991e99784b09f6bddec0ccbda5e2", "score": "0.46112123", "text": "func TestGetNotesSlideHeaderFooterInvalidPassword(t *testing.T) {\n testname, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"slideIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"GetNotesSlideHeaderFooter\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testpassword, \"GetNotesSlideHeaderFooter\", \"password\", \"string\")\n if (invalidValue == nil) {\n var nullValue string\n testpassword = nullValue\n } else {\n testpassword, _ = invalidValue.(string)\n }\n\n e := InitializeTest(\"GetNotesSlideHeaderFooter\", \"password\", testpassword)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.GetNotesSlideHeaderFooter(testname, testslideIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"GetNotesSlideHeaderFooter\", \"password\", \"string\", testpassword, int32(statusCode), e)\n}", "title": "" }, { "docid": "de9ec279777ffb2ba0fd2e15eaf971d2", "score": "0.4527126", "text": "func (o GoogleCloudDialogflowV2beta1IntentMessageBrowseCarouselCardBrowseCarouselCardItemOutput) Footer() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v GoogleCloudDialogflowV2beta1IntentMessageBrowseCarouselCardBrowseCarouselCardItem) *string {\n\t\treturn v.Footer\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "8d1c8c3f5e0d71dd571aae7987c36bfc", "score": "0.45170036", "text": "func (self *ParquetReader) ReadFooter() {\n\tsize := self.GetFooterSize()\n\tself.PFile.Seek(int(-(int64)(8+size)), 2)\n\tself.Footer = parquet.NewFileMetaData()\n\tpf := thrift.NewTCompactProtocolFactory()\n\tprotocol := pf.GetProtocol(thrift.NewStreamTransportR(self.PFile))\n\tself.Footer.Read(protocol)\n}", "title": "" }, { "docid": "c6fd4312f3570464508741ef0a4e4c07", "score": "0.45165655", "text": "func writeFileFooter(file *os.File, executionTime time.Duration) error {\n\tfooter := breakLine()\n\tfooter += fmt.Sprintf(\"Test execution took %.2f seconds\\n\", executionTime.Seconds())\n\tfooter += GetTimestamp()\n\t_, err := file.WriteString(footer)\n\treturn err\n}", "title": "" }, { "docid": "c9d5204caf5c36f5a19351ccd03e9263", "score": "0.44732964", "text": "func (a *WordsApiService) DeleteHeadersFooters(ctx context.Context, data *models.DeleteHeadersFootersRequest) (*http.Response, error) {\n var (\n )\n\n requestData, err := data.CreateRequestData();\n if err != nil {\n return nil, err\n }\n\n requestData.Path = a.client.cfg.BaseUrl + requestData.Path;\n\n r, err := a.client.prepareRequest(ctx, requestData)\n if err != nil {\n return nil, err\n }\n\n response, err := a.client.callAPI(r)\n defer response.Body.Close()\n\n if err != nil || response == nil {\n return response, err\n }\n if response.StatusCode == 401 {\n return nil, errors.New(\"Access is denied\")\n }\n if response.StatusCode >= 300 {\n var apiError models.WordsApiErrorResponse;\n\n if err = json.NewDecoder(response.Body).Decode(&apiError); err != nil {\n return response, err\n }\n\n return response, &apiError\n }\n return response, err\n}", "title": "" }, { "docid": "3dc5aad6cd59715bbde28dc599f78175", "score": "0.44391868", "text": "func (v *PageSetup) SetBottomMargin(margin float64, unit Unit) {\n\tC.gtk_page_setup_set_bottom_margin(v.native(), C.gdouble(margin), C.GtkUnit(unit))\n}", "title": "" }, { "docid": "9a527c3f132ec7282f966f29870150b6", "score": "0.44324255", "text": "func endSlide() {\n\tfmt.Println(\"</slide>\")\n}", "title": "" }, { "docid": "2aa2e3075c5db7aebc0fe9a86f5e5b0a", "score": "0.44312733", "text": "func WithHeaderFooter(value bool) Setting {\n\treturn func(config *Configuration) {\n\t\tconfig.WrapInHTMLBodyElement = value\n\t}\n}", "title": "" }, { "docid": "e0fa530ad57f53e0a60492c2c696b880", "score": "0.44198072", "text": "func (mr *MockOutputFileSegmenterMockRecorder) AppendFooter(arg0 interface{}, arg1 ...interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\tvarargs := append([]interface{}{arg0}, arg1...)\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"AppendFooter\", reflect.TypeOf((*MockOutputFileSegmenter)(nil).AppendFooter), varargs...)\n}", "title": "" }, { "docid": "7f31df47bed037abf649cd3bd2709f94", "score": "0.44053453", "text": "func TestSetChartLegend(t *testing.T) {\n testname, _ := createTestParamValue(\"SetChartLegend\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetChartLegend\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"SetChartLegend\", \"shapeIndex\", \"int32\").(int32)\n testlegend, _ := createTestParamValue(\"SetChartLegend\", \"legend\", \"Legend\").(ILegend)\n testpassword, _ := createTestParamValue(\"SetChartLegend\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetChartLegend\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetChartLegend\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetChartLegend\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetChartLegend(testname, testslideIndex, testshapeIndex, testlegend, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "e5c47efb7798c187cc854da5bae5e62d", "score": "0.4386424", "text": "func createFooterString(aroundStruct Around, bonduaryStruct Bonduary) string {\n\tvar footerStr bytes.Buffer\n\n\tbonduaryStruct.begin = removeRepeated(aroundStruct, bonduaryStruct.begin)\n\tbonduaryStruct.end = removeRepeated(aroundStruct, bonduaryStruct.end)\n\n\tfooterArray := append(bonduaryStruct.begin, aroundStruct.pages...)\n\tif bonduaryStruct.begin[0] > aroundStruct.pages[0] {\n\t\tfooterArray = append(aroundStruct.pages, bonduaryStruct.begin...)\n\t}\n\tfooterArray = append(footerArray, bonduaryStruct.end...)\n\n\tfooterStr.WriteString(footerHiddenPages(footerArray)[0])\n\tfor _, pageNum := range footerHiddenPages(footerArray)[1:] {\n\t\tfooterStr.WriteString(\" \")\n\t\tfooterStr.WriteString(pageNum)\n\t}\n\n\treturn footerStr.String()\n}", "title": "" }, { "docid": "2c21e4fbb3d0c5c65ef64c976f065216", "score": "0.43831065", "text": "func (t *Table) SetFooterVariadic(keys ...string) {\n\tt.SetFooter(keys)\n}", "title": "" }, { "docid": "968a80d842c130ebe2361b278fa0db98", "score": "0.4379381", "text": "func TestSetChartAxisInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetChartAxis\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetChartAxis\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"SetChartAxis\", \"shapeIndex\", \"int32\").(int32)\n testaxisType, _ := createTestParamValue(\"SetChartAxis\", \"axisType\", \"string\").(string)\n testaxis, _ := createTestParamValue(\"SetChartAxis\", \"axis\", \"Axis\").(IAxis)\n testpassword, _ := createTestParamValue(\"SetChartAxis\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetChartAxis\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetChartAxis\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetChartAxis\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetChartAxis\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetChartAxis(testname, testslideIndex, testshapeIndex, testaxisType, testaxis, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetChartAxis\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "81923f4bfcbb370bda343c2443d6e162", "score": "0.43763328", "text": "func UpdateEnduserMessagesDlpFooterPart(client sophos.ClientInterface, val string, options ...sophos.Option) (err error) {\n\treturn put(client, \"/api/nodes/enduser_messages.dlp.footer_part\", val, options...)\n}", "title": "" }, { "docid": "8166a4d923a44cf94edc741bafce4b54", "score": "0.43465745", "text": "func (r *Renderer) RenderFooter(w io.Writer, ast *bf.Node) {\n\tr.Base.RenderFooter(w, ast)\n}", "title": "" }, { "docid": "9a37184036781de5c0671923e3d3ae9b", "score": "0.4334804", "text": "func TestSetChartSeriesGroupInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetChartSeriesGroup\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetChartSeriesGroup\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"SetChartSeriesGroup\", \"shapeIndex\", \"int32\").(int32)\n testseriesGroupIndex, _ := createTestParamValue(\"SetChartSeriesGroup\", \"seriesGroupIndex\", \"int32\").(int32)\n testseriesGroup, _ := createTestParamValue(\"SetChartSeriesGroup\", \"seriesGroup\", \"ChartSeriesGroup\").(IChartSeriesGroup)\n testpassword, _ := createTestParamValue(\"SetChartSeriesGroup\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetChartSeriesGroup\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetChartSeriesGroup\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetChartSeriesGroup\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetChartSeriesGroup\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetChartSeriesGroup(testname, testslideIndex, testshapeIndex, testseriesGroupIndex, testseriesGroup, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetChartSeriesGroup\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "53a5a29365b773dd3f9cbd13c696161d", "score": "0.43296018", "text": "func (p PageMarginHeader) setPageMargins(pm *xlsxPageMargins) {\n\tpm.Header = float64(p)\n}", "title": "" }, { "docid": "a0a75f6b725e79aea0badcd9053e6ecd", "score": "0.43239552", "text": "func TestUpdateLayoutSlide(t *testing.T) {\n testname, _ := createTestParamValue(\"UpdateLayoutSlide\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"UpdateLayoutSlide\", \"slideIndex\", \"int32\").(int32)\n testslideDto, _ := createTestParamValue(\"UpdateLayoutSlide\", \"slideDto\", \"LayoutSlide\").(ILayoutSlide)\n testpassword, _ := createTestParamValue(\"UpdateLayoutSlide\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"UpdateLayoutSlide\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"UpdateLayoutSlide\", \"storage\", \"string\").(string)\n e := InitializeTest(\"UpdateLayoutSlide\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.UpdateLayoutSlide(testname, testslideIndex, testslideDto, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "11ae62c824536178341e4f4101f41841", "score": "0.43002048", "text": "func (*TSVFormatter) GetFooter() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "c74125fb26a131062269f86b79de45cc", "score": "0.42971382", "text": "func (s *BaseCobol85Listener) ExitProcedureSectionHeader(ctx *ProcedureSectionHeaderContext) {}", "title": "" }, { "docid": "4b731f6d1d311b0fcda0ae992173be4e", "score": "0.4292566", "text": "func TestSetSpecialSlideAnimation(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"slideIndex\", \"int32\").(int32)\n testslideType, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"slideType\", \"string\").(string)\n testanimation, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"animation\", \"SlideAnimation\").(ISlideAnimation)\n testpassword, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetSpecialSlideAnimation\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetSpecialSlideAnimation(testname, testslideIndex, testslideType, testanimation, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "cbea80423fa9b505c21b300e80ee361e", "score": "0.42862317", "text": "func TestDeleteTableCellParagraphInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"shapeIndex\", \"int32\").(int32)\n testrowIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"rowIndex\", \"int32\").(int32)\n testcellIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"cellIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"paragraphIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"DeleteTableCellParagraph\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"DeleteTableCellParagraph\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.DeleteTableCellParagraph(testname, testslideIndex, testshapeIndex, testrowIndex, testcellIndex, testparagraphIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"DeleteTableCellParagraph\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "90b17b7d1c254c5e8e18b139ff2e1fa6", "score": "0.4276994", "text": "func (p PageMarginBottom) setPageMargins(pm *xlsxPageMargins) {\n\tpm.Bottom = float64(p)\n}", "title": "" }, { "docid": "19f8b2be6be0dd9931efa95b814aacc8", "score": "0.42738685", "text": "func TestDeleteSpecialSlideAnimation(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"slideIndex\", \"int32\").(int32)\n testslideType, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"slideType\", \"string\").(string)\n testpassword, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteSpecialSlideAnimation\", \"storage\", \"string\").(string)\n e := InitializeTest(\"DeleteSpecialSlideAnimation\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.DeleteSpecialSlideAnimation(testname, testslideIndex, testslideType, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "a472437cdcf2f5ca4fc2ab9ad6252e1c", "score": "0.42697257", "text": "func TestSaveSlideInvalidHeight(t *testing.T) {\n testname, _ := createTestParamValue(\"SaveSlide\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SaveSlide\", \"slideIndex\", \"int32\").(int32)\n testformat, _ := createTestParamValue(\"SaveSlide\", \"format\", \"string\").(string)\n testoutPath, _ := createTestParamValue(\"SaveSlide\", \"outPath\", \"string\").(string)\n testoptions, _ := createTestParamValue(\"SaveSlide\", \"options\", \"ExportOptions\").(IExportOptions)\n var testwidth *int32\n testwidthValue := createTestParamValue(\"SaveSlide\", \"width\", \"int32\")\n if (testwidthValue != nil) {\n testwidth = new(int32)\n *testwidth, _ = testwidthValue.(int32)\n }\n var testheight *int32\n testheightValue := createTestParamValue(\"SaveSlide\", \"height\", \"int32\")\n if (testheightValue != nil) {\n testheight = new(int32)\n *testheight, _ = testheightValue.(int32)\n }\n testpassword, _ := createTestParamValue(\"SaveSlide\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SaveSlide\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SaveSlide\", \"storage\", \"string\").(string)\n testfontsFolder, _ := createTestParamValue(\"SaveSlide\", \"fontsFolder\", \"string\").(string)\n testheight = new(int32)\n\n invalidValue := invalidizeTestParamValue(testheight, \"SaveSlide\", \"height\", \"int32\")\n if (invalidValue == nil) {\n var nullValue *int32\n testheight = nullValue\n } else {\n *testheight, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SaveSlide\", \"height\", testheight)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n r, e := GetTestApiClient().SlidesApi.SaveSlide(testname, testslideIndex, testformat, testoutPath, testoptions, testwidth, testheight, testpassword, testfolder, teststorage, testfontsFolder)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SaveSlide\", \"height\", \"int32\", testheight, int32(statusCode), e)\n}", "title": "" }, { "docid": "c22dfbd997f3484c0087fea230856bee", "score": "0.4267281", "text": "func (o *WhatsAppTemplateTemplateStructureApiData) GetFooterOk() (*string, bool) {\n\tif o == nil || o.Footer == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Footer, true\n}", "title": "" }, { "docid": "2a226c4714acb780e6469c9901b29ae9", "score": "0.42644137", "text": "func TestSaveSlide(t *testing.T) {\n testname, _ := createTestParamValue(\"SaveSlide\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SaveSlide\", \"slideIndex\", \"int32\").(int32)\n testformat, _ := createTestParamValue(\"SaveSlide\", \"format\", \"string\").(string)\n testoutPath, _ := createTestParamValue(\"SaveSlide\", \"outPath\", \"string\").(string)\n testoptions, _ := createTestParamValue(\"SaveSlide\", \"options\", \"ExportOptions\").(IExportOptions)\n var testwidth *int32\n testwidthValue := createTestParamValue(\"SaveSlide\", \"width\", \"int32\")\n if (testwidthValue != nil) {\n testwidth = new(int32)\n *testwidth, _ = testwidthValue.(int32)\n }\n var testheight *int32\n testheightValue := createTestParamValue(\"SaveSlide\", \"height\", \"int32\")\n if (testheightValue != nil) {\n testheight = new(int32)\n *testheight, _ = testheightValue.(int32)\n }\n testpassword, _ := createTestParamValue(\"SaveSlide\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SaveSlide\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SaveSlide\", \"storage\", \"string\").(string)\n testfontsFolder, _ := createTestParamValue(\"SaveSlide\", \"fontsFolder\", \"string\").(string)\n e := InitializeTest(\"SaveSlide\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, e = c.SlidesApi.SaveSlide(testname, testslideIndex, testformat, testoutPath, testoptions, testwidth, testheight, testpassword, testfolder, teststorage, testfontsFolder)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "d74cfef20f4149ad3ea5aa5a95963637", "score": "0.42626324", "text": "func TestDeleteSection(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteSection\", \"name\", \"string\").(string)\n testsectionIndex, _ := createTestParamValue(\"DeleteSection\", \"sectionIndex\", \"int32\").(int32)\n var testwithSlides *bool\n testwithSlidesValue := createTestParamValue(\"DeleteSection\", \"withSlides\", \"bool\")\n if (testwithSlidesValue != nil) {\n testwithSlides = new(bool)\n *testwithSlides, _ = testwithSlidesValue.(bool)\n }\n testpassword, _ := createTestParamValue(\"DeleteSection\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteSection\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteSection\", \"storage\", \"string\").(string)\n e := InitializeTest(\"DeleteSection\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.DeleteSection(testname, testsectionIndex, testwithSlides, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "48456301b709bafcb1ef7eb60af0a980", "score": "0.42432117", "text": "func TestUpdateTableCellParagraphInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"shapeIndex\", \"int32\").(int32)\n testrowIndex, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"rowIndex\", \"int32\").(int32)\n testcellIndex, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"cellIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"paragraphIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"dto\", \"Paragraph\").(IParagraph)\n testpassword, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"UpdateTableCellParagraph\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"UpdateTableCellParagraph\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"UpdateTableCellParagraph\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.UpdateTableCellParagraph(testname, testslideIndex, testshapeIndex, testrowIndex, testcellIndex, testparagraphIndex, testdto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"UpdateTableCellParagraph\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "06566067e7403b26beb04ab27c461352", "score": "0.42338017", "text": "func (*MarkdownFormatter) GetFooter() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "65c718853f1a27604a22cfc80bd3348b", "score": "0.4233708", "text": "func TestSetSections(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSections\", \"name\", \"string\").(string)\n testsections, _ := createTestParamValue(\"SetSections\", \"sections\", \"Sections\").(ISections)\n testpassword, _ := createTestParamValue(\"SetSections\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSections\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSections\", \"storage\", \"string\").(string)\n e := InitializeTest(\"SetSections\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.SetSections(testname, testsections, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "df1c145b5e766eea9aa237123280a731", "score": "0.42326546", "text": "func TestDeleteSectionInvalidSectionIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteSection\", \"name\", \"string\").(string)\n testsectionIndex, _ := createTestParamValue(\"DeleteSection\", \"sectionIndex\", \"int32\").(int32)\n var testwithSlides *bool\n testwithSlidesValue := createTestParamValue(\"DeleteSection\", \"withSlides\", \"bool\")\n if (testwithSlidesValue != nil) {\n testwithSlides = new(bool)\n *testwithSlides, _ = testwithSlidesValue.(bool)\n }\n testpassword, _ := createTestParamValue(\"DeleteSection\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteSection\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteSection\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testsectionIndex, \"DeleteSection\", \"sectionIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testsectionIndex = nullValue\n } else {\n testsectionIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"DeleteSection\", \"sectionIndex\", testsectionIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.DeleteSection(testname, testsectionIndex, testwithSlides, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"DeleteSection\", \"sectionIndex\", \"int32\", testsectionIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "4062a07c60d2b07c519cfcbaa1fba6a4", "score": "0.4225397", "text": "func TestDeleteTableCellPortionInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteTableCellPortion\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"shapeIndex\", \"int32\").(int32)\n testrowIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"rowIndex\", \"int32\").(int32)\n testcellIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"cellIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"paragraphIndex\", \"int32\").(int32)\n testportionIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"portionIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"DeleteTableCellPortion\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteTableCellPortion\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteTableCellPortion\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"DeleteTableCellPortion\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"DeleteTableCellPortion\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.DeleteTableCellPortion(testname, testslideIndex, testshapeIndex, testrowIndex, testcellIndex, testparagraphIndex, testportionIndex, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"DeleteTableCellPortion\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "6477f64916cb36f995cb46510cbdf7e9", "score": "0.42161846", "text": "func TestDeleteSpecialSlideParagraph(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"slideIndex\", \"int32\").(int32)\n testslideType, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"slideType\", \"string\").(string)\n testshapeIndex, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"shapeIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"paragraphIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"storage\", \"string\").(string)\n testsubShape, _ := createTestParamValue(\"DeleteSpecialSlideParagraph\", \"subShape\", \"string\").(string)\n e := InitializeTest(\"DeleteSpecialSlideParagraph\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.DeleteSpecialSlideParagraph(testname, testslideIndex, testslideType, testshapeIndex, testparagraphIndex, testpassword, testfolder, teststorage, testsubShape)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "213487206fa8814a6cf0a3d0f0d1c9c6", "score": "0.41797352", "text": "func TestDeleteTableCellPortion(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteTableCellPortion\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"shapeIndex\", \"int32\").(int32)\n testrowIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"rowIndex\", \"int32\").(int32)\n testcellIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"cellIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"paragraphIndex\", \"int32\").(int32)\n testportionIndex, _ := createTestParamValue(\"DeleteTableCellPortion\", \"portionIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"DeleteTableCellPortion\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteTableCellPortion\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteTableCellPortion\", \"storage\", \"string\").(string)\n e := InitializeTest(\"DeleteTableCellPortion\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.DeleteTableCellPortion(testname, testslideIndex, testshapeIndex, testrowIndex, testcellIndex, testparagraphIndex, testportionIndex, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "81ac75cbc3ed402e0db0b93b123b28ce", "score": "0.41781187", "text": "func TestDeleteTableCellParagraph(t *testing.T) {\n testname, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"slideIndex\", \"int32\").(int32)\n testshapeIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"shapeIndex\", \"int32\").(int32)\n testrowIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"rowIndex\", \"int32\").(int32)\n testcellIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"cellIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"paragraphIndex\", \"int32\").(int32)\n testpassword, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"DeleteTableCellParagraph\", \"storage\", \"string\").(string)\n e := InitializeTest(\"DeleteTableCellParagraph\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.DeleteTableCellParagraph(testname, testslideIndex, testshapeIndex, testrowIndex, testcellIndex, testparagraphIndex, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "394731bf1a549dec05739b1ae5013915", "score": "0.41776615", "text": "func TestSaveSlideInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SaveSlide\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SaveSlide\", \"slideIndex\", \"int32\").(int32)\n testformat, _ := createTestParamValue(\"SaveSlide\", \"format\", \"string\").(string)\n testoutPath, _ := createTestParamValue(\"SaveSlide\", \"outPath\", \"string\").(string)\n testoptions, _ := createTestParamValue(\"SaveSlide\", \"options\", \"ExportOptions\").(IExportOptions)\n var testwidth *int32\n testwidthValue := createTestParamValue(\"SaveSlide\", \"width\", \"int32\")\n if (testwidthValue != nil) {\n testwidth = new(int32)\n *testwidth, _ = testwidthValue.(int32)\n }\n var testheight *int32\n testheightValue := createTestParamValue(\"SaveSlide\", \"height\", \"int32\")\n if (testheightValue != nil) {\n testheight = new(int32)\n *testheight, _ = testheightValue.(int32)\n }\n testpassword, _ := createTestParamValue(\"SaveSlide\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SaveSlide\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SaveSlide\", \"storage\", \"string\").(string)\n testfontsFolder, _ := createTestParamValue(\"SaveSlide\", \"fontsFolder\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SaveSlide\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SaveSlide\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n r, e := GetTestApiClient().SlidesApi.SaveSlide(testname, testslideIndex, testformat, testoutPath, testoptions, testwidth, testheight, testpassword, testfolder, teststorage, testfontsFolder)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SaveSlide\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "a2a7583fbd824e915f716e63c2d23ea3", "score": "0.4174905", "text": "func TestUpdateSection(t *testing.T) {\n testname, _ := createTestParamValue(\"UpdateSection\", \"name\", \"string\").(string)\n testsectionIndex, _ := createTestParamValue(\"UpdateSection\", \"sectionIndex\", \"int32\").(int32)\n testsectionName, _ := createTestParamValue(\"UpdateSection\", \"sectionName\", \"string\").(string)\n testpassword, _ := createTestParamValue(\"UpdateSection\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"UpdateSection\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"UpdateSection\", \"storage\", \"string\").(string)\n e := InitializeTest(\"UpdateSection\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.UpdateSection(testname, testsectionIndex, testsectionName, testpassword, testfolder, teststorage)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "120c2a4a706b66d254438cb1e696a063", "score": "0.41710684", "text": "func (*MarkdownCodeFormatter) GetFooter() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "e66e1d98233d79078d225c6fec6398a5", "score": "0.41576788", "text": "func TestUpdateSpecialSlideParagraph(t *testing.T) {\n testname, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"slideIndex\", \"int32\").(int32)\n testslideType, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"slideType\", \"string\").(string)\n testshapeIndex, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"shapeIndex\", \"int32\").(int32)\n testparagraphIndex, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"paragraphIndex\", \"int32\").(int32)\n testdto, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"dto\", \"Paragraph\").(IParagraph)\n testpassword, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"storage\", \"string\").(string)\n testsubShape, _ := createTestParamValue(\"UpdateSpecialSlideParagraph\", \"subShape\", \"string\").(string)\n e := InitializeTest(\"UpdateSpecialSlideParagraph\", \"\", \"\")\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n c := GetTestApiClient()\n _, _, e = c.SlidesApi.UpdateSpecialSlideParagraph(testname, testslideIndex, testslideType, testshapeIndex, testparagraphIndex, testdto, testpassword, testfolder, teststorage, testsubShape)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n}", "title": "" }, { "docid": "4cf75b2de640410872ea5ff3ce125d32", "score": "0.41418302", "text": "func TestSetSpecialSlideAnimationInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"slideIndex\", \"int32\").(int32)\n testslideType, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"slideType\", \"string\").(string)\n testanimation, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"animation\", \"SlideAnimation\").(ISlideAnimation)\n testpassword, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"SetSpecialSlideAnimation\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"SetSpecialSlideAnimation\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"SetSpecialSlideAnimation\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.SetSpecialSlideAnimation(testname, testslideIndex, testslideType, testanimation, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"SetSpecialSlideAnimation\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" }, { "docid": "ad4a0e3823b3a240b15c1445bfe06b8a", "score": "0.41362077", "text": "func TestUpdateLayoutSlideInvalidSlideIndex(t *testing.T) {\n testname, _ := createTestParamValue(\"UpdateLayoutSlide\", \"name\", \"string\").(string)\n testslideIndex, _ := createTestParamValue(\"UpdateLayoutSlide\", \"slideIndex\", \"int32\").(int32)\n testslideDto, _ := createTestParamValue(\"UpdateLayoutSlide\", \"slideDto\", \"LayoutSlide\").(ILayoutSlide)\n testpassword, _ := createTestParamValue(\"UpdateLayoutSlide\", \"password\", \"string\").(string)\n testfolder, _ := createTestParamValue(\"UpdateLayoutSlide\", \"folder\", \"string\").(string)\n teststorage, _ := createTestParamValue(\"UpdateLayoutSlide\", \"storage\", \"string\").(string)\n\n invalidValue := invalidizeTestParamValue(testslideIndex, \"UpdateLayoutSlide\", \"slideIndex\", \"int32\")\n if (invalidValue == nil) {\n var nullValue int32\n testslideIndex = nullValue\n } else {\n testslideIndex, _ = invalidValue.(int32)\n }\n\n e := InitializeTest(\"UpdateLayoutSlide\", \"slideIndex\", testslideIndex)\n if e != nil {\n t.Errorf(\"Error: %v.\", e)\n return\n }\n _, r, e := GetTestApiClient().SlidesApi.UpdateLayoutSlide(testname, testslideIndex, testslideDto, testpassword, testfolder, teststorage)\n statusCode := 400\n if r != nil {\n statusCode = r.StatusCode\n }\n assertError(t, \"UpdateLayoutSlide\", \"slideIndex\", \"int32\", testslideIndex, int32(statusCode), e)\n}", "title": "" } ]
9fca5199cdf7cf0263ac34f4f5c00a26
SetAdditionalData sets the additionalData property value. Stores additional data not described in the OpenAPI description found when deserializing. Can be used for serialization as well.
[ { "docid": "322857f4a5c24a51b3b9793aee757449", "score": "0.76854837", "text": "func (m *ScheduleEntity) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" } ]
[ { "docid": "9642f05c6f6618e847eec1db5fd81781", "score": "0.84001416", "text": "func (m *WorkforceIntegrationEncryption) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "389c083571d3d2d6c2b12917082bb475", "score": "0.8386653", "text": "func (m *EdgeSearchEngineBase) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "483bff12f3c908cbdeb2168f4081c511", "score": "0.83674693", "text": "func (m *UnfavoritePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "4bf91fdf00aa7c0a2d0cd543da8e90b2", "score": "0.8363488", "text": "func (m *AssignLicensePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "a71c92415d17566f70f6ac761a8a18ba", "score": "0.83481175", "text": "func (m *ProvisioningStep) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "06da3c180c52984c8c48b4d5943529a3", "score": "0.831025", "text": "func (m *DeviceOperatingSystemSummary) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "b6cdb5f7fbc4d57f30157f4f0069a44a", "score": "0.8288066", "text": "func (m *VerifiedPublisher) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f70998e8e92c0b3731730dbb1fed1cd2", "score": "0.8285977", "text": "func (m *AccessPackageAssignmentReviewSettings) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "54e0e1746b22cc3da3e1bd17f9fbf4e7", "score": "0.8282839", "text": "func (m *DocumentSetContent) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "ae6142f8dcb5e49888e538aca1abee6b", "score": "0.8278091", "text": "func (m *EducationRoot) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f972ef7234dfeb072cc9364fccb94345", "score": "0.82489866", "text": "func (m *DocumentSet) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f47734b463cb5f858b2ac2784745d339", "score": "0.822358", "text": "func (m *RequiredResourceAccess) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "da3647b5ceb915bebfa6804bdb709daf", "score": "0.8209694", "text": "func (m *InvitePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "457c78af75bb059205c28437f3f88386", "score": "0.8180554", "text": "func (m *InformationalUrl) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "0b9fdebd6b293acffdcca94b8d46095e", "score": "0.8166377", "text": "func (m *AccessPackageAssignmentRequestRequirements) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "606ee5d92e8491c778f42d2be489f3d9", "score": "0.8161452", "text": "func (m *CreateOrGetPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f55150a85f6de332fabe2759f9752e1f", "score": "0.8155807", "text": "func (m *AuthenticationMethodsRegistrationCampaign) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "24435b711f96983f060dff197484ac4a", "score": "0.8144931", "text": "func (m *DeviceHealthAttestationState) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "81ac503d86b05fa0bfd87650ea981052", "score": "0.8120311", "text": "func (m *ImageInfo) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "4873527bc93acabcb1d73e24ba7b43c4", "score": "0.8106709", "text": "func (m *DismissPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "9f5f324a61542117156890975d0842f3", "score": "0.8103305", "text": "func (m *ProvisionedPlan) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "6d617ddc29e61e977e872fd05347445c", "score": "0.8093076", "text": "func (m *ImplicitGrantSettings) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "7b0bf6d562b426f5233c008db8018e5b", "score": "0.80721104", "text": "func (m *AddGroupPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "7fbcb126eb714195ab0a479106db6d21", "score": "0.80557775", "text": "func (m *MarkUnreadPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "52a851e7331d4bf64e0373c7eb7e5649", "score": "0.8055277", "text": "func (m *SubjectRightsRequestHistory) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "06d4197a3785ea759344a098f77ec1ec", "score": "0.8054699", "text": "func (m *CopyPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "41649ee848d583856b6b79c7a604be0d", "score": "0.8050649", "text": "func (m *OnenotePagePreview) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "3f023b8953196e2969a504934807744e", "score": "0.80490774", "text": "func (m *UserAgent) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "c909e37533e14497c7348df92b0adeff", "score": "0.80199957", "text": "func (m *RiskUserActivity) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "8cf493b6d5d68c5fcae2efa9832007a5", "score": "0.79923266", "text": "func (m *AlterationResponse) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "4bc6282c7f2e9bb20acf5fb35fc409b8", "score": "0.7983122", "text": "func (m *EmployeeOrgData) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "05b412d8266b37ad1183e52589519e09", "score": "0.79813904", "text": "func (m *SetPresencePostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f487d09674bd13fd75b97e7a451645ed", "score": "0.79776025", "text": "func (m *RemoveKeyPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "a4e5351202f1347f457931e721303b66", "score": "0.7973419", "text": "func (m *UpdateRecordingStatusPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "b88b8bdf7de94ee30778394cd87f17bd", "score": "0.79552513", "text": "func (m *AverageComparativeScore) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "119983dad4ce923ec9e234cf0208803c", "score": "0.79506975", "text": "func (m *MacOSLobChildApp) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "df90caacce3d03ef250043d11497850e", "score": "0.7936653", "text": "func (m *QueryPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "6adedabc5a3009e3b6bd4bed8b68003b", "score": "0.7925245", "text": "func (m *LobbyBypassSettings) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "8dd4d5e998af5ee2b5e37f21b279f514", "score": "0.7915873", "text": "func (m *SendMailPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "5baa4080a0965ac10f57362150d005a8", "score": "0.7912656", "text": "func (m *WindowsFirewallNetworkProfile) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "a59d9a643f1100fc6ebee4b926620751", "score": "0.7903407", "text": "func (m *TraceRouteHop) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "6d8aaf57d10b1024946b1f04c811a8a2", "score": "0.7895114", "text": "func (m *PowerliftIncidentMetadata) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "da4375656f5c9b342cf8dddc705bdebe", "score": "0.787664", "text": "func (m *DomainState) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "1a3d1b52b4832b73adf01f10f38b9e72", "score": "0.7859704", "text": "func (m *SignInStatus) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "4da6d331a35c5e689c8f7000bdb768d8", "score": "0.78526676", "text": "func (m *WindowsInformationProtectionIPRangeCollection) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "c08dc6923fbf2418e58ba6d8f9df9641", "score": "0.7840584", "text": "func (m *RemoveGroupPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "e5a0f2e06cc6bc7a9e28c25144a8fc41", "score": "0.78344804", "text": "func (m *Win32LobAppRule) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f5179781e35e704821e8938469af3c4b", "score": "0.78311837", "text": "func (m *OathTokenMetadata) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c59b4f2641334ce2de52c51830ef85fc", "score": "0.78139", "text": "func (m *PasswordResetResponse) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "5f9abbc51a42f686ca3d3aef226f945b", "score": "0.77980965", "text": "func (m *ItemItemsItemWorkbookFunctionsReplacePostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "923e8c5c91f7b86554e70a91f0798bc1", "score": "0.7772463", "text": "func (m *ProvisioningErrorInfo) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "d76de88e817e2a97806ce8fa70a11f74", "score": "0.7755162", "text": "func (m *PayloadByFilter) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "ea4f82436f84f4e66cb71522ea06c64a", "score": "0.77151585", "text": "func (m *CalculatedColumn) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "f1811c4ae3153b421d03992da8aa0dd3", "score": "0.77149194", "text": "func (m *DeviceManagementSettingInsightsDefinition) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "ebfa63cad65e44d94f4e882f3e8502d3", "score": "0.77124286", "text": "func (m *WindowsInformationProtectionProxiedDomainCollection) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "1efbf3c1209e28e4ac55d307908da542", "score": "0.77059674", "text": "func (m *UserTrainingEventInfo) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "3272776da8f367997684694f98e9d5b5", "score": "0.7701056", "text": "func (m *GetMemberGroupsPostRequestBody) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "66555e97f5627bc115056745171407b2", "score": "0.76973045", "text": "func (m *VmMetadata) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "827547f701dfdc49853b3f57a95e405a", "score": "0.7696682", "text": "func (m *RecommendedAction) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "3d64713cf321b60f2e45d8bf64268b88", "score": "0.76884085", "text": "func (o *GenerateTokenByNewHeadlessAccountV3Params) SetAdditionalData(additionalData *string) {\n\to.AdditionalData = additionalData\n}", "title": "" }, { "docid": "5b595fae4aadf74ab542f9798d4cdbe2", "score": "0.7682776", "text": "func (m *TrainingEventsContent) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6ec5228a867fdc17f79fc930b57b7bdc", "score": "0.76465315", "text": "func (m *DeviceComplianceScriptsItemAssignPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "ff607ea235d7c4e16c123d55356ed532", "score": "0.7643285", "text": "func (m *ItemItemsItemWorkbookFunctionsEoMonthPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "bd77348098cc10496d1b8816175e8cb9", "score": "0.7631079", "text": "func (m *GeneralLedgerEntry) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "89c407cd6e7a446e5e0e76e449e95882", "score": "0.76276964", "text": "func (m *OcrSettings) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "2d7520183ea307e8bef9cc8a250902c5", "score": "0.7605845", "text": "func (m *ItemItemsItemWorkbookFunctionsFindBPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6481cb5de76d67666d8a8dd957cc2682", "score": "0.7591438", "text": "func (m *ResourceVisualization) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9259c795c6c9a12da97c45bc46a310f0", "score": "0.7585113", "text": "func (m *ComanagedDevicesItemActivateDeviceEsimPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "b5637cc2fecdb0e80b1e11f6ff7280d0", "score": "0.7584568", "text": "func (m *AuthenticationAttributeCollectionOptionConfiguration) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "29900fb2c2e4b47d13a94684569f2dda", "score": "0.7583791", "text": "func (m *Financials) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "15d3d8ecde727c50dff8d58ab92e0ce9", "score": "0.7570279", "text": "func (m *ComanagementEligibleDevicesSummary) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f3b753ba8d979b560b93e6047ce61921", "score": "0.7569351", "text": "func (m *X509CertificateAuthenticationModeConfiguration) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "60822370ecf9386d03679426d8069c5a", "score": "0.75660187", "text": "func (m *RoleManagement) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "15f98e3ea3fb2f49fd7a0b0733cdac48", "score": "0.7563955", "text": "func (m *Property) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "0f982f091f801c09b1004a5668d89709", "score": "0.75576353", "text": "func (m *ChatMessageMention) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "feae46f7db7ce7473cf1d88a24d295b1", "score": "0.7554797", "text": "func (m *TeamworkPeripheralsHealth) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "d3050abda3f14c0ba761b4f26105d817", "score": "0.75284165", "text": "func (m *BulkManagedDeviceActionResult) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "e3c482526662d0a19183f9f783921f28", "score": "0.7521168", "text": "func (m *ItemUpdatePasswordSingleSignOnCredentialsPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "059fa190ecd38ce43f691a2d9830fce1", "score": "0.7518612", "text": "func (m *JournalLine) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "c65662b922da2ac99032b63a9409d181", "score": "0.75161886", "text": "func (m *PlannerCategoryDescriptions) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "dcfb44a5dd5c9bdb26cd1d8f7cec5d2a", "score": "0.751304", "text": "func (m *UserTrainingContentEventInfo) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "b46943ecafa225e5f44bd7b63a7356ec", "score": "0.7509568", "text": "func (m *DocumentSet) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "f08d24d7d5285c098bfdce321ebf3620", "score": "0.7499709", "text": "func (m *StandardTimeZoneOffset) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "27fcc264d26f81b6d560c31dfddabb07", "score": "0.7499261", "text": "func (m *AssignmentFilterEvaluationSummary) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "a3f1e12493c85ab944daa64d2fd2bf18", "score": "0.74928814", "text": "func (m *DeviceHealthScriptRemediationHistoryData) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "b0c2a6ed3293080cace30c56acb7824a", "score": "0.7490313", "text": "func (m *DeviceManagementTroubleshootingErrorDetails) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "db58074a2828eacd7386296e24dfdb04", "score": "0.7482145", "text": "func (m *DeploymentState) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "9a459756d6eaa8721873bb083bf5a669", "score": "0.74776083", "text": "func (m *TeamworkHardwareConfiguration) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "1c20297ed97d8ad6898c4dbd63ea08e9", "score": "0.747414", "text": "func (m *CompanyInformation) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "7693a02e4c0c7dc49ec3b721229ddd8d", "score": "0.7473084", "text": "func (m *RelatedPerson) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "1490c98464ccfeab6d7221ad232f3ae9", "score": "0.74680245", "text": "func (m *MessageRuleActions) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "2adca314e98a59c5aa80f00351041143", "score": "0.7462243", "text": "func (m *VerifiedDomain) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "d147cf4357e5b62e0d3b50b8e11dfe1c", "score": "0.7454242", "text": "func (m *ChatMessagePolicyViolationPolicyTip) SetAdditionalData(value map[string]interface{})() {\n m.additionalData = value\n}", "title": "" }, { "docid": "134ec5fef189231f8bf16fa0263f894e", "score": "0.74503154", "text": "func (m *ChatInfo) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "44ca62dd2a78633a61fbc19aeff0fde2", "score": "0.7448205", "text": "func (m *BusinessScenariosItemPlannerGetPlanPostRequestBody) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "b9d6da782511ccbbc5681f34b9e01421", "score": "0.7437706", "text": "func (m *ConditionalAccessClientApplications) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "8aed749059b790dc8c60aa90782b37b5", "score": "0.74290454", "text": "func (m *Entity) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "6878c7a16baacf72cfb513d7b16b6b98", "score": "0.7400784", "text": "func (m *SalesOrder) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "4f1189459e3be0623b83c031a67fc9f0", "score": "0.7399711", "text": "func (m *MicrosoftAuthenticatorFeatureSettings) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" }, { "docid": "cd6dc4b4fc63a048c80f2f0110caf453", "score": "0.7390934", "text": "func (m *CertificateConnectorSetting) SetAdditionalData(value map[string]any)() {\n err := m.GetBackingStore().Set(\"additionalData\", value)\n if err != nil {\n panic(err)\n }\n}", "title": "" } ]
a9320f753a8dfa58566e8bf62ac29970
Deprecated: Use CarePlan_StatusCode.ProtoReflect.Descriptor instead.
[ { "docid": "5ae702039bf5b0a7b7de0305e94c9bf0", "score": "0.70148957", "text": "func (*CarePlan_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_care_plan_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" } ]
[ { "docid": "5906b607b139ccf6690adea4c55347e9", "score": "0.6819845", "text": "func (*CarePlan_Activity_Detail_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_care_plan_proto_rawDescGZIP(), []int{0, 2, 0, 1}\n}", "title": "" }, { "docid": "df6c0692b211284838fbc5577b3a73e8", "score": "0.6781541", "text": "func (*PlanDefinition_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_plan_definition_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "6c7e609cf590acf8f95390dd195b66a6", "score": "0.6595153", "text": "func (StatusProto_StatusCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_jina_proto_rawDescGZIP(), []int{4, 0}\n}", "title": "" }, { "docid": "f32702c5fc804c5e7bdbd040929cb500", "score": "0.6466586", "text": "func (StatusCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_envoy_type_v3_http_status_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "8c86740f5d16ab3b1918b0b1b1222b58", "score": "0.6382222", "text": "func (FailureDetails_Type) EnumDescriptor() ([]byte, []int) {\n\treturn file_go_chromium_org_luci_luciexe_legacy_annotee_proto_annotations_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "d3212b5c7b610c7e2a496fe1b5fb0617", "score": "0.63428706", "text": "func (PlanType) EnumDescriptor() ([]byte, []int) {\n\treturn file_plans_plans_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "ebb120e9ba5f5e32b1955520d5be753d", "score": "0.63277394", "text": "func (*GetNotificationChannelVerificationCodeResponse) Descriptor() ([]byte, []int) {\n\treturn file_google_monitoring_v3_notification_service_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "ceabb14c3ffa3f773459695571c7c68d", "score": "0.6322943", "text": "func (StatusCondition_Code) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_container_v1_cluster_service_proto_rawDescGZIP(), []int{106, 0}\n}", "title": "" }, { "docid": "42590e37609a56aab234615cdb72ec96", "score": "0.63200414", "text": "func (ProjectStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_zeropsApiProtocol_proto_rawDescGZIP(), []int{6}\n}", "title": "" }, { "docid": "862659e9af6b96b79fd18aa2cd66ecd6", "score": "0.63185143", "text": "func (CallStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_client_call_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "d4aa970320100cfd327158b93ff8f45e", "score": "0.6311623", "text": "func (ProjectRulesStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_external_iam_v2_common_rules_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "36cdc33a75d608a9fd33eafebb61d434", "score": "0.6309025", "text": "func (RestoreSnapshotStatusProto_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_jina_proto_rawDescGZIP(), []int{13, 0}\n}", "title": "" }, { "docid": "d96ba902ef2b727965e60d972225fd77", "score": "0.63005817", "text": "func (*PaymentReconciliation_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_payment_reconciliation_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "69e90f6806c92fdcc9fbb75ddba311bf", "score": "0.62931794", "text": "func (Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_go_chromium_org_luci_luciexe_legacy_annotee_proto_annotations_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b9be47b5a25443c013ada8e2e5bd7209", "score": "0.6279863", "text": "func (CallForwardingResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_wgtwo_callforward_v0_callforward_proto_rawDescGZIP(), []int{9, 0}\n}", "title": "" }, { "docid": "10bbc268511403424c7889674a807518", "score": "0.6262754", "text": "func (*CarePlan_Activity_Detail_KindCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_care_plan_proto_rawDescGZIP(), []int{0, 2, 0, 0}\n}", "title": "" }, { "docid": "5d0af8c224eb4728e6c662f41cd81714", "score": "0.6259051", "text": "func (GetValueResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_grpc_node_proto_rawDescGZIP(), []int{3, 0}\n}", "title": "" }, { "docid": "c706c511689ba312cf0ec436d2e895c8", "score": "0.6249404", "text": "func (*FamilyMemberHistory_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_family_member_history_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "2a370054802c05f41669e41d84301510", "score": "0.62388754", "text": "func (Diagnostic_Severity) EnumDescriptor() ([]byte, []int) {\n\treturn file_proto_schema_schema_proto_rawDescGZIP(), []int{3, 0}\n}", "title": "" }, { "docid": "1f69a4828608d2018898d53612df45b0", "score": "0.6228094", "text": "func (SnapshotStatusProto_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_jina_proto_rawDescGZIP(), []int{12, 0}\n}", "title": "" }, { "docid": "d0ca71f0a667079265b52e22dba57be3", "score": "0.62268376", "text": "func (*GetNotificationChannelVerificationCodeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_monitoring_v3_notification_service_proto_rawDescGZIP(), []int{10}\n}", "title": "" }, { "docid": "8b6509c508b12d9c1aaa261b319bd335", "score": "0.6224883", "text": "func (*PlanAssignmentRequestChange_Removed) Descriptor() ([]byte, []int) {\n\treturn edgelq_limits_proto_v1alpha2_plan_assignment_request_change_proto_rawDescGZIP(), []int{0, 3}\n}", "title": "" }, { "docid": "891e2fffd337684ad8ddf276cdb80e83", "score": "0.62229806", "text": "func (*MeasureReport_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_measure_report_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "b13f4ec87c1fce24f83554b6e84cbe96", "score": "0.62031716", "text": "func (*ChangeStatus) Descriptor() ([]byte, []int) {\n\treturn file_google_ads_googleads_v10_resources_change_status_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "bbcd3e7745ad3352f1f78208ba513afb", "score": "0.62001157", "text": "func (RefType) EnumDescriptor() ([]byte, []int) {\n\treturn file_language_agent_Tracing_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "11e34f5ccc23999364f792d767f265da", "score": "0.6192846", "text": "func (SkippedShipment_Reason_Code) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_cloud_optimization_v1_fleet_routing_proto_rawDescGZIP(), []int{18, 0, 0}\n}", "title": "" }, { "docid": "69ab4d0b63ac420d98c35ad499fb3bf1", "score": "0.6191708", "text": "func (BuildEventData_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_cloud_cloudbuild_v1_data_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "6c0fde0a9626137716be4ea96cfc9f5c", "score": "0.6187428", "text": "func (GrpcStatusFilter_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_envoy_config_accesslog_v3_accesslog_proto_rawDescGZIP(), []int{12, 0}\n}", "title": "" }, { "docid": "3fdd372141906884a4ba0827898dec5d", "score": "0.61762303", "text": "func (*Immunization_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_immunization_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "ee25fc8b69b99878c4ca5673c0228307", "score": "0.61733514", "text": "func (ResponseStatusCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_calendarpb_calendar_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "f8fbb3216a8f16e48c3f2bc67a843821", "score": "0.6160682", "text": "func (StateCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_plans_plans_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "9b218d84bb7ccb3e75bb5d9f896ee325", "score": "0.61477107", "text": "func (*ConstantFetcherStatus) Descriptor() ([]byte, []int) {\n\treturn file_pkg_security_proto_api_api_proto_rawDescGZIP(), []int{22}\n}", "title": "" }, { "docid": "bf414b3f315b92c431b572add213ca00", "score": "0.6120679", "text": "func (NotifyType) EnumDescriptor() ([]byte, []int) {\n\treturn file_apps_verifycode_pb_enum_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "77d211c331687bf628ada76884ae950e", "score": "0.6117166", "text": "func (*ImmunizationEvaluation_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_immunization_evaluation_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "0e102d87673157d951fa03e9d8ec9dd5", "score": "0.61099", "text": "func (TelemetryResult_Result) EnumDescriptor() ([]byte, []int) {\n\treturn file_telemetry_proto_rawDescGZIP(), []int{116, 0}\n}", "title": "" }, { "docid": "70269ee0e24174e7c4c01cdb27ba8ab4", "score": "0.61059415", "text": "func (x *fastReflection_MsgRevokeAllowance) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_MsgRevokeAllowance\n}", "title": "" }, { "docid": "ae32d5e8a0faf668dcced5c8e35a1cc4", "score": "0.610158", "text": "func (Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_pb_circuit_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "9033aa6784d6431456ed16103a241292", "score": "0.6101213", "text": "func (*PlanAssignmentRequestChange_Current) Descriptor() ([]byte, []int) {\n\treturn edgelq_limits_proto_v1alpha2_plan_assignment_request_change_proto_rawDescGZIP(), []int{0, 2}\n}", "title": "" }, { "docid": "d07ed75ffc7df76d96c5edacf9462488", "score": "0.6100722", "text": "func (*Invoice_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_invoice_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "ac4ca7bf05d2e31943ff0c6e6bc14fce", "score": "0.6095307", "text": "func (SubmitResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_rpc_rpc_proto_rawDescGZIP(), []int{6, 0}\n}", "title": "" }, { "docid": "8e094a80f12b293d57a831df26ac3945", "score": "0.6092673", "text": "func (*ValidCodeRsp) Descriptor() ([]byte, []int) {\n\treturn file_api_proto_auth_ValidCode_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "546eca3f5f2acedea59f3471311d514b", "score": "0.60876894", "text": "func (*CallUpdateStatusChanged) Descriptor() ([]byte, []int) {\n\treturn file_client_call_proto_rawDescGZIP(), []int{51}\n}", "title": "" }, { "docid": "69f8abd7dc521316a23897a71d188772", "score": "0.6086688", "text": "func (Cluster_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_container_v1_cluster_service_proto_rawDescGZIP(), []int{41, 0}\n}", "title": "" }, { "docid": "81e7a8471b0c4b9aa451f6e8234fdc7c", "score": "0.6081571", "text": "func (StatusCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_datanode_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b6a7e58981cd29b74ad6f46f5d9714d4", "score": "0.6079776", "text": "func (Issue_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_devtools_issuetracker_v1_issuetracker_proto_rawDescGZIP(), []int{5, 1}\n}", "title": "" }, { "docid": "20c77b994945fe28e9110900da068e09", "score": "0.6077361", "text": "func (SmartContractValidationResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_smartcontract_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "7fc2281e24b5ac82c3cd90cdab53e26d", "score": "0.6072503", "text": "func (EntityStatus_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_devtools_issuetracker_v1_issuetracker_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "63a2a0d8933f2a6d38ae226f8f3f2a57", "score": "0.6070039", "text": "func (*PlanAssignmentRequestChange) Descriptor() ([]byte, []int) {\n\treturn edgelq_limits_proto_v1alpha2_plan_assignment_request_change_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3994d823cf2b390f870fecd1e19a1771", "score": "0.6069355", "text": "func (SetValueResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_grpc_node_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "7948052d475338510b9c9cf4b84e525f", "score": "0.606799", "text": "func (UpdateWhitelistResponse_WhitelistResult) EnumDescriptor() ([]byte, []int) {\n\treturn file_discord_mc_protobuf_proto_mc_management_proto_rawDescGZIP(), []int{6, 0}\n}", "title": "" }, { "docid": "ad8375cc5a69d9d0cbc3a0baee7e241f", "score": "0.60654306", "text": "func (BigQueryAuditMetadata_RoutineChange_Reason) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_cloud_audit_bigquery_audit_metadata_proto_rawDescGZIP(), []int{0, 12, 0}\n}", "title": "" }, { "docid": "8cf4012bf21104a57cc300f0b854b161", "score": "0.6064328", "text": "func (ProjectVisibility) EnumDescriptor() ([]byte, []int) {\n\treturn file_modeldb_ProjectService_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "26e9c66a7b20be649bb3ed91bfdde095", "score": "0.60622954", "text": "func (Trigger_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_yandex_cloud_serverless_triggers_v1_trigger_proto_rawDescGZIP(), []int{0, 2}\n}", "title": "" }, { "docid": "ead7f78cd383a5c119981aa049094d64", "score": "0.6061723", "text": "func (*ContractCallLocalResponse) Descriptor() ([]byte, []int) {\n\treturn file_proto_ContractCallLocal_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "ebf038bc10e524271c685214fcbc6c29", "score": "0.6057628", "text": "func (LimitCondition) EnumDescriptor() ([]byte, []int) {\n\treturn file_trace_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "fc3d067de429120e973d0fcfcbd88932", "score": "0.6056542", "text": "func (RuleStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_external_iam_v2_common_rules_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "6959b46f0f72ecbeb4dab9d17340a3fc", "score": "0.60535556", "text": "func (TraceStatusCondition) EnumDescriptor() ([]byte, []int) {\n\treturn file_trace_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "608e535eadc758aa2899fbfc6d8a2cf2", "score": "0.6053166", "text": "func (EntityStatus_Reason) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_devtools_issuetracker_v1_issuetracker_proto_rawDescGZIP(), []int{0, 1}\n}", "title": "" }, { "docid": "9342e7db4518d9d4f2c1bc79e8779a74", "score": "0.6051005", "text": "func (Vehicle_CurrentStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_api_public_proto_rawDescGZIP(), []int{37, 0}\n}", "title": "" }, { "docid": "deba52c30a6198c26a04bdc6107a31fa", "score": "0.6045769", "text": "func (x *fastReflection_MsgCancelUpgradeResponse) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_MsgCancelUpgradeResponse\n}", "title": "" }, { "docid": "87975ead2d0f06f2cdbb7b29cee8bdf1", "score": "0.6045645", "text": "func (ClientVersionResponse_VersionStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_api_v1_pubgolf_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "3a3d5719eab5051c94de33c42b7a6ac3", "score": "0.60438234", "text": "func (Trickle_Target) EnumDescriptor() ([]byte, []int) {\n\treturn file_pkg_grpc_biz_biz_proto_rawDescGZIP(), []int{7, 0}\n}", "title": "" }, { "docid": "83688b7db649fcefcb485b464d77cc9b", "score": "0.604328", "text": "func (BigQueryAuditMetadata_ModelMetadataChange_Reason) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_cloud_audit_bigquery_audit_metadata_proto_rawDescGZIP(), []int{0, 11, 0}\n}", "title": "" }, { "docid": "35abfd78f2efea3f55a4e4df875176c4", "score": "0.6042606", "text": "func (ApplyFeatureSetResponse_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_feast_core_CoreService_proto_rawDescGZIP(), []int{9, 0}\n}", "title": "" }, { "docid": "620d1506a3d3279d30912b0c366ffb12", "score": "0.6040029", "text": "func (Vehicle_CongestionLevel) EnumDescriptor() ([]byte, []int) {\n\treturn file_api_public_proto_rawDescGZIP(), []int{37, 1}\n}", "title": "" }, { "docid": "ab8cb820ff4ef4a0e5d1614c6deba45e", "score": "0.6036557", "text": "func (BigQueryAuditMetadata_DatasetChange_Reason) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_cloud_audit_bigquery_audit_metadata_proto_rawDescGZIP(), []int{0, 4, 0}\n}", "title": "" }, { "docid": "47e52c4e5c2353be01dcb9be6b9c2215", "score": "0.6036354", "text": "func (TestStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_third_party_bazel_src_main_java_com_google_devtools_build_lib_buildeventstream_proto_build_event_stream_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "1bb2bfc208b4a5a1755fdec815461c43", "score": "0.6033499", "text": "func (Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_billing_billing_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "3e69a722e2ef17f0f2bd343fea21c341", "score": "0.60332435", "text": "func (RequestCode) EnumDescriptor() ([]byte, []int) {\n\treturn file_sql_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "7289875337f328d8cc64986e1aa77726", "score": "0.60331744", "text": "func (CertType) EnumDescriptor() ([]byte, []int) {\n\treturn file_orc8r_protos_certifier_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "0addf1636d8f6e897e11229793764ee5", "score": "0.60317487", "text": "func (IssueType) EnumDescriptor() ([]byte, []int) {\n\treturn file_apps_verifycode_pb_enum_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "5fdb20b3a522e508cebaa7977136f72b", "score": "0.602364", "text": "func (*ClinicalImpression_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r5_core_resources_clinical_impression_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "e79632babc6d8f010774e70aff14af13", "score": "0.6019371", "text": "func (*PlanAssignmentRequestChange_Modified) Descriptor() ([]byte, []int) {\n\treturn edgelq_limits_proto_v1alpha2_plan_assignment_request_change_proto_rawDescGZIP(), []int{0, 1}\n}", "title": "" }, { "docid": "2144c0561b29e74d5ce34973a998b7bf", "score": "0.60173625", "text": "func (*EnumConst) Descriptor() ([]byte, []int) {\n\treturn file_buf_validate_conformance_cases_enums_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "fe2ca23e699b50626361c07626a16cae", "score": "0.6015904", "text": "func (Kind) EnumDescriptor() ([]byte, []int) {\n\treturn file_billing_billing_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "58d79c7a3b02eb29a1ec9cdd1e817587", "score": "0.6013831", "text": "func (Operation_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_container_v1_cluster_service_proto_rawDescGZIP(), []int{50, 0}\n}", "title": "" }, { "docid": "c5290838eaad1fd9b8a2b1535c0af89b", "score": "0.60132474", "text": "func (SpanLayer) EnumDescriptor() ([]byte, []int) {\n\treturn file_language_agent_Tracing_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "df2bed6980e8de331311925010af5de9", "score": "0.60130996", "text": "func (*GetTraceDebugStatusByRequestIDResponse) Descriptor() ([]byte, []int) {\n\treturn file_trace_proto_rawDescGZIP(), []int{21}\n}", "title": "" }, { "docid": "152414556d2d915d04010aafa09eb77a", "score": "0.60039586", "text": "func (Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_flight_operator_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "5b1ef090917451991cc5d6864b928561", "score": "0.60035574", "text": "func (*LogProjectCodeVersion_Response) Descriptor() ([]byte, []int) {\n\treturn file_modeldb_ProjectService_proto_rawDescGZIP(), []int{13, 0}\n}", "title": "" }, { "docid": "a2541137a97583479412a3ca5277e614", "score": "0.6003544", "text": "func (PolicyRule_TrackingType) EnumDescriptor() ([]byte, []int) {\n\treturn file_lte_protos_policydb_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "23c28080ed7d1dc8c971318ea7716c86", "score": "0.6000485", "text": "func (*SetRateRcStatusRequest) Descriptor() ([]byte, []int) {\n\treturn file_telemetry_proto_rawDescGZIP(), []int{74}\n}", "title": "" }, { "docid": "cc3eb1babeb38d8791cf02efc6ab83d0", "score": "0.599774", "text": "func (GetOnlineFeaturesResponse_FieldStatus) EnumDescriptor() ([]byte, []int) {\n\treturn file_feast_serving_ServingService_proto_rawDescGZIP(), []int{4, 0}\n}", "title": "" }, { "docid": "e7f7261306499bf89c89869d0ffbdea4", "score": "0.5992856", "text": "func (VerificationType) EnumDescriptor() ([]byte, []int) {\n\treturn file_Verification_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "a8c760b9cd7b4376135d2e3caff293fa", "score": "0.5992039", "text": "func (*RcStatus) Descriptor() ([]byte, []int) {\n\treturn file_telemetry_proto_rawDescGZIP(), []int{99}\n}", "title": "" }, { "docid": "c6ac2564690873d93088d22aaa173e6c", "score": "0.5991694", "text": "func (*PlanAssignmentRequestChange_Added) Descriptor() ([]byte, []int) {\n\treturn edgelq_limits_proto_v1alpha2_plan_assignment_request_change_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "7948b55e724e92f2a9e4089f3fb460da", "score": "0.59913844", "text": "func (Flow) EnumDescriptor() ([]byte, []int) {\n\treturn file_github_com_gunk_opt_openapiv2_all_proto_rawDescGZIP(), []int{4}\n}", "title": "" }, { "docid": "ca07c2b8fc356601e4eaae9281f4e4be", "score": "0.59909457", "text": "func (CallUpdate) EnumDescriptor() ([]byte, []int) {\n\treturn file_client_call_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "f132f03ce239921560292d191db0cc32", "score": "0.59906673", "text": "func (*SendNotificationChannelVerificationCodeRequest) Descriptor() ([]byte, []int) {\n\treturn file_google_monitoring_v3_notification_service_proto_rawDescGZIP(), []int{9}\n}", "title": "" }, { "docid": "7655c9bc90d362e94e92e510db8c5b2e", "score": "0.59887975", "text": "func (StopMessage_Type) EnumDescriptor() ([]byte, []int) {\n\treturn file_pb_circuit_proto_rawDescGZIP(), []int{1, 0}\n}", "title": "" }, { "docid": "2c62ba21be1d0f04796b1b7c1129ca7d", "score": "0.59845024", "text": "func (*GetProjectCodeVersion_Response) Descriptor() ([]byte, []int) {\n\treturn file_modeldb_ProjectService_proto_rawDescGZIP(), []int{14, 0}\n}", "title": "" }, { "docid": "4c3216f5d4cfce511e45a4d6e9a4cf76", "score": "0.59781677", "text": "func (OtherCondition) EnumDescriptor() ([]byte, []int) {\n\treturn file_trace_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "d4840d7b1cd83e3f5bf64c1c04cf2247", "score": "0.59779537", "text": "func (PrivateCloud_Type) EnumDescriptor() ([]byte, []int) {\n\treturn file_google_cloud_vmwareengine_v1_vmwareengine_resources_proto_rawDescGZIP(), []int{2, 1}\n}", "title": "" }, { "docid": "b043dfb3c20fbe180d9951d61b606934", "score": "0.5977697", "text": "func (ServiceState_Status) EnumDescriptor() ([]byte, []int) {\n\treturn file_trisa_gds_api_v1beta1_api_proto_rawDescGZIP(), []int{11, 0}\n}", "title": "" }, { "docid": "c48f24d4a0b80b7dc95d1082eca6b665", "score": "0.597676", "text": "func (*CallUpdateConnectionStatusChanged) Descriptor() ([]byte, []int) {\n\treturn file_client_call_proto_rawDescGZIP(), []int{46}\n}", "title": "" }, { "docid": "0693b4fc9ee505744045aa7d49f0964b", "score": "0.5974581", "text": "func (FixType) EnumDescriptor() ([]byte, []int) {\n\treturn file_telemetry_proto_rawDescGZIP(), []int{0}\n}", "title": "" }, { "docid": "b6da49c273e964b19c3bcf19ae434df2", "score": "0.59744734", "text": "func (EClientReportingVersion) EnumDescriptor() ([]byte, []int) {\n\treturn file_cstrike15_gcmessages_proto_rawDescGZIP(), []int{2}\n}", "title": "" }, { "docid": "6ee68688830e614c7376ec39c10137c7", "score": "0.5973719", "text": "func (*CDSHooksRequestGroup_StatusCode) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_profiles_cds_hooks_request_group_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "b2565a2c3784f2171de0d7bf9cc19c3e", "score": "0.5972926", "text": "func (x *fastReflection_MsgRevokeAllowanceResponse) Descriptor() protoreflect.MessageDescriptor {\n\treturn md_MsgRevokeAllowanceResponse\n}", "title": "" }, { "docid": "72a293bb1ff110b74408df7dbae4520c", "score": "0.59695774", "text": "func (*CarePlan) Descriptor() ([]byte, []int) {\n\treturn file_proto_google_fhir_proto_r4_core_resources_care_plan_proto_rawDescGZIP(), []int{0}\n}", "title": "" } ]
4a7ce7cf33819df5937dee8a70ab68c0
AddTagEdit adds a new custom tag for given line, using textbuf.Edit for location
[ { "docid": "8b157d4992d3a0d11ad6ae3617107cb9", "score": "0.74069685", "text": "func (tb *TextBuf) AddTagEdit(tbe *textbuf.Edit, tag token.Tokens) {\n\ttb.AddTag(tbe.Reg.Start.Ln, tbe.Reg.Start.Ch, tbe.Reg.End.Ch, tag)\n}", "title": "" } ]
[ { "docid": "b4a605cc551771925c33a41760fba415", "score": "0.6959548", "text": "func (tb *TextBuf) AddTag(ln, st, ed int, tag token.Tokens) {\n\tif !tb.IsValidLine(ln) {\n\t\treturn\n\t}\n\ttb.MarkupMu.Lock()\n\ttr := lex.NewLex(token.KeyToken{Tok: tag}, st, ed)\n\ttr.Time.Now()\n\tif len(tb.Tags[ln]) == 0 {\n\t\ttb.Tags[ln] = append(tb.Tags[ln], tr)\n\t} else {\n\t\ttb.Tags[ln] = tb.AdjustedTags(ln) // must re-adjust before adding new ones!\n\t\ttb.Tags[ln].AddSort(tr)\n\t}\n\ttb.MarkupMu.Unlock()\n\ttb.MarkupLinesLock(ln, ln)\n}", "title": "" }, { "docid": "e2925bae65975f3e3f58980e4df40dba", "score": "0.55640334", "text": "func (tb *TextBuf) TagAt(pos lex.Pos) (reg lex.Lex, ok bool) {\n\ttb.MarkupMu.Lock()\n\tdefer tb.MarkupMu.Unlock()\n\tif !tb.IsValidLine(pos.Ln) {\n\t\treturn\n\t}\n\ttb.Tags[pos.Ln] = tb.AdjustedTags(pos.Ln) // re-adjust for current info\n\tfor _, t := range tb.Tags[pos.Ln] {\n\t\tif t.St >= pos.Ch && t.Ed < pos.Ch {\n\t\t\treturn t, true\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "38d3afc1291eba3477bfc8e99b4b6af5", "score": "0.5218215", "text": "func (tb *TextBuf) SpellCheckLineTag(ln int) {\n\tif !tb.IsValidLine(ln) {\n\t\treturn\n\t}\n\tser := tb.SpellCheckLineErrs(ln)\n\ttb.MarkupMu.Lock()\n\tntgs := tb.AdjustedTags(ln)\n\tntgs.DeleteToken(token.TextSpellErr)\n\tfor _, t := range ser {\n\t\tntgs.AddSort(t)\n\t}\n\ttb.Tags[ln] = ntgs\n\ttb.MarkupMu.Unlock()\n\ttb.MarkupLinesLock(ln, ln)\n\ttb.StartDelayedReMarkup()\n}", "title": "" }, { "docid": "3dff1fcf83ca82e31260db547e0da8d9", "score": "0.52134854", "text": "func (c *Completion) Add(line string) {\n\n}", "title": "" }, { "docid": "28feb21da2c154d9fd0823ff8197f2d9", "score": "0.51920676", "text": "func (tb *TextBuf) AppendTextLine(text []byte, signal bool) *textbuf.Edit {\n\ted := tb.EndPos()\n\tsz := len(text)\n\taddLF := false\n\tif sz > 0 {\n\t\tif text[sz-1] != '\\n' {\n\t\t\taddLF = true\n\t\t}\n\t} else {\n\t\taddLF = true\n\t}\n\tefft := text\n\tif addLF {\n\t\ttcpy := make([]byte, sz+1)\n\t\tcopy(tcpy, text)\n\t\ttcpy[sz] = '\\n'\n\t\tefft = tcpy\n\t}\n\ttbe := tb.InsertText(ed, efft, signal)\n\treturn tbe\n}", "title": "" }, { "docid": "f9df82e56f47b0a4b1997e99a6cecf00", "score": "0.50898176", "text": "func (tb *TextBuf) AppendTextLineMarkup(text []byte, markup []byte, signal bool) *textbuf.Edit {\n\ted := tb.EndPos()\n\tsz := len(text)\n\taddLF := false\n\tif sz > 0 {\n\t\tif text[sz-1] != '\\n' {\n\t\t\taddLF = true\n\t\t}\n\t} else {\n\t\taddLF = true\n\t}\n\tefft := text\n\tif addLF {\n\t\ttcpy := make([]byte, sz+1)\n\t\tcopy(tcpy, text)\n\t\ttcpy[sz] = '\\n'\n\t\tefft = tcpy\n\t}\n\ttbe := tb.InsertText(ed, efft, false)\n\ttb.Markup[tbe.Reg.Start.Ln] = markup\n\tif signal {\n\t\ttb.TextBufSig.Emit(tb.This(), int64(TextBufInsert), tbe)\n\t}\n\treturn tbe\n}", "title": "" }, { "docid": "66253f4018bc2d878c7e4ec35236238a", "score": "0.5052721", "text": "func (sb *SectionBuilder) AddLine(line string) {\n\tsb.content.WriteString(line)\n}", "title": "" }, { "docid": "b9b3016692a3867df940cef266da19d7", "score": "0.50295633", "text": "func (l *LinearInfoWindow) AddLine(line string) {\n\tif l.maxLines != 0 {\n\t\tif len(l.lines) >= l.maxLines {\n\t\t\tl.lines = l.lines[1 : len(l.lines)-1]\n\t\t}\n\t}\n\tl.lines = append(l.lines, line)\n\tif l.autoscroll {\n\t\tl.LineDown()\n\t}\n}", "title": "" }, { "docid": "42c00e3bd7642c46f7a921e92d857b11", "score": "0.5016149", "text": "func (span *_Span) SetTag(key string, value interface{}) opentracing.Span {\n\tspan.tags = append(span.tags,\n\t\topentracing.Tag{\n\t\t\tKey: key,\n\t\t\tValue: value,\n\t\t})\n\treturn span\n}", "title": "" }, { "docid": "61729b315a33a0c7366ec0c8cf820102", "score": "0.5007919", "text": "func (tb *TextBuf) AdjustedTags(ln int) lex.Line {\n\treturn tb.AdjustedTagsImpl(tb.Tags[ln], ln)\n}", "title": "" }, { "docid": "97dcc468fdf6391e3ad247ba161db6e7", "score": "0.49999702", "text": "func parseTagLine(ctx context.Context, objectReader catfile.ObjectReader, tagLine string) (*gitalypb.Tag, error) {\n\tfields := strings.SplitN(tagLine, \" \", 3)\n\tif len(fields) != 3 {\n\t\treturn nil, fmt.Errorf(\"invalid output from for-each-ref command: %v\", tagLine)\n\t}\n\n\ttagID, refType, refName := fields[0], fields[1], fields[2]\n\n\ttag := &gitalypb.Tag{\n\t\tId: tagID,\n\t\tName: []byte(refName),\n\t}\n\n\tswitch refType {\n\t// annotated tag\n\tcase \"tag\":\n\t\ttag, err := catfile.GetTag(ctx, objectReader, git.Revision(tagID), refName)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"getting annotated tag: %v\", err)\n\t\t}\n\t\tcatfile.TrimTagMessage(tag)\n\n\t\treturn tag, nil\n\tcase \"commit\":\n\t\tcommit, err := catfile.GetCommit(ctx, objectReader, git.Revision(tagID))\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"getting commit catfile: %v\", err)\n\t\t}\n\t\ttag.TargetCommit = commit\n\t\treturn tag, nil\n\tdefault:\n\t\treturn tag, nil\n\t}\n}", "title": "" }, { "docid": "65695ca9cf1d65150f8447d2defbcff2", "score": "0.49656937", "text": "func (p *tagParser) createTag(name, addr string, line int, tagType TagType) Tag {\n\tf := p.file\n\tif p.relative {\n\t\tif abs, err := filepath.Abs(f); err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"could not determine absolute path: %s\\n\", err)\n\t\t} else if rel, err := filepath.Rel(p.basepath, abs); err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"could not determine relative path: %s\\n\", err)\n\t\t} else {\n\t\t\tf = rel\n\t\t}\n\t}\n\treturn NewTag(name, f, addr, line, tagType)\n}", "title": "" }, { "docid": "6d307659d2ad3d33c9825e93a9110df6", "score": "0.49540758", "text": "func (tb *TextBuf) RemoveTag(pos lex.Pos, tag token.Tokens) (reg lex.Lex, ok bool) {\n\tif !tb.IsValidLine(pos.Ln) {\n\t\treturn\n\t}\n\ttb.MarkupMu.Lock()\n\ttb.Tags[pos.Ln] = tb.AdjustedTags(pos.Ln) // re-adjust for current info\n\tfor i, t := range tb.Tags[pos.Ln] {\n\t\tif t.ContainsPos(pos.Ch) {\n\t\t\tif tag > 0 && t.Tok.Tok != tag {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttb.Tags[pos.Ln].DeleteIdx(i)\n\t\t\treg = t\n\t\t\tok = true\n\t\t\tbreak\n\t\t}\n\t}\n\ttb.MarkupMu.Unlock()\n\tif ok {\n\t\ttb.MarkupLinesLock(pos.Ln, pos.Ln)\n\t}\n\treturn\n}", "title": "" }, { "docid": "9713b0303f0d23ac337aea2f3e5abb1c", "score": "0.49426425", "text": "func (tb *TextBuf) AdjustedTagsImpl(tags lex.Line, ln int) lex.Line {\n\tsz := len(tags)\n\tif sz == 0 {\n\t\treturn nil\n\t}\n\tntags := make(lex.Line, 0, sz)\n\tfor _, tg := range tags {\n\t\treg := textbuf.Region{Start: lex.Pos{Ln: ln, Ch: tg.St}, End: lex.Pos{Ln: ln, Ch: tg.Ed}}\n\t\treg.Time = tg.Time\n\t\treg = tb.Undos.AdjustReg(reg)\n\t\tif !reg.IsNil() {\n\t\t\tntr := ntags.AddLex(tg.Tok, reg.Start.Ch, reg.End.Ch)\n\t\t\tntr.Time.Now()\n\t\t}\n\t}\n\t// lex.LexsCleanup(&ntags)\n\treturn ntags\n}", "title": "" }, { "docid": "a2d5fd3a025b525ab5b1712bcc00bda8", "score": "0.49390706", "text": "func (tb *TextBuf) LinesInserted(tbe *textbuf.Edit) {\n\tstln := tbe.Reg.Start.Ln + 1\n\tnsz := (tbe.Reg.End.Ln - tbe.Reg.Start.Ln)\n\n\ttb.MarkupMu.Lock()\n\ttb.MarkupEdits = append(tb.MarkupEdits, tbe)\n\n\t// LineBytes\n\ttmplb := make([][]byte, nsz)\n\tnlb := append(tb.LineBytes, tmplb...)\n\tcopy(nlb[stln+nsz:], nlb[stln:])\n\tcopy(nlb[stln:], tmplb)\n\ttb.LineBytes = nlb\n\n\t// Markup\n\ttmpmu := make([][]byte, nsz)\n\tnmu := append(tb.Markup, tmpmu...) // first append to end to extend capacity\n\tcopy(nmu[stln+nsz:], nmu[stln:]) // move stuff to end\n\tcopy(nmu[stln:], tmpmu) // copy into position\n\ttb.Markup = nmu\n\n\t// Tags\n\ttmptg := make([]lex.Line, nsz)\n\tntg := append(tb.Tags, tmptg...)\n\tcopy(ntg[stln+nsz:], ntg[stln:])\n\tcopy(ntg[stln:], tmptg)\n\ttb.Tags = ntg\n\n\t// HiTags\n\ttmpht := make([]lex.Line, nsz)\n\tnht := append(tb.HiTags, tmpht...)\n\tcopy(nht[stln+nsz:], nht[stln:])\n\tcopy(nht[stln:], tmpht)\n\ttb.HiTags = nht\n\n\t// ByteOffs -- maintain mem updt\n\ttmpof := make([]int, nsz)\n\tnof := append(tb.ByteOffs, tmpof...)\n\tcopy(nof[stln+nsz:], nof[stln:])\n\tcopy(nof[stln:], tmpof)\n\ttb.ByteOffs = nof\n\n\tif tb.Hi.UsingPi() {\n\t\tpfs := tb.PiState.Done()\n\t\tpfs.Src.LinesInserted(stln, nsz)\n\t}\n\n\tst, ed := tbe.Reg.Start.Ln, tbe.Reg.End.Ln\n\tbo := tb.ByteOffs[st]\n\tfor ln := st; ln <= ed; ln++ {\n\t\ttb.LineBytes[ln] = []byte(string(tb.Lines[ln]))\n\t\ttb.Markup[ln] = HTMLEscapeRunes(tb.Lines[ln])\n\t\ttb.ByteOffs[ln] = bo\n\t\tbo += len(tb.LineBytes[ln]) + 1\n\t}\n\ttb.MarkupLines(st, ed)\n\ttb.MarkupMu.Unlock()\n\ttb.StartDelayedReMarkup()\n}", "title": "" }, { "docid": "35c014d36f788a8ba7ea2d6f8914e5e9", "score": "0.48781973", "text": "func (l *LineNoise) editInsert(c byte) int {\n\tif l.editLen < l.bufLen {\n\t\tif l.editLen == l.pos {\n\t\t\tl.buf[l.pos] = c\n\t\t\tl.pos++\n\t\t\tl.editLen++\n\t\t\tl.buf[l.editLen] = 0\n\t\t\tif !l.mlMode && l.plen+l.editLen < l.cols /*&& !hintsCallback*/ {\n\t\t\t\t/* Avoid a full update of the line in the\n\t\t\t\t * trivial case. */\n\t\t\t\tif _, err := l.out.Write([]byte{c}); err != nil {\n\t\t\t\t\treturn -1\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tl.refreshLine()\n\t\t\t}\n\t\t} else {\n\t\t\tcopy(l.buf[l.pos+1:], l.buf[l.pos:l.editLen])\n\t\t\tl.buf[l.pos] = c\n\t\t\tl.editLen++\n\t\t\tl.pos++\n\t\t\tl.buf[l.editLen] = 0\n\t\t\tl.refreshLine()\n\t\t}\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "75713038aa6cc847b511a085a3bbdae5", "score": "0.48691344", "text": "func (t *Tags) Add(tag string) {\n\tt.initTags()\n\tt.tags[strings.TrimSpace(tag)] = struct{}{}\n}", "title": "" }, { "docid": "9cbd9b874ceb7af0a1705e8353f11f80", "score": "0.48532873", "text": "func (f *File) AddLineInfo(offset int, filename string, line int) {\n\tf.set.mutex.Lock()\n\tif i := len(f.infos); i == 0 || f.infos[i-1].Offset < offset && offset < f.size {\n\t\tf.infos = append(f.infos, lineInfo{offset, filename, line})\n\t}\n\tf.set.mutex.Unlock()\n}", "title": "" }, { "docid": "b73a455bdc6b810a627baf37dd71f166", "score": "0.4830275", "text": "func AddTag(c *gin.Context) {\n\tmessages := msg.GetMessages(c)\n\tuser := router.GetUser(c)\n\tid, _ := strconv.ParseInt(c.Query(\"id\"), 10, 32)\n\t// Retrieve the torrent\n\ttorrent, err := torrents.FindByID(uint(id))\n\n\t// If torrent not found, display 404\n\tif err != nil {\n\t\tc.Status(http.StatusNotFound)\n\t\treturn\n\t}\n\n\t// We load tags for user and torrents\n\tuser.LoadTags(torrent)\n\ttorrent.LoadTags()\n\n\tif c.Query(\"tag\") != \"\" && user.ID > 0 {\n\t\ttagForm := &tagsValidator.CreateForm{c.Query(\"tag\"), c.Query(\"type\")}\n\n\t\tvalidator.ValidateForm(tagForm, messages)\n\n\t\tif !messages.HasErrors() {\n\t\t\ttag := postTag(c, torrent, user)\n\t\t\tif !messages.HasErrors() {\n\t\t\t\tif _, ok := c.GetQuery(\"json\"); ok {\n\t\t\t\t\tapiUtils.ResponseHandler(c, tag)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tif _, ok := c.GetQuery(\"json\"); ok {\n\t\tapiUtils.ResponseHandler(c)\n\t\treturn\n\t}\n\tc.Redirect(http.StatusSeeOther, fmt.Sprintf(\"/view/%d\", id))\n}", "title": "" }, { "docid": "62a7bd40ea3f18735eb189fef69a78b9", "score": "0.48249498", "text": "func (ctl *LimitCtl) AddTag(name string, value int64) {\n\tctl.lock.Lock()\n\tdefer ctl.lock.Unlock()\n\n\t// double check\n\t_, ok := ctl.options.TagRules[name]\n\tif ok {\n\t\treturn\n\t}\n\n\t// add in ctl.options\n\tctl.options.TagRules[name] = value\n\n\t// add in ctl.wait_queue\n\tnewWaitQueuePool := ctl.makeWaitQueuePool()\n\tfor tag, dto := range ctl.waitQueuePool {\n\t\tnewWaitQueuePool[tag] = dto\n\t}\n\tctl.waitQueuePool = newWaitQueuePool\n\n\t// replace new pool\n\tnewLimitModelPool := ctl.makelimitModelPool()\n\tfor idx, shard := range ctl.limitModelPool {\n\t\tfor tagName, model := range shard {\n\t\t\tnewLimitModelPool[idx][tagName] = model\n\t\t}\n\t}\n\tctl.limitModelPool = newLimitModelPool\n}", "title": "" }, { "docid": "3cde752f95c4135d93aca803f4d4a0a4", "score": "0.48209623", "text": "func (f *SourceFile) AddLine(offset int) {\n\ti := len(f.Lines)\n\tif (i == 0 || f.Lines[i-1] < offset) && offset < f.Size {\n\t\tf.Lines = append(f.Lines, offset)\n\t}\n}", "title": "" }, { "docid": "de286bd4fe06e632165bb9deaf068184", "score": "0.48182234", "text": "func posEdit(tf *token.File, start, end token.Pos, new string) (diff.Edit, error) {\n\tstartOffset, endOffset, err := safetoken.Offsets(tf, start, end)\n\tif err != nil {\n\t\treturn diff.Edit{}, err\n\t}\n\treturn diff.Edit{Start: startOffset, End: endOffset, New: new}, nil\n}", "title": "" }, { "docid": "f455c954029ae0e0bdc6b8b3f2cfb9bb", "score": "0.48121947", "text": "func (msg *Message) AddTag(tag, value string) {\n\tmsg.Tags[tag] = value\n}", "title": "" }, { "docid": "b2db7eabb0490a32e117a13bc0eb54ee", "score": "0.48085362", "text": "func (token *Token) AddTag(tokenTag *TokenTag) (err error){\n\tstmt := `MATCH (tokenTag: TokenTag) WHERE tokenTag.id = {tokenTagId}\n\t MATCH (token:Token) WHERE token.JTI = {JTI} AND token.KID = {KID}\n\t MERGE (tokenTag) - [role:Role] -> (token)`\n\n\tcq := neoism.CypherQuery{\n\t\tStatement: stmt,\n\t\tParameters: neoism.Props{\"tokenTagId\": tokenTag.Id, \"KID\": token.KID, \"JTI\": token.JTI},\n\t}\n\n\t// Issue the query.\n\terr = db.Cypher(&cq)\n\treturn\n}", "title": "" }, { "docid": "9bdd8bea1c2206a808bbde61e5424fa5", "score": "0.47748467", "text": "func cmd_admin_addtag(s *discordgo.Session, m *discordgo.MessageCreate) {\n\t// Get the params\n\tparams := get_longParam(m.Content)\n\t\n\n}", "title": "" }, { "docid": "a1ef2e102f30e8c357c4025b6c63888d", "score": "0.47692376", "text": "func (d *Doc) AddTag(key string, description string) {\n\td.Tags[key] = description\n}", "title": "" }, { "docid": "0b57b900c9d2bfffca51c60462d0f98e", "score": "0.47470298", "text": "func (t tmplField) AddOneWithTag(i int) string {\n\tif t.ColName == \"id\" {\n\t\treturn fmt.Sprintf(`%d [(tagger.tags) = \"uri:\\\"id\\\"\" ]`, i+1)\n\t}\n\n\treturn fmt.Sprintf(\"%d\", i+1)\n}", "title": "" }, { "docid": "6f0930d68b191f55d971a13374aac31d", "score": "0.47431493", "text": "func (c *ZipKin) AddSpanAttribute(ctx context.Context, params map[string]string) error {\n if c.IsWork() != nil {\n return TraceNotWork\n }\n\n span := zipkin.SpanFromContext(ctx)\n for k, v := range params {\n span.Tag(k, v)\n }\n\n return nil\n}", "title": "" }, { "docid": "56328a459abb61737f2dbab72c2abcc3", "score": "0.472078", "text": "func (tb *TextBuf) AddView(vw *TextView) {\n\ttb.Views = append(tb.Views, vw)\n\ttb.TextBufSig.Connect(vw.This(), TextViewBufSigRecv)\n}", "title": "" }, { "docid": "434b94898eca595cde70098f9c4b82da", "score": "0.4711503", "text": "func AppendEditText(view View, subviewID string, text string) {\n\tif subviewID != \"\" {\n\t\tif edit := EditViewByID(view, subviewID); edit != nil {\n\t\t\tedit.AppendText(text)\n\t\t\treturn\n\t\t}\n\t}\n\n\tif edit, ok := view.(EditView); ok {\n\t\tedit.AppendText(text)\n\t}\n}", "title": "" }, { "docid": "b5a3b430f2d31b36be81a51500ea98fa", "score": "0.47038925", "text": "func AddTag(c *gin.Context) {\n\tmessages := msg.GetMessages(c)\n\tuser := router.GetUser(c)\n\tid, _ := strconv.ParseInt(c.Query(\"id\"), 10, 32)\n\t// Retrieve the torrent\n\ttorrent, err := torrents.FindByID(uint(id))\n\n\t// If torrent not found, display 404\n\tif err != nil {\n\t\tc.Status(http.StatusNotFound)\n\t\treturn\n\t}\n\ttagForm := &tagsValidator.CreateForm{c.Query(\"tag\"), c.Query(\"type\")}\n\tif c.Query(\"tag\") != \"\" && user.ID > 0 {\n\t\tvalidator.ValidateForm(tagForm, messages)\n\t\tif !messages.HasErrors() {\n\t\t\t// We load tags for user and torrents\n\t\t\tuser.LoadTags(torrent)\n\t\t\tnewTag := models.Tag{Tag: tagForm.Tag, Type: tagForm.Type, UserID: user.ID, TorrentID: torrent.ID, Weight: user.Pantsu}\n\t\t\tif !user.Tags.Contains(newTag) {\n\t\t\t\t// We check if the user has already submitted this tag, if he has, we prevent him to vote twice for it\n\t\t\t\ttags.FilterOrCreate(&newTag, torrent, user)\n\t\t\t\ttorrent.Update(false)\n\t\t\t}\n\t\t}\n\t}\n\tif _, ok := c.GetQuery(\"json\"); ok {\n\t\tapiUtils.ResponseHandler(c, tagForm)\n\t\treturn\n\t}\n\tc.Redirect(http.StatusSeeOther, fmt.Sprintf(\"/view/%d\", id))\n}", "title": "" }, { "docid": "d707e16375a012040338cce9f0e3fdcf", "score": "0.46960986", "text": "func (w *Writer) Tag(id string) {\n\tw.finishTag()\n\tlastA := w.annotations[len(w.annotations)-1]\n\tif lastA.drs != nil {\n\t\tlastA = copyAnnotation(lastA)\n\t\tw.annotations = append(w.annotations, lastA)\n\t}\n\tlastA.tags = append(lastA.tags, &Tag{Id: id})\n}", "title": "" }, { "docid": "2b6d1a5b13cfe334f4de0d70727477ec", "score": "0.46882835", "text": "func NewEdit(startLine, startColumn, endLine, endColumn int, text string) Edit {\n\treturn Edit{\n\t\tStart: Pos{Line: startLine, Column: startColumn},\n\t\tEnd: Pos{Line: endLine, Column: endColumn},\n\t\tText: text,\n\t}\n}", "title": "" }, { "docid": "63eb07d673e9188b13ff4f877560c0ab", "score": "0.46462664", "text": "func (repo *gitRepo) TagNew(name string, extra ...string) error {\n\ttagcmd := ShellCmd{\"git\", \"tag\", name}\n\tif len(extra) > 0 {\n\t\t// Remove the name on the end, insert an annotation, append extra[1:].\n\t\ttagcmd = append(\n\t\t\tappend(tagcmd[:len(tagcmd)-1], \"-a\", \"-m\", extra[0], name),\n\t\t\tShellCmd(extra[1:])...)\n\t}\n\ttagscript := CmdTemplateScript(repo.shell, repo.root, tagcmd)\n\t_, err := tagscript.Execute()\n\treturn err\n}", "title": "" }, { "docid": "1f13ef1f4941c7cd4476318d44ee01da", "score": "0.4645923", "text": "func (tm *TagMap) BuildTagLine() TagLine {\n\tsrtKeys := make([]string, 0, len(*tm))\n\t// sort keys\n\tfor k := range *tm {\n\t\tidx := sort.SearchStrings(srtKeys, k)\n\t\tsrtKeys = append(srtKeys, k)\n\t\tif idx < len(srtKeys)-1 {\n\t\t\tcopy(srtKeys[idx+1:], srtKeys[idx:])\n\t\t}\n\t\tsrtKeys[idx] = k\n\t}\n\n\tvar b bytes.Buffer\n\tfirst := true\n\tfor _, k := range srtKeys {\n\t\tif !first {\n\t\t\tb.WriteString(cTagSeparator)\n\t\t}\n\t\tb.WriteString(k)\n\t\tb.WriteString(cTagValueSeparator)\n\t\tb.WriteString((*tm)[k])\n\t\tfirst = false\n\t}\n\treturn TagLine(b.String())\n}", "title": "" }, { "docid": "f6f6a12362d7ded0970a1a701ba6968d", "score": "0.46407878", "text": "func AddString(tx *bolt.Tx, datfile string, vals []string) {\n\tfor _, v := range vals {\n\t\tif !tag.IsOK(v) {\n\t\t\tcontinue\n\t\t}\n\t\tif err := db.PutMap(tx, \"sugtag\", []byte(datfile), v); err != nil {\n\t\t\tlog.Print(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e9934f2ca9712c9ff5c39e84f7109179", "score": "0.46285662", "text": "func (f *Field) AddTag(tag string) FieldInterface {\n\tf.tag[tag] = struct{}{}\n\treturn f\n}", "title": "" }, { "docid": "dedefe47e1603ddcedc1f09b77699610", "score": "0.46278498", "text": "func (c *Context) Tag(key string, value interface{}) {\n\tc.Span.Tag(key, value)\n}", "title": "" }, { "docid": "0c70b9abab9d713f2081fbc50a1823fd", "score": "0.46188655", "text": "func AddTag(key string, value ...string) {\n\tstd.AddTag(key, value...)\n}", "title": "" }, { "docid": "f1fc479aab29f524040a0f0103b7b521", "score": "0.4617425", "text": "func (f *File) AddLine(offset int) {\n\tif i := len(f.Lines); (i == 0 || f.Lines[i-1] < offset) && offset < f.Size {\n\t\tf.Lines = append(f.Lines, offset)\n\t}\n}", "title": "" }, { "docid": "389c1f2e8d11eb8a4be3738283bfc967", "score": "0.46170157", "text": "func (l *Logger) Tag(name string) {\n\tline := l.Plan()\n\tline += l.Good(\"\")\n\tline += color.New(color.FgYellow).SprintFunc()(\"Tagged:\")\n\tl.printLog(line + \" \" + name)\n}", "title": "" }, { "docid": "fc370953e1466454cb5d226659cce96b", "score": "0.46024603", "text": "func (tb *TextBuf) MarkupLine(ln int) {\n\ttb.LinesMu.Lock()\n\ttb.MarkupMu.Lock()\n\n\tif ln >= 0 && ln < len(tb.Markup) {\n\t\ttb.LineBytes[ln] = []byte(string(tb.Lines[ln]))\n\t\ttb.Markup[ln] = HTMLEscapeRunes(tb.Lines[ln])\n\t\ttb.MarkupLines(ln, ln)\n\t}\n\ttb.MarkupMu.Unlock()\n\ttb.LinesMu.Unlock()\n}", "title": "" }, { "docid": "b36d5b1c67b6f9666db0e7ad404f96b7", "score": "0.45939812", "text": "func (t *TextBlock) AddLine(words ...string) *TextBlock {\n\tline := FormatedText{\n\t\tValue: \" \\n\",\n\t}\n\tt.Add(words...)\n\t// if !strings.HasSuffix(t.Words[len(t.Words)-1].Value, \"\\n\") {\n\t// \tline.Value += \"\\n\"\n\t// }\n\tt.Words[len(t.Words)-1].Value = strings.TrimSpace(t.Words[len(t.Words)-1].Value)\n\tt.Words = append(t.Words, line)\n\treturn t\n}", "title": "" }, { "docid": "a49d840c90c364908426952e8f3c88dc", "score": "0.45910266", "text": "func (f *File) AddLine(offset int) {\n\tf.set.mutex.Lock()\n\tif i := len(f.lines); (i == 0 || f.lines[i-1] < offset) && offset < f.size {\n\t\tf.lines = append(f.lines, offset)\n\t}\n\tf.set.mutex.Unlock()\n}", "title": "" }, { "docid": "a74cab3769d943270bacfac95f4e43ba", "score": "0.45860243", "text": "func (r *ExtractLocal) addEdits(insertBefore ast.Stmt) {\n\tselectedExprOffset := r.getOffset(r.SelectedNode)\n\tselectedExprEnd := r.getEndOffset(r.SelectedNode)\n\tselectedExprLen := selectedExprEnd - selectedExprOffset\n\n\t// First, replace the original expression.\n\tr.Edits[r.Filename].Add(&text.Extent{selectedExprOffset, selectedExprLen}, r.varName)\n\n\t// Then, add the assignment statement afterward.\n\t// If this inserts at the same position as the replacement, this\n\t// guarantees that it will be inserted before it, which is what we want\n\texpression := string(r.FileContents[selectedExprOffset:selectedExprEnd])\n\tassignment := r.varName + \" := \" + expression + \"\\n\"\n\tr.Edits[r.Filename].Add(&text.Extent{r.getOffset(insertBefore), 0}, assignment)\n}", "title": "" }, { "docid": "6fea840bc49e75a131687dfeb6f3c2c2", "score": "0.45839152", "text": "func (tb *TextBuf) IndentLine(ln, ind int) *textbuf.Edit {\n\tasv := tb.AutoSaveOff()\n\tdefer tb.AutoSaveRestore(asv)\n\n\ttabSz := tb.Opts.TabSize\n\tichr := indent.Tab\n\tif tb.Opts.SpaceIndent {\n\t\tichr = indent.Space\n\t}\n\n\ttb.LinesMu.RLock()\n\tcurind, _ := lex.LineIndent(tb.Lines[ln], tabSz)\n\ttb.LinesMu.RUnlock()\n\tif ind > curind {\n\t\treturn tb.InsertText(lex.Pos{Ln: ln}, indent.Bytes(ichr, ind-curind, tabSz), EditSignal)\n\t} else if ind < curind {\n\t\tspos := indent.Len(ichr, ind, tabSz)\n\t\tcpos := indent.Len(ichr, curind, tabSz)\n\t\treturn tb.DeleteText(lex.Pos{Ln: ln, Ch: spos}, lex.Pos{Ln: ln, Ch: cpos}, EditSignal)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ef99aabbe23f7363b55b7357744fcfc", "score": "0.456812", "text": "func (ud Content) AddInTag(phase Phase, tagname string, content string) {\n\tif _, ok := ud.Tags[phase]; !ok {\n\t\tud.Tags[phase] = map[string][]string{}\n\t}\n\tud.Tags[phase][tagname] = append(ud.Tags[phase][tagname], content)\n}", "title": "" }, { "docid": "060d0e9799533d1c9d8840f9bd826bb7", "score": "0.45636773", "text": "func (client *PdfToPdfClient) SetTag(tag string) *PdfToPdfClient {\n client.fields[\"tag\"] = tag\n return client\n}", "title": "" }, { "docid": "7f569884d44dad6e6d638f9d3d7127b5", "score": "0.45617762", "text": "func (s *Span) SetTag(key string, value interface{}) ot.Span {\n\tswitch key {\n\tcase ServiceName:\n\t\ts.Span.Lock()\n\t\tdefer s.Span.Unlock()\n\t\ts.Span.Service = fmt.Sprint(value)\n\tcase ResourceName:\n\t\ts.Span.Lock()\n\t\tdefer s.Span.Unlock()\n\t\ts.Span.Resource = fmt.Sprint(value)\n\tcase SpanType:\n\t\ts.Span.Lock()\n\t\tdefer s.Span.Unlock()\n\t\ts.Span.Type = fmt.Sprint(value)\n\tcase Error:\n\t\tswitch v := value.(type) {\n\t\tcase nil:\n\t\t\t// no error\n\t\tcase error:\n\t\t\ts.Span.SetError(v)\n\t\tdefault:\n\t\t\ts.Span.SetError(fmt.Errorf(\"%v\", v))\n\t\t}\n\tdefault:\n\t\t// NOTE: locking is not required because the `SetMeta` is\n\t\t// already thread-safe\n\t\ts.Span.SetMeta(key, fmt.Sprint(value))\n\t}\n\treturn s\n}", "title": "" }, { "docid": "f5df4d5c2ff2edc81df75ad5f9aaf91b", "score": "0.45565563", "text": "func SetTag(ctx context.Context, k string, v interface{}) {\n\ts := opentracing.SpanFromContext(ctx)\n\tSetTagS(s, k, v)\n}", "title": "" }, { "docid": "0e753f1ad2283c9f0ba325ff029c7b96", "score": "0.45496088", "text": "func AddTag(dbConn *sqlx.DB, transaction *sqlx.Tx, tag string) error {\n\tstmt := `\n INSERT INTO\n Tag(Tag)\n VALUES(?);\n `\n\n\treturn helpers.SqlExecute(dbConn, transaction, stmt, tag)\n}", "title": "" }, { "docid": "e3594d18d75db23cc41e34f47cc94a8c", "score": "0.45479253", "text": "func (this *Logger) AddTag(key string, value ...string) {\n\tthis.mu.Lock()\n\tdefer this.mu.Unlock()\n\tif key == \"\" {\n\t\tkey = \"tags\"\n\t}\n\tthis.tags.Add(key, value...)\n}", "title": "" }, { "docid": "e31ead76b5732c6c55912c6ecb51987a", "score": "0.45391527", "text": "func (p *Pipe) AddLine(l *Line) mutability.Mutation {\n\treturn p.mutability.Mutate(func() error {\n\t\taddLine(p, l)\n\t\tp.merger.merge(l.start(p.ctx)...)\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "9984738cd038ab1cfb29e6de9afe67a1", "score": "0.45381927", "text": "func AddTagHook(hookPoint boil.HookPoint, tagHook TagHook) {\n\tswitch hookPoint {\n\tcase boil.BeforeInsertHook:\n\t\ttagBeforeInsertHooks = append(tagBeforeInsertHooks, tagHook)\n\tcase boil.BeforeUpdateHook:\n\t\ttagBeforeUpdateHooks = append(tagBeforeUpdateHooks, tagHook)\n\tcase boil.BeforeDeleteHook:\n\t\ttagBeforeDeleteHooks = append(tagBeforeDeleteHooks, tagHook)\n\tcase boil.BeforeUpsertHook:\n\t\ttagBeforeUpsertHooks = append(tagBeforeUpsertHooks, tagHook)\n\tcase boil.AfterInsertHook:\n\t\ttagAfterInsertHooks = append(tagAfterInsertHooks, tagHook)\n\tcase boil.AfterSelectHook:\n\t\ttagAfterSelectHooks = append(tagAfterSelectHooks, tagHook)\n\tcase boil.AfterUpdateHook:\n\t\ttagAfterUpdateHooks = append(tagAfterUpdateHooks, tagHook)\n\tcase boil.AfterDeleteHook:\n\t\ttagAfterDeleteHooks = append(tagAfterDeleteHooks, tagHook)\n\tcase boil.AfterUpsertHook:\n\t\ttagAfterUpsertHooks = append(tagAfterUpsertHooks, tagHook)\n\t}\n}", "title": "" }, { "docid": "ceb184343df22cae1a8b035fbb851709", "score": "0.45162538", "text": "func AddTag(name string, script string, author string, Database *sql.DB) error {\n\ttransaction, err := Database.Begin()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tstatement, err := transaction.Prepare(`\n\t\tINSERT INTO scripts(name, content, author, date, uses) VALUES(?, ?, ?, ?, ?)\n\t`)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer statement.Close()\n\n\t_, err = statement.Exec(name, script, author, time.Now(), 0)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttransaction.Commit()\n\treturn nil\n}", "title": "" }, { "docid": "1250c54c0a58dcb814fd7d7f38b9b528", "score": "0.4513592", "text": "func (tw *traceWriter) AddTrace(threadID int, result *core.BuildResult, active bool) {\n\t// It's a bit fiddly to keep all the phases in line here.\n\tif !active {\n\t\ttw.writeEvent(threadID, result, \"E\") // end the span for this target\n\t\tdelete(tw.active, result.Label)\n\t} else if _, present := tw.active[result.Label]; !present {\n\t\ttw.writeEvent(threadID, result, \"B\") // begin a new span for this target\n\t\ttw.active[result.Label] = struct{}{}\n\t} else {\n\t\ttw.writeEvent(threadID, result, \"i\")\n\t}\n}", "title": "" }, { "docid": "a6ed53f9f3f26ee74165b8f619ee0701", "score": "0.4507172", "text": "func (client *HtmlToPdfClient) SetTag(tag string) *HtmlToPdfClient {\n client.fields[\"tag\"] = tag\n return client\n}", "title": "" }, { "docid": "90eac2cf4ad75c5aff6cfeb7d06154f3", "score": "0.45068496", "text": "func (m *Mark) Tag(pat, tag string) bool {\n\thit, _ := filepath.Match(pat, path.Base(m.Path))\n\tif pat == \"\" || hit {\n\t\tfor _, t := range m.Tags {\n\t\t\tif t == tag {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\n\t\tm.Tags = append(m.Tags, tag)\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "68c69d89bd96e727a15d23da9667c486", "score": "0.45029324", "text": "func (b *Buffer) InsertLine(i int, text string) {\n\tif b.IsReadOnly {\n\t\treturn\n\t}\n\n\t// Ensure the index we are trying to insert at is valid.\n\tif i >= 0 && i <= b.Length() {\n\n\t\t// https://github.com/golang/go/wiki/SliceTricks\n\t\tb.Lines = append(b.Lines, Line{})\n\t\tcopy(b.Lines[i+1:], b.Lines[i:])\n\t\tb.Lines[i] = MakeBufferLine(b, text)\n\t}\n}", "title": "" }, { "docid": "6069e643ebe40077f6118f88cbae53a6", "score": "0.44990918", "text": "func (m *Memory) Tag(_ context.Context, desc ocispec.Descriptor, reference string) error {\n\tm.index.Store(reference, desc)\n\treturn nil\n}", "title": "" }, { "docid": "389c06720879bcc8b585c398eeaedc66", "score": "0.44894457", "text": "func (f *Formatter) addTerm(to goraptor.Term, key string, value goraptor.Term) error {\n\treturn f.add(to, prefix(key), value)\n}", "title": "" }, { "docid": "508ea5d7062bbed21ea1ed2f6d541a82", "score": "0.44692764", "text": "func AddCommandContext(line string) {\n\tsentry.ConfigureScope(func(scope *sentry.Scope) {\n\t\tscope.SetContext(\"command\", map[string]interface{}{\n\t\t\t\"line\": line,\n\t\t})\n\t})\n}", "title": "" }, { "docid": "f608327e5ec08b38d2f7789637f4d6a0", "score": "0.44681394", "text": "func (client *ImageToPdfClient) SetTag(tag string) *ImageToPdfClient {\n client.fields[\"tag\"] = tag\n return client\n}", "title": "" }, { "docid": "b77c19f01879ab401fedd1629683f2d4", "score": "0.4461584", "text": "func AddBufferHighlight(buffer Buffer, srcID int, hlGroup string, line, startCol, endCol int) (id int) {\n\tname(nvim_buf_add_highlight)\n}", "title": "" }, { "docid": "8edcb4864c9549e221d2503a3a50c24f", "score": "0.44558057", "text": "func (n Node) AddLine(text string) {\n\tt := n.tree\n\tif t.style == BulletStyle {\n\t\ttext = \" \" + text\n\t}\n\trowIdx := t.addRow(n.level-1, text)\n\tif t.style != BulletStyle {\n\t\tt.stack[n.level-1].firstChildConnectRow = rowIdx\n\t}\n}", "title": "" }, { "docid": "08c1589729337c46867a4458cf310b1a", "score": "0.44516724", "text": "func (e *Entity) AddTag(key string, value interface{}) error {\n\tif len(key) == 0 {\n\t\treturn errors.New(\"key cannot be empty\")\n\t}\n\te.Metadata.AddTag(key, value)\n\treturn nil\n}", "title": "" }, { "docid": "f309e09e706ff3d508ee6e6114428d5e", "score": "0.44288743", "text": "func (i Ref) WithNewTag(t string) Ref {\n\tvar img Ref\n\timg = i\n\timg.Tag = t\n\treturn img\n}", "title": "" }, { "docid": "6f1c1bee1f5c6d4c1f6c3523a75339f1", "score": "0.4428415", "text": "func (tb *TextBuf) SetLineIcon(ln int, icon icons.Icon) {\n\ttb.LinesMu.Lock()\n\tdefer tb.LinesMu.Unlock()\n\tif tb.LineIcons == nil {\n\t\ttb.LineIcons = make(map[int]icons.Icon)\n\t\ttb.Icons = make(map[icons.Icon]*gi.Icon)\n\t}\n\ttb.LineIcons[ln] = icon\n\tic, has := tb.Icons[icon]\n\tif !has {\n\t\tic = &gi.Icon{}\n\t\tic.InitName(ic, string(icon))\n\t\tic.SetIcon(icon)\n\t\tic.SetProp(\"width\", units.Em(1))\n\t\tic.SetProp(\"height\", units.Em(1))\n\t\ttb.Icons[icon] = ic\n\t}\n}", "title": "" }, { "docid": "44fa143a7a500b342e7341ca3b265f2d", "score": "0.43925372", "text": "func (c *PanoIpv4) Edit(tmpl, ts, vr string, e Entry) error {\n\tif vr == \"\" {\n\t\treturn fmt.Errorf(\"vr must be specified\")\n\t} else if tmpl == \"\" && ts == \"\" {\n\t\treturn fmt.Errorf(\"tmpl or ts must be specified\")\n\t}\n\n\t_, fn := c.versioning()\n\tpath := c.xpath(tmpl, ts, vr, []string{e.Name})\n\tdata := fn(e)\n\n\treturn c.ns.Edit(e.Name, path, data)\n}", "title": "" }, { "docid": "945187dd39c7630fb953b95a864413b9", "score": "0.43807822", "text": "func (t *TextBlock) AddCode(value string) *TextBlock {\n\tf := FormatedText{\n\t\tValue: value,\n\t\tIsCode: true,\n\t}\n\tt.Words = append(t.Words, f)\n\n\treturn t\n}", "title": "" }, { "docid": "46b9642edec3a636fbf1442d0599925d", "score": "0.43754318", "text": "func (s *Session) AddLine(line string) error {\n\n\tr := NewEntry(s.Parser)\n\terr := r.ParseLine(line)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ts.Entries = append(s.Entries, r)\n\ts.Report.TotalHits++\n\n\treturn nil\n}", "title": "" }, { "docid": "6bee41417c75299ae2f9f9c895a9d060", "score": "0.43656927", "text": "func (client *HtmlToImageClient) SetTag(tag string) *HtmlToImageClient {\n client.fields[\"tag\"] = tag\n return client\n}", "title": "" }, { "docid": "8bef90dc38c40b4634ed789d3df0eacc", "score": "0.43556875", "text": "func (todo *Todo) Edit(text string) {\n\ttodo.Text = text\n\ttodo.Timestamp = time.Now()\n}", "title": "" }, { "docid": "b6480d87192e738fcfffd137339836c4", "score": "0.4354694", "text": "func AddNamedImport(fset *token.FileSet, f *ast.File, name, path string) (edits []TextEdit, err error) {\n\tif alreadyImports(f, name, path) {\n\t\treturn nil, nil\n\t}\n\n\tnewImport := &ast.ImportSpec{\n\t\tPath: &ast.BasicLit{\n\t\t\tKind: token.STRING,\n\t\t\tValue: strconv.Quote(path),\n\t\t},\n\t}\n\tif name != \"\" {\n\t\tnewImport.Name = &ast.Ident{Name: name}\n\t}\n\n\t// TODO(suzmue): insert the import statement in the location that would be chosen\n\t// by astutil.AddNamedImport\n\t// Find the last import decl.\n\tvar lastImport = -1 // index in f.Decls of the file's final import decl\n\tfor i, decl := range f.Decls {\n\t\tgen, ok := decl.(*ast.GenDecl)\n\t\tif ok && gen.Tok == token.IMPORT {\n\t\t\tlastImport = i\n\t\t}\n\t}\n\n\t// Add an import decl after the last import.\n\timpDecl := &ast.GenDecl{\n\t\tTok: token.IMPORT,\n\t}\n\timpDecl.Specs = append(impDecl.Specs, newImport)\n\n\tvar insertPos token.Pos\n\tif lastImport >= 0 {\n\t\tinsertPos = f.Decls[lastImport].End()\n\t} else {\n\t\t// There are no existing imports.\n\t\t// Our new import, preceded by a blank line, goes after the package declaration\n\t\t// and after the comment, if any, that starts on the same line as the\n\t\t// package declaration.\n\t\tinsertPos = f.Name.End()\n\n\t\tfile := fset.File(f.Package)\n\t\tpkgLine := file.Line(f.Package)\n\t\tfor _, c := range f.Comments {\n\t\t\tif file.Line(c.Pos()) > pkgLine {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tinsertPos = c.End()\n\t\t}\n\t}\n\n\t// Print this import declaration.\n\tvar buf bytes.Buffer\n\tformat.Node(&buf, fset, impDecl)\n\tnewText := \"\\n\\n\" + buf.String() + \"\\n\"\n\n\trng := span.NewRange(fset, insertPos, insertPos)\n\tspn, err := rng.Span()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tedits = append(edits, TextEdit{\n\t\tSpan: spn,\n\t\tNewText: newText,\n\t})\n\treturn edits, nil\n}", "title": "" }, { "docid": "e1418f98df76713a629a3c567e037949", "score": "0.43544206", "text": "func (tdb tagDB) AddTag( tag TagObj) (err error) {\r\n\t\r\n\t// first check if tag already exists\r\n\t_, err = tdb.GetTagIndex( tag.PLCName, tag.TagName )\r\n\tif ( err == nil ){\r\n\t\t\r\n\t\t// tag exists, create a new error as the error\r\n\t\t// returned by GetTagIndex is worded in the opposite\r\n\t\terr = errors.New(tag.TagName + \" Already exists\")\r\n\t\treturn err\r\n\t}\r\n\r\n\t// Add the new tag to the slice\r\n\tTagDatabase.Tags = append(TagDatabase.Tags, tag)\r\n\treturn err\r\n}", "title": "" }, { "docid": "757c0a2ca97f3ec79cb3ef775a293f4c", "score": "0.43485445", "text": "func NewTag(ownerName string, ownerSource *url.Resource, key string, lineNumber int) *Tag {\n\tvar result = &Tag{\n\t\tOwnerName: ownerName,\n\t\tOwnerSource: ownerSource,\n\t\tName: key,\n\t\tLineNumber: lineNumber,\n\t}\n\tkey = decodeIteratorIfPresent(key, result)\n\tif len(key) > 2 && string(key[0:2]) == \"[]\" {\n\t\tresult.Name = string(key[2:])\n\t\tresult.IsArray = true\n\t}\n\n\tif rangeIndex := strings.LastIndex(result.Name, \"{\"); rangeIndex != -1 {\n\t\tresult.Name = string(result.Name[:rangeIndex])\n\t}\n\n\tif ownerName != \"\" {\n\t\townerName = ownerName + \"_\"\n\t}\n\tresult.tagIdPrefix = ownerName + result.Name\n\treturn result\n}", "title": "" }, { "docid": "0204f5fcc7ec1ce217d0c4ace577da90", "score": "0.43449187", "text": "func (f *TextArea) insertRune(r rune) {\n\t// get position cursor in buffer\n\tline, pos := f.cursorByScreen()\n\tif len(f.view.buffer) == 0 {\n\t\tf.view.buffer = []string{\"\"}\n\t}\n\t// prepare new line\n\trunes := []rune(f.view.buffer[line])\n\tstr := string(r)\n\tif str == \"\\t\" {\n\t\tstr = strings.Repeat(\" \", TabSize)\n\t}\n\tif pos < len(runes) {\n\t\trunes = append(runes[:pos], append([]rune(str), runes[pos:]...)...)\n\t} else {\n\t\trunes = append(runes[:pos], []rune(str)...)\n\t}\n\t// change buffer\n\tf.view.buffer[line] = string(runes)\n\t// update a view\n\tf.updateBuffers()\n}", "title": "" }, { "docid": "918677ad05612eac198918200592b087", "score": "0.43448797", "text": "func (tc *TextColumnar) Add(t string) uint32 {\n\ti, ok := tc.offset[t]\n\tif !ok {\n\t\ti = len(tc.offset)\n\t\tif i > 0 {\n\t\t\ttc.texts.WriteByte(SOH)\n\t\t}\n\t\ttc.texts.WriteString(t)\n\t\ttc.offset[t] = i\n\t}\n\n\treturn uint32(i) + 1\n}", "title": "" }, { "docid": "447096701138c815c875988ce5186d33", "score": "0.43420637", "text": "func (o *Tag) AddTagUses(exec boil.Executor, insert bool, related ...*TagUse) error {\n\tvar err error\n\tfor _, rel := range related {\n\t\tif insert {\n\t\t\trel.Tag = o.ID\n\t\t\tif err = rel.Insert(exec); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"failed to insert into foreign table\")\n\t\t\t}\n\t\t} else {\n\t\t\tupdateQuery := fmt.Sprintf(\n\t\t\t\t\"UPDATE \\\"tag_use\\\" SET %s WHERE %s\",\n\t\t\t\tstrmangle.SetParamNames(\"\\\"\", \"\\\"\", 1, []string{\"tag\"}),\n\t\t\t\tstrmangle.WhereClause(\"\\\"\", \"\\\"\", 2, tagUsePrimaryKeyColumns),\n\t\t\t)\n\t\t\tvalues := []interface{}{o.ID, rel.Container, rel.Segment, rel.Tag, rel.Who}\n\n\t\t\tif boil.DebugMode {\n\t\t\t\tfmt.Fprintln(boil.DebugWriter, updateQuery)\n\t\t\t\tfmt.Fprintln(boil.DebugWriter, values)\n\t\t\t}\n\n\t\t\tif _, err = exec.Exec(updateQuery, values...); err != nil {\n\t\t\t\treturn errors.Wrap(err, \"failed to update foreign table\")\n\t\t\t}\n\n\t\t\trel.Tag = o.ID\n\t\t}\n\t}\n\n\tif o.R == nil {\n\t\to.R = &tagR{\n\t\t\tTagUses: related,\n\t\t}\n\t} else {\n\t\to.R.TagUses = append(o.R.TagUses, related...)\n\t}\n\n\tfor _, rel := range related {\n\t\tif rel.R == nil {\n\t\t\trel.R = &tagUseR{\n\t\t\t\tTag: o,\n\t\t\t}\n\t\t} else {\n\t\t\trel.R.Tag = o\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3c5812ee0d6ba118fd201639e2788075", "score": "0.43238354", "text": "func (cu *CodeUtils) GenTags(f *parser.Field, insertPoint string) (string, error) {\n\tvar tags []string\n\tif f.Requiredness == parser.FieldType_Required {\n\t\ttags = append(tags, fmt.Sprintf(`thrift:\"%s,%d,required\"`, f.Name, f.ID))\n\t} else {\n\t\ttags = append(tags, fmt.Sprintf(`thrift:\"%s,%d\"`, f.Name, f.ID))\n\t}\n\n\tif gotags := f.Annotations.Get(\"go.tag\"); len(gotags) > 0 {\n\t\ttags = append(tags, gotags[0])\n\t} else {\n\t\tif cu.Features().GenDatabaseTag {\n\t\t\ttags = append(tags, fmt.Sprintf(`db:\"%s\"`, f.Name))\n\t\t}\n\n\t\tif f.Requiredness.IsOptional() && cu.Features().GenOmitEmptyTag {\n\t\t\ttags = append(tags, fmt.Sprintf(`json:\"%s,omitempty\"`, f.Name))\n\t\t} else {\n\t\t\ttags = append(tags, fmt.Sprintf(`json:\"%s\"`, f.Name))\n\t\t}\n\t}\n\tstr := fmt.Sprintf(\"`%s%s`\", strings.Join(tags, \" \"), insertPoint)\n\treturn str, nil\n}", "title": "" }, { "docid": "8e51a29f6247ea84ad05d890fe18680c", "score": "0.43206146", "text": "func (m *Message) AddTag(key string, val string) {\n\tvar tag *Tag\n\n\tfor _, t := range m.Tags {\n\t\tif t.Name == key {\n\t\t\ttag = t\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif tag == nil {\n\t\ttag = &Tag{Name: key}\n\t\tm.Tags = append(m.Tags, tag)\n\t}\n\n\tif val == \"\" {\n\t\ttag.Value = nil\n\t} else {\n\t\ttag.Value = &val\n\t}\n}", "title": "" }, { "docid": "2632f28742dffa597f31935a67c7d8f1", "score": "0.4315716", "text": "func (tb *TextBuf) EditDone() {\n\ttb.AutoSaveDelete()\n\ttb.ClearChanged()\n\ttb.LinesToBytes()\n\ttb.TextBufSig.Emit(tb.This(), int64(TextBufDone), tb.Txt)\n}", "title": "" }, { "docid": "46d184dac1abab064b1bc6be9de92aac", "score": "0.43136263", "text": "func (db *Database) AddTag(name string) int64 {\n\tdb.Execute2(\"insert or ignore into tags(name) values(?)\", name)\n\tstmt, _ := db.Execute2(\"select id from tags where name = (?)\", name)\n\tif stmt.Row() != nil {\n\t\treturn (stmt.Row())[0].(int64)\n\t}\n\treturn -1\n}", "title": "" }, { "docid": "7ebb05115dfc31ba99dd59001b8423e5", "score": "0.43097675", "text": "func (e *Editor) NewLine(c *vt100.Canvas, status *StatusBar) {\n\te.InsertLineBelow()\n\te.Down(c, status)\n}", "title": "" }, { "docid": "27c3d2582e0de4ab63b1ab1b6ce042fe", "score": "0.43087405", "text": "func (l *LineNoise) AddHistory(line string) {\n\n}", "title": "" }, { "docid": "114c4b3e1d5ebec20cf95994e10f045f", "score": "0.43014255", "text": "func ReqAddTag(ut string, req []llrp.TagRecord) string {\n\t// TODO: success/fail notification per tag\n\tfailed := false\n\tfor _, t := range req {\n\t\ttag, err := llrp.NewTag(&llrp.TagRecord{\n\t\t\tPCBits: t.PCBits,\n\t\t\tEPC: t.EPC,\n\t\t})\n\t\tif err != nil {\n\t\t\tlog.Error(err)\n\t\t}\n\n\t\tadd := TagManager{\n\t\t\tAction: AddTags,\n\t\t\tTags: []*llrp.Tag{tag},\n\t\t}\n\t\ttagManagerChannel <- add\n\t}\n\n\tif failed {\n\t\tlog.Warnf(\"failed %v %v\", ut, req)\n\t\treturn \"error\"\n\t}\n\tlog.Debugf(\"%v %v\", ut, req)\n\treturn ut\n}", "title": "" }, { "docid": "8290e85849df2505a98cdec3d482f01c", "score": "0.4300755", "text": "func (b *Builder) registerTag(name string, kind yaml.Kind, process func(*yaml.Node) error) {\n\tb.tags = append(b.tags, tagRegistryEntry{\n\t\tname: name,\n\t\tkind: kind,\n\t\tprocess: process,\n\t})\n}", "title": "" }, { "docid": "9d7a40cc41ba5c3929cd92702e3c6260", "score": "0.42890346", "text": "func AddSupport(value string) {\n\tif supportLine != \"\" {\n\t\tsupportLine += \" \" + value\n\t} else {\n\t\tsupportLine = value\n\t}\n}", "title": "" }, { "docid": "f068012079df5d6ff5e969dc11bb5835", "score": "0.42833886", "text": "func (p *Pipe) AddLine(l Line) mutable.Mutation {\n\treturn p.mctx.Mutate(func() error {\n\t\tdest, ok := p.pusher.Destination(l.Context)\n\t\tr, err := l.Runner(p.bufferSize, dest)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif !l.Context.IsMutable() {\n\t\t\tp.runners[dest] = r\n\t\t\tr.bindContexts(p.pusher, dest)\n\t\t\tr.start(p.ctx, &p.errorMerger)\n\t\t\treturn nil\n\t\t}\n\n\t\t// sync exec\n\t\tif ok {\n\t\t\t// add line to existing multiline runner\n\t\t\tmlr := p.runners[dest].(*MultiLineRunner)\n\t\t\tp.pusher.Put(l.Context.Mutate(func() error {\n\t\t\t\tmlr.Lines = append(mlr.Lines, r)\n\t\t\t\treturn nil\n\t\t\t}))\n\t\t} else {\n\t\t\t// add new multiline runner\n\t\t\tmlr := &MultiLineRunner{\n\t\t\t\tLines: []*LineRunner{r},\n\t\t\t}\n\t\t\tr.bindContexts(p.pusher, dest)\n\t\t\tmlr.start(p.ctx, &p.errorMerger)\n\t\t}\n\t\treturn nil\n\t})\n}", "title": "" }, { "docid": "d0fc12a029b8bfa7fd6f70882ddc9c0c", "score": "0.42793664", "text": "func (b *Bookmark) Add(k, v string, tags ...string) {\n\tb.data.Add(k, v)\n\tb.index.Add(k, k)\n\tfor _, t := range tags {\n\t\tb.index.Add(t, k)\n\t}\n}", "title": "" }, { "docid": "c98607626761ae49084112241f7023e0", "score": "0.427926", "text": "func (lines *Lines) AddOrUpdateLine(lineNumber int, hits int64) {\n\tif len(*lines) > 0 {\n\t\tlastLine := (*lines)[len(*lines)-1]\n\t\tif lineNumber == lastLine.Number {\n\t\t\tif hits < lastLine.Hits {\n\t\t\t\tlastLine.Hits = hits\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n\t*lines = append(*lines, &Line{Number: lineNumber, Hits: hits})\n}", "title": "" }, { "docid": "c51dbbcb3e73d4cc3f2cc3501a1d54c4", "score": "0.42679694", "text": "func (e *Encoder) AddLine(line string) error {\n\tle, err := EncodeFromString(line + \"\\n\")\n\tif err != nil {\n\t\treturn err\n\t}\n\n\te.lines = append(e.lines, le)\n\treturn nil\n}", "title": "" }, { "docid": "3bf43319f026b9cd047fc4090edfd45e", "score": "0.42613637", "text": "func (r *SyndicationRepository) Tag(ctx context.Context, s *syndication.Source, t *syndication.Tag) error {\n\tquery := `\n\t\tINSERT INTO syndication_tags_relation\n\t\t(source_id, tag_id)\n\t\tVALUES\n\t\t(?, ?)\n\t`\n\t_, err := r.db.ExecContext(\n\t\tctx,\n\t\tformatQuery(query),\n\t\ts.ID,\n\t\tt.ID,\n\t)\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"execute\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b439010c6cf21374c7b834a751b26f42", "score": "0.42611688", "text": "func (tb *TextBuf) InsertTextRectImpl(tbe *textbuf.Edit) *textbuf.Edit {\n\tst := tbe.Reg.Start\n\ted := tbe.Reg.End\n\tnlns := (ed.Ln - st.Ln) + 1\n\tif nlns <= 0 {\n\t\treturn nil\n\t}\n\t// make sure there are enough lines -- add as needed\n\tcln := len(tb.Lines)\n\tif cln == 0 {\n\t\ttb.New(nlns)\n\t} else if cln <= ed.Ln {\n\t\tnln := (1 + ed.Ln) - cln\n\t\ttmp := make([][]rune, nln)\n\t\ttb.Lines = append(tb.Lines, tmp...) // first append to end to extend capacity\n\t\ttb.NLines = len(tb.Lines)\n\t\tie := &textbuf.Edit{}\n\t\tie.Reg.Start.Ln = cln - 1\n\t\tie.Reg.End.Ln = ed.Ln\n\t\ttb.LinesInserted(ie)\n\t}\n\tnch := (ed.Ch - st.Ch)\n\tfor i := 0; i < nlns; i++ {\n\t\tln := st.Ln + i\n\t\tlr := tb.Lines[ln]\n\t\tir := tbe.Text[i]\n\t\tif len(lr) < st.Ch {\n\t\t\tlr = append(lr, runes.Repeat([]rune(\" \"), st.Ch-len(lr))...)\n\t\t}\n\t\tnt := append(lr, ir...) // first append to end to extend capacity\n\t\tcopy(nt[st.Ch+nch:], nt[st.Ch:]) // move stuff to end\n\t\tcopy(nt[st.Ch:], ir) // copy into position\n\t\ttb.Lines[ln] = nt\n\t}\n\tre := tbe.Clone()\n\tre.Delete = false\n\tre.Reg.TimeNow()\n\ttb.LinesEdited(re)\n\treturn re\n}", "title": "" }, { "docid": "1f314177de17f78823a8d204e99a7fe8", "score": "0.42491278", "text": "func (t *TextBlock) AddItalic(value string) *TextBlock {\n\tf := FormatedText{\n\t\tValue: value,\n\t\tIsItalic: true,\n\t}\n\tt.Words = append(t.Words, f)\n\n\treturn t\n}", "title": "" }, { "docid": "f85a96ab471ca898b49affe543d588ac", "score": "0.4248963", "text": "func (h *handler) LineExist(l string) (bool, int) {\r\n\tfor i := range h.Lines {\r\n\t\tif strings.ToLower(h.Lines[i].Text) == l {\r\n\t\t\treturn true, i\r\n\t\t}\r\n\t}\r\n\tnl := Line{Text: l}\r\n\th.Lines = append(h.Lines, &nl)\r\n\r\n\t// return index of newly added line item\r\n\treturn false, len(h.Lines) - 1\r\n}", "title": "" }, { "docid": "4e2981aae026a0e4536567f9e11a8059", "score": "0.42471206", "text": "func SetSpanComponentTag(span opentracing.Span, name string) {\n\tif span == nil {\n\t\treturn\n\t}\n\text.Component.Set(span, name)\n}", "title": "" }, { "docid": "1f92a0ebf1499f8f39703ba1f70d6d8d", "score": "0.42460504", "text": "func (d *Display) AddVerbose(s string) error {\n\ts = strings.TrimRight(s, \"\\n\")\n\tif strings.Contains(s, \"\\n\") {\n\t\treturn callForEachLine(s, d.AddVerbose)\n\t}\n\n\tth := d.tm.newHandle()\n\tif d.numVerboseRows < d.maxVerboseRows {\n\t\td.numVerboseRows++\n\t\td.scrollForStatusAndVerbose(th)\n\t} else {\n\t\td.scrollRegion(th, d.statusRow+1, d.statusRow+d.numVerboseRows, 1)\n\t}\n\n\tth.setCursorPos(d.statusRow+d.numVerboseRows, 1)\n\tth.clearLine()\n\t// TODO(derat): Wrap long lines here too.\n\tif len(s) > d.screenCols {\n\t\ts = s[:d.screenCols]\n\t}\n\tth.writeString(s)\n\treturn th.close()\n}", "title": "" }, { "docid": "593115b225a81ed53fd93b1b4a08e398", "score": "0.42448905", "text": "func (tb *TextBuf) InsertTextRect(tbe *textbuf.Edit, signal bool) *textbuf.Edit {\n\tif tbe == nil {\n\t\treturn nil\n\t}\n\ttb.FileModCheck() // will just revert changes if shouldn't have changed\n\ttb.SetChanged()\n\ttb.LinesMu.Lock()\n\tnln := tb.NLines\n\tre := tb.InsertTextRectImpl(tbe)\n\ttb.SaveUndo(re)\n\ttb.LinesMu.Unlock()\n\tif signal {\n\t\tif re.Reg.End.Ln >= nln {\n\t\t\tie := &textbuf.Edit{}\n\t\t\tie.Reg.Start.Ln = nln - 1\n\t\t\tie.Reg.End.Ln = re.Reg.End.Ln\n\t\t\ttb.TextBufSig.Emit(tb.This(), int64(TextBufInsert), ie)\n\t\t} else {\n\t\t\ttb.Refresh()\n\t\t}\n\t}\n\tif tb.Autosave {\n\t\tgo tb.AutoSave()\n\t}\n\treturn re\n}", "title": "" }, { "docid": "74de2698c0068e763db77528b4896cb7", "score": "0.42436633", "text": "func (t Tag) Line() string {\n\tu := Unit(t)\n\treturn u.escape().line()\n}", "title": "" } ]
07aa962a310cc50fe458cd9d7f03bd26
GetPixelColor Get a pixel color by a position
[ { "docid": "aac9506fbdc2555d79ec42aaffff14da", "score": "0.72849077", "text": "func GetPixelColor(instructionData reflect.Value, finished chan bool) int {\n\tfmt.Println(\"FIBER INFO: Getting pixel color ...\")\n\n\tx, err := variable.GetValue(instructionData, \"XVarName\", \"XIsVar\", \"X\")\n\tif err != nil {\n\t\tfinished <- true\n\t\treturn -1\n\t}\n\n\ty, err := variable.GetValue(instructionData, \"YVarName\", \"YIsVar\", \"Y\")\n\tif err != nil {\n\t\tfinished <- true\n\t\treturn -1\n\t}\n\n\tvariable.SetVariable(instructionData.FieldByName(\"Output\").Interface().(string), robotgo.GetPixelColor(x.(int), y.(int)))\n\tfinished <- true\n\treturn -1\n}", "title": "" } ]
[ { "docid": "fea5c63531468f5d951bacf39ee553f9", "score": "0.7002874", "text": "func (s *Surface) GetPixel(x int, y int) Color {\n\ti := (y*s.Width + x) * 4\n\tp := *s.pixels\n\treturn Color{\n\t\tR: p[i+0],\n\t\tG: p[i+1],\n\t\tB: p[i+2],\n\t\tA: p[i+3],\n\t}\n}", "title": "" }, { "docid": "b4d728d0fdfce0200865f201bd2811d7", "score": "0.68903935", "text": "func GetPixelColor(x, y int, displayId ...int) string {\n\treturn PadHex(GetPxColor(x, y, displayId...))\n}", "title": "" }, { "docid": "f9b05401a36d5160175822eed4ef7e9f", "score": "0.66046256", "text": "func GetPixelColor(iterations int, multiplier color.RGBA64) color.RGBA64 {\n\treturn color.RGBA64{\n\t\tuint16((uint16(iterations) * multiplier.R) % 65535),\n\t\tuint16((uint16(iterations) * multiplier.G) % 65535),\n\t\tuint16((uint16(iterations) * multiplier.B) % 65535),\n\t\t65535,\n\t}\n}", "title": "" }, { "docid": "cebcce403b8ed2699ac7e5dc574548b2", "score": "0.66001576", "text": "func (c *Canvas) GetPixel(w, h int) (*color.Color, error) {\n\tif w < 0 || w >= c.Width || h < 0 || h >= c.Height {\n\t\treturn nil, errors.New(\"attempt to access pixel outside of canvas\")\n\t}\n\treturn c.Colors[h][w], nil\n}", "title": "" }, { "docid": "b20f42b54bc7d5ce6ab45c29cb3ab5b7", "score": "0.6471239", "text": "func PixelAt(canvas Canvas, x int, y int) colors.Color {\n\treturn canvas.Pixels[x][y]\n}", "title": "" }, { "docid": "14b26698901bf830ab2e1fc51c8ba046", "score": "0.6453237", "text": "func (id imageData) getIndexOfPixel(x, y int) int {\n\treturn (x + y*id.Width()) * 4\n}", "title": "" }, { "docid": "6383ae4985c9d0fe1d3c25e4a6570d84", "score": "0.63980204", "text": "func (canvas *Canvas) PixelAt(x, y int) *Color {\n\tif !canvas.checkBounds(x, y) {\n\t\treturn nil\n\t}\n\treturn canvas.pixels[y][x]\n}", "title": "" }, { "docid": "bd67ddbe15b0c4af37bf9aab60b6f1fc", "score": "0.6352681", "text": "func (bmp *Bitmap) ColorAt(x, y int) Color {\n\treturn ColorWithARGB(0, 0, 0, 0)\n}", "title": "" }, { "docid": "0dfcc9a7293884d3f4dbc9ffbd289e1d", "score": "0.63522434", "text": "func (b *Board) ColorAt(x, y int32) *graphics.Color {\n\treturn &(b.colors[x*b.size+y])\n}", "title": "" }, { "docid": "ea01aacf83f098f78a622711376883cc", "score": "0.6333691", "text": "func (c *Converted) At(x, y int) color.Color{\n return c.Mod.Convert(c.Img.At(x,y))\n}", "title": "" }, { "docid": "530e281e76749bd49de87542f78c8c2f", "score": "0.6307345", "text": "func (point *Point) GetColor() uint32 {\n\treturn point.color\n}", "title": "" }, { "docid": "a5a2924ca052aa0886fa2585828a2a86", "score": "0.62359476", "text": "func getColor(img image.Image, winWidth, winHeight, x, y int) sdl.Color {\n\t// coordinates relative to image\n\timgX := x - (winWidth-img.Bounds().Max.X)/2\n\timgY := y - (winHeight-img.Bounds().Max.Y)/2\n\n\tcodeColor := sdl.Color(config.codeColor)\n\n\t// outside of image\n\tif imgX < 0 || imgX >= img.Bounds().Max.X {\n\t\treturn codeColor\n\t}\n\n\tif imgY < 0 || imgY >= img.Bounds().Max.Y {\n\t\treturn codeColor\n\t}\n\n\tcolor := img.At(imgX, imgY)\n\tr, g, b, a := color.RGBA()\n\n\t// full transparent\n\tif a == 0 {\n\t\treturn codeColor\n\t}\n\n\tresult := sdl.Color{\n\t\tR: uint8((float32)(r) / 0xffff * 0xff),\n\t\tG: uint8(float32(g) / 0xffff * 0xff),\n\t\tB: uint8(float32(b) / 0xffff * 0xff),\n\t\tA: uint8(float32(a) / 0xffff * 0xff),\n\t}\n\n\tif result == sdl.Color(config.bgColor) {\n\t\tresult = codeColor\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "7d954126c52d227e77a2b84da8a44026", "score": "0.6228829", "text": "func (cnv Canvas) Pixel(x, y int) color.Color {\n\treturn cnv.pixels[cnv.index(x, y)]\n}", "title": "" }, { "docid": "becdad039b8e5984c9539f11fa29ec9d", "score": "0.62118", "text": "func (t *Texture) GetColor(x, y float64) color.RGBA {\n\ta := int(x * float64(t.width))\n\tb := int(y * float64(t.height))\n\treturn t.tex.RGBAAt(a, b)\n}", "title": "" }, { "docid": "fcf1d2148ad2dace15d83bc7d886e339", "score": "0.6198207", "text": "func (im Image) At(x,y int) color.Color{\n\nv:= uint8(x^2*y^2) \nreturn color.RGBA{v, v, 255, 255}\n}", "title": "" }, { "docid": "0aa84e41667d52d77fe50385d41133ce", "score": "0.6180037", "text": "func (bmp *Bitmap) Pixel(x, y int) (color Color) {\n return wrapColor(C.al_get_pixel(bmp.handle, C.int(x), C.int(y)))\n}", "title": "" }, { "docid": "42881f42821071273d300930e81a8472", "score": "0.6099652", "text": "func (m *Maze) GetPixel(row int, rowPos int) (*Pixel, error) {\n\tif row < len(m.pixels) && rowPos < len(m.pixels[row]) {\n\t\treturn &m.pixels[row][rowPos], nil\n\t}\n\treturn nil, fmt.Errorf(\"Pixel does not exist at array position (%d,%d)\", row, rowPos)\n}", "title": "" }, { "docid": "039344c80b9498e8e88bc799a8995005", "score": "0.6081893", "text": "func colorAtPoint64(x, y float64, maxIter int) color.Color {\n\tx0, y0, iter := x, y, 0\n\tfor ; (x*x+y*y <= 4) && (iter < maxIter); iter++ {\n\t\tx, y = x*x-y*y+x0, 2*x*y+y0\n\t}\n\treturn iterationToColor64(iter, maxIter)\n}", "title": "" }, { "docid": "9831430452779bde1aef0c9ec1fcbacc", "score": "0.6043176", "text": "func processPixel(px color.Color) uint64 {\n\tdiscolored := color.GrayModel.Convert(px)\n\tvalue := reflect.ValueOf(discolored).FieldByName(\"Y\")\n\n\treturn value.Uint()\n}", "title": "" }, { "docid": "0c8746adf0f8df73279d3fa9c3f5e5b6", "score": "0.6012233", "text": "func GetMouseColor(instructionData reflect.Value, finished chan bool) int {\n\tfmt.Println(\"FIBER INFO: Getting mouse pixel color ...\")\n\n\tvariable.SetVariable(instructionData.FieldByName(\"Output\").Interface().(string), robotgo.GetMouseColor())\n\tfinished <- true\n\treturn -1\n}", "title": "" }, { "docid": "9ab1d24e0cfd63c1e7c0fdc990ea94f1", "score": "0.60055685", "text": "func GetPixel(HDC uint32, x, y int32) int32 {\n\tret, _, _ := syscall.Syscall(getPixel, 3,\n\t\tuintptr(HDC),\n\t\tuintptr(x),\n\t\tuintptr(y))\n\n\treturn int32(ret)\n}", "title": "" }, { "docid": "6d00337735352d48ba1a57608d5434d3", "score": "0.60015374", "text": "func (col *Color) GetColor() (r, g, b float64) {\n\tr, g, b, _ = col.GetTuple()\n\treturn r, g, b\n}", "title": "" }, { "docid": "377d80491c328987afde0f6688692bc4", "score": "0.59855884", "text": "func (this *Winner) ColorAt(position float64, baseColor RGBA) RGBA {\n\n\tif this.left <= position && position <= this.right && int(this.time*4)%2 == 0 {\n\t\treturn this.color\n\t}\n\n\treturn baseColor\n}", "title": "" }, { "docid": "46c7d64b7e859335a661949cb585e3f7", "score": "0.5966356", "text": "func (s *Surface) GetPixelv(v Vec2) Color {\n\treturn s.GetPixel(v.X, v.Y)\n}", "title": "" }, { "docid": "bbbd8d92ecd2ccca0fad61a3f8055334", "score": "0.5943326", "text": "func (t *Texture) ColorAt(uv mgl64.Vec2) color64.Color64 {\n\tbounds := t.img.Bounds()\n\tw := float64(bounds.Max.X - 1)\n\th := float64(bounds.Max.Y - 1)\n\tx, y := uv.X()*w, uv.Y()*h\n\tfx, fy := math.Floor(x), math.Floor(y)\n\ti, j := int(fx), int(fy)\n\n\tulr, ulg, ulb, _ := t.img.At(i, j).RGBA()\n\turr, urg, urb, _ := t.img.At(i+1, j).RGBA()\n\tllr, llg, llb, _ := t.img.At(i, j+1).RGBA()\n\tlrr, lrg, lrb, _ := t.img.At(i+1, j+1).RGBA()\n\n\tdx, dy := x-fx, y-fy\n\n\tul := (1 - dx) * (1 - dy)\n\tur := dx * (1 - dy)\n\tll := (1 - dx) * dy\n\tlr := dx * dy\n\tr := ul*float64(ulr) + ur*float64(urr) + ll*float64(llr) + lr*float64(lrr)\n\tg := ul*float64(ulg) + ur*float64(urg) + ll*float64(llg) + lr*float64(lrg)\n\tb := ul*float64(ulb) + ur*float64(urb) + ll*float64(llb) + lr*float64(lrb)\n\n\treturn color64.Color64{r / 65535, g / 65535, b / 65535}\n}", "title": "" }, { "docid": "06d696809f48ac9a0fc761c62ad6091f", "score": "0.5895027", "text": "func (self Image) Pixel(x, y uint) Color {\n\treturn Color{C.sfImage_getPixel(self.Cref, C.uint(x), C.uint(y))}\n}", "title": "" }, { "docid": "a838268802f00e47a1232dd85437a850", "score": "0.5861447", "text": "func (bmp *Bitmap) Index8ColorAt(x, y int) PremulColor {\n\ttoimpl()\n\treturn PremulColor(0)\n}", "title": "" }, { "docid": "b68d6f69b66c72c42829570b177038bd", "score": "0.5850251", "text": "func (s *CommandCircle) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "8db8c3cf76093435c15a8b637b299f9d", "score": "0.58476895", "text": "func (s *CommandCircleFilled) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "5f7030027fb467cafda08119158c799c", "score": "0.58432686", "text": "func (surface *Surface) GetColorMod() (r, g, b uint8, err error) {\n\t_r := (*C.Uint8)(unsafe.Pointer(&r))\n\t_g := (*C.Uint8)(unsafe.Pointer(&g))\n\t_b := (*C.Uint8)(unsafe.Pointer(&b))\n\tif C.SDL_GetSurfaceColorMod(surface.cptr(), _r, _g, _b) != 0 {\n\t\treturn r, g, b, GetError()\n\t}\n\treturn r, g, b, nil\n}", "title": "" }, { "docid": "bd64ae7d4f71af6746697ed77a7e05f1", "score": "0.5820047", "text": "func (p *pixelBuffer) GetColor(colorID ColorID) color.Color {\n\treturn p.palette.GetColor(colorID)\n}", "title": "" }, { "docid": "bbafc8939441ad4ec7630f2aef7c0b79", "score": "0.58029145", "text": "func (pix PixelData) At(x, y int) color.Color {\n\tformat := pix.s.format\n\tptr := pix.pixel(x, y)\n\t// TODO(adam): not necesarily NRGBA (which would be an entirely different codepath)\n\tvar col color.NRGBA\n\n\tswitch format.BytesPerPixel {\n\tcase 4:\n\t\tpixel := *(*uint32)(ptr)\n\t\tcol.R = expandColor(pixel, format.Rmask, format.Rshift, format.Rloss)\n\t\tcol.G = expandColor(pixel, format.Gmask, format.Gshift, format.Gloss)\n\t\tcol.B = expandColor(pixel, format.Bmask, format.Bshift, format.Bloss)\n\t\t// If the alpha mask is 0, there's no alpha component, so set it opaque.\n\t\tif format.Amask == 0 {\n\t\t\tcol.A = ^uint8(0)\n\t\t} else {\n\t\t\tcol.A = expandColor(pixel, format.Amask, format.Ashift, format.Aloss)\n\t\t}\n\tdefault:\n\t\t// TODO(#22): handle all pixel formats\n\t\tpanic(\"pixel format not handled\")\n\t}\n\treturn col\n}", "title": "" }, { "docid": "7a4c54351b13642d4c3080fae8ba897d", "score": "0.57702637", "text": "func (self *Color) GetColor(r int, g int, b int) int{\n return self.Object.Call(\"getColor\", r, g, b).Int()\n}", "title": "" }, { "docid": "2b7fd2c3d4cb6e7823d6bfc9dc442bf3", "score": "0.57691467", "text": "func (m Mandelbrot) colorAt(i int) color.Color {\n\tr, g, b := HSVToRGB(1.0-math.Mod(float64(i%m.Colors)/float64(m.Colors)+0.3333, 1.0), 1.0, 1.0)\n\treturn color.RGBA{r, g, b, 255}\n}", "title": "" }, { "docid": "7c6251d774dd9a1738d92fb5db906fb7", "score": "0.5755035", "text": "func GetLocationColor(displayId ...int) string {\n\tx, y := Location()\n\treturn GetPixelColor(x, y, displayId...)\n}", "title": "" }, { "docid": "41563d594f6cb024566eb48ef506b048", "score": "0.5729719", "text": "func (this *HSLWheel) ColorAt(position float64, baseColor RGBA) RGBA {\n\n\tluminosity := position / this.scale\n\n\t// shift it up because we don't care much about the very dark colors\n\t//luminosity = luminosity*0.8 + 0.2\n\n\treturn hslToRGB(this.hue, 1.0, luminosity)\n}", "title": "" }, { "docid": "51359195f287b54eddc5a2ac1521e7eb", "score": "0.57263494", "text": "func (i *Image) At(x, y int) color.Color {\n\tif !(image.Point{x, y}.In(i.Clipr)) {\n\t\treturn color.Transparent\n\t}\n\tif i.Repl && !(image.Point{x, y}.In(i.R)) {\n\t\t// Translate (x, y) to be within i.R.\n\t\tx = (x-i.R.Min.X)%(i.R.Max.X-i.R.Min.X) + i.R.Min.X\n\t\ty = (y-i.R.Min.Y)%(i.R.Max.Y-i.R.Min.Y) + i.R.Min.Y\n\t}\n\tvar buf [4]byte\n\t_, err := i.Unload(image.Rect(x, y, x+1, y+1), buf[:])\n\tif err != nil {\n\t\tprintln(\"image.At: error in Unload: \", err.Error())\n\t\treturn color.Transparent // As good a value as any.\n\t}\n\t// For multi-byte pixels, the ordering is little-endian.\n\t// For sub-byte pixels, the ordering is big-endian (0x80 is the first bit).\n\t// Three cheers for PCs.\n\tswitch i.Pix {\n\tcase GREY1:\n\t\t// CGrey, 1\n\t\tmask := uint8(1 << uint8(7-x&7))\n\t\treturn Gray1{(buf[0] & mask) != 0}\n\tcase GREY2:\n\t\t// CGrey, 2\n\t\tshift := uint(x&3) << 1\n\t\t// Place pixel at top of word.\n\t\ty := buf[0] << shift\n\t\ty &= 0xC0\n\t\t// Replicate throughout.\n\t\ty |= y >> 2\n\t\ty |= y >> 4\n\t\treturn Gray2{y}\n\tcase GREY4:\n\t\t// CGrey, 4\n\t\tshift := uint(x&1) << 2\n\t\t// Place pixel at top of word.\n\t\ty := buf[0] << shift\n\t\ty &= 0xF0\n\t\t// Replicate throughout.\n\t\ty |= y >> 4\n\t\treturn Gray4{y}\n\tcase GREY8:\n\t\t// CGrey, 8\n\t\treturn color.Gray{buf[0]}\n\tcase CMAP8:\n\t\t// CMap, 8\n\t\treturn CMap8{buf[0]}\n\tcase RGB15:\n\t\tv := uint16(buf[0]) | uint16(buf[1])<<8\n\t\treturn CRGB15{v}\n\tcase RGB16:\n\t\tv := uint16(buf[0]) | uint16(buf[1])<<8\n\t\treturn CRGB16{v}\n\tcase RGB24:\n\t\t// CRed, 8, CGreen, 8, CBlue, 8\n\t\treturn color.RGBA{buf[2], buf[1], buf[0], 0xFF}\n\tcase BGR24:\n\t\t// CBlue, 8, CGreen, 8, CRed, 8\n\t\treturn color.RGBA{buf[0], buf[1], buf[2], 0xFF}\n\tcase RGBA32:\n\t\t// CRed, 8, CGreen, 8, CBlue, 8, CAlpha, 8\n\t\treturn color.RGBA{buf[3], buf[2], buf[1], buf[0]}\n\tcase ARGB32:\n\t\t// CAlpha, 8, CRed, 8, CGreen, 8, CBlue, 8 // stupid VGAs\n\t\treturn color.RGBA{buf[2], buf[1], buf[0], buf[3]}\n\tcase ABGR32:\n\t\t// CAlpha, 8, CBlue, 8, CGreen, 8, CRed, 8\n\t\treturn color.RGBA{buf[0], buf[1], buf[2], buf[3]}\n\tcase XRGB32:\n\t\t// CIgnore, 8, CRed, 8, CGreen, 8, CBlue, 8\n\t\treturn color.RGBA{buf[2], buf[1], buf[0], 0xFF}\n\tcase XBGR32:\n\t\t// CIgnore, 8, CBlue, 8, CGreen, 8, CRed, 8\n\t\treturn color.RGBA{buf[0], buf[1], buf[2], 0xFF}\n\tdefault:\n\t\tpanic(\"unknown color\")\n\t}\n}", "title": "" }, { "docid": "50e0b7f8764195b0427223d267dfaed9", "score": "0.57259184", "text": "func (s *FontAtlas) GetPixel() *unsafe.Pointer {\n\tvar ret *unsafe.Pointer\n\tret = (*unsafe.Pointer)(unsafe.Pointer(&s.pixel))\n\treturn ret\n}", "title": "" }, { "docid": "c8af098780a25a6fdc8a26b91a77e1bb", "score": "0.5723993", "text": "func (s *CommandRect) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "ecfc67e7c1fe23b5f873d82b408e7dbe", "score": "0.5719997", "text": "func getColor(colorName string) (uint8, uint8, uint8) {\n\tswitch colorName {\n\tcase \"orange\":\n\t\treturn 254, 152, 36\n\tcase \"white\":\n\t\treturn 247, 233, 217\n\tdefault:\n\t\treturn 247, 233, 217\n\t}\n}", "title": "" }, { "docid": "d5c628b38df855c205d765c9c3e99f97", "score": "0.5706464", "text": "func (pos *Position) ByColor(col Color) Bitboard {\n\treturn pos.curr.ByColor[col]\n}", "title": "" }, { "docid": "0e71eae077039ebef6f5ea3a3278f4e2", "score": "0.56959224", "text": "func (s *CommandRectFilled) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "9ec7c5c316febcc9aa2b581bb1cb6cf4", "score": "0.56916445", "text": "func (s *CommandPolygon) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "e39bd5c38bf328066699e48d1ccad8b9", "score": "0.5687958", "text": "func (pix PixelData) pixel(x, y int) unsafe.Pointer {\n\toffset := uintptr(y)*uintptr(pix.s.pitch) + uintptr(x)*uintptr(pix.s.format.BytesPerPixel)\n\treturn unsafe.Pointer(uintptr(pix.s.pixels) + offset)\n}", "title": "" }, { "docid": "65d5cfa5733dbb2866d6616a37b66b48", "score": "0.56757665", "text": "func (s *CommandPolygonFilled) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "3a0c5e8ba362172bb7ad354a14b525cd", "score": "0.5618585", "text": "func (mmu * MMU) backgroundPixelAt(x uint8, y uint8) int {\n // 32 tiles per row. y>>3 (same as y/8) gets the row. x>>3 (x/8) gets the columns\n tileMapOffset := (uint16(x)>>3) + (uint16(y)>>3)*32\n tileSelectionAddress := mmu.bgTileMapStartAddress() + uint16(tileMapOffset)\n tileNumber := mmu.read8(tileSelectionAddress) // Which one of 256 tiles are to be shown\n tileDataAddress := mmu.bgTileDataAddress(tileNumber) // Where the 16-bytes of the tile begin\n\n tileYOffset := (y & 0x7)*2 // Each row in the tile takes 2 bytes\n tileXOffset := (x & 0x7) // Each col in the tile is 1 bit\n pixelByte := tileDataAddress + uint16(tileYOffset)\n pixLow := (mmu.read8(pixelByte+1) >> (7-tileXOffset)) & 0x1\n pixHigh := (mmu.read8(pixelByte) >> (7-tileXOffset)) & 0x1\n colorNumber := (pixHigh << 1) | pixLow\n return GameBoyColorMap[colorNumber]\n}", "title": "" }, { "docid": "ab4ee279db31ddbf08c44a9cddeb69c0", "score": "0.5612294", "text": "func (self *Color) PackPixel(r int, g int, b int, a int) int{\n return self.Object.Call(\"packPixel\", r, g, b, a).Int()\n}", "title": "" }, { "docid": "5b8bf9dde83749400f7c4465edcaf5b3", "score": "0.55793846", "text": "func (c *Converted) At(x, y int) color.Color{\n\treturn c.Mod.Convert(c.Img.At(x,y))\n}", "title": "" }, { "docid": "693cedbb415c49c81f1a3ef5e6e2e310", "score": "0.5564325", "text": "func (s *CommandPolyline) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "818ab6ca47cbd32a75e7c2235d0942c9", "score": "0.5534012", "text": "func extractColor(color string) (r, g, b float64, err error) {\n\tif len(color) != 8 {\n\t\terr = fmt.Errorf(\"invalid color length\")\n\t\treturn\n\t}\n\tif !strings.HasPrefix(color, \"0x\") {\n\t\terr = fmt.Errorf(\"color should starts from 0x\")\n\t\treturn\n\t}\n\tintR, err := strconv.ParseInt(color[2:4], 16, 64)\n\tif err != nil {\n\t\treturn\n\t}\n\tintG, err := strconv.ParseInt(color[4:6], 16, 64)\n\tif err != nil {\n\t\treturn\n\t}\n\tintB, err := strconv.ParseInt(color[6:8], 16, 64)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tr = float64(intR) / 255.0\n\tg = float64(intG) / 255.0\n\tb = float64(intB) / 255.0\n\treturn\n}", "title": "" }, { "docid": "aa358cf51e4f00ced7f10fd589b7aa0b", "score": "0.5533043", "text": "func (s *CommandCurve) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "6313a82ca2ad472a65ff5aa48c2f1a25", "score": "0.5528804", "text": "func (c XYZ) HDRPixel() (x, y, z, a float64) {\n\treturn c.HDRXYZA()\n}", "title": "" }, { "docid": "36651a85f62d6836e540ef31993ea041", "score": "0.5525076", "text": "func (c RGB) HDRPixel() (r, g, b, a float64) {\n\treturn c.HDRRGBA()\n}", "title": "" }, { "docid": "ede216ab29640ef493f82389a7e91c83", "score": "0.55211294", "text": "func (s *CommandArcFilled) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "d9a46c3ac8df10fc2ffec452b7572123", "score": "0.5518843", "text": "func (gdt *PoolColorArray) Get(\n\tp_idx int32, /* else case */\n) Color {\n\n\t/* go_godot_pool_color_array_get(API_STRUCT,godot_int) ->godot_color */\n\n\tapi := CoreApi\n\trcv := (*C.godot_pool_color_array)(unsafe.Pointer(gdt))\n\tin0 := *(*C.godot_int)(unsafe.Pointer(&p_idx))\n\n\tret := C.go_godot_pool_color_array_get(\n\t\tapi,\n\t\trcv,\n\t\tin0,\n\t)\n\truntime.KeepAlive(in0)\n\n\treturn *(*Color)(unsafe.Pointer(&ret))\n}", "title": "" }, { "docid": "634d1263aefb861c7e5256b42954c953", "score": "0.5501506", "text": "func (recv *HSV) GetColor() (float64, float64, float64) {\n\tvar c_h C.gdouble\n\n\tvar c_s C.gdouble\n\n\tvar c_v C.gdouble\n\n\tC.gtk_hsv_get_color((*C.GtkHSV)(recv.native), &c_h, &c_s, &c_v)\n\n\th := (float64)(c_h)\n\n\ts := (float64)(c_s)\n\n\tv := (float64)(c_v)\n\n\treturn h, s, v\n}", "title": "" }, { "docid": "96e8b223068d110382f4c8cb90675da9", "score": "0.5499351", "text": "func (i *Image) Get(row, col int) byte {\n\treturn i.Pixels[int(i.Cols)*row+col]\n}", "title": "" }, { "docid": "d730719e7e6ecddfa004d3cdff1d2820", "score": "0.5482258", "text": "func checkerAt(point *base.Tuple, p *PatternObject) *Color {\n\tsum := math.Floor(point.GetX()) + math.Floor(point.GetY()) + math.Floor(point.GetZ())\n\tif base.EqualFloats(utils.Mod(sum, 2), 0) {\n\t\treturn p.color1\n\t}\n\n\treturn p.color2\n}", "title": "" }, { "docid": "692376be6d150033f3d88c3db512ef51", "score": "0.54749805", "text": "func (s *CommandArc) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "5f4caa3ed9eb20e0490bc8c5ac75b025", "score": "0.547265", "text": "func (d *Device) GetPixel(x int16, y int16) bool {\n\tif x < 0 || x >= d.width || y < 0 || y >= d.height {\n\t\treturn false\n\t}\n\tbyteIndex := x + (y/8)*d.width\n\treturn (d.buffer[byteIndex] >> uint8(y%8) & 0x1) == 1\n}", "title": "" }, { "docid": "1b6a9eaea805e19918bd5470f4521745", "score": "0.54723185", "text": "func (s *CommandTriangleFilled) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "be0a5c08b7cd312ea6463f179d9430df", "score": "0.54551685", "text": "func (c Circle) ColorAtPoint(p rays.Point, cameraPosition rays.Point) rays.Point {\n\tvar color rays.Point\n\tif c.XStripeWidth != 0 && int(p.X)%10 <= c.XStripeWidth {\n\t\tcolor = c.XStripeColor\n\t} else if c.YStripeWidth != 0 && int(p.Y)%10 <= c.YStripeWidth {\n\t\tcolor = c.YStripeColor\n\t} else {\n\t\tcolor = c.Color\n\t}\n\n\tif c.Reflectivity == 0 {\n\t\treturn color\n\t}\n\n\tintersectionRay := rays.Ray{Direction: rays.Normalize(cameraPosition, p), Origin: cameraPosition}\n\tsurfaceNormal := c.NormalAtPoint(p)\n\treflectRay := rays.RayFromAngle(surfaceNormal, intersectionRay)\n\n\treflectMag := float32(100000)\n\tvar zeroPoint, reflectedPoint rays.Point\n\tvar reflectedObject Intersectable\n\n\t//check shapes list for intersection, if one is found then show that color for this point.\n\tfor _, e := range ReflectiveObjects {\n\t\tif do, intersectPoint, _ := e.DoesRayIntersect(reflectRay); do && !e.Equals(c) {\n\t\t\tnewMag := rays.MagnitudeRay(reflectRay)\n\t\t\tif reflectMag > newMag {\n\t\t\t\treflectMag = newMag\n\t\t\t\treflectedPoint = intersectPoint\n\t\t\t\treflectedObject = e\n\t\t\t}\n\t\t}\n\t}\n\n\tif !reflectedPoint.Equals(zeroPoint) {\n\t\treturn reflectedObject.ColorAtPoint(reflectedPoint, cameraPosition)\n\t}\n\treturn rays.Point{X: 0.0, Y: 0.0, Z: 0.0}\n}", "title": "" }, { "docid": "a692a14adcbd941a1cd0e02fef02ae1c", "score": "0.54508257", "text": "func GetPxColor(x, y int, displayId ...int) C.MMRGBHex {\n\tcx := C.int32_t(x)\n\tcy := C.int32_t(y)\n\n\tdisplay := displayIdx(displayId...)\n\tcolor := C.get_px_color(cx, cy, C.int32_t(display))\n\treturn color\n}", "title": "" }, { "docid": "2f5f73a14331c42031d240c35d37e8e2", "score": "0.5448977", "text": "func (t *Target) Pixel(x, y float32, color Color) {\n\t_c := C.SDL_Color{C.Uint8(color.R), C.Uint8(color.G), C.Uint8(color.B), C.Uint8(color.A)}\n\tC.GPU_Pixel(t.cptr(),\n\t\tC.float(x),\n\t\tC.float(y),\n\t\t_c)\n}", "title": "" }, { "docid": "e341e1779dc76eb916a23589e9d54f3e", "score": "0.5442222", "text": "func computeColor(i, j int, minCol, maxCol string) color.Color {\n\tx := xyrange * (float64(i)/cells - 0.5) // -15.0..+15.0\n\ty := xyrange * (float64(j)/cells - 0.5) // -15.0..+15.0\n\n\tz := f(x, y)\n\n\tr, g, b := processInput(minCol, maxCol)\n\n\t//r := 255 * (z + 1) / 2\n\t//b := 255 * (1 - z) / 2\n\n\treturn color.RGBA{uint8(r(z)), uint8(g(z)), uint8(b(z)), 0x00}\n}", "title": "" }, { "docid": "2bc66b53110c6d01b803b7bc3e67af0f", "score": "0.5442206", "text": "func (s *CommandLine) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "205320ef0111dd5a4eb54bca95040789", "score": "0.54357547", "text": "func (this *Countdown) ColorAt(position float64, baseColor RGBA) RGBA {\n\n\tgreenFactor := this.time / this.totalTime\n\tredFactor := 1.0 - greenFactor\n\n\tif greenFactor > 0.8 {\n\t\treturn baseColor\n\t}\n\n\treturn RGBA{\n\t\tuint8(redFactor * 255),\n\t\tuint8(greenFactor * 255),\n\t\t0,\n\t\t255,\n\t}\n}", "title": "" }, { "docid": "18020bdf6049ba835cd2620bd0eabcce", "score": "0.5426109", "text": "func (s *CommandTriangle) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "a2311f284a7bf95771f8b4f85042461a", "score": "0.5404939", "text": "func (p *Palette) analysePixel(pix vector.Vector) {\n\n\t// Find the closest palette entry\n\tiClose := 0\n\tdClose := p.nodes[iClose].center.Sub(pix).Abs()\n\tfor i := range p.nodes {\n\t\td := p.nodes[i].center.Sub(pix).Abs()\n\t\tif d < dClose {\n\t\t\tiClose = i\n\t\t\tdClose = d\n\t\t}\n\t}\n\n\t// Keep a running bounded box of the color area covered\n\t// to speed up the 'split' operations\n\tif p.nodes[iClose].count > 0 {\n\t\tp.nodes[iClose].min = p.nodes[iClose].min.Min(pix)\n\t\tp.nodes[iClose].max = p.nodes[iClose].max.Max(pix)\n\t} else {\n\t\tp.nodes[iClose].min = pix\n\t\tp.nodes[iClose].max = pix\n\t}\n\n\t// Keep a running total for all pixels added to\n\t// speed up the 'shift' operation\n\tp.nodes[iClose].total = p.nodes[iClose].total.Add(pix)\n\tp.nodes[iClose].count++\n}", "title": "" }, { "docid": "583ab327eaf7514472e2cd6d79e59481", "score": "0.5404577", "text": "func (raytracer *Raytracer) Pixel(x int, y int) color.RGBA {\n\tvar ray Ray\n\tvar x1, y1, z1 float64\n\tvar pixel color.RGBA\n\n\tpixel.R = 255\n\tpixel.G = 99\n\tpixel.B = 71\n\tpixel.A = 255\n\n\tx1 = float64(D)\n\ty1 = float64((WinX / 2) - x)\n\tz1 = float64((WinY / 2) - y)\n\n\tray.V.X = x1 - raytracer.Scene.Cam.Pos.X\n\tray.V.Y = y1 - raytracer.Scene.Cam.Pos.Y\n\tray.V.Z = z1 - raytracer.Scene.Cam.Pos.Z\n\n\t// ray.TopMesh = scene.Meshs\n\t// ray.TopSpot = scene.Lights\n\tray.Is = true\n\n\t//pixel = self.Calcul(&ray, x, y)\n\treturn pixel\n}", "title": "" }, { "docid": "62d668bc0f17440aa877209744172ae7", "score": "0.5400204", "text": "func (self *Color) UnpackPixel(rgba int) interface{}{\n return self.Object.Call(\"unpackPixel\", rgba)\n}", "title": "" }, { "docid": "b0688f77e554a8d0e12639805ef69315", "score": "0.53884655", "text": "func (b *CBitMap) At(x, y int) color.Color {\n\tif !(image.Point{x, y}.In(b.Rect)) {\n\t\treturn color.RGBA{}\n\t}\n\ti := b.PixOffset(x, y)\n\ts := b.Pix[i : i+4 : i+4]\n\treturn color.RGBA{s[0], s[1], s[2], s[3]}\n}", "title": "" }, { "docid": "66673c5c32d64eff2f0d3120fe75c5a3", "score": "0.5341667", "text": "func (this *Sinusoid) ColorAt(position float64, baseColor RGBA) RGBA {\n\n\t// 0 to 1\n\tfieldPercentage := position / this.scale\n\n\treturn RGBA{\n\t\tthis.lookup(fieldPercentage + this.offsets[0]),\n\t\tthis.lookup(fieldPercentage + this.offsets[1]),\n\t\tthis.lookup(fieldPercentage + this.offsets[2]),\n\t\t255,\n\t}\n}", "title": "" }, { "docid": "ff96ec8aa1187c684f61d5a83c582117", "score": "0.5304454", "text": "func (i *Im8) At(x, y int) color.Color {\n\treturn i.Col8At(x, y)\n}", "title": "" }, { "docid": "fa2d195c9f8138241e66c36e6bd6693c", "score": "0.5289642", "text": "func (o *CanvasModulate) GetColor() gdnative.Color {\n\t//log.Println(\"Calling CanvasModulate.GetColor()\")\n\n\t// Build out the method's arguments\n\tptrArguments := make([]gdnative.Pointer, 0, 0)\n\n\t// Get the method bind\n\tmethodBind := gdnative.NewMethodBind(\"CanvasModulate\", \"get_color\")\n\n\t// Call the parent method.\n\t// Color\n\tretPtr := gdnative.NewEmptyColor()\n\tgdnative.MethodBindPtrCall(methodBind, o.GetBaseObject(), ptrArguments, retPtr)\n\n\t// If we have a return type, convert it from a pointer into its actual object.\n\tret := gdnative.NewColorFromPointer(retPtr)\n\treturn ret\n}", "title": "" }, { "docid": "f7f9234ff3fdfa45a2661e6d936186a4", "score": "0.52661735", "text": "func nearestColor(src int, palette []int) int {\n\tvar nearestColor int\n\tvar lowestDistance = math.MaxFloat64\n\n\tfor _, v := range palette {\n\t\tr, g, b, a := intToRgba(v)\n\t\tr1, g1, b1, a1 := intToRgba(v)\n\n\t\tdist := colorDistance(\n\t\t\tr, g, b, a,\n\t\t\tr1, g1, b1, a1,\n\t\t)\n\n\t\tif dist < lowestDistance {\n\t\t\tlowestDistance = dist\n\t\t\tnearestColor = v\n\t\t}\n\t}\n\n\treturn nearestColor\n}", "title": "" }, { "docid": "09f81f670e6f5764df43d313f0a17ee8", "score": "0.52618235", "text": "func (handler *GrayImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" }, { "docid": "3416436bef93c1e05e94cba12dfa2cd4", "score": "0.52552915", "text": "func (s *CommandImage) GetCol() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.col))\n\treturn ret\n}", "title": "" }, { "docid": "90ee73ff9e203dfa93b981bf6577bbee", "score": "0.52538526", "text": "func (d *Document) GetColor(field string) (string, bool) {\n\tc, found := d.GetColorFragment(field)\n\tif !found {\n\t\treturn \"\", false\n\t}\n\treturn string(*c), true\n}", "title": "" }, { "docid": "89751724cd809a8a3b3ccb6b106be88b", "score": "0.525272", "text": "func FindColorCode(c color.Color) ColorCode {\n\t_, _, _, alpha := c.RGBA()\n\tif alpha == 0 {\n\t\treturn 0\n\t}\n\treturn ColorLookup[TermPalette.Index(c)]\n}", "title": "" }, { "docid": "7f06f98a4995cd9d0670dd518e60703f", "score": "0.52432287", "text": "func (self *Color) GetColor32(a int, r int, g int, b int) int{\n return self.Object.Call(\"getColor32\", a, r, g, b).Int()\n}", "title": "" }, { "docid": "69dca2cb227717feeba2a95a55539903", "score": "0.5237945", "text": "func (handler *NRGBAImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" }, { "docid": "d2cb73d27ac9597fd2de820e6e9f0a5f", "score": "0.5235556", "text": "func FindColorCode(c color.Color) ColorCode {\n\t_, _, _, alpha := c.RGBA()\n\tif alpha == 0 {\n\t\treturn 0\n\t} else {\n\t\treturn ColorLookup[TermPalette.Index(c)]\n\t}\n}", "title": "" }, { "docid": "d9cca02203ed06d8e0334c1ec4d35895", "score": "0.5234057", "text": "func Color(r, g, b float64) Tuple {\n\treturn Tuple([]float64{r, g, b})\n}", "title": "" }, { "docid": "e98b9e47ccaecfbc522728d1b87cb6f4", "score": "0.523229", "text": "func setPixel(x, y int, c rgba, pixels []byte) error {\n\tindex := (y*int(winWidth) + x) * 4\n\n\tif index < len(pixels) && index >= 0 {\n\t\tpixels[index] = c.r\n\t\tpixels[index+1] = c.g\n\t\tpixels[index+2] = c.b\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "13802042b739488814be2d7b0c55c816", "score": "0.52193326", "text": "func (handler *RGBAImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" }, { "docid": "7e37cbad73772b4d16f735450a30af7c", "score": "0.52159137", "text": "func (i *rwImage) At(x, y int) color.Color {\n\treturn i.img.At(x, y)\n}", "title": "" }, { "docid": "bff41cc1af14f930ed032761ad5de072", "score": "0.5214362", "text": "func newColorFromBitmap(setBits uint8, componentVal uint8) color.Color {\n\tc := make([]uint8, 3)\n\tfor i, bit := range []uint8{1, 2, 4} {\n\t\tif setBits&bit == bit {\n\t\t\tc[i] = componentVal\n\t\t}\n\t}\n\treturn newColor(c[0], c[1], c[2])\n}", "title": "" }, { "docid": "6e39ecc53d8d481e4a500486d024c3ab", "score": "0.5213547", "text": "func rgbaToPixel(r uint32, g uint32, b uint32, a uint32) Pixel {\n\treturn Pixel{int(r / 257), int(g / 257), int(b / 257), int(a / 257)}\n}", "title": "" }, { "docid": "6e39ecc53d8d481e4a500486d024c3ab", "score": "0.5213547", "text": "func rgbaToPixel(r uint32, g uint32, b uint32, a uint32) Pixel {\n\treturn Pixel{int(r / 257), int(g / 257), int(b / 257), int(a / 257)}\n}", "title": "" }, { "docid": "e2f387d8ccb6aea377fafc4ee40351ae", "score": "0.5210604", "text": "func (this *StepFunction) ColorAt(position float64, baseColor RGBA) RGBA {\n\n\tposition = math.Abs(position - this.center)\n\n\talpha := uint8(math.Mod(position+this.offset, this.scale) * this.scaleInverse)\n\n\tcolor := RGBA{\n\t\tthis.baseColor.R,\n\t\tthis.baseColor.G,\n\t\tthis.baseColor.B,\n\t\talpha,\n\t}\n\n\treturn color.BlendWith(baseColor)\n}", "title": "" }, { "docid": "63716d4582a3d153a88ba68e5498550d", "score": "0.520786", "text": "func (handler *PalettedImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" }, { "docid": "5db4bee65a91e7434a3455347875b862", "score": "0.5207353", "text": "func decodePixelValue(v uint8, bpc int, r colValRange) uint8 {\n\tq := float64(maxValForBits(bpc))\n\tf := r.min + (float64(v) * (r.max - r.min) / q)\n\treturn uint8(f * q)\n}", "title": "" }, { "docid": "652e17b2d4c7ad20db9b46f3b7fabc26", "score": "0.5205177", "text": "func (c RAW) HDRPixel() (p1, p2, p3, pa float64) {\n\treturn c.P1, c.P2, c.P3, 0xFFFF\n}", "title": "" }, { "docid": "a8c4aa7701d52732decd0dc7300f9de7", "score": "0.5202188", "text": "func (handler *NRGBA64ImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" }, { "docid": "02e23fe5546f593cb48758bba1478da1", "score": "0.5200724", "text": "func (d *Device) ReadColor() (r int32, g int32, b int32, clear int32) {\n\tif d.mode != MODE_COLOR {\n\t\treturn\n\t}\n\tdata := []byte{0, 0, 0, 0, 0, 0, 0, 0}\n\td.bus.ReadRegister(d.Address, APDS9960_CDATAL_REG, data[:1])\n\td.bus.ReadRegister(d.Address, APDS9960_CDATAH_REG, data[1:2])\n\td.bus.ReadRegister(d.Address, APDS9960_RDATAL_REG, data[2:3])\n\td.bus.ReadRegister(d.Address, APDS9960_RDATAH_REG, data[3:4])\n\td.bus.ReadRegister(d.Address, APDS9960_GDATAL_REG, data[4:5])\n\td.bus.ReadRegister(d.Address, APDS9960_GDATAH_REG, data[5:6])\n\td.bus.ReadRegister(d.Address, APDS9960_BDATAL_REG, data[6:7])\n\td.bus.ReadRegister(d.Address, APDS9960_BDATAH_REG, data[7:])\n\tclear = int32(uint16(data[1])<<8 | uint16(data[0]))\n\tr = int32(uint16(data[3])<<8 | uint16(data[2]))\n\tg = int32(uint16(data[5])<<8 | uint16(data[4]))\n\tb = int32(uint16(data[7])<<8 | uint16(data[6]))\n\treturn\n}", "title": "" }, { "docid": "4a9d71ef89a8f7e080d2623f5f0c8dca", "score": "0.5199199", "text": "func (s *ChartSlot) GetColor() *Color {\n\tvar ret *Color\n\tret = (*Color)(unsafe.Pointer(&s.color))\n\treturn ret\n}", "title": "" }, { "docid": "aef9bd95e04789afa00699a29b609d18", "score": "0.519551", "text": "func (c Rgb) Pixel() Pixel {\n\treturn Pixel{R: byte(c >> 16), G: byte(c >> 8), B: byte(c)}\n}", "title": "" }, { "docid": "ba935f5760fa2e7e848e6215402b4f3a", "score": "0.5194534", "text": "func (error *Colour2D) PixelDataForFrame(frame int) []byte {\n\treturn error.rawColourData\n}", "title": "" }, { "docid": "72855763162521d8533de9eade0fa4cf", "score": "0.5192105", "text": "func (handler *RGBA64ImageHandler) At(row, column int) (Pixel, error) {\n\trect := handler.Image.Bounds()\n\tif (row < rect.Min.X && row > rect.Max.X) || (column < rect.Min.Y && column > rect.Max.Y) {\n\t\treturn Pixel{}, ErrRowColumnOutOfBounds\n\t}\n\treturn ConvertColor(handler.Image.At(row, column)), nil\n}", "title": "" } ]
7c96cfa3cdae4accaab30019c1d3d04f
NewRequest starts new request instance
[ { "docid": "91ccc6195938eb8e8186694da3d2331f", "score": "0.0", "text": "func NewRequest(config *viper.Viper) Requester {\n\treturn &Request{config, \"\", \"\", http.MethodGet, \"\"}\n}", "title": "" } ]
[ { "docid": "6255a9c42398a13d88d9f762dc44acc1", "score": "0.7389818", "text": "func (s *PingoneService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9488258aa53b4d53551d474f589e923b", "score": "0.73763746", "text": "func (s *PingfederateService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7caa8a043ed660738e288fcf918796a4", "score": "0.7330402", "text": "func (c *STS) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "bd4666b64a376b3f67d20223490cae2b", "score": "0.72783494", "text": "func (c *InputService1ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "649cc055a8d139010b05b8e1baf3870a", "score": "0.72574973", "text": "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "649cc055a8d139010b05b8e1baf3870a", "score": "0.72574973", "text": "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "649cc055a8d139010b05b8e1baf3870a", "score": "0.72574973", "text": "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "649cc055a8d139010b05b8e1baf3870a", "score": "0.72574973", "text": "func (c *InputService1ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "b7e183a737e1b013236939cd0e718286", "score": "0.72322357", "text": "func (c *Support) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "bc65467a731d0520f18586b51c9eaa86", "score": "0.7229137", "text": "func (c *InputService4ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "fea377ff005b34e7315dc1a18bddc7cf", "score": "0.72132486", "text": "func (c *InputService14ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "1a62d33d478569010b126d6da50572e6", "score": "0.7195343", "text": "func (c *InputService18ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3d9ba54131360b75058abcb02ca6541f", "score": "0.7189045", "text": "func NewRequest(method, target string, body io.Reader) *http.Request", "title": "" }, { "docid": "1fdb9b9740cd30895d19d89e02929c48", "score": "0.7173354", "text": "func (c *InputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "1fdb9b9740cd30895d19d89e02929c48", "score": "0.7173354", "text": "func (c *InputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "1fdb9b9740cd30895d19d89e02929c48", "score": "0.7173354", "text": "func (c *InputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "1fdb9b9740cd30895d19d89e02929c48", "score": "0.7173354", "text": "func (c *InputService4ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "af1e372f431d0bc9b2198648fc1c94cd", "score": "0.71677", "text": "func (c *InputService9ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "e7c22d1aeb0f0d169aaffac413522f34", "score": "0.7167369", "text": "func (c *InputService9ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "e7c22d1aeb0f0d169aaffac413522f34", "score": "0.7167369", "text": "func (c *InputService9ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "e7c22d1aeb0f0d169aaffac413522f34", "score": "0.7167369", "text": "func (c *InputService9ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9c8edeb9253a086927135575324b4525", "score": "0.7154665", "text": "func (c *InputService16ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "ecf09140ecaf9daa41bfeb8805039eb3", "score": "0.7148977", "text": "func (c *InputService15ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "03ac67b0a6dd4edb0da1da6f3318acec", "score": "0.7148917", "text": "func (c *InputService8ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "45cda40ab6d03805a5948c6546757bb6", "score": "0.714615", "text": "func (s *HttpConfigService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "4f20250f43e362e06d6516d2d79913a6", "score": "0.7145676", "text": "func (c *DynamoDBStreams) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "e56dea95c3506a4aeab8f812255d97a1", "score": "0.7132814", "text": "func (c *InputService17ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "c67c7ae2219017209c325ea11a704807", "score": "0.71297926", "text": "func (c *InputService13ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "200927996b123025f369229416a3b685", "score": "0.7127308", "text": "func (c *InputService10ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "4c4f9c967df42e31e24cb1022fc2f532", "score": "0.7114994", "text": "func (c *RDS) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "ab2bae617f5c1ac7dd917ff40888ff9e", "score": "0.71139264", "text": "func (s *VersionService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "5c2d7381d5b1b8311aedd136ebb6d309", "score": "0.711248", "text": "func (c *InputService19ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9622e4121393954e5f81ed7440acc1da", "score": "0.7107039", "text": "func (c *InputService10ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9622e4121393954e5f81ed7440acc1da", "score": "0.7107039", "text": "func (c *InputService10ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "fbdc09fe0518de29a6ff04449ea908d3", "score": "0.71055794", "text": "func (c *Inspector) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "b54bd4146d919828f8fd4c42827ad936", "score": "0.710415", "text": "func (c *InputService20ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "66a7ec5ecbc66ff1f2c17dca7e624bc7", "score": "0.71026963", "text": "func (c *InputService2ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3e53a8307e55783f5fc22bec1d623655", "score": "0.7101714", "text": "func (c *InputService8ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3e53a8307e55783f5fc22bec1d623655", "score": "0.7101714", "text": "func (c *InputService8ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3e53a8307e55783f5fc22bec1d623655", "score": "0.7101714", "text": "func (c *InputService8ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3e53a8307e55783f5fc22bec1d623655", "score": "0.7101714", "text": "func (c *InputService8ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "38c6659a545ef17d6c4a1a6d75fdb6b4", "score": "0.70931363", "text": "func (c *InputService12ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "2e0afc7a7c2cae5902e400f77cdaa7fe", "score": "0.7085129", "text": "func (c *DynamoDB) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "fb1a6cf310525a9574f12c458b07e196", "score": "0.7077555", "text": "func (c *InputService12ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3f08789c693c1023f138d7a409e79857", "score": "0.70688766", "text": "func (c *InputService2ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3f08789c693c1023f138d7a409e79857", "score": "0.70688766", "text": "func (c *InputService2ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3f08789c693c1023f138d7a409e79857", "score": "0.70688766", "text": "func (c *InputService2ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3f08789c693c1023f138d7a409e79857", "score": "0.70688766", "text": "func (c *InputService2ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "e493eea507c3ad9c033c9a6ad4840488", "score": "0.7068528", "text": "func (c *Client) newRequest(method, url string) (*request, error) {\n\tvar err error\n\treq := new(request)\n\n\treq.Req, err = http.NewRequest(method, url, nil)\n\tif err != nil {\n\t\treturn req, errors.Wrap(errors.WithStack(err), errInfo())\n\t}\n\n\treq.HTTPClient = c.httpClient\n\ttoken := c.getTokenID()\n\n\treq.Req.Header.Set(\"Content-Type\", \"application/json\")\n\tif token != \"\" {\n\t\treq.Req.Header.Set(\"X-Vault-token\", token)\n\t}\n\n\tif len(c.namespace) > 0 {\n\t\treq.Req.Header.Set(\"X-Vault-Namespace\", c.namespace)\n\t}\n\treturn req, errors.Wrap(errors.WithStack(err), errInfo())\n\n}", "title": "" }, { "docid": "41166de2f4848fc23640120f6d85e0c8", "score": "0.70636404", "text": "func (c *InputService11ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "373df6b6895cee682ac5e3f84b27b65e", "score": "0.70618385", "text": "func (c *InputService24ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "c5513277c17ef10e4b9c3e423fdf3202", "score": "0.70554364", "text": "func newRequest(seq int, command string) *Request {\n\treturn &Request{\n\t\tProtocolMessage: ProtocolMessage{\n\t\t\tType: \"request\",\n\t\t\tSeq: seq,\n\t\t},\n\t\tCommand: command,\n\t}\n}", "title": "" }, { "docid": "d02005bd0e7ce95b273258c4580cc11b", "score": "0.70521975", "text": "func (c *InputService23ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "cf696351e92b87acdf210932699ed949", "score": "0.70444196", "text": "func (c *InputService25ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "287021e1c30c06b4497ba130c5b7b1d3", "score": "0.7037556", "text": "func (c *InputService11ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "27087697d82b91d40dca5f981237c7f9", "score": "0.70371735", "text": "func (c *InputService3ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3c30b16d1acc3053e7c361547a808748", "score": "0.7028133", "text": "func (c *ELB) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "a604372107bfd11f6d5e0474a6351a81", "score": "0.7001125", "text": "func (c *InputService21ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7be77d87a98fed15d556d0ae2e858e92", "score": "0.69932264", "text": "func (s *KeyPairsService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "df9e57bf3f59772b90ec3b4831903613", "score": "0.6976222", "text": "func (c *InputService3ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "df9e57bf3f59772b90ec3b4831903613", "score": "0.6976222", "text": "func (c *InputService3ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "df9e57bf3f59772b90ec3b4831903613", "score": "0.6976222", "text": "func (c *InputService3ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "df9e57bf3f59772b90ec3b4831903613", "score": "0.6976222", "text": "func (c *InputService3ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7c728cad55520fd3f7e821cacac25ced", "score": "0.69732773", "text": "func (c *InputService7ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7c728cad55520fd3f7e821cacac25ced", "score": "0.69732773", "text": "func (c *InputService7ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7c728cad55520fd3f7e821cacac25ced", "score": "0.69732773", "text": "func (c *InputService7ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "7c728cad55520fd3f7e821cacac25ced", "score": "0.69732773", "text": "func (c *InputService7ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "b1c3540dec7e8ffdefc26dcce6587d4a", "score": "0.6955688", "text": "func (c *InputService22ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "702af20907e798db9172bab50fe8a7a4", "score": "0.6951446", "text": "func (c *InputService7ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "e6ea0d6b927fa429cb9c41611d2399d1", "score": "0.69512856", "text": "func (s *OauthKeyManagementService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "80759d75034e241a61ab831729b9b664", "score": "0.6943771", "text": "func (c *OpsWorksCM) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "58b9d018cb01cf6eeb05207ec3293326", "score": "0.6942614", "text": "func (c *ApplicationDiscoveryService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "2372afe75b23ba9dd183bf821d711c12", "score": "0.69397", "text": "func (c *Client) newRequest(method, path string) *request {\n\tr := &request{\n\t\tconfig: &c.config,\n\t\tmethod: method,\n\t\turl: &url.URL{\n\t\t\tScheme: c.config.Scheme,\n\t\t\tHost: c.config.Address,\n\t\t\tPath: \"/api/2.0\" + path,\n\t\t},\n\t\tparams: make(map[string][]string),\n\t}\n\treturn r\n}", "title": "" }, { "docid": "229de69a1d3349576c9778aba7904f01", "score": "0.693433", "text": "func (s *AdminSessionInfoService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "25ea9622c8fb1051bebe509839790cd2", "score": "0.69256324", "text": "func (c *InputService5ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "8fc92639582b718ef3accaf1442bb58a", "score": "0.69055504", "text": "func (c *InputService5ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "8fc92639582b718ef3accaf1442bb58a", "score": "0.69055504", "text": "func (c *InputService5ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "8fc92639582b718ef3accaf1442bb58a", "score": "0.69055504", "text": "func (c *InputService5ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "8fc92639582b718ef3accaf1442bb58a", "score": "0.69055504", "text": "func (c *InputService5ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "be15e0d4c9c2eb7bfea9678b9b96f876", "score": "0.6902695", "text": "func (s *RulesService) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := s.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "372ff0d818a2a58edf50392d145444b8", "score": "0.6898998", "text": "func newRequest(ctx context.Context, method string, url string, body io.Reader, userAuthToken, serviceAuthToken, ifMatch string) (*http.Request, error) {\n\treq, err := http.NewRequestWithContext(ctx, method, url, body)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create request\")\n\t}\n\n\tif err := headers.SetAuthToken(req, userAuthToken); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to set auth token header\")\n\t}\n\n\tif err := headers.SetServiceAuthToken(req, serviceAuthToken); err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to set service token header\")\n\t}\n\n\tif err = headers.SetIfMatch(req, ifMatch); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to set if match: %w\", err)\n\t}\n\treturn req, nil\n}", "title": "" }, { "docid": "f8bd68172596668a85ebd005db5689fe", "score": "0.6887595", "text": "func (c *ECS) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\t// Run custom request initialization if present\n\tif initRequest != nil {\n\t\tinitRequest(req)\n\t}\n\n\treturn req\n}", "title": "" }, { "docid": "ceca3c7dfffecf4080da34d6563a17ce", "score": "0.6873539", "text": "func NewRequest(ctx context.Context, cancel context.CancelFunc, data interface{}) (Request, error) {\n\treturn simple.NewRequest(ctx, cancel, data)\n}", "title": "" }, { "docid": "145ad088b6aca6e5f8c531ad78515144", "score": "0.6857177", "text": "func (c *InputService6ProtocolTest) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9270401eed15de5ccc5b068cf7045363", "score": "0.68305475", "text": "func (c *InputService6ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9270401eed15de5ccc5b068cf7045363", "score": "0.68305475", "text": "func (c *InputService6ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9270401eed15de5ccc5b068cf7045363", "score": "0.68305475", "text": "func (c *InputService6ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "9270401eed15de5ccc5b068cf7045363", "score": "0.68305475", "text": "func (c *InputService6ProtocolTest) newRequest(op *aws.Operation, params, data interface{}) *aws.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "3bd71f46fbadac19accc805b21c55b9c", "score": "0.68179405", "text": "func newRequest(data interface{}, i *InOut) *request {\n\tvar c chan *Response\n\tif i.WantResponse == WantResponse {\n\t\tc = make(chan *Response)\n\t}\n\treturn &request{\n\t\tc: c,\n\t\tdata: data,\n\t\tp: i.Processor,\n\t}\n}", "title": "" }, { "docid": "a3c1b8f4da61c24c8bb8c890343d8e08", "score": "0.6797811", "text": "func (c *Client) newRequest(ctx context.Context, method string, url string, body io.Reader) (r *http.Request, err error) {\n\tif c == nil {\n\t\terr = ErrNotConfigured\n\t\treturn\n\t}\n\tr, err = http.NewRequestWithContext(\n\t\tctx,\n\t\tmethod,\n\t\turl,\n\t\tbody,\n\t)\n\tif err != nil {\n\t\treturn\n\t}\n\tif c.Token != \"\" {\n\t\tr.AddCookie(&http.Cookie{\n\t\t\tName: \"token\",\n\t\t\tValue: c.Token,\n\t\t})\n\t}\n\treturn\n}", "title": "" }, { "docid": "ee943ccb2740bff50392f90852b2e6d4", "score": "0.6760591", "text": "func (c *Client) newRequest(method, urlStr string, body interface{}) (*http.Request, error) {\n\tu, err := c.baseURL.Parse(urlStr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(method, u.String(), bytes.NewReader(data))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(headerProcessingKey, c.key)\n\treq.Header.Set(headerProcessingSignature, genSignature(c.secret, data))\n\n\treturn req, nil\n}", "title": "" }, { "docid": "c410ad26d54b030eef560e51b7f41866", "score": "0.6757933", "text": "func (c *S3) newRequest(op *request.Operation, params, data interface{}) *request.Request {\n\treq := c.NewRequest(op, params, data)\n\n\treturn req\n}", "title": "" }, { "docid": "d4fb174ddbfd862fc279eca57ffbed0e", "score": "0.6731554", "text": "func (client *Client) newRequest(passedRequest requestOptions) (*http.Request, error) {\n\tvar request *http.Request\n\tvar err error\n\n\tif passedRequest.URL != \"\" {\n\t\trequest, err = http.NewRequest(\n\t\t\tpassedRequest.Method,\n\t\t\tpassedRequest.URL,\n\t\t\tpassedRequest.Body,\n\t\t)\n\t} else {\n\t\trequest, err = client.router.CreateRequest(\n\t\t\tpassedRequest.RequestName,\n\t\t\tpassedRequest.URIParams,\n\t\t\tpassedRequest.Body,\n\t\t)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif passedRequest.Query != nil {\n\t\trequest.URL.RawQuery = passedRequest.Query.Encode()\n\t}\n\n\tif passedRequest.Header != nil {\n\t\trequest.Header = passedRequest.Header\n\t} else {\n\t\trequest.Header = http.Header{}\n\t}\n\trequest.Header.Set(\"Accept\", \"application/json\")\n\trequest.Header.Set(\"Connection\", \"close\")\n\trequest.Header.Set(\"User-Agent\", client.userAgent)\n\n\treturn request, nil\n}", "title": "" }, { "docid": "a53346c624bd26f63fabcad14971da3b", "score": "0.67260176", "text": "func (c *Client) newRequest(method string, path string, body io.Reader) (*http.Request, error) {\n\n\trelPath, err := url.Parse(apiKeyPath(path, c.apiKey))\n\n\tif err != nil {\n\t\treturn nil, err\n\n\t}\n\n\turl := c.endPoint.ResolveReference(relPath)\n\n\treq, err := http.NewRequest(method, url.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\n\t}\n\n\treq.Header.Add(\"User-Agent\", c.userAgent)\n\treq.Header.Add(\"Accept\", ContentType)\n\n\treturn req, nil\n\n}", "title": "" }, { "docid": "67a5828dfd3890379eeadc682ebc9295", "score": "0.671519", "text": "func (c *Client) newRequest(\n\tctx context.Context,\n\tmethod string,\n\turlStr string,\n\tbody io.Reader,\n) (*http.Request, error) {\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\n\tu := new(url.URL)\n\n\t// get final URL path.\n\tif rel, err := url.Parse(urlStr); err == nil {\n\t\tu = c.BaseURL.ResolveReference(rel)\n\t} else if strings.ContainsRune(urlStr, ':') {\n\t\t// IPv6 strings fail to parse as URLs, so let's add it as a URL Path.\n\t\t*u = *c.BaseURL\n\t\tu.Path += urlStr\n\t} else {\n\t\treturn nil, err\n\t}\n\n\t// get `http` package request object.\n\treq, err := http.NewRequestWithContext(ctx, method, u.String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// set common headers.\n\treq.Header.Set(\"Accept\", \"application/json\")\n\tif c.UserAgent != \"\" {\n\t\treq.Header.Set(\"User-Agent\", c.UserAgent)\n\t}\n\tif c.Token != \"\" {\n\t\treq.Header.Set(\"Authorization\", \"Bearer \"+c.Token)\n\t}\n\n\treturn req, nil\n}", "title": "" }, { "docid": "54d4159cb5437253808d13ee497416fe", "score": "0.66964483", "text": "func (s *Wire) NewRequest(method string, url string, payload interface{}) (req *http.Request, err error) {\n\n var body []byte\n\n if payload == nil {\n payload = map[string]interface{}{}\n }\n\n if body, err = json.Marshal(payload); err == nil {\n\n if req, err = http.NewRequest(method, s.BuildFullUrl(url), bytes.NewBuffer(body)); err == nil {\n\n req.Header.Set(\"Accept\", \"application/json\")\n req.Header.Set(\"Accept-charset\", \"utf-8\")\n\n if method == \"POST\" || method == \"DELETE\" {\n req.Header.Add(\"Content-Type\", \"application/json;charset=utf-8\")\n }\n\n }\n }\n\n return req, err\n}", "title": "" }, { "docid": "15d998b9d9a70a9f8334995d7510b7ac", "score": "0.6689639", "text": "func (c *Client) newRequest(method string, api string, v interface{}) (*http.Request, error) {\n\tvar body io.Reader\n\n\tif v != nil {\n\t\tdata, err := json.Marshal(v)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tbody = bytes.NewReader(data)\n\t}\n\n\tu, err := url.Parse(api)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(method, c.baseURL.ResolveReference(u).String(), body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq.Close = true\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"User-Agent\", \"REST API Go Agent\")\n\treq.Header.Set(\"X-API-Token\", c.authtoken)\n\n\treturn req, nil\n}", "title": "" }, { "docid": "b286ab4b97baddcb2cca6b31fa84196d", "score": "0.6689282", "text": "func newRequest(id uint64, data []byte, msgType byte) *request {\n\treturn &request{\n\t\tmsgType: msgType,\n\t\tid: id,\n\t\tdata: data,\n\t}\n}", "title": "" }, { "docid": "ac8ba4f9bb4bd3db4f2d014297229200", "score": "0.6670513", "text": "func (nest *Client) newRequest(method, path string, body interface{}) (*http.Request, error) {\n\trel := &url.URL{Path: path}\n\tu := nest.baseURL.ResolveReference(rel)\n\n\tvar buf io.ReadWriter\n\tif body != nil {\n\t\tbuf = new(bytes.Buffer)\n\t\terr := json.NewEncoder(buf).Encode(body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treq, err := http.NewRequest(method, u.String(), buf)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif body != nil {\n\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t}\n\n\treq.Header.Add(\"Accept\", \"application/json\")\n\treturn req, err\n}", "title": "" }, { "docid": "72bc9f4745ab81bc65ed46a79f4f3797", "score": "0.6655179", "text": "func (c *DefaultClient) newRequest(method string, path string, headers map[string]string, data interface{}) (*http.Request, error) {\n\n\t// Construct request body\n\tvar body io.Reader\n\tif data != nil {\n\t\trequestJSON, err := json.Marshal(data)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tbody = bytes.NewReader(requestJSON)\n\t}\n\n\t// construct the request\n\treq, err := http.NewRequest(method, c.BaseURL+path, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif body != nil {\n\t\treq.Header.Set(\"Content-Type\", \"application/json\")\n\t}\n\n\tfor k, v := range headers {\n\t\treq.Header.Set(k, v)\n\t}\n\n\treturn req, nil\n}", "title": "" }, { "docid": "7ad2855214ee446d54ca112ea338273c", "score": "0.665278", "text": "func (r *Recorder) NewRequest(method string, path string) *http.Request {\n\tfullURL := r.baseURL + path\n\treq, err := http.NewRequest(method, fullURL, nil)\n\tif err != nil {\n\t\tr.t.Fatal(err)\n\t}\n\treturn req\n}", "title": "" } ]
21b4eecd63b8316c8a460f3c788dc048
GetForexReq gets ForexReq, Tag 121
[ { "docid": "ca541a63d20cf88c9e853f505630ce85", "score": "0.65089625", "text": "func (m OrderCancelReplaceRequest) GetForexReq() (v bool, err quickfix.MessageRejectError) {\n\tvar f field.ForexReqField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "title": "" } ]
[ { "docid": "a3d7a51c922a1e26686126cc3b773590", "score": "0.69629276", "text": "func (f ForexReqField) Tag() quickfix.Tag { return tag.ForexReq }", "title": "" }, { "docid": "e1e903ae02aeba64b724b88cf0e4b7cb", "score": "0.6745311", "text": "func (m NoOrders) GetForexReq() (v bool, err quickfix.MessageRejectError) {\n\tvar f field.ForexReqField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "title": "" }, { "docid": "4a33cd55bc6db9a57e794495fe652180", "score": "0.66499346", "text": "func (m NewOrderSingle) GetForexReq() (v bool, err quickfix.MessageRejectError) {\n\tvar f field.ForexReqField\n\tif err = m.Get(&f); err == nil {\n\t\tv = f.Value()\n\t}\n\treturn\n}", "title": "" }, { "docid": "ff581a2fbf96cc74bcc17dcfffb89403", "score": "0.64785695", "text": "func (m NoOrders) HasForexReq() bool {\n\treturn m.Has(tag.ForexReq)\n}", "title": "" }, { "docid": "68dc2202e90a2d750fcec82c8106fe30", "score": "0.6427773", "text": "func (m NewOrderSingle) HasForexReq() bool {\n\treturn m.Has(tag.ForexReq)\n}", "title": "" }, { "docid": "fb82ced7eac12b437e0aae978296e259", "score": "0.64266276", "text": "func (m NoOrders) SetForexReq(v bool) {\n\tm.Set(field.NewForexReq(v))\n}", "title": "" }, { "docid": "3d5294313f90e10ca5f8eaed289c3793", "score": "0.63458073", "text": "func (m OrderCancelReplaceRequest) HasForexReq() bool {\n\treturn m.Has(tag.ForexReq)\n}", "title": "" }, { "docid": "73beaab4517dcea8ff8db63811cf4a49", "score": "0.63331777", "text": "func (m NewOrderSingle) SetForexReq(v bool) {\n\tm.Set(field.NewForexReq(v))\n}", "title": "" }, { "docid": "3f2205e352e7e771b2b897109c73481e", "score": "0.6202753", "text": "func NewForexReq(val bool) ForexReqField {\n\treturn ForexReqField{quickfix.FIXBoolean(val)}\n}", "title": "" }, { "docid": "846b2129ade4da0a4b0e698618829e91", "score": "0.6161615", "text": "func (m OrderCancelReplaceRequest) SetForexReq(v bool) {\n\tm.Set(field.NewForexReq(v))\n}", "title": "" }, { "docid": "6ebd4ea8d0ce945d2074e371432c2264", "score": "0.6034755", "text": "func (i *Info) GetTxFee(_ *http.Request, _ *struct{}, reply *GetTxFeeResponse) error {\n\ti.log.Debug(\"API called\",\n\t\tzap.String(\"service\", \"info\"),\n\t\tzap.String(\"method\", \"getTxFee\"),\n\t)\n\n\treply.TxFee = json.Uint64(i.TxFee)\n\treply.CreateAssetTxFee = json.Uint64(i.CreateAssetTxFee)\n\treply.CreateSubnetTxFee = json.Uint64(i.CreateSubnetTxFee)\n\treply.TransformSubnetTxFee = json.Uint64(i.TransformSubnetTxFee)\n\treply.CreateBlockchainTxFee = json.Uint64(i.CreateBlockchainTxFee)\n\treply.AddPrimaryNetworkValidatorFee = json.Uint64(i.AddPrimaryNetworkValidatorFee)\n\treply.AddPrimaryNetworkDelegatorFee = json.Uint64(i.AddPrimaryNetworkDelegatorFee)\n\treply.AddSubnetValidatorFee = json.Uint64(i.AddSubnetValidatorFee)\n\treply.AddSubnetDelegatorFee = json.Uint64(i.AddSubnetDelegatorFee)\n\treturn nil\n}", "title": "" }, { "docid": "a363ceaf7a0d170db65c9f0f38c831b9", "score": "0.57067066", "text": "func GetReq(symbol string) *http.Response {\n\thttp.DefaultTransport.(*http.Transport).TLSClientConfig = &tls.Config{InsecureSkipVerify: true}\n\tdud := &http.Response{}\n\tapikey := os.Getenv(\"XKEY\")\n\turl := fmt.Sprintf(\"https://www.alphavantage.co/query?apikey=%s\", apikey) +\n\t\t\"&function=TIME_SERIES_DAILY_ADJUSTED&symbol=\"\n\n\treq, err := http.NewRequest(\"GET\", url+symbol, nil)\n\n\tif err != nil {\n\t\tfmt.Printf(\"newrequest: %v\\n\", err)\n\t}\n\n\tclient := &http.Client{}\n\tif err != nil {\n\t\tfmt.Printf(\"Client Error: %v\", err)\n\t\treturn dud\n\t}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tfmt.Printf(\"Client Do: %v\", err)\n\t\treturn dud\n\t}\n\treturn resp\n}", "title": "" }, { "docid": "6e7a6f277042cc5d1579a79fc0e733b0", "score": "0.5310219", "text": "func (c *Client) GetForexChangeRate(transactionID string, request *pb.VisaForexRequest) (*pb.VisaForexReply, error) {\n\n\turlFull := &url.URL{\n\t\tScheme: \"https\",\n\t\tHost: c.BaseURL,\n\t\tPath: \"/forexrates/v1/foreignexchangerates\",\n\t}\n\n\tbody, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treq, err := http.NewRequest(\"POST\", urlFull.String(), bytes.NewBuffer(body))\n\treq.Header.Set(\"X-Client-Transaction-ID\", transactionID)\n\treq.Header.Set(\"Authorization\", c.Authorization)\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\tresp, err := c.HTTPClient.Do(req)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Could not load HTTPS client: %v\", err)\n\t}\n\n\tdefer resp.Body.Close()\n\n\t// HTTP 200 and 404 are not errors\n\tserializedBody, _ := ioutil.ReadAll(resp.Body)\n\n\tresponse := &pb.VisaForexReply{}\n\n\tjsonErr := json.Unmarshal(serializedBody, response)\n\n\tif jsonErr != nil {\n\t\tfmt.Println(err)\n\t}\n\n\tswitch resp.StatusCode {\n\tcase 200, 202, 404:\n\t\treturn response, nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"HTTP error: %s, %v\", resp.Status, string(serializedBody))\n\t}\n}", "title": "" }, { "docid": "6909dd919f08ec4884732ece71a87d55", "score": "0.53079534", "text": "func (webConnector *WebConnector) RequestFaucetFunds(addr address.Address) (err error) {\n\t_, err = webConnector.client.SendFaucetRequest(addr.Address().Base58())\n\n\treturn\n}", "title": "" }, { "docid": "cd373e900732f51001bbdc71d59e2ff6", "score": "0.52981925", "text": "func (f RefApplReqIDField) Tag() quickfix.Tag { return tag.RefApplReqID }", "title": "" }, { "docid": "600661ca514aaa6741b190955a77bc70", "score": "0.5297134", "text": "func ForexRate(fxp *ForexParams) (*ForexResponse, error) {\n\tif fxp.SecKey == \"\" {\n\t\tfxp.SecKey = SecretKey\n\t}\n\n\tresp := &ForexResponse{}\n\terr := sendRequestAndParseResponse(\"POST\", fxURL, fxp, resp)\n\treturn resp, err\n}", "title": "" }, { "docid": "970dd026a6d452ba67b7ce05190b69e4", "score": "0.5287664", "text": "func (f LocateReqdField) Tag() quickfix.Tag { return tag.LocateReqd }", "title": "" }, { "docid": "e5a6ae528ec1661787bd9f70be5e64dd", "score": "0.52590615", "text": "func GetAddress(req *SmartRequest, reqOp *SmartRequestOptional, headOp *HeadersOptional) (res *http.Response, err error) {\n if req != nil {\n if hasAuth(req) {\n nurl := baseURL + fmt.Sprintf(\"?auth-id=%s&auth-token=%s\", req.AuthID, req.AuthToken)\n query, e := prepareReqQuery(req)\n if e == nil {\n nurl += query\n appendCandidates(req, &nurl)\n if reqOp != nil {\n nurl += prepareReqOpQuery(reqOp)\n }\n hreq, e := http.NewRequest(\"GET\", nurl, nil)\n if e == nil {\n if headOp != nil {\n addHeadersOptional(hreq, headOp)\n }\n client := &http.Client{}\n res, e = client.Do(hreq)\n if e != nil {\n err = e\n }\n } else {\n err = e\n }\n } else {\n err = e\n }\n } else {\n err = errors.New(\"Authentication paramaters required\")\n }\n }\n return\n}", "title": "" }, { "docid": "7c588b725287e59a6d618e7407b6fd20", "score": "0.5253882", "text": "func FaucetRequest(gwCosmosmux *runtime.ServeMux, rpcAddr string) http.HandlerFunc {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\t\trequest := common.GetInterxRequest(r)\n\t\tresponse := common.GetResponseFormat(request, rpcAddr)\n\t\tstatusCode := http.StatusOK\n\n\t\tqueries := r.URL.Query()\n\t\tclaims := queries[\"claim\"]\n\t\ttokens := queries[\"token\"]\n\n\t\tif len(claims) == 0 && len(tokens) == 0 {\n\t\t\tcommon.GetLogger().Info(\"[faucet] Entering faucet info\")\n\t\t\tresponse.Response, response.Error, statusCode = serveFaucetInfo(r, gwCosmosmux)\n\t\t} else if len(claims) == 1 && len(tokens) == 1 {\n\t\t\tcommon.GetLogger().Info(\"[faucet] Entering faucet: claim = \", claims[0], \", token = \", tokens[0])\n\t\t\tresponse.Response, response.Error, statusCode = serveFaucet(r, gwCosmosmux, request, rpcAddr, claims[0], tokens[0])\n\t\t} else {\n\t\t\tcommon.GetLogger().Error(\"[faucet] Invalid parameters\")\n\t\t\tresponse.Response, response.Error, statusCode = common.ServeError(0, \"\", \"invalid query parameters\", http.StatusBadRequest)\n\t\t}\n\n\t\tcommon.WrapResponse(w, request, *response, statusCode, false)\n\t}\n}", "title": "" }, { "docid": "282cfc5d6f8a929f2a01408bd2d08981", "score": "0.5233749", "text": "func (cl *Client) doReq(ctx context.Context, path string, v interface{}, takeFirstEl bool) (interface{}, error) {\n\tif err := cl.start(ctx); err != nil {\n\t\treturn nil, err\n\t}\n\tcl.Lock()\n\tdefer cl.Unlock()\n\t// build request\n\treq, err := cl.buildRequest(cl.endpoint+path, v)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// do request\n\tres, err := cl.cl.Do(req.WithContext(ctx))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer res.Body.Close()\n\t// check status code\n\tif res.StatusCode != http.StatusOK {\n\t\treturn nil, ErrBadStatusCode\n\t}\n\t// retrieve and save csrf token header\n\tif tok := res.Header.Get(TokenHeader); tok != \"\" {\n\t\tcl.token = tok\n\t}\n\t// read body\n\tbody, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// decode\n\treturn xmlDecode(body, takeFirstEl)\n}", "title": "" }, { "docid": "87e5d680f061ad4c9ccc032a45329e79", "score": "0.5185101", "text": "func (a *DefaultApiService) ForexSymbols(ctx _context.Context) ApiForexSymbolsRequest {\n\treturn ApiForexSymbolsRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "294306f2ca9bc0c7cdcba13b8ec01245", "score": "0.51835483", "text": "func (f ApplReqIDField) Tag() quickfix.Tag { return tag.ApplReqID }", "title": "" }, { "docid": "5e8320220c44e3b0d618031c57588cf1", "score": "0.5176814", "text": "func (f ProgRptReqsField) Tag() quickfix.Tag { return tag.ProgRptReqs }", "title": "" }, { "docid": "e90b7c894c64f5c1f34db7305d623f2f", "score": "0.51582295", "text": "func getForexItem() (*ForexData, error) {\n\n\tforexitem, err := getItem(\"EURGBP\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn forexitem, nil\n}", "title": "" }, { "docid": "dd0a638246c777db93a0399f916a667b", "score": "0.5151224", "text": "func (f ApplReqTypeField) Tag() quickfix.Tag { return tag.ApplReqType }", "title": "" }, { "docid": "481de60ac8c5da83fbee87480298be36", "score": "0.5127635", "text": "func (r ApiCompanyRevenueEstimatesRequest) Freq(freq string) ApiCompanyRevenueEstimatesRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "104a0ef3187f530830db42b42e445480", "score": "0.51113605", "text": "func get_service(r *http.Request) (Service_Definition, error) {\n\tx := Service_Definition{}\n\tfound := false\n\n\tfor _, s := range Services {\n\t\tif s.Matches_Request(r) {\n\t\t\tx = s\n\t\t\tfound = true\n\t\t}\n\t}\n\n\tif !found {\n\t\treturn x, fmt.Errorf(\"get_service: no service found for request\")\n\t}\n\n\treturn x, nil\n}", "title": "" }, { "docid": "85829b3b8e2ce65cbced7202c9a81bc7", "score": "0.5105533", "text": "func GetFc(ctx *pulumi.Context) string {\n\treturn config.Get(ctx, \"alicloud:fc\")\n}", "title": "" }, { "docid": "20794fcefba695d6bc449dd554ddf8f1", "score": "0.5069994", "text": "func (f OrdStatusReqIDField) Tag() quickfix.Tag { return tag.OrdStatusReqID }", "title": "" }, { "docid": "b74e185bb5e5b5b0333a3a939490b4da", "score": "0.5062181", "text": "func getReq(ctx RequestContext) (*api.GetCertificatesRequest, error) {\n\tvar err error\n\treq := new(api.GetCertificatesRequest)\n\n\treq.ID = ctx.GetQueryParm(\"id\")\n\treq.Serial = ctx.GetQueryParm(\"serial\")\n\treq.AKI = ctx.GetQueryParm(\"aki\")\n\treq.NotRevoked, err = ctx.GetBoolQueryParm(\"notrevoked\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.NotExpired, err = ctx.GetBoolQueryParm(\"notexpired\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn req, nil\n}", "title": "" }, { "docid": "8cd255cf0e6707b67a2c6cccd75f4167", "score": "0.50542265", "text": "func (r ApiFinancialsRequest) Freq(freq string) ApiFinancialsRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "a25919da78511576c7a9c036b654ec10", "score": "0.5048598", "text": "func (f RFQReqIDField) Tag() quickfix.Tag { return tag.RFQReqID }", "title": "" }, { "docid": "789aafabb8ef34cc7c3243b61eee3765", "score": "0.5033219", "text": "func IsFaucetReq(msg *tangle.Message) bool {\n\treturn msg.Payload().Type() == Type\n}", "title": "" }, { "docid": "2c8b9b11b4526b0b61fefc9d4d3ec0fe", "score": "0.50241274", "text": "func (td *TestData_App01sqVendor) GetReq(target string, body string) {\n\n\ttd.T.Logf(\"Vendor.Setup()\\n\")\n\n\tif target == \"\" {\n\t\ttd.T.Fatalf(\"Error: Missing Target String\\n\")\n\t}\n\n\ttd.Req = httptest.NewRequest(http.MethodGet, target, strings.NewReader(body))\n\ttd.ServeHttp() // Perform the test through the mux.\n\n\ttd.T.Logf(\"...end Vendor.Setup\\n\")\n\n}", "title": "" }, { "docid": "03efabef70c48bd7824f9122c07bded6", "score": "0.49860322", "text": "func getForexAllItem() (events.APIGatewayProxyResponse, error) {\n\n\t// Fetch the forex record from the database.\n\tforexItems, err := getAllItem()\n\tif err != nil {\n\t\treturn serverError(err)\n\t}\n\tif forexItems == nil {\n\t\treturn clientError(http.StatusNotFound)\n\t}\n\n\t// The APIGatewayProxyResponse.Body field needs to be a string, so\n\t// we marshal the forex record into JSON.\n\tjs, err := json.Marshal(forexItems)\n\tfmt.Println(js)\n\tif err != nil {\n\t\treturn serverError(err)\n\t}\n\n\t// Response with a 200 OK status and the JSON forex record // as the body.\n\treturn events.APIGatewayProxyResponse{\n\t\tStatusCode: http.StatusOK,\n\t\tBody: string(js),\n\t\tHeaders: map[string]string{\n\t\t\t\"Content-Type\": \"application/json\",\n\t\t\t\"Access-Control-Allow-Origin\": \"*\",\n\t\t\t\"Access-Control-Allow-Credentials\": \"true\",\n\t\t\t\"Access-Control-Allow-Headers\": \"Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token\",\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "7cf7920b5ca83f47b4cb945a1148b352", "score": "0.49791497", "text": "func getRequestAddress() (string, error) {\n\ttrace := make([]byte, 10240)\n\tcount := runtime.Stack(trace, false)\n\t//fmt.Printf(\"Stack of %d bytes: %s\\n\", count, trace)\n\tmatch := regexServeHTTP.FindStringSubmatch(string(trace[0:count]))\n\tif len(match) != 2 {\n\t\tfmt.Println(\"Autocontext: regex not found in stack\")\n\t\t//fmt.Printf(\"*** STACK ***\\n%s\\n\", trace)\n\t\treturn \"\", errors.New(\"Failed to find *http.Request address\")\n\t}\n\tif count > 3072 {\n\t\tfmt.Println(\"Autocontext: stack frame too large, check for bugs\")\n\t\tfmt.Printf(\"*** STACK ***\\n%s\\n\", trace)\n\t}\n\t//fmt.Printf(\"*** extracted address from stacktrace: %s\\n\", match[1])\n\treturn match[1], nil\n}", "title": "" }, { "docid": "7def117b0a9a68450fc1257ae2443416", "score": "0.49575886", "text": "func (r ApiCompanyEpsEstimatesRequest) Freq(freq string) ApiCompanyEpsEstimatesRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "864ec2f24f2e70c7acdf7bd9f10c287d", "score": "0.49478462", "text": "func onDemandAskRequest(logger *zap.Logger, ask string, name string) error {\n\taskURL, err := url.Parse(ask)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"parsing ask URL: %v\", err)\n\t}\n\tqs := askURL.Query()\n\tqs.Set(\"domain\", name)\n\taskURL.RawQuery = qs.Encode()\n\n\taskURLString := askURL.String()\n\tresp, err := onDemandAskClient.Get(askURLString)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error checking %v to determine if certificate for hostname '%s' should be allowed: %v\",\n\t\t\task, name, err)\n\t}\n\tresp.Body.Close()\n\n\tlogger.Debug(\"response from ask endpoint\",\n\t\tzap.String(\"domain\", name),\n\t\tzap.String(\"url\", askURLString),\n\t\tzap.Int(\"status\", resp.StatusCode))\n\n\tif resp.StatusCode < 200 || resp.StatusCode > 299 {\n\t\treturn fmt.Errorf(\"%s: %w %s - non-2xx status code %d\", name, errAskDenied, ask, resp.StatusCode)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "94e87deec6feffa1700d8a89303ea1ed", "score": "0.4931024", "text": "func (r ApiFinancialsReportedRequest) Freq(freq string) ApiFinancialsReportedRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "73a7a07a1b35350cc6b928f9480d1ed4", "score": "0.49223042", "text": "func (f TradeRequestStatusField) Tag() quickfix.Tag { return tag.TradeRequestStatus }", "title": "" }, { "docid": "e8b9f333fee8f9733c13869c89469acf", "score": "0.49196485", "text": "func (f *FeatureSupportRequest) GetFeatureSupportRequest() *FeatureSupportRequest { return f }", "title": "" }, { "docid": "e202fc0d250d0ab99de7d9fbddf0b6bb", "score": "0.4917309", "text": "func (f QuoteStatusReqIDField) Tag() quickfix.Tag { return tag.QuoteStatusReqID }", "title": "" }, { "docid": "c2e739e5a0f252641a6fcbd578b5bad4", "score": "0.49124306", "text": "func (f SecurityReqIDField) Tag() quickfix.Tag { return tag.SecurityReqID }", "title": "" }, { "docid": "751c38cc80b3c428d7e71a53ba4a4441", "score": "0.4905362", "text": "func (f TradSesReqIDField) Tag() quickfix.Tag { return tag.TradSesReqID }", "title": "" }, { "docid": "410ddc982548f98cd9bb6fa50c56122e", "score": "0.4898501", "text": "func (f QuoteReqIDField) Tag() quickfix.Tag { return tag.QuoteReqID }", "title": "" }, { "docid": "dd2616ba8a548cff09a7f24e1df639e2", "score": "0.4894665", "text": "func processRefsRequest(ctx *fasthttp.RequestCtx, start time.Time, pkgInfo *PkgInfo) {\n\tif pkgInfo.TargetName != \"\" {\n\t\tswitch pkgInfo.TargetType {\n\t\tcase refs.TYPE_TAG:\n\t\t\tatomic.AddUint64(&metrics.Hits, 1)\n\t\t\tlog.Debug(\n\t\t\t\t\"%s -> T:%s (%s)\", pkgInfo.Path, pkgInfo.TargetName,\n\t\t\t\tpkgInfo.RefsInfo.GetTagSHA(pkgInfo.TargetName, true),\n\t\t\t)\n\t\tcase refs.TYPE_BRANCH:\n\t\t\tatomic.AddUint64(&metrics.Hits, 1)\n\t\t\tlog.Debug(\n\t\t\t\t\"%s -> B:%s (%s)\", pkgInfo.Path, pkgInfo.TargetName,\n\t\t\t\tpkgInfo.RefsInfo.GetBranchSHA(pkgInfo.TargetName, true),\n\t\t\t)\n\t\tdefault:\n\t\t\tatomic.AddUint64(&metrics.Misses, 1)\n\t\t\tlog.Warn(\"%s -> master (proper tag/branch not found)\", pkgInfo.Path)\n\t\t}\n\t} else {\n\t\tatomic.AddUint64(&metrics.Misses, 1)\n\t\tlog.Info(\"%s -> master (no target version)\", pkgInfo.Path)\n\t}\n\n\tappendProcHeader(ctx, start)\n\tctx.Response.Header.Set(\"Content-Type\", \"application/x-git-upload-pack-advertisement\")\n\tctx.Write(pkgInfo.RefsInfo.Rewrite(pkgInfo.TargetName, pkgInfo.TargetType))\n}", "title": "" }, { "docid": "11445bf3bacc8ae88294dff8b35447db", "score": "0.4887733", "text": "func (f MarketReqIDField) Tag() quickfix.Tag { return tag.MarketReqID }", "title": "" }, { "docid": "ce2133b8e24c2c842f91694b2cd3d908", "score": "0.4878329", "text": "func GetRAFlow(w http.ResponseWriter, r *http.Request, d *ServiceData) {\n\tconst funcname = \"GetRAFlow\"\n\tvar (\n\t\tflow rlib.Flow\n\t\terr error\n\t\treq GetRAFlowRequest\n\t\ttx *sql.Tx\n\t\tctx context.Context\n\t)\n\trlib.Console(\"Entered %s, \\n\", funcname)\n\n\t// ===============================================\n\t// defer function to handle transactaion rollback\n\t// ===============================================\n\tdefer func() {\n\t\tif err != nil {\n\t\t\tif tx != nil {\n\t\t\t\ttx.Rollback()\n\t\t\t}\n\t\t\tSvcErrorReturn(w, err, funcname)\n\t\t\treturn\n\t\t}\n\n\t\t// COMMIT TRANSACTION\n\t\tif tx != nil {\n\t\t\terr = tx.Commit()\n\t\t}\n\t}()\n\n\t// ------- unmarshal the request data ---------------\n\tif err := json.Unmarshal([]byte(d.data), &req); err != nil {\n\t\treturn\n\t}\n\n\t// rlib.Console(\"req.Version = %s\\n\", req.Version)\n\n\t//-------------------------------------------------------\n\t// GET THE NEW `tx`, UPDATED CTX FROM THE REQUEST CONTEXT\n\t//-------------------------------------------------------\n\ttx, ctx, err = rlib.NewTransactionWithContext(r.Context())\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// EditFlag should be set to true only when we're creating a Flow that\n\t// becomes a RefNo (an amended RentalAgreement)\n\tEditFlag := false // assume we're asking for the view version\n\n\t// BASED ON MODE DO OPERATION\n\tswitch req.Version {\n\tcase \"raid\":\n\t\t// GET RENTAL AGREEMENT\n\t\tvar ra rlib.RentalAgreement\n\t\tra, err = rlib.GetRentalAgreement(ctx, req.RAID)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\t\tif ra.RAID == 0 {\n\t\t\terr = fmt.Errorf(\"Rental Agreement not found with given RAID: %d\", req.RAID)\n\t\t\treturn\n\t\t}\n\n\t\t// convert permanent ra to flow data and get it\n\t\tvar raf rlib.RAFlowJSONData\n\t\traf, err = rlib.ConvertRA2Flow(ctx, &ra, EditFlag)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t//-------------------------------------------------------------------------\n\t\t// Save the flow to the db\n\t\t//-------------------------------------------------------------------------\n\t\tvar raflowJSONData []byte\n\t\traflowJSONData, err = json.Marshal(&raf)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t//-------------------------------------------------------------------------\n\t\t// Fill out the datastructure and save it to the db as a flow...\n\t\t//-------------------------------------------------------------------------\n\t\tflow = rlib.Flow{\n\t\t\tBID: ra.BID,\n\t\t\tFlowID: 0, // we're not creating any flow, just to see RA content\n\t\t\tUserRefNo: \"\",\n\t\t\tFlowType: rlib.RAFlow,\n\t\t\tID: ra.RAID,\n\t\t\tData: raflowJSONData,\n\t\t\tCreateBy: 0,\n\t\t\tLastModBy: 0,\n\t\t}\n\n\t\t// -------------------\n\t\t// WRITE FLOW RESPONSE\n\t\t// -------------------\n\t\tSvcWriteFlowResponse(ctx, d.BID, flow, w)\n\t\treturn\n\n\tcase \"refno\":\n\t\t// CREATE ONE ONLY WHEN REF.NO IS BLANK\n\t\t// rlib.Console(\"req.UserRefNo = %s\\n\", req.UserRefNo)\n\t\tif req.UserRefNo == \"\" {\n\n\t\t\t// CHECK IF ANY FLOW EXIST WITH GIVEN RAID\n\t\t\tflow, err = rlib.GetFlowForRAID(ctx, \"RA\", req.RAID)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif flow.FlowID > 0 {\n\t\t\t\terr = fmt.Errorf(\"flow already exists with given refno: %s\", flow.UserRefNo)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// rlib.Console(\"Generating new flow %s\\n\", req.UserRefNo)\n\t\t\t// IF NOT FOUND THEN TRY TO CREATE NEW ONE FROM RAID\n\t\t\t// GET RENTAL AGREEMENT\n\t\t\tvar ra rlib.RentalAgreement\n\t\t\tra, err = rlib.GetRentalAgreement(ctx, req.RAID)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif ra.RAID == 0 {\n\t\t\t\terr = fmt.Errorf(\"rental Agreement not found with given RAID: %d\", req.RAID)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// GET THE NEW FLOW ID CREATED USING PERMANENT DATA\n\t\t\tvar flowID int64\n\t\t\tEditFlag = true\n\t\t\tflowID, err = GetRA2FlowCore(ctx, &ra, d, EditFlag)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// GET GENERATED FLOW USING NEW ID\n\t\t\tflow, err = rlib.GetFlow(ctx, flowID)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\t// -------------------\n\t\t\t// WRITE FLOW RESPONSE\n\t\t\t// -------------------\n\t\t\tSvcWriteFlowResponse(ctx, d.BID, flow, w)\n\t\t\treturn\n\t\t}\n\n\t\t// rlib.Console(\"Using existing flow\\n\")\n\t\t// GIVEN REF.NO SHOULD BE VALID\n\t\tif len(req.UserRefNo) != rlib.UserRefNoLength {\n\t\t\terr = fmt.Errorf(\"given refno is not valid: %s \", req.UserRefNo)\n\t\t\treturn\n\t\t}\n\n\t\t// IF REF NO IS PROVIDED THEN TRY TO FIND\n\t\t// GET THE FLOW BY REFERENCE NO IF RAID == 0\n\t\tflow, err = rlib.GetFlowByUserRefNo(ctx, d.BID, req.UserRefNo)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\t// IF FLOW FOUND WITH REF.NO THEN RETURN THE RESPONSE\n\t\tif flow.FlowID == 0 {\n\t\t\terr = fmt.Errorf(\"flow not found with given refno: %s \", req.UserRefNo)\n\t\t\treturn\n\t\t}\n\t\t// -------------------\n\t\t// WRITE FLOW RESPONSE\n\t\t// -------------------\n\t\tSvcWriteFlowResponse(ctx, d.BID, flow, w)\n\t\treturn\n\n\tdefault:\n\t\terr = fmt.Errorf(\"Invalid version: (%s) to get raflow for RAID: %d\", req.Version, req.RAID)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "1e0c2a6358808cbcc76263275456eb1a", "score": "0.4874769", "text": "func (a *DefaultApiService) ForexRates(ctx _context.Context) ApiForexRatesRequest {\n\treturn ApiForexRatesRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "fe3755158a879f3826abe096a600274c", "score": "0.48651424", "text": "func getRequestInfo(req *authservice.CheckRequest) (*requestInfo, error) {\n\n\tnewConnection := requestInfo{\n\t\thttpRequest: req.Attributes.Request.Http,\n\t}\n\tif ipaddress, ok := newConnection.httpRequest.Headers[\"x-forwarded-for\"]; ok {\n\t\tnewConnection.IP = net.ParseIP(ipaddress)\n\t}\n\n\tvar err error\n\tif newConnection.URL, err = url.ParseRequestURI(newConnection.httpRequest.Path); err != nil {\n\t\treturn nil, errors.New(\"cannot parse url\")\n\t}\n\n\tif newConnection.queryParameters, err = url.ParseQuery(newConnection.URL.RawQuery); err != nil {\n\t\treturn nil, errors.New(\"cannot parse query parameters\")\n\t}\n\n\treturn &newConnection, nil\n}", "title": "" }, { "docid": "eba2c5d386e6bbf18986dd8461b33643", "score": "0.485051", "text": "func (t *HousingChaincode) getRequest(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\n\tif len(args) != 4 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting 4, \\\"RequestID\\\" : \\\"xxxxxx\\\"\")\n\t}\n\n\tif args[0] != \"Caller\" || args[2] != \"RequestID\" {\n\t\treturn nil, errors.New(\"Unsupoprted query arguments [\" + args[0] + \"] or [\" + args[2] + \"]\")\n\t}\n\n\tcallerCert := args[1]\n\n\trcLOK, rcLErr := t.hasRole(stub, callerCert, \"Landlord\")\n\n\tif rcLErr != nil {\n\t\treturn nil, fmt.Errorf(\"Failed checking role [%s]\", rcLErr)\n\t}\n\n\trcTOK, rcTErr := t.hasRole(stub, callerCert, \"Tenant\")\n\n\tif rcTErr != nil {\n\t\treturn nil, fmt.Errorf(\"Failed checking role [%s]\", rcTErr)\n\t}\n\n\trcSOK, rcSErr := t.hasRole(stub, callerCert, \"ServiceProvider\")\n\n\tif rcSErr != nil {\n\t\treturn nil, fmt.Errorf(\"Failed checking role [%s]\", rcSErr)\n\t}\n\n\tif !rcLOK && !rcTOK && !rcSOK {\n\t\treturn nil, errors.New(\"The invoker does not have the required roles.\")\n\t}\n\n\tfmt.Println(\"Start to query a Request ...\")\n\n\trequestID := args[3]\n\n\tvar columns []shim.Column\n\tkeyCol1 := shim.Column{Value: &shim.Column_String_{String_: requestID}}\n\n\tcolumns = append(columns, keyCol1)\n\n\trow, err := stub.GetRow(RequestTableName, columns)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Query one request (RequestID = %s) in the table Request failed\", requestID)\n\t}\n\n\tif len(row.Columns) == 0 {\n\t\treturn nil, errors.New(\"Request was NOT found\")\n\t}\n\n\tfmt.Println(\"Query one request (RequestID = \" + requestID + \") in the table Request successfully...\")\n\n\t// Convert to the structure Request, the returns would be key1:value1,key2:value2,key3:value3, ...\n\trequest := &Request{\n\t\trow.Columns[0].GetString_(),\n\t\trow.Columns[1].GetString_(),\n\t\trow.Columns[2].GetString_(),\n\t\trow.Columns[3].GetString_(),\n\t\trow.Columns[4].GetString_(),\n\t\trow.Columns[5].GetString_(),\n\t\trow.Columns[6].GetString_(),\n\t\trow.Columns[7].GetString_(),\n\t\trow.Columns[8].GetString_(),\n\t\trow.Columns[9].GetString_(),\n\t\trow.Columns[10].GetString_(),\n\t\trow.Columns[11].GetString_(),\n\t\trow.Columns[12].GetString_(),\n\t}\n\n\treturnRequest, err := json.Marshal(request)\n\n\tif err != nil {\n\t\treturn nil, errors.New(\"getRequest() json marshal error\")\n\t}\n\n\tfmt.Println(\"End to query a Request ...\")\n\n\treturn returnRequest, nil\n}", "title": "" }, { "docid": "99fee6c535b14907fffb755d87739657", "score": "0.48491922", "text": "func (f TestReqIDField) Tag() quickfix.Tag { return tag.TestReqID }", "title": "" }, { "docid": "841b98a906d65b16a6f27b43041f5113", "score": "0.48409683", "text": "func (this *FastBill) execGetRequest(request *Request, response interface{}) error {\n\n\tjsonBytes, err := json.Marshal(request)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to marshal JSON: %v\", err)\n\t}\n\n\tbeego.Info(\"jsonBytes:\", string(jsonBytes))\n\n\treq, err := http.NewRequest(\"GET\", API_URL, bytes.NewBuffer(jsonBytes))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed to create request: %v\", err)\n\t}\n\treq.Header.Add(\"Content-Type\", \"application/json\")\n\treq.SetBasicAuth(this.email, this.apiKey)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\tbeego.Error(\"Failed to get response:\", err)\n\t\treturn fmt.Errorf(\"Failed to get response\")\n\t}\n\tdefer resp.Body.Close()\n\n\tif code := resp.StatusCode; code < 200 || code >= 300 {\n\t\treturn fmt.Errorf(\"status code %v (%v)\", code, resp.Status)\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tbeego.Error(\"Failed to read response body:\", err)\n\t\treturn fmt.Errorf(\"Failed to read response body\")\n\t}\n\n\terr = json.Unmarshal(body, response)\n\tif err != nil {\n\t\tbeego.Error(\"Failed to unmarshal JSON:\", err)\n\t\tbeego.Error(\"JSON was: \", string(body))\n\t\treturn fmt.Errorf(\"Failed to unmarshal json\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "c5127991c6204f62285b5466a6f08138", "score": "0.48361668", "text": "func objAPIFn_ReqAct(\n\tme interface{}, hd gos_packet.Header, robj *gos_obj.ReqAct_data) (\n\tgos_packet.Header, *gos_obj.RspAct_data, error) {\n\tsendHeader := gos_packet.Header{\n\t\tErrorCode: gos_error.None,\n\t}\n\tsendBody := &gos_obj.RspAct_data{}\n\treturn sendHeader, sendBody, nil\n}", "title": "" }, { "docid": "1c266cb0f53875b92f27500fcb20ac5a", "score": "0.48336273", "text": "func (f SecurityStatusReqIDField) Tag() quickfix.Tag { return tag.SecurityStatusReqID }", "title": "" }, { "docid": "2adcf541cb59e5677a2420f0ca36a9a9", "score": "0.4825679", "text": "func (f SettlInstReqIDField) Tag() quickfix.Tag { return tag.SettlInstReqID }", "title": "" }, { "docid": "7c6643aff60395ce4291de79a8488a54", "score": "0.4816492", "text": "func (f AsgnReqIDField) Tag() quickfix.Tag { return tag.AsgnReqID }", "title": "" }, { "docid": "e65027cc0a5b9fc4afeba09e5b5bc573", "score": "0.48142314", "text": "func getDrawableInfoRequest(c *xgb.Conn, Screen uint32, Drawable uint32) []byte {\n\tsize := 12\n\tb := 0\n\tbuf := make([]byte, size)\n\n\tc.ExtLock.RLock()\n\tbuf[b] = c.Extensions[\"XFree86-DRI\"]\n\tc.ExtLock.RUnlock()\n\tb += 1\n\n\tbuf[b] = 9 // request opcode\n\tb += 1\n\n\txgb.Put16(buf[b:], uint16(size/4)) // write request size in 4-byte units\n\tb += 2\n\n\txgb.Put32(buf[b:], Screen)\n\tb += 4\n\n\txgb.Put32(buf[b:], Drawable)\n\tb += 4\n\n\treturn buf\n}", "title": "" }, { "docid": "3203d84b8581f89d163d0acf565cd8f8", "score": "0.4813242", "text": "func (f CollReqIDField) Tag() quickfix.Tag { return tag.CollReqID }", "title": "" }, { "docid": "e3b8a1e972e32c4f061fa1cd56b245dc", "score": "0.480209", "text": "func doReq(ctx *gin.Context) *rkentry.ReqResponse {\n\tmetricsSet := rkginmetrics.GetServerMetricsSet(ctx)\n\tif metricsSet == nil {\n\t\treturn &rkentry.ReqResponse{\n\t\t\tMetrics: make([]*rkentry.ReqMetricsRK, 0),\n\t\t}\n\t}\n\n\tvector := metricsSet.GetSummary(rkginmetrics.ElapsedNano)\n\treqMetrics := rkentry.NewPromMetricsInfo(vector)\n\n\t// Fill missed metrics\n\tapis := make([]string, 0)\n\n\tginEntry := GetGinEntry(rkginctx.GetEntryName(ctx))\n\tif ginEntry != nil {\n\t\troutes := ginEntry.Router.Routes()\n\t\tfor j := range routes {\n\t\t\tinfo := routes[j]\n\t\t\tapis = append(apis, info.Path)\n\t\t}\n\t}\n\n\t// Add empty metrics into result\n\tfor i := range apis {\n\t\tif !containsMetrics(apis[i], reqMetrics) {\n\t\t\treqMetrics = append(reqMetrics, &rkentry.ReqMetricsRK{\n\t\t\t\tRestPath: apis[i],\n\t\t\t\tResCode: make([]*rkentry.ResCodeRK, 0),\n\t\t\t})\n\t\t}\n\t}\n\n\treturn &rkentry.ReqResponse{\n\t\tMetrics: reqMetrics,\n\t}\n}", "title": "" }, { "docid": "1b802aec1dba188bd9641ce083c44f62", "score": "0.4779574", "text": "func (f *future) GetRequest() network.Request {\n\trequest := f.Request()\n\treturn request\n}", "title": "" }, { "docid": "cf85ca81ae9d60e93fe278ecb8922fa2", "score": "0.47655702", "text": "func (s *apiService) Fuse(ctx context.Context, req *pb.FusionRequest) (*pb.FusionInfo, error) {\n\tid := req.Id\n\tif id == \"\" {\n\t\tid = uuid.New().String()\n\t}\n\tcontents := &pb.FusionTask{\n\t\tDoneQueue: queueConf.FusionOutbox(),\n\t\tFusion: req.Request,\n\t\tFuserId: req.FuserId,\n\t\tTags: req.Tags,\n\t\tDetectionId: req.DetectionId,\n\t}\n\n\tval, err := new(jsonpb.Marshaler).MarshalToString(contents)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"fusion task json\")\n\t}\n\n\tif _, _, err := s.eqc.Modify(ctx, entroq.InsertingInto(queueConf.FusionInbox(), entroq.WithValue([]byte(val)))); err != nil {\n\t\tif isGRPCFatal(err) {\n\t\t\tlog.Fatalf(\"Fatal rpc error in modify: %v\", err)\n\t\t}\n\t\treturn nil, errors.Wrap(err, \"fusion task insert\")\n\t}\n\n\tinfo := new(pb.FusionInfo)\n\n\tfor _, fID := range contents.FuserId {\n\t\tinfo.FusionInfos = append(info.FusionInfos, &pb.FuserFusionInfo{\n\t\t\tFuserId: fID,\n\t\t\tFusion: req.Request,\n\t\t})\n\t}\n\n\treturn info, nil\n}", "title": "" }, { "docid": "2bb1b802519c05f639562b2a5163f299", "score": "0.47563305", "text": "func (f ConfirmReqIDField) Tag() quickfix.Tag { return tag.ConfirmReqID }", "title": "" }, { "docid": "0dd790f786ea3135e62127f5a4ea2177", "score": "0.47536868", "text": "func (p *FileInf) reqAndGetRawResponse(r *RequestParams) {\r\n\tres, err := r.FetchAPI()\r\n\tif err != nil {\r\n\t\tp.errHandlingFromFetch(res)\r\n\t\treturn\r\n\t}\r\n\tp.saveResponse(res)\r\n}", "title": "" }, { "docid": "b250c4bea051b6b186ebaafba611ba95", "score": "0.47529206", "text": "func CreateGetHotlineQualificationByOrderRequest() (request *GetHotlineQualificationByOrderRequest) {\n\trequest = &GetHotlineQualificationByOrderRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Dyvmsapi\", \"2017-05-25\", \"GetHotlineQualificationByOrder\", \"dyvms\", \"openAPI\")\n\trequest.Method = requests.POST\n\treturn\n}", "title": "" }, { "docid": "164ebfa1e43bbdd23a90b7bba926901a", "score": "0.47419265", "text": "func RefFromReq(r *http.Request) (Ref, error) {\n\tif r.URL.String() == \"\" || r.URL.Path == \"\" {\n\t\treturn Ref{}, nil\n\t}\n\treturn RefFromHTTPPath(r.URL.Path)\n}", "title": "" }, { "docid": "f95eb749490d5b294975ed1f82ffb251", "score": "0.47371554", "text": "func (_CivilTCRContract *CivilTCRContractTransactor) RequestAppeal(opts *bind.TransactOpts, listingAddress common.Address, data string) (*types.Transaction, error) {\n\treturn _CivilTCRContract.contract.Transact(opts, \"requestAppeal\", listingAddress, data)\n}", "title": "" }, { "docid": "be12a498940a82ae901b6e58c1aef6a6", "score": "0.4734327", "text": "func (f PosReqStatusField) Tag() quickfix.Tag { return tag.PosReqStatus }", "title": "" }, { "docid": "08da01b13b7f66f49a001e9ca3859b15", "score": "0.47210336", "text": "func (f MassStatusReqTypeField) Tag() quickfix.Tag { return tag.MassStatusReqType }", "title": "" }, { "docid": "742698dcfda07c8b727650c5251d62a3", "score": "0.47065005", "text": "func (c *P4rtClient) ReadReq(entity *p4.Entity) (*p4.ReadResponse, error) {\n\tvar req p4.ReadRequest\n\treq.DeviceId = c.DeviceID\n\treq.Entities = []*p4.Entity{entity}\n\n\tctx, cancel := context.WithTimeout(context.Background(),\n\t\t2*time.Second)\n\tdefer cancel()\n\n\tlog.Traceln(proto.MarshalTextString(&req))\n\n\treadClient, err := c.Client.Read(ctx, &req)\n\tif err == nil {\n\t\treadRes, err := readClient.Recv()\n\t\tif err == nil {\n\t\t\tlog.Traceln(proto.MarshalTextString(readRes))\n\t\t\treturn readRes, nil\n\t\t}\n\t}\n\n\treturn nil, err\n}", "title": "" }, { "docid": "40dfa3ecbc86eba9f4182f90ba25fe5e", "score": "0.47058502", "text": "func readRequest(s *FilterProcessScanner) (*Request, error) {\n\ts.Scan()\n\n\tif err := s.Err(); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.Request(), nil\n}", "title": "" }, { "docid": "9cd77b4332954733ea0747ee32cdea99", "score": "0.4703884", "text": "func getRequestPrefix(callclass string) string {\r\n\tespXmlmc := NewEspXmlmcSession(importConf.HBConf.APIKeys[0])\r\n\r\n\tstrSetting := \"\"\r\n\tcallclass = strings.ToLower(callclass)\r\n\tswitch callclass {\r\n\tcase \"incident\":\r\n\t\tstrSetting = \"guest.app.requests.types.IN\"\r\n\tcase \"service request\":\r\n\t\tstrSetting = \"guest.app.requests.types.SR\"\r\n\tcase \"change request\":\r\n\t\tstrSetting = \"app.requests.types.CH\"\r\n\tcase \"problem\":\r\n\t\tstrSetting = \"app.requests.types.PM\"\r\n\tcase \"known error\":\r\n\t\tstrSetting = \"app.requests.types.KE\"\r\n\tcase \"release\":\r\n\t\tstrSetting = \"app.requests.types.RM\"\r\n\t}\r\n\r\n\tespXmlmc.SetParam(\"appName\", appServiceManager)\r\n\tespXmlmc.SetParam(\"filter\", strSetting)\r\n\tresponse, err := espXmlmc.Invoke(\"session\", \"getApplicationOption\")\r\n\tif err != nil {\r\n\t\tlogger(4, \"Could not retrieve System Setting for Request Prefix. Using default [\"+callclass+\"].\", false)\r\n\t\treturn callclass\r\n\t}\r\n\tvar xmlRespon xmlmcSysSettingResponse\r\n\terr = xml.Unmarshal([]byte(response), &xmlRespon)\r\n\tif err != nil {\r\n\t\tlogger(4, \"Could not retrieve System Setting for Request Prefix. Using default [\"+callclass+\"].\", false)\r\n\t\treturn callclass\r\n\t}\r\n\tif xmlRespon.MethodResult != \"ok\" {\r\n\t\tlogger(4, \"Could not retrieve System Setting for Request Prefix: \"+xmlRespon.MethodResult, false)\r\n\t\treturn callclass\r\n\t}\r\n\treturn xmlRespon.Setting\r\n}", "title": "" }, { "docid": "5ea32da0cafcc3534ab2d1a4405b49a2", "score": "0.47020584", "text": "func (c *Client) Req() httd.Requester {\n\treturn c.req\n}", "title": "" }, { "docid": "c5366666db94c44ea5ef727f7cc846f8", "score": "0.46973157", "text": "func (client ImplicitClient) GetRequiredGlobalQuerySender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req)\n}", "title": "" }, { "docid": "8beec0a96b818038924a64b56b30d426", "score": "0.46942353", "text": "func (*GetReq) Descriptor() ([]byte, []int) {\n\treturn file_client_req_proto_rawDescGZIP(), []int{3}\n}", "title": "" }, { "docid": "c7b6f49e79357386425597657d371754", "score": "0.46903527", "text": "func requestfunc(u string) (resp *http.Response, body string, errs []error) {\n\thttp.DefaultTransport.(*http.Transport).TLSClientConfig = &tls.Config{InsecureSkipVerify: true}\n\tclient := &http.Client{\n\t\tCheckRedirect: redirectPolicyFunc,\n\t}\n\n\treq, err := http.NewRequest(\"GET\", u, nil)\n\treq.Header.Add(\"User-Agent\", useragent)\n\n\t//splitting headers and values by using : as separator\n\tfor _, v := range custhead {\n\t\ts := strings.SplitN(v, \":\", 2)\n\t\treq.Header.Add(s[0], s[1])\n\t}\n\n\t//Converting request dump to string for verbose mode\n\trequestDump, err := httputil.DumpRequest(req, true)\n\tif err != nil {\n\t\tfmt.Println(err)\n\t}\n\tif verbose == true {\n\t\tfmt.Println(string(requestDump))\n\t}\n\tresp, err = client.Do(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tbodyBytes, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tbodyString := string(bodyBytes)\n\treturn resp, bodyString, errs\n}", "title": "" }, { "docid": "a2a7e88f4174fbe4748b4f8633e82f9c", "score": "0.4688817", "text": "func (*GetFacilityRequestStatusRequest) Descriptor() ([]byte, []int) {\n\treturn file_hts_facility_service_proto_rawDescGZIP(), []int{14}\n}", "title": "" }, { "docid": "d7caa036973ce65852fe1e0840ceea85", "score": "0.468719", "text": "func (store *Store) trcRequestFunc(ctx context.Context, request dedupe.Request) dedupe.Response {\n\treq := request.(*trcRequest)\n\ttrcReqMsg := &cert_mgmt.TRCReq{\n\t\tISD: req.isd,\n\t\tVersion: req.version,\n\t\tCacheOnly: req.cacheOnly,\n\t}\n\ttrcMsg, err := store.msger.GetTRC(ctx, trcReqMsg, req.server, req.id)\n\tif err != nil {\n\t\treturn wrapErr(err)\n\t}\n\ttrcObj, err := trcMsg.TRC()\n\tif err != nil {\n\t\treturn wrapErr(common.NewBasicError(\"Unable to parse TRC message\", err, \"msg\", trcMsg))\n\t}\n\tif trcObj == nil {\n\t\treturn dedupe.Response{Data: nil}\n\t}\n\n\tif req.version != scrypto.LatestVer && trcObj.Version != req.version {\n\t\treturn wrapErr(common.NewBasicError(\"Remote server responded with bad version\", nil,\n\t\t\t\"got\", trcObj.Version, \"expected\", req.version))\n\t}\n\n\tif req.postHook != nil {\n\t\treturn dedupe.Response{Data: trcObj, Error: req.postHook(ctx, trcObj)}\n\t}\n\treturn dedupe.Response{Data: trcObj}\n}", "title": "" }, { "docid": "6f881b5ba23969cdb5aea626358c2dac", "score": "0.46842524", "text": "func (f MassStatusReqIDField) Tag() quickfix.Tag { return tag.MassStatusReqID }", "title": "" }, { "docid": "837ee55a6000d5093ef181c98a21618a", "score": "0.46783966", "text": "func requestFunds(w http.ResponseWriter, r *http.Request) {\n\thostIP, err := getClientIP(r)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tif err := r.ParseForm(); err != nil {\n\t\tsendReply(w, r, \"\", err.Error())\n\t\treturn\n\t}\n\n\taddressInput := r.FormValue(\"address\")\n\tamountInput := r.FormValue(\"amount\")\n\toverridetokenInput := r.FormValue(\"overridetoken\")\n\n\tresp, err := pay(r.Context(), hostIP, addressInput, amountInput, overridetokenInput)\n\tif err != nil {\n\t\tsendReply(w, r, \"\", err.Error())\n\t\treturn\n\t}\n\tsendReply(w, r, resp, \"\")\n}", "title": "" }, { "docid": "d8e717b9568ab4f8ff503022c34e741d", "score": "0.46774992", "text": "func (api *API) Faucet(c appengine.Context, a AddrKeychain, amount int) (txhash string, err error) {\n\tif !(api.Coin == \"bcy\" && api.Chain == \"test\") && !(api.Coin == \"btc\" && api.Chain == \"test3\") {\n\t\terr = errors.New(\"Faucet: Cannot use Faucet unless on BlockCypher Testnet or Bitcoin Testnet3.\")\n\t\treturn\n\t}\n\tif amount > 1e7 {\n\t\terr = errors.New(\"Faucet: Cannot fund with more than 10,000,000 coins at a time.\")\n\t\treturn\n\t}\n\tu, err := api.buildURL(\"/faucet\")\n\tif err != nil {\n\t\treturn\n\t}\n\ttype FauxAddr struct {\n\t\tAddress string `json:\"address\"`\n\t\tAmount int `json:\"amount\"`\n\t}\n\tvar addr string\n\t//for easy funding/testing of OAPAddresses\n\tif a.OriginalAddress != \"\" {\n\t\taddr = a.OriginalAddress\n\t} else {\n\t\taddr = a.Address\n\t}\n\tvar data bytes.Buffer\n\tenc := json.NewEncoder(&data)\n\tif err = enc.Encode(&FauxAddr{addr, amount}); err != nil {\n\t\treturn\n\t}\n\tresp, err := postResponse(c, u, &data)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer resp.Body.Close()\n\t//decode JSON into map[string]string\n\ttxref := make(map[string]string)\n\tdec := json.NewDecoder(resp.Body)\n\terr = dec.Decode(&txref)\n\ttxhash = txref[\"tx_ref\"]\n\treturn\n}", "title": "" }, { "docid": "17fdc2dab18039413efc49a980e63108", "score": "0.46761027", "text": "func DoMainRequest(nextChangeID string) []byte {\n\t\n\tnewReq, anyError := http.NewRequest(\"GET\", \"http://api.pathofexile.com/public-stash-tabs\", nil)\n\t//571783755-589642300-558214129-635578319-604141055\n\tif anyError != nil {\n\t\tlog.Fatalln(anyError)\n\t}\n\tclient := &http.Client{}\n\tq := newReq.URL.Query()\n\n\tif(nextChangeID != \"\") {\n\t\tq.Add(\"id\", nextChangeID)\n\t}\n\tnewReq.URL.RawQuery = q.Encode()\n\n\tresp, anyError := client.Do(newReq)\n\tif anyError != nil {\n\t\tlog.Fatalln(anyError)\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t}\n\treturn body\n}", "title": "" }, { "docid": "af24e927447be0b42d61150175f0389b", "score": "0.46740544", "text": "func isActiveRequest(tx *sqlx.Tx, xmlID string) (bool, error) {\n\tqry := `SELECT EXISTS(SELECT 1 FROM deliveryservice_request WHERE deliveryservice->>'xmlId' = $1 AND status IN ('draft', 'submitted', 'pending'))`\n\tactive := false\n\tif err := tx.QueryRow(qry, xmlID).Scan(&active); err != nil {\n\t\treturn false, err\n\t}\n\treturn active, nil\n}", "title": "" }, { "docid": "af24e927447be0b42d61150175f0389b", "score": "0.46740544", "text": "func isActiveRequest(tx *sqlx.Tx, xmlID string) (bool, error) {\n\tqry := `SELECT EXISTS(SELECT 1 FROM deliveryservice_request WHERE deliveryservice->>'xmlId' = $1 AND status IN ('draft', 'submitted', 'pending'))`\n\tactive := false\n\tif err := tx.QueryRow(qry, xmlID).Scan(&active); err != nil {\n\t\treturn false, err\n\t}\n\treturn active, nil\n}", "title": "" }, { "docid": "94a183ad6852a7a6a6e92d13b606b6e8", "score": "0.4664807", "text": "func (req TODeliveryServiceRequest) GetType() string {\n\treturn \"deliveryservice_request\"\n}", "title": "" }, { "docid": "54212bebbeecdfe5cfba7eb60e78cc35", "score": "0.4657142", "text": "func (client *BorutaClient) GetRequestInfo(reqID boruta.ReqID) (boruta.ReqInfo, error) {\n\tvar reqInfo boruta.ReqInfo\n\tpath := client.url + \"reqs/\" + strconv.FormatUint(uint64(reqID), 10)\n\tresp, err := http.Get(path)\n\tif err != nil {\n\t\treturn reqInfo, err\n\t}\n\terr = processResponse(resp, &reqInfo)\n\treturn reqInfo, err\n}", "title": "" }, { "docid": "287d9467689b512e8db352be91ea657e", "score": "0.4652846", "text": "func (cl *Client) doReqString(ctx context.Context, path string, v interface{}, elName string) (string, error) {\n\t// send request\n\tres, err := cl.doReq(ctx, path, v, true)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\t// convert\n\td, ok := res.(map[string]interface{})\n\tif !ok {\n\t\treturn \"\", ErrInvalidXML\n\t}\n\tl, ok := d[elName]\n\tif !ok {\n\t\treturn \"\", ErrInvalidResponse\n\t}\n\ts, ok := l.(string)\n\tif !ok {\n\t\treturn \"\", ErrInvalidValue\n\t}\n\treturn s, nil\n}", "title": "" }, { "docid": "a24e0694a3b2bab3ff1ca3da78b27e82", "score": "0.462907", "text": "func (v *SimpleService_TransHeadersType_Args) GetReq() (o *TransHeader) {\n\tif v != nil {\n\t\to = v.Req\n\t}\n\treturn\n}", "title": "" }, { "docid": "ef4adc4207faed8e4eb131950a8a5757", "score": "0.46237075", "text": "func (s *Source) GetTimeSeriesReq() (*v3.CreateTimeSeriesRequest, error) {\n\t// Get the latest summary.\n\tsummary, err := s.client.GetSummary()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to get summary from kubelet: %v\", err)\n\t}\n\n\t// Translate kubelet's data to GCM v3's format.\n\ttsReq, err := s.translator.Translate(summary)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to translate data from summary %v: %v\", summary, err)\n\t}\n\n\treturn tsReq, nil\n}", "title": "" }, { "docid": "cfd8ceac58ce8f8c123de86505c441ab", "score": "0.46225843", "text": "func (client *TagsClient) getAtScopeCreateRequest(ctx context.Context, scope string, options *TagsClientGetAtScopeOptions) (*policy.Request, error) {\n\turlPath := \"/{scope}/providers/Microsoft.Resources/tags/default\"\n\turlPath = strings.ReplaceAll(urlPath, \"{scope}\", scope)\n\treq, err := runtime.NewRequest(ctx, http.MethodGet, runtime.JoinPaths(client.internal.Endpoint(), urlPath))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treqQP := req.Raw().URL.Query()\n\treqQP.Set(\"api-version\", \"2021-04-01\")\n\treq.Raw().URL.RawQuery = reqQP.Encode()\n\treq.Raw().Header[\"Accept\"] = []string{\"application/json\"}\n\treturn req, nil\n}", "title": "" }, { "docid": "950250ab2b74b4e371a8e1e8d2f185b4", "score": "0.46220902", "text": "func (client DateClient) GetUnderflowDateSender(req *http.Request) (*http.Response, error) {\n\treturn client.Send(req, autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n}", "title": "" }, { "docid": "6adb6be51dbd15e927a15cd06e620403", "score": "0.4621868", "text": "func (*GetFacilityRequestStatusFullRequest) Descriptor() ([]byte, []int) {\n\treturn file_hts_facility_service_proto_rawDescGZIP(), []int{15}\n}", "title": "" }, { "docid": "6e14eb44445556fb0d9d74ada377df4b", "score": "0.4617689", "text": "func (v *SimpleService_TransHeadersType_Args) GetReq() (o *TransHeaderType) {\n\tif v != nil {\n\t\to = v.Req\n\t}\n\treturn\n}", "title": "" }, { "docid": "533fcb97408c11b820277cd9db257331", "score": "0.46139625", "text": "func (r ApiCompanyEarningsQualityScoreRequest) Freq(freq string) ApiCompanyEarningsQualityScoreRequest {\n\tr.freq = &freq\n\treturn r\n}", "title": "" }, { "docid": "52fcb0b2e1b967835f3028d54fe12401", "score": "0.4609127", "text": "func (this *Service) ReqDcrmAddr(raw string,model string) map[string]interface{} { //函数名首字母必须大写\n fmt.Println(\"==========dcrm_reqDcrmAddr,raw = %s,model = %s ===========\",raw,model)\n\n data := make(map[string]interface{})\n if raw == \"\" || model == \"\" || (model != \"0\" && model != \"1\") {\n\tdata[\"result\"] = \"\"\n\treturn map[string]interface{}{\n\t\t\"Status\": \"Error\",\n\t\t\"Tip\": \"parameter error\",\n\t\t\"Error\": \"parameter error\",\n\t\t\"Data\": data,\n\t}\n }\n\n ret,tip,err := dcrm.ReqDcrmAddr(raw,model)\n fmt.Println(\"===========dcrm_reqDcrmAddr,ret = %s,tip =%s,err =%v===========\",ret,tip,err)\n if err != nil {\n\tdata[\"result\"] = \"\"\n\treturn map[string]interface{}{\n\t\t\"Status\": \"Error\",\n\t\t\"Tip\": tip,\n\t\t\"Error\": err.Error(),\n\t\t\"Data\": data,\n\t}\n }\n\n data[\"result\"] = ret\n return map[string]interface{}{\n\t \"Status\": \"Success\",\n\t \"Tip\": \"\",\n\t \"Error\": \"\",\n\t \"Data\": data,\n }\n}", "title": "" }, { "docid": "fee8c5c46dc3a2759ba9963a44cefe68", "score": "0.46058527", "text": "func (*ApproveFacilityRequestRequest) Descriptor() ([]byte, []int) {\n\treturn file_hts_facility_service_proto_rawDescGZIP(), []int{11}\n}", "title": "" }, { "docid": "46f60cec84121413751849b7013ccfd0", "score": "0.4602016", "text": "func (v *SimpleService_TransHeaders_Args) GetReq() (o *base.TransHeaders) {\n\tif v != nil {\n\t\to = v.Req\n\t}\n\treturn\n}", "title": "" }, { "docid": "4bf36ccb14a8f4b9bbc6f92537fd4b71", "score": "0.45991015", "text": "func (f TradeRequestTypeField) Tag() quickfix.Tag { return tag.TradeRequestType }", "title": "" }, { "docid": "31c0b5a1e80411b6fccd56c97ed46930", "score": "0.45956504", "text": "func (f MultiLegRptTypeReqField) Tag() quickfix.Tag { return tag.MultiLegRptTypeReq }", "title": "" }, { "docid": "242758f7d21f84d3cd2f7e647f63621a", "score": "0.45954958", "text": "func (s *AppleReq) AsFruitReq() FruitReq {\n return FruitReq{ FruitReqInterface: s }\n}", "title": "" } ]
d8c7fd85d9fb0736337485f06e3b9ed9
String implements the fmt.Stringer interface
[ { "docid": "9a9bfc6ba2b191dd51f08db5d98f6090", "score": "0.0", "text": "func (ps *ParallelStepDisplay) String() string {\n\treturn ps.inner.String()\n}", "title": "" } ]
[ { "docid": "516607e693a42d9bc37fec8bbe11e492", "score": "0.732374", "text": "func (f Format) String() string {\n\ts, ok := formatToString[f]\n\tif !ok {\n\t\treturn strconv.Itoa(int(f))\n\t}\n\treturn s\n}", "title": "" }, { "docid": "fed661f8c2e0c3cfe0067984ae992026", "score": "0.73202115", "text": "func (x Format) String() string {\n\treturn string(x)\n}", "title": "" }, { "docid": "266d9e8ce230eab55ab3c48fe4d7ab83", "score": "0.73119104", "text": "func (format Format) String() string {\n\treturn ast.Format(format).String()\n}", "title": "" }, { "docid": "42e3af4863ce23a8e542c15069f06dd5", "score": "0.72914225", "text": "func String(s string) fmt.Stringer {\n\treturn str(s)\n}", "title": "" }, { "docid": "2da1fbc12a040214254cba180e1c7b8a", "score": "0.7256933", "text": "func (p Format) String() string {\n\treturn string(p)\n}", "title": "" }, { "docid": "2ec4ab0dc7456493b4c901165b22d8fc", "score": "0.7255796", "text": "func String() string {\n\treturn fmt.Sprintf(\"k8sec version: %s, commit: %s, build at: %s\", version, commit, date)\n}", "title": "" }, { "docid": "5f47df6f7bc985748793e3c6c02b3d5b", "score": "0.72401065", "text": "func (o PrintFormat) String() string {\n\treturn string(o)\n}", "title": "" }, { "docid": "db25b84b87f569b93b0843f28924c1fc", "score": "0.71834874", "text": "func (q qer) String() string {\n\tb := strings.Builder{}\n\tfmt.Fprintf(&b, \"\\n\")\n\tfmt.Fprintf(&b, \"qerID: %v\\n\", q.qerID)\n\tfmt.Fprintf(&b, \"fseID: %x\\n\", q.fseID)\n\tfmt.Fprintf(&b, \"qfi: %v\\n\", q.qfi)\n\tfmt.Fprintf(&b, \"fseIDIP: %v\\n\", int2ip(q.fseidIP))\n\tfmt.Fprintf(&b, \"uplinkStatus: %v\\n\", q.ulStatus)\n\tfmt.Fprintf(&b, \"downlinkStatus: %v\\n\", q.dlStatus)\n\tfmt.Fprintf(&b, \"uplinkMBR: %v\\n\", q.ulMbr)\n\tfmt.Fprintf(&b, \"downlinkMBR: %v\\n\", q.dlMbr)\n\tfmt.Fprintf(&b, \"uplinkGBR: %v\\n\", q.ulGbr)\n\tfmt.Fprintf(&b, \"downlinkGBR: %v\\n\", q.dlGbr)\n\n\treturn b.String()\n}", "title": "" }, { "docid": "6e7337844dd7986b9766b047e4db1963", "score": "0.7166159", "text": "func (pt *Prayer) String() string {\n\treturn fmt.Sprintf(\"%s: %s\", pt.Name, pt.Time.Format(\"15:04 02.01.2006\"))\n}", "title": "" }, { "docid": "31ded1878197a1fc4f71e832b825a804", "score": "0.71034586", "text": "func (f format) String() string {\n\treturn formatMap[f]\n}", "title": "" }, { "docid": "c10dd06a220756971005ade8fcaea966", "score": "0.70889837", "text": "func (info Info) String() string {\n\treturn fmt.Sprintf(\"%s-%s\", info.GitVersion, info.GitCommit)\n}", "title": "" }, { "docid": "93f624eaa82a9f6afcc20f13342ccee8", "score": "0.70734894", "text": "func (s RedactRoomMessageOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "df099bbbf01f5e9f1c44906a7bf3a156", "score": "0.7031996", "text": "func (s Stats) String() string {\n\tbits, _ := json.MarshalIndent(&s, \"\", \" \")\n\treturn fmt.Sprintf(\"%s\", string(bits))\n}", "title": "" }, { "docid": "885ab5269a4ecd6e81d1d61375c30a8e", "score": "0.70213467", "text": "func (a Resource) String() string {\n\treturn fmt.Sprintf(\"%s %s/%s\", a.GroupVersion, a.Kind, a.Name)\n}", "title": "" }, { "docid": "4fa60a96af8af8f04ce8372a3c4b3c9f", "score": "0.7010764", "text": "func (s Person) String() string {\n\treturn fmt.Sprintf(\"%#v\", s)\n}", "title": "" }, { "docid": "60ad9cecdc8bcd58759c99ea02cb035f", "score": "0.7002142", "text": "func (n Name) String() string {\n\treturn fmt.Sprintf(\"%-10s %-2s %-12s\", n.last, n.middle, n.first)\n}", "title": "" }, { "docid": "bb622dd7f5144cb5c485d754f50ebad0", "score": "0.69939256", "text": "func (s MyString) String() string {\n\treturn fmt.Sprintf(\"%q\\n\", string(s)) // Needs to convert s from the receiver as a string or will be recursive\n}", "title": "" }, { "docid": "2682802879602ba29adfb3f5abfb17e2", "score": "0.69834733", "text": "func (format Format) String() string {\n\tswitch format {\n\tcase FormatText:\n\t\treturn \"text\"\n\tcase FormatHTML:\n\t\treturn \"HTML\"\n\tcase FormatCSS:\n\t\treturn \"CSS\"\n\tcase FormatJS:\n\t\treturn \"JavaScript\"\n\tcase FormatJSON:\n\t\treturn \"JSON\"\n\tcase FormatMarkdown:\n\t\treturn \"Markdown\"\n\t}\n\tpanic(\"invalid format\")\n}", "title": "" }, { "docid": "04de487ad099bd11ab528c87e31d0c16", "score": "0.69829744", "text": "func String(v interface{}) string { return fmt.Sprintf(\"%v\", v) }", "title": "" }, { "docid": "3c75a796164d1aa83e61f8866e27a9a6", "score": "0.6981023", "text": "func (t *person) String() string {\n\treturn fmt.Sprintf(\"%v/%v/%v\", t.age, t.surname, t.name)\n}", "title": "" }, { "docid": "957b24d6bb55fd0cb47dd04e3dc96a5e", "score": "0.6975156", "text": "func (p Person) String() string {\n\treturn fmt.Sprintf(\" Person -> name: %v, age: %v \\n\", p.name, p.age)\n}", "title": "" }, { "docid": "8cc1b44af15923e53929d1d854ee6b97", "score": "0.6970401", "text": "func (s *Sample) string() string {\n\tss := []string{}\n\tvar sv string\n\tfor _, v := range s.Value {\n\t\tsv = fmt.Sprintf(\"%s %10d\", sv, v)\n\t}\n\tsv = sv + \": \"\n\tfor _, l := range s.Location {\n\t\tsv = sv + fmt.Sprintf(\"%d \", l.ID)\n\t}\n\tss = append(ss, sv)\n\tconst labelHeader = \" \"\n\tif len(s.Label) > 0 {\n\t\tss = append(ss, labelHeader+labelsToString(s.Label))\n\t}\n\tif len(s.NumLabel) > 0 {\n\t\tss = append(ss, labelHeader+numLabelsToString(s.NumLabel, s.NumUnit))\n\t}\n\treturn strings.Join(ss, \"\\n\")\n}", "title": "" }, { "docid": "433fa3e31d96d3ba6769cea41c781100", "score": "0.69685143", "text": "func (book Book) String() string {\r\n\treturn fmt.Sprintf(\"<<%T Isbn:%s Name:%s Author:%s Publisher:%s >>\", book, book.ISBN, book.Name, book.Author, book.Publisher)\r\n}", "title": "" }, { "docid": "daeda53d3394136b0b0686a9671382ae", "score": "0.69629633", "text": "func String(s string) string {\n\treturn fmt.Sprintf(\"%o\", ValueOf(s))\n}", "title": "" }, { "docid": "0f38203b29f334acc30ff0cba6f34ab3", "score": "0.6936281", "text": "func (v info) String() string {\n\treturn fmt.Sprintf(\"%#v\", v)\n}", "title": "" }, { "docid": "2e63412d5e501e681a6ea2fa9defe3fb", "score": "0.6930156", "text": "func (s Info) String() string {\n\tif log.GetLevel() >= log.TraceLevel {\n\t\treturn fmt.Sprintf(\"%v (%v): %v\\n%v\", s.Name, s.DeviceID, s.Type, string(s.Raw))\n\t}\n\treturn fmt.Sprintf(\"%v (%v): %v\", s.Name, s.DeviceID, s.Type)\n}", "title": "" }, { "docid": "491c8db81ccb62b652d47638039f9485", "score": "0.69135845", "text": "func (s step) String() string {\n\treturn fmt.Sprintf(\"Component: %s, Release: %s, Namespace: %s\", s.component.Name, s.component.GetReleaseName(), s.component.Namespace)\n}", "title": "" }, { "docid": "f7d5cca172a3432f28ba44fbfeae9fc6", "score": "0.6908711", "text": "func (p *Person) String() string {\n\treturn fmt.Sprintf(\"Person ID: %d, Name: %s %s\", p.ID, p.FirstName, p.LastName)\n}", "title": "" }, { "docid": "6f97479d956fbf7445e1aabe90358ece", "score": "0.69082224", "text": "func (t *Trace) String() string {\n\treturn fmt.Sprintf(\"Keys: %#v, Options: %#v, Digests: %q\", t.keys, t.options, t.Digests)\n}", "title": "" }, { "docid": "a88607639a5cf740c3c6177f71e2d5f8", "score": "0.690525", "text": "func (r Record) String() string {\n\treturn fmt.Sprintf(\"context:%s, duration:%v, spans:%v, meta:%v\", r.Context, r.Duration, r.Spans, r.Meta)\n}", "title": "" }, { "docid": "46f258de3d336087904be73fe27216f6", "score": "0.6902926", "text": "func (r *Entry) String() string {\n\treturn fmt.Sprintf(\"%s-%s: %v\", r.Start, r.End, r.Data)\n}", "title": "" }, { "docid": "9715348d318a963dca553c21fe6e33b7", "score": "0.68998647", "text": "func (b Bounds) String() string {\n\treturn fmt.Sprintf(\"start: %v, duration: %v, stepSize: %v, steps: %d\",\n\t\tb.Start, b.Duration, b.StepSize, b.Steps())\n}", "title": "" }, { "docid": "91946acb856aaaa39c483ebc4a7ebb04", "score": "0.6893174", "text": "func (instr *RegisterRegister) String() string {\n\treturn fmt.Sprintf(\"%s %v, %v\", mnemonicColor.Sprint(instr.Mnemonic), instr.Destination.StringWithUser(instr.UsedBy1), instr.Source.StringWithUser(instr.UsedBy2))\n}", "title": "" }, { "docid": "ce1388099cd69255c74ab20a5b00778b", "score": "0.68851614", "text": "func (p Person) String() string {\n\treturn fmt.Sprintf(\"%s: %d\", p.Name, p.Age)\n}", "title": "" }, { "docid": "fbc96180d75d2c9beebafa71cd739235", "score": "0.688396", "text": "func (f *Format) String() string {\n\treturn fmt.Sprintf(\"format{prefix:%s}\", f.Prefix)\n}", "title": "" }, { "docid": "695981d9d864cc551543fc4b2fc90cfa", "score": "0.6878496", "text": "func (a Amount) String() string {\n\treturn fmt.Sprintf(\"%v %v %v %v %v %v\", a.name, a.sum, a.start, a.end, a.category, a.recurrency)\n}", "title": "" }, { "docid": "cd201c7df0c686bf45793679f1c0379c", "score": "0.6866936", "text": "func (p *Person) String() string {\n\treturn fmt.Sprintf(\"id:%d age:%d sex:%c\", p.ID(), p.Age(), p.Sex())\n}", "title": "" }, { "docid": "0db46e4d413d7ef3e68390fe7046ed48", "score": "0.6865087", "text": "func (s RedactChannelMessageOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "4fabe34dbf5cbbaf3562578e2c50fe5f", "score": "0.68614006", "text": "func (b bottleNumber) String() string {\n\treturn fmt.Sprintf(\"%s %s\",\n\t\tb.quantity(),\n\t\tb.container())\n}", "title": "" }, { "docid": "dfd02bd98fa52e18ef8f1471d0055b96", "score": "0.68573093", "text": "func (r *Result) string() string {\n\treturn fmt.Sprintf(\"Result{%v, %v}\", r.Offset, r.Error)\n}", "title": "" }, { "docid": "749efc787742a8af2fac386f9aee1b06", "score": "0.6856738", "text": "func (r NServices) String() string {\n\tls := new(common.LogString)\n\tls.AddS(\"NServices\\n\")\n\tfor _, s := range r {\n\t\tls.AddF(\"%s\\n\", s)\n\t}\n\treturn ls.Box(80)\n}", "title": "" }, { "docid": "ab9280208b86f613873cf5b4d6c93140", "score": "0.68499905", "text": "func (s AccountNotRegisteredException) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2df2a6caf606d05fc636e982ef82bc7c", "score": "0.68496984", "text": "func (gl *GitLabChecker) String() string {\n\treturn fmt.Sprintf(\"GitLabChecker{%q,%s,%q}\", gl.token, gl.ref, gl.eventsString)\n}", "title": "" }, { "docid": "b2f6d3220ca0561c214b56b62991549f", "score": "0.6848737", "text": "func (s Standard) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ca36e19d6f04a4b25afb7dfd92f8c6ab", "score": "0.6842853", "text": "func (c *Components) String() string {\n\treturn fmt.Sprintf(\"{Tag: %#x, Length: %d, Component: %v}\",\n\t\tc.Tag,\n\t\tc.Length,\n\t\tc.Component,\n\t)\n}", "title": "" }, { "docid": "fb049264ec2bbd41a7a18add20efd1ec", "score": "0.68379503", "text": "func (s *sequence) String() string {\n\treturn fmt.Sprintf(\"sequence:{leader:%d,seq:%d}\", s.leader, s.seq)\n}", "title": "" }, { "docid": "77cc6cb043b44c3a287a2758fdc9478a", "score": "0.683434", "text": "func (h *Header) String() string {\n\treturn fmt.Sprintf(\"{Type: %d, Payload: %x}\",\n\t\th.Type,\n\t\th.Payload,\n\t)\n}", "title": "" }, { "docid": "318ae24c7b946533a0e2a1f9b7c27dc0", "score": "0.6833613", "text": "func (s State) String() string {\n\treturn fmt.Sprintf(\"%s: %s\", s.Status.String(), s.Message)\n}", "title": "" }, { "docid": "b2964416672170c75a07858341a20e18", "score": "0.682795", "text": "func Stringer(v interface{}) string {\n\tswitch c := v.(type) {\n\tcase string:\n\t\treturn c\n\tcase *string:\n\t\treturn *c\n\tcase fmt.Stringer:\n\t\treturn c.String()\n\tdefault:\n\t\treturn fmt.Sprintf(\"%v\", v)\n\t}\n}", "title": "" }, { "docid": "d2946ae758ad5375ff59126ca99abcb1", "score": "0.682795", "text": "func (id ID) String() string {\n\tvar b [8]byte\n\tid.FormatTo(b[:], 'v')\n\treturn string(b[:])\n}", "title": "" }, { "docid": "dcc9e85791ae2e91a10598f3c40a4a0c", "score": "0.68274385", "text": "func (s Saiyan) String() string {\n\treturn fmt.Sprintf(\"%s %s\", s.Name, s.Friends)\n}", "title": "" }, { "docid": "66f127033e1152027896b2054de44253", "score": "0.6816984", "text": "func (v *Version) String() string {\n\treturn fmt.Sprintf(\"%d.%d.%d%s%s\",\n\t\tv.Major,\n\t\tv.Minor,\n\t\tv.Patch,\n\t\tv.strPreRelease(),\n\t\tv.strMetadata(),\n\t)\n}", "title": "" }, { "docid": "2be0116391c6f131393fad0a4b63f6f4", "score": "0.6816656", "text": "func (i *Info) String() string {\n\tb := strings.Builder{}\n\tw := tabwriter.NewWriter(&b, 0, 0, 2, ' ', 0)\n\n\tfmt.Fprintf(w, \"GitVersion:\\t%s\\n\", i.Version)\n\tfmt.Fprintf(w, \"GitCommit:\\t%s\\n\", i.GitCommit)\n\tfmt.Fprintf(w, \"BuildDate:\\t%s\\n\", i.BuildDate)\n\tfmt.Fprintf(w, \"GoVersion:\\t%s\\n\", i.GoVersion)\n\tfmt.Fprintf(w, \"Compiler:\\t%s\\n\", i.Compiler)\n\tfmt.Fprintf(w, \"Platform:\\t%s\\n\", i.Platform)\n\tfmt.Fprintf(w, \"License:\\t%s\\n\", i.License)\n\n\tw.Flush()\n\treturn b.String()\n}", "title": "" }, { "docid": "caf829be4f34fc8e4c953d4dd5b82750", "score": "0.6813092", "text": "func (a ResourceObject) String() string {\n\treturn fmt.Sprintf(\"%s %s/%s/%s\", a.GroupVersion, a.Resource, a.Namespace, a.Name)\n}", "title": "" }, { "docid": "3b92070694fec22cbee0d6d6b8bb431c", "score": "0.680816", "text": "func (i DebugInfo) String() string {\n\treturn fmt.Sprintf(\"file=%s func=%s line=%d\", i.Source, i.Name, i.CurrentLine)\n}", "title": "" }, { "docid": "590864ab075a17655518dedaa6108991", "score": "0.680613", "text": "func (c Constituent) String() string {\n\treturn fmt.Sprintf(\"%s/%g/%g\", c.Name, c.Amplitude, c.Lag)\n}", "title": "" }, { "docid": "0b82d4c4c70937c86bb666403d7124d9", "score": "0.68052745", "text": "func (s NiftyDeregisterRoutersFromSecurityGroupOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "784c5583861c8f23d32d944a9f4f50a7", "score": "0.68031263", "text": "func (s NiftyRegisterRoutersWithSecurityGroupOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e2ac7d9d92bc54915b25ee0305f6cfbe", "score": "0.6800135", "text": "func (s PublishLayerVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e2ac7d9d92bc54915b25ee0305f6cfbe", "score": "0.6800135", "text": "func (s PublishLayerVersionOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b63c6ca81e1e4463ea95cbbc8faadfb8", "score": "0.6798459", "text": "func (p Person) String() string {\n\treturn fmt.Sprintf(\"%v: %v\", p.Name, p.Age)\n}", "title": "" }, { "docid": "0ef196312055a01b552a1f28f71f2a4d", "score": "0.6791527", "text": "func (a SID) String() string {\n\treturn fmt.Sprintf(\"SID Identifier[%s] Name[%s] Domain[%s] Type[%s]\",\n\t\ta.Identifier, a.Name, a.Domain, a.Type)\n}", "title": "" }, { "docid": "1a9ba0d7f440d25f07382d36a476da12", "score": "0.67847204", "text": "func (n *Notify) String() string {\n\treturn fmt.Sprintf(\"{Header: %s, Status: %s, AspIdentifier: %s, RoutingContext: %s, InfoString: %s}\",\n\t\tn.Header.String(),\n\t\tn.Status.String(),\n\t\tn.AspIdentifier.String(),\n\t\tn.RoutingContext.String(),\n\t\tn.InfoString.String(),\n\t)\n}", "title": "" }, { "docid": "d1952d75279d1eb8bb9ed10bdb16de40", "score": "0.6783506", "text": "func (s ResetResourceLogLevelOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c44ad4688cb8d12f774276b2a45d669c", "score": "0.678255", "text": "func (workerGroup WorkerGroup) String() string {\n stringResult := \"{ \"\n stringResult += \"PlayerIndex: \"\n playerIndex := workerGroup.PlayerIndex\n stringResult += fmt.Sprint(playerIndex)\n stringResult += \", \"\n stringResult += \"Number: \"\n number := workerGroup.Number\n stringResult += fmt.Sprint(number)\n stringResult += \" }\"\n return stringResult\n}", "title": "" }, { "docid": "583c94a65c0e473440debd8e0d223c8b", "score": "0.6776552", "text": "func (loc Location) String() string {\n\treturn fmt.Sprintf(\"Location: Lat:%0.2f Lon:%0.2f\", loc.latitude, loc.longitude)\n}", "title": "" }, { "docid": "5a3fe0d6c821157a6049ade8b9c4b35f", "score": "0.6767902", "text": "func (d Dev) String() string {\n\tswitch d {\n\tcase QUEUE:\n\t\treturn \"QUEUE\"\n\tcase FORWARDER:\n\t\treturn \"FORWARDER\"\n\tcase STREAMER:\n\t\treturn \"STREAMER\"\n\t}\n\treturn \"<INVALID>\"\n}", "title": "" }, { "docid": "0f857ef87cc75179de7f90bb6316a6d6", "score": "0.6765537", "text": "func (a Align) String() string {\n\tswitch a {\n\tcase AlignLeft:\n\t\treturn \"Left\"\n\tcase AlignRight:\n\t\treturn \"Right\"\n\tcase AlignCenter:\n\t\treturn \"Center\"\n\t}\n\treturn fmt.Sprintf(\"Align(%d)\", a)\n}", "title": "" }, { "docid": "d33ef7a74f7b67fd36a2b760c211a774", "score": "0.6763912", "text": "func (s NiftyDeregisterRoutersFromSecurityGroupOutput) String() string {\n\treturn nifcloudutil.Prettify(s)\n}", "title": "" }, { "docid": "82ff153c00b7de68d012d56be7ae3183", "score": "0.6756017", "text": "func (t *Trace) String() string {\n\treturn fmt.Sprintf(\"addr=%v, reqHeaders=%v, respHeaders=%v\", t.Addr, t.ReqHeaders, t.RespHeaders)\n}", "title": "" }, { "docid": "7982a59f13d265e6fc79cda680d4a859", "score": "0.6755929", "text": "func (d *Data) String() string {\n\treturn fmt.Sprintf(\"{Header: %s, NetworkAppearance: %s, RoutingContext: %s, ProtocolData %s, CorrelationID: %s}\",\n\t\td.Header.String(),\n\t\td.NetworkAppearance.String(),\n\t\td.RoutingContext.String(),\n\t\td.ProtocolData.String(),\n\t\td.CorrelationID.String(),\n\t)\n}", "title": "" }, { "docid": "77115aac96a12039f18a3235d1f085b7", "score": "0.67546135", "text": "func (id PipelineRunId) String() string {\n\tcomponents := []string{\n\t\tfmt.Sprintf(\"Subscription: %q\", id.SubscriptionId),\n\t\tfmt.Sprintf(\"Resource Group Name: %q\", id.ResourceGroupName),\n\t\tfmt.Sprintf(\"Registry Name: %q\", id.RegistryName),\n\t\tfmt.Sprintf(\"Pipeline Run Name: %q\", id.PipelineRunName),\n\t}\n\treturn fmt.Sprintf(\"Pipeline Run (%s)\", strings.Join(components, \"\\n\"))\n}", "title": "" }, { "docid": "da66578461b888b04dfc0548bee55800", "score": "0.6750267", "text": "func (s Status) String() string {\n\tswitch s {\n\tcase StatusNew:\n\t\treturn \"I kön\"\n\tcase StatusCompiling:\n\t\treturn \"Kompilerar\"\n\tcase StatusCompilationFailed:\n\t\treturn \"Kompileringsfel\"\n\tcase StatusRunning:\n\t\treturn \"Kör\"\n\tcase StatusSuccessful:\n\t\treturn \"Färdig\"\n\t}\n\tpanic(fmt.Errorf(\"unknown status: %v\", s))\n}", "title": "" }, { "docid": "9c75c954d29301e7127c816855775d95", "score": "0.67500556", "text": "func (s SigningImageFormat) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2b81f500b263d235f3e8b92ceff0453b", "score": "0.67439914", "text": "func (id VirtualNetworkPeeringId) String() string {\n\tcomponents := []string{\n\t\tfmt.Sprintf(\"Subscription: %q\", id.SubscriptionId),\n\t\tfmt.Sprintf(\"Resource Group Name: %q\", id.ResourceGroupName),\n\t\tfmt.Sprintf(\"Workspace Name: %q\", id.WorkspaceName),\n\t\tfmt.Sprintf(\"Virtual Network Peering Name: %q\", id.VirtualNetworkPeeringName),\n\t}\n\treturn fmt.Sprintf(\"Virtual Network Peering (%s)\", strings.Join(components, \"\\n\"))\n}", "title": "" }, { "docid": "f3cce4696734084a2c1628d1b6aeeaad", "score": "0.6741073", "text": "func (s AccountRegisteredException) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a7031b6abe7af9303c2b3e5f9bb7a1c1", "score": "0.67410606", "text": "func (s NiftyDeleteRouterOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a045a0d91e29711ee995269805cd98e4", "score": "0.67405975", "text": "func (s NiftyCreateRouterOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b273e440247fd30552265c3fed3584a6", "score": "0.6740023", "text": "func (s SRet) String() string {\n\t// 'sret' '(' Typ=Type ')'\n\treturn fmt.Sprintf(\"sret(%s)\", s.Typ)\n}", "title": "" }, { "docid": "2ba69b0b6c7b79f774f37f28c99d8b51", "score": "0.673856", "text": "func (s Study) String() string {\n\treturn fmt.Sprintf(\"study(name=%s, params=%s, objective=%s)\", s.Name, s.Params, s.Objective)\n}", "title": "" }, { "docid": "56d93b3c90e601173c7a12cde72f70fe", "score": "0.67381537", "text": "func (info GlyphInfo) String() string {\n\treturn fmt.Sprintf(\"%d=%d(%d)\", info.Glyph, info.Cluster, info.Mask)\n}", "title": "" }, { "docid": "b1ab7200deceeb2f5dd65427566b37e0", "score": "0.6736698", "text": "func (s CreateTrailOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c686b40db163ff65c275a9766788c759", "score": "0.67363924", "text": "func (t *Transaction) String() string {\n\treturn fmt.Sprintf(`T{Date=%s Amount=%d Label=%v Sender=%v Receiver=%v Details=%v}`,\n\t\tt.Date.Format(DateFormat), t.Amount, t.Label, t.Sender, t.Receiver, t.Details)\n}", "title": "" }, { "docid": "ae7838a0f51e57ba4fe2913711da8015", "score": "0.6732782", "text": "func (s NetworkPathComponent) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "714acfb1b4f11ceaa2a51b617f161ce0", "score": "0.67273426", "text": "func (chunk Chunk) String() string {\n\treturn fmt.Sprintf(\"{ %d {%s}}\", chunk.StartAt, string(chunk.V))\n}", "title": "" }, { "docid": "effbf3effd8c70311836ab617542b10c", "score": "0.67272204", "text": "func (s DeleteRoomOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "effbf3effd8c70311836ab617542b10c", "score": "0.67272204", "text": "func (s DeleteRoomOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "acfb51e732fa330ab575cff904ca0fbb", "score": "0.67261624", "text": "func (e Earnings) String() string {\n\treturn fmt.Sprintf(`Earnings:\n Target Block Height: \t\t%d,\n Amount Locked:\t\t\t%s,\n Amount Yielded:\t\t\t%s`,\n\t\te.TargetBlockHeight, e.AmountLocked, e.AmountYielded,\n\t)\n}", "title": "" }, { "docid": "4aea705ab3cb55046130db61cab85cd9", "score": "0.67257327", "text": "func (s ResourceInfo) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6d5666bd171ba2fa4ac977fea3efad05", "score": "0.67255414", "text": "func (p *Player) String() string {\n\treturn fmt.Sprintf(\"Player:\\nid %d \\nbalance %g\", p.ID, p.Balance)\n}", "title": "" }, { "docid": "044e6d10d2c0146b82171bb7c943bea2", "score": "0.6721253", "text": "func (i *Info) String() string {\n\treturn fmt.Sprintf(\"%d Hz @ %d bits, %d channel(s), %d avg bytes/sec, duration: %s\", i.SampleRate, i.BitsPerSample, i.NumChannels, i.AvgBytesPerSec, i.Duration)\n}", "title": "" }, { "docid": "4eec593f7985faae9c10eb5b19a541b6", "score": "0.67207414", "text": "func String(i interface{}) string {\n\tv, _ := StringE(i)\n\treturn v\n}", "title": "" }, { "docid": "4289cc8455f8f6094a3a56497d8bc17e", "score": "0.67158216", "text": "func (s CreateRoomOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "4289cc8455f8f6094a3a56497d8bc17e", "score": "0.67158216", "text": "func (s CreateRoomOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "8d84f8fbeec9bc24b38c0133c2a003d8", "score": "0.6713563", "text": "func (s *Stats) String() string {\n\treturn fmt.Sprintf(\"Percentage: %.1f %s\\t | Weight: %.1f\", s.Percentage*100, \"%\", s.Weighting)\n}", "title": "" }, { "docid": "cca4bece3a45a8e5a2a341ef5de7cf38", "score": "0.6712248", "text": "func (s NiftyRebootRoutersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "e2d05cc4fd110cc08da310855c4b51b1", "score": "0.6711465", "text": "func (s Span) String() string {\n\tsourceName := \"\"\n\tif s.Source != nil {\n\t\tsourceName = s.Source.Name()\n\t}\n\n\treturn fmt.Sprintf(\"{ Source: %s, Line: %d, ColBeg: %d, ColEnd: %d }\",\n\t\tsourceName, s.Line, s.ColBeg, s.ColEnd)\n}", "title": "" }, { "docid": "c74bd43a79cd25809d86513af7bd2c65", "score": "0.67078626", "text": "func (l *logEntry) String() string {\n\tresult := l.time.Format(\"15:04:05\") + \" \" + kvstore.CommandNames[l.command]\n\tfor _, parameter := range l.parameters {\n\t\tresult += \" \" + base58.Encode(parameter)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "b4e4e82153615c8cbb39786d4523cf29", "score": "0.670738", "text": "func (s Resource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b4e4e82153615c8cbb39786d4523cf29", "score": "0.670738", "text": "func (s Resource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b4e4e82153615c8cbb39786d4523cf29", "score": "0.670738", "text": "func (s Resource) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
de69decdf97b82e5ee9769ab9277a323
Reason function returns reason value.
[ { "docid": "dc473b1a70ed5b6fecf38b75c2aceb21", "score": "0.0", "text": "func (e EmbedValidationError) Reason() string { return e.reason }", "title": "" } ]
[ { "docid": "9519ea659f9370f99686e209439978e4", "score": "0.7806314", "text": "func (m *FailureInfo) GetReason()(*string) {\n return m.reason\n}", "title": "" }, { "docid": "54118803768fe7ad447ca6caaa2fe074", "score": "0.77888066", "text": "func GetReason(msg string) *Reason {\n\treturn &Reason{\n\t\tReason: msg,\n\t}\n}", "title": "" }, { "docid": "0ad4afe6e37f55b2bfc01eb663074335", "score": "0.76632565", "text": "func reason(r string) string {\n\treturn reasonString + r\n}", "title": "" }, { "docid": "9d59cdecdb1127a83e184125f1758e49", "score": "0.7589503", "text": "func (o *Mute) GetReason() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Reason\n}", "title": "" }, { "docid": "fd932d6d9052c123f25d61e34ecceed9", "score": "0.7564048", "text": "func (cl Tangential) Reason() string {\n\treturn cl.reason\n}", "title": "" }, { "docid": "b2ff259f7223bb2300624b10b8b8b988", "score": "0.7515556", "text": "func (o EventTypeOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventType) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b2ff259f7223bb2300624b10b8b8b988", "score": "0.7514836", "text": "func (o EventTypeOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventType) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5ce829a13487fde033dfea4c5df700af", "score": "0.7511544", "text": "func (e WarnMessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f717dd91ef23be048987a2288622fdc5", "score": "0.7484756", "text": "func (bye byeData) getReason(ssrcCnt int) string {\n\toffset := ssrcCnt * 4\n\tif offset >= len(bye) {\n\t\treturn \"\"\n\t}\n\tlength := int(bye[offset])\n\toffset++\n\tif offset+length > len(bye) {\n\t\treturn \"\"\n\t}\n\treturn string(bye[offset : offset+length])\n}", "title": "" }, { "docid": "5befa75cbd2898518d89748c9fd08451", "score": "0.74702907", "text": "func (m *FailureInfo) GetReason()(*string) {\n val, err := m.GetBackingStore().Get(\"reason\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.(*string)\n }\n return nil\n}", "title": "" }, { "docid": "08da1b40f59dfe515d6d5611d2690b97", "score": "0.7433293", "text": "func (o FlowSchemaConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v FlowSchemaCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "645f770a195ded503bc7684e237f8b0c", "score": "0.7433122", "text": "func (e WarnResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "97b5a880557b04c54d27c6b8cf07c012", "score": "0.74179375", "text": "func (e WarningValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "fdd008cf6f4d8f75efd0e8e3af8bf8da", "score": "0.7406905", "text": "func (e OutfitValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "4f6b74adc7bb5eaaaffde8451eaea34d", "score": "0.740075", "text": "func (m *AlarmFilterMutation) Reason() (r string, exists bool) {\n\tv := m.reason\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "4051b56f0e502fa19666184c32142e37", "score": "0.73746735", "text": "func (m *RejectPostRequestBody) GetReason()(*iadcd81124412c61e647227ecfc4449d8bba17de0380ddda76f641a29edf2b242.RejectReason) {\n return m.reason\n}", "title": "" }, { "docid": "1d7da0df5723a9a571aa53281247beec", "score": "0.73564005", "text": "func (e UnWarnMessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f7412bdff0aafed91617db99b411a88a", "score": "0.7355803", "text": "func (cl Coast) Reason() string {\n\treturn cl.reason\n}", "title": "" }, { "docid": "500650c87192c0062e20a1b3b29ec579", "score": "0.73530483", "text": "func (e CiliumEventTypeValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "9b11c7e3377743eecf68ff08cd910d82", "score": "0.73462796", "text": "func Reason(v string) predicate.Warning {\n\treturn predicate.Warning(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldReason), v))\n\t})\n}", "title": "" }, { "docid": "4924fa100122afb12f30d5263b14744b", "score": "0.73452026", "text": "func (_this *DisplayEvent) Reason() *DisplayEventReason {\n\tvar ret *DisplayEventReason\n\tvalue := _this.Value_JS.Get(\"reason\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\t__tmp := DisplayEventReasonFromJS(value)\n\t\tret = &__tmp\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "baf4927e5d9537a6aca55ec1f0635340", "score": "0.73432285", "text": "func (o LienOutput) Reason() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Lien) pulumi.StringOutput { return v.Reason }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "98e90502e6fad1cadd829162d7730512", "score": "0.73363024", "text": "func (e WarnRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "0e8de34776b47e532d67fc1aa5809980", "score": "0.7330937", "text": "func (e BitStringValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c9e7e2baebb1f26603f3ca72adc3fffa", "score": "0.73263353", "text": "func (e *Error) Reason() error { return e.reason }", "title": "" }, { "docid": "75caa0c1af7e4f83f56b314c75dcc55c", "score": "0.7325795", "text": "func (e SoftwareExpensePercentValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "a5973036dfdb9f07a2e07e18306f3999", "score": "0.7322673", "text": "func (e BanMessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "1b196c087926cfa92905e3255cab1130", "score": "0.7317115", "text": "func (o *DepositDetail) GetReason() string {\n\tif o == nil || o.Reason == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Reason\n}", "title": "" }, { "docid": "434539cb855e1e7b9b633ae39724cfd8", "score": "0.73164994", "text": "func (o *Pullrequest) GetReason() string {\n\tif o == nil || o.Reason == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Reason\n}", "title": "" }, { "docid": "1cc059242a6d5463925156af9c0f00ef", "score": "0.7310379", "text": "func (e Large_MessageDValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c1743f624e5b33fe3d41cdf66de85d47", "score": "0.73055404", "text": "func (e UnBanMessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "1a160c0c3a84d89d80d99397de9d190c", "score": "0.7300894", "text": "func (e RsrpValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d0fe256302419882aa27aa123498425b", "score": "0.72927713", "text": "func (e GetWarnRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "cdd77e82db000495bd33688f726b9925", "score": "0.7288121", "text": "func (e ComplianceAlertResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b593d77b50bcacbcf8d4c3f571f392f9", "score": "0.7280212", "text": "func (e MessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b593d77b50bcacbcf8d4c3f571f392f9", "score": "0.7280212", "text": "func (e MessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b593d77b50bcacbcf8d4c3f571f392f9", "score": "0.7280212", "text": "func (e MessageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "aad3a24558794d5ab5fc3d68bdfa601e", "score": "0.7265987", "text": "func (e PolicyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "aad3a24558794d5ab5fc3d68bdfa601e", "score": "0.7265987", "text": "func (e PolicyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "3d998f65e35f9b3199f4cba5108caa5a", "score": "0.7259639", "text": "func (e ApplicationWebhookHealth_WebhookHealthStatusHealthyValidationError) Reason() string {\n\treturn e.reason\n}", "title": "" }, { "docid": "74fb8a6a02e895aee40d8429fa9291b8", "score": "0.7252345", "text": "func (e EutracgiValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f57b6563cfa1310a576c459339c67c33", "score": "0.7249454", "text": "func (e VaultValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "69a63f2219bee16dd2d29607f130f2b0", "score": "0.7246308", "text": "func (e ComplianceAlertRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "8ab256a08bc10a207071f1e9cfa8c2ab", "score": "0.7244861", "text": "func (o CertificateManagedProvisioningIssueOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CertificateManagedProvisioningIssue) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f0443aa2b5a1f84e00099f98c1ca4b72", "score": "0.7242937", "text": "func (e HandModelValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "acc6a3dd55683c1f74eb970d08e93421", "score": "0.72409654", "text": "func (e UnderusageByEditorDataValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "23c4c05b5b7a31451ab286841ddbeb6a", "score": "0.7239247", "text": "func (cl GenericCL) Reason() string {\n\treturn cl.reason\n}", "title": "" }, { "docid": "39a4dd83206b735d552396649e9b7899", "score": "0.72389776", "text": "func (c *StatusCondition) GetReason() string {\n\treturn c.Reason\n}", "title": "" }, { "docid": "d8d1868190ab0e44190a38e3d0f1f2dc", "score": "0.723702", "text": "func (p *Pubcomp) Reason() string {\n\tswitch p.ReasonCode {\n\tcase 0:\n\t\treturn \"Success - Packet Identifier released. Publication of QoS 2 message is complete.\"\n\tcase 146:\n\t\treturn \"Packet Identifier not found - The Packet Identifier is not known. This is not an error during recovery, but at other times indicates a mismatch between the Session State on the Client and Server.\"\n\t}\n\n\treturn \"\"\n}", "title": "" }, { "docid": "14f7986352bcdf45a2730c91bf090d6a", "score": "0.7226945", "text": "func (e DownResultValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "f1258359c8fc43404f521342de122b7f", "score": "0.7225926", "text": "func (e CommonRespValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "9a6bddbb54303e5951eeec0f154ec26a", "score": "0.7223395", "text": "func (e Large_MessageCValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "59add29e429f70b795fe9215389057e6", "score": "0.72216314", "text": "func (e DescriptionValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "032035d12d5bcc1b67fd902bcd3b0da4", "score": "0.7220483", "text": "func (o PodConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PodConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "dc7270a0b8c82e58faa18abc88c45f92", "score": "0.7219423", "text": "func (o PodConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PodCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "12c61c95993b9e06d7e717a5541828ed", "score": "0.721848", "text": "func (e ResourceRuleValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "12c61c95993b9e06d7e717a5541828ed", "score": "0.721848", "text": "func (e ResourceRuleValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "454d3b17fa03a8a53fbd485e8df606c3", "score": "0.7216686", "text": "func (e *Error) GetReason() (value string, ok bool) {\n\tok = e != nil && e.reason != nil\n\tif ok {\n\t\tvalue = *e.reason\n\t}\n\treturn\n}", "title": "" }, { "docid": "11351b8c5c5be9faa666838a8ace1165", "score": "0.72096264", "text": "func (e SolutionValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "2d24563dfbd60d2f1ed3fce8bfd7bbc7", "score": "0.72094965", "text": "func (e SecretValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "6fec278fc39b2291c2159149b89ad1d8", "score": "0.72048056", "text": "func (e Large_MessageFValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b5b38bc84ffe604a6ba665c9bb9bbd8e", "score": "0.72019243", "text": "func (e OpenTradeResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "104001f9eae83ad858cebceb16ca8747", "score": "0.72008085", "text": "func (o PersistentVolumeStatusOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PersistentVolumeStatus) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "bb6cc50096d8bd40a8faa2adc8eb0de4", "score": "0.71997106", "text": "func (o EventPatchTypeOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventPatchType) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "ef31ce6ea45c9bd5401307fdd0cdc5f6", "score": "0.71993536", "text": "func (e MessagePayloadDecoderValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "bb6cc50096d8bd40a8faa2adc8eb0de4", "score": "0.7197893", "text": "func (o EventPatchTypeOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v EventPatchType) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "621af148f77d06f1236ef39c259b7cfd", "score": "0.7196513", "text": "func (e CriticalValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "2afbafb85256288bb40a138f7b38cea1", "score": "0.7195816", "text": "func (e ResponseFlagsValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "88552f3af6fc4de2d856a274f9da8337", "score": "0.7192367", "text": "func (e CertficateValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "bd0db249e073fbc60492fd8c0e6ca5fb", "score": "0.71906096", "text": "func (e PayNotifyValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "9c5310b6c6c39a14e347728667e36c69", "score": "0.7187475", "text": "func (o PersistentVolumeStatusPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PersistentVolumeStatusPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "69d825dd736c3a37fb760d1a46c89d3d", "score": "0.7186926", "text": "func (e RequirementRuleValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "4890b6688e18a0a32cfdb65bd28a27ef", "score": "0.71854496", "text": "func (o *QuotaStatusResponseResult) Reason() string {\n\tvar r string\n\tif o.ReasonPtr == nil {\n\t\treturn r\n\t}\n\tr = *o.ReasonPtr\n\treturn r\n}", "title": "" }, { "docid": "780600540a8742396bb830c29889a4fa", "score": "0.71824837", "text": "func (e OpenTradeRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "644527fcfa0fe2784327a5a8d4c1a64d", "score": "0.717957", "text": "func (e RequirementValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "97accef50a73b758af8acc4aa6e94fa5", "score": "0.7179069", "text": "func (o CustomResourceDefinitionConditionPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CustomResourceDefinitionConditionPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d2ad84eb288a7f5153524848d0a177f4", "score": "0.71788406", "text": "func (e WatchResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "8a4fbcc5b11b939ceddaad656cee0f74", "score": "0.7178247", "text": "func (o *DepositCreate) GetReason() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Reason\n}", "title": "" }, { "docid": "da8ca2063dcdda15a3a8054016cd7af9", "score": "0.71728724", "text": "func (e FundsResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c01f1ae8c6ede379f4c4dae660bddc54", "score": "0.7172467", "text": "func (e ResourceTypeValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "fd6b702e3b96bd1b4169dffce795f201", "score": "0.7162097", "text": "func (o *Session) GetReason() string {\n\tif o == nil || o.Reason == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Reason\n}", "title": "" }, { "docid": "e6d9ba4b3c1421856fa0d8b5f3834c28", "score": "0.71615326", "text": "func (e UnWarnResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d50e1453f349bc81f9a0aa5cbfec7f78", "score": "0.71603346", "text": "func (o PodStatusOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PodStatus) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "65d0b265f40dfb7970a25957e2043ef6", "score": "0.71585476", "text": "func (o ResourceLockerStatusConditionsOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ResourceLockerStatusConditions) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6e0c7fcb61444c23e1e2c72a0be3f663", "score": "0.71565783", "text": "func (e CurrencyIdValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "87bb70f0edaf2ae3cc43c5e074d4d695", "score": "0.7153686", "text": "func (o ContainerStateWaitingOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ContainerStateWaiting) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0217324c90c66c42175c59f0d9d50564", "score": "0.71525365", "text": "func (o CompositionStatusConditionsOutput) Reason() pulumi.StringOutput {\n\treturn o.ApplyT(func(v CompositionStatusConditions) string { return v.Reason }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "bc327db81ee303723731b94c41f83909", "score": "0.714796", "text": "func (e *Error) Reason() string {\n\tif e != nil && e.reason != nil {\n\t\treturn *e.reason\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "4c73a4b3451e953abd62bd8e63f261a2", "score": "0.7147355", "text": "func (o CustomResourceDefinitionConditionOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CustomResourceDefinitionCondition) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "48e7f8700fddc68cf414563541e20b30", "score": "0.714723", "text": "func (e RuleValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "99e1e038c9974ba2276612d32563a6e0", "score": "0.7146931", "text": "func (e ConfigValValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b3ef47f5bec22587ea190896ecff48b4", "score": "0.7145295", "text": "func (e FundsRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "849f15502ba14c19ea5b00e9b66703c3", "score": "0.71445525", "text": "func (o PodStatusPatchOutput) Reason() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v PodStatusPatch) *string { return v.Reason }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "2caefbb981016e12f529cea0a5cdf32e", "score": "0.7143114", "text": "func (e Large_MessageEValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "75df732f9b4623bcbb03e05ef6a45fc7", "score": "0.7141755", "text": "func (e UnBanResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "aa81bda7afd1f579881782349a939c5f", "score": "0.714134", "text": "func (d *DeleteAccountRequest) GetReason() (value string) {\n\tif d == nil {\n\t\treturn\n\t}\n\treturn d.Reason\n}", "title": "" }, { "docid": "a7f9b7642921458ce1fe99e91430da3a", "score": "0.71400666", "text": "func (e SettlementRequestValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "5f07ceb5d6332c3e5442ee21b6abde9e", "score": "0.7138927", "text": "func (e LanguageValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "cf7ac7ac6ecb415563029c8bba3c121e", "score": "0.7135812", "text": "func (e SettlementResponseValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "809f3f5e0e2a232f14d404372d98ec12", "score": "0.7134647", "text": "func (e TradeInfoValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "23ed7eed60dbc38430434032fbcf1c77", "score": "0.71290606", "text": "func getReason(groups conditionGroups, options *mergeOptions) string {\n\treturn getFirstReason(groups, options.conditionTypes, options.addSourceRef)\n}", "title": "" } ]
770b3a0bb8c83721caf9799616892683
Initialize memory that will be converted into a BtCursor object. The simple approach here would be to memset() the entire object to zero. But it turns out that the apPage[] and aiIdx[] arrays do not need to be zeroed and they are large, so we can save a lot of runtime by skipping the initialization of those elements.
[ { "docid": "5381d58f76703301fbc26b85f8e7f214", "score": "0.55831194", "text": "func Xsqlite3BtreeCursorZero(tls *libc.TLS, p uintptr) {\n\tlibc.Xmemset(tls, p, 0, uint64(uintptr(0)+32))\n}", "title": "" } ]
[ { "docid": "a41b508d3a3d2c43e80062d5e2ef8c58", "score": "0.6095273", "text": "func _968sqlite3BtreeCursorZero(tls *crt.TLS, _p uintptr /* *TBtCursor */) {\n\tcrt.Xmemset(tls, _p, int32(0), uint32(64))\n}", "title": "" }, { "docid": "fdc03cc9958466b438a634bdeb2dd73f", "score": "0.5938791", "text": "func (p *manyIntIterator) Initialize(a *Bitmap) {\n\tp.pos = 0\n\tp.highlowcontainer = &a.highlowcontainer\n\tp.init()\n}", "title": "" }, { "docid": "405dd0c1def3d3e44f107ccc72f37b3c", "score": "0.5822037", "text": "func _939initMemArray(tls *crt.TLS, _p uintptr /* *TMem */, _N int32, _db uintptr /* *Tsqlite3 */, _flags Tu16) {\n_1:\n\tif postinc24(&_N) <= int32(0) {\n\t\tgoto _2\n\t}\n\n\t*(*uintptr)(unsafe.Pointer(_p + 32)) = _db\n\t*(*Tu16)(unsafe.Pointer(_p + 8)) = _flags\n\t*(*int32)(unsafe.Pointer(_p + 24)) = int32(0)\n\t_p += 40\n\tgoto _1\n\n_2:\n}", "title": "" }, { "docid": "1b8efc220476c83c5add7a3c10d5c7bb", "score": "0.57676995", "text": "func (p *intIterator) Initialize(a *Bitmap) {\n\tp.pos = 0\n\tp.highlowcontainer = &a.highlowcontainer\n\tp.init()\n}", "title": "" }, { "docid": "12e2e490cd2cc6b941779bdb48fa4e66", "score": "0.56317943", "text": "func (b *SymBuffer) Init(p *Prog) {\n\tb.data = nil\n\tb.reloc = nil\n\tb.order = p.byteorder\n\tb.ptrsize = p.ptrsize\n}", "title": "" }, { "docid": "ca5b36fd096534e33a1beb3f91957d4b", "score": "0.5599049", "text": "func init() {\n\tconst bits = 8\n\tfor i := range &pinnedData.buffers {\n\t\tpinnedData.buffers[i] = newBuffer(bits)\n\t}\n}", "title": "" }, { "docid": "2d000c41f976a4ccc5dad10d06fc5ce2", "score": "0.55322057", "text": "func (p *intReverseIterator) Initialize(a *Bitmap) {\n\tp.highlowcontainer = &a.highlowcontainer\n\tp.pos = a.highlowcontainer.size() - 1\n\tp.init()\n}", "title": "" }, { "docid": "685ebbcaf0ee0afdd2d0fbf183f67a13", "score": "0.52950794", "text": "func _681allocateCursor(tls *crt.TLS, _p uintptr /* *TVdbe */, _iCur int32, _nField int32, _iDb int32, _eCurType Tu8) (r uintptr) {\n\tvar (\n\t\t_pMem uintptr // *TMem\n\t\t_nByte int32\n\t\t_pCx uintptr // *TVdbeCursor\n\t)\n\t_pMem = func() uintptr {\n\t\tif _iCur > int32(0) {\n\t\t\treturn (*(*uintptr)(unsafe.Pointer(_p + 88))) + 40*uintptr((*(*int32)(unsafe.Pointer(_p + 24)))-_iCur)\n\t\t}\n\t\treturn *(*uintptr)(unsafe.Pointer(_p + 88))\n\t}()\n\t_pCx = 0\n\t_nByte = int32((uint32(88) + (uint32(8) * uint32(_nField))) + uint32(func() int32 {\n\t\tif int32(_eCurType) == int32(0) {\n\t\t\treturn _967sqlite3BtreeCursorSize(tls)\n\t\t}\n\t\treturn int32(0)\n\t}()))\n\n\tif (*(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_p + 108))) + 4*uintptr(_iCur)))) == 0 {\n\t\tgoto _1\n\t}\n\n\t_687sqlite3VdbeFreeCursor(tls, _p, *(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_p + 108))) + 4*uintptr(_iCur))))\n\t*(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_p + 108))) + 4*uintptr(_iCur))) = null\n_1:\n\tif int32(0) != _631sqlite3VdbeMemClearAndResize(tls, _pMem, _nByte) {\n\t\tgoto _2\n\t}\n\n\t*(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_p + 108))) + 4*uintptr(_iCur))) = set4(&_pCx, *(*uintptr)(unsafe.Pointer(_pMem + 16)))\n\tcrt.Xmemset(tls, _pCx, int32(0), uint32(32))\n\t*(*Tu8)(unsafe.Pointer(_pCx)) = _eCurType\n\t*(*Ti8)(unsafe.Pointer(_pCx + 1)) = Ti8(_iDb)\n\t*(*Ti16)(unsafe.Pointer(_pCx + 52)) = Ti16(_nField)\n\t*(*uintptr)(unsafe.Pointer(_pCx + 64)) = (_pCx + 80) + 4*uintptr(_nField)\n\tif int32(_eCurType) != int32(0) {\n\t\tgoto _3\n\t}\n\n\t*(*uintptr)(unsafe.Pointer(_pCx + 36)) = (*(*uintptr)(unsafe.Pointer(_pMem + 16))) + uintptr(uint32(88)+(uint32(8)*uint32(_nField)))\n\t_968sqlite3BtreeCursorZero(tls, *(*uintptr)(unsafe.Pointer(_pCx + 36)))\n_3:\n_2:\n\treturn _pCx\n}", "title": "" }, { "docid": "8d50e148cc27a0e75caebb4916d9fcd4", "score": "0.5273", "text": "func (it *PCIter) Init(p *Prog, buf []byte) {\n\tit.p = buf\n\tit.PC = 0\n\tit.NextPC = 0\n\tit.Value = -1\n\tit.start = true\n\tit.pcquantum = uint32(p.pcquantum)\n\tit.Done = false\n\tit.Next()\n}", "title": "" }, { "docid": "75a951f91491c57e04c62d714afc738d", "score": "0.5234585", "text": "func (a *Array) Init(capacity int) *Array {\n\tif capacity < 0 {\n\t\treturn nil\n\t}\n\ta.collection = make([]interface{}, capacity)\n\ta.size = 0\n\treturn a\n}", "title": "" }, { "docid": "293a2b4c0cb96034874e221bd1e6c37f", "score": "0.5224241", "text": "func (ba *BitArray) Init(size int) {\n\tba.size = size\n\tba.data = make([]uint64, (size/64)+1)\n}", "title": "" }, { "docid": "a01331ffe4b99cdf78996acc666c2671", "score": "0.5163457", "text": "func (mb *MemoryBlock) Init(b []byte) error {\n mb.Bytes = b\n\treturn nil\n}", "title": "" }, { "docid": "396fc567b7c100f0fb6537758778772d", "score": "0.51535153", "text": "func _865completionCursorReset(tls *crt.TLS, _pCur uintptr /* *Tcompletion_cursor */) {\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer(_pCur + 16)))\n\t*(*uintptr)(unsafe.Pointer(_pCur + 16)) = null\n\t*(*int32)(unsafe.Pointer(_pCur + 8)) = int32(0)\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer(_pCur + 20)))\n\t*(*uintptr)(unsafe.Pointer(_pCur + 20)) = null\n\t*(*int32)(unsafe.Pointer(_pCur + 12)) = int32(0)\n\tXsqlite3_finalize(tls, *(*uintptr)(unsafe.Pointer(_pCur + 28)))\n\t*(*uintptr)(unsafe.Pointer(_pCur + 28)) = null\n\t*(*int32)(unsafe.Pointer(_pCur + 44)) = int32(0)\n}", "title": "" }, { "docid": "3347e4f165230f058c16f1b5313ce67c", "score": "0.51449597", "text": "func (fo *FlexObj) Reset() {\n\tfo.indexPtr = 0\n}", "title": "" }, { "docid": "0ef40b6b20780eed4514a25dd0a49c54", "score": "0.513557", "text": "func (table ObjectCrossReferenceTable) Reset() {\n\ttableLen := len(table)\n\tfor i := 0; i < tableLen; i++ {\n\t\tentry := &table[i]\n\t\tentry.Reset()\n\t\tentry.NextInTile = int16(i + 1)\n\t}\n\tif tableLen > 0 {\n\t\ttable[tableLen-1].NextInTile = 0\n\t}\n}", "title": "" }, { "docid": "dde7ab8dc32f69e361f841306373e78c", "score": "0.5130689", "text": "func (ao *Array) Reset() {\n\tao.offset = 0\n}", "title": "" }, { "docid": "108ab787b0de993acf1840b54025ad21", "score": "0.5067538", "text": "func (la *LayoutAllocs) Reset() {\n\tla.Size = mat32.Vec2Zero\n\tla.Pos = mat32.Vec2Zero\n\tla.PosRel = mat32.Vec2Zero\n}", "title": "" }, { "docid": "1abca1df7a7662322cab0cab80581031", "score": "0.5057384", "text": "func (d *DataFromMem) Init() error {\n\n\td.Data = make(map[bson.ObjectId]*Person)\n\treturn nil\n}", "title": "" }, { "docid": "2b41269ba33ea6d570af33c4e2baf11b", "score": "0.50034285", "text": "func (a *Array) Reset() {\n\ta.doc.Reset()\n}", "title": "" }, { "docid": "f607b7b8a4a31151b35eab31b7379ba0", "score": "0.49985382", "text": "func _1000vdbePmaReaderClear(tls *crt.TLS, _pReadr uintptr /* *TPmaReader */) {\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer(_pReadr + 28)))\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer(_pReadr + 36)))\n\tif (*(*uintptr)(unsafe.Pointer(_pReadr + 44))) == 0 {\n\t\tgoto _1\n\t}\n\n\t_876sqlite3OsUnfetch(tls, *(*uintptr)(unsafe.Pointer(_pReadr + 24)), int64(0), *(*uintptr)(unsafe.Pointer(_pReadr + 44)))\n_1:\n\t_1222vdbeIncrFree(tls, *(*uintptr)(unsafe.Pointer(_pReadr + 48)))\n\tcrt.Xmemset(tls, _pReadr, int32(0), uint32(52))\n}", "title": "" }, { "docid": "4dc8a229bffbae5009301b16ddbb01bf", "score": "0.49792472", "text": "func (self *_Runtime) FullInit(alloc_with_pool bool, heap_buf []byte,\n max_thread_num uint) error {\n var heap_buf_C *C.uchar\n\n if (self.initialized) {\n return nil\n }\n\n if (alloc_with_pool) {\n if (heap_buf == nil) {\n return fmt.Errorf(\"Failed to init WAMR runtime\")\n }\n heap_buf_C = (*C.uchar)(unsafe.Pointer(&heap_buf[0]))\n }\n\n if (!C.init_wamr_runtime((C.bool)(alloc_with_pool), heap_buf_C,\n (C.uint)(len(heap_buf)),\n (C.uint)(max_thread_num))) {\n return fmt.Errorf(\"Failed to init WAMR runtime\")\n }\n\n self.initialized = true\n return nil\n}", "title": "" }, { "docid": "44fc4c3a8b766a39d43987ebeb6c1144", "score": "0.49558386", "text": "func (b *Bytes) memsetZero() {\n\tfor i := range b.data {\n\t\tb.data[i] = 0\n\t}\n}", "title": "" }, { "docid": "e3154fb60aaf57dd4e9c09a614edb34d", "score": "0.49506876", "text": "func (r *amlStreamReader) Init(dataAddr uintptr, dataLen, initialOffset uint32) {\n\t// Overlay a byte slice on top of the memory block to be accessed.\n\tr.data = *(*[]byte)(unsafe.Pointer(&reflect.SliceHeader{\n\t\tLen: int(dataLen),\n\t\tCap: int(dataLen),\n\t\tData: dataAddr,\n\t}))\n\n\tr.SetOffset(initialOffset)\n}", "title": "" }, { "docid": "ef817eed37a0caecaf45201f2d6275f9", "score": "0.49398252", "text": "func _564zeroPage(tls *crt.TLS, _pPage uintptr /* *TMemPage */, _flags int32) {\n\tvar (\n\t\t_data uintptr // *uint8\n\t\t_pBt uintptr // *TBtShared\n\t\t_hdr Tu8\n\t\t_first Tu16\n\t)\n\t_data = *(*uintptr)(unsafe.Pointer(_pPage + 56))\n\t_pBt = *(*uintptr)(unsafe.Pointer(_pPage + 52))\n\t_hdr = *(*Tu8)(unsafe.Pointer(_pPage + 9))\n\n\tif (int32(*(*Tu16)(unsafe.Pointer(_pBt + 22))) & int32(0xc)) == 0 {\n\t\tgoto _1\n\t}\n\n\tcrt.Xmemset(tls, _data+uintptr(_hdr), int32(0), (*(*Tu32)(unsafe.Pointer(_pBt + 36)))-Tu32(_hdr))\n_1:\n\t*(*uint8)(unsafe.Pointer(_data + uintptr(_hdr))) = uint8(int8(_flags))\n\t_first = Tu16(int32(_hdr) + func() int32 {\n\t\tif (_flags & int32(0x8)) == int32(0) {\n\t\t\treturn int32(12)\n\t\t}\n\t\treturn int32(8)\n\t}())\n\tcrt.Xmemset(tls, _data+uintptr(int32(_hdr)+int32(1)), int32(0), uint32(4))\n\t*(*uint8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(7)))) = uint8(0)\n\t*(*uint8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(5)))) = Tu8((*(*Tu32)(unsafe.Pointer(_pBt + 36))) >> (uint(8) % 32))\n\t*(*uint8)(unsafe.Pointer((_data + uintptr(int32(_hdr)+int32(5))) + 1)) = Tu8(*(*Tu32)(unsafe.Pointer(_pBt + 36)))\n\t*(*Tu16)(unsafe.Pointer(_pPage + 20)) = Tu16((*(*Tu32)(unsafe.Pointer(_pBt + 36))) - Tu32(_first))\n\t_887decodeFlags(tls, _pPage, _flags)\n\t*(*Tu16)(unsafe.Pointer(_pPage + 18)) = _first\n\t*(*uintptr)(unsafe.Pointer(_pPage + 60)) = _data + uintptr(*(*Tu32)(unsafe.Pointer(_pBt + 36)))\n\t*(*uintptr)(unsafe.Pointer(_pPage + 64)) = _data + uintptr(_first)\n\t*(*uintptr)(unsafe.Pointer(_pPage + 68)) = _data + uintptr(*(*Tu8)(unsafe.Pointer(_pPage + 10)))\n\t*(*Tu8)(unsafe.Pointer(_pPage + 12)) = Tu8(0)\n\n\t*(*Tu16)(unsafe.Pointer(_pPage + 24)) = Tu16((*(*Tu32)(unsafe.Pointer(_pBt + 32))) - Tu32(1))\n\t*(*Tu16)(unsafe.Pointer(_pPage + 22)) = Tu16(0)\n\t*(*Tu8)(unsafe.Pointer(_pPage)) = Tu8(1)\n}", "title": "" }, { "docid": "21da9fe22f16e8e98939a2e62a16dabb", "score": "0.491943", "text": "func _604btreeReleaseAllCursorPages(tls *crt.TLS, _pCur uintptr /* *TBtCursor */) {\n\tvar _i int32\n\n\tif int32(*(*Ti8)(unsafe.Pointer(_pCur + 64))) < int32(0) {\n\t\tgoto _1\n\t}\n\n\t_i = int32(0)\n_2:\n\tif _i >= int32(*(*Ti8)(unsafe.Pointer(_pCur + 64))) {\n\t\tgoto _4\n\t}\n\n\t_924releasePageNotNull(tls, *(*uintptr)(unsafe.Pointer((_pCur + 116) + 4*uintptr(_i))))\n\t_i++\n\tgoto _2\n\n_4:\n\t_924releasePageNotNull(tls, *(*uintptr)(unsafe.Pointer(_pCur + 112)))\n\t*(*Ti8)(unsafe.Pointer(_pCur + 64)) = Ti8(-1)\n_1:\n}", "title": "" }, { "docid": "7722930f09a485bd7801388eec035173", "score": "0.48737553", "text": "func (c *cursor) setBuf(block []byte) {\n\t// Clear if the block is empty.\n\tif len(block) == 0 {\n\t\tc.buf, c.off, c.fieldIndices, c.index = c.buf[0:0], 0, c.fieldIndices[0:0], 0\n\t\treturn\n\t}\n\n\t// Otherwise decode block into buffer.\n\t// Skip over the first 8 bytes since they are the max timestamp.\n\tbuf, err := snappy.Decode(nil, block[8:])\n\tif err != nil {\n\t\tc.buf = c.buf[0:0]\n\t\tfmt.Printf(\"block decode error: %s\\n\", err)\n\t}\n\n\tc.buf, c.off = buf, 0\n}", "title": "" }, { "docid": "051ae65e21efe56df9182e683f6850eb", "score": "0.4873078", "text": "func _516pageReinit(tls *crt.TLS, _pData uintptr /* *TDbPage */) {\n\tvar _pPage uintptr // *TMemPage\n\n\t_pPage = _336sqlite3PagerGetExtra(tls, _pData)\n\n\tif (*(*Tu8)(unsafe.Pointer(_pPage))) == 0 {\n\t\tgoto _1\n\t}\n\n\t*(*Tu8)(unsafe.Pointer(_pPage)) = Tu8(0)\n\tif _852sqlite3PagerPageRefcount(tls, _pData) <= int32(1) {\n\t\tgoto _2\n\t}\n\n\t_853btreeInitPage(tls, _pPage)\n_2:\n_1:\n}", "title": "" }, { "docid": "5ee644a7bff53104d4b2fb8621dd03a9", "score": "0.48471633", "text": "func (c *ArrayBase) Reset() {\n\tc.offsetColumn.Reset()\n\tc.dataColumn.Reset()\n\tc.offset = 0\n}", "title": "" }, { "docid": "f4b25be04bd775ab5f7c53d637ac6387", "score": "0.4825211", "text": "func (b *bitmap64) Reset() {\n\tfor i := range b.bitmap {\n\t\tb.bitmap[i] = 0\n\t}\n}", "title": "" }, { "docid": "11bfd629847edb1159de5e4d5ecf2de9", "score": "0.4821243", "text": "func DD_initParVars(parVars *DD_partitionVarsT, maxRects, minFill int) {\n\tparVars.count[0] = 0\n\tparVars.count[1] = 0\n\tparVars.area[0] = 0\n\tparVars.area[1] = 0\n\tparVars.total = maxRects\n\tparVars.minFill = minFill\n\tfor index := 0; index < maxRects; index++ {\n\t\tparVars.partition[index] = DD_notTaken\n\t}\n}", "title": "" }, { "docid": "4f06061ad42f13b57603784637cc3a7c", "score": "0.4809364", "text": "func (win *Window) Init(capacity int, socket eal.NumaSocket) {\n\tif capacity < 1 {\n\t\tcapacity = 65536\n\t}\n\tcapacity = int(C.rte_align32pow2(C.uint32_t(capacity)))\n\n\tc := win.ptr()\n\tc.array = (*C.FetchSeg)(eal.ZmallocAligned(\"FetchWindow\", capacity*int(C.sizeof_FetchSeg), 1, socket))\n\tc.capacityMask = C.uint(capacity - 1)\n}", "title": "" }, { "docid": "9d5d7c1db0be0e64e461d5a3d6893a07", "score": "0.47989172", "text": "func (db *Db) Init() error {\n\tfmt.Println(\"building index ...\")\n\n\toffset := uint32(0)\n\tfor {\n\t\tkeys, valPageIds, valOffsets, err := db.ir.Read(offset)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\tfor i := 0; i < len(keys); i++ {\n\t\t\tkey := keys[i]\n\t\t\tvalPageId := valPageIds[i]\n\t\t\tvalOffset := valOffsets[i]\n\n\t\t\tpos := Pos{\n\t\t\t\tvalPageId: valPageId,\n\t\t\t\tvalOffset: valOffset,\n\t\t\t}\n\t\t\tdb.tree.Insert(art.Key(key), art.Value(pos))\n\t\t}\n\n\t\toffset += defaultIdxPageSize\n\t}\n\tfmt.Println(\"build index success\")\n\n\treturn nil\n}", "title": "" }, { "docid": "d3899ed99c4b494645b8c1fea6b4484d", "score": "0.47965413", "text": "func (b *Builder) Reset() {\n\tvar pa []interface{}\n\tb.Aggregate = map[string]string{}\n\tb.Columns = []string{}\n\tb.Values = []map[string]string{}\n\tb.IsDistinct = false\n\tb.FromTable = \"\"\n\tb.PArgs = pa\n\tb.Groups = []string{}\n\tb.LimitNum = 0\n\tb.OffsetNum = 0\n\tb.Unions = map[string]interface{}{}\n\tb.UnionLimitNum = 0\n\tb.UnionOffsetNum = 0\n\tb.UnionOrders = map[string]interface{}{}\n\tb.Lock = map[string]interface{}{}\n\tb.Operators = map[string]interface{}{}\n\tb.Components = map[string][]map[string]string{}\n\tb.UseWrite = false\n\tb.debug = false\n\tb.mu.Unlock()\n}", "title": "" }, { "docid": "5648c77c66977656a3ccb69f49ebdcb7", "score": "0.47884363", "text": "func (entry *ObjectClassEntry) Reset() {\n\tentry.ObjectID = 0\n\tentry.Next = 0\n\tentry.Prev = 0\n\tfor i := 0; i < len(entry.Data); i++ {\n\t\tentry.Data[i] = 0\n\t}\n}", "title": "" }, { "docid": "7845d31ecd043e1339e5b9b847cd7646", "score": "0.47878698", "text": "func zeroOutAlternative(ptr *[32]byte) {\n\t*ptr = [32]byte{}\n}", "title": "" }, { "docid": "87a8bb3545797694a3878dba6a664b1a", "score": "0.47771406", "text": "func (b *Bulk) Reset() {\n\tb.buf = nil\n\tb.bu = btree.Bulk{}\n}", "title": "" }, { "docid": "001f19a38f608f1491e1babd42198b9e", "score": "0.47559002", "text": "func (idx *Index) Init() {\n idx.InitSize(DefaultSize)\n}", "title": "" }, { "docid": "0cf2ddf145f7e73ad4ca9d1f9b828fdf", "score": "0.47520772", "text": "func (db *DB) init() error {\n\t// Set the page size to the OS page size.\n\tdb.pageSize = os.Getpagesize()\n\tif db.pageSize > int(maxPageSize) {\n\t\tdb.pageSize = int(maxPageSize)\n\t}\n\n\t// 1 headPage + 1 dataPage\n\tbuf := make([]byte, db.pageSize*2)\n\t{\n\t\thead := db.headPageInBuffer(buf)\n\t\thead.magic = Magic\n\t\thead.Compression = db.compression\n\t\thead.Version = Version\n\t\toffset := PageSz(unsafe.Sizeof(*head))\n\t\thead.indexPtr = RecordPtr{0, offset}\n\t\thead.kvPtr = RecordPtr{1, PageSz(unsafe.Sizeof(Page{}))}\n\t\thead.ptr = offset\n\t\thead.PageCount = 2\n\t\thead.IndexPageCount = 0\n\t\thead.PageSize = PageSz(db.pageSize)\n\t\tdb.head = head\n\t}\n\t{\n\t\tpage1 := db.pageInBuffer(buf, 1)\n\t\tpage1.ptr = PageSz(unsafe.Sizeof(*page1))\n\t\tpage1.Flag = PageData | PageFull\n\t}\n\n\t// Write the buffer to our data file.\n\tif _, err := db.ops.writeAt(buf, 0); err != nil {\n\t\treturn err\n\t}\n\tif err := db.file.Sync(); err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "da73d9cba547e392cf90c3bdf42bbe4f", "score": "0.47515336", "text": "func _853btreeInitPage(tls *crt.TLS, _pPage uintptr /* *TMemPage */) (r int32) {\n\tvar (\n\t\t_pc int32\n\t\t_hdr Tu8\n\t\t_data uintptr // *Tu8\n\t\t_pBt uintptr // *TBtShared\n\t\t_usableSize int32\n\t\t_cellOffset Tu16\n\t\t_nFree int32\n\t\t_top int32\n\t\t_iCellFirst int32\n\t\t_iCellLast int32\n\t\t_i int32\n\t\t_sz int32\n\t\t_next Tu32\n\t\t_size Tu32\n\t)\n\n\t_pBt = *(*uintptr)(unsafe.Pointer(_pPage + 52))\n\t_hdr = *(*Tu8)(unsafe.Pointer(_pPage + 9))\n\t_data = *(*uintptr)(unsafe.Pointer(_pPage + 56))\n\tif _887decodeFlags(tls, _pPage, int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(_hdr))))) == 0 {\n\t\tgoto _1\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61502))\n\n_1:\n\t*(*Tu16)(unsafe.Pointer(_pPage + 24)) = Tu16((*(*Tu32)(unsafe.Pointer(_pBt + 32))) - Tu32(1))\n\t*(*Tu8)(unsafe.Pointer(_pPage + 12)) = Tu8(0)\n\t_usableSize = int32(*(*Tu32)(unsafe.Pointer(_pBt + 36)))\n\t*(*Tu16)(unsafe.Pointer(_pPage + 18)) = set62(&_cellOffset, Tu16((int32(_hdr)+int32(8))+int32(*(*Tu8)(unsafe.Pointer(_pPage + 10)))))\n\t*(*uintptr)(unsafe.Pointer(_pPage + 60)) = _data + uintptr(_usableSize)\n\t*(*uintptr)(unsafe.Pointer(_pPage + 64)) = _data + uintptr(_cellOffset)\n\t*(*uintptr)(unsafe.Pointer(_pPage + 68)) = _data + uintptr(*(*Tu8)(unsafe.Pointer(_pPage + 10)))\n\t_top = (((int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(5))))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(int32(_hdr)+int32(5))) + 1))) - int32(1)) & int32(0xffff)) + int32(1)\n\t*(*Tu16)(unsafe.Pointer(_pPage + 22)) = Tu16((int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(3))))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(int32(_hdr)+int32(3))) + 1))))\n\tif uint32(*(*Tu16)(unsafe.Pointer(_pPage + 22))) <= (((*(*Tu32)(unsafe.Pointer(_pBt + 32))) - Tu32(8)) / Tu32(6)) {\n\t\tgoto _2\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61521))\n\n_2:\n\t_iCellFirst = int32(_cellOffset) + (int32(2) * int32(*(*Tu16)(unsafe.Pointer(_pPage + 22))))\n\t_iCellLast = _usableSize - int32(4)\n\tif ((*(*Tu32)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_pBt + 4))) + 28))) & Tu32(0x200000)) == 0 {\n\t\tgoto _3\n\t}\n\n\tif (*(*Tu8)(unsafe.Pointer(_pPage + 8))) != 0 {\n\t\tgoto _4\n\t}\n\n\t_iCellLast--\n_4:\n\t_i = int32(0)\n_5:\n\tif _i >= int32(*(*Tu16)(unsafe.Pointer(_pPage + 22))) {\n\t\tgoto _7\n\t}\n\n\t_pc = (int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(int32(_cellOffset)+(_i*int32(2)))))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(int32(_cellOffset)+(_i*int32(2)))) + 1)))\n\tif _pc >= _iCellFirst && _pc <= _iCellLast {\n\t\tgoto _8\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61549))\n\n_8:\n\t_sz = int32(fn150(*(*uintptr)(unsafe.Pointer(_pPage + 76)))(tls, _pPage, _data+uintptr(_pc)))\n\tif (_pc + _sz) <= _usableSize {\n\t\tgoto _9\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61554))\n\n_9:\n\t_i++\n\tgoto _5\n\n_7:\n\tif (*(*Tu8)(unsafe.Pointer(_pPage + 8))) != 0 {\n\t\tgoto _10\n\t}\n\n\t_iCellLast++\n_10:\n_3:\n\t_pc = (int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(1))))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(int32(_hdr)+int32(1))) + 1)))\n\t_nFree = int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(int32(_hdr)+int32(7))))) + _top\n\tif _pc <= int32(0) {\n\t\tgoto _11\n\t}\n\n\tif _pc >= _iCellFirst {\n\t\tgoto _12\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61572))\n\n_12:\n_13:\n\tif 1 == 0 {\n\t\tgoto _14\n\t}\n\n\tif _pc <= _iCellLast {\n\t\tgoto _15\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61577))\n\n_15:\n\t_next = Tu32((int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(_pc)))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(_pc)) + 1))))\n\t_size = Tu32((int32(*(*Tu8)(unsafe.Pointer(_data + uintptr(_pc+int32(2))))) << (uint(8) % 32)) | int32(*(*Tu8)(unsafe.Pointer((_data + uintptr(_pc+int32(2))) + 1))))\n\t_nFree = int32(uint32(_nFree) + _size)\n\tif _next > ((uint32(_pc) + _size) + uint32(3)) {\n\t\tgoto _16\n\t}\n\n\tgoto _14\n\n_16:\n\t_pc = int32(_next)\n\tgoto _13\n\n_14:\n\tif _next <= Tu32(0) {\n\t\tgoto _17\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61587))\n\n_17:\n\tif (uint32(_pc) + _size) <= uint32(_usableSize) {\n\t\tgoto _18\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61591))\n\n_18:\n_11:\n\tif _nFree <= _usableSize {\n\t\tgoto _19\n\t}\n\n\treturn _559sqlite3CorruptError(tls, int32(61603))\n\n_19:\n\t*(*Tu16)(unsafe.Pointer(_pPage + 20)) = Tu16(_nFree - _iCellFirst)\n\t*(*Tu8)(unsafe.Pointer(_pPage)) = Tu8(1)\n\treturn int32(0)\n}", "title": "" }, { "docid": "57dc74c155ced86b6caba776dbebd7c0", "score": "0.47435212", "text": "func (idx *Index) InitSize(size int) {\n idx.I = make([]int, 0, size)\n idx.Reverse = make([]I, 0, size)\n idx.Empty = make([]I, 0, size/8)\n}", "title": "" }, { "docid": "515fc3f913cdbfd827550d933a438409", "score": "0.4743034", "text": "func _727sqlite3VdbeMemInit(tls *crt.TLS, _pMem uintptr /* *TMem */, _db uintptr /* *Tsqlite3 */, _flags Tu16) {\n\t*(*Tu16)(unsafe.Pointer(_pMem + 8)) = _flags\n\t*(*uintptr)(unsafe.Pointer(_pMem + 32)) = _db\n\t*(*int32)(unsafe.Pointer(_pMem + 24)) = int32(0)\n}", "title": "" }, { "docid": "67d74355b2392569b538d8b3e6743e5b", "score": "0.47408116", "text": "func _1857pragmaVtabCursorClear(tls *crt.TLS, _pCsr uintptr /* *TPragmaVtabCursor */) {\n\tvar _i int32\n\n\tXsqlite3_finalize(tls, *(*uintptr)(unsafe.Pointer(_pCsr + 4)))\n\t*(*uintptr)(unsafe.Pointer(_pCsr + 4)) = null\n\t_i = int32(0)\n_1:\n\tif _i >= int32(2) {\n\t\tgoto _3\n\t}\n\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer((_pCsr + 16) + 4*uintptr(_i))))\n\t*(*uintptr)(unsafe.Pointer((_pCsr + 16) + 4*uintptr(_i))) = null\n\t_i++\n\tgoto _1\n\n_3:\n}", "title": "" }, { "docid": "bc3acad9f5cde8a74343a1086b1c6f74", "score": "0.47348118", "text": "func (l *List) Init() *List {\n\tl.front = nil;\n\tl.back = nil;\n\tl.len = 0;\n\tl.id = new(byte);\n\treturn l;\n}", "title": "" }, { "docid": "8af0fc9661a258caef0c9e16150eb090", "score": "0.47339675", "text": "func InitInternalData() {\n\t// This needs to happen before magic bitboard generation\n\t// because we use this as a convenience for building attack\n\t// boards.\n\tBuildByteLookupTable()\n\tInitMagicBitboards()\n\tLEGALKINGMOVES = LegalKingMovesDict()\n\tLEGALKNIGHTMOVES = LegalKnightMovesDict()\n\tInitPawnAttacks()\n\tInitZobristNumbers()\n}", "title": "" }, { "docid": "83137f503a767b89845a17159361950e", "score": "0.47337455", "text": "func (dungeon *Dungeon) Init(mapSize int) {\n\tdungeon.chart = make([]int, 0, mapSize)\n\tdungeon.travelPath = make([]int, 0, mapSize/10)\n\tdungeon.travelRes = -1\n\tdungeon.source = \"#undef\"\n}", "title": "" }, { "docid": "3a44ee67ffdb3e4200dd5e6f6980ab4c", "score": "0.47287735", "text": "func (dba *Sqler) Reset() {\n\tdba.table = \"\"\n\tdba.fields = \"\"\n\tdba.where = [][]interface{}{}\n\tdba.order = \"\"\n\tdba.limit = 0\n\tdba.offset = 0\n\tdba.join = [][]interface{}{}\n\tdba.distinct = false\n\tdba.group = \"\"\n\tdba.having = \"\"\n\tvar tmp interface{}\n\tdba.data = tmp\n\n\tdba.count = \"\"\n\tdba.sum = \"\"\n\tdba.avg = \"\"\n\tdba.max = \"\"\n\tdba.min = \"\"\n}", "title": "" }, { "docid": "0406df257e3951358b3fbd33b67bac41", "score": "0.4726078", "text": "func (b *bitmap32) Reset() {\n\tfor i := range b.bitmap {\n\t\tb.bitmap[i] = 0\n\t}\n}", "title": "" }, { "docid": "94c3328a82824908d820552c52fce291", "score": "0.47157052", "text": "func (ai aggregatingIterator) init() {\n\theap.Init(&ai)\n\tif !ai.isValid() {\n\t\treturn\n\t}\n\tif ai[0].nextReal.offset() > 0 {\n\t\tai.advance()\n\t}\n}", "title": "" }, { "docid": "571d897d2170d19cbc752b0eb2e25c6e", "score": "0.47153592", "text": "func (bs *buckets) _setOff() {\n\tfor i := range bs {\n\t\tbs[i] = nil\n\t}\n}", "title": "" }, { "docid": "a707d718aad5c2e97d9a97fd4dab5c5c", "score": "0.4707382", "text": "func _1067sqlite3VdbeMemSetZeroBlob(tls *crt.TLS, _pMem uintptr /* *TMem */, _n int32) {\n\t_400sqlite3VdbeMemRelease(tls, _pMem)\n\t*(*Tu16)(unsafe.Pointer(_pMem + 8)) = Tu16(16400)\n\t*(*int32)(unsafe.Pointer(_pMem + 12)) = int32(0)\n\tif _n >= int32(0) {\n\t\tgoto _1\n\t}\n\n\t_n = int32(0)\n_1:\n\t*(*int32)(unsafe.Pointer(_pMem)) = _n\n\t*(*Tu8)(unsafe.Pointer(_pMem + 10)) = Tu8(1)\n\t*(*uintptr)(unsafe.Pointer(_pMem + 16)) = null\n}", "title": "" }, { "docid": "bb33a7c0b4d3a066c08d3bb7bd530a4f", "score": "0.47056147", "text": "func (aMan *AvroDescManager) Init() {\n\taMan.Amap = make(AvroPackageDescMap)\n}", "title": "" }, { "docid": "4556f9639e4cb0a4c5d5d002428829ae", "score": "0.47019237", "text": "func allocate() {\n\t_ = make([]byte, 1<<20)\n}", "title": "" }, { "docid": "bf6024a5ca9c6cee2bd0a49fc9c5b20e", "score": "0.47015288", "text": "func allocStructNkCursorMemory(n int) unsafe.Pointer {\n\tmem, err := C.calloc(C.size_t(n), (C.size_t)(sizeOfStructNkCursorValue))\n\tif err != nil {\n\t\tpanic(\"memory alloc error: \" + err.Error())\n\t}\n\treturn mem\n}", "title": "" }, { "docid": "352972b06e10a00fb5ef9b63e69e97a7", "score": "0.46980527", "text": "func MapInit(bitmapScale int) {\n\tBitmapScale = bitmapScale\n\tfmt.Println(\"[Initialising Map]\")\n\n\tRobotMap = CreateMap()\n\tfmt.Println(\"[Map Created]\")\n\tfmt.Println(\"[Initialising RDP]\")\n\n\tRDPInit()\n\tfmt.Println(\"[RDP Link Ready]\")\n\n\tscanBuffer = make([]RobotDriverProtocol.ScanResponse, 0)\n}", "title": "" }, { "docid": "b438e8c7dc91263ea45e945db50daeb7", "score": "0.4697537", "text": "func (f *BitmapRowsUnion) Reset() {\n\tfor i := range f.c {\n\t\tf.c[i] = nil\n\t}\n}", "title": "" }, { "docid": "e26fe566479117d6056dab824496d331", "score": "0.46766803", "text": "func (l *List64) Init() *List64 {\n\tl.Clear()\n\treturn l\n}", "title": "" }, { "docid": "685cd8f9e8ae3d243977bb5d0656b69d", "score": "0.4667278", "text": "func kinc_shader_storage_buffer_init(buffer *kinc_shader_storage_buffer, count int32, _type kinc_g4_vertex_data) {\n\tcbuffer, cbufferAllocMap := buffer.PassRef()\n\tccount, ccountAllocMap := (C.int)(count), cgoAllocsUnknown\n\tc_type, c_typeAllocMap := (C.kinc_g4_vertex_data_t)(_type), cgoAllocsUnknown\n\tC.kinc_shader_storage_buffer_init(cbuffer, ccount, c_type)\n\truntime.KeepAlive(c_typeAllocMap)\n\truntime.KeepAlive(ccountAllocMap)\n\truntime.KeepAlive(cbufferAllocMap)\n}", "title": "" }, { "docid": "5b5be40716c24c3fdb2d898bca8b146b", "score": "0.4666445", "text": "func sysBufNil() *core.Buffer {\n\tb := core.NewBuffer()\n\tb.Data = nil\n\treturn b\n}", "title": "" }, { "docid": "57ce66ea180be39f82a651a59e9b3a77", "score": "0.46589333", "text": "func (array *PdfObjectArray) Clear() {\n\tarray.vec = []PdfObject{}\n}", "title": "" }, { "docid": "1ab4f6671a67dac93c4d2281c3874656", "score": "0.46588296", "text": "func (b *indexScanBuilder) Init(c *CustomFuncs, tabID opt.TableID) {\n\t// This initialization pattern ensures that fields are not unwittingly\n\t// reused. Field reuse must be explicit.\n\t*b = indexScanBuilder{\n\t\tc: c,\n\t\tf: c.e.f,\n\t\tmem: c.e.mem,\n\t\ttabID: tabID,\n\t}\n}", "title": "" }, { "docid": "a017ec4cbabc029ec7e4b49a555d8f58", "score": "0.46556956", "text": "func (b *BitArray) Reset() {\n\tb.blocks = make([]uint64, b.length/bitPerBlock+1)\n}", "title": "" }, { "docid": "a2652fcbfb48b504bdfb12e9aa24b2a4", "score": "0.4654951", "text": "func mapiterinit(rtype unsafe.Pointer, m unsafe.Pointer) *hiter", "title": "" }, { "docid": "96804c89295a6f6cd6f75c6ccb31c010", "score": "0.46548998", "text": "func (c *Chip8) Initialize(b beeper.BeeperInterface) {\n\tc.opcode = 0\n\tc.memory = [memorySize]uint16{}\n\tfor i := 0; i < fontSetSize; i++ {\n\t\tc.memory[i] = chip8FontSet[i]\n\t}\n\tc.registers = [registersSize]uint8{}\n\tc.i = 0\n\tc.pc = 0x200\n\tc.gfx = [gfxSize]uint8{}\n\tc.delayTimer = 0\n\tc.soundTimer = 0\n\tc.beeper = b\n\tc.stack = [stackSize]uint16{}\n\tc.sp = 0\n\tc.key = [keySize]byte{}\n\tc.draw = false\n}", "title": "" }, { "docid": "8ff4faab6fda9ed9fce39c62e256d8f9", "score": "0.4644639", "text": "func (a *AsmBuf) Reset()", "title": "" }, { "docid": "2691bbbadface54b3da8099d0d99e1aa", "score": "0.46365827", "text": "func initiateClientAddressMemoryDB() {\n\tclientsAddressAndPort = make(map[string]common_code.ClientsAddressAndPortStruct)\n}", "title": "" }, { "docid": "475ef0a953a24ebabb33cfd724b5d98c", "score": "0.46357918", "text": "func zeroOut(ptr *[32]byte) {\n\tfor i := range ptr {\n\t\tptr[i] = 0\n\t}\n}", "title": "" }, { "docid": "15340fe973110a07643e0346e63f0232", "score": "0.46340716", "text": "func Clear() {\n\tarray = nil\n\tcapacity = 10\n\tlength = 0\n}", "title": "" }, { "docid": "8035bf0114ddf627f1a9d6235ffa34e5", "score": "0.4628575", "text": "func (table ObjectClassTable) Reset() {\n\ttableLen := len(table)\n\tfor i := 0; i < tableLen; i++ {\n\t\tentry := &table[i]\n\t\tentry.Reset()\n\t\tentry.Next = int16(i + 1)\n\t}\n\tif tableLen > 0 {\n\t\ttable[tableLen-1].Next = 0\n\t}\n}", "title": "" }, { "docid": "7236a68fe154855813e8bb8151ce28ee", "score": "0.46252283", "text": "func (c *PanoObjs) Initialize(i util.XapiClient) {\n c.Address = &addr.PanoAddr{}\n c.Address.Initialize(i)\n\n c.AddressGroup = &addrgrp.PanoAddrGrp{}\n c.AddressGroup.Initialize(i)\n\n c.Application = &app.PanoApp{}\n c.Application.Initialize(i)\n\n c.AppGroup = &appgrp.PanoGroup{}\n c.AppGroup.Initialize(i)\n\n c.AppSignature = &signature.PanoSignature{}\n c.AppSignature.Initialize(i)\n\n c.AppSigAndCond = &andcond.PanoAndCond{}\n c.AppSigAndCond.Initialize(i)\n\n c.AppSigOrCond = &orcond.PanoOrCond{}\n c.AppSigOrCond.Initialize(i)\n\n c.Edl = &edl.PanoEdl{}\n c.Edl.Initialize(i)\n\n c.LogForwardingProfile = &logfwd.PanoLogFwd{}\n c.LogForwardingProfile.Initialize(i)\n\n c.LogForwardingProfileMatchList = &matchlist.PanoMatchList{}\n c.LogForwardingProfileMatchList.Initialize(i)\n\n c.LogForwardingProfileMatchListAction = &action.PanoAction{}\n c.LogForwardingProfileMatchListAction.Initialize(i)\n\n c.Services = &srvc.PanoSrvc{}\n c.Services.Initialize(i)\n\n c.ServiceGroup = &srvcgrp.PanoSrvcGrp{}\n c.ServiceGroup.Initialize(i)\n\n c.Tags = &tags.PanoTags{}\n c.Tags.Initialize(i)\n}", "title": "" }, { "docid": "7ccbbfa69114e5cdd677dc9328f1c564", "score": "0.46242946", "text": "func (dm *OpenDirMap) Init() {\n\tif *dm == nil {\n\t\t*dm = make(OpenDirMap, 1000)\n\t}\n}", "title": "" }, { "docid": "fc09008a7160f63d64b66f8f80c5d7c0", "score": "0.4622257", "text": "func _545vdbeMemClearExternAndSetNull(tls *crt.TLS, _p uintptr /* *TMem */) {\n\tvar _pFrame uintptr // *TVdbeFrame\n\n\tif (int32(*(*Tu16)(unsafe.Pointer(_p + 8))) & int32(0x2000)) == 0 {\n\t\tgoto _1\n\t}\n\n\t_728sqlite3VdbeMemFinalize(tls, _p, *(*uintptr)(unsafe.Pointer(_p)))\n\n_1:\n\tif (int32(*(*Tu16)(unsafe.Pointer(_p + 8))) & int32(0x400)) == 0 {\n\t\tgoto _2\n\t}\n\n\tfn16(*(*uintptr)(unsafe.Pointer(_p + 36)))(tls, *(*uintptr)(unsafe.Pointer(_p + 16)))\n\tgoto _3\n\n_2:\n\tif (int32(*(*Tu16)(unsafe.Pointer(_p + 8))) & int32(0x20)) == 0 {\n\t\tgoto _4\n\t}\n\n\t_868sqlite3RowSetClear(tls, *(*uintptr)(unsafe.Pointer(_p)))\n\tgoto _5\n\n_4:\n\tif (int32(*(*Tu16)(unsafe.Pointer(_p + 8))) & int32(0x40)) == 0 {\n\t\tgoto _6\n\t}\n\n\t_pFrame = *(*uintptr)(unsafe.Pointer(_p))\n\t*(*uintptr)(unsafe.Pointer(_pFrame + 4)) = *(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_pFrame))) + 188))\n\t*(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_pFrame))) + 188)) = _pFrame\n_6:\n_5:\n_3:\n\t*(*Tu16)(unsafe.Pointer(_p + 8)) = Tu16(0x1)\n}", "title": "" }, { "docid": "d9e67697a1000e1de47d5291d20f68a6", "score": "0.46177727", "text": "func (c Collection) Reset() {\n\tc.rv.Set(reflect.MakeSlice(c.rt, 0, 0))\n}", "title": "" }, { "docid": "8701a0feb558a62a15589f7e64727255", "score": "0.46141168", "text": "func _1620sqlite3ArrayAllocate(tls *crt.TLS, _db uintptr /* *Tsqlite3 */, _pArray uintptr /* uintptr */, _szEntry int32, _pnEntry uintptr /* *int32 */, _pIdx uintptr /* *int32 */) (r uintptr) {\n\tvar (\n\t\t_z uintptr // *int8\n\t\t_n int32\n\t\t_sz int32\n\t\t_pNew uintptr // uintptr\n\t)\n\t_n = *(*int32)(unsafe.Pointer(_pnEntry))\n\tif (_n & (_n - int32(1))) != int32(0) {\n\t\tgoto _1\n\t}\n\n\t_sz = func() int32 {\n\t\tif _n == int32(0) {\n\t\t\treturn int32(1)\n\t\t}\n\t\treturn int32(2) * _n\n\t}()\n\t_pNew = _871sqlite3DbRealloc(tls, _db, _pArray, uint64(_sz*_szEntry))\n\tif _pNew != 0 {\n\t\tgoto _2\n\t}\n\n\t*(*int32)(unsafe.Pointer(_pIdx)) = int32(-1)\n\treturn _pArray\n\n_2:\n\t_pArray = _pNew\n_1:\n\t_z = _pArray\n\tcrt.Xmemset(tls, _z+uintptr(_n*_szEntry), int32(0), uint32(_szEntry))\n\t*(*int32)(unsafe.Pointer(_pIdx)) = _n\n\t(*(*int32)(unsafe.Pointer(_pnEntry)))++\n\treturn _pArray\n}", "title": "" }, { "docid": "4334dd3eb88f8daea63cb3e94fe5c93f", "score": "0.46055114", "text": "func _1466walIteratorInit(tls *crt.TLS, _pWal uintptr /* *TWal */, _pp uintptr /* **TWalIterator */) (r int32) {\n\tesc := crt.MustMalloc(52)\n\tvar (\n\t\t_p uintptr // *TWalIterator\n\t\t_nSegment int32\n\t\t_iLast Tu32\n\t\t_nByte int32\n\t\t_i int32\n\t\t_aTmp uintptr // *Tht_slot\n\t\t_rc int32\n\t\t_aHash = esc // **Tht_slot\n\t\t_iZero = esc + 16 // *Tu32\n\t\t_aPgno = esc + 32 // **Tu32\n\t\t_j int32\n\t\t_nEntry = esc + 48 // *int32\n\t\t_aIndex uintptr // *Tht_slot\n\t)\n\tdefer crt.Free(esc)\n\t_rc = int32(0)\n\n\t_iLast = *(*Tu32)(unsafe.Pointer((_pWal + 52) + 16))\n\t_nSegment = _1152walFramePage(tls, _iLast) + int32(1)\n\t_nByte = int32((uint32(28) + (uint32(_nSegment-int32(1)) * uint32(20))) + (_iLast * Tu32(2)))\n\t_p = Xsqlite3_malloc64(tls, uint64(_nByte))\n\tif _p != 0 {\n\t\tgoto _1\n\t}\n\n\treturn int32(7)\n\n_1:\n\tcrt.Xmemset(tls, _p, int32(0), uint32(_nByte))\n\t*(*int32)(unsafe.Pointer(_p + 4)) = _nSegment\n\t_aTmp = Xsqlite3_malloc64(tls, uint64(uint32(2)*func() uint32 {\n\t\tif _iLast > Tu32(4096) {\n\t\t\treturn uint32(4096)\n\t\t}\n\t\treturn _iLast\n\t}()))\n\tif _aTmp != 0 {\n\t\tgoto _2\n\t}\n\n\t_rc = int32(7)\n_2:\n\t_i = int32(0)\n_3:\n\tif _rc != int32(0) || _i >= _nSegment {\n\t\tgoto _5\n\t}\n\n\t_rc = _1153walHashGet(tls, _pWal, _i, _aHash, _aPgno, _iZero)\n\tif _rc != int32(0) {\n\t\tgoto _6\n\t}\n\n\t*(*uintptr)(unsafe.Pointer(_aPgno)) += 4\n\tif (_i + int32(1)) != _nSegment {\n\t\tgoto _7\n\t}\n\n\t*(*int32)(unsafe.Pointer(_nEntry)) = int32(_iLast - (*(*Tu32)(unsafe.Pointer(_iZero))))\n\tgoto _8\n\n_7:\n\t*(*int32)(unsafe.Pointer(_nEntry)) = int32((*(*uintptr)(unsafe.Pointer(_aHash)) - *(*uintptr)(unsafe.Pointer(_aPgno))) / 4)\n_8:\n\t_aIndex = (_p + 8) + 20*uintptr(*(*int32)(unsafe.Pointer(_p + 4))) + 2*uintptr(*(*Tu32)(unsafe.Pointer(_iZero)))\n\t(*(*Tu32)(unsafe.Pointer(_iZero)))++\n\t_j = int32(0)\n_9:\n\tif _j >= (*(*int32)(unsafe.Pointer(_nEntry))) {\n\t\tgoto _11\n\t}\n\n\t*(*Tht_slot)(unsafe.Pointer(_aIndex + 2*uintptr(_j))) = Tht_slot(_j)\n\t_j++\n\tgoto _9\n\n_11:\n\t_1725walMergesort(tls, *(*uintptr)(unsafe.Pointer(_aPgno)), _aTmp, _aIndex, _nEntry)\n\t*(*int32)(unsafe.Pointer(((_p + 8) + 20*uintptr(_i)) + 16)) = int32(*(*Tu32)(unsafe.Pointer(_iZero)))\n\t*(*int32)(unsafe.Pointer(((_p + 8) + 20*uintptr(_i)) + 12)) = *(*int32)(unsafe.Pointer(_nEntry))\n\t*(*uintptr)(unsafe.Pointer(((_p + 8) + 20*uintptr(_i)) + 4)) = _aIndex\n\t*(*uintptr)(unsafe.Pointer(((_p + 8) + 20*uintptr(_i)) + 8)) = *(*uintptr)(unsafe.Pointer(_aPgno))\n_6:\n\t_i++\n\tgoto _3\n\n_5:\n\tXsqlite3_free(tls, _aTmp)\n\tif _rc == int32(0) {\n\t\tgoto _12\n\t}\n\n\t_1468walIteratorFree(tls, _p)\n_12:\n\t*(*uintptr)(unsafe.Pointer(_pp)) = _p\n\treturn _rc\n}", "title": "" }, { "docid": "b912081fc8e9b640b4b8856090c5d969", "score": "0.46051797", "text": "func newBufCursor(cur Cursor, seek int64) *bufCursor {\n\tc := &bufCursor{cur: cur}\n\n\t// Limit min seek to zero.\n\tif seek < 0 {\n\t\tseek = 0\n\t}\n\n\t// Fill buffer, if seekable.\n\tk, v := cur.SeekTo(seek)\n\tif k != EOF {\n\t\tc.buf = &struct {\n\t\t\tkey int64\n\t\t\tvalue interface{}\n\t\t}{k, v}\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "493eed3e92cc546313296bd4baacc6bf", "score": "0.45988286", "text": "func Init(h heap.Interface) {\n\t// heapify\n\tn := h.Len()\n\tfor i := n/2 - 1; i >= 0; i-- {\n\t\tdown(h, i, n)\n\t}\n}", "title": "" }, { "docid": "127e91712e82ee8a5486e4b6b12668bb", "score": "0.45949927", "text": "func (db *MemDB) initialise() error {\n\troot := db.getRoot()\n\tfor tName, tableSchema := range db.schema.Tables {\n\t\tfor iName := range tableSchema.Indexes {\n\t\t\tindex := iradix.New()\n\t\t\tpath := indexPath(tName, iName)\n\t\t\troot, _, _ = root.Insert(path, index)\n\t\t}\n\t}\n\tdb.root = unsafe.Pointer(root)\n\treturn nil\n}", "title": "" }, { "docid": "5f238c3c966060dedcc9d98f88c35a71", "score": "0.45948276", "text": "func (s *BulkService) Reset() {\n\ts.requests = make([]BulkableRequest, 0)\n\ts.sizeInBytes = 0\n\ts.sizeInBytesCursor = 0\n}", "title": "" }, { "docid": "8ee33ec67706a7c31b906ae07a641b2c", "score": "0.45921633", "text": "func zeroPtr(intPtr *int) {\n\t*intPtr = 0\n}", "title": "" }, { "docid": "c7c40d944bfc7b5a50e59acb97669aa7", "score": "0.45860973", "text": "func (nmap_p *NbrMap) Init() {\n\tnmap_p.bkt = make(map[int]*NbrNode)\n}", "title": "" }, { "docid": "01e92bc6dfa2e577d60789025f35a573", "score": "0.45847303", "text": "func (hm *HistoryMemory) Initialize(ctx context.Context) error {\n\thm.Lock()\n\tdefer hm.Unlock()\n\tif hm.History == nil {\n\t\thm.History = make(map[string][]*JobInvocation)\n\t}\n\tif hm.Lookup == nil {\n\t\thm.Lookup = make(map[string]*JobInvocation)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7275233daa6e7f4a34783a99eb04925b", "score": "0.45824155", "text": "func (a *FetchArena) Init(wc *http.Client, root string) {\n\ta.wc = wc\n\ta.root = root\n\ta.sf = &singleflight.Group{}\n\ta.rc = make(map[string]int)\n}", "title": "" }, { "docid": "eecbe0086082c3dc4ce251f91991b2ed", "score": "0.45759097", "text": "func _278sqlite3HashInit(tls *crt.TLS, _pNew uintptr /* *THash */) {\n\t*(*uintptr)(unsafe.Pointer(_pNew + 8)) = null\n\t*(*uint32)(unsafe.Pointer(_pNew + 4)) = uint32(0)\n\t*(*uint32)(unsafe.Pointer(_pNew)) = uint32(0)\n\t*(*uintptr)(unsafe.Pointer(_pNew + 12)) = null\n}", "title": "" }, { "docid": "2978976d75c9f3a5ab78474dae613b54", "score": "0.457226", "text": "func _297sqlite3DbMallocZero(tls *crt.TLS, _db uintptr /* *Tsqlite3 */, _n Tu64) (r uintptr) {\n\tvar _p uintptr // uintptr\n\n\t_p = _179sqlite3DbMallocRaw(tls, _db, _n)\n\tif _p == 0 {\n\t\tgoto _1\n\t}\n\n\tcrt.Xmemset(tls, _p, int32(0), Tsize_t(_n))\n_1:\n\treturn _p\n}", "title": "" }, { "docid": "364e85938862b48ef3967bc15fc1aff6", "score": "0.4568793", "text": "func _979invalidateIncrblobCursors(tls *crt.TLS, _pBtree uintptr /* *TBtree */, _pgnoRoot TPgno, _iRow Ti64, _isClearTable int32) {\n\tvar _p uintptr // *TBtCursor\n\n\tif int32(*(*Tu8)(unsafe.Pointer(_pBtree + 11))) != int32(0) {\n\t\tgoto _1\n\t}\n\n\treturn\n\n_1:\n\t*(*Tu8)(unsafe.Pointer(_pBtree + 11)) = Tu8(0)\n\t_p = *(*uintptr)(unsafe.Pointer((*(*uintptr)(unsafe.Pointer(_pBtree + 4))) + 8))\n_2:\n\tif _p == 0 {\n\t\tgoto _4\n\t}\n\n\tif (int32(*(*Tu8)(unsafe.Pointer(_p + 1))) & int32(0x10)) == int32(0) {\n\t\tgoto _5\n\t}\n\n\t*(*Tu8)(unsafe.Pointer(_pBtree + 11)) = Tu8(1)\n\tif (*(*TPgno)(unsafe.Pointer(_p + 56))) != _pgnoRoot || _isClearTable == 0 && (*(*Ti64)(unsafe.Pointer(_p + 24))) != _iRow {\n\t\tgoto _6\n\t}\n\n\t*(*Tu8)(unsafe.Pointer(_p)) = Tu8(0)\n_6:\n_5:\n\t_p = *(*uintptr)(unsafe.Pointer(_p + 16))\n\tgoto _2\n\n_4:\n}", "title": "" }, { "docid": "7af3aa24d05aba3c2190813f1d3a03e2", "score": "0.456604", "text": "func (b *Builder) Reset() {\n\tif b.Bytes != nil {\n\t\tb.Bytes = b.Bytes[:cap(b.Bytes)]\n\t}\n\n\tif b.vtables != nil {\n\t\tb.vtables = b.vtables[:0]\n\t}\n\n\tif b.vtable != nil {\n\t\tb.vtable = b.vtable[:0]\n\t}\n\n\tif b.sharedStrings != nil {\n\t\tfor key := range b.sharedStrings {\n\t\t\tdelete(b.sharedStrings, key)\n\t\t}\n\t}\n\n\tb.head = UOffsetT(len(b.Bytes))\n\tb.minalign = 1\n\tb.nested = false\n\tb.finished = false\n}", "title": "" }, { "docid": "c41988819890836ddee165d85b350ddd", "score": "0.45610008", "text": "func (bsr *blockStreamReader) MustInitFromInmemoryBlock(ib *inmemoryBlock) {\n\tbsr.reset()\n\tbsr.Block.CopyFrom(ib)\n\tbsr.Block.SortItems()\n\tbsr.isInmemoryBlock = true\n}", "title": "" }, { "docid": "bdb4a567b6f7275c5a350012728f9bc3", "score": "0.45554537", "text": "func zeroPtr(xPtr *int) {\n *xPtr = 0\n}", "title": "" }, { "docid": "d4ffba9577a3b479c91c1859964348fd", "score": "0.45553407", "text": "func InitPtr(target reflect.Value) {\n\tv := reflect.New(target.Type().Elem())\n\ttarget.Set(v)\n}", "title": "" }, { "docid": "faab15e99be7c9d14f2acdb6761f7e64", "score": "0.45547938", "text": "func (p *Page) reset() {\n\tfor i := range p.content {\n\t\tp.content[i] = 0\n\t}\n}", "title": "" }, { "docid": "3477bc3b17286ff04e446eb25ddb23e2", "score": "0.45517147", "text": "func _603sqlite3BtreeClearCursor(tls *crt.TLS, _pCur uintptr /* *TBtCursor */) {\n\tXsqlite3_free(tls, *(*uintptr)(unsafe.Pointer(_pCur + 52)))\n\t*(*uintptr)(unsafe.Pointer(_pCur + 52)) = null\n\t*(*Tu8)(unsafe.Pointer(_pCur)) = Tu8(0)\n}", "title": "" }, { "docid": "67a4af43ed441b20e9331a0953ccbc8a", "score": "0.4551543", "text": "func (sr *SampleReservoir) Init(\n\tnumSamples int, colTypes []*types.T, memAcc *mon.BoundAccount, sampleCols util.FastIntSet,\n) {\n\tsr.samples = make([]SampledRow, 0, numSamples)\n\tsr.colTypes = colTypes\n\tsr.memAcc = memAcc\n\tsr.sampleCols = sampleCols\n}", "title": "" }, { "docid": "e97d5022cd67818153ce791dc7166381", "score": "0.4551025", "text": "func InitZeroHashes(hFn HashFn) {\n\tZeroHashes = make([][32]byte, 32)\n\tv := [64]byte{}\n\tfor i := 0; i < 31; i++ {\n\t\tcopy(v[:32], ZeroHashes[i][:])\n\t\tcopy(v[32:], ZeroHashes[i][:])\n\t\tZeroHashes[i + 1] = hFn(v[:])\n\t}\n}", "title": "" }, { "docid": "b2a2f54c5d62fa1841549ee01717df3d", "score": "0.45485097", "text": "func _1189allocateTempSpace(tls *crt.TLS, _pBt uintptr /* *TBtShared */) {\n\tif (*(*uintptr)(unsafe.Pointer(_pBt + 80))) != 0 {\n\t\tgoto _1\n\t}\n\n\t*(*uintptr)(unsafe.Pointer(_pBt + 80)) = _758sqlite3PageMalloc(tls, int32(*(*Tu32)(unsafe.Pointer(_pBt + 32))))\n\tif (*(*uintptr)(unsafe.Pointer(_pBt + 80))) == 0 {\n\t\tgoto _2\n\t}\n\n\tcrt.Xmemset(tls, *(*uintptr)(unsafe.Pointer(_pBt + 80)), int32(0), uint32(8))\n\t*(*uintptr)(unsafe.Pointer(_pBt + 80)) += uintptr(4)\n_2:\n_1:\n}", "title": "" }, { "docid": "52be2616308b5ca917b0693aefbfab9c", "score": "0.4545145", "text": "func (c *Chunk) Reset() {\n\tfor _, c := range c.columns {\n\t\tc.reset()\n\t}\n\tc.numVirtualRows = 0\n}", "title": "" }, { "docid": "f37b6d9515e9a956de206b944bb8b743", "score": "0.45441806", "text": "func (sr *Scanner) InitBytes(b []byte) {\n\tsr.n++\n\tsr.Scanner.InitBytes(b)\n}", "title": "" }, { "docid": "b648e68a421e00899084545a12a7fdde", "score": "0.45397383", "text": "func (b *Buffer) checkInit() {\n\tif len(b.data) < 1 {\n\t\tb.data = make([]byte, b.size)\n\t\tb.size = 0\n\t}\n}", "title": "" }, { "docid": "4a201a3e501a9d28c2689ae736e0e618", "score": "0.45369586", "text": "func NewCursor(table *Table, endFlag bool) *Cursor {\n\tc := &Cursor{\n\t\ttable: table,\n\t}\n\n\tif endFlag {\n\t\tc.rowNum = table.NumRows\n\t\tc.endOfTable = true\n\t} else {\n\t\tc.rowNum = 0\n\t\tc.endOfTable = table.NumRows == 0\n\t\tc.pageNum = table.rootPageNum\n\t\tc.cellNum = 0\n\t}\n\treturn c\n}", "title": "" }, { "docid": "e00078f086ec02409b68934f39706aca", "score": "0.45368767", "text": "func (p *Pages) Reset() {\n\t// acquire an exclusive lock\n\tp.Lock()\n\tp.internal = make(map[string]*Page)\n\tp.Unlock()\n}", "title": "" }, { "docid": "51b66a642711ab4401505428d23957ec", "score": "0.45342094", "text": "func (h *Hasher) Reset() {\n\th.cursor = 0\n\th.size = 0\n\th.releaseTree()\n}", "title": "" } ]
16a5c66574a1aa7b9e8d77765b9e7b61
GetTasks returns a list of tasks matching the filter options.
[ { "docid": "0fdb872b772203a3bc46b7dc480919cf", "score": "0.7583275", "text": "func (c *Cluster) GetTasks(options apitypes.TaskListOptions) ([]types.Task, error) {\n\tc.RLock()\n\tdefer c.RUnlock()\n\n\tif !c.isActiveManager() {\n\t\treturn nil, c.errNoManager()\n\t}\n\n\tbyName := func(filter filters.Args) error {\n\t\tif filter.Include(\"service\") {\n\t\t\tserviceFilters := filter.Get(\"service\")\n\t\t\tfor _, serviceFilter := range serviceFilters {\n\t\t\t\tservice, err := c.GetService(serviceFilter)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tfilter.Del(\"service\", serviceFilter)\n\t\t\t\tfilter.Add(\"service\", service.ID)\n\t\t\t}\n\t\t}\n\t\tif filter.Include(\"node\") {\n\t\t\tnodeFilters := filter.Get(\"node\")\n\t\t\tfor _, nodeFilter := range nodeFilters {\n\t\t\t\tnode, err := c.GetNode(nodeFilter)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tfilter.Del(\"node\", nodeFilter)\n\t\t\t\tfilter.Add(\"node\", node.ID)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t}\n\n\tfilters, err := newListTasksFilters(options.Filter, byName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tctx, cancel := c.getRequestContext()\n\tdefer cancel()\n\n\tr, err := c.client.ListTasks(\n\t\tctx,\n\t\t&swarmapi.ListTasksRequest{Filters: filters})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttasks := []types.Task{}\n\n\tfor _, task := range r.Tasks {\n\t\ttasks = append(tasks, convert.TaskFromGRPC(*task))\n\t}\n\treturn tasks, nil\n}", "title": "" } ]
[ { "docid": "0b5e97797aa620434b411224929abc26", "score": "0.79195917", "text": "func (c *Client) GetTasks(project string, required []string, optional []string) ([]Task, error) {\n\tr := c.Request()\n\n\tif project != \"\" {\n\t\tr = r.SetQueryParam(\"project_id\", project)\n\t}\n\n\t// build the filters\n\tr = r.SetQueryParam(\"filter\", c.BuildFilter(required, optional))\n\n\tresp, err := r.Get(c.Resolve(\"tasks\"))\n\tif err != nil {\n\t\tlog.Printf(\"error listing tasks: %s\", err.Error())\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode() != 200 {\n\t\tlog.Printf(\"unexpected status listing tasks: %d\", resp.StatusCode())\n\t\treturn nil, errors.New(\"unexpected status code\")\n\t}\n\n\ttasks, err := ParseTasks(resp.Body())\n\tif err != nil {\n\t\tlog.Printf(\"error parsing tasks: %s\", err.Error())\n\t\treturn nil, err\n\t}\n\n\tsort.Slice(tasks, func(i, j int) bool {\n\t\treturn tasks[i].Order < tasks[j].Order\n\t})\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "6af05e2107233a42142884a78c1c8537", "score": "0.7261009", "text": "func GetTasks() []*Task {\n\ttasks := make([]*Task, 0)\n\n\tfor _, v := range tm.tasks {\n\t\tif b, ok := tm.disabledTasks[v.Name]; b && ok {\n\t\t\tcontinue\n\t\t}\n\t\ttasks = append(tasks, v)\n\t}\n\n\treturn tasks\n}", "title": "" }, { "docid": "3341c5ebe7876302db952cc5f354608d", "score": "0.719069", "text": "func GetTasks(c *gin.Context) {\n\tdb := *MongoConfig()\n\n\tstatus := strings.ToUpper(c.Query(\"status\"))\n\n\ttasks := model_task.Tasks{}\n\n\tvar err error\n\n\tif status != \"\" {\n\t\ttasks, err = getTasksByStatus(c, status, &db)\n\t} else {\n\t\ttasks, err = getAllTaks(c, &db)\n\t}\n\n\tif err != nil {\n\t\tc.JSON(http.StatusInternalServerError, gin.H{\n\t\t\t\"message\": \"Error fetching tasks\",\n\t\t})\n\t}\n\n\tc.JSON(http.StatusOK, gin.H{\n\t\t\"tasks\": &tasks,\n\t})\n}", "title": "" }, { "docid": "cded1c8cab05d901a87b7f2b084d8059", "score": "0.70569336", "text": "func GetTasks(ctx context.Context, id int64) ([]Task, error) {\n\tvar m []Task\n\tvar err error\n\tif _, ok := SessionCheck(ctx); !ok {\n\t\treturn m, ErrSessionRequired\n\t}\n\tvar rows *sql.Rows\n\tfields := []interface{}{id}\n\tif tx, ok := DBTxFromContext(ctx); ok { // if transaction is supplied\n\t\tstmt := tx.Stmt(RRdb.Prepstmt.GetTasks)\n\t\tdefer stmt.Close()\n\t\trows, err = stmt.Query(fields...)\n\t} else {\n\t\trows, err = RRdb.Prepstmt.GetTasks.Query(fields...)\n\t}\n\tif err != nil {\n\t\treturn m, err\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tvar a Task\n\t\tif err = ReadTasks(rows, &a); err != nil {\n\t\t\treturn m, err\n\t\t}\n\t\tm = append(m, a)\n\t}\n\treturn m, rows.Err()\n}", "title": "" }, { "docid": "bfdf41a1d493f268991cf1d64e645237", "score": "0.69997364", "text": "func (g Group) GetTasks() ([]string, error) {\n\treturn g.readPids(Tasks)\n}", "title": "" }, { "docid": "3d0a89c8196d56bb391a8a229934fedc", "score": "0.69684416", "text": "func GetTasks(ctx context.Context, db *sql.DB, fieldMask *field_mask.FieldMask) ([]*api_pb.Task, error) {\n\t// TODO(@rerost) 取得するカラムを絞り込む\n\tdbTasks, err := todolist.Tasks().All(ctx, db)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tpbTasks := TasksToPB(ctx, dbTasks)\n\n\tmaskedTasks, err := MaskTasks(pbTasks, fieldMask)\n\n\treturn maskedTasks, err\n}", "title": "" }, { "docid": "2e13f5a9499fd6134e66d93b809da3f0", "score": "0.6912383", "text": "func GetTasks(t *testing.T, region string, clusterName string) *ecs.ListTasksOutput {\n\tvar returnTaskList *ecs.ListTasksOutput\n\tecsClient, err := aws.NewEcsClientE(t, region)\n\trequire.Nil(t, err, \"Error creating ECS client\")\n\n\tparams := &ecs.ListTasksInput{\n\t\tCluster: awssdk.String(clusterName),\n\t}\n\n\t// Need to spin and wait 30s to allow time for resources to get up\n\tmaxRetries := 3\n\tretryDuration, _ := time.ParseDuration(\"30s\")\n\t_, err = retry.DoWithRetryE(t, \"Get tasks\", maxRetries, retryDuration,\n\t\tfunc() (string, error) {\n\t\t\ttasks, _ := ecsClient.ListTasks(params)\n\n\t\t\tif len(tasks.TaskArns) == 0 {\n\t\t\t\treturn \"Did not retrieve tasks\", fmt.Errorf(\"We returned empty tasks %v\", tasks.TaskArns)\n\t\t\t}\n\t\t\treturnTaskList = tasks\n\t\t\treturn \"Retrieved tasks\", nil\n\t\t},\n\t)\n\trequire.Nil(t, err, err)\n\n\treturn returnTaskList\n}", "title": "" }, { "docid": "8f69acbeaa04dc6ec5562b7f355dd426", "score": "0.6903002", "text": "func (m *testTaskManager) GetTasks(\n\t_ context.Context,\n\trequest *persistence.GetTasksRequest,\n) (*persistence.GetTasksResponse, error) {\n\tm.logger.Debug(\"testTaskManager.GetTasks\", tag.MinLevel(request.InclusiveMinTaskID), tag.MaxLevel(request.ExclusiveMaxTaskID))\n\n\ttlm := m.getTaskQueueManager(newTestTaskQueueID(namespace.ID(request.NamespaceID), request.TaskQueue, request.TaskType))\n\ttlm.Lock()\n\tdefer tlm.Unlock()\n\tvar tasks []*persistencespb.AllocatedTaskInfo\n\n\tit := tlm.tasks.Iterator()\n\tfor it.Next() {\n\t\ttaskID := it.Key().(int64)\n\t\tif taskID < request.InclusiveMinTaskID {\n\t\t\tcontinue\n\t\t}\n\t\tif taskID >= request.ExclusiveMaxTaskID {\n\t\t\tbreak\n\t\t}\n\t\ttasks = append(tasks, it.Value().(*persistencespb.AllocatedTaskInfo))\n\t}\n\ttlm.getTasksCount++\n\treturn &persistence.GetTasksResponse{\n\t\tTasks: tasks,\n\t}, nil\n}", "title": "" }, { "docid": "5a815ee4d8a99a244db39d9af90ba9f2", "score": "0.676074", "text": "func (s *Server) GetTasks(ctx context.Context, message *taskspb.GetTasksRequest) (*taskspb.GetTasksResponse, error) {\n\tctx = context.WithValue(ctx, goa.MethodKey, \"get_tasks\")\n\tctx = context.WithValue(ctx, goa.ServiceKey, \"tasks\")\n\tresp, err := s.GetTasksH.Handle(ctx, message)\n\tif err != nil {\n\t\treturn nil, goagrpc.EncodeError(err)\n\t}\n\treturn resp.(*taskspb.GetTasksResponse), nil\n}", "title": "" }, { "docid": "fd591a0e41f738d19e81bf6f12936c83", "score": "0.67473286", "text": "func tasksGet(c *gin.Context) {\n\ttasks, err := models.TasksDB.GetAll(currentUserID(c))\n\tif err != nil {\n\t\tabortWithError(c, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\tc.JSON(http.StatusOK, tasks)\n}", "title": "" }, { "docid": "9aad0bd34308927e7fa16fd02673ace7", "score": "0.669675", "text": "func (h *Handler) GetTasks() []Task {\n\treturn h.tasks\n}", "title": "" }, { "docid": "ed061173b877c37a87946c6abe0e89f4", "score": "0.6645635", "text": "func (ts *CalendarService) GetTasks(ctx context.Context, req *tasks.TasksRequest, rsp *tasks.TasksTree) error {\n\t// find all tasks on categoryid\n\tcatTasks := []*tasks.Task{}\n\tquery := bson.M{\"categoryid\": req.Categoryid}\n\terr := ts.db.Collection(CollectionTasks).Find(query).All(&catTasks)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// create tasks tree\n\ttoptasks := filter(catTasks, func(task *tasks.Task) bool { return task.Parent == \"\" })\n\tfor _, topTask := range toptasks {\n\t\tnode := &tasks.TreeNode{Task: topTask}\n\t\trecTaskTree(catTasks, node, topTask.Id)\n\t\trsp.Nodes = append(rsp.Nodes, node)\n\t}\n\trsp.Categoryid = req.Categoryid\n\n\t// apply state map\n\t// get statemap\n\tif !req.Categorytimestamp.IsZero() {\n\t\tcatList := tasks.TaskList{}\n\t\tquery := bson.M{\"categoryid\": req.Categoryid, \"categorytimestamp\": req.Categorytimestamp}\n\t\terr := ts.db.Collection(CollectionTasksList).Find(query).One(&catList)\n\t\tif err != nil {\n\t\t\tfmt.Println(err)\n\t\t\treturn err\n\t\t}\n\t\ttasks.ApplyStateMap(rsp.Nodes, catList.TaskStateMap)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ffcb104bbc67429aee0aad7c57a10fe2", "score": "0.66275334", "text": "func GetTasks(w http.ResponseWriter, r *http.Request) {\n\tcontext := NewContext()\n\tdefer context.Close()\n\tcol := context.DbCollection(\"tasks\")\n\trepo := &data.ProjectRepository{C: col}\n\taccts := repo.GetAccounts()\n\n\tj, err := json.Marshal(TasksResource{Data: bills})\n\tif err != nil {\n\t\tcommon.DisplayAppError(\n\t\t\tw, \n\t\t\terr, \n\t\t\t\"An unexpected error has occured\", \n\t\t\t500,\n\t\t)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(j)\n}", "title": "" }, { "docid": "c46a57ac27ab62844e1caa78d726a208", "score": "0.6610947", "text": "func GetTasks(db *gorm.DB) Tasks {\n\tvar tasks Tasks\n\tdb.Find(&tasks)\n\treturn tasks\n}", "title": "" }, { "docid": "0229927de3fe871e3568c3cd83589730", "score": "0.6550448", "text": "func (c *ActClient) GetTasks() (*ActTasks, error) {\n\ttks := &ActTasks{}\n\n\treq, err := c.NewRequest(\"GET\", fmt.Sprintf(\"%s%s\", c.BaseURL, \"/runtime/tasks\"), nil)\n\tif err != nil {\n\t\treturn tks, err\n\t}\n\n\tif err = c.SendWithBasicAuth(req, tks); err != nil {\n\t\treturn tks, err\n\t}\n\n\treturn tks, nil\n}", "title": "" }, { "docid": "25c6571a013bf31e9c2d1a0cc6d0dfd5", "score": "0.6541224", "text": "func (es *Elastic) ListTasks(ctx context.Context, req *tes.ListTasksRequest) (*tes.ListTasksResponse, error) {\n\n\tpageSize := tes.GetPageSize(req.GetPageSize())\n\tq := es.client.Search().\n\t\tIndex(es.taskIndex).\n\t\tType(\"task\")\n\n\tif req.PageToken != \"\" {\n\t\tq = q.SearchAfter(req.PageToken)\n\t}\n\n\tfilterParts := []elastic.Query{}\n\tif req.State != tes.Unknown {\n\t\tfilterParts = append(filterParts, elastic.NewTermQuery(\"state\", req.State.String()))\n\t}\n\n\tfor k, v := range req.Tags {\n\t\tfilterParts = append(filterParts, elastic.NewMatchQuery(fmt.Sprintf(\"tags.%s.keyword\", k), v))\n\t}\n\n\tif len(filterParts) > 0 {\n\t\tq = q.Query(elastic.NewBoolQuery().Filter(filterParts...))\n\t}\n\n\tq = q.Sort(\"id\", false).Size(pageSize)\n\n\tswitch req.View {\n\tcase tes.TaskView_BASIC:\n\t\tq = q.FetchSource(true).FetchSourceContext(basic)\n\tcase tes.TaskView_MINIMAL:\n\t\tq = q.FetchSource(true).FetchSourceContext(minimal)\n\t}\n\n\tres, err := q.Do(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &tes.ListTasksResponse{}\n\tfor i, hit := range res.Hits.Hits {\n\t\tt := &tes.Task{}\n\t\terr := jsonpb.Unmarshal(bytes.NewReader(*hit.Source), t)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif i == pageSize-1 {\n\t\t\tresp.NextPageToken = t.Id\n\t\t}\n\n\t\tresp.Tasks = append(resp.Tasks, t)\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "1984969539ebd962ea8e235cef9478b6", "score": "0.6530972", "text": "func ListTasks(client *ecs.Client, clusterName, taskFilter string) []ecs.Task {\n\treq := client.ListTasksRequest(&ecs.ListTasksInput{Cluster: &clusterName})\n\tp := ecs.NewListTasksPaginator(req)\n\n\ttaskNames := make([]string, 0)\n\tfor p.Next(context.Background()) {\n\t\tpage := p.CurrentPage()\n\t\ttaskNames = append(taskNames, page.TaskArns...)\n\t}\n\n\tecsTasks := make([]ecs.Task, 0)\n\tfor _, tasks := range chunk(taskNames, 100) {\n\t\tif len(tasks) > 0 {\n\t\t\tfor _, t := range describeTasks(client, clusterName, tasks) {\n\t\t\t\tif strings.Contains(*t.TaskDefinitionArn, taskFilter) {\n\t\t\t\t\tecsTasks = append(ecsTasks, t)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tsort.Sort(byTaskName(ecsTasks))\n\treturn ecsTasks\n}", "title": "" }, { "docid": "162d283d3511e7156a05e17eb85f6174", "score": "0.65235895", "text": "func (client *Client) GetTaskListFilter(request *GetTaskListFilterRequest) (response *GetTaskListFilterResponse, err error) {\n\tresponse = CreateGetTaskListFilterResponse()\n\terr = client.DoAction(request, response)\n\treturn\n}", "title": "" }, { "docid": "566e1d1bd0dcaf163c25e7afb4e0335f", "score": "0.6478624", "text": "func TasksGET(c *gin.Context) {\n\ttask := c.Param(\"task\")\n\tvalue, err := redis.Hgetall(\"task\", task)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"message\": \"Error when reading from Redis\",\n\t\t})\n\t\treturn\n\t}\n\tif value != nil {\n\t\tc.JSON(http.StatusOK, value)\n\t} else {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"message\": \"Couldn't find the task\",\n\t\t})\n\t}\n}", "title": "" }, { "docid": "365a3bf8d89eada6c524f92bd172db6f", "score": "0.6476355", "text": "func (core *Core) FilterTask(choose filter) []*registry.Task {\n\tvar result []*registry.Task\n\tfor _, task := range core.tasks.List() {\n\t\tif choose(task.(*registry.Task)) {\n\t\t\tresult = append(result, task.(*registry.Task))\n\t\t}\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "19dc2ddbdbe5603864764950a45178a5", "score": "0.64740777", "text": "func ReturnAllTasks(client *mongo.Client, filter bson.M) []*types.Task {\n\tvar tasks []*types.Task\n\tcollection := client.Database(\"quiz\").Collection(\"tasks\")\n\tcur, err := collection.Find(context.TODO(), filter)\n\tif err != nil {\n\t\tlog.Fatal(\"Error on Finding all the documents\", err)\n\t}\n\tfor cur.Next(context.TODO()) {\n\t\tvar task types.Task\n\t\terr = cur.Decode(&task)\n\t\tif err != nil {\n\t\t\tlog.Fatal(\"Error on Decoding the document\", err)\n\t\t}\n\t\ttasks = append(tasks, &task)\n\t}\n\treturn tasks\n}", "title": "" }, { "docid": "fd6116bbfbf44e658aee203ab881cd0a", "score": "0.6472266", "text": "func (r *PlannerPlanTasksCollectionRequest) Get(ctx context.Context) ([]PlannerTask, error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\treturn r.Paging(ctx, \"GET\", query, nil)\n}", "title": "" }, { "docid": "e39818d2e093534c490097597048e34e", "score": "0.6455448", "text": "func ListTasks(client *http.Client, folderID string, hideCompleted bool, limit int) []Task {\n\tt := new(_task)\n\tvar reqURL string\n\tvar resp *http.Response\n\tvar err error\n\tparams := map[string]string{}\n\n\tfilter := \"\"\n\tif hideCompleted {\n\t\tfilter += \" status eq 'notStarted' \"\n\t}\n\tif filter != \"\" {\n\t\tparams[\"$filter\"] = filter\n\t}\n\tparams[\"$top\"] = strconv.Itoa(limit)\n\n\tif folderID != \"\" {\n\t\treqURL = constructURL([]string{\"taskFolders\", folderID, \"tasks\"}, params)\n\t} else {\n\t\treqURL = constructURL([]string{\"tasks\"}, params)\n\t}\n\tresp, err = client.Get(reqURL)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer resp.Body.Close()\n\terr = json.NewDecoder(resp.Body).Decode(t)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn t.Value\n}", "title": "" }, { "docid": "a226f0e8399d45f6b9d10734760f9387", "score": "0.6451122", "text": "func (m *Monitor) GetAppsTasks(ctx *gin.Context) {\n\tparam := &models.QueryParameter{\n\t\tStart: ctx.Query(\"start\"),\n\t\tEnd: ctx.Query(\"end\"),\n\t\tStep: ctx.Query(\"step\"),\n\t\tCluster: ctx.Param(\"clusterid\"),\n\t\tApp: ctx.Param(\"appid\"),\n\t}\n\n\tquery := &service.Query{\n\t\tExprTmpl: service.SetQueryExprsList(),\n\t\tHTTPClient: http.DefaultClient,\n\t\tPromServer: config.GetConfig().PrometheusURL,\n\t\tPath: service.QUERYRANGEPATH,\n\t\tQueryParameter: param,\n\t}\n\n\tdata, err := query.GetQueryAppTasks()\n\tif err != nil {\n\t\tutils.ErrorResponse(ctx, err)\n\t\treturn\n\t}\n\tutils.Ok(ctx, data)\n}", "title": "" }, { "docid": "ad44ae78fc3768c7b00f2572b7b89c75", "score": "0.6386269", "text": "func GetList(apiToken string, filter string) (GetListResponse, error) {\n\targs := map[string]string{\n\t\t\"api_key\": api.APIKey,\n\t\t\"auth_token\": apiToken,\n\t}\n\n\tif filter != \"\" {\n\t\targs[\"filter\"] = filter\n\t}\n\n\tvar response GetListResponse\n\tunmarshal := func(b []byte) error {\n\t\treturn json.Unmarshal(b, &response)\n\t}\n\n\terr := api.GetMethod(\"rtm.tasks.getList\", args, unmarshal)\n\tif err != nil {\n\t\treturn response, err\n\t}\n\n\tlog.WithFields(log.Fields{\n\t\t\"response\": response,\n\t}).Debug(\"\")\n\n\treturn response, nil\n\n}", "title": "" }, { "docid": "2b92255cc35fe13393b605334090356c", "score": "0.6359882", "text": "func getTasks(supportProjectId string) ([]Task, error) {\n\tprojectRespData := getAsanaResponse(parseURL(AsanaBase + \"/projects/\" + supportProjectId + \"/tasks\"))\n\n\tvar projectResp Response\n\t// unmarshal the data to the response object\n\tjson.Unmarshal(projectRespData, &projectResp)\n\tif len(projectResp.Errors) > 0 {\n\t\treturn nil, errors.New(fmtApiErrors(projectResp.Errors))\n\t}\n\tvar tasks []Task\n\tfor i := 0; i < len(projectResp.Resources); i++ {\n\t\t// Get the task response data\n\t\ttask, err := getTask(projectResp.Resources[i].Gid)\n\t\tif err != nil {\n\t\t\treturn tasks, err\n\t\t}\n\t\t// append the task responses into the array\n\t\ttasks = append(tasks, task)\n\t\tfmt.Println(\"task: \" + task.Gid)\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "5b992487fa09a5dfbdf81f76b90fb1f3", "score": "0.62989444", "text": "func getTasks(w io.Writer, r *http.Request) error {\n\tc := appengine.NewContext(r)\n\n\t// Get the list key from the url and decode it.\n\tlistKey, err := datastore.DecodeKey(mux.Vars(r)[\"list\"])\n\tif err != nil {\n\t\treturn AppErrorf(http.StatusBadRequest, \"invalid list id\")\n\t}\n\n\t// Fetch all the tasks from datastore.\n\ttasks := make([]*Task, 0)\n\tkeys, err := datastore.NewQuery(taskKind).Ancestor(listKey).GetAll(c, &tasks)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"fetch tasks: %v\", err)\n\t}\n\n\t// Update the encoded keys and encode the tasks.\n\tfor i, key := range keys {\n\t\ttasks[i].ID = key.IntID()\n\t}\n\treturn json.NewEncoder(w).Encode(tasks)\n}", "title": "" }, { "docid": "a43f279aeea3369b37963eb9a9bb68c4", "score": "0.6297943", "text": "func (i *Introspector) GetTasks() (*AgentTasks, error) {\n\n\ttasks := &AgentTasks{}\n\tif err := i.get(\"v1/tasks\", tasks); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "91680a8266a2f5f217d3f2942ba17d46", "score": "0.62957245", "text": "func GetTask(name, content, operator, serviceUID string, id uint, ctmin, ctmax int, revision uint) []model.Task {\n\tvar whereStr = \"1=1 \"\n\tvar args = make([]interface{}, 0)\n\tvar tasks = make([]model.Task, 0)\n\n\tif name != \"\" {\n\t\twhereStr += \"and name like ?\"\n\t\targs = append(args, name)\n\t}\n\tif content != \"\" {\n\t\twhereStr += \"and content like ?\"\n\t\targs = append(args, content)\n\t}\n\tif operator != \"\" {\n\t\twhereStr += \"and operator like ?\"\n\t\targs = append(args, operator)\n\t}\n\tif serviceUID != \"\" {\n\t\twhereStr += \"and service_uid like ?\"\n\t\targs = append(args, serviceUID)\n\t}\n\tif id != 0 {\n\t\twhereStr += \"and id = ?\"\n\t\targs = append(args, id)\n\t}\n\tif ctmin != 0 {\n\t\twhereStr += \"and create_time > ?\"\n\t\targs = append(args, ctmin)\n\t}\n\tif ctmax != 0 {\n\t\twhereStr += \"and create_time < ?\"\n\t\targs = append(args, ctmax)\n\t}\n\tif revision != 0 {\n\t\twhereStr += \"and revision = ?\"\n\t\targs = append(args, revision)\n\t}\n\n\tif e := db.Where(whereStr, args...).Order(\"created_at desc\").Find(&tasks).Error; e != nil {\n\t\tlog.Info(\"[service] GetTask fail\", \"error\", e.Error())\n\t}\n\n\treturn tasks\n}", "title": "" }, { "docid": "691117c08fd97b0a4715a4fa32311110", "score": "0.6283048", "text": "func filterTasks(\n\ttasks map[string]*RMTask,\n\tjobID string,\n\trespoolID string,\n\tstates []string,\n) []*RMTask {\n\tvar result []*RMTask\n\n\tfor _, t := range tasks {\n\t\t// filter by jobID\n\t\tif jobID != \"\" && t.Task().GetJobId().GetValue() != jobID {\n\t\t\tcontinue\n\t\t}\n\n\t\t// filter by resource pool ID\n\t\tif respoolID != \"\" && t.Respool().ID() != respoolID {\n\t\t\tcontinue\n\t\t}\n\n\t\t// filter by task states\n\t\tif len(states) > 0 &&\n\t\t\t!util.Contains(states, t.GetCurrentState().State.String()) {\n\t\t\tcontinue\n\t\t}\n\n\t\tresult = append(result, t)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "e6ebc81c500e9af91c2133ca2b589182", "score": "0.6260914", "text": "func getAllTasks(t *testing.T) []Task {\n\tt.Helper()\n\tresp, err := http.Get(serverAddress() + \"/task/\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tdefer resp.Body.Close()\n\n\tenforceContentJSON(t, resp)\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tvar tasks []Task\n\tif err := json.Unmarshal(body, &tasks); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn tasks\n}", "title": "" }, { "docid": "a478cc8bcaafeda44491221ad0723e65", "score": "0.62217355", "text": "func (db *MongoDB) ListTasks(ctx context.Context, req *tes.ListTasksRequest) (*tes.ListTasksResponse, error) {\n\tsess := db.sess.Copy()\n\tdefer sess.Close()\n\n\tpageSize := tes.GetPageSize(req.GetPageSize())\n\n\tvar query = bson.M{}\n\tvar q *mgo.Query\n\tvar err error\n\tif req.PageToken != \"\" {\n\t\tquery[\"id\"] = bson.M{\"$lt\": req.PageToken}\n\t}\n\n\tif req.State != tes.Unknown {\n\t\tquery[\"state\"] = bson.M{\"$eq\": req.State}\n\t}\n\n\tfor k, v := range req.Tags {\n\t\tquery[fmt.Sprintf(\"tags.%s\", k)] = bson.M{\"$eq\": v}\n\t}\n\n\tq = db.tasks(sess).Find(query).Sort(\"-creationtime\").Limit(pageSize)\n\n\tswitch req.View {\n\tcase tes.TaskView_BASIC:\n\t\tq = q.Select(basicView)\n\tcase tes.TaskView_MINIMAL:\n\t\tq = q.Select(minimalView)\n\t}\n\n\tvar tasks []*tes.Task\n\terr = q.All(&tasks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tout := tes.ListTasksResponse{\n\t\tTasks: tasks,\n\t}\n\t// TODO figure out when not to return a next page token\n\tif len(tasks) > 0 {\n\t\tout.NextPageToken = tasks[len(tasks)-1].Id\n\t}\n\n\treturn &out, nil\n}", "title": "" }, { "docid": "9996847d11e43c7b8bf6297e10e2e185", "score": "0.6220121", "text": "func GetTasksHandler(w http.ResponseWriter, r *http.Request) {\n\tsessionID, err := auth.GetSessionIDFromRequest(w, r)\n\tif err != nil {\n\t\treturn\n\t}\n\tif auth.CheckPermission(sessionID, auth.AdminRole, \"\") == false {\n\t\tcommon.SendError(w, r, http.StatusForbidden, auth.NotAdminResponse, nil)\n\t\treturn\n\t}\n\ttasks, err := model.GetTasks()\n\n\tif err != nil {\n\t\tcommon.SendNotFound(w, r, \"ERROR: Can't get tasks\", err)\n\t\treturn\n\t}\n\n\tcommon.RenderJSON(w, r, tasks)\n}", "title": "" }, { "docid": "92959aaa24cb72088ed8c9536981f248", "score": "0.61887896", "text": "func (o *InlineResponse20089SearchResult) GetTasks() []InlineResponse20089SearchResultTasks {\n\tif o == nil || o.Tasks == nil {\n\t\tvar ret []InlineResponse20089SearchResultTasks\n\t\treturn ret\n\t}\n\treturn *o.Tasks\n}", "title": "" }, { "docid": "1c3f28c99161ebef4deec0cd10c227ad", "score": "0.6185491", "text": "func GetShowsWithTasks() (shows []Show, err error) {\n\terr = DB.Where(\"task != ''\").Find(&shows).Error\n\treturn\n}", "title": "" }, { "docid": "30f6436da6f5bfe7d08cf47a876f43bf", "score": "0.6177521", "text": "func (client Client) ListTasks(labelQuery map[string]string) (api.TaskList, error) {\n\tpath := \"tasks\"\n\tif labelQuery != nil && len(labelQuery) > 0 {\n\t\tpath += \"?labels=\" + EncodeLabelQuery(labelQuery)\n\t}\n\tvar result api.TaskList\n\t_, err := client.rawRequest(\"GET\", path, nil, &result)\n\treturn result, err\n}", "title": "" }, { "docid": "aaf99013182a6736be10f7601a1009b9", "score": "0.6126302", "text": "func (task *TaskRPCs) GetSubTasks(ctx iris.Context) {\n\tdefer ctx.Next()\n\tctxt := ctx.Request().Context()\n\treq := &taskproto.GetTaskRequest{\n\t\tTaskID: ctx.Params().Get(\"TaskID\"),\n\t\tSessionToken: ctx.Request().Header.Get(AuthTokenHeader),\n\t}\n\tresponse, err := task.GetSubTasksRPC(ctxt, req)\n\tcommon.SetResponseHeader(ctx, response.Header)\n\tl.LogWithFields(ctxt).Debugf(\"Incoming request received for getting sub tasks collections with taskid %s\", req.TaskID)\n\tif err != nil {\n\t\terrorMessage := \"RPC error: \" + err.Error()\n\t\tl.LogWithFields(ctxt).Error(errorMessage)\n\t\tresponse := common.GeneralError(http.StatusInternalServerError, errResponse.InternalError, errorMessage, nil, nil)\n\t\tctx.StatusCode(http.StatusInternalServerError)\n\t\tctx.JSON(&response.Body)\n\t\treturn\n\t}\n\tl.LogWithFields(ctxt).Debugf(\"Outgoing response for getting sub tasks is %s with status code %d\", string(response.Body), int(response.StatusCode))\n\tctx.ResponseWriter().Header().Set(\"Allow\", \"GET\")\n\tsendTaskResponse(ctx, response)\n}", "title": "" }, { "docid": "2b7b895deaae2bb25a7de23688946b74", "score": "0.6124597", "text": "func (r *ResourceManager) ListTasks(filterContext *model.FilterContext, opts *list.Options) ([]*model.Task, int, string, error) {\n\ttasks, totalSize, nextPageToken, err := r.taskStore.ListTasks(filterContext, opts)\n\tif err != nil {\n\t\treturn nil, 0, \"\", util.Wrap(err, \"Failed to list tasks\")\n\t}\n\treturn tasks, totalSize, nextPageToken, nil\n}", "title": "" }, { "docid": "ed4837f8f3ce6d3c8128a48ec184d2a3", "score": "0.6103937", "text": "func (s *AppService) GetAllTasks(ctx context.Context, lastTaskId int64, userId int64, limit int) ([]models.Task, error) {\n\treturn s.appRepo.GetAllTasks(ctx, lastTaskId, userId, limit)\n}", "title": "" }, { "docid": "e4e207a5273419a101d372d16bd0ceef", "score": "0.6089516", "text": "func (m *PrintJob) GetTasks()([]PrintTaskable) {\n val, err := m.GetBackingStore().Get(\"tasks\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]PrintTaskable)\n }\n return nil\n}", "title": "" }, { "docid": "c6e27f1793b7614c8b88378c77211b72", "score": "0.607582", "text": "func (h *Handler) GetTasksInGroup(group string) []Task {\n\tts := []Task{}\n\tfor _, t := range h.tasks {\n\t\tif t.group == group {\n\t\t\tts = append(ts, t)\n\t\t}\n\t}\n\treturn ts\n}", "title": "" }, { "docid": "9eca9dedee508b06bb32b66eeae87405", "score": "0.6052232", "text": "func GetServiceTasks(ctx context.Context, serviceID string) (r []swarm.Task, err error) {\n\terr = withCli(func(cli *client.Client) error {\n\t\tr, err = cli.TaskList(ctx, types.TaskListOptions{\n\t\t\tFilters: filters.NewArgs(filters.Arg(\"service\", serviceID)),\n\t\t})\n\n\t\treturn err\n\t})\n\n\treturn r, err\n}", "title": "" }, { "docid": "3f87a2f3e46965bc99ed63854e5b659b", "score": "0.60290384", "text": "func GetTaskList(ctx context.Context, id int64) (TaskList, error) {\n\tvar a TaskList\n\tif _, ok := SessionCheck(ctx); !ok {\n\t\treturn a, ErrSessionRequired\n\t}\n\tvar row *sql.Row\n\tfields := []interface{}{id}\n\tif tx, ok := DBTxFromContext(ctx); ok { // if transaction is supplied\n\t\tstmt := tx.Stmt(RRdb.Prepstmt.GetTaskList)\n\t\tdefer stmt.Close()\n\t\trow = stmt.QueryRow(fields...)\n\t} else {\n\t\trow = RRdb.Prepstmt.GetTaskList.QueryRow(fields...)\n\t}\n\treturn a, ReadTaskList(row, &a)\n}", "title": "" }, { "docid": "d897f489e61fdbf9c29c1d6bb9157195", "score": "0.60191005", "text": "func GetProjectTasks(w http.ResponseWriter, r *http.Request) {\n\tcontext := NewContext()\n\tdefer context.Close()\n\tcol := context.DbCollection(\"projecttasks\")\n\trepo := &data.ProjectRepository{C: col}\n\tprojectTasks := repo.GetProjectTasks()\n\n\tj, err := json.Marshal(ProjectTasksResource{Data: projectTasks})\n\tif err != nil {\n\t\tcommon.DisplayAppError(\n\t\t\tw, \n\t\t\terr, \n\t\t\t\"An unexpected error has occured\", \n\t\t\t500,\n\t\t)\n\t\treturn\n\t}\n\n\tw.WriteHeader(http.StatusOK)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(j)\n}", "title": "" }, { "docid": "ebd64b2edce07c8cf30565ede33d088f", "score": "0.6000445", "text": "func getTasks(r io.Reader, args ...string) ([]string, error) {\n\tvar tasks []string\n\tif len(args) > 0 {\n\t\ttasks = append(tasks, strings.Join(args, \" \"))\n\t\treturn tasks, nil\n\t}\n\n\ts := bufio.NewScanner(r)\n\tfor s.Scan() {\n\t\tif err := s.Err(); err != nil {\n\t\t\treturn tasks, err\n\t\t}\n\t\tif len(s.Text()) == 0 {\n\t\t\treturn tasks, fmt.Errorf(\"Task cannot be blank\")\n\t\t}\n\t\ttasks = append(tasks, s.Text())\n\t}\n\treturn tasks, nil\n}", "title": "" }, { "docid": "70c52592a0a8e3a3691d70fa12c3e3b5", "score": "0.60000694", "text": "func (o *PlannerWorkloadPlannersResponseIncluded) GetTasks() map[string]ViewTask {\n\tif o == nil || o.Tasks == nil {\n\t\tvar ret map[string]ViewTask\n\t\treturn ret\n\t}\n\treturn *o.Tasks\n}", "title": "" }, { "docid": "83fe7e6585ef89a8debd6983d81194ac", "score": "0.59925425", "text": "func (o *PlannerBucket) GetTasks() []MicrosoftGraphPlannerTask {\n\tif o == nil || o.Tasks == nil {\n\t\tvar ret []MicrosoftGraphPlannerTask\n\t\treturn ret\n\t}\n\treturn *o.Tasks\n}", "title": "" }, { "docid": "46d2a4d61ea9205159b8af36150b8c61", "score": "0.5989218", "text": "func (c *Client) ListTasks() ([]byte, error) {\n\turl := c.psUrl + \"/tasks\"\n\n\tc.logger.Debug(\"Listing tasks\")\n\n\tresp, err := c.httpClient.Get(url)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error performing request\")\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error reading response body\")\n\t}\n\n\tc.logger.Debug(\"Got tasks from the ps\")\n\n\treturn body, nil\n}", "title": "" }, { "docid": "b19e3129a5ed335a9420b3a09f193066", "score": "0.59835327", "text": "func (m *OutlookTaskFolder) GetTasks()([]OutlookTaskable) {\n val, err := m.GetBackingStore().Get(\"tasks\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]OutlookTaskable)\n }\n return nil\n}", "title": "" }, { "docid": "dfcb9f0a1789f6dc8cc691f63c972849", "score": "0.5976906", "text": "func GetDisabledTasks() []*Task {\n\ttasks := make([]*Task, 0)\n\tfor k, v := range tm.disabledTasks {\n\t\tif v {\n\t\t\ttasks = append(tasks, tm.tasks[k])\n\t\t}\n\t}\n\treturn tasks\n}", "title": "" }, { "docid": "734713e2818342e4225a51ddd5c5135a", "score": "0.5974055", "text": "func (mdb *db) SelectFromTasks(\n\tctx context.Context,\n\tfilter sqlplugin.TasksFilter,\n) ([]sqlplugin.TasksRow, error) {\n\tvar err error\n\tvar rows []sqlplugin.TasksRow\n\tswitch {\n\tcase filter.ExclusiveMaxTaskID != nil:\n\t\terr = mdb.conn.SelectContext(ctx,\n\t\t\t&rows, getTaskMinMaxQry,\n\t\t\tfilter.RangeHash,\n\t\t\tfilter.TaskQueueID,\n\t\t\t*filter.InclusiveMinTaskID,\n\t\t\t*filter.ExclusiveMaxTaskID,\n\t\t\t*filter.PageSize,\n\t\t)\n\tdefault:\n\t\terr = mdb.conn.SelectContext(ctx,\n\t\t\t&rows, getTaskMinQry,\n\t\t\tfilter.RangeHash,\n\t\t\tfilter.TaskQueueID,\n\t\t\t*filter.InclusiveMinTaskID,\n\t\t\t*filter.PageSize,\n\t\t)\n\t}\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn rows, nil\n}", "title": "" }, { "docid": "28afffd47362f665be4aad860f47ffdc", "score": "0.5973281", "text": "func (s *Server) ListTasks(ctx context.Context, in *tasks.ListTasksRequest) (*tasks.ListTasksResponse, error) {\n\t// TODO: Implement pageing of some sort\n\tqueue, _ := s.qs[in.GetParent()]\n\n\tvar taskStates []*tasks.Task\n\n\tfor _, task := range queue.ts {\n\t\tif task != nil {\n\t\t\ttaskStates = append(taskStates, task.state)\n\t\t}\n\t}\n\n\treturn &tasks.ListTasksResponse{\n\t\tTasks: taskStates,\n\t}, nil\n}", "title": "" }, { "docid": "2a0f9e7d8de5d60061ed2e9b0e38dff6", "score": "0.59696174", "text": "func (c *Client) ListTasks(ctx context.Context, path string, userID *string) (*http.Response, error) {\n\treq, err := c.NewListTasksRequest(ctx, path, userID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn c.Client.Do(ctx, req)\n}", "title": "" }, { "docid": "e4c92a2835799c704001ab593d1c6d87", "score": "0.59667176", "text": "func AdminListTaskQueueTasks(c *cli.Context) error {\n\tnamespace, err := getRequiredOption(c, FlagNamespace)\n\tif err != nil {\n\t\treturn err\n\t}\n\ttqName := c.String(FlagTaskQueue)\n\ttlTypeInt, err := stringToEnum(c.String(FlagTaskQueueType), enumspb.TaskQueueType_value)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"invalid task queue type: %v\", err)\n\t}\n\ttqType := enumspb.TaskQueueType(tlTypeInt)\n\tif tqType == enumspb.TASK_QUEUE_TYPE_UNSPECIFIED {\n\t\treturn fmt.Errorf(\"missing Task Queue type\")\n\t}\n\tminTaskID := c.Int64(FlagMinTaskID)\n\tmaxTaskID := c.Int64(FlagMaxTaskID)\n\tpageSize := defaultPageSize\n\tif c.IsSet(FlagPageSize) {\n\t\tpageSize = c.Int(FlagPageSize)\n\t}\n\tworkflowID := c.String(FlagWorkflowID)\n\trunID := c.String(FlagRunID)\n\n\tclient := cFactory.AdminClient(c)\n\n\treq := &adminservice.GetTaskQueueTasksRequest{\n\t\tNamespace: namespace,\n\t\tTaskQueue: tqName,\n\t\tTaskQueueType: tqType,\n\t\tMinTaskId: minTaskID,\n\t\tMaxTaskId: maxTaskID,\n\t\tBatchSize: int32(pageSize),\n\t}\n\n\tctx, cancel := newContext(c)\n\tdefer cancel()\n\tpaginationFunc := func(paginationToken []byte) ([]interface{}, []byte, error) {\n\t\treq.NextPageToken = paginationToken\n\t\tresponse, err := client.GetTaskQueueTasks(ctx, req)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\ttasks := response.Tasks\n\t\tif workflowID != \"\" {\n\t\t\tfilteredTasks := tasks[:0]\n\n\t\t\tfor _, task := range tasks {\n\t\t\t\tif task.Data.WorkflowId != workflowID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif runID != \"\" && task.Data.RunId != runID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfilteredTasks = append(filteredTasks, task)\n\t\t\t}\n\n\t\t\ttasks = filteredTasks\n\t\t}\n\n\t\tvar items []interface{}\n\t\tfor _, task := range tasks {\n\t\t\titems = append(items, task)\n\t\t}\n\t\treturn items, nil, nil\n\t}\n\n\tif err := paginate(c, paginationFunc, pageSize); err != nil {\n\t\treturn fmt.Errorf(\"unable to list Task Queue Tasks: %v\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "17480ae18402c56280c83cf7786f598b", "score": "0.59526813", "text": "func AdminListTaskQueueTasks(c *cli.Context) {\n\tnamespace := getRequiredOption(c, FlagNamespaceID)\n\ttlName := getRequiredOption(c, FlagTaskQueue)\n\ttlTypeInt, err := stringToEnum(c.String(FlagTaskQueueType), enumspb.TaskQueueType_value)\n\tif err != nil {\n\t\tErrorAndExit(\"Failed to parse TaskQueue Type\", err)\n\t}\n\ttlType := enumspb.TaskQueueType(tlTypeInt)\n\tif tlType == enumspb.TASK_QUEUE_TYPE_UNSPECIFIED {\n\t\tErrorAndExit(\"TaskQueue type Unspecified is currently not supported\", nil)\n\t}\n\tminReadLvl := getRequiredInt64Option(c, FlagMinReadLevel)\n\tmaxReadLvl := getRequiredInt64Option(c, FlagMaxReadLevel)\n\tworkflowID := c.String(FlagWorkflowID)\n\trunID := c.String(FlagRunID)\n\n\tpFactory := CreatePersistenceFactory(c)\n\ttaskManager, err := pFactory.NewTaskManager()\n\tif err != nil {\n\t\tErrorAndExit(\"Failed to initialize task manager\", err)\n\t}\n\n\treq := &persistence.GetTasksRequest{NamespaceID: namespace, TaskQueue: tlName, TaskType: tlType, ReadLevel: minReadLvl, MaxReadLevel: &maxReadLvl}\n\tpaginationFunc := func(paginationToken []byte) ([]interface{}, []byte, error) {\n\t\tresponse, err := taskManager.GetTasks(req)\n\t\tif err != nil {\n\t\t\treturn nil, nil, err\n\t\t}\n\n\t\ttasks := response.Tasks\n\t\tif workflowID != \"\" {\n\t\t\tfilteredTasks := tasks[:0]\n\n\t\t\tfor _, task := range tasks {\n\t\t\t\tif task.Data.WorkflowId != workflowID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif runID != \"\" && task.Data.RunId != runID {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tfilteredTasks = append(filteredTasks, task)\n\t\t\t}\n\n\t\t\ttasks = filteredTasks\n\t\t}\n\n\t\tvar items []interface{}\n\t\tfor _, task := range tasks {\n\t\t\titems = append(items, task)\n\t\t}\n\t\treturn items, nil, nil\n\t}\n\n\tpaginate(c, paginationFunc)\n}", "title": "" }, { "docid": "5674702c344cdf77a2eb0a526a8e1d0d", "score": "0.59499985", "text": "func (o *TaskCustomFieldTasksResponseIncluded) GetTasks() map[string]ViewTask {\n\tif o == nil || o.Tasks == nil {\n\t\tvar ret map[string]ViewTask\n\t\treturn ret\n\t}\n\treturn *o.Tasks\n}", "title": "" }, { "docid": "524d4b0cb549759a6af10383e585d363", "score": "0.5942725", "text": "func (ob *Timer) GetTasks() map[string]*TimerTask {\n\treturn ob.Tasks\n}", "title": "" }, { "docid": "2154742c46d3ef2a729d16db2e3a1f7f", "score": "0.5942677", "text": "func TasksGetAll() http.HandlerFunc {\n\treturn http.HandlerFunc(func(w http.ResponseWriter, _ *http.Request) {\n\t\ttasks := service.AllTasks()\n\t\tjs, err := json.Marshal(tasks)\n\t\tif err != nil {\n\t\t\tSetErrorResponse(w, http.StatusInternalServerError, \"\")\n\t\t\treturn\n\t\t}\n\t\tw.Write(js)\n\t})\n}", "title": "" }, { "docid": "26f4f5cd601d1bdddf2b0e5ae4a85445", "score": "0.59374213", "text": "func (taskController TaskController) ListTasks(id string) ([]models.TaskList, error) {\n\t// Verify id is ObjectId, otherwise return error\n\tif !bson.IsObjectIdHex(id) {\n\t\treturn nil, fmt.Errorf(\"Invalid ID\")\n\t}\n\t// Grab id\n\tobjectID := bson.ObjectIdHex(id)\n\n\t// get tasks from mongo\n\n\tnow := time.Now().UTC()\n\n\ttasks := []models.TaskList{}\n\terr := taskController.Session.DB(\"advanced_computer_lab\").C(\"tasks\").Find(bson.M{\"userID\": objectID, \"startDateTime\": bson.M{\"$gte\": now}}).Select(bson.M{\"_id\": 1, \"title\": 1, \"startDateTime\": 1}).Sort(\"startDateTime\").All(&tasks)\n\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Unable to get task with id: %s . %v\", id, err)\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "f4ea5ccec712d040ea935d0bb60831ca", "score": "0.5930513", "text": "func (v *RespondCrossClusterTasksCompletedResponse) GetTasks() (o []*CrossClusterTaskRequest) {\n\tif v != nil && v.Tasks != nil {\n\t\treturn v.Tasks\n\t}\n\treturn\n}", "title": "" }, { "docid": "4776c57545ae68c36575159fd9aad238", "score": "0.5921622", "text": "func (m *MockBackendClient) GetTasks(arg0 types.TaskListOptions) ([]swarm.Task, error) {\n\tret := m.ctrl.Call(m, \"GetTasks\", arg0)\n\tret0, _ := ret[0].([]swarm.Task)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "c464fb2a57a93c76bbc0faa5b2ebc9c3", "score": "0.59056264", "text": "func Tasks(in tqtesting.TaskList) tqtesting.TaskList {\n\tret := make(tqtesting.TaskList, 0, len(in))\n\tfor _, t := range in.SortByETA() {\n\t\tswitch t.Payload.(type) {\n\t\tcase *eventpb.ManageRunTask, *eventpb.KickManageRunTask:\n\t\t\tret = append(ret, t)\n\t\t}\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "e97b044420d8982b3567d156d81ceb81", "score": "0.5903927", "text": "func (c *highLevelClient) GetAllTasks(req ConnectorRequest) (GetAllTasksResponse, error) {\n\treturn c.client.GetAllTasks(req)\n}", "title": "" }, { "docid": "52710a0aa91ff247ea569da0022e7d88", "score": "0.5890953", "text": "func (d *Info) GetTasks(user string) (etcd.Nodes, error) {\n\tresp, err := d.Get(path.Join(DDLInfo, user, TaskQueue), true, true)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp.Node.Nodes, nil\n}", "title": "" }, { "docid": "06869ffb27da80d1f72b3e0db108e928", "score": "0.5878609", "text": "func ListTasks() ([]Task, error) {\n\tdb := OpenDb()\n\tdefer db.Close()\n\tvar taskList []Task\n\terr := db.View(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(bucketName))\n\n\t\tc := b.Cursor()\n\t\tvar temp Task\n\t\tfor k, v := c.First(); k != nil; k, v = c.Next() {\n\t\t\ttemp.Key = btoi(k)\n\t\t\ttemp.Value = string(v)\n\t\t\ttaskList = append(taskList, temp)\n\t\t}\n\n\t\treturn nil\n\t})\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn taskList, nil\n}", "title": "" }, { "docid": "efabe97f35b704d2b27586fc1e9ed336", "score": "0.586989", "text": "func listTasks(c *context, w http.ResponseWriter, r *http.Request) {\n\tvar (\n\t\tallStr = r.URL.Query().Get(\"all\")\n\t\tall = false\n\t\terr error\n\t\tlistTaskResp *api.ListTasksResponse\n\t\ttasks []*api.Task\n\t)\n\n\tif len(strings.TrimSpace(allStr)) != 0 && allStr == \"1\" {\n\t\tall = true\n\t}\n\n\tif listTaskResp, err = c.swarmkitAPI.ListTasks(ct.TODO(), &api.ListTasksRequest{}); err != nil {\n\t\terrResponse(w, r, err, c)\n\t\treturn\n\t}\n\tfor _, t := range listTaskResp.Tasks {\n\t\tif all || t.DesiredState <= api.TaskStateRunning {\n\t\t\ttasks = append(tasks, t)\n\t\t}\n\t}\n\n\tc.render.JSON(w, http.StatusOK, tasks)\n}", "title": "" }, { "docid": "f7299b13cdcb2559abf52d2e5a56df7f", "score": "0.5864964", "text": "func GetQueryTaskIDs(taskType TaskType, query string, target string) ([]string, error) {\n\ttasksKeys, err := consulutil.GetKeys(consulutil.TasksPrefix)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttasks := make([]string, 0)\n\tfor _, taskKey := range tasksKeys {\n\t\tid := path.Base(taskKey)\n\t\tif ttyp, err := GetTaskType(id); err != nil {\n\t\t\t// Ignore errors\n\t\t\tlog.Printf(\"[WARNING] the task with id:%q won't be listed due to error:%+v\", id, err)\n\t\t\tcontinue\n\t\t} else if ttyp != taskType {\n\t\t\tcontinue\n\t\t}\n\n\t\texist, targetID, err := consulutil.GetStringValue(path.Join(taskKey, \"targetId\"))\n\t\tif err != nil {\n\t\t\t// Ignore errors\n\t\t\tlog.Printf(\"[WARNING] the task with id:%q won't be listed due to error:%+v\", id, err)\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Debugf(\"targetId:%q\", targetID)\n\t\tif exist && targetID != \"\" && strings.HasPrefix(targetID, query) && strings.HasSuffix(targetID, target) {\n\t\t\ttasks = append(tasks, id)\n\t\t}\n\t}\n\treturn tasks, nil\n}", "title": "" }, { "docid": "e4a62a73306dc1b1122808aaf57bb493", "score": "0.58357674", "text": "func runOperationTasksGetTasks(cmd *cobra.Command, args []string) error {\n\tappCli, err := makeClient(cmd, args)\n\tif err != nil {\n\t\treturn err\n\t}\n\t// retrieve flag values from cmd and fill params\n\tparams := tasks.NewGetTasksParams()\n\tif err, _ := retrieveOperationTasksGetTasksCountFlag(params, \"\", cmd); err != nil {\n\t\treturn err\n\t}\n\tif err, _ := retrieveOperationTasksGetTasksPageFlag(params, \"\", cmd); err != nil {\n\t\treturn err\n\t}\n\tif err, _ := retrieveOperationTasksGetTasksPeriodFlag(params, \"\", cmd); err != nil {\n\t\treturn err\n\t}\n\tif err, _ := retrieveOperationTasksGetTasksStatusFlag(params, \"\", cmd); err != nil {\n\t\treturn err\n\t}\n\tif dryRun {\n\n\t\tlogDebugf(\"dry-run flag specified. Skip sending request.\")\n\t\treturn nil\n\t}\n\t// make request and then print result\n\tmsgStr, err := parseOperationTasksGetTasksResult(appCli.Tasks.GetTasks(params, nil))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !debug {\n\n\t\tfmt.Println(msgStr)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "02983297ff9779336aafb76699b9e4a0", "score": "0.58271873", "text": "func (o *InlineResponse20015) GetTasks() []InlineResponse20015Tasks {\n\tif o == nil || o.Tasks == nil {\n\t\tvar ret []InlineResponse20015Tasks\n\t\treturn ret\n\t}\n\treturn *o.Tasks\n}", "title": "" }, { "docid": "ba708bebf6618e1e929b9730e428aec7", "score": "0.58182937", "text": "func (client *XenClient) TaskGetSubtasks(self string) (result []string, err error) {\n\tobj, err := client.APICall(\"task.get_subtasks\", self)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tresult = make([]string, len(obj.([]interface{})))\n\tfor i, value := range obj.([]interface{}) {\n\t\tresult[i] = value.(string)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "8ae33a3d9f33257f5451da7aa2587f7e", "score": "0.5817184", "text": "func (s *TaskService) Get(tasksQuery TasksQuery) (*resources.Resources[*Task], error) {\n\tpath, err := s.GetURITemplate().Expand(tasksQuery)\n\tif err != nil {\n\t\treturn &resources.Resources[*Task]{}, err\n\t}\n\n\tresponse, err := api.ApiGet(s.GetClient(), new(resources.Resources[*Task]), path)\n\tif err != nil {\n\t\treturn &resources.Resources[*Task]{}, err\n\t}\n\n\treturn response.(*resources.Resources[*Task]), nil\n}", "title": "" }, { "docid": "4f641aacc78c6eb186c643e83c8dca75", "score": "0.579539", "text": "func getTasks(session *mgo.Session) {\n\tsessionCopy := session.Copy()\n\tdefer sessionCopy.Close()\n\tcollection := sessionCopy.DB(AuthDatabase).C(\"tasks\")\n\n\tvar tasks []Task\n\terr := collection.Find(nil).All(&tasks)\n\tif err != nil {\n\t\tlog.Printf(\"getTasks ERROR: %s\\n\", err)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "f0ce4afa1f26bfd52202c5263333f53e", "score": "0.5760643", "text": "func GetTasks(username, status, category string) (types.Context, error) {\n\tlog.Println(\"getting tasks for \", status)\n\tvar tasks []types.Task\n\tvar task types.Task\n\tvar TaskCreated time.Time\n\tvar context types.Context\n\tvar getTaskSQL string\n\tvar rows *sql.Rows\n\n\tcomments, err := GetComments(username)\n\n\tif err != nil {\n\t\treturn context, err\n\t}\n\n\tbasicSQL := \"select t.id, title, content, created_date, priority, case when c.name is null then 'NA' else c.name end from task t, status s, user u left outer join category c on c.id=t.cat_id where u.username=? and s.id=t.task_status_id and u.id=t.user_id \"\n\tif category == \"\" {\n\t\tswitch status {\n\t\tcase \"pending\":\n\t\t\tgetTaskSQL = basicSQL + \" and s.status='PENDING' and t.hide!=1\"\n\t\tcase \"deleted\":\n\t\t\tgetTaskSQL = basicSQL + \" and s.status='DELETED' and t.hide!=1\"\n\t\tcase \"completed\":\n\t\t\tgetTaskSQL = basicSQL + \" and s.status='COMPLETE' and t.hide!=1\"\n\t\t}\n\n\t\tgetTaskSQL += \" order by t.created_date asc\"\n\n\t\trows = database.query(getTaskSQL, username, username)\n\t} else {\n\t\tstatus = category\n\t\t//This is a special case for showing tasks with null categories, we do a union query\n\t\tif category == \"UNCATEGORIZED\" {\n\t\t\tgetTaskSQL = \"select t.id, title, content, created_date, priority, 'UNCATEGORIZED' from task t, status s, user u where u.username=? and s.id=t.task_status_id and u.id=t.user_id and t.cat_id=0 and s.status='PENDING' order by priority desc, created_date asc, finish_date asc\"\n\t\t\trows, err = database.db.Query(getTaskSQL, username)\n\t\t} else {\n\t\t\tgetTaskSQL = basicSQL + \" and name = ? and s.status='PENDING' order by priority desc, created_date asc, finish_date asc\"\n\t\t\trows, err = database.db.Query(getTaskSQL, username, category)\n\t\t}\n\n\t\tif err != nil {\n\t\t\tlog.Println(\"tasks.go: something went wrong while getting query fetch tasks by category\")\n\t\t}\n\t}\n\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\ttask = types.Task{}\n\n\t\terr = rows.Scan(&task.Id, &task.Title, &task.Content, &TaskCreated, &task.Priority, &task.Category)\n\n\t\ttaskCompleted := 0\n\t\ttotalTasks := 0\n\n\t\tif strings.HasPrefix(task.Content, \"- [\") {\n\t\t\tfor _, value := range strings.Split(task.Content, \"\\n\") {\n\t\t\t\tif strings.HasPrefix(value, \"- [x]\") {\n\t\t\t\t\ttaskCompleted += 1\n\t\t\t\t}\n\t\t\t\ttotalTasks += 1\n\t\t\t}\n\t\t\ttask.CompletedMsg = strconv.Itoa(taskCompleted) + \" complete out of \" + strconv.Itoa(totalTasks)\n\t\t}\n\n\t\t// TaskContent = strings.Replace(TaskContent, \"\\n\", \"<br>\", -1)\n\t\tif err != nil {\n\t\t\tlog.Println(err)\n\t\t}\n\n\t\tif comments[task.Id] != nil {\n\t\t\ttask.Comments = comments[task.Id]\n\t\t}\n\n\t\tTaskCreated = TaskCreated.Local()\n\t\t// if task.Priority != \"1\" { // if priority is not 1 then calculate, else why bother?\n\t\t// CurrentTime := time.Now().Local()\n\t\t// diff := CurrentTime.Sub(TaskCreated).Hours()\n\t\t// if diff > 168 {\n\t\t// \ttask.IsOverdue = true // If one week then overdue by default\n\t\t// }\n\t\t// }\n\t\ttask.Created = TaskCreated.Format(\"Jan 2 2006\")\n\n\t\ttasks = append(tasks, task)\n\t}\n\tcontext = types.Context{Tasks: tasks, Navigation: status}\n\treturn context, nil\n}", "title": "" }, { "docid": "58e8fa6e8bacaa47ed11b7cba17edbc7", "score": "0.57112914", "text": "func getProjectTasks(c *cli.Context, w io.Writer) error {\n\terr := checkArgCount(c, 1)\n\tif err != nil {\n\t\treturn err\n\t}\n\tid := c.Args().First()\n\tstate := c.String(\"state\")\n\tkind := c.String(\"kind\")\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toptions := &photon.TaskGetOptions{\n\t\tState: state,\n\t\tKind: kind,\n\t}\n\n\ttaskList, err := client.Photonclient.Projects.GetTasks(id, options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = printTaskList(taskList.Items, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4264ae782cc90922db5b6cbac62baf2a", "score": "0.5692075", "text": "func getVMTasks(c *cli.Context, w io.Writer) error {\n\terr := checkArgCount(c, 1)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tid := c.Args().First()\n\tstate := c.String(\"state\")\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toptions := &photon.TaskGetOptions{\n\t\tState: state,\n\t}\n\n\ttaskList, err := client.Photonclient.VMs.GetTasks(id, options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif !utils.NeedsFormatting(c) {\n\t\terr = printTaskList(taskList.Items, c)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\tutils.FormatObjects(taskList, w, c)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a7f0ca2081ad922f0738cf75f07066e2", "score": "0.5685528", "text": "func (actor Actor) GetApplicationTasks(appGUID string, sortOrder SortOrder) ([]resources.Task, Warnings, error) {\n\ttasks, warnings, err := actor.CloudControllerClient.GetApplicationTasks(appGUID)\n\tactorWarnings := Warnings(warnings)\n\tif err != nil {\n\t\treturn nil, actorWarnings, err\n\t}\n\n\tallTasks := []resources.Task{}\n\tfor _, task := range tasks {\n\t\tallTasks = append(allTasks, resources.Task(task))\n\t}\n\n\tif sortOrder == Descending {\n\t\tsort.Slice(allTasks, func(i int, j int) bool { return allTasks[i].SequenceID > allTasks[j].SequenceID })\n\t} else {\n\t\tsort.Slice(allTasks, func(i int, j int) bool { return allTasks[i].SequenceID < allTasks[j].SequenceID })\n\t}\n\n\treturn allTasks, actorWarnings, nil\n}", "title": "" }, { "docid": "efa1f4f7ec7a42ec7e27f059ce273737", "score": "0.5667972", "text": "func TaskListFilter(name string) FilterOption {\n\treturn func(filterMap map[Filter]interface{}) {\n\t\tfilterMap[TaskListName] = name\n\t}\n}", "title": "" }, { "docid": "8b785540698f86c46113f377cf057945", "score": "0.56661326", "text": "func GetTasksHandler(w http.ResponseWriter, r *http.Request, getTasksFunc models.GetTasksFunc, tmplToExec string) {\n\tcookie, err := r.Cookie(\"token\")\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tusername, err := utils.GetCurrentUsername(cookie)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\ttasks, err := getTasksFunc(username)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\treturn\n\t}\n\n\tutils.ExecTemplate(w, tmplToExec, tasks)\n}", "title": "" }, { "docid": "4e40546140024e0f354c6db94d4bd14e", "score": "0.5665248", "text": "func AllTasks() []*Task {\n\treturn tasks\n}", "title": "" }, { "docid": "11d0035cc233b5934fa31b731a5dc1ad", "score": "0.56611264", "text": "func (s *BasecampService) Tasks() ([]*Task, error) {\n\tc := basecamp.Client{AccessToken: s.AccessToken}\n\tforeignObjects, err := c.GetTodoLists(s.AccountID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tvar tasks []*Task\n\tfor _, object := range foreignObjects {\n\t\ttodoList, err := c.GetTodoList(s.AccountID, object.ProjectId, object.Id)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tfor _, todo := range todoList.Todos.Remaining {\n\t\t\ttask := Task{\n\t\t\t\tForeignID: todo.Id,\n\t\t\t\tName: fmt.Sprintf(\"[%s] %s\", object.Name, todo.Content),\n\t\t\t\tActive: true,\n\t\t\t\tforeignProjectID: object.ProjectId,\n\t\t\t}\n\t\t\ttasks = append(tasks, &task)\n\t\t}\n\t}\n\treturn tasks, nil\n}", "title": "" }, { "docid": "5541096da8522987c15cd869f4cc4867", "score": "0.56475437", "text": "func FetchTasks(w http.ResponseWriter, r *http.Request) {\n\tenableCors(&w)\n\tvar allTasks []Task\n\tcur, err := collection.Find(context.TODO(), bson.D{{}})\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t\treturn\n\t}\n\tfor cur.Next(context.TODO()) {\n\n\t\t// create a value into which the single document can be decoded\n\t\tvar elem Task\n\t\terr := cur.Decode(&elem)\n\t\tif err != nil {\n\t\t\tlog.Fatal(err)\n\t\t}\n\n\t\tallTasks = append(allTasks, elem)\n\t}\n\n\tif err := cur.Err(); err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(allTasks)\n\treturn\n}", "title": "" }, { "docid": "cf7a35f8ba0b269cb63485bc5c422bcc", "score": "0.56434", "text": "func (c oauthClient) Tasks() ([]wl.Task, error) {\n\tlists, err := c.Lists()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlistCount := len(lists)\n\tc.logger.Debug(\n\t\t\"tasks\",\n\t\tmap[string]interface{}{\"listCount\": listCount},\n\t)\n\n\ttasksChan := make(chan []wl.Task, listCount)\n\tidErrChan := make(chan idErr, listCount)\n\tfor _, l := range lists {\n\t\tgo func(list wl.List) {\n\t\t\tc.logger.Debug(\n\t\t\t\t\"tasks - getting tasks for list\",\n\t\t\t\tmap[string]interface{}{\"listID\": list.ID},\n\t\t\t)\n\t\t\ttasks, err := c.TasksForListID(list.ID)\n\t\t\tidErrChan <- idErr{idType: \"list\", id: list.ID, err: err}\n\t\t\ttasksChan <- tasks\n\t\t}(l)\n\t}\n\n\te := multiIDErr{}\n\tfor i := 0; i < listCount; i++ {\n\t\tidErr := <-idErrChan\n\t\tif idErr.err != nil {\n\t\t\tc.logger.Debug(\n\t\t\t\t\"tasks - error received getting tasks for list\",\n\t\t\t\tmap[string]interface{}{\"listID\": idErr.id, \"err\": err},\n\t\t\t)\n\t\t\te.addError(idErr)\n\t\t}\n\t}\n\n\ttotalTasks := []wl.Task{}\n\tfor i := 0; i < listCount; i++ {\n\t\ttasks := <-tasksChan\n\t\ttotalTasks = append(totalTasks, tasks...)\n\t}\n\n\tif len(e.errors()) > 0 {\n\t\treturn totalTasks, e\n\t}\n\n\treturn totalTasks, nil\n}", "title": "" }, { "docid": "7faa5690bad6882d23fce11481fc0a54", "score": "0.5640766", "text": "func (h *Handler) getKubeTasks(ctx context.Context, kubeID string) ([]*workflows.Task, error) {\n\tk, err := h.svc.Get(ctx, kubeID)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ttasks := make([]*workflows.Task, 0, len(k.Tasks))\n\n\tfor _, taskSet := range k.Tasks {\n\t\tfor _, taskID := range taskSet {\n\t\t\tt, err := h.repo.Get(ctx, workflows.Prefix, taskID)\n\n\t\t\t// If one of tasks not found we dont care, because\n\t\t\t// they may npt be created yet\n\t\t\tif err != nil {\n\t\t\t\tlogrus.Debugf(\"task %s not found\", taskID)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\ttask := &workflows.Task{}\n\t\t\terr = json.Unmarshal(t, task)\n\n\t\t\tif err != nil {\n\t\t\t\treturn nil, errors.Wrapf(err,\n\t\t\t\t\t\"get task %s\", taskID)\n\t\t\t}\n\n\t\t\ttasks = append(tasks, task)\n\t\t}\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "f40ff10f15f7df129e50dc593757762f", "score": "0.563724", "text": "func (h *Handler) getKubeTasks(ctx context.Context, kubeName string) ([]*workflows.Task, error) {\n\tdata, err := h.repo.GetAll(ctx, workflows.Prefix)\n\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"get cluster tasks\")\n\t}\n\n\ttasks := make([]*workflows.Task, 0)\n\tfor _, v := range data {\n\t\ttask := &workflows.Task{}\n\t\terr := json.Unmarshal(v, task)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"unmarshal task data\")\n\t\t}\n\n\t\tif task != nil && task.Config != nil && task.Config.ClusterName == kubeName {\n\t\t\ttasks = append(tasks, task)\n\t\t}\n\t}\n\n\treturn tasks, nil\n}", "title": "" }, { "docid": "a71fbb0edd124cafabff5b732d774bb6", "score": "0.56156546", "text": "func (h *Handler) FindTasks(c echo.Context) error {\n\n\tTasks, err := h.TaskService.FindTasks()\n\tif err != nil {\n\t\tlogger.Warn(err)\n\t\treturn respondWithErrorStatus(c, StatusBadRequest, err.Error())\n\t}\n\n\tlogger.Info(\"Successful attempt to get a list of Tasks\")\n\treturn respondWithData(c, Tasks)\n}", "title": "" }, { "docid": "560042f4e78ad14944aa1b2d4678779e", "score": "0.5615206", "text": "func ListTasks(store TaskLister, all bool, args []string) {\n\tlistType := db.Undone\n\tif all {\n\t\tlistType = db.All\n\t}\n\tlist, err := store.List(listType)\n\tif err != nil {\n\t\tfmt.Printf(\"error: %s\", err)\n\t\treturn\n\t}\n\tif len(list) == 0 {\n\t\tfmt.Println(\"No tasks\")\n\t}\n\n\tfor _, task := range list {\n\t\tif task.Done {\n\t\t\tfmt.Printf(\"%d. %s ✔\\n\", task.ID, task.Title)\n\t\t} else {\n\t\t\tfmt.Printf(\"%d. %s\\n\", task.ID, task.Title)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d634df2ed63c569722675942864b2d8e", "score": "0.56053257", "text": "func GetDeploymentTaskList(ctx context.Context, deploymentID string) ([]string, error) {\n\tkeys, err := consulutil.GetKeys(path.Join(consulutil.DeploymentKVPrefix, deploymentID, \"tasks\"))\n\tif err != nil {\n\t\treturn keys, err\n\t}\n\tfor i := range keys {\n\t\tkeys[i] = path.Base(keys[i])\n\t}\n\treturn keys, err\n}", "title": "" }, { "docid": "42b569a43b80a5a34eb3769983004e21", "score": "0.55810714", "text": "func (m *TaskManager) Tasks(ctx context.Context, all bool) ([]runtime.Task, error) {\n\treturn m.tasks.GetAll(ctx, all)\n}", "title": "" }, { "docid": "c75e6df54866b45fc6e8b84f27e8589d", "score": "0.55751413", "text": "func (s *Service) GetRouterTasks(routerID string, parameters connection.APIRequestParameters) ([]Task, error) {\n\treturn connection.InvokeRequestAll(func(p connection.APIRequestParameters) (*connection.Paginated[Task], error) {\n\t\treturn s.GetRouterTasksPaginated(routerID, p)\n\t}, parameters)\n}", "title": "" }, { "docid": "e17bea139f11cd610dd7bdceeb4b9659", "score": "0.5564043", "text": "func getResourceTicketTasks(c *cli.Context, w io.Writer) error {\n\terr := checkArgCount(c, 1)\n\tif err != nil {\n\t\treturn err\n\t}\n\tname := c.Args().First()\n\ttenantName := c.String(\"tenant\")\n\tstate := c.String(\"state\")\n\n\tclient.Photonclient, err = client.GetClient(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\ttenant, err := verifyTenant(tenantName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\trt, err := findResourceTicket(tenant.ID, name)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\toptions := &photon.TaskGetOptions{\n\t\tState: state,\n\t}\n\n\ttaskList, err := client.Photonclient.ResourceTickets.GetTasks(rt.ID, options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = printTaskList(taskList.Items, c)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b15c1bbb5179652c2efd3e51b7f5e6c7", "score": "0.55625755", "text": "func GetTektonPipelineRunTasks(accounts models.Accounts, w http.ResponseWriter, r *http.Request) {\n\t// swagger:operation GET /applications/{appName}/jobs/{jobName}/pipelineruns/{pipelineRunName}/tasks pipeline-job getTektonPipelineRunTasks\n\t// ---\n\t// summary: Gets list of pipeline run tasks of a pipeline-job\n\t// parameters:\n\t// - name: appName\n\t// in: path\n\t// description: name of Radix application\n\t// type: string\n\t// required: true\n\t// - name: jobName\n\t// in: path\n\t// description: Name of pipeline job\n\t// type: string\n\t// required: true\n\t// - name: pipelineRunName\n\t// in: path\n\t// description: Name of pipeline run\n\t// type: string\n\t// required: true\n\t// - name: Impersonate-User\n\t// in: header\n\t// description: Works only with custom setup of cluster. Allow impersonation of test users (Required if Impersonate-Group is set)\n\t// type: string\n\t// required: false\n\t// - name: Impersonate-Group\n\t// in: header\n\t// description: Works only with custom setup of cluster. Allow impersonation of test group (Required if Impersonate-User is set)\n\t// type: array\n\t// items:\n\t// type: string\n\t// required: false\n\t// responses:\n\t// \"200\":\n\t// description: \"List of Pipeline Run Tasks\"\n\t// schema:\n\t// type: \"array\"\n\t// items:\n\t// \"$ref\": \"#/definitions/PipelineRunTask\"\n\t// \"401\":\n\t// description: \"Unauthorized\"\n\t// \"404\":\n\t// description: \"Not found\"\n\tappName := mux.Vars(r)[\"appName\"]\n\tjobName := mux.Vars(r)[\"jobName\"]\n\tpipelineRunName := mux.Vars(r)[\"pipelineRunName\"]\n\n\thandler := Init(accounts, deployments.Init(accounts))\n\ttektonTasks, err := handler.GetTektonPipelineRunTasks(r.Context(), appName, jobName, pipelineRunName)\n\n\tif err != nil {\n\t\tradixhttp.ErrorResponse(w, r, err)\n\t\treturn\n\t}\n\n\tradixhttp.JSONResponse(w, r, tektonTasks)\n}", "title": "" }, { "docid": "02c309136109cd14b0b05797541c18d9", "score": "0.55579793", "text": "func WindowsGetTasks() (records []*Autorun) {\n\ttaskService, err := taskmaster.Connect()\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer taskService.Disconnect()\n\n\ttasks, err := taskService.GetRegisteredTasks()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor _, task := range tasks {\n\t\tfor _, action := range task.Definition.Actions {\n\t\t\tif action.GetType() == taskmaster.TASK_ACTION_EXEC {\n\t\t\t\tnewAutorun := stringToAutorun(\"task\", task.Path, action.(taskmaster.ExecAction).Path, task.Name, true)\n\t\t\t\trecords = append(records, newAutorun)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "7b46f391cde8adf7ea96d67ebf0f35d9", "score": "0.5552573", "text": "func (_class TaskClass) GetSubtasks(sessionID SessionRef, self TaskRef) (_retval []TaskRef, _err error) {\n\tif IsMock {\n\t\treturn _class.GetSubtasksMock(sessionID, self)\n\t}\t\n\t_method := \"task.get_subtasks\"\n\t_sessionIDArg, _err := convertSessionRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"session_id\"), sessionID)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_selfArg, _err := convertTaskRefToXen(fmt.Sprintf(\"%s(%s)\", _method, \"self\"), self)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_result, _err := _class.client.APICall(_method, _sessionIDArg, _selfArg)\n\tif _err != nil {\n\t\treturn\n\t}\n\t_retval, _err = convertTaskRefSetToGo(_method + \" -> \", _result.Value)\n\treturn\n}", "title": "" }, { "docid": "7b489a29006222b66de70a8e2adf5b21", "score": "0.5547358", "text": "func (client *XenClient) TaskGetAll() (result []string, err error) {\n\tobj, err := client.APICall(\"task.get_all\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tresult = make([]string, len(obj.([]interface{})))\n\tfor i, value := range obj.([]interface{}) {\n\t\tresult[i] = value.(string)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "51e43a372518c45334c402f070bc7b89", "score": "0.55411875", "text": "func ServeTasksList(w http.ResponseWriter, r *http.Request) {\n\tacc, ok := context.Get(r, \"account\").(*data.Account)\n\tif !ok {\n\t\thttp.Redirect(w, r, \"/\", http.StatusSeeOther)\n\t\treturn\n\t}\n\ttasks, err := data.ListTasksByAccountID(acc.ID)\n\tif err != nil {\n\t\tServeInternalServerError(w, r)\n\t\treturn\n\t}\n\terr = TplTasksList.Execute(w, TplTasksListValues{\n\t\tCommon: TplCommonValues{\n\t\t\tAccount: acc,\n\t\t},\n\t\tTasks: tasks,\n\t})\n\tif err != nil {\n\t\tServeInternalServerError(w, r)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "289c3d478a269eff90c599b023041e82", "score": "0.55319667", "text": "func GetAllTasks(conn redis.Conn, username string) []string {\n\tresults, err := redis.Strings(conn.Do(\"SMEMBERS\", username))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn results\n}", "title": "" }, { "docid": "6ed97aa15f0023c1c8eb23fd61d23f97", "score": "0.55201066", "text": "func (c *ProjectsLocationsJobsTaskGroupsTasksListCall) Filter(filter string) *ProjectsLocationsJobsTaskGroupsTasksListCall {\n\tc.urlParams_.Set(\"filter\", filter)\n\treturn c\n}", "title": "" }, { "docid": "62ed6d6ec9664d4b1107e20053f42644", "score": "0.5486702", "text": "func Tasks(exec boil.Executor, mods ...qm.QueryMod) taskQuery {\n\tmods = append(mods, qm.From(\"\\\"tasks\\\"\"))\n\treturn taskQuery{NewQuery(exec, mods...)}\n}", "title": "" }, { "docid": "fd3453238830b1e9440f422e3070bbf8", "score": "0.5467201", "text": "func (c oauthClient) TasksForListID(listID uint) ([]wl.Task, error) {\n\tif listID == 0 {\n\t\treturn nil, errors.New(\"listID must be > 0\")\n\t}\n\turl := fmt.Sprintf(\n\t\t\"%s/tasks?list_id=%d\",\n\t\tc.apiURL,\n\t\tlistID,\n\t)\n\n\treq, err := c.newGetRequest(url)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := c.do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn nil, fmt.Errorf(\"Unexpected response code %d - expected %d\", resp.StatusCode, http.StatusOK)\n\t}\n\n\ttasks := []transportTask{}\n\terr = json.NewDecoder(resp.Body).Decode(&tasks)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn tasksFromTransport(tasks)\n}", "title": "" }, { "docid": "a521cdd0a564057298dda1ad6639626e", "score": "0.5452051", "text": "func (tr *tracker) GetActiveTasks(\n\tjobID string,\n\trespoolID string,\n\tstates []string) map[string][]*RMTask {\n\ttr.lock.RLock()\n\tdefer tr.lock.RUnlock()\n\n\ttaskStates := make(map[string][]*RMTask)\n\n\tfor _, t := range filterTasks(tr.tasks, jobID, respoolID, states) {\n\t\ttaskState := t.GetCurrentState().State.String()\n\t\ttaskStates[taskState] = append(taskStates[taskState], t)\n\t}\n\n\tfor _, t := range filterTasks(tr.orphanTasks, jobID, respoolID, states) {\n\t\ttaskState := t.GetCurrentState().State.String()\n\t\ttaskStates[taskState] = append(taskStates[taskState], t)\n\t}\n\n\treturn taskStates\n}", "title": "" } ]
e085b6de8b11bc503adf516c0fd4f629
Read Implements Reader interface.
[ { "docid": "9b916429e7b5a3adf2e9ea22f317af10", "score": "0.0", "text": "func (o *odirectReader) Read(buf []byte) (n int, err error) {\n\tif o.err != nil && (len(o.buf) == 0 || o.freshRead) {\n\t\treturn 0, o.err\n\t}\n\tif o.buf == nil {\n\t\tif o.smallFile {\n\t\t\to.bufp = xlPoolSmall.Get().(*[]byte)\n\t\t} else {\n\t\t\to.bufp = xlPoolLarge.Get().(*[]byte)\n\t\t}\n\t}\n\tif o.freshRead {\n\t\to.buf = *o.bufp\n\t\tn, err = o.f.Read(o.buf)\n\t\tif err != nil && err != io.EOF {\n\t\t\tif isSysErrInvalidArg(err) {\n\t\t\t\tif err = disk.DisableDirectIO(o.f); err != nil {\n\t\t\t\t\to.err = err\n\t\t\t\t\treturn n, err\n\t\t\t\t}\n\t\t\t\tn, err = o.f.Read(o.buf)\n\t\t\t}\n\t\t\tif err != nil && err != io.EOF {\n\t\t\t\to.err = err\n\t\t\t\treturn n, err\n\t\t\t}\n\t\t}\n\t\tif n == 0 {\n\t\t\t// err is likely io.EOF\n\t\t\to.err = err\n\t\t\treturn n, err\n\t\t}\n\t\to.err = err\n\t\to.buf = o.buf[:n]\n\t\to.freshRead = false\n\t}\n\tif len(buf) >= len(o.buf) {\n\t\tn = copy(buf, o.buf)\n\t\to.freshRead = true\n\t\treturn n, o.err\n\t}\n\tn = copy(buf, o.buf)\n\to.buf = o.buf[n:]\n\t// There is more left in buffer, do not return any EOF yet.\n\treturn n, nil\n}", "title": "" } ]
[ { "docid": "61e5d373313f5c17cd335b1519b37bbe", "score": "0.74035615", "text": "func (r *Reader) Read(p []byte) (n int, err error)", "title": "" }, { "docid": "de1be758422f98e658f48d3b10268254", "score": "0.7290972", "text": "func (r MyReader) Read(b []byte) (int, error) {\n\tfmt.Printf(\"%q\",'A')\n\treturn 0, nil\n}", "title": "" }, { "docid": "d42db283677aca6a8d5f38a144b02073", "score": "0.72843844", "text": "func (m MyReader) Read(p []byte) (int, error) {\n\tp[0] = 'A'\n\treturn 1, nil\n}", "title": "" }, { "docid": "e2d703a2ec09506e7b647ddee0014772", "score": "0.72065294", "text": "func (mr MyReader) Read(x []byte) (int, error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tif d.err != nil {\n\t\treturn 0, d.err\n\t}\n\n}", "title": "" }, { "docid": "4ec6d24830b1f899192217518ebf3321", "score": "0.7201308", "text": "func (r *hadReader) Read(p []byte) (n int, err error) {\n\tr.isRead = true\n\treturn r.reader.Read(p)\n}", "title": "" }, { "docid": "d37aa16306aa603eebc79cd269592a22", "score": "0.71671605", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tn, err = r.Reader.Read(p)\n\tr.bar.Add(n)\n\treturn\n}", "title": "" }, { "docid": "2181df0cebe16f5cf11b00954b31b7fc", "score": "0.71424437", "text": "func (r *readType) Read(b []byte) (int, error) {\n\tif r.index >= len(r.content) {\n\t\treturn 0, io.EOF\n\t}\n\tn := copy(b, r.content[r.index:])\n\tr.index += n\n\treturn n, nil\n}", "title": "" }, { "docid": "60b0bf8de27305c40e857345f1af7665", "score": "0.7127251", "text": "func (r Reader) Read(p []byte) (n int, err error) {\n\tif r.ReadErr != nil {\n\t\treturn 0, r.ReadErr\n\t}\n\n\treturn 0, nil\n}", "title": "" }, { "docid": "0fd2072a64cd76b5ffa975095617e9cf", "score": "0.71011204", "text": "func (r *reader) Read(b []byte) (int, error) {\n\treturn r.r.Read(b)\n}", "title": "" }, { "docid": "7eb028027102ad00b053c524c3858c6c", "score": "0.7078313", "text": "func (ar *Reader) Read(b []byte) (int, error) {\n\tif ar.err != nil {\n\t\treturn 0, ar.err\n\t}\n\n\tif ar.data.R == nil {\n\t\treturn 0, os.ErrNotExist\n\t}\n\n\treturn ar.data.Read(b)\n}", "title": "" }, { "docid": "03eb3778e45ca42971bd535cfdeb1a6d", "score": "0.7072756", "text": "func (mr MyReader) Read(buffer []byte) (int, error) {\n\tbuffer[0] = 'A'\n\treturn 1, nil\n}", "title": "" }, { "docid": "55305449567ed5a8eb2f16866ff6757e", "score": "0.7040905", "text": "func (d *Data) Reader() *Reader", "title": "" }, { "docid": "4c34a59e16e4556622226754ea802a47", "score": "0.7025307", "text": "func (m *ManualReader) Read() (interface{}, error) {\n\treturn m.decoder.Decode(m.reader)\n}", "title": "" }, { "docid": "7eaf55c47d54910d6b1e6baf1b1fba75", "score": "0.6993279", "text": "func (rw IOAdaper) Read(p []byte) (n int, err error) {\n\tfmt.Println(\"how stupid this function\")\n\treturn 0, nil\n}", "title": "" }, { "docid": "ef9b25ab8b4a06a5b7160985125f7560", "score": "0.6956189", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\treturn r.r.Read(p)\n}", "title": "" }, { "docid": "e1d25ce6f39b6012422d3cbabf5bfd3f", "score": "0.69513285", "text": "func (c *Client) Read(name string) ([]byte, error) {\n\tf := c.Open(name)\n\tdefer f.Close()\n\treturn io.ReadAll(f)\n}", "title": "" }, { "docid": "ab5dc11aad45ad5161297ced37af2b0a", "score": "0.694974", "text": "func (c *T) Read(p []byte) (int, error) {\n\tif err := c.check(); err != nil {\n\t\treturn 0, err\n\t}\n\treturn c.ReadCloser.Read(p)\n}", "title": "" }, { "docid": "8b06a91bf2bf43c206d4fe82b3f979bf", "score": "0.69467676", "text": "func (r *rcReader) Read(v interface{}) error {\n\terr := binary.Read(r.reader, byteOrder, v)\n\treturn err\n}", "title": "" }, { "docid": "4f5185086fa61446771ec49b9ebc10e2", "score": "0.69272643", "text": "func (r *Reader) Read(n int) ([]byte, error) {\n\tif len(r.data) < n {\n\t\treturn []byte{}, errReader\n\t}\n\n\td := r.data[:n]\n\tr.advance(n)\n\n\treturn d, nil\n}", "title": "" }, { "docid": "a84f4afe5d132ab5d40b7128a4a0a03d", "score": "0.68958634", "text": "func (r *mReader) Read(v interface{}) error {\n\treturn binary.Read(r.pr, ByteOrder, v)\n}", "title": "" }, { "docid": "77c346257ab4e1389524df2cbc229411", "score": "0.68835557", "text": "func (rc *ReadCloser) Read(buffer []byte) (int, error) {\n\treturn rc.reader.Read(buffer)\n}", "title": "" }, { "docid": "baa75c3b93aa3246f04cdd82d4af3962", "score": "0.68712234", "text": "func (r MyReader) Read(s []byte) (n int, err error) {\n\ts = s[:cap(s)]\n\tfor i := range s {\n\t\ts[i] = 'A'\n\t}\n\treturn cap(s), nil\n}", "title": "" }, { "docid": "60c3e0fcf81ebb92a2cc1b77c91a0814", "score": "0.6865798", "text": "func (fr *Reader) Read() (interface{}, error) {\n\treturn fr.datum.Value, fr.datum.Err\n}", "title": "" }, { "docid": "515a1f283cde41be2c38c3bdeb66a67f", "score": "0.68617225", "text": "func (d *Data) Reader() *Reader {}", "title": "" }, { "docid": "464400fd05f717da985146c565d0c282", "score": "0.6855463", "text": "func (e *ObservableEditableBuffer) Read(q0 int, r []rune) (int, error) {\n\treturn e.f.b.Read(q0, r)\n}", "title": "" }, { "docid": "a87b017e58f2f06385769bd51d594043", "score": "0.68442035", "text": "func (rd *Reader) Read(p []byte) int {\n\tif rd.err != nil {\n\t\treturn 0\n\t}\n\tn, err := rd.R.Read(p)\n\trd.check(n, err)\n\treturn n\n}", "title": "" }, { "docid": "ee86502504bb093ac6d18aa7100dc6be", "score": "0.68321455", "text": "func (self *CStreamReaderT) Read(\n\tptr unsafe.Pointer,\n\tsize int64,\n\tn int64,\n) (ret int64) {\n\n\tcRet := C.cefingo_stream_reader_read((*C.cef_stream_reader_t)(self.pc_stream_reader), ptr, (C.size_t)(size), (C.size_t)(n))\n\n\tret = (int64)(cRet) // return GoObj\n\treturn ret\n}", "title": "" }, { "docid": "72f3b0d000241f20f805bb2e54c0cce3", "score": "0.68169266", "text": "func (rr *Reader) Read() (result interface{}, err interface{}) {\n\tdefer func() {\n\t\tif e := recover(); e != nil {\n\t\t\tresult, err = Nil, e\n\t\t}\n\t}()\n\trr.readToken()\n\treturn rr.parseExpression(), nil\n}", "title": "" }, { "docid": "d8bc81449a13d08cfbe086428d267120", "score": "0.6796867", "text": "func (r *BinReader) Read(offset int, length int) []byte {\n\treturn r.data[offset : offset+length]\n}", "title": "" }, { "docid": "34a5e0d22d4f792655d2ff0620ebd0c8", "score": "0.67537516", "text": "func (method *BasicGet) Read(reader io.Reader, protoVersion string) (err error) {\n\n\tmethod.Reserved1, err = ReadShort(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmethod.Queue, err = ReadShortstr(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tbits, err := ReadOctet(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmethod.NoAck = bits&(1<<0) != 0\n\n\treturn\n}", "title": "" }, { "docid": "7770f5fd72a43736f7b012963a60fb67", "score": "0.6751272", "text": "func (lr *countingReader) Read(p []byte) (n int, err error) {\n\tn, err = lr.r.Read(p)\n\tlr.n += int64(n)\n\treturn n, err\n}", "title": "" }, { "docid": "f2cc72186517241a0fafc40315f04664", "score": "0.67477334", "text": "func (c Client) Read() ([]byte, error) {\n\tif c.ReaderFunc != nil {\n\t\treturn c.ReaderFunc()\n\t}\n\treturn nil, ErrReadNotAllowed\n}", "title": "" }, { "docid": "63cd3f907229e36f5a80af6912afcd0c", "score": "0.6746847", "text": "func (ar *AtomicReader) Read(v Decoder) (n int, err error) {\n\n\tar.wrapper.decoder = v\n\n\tn, err = ar.reader.Read(&ar.wrapper)\n\tif err != nil {\n\t\treturn n, err\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "58bf3125fb2c8e8f8963e8abf2f99dac", "score": "0.6724798", "text": "func (i *Item) Read(p []byte) (n int, err error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\tc, err := i.ReadAt(p, i.offset)\n\ti.offset += int64(c)\n\treturn c, err\n}", "title": "" }, { "docid": "bb20eb94e5cc4a084bd489d8cabeafb3", "score": "0.67151237", "text": "func (handle *handle) Read(offset int64, size int) ([]byte, error) {\n\thandle.Lock()\n\tdefer handle.Unlock()\n\n\treturn handle.read(offset, size)\n}", "title": "" }, { "docid": "e9e1af85a48aa375cf8320e6d8616808", "score": "0.6705277", "text": "func (rwc *ReadWriteCloser) Read(buffer []byte) (int, error) {\n\treturn rwc.reader.Read(buffer)\n}", "title": "" }, { "docid": "f2e3e579a6ca600c6c87295d87382280", "score": "0.6705116", "text": "func (ar *Reader) Read(b []byte) (n int, err error) {\n\tif ar.dataRemain == 0 {\n\t\treturn 0, io.EOF\n\t}\n\tif int64(len(b)) > ar.dataRemain {\n\t\tb = b[:ar.dataRemain]\n\t}\n\tn, err = ar.r.Read(b)\n\tar.offset += int64(n)\n\tar.dataRemain -= int64(n)\n\tif ar.dataRemain == 0 {\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "3571af0c734b4ff06b70d7bf72d56acf", "score": "0.66994363", "text": "func (f fakeReadCloser) Read(p []byte) (n int, err error) {\n\treturn 0, errors.New(\"Error\")\n}", "title": "" }, { "docid": "0b88fda2aad50fe9b6fedab926af9d0d", "score": "0.6677535", "text": "func (r *CustomReader) Read(p []byte) (int, error) {\n\tn, err := r.fp.Read(p)\n\tif err != nil {\n\t\treturn n, err\n\t}\n\tatomic.AddInt64(&r.upSize.Asize, int64(n))\n\ttypes.SendStats(r.prgNotify, r.upSize)\n\treturn n, err\n}", "title": "" }, { "docid": "20a1242391a456499153bbd168eca2be", "score": "0.667617", "text": "func (r MyReader) _Read(b []byte) (n int, err error) {\n\t// One byte at a time is usable but too inefficient\n\tb[0] = 'A'\n\treturn 1, nil\n}", "title": "" }, { "docid": "e5b68751aa44189a515b49ee7cd462cb", "score": "0.66706544", "text": "func (ocfr *OCFReader) Read() (interface{}, error) {\n\t// NOTE: Test previous error before testing readReady to prevent overwriting\n\t// previous error.\n\tif ocfr.rerr != nil {\n\t\treturn nil, ocfr.rerr\n\t}\n\tif !ocfr.readReady {\n\t\tocfr.rerr = errors.New(\"Read called without successful Scan\")\n\t\treturn nil, ocfr.rerr\n\t}\n\tocfr.readReady = false\n\n\t// decode one datum value from block\n\tvar datum interface{}\n\tdatum, ocfr.block, ocfr.rerr = ocfr.header.codec.NativeFromBinary(ocfr.block)\n\tif ocfr.rerr != nil {\n\t\treturn false, ocfr.rerr\n\t}\n\tocfr.remainingBlockItems--\n\n\treturn datum, nil\n}", "title": "" }, { "docid": "5e150ddfd0e7d186eb6df2c0f0136018", "score": "0.6665429", "text": "func (dec *Decoder) Read(p []byte) (int, error) {\n\treturn io.ReadFull(dec.r, p)\n}", "title": "" }, { "docid": "d3a14e66ee2b8fdd1734fa1983a2d799", "score": "0.66652775", "text": "func (fr *fixedReader) Read(p []byte) (n int, err error) {\n\tn, err = fr.iobuf.Read(p)\n\tfr.pos += n\n\treturn\n}", "title": "" }, { "docid": "828ee199f39971b2429904cd422ccadd", "score": "0.66628087", "text": "func (nrc *NopReadCloser) Read(buf []byte) (int, error) {\n\treturn 0, io.EOF\n}", "title": "" }, { "docid": "5fa34e450cdf27b17319a08721d2a329", "score": "0.665854", "text": "func (method *BasicRecover) Read(reader io.Reader, protoVersion string) (err error) {\n\n\tbits, err := ReadOctet(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tmethod.Requeue = bits&(1<<0) != 0\n\n\treturn\n}", "title": "" }, { "docid": "42ef3f6e692ffceb9935022fa936d526", "score": "0.6654314", "text": "func (mr *MockRepository) Read(r interface{}) ([]byte, error) {\n\tif mr.ReReads > 0 && len(mr.ReReadFunc) > 0 {\n\t\tmr.ReReads++\n\t\treturn mr.ReReadFunc[mr.ReReads-2](r)\n\t}\n\tif mr.ReadFunc != nil {\n\t\tmr.ReReads++\n\t\treturn mr.ReadFunc(r)\n\t}\n\treturn nil, errors.New(\"error\")\n}", "title": "" }, { "docid": "45a3e59eb728550f514c630a584e710e", "score": "0.6653022", "text": "func (method *ChannelOpen) Read(reader io.Reader, protoVersion string) (err error) {\n\n\tmethod.Reserved1, err = ReadShortstr(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "e94093bd5db5c00341d303e767ce7d43", "score": "0.66471773", "text": "func (p *Puter) Read(n int) int {\n\treturn p.mem[n]\n}", "title": "" }, { "docid": "7704408161f0cb8366aaf28d4a39c081", "score": "0.6635753", "text": "func (r *ReverseReader) Read() (string, error) {\n\tif r.offset < 0 {\n\t\treturn \"\", fmt.Errorf(\"at beginning of file: %w\", io.EOF)\n\t}\n\t// Read from given offset\n\tb := make([]byte, r.readSize)\n\tn, err := r.reader.ReadAt(b, r.offset)\n\tif err != nil && !errors.Is(err, io.EOF) {\n\t\treturn \"\", err\n\t}\n\t// Move the offset one pagesize up\n\tr.offset -= r.readSize\n\treturn string(b[:n]), nil\n}", "title": "" }, { "docid": "050e7a6568ca6f9283d7fc6a91f8b96e", "score": "0.66344565", "text": "func (m *MockReader) Read(p []byte) (n int, err error) {\n\tr := m.TrackCall(\"Read\", p)\n\treturn r[0].(int), NilOrError(r[1])\n}", "title": "" }, { "docid": "206dd3b48804d95ca49efa22c60ef267", "score": "0.6633779", "text": "func (r *fakeReader) Read(p []byte) (int, error) {\n\tn := r.n\n\tif n > len(p) {\n\t\tn = len(p)\n\t}\n\treturn n, r.err\n}", "title": "" }, { "docid": "703a2d1e7efdc07499de4866e4d34fe1", "score": "0.6632984", "text": "func (b *Reader) Read(p []byte) (n int, e error) {\n n = len(p)\n\n if n == 0 {\n return 0, nil\n }\n\n if b.w == b.r {\n // read request is larger then current window size\n if n >= len(b.buf[b.w:IOBUFLEN]) {\n //log.Println(\"Read directly from IO\")\n n, e = b.rd.Read(p)\n b.reads++\n return n, e\n }\n\n log.Println(\"End of buffer\")\n if e = b.fill(); e != nil {\n return 0, e\n }\n }\n\n // drain buffer\n if n > b.w-b.r {\n n = b.w - b.r\n }\n\n copy(p[0:n], b.buf[b.r:])\n b.r += n\n return n, nil\n}", "title": "" }, { "docid": "65aea47677f307f81da9b25847293e0b", "score": "0.6631918", "text": "func (f *FakeReader) Read(p []byte) (n int, err error) {\n\tif f.ReadErr != nil {\n\t\treturn 0, f.ReadErr\n\t}\n\tif len(f.Reads) > 0 {\n\t\tif len(f.Reads) <= f.i {\n\t\t\treturn 0, errors.New(\"no more fake lines to read\")\n\t\t}\n\t\tf.Buffer = bytes.NewBufferString(f.Reads[f.i])\n\t\tf.i++\n\t}\n\treturn f.Buffer.Read(p)\n}", "title": "" }, { "docid": "d13b6d793925ff0dcd39c89595aacca6", "score": "0.6614957", "text": "func (tr trimReader) Read(buf []byte) (int, error) {\n\tn, err := tr.rd.Read(buf)\n\tt := bytes.TrimLeftFunc(buf[:n], unicode.IsSpace)\n\tn = copy(buf, t)\n\treturn n, err\n}", "title": "" }, { "docid": "d13b6d793925ff0dcd39c89595aacca6", "score": "0.6614957", "text": "func (tr trimReader) Read(buf []byte) (int, error) {\n\tn, err := tr.rd.Read(buf)\n\tt := bytes.TrimLeftFunc(buf[:n], unicode.IsSpace)\n\tn = copy(buf, t)\n\treturn n, err\n}", "title": "" }, { "docid": "a62a3538f2f4b0779b2a980bdcf510da", "score": "0.66128814", "text": "func (novel *Novel) Read(index int) []Content {\n\tcontents := getContents(*novel, index)\n\treturn contents\n}", "title": "" }, { "docid": "321166475aab1dce138bea98c82308c7", "score": "0.66123533", "text": "func (data *Data) Read(b []byte) (n int, err error) {\n\treturn 1, nil\n}", "title": "" }, { "docid": "161c0af2c57d42dc24f53264aefd57cd", "score": "0.6612247", "text": "func (gr *gobReader) Read(p []byte) (n int, err error) {\n\tif err = gr.decoder.Decode(&p); err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn len(p), nil\n}", "title": "" }, { "docid": "e33f3b65b53ef79f2ad941df4cf87268", "score": "0.6607623", "text": "func (r *Rand) Read(p []byte) (n int, err error)", "title": "" }, { "docid": "a28ddd4d2b377e06dd5e7c9a435f14e2", "score": "0.66043526", "text": "func (r MyReader) Read(b []byte) (int, error) {\n\ti := 0\n\tfor i < len(b) {\n\t\tb[i] = 'A'\n\t\ti++\n\t}\n\treturn i, nil\n}", "title": "" }, { "docid": "f1d02c0cde56805c78a247b628ca643e", "score": "0.66042393", "text": "func (r *reader) Read() (msg midi.Message, err error) {\n\t// read the canary in the coal mine to see, if we have a running status byte or a given one\n\tvar canary byte\n\tcanary, err = midilib.ReadByte(r.input)\n\n\tif err != nil {\n\t\treturn\n\t}\n\n\treturn r.readMsg(canary)\n}", "title": "" }, { "docid": "3f8454fa92e31d3fa20a6459f49ade54", "score": "0.6598191", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tn, err = r.r.Read(p)\n\tr.n += int64(n)\n\tr.Err = err\n\treturn n, err\n}", "title": "" }, { "docid": "6cbc78a28a245a005926a7a4d669782e", "score": "0.6596089", "text": "func (r MyReader) Read(s []byte) (int, error) {\n\tfor i := 0; i < len(s); i++ {\n\t\ts[i] = 'A'\n\t}\n\treturn len(s), nil\n}", "title": "" }, { "docid": "ca37a55f6291742b4f47b082d3c3920b", "score": "0.6595421", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\t// r.bits will be the same after reading 8 bits, so we don't need to update that.\n\tif r.bits == 0 {\n\t\treturn r.in.Read(p)\n\t}\n\n\tfor ; n < len(p); n++ {\n\t\tif p[n], err = r.readUnalignedByte(); err != nil {\n\t\t\treturn\n\t\t}\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "62a752905256f3dd2e96d51059ff9193", "score": "0.6594953", "text": "func (rd *readAtSeekerWriteToCloserImplementation) Read(b []byte) (n int, err error) {\n\tif rd.contentFh != nil {\n\t\tn, err = rd.contentFh.Read(b)\n\t}\n\tif rd.contentData != nil {\n\t\tn, err = rd.contentData.Read(b)\n\t}\n\treturn\n}", "title": "" }, { "docid": "8e0f03bc9f3f67054264c9768bba205b", "score": "0.65923285", "text": "func (d *decodeReader) Read(p []byte) (int, error) {\n\tvar err error\n\tif len(d.outbuf) == 0 {\n\t\td.outbuf, err = d.bytes()\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t}\n\tn := copy(p, d.outbuf)\n\td.outbuf = d.outbuf[n:]\n\treturn n, err\n}", "title": "" }, { "docid": "a6b9dda0ecb1bfd20d83d3d5c340fad5", "score": "0.65887403", "text": "func (r *ConReader) Read(p []byte) (int, error) {\n\tif len(p) == 0 {\n\t\treturn 0, nil\n\t}\n\n\tif r.unread == 0 {\n\t\thdr, err := readHeader(r.r)\n\t\tif err != nil {\n\t\t\treturn 0, err\n\t\t}\n\t\tr.unread = hdr.Size()\n\t\tif hdr.IsClosed() {\n\t\t\treturn 0, io.EOF\n\t\t}\n\t}\n\tif r.unread < len(p) {\n\t\tp = p[:r.unread]\n\t}\n\tn, err := r.r.Read(p)\n\tr.unread -= n\n\treturn n, err\n}", "title": "" }, { "docid": "15dcd0f53739980d93b0041a62d046e7", "score": "0.6586093", "text": "func (list *LinkedList) Read(index int) interface{} {\n\tcurrentNode := list.head\n\tfor i := 0; i < index; i++ {\n\t\tcurrentNode = currentNode.next\n\t}\n\treturn currentNode.data\n}", "title": "" }, { "docid": "de562010be812c94af7f889f0812d76e", "score": "0.6582457", "text": "func (f *File) Read(b []byte) (n int, err error) {\n\t// omitted\n\treturn 0, nil // OMIT\n}", "title": "" }, { "docid": "702758169a558eccf429dcb16d3958af", "score": "0.6580262", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tr.m.Lock()\n\tdefer r.m.Unlock()\n\n\twnd := r.limiter.currentWindow(r.streamId)\n\tif wnd > 0 {\n\t\tn = len(p)\n\t\tif n > wnd {\n\t\t\tn = wnd\n\t\t}\n\t\tp = p[:n]\n\t\tn, err = r.source.Read(p)\n\t\tr.limiter.consumeWindow(r.streamId, n)\n\t\tif err == io.EOF {\n\t\t\tr.Close()\n\t\t}\n\t} else {\n\t\tif r.limiter.blocking {\n\t\t\ttime.Sleep(time.Duration(r.limiter.taktTime) * time.Millisecond)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "5b7ac6e257a46d17c2386586f5f49db3", "score": "0.65776813", "text": "func (errReader) Read(p []byte) (n int, err error) {\n\treturn 0, errors.New(\"test error\")\n}", "title": "" }, { "docid": "dfe2156780aa474f63446fa46ddffe38", "score": "0.6572488", "text": "func (cr *countingReader) Read(b []byte) (int, error) {\n\t// We declare vars `n` and `err` whose values will be set by invoking\n\t// the countingReader's src attribute's Read method on the byte slice passed.\n\t// Essentially, it is a pass through to a more \"legitimate\" Reader.\n\tn, err := cr.src.Read(b)\n\t// We set the countingReader's (cr's) `total` attribute to `n`\n\t// which will be the number of bytes read from the data source\n\t// provided to `cr.src.Read`\n\tcr.total += int64(n)\n\t// Adhereing to the `io.Reader` interface we return the number of bytes read\n\t// and any error that occurred on the underlying read.\n\treturn n, err\n}", "title": "" }, { "docid": "4581ea39e57ad99bd5f410a4101df94e", "score": "0.6569672", "text": "func Read(p []byte) (n int, err error)", "title": "" }, { "docid": "b648ddc118096b7f1c68112c84f22136", "score": "0.6566895", "text": "func (reader MyReader) Read(rbyte []byte) (int, error) {\n\tfor i := range rbyte {\n\t\trbyte[i] = 'A'\n\t}\n\n\treturn len(rbyte), nil\n}", "title": "" }, { "docid": "6ccbb5eeb3a09bb850e8215ab6731ca3", "score": "0.6564707", "text": "func (g *GetObjectReader) Read(p []byte) (n int, err error) {\n\tn, err = g.pReader.Read(p)\n\tif err != nil {\n\t\t// Calling code may not Close() in case of error, so\n\t\t// we ensure it.\n\t\tg.Close()\n\t}\n\treturn\n}", "title": "" }, { "docid": "edf1139626e85f477bb861fb3f3b0a43", "score": "0.65592414", "text": "func (method *BasicRecoverOk) Read(reader io.Reader, protoVersion string) (err error) {\n\n\treturn\n}", "title": "" }, { "docid": "40b4db567bc906a2a44d19401e9e42a2", "score": "0.65584284", "text": "func (u *UIView) Read(p []byte) (n int, err error) {\n\tu.mutex.Lock()\n\tn = copy(p, u.buffer[u.readpos:])\n\tu.readpos += n\n\tif u.readpos == len(u.buffer) {\n\t\terr = io.EOF\n\t}\n\tu.mutex.Unlock()\n\treturn\n}", "title": "" }, { "docid": "0583ebf6fef5adc6b103275038dc4c4d", "score": "0.6553415", "text": "func (st *state) Read(p []byte) (n int, err error) {\n\tif st.br == nil {\n\t\tif st.bytes, err = processInput(st.src); err != nil {\n\t\t\treturn\n\t\t}\n\t\tst.br = bytes.NewReader(st.bytes)\n\t}\n\treturn st.br.Read(p)\n}", "title": "" }, { "docid": "5596d690a6d3fbfd0473b383a79c8557", "score": "0.65404737", "text": "func (c *CountingReader) Read(bs []byte) (int, error) {\n\tn, err := c.Reader.Read(bs)\n\tc.BytesRead += int64(n)\n\treturn n, err\n}", "title": "" }, { "docid": "f2d517eda340f81bee8d2ed6633220c8", "score": "0.6525756", "text": "func (r *Reader) Read(p []byte) (n int, err error) {\n\tn = copy(p, r.buf)\n\tr.buf = r.buf[n:]\n\tif len(r.buf) == 0 {\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "85e6dd3aa0e0c99cc9a2c5f4f1ae632b", "score": "0.6504337", "text": "func (f *File) Read(v interface{}) error {\n\trec, err := f.r.Read()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn read(rec, v)\n}", "title": "" }, { "docid": "321f398f1f63ddb6072718d090a61ade", "score": "0.6502924", "text": "func (r *Generator) Read(p []byte) (n int, err error) {\n\treturn r.buffer.Read(p)\n}", "title": "" }, { "docid": "225ab999382009c4890abf07ab624b7a", "score": "0.6501439", "text": "func (r *Reader) Read(p []byte) (int, error) {\n\tif r.n > 0 {\n\t\tn := copy(p, r.buf[:r.n])\n\t\tcopy(r.buf[:], r.buf[n:])\n\t\tr.n -= n\n\t\treturn n, nil\n\t}\n\treturn r.read(p)\n}", "title": "" }, { "docid": "c81221e949371b93342dfd3285e87283", "score": "0.64985484", "text": "func (r *Reader) Read(b []byte) (n int, err error) {\n\tn = int(C.archive_read_data(r.archive, unsafe.Pointer(&b[0]), C.size_t(cap(b))))\n\tif n == 0 {\n\t\terr = ErrArchiveEOF\n\t} else if 0 > n { // err\n\t\terr = codeToError(r.archive, C.ARCHIVE_FAILED)\n\t\tn = 0\n\t}\n\tr.offset += int64(n)\n\treturn\n}", "title": "" }, { "docid": "3c68fd9c654cd70fc8e726a81fcd9494", "score": "0.64952034", "text": "func (m *Conn) Read(p []byte) (int, error) {\n\treturn m.reader.Read(p)\n}", "title": "" }, { "docid": "85a433040d394174b99c9f5309d1bbdb", "score": "0.64942116", "text": "func (r *R) Read(b []byte) (amt int, err error) {\n\tremaining := r.remainingSlice()\n\tamt = copy(b, remaining)\n\n\tr.pos += int64(amt)\n\tif r.pos >= int64(len(r.Buffer)) {\n\t\terr = io.EOF\n\t}\n\treturn\n}", "title": "" }, { "docid": "9360a656ccacfc83ea93c958f7315c89", "score": "0.6486049", "text": "func (r *readAt) Read(p []byte) (n int, err error) {\n\tnb, err := r.ReadAt(p, r.offset)\n\tif err == nil {\n\t\t// Update internal offset in case a retry happens due to error\n\t\tr.offset += int64(nb)\n\t}\n\n\treturn nb, err\n}", "title": "" }, { "docid": "6b98493b97cf9ec745d8caa932004dfc", "score": "0.6485684", "text": "func (method *BasicGetEmpty) Read(reader io.Reader, protoVersion string) (err error) {\n\n\tmethod.Reserved1, err = ReadShortstr(reader)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "a6ddc2b98941e1aade84c73e51dd76f9", "score": "0.64846426", "text": "func (maxReader *MaxReader) Read(b []byte) (int, error) {\n\tfmt.Print(\"in > \")\n\treturn os.Stdin.Read(b)\n}", "title": "" }, { "docid": "1e9d828d65fee976338dd6450d4e8b78", "score": "0.64794654", "text": "func (c *conn) Read(b []byte) (n int, err error) {\n\tn, err = c.in.Read(b)\n\tc.log(c.name, err, \"<\", string(b[:n]))\n\treturn\n}", "title": "" }, { "docid": "569d3cdbffa7a1445067f75ba8c1791e", "score": "0.6478774", "text": "func (vm *VM) Read() ([]byte, error) {\n\tvm.event(StatusSuccess, TypeRead)\n\treturn vm.read()\n}", "title": "" }, { "docid": "2db12b3c61977bbab33f13bcc0ba666a", "score": "0.6475803", "text": "func (r *Reader) Read() (*Fasta, error) {\n\t// States of the reader.\n\tconst (\n\t\tstateStart = iota // Beginning of input\n\t\tstateNewLine // Beginning of new line\n\t\tstateName // Middle of name\n\t\tstateSequence // Middle sequence\n\t)\n\n\t// Start reading.\n\tresult := &Fasta{}\n\tstate := stateStart\n\tvar b byte\n\tvar err error\n\treadAnything := false\n\nloop:\n\tfor b, err = r.r.ReadByte(); err == nil; b, err = r.r.ReadByte() {\n\t\treadAnything = true\n\t\tswitch state {\n\t\tcase stateStart:\n\t\t\t// '>' marks the name of the sequence.\n\t\t\tif b == '>' {\n\t\t\t\tstate = stateName\n\t\t\t} else {\n\t\t\t\t// If no '>' then only sequence without name.\n\t\t\t\tstate = stateSequence\n\t\t\t\tif b == '\\n' || b == '\\r' {\n\t\t\t\t\tstate = stateNewLine\n\t\t\t\t} else {\n\t\t\t\t\tresult.Sequence = append(result.Sequence, b)\n\t\t\t\t}\n\t\t\t}\n\n\t\tcase stateSequence:\n\t\t\tif b == '\\n' || b == '\\r' {\n\t\t\t\tstate = stateNewLine\n\t\t\t} else {\n\t\t\t\tresult.Sequence = append(result.Sequence, b)\n\t\t\t}\n\n\t\tcase stateName:\n\t\t\tif b == '\\n' || b == '\\r' {\n\t\t\t\tstate = stateNewLine\n\t\t\t} else {\n\t\t\t\tresult.Name = append(result.Name, b)\n\t\t\t}\n\n\t\tcase stateNewLine:\n\t\t\tif b == '\\n' || b == '\\r' {\n\t\t\t\t// Nothing. Move on to the next line.\n\t\t\t} else if b == '>' {\n\t\t\t\t// New sequence => done reading.\n\t\t\t\tr.r.UnreadByte()\n\t\t\t\tbreak loop\n\t\t\t} else {\n\t\t\t\t// Just more sequence.\n\t\t\t\tstate = stateSequence\n\t\t\t\tresult.Sequence = append(result.Sequence, b)\n\t\t\t\tif err != nil {\n\t\t\t\t\tbreak loop\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// Return EOF only if encountered before reading anything.\n\tif !readAnything {\n\t\treturn nil, err\n\t}\n\t// EOF will be returned on the next call to Next.\n\tif err != nil && err != io.EOF {\n\t\treturn nil, err\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "29e695eb8b78f2ea451803ffc10058e4", "score": "0.647199", "text": "func (txr *txReader) Read(p []byte) (n int, err error) {\n\tn, err = txr.reader.Read(p)\n\tif err != nil && err != io.EOF {\n\t\treturn\n\t}\n\ttxr.consumed += n\n\n\t_, crc32err := txr.crc32.Write(p)\n\tif crc32err != nil {\n\t\treturn n, crc32err\n\t}\n\n\treturn n, err\n}", "title": "" }, { "docid": "44f7bb9cc88d9cf994a08669e6b7a0b1", "score": "0.6471544", "text": "func (buf *BrokenCloser) Read(p []byte) (int, error) {\n\treturn buf.buf.Read(p)\n}", "title": "" }, { "docid": "139e703127255640a694097d9c8f73fa", "score": "0.64713436", "text": "func (s *TimeoutReader) Read(buf []byte) (int, error) {\n\tvar (\n\t\tn int\n\t\terr error\n\t\tch = make(chan bool)\n\t\tchTo = make(chan bool, 1)\n\t)\n\n\tgo func() {\n\t\tn, err = s.Reader.Read(buf)\n\t\tselect {\n\t\tcase ch <- true:\n\t\tcase <-chTo:\n\t\t}\n\t}()\n\n\t// no timout: wait for reader result\n\tif s.timeout == 0 {\n\t\t<-ch\n\t\treturn n, err\n\t}\n\n\tselect {\n\tcase <-ch:\n\t\treturn n, err\n\tcase <-time.After(s.timeout):\n\t\tchTo <- true\n\t\treturn 0, Timeout\n\t}\n}", "title": "" }, { "docid": "979e6433c74a4e95d4178651443b18ac", "score": "0.6470019", "text": "func (r *ReverseReader) Read(p []byte) (int, error) {\n\tif r.n > 0 {\n\t\tn := ypocByte(p, r.buf[:r.n])\n\t\tr.n -= n\n\t\treturn n, nil\n\t}\n\treturn r.read(p)\n}", "title": "" }, { "docid": "16636be63753ac40a30a14fc608df3f2", "score": "0.64650357", "text": "func Read(c context.Context, b []byte) (n int, err error) {\n\treturn io.ReadFull(Get(c), b)\n}", "title": "" }, { "docid": "b873205a7743ff560f604635b4b92ac1", "score": "0.64626694", "text": "func (r *Reader) ReadLine() (string, error) {}", "title": "" }, { "docid": "6e371e3d6be55fab91c4c4528f08594b", "score": "0.64623505", "text": "func (dec *Decoder) Read(t reflect.Type, tag ...byte) (result interface{}) {\n\tif t == nil {\n\t\tdec.Decode(&result, tag...)\n\t\treturn\n\t}\n\tt2 := reflect2.Type2(t)\n\tp := t2.New()\n\tif len(tag) > 0 {\n\t\tdec.decode(p, tag[0])\n\t} else {\n\t\tdec.decode(p, dec.NextByte())\n\t}\n\treturn t2.Indirect(p)\n}", "title": "" }, { "docid": "c11b8414d0223e6884c2df944986051b", "score": "0.64603084", "text": "func (blf *basicLicenseFile) Read(p []byte) (int, error) {\n\treturn blf.reader.Read(p)\n}", "title": "" }, { "docid": "649fe824f9b8d1ec0d5deee0f9004679", "score": "0.6456984", "text": "func (coppler *IOCoppler) Read(data []byte) (int, error) {\n\tif reader, ok := coppler.upper.(io.Reader); ok {\n\t\treturn reader.Read(data)\n\t}\n\treturn -1, errors.New(\"Read() not supported\")\n}", "title": "" } ]
fc4b07baa5232d60a9fb52ec37b502ef
Max usage constraints on this kind by resource name.
[ { "docid": "a36f34b03b38952d8dfa7ecd486f8dc3", "score": "0.4789921", "text": "func (o LimitRangeItemPatchOutput) Max() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v LimitRangeItemPatch) map[string]string { return v.Max }).(pulumi.StringMapOutput)\n}", "title": "" } ]
[ { "docid": "69185b4e424e6ef090afbcedab455753", "score": "0.569799", "text": "func (o ResourceLimitOutput) Maximum() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ResourceLimit) *string { return v.Maximum }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "696cfab67fa586d334583192599b65c1", "score": "0.53389317", "text": "func (lt LimitType) Name() string {\n\tswitch lt {\n\tcase CPU:\n\t\treturn \"Max cpu time\"\n\tcase FileSize:\n\t\treturn \"Max file size\"\n\tcase Data:\n\t\treturn \"Max data size\"\n\tcase Stack:\n\t\treturn \"Max stack size\"\n\tcase Core:\n\t\treturn \"Max core file size\"\n\tcase Rss:\n\t\treturn \"Max resident set\"\n\tcase ProcessCount:\n\t\treturn \"Max processes\"\n\tcase NumberOfFiles:\n\t\treturn \"Max open files\"\n\tcase MemoryLocked:\n\t\treturn \"Max locked memory\"\n\tcase AS:\n\t\treturn \"Max address space\"\n\tcase Locks:\n\t\treturn \"Max file locks\"\n\tcase SignalsPending:\n\t\treturn \"Max pending signals\"\n\tcase MessageQueueBytes:\n\t\treturn \"Max msgqueue size\"\n\tcase Nice:\n\t\treturn \"Max nice priority\"\n\tcase RealTimePriority:\n\t\treturn \"Max realtime priority\"\n\tcase Rttime:\n\t\treturn \"Max realtime timeout\"\n\t}\n\treturn \"unknown\"\n}", "title": "" }, { "docid": "055c5772007fc9d1de8bd7c122cb1892", "score": "0.53213036", "text": "func (*ListResourceLimits) name() string {\n\treturn \"listResourceLimits\"\n}", "title": "" }, { "docid": "b9d46d7a4026d959c80579ab8338de85", "score": "0.5272746", "text": "func getResourceLimits(log logrus.FieldLogger, config *corev1.ConfigMap) (string, string) {\n\tif config == nil {\n\t\tlog.Debug(\"No config found for plugin\")\n\t\treturn \"\", \"\"\n\t}\n\n\treturn config.Data[\"cpuLimit\"], config.Data[\"memLimit\"]\n}", "title": "" }, { "docid": "bbe7c500a4660f31c299916ca0d63c1c", "score": "0.52586263", "text": "func (o ResourceLimitResponseOutput) Maximum() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResourceLimitResponse) string { return v.Maximum }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d627d8fd2caa247b2c2b77bbf1855a6b", "score": "0.5223936", "text": "func (o ResourceLimitOutput) ResourceType() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ResourceLimit) *string { return v.ResourceType }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "a12061ef09f7d73c5acb8a38d847193e", "score": "0.51789373", "text": "func getResourceCapacity() uint32 {\n\treturn 1073741824 // 1Gi\n}", "title": "" }, { "docid": "430a66df4be8316b5d7dc750cea0ff9b", "score": "0.51753265", "text": "func CompareResource(metrics v1alpha1.Metric, expectTotal int) int {\n\tlimit := CalcMaxPerfResource(metrics)\n\tif limit >= expectTotal {\n\t\treturn expectTotal\n\t}\n\treturn limit\n}", "title": "" }, { "docid": "1c20cc61f8ed80c3abfb1e87ab961a38", "score": "0.5152435", "text": "func (*MaxPodsConstraint) Descriptor() ([]byte, []int) {\n\treturn file_google_cloud_gkemulticloud_v1_common_resources_proto_rawDescGZIP(), []int{1}\n}", "title": "" }, { "docid": "016dc5c488da762331d90d9113be4e93", "score": "0.51495636", "text": "func (s *Stat) MaxResources() int32 {\n\treturn s.maxResources\n}", "title": "" }, { "docid": "016dc5c488da762331d90d9113be4e93", "score": "0.51495636", "text": "func (s *Stat) MaxResources() int32 {\n\treturn s.maxResources\n}", "title": "" }, { "docid": "30a0ceba1ddba19906718ffa8d139f4f", "score": "0.5129221", "text": "func maxTTL(resourceA, resourceB *resources.WatchedResource) (string, error) {\n\ttimeA, err := resourceA.GetDeletionTime()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Parsing TTL failed with following error: %s\", err.Error())\n\t}\n\ttimeB, err := resourceB.GetDeletionTime()\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"Parsing TTL failed with following error: %s\", err.Error())\n\t}\n\tif timeA.After(timeB) {\n\t\treturn resourceA.TTL, nil\n\t} else {\n\t\treturn resourceB.TTL, nil\n\t}\n}", "title": "" }, { "docid": "bcc02ca47b2d9284934ce8bb192c4491", "score": "0.5105259", "text": "func (o ScaleCapacityOutput) Maximum() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ScaleCapacity) string { return v.Maximum }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "7fbb75d5fed05b62cc84bb545d07633f", "score": "0.50761676", "text": "func (js *JobStatus) ResourceUsage(task int) ([]string, []string) {\n\treturn geparser.GetUsageList(&js.js, task)\n}", "title": "" }, { "docid": "d28ce78e6434b7e8be3b93099d8d6afb", "score": "0.5073689", "text": "func (o ScaleCapacityResponseOutput) Maximum() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ScaleCapacityResponse) string { return v.Maximum }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "628e8966ec26726945b0f709488c1c24", "score": "0.5046903", "text": "func resourceVolterraRateLimiter() *schema.Resource {\n\treturn &schema.Resource{\n\t\tCreate: resourceVolterraRateLimiterCreate,\n\t\tRead: resourceVolterraRateLimiterRead,\n\t\tUpdate: resourceVolterraRateLimiterUpdate,\n\t\tDelete: resourceVolterraRateLimiterDelete,\n\n\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\"annotations\": {\n\t\t\t\tType: schema.TypeMap,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"description\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"disable\": {\n\t\t\t\tType: schema.TypeBool,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"labels\": {\n\t\t\t\tType: schema.TypeMap,\n\t\t\t\tOptional: true,\n\t\t\t},\n\n\t\t\t\"name\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"namespace\": {\n\t\t\t\tType: schema.TypeString,\n\t\t\t\tRequired: true,\n\t\t\t\tForceNew: true,\n\t\t\t},\n\n\t\t\t\"limits\": {\n\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"burst_multiplier\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"total_number\": {\n\t\t\t\t\t\t\tType: schema.TypeInt,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"unit\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\n\t\t\t\"user_identification\": {\n\n\t\t\t\tType: schema.TypeList,\n\t\t\t\tOptional: true,\n\t\t\t\tElem: &schema.Resource{\n\t\t\t\t\tSchema: map[string]*schema.Schema{\n\n\t\t\t\t\t\t\"kind\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tComputed: true,\n\t\t\t\t\t\t},\n\n\t\t\t\t\t\t\"name\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"namespace\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t\t\"tenant\": {\n\t\t\t\t\t\t\tType: schema.TypeString,\n\t\t\t\t\t\t\tOptional: true,\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "5a7d694ad7e60a179e5637d42cb82c29", "score": "0.501819", "text": "func maxResourceList(list, new corev1.ResourceList) {\n\tfor name, quantity := range new {\n\t\tif value, ok := list[name]; !ok {\n\t\t\tlist[name] = *quantity.Copy()\n\t\t\tcontinue\n\t\t} else {\n\t\t\tif quantity.Cmp(value) > 0 {\n\t\t\t\tlist[name] = *quantity.Copy()\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c1d1c7db061b97c474734bb521679d85", "score": "0.49892253", "text": "func ValidateResourceRequirements(annotation, value string) error {\n\tif value == \"nil\" {\n\t\treturn nil\n\t}\n\n\tresource := make(corev1.ResourceList)\n\terr := json.Unmarshal([]byte(value), &resource)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"%s unmarshal error:%s\", annotation, err.Error())\n\t}\n\n\tfor resourceName, quantity := range resource {\n\t\t//validate resource name\n\t\tif !standardContainerResources.Has(string(resourceName)) && !strings.HasPrefix(string(resourceName), HugePagesPrefix) {\n\t\t\treturn fmt.Errorf(\"%s error:%s isn't a standard resource type\", annotation, string(resourceName))\n\t\t}\n\n\t\t//validate resource quantity value\n\t\tif quantity.MilliValue() <= int64(0) {\n\t\t\treturn fmt.Errorf(\"%s error:%d must be greater than 0\", annotation, quantity.MilliValue())\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "29499e63ca5d0d206133d3b0018c3d3c", "score": "0.49869972", "text": "func maxResourceList(list, new v1.ResourceList) {\n\tfor name, quantity := range new {\n\t\tif value, ok := list[name]; !ok {\n\t\t\tlist[name] = quantity.DeepCopy()\n\t\t\tcontinue\n\t\t} else {\n\t\t\tif quantity.Cmp(value) > 0 {\n\t\t\t\tlist[name] = quantity.DeepCopy()\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c95f9f0277c689a8dd54bfccec07ad78", "score": "0.4967157", "text": "func (pod *Pod) ResourceUsage(clock clock.Clock) v1.ResourceList {\n\tif !(pod.IsRunning(clock) || pod.IsTerminating(clock)) {\n\t\t// pod is not using resource\n\t\treturn v1.ResourceList{}\n\t}\n\n\texecutedSeconds := int32(pod.executedDuration(clock).Seconds())\n\tphaseDurationAcc := int32(0)\n\tfor _, phase := range pod.spec {\n\t\tphaseDurationAcc += phase.seconds\n\t\tif executedSeconds < phaseDurationAcc {\n\t\t\treturn phase.resourceUsage\n\t\t}\n\t}\n\n\tlog.L.Panic(\"Unreachable code in pod.ResourceUsage()\")\n\treturn v1.ResourceList{}\n}", "title": "" }, { "docid": "5f6be6e22e7ea46ec226aad87d8cee22", "score": "0.49523315", "text": "func resource(gvk metav1.GroupVersionKind, resources []metav1.APIResource) (string, error) {\n\tfor _, r := range resources {\n\t\tif r.Kind == gvk.Kind && r.Group == gvk.Group {\n\t\t\treturn fullAPIResourceName(r), nil\n\t\t}\n\t}\n\treturn \"\", fmt.Errorf(\"no api-resource for %s\", gvk.String())\n}", "title": "" }, { "docid": "d3665489e9635ad7b6970b94ce7bc238", "score": "0.4942485", "text": "func (c *prefixed) Max(name string) MaxMinValue {\n\treturn c.GetMax(name)\n}", "title": "" }, { "docid": "cb09852e1954a0e6dfba648bf7ae6c73", "score": "0.49309275", "text": "func MaximumContainersResources(containers []v1.Container) v1.ResourceRequirements {\n\tmax := v1.ResourceRequirements{\n\t\tLimits: make(v1.ResourceList),\n\t\tRequests: make(v1.ResourceList),\n\t}\n\tfor idx := range containers {\n\t\tcontainer := &containers[idx]\n\t\tmax.Requests = quotav1.Max(max.Requests, container.Resources.Requests)\n\t\tmax.Limits = quotav1.Max(max.Limits, container.Resources.Limits)\n\t}\n\treturn max\n}", "title": "" }, { "docid": "fd3f29afa72ffd6cdf465fd847bcfa71", "score": "0.49123743", "text": "func GetResourceLimit(rtype ResourceType) int64 {\n\treturn int64(C.MagickGetResourceLimit(C.ResourceType(rtype)))\n}", "title": "" }, { "docid": "6bf593f64e80767d1f017c5f6c2c4fd1", "score": "0.49046442", "text": "func Max(field string) string {\n\treturn fmt.Sprintf(`\n \"max\": {\n \"field\": %q\n }\n `, field)\n}", "title": "" }, { "docid": "4e9c6810f18e6293ab0a2a77002c629b", "score": "0.48927873", "text": "func MaxCapacity(managerUUID string, qLen, qCap int, qType Type) *MaxCapacityError {\n\treturn &MaxCapacityError{\n\t\tmanagerUUID,\n\t\tqLen,\n\t\tqCap,\n\t\tqType,\n\t}\n}", "title": "" }, { "docid": "7f196109b7456afc5f7193d3e2c50547", "score": "0.48849282", "text": "func maxTasksForOffer(offer *mesos.Offer) int {\n\tcount := 0\n\n\tvar cpus, mem float64\n\n\tfor _, resource := range offer.Resources {\n\t\tswitch resource.GetName() {\n\t\tcase \"cpus\":\n\t\t\tcpus += *resource.GetScalar().Value\n\t\tcase \"mem\":\n\t\t\tmem += *resource.GetScalar().Value\n\t\t}\n\t}\n\n\tfor cpus >= taskCPUs && mem >= taskMem {\n\t\tcount++\n\t\tcpus -= taskCPUs\n\t\tmem -= taskMem\n\t}\n\n\treturn count\n}", "title": "" }, { "docid": "a09ad8607e6c5e6cc8a1a5c49a6ce80f", "score": "0.48601726", "text": "func RecycleOptionMaxUsage(max int) RecycleOption {\n\treturn func(r *Recycler) *Recycler {\n\t\tr.maxUsage = max\n\t\treturn r\n\t}\n}", "title": "" }, { "docid": "df6027fc16e8d68f735ffdecdc9c4a8e", "score": "0.4855216", "text": "func (o *ReferralConstraints) GetUsageLimit() int32 {\n\tif o == nil || o.UsageLimit == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.UsageLimit\n}", "title": "" }, { "docid": "9a8b3e3b8096725255e08c59c4377a63", "score": "0.48463672", "text": "func (_m *Validator) MaxString(name string, val string, max int, msg ...interface{}) {\n\tvar _ca []interface{}\n\t_ca = append(_ca, name, val, max)\n\t_ca = append(_ca, msg...)\n\t_m.Called(_ca...)\n}", "title": "" }, { "docid": "81345f0c4a53dc5333175ef2459b6b96", "score": "0.48380625", "text": "func (o *NewReferralsForMultipleAdvocates) GetUsageLimit() int32 {\n\tif o == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\n\treturn o.UsageLimit\n}", "title": "" }, { "docid": "6ed699cf744745108915f628ca0c18d5", "score": "0.48171973", "text": "func Max(a corev1.ResourceList, b corev1.ResourceList) corev1.ResourceList {\n\tresult := corev1.ResourceList{}\n\tfor key, value := range a {\n\t\tif other, found := b[key]; found {\n\t\t\tif value.Cmp(other) <= 0 {\n\t\t\t\tresult[key] = other.DeepCopy()\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tresult[key] = value.DeepCopy()\n\t}\n\tfor key, value := range b {\n\t\tif _, found := result[key]; !found {\n\t\t\tresult[key] = value.DeepCopy()\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "cc8dede7e41efda6ef4ef6cf80fdc7c1", "score": "0.48129708", "text": "func (o ResourceLimitResponseOutput) ResourceType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResourceLimitResponse) string { return v.ResourceType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1cc48d34c181aa505ce43f2ce3dd29ad", "score": "0.48038355", "text": "func CalculateUsage(namespaceName string, scopes []corev1.ResourceQuotaScope, hardLimits corev1.ResourceList, registry Registry, scopeSelector *corev1.ScopeSelector) (corev1.ResourceList, error) {\n\t// find the intersection between the hard resources on the quota\n\t// and the resources this controller can track to know what we can\n\t// look to measure updated usage stats for\n\thardResources := ResourceNames(hardLimits)\n\tpotentialResources := []corev1.ResourceName{}\n\tevaluators := registry.List()\n\tfor _, evaluator := range evaluators {\n\t\tpotentialResources = append(potentialResources, evaluator.MatchingResources(hardResources)...)\n\t}\n\t// NOTE: the intersection just removes duplicates since the evaluator match intersects with hard\n\tmatchedResources := Intersection(hardResources, potentialResources)\n\n\terrors := []error{}\n\n\t// sum the observed usage from each evaluator\n\tnewUsage := corev1.ResourceList{}\n\tfor _, evaluator := range evaluators {\n\t\t// only trigger the evaluator if it matches a resource in the quota, otherwise, skip calculating anything\n\t\tintersection := evaluator.MatchingResources(matchedResources)\n\t\tif len(intersection) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tusageStatsOptions := UsageStatsOptions{Namespace: namespaceName, Scopes: scopes, Resources: intersection, ScopeSelector: scopeSelector}\n\t\tstats, err := evaluator.UsageStats(usageStatsOptions)\n\t\tif err != nil {\n\t\t\t// remember the error\n\t\t\terrors = append(errors, err)\n\t\t\t// exclude resources which encountered calculation errors\n\t\t\tmatchedResources = Difference(matchedResources, intersection)\n\t\t\tcontinue\n\t\t}\n\t\tnewUsage = Add(newUsage, stats.Used)\n\t}\n\n\t// mask the observed usage to only the set of resources tracked by this quota\n\t// merge our observed usage with the quota usage status\n\t// if the new usage is different than the last usage, we will need to do an update\n\tnewUsage = Mask(newUsage, matchedResources)\n\treturn newUsage, utilerrors.NewAggregate(errors)\n}", "title": "" }, { "docid": "9982cdd74ddc3751bba831c3e9bcaf0d", "score": "0.47754106", "text": "func ParseResourceRequirements(cpuRequest, memRequest, cpuLimit, memLimit string) (corev1.ResourceRequirements, error) {\n\tresources := corev1.ResourceRequirements{\n\t\tRequests: corev1.ResourceList{},\n\t\tLimits: corev1.ResourceList{},\n\t}\n\n\tparsedCPURequest, err := resource.ParseQuantity(cpuRequest)\n\tif err != nil {\n\t\treturn resources, errors.Wrapf(err, `couldn't parse CPU request \"%s\"`, cpuRequest)\n\t}\n\n\tparsedMemRequest, err := resource.ParseQuantity(memRequest)\n\tif err != nil {\n\t\treturn resources, errors.Wrapf(err, `couldn't parse memory request \"%s\"`, memRequest)\n\t}\n\n\tparsedCPULimit, err := resource.ParseQuantity(cpuLimit)\n\tif err != nil {\n\t\treturn resources, errors.Wrapf(err, `couldn't parse CPU limit \"%s\"`, cpuLimit)\n\t}\n\n\tparsedMemLimit, err := resource.ParseQuantity(memLimit)\n\tif err != nil {\n\t\treturn resources, errors.Wrapf(err, `couldn't parse memory limit \"%s\"`, memLimit)\n\t}\n\n\t// A quantity of 0 is treated as unbounded\n\tunbounded := resource.MustParse(\"0\")\n\n\tif parsedCPULimit != unbounded && parsedCPURequest.Cmp(parsedCPULimit) > 0 {\n\t\treturn resources, errors.WithStack(errors.Errorf(`CPU request \"%s\" must be less than or equal to CPU limit \"%s\"`, cpuRequest, cpuLimit))\n\t}\n\n\tif parsedMemLimit != unbounded && parsedMemRequest.Cmp(parsedMemLimit) > 0 {\n\t\treturn resources, errors.WithStack(errors.Errorf(`Memory request \"%s\" must be less than or equal to Memory limit \"%s\"`, memRequest, memLimit))\n\t}\n\n\t// Only set resources if they are not unbounded\n\tif parsedCPURequest != unbounded {\n\t\tresources.Requests[corev1.ResourceCPU] = parsedCPURequest\n\t}\n\tif parsedMemRequest != unbounded {\n\t\tresources.Requests[corev1.ResourceMemory] = parsedMemRequest\n\t}\n\tif parsedCPULimit != unbounded {\n\t\tresources.Limits[corev1.ResourceCPU] = parsedCPULimit\n\t}\n\tif parsedMemLimit != unbounded {\n\t\tresources.Limits[corev1.ResourceMemory] = parsedMemLimit\n\t}\n\n\treturn resources, nil\n}", "title": "" }, { "docid": "cae6e1f8064ef96d4d9e1b177c4deba2", "score": "0.47711444", "text": "func (o GetAppGroupsGroupQuotaOutput) ComputeResource() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetAppGroupsGroupQuota) string { return v.ComputeResource }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0b47891f77c32611247aa287625b5a37", "score": "0.4764211", "text": "func (s WAFSizeConstraintSet) CfnResourceType() string {\n\t\n\treturn \"AWS::WAF::SizeConstraintSet\"\n}", "title": "" }, { "docid": "2bf8e097494d19a2c0e3f1f29e3d6e69", "score": "0.4763967", "text": "func (stats pcStatList) maxName() string {\n\tvar maxName string\n\tfor _, pcs := range stats {\n\t\tif len(pcs.Name) > len(maxName) {\n\t\t\tmaxName = pcs.Name\n\t\t}\n\t}\n\treturn maxName\n}", "title": "" }, { "docid": "5f0d50b4c927a10e42939bfd1b1ae20a", "score": "0.47549894", "text": "func (s EC2SecurityGroupEgress) CfnResourceType() string {\n\t\n\treturn \"AWS::EC2::SecurityGroupEgress\"\n}", "title": "" }, { "docid": "ae9bb55676d1ede0227ac385fc2c4761", "score": "0.4753471", "text": "func calculatePipelineLimitResource(resources [][]*apistructs.PipelineAppliedResources) apistructs.PipelineAppliedResource {\n\tvar (\n\t\tallStageCPU []float64\n\t\tallStageMemMB []float64\n\t)\n\tfor _, stagesResources := range resources {\n\t\tvar (\n\t\t\tstageCPU float64 = 0\n\t\t\tstageMemMB float64 = 0\n\t\t)\n\t\tfor _, taskResources := range stagesResources {\n\t\t\tstageCPU += taskResources.Limits.CPU\n\t\t\tstageMemMB += taskResources.Limits.MemoryMB\n\t\t}\n\t\tallStageCPU = append(allStageCPU, stageCPU)\n\t\tallStageMemMB = append(allStageMemMB, stageMemMB)\n\t}\n\tmaxStageResource := apistructs.PipelineAppliedResource{\n\t\tCPU: numeral.MaxFloat64(allStageCPU),\n\t\tMemoryMB: numeral.MaxFloat64(allStageMemMB),\n\t}\n\n\treturn maxStageResource\n}", "title": "" }, { "docid": "ec89a50d52fe75f65354043bfbad8b7f", "score": "0.4752786", "text": "func (c *prefixed) GetMax(name string) MaxMinValue {\n\tvalue, _ := c.max.LoadOrStore(name, c.base.GetMax(c.prefix+name))\n\tv, _ := value.(MaxMinValue)\n\treturn v\n}", "title": "" }, { "docid": "bdfd13a3cb76a16e6f1a9f3ec998a046", "score": "0.47428083", "text": "func PVCRuleByUsageCapacity(usagePercentage int, scalePercentage int, maxSize string) apapi.AutopilotRule {\n\tapRuleObject := apapi.AutopilotRule{\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"pvc-usage-%d-scale-%d\", usagePercentage, scalePercentage),\n\t\t},\n\t\tSpec: apapi.AutopilotRuleSpec{\n\t\t\tConditions: apapi.RuleConditions{\n\t\t\t\tExpressions: []*apapi.LabelSelectorRequirement{\n\t\t\t\t\t{\n\t\t\t\t\t\tKey: PxVolumeUsagePercentMetric,\n\t\t\t\t\t\tOperator: apapi.LabelSelectorOpGt,\n\t\t\t\t\t\tValues: []string{fmt.Sprintf(\"%d\", usagePercentage)},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tActions: []*apapi.RuleAction{\n\t\t\t\t{\n\t\t\t\t\tName: VolumeSpecAction,\n\t\t\t\t\tParams: map[string]string{\n\t\t\t\t\t\tRuleActionsScalePercentage: fmt.Sprintf(\"%d\", scalePercentage),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tif maxSize != \"\" {\n\t\tapRuleObject.Name = fmt.Sprintf(\"%s-maxsize-%s\", apRuleObject.Name, strings.ToLower(maxSize))\n\t\tfor _, action := range apRuleObject.Spec.Actions {\n\t\t\taction.Params[RuleMaxSize] = maxSize\n\t\t}\n\t}\n\treturn apRuleObject\n}", "title": "" }, { "docid": "bdfd13a3cb76a16e6f1a9f3ec998a046", "score": "0.47428083", "text": "func PVCRuleByUsageCapacity(usagePercentage int, scalePercentage int, maxSize string) apapi.AutopilotRule {\n\tapRuleObject := apapi.AutopilotRule{\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"pvc-usage-%d-scale-%d\", usagePercentage, scalePercentage),\n\t\t},\n\t\tSpec: apapi.AutopilotRuleSpec{\n\t\t\tConditions: apapi.RuleConditions{\n\t\t\t\tExpressions: []*apapi.LabelSelectorRequirement{\n\t\t\t\t\t{\n\t\t\t\t\t\tKey: PxVolumeUsagePercentMetric,\n\t\t\t\t\t\tOperator: apapi.LabelSelectorOpGt,\n\t\t\t\t\t\tValues: []string{fmt.Sprintf(\"%d\", usagePercentage)},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tActions: []*apapi.RuleAction{\n\t\t\t\t{\n\t\t\t\t\tName: VolumeSpecAction,\n\t\t\t\t\tParams: map[string]string{\n\t\t\t\t\t\tRuleActionsScalePercentage: fmt.Sprintf(\"%d\", scalePercentage),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tif maxSize != \"\" {\n\t\tapRuleObject.Name = fmt.Sprintf(\"%s-maxsize-%s\", apRuleObject.Name, strings.ToLower(maxSize))\n\t\tfor _, action := range apRuleObject.Spec.Actions {\n\t\t\taction.Params[RuleMaxSize] = maxSize\n\t\t}\n\t}\n\treturn apRuleObject\n}", "title": "" }, { "docid": "7e57fe0e0fb4fd18db731af9232cb174", "score": "0.47305843", "text": "func (s ApplicationAutoScalingScalableTarget) CfnResourceType() string {\n\t\n\treturn \"AWS::ApplicationAutoScaling::ScalableTarget\"\n}", "title": "" }, { "docid": "b0d0b9cd81d7f016b64201cc9c55e569", "score": "0.47269532", "text": "func CapacityByResource(resource corev1.ResourceName) int64 {\n\tn, err := kubeapi.APIClient().CoreV1().Nodes().List(ctx, metav1.ListOptions{})\n\tif err != nil {\n\t\tpanic(err.Error())\n\t}\n\tvar allocatableResource int64\n\n\tfor _, node := range n.Items {\n\t\tquantity := node.Status.Allocatable[resource]\n\t\tallocatableResource += quantity.MilliValue()\n\t}\n\n\tlogger.V(2).Info(\"Node resources allocated\", \"resource\", resource, \"value\", allocatableResource)\n\treturn allocatableResource / 1000\n}", "title": "" }, { "docid": "ffea6a50f10e1968de6e497801141053", "score": "0.47261012", "text": "func (b *Bluecat) GetMaxAllowedRange(rangeid int) (string, error) {\n\treq := fmt.Sprintf(\"https://%s%s/getMaxAllowedRange?rangeId=%d\",\n\t\tb.Server, b.URI, rangeid)\n\tresp, err := resty.R().\n\t\tSetHeader(\"Content-Type\", \"application/json\").\n\t\tSetHeader(\"Authorization\", fmt.Sprintf(\"%s\", b.AuthToken)).\n\t\tGet(req)\n\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"%s - GetMaxAllowedRange request\", err)\n\t}\n\n\tformatted := strings.TrimLeft(strings.TrimRight(resp.String(), \"\\\"\"), \"\\\"\")\n\treturn formatted, nil\n}", "title": "" }, { "docid": "225698c998dc031cce4a5b82b7b5816a", "score": "0.47257146", "text": "func (s APIGatewayUsagePlan) CfnResourceType() string {\n\t\n\treturn \"AWS::ApiGateway::UsagePlan\"\n}", "title": "" }, { "docid": "a7f3d7624391b76f439007c56d16a235", "score": "0.47083458", "text": "func (o ContainerResizePolicyOutput) ResourceName() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ContainerResizePolicy) string { return v.ResourceName }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "6d689d1b5ae3797c75219978967b0755", "score": "0.4698987", "text": "func (o LimitRangeItemOutput) Max() pulumi.StringMapOutput {\n\treturn o.ApplyT(func(v LimitRangeItem) map[string]string { return v.Max }).(pulumi.StringMapOutput)\n}", "title": "" }, { "docid": "ce240f5b162b6381a5f8e628cb830971", "score": "0.46982113", "text": "func (ji *JobInfo) ResourceUsage() map[string]string {\n\treturn ji.resourceUsage\n}", "title": "" }, { "docid": "c08575d5a91ac3e400a2e157bc141f4d", "score": "0.4697802", "text": "func CalcMaxPerfResource(metrics v1alpha1.Metric) int {\n\tif metrics.HashRate != \"\" {\n\t\tmaxHashrate, _ := strconv.Atoi(metrics.HashRate)\n\t\treturn maxHashrate\n\t} else {\n\t\treturn 8\n\t}\n}", "title": "" }, { "docid": "c43981507a6042d779b1c6d677fd33ec", "score": "0.4697045", "text": "func (c *Config) MaxReq() (uint64, error) {\n\tif c == nil {\n\t\treturn 0, errors.New(errors.KsiInvalidArgumentError)\n\t}\n\tif c.maxReq == nil {\n\t\treturn 0, nil\n\t}\n\treturn *c.maxReq, nil\n}", "title": "" }, { "docid": "9413f73cbd3c21b7043c98ebbee7b821", "score": "0.46950862", "text": "func (r Resource) GetResourceName() string {\n\tif r.ResourcePlural != \"\" {\n\t\treturn r.ResourcePlural\n\t}\n\t// kubebuilder default:\n\treturn strings.ToLower(flect.Pluralize(r.GroupVersionKind.Kind))\n}", "title": "" }, { "docid": "d29ac8221f7dd282410f4172c8ac1c8b", "score": "0.46932206", "text": "func (e *NetworkBandwidth) Resource() string {\n\treturn \"networkchaos\"\n}", "title": "" }, { "docid": "18ee055eaa151a147fe9af02c6a03e72", "score": "0.46849182", "text": "func (g *MetricGetter) GetNamespaceResourceLimit(opts *types.JobCommonOpts,\n\tclients *types.Clients) (float64, int64, float64, int64, error) {\n\tvar requestCPU, limitCPU float64\n\tvar requestMemory, limitMemory int64\n\trequestCPUResponse, err := clients.MonitorClient.QueryByPost(fmt.Sprintf(NamespaceResourceQuota,\n\t\tfmt.Sprintf(NamespaceCondition, opts.ClusterID, opts.Namespace), \"requests.cpu\"),\n\t\topts.CurrentTime)\n\tif err != nil {\n\t\treturn requestCPU, requestMemory, limitCPU, limitMemory, fmt.Errorf(\"get namespace metrics error: %v\", err)\n\t}\n\trequestCPU = GetFloatData(requestCPUResponse)\n\tlimitCPUResponse, err := clients.MonitorClient.QueryByPost(\n\t\tfmt.Sprintf(NamespaceResourceQuota, fmt.Sprintf(NamespaceCondition, opts.ClusterID, opts.Namespace), \"limit.cpu\"),\n\t\topts.CurrentTime)\n\tif err != nil {\n\t\treturn requestCPU, requestMemory, limitCPU, limitMemory, fmt.Errorf(\"get namespace metrics error: %v\", err)\n\t}\n\tlimitCPU = GetFloatData(limitCPUResponse)\n\trequestMemoryResponse, err := clients.MonitorClient.QueryByPost(fmt.Sprintf(NamespaceResourceQuota,\n\t\tfmt.Sprintf(NamespaceCondition, opts.ClusterID, opts.Namespace), \"requests.memory\"),\n\t\topts.CurrentTime)\n\tif err != nil {\n\t\treturn requestCPU, requestMemory, limitCPU, limitMemory, fmt.Errorf(\"get namespace metrics error: %v\", err)\n\t}\n\trequestMemory = GetInt64Data(requestMemoryResponse)\n\tlimitMemoryResponse, err := clients.MonitorClient.QueryByPost(fmt.Sprintf(NamespaceResourceQuota,\n\t\tfmt.Sprintf(NamespaceCondition, opts.ClusterID, opts.Namespace), \"limit.memory\"),\n\t\topts.CurrentTime)\n\tif err != nil {\n\t\treturn requestCPU, requestMemory, limitCPU, limitMemory, fmt.Errorf(\"get namespace metrics error: %v\", err)\n\t}\n\tlimitMemory = GetInt64Data(limitMemoryResponse)\n\treturn requestCPU, requestMemory, limitCPU, limitMemory, nil\n}", "title": "" }, { "docid": "afb30deaf2cb449c7c87e905daba2ebf", "score": "0.46799996", "text": "func ComponentWiseMax(left *Resource, right *Resource) *Resource {\n out := NewResource()\n if left != nil && right != nil {\n for k, v := range left.Resources {\n out.Resources[k] = maxQuantity(v, right.Resources[k])\n }\n for k, v := range right.Resources {\n out.Resources[k] = maxQuantity(v, left.Resources[k])\n }\n }\n return out\n}", "title": "" }, { "docid": "15d42a8a6c93d285f579d2395ff0bea9", "score": "0.4672989", "text": "func (s *VNetSpec) ResourceName() string {\n\treturn s.Name\n}", "title": "" }, { "docid": "9a9820934dab71731fbd6975c0b3ca30", "score": "0.46612543", "text": "func ResourceQuotaFromYaml(yamlData []byte) (*ResourceUsage, error) {\n\tobject, gvk, err := scheme.Codecs.UniversalDeserializer().Decode(yamlData, nil, nil)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"decoding yaml data: %w\", err)\n\t}\n\n\tswitch obj := object.(type) {\n\tcase *appsv1.Deployment:\n\t\tusage, err := deployment(*obj)\n\t\tif err != nil {\n\t\t\treturn nil, CalculationError{\n\t\t\t\tVersion: gvk.Version,\n\t\t\t\tKind: gvk.Kind,\n\t\t\t\terr: err,\n\t\t\t}\n\t\t}\n\n\t\treturn usage, nil\n\tcase *appsv1.StatefulSet:\n\t\treturn statefulSet(*obj), nil\n\tdefault:\n\t\treturn nil, CalculationError{\n\t\t\tVersion: gvk.Version,\n\t\t\tKind: gvk.Kind,\n\t\t\terr: ErrResourceNotSupported,\n\t\t}\n\t}\n}", "title": "" }, { "docid": "da7f4a131c93d08d5a3ff30cf8128ac1", "score": "0.46575832", "text": "func formatResourceName(kind schema.GroupKind, name string, withKind bool) string {\n\tif !withKind || kind.Empty() {\n\t\treturn name\n\t}\n\n\treturn strings.ToLower(kind.String()) + \"/\" + name\n}", "title": "" }, { "docid": "da7f4a131c93d08d5a3ff30cf8128ac1", "score": "0.46575832", "text": "func formatResourceName(kind schema.GroupKind, name string, withKind bool) string {\n\tif !withKind || kind.Empty() {\n\t\treturn name\n\t}\n\n\treturn strings.ToLower(kind.String()) + \"/\" + name\n}", "title": "" }, { "docid": "ee52ad138336da37e382276f9ea45779", "score": "0.46507433", "text": "func DecodeResource(res string) (int64, error) {\n\n\tvar i = int64(1024)\n\n\trq := regexp.MustCompile(\"([0-9]+)\\\\w*.*\")\n\trt := regexp.MustCompile(\"\\\\d*(\\\\w+)?.*\")\n\tmq := rq.FindStringSubmatch(res)\n\tmt := rt.FindStringSubmatch(res)\n\n\tif len(mt) == 2 {\n\t\tswitch strings.ToLower(mt[1]) {\n\t\tcase \"mb\":\n\t\t\ti = MB\n\t\t\tbreak\n\t\tcase \"mib\":\n\t\t\ti = MIB\n\t\t\tbreak\n\t\tcase \"gb\":\n\t\t\ti = GB\n\t\t\tbreak\n\t\tcase \"gib\":\n\t\t\ti = GIB\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif len(mq) == 2 {\n\n\t\tq, err := strconv.ParseInt(mq[1], 10, 64)\n\t\tif err != nil {\n\t\t\treturn i, err\n\t\t}\n\t\ti*=q\n\t}\n\n\treturn i, nil\n}", "title": "" }, { "docid": "64db312af6ffc381576fe49b9aa17ba3", "score": "0.46461332", "text": "func (p Pkgs) getMaxSize() int {\n\tsize := 0\n\n\tfor _, pkg := range p {\n\t\tif len(pkg.Name) > size {\n\t\t\tsize = len(pkg.Name)\n\t\t}\n\t}\n\n\treturn size\n}", "title": "" }, { "docid": "8f978acb1e9235e618120bbf44781db7", "score": "0.46438324", "text": "func DemandCustomResourceDefinitionName() string {\n\treturn (&demandGroupResource).String()\n}", "title": "" }, { "docid": "455ef4d0f957296ff1bf1db8778b42b8", "score": "0.46290767", "text": "func GetResourcesLimit(c *kubernetes.Clientset, namespace string) (cpu float64, memory uint32, err error) {\n\t// Get existing limits\n\tel, err := c.CoreV1().LimitRanges(namespace).Get(namespace, metav1.GetOptions{})\n\tif errors.IsNotFound(err) {\n\t\treturn cpu, memory, nil\n\t}\n\n\t// We need only first available item\n\titem := el.Spec.Limits[0]\n\n\n\t// In case CPU appears in the configuration\n\tif v, ok := item.Max[corev1.ResourceCPU]; ok {\n\t\tvalue := v.String()\n\t\tif strings.HasSuffix(value, \"m\") {\n\t\t\t// Remove \"m\" (millicores)\n\t\t\tvar i int\n\t\t\ti, err = strconv.Atoi(value[0 : len(value)-1])\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\t// Convert to float64\n\t\t\tcpu = float64(i) / 1000\n\n\t\t} else {\n\t\t\t// Parse string value to float64\n\t\t\tcpu, err = strconv.ParseFloat(value, 64)\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\n\t// In case Memory appears in the configuration\n\tif v, ok := item.Max[corev1.ResourceMemory]; ok {\n\t\t// Get the value and remove the suffix \"Mi\"\n\t\tvalue := v.String()\n\t\tm := value[0 : len(value)-2]\n\t\tvar memInt int\n\t\tmemInt, err = strconv.Atoi(m)\n\t\tif err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tmemory = uint32(memInt)\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6c44a13582451a6ecdbef85d2ea721a2", "score": "0.4621839", "text": "func fullAPIResourceName(apiResource metav1.APIResource) string {\n\treturn strings.Join([]string{apiResource.Name, apiResource.Group}, \".\")\n}", "title": "" }, { "docid": "1d8c7efa3b94e729a7054ecdb52d8a82", "score": "0.46158063", "text": "func IsResourcesLimitTooLow(r *corev1.ResourceRequirements) bool {\n\tif r == nil || r.Limits == nil {\n\t\treturn false\n\t}\n\tif r.Limits.Memory() != nil {\n\t\tq, _ := resource.ParseQuantity(\"2Gi\")\n\t\tif r.Limits.Memory().Cmp(q) < 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\tif r.Limits.Cpu() != nil {\n\t\tq, _ := resource.ParseQuantity(\"2\")\n\t\tif r.Limits.Cpu().Cmp(q) < 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "c9ade2c9958fb9576f5d75eb11fb5bef", "score": "0.4607871", "text": "func Require(limiter Interface, resource Resource) error {\n\tif limit, result := limiter.RateLimit(resource); limit {\n\t\treturn errRateLimitExceeded.WithAttributes(\n\t\t\t\"key\", resource.Key(),\n\t\t\t\"rate\", result.Limit,\n\t\t)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "47c2498c6ecec067c0cc40ff95271d00", "score": "0.4607806", "text": "func validateExtendedResourceName(name v1.ResourceName) []error {\n\tvar validationErrors []error\n\tfor _, msg := range validation.IsQualifiedName(string(name)) {\n\t\tvalidationErrors = append(validationErrors, errors.New(msg))\n\t}\n\tif len(validationErrors) != 0 {\n\t\treturn validationErrors\n\t}\n\tif !v1helper.IsExtendedResourceName(name) {\n\t\tvalidationErrors = append(validationErrors, fmt.Errorf(\"%s is an invalid extended resource name\", name))\n\t}\n\treturn validationErrors\n}", "title": "" }, { "docid": "a503d1dad70d0adc97653a01dc33bc0b", "score": "0.46055833", "text": "func (s *VMSSExtensionSpec) ResourceName() string {\n\treturn s.Name\n}", "title": "" }, { "docid": "135e461e0e3bdad18b06d3d88aa70ad8", "score": "0.46041948", "text": "func (s APIGatewayUsagePlanKey) CfnResourceType() string {\n\t\n\treturn \"AWS::ApiGateway::UsagePlanKey\"\n}", "title": "" }, { "docid": "432de9dedb9879e8dcbf3ea720c5689a", "score": "0.45982322", "text": "func ValidateResourceName(name string) error {\n\tif hclsyntax.ValidIdentifier(name) {\n\t\treturn nil\n\t}\n\treturn errors.New(\"invalid resource name: \" + name)\n}", "title": "" }, { "docid": "acaa5936d874272d664de8a91011ad3d", "score": "0.45954996", "text": "func ResourceType(name string) events.ResourceType {\n\tswitch name {\n\tcase events.ResourceType_RESOURCE_TYPE_TEMPLATE.String():\n\t\treturn events.ResourceType_RESOURCE_TYPE_TEMPLATE\n\tcase events.ResourceType_RESOURCE_TYPE_HARDWARE.String():\n\t\treturn events.ResourceType_RESOURCE_TYPE_HARDWARE\n\tcase events.ResourceType_RESOURCE_TYPE_WORKFLOW.String():\n\t\treturn events.ResourceType_RESOURCE_TYPE_WORKFLOW\n\tdefault:\n\t\treturn events.ResourceType_RESOURCE_TYPE_UNKNOWN\n\t}\n}", "title": "" }, { "docid": "ad6dcfa03aad52e71e77d89f0ed7d2c9", "score": "0.4595027", "text": "func FormatResourceName(r types.ResourceWithLabels, verbose bool) string {\n\tif !verbose {\n\t\t// return the (shorter) discovered name in non-verbose mode.\n\t\tdiscoveredName, ok := r.GetAllLabels()[types.DiscoveredNameLabel]\n\t\tif ok && discoveredName != \"\" {\n\t\t\treturn discoveredName\n\t\t}\n\t}\n\treturn r.GetName()\n}", "title": "" }, { "docid": "2a523b53f1d92f468ecf6f398609521d", "score": "0.4591835", "text": "func coreGroupResourcePriority(resource string) int {\n\tswitch strings.ToLower(resource) {\n\tcase \"pods\":\n\t\treturn pod\n\tcase \"persistentvolumeclaims\":\n\t\treturn pvc\n\tcase \"persistentvolumes\":\n\t\treturn pv\n\t}\n\n\treturn other\n}", "title": "" }, { "docid": "2a3e1d74d155ed72ea8de34ef8fde01b", "score": "0.4589341", "text": "func (srv *rateLimiterService) RequireResource(ctx context.Context, addr string, url string) (claims *domain.Claims, err error) {\n\tvar (\n\t\tkey string\n\t)\n\n\tif addr == \"\" {\n\t\treturn nil, errors.ErrInternal.Build(\"addr must need input\")\n\t}\n\n\t// why key format is url + : + addr ?\n\t// because I want to distinguish url require count\n\t// each url resource can has own rate limit\n\tkey = url + \":\" + addr\n\n\tcount, err := srv.repo.AddRequestCount(ctx, key, srv.maxCount, srv.timeUintSecond)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Why AddRequestCount Too ManyRequests will return -1\n\t// Because I want testing in service layer\n\tif count == -1 {\n\t\treturn nil, errors.ErrTooManyRequests.Build(\"too many request please retry later addr = %s url = %s\", addr, url)\n\t}\n\n\treturn &domain.Claims{\n\t\tURL: url,\n\t\tRemoteAddr: addr,\n\t\tRequestCount: count + 1,\n\t}, nil\n}", "title": "" }, { "docid": "5652ad5754841c4c976ea878c73c4be7", "score": "0.45813334", "text": "func (r *RateCollector) max(label string, now time.Time) (float64, error) {\n\tr.Lock()\n\tdefer r.Unlock()\n\tr.update(now)\n\tif _, ok := r.values[label]; ok {\n\t\tmax := float64(0)\n\t\tfor _, v := range r.values[label] {\n\t\t\tif v > max {\n\t\t\t\tmax = v\n\t\t\t}\n\t\t}\n\t\treturn max, nil\n\t}\n\treturn 0, fmt.Errorf(\"RateColletor didn't register for label %s\", label)\n}", "title": "" }, { "docid": "6e703968dfd14303b299cfa3a903a889", "score": "0.45790824", "text": "func (r *Resource) Validate() error {\n\tif r.isGroupEmpty() {\n\t\treturn fmt.Errorf(\"group cannot be empty\")\n\t}\n\tif r.isVersionEmpty() {\n\t\treturn fmt.Errorf(\"version cannot be empty\")\n\t}\n\tif r.isKindEmpty() {\n\t\treturn fmt.Errorf(\"kind cannot be empty\")\n\t}\n\t// Check if the Group has a valid value for for it\n\tif err := IsDNS1123Subdomain(r.Group); err != nil {\n\t\treturn fmt.Errorf(\"group name is invalid: (%v)\", err)\n\t}\n\t// Check if the version is a valid value\n\tversionMatch := regexp.MustCompile(`^v\\d+(alpha\\d+|beta\\d+)?$`)\n\tif !versionMatch.MatchString(r.Version) {\n\t\treturn fmt.Errorf(\n\t\t\t\"version must match ^v\\\\d+(alpha\\\\d+|beta\\\\d+)?$ (was %s)\", r.Version)\n\t}\n\t// Check if the Kind is a valid value\n\tif r.Kind != flect.Pascalize(r.Kind) {\n\t\treturn fmt.Errorf(\"kind must be PascalCase (expected %s was %s)\", flect.Pascalize(r.Kind), r.Kind)\n\t}\n\n\t// todo: move it for the proper place since they are not validations and then, should not be here\n\t// Add in r.Resource the Kind plural\n\tif len(r.Resource) == 0 {\n\t\tr.Resource = flect.Pluralize(strings.ToLower(r.Kind))\n\t}\n\t// Replace the caracter \"-\" for \"\" to allow scaffold the go imports\n\tr.GroupImportSafe = strings.Replace(r.Group, \"-\", \"\", -1)\n\tr.GroupImportSafe = strings.Replace(r.GroupImportSafe, \".\", \"\", -1)\n\treturn nil\n}", "title": "" }, { "docid": "c4a35982d01d34300f3bff87e8443085", "score": "0.4571649", "text": "func (nc *NumberConstraint) Maximum(n float64) *NumberConstraint {\n\tnc.applyMaximum = true\n\tnc.maximum = n\n\treturn nc\n}", "title": "" }, { "docid": "cec884516fcf47887fb8b4121c4b3341", "score": "0.4568359", "text": "func (r *RateCollector) Max(label string, now time.Time) (float64, error) {\n\treturn r.max(label, time.Now())\n}", "title": "" }, { "docid": "6d0ad196ffce9f7e09594554a981cc2f", "score": "0.45652157", "text": "func (o *ReferralConstraints) SetUsageLimit(v int32) {\n\to.UsageLimit = &v\n}", "title": "" }, { "docid": "71f5c884e0edd8b58ac09394917a2a83", "score": "0.45610526", "text": "func (s ElasticLoadBalancingV2TargetGroup) CfnResourceType() string {\n\t\n\treturn \"AWS::ElasticLoadBalancingV2::TargetGroup\"\n}", "title": "" }, { "docid": "eb088e786a1f6499e39aaa3a730f8e7f", "score": "0.45567602", "text": "func (r *TaskRunner) LatestResourceUsage() *cstructs.TaskResourceUsage {\n\tr.resourceUsageLock.RLock()\n\tdefer r.resourceUsageLock.RUnlock()\n\tr.runningLock.Lock()\n\tdefer r.runningLock.Unlock()\n\n\t// If the task is not running there can be no latest resource\n\tif !r.running {\n\t\treturn nil\n\t}\n\n\treturn r.resourceUsage\n}", "title": "" }, { "docid": "5ec4330059155279fd1ea330ee5a5c59", "score": "0.45540643", "text": "func (o *ExcessResourceAllOf) GetResourceName() string {\n\tif o == nil || o.ResourceName == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ResourceName\n}", "title": "" }, { "docid": "0a3bce249de5da5ba64abc046ec139ae", "score": "0.45491323", "text": "func (dm *Datamuse) Max(n uint) *Datamuse {\n\tdm.setQueryParam(\"max\", strconv.FormatUint(uint64(n), 10))\n\treturn dm\n}", "title": "" }, { "docid": "d1f47cd9a713e8b7251d39646742544d", "score": "0.45444113", "text": "func ResourceFromKind(kind string) string {\n\tif string(kind[len(kind)-1]) == \"s\" {\n\t\treturn strings.ToLower(kind) + \"es\"\n\t}\n\tif string(kind[len(kind)-1]) == \"y\" {\n\t\treturn strings.ToLower(kind)[:len(kind)-1] + \"ies\"\n\t}\n\treturn strings.ToLower(kind) + \"s\"\n}", "title": "" }, { "docid": "c7aec44ab6b6bc2e9f7b17e6bb2b2870", "score": "0.45402423", "text": "func (*ResourceLimit) Descriptor() ([]byte, []int) {\n\treturn file_xchain_proto_rawDescGZIP(), []int{69}\n}", "title": "" }, { "docid": "e89e1b91299e48bf58d5c5480a32c9d7", "score": "0.45394757", "text": "func (px *Paxos) Max() int {\n\tkeys := px.getKeys(px.instances)\n\t\n\tmax := -1\n\tfor i := range keys {\n\t\tif keys[i] > max {\n\t\t\tmax = keys[i]\n\t\t}\n\t}\n\treturn max\n}", "title": "" }, { "docid": "7843f5737a8584c89c89c41d18492525", "score": "0.45373136", "text": "func (t *Tally) Max() string {\n\treturn t.MaxExclude()\n}", "title": "" }, { "docid": "56b109ecfabd040cc4e7b96283f137a2", "score": "0.45347637", "text": "func (ic *IntegerConstraint) Maximum(n float64) *IntegerConstraint {\n\tic.applyMaximum = true\n\tic.maximum = n\n\treturn ic\n}", "title": "" }, { "docid": "97d09c1e06ab37ef466afad5da56aac2", "score": "0.45283988", "text": "func (s *AvailabilitySetSpec) ResourceName() string {\n\treturn s.Name\n}", "title": "" }, { "docid": "bbe63d7d02e0b3f299c7b2c2f135d46c", "score": "0.45231414", "text": "func (s WAFRegionalSizeConstraintSet) CfnResourceType() string {\n\t\n\treturn \"AWS::WAFRegional::SizeConstraintSet\"\n}", "title": "" }, { "docid": "0c567e682d0ff74c417a38e2fc0eca6d", "score": "0.45216605", "text": "func (m *metricMongodbatlasSystemCPUNormalizedUsageMax) updateCapacity() {\n\tif m.data.Gauge().DataPoints().Len() > m.capacity {\n\t\tm.capacity = m.data.Gauge().DataPoints().Len()\n\t}\n}", "title": "" }, { "docid": "797bc4aacd5d7fb54972d3a0a26bfb88", "score": "0.45160857", "text": "func PoolRuleByAvailableCapacity(usage, scalePercentage uint64, expandType string) apapi.AutopilotRule {\n\treturn apapi.AutopilotRule{\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"pool-%s-available-%d\", expandType, usage),\n\t\t},\n\t\tSpec: apapi.AutopilotRuleSpec{\n\t\t\tConditions: apapi.RuleConditions{\n\t\t\t\tExpressions: []*apapi.LabelSelectorRequirement{\n\t\t\t\t\t{\n\t\t\t\t\t\tKey: PxPoolAvailableCapacityMetric,\n\t\t\t\t\t\tOperator: apapi.LabelSelectorOpLt,\n\t\t\t\t\t\tValues: []string{fmt.Sprintf(\"%d\", usage)},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tActions: []*apapi.RuleAction{\n\t\t\t\t{\n\t\t\t\t\tName: StorageSpecAction,\n\t\t\t\t\tParams: map[string]string{\n\t\t\t\t\t\tRuleActionsScalePercentage: fmt.Sprintf(\"%d\", scalePercentage),\n\t\t\t\t\t\tRuleScaleType: expandType,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "797bc4aacd5d7fb54972d3a0a26bfb88", "score": "0.45160857", "text": "func PoolRuleByAvailableCapacity(usage, scalePercentage uint64, expandType string) apapi.AutopilotRule {\n\treturn apapi.AutopilotRule{\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"pool-%s-available-%d\", expandType, usage),\n\t\t},\n\t\tSpec: apapi.AutopilotRuleSpec{\n\t\t\tConditions: apapi.RuleConditions{\n\t\t\t\tExpressions: []*apapi.LabelSelectorRequirement{\n\t\t\t\t\t{\n\t\t\t\t\t\tKey: PxPoolAvailableCapacityMetric,\n\t\t\t\t\t\tOperator: apapi.LabelSelectorOpLt,\n\t\t\t\t\t\tValues: []string{fmt.Sprintf(\"%d\", usage)},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tActions: []*apapi.RuleAction{\n\t\t\t\t{\n\t\t\t\t\tName: StorageSpecAction,\n\t\t\t\t\tParams: map[string]string{\n\t\t\t\t\t\tRuleActionsScalePercentage: fmt.Sprintf(\"%d\", scalePercentage),\n\t\t\t\t\t\tRuleScaleType: expandType,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "130894c8ab6a489bd0bd2aa887869b2c", "score": "0.45099682", "text": "func (*resourceUsageMetricMeasurement) String() string {\n\treturn resourceUsageMetricName\n}", "title": "" }, { "docid": "82c214d030b4853d1bcb8a269717d111", "score": "0.4506908", "text": "func (o VpcIpamPoolCidrAllocationOutput) ResourceType() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *VpcIpamPoolCidrAllocation) pulumi.StringOutput { return v.ResourceType }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "09c802bb6c04c0c1acbb42dd5289414b", "score": "0.45052552", "text": "func (*String) Max(x, y string) string {\n\tif x > y {\n\t\treturn x\n\t}\n\treturn y\n}", "title": "" }, { "docid": "8e93889c772ed48d91db8a5c19856f9e", "score": "0.45049536", "text": "func (mpl minLifespanTolerations) Name() string {\n\treturn \"min_lifespan\"\n}", "title": "" }, { "docid": "5a31a6c2d4cd185b09dddbf8fb664b21", "score": "0.4501647", "text": "func (m *ResourceType) Validate() error {\n\tif m == nil {\n\t\treturn nil\n\t}\n\n\tif _, ok := _ResourceType_Name_NotInLookup[m.GetName()]; ok {\n\t\treturn ResourceTypeValidationError{\n\t\t\tfield: \"Name\",\n\t\t\treason: \"value must not be in list []\",\n\t\t}\n\t}\n\n\t// no validation rules for Description\n\n\tif len(m.GetData()) < 1 {\n\t\treturn ResourceTypeValidationError{\n\t\t\tfield: \"Data\",\n\t\t\treason: \"value must contain at least 1 item(s)\",\n\t\t}\n\t}\n\n\tfor idx, item := range m.GetData() {\n\t\t_, _ = idx, item\n\n\t\tif v, ok := interface{}(item).(interface{ Validate() error }); ok {\n\t\t\tif err := v.Validate(); err != nil {\n\t\t\t\treturn ResourceTypeValidationError{\n\t\t\t\t\tfield: fmt.Sprintf(\"Data[%v]\", idx),\n\t\t\t\t\treason: \"embedded message failed validation\",\n\t\t\t\t\tcause: err,\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e03e97755c67fac0e6ba5c69a2c1d142", "score": "0.44829857", "text": "func (o *NewReferralsForMultipleAdvocates) SetUsageLimit(v int32) {\n\to.UsageLimit = v\n}", "title": "" } ]
02635b2bcc7a331fe7f496bc1df09ff6
LineToList takes a string and a separator, and returns a slice of string. Spaces are trimmed from each element.
[ { "docid": "257a31bd1428b4f41d8c0d67f86886c2", "score": "0.82087165", "text": "func LineToList(line string, sep string) []string {\n\tvar data []string\n\tfor _, item := range strings.Split(line, sep) {\n\t\tdata = append(data, strings.Trim(item, \" \"))\n\t}\n\treturn data\n}", "title": "" } ]
[ { "docid": "084c16292d2ffb086cb3b42419b4c32f", "score": "0.64088374", "text": "func stringToList(str, delimiter string) ([]string, error) {\n\tzonesSlice := make([]string, 0)\n\tfor _, zone := range strings.Split(str, delimiter) {\n\t\ttrimmedZone := strings.TrimSpace(zone)\n\t\tif trimmedZone == \"\" {\n\t\t\treturn nil, fmt.Errorf(\n\t\t\t\t\"%q separated list (%q) must not contain an empty string\",\n\t\t\t\tdelimiter,\n\t\t\t\tstr)\n\t\t}\n\t\tzonesSlice = append(zonesSlice, trimmedZone)\n\t}\n\treturn zonesSlice, nil\n}", "title": "" }, { "docid": "01dff62ff883ec1fbe87dbf8ca83da74", "score": "0.57077277", "text": "func splitByEach(source, sep string) []string {\n\tlength := len(source)\n\tres := []string{}\n\tstart := 0\n\tfor i := 0; i < length; i++ {\n\t\t// ptr run into delimiter\n\t\tif strings.Contains(sep, string(source[i])) {\n\t\t\tres = append(res, source[start:i])\n\t\t\tstart = i + 1\n\t\t} else if i == length-1 {\n\t\t\t// when ptr meet the end of string\n\t\t\tres = append(res, source[start:i])\n\t\t} else {\n\t\t\tcontinue\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "2de111008cd126c9db9cebed2897ad79", "score": "0.57029545", "text": "func StringList(line string) (list []string, err error) {\n\n\tfor len(line) > 0 {\n\t\tvar quoted bool\n\t\tvar j int\n\t\tif line[0] == '\"' {\n\t\t\tj = endQuoteIndex(line)\n\t\t\tquoted = true\n\t\t} else {\n\t\t\tj = nextSpaceIndex(line) - 1\n\t\t\tquoted = false\n\t\t}\n\n\t\tvar p string\n\t\tif j < len(line) {\n\t\t\tp = line[0 : j+1]\n\t\t\tline = line[j+1:]\n\t\t} else {\n\t\t\tp = line[0:j]\n\t\t\tif quoted {\n\t\t\t\tp += \"\\\"\" // gracefuly add missing \" at end\n\t\t\t}\n\t\t\tline = \"\"\n\t\t}\n\t\tif quoted {\n\t\t\tif p, err = dequote(p); err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tlist = append(list, p)\n\t\tline = strings.TrimLeft(line, \" \")\n\t}\n\treturn\n}", "title": "" }, { "docid": "6b91c8880c4aadbb80a4d853280eb958", "score": "0.5620387", "text": "func splitline(l string, count int) []string {\n\tsplits := splittingregexp.Split(strings.TrimLeft(l, \"\\t \"), count)\n\t// log.Printf(\"splitting %#v ➜ %#v\", l, splits)\n\treturn splits\n}", "title": "" }, { "docid": "8b25ca523f2968b1c0ad10118758fde9", "score": "0.55786604", "text": "func SplitLines(s string) []string {\r\n\tvar lines []string\r\n\tsc := bufio.NewScanner(strings.NewReader(s))\r\n\tfor sc.Scan() {\r\n\t\tlines = append(lines, sc.Text())\r\n\t}\r\n\treturn lines\r\n}", "title": "" }, { "docid": "01aa5129bd9e3fed456acaa7077c6a8d", "score": "0.5534684", "text": "func StringListFromReader(reader io.Reader) []string {\n\tdata := mustReadStringData(reader)\n\tlines := strings.Split(data, \"\\n\")\n\treturn lines\n}", "title": "" }, { "docid": "24e996c3480b7d2255f6e4d2fc8cf629", "score": "0.5534662", "text": "func ParseList(s, sep string) []string {\n\tvar list []string\n\tfor _, item := range strings.Split(s, sep) {\n\t\titem = strings.TrimSpace(item)\n\t\tif item != \"\" {\n\t\t\tlist = append(list, item)\n\t\t}\n\t}\n\treturn list\n}", "title": "" }, { "docid": "3668c911383cfd00b53d20914a397875", "score": "0.5479834", "text": "func SplitLines(s string) []string {\n\tsli := strings.Split(s, \"/n\")\n\treturn sli\n}", "title": "" }, { "docid": "434b9e920899b6d8bd381ce533743fa1", "score": "0.5470198", "text": "func SplitStringByLine(base string) []string {\n\treturn strings.Split(strings.ReplaceAll(base, \"\\r\\n\", \"\\n\"), \"\\n\")\n}", "title": "" }, { "docid": "03ce8f30e85e0fb843b74b664c975cb9", "score": "0.54137677", "text": "func stringSplitLines(s string) []string {\n\treturn strings.Split(strings.Replace(s, \"\\r\\n\", \"\\n\", -1), \"\\n\")\n}", "title": "" }, { "docid": "6b26fdb3105fe31f592093a69c575b59", "score": "0.5411808", "text": "func splitLines(s string) []string {\n\treturn strings.Split(strings.Replace(s, \"\\r\\n\", \"\\n\", -1), \"\\n\")\n}", "title": "" }, { "docid": "97f5d424294d0516a2d65e9eeeb16adf", "score": "0.5397544", "text": "func appendLine(s []string, l string) []string {\n\treturn append(s, trimLine(l))\n}", "title": "" }, { "docid": "cc313c6561ac4a68b4bf1c701fa9ce31", "score": "0.537948", "text": "func (*PDF) splitLines(s string) []string {\n\tsplit := func(lines []string, sep string) (ret []string) {\n\t\tfor _, line := range lines {\n\t\t\tif strings.Contains(line, sep) {\n\t\t\t\tret = append(ret, strings.Split(line, sep)...)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tret = append(ret, line)\n\t\t}\n\t\treturn ret\n\t}\n\treturn split(split(split([]string{s}, \"\\r\\n\"), \"\\r\"), \"\\n\")\n}", "title": "" }, { "docid": "f4c2d8de30b638fc117f7ed84aad3823", "score": "0.5373825", "text": "func ReadLinesWithSeparator(path string, sep string) ([]string, error) {\n\tcontent, readFileErr := ioutil.ReadFile(path)\n\tif readFileErr != nil {\n\t\treturn nil, readFileErr\n\t}\n\tlines := strings.Split(string(content), sep)\n\n\treturn lines, nil\n}", "title": "" }, { "docid": "3194d5f37fc7420260003032a4160825", "score": "0.5339807", "text": "func Line(lines string) []string {\n\tvar result []string\n\tappendPrevLine := false\n\tindex := 0\n\n\tfor _, l := range regexp.MustCompile(`\\n`).Split(lines, -1) {\n\t\tnl := strings.TrimSpace(l)\n\t\tif nl == \"\" || strings.HasPrefix(nl, \"//\") || strings.HasPrefix(nl, \"#\") {\n\t\t\tcontinue\n\t\t}\n\t\tif appendPrevLine {\n\t\t\tresult[index-1] = result[index-1] + \"\\n \" + nl\n\t\t\tappendPrevLine = false\n\t\t} else {\n\t\t\tresult = append(result, nl)\n\t\t\tindex++\n\t\t}\n\n\t\tif strings.HasSuffix(nl, \"\\\\\") {\n\t\t\tappendPrevLine = true\n\t\t}\n\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "109d1c2aac80651c21f43e39926de207", "score": "0.53334147", "text": "func StringSplit(s, sep string) []string {\n\treturn neogointernal.CallWithToken(Hash, \"stringSplit\", int(contract.NoneFlag),\n\t\ts, sep).([]string)\n}", "title": "" }, { "docid": "d7f67f14f936d2ee39d0e4102078b1a5", "score": "0.5333244", "text": "func smartSplitLines(line, sentinel string) []string {\n\t// NOTE(termie): we have to do some string mangling here to find the\n\t// sentinel when stuff manages to squeeze it on to the\n\t// same logical output line, it isn't pretty and makes\n\t// me sad\n\tlines := []string{}\n\tsplitLines := strings.Split(line, \"\\n\")\n\t// If the line at least ends with a newline\n\tif len(splitLines) > 1 {\n\t\t// Check the second to last element\n\t\t// (the newline at the end makes an empty final element)\n\t\tpossibleSentinel := splitLines[len(splitLines)-2]\n\t\t// And we expect a newline at the end\n\t\tpossibleSentinel = fmt.Sprintf(\"%s\\n\", possibleSentinel)\n\n\t\t// does this string contain the sentinel?\n\t\tsentPos := strings.Index(possibleSentinel, sentinel)\n\n\t\t// If we found the sentinel, make sure it gets read as a separate line to anything that preceded it\n\t\tif sentPos >= 0 {\n\t\t\t// If we weren't the only line to begin with, add the rest\n\t\t\tif len(splitLines) > 2 {\n\t\t\t\totherLines := strings.Join(splitLines[:len(splitLines)-2], \"\\n\")\n\t\t\t\totherLines = fmt.Sprintf(\"%s\\n\", otherLines)\n\t\t\t\tlines = append(lines, otherLines)\n\t\t\t}\n\t\t\tif sentPos > 0 {\n\t\t\t\t// Add the characters before the sentinel on its own line\n\t\t\t\tlines = append(lines, possibleSentinel[0:sentPos])\n\t\t\t}\n\t\t\t// add the sentinel (and whatever follows) on its own line\n\t\t\tlines = append(lines, possibleSentinel[sentPos:])\n\t\t} else {\n\t\t\t// Otherwise a sentinel was not found so just return the whole thing\n\t\t\tlines = append(lines, line)\n\t\t}\n\t} else {\n\t\tlines = append(lines, line)\n\t}\n\treturn lines\n}", "title": "" }, { "docid": "0d665ebe5bbc899bb3fa6fab709d7f90", "score": "0.5312743", "text": "func StringSlice(val, sep string) ([]string, error) {\n\treturn strings.Split(val, sep), nil\n}", "title": "" }, { "docid": "edaf6801862188c526465c31a56a37eb", "score": "0.52976996", "text": "func linesUntilSeparator(reader *bufio.Reader, separator string, out chan string) error {\n\n\tvar line string\n\tvar err error\n\n\tdefer close(out)\n\n\tfor {\n\n\t\tline, err = reader.ReadString('\\n')\n\t\tif err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\n\t\tif strings.HasPrefix(line, separator) {\n\t\t\tbreak\n\t\t}\n\n\t\tout <- line\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3b88f0590aa0e562dd732c24bfdf80b6", "score": "0.52867967", "text": "func DataFromListLine(data []string, key string, sep string, index int) string {\n\tvar datum string\n\tfor _, line := range data {\n\t\tif strings.HasPrefix(line, key) {\n\t\t\tif sep != \"\" && index >= 0 {\n\t\t\t\tdatum = strings.Split(line, sep)[index]\n\t\t\t} else {\n\t\t\t\tdatum = line\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\treturn datum\n}", "title": "" }, { "docid": "667a9b8d94127d5a0744d27e55e5582e", "score": "0.5271981", "text": "func parseListString(s string) []string {\n\tf := func(c rune) bool {\n\t\treturn c == ','\n\t}\n\t// Split by comma\n\tsplit := strings.FieldsFunc(s, f)\n\tvar result = make([]string, len(split))\n\t// Trim any whitespace\n\tfor i, s := range split {\n\t\tresult[i] = strings.TrimSpace(s)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "fbe8a407b6084849717938893bff36eb", "score": "0.526406", "text": "func split(s string, sep string) []string {\n\treturn strings.Split(s, sep)\n}", "title": "" }, { "docid": "833a8db8de10114103743157c8e1c7b9", "score": "0.5218385", "text": "func splitPath(path, separator string) []string {\n\treturn stringex.SplitFilter(path, separator, func(part string) bool {\n\t\treturn part != \"\"\n\t})\n}", "title": "" }, { "docid": "c7bc66535f0f2450e432489d8b1f8b4a", "score": "0.52167255", "text": "func Split(str string, seperator ...string) []string {\n\tsep := \"\"\n\tstr = strings.TrimSpace(str)\n\tif len(seperator) == 0 {\n\t\tsep = \",\"\n\t} else {\n\t\tsep = seperator[0]\n\t}\n\tarr := strings.Split(str, sep)\n\tfor i, value := range arr {\n\t\tarr[i] = strings.TrimSpace(value)\n\t}\n\treturn arr\n}", "title": "" }, { "docid": "0848935bf2404c53d8b3d271bf923520", "score": "0.52113414", "text": "func (s TrimmedString) Split(sep string) []TrimmedString {\n\tsubstrings := strings.Split(s.String(), sep)\n\tfor i, substring := range substrings {\n\t\tsubstrings[i] = strings.TrimSpace(substring)\n\t}\n\treturn *(*[]TrimmedString)(unsafe.Pointer(&substrings))\n}", "title": "" }, { "docid": "f74da6940f54dbe1898ebae03cf7ec57", "score": "0.5196821", "text": "func list(v string) []string {\n\t// split the string on \":\"\n\treturn strings.Split(v, \":\")\n}", "title": "" }, { "docid": "67c235b3b239b0581e426e06d75b1fcc", "score": "0.5182956", "text": "func splitFileLines(s string) []string {\n\treturn strings.Split(s, \"\\n\")\n}", "title": "" }, { "docid": "6713e93fb52ebb81290c7aa4fd926896", "score": "0.5180511", "text": "func SeparateString(rowSep *regexp.Regexp, colSep *regexp.Regexp, str string) (output Table) {\n\tlines := rowSep.Split(str, -1)\n\tfor _, line := range lines {\n\t\trawRow := colSep.Split(line, -1)\n\t\trow := []string{}\n\t\tfor _, cell := range rawRow {\n\t\t\trow = append(row, strings.TrimSpace(cell))\n\t\t}\n\t\tif len(row) > 0 && HasNonEmpty(row) {\n\t\t\toutput = append(output, row)\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "bda60fb6849977c574bd4558c5c33114", "score": "0.51778734", "text": "func NewListFromString(s string, padding string) BulletList {\n\treturn NewListFromStrings(strings.Split(s, \"\\n\"), padding)\n}", "title": "" }, { "docid": "f44099c722e0b5307c2a5843e66d8569", "score": "0.51733744", "text": "func Lines(input string) []string {\n\treturn strings.Split(strings.TrimSpace(input), \"\\n\")\n}", "title": "" }, { "docid": "21beb22dc860fbde7c3aad9c05e3e45f", "score": "0.5140284", "text": "func Split(s interface{}, sep string) ([]string, error) {\n\tss, err := toStringE(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn strings.Split(ss, sep), nil\n}", "title": "" }, { "docid": "1b64cbee8d1da8647f03503951dc32f8", "score": "0.51368684", "text": "func toStringIdentifiersWithSeparator(s string, separator string) ([]stringIdentifier, error) {\n\tif \"\" == s {\n\t\treturn nil, fmt.Errorf(\"can't parse an empty string\")\n\t}\n\n\treturn toStringIdentifiers(strings.Split(s, separator))\n}", "title": "" }, { "docid": "1decd1812000fa3300bd918c3c861b22", "score": "0.5130887", "text": "func SplitAndTrim(s, sep, cutset string) []string {\n\tif s == \"\" {\n\t\treturn []string{}\n\t}\n\n\tspl := strings.Split(s, sep)\n\tfor i := 0; i < len(spl); i++ {\n\t\tspl[i] = strings.Trim(spl[i], cutset)\n\t}\n\treturn spl\n}", "title": "" }, { "docid": "1569673a5b3c68e6f1bc5b8d8c670d28", "score": "0.5108204", "text": "func Lines(s string) []string {\n\treturn strings.Split(s, \"\\n\")\n}", "title": "" }, { "docid": "004167c1ee57207bb1b09f7c04264ccc", "score": "0.5103128", "text": "func StrToSlice(src string, delimiter string) []string {\n\tchoiceSlice := strings.Split(src, delimiter)\n\treturn choiceSlice\n}", "title": "" }, { "docid": "c7c998d85d237fa3e0dcbaf4fe0abcb3", "score": "0.5087319", "text": "func StringListToSpaceLine(list []string) string {\n\ttmpArr := make([]string, 0, len(list))\n\tfor _, val := range list {\n\t\tval = CleanArgLine(val)\n\t\t// val = strings.Replace(val, \" \", \",\", -1)\n\t\ttmpArr = append(tmpArr, val)\n\t}\n\treturn strings.Trim(strings.Join(tmpArr, \" \"), \", \")\n}", "title": "" }, { "docid": "9d0519dfd79fb628de0f99fb6aa08adc", "score": "0.5083421", "text": "func Split(s string, sep string) []string {\n\treturn strings.Split(s, sep)\n}", "title": "" }, { "docid": "094d15ccece3980837a77549faa634b6", "score": "0.5067023", "text": "func GetVectorOfStrings(source string, sep string) []string {\n\treturn strings.Split(source,sep)\n}", "title": "" }, { "docid": "7543014973a2f0232b1984e910d5cad8", "score": "0.5051434", "text": "func Breaker(s string, nx int) []string {\n\n\tif len(s) == 0 {\n\t\treturn make([]string, 0)\n\t}\n\n\trows := len(s) / nx\n\tif (len(s) % nx) != 0 {\n\t\trows++\n\t}\n\tvar ret []string = make([]string, rows)\n\tfor i := 0; i < rows; i++ {\n\t\tif i < rows-1 {\n\t\t\tret[i] = s[i*nx : (i+1)*nx]\n\n\t\t} else {\n\t\t\tret[i] = s[i*nx:]\n\n\t\t}\n\t}\n\treturn ret\n\n}", "title": "" }, { "docid": "b20711f30deff64e29e87afadb6af83a", "score": "0.50473225", "text": "func tokenizeString(s, sep string) []string {\n\tvar tokens []string = nil\n\n\tfor _, t := range strings.Split(s, sep) {\n\t\tif t != \"\" {\n\t\t\ttokens = append(tokens, t)\n\t\t}\n\t}\n\n\treturn tokens\n}", "title": "" }, { "docid": "e81cf78f3b13f8cb07783de3356a308c", "score": "0.50472224", "text": "func (ctxt *fileSystem) splitPathList(s string) []string {\n\tif f := ctxt.SplitPathList; f != nil {\n\t\treturn f(s)\n\t}\n\treturn filepath.SplitList(s)\n}", "title": "" }, { "docid": "f0f0655ede300fcc55e6f18bd119bddb", "score": "0.5027292", "text": "func ReadStringCollectionWithSeparatorValue(flagValue *string, sep string) []string {\n\n\tif flagValue == nil {\n\t\treturn make([]string, 0)\n\t}\n\n\ts := strings.Split(*flagValue, sep)\n\n\tc := make([]string, 0)\n\tfor _, i := range s {\n\t\tif i == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tc = append(c, strings.TrimSpace(i))\n\t}\n\treturn c\n}", "title": "" }, { "docid": "dfd5428c84b0118fae310f354da60fbf", "score": "0.502183", "text": "func listSeparator() string {\n\tif pathListSep == \"\" {\n\t\tlen := utf8.RuneLen(filepath.ListSeparator)\n\t\tif len < 0 {\n\t\t\tpanic(\"filepath.ListSeparator is not valid utf8?!\")\n\t\t}\n\t\tbuf := make([]byte, len)\n\t\tlen = utf8.EncodeRune(buf, filepath.ListSeparator)\n\t\tpathListSep = string(buf[:len])\n\t}\n\n\treturn pathListSep\n}", "title": "" }, { "docid": "3f3a82dfd2e006b3f0489bac361506e1", "score": "0.500752", "text": "func StringSplit(s *string, sep string) []string {\n\treturn strings.Split(*s, sep)\n}", "title": "" }, { "docid": "fcee6165e6058fe95d2abf338484e475", "score": "0.49861312", "text": "func splitLog(log string) []string {\n\tlines := strings.Split(log, \"\\n\")\n\t// Remove last entry since '\\n' adds an empty element to the end of the arr\n\treturn lines[:len(lines)-1]\n}", "title": "" }, { "docid": "3eb8bca49e8707b213aff8bb5c96f0d5", "score": "0.49819565", "text": "func (t *StrChain) Split(sep string) []string {\n\treturn strings.Split(t.v, sep)\n}", "title": "" }, { "docid": "38461c4ae41490fb4f75c654becdd8b0", "score": "0.49554998", "text": "func Split(sep, str cty.Value) (cty.Value, error) {\n\treturn SplitFunc.Call([]cty.Value{sep, str})\n}", "title": "" }, { "docid": "a2836bc0fda27cc755241e18723b0ef1", "score": "0.4935579", "text": "func LinesOf(it Lines) []Line {\n\tif it == nil {\n\t\treturn nil\n\t}\n\tn := it.Len()\n\tswitch {\n\tcase n == 0:\n\t\treturn nil\n\tcase n < 0:\n\t\tn = 0\n\t}\n\tswitch it := it.(type) {\n\tcase LineSlicer:\n\t\treturn it.LineSlice()\n\t}\n\tlines := make([]Line, 0, n)\n\tfor it.Next() {\n\t\tlines = append(lines, it.Line())\n\t}\n\tif len(lines) == 0 {\n\t\treturn nil\n\t}\n\treturn lines\n}", "title": "" }, { "docid": "a8f30ebd0b48489fa7c61b861652ac8a", "score": "0.4876986", "text": "func FromStrStrSlice(lines [][]string, comma ...string) Parsed {\n\tvar sep = \"\\t\"\n\tif len(comma) > 0 {\n\t\tsep = comma[0]\n\t}\n\n\tp := Parsed{}\n\tfor _, l := range lines {\n\t\tp = append(p, parsedLine{\n\t\t\tparsed: l,\n\t\t\toriginal: strings.Join(l, sep),\n\t\t})\n\t}\n\treturn p\n}", "title": "" }, { "docid": "6a1820dd7804a3bf9377237e9cc03490", "score": "0.48740575", "text": "func FieldsFuncWithSeparator(s string, separatorsToInclude func(rune) bool, separatorsToExclude func(rune) bool) []string {\n\tspans := make([]string, 0, 32)\n\n\tstart := 0\n\n\tfor i, r := range s {\n\t\tif separatorsToInclude(r) {\n\t\t\tif start != i {\n\t\t\t\tspans = append(spans, s[start:i])\n\t\t\t}\n\n\t\t\tspans = append(spans, s[i:i+1])\n\t\t\tstart = i + 1\n\t\t} else if separatorsToExclude(r) {\n\t\t\tif start != i {\n\t\t\t\tspans = append(spans, s[start:i])\n\t\t\t}\n\n\t\t\tstart = i + 1\n\t\t}\n\t}\n\n\tif start != len(s) {\n\t\tspans = append(spans, s[start:])\n\t}\n\n\treturn spans\n}", "title": "" }, { "docid": "6aae5064206f3f397fffd0c10fee52f0", "score": "0.48633316", "text": "func SplitLines(s []byte) (results [][]byte) {\n\trest := s\n\tfor len(rest) > 0 {\n\t\tline, r := ReadLine(rest)\n\t\tresults = append(results, line)\n\t\trest = r\n\t}\n\treturn\n}", "title": "" }, { "docid": "2fee2b68b108a7b75a64b55c9d2c1780", "score": "0.48572677", "text": "func Split(s string) []string {\n\treturn regexp.MustCompile(`\\s*[.,]\\s*`).Split(s, -1)\n}", "title": "" }, { "docid": "e1626608939f0cbaa63c8d26be1d5291", "score": "0.4830562", "text": "func (ctxt *Context) splitPathList(s string) []string {\n\tif f := ctxt.SplitPathList; f != nil {\n\t\treturn f(s)\n\t}\n\treturn filepath.SplitList(s)\n}", "title": "" }, { "docid": "cd769ca46db68fc23848b68e96b33e94", "score": "0.48231557", "text": "func StringSliceFlatten(in []string) []string {\n\tss := []string{}\n\n\tfor _, s := range in {\n\t\ts = strings.TrimSpace(s)\n\t\tif len(s) == 0 {\n\t\t\tcontinue\n\t\t}\n\n\t\tss = append(ss, s)\n\t}\n\n\treturn ss\n}", "title": "" }, { "docid": "c905a43f9ce2fdef4e25c8d28f64267a", "score": "0.4822763", "text": "func splitStringLinesBySize(input string, maxSize int) []string {\n\tresult := []string{}\n\tparts := regexp.MustCompile(\"\\n\").Split(input, -1)\n\tchunks := []string{parts[0]}\n\tchunkSize := len(parts[0])\n\n\tfor _, part := range parts[1:] {\n\t\t// current + \"\\n\" + next > maxSize\n\t\tif chunkSize+1+len(part) > maxSize {\n\t\t\tresult = append(result, strings.Join(chunks, \"\\n\"))\n\t\t\tchunks = []string{part}\n\t\t\tchunkSize = len(part)\n\t\t} else {\n\t\t\tchunks = append(chunks, part)\n\t\t\tchunkSize += 1 + len(part)\n\t\t}\n\t}\n\tif len(chunks) > 0 {\n\t\tresult = append(result, strings.Join(chunks, \"\\n\"))\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "b48965f9f368238043944e5cdf0e8305", "score": "0.48212382", "text": "func Split(items string) []string {\n\treturn s.Split(items, \",\")\n}", "title": "" }, { "docid": "dc20eb056b2025b093179b312f55be67", "score": "0.4812107", "text": "func FlatFileSplit(s string) []string {\n\ts = strings.TrimSuffix(s, \".\")\n\tif len(s) == 0 {\n\t\treturn nil\n\t}\n\treturn strings.Split(s, \"; \")\n}", "title": "" }, { "docid": "93d079e37020899bfa47ad5fab424861", "score": "0.4767794", "text": "func SplitSafe(s, sep string) []string {\n\tvar dd []string\n\ts = ClearSpace(s)\n\tdd = strings.Split(s, sep)\n\treturn dd\n}", "title": "" }, { "docid": "559bcd662f9dd5d37e14865e8f63338c", "score": "0.47671014", "text": "func Explode(s, sep string) ([]string) {\n\n\tif s == \"\" {\n\t\treturn []string{s}\n\t}\n\n\treturn strings.Split(s, sep)\n}", "title": "" }, { "docid": "f458db750fd20bb2e215ece590ea1be3", "score": "0.47662744", "text": "func SplitAndTrim(s, sep []byte) [][]byte {\n\tsp := bytes.Split(s, sep)\n\tfor i, n := 0, len(sp); i < n; i++ {\n\t\tsp[i] = bytes.TrimSpace(sp[i])\n\t}\n\n\treturn sp\n}", "title": "" }, { "docid": "02a066fc60d7ad9993e6a143d56122c8", "score": "0.47520462", "text": "func SplitLines(line string, width int) []string {\n\tvar retstring []string\n\tvar wrapped string\n\twords := strings.Fields(line)\n\tif len(words) == 0 {\n\t\treturn retstring\n\t}\n\twrapped = words[0]\n\tspaceleft := width - len(wrapped)\n\tfor _, word := range words[1:] {\n\t\tif len(word)+1 > spaceleft {\n\t\t\tretstring = append(retstring, wrapped)\n\t\t\twrapped = word\n\t\t\tspaceleft = width - len(word)\n\t\t} else {\n\t\t\twrapped += \" \" + word\n\t\t\tspaceleft -= 1 + len(word)\n\t\t}\n\t}\n\tretstring = append(retstring, wrapped)\n\treturn retstring\n}", "title": "" }, { "docid": "060ed63028beefba3e9cc365895b9461", "score": "0.47352165", "text": "func (e *echo) Split(list string, sep ...string) []string {\n\tsepRegx := spaceRgx\n\tif len(sep) > 0 {\n\t\tsepRegx = regexp.MustCompile(sep[0])\n\t}\n\treturn sepRegx.Split(os.Expand(list, e.Val), -1)\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "b76ecbba0b6c7ea6df5c4035c1611057", "score": "0.47192925", "text": "func splitandclean(in, sep string, n int) []string {\n\tv := strings.SplitN(in, sep, n)\n\tfor i := range v {\n\t\tv[i] = strings.TrimSpace(v[i])\n\t}\n\treturn v\n}", "title": "" }, { "docid": "42e82193af5066bd7a8ed603e498e450", "score": "0.4719121", "text": "func filter(input []string) (output []string) {\n\tfor i := range input {\n\t\tif input[i] != \"\" {\n\t\t\tif input[i][len(input[i])-1] == '\\r' {\n\t\t\t\tinput[i] = input[i][:len(input[i])-1]\n\t\t\t}\n\t\t\toutput = append(output, input[i])\n\t\t}\n\t}\n\treturn output\n}", "title": "" }, { "docid": "03cf58b21d2d0f8055667042530ea793", "score": "0.46944532", "text": "func RegSplit(text string, delimeter string) []string {\n reg := regexp.MustCompile(delimeter)\n indexes := reg.FindAllStringIndex(text, -1)\n laststart := 0\n result := make([]string, len(indexes) + 1)\n for i, element := range indexes {\n result[i] = text[laststart:element[0]]\n laststart = element[1]\n }\n result[len(indexes)] = text[laststart:len(text)]\n return result\n}", "title": "" }, { "docid": "53b98afadf380853a42bb307946ca1bf", "score": "0.4694214", "text": "func parseIPsToSlice(iplist string) []string {\n\treturn strings.Split(iplist, \",\")\n}", "title": "" }, { "docid": "9df3e6e42d4c8a776a57a94892bcb724", "score": "0.46841893", "text": "func HeadersFromList(data []string, sep string) []string {\n\t// assumes blank lines and comments have been filtered out.\n\tvar headers []string\n\tfor _, line := range data {\n\t\tdatum := strings.Split(line, sep)[0]\n\t\theaders = append(headers, strings.Trim(datum, \" \"))\n\t}\n\tsort.Strings(headers)\n\treturn headers\n}", "title": "" }, { "docid": "4f168aa3a64df46b06c26e3f525d5168", "score": "0.4680906", "text": "func TokeniseLine(line string, re *regexp.Regexp) []string {\n\tvar res []string\n\tmatches := re.FindAllStringSubmatch(line, -1)\n\tfor i := range matches {\n\t\tfor j := range matches[i] {\n\t\t\tif j > 0 && matches[i][j] != \"\" {\n\t\t\t\tres = append(res, matches[i][j])\n\t\t\t}\n\t\t}\n\t}\n\treturn res\n}", "title": "" }, { "docid": "e05324dc5b8d7fd58d538f1bdcbdec8f", "score": "0.46788377", "text": "func SplitN(s interface{}, sep string, n int) ([]string, error) {\n\tss, err := toStringE(s)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn strings.SplitN(ss, sep, n), nil\n}", "title": "" }, { "docid": "ca44fba48a878d37eed212e2a2ac5f64", "score": "0.46756577", "text": "func StringToSlice(s string) []string {\n\treturn strings.Split(s, \",\")\n}", "title": "" }, { "docid": "7865a13c65a25644e8566fc5e32c56e5", "score": "0.46664387", "text": "func TokeniseLine(line string) ([]string, error) {\n\tif !lineMatcher.MatchString(line) {\n\t\treturn nil, fmt.Errorf(\"Invalid line: %#v\", line)\n\t}\n\n\tsanitisedLine := strings.Replace(strings.Trim(line, \" \"), \" \", \" \", -1)\n\ttokens := strings.Split(sanitisedLine, \" \")\n\n\tpackageName := strings.TrimRight(tokens[0], \":\")\n\n\tdependenciesNames := tokens[1:len(tokens)]\n\treturn append([]string{packageName}, dependenciesNames...), nil\n}", "title": "" }, { "docid": "c998a19069a9f60331eea806bdeca868", "score": "0.46596244", "text": "func ArgsToList(list []string) string {\n\treturn strings.Trim(strings.Join(list, \",\"), \", \")\n}", "title": "" }, { "docid": "f345f2a5d496eec98bd79b6bb86168c4", "score": "0.46590945", "text": "func LoadFromFile(fileName string, sep string) [][]string {\r\n\r\n\tvar entries [][]string\r\n\tlines := LoadLinesFromFile(fileName)\r\n\r\n\tfor _, line := range lines {\r\n\t\t// log.Println(scanner.Text())\r\n\t\tentry := strings.Split(line, sep)\r\n\t\tentries = append(entries, entry)\r\n\t}\r\n\treturn entries\r\n}", "title": "" }, { "docid": "9e74111ed2eeef33de218b51afb12a8f", "score": "0.46584517", "text": "func New(line []byte, sep []byte) *Split {\n\treturn &Split{line: line, sep: sep}\n}", "title": "" }, { "docid": "d185512b20b0a521012c55392ca8bb1b", "score": "0.46503988", "text": "func SplitClean(s string, sep string) []string {\n\tif s == \"\" {\n\t\treturn []string{}\n\t}\n\tbb := strings.Split(s, sep)\n\tvar r []string\n\tfor _, str := range bb {\n\t\tif str != \"\" {\n\t\t\tr = append(r, strings.TrimSpace(str))\n\t\t}\n\t}\n\treturn r\n}", "title": "" }, { "docid": "1724360680a45726b9648a2e574acf25", "score": "0.46493736", "text": "func splitBySpace(s string) []string {\n\treturn spaceSplitter.Split(strings.TrimSpace(s), -1)\n}", "title": "" }, { "docid": "09ef743b4734fe259bd5b72cf7111175", "score": "0.46431622", "text": "func CutStringIntoLines(text string) (result []string) {\n\tvar builder strings.Builder\n\tfor _, runeValue := range text {\n\t\tbuilder.WriteRune(runeValue)\n\t\tif runeValue == '\\n' {\n\t\t\tresult = append(result, builder.String())\n\t\t\tbuilder = strings.Builder{}\n\t\t}\n\t}\n\tif builder.Len() > 0 || len(result) == 0 {\n\t\tresult = append(result, builder.String())\n\t}\n\treturn result\n}", "title": "" }, { "docid": "9db59a5550ec09f03f842fc18776a989", "score": "0.46306452", "text": "func Split(sql, separator string) []string {\n\tif len(separator) == 0 || len(sql) < len(separator) {\n\t\treturn []string{sql}\n\t}\n\tl := &lexer{\n\t\tSql: sql,\n\t\tSep: separator,\n\t\tAt: 0,\n\t}\n\tstate := stateWhitespace\n\tfor state != nil {\n\t\tstate = state(l)\n\t}\n\tl.AddCurrent(1)\n\treturn l.Batch\n}", "title": "" }, { "docid": "2e1a9fb65a8f9095c8387493a6b52383", "score": "0.46228552", "text": "func StringSplitNonEmpty(s, sep string) []string {\n\treturn neogointernal.CallWithToken(Hash, \"stringSplit\", int(contract.NoneFlag),\n\t\ts, sep, true).([]string)\n}", "title": "" }, { "docid": "0dd31abee40000802705cc47717de024", "score": "0.46142524", "text": "func toIdentifiersWithSeparator(s string, separator string, integersPolicy UseIntegerIdentifiers) ([]identifier, error) {\n\tif \"\" == s {\n\t\treturn nil, fmt.Errorf(\"can't parse an empty string\")\n\t}\n\n\treturn toIdentifiers(strings.Split(s, separator), integersPolicy)\n}", "title": "" }, { "docid": "71e4dc744f52e18def28c804cb191469", "score": "0.46141207", "text": "func SplitLine(line string) (<-chan Line, int) {\n\tlines := strings.Split(line, \"\\n\")\n\tch := make(chan Line)\n\n\tgo func() {\n\t\tdefer close(ch)\n\t\tfor i, s := range lines {\n\t\t\tch <- Line{int64(i), s, nil}\n\t\t}\n\t}()\n\n\treturn ch, len(lines)\n}", "title": "" }, { "docid": "62d22423943f4e9ea14ec61198e23eab", "score": "0.4590277", "text": "func (receiver *Utility) Split(value interface{}, separator string) interface{} {\n\tdata := fmt.Sprintf(\"%v\", value)\n\treturn strings.Split(data, separator)\n}", "title": "" }, { "docid": "380e643a90f984b4e96fa49271bc5efe", "score": "0.45842507", "text": "func readFileByLine(filepath string, delim ...string) []string {\n\tif delim == nil {\n\t\tdelim = []string{\"\\n\"}\n\t}\n\n\tnewline := regexp.MustCompile(strings.Join(delim, \"|\"))\n\tcontent, err := ioutil.ReadFile(filepath)\n\n\tif content == nil || err != nil {\n\t\tlog(err.Error())\n\t\treturn nil\n\t}\n\n\tfully := -1\n\treturn newline.Split(string(content), fully)\n}", "title": "" }, { "docid": "8bcd09b2ba2b0e2f633cb68b25720003", "score": "0.4582217", "text": "func licenceSetSplit(sep *regexp.Regexp, str string) []string {\n\tseparators := sep.FindAllStringIndex(str, -1)\n\tif separators == nil {\n\t\treturn []string{str}\n\t}\n\n\tused := 0\n\tresult := make([]string, 0)\n\tfor i := 0; i < len(separators); i++ {\n\t\tnextOpen, nextClose := findMatchingParenSet(str[used:])\n\t\tif nextOpen >= 0 && nextClose >= 0 {\n\t\t\tnextOpen += used\n\t\t\tnextClose += used\n\t\t}\n\n\t\tnextSep := separators[i]\n\t\tif nextOpen < nextSep[0] && nextSep[1] < nextClose {\n\t\t\t// find a new token that's after nextClose\n\t\t\tcontinue\n\t\t}\n\n\t\tresult = append(result, strings.TrimSpace(str[used:nextSep[0]]))\n\t\tused = nextSep[1]\n\t}\n\n\tlastToken := strings.TrimSpace(str[used:])\n\tif len(lastToken) > 0 {\n\t\tresult = append(result, lastToken)\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "ea01a1be1cb9c817c5010b447a229e4b", "score": "0.4581456", "text": "func LineBefore(buf []rune, sep rune, i int) (r []rune) {\n\tf := IndexLeft(buf, sep, i)\n\tif buf[f] == sep {\n\t\tk := f + 1\n\t\tif k == i {\n\t\t\treturn []rune(\"\")\n\t\t}\n\t\treturn buf[k:i]\n\t}\n\tr = buf[f:i]\n\n\treturn\n}", "title": "" }, { "docid": "2c200428ddd3613f20d65fc58d9d24ba", "score": "0.45745814", "text": "func tokenizePath(path string) []string {\n\tif \"/\" == path {\n\t\treturn []string{}\n\t}\n\treturn strings.Split(strings.Trim(path, \"/\"), \"/\")\n}", "title": "" }, { "docid": "6321871d90b595a431cd89363777c776", "score": "0.45714566", "text": "func SplitLines(text string) []string {\n\ttext = strings.Replace(text, \"\\r\\n\", \"\\n\", -1)\n\t// replace escaped newlines\n\ttext = strings.Replace(text, \"\\\\\\n\", \"\", -1)\n\treturn strings.Split(text, \"\\n\")\n}", "title": "" }, { "docid": "f41d785aa5146f615e1c9eb8ecfd4d8f", "score": "0.45706004", "text": "func splitAsList(value string) []string {\n\treturn strings.Split(strings.ReplaceAll(value, \"{\", \"\"), \"},\")\n}", "title": "" }, { "docid": "c4f92874a9e910243c796f4036360910", "score": "0.45464474", "text": "func FromReader(r io.Reader) (result []string, err error) {\n\tbr := bufio.NewReader(r)\n\tfor {\n\t\tline, err := br.ReadString('\\n')\n\t\tif err == io.EOF {\n\t\t\tbreak\n\t\t}\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresult = append(result, strings.TrimSpace(line))\n\t}\n\treturn result, nil\n}", "title": "" }, { "docid": "cba2e510be4ee7b45098e53bc9fa00da", "score": "0.45346844", "text": "func stringToSlice(s, d string) []string {\n\tss := make([]string, 0)\n\tif strings.Contains(s, d) {\n\t\tss = strings.Split(s, d)\n\t} else {\n\t\tss = append(ss, s)\n\t}\n\treturn ss\n}", "title": "" }, { "docid": "06787c228bda54af32ae92462069e73d", "score": "0.4532991", "text": "func Partition(str, sep string) (head, match, tail string) {\n\tindex := strings.Index(str, sep)\n\n\tif index == -1 {\n\t\thead = str\n\t\treturn\n\t}\n\n\thead = str[:index]\n\tmatch = str[index : index+len(sep)]\n\ttail = str[index+len(sep):]\n\treturn\n}", "title": "" }, { "docid": "014d42cb3d0fc64baca397b24ed77559", "score": "0.4523065", "text": "func NewLineDelimited(newLineDelim string) []uuid.UUID {\n\treturn delimited(newLineDelim, 0x000A) // = \"\\n\"\n}", "title": "" }, { "docid": "48a67e2b97c65cfee9a92def9d5927fa", "score": "0.45221463", "text": "func Ltrim(s, cutset string) string {\n\n\treturn strings.TrimLeft(s, cutset)\n}", "title": "" }, { "docid": "b2fcd0b2d900d2369bd8f8030a8d73dd", "score": "0.45192894", "text": "func Split(input, escape, delimiter string) []string {\n\tstate := stateParsing\n\tfound := make([]string, 0)\n\tparsed := \"\"\n\n\tfor _, c := range input {\n\t\tc := string(c)\n\t\tif state == stateParsing {\n\t\t\tif c == delimiter {\n\t\t\t\tfound = append(found, parsed)\n\t\t\t\tparsed = \"\"\n\t\t\t} else if c == escape {\n\t\t\t\tstate = stateEscaped\n\t\t\t} else {\n\t\t\t\tparsed += c\n\t\t\t}\n\t\t} else {\n\t\t\tparsed += c\n\t\t\tstate = stateParsing\n\t\t}\n\t}\n\n\tif parsed != \"\" {\n\t\tfound = append(found, parsed)\n\t}\n\n\treturn found\n}", "title": "" }, { "docid": "3c7ff991a71a5bf9b55f8dfc233d1e40", "score": "0.45153657", "text": "func SplitSliceElements(s string) ([]string, error) {\n\tr := csv.NewReader(bytes.NewBufferString(s))\n\telements, err := r.Read()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn elements, nil\n}", "title": "" } ]
7a50074c68ea18bc68e94791078b4b43
AsInMageRcmPolicyCreationInput is the BasicPolicyProviderSpecificInput implementation for VMwareCbtPolicyCreationInput.
[ { "docid": "12b724d490c5f6e0e6e6fc0afdec6bb5", "score": "0.84789616", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" } ]
[ { "docid": "9b3b2b79f8ef31af5bf62015593e3606", "score": "0.8446464", "text": "func (ppsi PolicyProviderSpecificInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9eafd9fbf1628dfe146cb242a27eb80a", "score": "0.8088361", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b737dee936c960f4a4ab752f8abc9042", "score": "0.8046516", "text": "func (impi InMagePolicyInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "accbdd44c9ed9f43411694ca3d1abc74", "score": "0.7938957", "text": "func (hvrpi HyperVReplicaPolicyInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0d6f95f21982f343274460b9f84859ac", "score": "0.7907777", "text": "func (apci A2APolicyCreationInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1f0ad497f45822fb77b3311a85ff328f", "score": "0.78638446", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "69bbfbb4ebd975b503afde6e49a8935b", "score": "0.7837785", "text": "func (imavpi InMageAzureV2PolicyInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6c91c09378dafce95a029b220d129456", "score": "0.7785641", "text": "func (imrpci InMageRcmPolicyCreationInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bd387226d541fdfdea119dac6f17eb3d", "score": "0.77841765", "text": "func (hvrbpi HyperVReplicaBluePolicyInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ab07b43d91792ba9793a916d3b1e5a54", "score": "0.7694471", "text": "func (imrpci InMageRcmPolicyCreationInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f4cfc96d882f236c6ad4b8b86e4b74c9", "score": "0.76860756", "text": "func (imrpci InMageRcmPolicyCreationInput) AsInMageRcmPolicyCreationInput() (*InMageRcmPolicyCreationInput, bool) {\n\treturn &imrpci, true\n}", "title": "" }, { "docid": "8e2ef7f39a3a9c0c6ce0ccd034fea2b5", "score": "0.7367576", "text": "func (imrpci InMageRcmPolicyCreationInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &imrpci, true\n}", "title": "" }, { "docid": "7f790b47f1fb1ecb9fddb46eb459e427", "score": "0.7290497", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "4162ef429614e49c18ddd08031446ca3", "score": "0.72516966", "text": "func (impi InMagePolicyInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1251294a2ed173c4045560c84e4fe918", "score": "0.7242935", "text": "func (apci A2APolicyCreationInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f3ee3cc8f197a80a21e9bf3f3fc88abe", "score": "0.72339386", "text": "func (ppsi PolicyProviderSpecificInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5eff2713d84b425a597d7395b6558704", "score": "0.7164732", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d74860bdf217e9aa85bd6e01b688a135", "score": "0.71187866", "text": "func (imrpci InMageRcmPolicyCreationInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "603c64164e774ce866b79170f8f2e806", "score": "0.71066755", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &vmcpci, true\n}", "title": "" }, { "docid": "c44b16dd6ae9f2ea2c3b9e546d245164", "score": "0.70281947", "text": "func (hvrpi HyperVReplicaPolicyInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e573d0c01ba0eac24d3b74e13919adcf", "score": "0.7007377", "text": "func (impi InMagePolicyInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "46b2f6232a4711c4fad3bd6cc5a61ef5", "score": "0.69180846", "text": "func (imrpci InMageRcmPolicyCreationInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "1386da4614433ff65e47d7b768f72a6e", "score": "0.6916012", "text": "func (ppsi PolicyProviderSpecificInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2bb683853f2ab24d1e3236c148b8ad53", "score": "0.6889878", "text": "func (hvrbpi HyperVReplicaBluePolicyInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b4d4658b6d0c6a9b7dbe294e33b8556f", "score": "0.688117", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "11762525d7ffdc4f586aded2e9c63d7f", "score": "0.6830018", "text": "func (afci AzureFabricCreationInput) AsInMageRcmFabricCreationInput() (*InMageRcmFabricCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ee24cffe502eb465f208590a018d06d0", "score": "0.67834014", "text": "func (impi InMagePolicyInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &impi, true\n}", "title": "" }, { "docid": "e5578f9e6e9402264845e54bae4b5e6b", "score": "0.6720454", "text": "func (imavpi InMageAzureV2PolicyInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a7549eb24af59922729da21292e158ba", "score": "0.6682904", "text": "func (imavpi InMageAzureV2PolicyInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cde4ca2a8a61a7fe669ec3cc8ef42d87", "score": "0.66652495", "text": "func (imavpi InMageAzureV2PolicyInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "9ac267de9e9586b728a6225f19d492f7", "score": "0.66593397", "text": "func (vmcpci VMwareCbtPolicyCreationInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn &vmcpci, true\n}", "title": "" }, { "docid": "de56570c83cad9c9221d6b9df74a1408", "score": "0.66487867", "text": "func (ppsi PolicyProviderSpecificInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "61d314ae51fe7782cdc35502ad42ba3e", "score": "0.6644822", "text": "func (fsci FabricSpecificCreationInput) AsInMageRcmFabricCreationInput() (*InMageRcmFabricCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fdc3fcd0d0a8a4bc787a9b74abe04e1e", "score": "0.66350317", "text": "func (apci A2APolicyCreationInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "cffb5e3e5b3e2b6cf98a4461ac8d7c80", "score": "0.657247", "text": "func (imavpi InMageAzureV2PolicyInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &imavpi, true\n}", "title": "" }, { "docid": "14e7dddcf2aa352ebf98986faaf7c554", "score": "0.6570536", "text": "func (vmvfci VMwareV2FabricCreationInput) AsInMageRcmFabricCreationInput() (*InMageRcmFabricCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "72ab5669acf24a4d8b88d3c8d24f199e", "score": "0.65566534", "text": "func (apci A2APolicyCreationInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "85a7be1428dfda1110cbdf2c3717c444", "score": "0.6521088", "text": "func (eppsi EnableProtectionProviderSpecificInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d665c8ff3c57fc396d651df4494f0b05", "score": "0.65093845", "text": "func (eppsi EnableProtectionProviderSpecificInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "bb4c5613e01dfe0b9cd9a72108e18331", "score": "0.6508995", "text": "func (imrepi InMageRcmEnableProtectionInput) AsBasicEnableProtectionProviderSpecificInput() (BasicEnableProtectionProviderSpecificInput, bool) {\n\treturn &imrepi, true\n}", "title": "" }, { "docid": "01a07c6551de6a565f4a742a1f48d9f0", "score": "0.64631414", "text": "func (impi InMagePolicyInput) AsInMagePolicyInput() (*InMagePolicyInput, bool) {\n\treturn &impi, true\n}", "title": "" }, { "docid": "8658f5ad8a070d81a377c741aeb77fdc", "score": "0.64513206", "text": "func (apci A2APolicyCreationInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &apci, true\n}", "title": "" }, { "docid": "fce0feeae386554e2366e9746bba8102", "score": "0.6403", "text": "func (imrepi InMageRcmEnableProtectionInput) AsEnableProtectionProviderSpecificInput() (*EnableProtectionProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d42a1a9e3b43af8ff82ed4ea998f5bab", "score": "0.63781774", "text": "func (imepi InMageEnableProtectionInput) AsEnableProtectionProviderSpecificInput() (*EnableProtectionProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "66333b1b42aebf5e1bfbd16e608a648f", "score": "0.63344", "text": "func (imrepi InMageRcmEnableProtectionInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5b5682525454cbbabb53306e47e67c16", "score": "0.63316196", "text": "func (arppsi ApplyRecoveryPointProviderSpecificInput) AsInMageRcmApplyRecoveryPointInput() (*InMageRcmApplyRecoveryPointInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a489cf5a9504ec800c9e42a6891fab98", "score": "0.6314179", "text": "func (imavepi InMageAzureV2EnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2c20dd8fe8d2c8232e84a92f05a6a761", "score": "0.6295976", "text": "func (apci A2APolicyCreationInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "868a6e25064b79e0ea541323afc56baf", "score": "0.62858945", "text": "func (imepi InMageEnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5c258fb69635d6715ab155d429a446e6", "score": "0.6279333", "text": "func (vcpd VmwareCbtPolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "aefe494ed863246c31d552997353fd6a", "score": "0.6263156", "text": "func (imepi InMageEnableProtectionInput) AsBasicEnableProtectionProviderSpecificInput() (BasicEnableProtectionProviderSpecificInput, bool) {\n\treturn &imepi, true\n}", "title": "" }, { "docid": "a2a504987ba6729a62da24d4850d20e3", "score": "0.6259357", "text": "func (sepi SanEnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "fce67409e9c787f07b8e83b215c11198", "score": "0.62533313", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6faaf6f6f6938f89410cb06b5c8b9d55", "score": "0.62181926", "text": "func (hvraepi HyperVReplicaAzureEnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "5b418e98243ba7ab702c2df9ab7e0aa6", "score": "0.62096435", "text": "func (hvrbpd HyperVReplicaBasePolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "b4e04a2a50989e885d31d2ee93893fba", "score": "0.6194456", "text": "func (rrpsi ReverseReplicationProviderSpecificInput) AsInMageReprotectInput() (*InMageReprotectInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d35e20a5593ab4543113213612e0673c", "score": "0.6186431", "text": "func (impi InMagePolicyInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "7ee4e05d67acb9bda39efe424cedd694", "score": "0.6168918", "text": "func (imbpd InMageBasePolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "32f035fd41b4aed9b23aa68825d549d3", "score": "0.6159501", "text": "func (aepi A2AEnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "68e6522fb5af902d552b18b93a11c49e", "score": "0.61552376", "text": "func (hvrpi HyperVReplicaPolicyInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f78ab866fd09d4d7fb9849493aa12298", "score": "0.61460274", "text": "func (hvrpi HyperVReplicaPolicyInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f78f2b243ef353406740dffc7ec8311f", "score": "0.61390066", "text": "func (i *InMageRcmPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "8a2231ef38abef478b9bb01a90154d82", "score": "0.6133201", "text": "func (ppsd PolicyProviderSpecificDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ae117df02e0002639e5fb3df86607ed6", "score": "0.6132584", "text": "func (imavepi InMageAzureV2EnableProtectionInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e881a0dd64073ae8fd273d3ae9d6bcf0", "score": "0.61067116", "text": "func (hvraepi HyperVReplicaAzureEnableProtectionInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0966bd778d8b9b2b4ebe63d5b5b0eba1", "score": "0.6100368", "text": "func (dppsi DisableProtectionProviderSpecificInput) AsInMageDisableProtectionProviderSpecificInput() (*InMageDisableProtectionProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "364fdff3a89a4a5c2695baea3db12f95", "score": "0.60940033", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "57a8ed6c60a6cec208eca12be1e62483", "score": "0.60799634", "text": "func (imavpi InMageAzureV2PolicyInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn &imavpi, true\n}", "title": "" }, { "docid": "883b08b20dbd76ffebe39ea0b7af8b8f", "score": "0.6074007", "text": "func (aepi A2AEnableProtectionInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e76665207e0f83a994aec852ad86fee6", "score": "0.60715115", "text": "func (imavepi InMageAzureV2EnableProtectionInput) AsEnableProtectionProviderSpecificInput() (*EnableProtectionProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "473b596007aee6349016ac882f278687", "score": "0.6045793", "text": "func (imavepi InMageAzureV2EnableProtectionInput) AsBasicEnableProtectionProviderSpecificInput() (BasicEnableProtectionProviderSpecificInput, bool) {\n\treturn &imavepi, true\n}", "title": "" }, { "docid": "d992c69386701b750278d7b31aaef759", "score": "0.60305285", "text": "func (imrfci InMageRcmFabricCreationInput) AsInMageRcmFabricCreationInput() (*InMageRcmFabricCreationInput, bool) {\n\treturn &imrfci, true\n}", "title": "" }, { "docid": "6b6e8216a5ce9cea98a9911550172b8d", "score": "0.60180086", "text": "func (impi InMagePolicyInput) AsA2APolicyCreationInput() (*A2APolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "288f40e0c7b7c2c0c91510601bc28153", "score": "0.60069495", "text": "func (imrpci InMageRcmPolicyCreationInput) MarshalJSON() ([]byte, error) {\n\timrpci.InstanceType = InstanceTypeBasicPolicyProviderSpecificInputInstanceTypeInMageRcm\n\tobjectMap := make(map[string]interface{})\n\tif imrpci.RecoveryPointHistoryInMinutes != nil {\n\t\tobjectMap[\"recoveryPointHistoryInMinutes\"] = imrpci.RecoveryPointHistoryInMinutes\n\t}\n\tif imrpci.CrashConsistentFrequencyInMinutes != nil {\n\t\tobjectMap[\"crashConsistentFrequencyInMinutes\"] = imrpci.CrashConsistentFrequencyInMinutes\n\t}\n\tif imrpci.AppConsistentFrequencyInMinutes != nil {\n\t\tobjectMap[\"appConsistentFrequencyInMinutes\"] = imrpci.AppConsistentFrequencyInMinutes\n\t}\n\tif imrpci.EnableMultiVMSync != nil {\n\t\tobjectMap[\"enableMultiVmSync\"] = imrpci.EnableMultiVMSync\n\t}\n\tif imrpci.InstanceType != \"\" {\n\t\tobjectMap[\"instanceType\"] = imrpci.InstanceType\n\t}\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "539e7a71072e2596c4f1f62055f4c257", "score": "0.5997045", "text": "func (psfi ProviderSpecificFailoverInput) AsInMageFailoverProviderInput() (*InMageFailoverProviderInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "2ff784cf04c8c496c78149367c3839a9", "score": "0.5991789", "text": "func (sepi SanEnableProtectionInput) AsInMageEnableProtectionInput() (*InMageEnableProtectionInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "a414fc30bb66cf7167aef68dc888ed14", "score": "0.59597707", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsBasicPolicyProviderSpecificInput() (BasicPolicyProviderSpecificInput, bool) {\n\treturn &hvrapi, true\n}", "title": "" }, { "docid": "b634e47396f3f00ba4b104056f4f44b3", "score": "0.5946954", "text": "func (imrpci InMageRcmPolicyCreationInput) AsA2APolicyCreationInput() (*A2APolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "dc0901369e749895ae0159464b0c1df3", "score": "0.59326327", "text": "func (imrepi InMageRcmEnableProtectionInput) AsInMageRcmEnableProtectionInput() (*InMageRcmEnableProtectionInput, bool) {\n\treturn &imrepi, true\n}", "title": "" }, { "docid": "764321f6a72d3331fa3de6c2cd4f232e", "score": "0.5928278", "text": "func (hvrapd HyperVReplicaAzurePolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f359dfe805db26f91a9d842478bc78f1", "score": "0.5916749", "text": "func (imrpd InMageRcmPolicyDetails) AsInMageBasePolicyDetails() (*InMageBasePolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "683250c6726ed38cac6aa9b6859b5403", "score": "0.5916204", "text": "func (vmccci VMwareCbtContainerCreationInput) AsBasicReplicationProviderSpecificContainerCreationInput() (BasicReplicationProviderSpecificContainerCreationInput, bool) {\n\treturn &vmccci, true\n}", "title": "" }, { "docid": "0bb2117ace8095a319370a4142ca371b", "score": "0.5911496", "text": "func (imdppsi InMageDisableProtectionProviderSpecificInput) AsInMageDisableProtectionProviderSpecificInput() (*InMageDisableProtectionProviderSpecificInput, bool) {\n\treturn &imdppsi, true\n}", "title": "" }, { "docid": "0c169bd047c36010113a508636e03649", "score": "0.5895491", "text": "func (hvrbpi HyperVReplicaBluePolicyInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d24a0b246f1d912615da0b80611103f5", "score": "0.58923906", "text": "func (i *InMageRcmFailbackPolicyCreationInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "11cfd5bc20e3fff17a08f236eec4c827", "score": "0.5891343", "text": "func (rampd RcmAzureMigrationPolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "d5d23c77e7437492d2071188e60f7fef", "score": "0.58791965", "text": "func (impd InMagePolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "6e4af49c0f094ee4ba123ae7a8bd7a95", "score": "0.58724844", "text": "func (hvrapi HyperVReplicaAzurePolicyInput) AsInMageAzureV2PolicyInput() (*InMageAzureV2PolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "730cfb358af48251c7ae418452651dcd", "score": "0.5870964", "text": "func (imrpci InMageRcmPolicyCreationInput) AsHyperVReplicaAzurePolicyInput() (*HyperVReplicaAzurePolicyInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "f7f8540a62f5e2a49c9e1f86366646c6", "score": "0.586925", "text": "func (vcpd VmwareCbtPolicyDetails) AsInMageBasePolicyDetails() (*InMageBasePolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "256862fc0285101b43941044dc8cc524", "score": "0.58652043", "text": "func (hvrpi HyperVReplicaPolicyInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "01b7ebcec9bc316438bb4f5029050e1f", "score": "0.5838967", "text": "func (hvrpd HyperVReplicaPolicyDetails) AsInMageRcmPolicyDetails() (*InMageRcmPolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "e286451e315e9ff9beb668ca80ef9eb7", "score": "0.58311695", "text": "func (hvrafpi HyperVReplicaAzureFailoverProviderInput) AsInMageFailoverProviderInput() (*InMageFailoverProviderInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "0d250b80d1e8ad6a33215c66b32449de", "score": "0.5822875", "text": "func (aarpi A2AApplyRecoveryPointInput) AsInMageRcmApplyRecoveryPointInput() (*InMageRcmApplyRecoveryPointInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "ece2b58d59ee0602704b71e65b69c211", "score": "0.5818013", "text": "func (hvrari HyperVReplicaAzureReprotectInput) AsInMageReprotectInput() (*InMageReprotectInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "92ca25da98235ce676369c17e86f87ab", "score": "0.58171105", "text": "func (imfpi InMageFailoverProviderInput) AsInMageFailoverProviderInput() (*InMageFailoverProviderInput, bool) {\n\treturn &imfpi, true\n}", "title": "" }, { "docid": "50a010c7b43c5791700d6a61b42fda35", "score": "0.5812234", "text": "func (i *InMagePolicyInput) GetPolicyProviderSpecificInput() *PolicyProviderSpecificInput {\n\treturn &PolicyProviderSpecificInput{\n\t\tInstanceType: i.InstanceType,\n\t}\n}", "title": "" }, { "docid": "cc67b22c55a7372f8b76be8f74015218", "score": "0.58074605", "text": "func (hvrbpi HyperVReplicaBluePolicyInput) AsPolicyProviderSpecificInput() (*PolicyProviderSpecificInput, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "003323dcd28b18b7c8fd29dea1a90dab", "score": "0.5804622", "text": "func (ppsd PolicyProviderSpecificDetails) AsInMageBasePolicyDetails() (*InMageBasePolicyDetails, bool) {\n\treturn nil, false\n}", "title": "" }, { "docid": "c9f9169eb79555e079e66e1630e7961a", "score": "0.5804133", "text": "func (hvrbpi HyperVReplicaBluePolicyInput) AsVMwareCbtPolicyCreationInput() (*VMwareCbtPolicyCreationInput, bool) {\n\treturn nil, false\n}", "title": "" } ]
b3fb77dec4390cbdb268ec5f530ab9a1
Part of a web request that you want AWS WAF to inspect. See `fieldToMatch` below for details.
[ { "docid": "cfd9a88ae04781a91ed2dacb103f754d", "score": "0.0", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementAndStatementStatementRegexPatternSetReferenceStatementOutput) FieldToMatch() WebAclRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchPtrOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementAndStatementStatementRegexPatternSetReferenceStatement) *WebAclRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatch {\n\t\treturn v.FieldToMatch\n\t}).(WebAclRuleStatementRateBasedStatementScopeDownStatementAndStatementStatementAndStatementStatementRegexPatternSetReferenceStatementFieldToMatchPtrOutput)\n}", "title": "" } ]
[ { "docid": "f5d2dba8309ecee67ddd09f7d6f2017f", "score": "0.59967333", "text": "func (e HttpGenericBodyMatchValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f4e33c5b84c0cbbc0419dedeb6a0e539", "score": "0.58007693", "text": "func (e HttpHeadersMatchValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f4e33c5b84c0cbbc0419dedeb6a0e539", "score": "0.58007693", "text": "func (e HttpHeadersMatchValidationError) Field() string { return e.field }", "title": "" }, { "docid": "96e460058bf2123b4a804d961a598d64", "score": "0.57349557", "text": "func (request *Request) Match(data map[string]interface{}, matcher *matchers.Matcher) (bool, []string) {\n\tpartString := matcher.Part\n\tswitch partString {\n\tcase \"body\", \"all\", \"data\", \"\":\n\t\tpartString = \"raw\"\n\t}\n\n\titem, ok := data[partString]\n\tif !ok {\n\t\treturn false, []string{}\n\t}\n\titemStr := types.ToString(item)\n\n\tswitch matcher.GetType() {\n\tcase matchers.SizeMatcher:\n\t\treturn matcher.Result(matcher.MatchSize(len(itemStr))), []string{}\n\tcase matchers.WordsMatcher:\n\t\treturn matcher.ResultWithMatchedSnippet(matcher.MatchWords(itemStr, nil))\n\tcase matchers.RegexMatcher:\n\t\treturn matcher.ResultWithMatchedSnippet(matcher.MatchRegex(itemStr))\n\tcase matchers.BinaryMatcher:\n\t\treturn matcher.ResultWithMatchedSnippet(matcher.MatchBinary(itemStr))\n\tcase matchers.DSLMatcher:\n\t\treturn matcher.Result(matcher.MatchDSL(data)), []string{}\n\t}\n\treturn false, []string{}\n}", "title": "" }, { "docid": "314432681ccec60d27c577d60870b491", "score": "0.5673292", "text": "func (e Exist) Match(payload map[string]interface{}) bool {\n\t_, found := getFieldExist(payload, e.Field)\n\treturn found\n}", "title": "" }, { "docid": "3d487c8668d9ef51eda7e1f1b158f773", "score": "0.56711257", "text": "func (filter *Requests) Match(elem interface{}) bool {\n\treq, ok := elem.(*boruta.ReqInfo)\n\tif !ok || req == nil {\n\t\treturn false\n\t}\n\n\tif len(filter.IDs) > 0 && !reqIDInSlice(req.ID, filter.IDs) {\n\t\treturn false\n\t}\n\n\tif len(filter.States) > 0 && !reqStateInSlice(req.State, filter.States) {\n\t\treturn false\n\t}\n\n\tif len(filter.Priorities) > 0 && !priorityInSlice(req.Priority, filter.Priorities) {\n\t\treturn false\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "6a7abb736938508f8ad49e88f6f9a8ba", "score": "0.5559218", "text": "func (e HttpGenericBodyMatch_GenericTextMatchValidationError) Field() string { return e.field }", "title": "" }, { "docid": "018412b0936fff6fffcc4488445e2e57", "score": "0.5482016", "text": "func (e HttpResponseStatusCodeMatchInputValidationError) Field() string { return e.field }", "title": "" }, { "docid": "ae0f163e3c65e22a562644d4f84c322f", "score": "0.5324995", "text": "func (e HttpResponseStatusCodeClassMatchInputValidationError) Field() string { return e.field }", "title": "" }, { "docid": "3629d2102f20a55f5fdc4f091af66e62", "score": "0.5312358", "text": "func (e Equal) Match(payload map[string]interface{}) bool {\n\treturn reflect.DeepEqual(getField(payload, e.Field), e.Value)\n}", "title": "" }, { "docid": "cd6ecb982d0c22b7cb813985f0522a8a", "score": "0.5261572", "text": "func (e LivenessRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9eae0ecb6011422a520d42501ac95472", "score": "0.5258046", "text": "func (e NotExist) Match(payload map[string]interface{}) bool {\n\t_, found := getFieldExist(payload, e.Field)\n\treturn !found\n}", "title": "" }, { "docid": "1c2e47a8145484489bd8d0e27e912052", "score": "0.523428", "text": "func (e GetStreamRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c643bd0afe439bd5dc8e7ec0d3e2a6c4", "score": "0.5207715", "text": "func (e GetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "2e6dd13b48777dad3ab330f7349c285a", "score": "0.5203238", "text": "func (m *Mocker) Match(req *http.Request) (bool, error) {\n\tif m.disabled {\n\t\treturn false, nil\n\t}\n\n\t// Filter\n\tfor _, filter := range m.request.Filters {\n\t\tif !filter(req) {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\n\t// Map\n\tfor _, mapper := range m.request.Mappers {\n\t\tif treq := mapper(req); treq != nil {\n\t\t\treq = treq\n\t\t}\n\t}\n\n\t// Match\n\tmatches, err := m.matcher.Match(req, m.request)\n\tif matches {\n\t\tm.decrement()\n\t}\n\n\treturn matches, err\n}", "title": "" }, { "docid": "3e22857c82bcc2060c2fbcd25a0c3a11", "score": "0.5180511", "text": "func (e SecretK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "989ced8a4dc06c5581cc49ccdc3677b6", "score": "0.5157245", "text": "func (e LivenessResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "65fa30939d18cd6fb47478d6d276efb0", "score": "0.5143461", "text": "func LogRequestFields(r *http.Request) log.Fields {\n\treturn log.Fields{\n\t\t\"method\": r.Method,\n\t\t\"URI\": r.RequestURI,\n\t\t\"upstream\": r.Host,\n\t\t\"contract\": r.Header.Get(\"X-Devroute\"),\n\t\t\"matched-service\": r.Header.Get(\"X-Devroute-Matched\"),\n\t}\n}", "title": "" }, { "docid": "a9804309d7f5d4f34bda00875372900a", "score": "0.51287264", "text": "func (e PodRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "974f9cd194cfe95c63848227bfae61e7", "score": "0.51147825", "text": "func (e ServiceK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "d6486909def55521c17930d8c4c3cadc", "score": "0.5111635", "text": "func (e WatchDynamicRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "a44af39562a25390446ad03d86d8ab0f", "score": "0.51064783", "text": "func (e MyServerRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "c92f2b293fa43f0c8a0a4f0e9e1077db", "score": "0.51002043", "text": "func (e StreamTapsRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "3c61ee40b9ab114173924e5c18b7fc07", "score": "0.50904423", "text": "func (e ReadRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "ed0c9cb3ac72923efe4510b71bb58668", "score": "0.5088196", "text": "func (e NotEqual) Match(payload map[string]interface{}) bool {\n\treturn !reflect.DeepEqual(getField(payload, e.Field), e.Value)\n}", "title": "" }, { "docid": "19799d9b171784671eabc7d86e2446fc", "score": "0.5083388", "text": "func (e DiscoveryRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f2139fd7e9d5944410a050f0062210e3", "score": "0.506431", "text": "func (e GetResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9e34d4db754df61628a743e382c538a9", "score": "0.50579506", "text": "func (e GetStreamResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "0a72aee52642ab9e85e3686681b300c4", "score": "0.5045493", "text": "func (e UserWatchingRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "def3345174436b8c8e023d8e4b6459ee", "score": "0.5039237", "text": "func (r *Request) Field(key string, value string) *Request {\n\tr.formParams.Add(key, value)\n\treturn r\n}", "title": "" }, { "docid": "41add8f2842faacfcb70aded517297de", "score": "0.5039132", "text": "func (e In) Match(payload map[string]interface{}) bool {\n\tvalue := getField(payload, e.Field)\n\tfor _, v := range e.Values {\n\t\tif reflect.DeepEqual(v, value) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "038b759ba1ba428eca95d2e16234cec7", "score": "0.50360113", "text": "func (e AllowRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "7db329b647fc3b7e3fadd866d72a29a6", "score": "0.5019307", "text": "func (e DeploymentK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "52efe22260694008504fec128236f84a", "score": "0.5017516", "text": "func (e EndpointsK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "aff35daaee564a894384c513f638152f", "score": "0.5014164", "text": "func (f reFilter) Match(m *Message) (b bool) {\n\tvar v string\n\tswitch f.Field {\n\tcase \"host\":\n\t\tv = m.Host\n\tcase \"facility\":\n\t\tv = m.Facility\n\t}\n\tb = f.Re.MatchString(v)\n\tlog.Printf(\"M %s=%s ?%s: %t\", f.Field, v, f.Re, b)\n\treturn\n}", "title": "" }, { "docid": "88d05186aeeaefd079977b78a85c5eb8", "score": "0.50093967", "text": "func (e WatchDynamicResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "e7a6011ff8c58ddbd5a5a1225e6f936f", "score": "0.50086516", "text": "func (e StreamTapsResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "1426dffe947d804b642e620e90581554", "score": "0.50070935", "text": "func (e ApplicationSearchParamsValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f8570ddcd344885a68ced0f67b29b910", "score": "0.49971285", "text": "func (e SearchRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "060dc086588604d9e842d6e2b7daf65c", "score": "0.49888358", "text": "func (e UserWatchingResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "209b09d00bc3ae07b1ee273784689a81", "score": "0.49844858", "text": "func (e Exports_GetResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "a1814b893f9e3a8983abd87a024abef2", "score": "0.49797305", "text": "func (e SecretK8SResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "b7badc2a62bcc77314d46c098e16c406", "score": "0.4964054", "text": "func (e NamespaceK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "1a4ea4f5fb9a394e6e14b8d1b342a4be", "score": "0.4962996", "text": "func (e GetMetricRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "cb5fc4dbc8933aa62b4d49fb2a35ffac", "score": "0.49614856", "text": "func (e WatchMetricRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "0f40c5ee071cf44554558ea618ef7075", "score": "0.49558115", "text": "func (e NodeRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "2fb03c44b569085cc10bdb19065db175", "score": "0.49499038", "text": "func (e DiscoveryResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "6b54d1e393d81c9f5b64d32197030973", "score": "0.4946107", "text": "func Search(r *http.Request) api.Response {\n\tstart := time.Now()\n\tsearchRequest := searchRequest{}\n\n\terr := api.FormValues(r, &searchRequest, []*v.FieldRules{\n\t\tv.Field(&searchRequest.S, v.Length(3, 99999), v.Required),\n\t\tv.Field(&searchRequest.Size, v.Max(10000)),\n\t\tv.Field(&searchRequest.From, v.Max(9999)),\n\t\t//There is a bug in the app https://github.com/lbryio/lbry-desktop/issues/3377\n\t\t//v.Field(&searchRequest.ClaimType, validator.ClaimTypeValidator),\n\t\tv.Field(&searchRequest.MediaType, validator.MediaTypeValidator),\n\t\tv.Field(&searchRequest.TimeFilter, validator.TimeFilter),\n\t})\n\tif err != nil {\n\t\treturn api.Response{Error: errors.Err(err), Status: http.StatusBadRequest}\n\t}\n\tsearchRequest.filterset, err = collectFilters(searchRequest.Filters)\n\tif err != nil {\n\t\treturn api.Response{Error: errors.Err(err), Status: http.StatusBadRequest}\n\t}\n\tsearchRequest.searchType = \"general\"\n\tsearchRequest.S = truncate(searchRequest.S, searchRequest.RelatedTo != nil)\n\tsearchRequest.S = checkForSpecialHandling(searchRequest.S)\n\tsearchRequest.terms = len(strings.Split(searchRequest.S, \" \"))\n\tif searchRequest.RelatedTo != nil {\n\t\tsearchRequest.searchType = \"related_content\"\n\t}\n\tquery := searchRequest.newQuery()\n\tt, err := query.Source()\n\tif err != nil {\n\t\treturn api.Response{Error: errors.Err(\"%s: for query -s %s\", err, t)}\n\t}\n\tincludes := []string{\"name\", \"claimId\"}\n\tif searchRequest.Include != nil {\n\t\tadditionfields := strings.Split(*searchRequest.Include, \",\")\n\t\tincludes = append(includes, additionfields...)\n\t}\n\tsourceContext := elastic.NewFetchSourceContext(true).Exclude(\"value\")\n\tif !searchRequest.Source {\n\t\tincludes = append(includes)\n\t\tsourceContext = sourceContext.Include(includes...)\n\t\tif searchRequest.Resolve {\n\t\t\tsourceContext = sourceContext.Include(\"channel\", \"channel_claim_id\", \"title\", \"thumbnail_url\", \"release_time\", \"fee\", \"nsfw\", \"duration\")\n\t\t}\n\t}\n\tservice := es.Client.\n\t\tSearch(\"claims\").\n\t\tQuery(query).\n\t\tFetchSourceContext(sourceContext)\n\tif searchRequest.Size != nil {\n\t\tservice = service.Size(*searchRequest.Size)\n\t}\n\tif searchRequest.From != nil {\n\t\tservice = service.From(*searchRequest.From)\n\t}\n\n\tif searchRequest.Debug {\n\t\tsearchResults, err := service.\n\t\t\tExplain(true).\n\t\t\tErrorTrace(true).\n\t\t\tDo(context.Background())\n\t\tif err != nil {\n\t\t\treturn api.Response{Error: errors.Err(err)}\n\t\t}\n\t\treturn api.Response{Data: searchResults}\n\t}\n\tif searchRequest.SortBy != nil {\n\t\tsortBy := strings.TrimPrefix(*searchRequest.SortBy, \"^\")\n\t\tservice.Sort(sortBy, strings.Contains(*searchRequest.SortBy, \"^\"))\n\t}\n\tresults, err := searchCache.Fetch(r.URL.RequestURI(), 15*time.Minute, func() (interface{}, error) {\n\t\tsearchResults, err := service.Do(context.Background())\n\t\tif err != nil {\n\t\t\treturn nil, errors.Err(err)\n\t\t}\n\t\tresults := make([]map[string]interface{}, 0)\n\t\tfor _, hit := range searchResults.Hits.Hits {\n\t\t\tif hit.Source != nil {\n\t\t\t\tdata, err := hit.Source.MarshalJSON()\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogrus.Error(err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tresult := map[string]interface{}{}\n\t\t\t\terr = json.Unmarshal(data, &result)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlogrus.Error(err)\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tresults = append(results, result)\n\t\t\t}\n\t\t}\n\t\treturn results, nil\n\t})\n\tif err != nil {\n\t\treturn api.Response{Error: errors.Err(err)}\n\t}\n\ttotalTime := time.Since(start)\n\tmetrics.SearchDuration.WithLabelValues(\n\t\tsearchRequest.searchType,\n\t\tstrconv.Itoa(searchRequest.terms)).\n\t\tObserve(totalTime.Seconds())\n\tsearchRequest.log(r, totalTime)\n\treturn api.Response{Data: results.Value()}\n}", "title": "" }, { "docid": "be3c82bca60c2a5724dba13c1a8c7741", "score": "0.49408746", "text": "func (e DeltaDiscoveryRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4b3bbfa950f791470f2f0d9bd6e93d82", "score": "0.49370193", "text": "func (e ReadResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "b30442045ee6d429958e966e60354c89", "score": "0.4935316", "text": "func (e WatchContainerRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "7cfbf1881b665a8593a076cfc24ec103", "score": "0.49318886", "text": "func (e SearchResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "ed91136f1212dd6a224898ed10bb16c8", "score": "0.49215254", "text": "func (e QueryRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "dc98018fbd5e6c09ca1707261a935a52", "score": "0.49117702", "text": "func (e InstanceSearchParamsValidationError) Field() string { return e.field }", "title": "" }, { "docid": "03bab9d5986e12107911c74b853f2ee0", "score": "0.49110213", "text": "func (e QueryMetricRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "406d32beb0e79fd971cd026577bf73e3", "score": "0.49073943", "text": "func (e SignRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "bb7b14101d4649e773e87f466036fce7", "score": "0.4901794", "text": "func TestRequestFingerprintBody(t *testing.T) {\n\treq, err := http.NewRequest(\"GET\", \"http://example.com\", nil)\n\texpect(t, err, nil)\n\n\tfp := getRequestFingerprint(req, []byte(\"some huge XML or JSON here\"))\n\n\texpect(t, fp, \"b3918a54eb6e42652e29e14c21ba8f81\")\n}", "title": "" }, { "docid": "ab1a07a52834bd2f4677d32d75f77d1b", "score": "0.4901042", "text": "func (e *serverEndpoint) Matches(request *http.Request) bool {\n\treturn e.requestMatcher.matches(request)\n}", "title": "" }, { "docid": "ca12854a3a8d51aeab0d19687be79d5d", "score": "0.48976317", "text": "func (e QueryResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9c12abcc7a91725aeae35285b9dfa191", "score": "0.48946273", "text": "func (e WatchMetricResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "8ca62be3fd0498bc277c742e71926492", "score": "0.4884469", "text": "func (e NodeResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f01028b5dec5996a7a3ab8dd01ee504d", "score": "0.48804855", "text": "func (e GetHostRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4a5a1107bc1ebf11b00ed7d3753209cb", "score": "0.48792866", "text": "func (e mocReqValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4a51d76e508ea498039b8dfb35ffa8b3", "score": "0.48788747", "text": "func (e ListRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4a51d76e508ea498039b8dfb35ffa8b3", "score": "0.48788747", "text": "func (e ListRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "3ba89b49ae5e0592365b71509b4abd7b", "score": "0.48692957", "text": "func (e CaptureInternalOrderRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "3373c1aa3a37ce788fe8e60635790097", "score": "0.48669395", "text": "func (e WatchEventRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "9f09bbedea11022cc9042a34d441408e", "score": "0.4862026", "text": "func (e WatchContainerResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "ed19f6034313f374aa8d9d82698ecd2f", "score": "0.48617923", "text": "func HandleRequest(w http.ResponseWriter, r *http.Request, pam map[string]string ) error {\n\n //r.FormValue to access the url query parameters\n fmt.Fprint(w, \"fileds=\" + r.FormValue(\"fields\") + \"\\n\")\n\n //r.URL.Query().Get() only get the 1st item of the query param\n fmt.Fprint(w, \"fields=\" + r.URL.Query().Get(\"fields\") + \"\\n\")\n\n //r.URL.Query()[] get array of all values of the query param\n paramarray := r.URL.Query()[\"fields\"]\n\n for _, value := range paramarray {\n fmt.Fprint(w, \"fields=\"+value + \"\\n\")\n }\n\n return nil\n}", "title": "" }, { "docid": "1b208178940e9af41281f4ae1ae9410f", "score": "0.4852873", "text": "func (e PodResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f56d5d68e33407d9255e913b6903d9f0", "score": "0.485236", "text": "func (e ResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "d832ad0d2bd1d39211e94387bd53b819", "score": "0.4850816", "text": "func (e DeltaDiscoveryResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "56e011ccc35b73f626e6e9caa8ad150b", "score": "0.48503768", "text": "func (e ProjectDomainAttributesGetRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "2357f5b31faf7c1dee5354b250332ef8", "score": "0.48478335", "text": "func (e ServiceK8SResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "6f729ddfbc55c7594c42654e7be5c051", "score": "0.48456398", "text": "func (e ListMetricRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "fc32ecd341b087400583eae5bc8f610a", "score": "0.4845029", "text": "func (e QueryMetricResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "7aa6f731f8f065f679d321b9d5713249", "score": "0.484242", "text": "func (e GetRuleReqValidationError) Field() string { return e.field }", "title": "" }, { "docid": "875e35415e01cdaf04c5357e459e01d9", "score": "0.48419672", "text": "func (e Resources_RequestsValidationError) Field() string { return e.field }", "title": "" }, { "docid": "26776f0b8de238bc1e8d85d68b886ad9", "score": "0.4838782", "text": "func (e StreamTapsRequest_IdentifierValidationError) Field() string { return e.field }", "title": "" }, { "docid": "29a800d4ceca61767d86d20e3b41ec2e", "score": "0.48352858", "text": "func (e ReadinessRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "084d0101115e3beb0c61ae61e64a0a81", "score": "0.4833284", "text": "func (e GetMetricResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "67a8b2ec0e26b764f4befa36b3deca7e", "score": "0.4832991", "text": "func (e SignUpIdentificationRequest_LawyerValidationError) Field() string { return e.field }", "title": "" }, { "docid": "5e9cf97c1620c7f8ac5e1b3f912d01e3", "score": "0.48309925", "text": "func (e HttpHeaderValidationError) Field() string { return e.field }", "title": "" }, { "docid": "2870cd3faec304b59df8aaa55e6b520d", "score": "0.48282275", "text": "func (e RetrieveUserRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "59be4f517309e81ef6678013e931694c", "score": "0.48280954", "text": "func (e WatchPriceRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "ef43ee4380e0a5b874f2e6dad2f9f266", "score": "0.4822546", "text": "func (e FilterAuthorizedPairsReqValidationError) Field() string { return e.field }", "title": "" }, { "docid": "a5fb3a3f4889a7d0b33a2a9c3a7c3dd4", "score": "0.4821118", "text": "func (e EndpointsK8SResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "21e90b1e4b06bb5c52b3dfbeb1efc35f", "score": "0.48169044", "text": "func (e LogtouResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "88baf07717685c96db73cd36d4798143", "score": "0.48151672", "text": "func (e DescribeCheckRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "381cf6d86a52ed4c35ba726e8d42ea83", "score": "0.48063356", "text": "func (e SignResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f2b5eb7c7826e6771f8e4e8c8f6f2b85", "score": "0.48041755", "text": "func (e GetMetricConfigurationRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "fcab345be6d28b4a90eedc5e4f488b99", "score": "0.4803656", "text": "func (e WatchEventResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "e9cfa065a4f06411f2977f7bde155c6a", "score": "0.4803611", "text": "func Handler(context *nuclio.Context, event nuclio.Event) (interface{}, error) {\n\n\tbody := string(event.GetBody())\n\n\tif len(body) == 0 {\n\t\tcontext.Logger.Debug(\"Body empty\")\n\t\treturn nuclio.Response{\n\t\t\tStatusCode: 204,\n\t\t\tContentType: \"application/text\",\n\n\t\t\tBody: []byte(\"Body empty\"),\n\t\t}, nil\n\t}\n\n\tvar regexHeader interface{} = event.GetHeader(\"X-Regex\")\n\n\tvar myRegexPattern string\n\n\tif _, ok := regexHeader.([]byte); ok {\n\t\tmyRegexPattern = string(regexHeader.([]byte))\n\t} else if _, ok := regexHeader.([]uint8); ok {\n\t\tmyRegexPattern = string(regexHeader.([]uint8))\n\t} else if _, ok := regexHeader.(string); ok {\n\t\tmyRegexPattern = regexHeader.(string)\n\t}\n\n\tcontext.Logger.Info(myRegexPattern)\n\tr, err := regexp.Compile(myRegexPattern)\n\n\tif err != nil {\n\t\treturn nuclio.Response{\n\t\t\tStatusCode: 400,\n\t\t\tContentType: \"application/text\",\n\t\t\tBody: []byte(\"Regex error\"),\n\t\t}, nil\n\t}\n\n\tfields := reSubMatchMap(r, body)\n\n\tif fields != nil {\n\t\t// Format into JSON\n\t\tfieldsJSON, _ := json.Marshal(fields)\n\t\treturn nuclio.Response{\n\t\t\tStatusCode: 200,\n\t\t\tContentType: \"application/json\",\n\t\t\tBody: []byte(fieldsJSON),\n\t\t}, nil\n\t}\n\t// Catch non matches and return 204\n\tcontext.Logger.Debug(\"Body empty\")\n\treturn nuclio.Response{\n\t\tStatusCode: 204,\n\t\tContentType: \"application/text\",\n\t\tBody: []byte(\"Body empty\"),\n\t}, nil\n}", "title": "" }, { "docid": "16d2a8c2107da34fb633c64505b96493", "score": "0.48019063", "text": "func (e ConfigMapK8SRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "4bef345da7614ea43dd938c199732693", "score": "0.47982126", "text": "func (c *BucketListingProcessorFactory) DoMatchRequestType(requestType requestobjects.RequestType) bool {\n return requestobjects.BucketListing.EqualTo(requestType.String())\n}", "title": "" }, { "docid": "7a29642b75d83c48686b288b148cd7bc", "score": "0.47968736", "text": "func (e WatchProductRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "b8ecdccfd81975d97baa5f06d4d70ac5", "score": "0.4796101", "text": "func (e GetTransactionRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "256dc547f9c7d0ab3da32dd7c378bd9e", "score": "0.47927186", "text": "func (e ListVerdictsV1RequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "bec3073a8e99ec41ac3d203a29ad024d", "score": "0.47916746", "text": "func (e DeploymentK8SResponseValidationError) Field() string { return e.field }", "title": "" }, { "docid": "07ca3ad543ac73ebea65b2a711bfe479", "score": "0.47902787", "text": "func (e RiskMetaRequestValidationError) Field() string { return e.field }", "title": "" }, { "docid": "f1eda7a52ed06c5f07f3e4bf2bbb3ee7", "score": "0.47884578", "text": "func (e CaptureInternalOrderResponseValidationError) Field() string { return e.field }", "title": "" } ]
dccae2b519ade062adc4dfc5e3e5eb2b
Build creates the error for the code "cluster_not_found" from this builder.
[ { "docid": "b5b163724d2c2f8127b51684e6f8bab9", "score": "0.80712765", "text": "func (b *K8sProvisionerClusterNotFoundBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"cluster {{cluster}} not found\",\n\t\tTechnical: \"cluster {{cluster}} not found\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"cluster_not_found\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Cluster not found\",\n\t\tVersion: 1,\n\t}\n}", "title": "" } ]
[ { "docid": "03dcf604eb70ab2fcf82371fae60fc66", "score": "0.6670739", "text": "func (b *K8sProvisionerClusterSynchronizationErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to sync the cluster\",\n\t\tTechnical: \"failed to sync the cluster\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"cluster_synchronization_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Cluster synchronization error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "6dbe894f0fc681aa566adc14d847f987", "score": "0.6416748", "text": "func (b *K8sProvisionerClusterManagerSetupErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to setup the cluster manager\",\n\t\tTechnical: \"failed to setup the cluster manager\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"cluster_manager_setup_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Cluster manager setup error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "7a927db4271f28ab715078e3534d4b1c", "score": "0.5825333", "text": "func (e KafkaClusterDefinitionValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "71d2736e6dea10ecdb0d54a5a048c19c", "score": "0.5725803", "text": "func NewK8sProvisionerClusterNotFoundBuilder(cluster string) *K8sProvisionerClusterNotFoundBuilder {\n\treturn &K8sProvisionerClusterNotFoundBuilder{arguments: impl.ErrorArguments{\"cluster\": impl.NewErrorArgument(cluster, \"the name of the cluster\")}}\n}", "title": "" }, { "docid": "2ec7101d38c8a63858b45a05080dd63a", "score": "0.56994265", "text": "func (b *K8sProvisionerKubeconfigReadErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to read the kubeconfig file from the adapter\",\n\t\tTechnical: \"failed to read the kubeconfig file from the adapter\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"kubeconfig_read_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Kubeconfig read error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "df51036fa259d0cb886c515a51029966", "score": "0.56979644", "text": "func (e ClusterValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "ef7301a7ed69b62db5e06c64fcdc439a", "score": "0.56687003", "text": "func (b *K8sProvisionerKopsStateStoreCreateFailedBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to create the state storage bucket\",\n\t\tTechnical: \"failed to create the state storage bucket\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"kops_state_store_create_failed\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Kops state store create failed\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "5ebd4cd7303fd8338e3da5e9baa505e4", "score": "0.5664292", "text": "func (b *K8sProvisionerSetOutputFailedBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to set the output\",\n\t\tTechnical: \"failed to set the output\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"set_output_failed\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Set output failed\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "f0adcb3598a8a0aeb2f0e5274f0519fc", "score": "0.56366724", "text": "func (b *K8sProvisionerUnknownProviderBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"provider {{provider}} does not exist\",\n\t\tTechnical: \"provider {{provider}} does not exist\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"unknown_provider\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Unknown provider\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "120928a46e45518e0933a6ab2be1e92b", "score": "0.54868436", "text": "func (b *K8sProvisionerStateStoreErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to get the URL and path for the state store\",\n\t\tTechnical: \"failed to get the URL and path for the state store\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"state_store_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"State store error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "307512cd4f39aaee82dead55df9e39d8", "score": "0.5456933", "text": "func (b *K8sProvisionerKopsExecErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to run kops\",\n\t\tTechnical: \"failed to run kops\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"kops_exec_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Kops exec error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "e15d3bca3907c77e7d92913fa157684b", "score": "0.54550725", "text": "func (b *Builder) Build() *Error {\n\tif ok := b.class.RegisterError(b.err); !ok {\n\t\tlog.Panic(\"replicated error prototype created\",\n\t\t\tzap.String(\"ID\", string(b.err.ID())),\n\t\t\tzap.String(\"RFCCode\", string(b.err.RFCCode())))\n\t}\n\treturn b.err\n}", "title": "" }, { "docid": "bfd38abe87b5b423f649e8e821591813", "score": "0.5421152", "text": "func (b *K8sProvisionerClientSetupErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to setup the client\",\n\t\tTechnical: \"failed to setup the client\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"client_setup_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Client setup error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "72769a61b6922a53bb0911e3c241f059", "score": "0.5359152", "text": "func (e KafkaClusterDefinitionValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "c4bcc79df9381a92e847e59ddff89852", "score": "0.53329176", "text": "func (b *K8sProvisionerPlatformSetupErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to setup the {{platform}} platform\",\n\t\tTechnical: \"failed to setup the {{platform}} platform\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"platform_setup_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Platform setup error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "49790e140c9d1a91da632c16576a4362", "score": "0.52428305", "text": "func (e ClusterValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "5e1d6a87e4ba92275cc60bfd61afc7fd", "score": "0.5227029", "text": "func (cb *ClusterBuilder) buildBlackHoleCluster() *cluster.Cluster {\n\tc := &cluster.Cluster{\n\t\tName: util.BlackHoleCluster,\n\t\tClusterDiscoveryType: &cluster.Cluster_Type{Type: cluster.Cluster_STATIC},\n\t\tConnectTimeout: proto.Clone(cb.req.Push.Mesh.ConnectTimeout).(*durationpb.Duration),\n\t\tLbPolicy: cluster.Cluster_ROUND_ROBIN,\n\t}\n\treturn c\n}", "title": "" }, { "docid": "9742aef1489736071034ce0a9fc84115", "score": "0.5200514", "text": "func (e Cluster_CustomClusterTypeValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d928b2811829fcc14c74e128b980e093", "score": "0.5143588", "text": "func (e Cluster_EdsClusterConfigValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "3eb9780f5c630626db6e61f0868b6d3e", "score": "0.51236063", "text": "func (c *Catalog) FakeClusterBuildStrategyNotFound(name string) error {\n\treturn errors.NewNotFound(schema.GroupResource{}, name)\n}", "title": "" }, { "docid": "a2eaf0eeda459c70dbfada2c8b4d5049", "score": "0.51108885", "text": "func (b *K8sProvisionerTimeoutErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"{{msg}}\",\n\t\tTechnical: \"{{msg}}\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"timeout_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Readiness timeout error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "54e75602905dc52a52a6bd0f266192cf", "score": "0.5106415", "text": "func (b *K8sProvisionerKopsSupportSetupErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"kops setup failed\",\n\t\tTechnical: \"kops setup failed\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"kops_support_setup_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Kops support setup error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "7da92531ed6404d11500b8c644ef7af8", "score": "0.5028673", "text": "func NewUpdateClusterNotFound() *UpdateClusterNotFound {\n\treturn &UpdateClusterNotFound{}\n}", "title": "" }, { "docid": "55453652806cbf6f747931dd40e9a544", "score": "0.5011042", "text": "func (b *K8sProvisionerSpecDecoderErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to decode the spec\",\n\t\tTechnical: \"failed to decode the spec\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"spec_decoder_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Spec decoder error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "550000d0275b00684333ce9b01d0c572", "score": "0.50096387", "text": "func (b *K8sProvisionerIoErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"{{msg}}\",\n\t\tTechnical: \"{{msg}}\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"io_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"IO error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "9087f7f9e78380747646091cc259d6fd", "score": "0.49738574", "text": "func (a *ClusterAPI) CreateCluster(c *gin.Context) {\n\ta.logger.Info(\"Cluster creation started\")\n\n\tctx := ginutils.Context(context.Background(), c)\n\n\torgID := auth.GetCurrentOrganization(c.Request).ID\n\tuserID := auth.GetCurrentUser(c.Request).ID\n\n\tvar requestBody map[string]interface{}\n\tif err := c.ShouldBindJSON(&requestBody); err != nil {\n\t\ta.errorHandler.Handle(err)\n\t\tpkgCommon.ErrorResponseWithStatus(c, http.StatusBadRequest, err)\n\t\treturn\n\t}\n\tif _, ok := requestBody[\"type\"]; !ok {\n\t\ta.logger.Info(\"request body did not match v2 structure, trying legacy path\")\n\t\tvar createClusterRequest pkgCluster.CreateClusterRequest\n\t\tif !a.parseRequest(c, requestBody, &createClusterRequest) {\n\t\t\treturn\n\t\t}\n\n\t\tif createClusterRequest.SecretId == \"\" && len(createClusterRequest.SecretIds) == 0 {\n\t\t\tif createClusterRequest.SecretName == \"\" {\n\t\t\t\tc.JSON(http.StatusBadRequest, pkgCommon.ErrorResponse{\n\t\t\t\t\tCode: http.StatusBadRequest,\n\t\t\t\t\tMessage: \"either secretId or secretName has to be set\",\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tcreateClusterRequest.SecretId = secret.GenerateSecretIDFromName(createClusterRequest.SecretName)\n\t\t}\n\n\t\texistingCluster, err := a.clusterManager.GetClusterByName(ctx, orgID, createClusterRequest.Name)\n\t\tif err != nil && !isNotFoundError(err) {\n\t\t\tc.JSON(http.StatusInternalServerError, pkgCommon.ErrorResponse{\n\t\t\t\tCode: http.StatusInternalServerError,\n\t\t\t\tMessage: \"check if the cluster already exists failed\",\n\t\t\t\tError: err.Error(),\n\t\t\t})\n\n\t\t\treturn\n\t\t} else if err != nil && isNotFoundError(err) {\n\t\t\ta.logger.Info(\"cluster does not exist yet, creating\")\n\t\t}\n\n\t\tif existingCluster != nil {\n\t\t\tstatusResponse, err := existingCluster.GetStatus()\n\t\t\tif err != nil {\n\t\t\t\tc.JSON(http.StatusInternalServerError, err)\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tswitch statusResponse.Status {\n\t\t\tcase pkgCluster.Creating:\n\t\t\t\tc.JSON(http.StatusCreated, pkgCommon.BanzaiResponse{\n\t\t\t\t\tStatusCode: http.StatusCreated,\n\t\t\t\t\tMessage: cluster.ErrAlreadyExists.Error(),\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\tcase pkgCluster.Deleting:\n\t\t\t\tc.JSON(http.StatusConflict, pkgCommon.ErrorResponse{\n\t\t\t\t\tCode: http.StatusConflict,\n\t\t\t\t\tMessage: cluster.ErrAlreadyExists.Error(),\n\t\t\t\t\tError: cluster.ErrAlreadyExists.Error(),\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\tdefault:\n\t\t\t\tc.JSON(http.StatusConflict, pkgCommon.ErrorResponse{\n\t\t\t\t\tCode: http.StatusBadRequest,\n\t\t\t\t\tMessage: cluster.ErrAlreadyExists.Error(),\n\t\t\t\t\tError: cluster.ErrAlreadyExists.Error(),\n\t\t\t\t})\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tcommonCluster, errorResponse := a.createCluster(ctx, &createClusterRequest, orgID, userID, createClusterRequest.PostHooks)\n\t\tif errorResponse != nil {\n\t\t\tc.JSON(errorResponse.Code, errorResponse)\n\t\t\treturn\n\t\t}\n\n\t\tc.JSON(http.StatusAccepted, pkgCluster.CreateClusterResponse{\n\t\t\tName: commonCluster.GetName(),\n\t\t\tResourceID: commonCluster.GetID(),\n\t\t})\n\t\treturn\n\t}\n\n\tvar createClusterRequestBase pipeline.CreateClusterRequestBase\n\tif !a.parseRequest(c, requestBody, &createClusterRequestBase) {\n\t\treturn\n\t}\n\n\tsecretID := createClusterRequestBase.SecretId\n\tif secretID == \"\" {\n\t\tif createClusterRequestBase.SecretName != \"\" {\n\t\t\tsecretID = secret.GenerateSecretIDFromName(createClusterRequestBase.SecretName)\n\t\t} else {\n\t\t\tginutils.ReplyWithErrorResponse(c, &pkgCommon.ErrorResponse{\n\t\t\t\tCode: http.StatusBadRequest,\n\t\t\t\tMessage: \"either secret ID or name is required\",\n\t\t\t\tError: \"no secret specified\",\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t}\n\n\tvar cluster interface {\n\t\tGetID() uint\n\t\tGetName() string\n\t}\n\n\tswitch createClusterRequestBase.Type {\n\tcase clusterAPI.PKEOnVsphere:\n\t\tvar req clusterAPI.CreatePKEOnVsphereClusterRequest\n\t\tif ok := a.parseRequest(c, requestBody, &req); !ok {\n\t\t\treturn\n\t\t}\n\t\treq.SecretId = secretID\n\t\t// TODO legacy posthook support if needed\n\t\tparams := req.ToVspherePKEClusterCreationParams(orgID, userID)\n\t\ta.logger.Infof(\"request: %+v\\n\\n\\nparams: %+v\\n\\n\", req, params)\n\t\tvsphereCluster, err := a.clusterCreators.PKEOnVsphere.Create(ctx, params)\n\t\tif err = errors.WrapIf(err, \"failed to create cluster from request\"); err != nil {\n\t\t\ta.handleCreationError(c, err)\n\t\t\treturn\n\t\t}\n\t\tcluster = vsphereCluster\n\tcase clusterAPI.PKEOnAzure:\n\t\tvar req clusterAPI.CreatePKEOnAzureClusterRequest\n\t\tif ok := a.parseRequest(c, requestBody, &req); !ok {\n\t\t\treturn\n\t\t}\n\t\treq.SecretId = secretID\n\t\tparams := req.ToAzurePKEClusterCreationParams(orgID, userID)\n\t\tazurePKECluster, err := a.clusterCreators.PKEOnAzure.Create(ctx, params)\n\t\tif err = errors.WrapIf(err, \"failed to create cluster from request\"); err != nil {\n\t\t\ta.handleCreationError(c, err)\n\t\t\treturn\n\t\t}\n\t\tcluster = azurePKECluster\n\tdefault:\n\t\tginutils.ReplyWithErrorResponse(c, &pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: fmt.Sprintf(\"unknown cluster type: %s\", createClusterRequestBase.Type),\n\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusAccepted, pkgCluster.CreateClusterResponse{\n\t\tName: cluster.GetName(),\n\t\tResourceID: cluster.GetID(),\n\t})\n}", "title": "" }, { "docid": "2c6b490568b44d115eb3d4594a708aae", "score": "0.49474394", "text": "func (c *GKECluster) Create(ctx context.Context) error {\n\tif c.Cluster != nil {\n\t\treturn fmt.Errorf(\"cluster already exists\")\n\t}\n\n\treq := &containerpb.CreateClusterRequest{\n\t\tParent: fmt.Sprintf(\"projects/%s/locations/%s\", c.Project, c.Location),\n\t\tCluster: &containerpb.Cluster{\n\t\t\tName: c.ClusterName,\n\t\t\tInitialNodeCount: c.NodeCount,\n\t\t},\n\t}\n\top, err := c.Client.CreateCluster(ctx, req)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to create cluster: %s\", err)\n\t}\n\topStatus := make(chan operation.Status)\n\tgo operation.Wait(ctx, opStatus, retryInterval, c.Client, c.Project, c.Location, op.Name)\n\n\tfor status := range opStatus {\n\t\tif status.Error != nil {\n\t\t\treturn status.Error\n\t\t}\n\n\t\tif status.Status == containerpb.Operation_DONE {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"operation_id\": op.Name,\n\t\t\t\t\"operation_status\": status.Status,\n\t\t\t}).Info(\"Operation completed\")\n\t\t\tbreak\n\t\t}\n\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"operation_id\": op.Name,\n\t\t\t\"operation_status\": status.Status,\n\t\t}).Info(\"Waiting for operation\")\n\t}\n\n\tgetReq := &containerpb.GetClusterRequest{\n\t\tName: fmt.Sprintf(\"projects/%s/locations/%s/clusters/%s\", c.Project, c.Location, c.ClusterName),\n\t}\n\n\tresp, err := c.Client.GetCluster(ctx, getReq)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to fetch created cluster metadata: %s\", err)\n\t}\n\n\tif resp.Status == containerpb.Cluster_ERROR {\n\t\treturn Error{clusterStatus: resp.Status}\n\t}\n\tc.Cluster = resp\n\treturn nil\n}", "title": "" }, { "docid": "9bc31982a2d0e2617b6f1374bc5283e1", "score": "0.49366063", "text": "func (d *Dao) CreateCluster(ctx context.Context, p *model.ParamCluster) (string, error) {\n\tsubctx, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\tspecCPU, specMaxMem, err := d.parseSpecification(p.Spec)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tp.SpecCPU = specCPU\n\tp.SpecMemory = specMaxMem\n\n\tnumber := int(p.TotalMemory) / int(p.SpecMemory)\n\tif number == 0 {\n\t\treturn \"\", fmt.Errorf(\n\t\t\t\"total memory(%fm) is less than each node's max memory(%fm) we can only create 0 node, reject\", p.SpecMemory, p.TotalMemory)\n\t}\n\n\tif number > 1024 {\n\t\treturn \"\", fmt.Errorf(\"cluster is too large. node number(%d) is more than 1024\", number)\n\t}\n\n\t// check if master num is even\n\tctype := types.CacheType(p.CacheType)\n\tif ctype == types.CacheTypeRedisCluster && number%2 != 0 {\n\t\tnumber++\n\t}\n\tp.Number = number\n\n\terr = d.checkClusterName(p.Name)\n\tif err != nil {\n\t\tlog.Info(\"cluster name must be unique\")\n\t\treturn \"\", err\n\t}\n\n\terr = d.checkVersion(p.Version)\n\tif err != nil {\n\t\tlog.Info(\"version must be exists\")\n\t\treturn \"\", err\n\t}\n\n\tseq, err := d.e.Sequence(subctx, etcd.PortSequence)\n\tif err != nil {\n\t\tlog.Errorf(\"fail to create front-end port due to %s\", err)\n\t\treturn \"\", err\n\t}\n\terr = d.e.Set(subctx, fmt.Sprintf(\"%s/%s/fe-port\", etcd.ClusterDir, p.Name), fmt.Sprintf(\"%d\", seq))\n\tif err != nil {\n\t\tlog.Errorf(\"fail to set front-end port due to %s\", err)\n\t\treturn \"\", err\n\t}\n\n\tt, err := d.createCreateClusterJob(p)\n\tif err != nil {\n\t\tlog.Infof(\"create fail due to %s\", err)\n\t\treturn \"\", err\n\t}\n\n\t// TODO: move it into mesos framework task\n\t// if ctype == types.CacheTypeRedisCluster {\n\t// \tgo func(name string) {\n\t// \t\terr := balance.Balance(p.Name, d.e)\n\t// \t\tif err != nil {\n\t// \t\t\tlog.Errorf(\"fail to balance cluster %s due to %v\", name, err)\n\t// \t\t}\n\t// \t}(p.Name)\n\t// }\n\n\ttaskID, err := d.saveJob(subctx, t)\n\tif err != nil {\n\t\treturn taskID, err\n\t}\n\n\terr = d.assignAppids(subctx, p.Name, p.Appids...)\n\treturn taskID, err\n}", "title": "" }, { "docid": "8fddc9cd7f6c1d40c5cb2a4d665222e5", "score": "0.49030396", "text": "func buildGKECCCreateObject(cluster *mgmtv3.Cluster) (*unstructured.Unstructured, error) {\n\tgkeClusterConfig := gkev1.GKEClusterConfig{\n\t\tTypeMeta: v1.TypeMeta{\n\t\t\tKind: \"GKEClusterConfig\",\n\t\t\tAPIVersion: gkeV1,\n\t\t},\n\t\tObjectMeta: v1.ObjectMeta{\n\t\t\tName: cluster.Name,\n\t\t\tOwnerReferences: []v1.OwnerReference{\n\t\t\t\t{\n\t\t\t\t\tKind: cluster.Kind,\n\t\t\t\t\tAPIVersion: rbac.RancherManagementAPIVersion,\n\t\t\t\t\tName: cluster.Name,\n\t\t\t\t\tUID: cluster.UID,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t\tSpec: *cluster.Spec.GKEConfig,\n\t}\n\n\t// convert GKE cluster config into unstructured object so it can be used with dynamic client\n\tgkeClusterConfigMap, err := runtime.DefaultUnstructuredConverter.ToUnstructured(&gkeClusterConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &unstructured.Unstructured{\n\t\tObject: gkeClusterConfigMap,\n\t}, nil\n}", "title": "" }, { "docid": "03c333cce330be3dbe4853c5fe21542a", "score": "0.4888895", "text": "func (b *K8sProvisionerAuthErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to authenticate\",\n\t\tTechnical: \"failed to authenticate\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"auth_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Auth error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "61bce4808b09d40a5953048d40d0bff2", "score": "0.48700294", "text": "func (e Cluster_CustomClusterTypeValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "858c55448a98477e8e0976ee7aaec9a2", "score": "0.48547336", "text": "func NewRebuildIndexNotFound() *RebuildIndexNotFound {\n\treturn &RebuildIndexNotFound{}\n}", "title": "" }, { "docid": "9b29064b8160011a1ffa0c9760ef9e1d", "score": "0.48522654", "text": "func (e ErrAddrSpaceNotFound) NotFound() {}", "title": "" }, { "docid": "c23b50ca3660349b298a6bc1681f7834", "score": "0.48049074", "text": "func (e TcpProxy_WeightedClusterValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "30139081d1cc8c5678a0fe044cdb12ec", "score": "0.47966897", "text": "func (b *K8sProvisionerSupportValidationErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"{{msg}}\",\n\t\tTechnical: \"{{msg}}\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"support_validation_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Support validation error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "4a959222871b8081ceb6256dcdb1c99b", "score": "0.4777308", "text": "func (e Cluster_SlowStartConfigValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "70c84d9c604b806cb65fc8a8ae699ed4", "score": "0.47760305", "text": "func (e ClusterCollectionValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b8fd6cee41ae4ea09eef44d927cd3f85", "score": "0.4771391", "text": "func ensureClusterNotExists(ctx context.Context, c client.Client, clusterName string) error {\n\tsecret := &v1.Secret{}\n\terr := c.Get(ctx, types2.NamespacedName{Name: clusterName, Namespace: ClusterGatewaySecretNamespace}, secret)\n\tif err == nil {\n\t\treturn ErrClusterExists\n\t}\n\tif !errors2.IsNotFound(err) {\n\t\treturn errors.Wrapf(err, \"failed to check duplicate cluster secret\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2a0f4eb803e70e59cd5e67fc6e616b20", "score": "0.47495836", "text": "func (e Cluster_EdsClusterConfigValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "d4c34d8a19c073e65df1bd07b688f893", "score": "0.4725434", "text": "func (inie InvalidNetworkIDError) NotFound() {}", "title": "" }, { "docid": "ae2e14eb2288b21b35469b0428c8fbb3", "score": "0.47171327", "text": "func (o *RebuildIndexNotFound) Code() int {\n\treturn 404\n}", "title": "" }, { "docid": "b80d78939d7f5ba91eb6d2308d1884d1", "score": "0.46959326", "text": "func (e Cluster_TransportSocketMatchValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "b444b60b11a0c7cf3385bb4198286002", "score": "0.46753678", "text": "func NewNotFoundErr(resource string, params interface{}) gin.H {\n\treturn gin.H{\"error\": fmt.Sprintf(\"%s(#%v) is not found\", resource, params)}\n}", "title": "" }, { "docid": "ca1ebb2309ac432feb308bcb0d113674", "score": "0.4669986", "text": "func BuildOutOfClusterConfig() (*rest.Config, error) {\n\tkubeconfigPath := os.Getenv(\"KUBECONFIG\")\n\tif kubeconfigPath == \"\" {\n\t\tkubeconfigPath = os.Getenv(\"HOME\") + \"/.kube/config\"\n\t}\n\treturn clientcmd.BuildConfigFromFlags(\"\", kubeconfigPath)\n}", "title": "" }, { "docid": "5cd8418b3892d3cc18fe8b1c8e8eee99", "score": "0.4654056", "text": "func NewCluster(ctx *pulumi.Context,\n\tname string, args *ClusterArgs, opts ...pulumi.ResourceOption) (*Cluster, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.ManagementEndpoint == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ManagementEndpoint'\")\n\t}\n\tif args.NodeTypes == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'NodeTypes'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20160901:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20170701preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20170701preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20180201:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20180201:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20190301:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20190301:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20190301preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20190301preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20190601preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20190601preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20191101preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20191101preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20200301:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20200301:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20201201preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20201201preview:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:servicefabric/v20210601:Cluster\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:servicefabric/v20210601:Cluster\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource Cluster\n\terr := ctx.RegisterResource(\"azure-native:servicefabric/v20160901:Cluster\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "c8dc52e44764023550e6cf08d8128787", "score": "0.46301952", "text": "func (s *Server) Create(ctx context.Context, q *ClusterCreateRequest) (*appv1.Cluster, error) {\n\tif !s.enf.EnforceClaims(ctx.Value(\"claims\"), \"clusters\", \"create\", q.Cluster.Server) {\n\t\treturn nil, grpc.ErrPermissionDenied\n\t}\n\tc := q.Cluster\n\terr := kube.TestConfig(q.Cluster.RESTConfig())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc.ConnectionState = appv1.ConnectionState{Status: appv1.ConnectionStatusSuccessful}\n\tclust, err := s.db.CreateCluster(ctx, c)\n\tif status.Convert(err).Code() == codes.AlreadyExists {\n\t\t// act idempotent if existing spec matches new spec\n\t\texisting, getErr := s.db.GetCluster(ctx, c.Server)\n\t\tif getErr != nil {\n\t\t\treturn nil, status.Errorf(codes.Internal, \"unable to check existing cluster details: %v\", getErr)\n\t\t}\n\n\t\t// cluster ConnectionState may differ, so make consistent before testing\n\t\texisting.ConnectionState = c.ConnectionState\n\t\tif reflect.DeepEqual(existing, c) {\n\t\t\tclust, err = existing, nil\n\t\t} else if q.Upsert {\n\t\t\treturn s.Update(ctx, &ClusterUpdateRequest{Cluster: c})\n\t\t} else {\n\t\t\treturn nil, status.Errorf(codes.InvalidArgument, \"existing cluster spec is different; use upsert flag to force update\")\n\t\t}\n\t}\n\treturn redact(clust), err\n}", "title": "" }, { "docid": "58dd1a54af16fb4e699fb88122fa6bc5", "score": "0.46270868", "text": "func (e TcpProxy_WeightedCluster_ClusterWeightValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "101b31da04f37a6917c70c9519094d34", "score": "0.46265382", "text": "func (req createClusterReq) Validate() error {\n\tif len(req.ProjectID) == 0 {\n\t\treturn fmt.Errorf(\"the project ID cannot be empty\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "dcf59292708a8fc1f4364c8e6864970c", "score": "0.46098784", "text": "func NewNotFound(msg string) errstack.E {\n\tif msg == \"\" {\n\t\tmsg = \"object not found\"\n\t}\n\treturn notFound{errstack.NewReq(msg)}\n}", "title": "" }, { "docid": "8ffc277e08e3924752645129a7fe8557", "score": "0.45916528", "text": "func NewCreateClusterManifestNotFound() *CreateClusterManifestNotFound {\n\treturn &CreateClusterManifestNotFound{}\n}", "title": "" }, { "docid": "7fc2fc27fae366a23070650a328f3ba6", "score": "0.45912224", "text": "func CreateClusterFailErrMocked(t *testing.T, clusterIn *types.Cluster) *types.Cluster {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewClusterService(cs)\n\tassert.Nil(err, \"Couldn't load cluster service\")\n\tassert.NotNil(ds, \"Cluster service not instanced\")\n\n\t// convertMap\n\tmapIn, err := utils.ItemConvertParams(*clusterIn)\n\tassert.Nil(err, \"Cluster test data corrupted\")\n\n\t// to json\n\tdOut, err := json.Marshal(clusterIn)\n\tassert.Nil(err, \"Cluster test data corrupted\")\n\n\t// call service\n\tcs.On(\"Post\", APIPathKubernetesClusters, mapIn).Return(dOut, 200, fmt.Errorf(\"mocked error\"))\n\tclusterOut, err := ds.CreateCluster(mapIn)\n\n\tassert.NotNil(err, \"We are expecting an error\")\n\tassert.Nil(clusterOut, \"Expecting nil output\")\n\tassert.Equal(err.Error(), \"mocked error\", \"Error should be 'mocked error'\")\n\n\treturn clusterOut\n}", "title": "" }, { "docid": "93f209d871dc543c6a99213cc59d4c2a", "score": "0.4591144", "text": "func NotFound(format string, a ...interface{}) *Error {\n\treturn newError(ErrNotFound, format, a)\n}", "title": "" }, { "docid": "4774f962ab48477a8d17909adefbcce3", "score": "0.45869955", "text": "func (e *AwsEnvironment) CreateCluster() (string, error) {\n\t_, privateIP, err := e.launchMaster()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif e.WorkerNodes > 0 {\n\t\t_, err = e.launchWorkers(privateIP)\n\t}\n\n\treturn \"\", err\n}", "title": "" }, { "docid": "9d6bcd0e7a2732ac78c92f872c10e43f", "score": "0.45740274", "text": "func (a *ClusterAPI) GetCluster(c *gin.Context) {\n\tcommonCluster, ok := a.clusterGetter.GetClusterFromRequest(c)\n\tif !ok {\n\t\treturn\n\t}\n\n\terrorHandler = emperror.HandlerWith(\n\t\terrorHandler,\n\t\t\"clusterId\", commonCluster.GetID(),\n\t\t\"cluster\", commonCluster.GetName(),\n\t)\n\n\tclusterStatus, err := commonCluster.GetStatus()\n\tif err != nil {\n\t\terrorHandler.Handle(err)\n\n\t\tginutils.ReplyWithErrorResponse(c, &common.ErrorResponse{\n\t\t\tCode: http.StatusInternalServerError,\n\t\t\tMessage: \"Error getting cluster\",\n\t\t\tError: err.Error(),\n\t\t})\n\t\treturn\n\t}\n\n\tsecret, err := commonCluster.GetSecretWithValidation()\n\tif err != nil {\n\t\terrorResponse := &common.ErrorResponse{\n\t\t\tCode: http.StatusInternalServerError,\n\t\t\tMessage: \"Error getting secret\",\n\t\t\tError: err.Error(),\n\t\t}\n\n\t\tif clusterStatus.Distribution == pkgCluster.PKE &&\n\t\t\tclusterStatus.Cloud == pkgCluster.Amazon &&\n\t\t\tclusterStatus.Status == pkgCluster.Creating {\n\t\t\terr = cluster.NotReadyError{\n\t\t\t\tOrganizationID: commonCluster.GetOrganizationId(),\n\t\t\t\tID: commonCluster.GetID(),\n\t\t\t\tName: commonCluster.GetName(),\n\t\t\t}\n\n\t\t\terrorResponse = &common.ErrorResponse{\n\t\t\t\tCode: http.StatusConflict,\n\t\t\t\tMessage: \"Secret has not been created yet\",\n\t\t\t\tError: err.Error(),\n\t\t\t}\n\t\t}\n\n\t\terrorHandler.Handle(err)\n\n\t\tginutils.ReplyWithErrorResponse(c, errorResponse)\n\t\treturn\n\t}\n\n\tresponse := GetClusterResponse{\n\t\tID: clusterStatus.ResourceID,\n\t\tStatus: clusterStatus.Status,\n\t\tStatusMessage: clusterStatus.StatusMessage,\n\t\tName: clusterStatus.Name,\n\n\t\tRegion: clusterStatus.Region,\n\t\tLocation: clusterStatus.Location,\n\t\tCloud: clusterStatus.Cloud,\n\t\tDistribution: clusterStatus.Distribution,\n\t\tSpot: clusterStatus.Spot,\n\n\t\t// TODO: keep one of the following?\n\t\t// TODO: is this correct?\n\t\tVersion: clusterStatus.Version,\n\t\tMasterVersion: clusterStatus.Version,\n\n\t\tNodePools: make(map[string]GetClusterNodePool, len(clusterStatus.NodePools)),\n\n\t\tSecretID: secret.ID,\n\t\tSecretName: secret.Name,\n\n\t\tCreatedAt: clusterStatus.CreatedAt,\n\t\tCreatorName: clusterStatus.CreatorName,\n\t\tCreatorID: clusterStatus.CreatorId,\n\t}\n\n\t// set oidc field on response\n\toidcCreator := oidc.NewCreator(a.authConfig.OIDC, a.clientSecretGetter)\n\toidcResponse, err := oidcCreator.CreateNewOIDCResponse(c.Request.Context(), clusterStatus.OIDCEnabled, commonCluster.GetID())\n\tif err != nil {\n\t\terrorHandler.Handle(err)\n\t} else {\n\t\tresponse.OIDC = OIDC{\n\t\t\tEnabled: oidcResponse.Enabled,\n\t\t\tIdpURL: oidcResponse.IdpURL,\n\t\t\tClientID: oidcResponse.ClientID,\n\t\t\tClientSecret: oidcResponse.ClientSecret,\n\t\t}\n\t}\n\n\tfor name, nodePool := range clusterStatus.NodePools {\n\t\tresponse.NodePools[name] = GetClusterNodePool{\n\t\t\tAutoscaling: nodePool.Autoscaling,\n\t\t\tCount: nodePool.Count,\n\t\t\tInstanceType: nodePool.InstanceType,\n\t\t\tSpotPrice: nodePool.SpotPrice,\n\t\t\tPreemptible: nodePool.Preemptible,\n\t\t\tMinCount: nodePool.MinCount,\n\t\t\tMaxCount: nodePool.MaxCount,\n\t\t\tImage: nodePool.Image,\n\t\t\tVersion: nodePool.Version,\n\t\t\tLabels: nodePool.Labels,\n\t\t\tVcpu: nodePool.Vcpu,\n\t\t\tRam: nodePool.Ram,\n\t\t\tTemplate: nodePool.Template,\n\n\t\t\tCreatedAt: nodePool.CreatedAt,\n\t\t\tCreatorName: nodePool.CreatorName,\n\t\t\tCreatorID: nodePool.CreatorId,\n\t\t}\n\t}\n\n\tready, err := commonCluster.IsReady()\n\tif err != nil {\n\t\terr = errors.WithMessage(err, \"failed to check if the cluster is ready\")\n\t\terrorHandler.Handle(err)\n\t}\n\tif err != nil || !ready { // Cluster is not ready yet or we can't check if it's ready\n\t\tc.JSON(http.StatusPartialContent, response)\n\t\treturn\n\t}\n\n\tvar partialResponse bool\n\n\tendpoint, err := commonCluster.GetAPIEndpoint()\n\tif err != nil {\n\t\terrorHandler.Handle(err)\n\n\t\tpartialResponse = true\n\t} else {\n\t\tresponse.Endpoint = endpoint\n\t}\n\n\tkubeConfig, err := commonCluster.GetK8sConfig()\n\tif err != nil {\n\t\terrorHandler.Handle(err)\n\n\t\t// We cannot continue collecting data from this point\n\t\tc.JSON(http.StatusPartialContent, response)\n\t\treturn\n\t}\n\n\tclient, err := k8sclient.NewClientFromKubeConfig(kubeConfig)\n\tif err != nil {\n\t\terrorHandler.Handle(err)\n\n\t\t// We cannot continue collecting data from this point\n\t\tc.JSON(http.StatusPartialContent, response)\n\t\treturn\n\t}\n\n\tdone := make(chan struct{}, 1)\n\tgo func() {\n\t\tdefer func() { done <- struct{}{} }()\n\n\t\ttotalSummary, err := resourcesummary.GetTotalSummary(c.Request.Context(), client)\n\t\tif err != nil {\n\t\t\terrorHandler.Handle(err)\n\n\t\t\tpartialResponse = true\n\t\t} else {\n\t\t\tcpuResource := Resource(totalSummary.CPU)\n\t\t\tmemoryResource := Resource(totalSummary.Memory)\n\t\t\tresponse.TotalSummary = &ResourceSummary{\n\t\t\t\tCPU: &cpuResource,\n\t\t\t\tMemory: &memoryResource,\n\t\t\t}\n\t\t}\n\n\t\tfor name, nodePool := range response.NodePools {\n\t\t\tselector := fmt.Sprintf(\"%s=%s\", common.LabelKey, name)\n\n\t\t\tnodes, err := client.CoreV1().Nodes().List(c.Request.Context(), metav1.ListOptions{\n\t\t\t\tLabelSelector: selector,\n\t\t\t})\n\t\t\tif err != nil {\n\t\t\t\terrorHandler.Handle(errors.Wrap(err, \"failed to get nodes\"))\n\n\t\t\t\tpartialResponse = true\n\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tnodePool.ResourceSummary = make(map[string]NodeResourceSummary, len(nodes.Items))\n\n\t\t\tfor _, node := range nodes.Items {\n\t\t\t\tnodeSummary, err := resourcesummary.GetNodeSummary(c.Request.Context(), client, node)\n\t\t\t\tif err != nil {\n\t\t\t\t\terrorHandler.Handle(errors.WithMessage(err, \"failed to get node resource summary\"))\n\n\t\t\t\t\tpartialResponse = true\n\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\tcpuResource := Resource(nodeSummary.CPU)\n\t\t\t\tmemoryResource := Resource(nodeSummary.Memory)\n\t\t\t\tnodePool.ResourceSummary[node.Name] = NodeResourceSummary{\n\t\t\t\t\tResourceSummary: ResourceSummary{\n\t\t\t\t\t\tCPU: &cpuResource,\n\t\t\t\t\t\tMemory: &memoryResource,\n\t\t\t\t\t},\n\t\t\t\t\tStatus: nodeSummary.Status,\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tresponse.NodePools[name] = nodePool\n\t\t}\n\t}()\n\n\tselect {\n\tcase <-done:\n\tcase <-time.After(5 * time.Second):\n\t\tpartialResponse = true\n\t}\n\n\tif partialResponse {\n\t\tc.JSON(http.StatusPartialContent, response)\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusOK, response)\n}", "title": "" }, { "docid": "ac47af6360c887d0ea340db61ef4ed0a", "score": "0.45735627", "text": "func (kb *KiteBuilder) Build(ctx context.Context, addr machine.Addr) Client {\n\tk, err := kb.pool.Get(addr.Value)\n\tif err != nil {\n\t\treturn NewDisconnected(ctx)\n\t}\n\n\tk.SetContext(ctx)\n\treturn k\n}", "title": "" }, { "docid": "f862d1498e10201a950356014f2e7f06", "score": "0.4567321", "text": "func NewUpdateClusterBadRequest() *UpdateClusterBadRequest {\n\treturn &UpdateClusterBadRequest{}\n}", "title": "" }, { "docid": "f862d1498e10201a950356014f2e7f06", "score": "0.4567321", "text": "func NewUpdateClusterBadRequest() *UpdateClusterBadRequest {\n\treturn &UpdateClusterBadRequest{}\n}", "title": "" }, { "docid": "17d66fbd7faabcf24ccc78f954288250", "score": "0.45441023", "text": "func (k *Kind) Create(ctx context.Context, cluster *Cluster, registry *Registry) error {\n\tstate, err := k.Status(ctx, cluster)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif state == Running {\n\t\treturn nil\n\t}\n\n\twd, err := os.Getwd()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcfgFile := filepath.Join(wd, filepath.Clean(cluster.ConfigFile))\n\tdir := filepath.Dir(cluster.ConfigFile)\n\terr = os.MkdirAll(dir, 0777)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not create build directory %s: %s\", dir, err.Error())\n\t}\n\n\tf, err := os.Create(cfgFile)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not create config file: %s: %s\", cfgFile, err.Error())\n\t}\n\tdefer f.Close()\n\n\terr = k.cfgTemplate.Execute(f, map[string]interface{}{\n\t\t\"Registry\": registry,\n\t})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error writing config to %s: %s\", cfgFile, err.Error())\n\t}\n\n\terr = f.Sync()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Could not sync config file to disk %s: %s\", cfgFile, err.Error())\n\t}\n\n\tnameArg := fmt.Sprintf(\"--name=%s\", cluster.Name)\n\tcfgArg := fmt.Sprintf(\"--config=%s\", cfgFile)\n\treturn sh.Run(\"kind\", \"create\", \"cluster\", nameArg, cfgArg)\n}", "title": "" }, { "docid": "a995537f64801de848cdf96d51924d5b", "score": "0.4541254", "text": "func (e Cluster_CommonLbConfigValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "d2c6f2c30492456f71bf57650c79fd1f", "score": "0.45371637", "text": "func Newkc(key string, message string, title string) SErr {\n\tvar (\n\t\tstack = make([]uintptr, 50)\n\t\tlength = runtime.Callers(2, stack[:])\n\t\terrx = construct(stack[:length], ErrorLevelFatal, ErrorCodeNothing, key, errors.New(message), 0)\n\t)\n\n\tif title != \"@\" {\n\t\terrx.comments[0] = title\n\t}\n\treturn errx\n}", "title": "" }, { "docid": "8c9be223107a71416ae733333962b8c5", "score": "0.45326072", "text": "func (ut *ClusterPostBody) Validate() (err error) {\n\n\tif ut.NamespaceID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"namespace_id\"))\n\t}\n\tif ut.NodePoolSize < 3 {\n\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(`response.nodePoolSize`, ut.NodePoolSize, 3, true))\n\t}\n\tif ut.NodePoolSize > 11 {\n\t\terr = goa.MergeErrors(err, goa.InvalidRangeError(`response.nodePoolSize`, ut.NodePoolSize, 11, false))\n\t}\n\treturn\n}", "title": "" }, { "docid": "14a944b12a566e6798cfe21bc7b8ba6a", "score": "0.45318618", "text": "func (e KafkaClusterDefinitionValidationError) Key() bool { return e.key }", "title": "" }, { "docid": "feb60e2ee5b16bea23fb5f6b2c936ad9", "score": "0.4530529", "text": "func NewK8sProvisionerClusterNotFound(cluster string) Error {\n\treturn NewK8sProvisionerClusterNotFoundBuilder(cluster).Build()\n}", "title": "" }, { "docid": "c7a75f48ebe4d9b683d6aa19575f8b45", "score": "0.45242003", "text": "func (e Cluster_LeastRequestLbConfigValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "e7a4a253114246046eb97ba9e9d1e4db", "score": "0.4522263", "text": "func (e KafkaClusterDefinitionValidationError) Field() string { return e.field }", "title": "" }, { "docid": "d7dce6254fd56273546225b1924aeb8c", "score": "0.45201778", "text": "func (ut *CreateClusterData) Validate() (err error) {\n\tif ut.Name == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"name\"))\n\t}\n\tif ut.APIURL == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"api-url\"))\n\t}\n\tif ut.AppDNS == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"app-dns\"))\n\t}\n\tif ut.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"type\"))\n\t}\n\tif ut.ServiceAccountToken == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"service-account-token\"))\n\t}\n\tif ut.ServiceAccountUsername == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"service-account-username\"))\n\t}\n\tif ut.AuthClientID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"auth-client-id\"))\n\t}\n\tif ut.AuthClientSecret == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"auth-client-secret\"))\n\t}\n\tif ut.AuthClientDefaultScope == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`type`, \"auth-client-default-scope\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "b6645a360b4e1f52559af74bf721db87", "score": "0.45171502", "text": "func (enn ErrNoNetwork) NotFound() {}", "title": "" }, { "docid": "c9a3989490942fd540c7855bb0de707e", "score": "0.45131657", "text": "func NewNotFound(name, group, resource string) error {\n\treturn errors.NewNotFound(schema.GroupResource{Group: group, Resource: resource}, name)\n}", "title": "" }, { "docid": "e319a903b4b5dabad76e657efcff5c57", "score": "0.4506844", "text": "func (mt *Cluster) Validate() (err error) {\n\tif mt.ID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"id\"))\n\t}\n\tif mt.Type == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"type\"))\n\t}\n\n\tif mt.State == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"state\"))\n\t}\n\tif mt.NamespaceID == \"\" {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`response`, \"namespace_id\"))\n\t}\n\tif !(mt.State == \"create_requested\" || mt.State == \"starting\" || mt.State == \"active\" || mt.State == \"delete_requested\" || mt.State == \"deleting\" || mt.State == \"deleted\") {\n\t\terr = goa.MergeErrors(err, goa.InvalidEnumValueError(`response.state`, mt.State, []interface{}{\"create_requested\", \"starting\", \"active\", \"delete_requested\", \"deleting\", \"deleted\"}))\n\t}\n\treturn\n}", "title": "" }, { "docid": "5af04883283ff01e3dadd7789a535e8e", "score": "0.4506513", "text": "func (s *Server) Create(ctx context.Context, q *cluster.ClusterCreateRequest) (*appv1.Cluster, error) {\n\tif err := s.enf.EnforceErr(ctx.Value(\"claims\"), rbacpolicy.ResourceClusters, rbacpolicy.ActionCreate, CreateClusterRBACObject(q.Cluster.Project, q.Cluster.Server)); err != nil {\n\t\treturn nil, err\n\t}\n\tc := q.Cluster\n\tserverVersion, err := s.kubectl.GetServerVersion(c.RESTConfig())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclust, err := s.db.CreateCluster(ctx, c)\n\tif err != nil {\n\t\tif status.Convert(err).Code() == codes.AlreadyExists {\n\t\t\t// act idempotent if existing spec matches new spec\n\t\t\texisting, getErr := s.db.GetCluster(ctx, c.Server)\n\t\t\tif getErr != nil {\n\t\t\t\treturn nil, status.Errorf(codes.Internal, \"unable to check existing cluster details: %v\", getErr)\n\t\t\t}\n\n\t\t\tif existing.Equals(c) {\n\t\t\t\tclust = existing\n\t\t\t} else if q.Upsert {\n\t\t\t\treturn s.Update(ctx, &cluster.ClusterUpdateRequest{Cluster: c})\n\t\t\t} else {\n\t\t\t\treturn nil, status.Errorf(codes.InvalidArgument, argo.GenerateSpecIsDifferentErrorMessage(\"cluster\", existing, c))\n\t\t\t}\n\t\t} else {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\terr = s.cache.SetClusterInfo(c.Server, &appv1.ClusterInfo{\n\t\tServerVersion: serverVersion,\n\t\tConnectionState: appv1.ConnectionState{\n\t\t\tStatus: appv1.ConnectionStatusSuccessful,\n\t\t\tModifiedAt: &v1.Time{Time: time.Now()},\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn s.toAPIResponse(clust), err\n}", "title": "" }, { "docid": "0eb752951a9d1725e94cbd8601e24d3d", "score": "0.4506036", "text": "func createCluster(\n\tstopper *stop.Stopper,\n\tnodeCount int,\n\tepochWriter, actionWriter io.Writer,\n\tscript Script,\n\trand *rand.Rand,\n) *Cluster {\n\tclock := hlc.NewClock(hlc.UnixNano)\n\trpcContext := rpc.NewContext(&base.Context{Insecure: true}, clock, stopper)\n\tserver := rpc.NewServer(rpcContext)\n\tg := gossip.New(rpcContext, server, nil, stopper, metric.NewRegistry())\n\t// NodeID is required for Gossip, so set it to -1 for the cluster Gossip\n\t// instance to prevent conflicts with real NodeIDs.\n\tg.SetNodeID(-1)\n\tstorePool := storage.NewStorePool(\n\t\tg,\n\t\tclock,\n\t\trpcContext,\n\t\t/* reservationsEnabled */ true,\n\t\tstorage.TestTimeUntilStoreDeadOff,\n\t\tstopper,\n\t)\n\tc := &Cluster{\n\t\tstopper: stopper,\n\t\tclock: clock,\n\t\trpc: rpcContext,\n\t\tgossip: g,\n\t\tstorePool: storePool,\n\t\tallocator: storage.MakeAllocator(storePool, storage.AllocatorOptions{\n\t\t\tAllowRebalance: true,\n\t\t\tDeterministic: true,\n\t\t}),\n\t\tstoreGossiper: gossiputil.NewStoreGossiper(g),\n\t\tnodes: make(map[roachpb.NodeID]*Node),\n\t\tstores: make(map[roachpb.StoreID]*Store),\n\t\tranges: make(map[roachpb.RangeID]*Range),\n\t\trangeIDsByStore: make(map[roachpb.StoreID]roachpb.RangeIDSlice),\n\t\trand: rand,\n\t\tepochWriter: tabwriter.NewWriter(epochWriter, 8, 1, 2, ' ', 0),\n\t\tactionWriter: tabwriter.NewWriter(actionWriter, 8, 1, 2, ' ', 0),\n\t\tscript: script,\n\t\tepoch: -1,\n\t}\n\n\t// Add the nodes.\n\tfor i := 0; i < nodeCount; i++ {\n\t\tc.addNewNodeWithStore()\n\t}\n\n\t// Add a single range and add to this first node's first store.\n\tfirstRange := c.addRange()\n\tfirstRange.addReplica(c.stores[0])\n\n\tc.calculateRangeIDsByStore()\n\n\t// Output the first epoch header.\n\tc.epoch = 0\n\tc.OutputEpochHeader()\n\tc.OutputEpoch()\n\tc.flush()\n\n\treturn c\n}", "title": "" }, { "docid": "bbf05dad6114cacdb0e831e90f0d31e3", "score": "0.45057142", "text": "func (a *ClusterAPI) createCluster(\n\tctx context.Context,\n\tcreateClusterRequest *pkgCluster.CreateClusterRequest,\n\torganizationID uint,\n\tuserID uint,\n\tpostHooks pkgCluster.PostHooks,\n) (cluster.CommonCluster, *pkgCommon.ErrorResponse) {\n\tlogger := a.logger.WithFields(logrus.Fields{\n\t\t\"organization\": organizationID,\n\t\t\"user\": userID,\n\t\t\"cluster\": createClusterRequest.Name,\n\t})\n\n\tlogger.Infof(\"Creating new entry with cloud type: %s\", createClusterRequest.Cloud)\n\n\t// TODO check validation\n\t// This is the common part of cluster flow\n\tcommonCluster, err := cluster.CreateCommonClusterFromRequest(createClusterRequest, organizationID, userID)\n\tif err != nil {\n\t\tlog.Errorf(\"error during create common cluster from request: %s\", err.Error())\n\t\treturn nil, &pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: err.Error(),\n\t\t\tError: err.Error(),\n\t\t}\n\t}\n\n\tif strings.HasPrefix(commonCluster.GetDistribution(), pkgCluster.PKE) && commonCluster.GetCloud() == pkgCluster.Amazon && !a.distributionConfig.PKE.Amazon.Enabled {\n\t\treturn nil, &pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: pkgErrors.ErrorNotSupportedDistributionType.Error(),\n\t\t\tError: pkgErrors.ErrorNotSupportedDistributionType.Error(),\n\t\t}\n\t}\n\n\tif _, ok := commonCluster.(*cluster.EKSCluster); ok {\n\t\tcommonCluster, err = a.clusterCreators.EKSAmazon.CreateCluster(ctx, commonCluster, createClusterRequest, organizationID, userID)\n\t} else {\n\t\tcreationCtx := cluster.CreationContext{\n\t\t\tOrganizationID: organizationID,\n\t\t\tUserID: userID,\n\t\t\tName: createClusterRequest.Name,\n\t\t\tSecretID: createClusterRequest.SecretId,\n\t\t\tSecretIDs: createClusterRequest.SecretIds,\n\t\t\tProvider: createClusterRequest.Cloud,\n\t\t\tPostHooks: postHooks,\n\t\t\tExternalBaseURL: a.externalBaseURL,\n\t\t\tExternalBaseURLInsecure: a.externalBaseURLInsecure,\n\t\t}\n\t\tcreator := cluster.NewClusterCreator(createClusterRequest, commonCluster, a.workflowClient)\n\t\tcommonCluster, err = a.clusterManager.CreateCluster(ctx, creationCtx, creator)\n\t}\n\n\tif isInvalid(err) {\n\t\tlogger.Debugf(\"invalid cluster creation: %s\", err.Error())\n\n\t\treturn nil, &pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusBadRequest,\n\t\t\tMessage: err.Error(),\n\t\t\tError: err.Error(),\n\t\t}\n\t} else if err != nil {\n\t\tlogger.Errorf(\"error during cluster creation: %s\", err.Error())\n\n\t\treturn nil, &pkgCommon.ErrorResponse{\n\t\t\tCode: http.StatusInternalServerError,\n\t\t\tMessage: err.Error(),\n\t\t\tError: err.Error(),\n\t\t}\n\t}\n\n\treturn commonCluster, nil\n}", "title": "" }, { "docid": "fa0c5f28298a61b02b019032b6520947", "score": "0.45034328", "text": "func NewShowNotFound(body *ShowNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\n\treturn v\n}", "title": "" }, { "docid": "2c0644b79f5331e3368f96d489b6b8f9", "score": "0.4503245", "text": "func Newk(key string, message string) SErr {\n\tvar (\n\t\tstack = make([]uintptr, 50)\n\t\tlength = runtime.Callers(2, stack[:])\n\t)\n\n\treturn construct(stack[:length], ErrorLevelFatal, ErrorCodeNothing, key, errors.New(message), 0)\n}", "title": "" }, { "docid": "e2e39842cf88233255e4d753233d4fdf", "score": "0.45029268", "text": "func NewShowNotFound(body *ShowNotFoundResponseBody) *goa.ServiceError {\n\tv := &goa.ServiceError{\n\t\tName: *body.Name,\n\t\tID: *body.ID,\n\t\tMessage: *body.Message,\n\t\tTemporary: *body.Temporary,\n\t\tTimeout: *body.Timeout,\n\t\tFault: *body.Fault,\n\t}\n\treturn v\n}", "title": "" }, { "docid": "5a37c1cc7faef7e9a3e12fa35b102d62", "score": "0.44961458", "text": "func (future *OperationalizationClustersCreateOrUpdateFuture) Result(client OperationalizationClustersClient) (oc OperationalizationCluster, err error) {\n\tvar done bool\n\tdone, err = future.Done(client)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"compute.OperationalizationClustersCreateOrUpdateFuture\", \"Result\", future.Response(), \"Polling failure\")\n\t\treturn\n\t}\n\tif !done {\n\t\terr = azure.NewAsyncOpIncompleteError(\"compute.OperationalizationClustersCreateOrUpdateFuture\")\n\t\treturn\n\t}\n\tsender := autorest.DecorateSender(client, autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n\tif oc.Response.Response, err = future.GetResult(sender); err == nil && oc.Response.Response.StatusCode != http.StatusNoContent {\n\t\toc, err = client.CreateOrUpdateResponder(oc.Response.Response)\n\t\tif err != nil {\n\t\t\terr = autorest.NewErrorWithError(err, \"compute.OperationalizationClustersCreateOrUpdateFuture\", \"Result\", oc.Response.Response, \"Failure responding to request\")\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f918676908d1b1164d9bbbbb71407c75", "score": "0.44930595", "text": "func (e TrackClusterStatsValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "c2285e33c70e0f178253dd71b1362ae9", "score": "0.44922546", "text": "func EnsureClusterExists(ctx context.Context) error {\n\treturn exec.CommandContext(ctx, \"kubectl\", \"cluster-info\").Run()\n}", "title": "" }, { "docid": "30f6f459ff4a42ff971f0c82eb91441b", "score": "0.4491045", "text": "func (e KafkaMeshValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "2676f6dc7822997876bcdce8bc06bb23", "score": "0.44817978", "text": "func NewBuildError(message string, args ...interface{}) (b *BuildError) {\n\tLogger.Info(message, args...)\n\tb = &BuildError{}\n\tb.Message = message\n\tb.Args = args\n\tb.Stack = logger.NewCallStack()\n\tLogger.Info(\"Stack\", \"stack\", b.Stack)\n\treturn b\n}", "title": "" }, { "docid": "b2196960d096735100236737c0e40484", "score": "0.44801646", "text": "func (b builder) Err() error {\n\treturn b.err\n}", "title": "" }, { "docid": "17b77c14356817bbc7ef5212e1ca48eb", "score": "0.44767502", "text": "func (b *K8sProvisionerCredentialsFileErrorBuilder) Build() Error {\n\tdescription := &impl.ErrorDescription{\n\t\tFriendly: \"failed to write credentials file\",\n\t\tTechnical: \"failed to write credentials file\",\n\t}\n\n\treturn &impl.Error{\n\t\tErrorArguments: b.arguments,\n\t\tErrorCode: \"credentials_file_error\",\n\t\tErrorDescription: description,\n\t\tErrorDomain: Domain,\n\t\tErrorMetadata: &impl.ErrorMetadata{},\n\t\tErrorSection: K8sProvisionerSection,\n\t\tErrorSensitivity: errawr.ErrorSensitivityNone,\n\t\tErrorTitle: \"Credentials file error\",\n\t\tVersion: 1,\n\t}\n}", "title": "" }, { "docid": "606dfc6d61222a587c56363a072bfbb3", "score": "0.44720623", "text": "func NewNotFound(message string) APIError {\n\tvar err APIError = &genericError{\n\t\tstatusCode: http.StatusNotFound,\n\t\tcode: \"not_found\",\n\t\tmessage: message,\n\t}\n\treturn err\n}", "title": "" }, { "docid": "484e40432f5ddcacc73fde9eb056651a", "score": "0.44700933", "text": "func IsK8sProvisionerClusterNotFound(err errawr.Error) bool {\n\treturn err != nil && err.Is(K8sProvisionerClusterNotFoundCode)\n}", "title": "" }, { "docid": "40c5caea91bfedcd80c093c8ad5ad972", "score": "0.4468649", "text": "func (ut *createClusterData) Validate() (err error) {\n\tif ut.Name == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"name\"))\n\t}\n\tif ut.APIURL == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"api-url\"))\n\t}\n\tif ut.AppDNS == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"app-dns\"))\n\t}\n\tif ut.Type == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"type\"))\n\t}\n\tif ut.ServiceAccountToken == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"service-account-token\"))\n\t}\n\tif ut.ServiceAccountUsername == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"service-account-username\"))\n\t}\n\tif ut.AuthClientID == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"auth-client-id\"))\n\t}\n\tif ut.AuthClientSecret == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"auth-client-secret\"))\n\t}\n\tif ut.AuthClientDefaultScope == nil {\n\t\terr = goa.MergeErrors(err, goa.MissingAttributeError(`request`, \"auth-client-default-scope\"))\n\t}\n\treturn\n}", "title": "" }, { "docid": "ca869174f3b22e673ebd230514b57a72", "score": "0.44679067", "text": "func (e Cluster_LbSubsetConfigValidationError) Reason() string { return e.reason }", "title": "" }, { "docid": "26f356195cee870fd1cb002710517cbb", "score": "0.4465373", "text": "func BuildCluster(cfg TestClusterConfig) *cluster.Cluster {\n\tdisco := fakediscovery.New()\n\tdisco.AddTaggedGates(nil, &vtadminpb.VTGate{Hostname: fmt.Sprintf(\"%s-%s-gate\", cfg.Cluster.Name, cfg.Cluster.Id)})\n\tdisco.AddTaggedVtctlds(nil, &vtadminpb.Vtctld{Hostname: \"doesn't matter\"})\n\n\ttablets := make([]*vtadminpb.Tablet, len(cfg.Tablets))\n\tfor i, t := range cfg.Tablets {\n\t\ttablet := &vtadminpb.Tablet{\n\t\t\tCluster: cfg.Cluster,\n\t\t\tTablet: t.Tablet,\n\t\t\tState: t.State,\n\t\t}\n\n\t\ttablets[i] = tablet\n\t}\n\n\tdb := vtsql.New(&vtsql.Config{\n\t\tCluster: cfg.Cluster,\n\t\tDiscovery: disco,\n\t})\n\tdb.DialFunc = func(_ vitessdriver.Configuration) (*sql.DB, error) {\n\t\treturn sql.OpenDB(&fakevtsql.Connector{Tablets: tablets, ShouldErr: cfg.DBConfig.ShouldErr}), nil\n\t}\n\n\tvtctld := vtadminvtctldclient.New(&vtadminvtctldclient.Config{\n\t\tCluster: cfg.Cluster,\n\t\tDiscovery: disco,\n\t})\n\tvtctld.DialFunc = func(addr string, ff grpcclient.FailFast, opts ...grpc.DialOption) (vtctldclient.VtctldClient, error) {\n\t\treturn cfg.VtctldClient, nil\n\t}\n\n\treturn &cluster.Cluster{\n\t\tID: cfg.Cluster.Id,\n\t\tName: cfg.Cluster.Name,\n\t\tDiscovery: disco,\n\t\tDB: db,\n\t\tVtctld: vtctld,\n\t}\n}", "title": "" }, { "docid": "14fec6d3c18928221ee81a3eff26e0a3", "score": "0.44554207", "text": "func (c *MgmtCluster) CreatePermanent() error {\n\tc.EventStream.Publish(&progress.StatusEvent{\n\t\tType: \"progress\",\n\t\tMsg: \"install HA rke cluster\",\n\t})\n\n\tif c.RKEConfigPath == \"\" {\n\t\tc.EventStream.Publish(&progress.StatusEvent{\n\t\t\tType: \"progress\",\n\t\t\tMsg: fmt.Sprintf(\"RKEConfigPath not provided in cake config, defaulting to %s\", defaultConfigPath),\n\t\t})\n\t\tc.RKEConfigPath = defaultConfigPath\n\t}\n\tif c.Hostname == \"\" {\n\t\tc.EventStream.Publish(&progress.StatusEvent{\n\t\t\tType: \"progress\",\n\t\t\tMsg: fmt.Sprintf(\"Hostname not provided in cake config, defaulting to %s\", defaultHostname),\n\t\t})\n\t\tc.Hostname = defaultHostname\n\t}\n\n\tvar y map[string]interface{}\n\terr := yaml.Unmarshal([]byte(rawClusterYML), &y)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error unmarshaling RKE cluster config file: %s\", err)\n\t}\n\n\tvar sans []string\n\tnodes := make([]*rkeConfigNode, 0)\n\tfor k, v := range c.Nodes {\n\t\tnode := &rkeConfigNode{\n\t\t\tAddress: v,\n\t\t\tPort: \"22\",\n\t\t\tInternalAddress: \"\",\n\t\t\tRole: []string{\"etcd\"},\n\t\t\tHostnameOverride: \"\",\n\t\t\tUser: c.SSH.Username,\n\t\t\tDockerSocket: \"/var/run/docker.sock\",\n\t\t\tSSHKeyPath: c.SSH.KeyPath,\n\t\t\tSSHCert: \"\",\n\t\t\tSSHCertPath: \"\",\n\t\t\tLabels: make(map[string]string),\n\t\t\tTaints: make([]rkeTaint, 0),\n\t\t}\n\t\tmasterPrefix := fmt.Sprintf(\"%s-%s\", c.ClusterName, config.ControlNode)\n\t\tif strings.HasPrefix(strings.ToLower(k), masterPrefix) {\n\t\t\tnode.Role = append(node.Role, config.ControlNode)\n\t\t\tsans = append(sans, v)\n\t\t} else {\n\t\t\tnode.Role = append(node.Role, config.WorkerNode)\n\t\t}\n\t\tnodes = append(nodes, node)\n\t}\n\n\tif len(nodes) == 1 {\n\t\tc.EventStream.Publish(&progress.StatusEvent{\n\t\t\tType: \"progress\",\n\t\t\tMsg: \"Non-HA RKE deployment, at least 3 nodes recommended\",\n\t\t})\n\t\tnodes[0].Role = []string{\"controlplane\", \"worker\", \"etcd\"}\n\t}\n\n\t// etcd requires an odd number of nodes, first role on each node is etcd.\n\tif len(nodes)%2 == 0 {\n\t\tlastNode := nodes[len(nodes)-1]\n\t\tlastNode.Role = lastNode.Role[1:]\n\t}\n\n\ty[\"nodes\"] = nodes\n\ty[\"ssh_key_path\"] = c.SSH.KeyPath\n\tsans = append(sans, c.Hostname)\n\ty[\"authentication\"] = map[string]interface{}{\n\t\t\"sans\": sans,\n\t\t\"strategy\": \"x509\",\n\t\t\"webhook\": nil,\n\t}\n\n\tclusterYML, err := yaml.Marshal(y)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error marshaling RKE cluster config file: %s\", err)\n\t}\n\terr = ioutil.WriteFile(c.RKEConfigPath, clusterYML, 0644)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error writing RKE cluster config file to file %s: %s\", c.RKEConfigPath, err)\n\t}\n\n\tcmd.FileLogLocation = c.LogFile\n\targs := []string{\n\t\t\"up\",\n\t\t\"--config=\" + c.RKEConfigPath,\n\t}\n\terr = cmd.GenericExecute(nil, \"rke\", args, nil)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error running rke up cmd: %s\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "625fb3e15f01bde722fbd5aaff6c0c67", "score": "0.44463864", "text": "func BuildClientConfigOrDie(kubeConfigPath string, clusterName string) *rest.Config {\n\n\tif cfg, err := clientcmd.BuildConfigFromFlags(\"\", \"\"); err == nil {\n\t\t// success!\n\t\treturn cfg\n\t}\n\t// try local...\n\n\toverrides := clientcmd.ConfigOverrides{}\n\t// Override the cluster name if provided.\n\tif clusterName != \"\" {\n\t\toverrides.Context.Cluster = clusterName\n\t}\n\n\tcfg, err := clientcmd.NewNonInteractiveDeferredLoadingClientConfig(\n\t\t&clientcmd.ClientConfigLoadingRules{ExplicitPath: kubeConfigPath},\n\t\t&overrides).ClientConfig()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn cfg\n}", "title": "" }, { "docid": "2b0b95db9f599a49dd6a394ea1a74c43", "score": "0.44392642", "text": "func (e Cluster_SlowStartConfigValidationError) Cause() error { return e.cause }", "title": "" }, { "docid": "215a093bb536df9c45756554a801aa51", "score": "0.4434507", "text": "func (err ErrKeyExists) Error() string {\n\treturn fmt.Sprintf(\"Error, timestamp key already exists for %s:%s\", err.gun, err.role)\n}", "title": "" }, { "docid": "d136f094e1324d59ae285882beb81b34", "score": "0.4428305", "text": "func newCluster(zoneCode, prefix string, excludeSuffix []string, config *rest.Config, db *gorm.DB) *cluster {\n\tc := &cluster{\n\t\tzoneCode: zoneCode,\n\t\tsyncPod: newSyncPod(zoneCode, prefix, excludeSuffix, config, db),\n\t}\n\treturn c\n}", "title": "" }, { "docid": "1bc25d80abd4890432b10e60a3d03983", "score": "0.4426854", "text": "func (d *Dao) GetCluster(ctx context.Context, cname string) (*model.Cluster, error) {\n\tsub, cancel := context.WithCancel(ctx)\n\tdefer cancel()\n\n\texists, err := d.checkClusterExists(sub, cname)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !exists {\n\t\treturn nil, model.ErrNotFound\n\t}\n\n\tistr, err := d.e.ClusterInfo(sub, cname)\n\tif client.IsKeyNotFound(err) {\n\t\treturn &model.Cluster{Name: cname, State: model.StateWaiting}, nil\n\t} else if err != nil {\n\t\treturn nil, err\n\t}\n\tinfo := &create.CacheInfo{}\n\tde := json.NewDecoder(strings.NewReader(istr))\n\terr = de.Decode(info)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclusterState, err := d.e.Get(sub, fmt.Sprintf(\"%s/%s/%s/state\", etcd.JobDetailDir, info.Group, info.JobID))\n\tif err != nil {\n\t\tclusterState = model.StateError\n\t}\n\n\tif clusterState == job.StateDone {\n\t\tclusterState = model.StateDone\n\t} else if clusterState == job.StateLost || clusterState == job.StateFail {\n\t\tclusterState = model.StateError\n\t} else {\n\t\tclusterState = model.StateWaiting\n\t}\n\n\tinstances, err := d.getClusterInstances(sub, info, clusterState)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tappids, err := d.getClusterAppids(sub, info.Name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar fePort int64\n\tfeport, err := d.e.Get(sub, fmt.Sprintf(\"%s/%s/fe-port\", etcd.ClusterDir, cname))\n\tif client.IsKeyNotFound(err) {\n\t\tfePort = -1\n\t} else if err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tfePort, err = strconv.ParseInt(feport, 10, 64)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tc := &model.Cluster{\n\t\tName: info.Name,\n\t\tCacheType: string(info.CacheType),\n\t\tAppids: appids,\n\t\tFrontEndPort: int(fePort),\n\t\tMaxMemory: info.MaxMemory,\n\t\tCPU: info.CPU,\n\t\tVersion: info.Version,\n\t\tNumber: info.Number,\n\t\tState: clusterState,\n\t\tInstances: instances,\n\t\tGroup: info.Group,\n\t\tMonitor: d.m.Href(info.Name),\n\t}\n\td.fillDefaultClusterConfig(c)\n\treturn c, nil\n}", "title": "" }, { "docid": "bc7b62f768c2b56726f640a739e6b53b", "score": "0.44246686", "text": "func (mc *MutableCluster) build() *cluster.Cluster {\n\tif mc == nil {\n\t\treturn nil\n\t}\n\t// Marshall Http Protocol options if they exist.\n\tif mc.httpProtocolOptions != nil {\n\t\t// UpstreamProtocolOptions is required field in Envoy. If we have not set this option earlier\n\t\t// we need to set it to default http protocol options.\n\t\tif mc.httpProtocolOptions.UpstreamProtocolOptions == nil {\n\t\t\tmc.httpProtocolOptions.UpstreamProtocolOptions = &http.HttpProtocolOptions_ExplicitHttpConfig_{\n\t\t\t\tExplicitHttpConfig: &http.HttpProtocolOptions_ExplicitHttpConfig{\n\t\t\t\t\tProtocolConfig: &http.HttpProtocolOptions_ExplicitHttpConfig_HttpProtocolOptions{},\n\t\t\t\t},\n\t\t\t}\n\t\t}\n\t\tmc.cluster.TypedExtensionProtocolOptions = map[string]*anypb.Any{\n\t\t\tv3.HttpProtocolOptionsType: protoconv.MessageToAny(mc.httpProtocolOptions),\n\t\t}\n\t}\n\treturn mc.cluster\n}", "title": "" }, { "docid": "9a4db7731d6f7f62af4585a1bef7398a", "score": "0.44244316", "text": "func NewCluster(ctx context.Context, o Options) (cluster *Cluster, err error) {\n\tvar (\n\t\t// We force the Docker runtime so we can create a Docker client for getting\n\t\t// the exposed ports for the API server and NGINX.\n\t\truntime = k3d_runtime.Docker\n\n\t\t// Running in docker indicates that we should configure k3s to connect to\n\t\t// the same docker network as the current container.\n\t\trunningInDocker = os.Getenv(\"K8S_USE_DOCKER_NETWORK\") == \"1\"\n\t)\n\n\tif err := o.applyDefaults(); err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to apply defaults to options: %w\", err)\n\t}\n\n\tk3dConfig := k3d_config.SimpleConfig{\n\t\tTypeMeta: k3d_cfgtypes.TypeMeta{\n\t\t\tKind: \"Simple\",\n\t\t\tAPIVersion: config.DefaultConfigApiVersion,\n\t\t},\n\t\tName: randomClusterName(),\n\t\tServers: 1,\n\t\tPorts: []k3d_config.PortWithNodeFilters{{\n\t\t\t// Bind NGINX (container port 80) to 127.0.0.1:0\n\t\t\tPort: \"127.0.0.1:0:80\",\n\t\t\tNodeFilters: []string{\"loadbalancer\"},\n\t\t}},\n\t\tExposeAPI: k3d_config.SimpleExposureOpts{\n\t\t\t// Bind API sever to 127.0.0.1:0\n\t\t\tHost: \"127.0.0.1\",\n\t\t\tHostIP: \"127.0.0.1\",\n\t\t\tHostPort: \"0\",\n\t\t},\n\t\tImage: fmt.Sprintf(\"%s:%s\", k3d_types.DefaultK3sImageRepo, k3d_version.K3sVersion),\n\t\tOptions: k3d_config.SimpleConfigOptions{\n\t\t\tK3dOptions: k3d_config.SimpleConfigOptionsK3d{\n\t\t\t\tWait: true,\n\t\t\t\tTimeout: time.Minute,\n\t\t\t},\n\t\t},\n\t}\n\tif runningInDocker {\n\t\terr := injectCurrentDockerNetwork(ctx, &k3dConfig)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not connect k3d to current docker network: %w\", err)\n\t\t}\n\t}\n\n\tclusterConfig, err := config.TransformSimpleToClusterConfig(ctx, runtime, k3dConfig)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to generate cluster config: %w\", err)\n\t}\n\n\terr = k3d_client.ClusterRun(ctx, runtime, clusterConfig)\n\n\tdefer func() {\n\t\t// We don't want to leak the cluster here, and we can't really be sure how\n\t\t// many resources exist, even if ClusterRun fails. If we never set our\n\t\t// cluster return argument, we'll delete the k3d cluster. This also\n\t\t// gracefully handles panics.\n\t\tif cluster == nil {\n\t\t\t_ = k3d_client.ClusterDelete(ctx, runtime, &clusterConfig.Cluster, k3d_types.ClusterDeleteOpts{})\n\t\t}\n\t}()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to run cluster: %w\", err)\n\t}\n\n\tvar (\n\t\thttpAddr string\n\t\tapiServerAddr string\n\t)\n\n\t// If we're currently running inside of Docker, we can connect directly to\n\t// our container. Otherwise, we have to find what the bound host IPs are.\n\tif runningInDocker {\n\t\thttpAddr, apiServerAddr, err = clusterInternalAddrs(ctx, clusterConfig.Cluster)\n\t} else {\n\t\thttpAddr, apiServerAddr, err = loadBalancerExposedAddrs(ctx, clusterConfig.Cluster)\n\t}\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to discover exposed cluster addresses: %w\", err)\n\t}\n\n\tkubeconfig, err := k3d_client.KubeconfigGet(ctx, runtime, &clusterConfig.Cluster)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to retrieve kubeconfig: %w\", err)\n\t}\n\tif c, ok := kubeconfig.Clusters[kubeconfig.CurrentContext]; ok && c != nil {\n\t\t// The generated kubeconfig will set https://127.0.0.1:0 as the address. We\n\t\t// need to replace it with the actual exposed port that Docker generated\n\t\t// for us.\n\t\tc.Server = \"https://\" + apiServerAddr\n\t} else {\n\t\treturn nil, fmt.Errorf(\"generated kubeconfig missing context set\")\n\t}\n\trestCfg, err := k8s_clientcmd.NewDefaultClientConfig(*kubeconfig, nil).ClientConfig()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not generate k8s REST API config: %w\", err)\n\t}\n\n\tkubeClient, err := client.New(restCfg, client.Options{\n\t\tScheme: o.Scheme,\n\t})\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to generate client: %w\", err)\n\t}\n\n\treturn &Cluster{\n\t\truntime: runtime,\n\t\tk3dCluster: clusterConfig.Cluster,\n\t\trestConfig: restCfg,\n\t\tnginxAddr: httpAddr,\n\t\tkubeClient: kubeClient,\n\t}, nil\n}", "title": "" }, { "docid": "58b6588914808688c52bdb882913251a", "score": "0.44228217", "text": "func (o *ClusterCreateDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "7fc15be0d2578ce6acf535f68a5091e5", "score": "0.4422015", "text": "func NotFound(detail string) *Error {\n\treturn ErrorFromStatus(http.StatusNotFound, detail)\n}", "title": "" }, { "docid": "1bce1330da5f294db9f1d7b0b0a2a4be", "score": "0.44210127", "text": "func clusterExists(ex terraform.Executor) (bool, error) {\n\to := map[string]interface{}{}\n\n\tif err := ex.Output(\"\", &o); err != nil {\n\t\treturn false, fmt.Errorf(\"getting Terraform output: %w\", err)\n\t}\n\n\treturn len(o) != 0, nil\n}", "title": "" }, { "docid": "8acaf5421d041ad0e990851873f9ee21", "score": "0.44208992", "text": "func (o *CreateClusterDetailsDefault) Code() int {\n\treturn o._statusCode\n}", "title": "" }, { "docid": "872c543fed71027d79c12963b3269c03", "score": "0.4416808", "text": "func NewDeregisterClusterNotFound() *DeregisterClusterNotFound {\n\n\treturn &DeregisterClusterNotFound{}\n}", "title": "" } ]
9cfc7ec1d4f8813b979f8f21d070f91d
Current state of the report.
[ { "docid": "ee9bdc3811db4b6f94b398a135b2f126", "score": "0.61269224", "text": "func (o LookupUtilizationReportResultOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupUtilizationReportResult) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" } ]
[ { "docid": "fccd562be76fef651daf4f6e7056f759", "score": "0.6292318", "text": "func (r *Recorder) State() *api.GlobalState {\n\treturn r.S\n}", "title": "" }, { "docid": "8824ad3f556e0e782d6c94195a8613bd", "score": "0.619316", "text": "func (eng *engine) State() *State { return eng.data.state }", "title": "" }, { "docid": "3eeb625081032540d1f65aeb0379d519", "score": "0.61205256", "text": "func (sim *testsim) State() *state.StateDB { return sim.statedb }", "title": "" }, { "docid": "e1e249acb8b6601eb5bae3f869aa23a1", "score": "0.61145395", "text": "func (s *Determination) State() State {\n\treturn s.stat.get()\n}", "title": "" }, { "docid": "43798c1f0c322777f0a4e9803c3243d3", "score": "0.609117", "text": "func (engine *Engine) State() string {\n\n\tengine.RLock()\n\tdefer engine.RUnlock()\n\treturn stateText[engine.state]\n}", "title": "" }, { "docid": "7d41c30ddfe181750ce9d4b4065c2a5c", "score": "0.60757285", "text": "func (manager *DomainProjectUpdateManager) State() string {\n\treturn manager.stage.state\n}", "title": "" }, { "docid": "99403c83c3bf7dd32d103ad7f0e8b574", "score": "0.59888047", "text": "func (w *WorkerInfo) State() (state WorkerState, from time.Time, runningExploit ServiceExploitName) {\n\tstate = w.state\n\tfrom = w.from\n\trunningExploit = w.running\n\treturn\n}", "title": "" }, { "docid": "40df6982cd9c45884626d4458e4a3236", "score": "0.59431213", "text": "func (ed *EvalDetails) State() interpreter.EvalState {\n\treturn ed.state\n}", "title": "" }, { "docid": "5396a4c620d925184e9f0f3fd922efad", "score": "0.5908783", "text": "func (w ResponseWriter) State() map[string]interface{} {\n\treturn w.state\n}", "title": "" }, { "docid": "0b560cc3f994e118cc4954e9ff133b48", "score": "0.5906068", "text": "func (n *NFA) GetCurrentState() Set {\n\treturn n.current\n}", "title": "" }, { "docid": "1fb4d367aad39625f92d6bddf0c027be", "score": "0.5876914", "text": "func (r *Instance) State() pulumi.StringOutput {\n\treturn (pulumi.StringOutput)(r.s.State[\"state\"])\n}", "title": "" }, { "docid": "2641eade0b61e1b205e3a892b171b06d", "score": "0.5871996", "text": "func (o DiskOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Disk) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "03c1a267e7501169874b361abc9c87fb", "score": "0.5864598", "text": "func (h *Harness) State() State {\n\treturn h.state\n}", "title": "" }, { "docid": "d75729bb003105a47b7f82e313b4167f", "score": "0.5832975", "text": "func (o InfluxDbOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *InfluxDb) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "8e6b7493036689d08fe99fe1df335720", "score": "0.5825073", "text": "func (v *Virtualizer) State() string {\n\treturn v.state\n}", "title": "" }, { "docid": "826be698bf3237814d61f1bcf657c7ed", "score": "0.5819906", "text": "func (pi *Instance) State() int {\n\treturn pi.state\n}", "title": "" }, { "docid": "8a536933462ede8c1c47485a9d0cccf6", "score": "0.58138853", "text": "func (v *VM) State() State {\n\treturn v.state\n}", "title": "" }, { "docid": "06b2182ba3d7065f8abeacf90af9106d", "score": "0.58134466", "text": "func (o AlertsDataTypeOfDataConnectorResponseAlertsOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AlertsDataTypeOfDataConnectorResponseAlerts) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "8b3232a3bb62621cce5fce45cb9ff690", "score": "0.57999086", "text": "func (o AlertsDataTypeOfDataConnectorAlertsOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v AlertsDataTypeOfDataConnectorAlerts) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "85c1c22b58727b3cc8d884c702b2e988", "score": "0.57980925", "text": "func (r *PrinterStateResolver) State() string {\n\treturn r.PrinterState\n}", "title": "" }, { "docid": "a04b99d8f14b94e6395423a929dca901", "score": "0.57971907", "text": "func (r *Prng) State() []byte {\n\treturn r.rng.State()\n}", "title": "" }, { "docid": "2037ec8031f637690061d4d89e742da4", "score": "0.5786346", "text": "func (o AssetResourceStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AssetResourceStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4d14e29c9d3c6ba837f66795e7c39fa2", "score": "0.5775528", "text": "func (v *Virtualizer) State() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "ea0080594868cde40f69884f1c468d6c", "score": "0.57677364", "text": "func (o SelfHostedIntegrationRuntimeStatusResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v SelfHostedIntegrationRuntimeStatusResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "6b613fb4e4c5629dc67e3f479c534eb7", "score": "0.57600623", "text": "func (o ManagedIntegrationRuntimeStatusResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ManagedIntegrationRuntimeStatusResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "dd34fa7899f1165dd32058784ad5c2ea", "score": "0.5755521", "text": "func (c *Counter) State(now time.Time) State {\n\tc.clear(now)\n\n\treturn State{Total: len(c.Map), LastUpdate: c.LastUpdate}\n}", "title": "" }, { "docid": "f539552dd820532833b23fe2bcb2d2b3", "score": "0.5746963", "text": "func (t *Timer) State() int {\n\treturn t.state\n}", "title": "" }, { "docid": "7d0578f86b4554fb0f8cdb782998c8ea", "score": "0.57412905", "text": "func (w *worker) State() ([]string, time.Time, bool) {\n\tw.mtx.Lock()\n\tdefer w.mtx.Unlock()\n\n\tcpy := make([]string, len(w.reply))\n\tcopy(cpy, w.reply)\n\treturn cpy, w.updated, w.enabled\n}", "title": "" }, { "docid": "577dcabfa47c6e40b238e1bb993e3d45", "score": "0.5736602", "text": "func (t *TaskStatus) State() State {\n\treturn t.state\n}", "title": "" }, { "docid": "573827690058f93f07651f60d560782e", "score": "0.57136726", "text": "func (o ManagedIntegrationRuntimeResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ManagedIntegrationRuntimeResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "75664e25432d8522aa7a948a7b8752d8", "score": "0.5711669", "text": "func (o FlexTemplateJobOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *FlexTemplateJob) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "503a9c02d5b38267bbce89f0b3790060", "score": "0.56952864", "text": "func (o InterconnectAttachmentOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *InterconnectAttachment) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "1991fd2fe5aba88ad2b12d1b6ccb5f5a", "score": "0.5694576", "text": "func (cb *circuitBreaker) State() State {\n\tcb.mutex.Lock()\n\tdefer cb.mutex.Unlock()\n\n\tnow := time.Now()\n\tstate, _ := cb.currentState(now)\n\treturn state\n}", "title": "" }, { "docid": "223945f8cf1c93dd374a9b4b69ca1687", "score": "0.569346", "text": "func (g *ICEGatherer) State() ICEGathererState {\n\tg.lock.RLock()\n\tdefer g.lock.RUnlock()\n\treturn g.state\n}", "title": "" }, { "docid": "57e44fbb2ded6648f710535538c3d664", "score": "0.5680784", "text": "func (o DocumentOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Document) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b9941df926e6ddfcb82b937989bd30d4", "score": "0.56740224", "text": "func (s *State) Current() int64 { return atomic.LoadInt64(&s.current) }", "title": "" }, { "docid": "5d7631f3f2b7d0de393cb00c3f4f87e3", "score": "0.56682074", "text": "func (o CSIPowerStoreStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CSIPowerStoreStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "24be833112b95c1c7526882fc95c9cf2", "score": "0.5667406", "text": "func (o JobOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Job) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "3ee223e5b3650298ad5af6d92b06b2f5", "score": "0.56573945", "text": "func (t Traveler) GetCurrent() *aql.QueryResult {\n\tlt := t.State[stateCurrent]\n\treturn &lt\n}", "title": "" }, { "docid": "73818e9763875bcd2a97feead605523c", "score": "0.56418407", "text": "func (o CSIIsilonStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CSIIsilonStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c3facfaf06771928c3a7e617a706b53b", "score": "0.5638895", "text": "func (o MetadataExportResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v MetadataExportResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d81e3d4800767e1168110ee13765b657", "score": "0.5629827", "text": "func (w *taskWorker) State() (WorkerState, time.Time) {\n\tw.stateLock.RLock()\n\tdefer w.stateLock.RUnlock()\n\treturn w.state, w.stateAt\n}", "title": "" }, { "docid": "7f89b91a130e6a70c6f6fae8f430e86b", "score": "0.5620805", "text": "func (cm *ConsensusModule) Report() (term int, isLeader bool) {\n\treturn cm.currentTerm, cm.state == Leader\n}", "title": "" }, { "docid": "8d775d7eac7faf67fd07089fff8543e2", "score": "0.56161916", "text": "func (o LakeMetastoreStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v LakeMetastoreStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0b11a98ad7a76a67ec8d78788b89271e", "score": "0.5606359", "text": "func (s *MemoryStore) Status() (on bool, err error) {\n\ts.mu.Lock()\n\ton = s.on\n\ts.mu.Unlock()\n\treturn\n}", "title": "" }, { "docid": "80584c57c8ccf6886fb2ac6305e71d2b", "score": "0.55899566", "text": "func (o ImportDataFileOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ImportDataFile) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "47acf610fc34b9bb8b641ec352e120e6", "score": "0.5588886", "text": "func (o BqmlTrainingRunResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v BqmlTrainingRunResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "191c119109dda5784da1cf47de4ec8a5", "score": "0.5586368", "text": "func (o ImportJobOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ImportJob) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "cb93d879320fc9aea7db4e8075f19a49", "score": "0.5572421", "text": "func (o ExperimentOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Experiment) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "dcf42dd89d6c212f174f9cbe2150695d", "score": "0.55698067", "text": "func (o CSIPowerMaxStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CSIPowerMaxStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "034b20f49ca5cb9ad8a8752b01a04659", "score": "0.5565854", "text": "func (h HistoryState) Current() string {\n\treturn h.current\n}", "title": "" }, { "docid": "e94d62d1d633ef6f6051faac4f36a526", "score": "0.55638593", "text": "func (v *VM) State() int {\n\tv.lock.Lock()\n\tdefer v.lock.Unlock()\n\treturn v.state\n}", "title": "" }, { "docid": "f887d9e10efe1e8b4d4021f568efaa4b", "score": "0.5552368", "text": "func (s *Simple) CurrentStatus() (Summary, bool) {\n\ts.lock.Lock()\n\tdefer s.lock.Unlock()\n\tif s.summary.Count == 0 {\n\t\treturn Summary{}, false\n\t}\n\treturn s.summary, true\n}", "title": "" }, { "docid": "fdc4993bec549d980ce8ee1c52127224", "score": "0.5536542", "text": "func (o *ClusterUpgrade) State() string {\n\tif o != nil && o.bitmap_&2 != 0 {\n\t\treturn o.state\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "aa206a8e7b35c11e57fe5a3394bd89d7", "score": "0.55325073", "text": "func (o BqmlTrainingRunOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v BqmlTrainingRun) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f3cc7c646afc93e02c2a68ffe703b1a7", "score": "0.5526424", "text": "func (o TaskExecutionStatusLatestJobOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v TaskExecutionStatusLatestJob) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cfadb65fecbfcf2dc867531ca668c479", "score": "0.5521865", "text": "func (o CSIVXFlexOSStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CSIVXFlexOSStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "cc8c9aec94501cb26f36a944426f0ba8", "score": "0.5512057", "text": "func (u *ContainerStatus) State() string {\n\tswitch u.state {\n\tcase SkippedState:\n\t\treturn \"Skipped\"\n\tcase ScannedState:\n\t\treturn \"Scanned\"\n\tcase UpdatedState:\n\t\treturn \"Updated\"\n\tcase FailedState:\n\t\treturn \"Failed\"\n\tcase FreshState:\n\t\treturn \"Fresh\"\n\tcase StaleState:\n\t\treturn \"Stale\"\n\tdefault:\n\t\treturn \"Unknown\"\n\t}\n}", "title": "" }, { "docid": "78a48c5b6b11696ec2798cce3bdfcf51", "score": "0.5511369", "text": "func (o JobStatusResponseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v JobStatusResponse) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b6b06cb23a8305e9145bc3b3cf6639e6", "score": "0.55022043", "text": "func (o AssetSecurityStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AssetSecurityStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f8d45a4db264a1de81eaa1c968bf38c4", "score": "0.5501999", "text": "func (s *AutoRollStateMachine) Current() string {\n\treturn s.s.Current()\n}", "title": "" }, { "docid": "8d83d638a5d01e57451de68419c5a6dc", "score": "0.54835933", "text": "func (o LookupBackupResultOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupBackupResult) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "074a4a860255a2603d4ed04f736cbcfd", "score": "0.54785717", "text": "func (bow *Browser) State() *jar.State {\n\treturn bow.state\n}", "title": "" }, { "docid": "6e08b5d2bc01c42a740996dff1141684", "score": "0.5476246", "text": "func (o ChallengeStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ChallengeStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "4004b90e218995e4e2f3892c36d3e46c", "score": "0.54677", "text": "func (o ComputeEnvironmentOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ComputeEnvironment) pulumi.StringPtrOutput { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c4a2d8f0ecaa054a559362b7b5112671", "score": "0.54637665", "text": "func (o OrderStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v OrderStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "b169e742575fbd8e324165e7573a29da", "score": "0.54600215", "text": "func (td *TaskData) State() int {\n\treturn td.state\n}", "title": "" }, { "docid": "efbc538854b16a54237e951810151804", "score": "0.54540426", "text": "func (f *FSM) Current() string {\n\tf.stateMu.RLock()\n\tdefer f.stateMu.RUnlock()\n\treturn f.current\n}", "title": "" }, { "docid": "2fbdac4b780d8b8a1d8aab7b5d3fd227", "score": "0.5453057", "text": "func CurrentState() State {\r\n\tlock.RLock()\r\n\tret := current\r\n\tlock.RUnlock()\r\n\treturn ret\r\n}", "title": "" }, { "docid": "d38e5231c555a1b67d1a994ff7baa861", "score": "0.5451612", "text": "func (o DatabaseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Database) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "d38e5231c555a1b67d1a994ff7baa861", "score": "0.5451612", "text": "func (o DatabaseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Database) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "2c712bd0ed912197f62c628ed7d8a787", "score": "0.5441474", "text": "func (b *Breaker) State() State {\n\tb.Lock()\n\tstate := b.state\n\tb.Unlock()\n\treturn state\n}", "title": "" }, { "docid": "2456b16179f8c9cd7f788780241aab86", "score": "0.5434346", "text": "func (e *Engine) PrintState() {\n\n\tfor _, a := range e.state {\n\t\tfmt.Println(a)\n\t}\n\tfmt.Println()\n}", "title": "" }, { "docid": "91d2e87c20b095cbc3bbe591dcd10d48", "score": "0.5426675", "text": "func (o KubernetesApplicationResourceStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v KubernetesApplicationResourceStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "f382d17a71ccf8a7787cd90d525b0f14", "score": "0.5426258", "text": "func (reporter *TelemetryReporter) ReportCurrentStatus() {\n\tfmt.Println(\"Reporting\")\n\tnode := reporter.CurrentNode\n\n\tfor _, provider := range reporter.Providers {\n\t\tsamples := provider.Provide()\n\n\t\tfor _, sample := range samples {\n\t\t\tnode.State[sample.Type] = sample.Value\n\t\t}\n\t}\n\n\tjson, _ := json.Marshal(node)\n\tfmt.Println(string(json))\n\n\tbody := bytes.NewBuffer(json)\n\tresponse, _ := http.Post(\"https://edge.dolittle.studio/api/Telemetry\", \"application/json\", body)\n\t//response, _ := http.Post(\"http://localhost:5000/api/Telemetry\", \"application/json\", body)\n\tresult, _ := ioutil.ReadAll(response.Body)\n\n\tfmt.Println(string(result))\n}", "title": "" }, { "docid": "dbd269f7b96979101b3286d21ceb6b2a", "score": "0.54262555", "text": "func (o LookupDlpJobResultOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupDlpJobResult) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "37deec15896d38ea6a96fa642d72949c", "score": "0.5421576", "text": "func (o AssetDiscoveryStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AssetDiscoveryStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "de0a576f49d25ae44d7f93189922fa29", "score": "0.5418901", "text": "func (s *SimpleScheduleResponse) State() ScheduleState {\n\treturn s.state\n}", "title": "" }, { "docid": "16932de2f65a47c86c0ca26e3a1b368e", "score": "0.54184043", "text": "func (n *NatsStreamingOutput) State() ([]byte, error) {\n\treturn nil, nil\n}", "title": "" }, { "docid": "e3d1862dc0994597fcade835932b64bc", "score": "0.54097533", "text": "func (o WorkstationOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Workstation) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "0dc9c3ef5a706693120925b38fa299dc", "score": "0.5398559", "text": "func (o *SnapshotInfoType) State() string {\n\tvar r string\n\tif o.StatePtr == nil {\n\t\treturn r\n\t}\n\tr = *o.StatePtr\n\treturn r\n}", "title": "" }, { "docid": "309279b5ebd97b17bacdcdc695745950", "score": "0.53800905", "text": "func (o ConnectionOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Connection) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "42ab184dcb26bf6fe031c4ee58f3c152", "score": "0.53636724", "text": "func (rr *ResolveRecorder) CurrentStatus() (rs ResolveStatus) {\n\trr.read(func() {\n\t\trs = *rr.status\n\t\trs.Log = make([]DiffResolution, len(rr.status.Log))\n\t\tcopy(rs.Log, rr.status.Log)\n\t\trs.Errs.Causes = make([]ErrorWrapper, len(rr.status.Errs.Causes))\n\t\tcopy(rs.Errs.Causes, rr.status.Errs.Causes)\n\t})\n\treturn\n}", "title": "" }, { "docid": "321de30ddfbdb23eed8f8b667b25dfe4", "score": "0.5359525", "text": "func (o ReservedInstanceOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *ReservedInstance) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "814c4ef99c3698f1bfb1888776e58d98", "score": "0.5357128", "text": "func Current(ctx context.Context) (res *State) {\n\tres, _ = ctx.Value(stateKey).(*State)\n\treturn\n}", "title": "" }, { "docid": "53d367cd6642269c34da92b1a954bc99", "score": "0.53566784", "text": "func (i *serviceInfo) ActualState() string {\n\treturn i.actualState\n}", "title": "" }, { "docid": "6ce81776101850060173eb0038fb9a0f", "score": "0.5351753", "text": "func (c *Chain) State() byte {\n\treturn c.jobChain.State\n}", "title": "" }, { "docid": "c09cf9965a1802f116fc6ebea59963da", "score": "0.5349615", "text": "func (w *wallet) Status() (string, error) {\n w.log.Debug(\"wallet.Status\")\n w.stateLock.RLock() // No device communication, state lock is enough\n defer w.stateLock.RUnlock()\n\n status, failure := w.driver.Status()\n return status, failure\n}", "title": "" }, { "docid": "0ed853bafcddffe2ff0e9c183d1b400c", "score": "0.5349469", "text": "func (c *State) CurrentStatus() Status {\n\tc.RLock()\n\tdefer c.RUnlock()\n\tret := c.current\n\treturn ret\n}", "title": "" }, { "docid": "120e20c6a2e9590c79af157a07e31719", "score": "0.53443074", "text": "func (o CSIPowerMaxStatusPtrOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CSIPowerMaxStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.State\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "70799ace982d4409241098ba10dffa3d", "score": "0.5343466", "text": "func (o ClickhouseOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v *Clickhouse) pulumi.StringOutput { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "5f09e39c2a64f76f3982934a5bb5f6b1", "score": "0.53359973", "text": "func (b *breaker) currentState() State {\n\tnow := time.Now().UnixNano()\n\tif b.isTripped() {\n\t\tif expire := atomic.LoadInt64(&b.openExp); expire > 0 && expire > now {\n\t\t\treturn StateOpen\n\t\t}\n\t\treturn StateHalfOpen\n\t}\n\tif expire := atomic.LoadInt64(&b.closedRefreshExp); expire == 0 || now > expire {\n\t\tb.reset()\n\t}\n\treturn StateClosed\n}", "title": "" }, { "docid": "774f534f66d525bea61b3fe0433abb7a", "score": "0.5334242", "text": "func (ld *LinkData) State() int {\n\treturn ld.state\n}", "title": "" }, { "docid": "3dfa59568be839ffbcabeae9d8c43416", "score": "0.5327966", "text": "func (s *StatusReport) Report() *Report {\n\trep := &Report{\n\t\tTokendVersion: s.Version,\n\t\tServiceVersion: s.ServiceVersion,\n\t\tStartedTS: s.Started.Unix(),\n\t\tTotalDuration: s.Finished.Sub(s.Started).Nanoseconds() / 1000,\n\t\tRPCDuration: s.MintTokenDuration.Nanoseconds() / 1000,\n\t\tUpdateOutcome: string(s.UpdateOutcome),\n\t\tUpdateReason: string(s.UpdateReason),\n\t}\n\tif s.FailureError != nil {\n\t\trep.FailureError = s.FailureError.Error()\n\t}\n\tif s.LastToken != nil {\n\t\trep.TokenLastUpdateTS = s.LastToken.LastUpdate\n\t\trep.TokenNextUpdateTS = s.LastToken.NextUpdate\n\t\trep.TokenExpiryTS = s.LastToken.Expiry\n\t}\n\treturn rep\n}", "title": "" }, { "docid": "2b5504f79c44b2b36d16d59de16957b5", "score": "0.53272074", "text": "func (ac *abstractCommand) State() *stt.State {\n\treturn ac.state\n}", "title": "" }, { "docid": "c9ac4506deaa80429c91d20579c64881", "score": "0.53093046", "text": "func (s *SegCapt) Status() (bool, bool, bool, bool, string){\n\ts.mu_seg.Lock()\n\tdefer s.mu_seg.Unlock()\n\t\n\treturn s.recording,s.stopped,s.lastrecord_pub,s.nextrecord_pub,s.semaforo\n}", "title": "" }, { "docid": "a21c138f49d1d0ee48af1e47e434b095", "score": "0.5308724", "text": "func (o CSIPowerStoreStatusPtrOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CSIPowerStoreStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.State\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "5498afcbdfcf5330c2cbcb71671c2f96", "score": "0.530827", "text": "func (o LookupPatchDeploymentResultOutput) State() pulumi.StringOutput {\n\treturn o.ApplyT(func(v LookupPatchDeploymentResult) string { return v.State }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "4fd678f90c100506dd5a8d92b97773a8", "score": "0.53073704", "text": "func (o CSIIsilonStatusPtrOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CSIIsilonStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.State\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c4545f220c70d1d13eec52586d9b5f0d", "score": "0.53050375", "text": "func (o CSIUnityStatusOutput) State() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CSIUnityStatus) *string { return v.State }).(pulumi.StringPtrOutput)\n}", "title": "" } ]
6fe5f57c689f56c77d6b4f93bb027f8b
Header returns an http.Header that can be modified by the caller to add HTTP headers to the request.
[ { "docid": "53c8038f3cb4e0904ae6c073ea2f185e", "score": "0.0", "text": "func (c *LocationsGetBusinesscallssettingsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" } ]
[ { "docid": "ba692fb9e31cc2b23a87127d4643eaee", "score": "0.727494", "text": "func (c *ChromeosdevicesMoveDevicesToOuCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "3a2df69ab1019b25b813f3c4d727e25c", "score": "0.72557694", "text": "func (c *InstallsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4e1b427a151e2ab56c50d7a6c9317aa0", "score": "0.72523546", "text": "func (rh *RequestHeader) Header() *RequestHeader {\n\treturn rh\n}", "title": "" }, { "docid": "268a967dd665615705fa781835b83bdd", "score": "0.7246219", "text": "func (c *MembersInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "cb5182b1f4a5c9b1b12cd9cd76ebad98", "score": "0.72368705", "text": "func (c *IssuesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "8a127d7f6ce2ff9ab29da9e5009637ab", "score": "0.7228742", "text": "func (c *PropertiesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c91ed63a8e269926a092a639fc61510", "score": "0.72220725", "text": "func (c *PagesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9c9845373f9df3ba54936b7a049db9e6", "score": "0.72170913", "text": "func (c *ManagedconfigurationsforuserUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "99b0713f7c9161bc93712e1a3f3c1a01", "score": "0.7214815", "text": "func (c *InstallsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "dd428410707ec3676e65091dc0bebf2a", "score": "0.7214587", "text": "func (c *ServerPermissionsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "36a9e5c4c80638ced45de331f20f1c55", "score": "0.7213245", "text": "func (c *UsersInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "36a9e5c4c80638ced45de331f20f1c55", "score": "0.7213245", "text": "func (c *UsersInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1751419dfa021c7ba9543dcd03358a37", "score": "0.72115254", "text": "func (c *ProjectsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b39187967cad3d7ecee5f83d33647bc2", "score": "0.72106034", "text": "func (c *ComponentsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1975150f38a12468dc838590561f217e", "score": "0.7207996", "text": "func (c *TablesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "5d99f817cdb14fbcfed723be31107650", "score": "0.7207783", "text": "func (c *MobiledevicesActionCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "fcc58bf9b62576aefc88cbd6af110e57", "score": "0.72000325", "text": "func (c *UnitStateGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1d417af003ee217f6bbcc6b434173c09", "score": "0.7195872", "text": "func (c *ProjectsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "94cc7031f1a24efc3adc95eefd8b27f7", "score": "0.7190942", "text": "func (c *PagesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c558964fa0819db2be9f230d3cb747e", "score": "0.7189663", "text": "func (c *UsersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c558964fa0819db2be9f230d3cb747e", "score": "0.7189663", "text": "func (c *UsersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c558964fa0819db2be9f230d3cb747e", "score": "0.7189663", "text": "func (c *UsersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4c558964fa0819db2be9f230d3cb747e", "score": "0.7189663", "text": "func (c *UsersGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "76fc62cdc82e9f30fa10f795c181ff8a", "score": "0.7178398", "text": "func (c *TablesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0bee476662d689474b9f926e3aff1e97", "score": "0.71777594", "text": "func (c *ProjectsKeysCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "82d236a170934df8b31ad685346d5380", "score": "0.71770597", "text": "func (c *ProjectsSetIamPolicyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9e776ee9957bd16c42dd3fe592fa664e", "score": "0.7167273", "text": "func (c *TimelineUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c4fc81cdabecdd1c8a13e91be0f7aaa8", "score": "0.7166851", "text": "func (r *Request) Header(k, v string) *Request {\n\tr.req.Header.Set(k, v)\n\treturn r\n}", "title": "" }, { "docid": "605c5cb88f70e9eeee4ac0fb26675743", "score": "0.71655846", "text": "func (c *UsersMakeAdminCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "62c2b7575f2f86ca136a401b4380d9f0", "score": "0.71643203", "text": "func (c *UsersUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "62c2b7575f2f86ca136a401b4380d9f0", "score": "0.71643203", "text": "func (c *UsersUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4b5f92a0dfd675b966fd28470b448055", "score": "0.7161924", "text": "func (c *OrgunitsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c9eb09e1675fdd7ad6b7c0dda191327c", "score": "0.715635", "text": "func (c *UnitsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "2a23e60ff29dc9c5c6e7f4f89564333f", "score": "0.715617", "text": "func (r *Response) Header() http.Header { return r.Response.Header.Clone() }", "title": "" }, { "docid": "02c4d4d80515eae0f28c1e36ee4b6a66", "score": "0.7153387", "text": "func (c *RoutinesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "54639b02879473f29f1dcddb9fa40fbd", "score": "0.7153225", "text": "func (c *ProjectsTimeSeriesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1d726dd8bfec83463c2da2e546221f31", "score": "0.71528953", "text": "func (c *TimelineInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "865023ceb075360c52dd595c286ce168", "score": "0.71499515", "text": "func (c *ProjectsAddFirebaseCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a10f632262cc4419aafef9b4c8ed6b71", "score": "0.71496904", "text": "func (c *MembersUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a43d43abe102e341be9441fee270d265", "score": "0.71484464", "text": "func (c *UnitStateListCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f0a27f700a96d3fc97fdb63d277b99bd", "score": "0.71454734", "text": "func (c *OperationsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a5bf17afbd39a40a95f49b40d2aede21", "score": "0.71428734", "text": "func (c *RolesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "5a5fd3a2a381ad0f683ca11bb8f7fad4", "score": "0.7142452", "text": "func (c *ManagedconfigurationsforuserGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "77d1380b4272e7f17041d4fdddbc862f", "score": "0.71408427", "text": "func (c *SeriesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "dd90aeb63289ddb41c18a843c30f958e", "score": "0.71406364", "text": "func (c *PermissionsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "e1cc17682c5a4ccf9865dda6227e05b4", "score": "0.7139567", "text": "func (c *DevicesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0061cd441fef6e29276db6fbb0b3f26f", "score": "0.7138501", "text": "func (c *GroupsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0061cd441fef6e29276db6fbb0b3f26f", "score": "0.7138501", "text": "func (c *GroupsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a846ea8e657c62904c6e5a85cbba1045", "score": "0.7137331", "text": "func (c *DomainsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "56b923c7a6419184a239f22ab3ebce40", "score": "0.7133903", "text": "func (c *DatasetsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "25c2e10ed52bb08892fc0dc7e150c5d8", "score": "0.7131215", "text": "func (c *TasksNewCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "39fdd75a65180c2e93639cf1e7b4bf5d", "score": "0.7131129", "text": "func (c *UnitsSetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "101faf59020673872a747a469c5a30b4", "score": "0.71277064", "text": "func (c *ProjectsInstancesSetIamPolicyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6ddf8b4ee1cfcb2edd604014b2dd5bef", "score": "0.712671", "text": "func (c *OrgunitsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "74c5092749d4a293b57807170d3d49ed", "score": "0.7122359", "text": "func (c *ActivitiesWatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6d028768bd307472a8a6ad1bce1248f2", "score": "0.7122141", "text": "func (c *MyconfigUpdateUserSettingsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "295f348e126a0317cadc9e646bd51836", "score": "0.71179026", "text": "func (c *ProjectsInstancesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "40f620687cad0aa2c84e2486e882bee9", "score": "0.71173835", "text": "func (c *TablesTestIamPermissionsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "045e294faf388e3506e68e5f21819b08", "score": "0.7116594", "text": "func (c *JobsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "dd8bad634d9333db4ec85ac975697971", "score": "0.711606", "text": "func (c *ComponentsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "05c111c9c7f377588adf9f67ae5a3a52", "score": "0.71136725", "text": "func (c *UsersWatchCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "27f650b0043f76b74bb64a5832f3d736", "score": "0.711323", "text": "func (c *MylibraryBookshelvesMoveVolumeCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "18e1ff4ab540d89b99b9828c167d600f", "score": "0.7109802", "text": "func (c *WebappsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "4d615ca41acd94cd1d4b2b9ab6f9553a", "score": "0.71094984", "text": "func (c *AdunitsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d50b9e5c3d0e99da64b3be6b56eca548", "score": "0.7105568", "text": "func (c *GroupsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d50b9e5c3d0e99da64b3be6b56eca548", "score": "0.7105568", "text": "func (c *GroupsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0a7a9636e80474c831cd7b4c5a98efcd", "score": "0.71049875", "text": "func (c *ProjectsTestIamPermissionsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "19648250ea19c1a41ee284ca61336a78", "score": "0.71047705", "text": "func (c *TablesSetIamPolicyCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "dd0c0a5fa4ffac4244eed56e0c9a57ed", "score": "0.710357", "text": "func (c *EntitlementsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0cf5ba1dbbfc7e163df5a02e6ec85d29", "score": "0.7102322", "text": "func (c *SeriesMembershipGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a7a994fba955992b569cd95ce51181c5", "score": "0.7102271", "text": "func (c *EnterprisesCreateEnrollmentTokenCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9cdcc8524e86a3156c5be36a89708cb1", "score": "0.7099788", "text": "func (c *ProjectsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "9cdcc8524e86a3156c5be36a89708cb1", "score": "0.7099788", "text": "func (c *ProjectsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a0f341a11558e4e74aee33b3959f2390", "score": "0.7097446", "text": "func (c *ResourcesBuildingsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7cc63c848b7fcfdfb7efe5085972d97b", "score": "0.7096608", "text": "func (c *ResourcesFeaturesRenameCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "a65b4cc923629432d146c22fab11c6a1", "score": "0.70941097", "text": "func (c *DomainAliasesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b94e1c2a4756d8d35f38e055a7b09d27", "score": "0.70918113", "text": "func (c *ResourcesBuildingsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "95260b68c844cd24cb40fcac26d72277", "score": "0.7089798", "text": "func (c *RoutinesInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "f8793ab81265e653507fc327aec09eba", "score": "0.7087755", "text": "func (c *JobsCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "eaf419f6c01ea54320e098b76068dbbb", "score": "0.70850897", "text": "func (c *TaskRequestCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "87a5929d4e890806febd0cc8c9a53191", "score": "0.70849377", "text": "func (t *Transaction) Header() http.Header {\n\treturn http.Header{}\n}", "title": "" }, { "docid": "5cf546d8eceeae08a99fe82828e3b33d", "score": "0.7082749", "text": "func (c *TablesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "6d12ee050c37bf383e58545b2b21bbe1", "score": "0.70790565", "text": "func (c *ContactsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7e7c9a6f2196142ca90813797bdd9397", "score": "0.7078596", "text": "func (c *ChromeosdevicesUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "1b48622127716833f7ed5b5a75892c7a", "score": "0.7078543", "text": "func (c *ManagedconfigurationsfordeviceUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "86ad748611bad2b7d65854d12386af89", "score": "0.7075719", "text": "func (c *DevicesGetStateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "682133b18f98489db4fa3ed09d69c47a", "score": "0.7073138", "text": "func (c *PropertiesUpdateDataRetentionSettingsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "541c68961e00a27e28a87f5e62e9b502", "score": "0.70730305", "text": "func (c *Request) Header(key, value string) *Request {\n\tif value == \"\" {\n\t\tdelete(c.headers, key)\n\t} else {\n\t\tc.headers[key] = value\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "be87469c771d814bc920f556ea22fb01", "score": "0.7072909", "text": "func (c *DevicesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "d2c93924613cb42d549ccb6e6a152ce8", "score": "0.7071995", "text": "func (c *PagesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "35f5cabbbf5e1ad5712900c8bc42a6e6", "score": "0.70688003", "text": "func (c *ServerTokenCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "0f1bd7a8fc45b58082ffc201565fd256", "score": "0.7068025", "text": "func (c *EntitlementsGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "b12c65cf5a6f822ce5821de45c10d783", "score": "0.7067593", "text": "func (c *WebappsUpdateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "344f0ec11921f1830f4746cae145a3b9", "score": "0.7064011", "text": "func (c *NotesCreateCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "7c0d34aa8def386abd85d15de276bb21", "score": "0.7063267", "text": "func (c *AccountsInsertCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "227afb6f981352ac709a6955df85adb9", "score": "0.7062683", "text": "func (c *TaskResultCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "c63dccdededa947c708b4904319a9714", "score": "0.7062154", "text": "func (c *ServerDetailsCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" }, { "docid": "19191801419e31987ba254228e24f896", "score": "0.706125", "text": "func (c *GrouplicensesGetCall) Header() http.Header {\n\tif c.header_ == nil {\n\t\tc.header_ = make(http.Header)\n\t}\n\treturn c.header_\n}", "title": "" } ]
cc051daf8d0a92a3188836bf7c3a98cc
metricDataToData converts metricData fields to use in tablewriter
[ { "docid": "33d7be47a98cc1e2855533efed7b5520", "score": "0.72028977", "text": "func metricDataToData(metric *metricData) []string {\n\treturn []string{\n\t\tmetric.Namespace,\n\t\tmetric.Name,\n\t\tmetric.Active,\n\t\tmetric.Valid,\n\t\tmetric.Value,\n\t\tmetric.References,\n\t\tmetric.UpdateTime,\n\t}\n}", "title": "" } ]
[ { "docid": "f99885c8369efbfc2a5b3100bf63b59d", "score": "0.6941402", "text": "func (f *influxdb) FormatData(metrics *[]*metric.Metric) *[]*[]byte {\n\tr := make([]*[]byte, 9*len(*metrics))\n\n\tfor i, metric := range *metrics {\n\t\tr[(9 * i)] = metric.Name\n\t\tr[(9*i)+1] = metric.Tags\n\t\tr[(9*i)+2] = metric.Metadata.Tags\n\t\tr[(9*i)+3] = &byteForSpace\n\t\tr[(9*i)+4] = &bytesForValueEquals\n\t\tr[(9*i)+5] = metric.Value\n\t\tr[(9*i)+6] = &byteForSpace\n\t\tbyteTs := []byte(fmt.Sprintf(\"%d\", *metric.Timestamp))\n\t\tr[(9*i)+7] = &byteTs\n\t\tr[(9*i)+8] = &byteForLineReturn\n\t}\n\n\treturn &r\n}", "title": "" }, { "docid": "ab2a22024a6d963f5f040eb09031e864", "score": "0.593405", "text": "func rdtData(rdtMetrics *rdtstore.RdtMetrics) metricValues {\n\treturn metricValues{\n\t\t{\n\t\t\tvalue: rdtMetrics.Value.IPC,\n\t\t\ttimestamp: rdtMetrics.Value.Timestamp,\n\t\t\tlabels: []string{rdtMetrics.Value.Cores, \"ipc\"},\n\t\t},\n\t\t{\n\t\t\tvalue: rdtMetrics.Value.Missees,\n\t\t\ttimestamp: rdtMetrics.Value.Timestamp,\n\t\t\tlabels: []string{rdtMetrics.Value.Cores, \"cache-misses\"},\n\t\t},\n\t\t{\n\t\t\tvalue: rdtMetrics.Value.LLC,\n\t\t\ttimestamp: rdtMetrics.Value.Timestamp,\n\t\t\tlabels: []string{rdtMetrics.Value.Cores, \"llc\"},\n\t\t},\n\t\t{\n\t\t\tvalue: rdtMetrics.Value.MBL,\n\t\t\ttimestamp: rdtMetrics.Value.Timestamp,\n\t\t\tlabels: []string{rdtMetrics.Value.Cores, \"mbl\"},\n\t\t},\n\t\t{\n\t\t\tvalue: rdtMetrics.Value.MBR,\n\t\t\ttimestamp: rdtMetrics.Value.Timestamp,\n\t\t\tlabels: []string{rdtMetrics.Value.Cores, \"mbr\"},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "d14e8c8a63fda253e1a77e9c1f907b21", "score": "0.5834158", "text": "func perfData(perfMetrics *perfstore.PerfMetrics) metricValues {\n\tjobName := getJobName(perfMetrics.Spec.PodName, perfMetrics.Spec.ContainerName)\n\ttaskName := getTaskName(perfMetrics.Spec.PodName, perfMetrics.Spec.ContainerName)\n\t// the data used to find outliers and identify antagonists by cpiManager must be the same with those sent to prometheus\n\tcpi.AddRecord(cpi.CPIRecord{\n\t\tTaskMeta: cpi.TaskMeta{\n\t\t\tJobName: jobName,\n\t\t\tTaskName: taskName,\n\t\t},\n\t\tCPI: perfMetrics.Value.CPI,\n\t\tCPUUsage: perfMetrics.Value.CPUUsage,\n\t\tTimestamp: perfMetrics.Value.Timestamp,\n\t})\n\treturn metricValues{\n\t\t{\n\t\t\tvalue: perfMetrics.Value.Cycles,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"cycles\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.Instructions,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"instructions\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.CPI,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"cpi\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.CPUUsage,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"cpu_usage\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.CacheMisses,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"cache-misses\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.CacheReference,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"cache-reference\", jobName},\n\t\t},\n\t\t{\n\t\t\tvalue: perfMetrics.Value.LLCOccupancy,\n\t\t\ttimestamp: perfMetrics.Value.Timestamp,\n\t\t\tlabels: []string{\"llc-occupancy\", jobName},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "04c1c111c2988c372abf1590ed4fa473", "score": "0.5593371", "text": "func (i *instance) reportSingleMetricsData(respMap map[string]*dto.MetricFamily, metricsName string) {\n\tpointsList := []*tsdb.Point{}\n\tfor _, fieldName := range minioDebugMetricsMap[metricsName] {\n\t\tdata, ok := respMap[fieldName]\n\t\tif !ok {\n\t\t\tlog.Infof(\"Cannot get field %v from minio metrics data\", fieldName)\n\t\t\tcontinue\n\t\t}\n\t\tfor _, metricsData := range data.Metric {\n\t\t\ttags := map[string]string{}\n\t\t\tfields := map[string]interface{}{}\n\t\t\tif len(metricsData.Label) != 0 {\n\t\t\t\ttags[\"label\"] = *metricsData.Label[0].Value\n\t\t\t}\n\t\t\tif data.Type.String() == \"GAUGE\" && metricsData.Gauge != nil {\n\t\t\t\tfields[fieldName] = *metricsData.Gauge.Value\n\t\t\t} else if data.Type.String() == \"COUNTER\" && metricsData.Counter != nil {\n\t\t\t\tfields[fieldName] = *metricsData.Counter.Value\n\t\t\t} else {\n\t\t\t\tlog.Errorf(\"Only support report GAUGE and COUNTER data into tsdb currently\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tpoints := &tsdb.Point{\n\t\t\t\tTags: tags,\n\t\t\t\tFields: fields,\n\t\t\t}\n\t\t\tpointsList = append(pointsList, points)\n\t\t}\n\t}\n\ti.Lock()\n\tif _, ok := i.metricsObjMap[metricsName]; !ok {\n\t\tlog.Errorf(\"Cannot find tsdb obj for metrics %v\", metricsName)\n\t\treturn\n\t}\n\tif err := i.metricsObjMap[metricsName].Points(pointsList, time.Now()); err != nil {\n\t\tlog.Errorf(\"Failed to store/export metrics %v. Err: %v\", metricsName, err)\n\t\treturn\n\t}\n\ti.Unlock()\n\treturn\n}", "title": "" }, { "docid": "6abbd784635298aced381683233420ff", "score": "0.55411845", "text": "func (gf *graphiteFormatter) metric2String(record metricPair) string {\n\tvar nextLines []string\n\tfs := newFields(record.attributes)\n\tname := record.metric.Name()\n\t//exhaustive:enforce\n\tswitch record.metric.Type() {\n\tcase pmetric.MetricTypeGauge:\n\t\tdps := record.metric.Gauge().DataPoints()\n\t\tnextLines = make([]string, 0, dps.Len())\n\t\tfor i := 0; i < dps.Len(); i++ {\n\t\t\tnextLines = append(nextLines, gf.numberRecord(fs, name, dps.At(i)))\n\t\t}\n\tcase pmetric.MetricTypeSum:\n\t\tdps := record.metric.Sum().DataPoints()\n\t\tnextLines = make([]string, 0, dps.Len())\n\t\tfor i := 0; i < dps.Len(); i++ {\n\t\t\tnextLines = append(nextLines, gf.numberRecord(fs, name, dps.At(i)))\n\t\t}\n\t// Skip complex metrics\n\tcase pmetric.MetricTypeHistogram:\n\tcase pmetric.MetricTypeSummary:\n\tcase pmetric.MetricTypeEmpty:\n\tcase pmetric.MetricTypeExponentialHistogram:\n\t}\n\n\treturn strings.Join(nextLines, \"\\n\")\n}", "title": "" }, { "docid": "360ce870014e15ec3f7fadbe47921f5b", "score": "0.55125433", "text": "func fillMetric(kind string, dfm dfMetric, metric *plugin.MetricType) {\n\tswitch kind {\n\tcase \"space_free\":\n\t\tmetric.Data_ = dfm.Available\n\tcase \"space_reserved\":\n\t\tmetric.Data_ = dfm.Blocks - (dfm.Used + dfm.Available)\n\tcase \"space_used\":\n\t\tmetric.Data_ = dfm.Used\n\tcase \"space_percent_free\":\n\t\tmetric.Data_ = ceilPercent(dfm.Available, dfm.Blocks)\n\tcase \"space_percent_reserved\":\n\t\tmetric.Data_ = ceilPercent(dfm.Blocks-(dfm.Used+dfm.Available), dfm.Blocks)\n\tcase \"space_percent_used\":\n\t\tmetric.Data_ = ceilPercent(dfm.Used, dfm.Blocks)\n\tcase \"device_name\":\n\t\tmetric.Data_ = dfm.Filesystem\n\tcase \"device_type\":\n\t\tmetric.Data_ = dfm.FsType\n\tcase \"inodes_free\":\n\t\tmetric.Data_ = dfm.IFree\n\tcase \"inodes_reserved\":\n\t\tmetric.Data_ = dfm.Inodes - (dfm.IUsed + dfm.IFree)\n\tcase \"inodes_used\":\n\t\tmetric.Data_ = dfm.IUsed\n\tcase \"inodes_percent_free\":\n\t\tmetric.Data_ = ceilPercent(dfm.IFree, dfm.Inodes)\n\tcase \"inodes_percent_reserved\":\n\t\tmetric.Data_ = ceilPercent(dfm.Inodes-(dfm.IUsed+dfm.IFree), dfm.Inodes)\n\tcase \"inodes_percent_used\":\n\t\tmetric.Data_ = ceilPercent(dfm.IUsed, dfm.Inodes)\n\t}\n}", "title": "" }, { "docid": "0da30e572087df431f49cfeb0e247afc", "score": "0.54679835", "text": "func exportMetric(stackdriverService *monitoring.Service, metricName string,\n\tmetricValue int64, metricLabels map[string]string, monitoredResource string, resourceLabels map[string]string) error {\n\tdataPoint := &monitoring.Point{\n\t\tInterval: &monitoring.TimeInterval{\n\t\t\tEndTime: time.Now().Format(time.RFC3339),\n\t\t},\n\t\tValue: &monitoring.TypedValue{\n\t\t\tInt64Value: &metricValue,\n\t\t},\n\t}\n\t// Write time series data.\n\trequest := &monitoring.CreateTimeSeriesRequest{\n\t\tTimeSeries: []*monitoring.TimeSeries{\n\t\t\t{\n\t\t\t\tMetric: &monitoring.Metric{\n\t\t\t\t\tType: \"custom.googleapis.com/\" + metricName,\n\t\t\t\t\tLabels: metricLabels,\n\t\t\t\t},\n\t\t\t\tResource: &monitoring.MonitoredResource{\n\t\t\t\t\tType: monitoredResource,\n\t\t\t\t\tLabels: resourceLabels,\n\t\t\t\t},\n\t\t\t\tPoints: []*monitoring.Point{\n\t\t\t\t\tdataPoint,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tprojectName := fmt.Sprintf(\"projects/%s\", resourceLabels[\"project_id\"])\n\t_, err := stackdriverService.Projects.TimeSeries.Create(projectName, request).Do()\n\treturn err\n}", "title": "" }, { "docid": "a12c0bffc03740342a6c8fed2962fe25", "score": "0.5352742", "text": "func (d *Data) writeTo(w io.Writer, when time.Time, options SnapshotExportOptions, metricsWritten map[string]bool) error {\n\tswitch d.Metric.Type {\n\tcase TypeUntyped, TypeGauge, TypeCounter:\n\t\treturn d.writeMetricLine(w, \"\", d.Number, when, options, nil, metricsWritten)\n\tcase TypeHistogram:\n\t\t// Write an empty line before and after histograms to easily distinguish them from\n\t\t// other metric lines.\n\t\tif _, err := io.WriteString(w, \"\\n\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tvar numSamples uint64\n\t\tvar samples Number\n\t\tfor _, bucket := range d.HistogramValue.Buckets {\n\t\t\tnumSamples += bucket.Samples\n\t\t\tsamples.Int = int64(numSamples) // Prometheus distribution bucket counts are cumulative.\n\t\t\tif err := d.writeMetricLine(w, \"_bucket\", &samples, when, options, &bucket.UpperBound, metricsWritten); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t\tif err := d.writeMetricLine(w, \"_sum\", &d.HistogramValue.Total, when, options, nil, metricsWritten); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsamples.Int = int64(numSamples)\n\t\tif err := d.writeMetricLine(w, \"_count\", &samples, when, options, nil, metricsWritten); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := d.writeMetricLine(w, \"_min\", &d.HistogramValue.Min, when, options, nil, metricsWritten); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := d.writeMetricLine(w, \"_max\", &d.HistogramValue.Max, when, options, nil, metricsWritten); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := d.writeMetricLine(w, \"_ssd\", &d.HistogramValue.SumOfSquaredDeviations, when, options, nil, metricsWritten); err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Empty line after the histogram.\n\t\tif _, err := io.WriteString(w, \"\\n\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown metric type for metric %s: %v\", d.Metric.Name, d.Metric.Type)\n\t}\n}", "title": "" }, { "docid": "8f2aa92cd8427feacd480f2128660eaf", "score": "0.5351655", "text": "func UpdateMetric(data map[string]float64) {\n\tlatestMetric.mutext.Lock()\n\tfor k, v := range data {\n\t\tlatestMetric.data[k] = v\n\t}\n\tlatestMetric.mutext.Unlock()\n}", "title": "" }, { "docid": "f9a59c586e3bd054416371a2c3a372d3", "score": "0.5336054", "text": "func convertScriptedMetrics(data map[string]string, prom chan<- prometheus.Metric) {\n\tfor k := range data {\n\t\t// k = \"script.custom_total\"\n\t\tif strings.HasPrefix(k, \"script.\") {\n\t\t\t// metricName = \"custom_total\"\n\t\t\tmetricName := strings.TrimPrefix(k, \"script.\")\n\t\t\tmetricName = strings.ToLower(metricName)\n\t\t\tvar valueType prometheus.ValueType\n\t\t\t// deduce the metrics value type by following https://prometheus.io/docs/practices/naming/\n\t\t\tif strings.HasSuffix(k, \"_total\") || strings.HasSuffix(k, \"_seconds\") || strings.HasSuffix(k, \"_bytes\") {\n\t\t\t\tvalueType = prometheus.CounterValue\n\t\t\t} else {\n\t\t\t\tvalueType = prometheus.GaugeValue\n\t\t\t}\n\t\t\t// create a metric description on the fly\n\t\t\tdescription := prometheus.NewDesc(\"kamailio_\"+metricName, \"Scripted metric \"+metricName, []string{}, nil)\n\t\t\t// and produce a metric\n\t\t\tconvertStatToMetric(data, k, \"\", description, prom, valueType)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0c304de85e2e0f92c5c724f9f8e97b9f", "score": "0.53328377", "text": "func (ms *metricStore) FlushMetricsDataTo(flusher metricsdata.Flusher, flushCtx flushContext) (err error) {\n\tslotRange := ms.slotRange\n\t// field not exist, return\n\tfieldLen := len(ms.fields)\n\tif fieldLen == 0 {\n\t\treturn\n\t}\n\t// flush field meta info\n\tflusher.FlushFieldMetas(ms.fields)\n\t// set current family's slot range\n\tflushCtx.Start, flushCtx.End = slotRange.GetRange()\n\tif err := ms.WalkEntry(func(key uint32, value tStoreINTF) error {\n\t\treturn flushFunc(flusher, flushCtx, key, value)\n\t}); err != nil {\n\t\treturn err\n\t}\n\treturn flusher.FlushMetric(flushCtx.metricID, slotRange.Start, slotRange.End)\n}", "title": "" }, { "docid": "bd4d3346252e0c896cd4a1b5b83f02cc", "score": "0.5325763", "text": "func getDatapointFromMetric(mf *dto.MetricFamily, m *dto.Metric) *DataPoint {\n\tmetricLabels := makeLabels(m)\n\tmetricName := mf.GetName()\n\tvar metricValue interface{}\n\n\tswitch metricName {\n\tcase \"kube_pod_status_phase\":\n\t\tif m.GetGauge().GetValue() == 1 {\n\t\t\tmetricValue = metricLabels[\"phase\"]\n\t\t\tdelete(metricLabels, \"phase\")\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\n\t// Only contribute labels\n\tcase \"kube_pod_labels\", \"kube_pod_info\", \"kube_service_info\", \"kube_pod_container_info\", \"kube_persistentvolumeclaim_info\", \"kube_cronjob_info\", \"kube_node_labels\", \"kube_service_labels\", \"kube_statefulset_labels\":\n\t\tmetricValue = nil\n\n\t// Formatted as Condition Values (kube-state-metrics v0.5 and prior)\n\tcase \"kube_pod_status_ready\", \"kube_pod_status_scheduled\", \"kube_node_status_disk_pressure\", \"kube_node_status_memory_pressure\", \"kube_node_status_out_of_disk\", \"kube_node_status_ready\":\n\t\tif m.GetGauge().GetValue() == 1 {\n\t\t\tmetricValue = metricLabels[\"condition\"]\n\t\t\tdelete(metricLabels, \"condition\")\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\t// kube-state-metrics v1.0 and up\n\tcase \"kube_node_status_condition\":\n\t\tif m.GetGauge().GetValue() == 1 {\n\t\t\tmetricName = fmt.Sprintf(\"kube_node_status_%s\", metricLabels[\"condition\"])\n\t\t\tmetricValue = metricLabels[\"status\"]\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\tcase \"kube_persistentvolumeclaim_status_phase\":\n\t\tif m.GetGauge().GetValue() == 1 {\n\t\t\tmetricValue = metricLabels[\"phase\"]\n\t\t\tdelete(metricLabels, \"phase\")\n\n\t\t}\n\tdefault:\n\t\tmetricValue = m.GetGauge().GetValue()\n\t}\n\n\treturn &DataPoint{\n\t\tName: metricName,\n\t\tValue: metricValue,\n\t\tLabels: metricLabels,\n\t}\n}", "title": "" }, { "docid": "20f8ae3a069953d14fd79c059e773730", "score": "0.53216064", "text": "func (o *Output) convertDatapoint(d *datapoint.Datapoint) *logMetric {\n\tfields := make(map[string]string)\n\n\tfor key, v := range d.Meta {\n\t\tif v != nil {\n\t\t\tfields[toString(key)] = toString(v)\n\t\t}\n\t}\n\tfor key, v := range d.Dimensions {\n\t\tfields[toString(key)] = toString(v)\n\t}\n\n\tfields[\"metric_type\"] = d.MetricType.String()\n\tfields[\"metric_name:\"+d.Metric] = d.Value.String()\n\n\thost := d.Dimensions[\"host\"]\n\tif host == \"\" {\n\t\thost = unknownHost\n\t}\n\treturn &logMetric{\n\t\tTime: computeTime(d.Timestamp),\n\t\tHost: host,\n\t\tSource: o.metricsSource,\n\t\tSourceType: o.metricsSourceType,\n\t\tIndex: o.metricsIndex,\n\t\tEvent: \"metric\",\n\t\tFields: fields,\n\t}\n}", "title": "" }, { "docid": "0d742e2e2f34b36831b36b81c27d26fa", "score": "0.51976156", "text": "func parseMetric(data string) *StatsDMetric {\n\tmetric := new(StatsDMetric)\n\tmetricParts := strings.Split(data, \":\")\n\tif len(metricParts) < 2 {\n\t\tlog.Printf(\"Malformatted metric: %s\", data)\n\t\treturn metric\n\t}\n\tname := metricParts[0]\n\tvalueParts := strings.Split(metricParts[1], \"|\")\n\tvalue64, _ := strconv.ParseInt(valueParts[0], 10, 0)\n\tvalue := float64(value64)\n\t// check for a samplerate\n\ttypeParts := strings.Split(valueParts[1], \"@\")\n\tmetricType := typeParts[0]\n\n\tswitch metricType {\n\tcase \"c\", \"ms\", \"g\":\n\t\tmetric.name = name\n\t\tmetric.value = value\n\t\tmetric.raw = []byte(data)\n\tdefault:\n\t\tlog.Printf(\"Unknown metrics type: %s\", metricType)\n\t}\n\n\treturn metric\n}", "title": "" }, { "docid": "c1f8412e38a1f4d77796f554d59ecb00", "score": "0.5192866", "text": "func JsonMeasurementFormatter(topics, headers []string, data [][]float64) (string, error) {\n\tm := map[string]map[string]float64{}\n\tfor j, topic := range topics {\n\t\tm[topic] = map[string]float64{}\n\t\tfor i, header := range headers {\n\t\t\tm[topic][header] = data[i][j]\n\t\t}\n\t}\n\n\tv, err := json.MarshalIndent(m, \"\", \" \")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(v), nil\n}", "title": "" }, { "docid": "d4c264938e819c5a2d35b41da52a3a33", "score": "0.5178759", "text": "func getFieldsFromMetric(m pdata.Metric) map[string]struct{} {\n\tswitch m.DataType() {\n\tcase pdata.MetricDataTypeGauge:\n\t\tret := make(map[string]struct{})\n\t\tfor i := 0; i < m.Gauge().DataPoints().Len(); i++ {\n\t\t\tdp := m.Gauge().DataPoints().At(i)\n\t\t\tl, ok := dp.Attributes().Get(\"field\")\n\t\t\tif !ok {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tret[l.StringVal()] = struct{}{}\n\t\t}\n\t\treturn ret\n\n\tdefault:\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "5c3e85f105a17e600832d80e5028aa68", "score": "0.51664495", "text": "func (p *Plugin) handlePerformanceData(w io.Writer) {\n\n\t// We require that a one-line summary is set by client code before\n\t// emitting performance data metrics.\n\tif strings.TrimSpace(p.ServiceOutput) == \"\" {\n\t\treturn\n\t}\n\n\t// If the value is available, use it, otherwise this is a NOOP.\n\tp.tryAddDefaultTimeMetric()\n\n\t// If no metrics have been collected by this point we have nothing further\n\t// to do.\n\tif len(p.perfData) == 0 {\n\t\treturn\n\t}\n\n\t// Performance data metrics are appended to plugin output. These\n\t// metrics are provided as a single line, leading with a pipe\n\t// character, a space and one or more metrics each separated from\n\t// another by a single space.\n\tfmt.Fprint(w, \" |\")\n\n\t// Sort performance data values prior to emitting them so that the\n\t// output is consistent across plugin execution.\n\tperfData := p.getSortedPerfData()\n\n\tfor _, pd := range perfData {\n\t\tfmt.Fprint(w, pd.String())\n\t}\n\n\t// Add final trailing newline to satisfy Nagios plugin output format.\n\tfmt.Fprint(w, CheckOutputEOL)\n\n}", "title": "" }, { "docid": "28101cb8b086df5e2f24cb1a7ab0e72a", "score": "0.51621056", "text": "func (c *serializerConsumer) addTelemetryMetric(hostname string) {\n\tc.series = append(c.series, &metrics.Serie{\n\t\tName: \"datadog.agent.otlp.metrics\",\n\t\tPoints: []metrics.Point{{Value: 1, Ts: float64(time.Now().Unix())}},\n\t\tTags: tagset.CompositeTagsFromSlice([]string{}),\n\t\tHost: hostname,\n\t\tMType: metrics.APIGaugeType,\n\t\tSourceTypeName: \"System\",\n\t})\n}", "title": "" }, { "docid": "5eb659f09b76f893f8bd4efbf84a1180", "score": "0.51266193", "text": "func (a *MetricsApiService) PostPagesPageIdMetricsMetricIdData(ctx _context.Context, pageId string, metricId string) ApiPostPagesPageIdMetricsMetricIdDataRequest {\n\treturn ApiPostPagesPageIdMetricsMetricIdDataRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tpageId: pageId,\n\t\tmetricId: metricId,\n\t}\n}", "title": "" }, { "docid": "5a727e73acb30e59b9f675aafa9df5ec", "score": "0.5115665", "text": "func newMetric(name string, ts uint64, value float64, tags []string) datadog.Metric {\n\t// Transform UnixNano timestamp into Unix timestamp\n\t// 1 second = 1e9 ns\n\ttimestamp := float64(ts / 1e9)\n\n\tmetric := datadog.Metric{\n\t\tPoints: []datadog.DataPoint{[2]*float64{&timestamp, &value}},\n\t\tTags: tags,\n\t}\n\tmetric.SetMetric(name)\n\treturn metric\n}", "title": "" }, { "docid": "2e060afcc7be41eeacd87f4853faf68e", "score": "0.5074053", "text": "func convertColumnData(column *Mysqlx_Resultset.ColumnMetaData, data []byte) (dest driver.Value, e error) {\n\n\t// We don't expect data to be nil. Probably a bug?\n\tif data == nil {\n\t\treturn nil, errors.Errorf(\"convertColumnData: data == nil. Unexpected. Returning dest = nil\")\n\t}\n\t// An empty slice implies NULL\n\tif len(data) == 0 {\n\t\treturn nil, nil\n\t}\n\n\t// If we get this far we have non NULL values.\n\tswitch column.GetType() {\n\tcase Mysqlx_Resultset.ColumnMetaData_SINT:\n\t\treturn mysqlSintToInt(data)\n\tcase Mysqlx_Resultset.ColumnMetaData_UINT:\n\t\treturn mysqlUintToUint(data)\n\tcase Mysqlx_Resultset.ColumnMetaData_DOUBLE:\n\t\treturn mysqlDoubleToFloat64(data)\n\tcase Mysqlx_Resultset.ColumnMetaData_BYTES:\n\t\treturn mysqlBytesToBytes(data)\n\tcase Mysqlx_Resultset.ColumnMetaData_FLOAT:\n\t\treturn mysqlFloatToFloat32(data)\n\t// ColumnMetaData_BYTES ColumnMetaData_FieldType = 7\n\t// ColumnMetaData_TIME ColumnMetaData_FieldType = 10\n\t// ColumnMetaData_DATETIME ColumnMetaData_FieldType = 12\n\t// ColumnMetaData_SET ColumnMetaData_FieldType = 15\n\t// ColumnMetaData_ENUM ColumnMetaData_FieldType = 16\n\t// ColumnMetaData_BIT ColumnMetaData_FieldType = 17\n\t// ColumnMetaData_DECIMAL ColumnMetaData_FieldType = 18\n\tdefault:\n\t\treturn noConversion(\"BYTES\", data)\n\t}\n}", "title": "" }, { "docid": "c26a334117c1997fb92e8951806dcf19", "score": "0.5058433", "text": "func addToDoubleMetric(metric pdata.NumberDataPointSlice, labels pdata.AttributeMap, value float64, ts pdata.Timestamp) {\n\tdataPoint := metric.AppendEmpty()\n\tdataPoint.SetTimestamp(ts)\n\tdataPoint.SetDoubleVal(value)\n\tif labels.Len() > 0 {\n\t\tlabels.CopyTo(dataPoint.Attributes())\n\t}\n}", "title": "" }, { "docid": "e4ec551c3ce328d863df8727b4fd9148", "score": "0.5052381", "text": "func (p *mtrUiPage) updateDataMetric(result *mtrpb.DataLatencySummary) {\n\tfor i, r := range p.Panels {\n\t\tif r.ID == result.TypeID {\n\t\t\tr.devices[result.SiteID] = true\n\t\t\tincDataCount(r.Values, result)\n\t\t\tp.Panels[i] = r\n\t\t\treturn\n\t\t}\n\t}\n\n\tc := make(map[string]idCount)\n\tincDataCount(c, result)\n\n\td := make(map[string]bool)\n\td[result.SiteID] = true\n\n\tl := p.appendPageParam(p.Path + \"?typeID=\" + result.TypeID)\n\tp.Panels = append(p.Panels, panel{ID: result.TypeID, Title: removeTypeIDPrefix(result.TypeID), StatusLink: l, Values: c, devices: d})\n}", "title": "" }, { "docid": "ed3f85a56e412f09c2e4f3459056e282", "score": "0.5043448", "text": "func (d *Data) writeMetricPreambleTo(w io.Writer, options SnapshotExportOptions, metricsWritten map[string]bool) error {\n\t// Metric header, if we haven't printed it yet.\n\tif !metricsWritten[d.Metric.Name] {\n\t\t// Extra newline before each preamble for aesthetic reasons.\n\t\tif _, err := io.WriteString(w, \"\\n\"); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := d.Metric.writeHeaderTo(w, options); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmetricsWritten[d.Metric.Name] = true\n\t}\n\n\t// Metric name.\n\tif options.ExporterPrefix != \"\" {\n\t\tif _, err := io.WriteString(w, options.ExporterPrefix); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif _, err := io.WriteString(w, d.Metric.Name); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9bdbb6966d93bcaa597cf43afbf5c6aa", "score": "0.503769", "text": "func marshalData(targetUrl string, monitorDictionary map[string][]Sample) string {\n\tstatistics := Statistics{Url: targetUrl, Dictionery: monitorDictionary}\n\tdata, err := json.Marshal(statistics)\n\tif err != nil {\n\t\tlog.Errorf(\"Not able to marshall the data\")\n\t\treturn \"Not able to marshall the data\"\n\t} else {\n\t\treturn string(data)\n\t}\n}", "title": "" }, { "docid": "b6ae11a1e9644ecc1e025e98227ac5b9", "score": "0.50256443", "text": "func addToIntMetric(metric pdata.NumberDataPointSlice, labels pdata.AttributeMap, value int64, ts pdata.Timestamp) {\n\tdataPoint := metric.AppendEmpty()\n\tdataPoint.SetTimestamp(ts)\n\tdataPoint.SetIntVal(value)\n\tif labels.Len() > 0 {\n\t\tlabels.CopyTo(dataPoint.Attributes())\n\t}\n}", "title": "" }, { "docid": "b9d4f03dda21219d88d0ef09b04477c4", "score": "0.4965815", "text": "func TableToData(table *simpletable.Table) [][]string {\n\n\tdata := make([][]string, len(table.Header.Cells)+len(table.Body.Cells)+len(table.Footer.Cells))\n\n\tdata[0] = make([]string, len(table.Header.Cells))\n\tfor index, element := range table.Header.Cells {\n\t\tdata[0][index] = element.Text\n\t}\n\n\tfor rowIndex := range table.Body.Cells {\n\t\tdata[rowIndex+1] = make([]string, len(table.Body.Cells))\n\t\tfor columnIndex := range table.Body.Cells[rowIndex] {\n\t\t\tdata[rowIndex+1][columnIndex] = table.Body.Cells[rowIndex][columnIndex].Text\n\t\t}\n\t}\n\treturn data\n}", "title": "" }, { "docid": "c7c9765d7a6ccaad4cd9839b1ae5b943", "score": "0.49588725", "text": "func (doc *Document) tableToData(eh *eventhandler.EventHandler) {\n\n\thcol := false\n\throw := false\n\n\tnrows := 0\n\tncols := 0\n\n\t// What type of table is it\n\tfor i := doc.ix; i < doc.stream.Len(); i++ {\n\t\ts, n := doc.stream.Item(i)\n\t\tif n < 1 {\n\t\t\tbreak\n\t\t}\n\t\tif s == \"!hrow\" {\n\t\t\throw = true\n\t\t} else if s == \"!hcol\" {\n\t\t\thcol = true\n\t\t}\n\t\tif s == \"!tr\" {\n\t\t\tnrows++\n\t\t}\n\t}\n\n\tif !hcol && !hrow {\n\t\treturn\n\t}\n\n\ttable := [][]string{}\n\n\t// Go through the rows. If hrow is true, first row is header\n\trow := 0\n\tfor {\n\t\ttext, n := doc.stream.Item(doc.ix)\n\t\tif n < 1 {\n\t\t\tbreak\n\t\t}\n\t\tdoc.ix++\n\n\t\t// Each tr has rows at level 2\n\t\tif text != \"!tr\" {\n\t\t\tcontinue\n\t\t}\n\n\t\ttable = append(table, []string{})\n\n\t\tcol := 0\n\t\tfor {\n\t\t\ttext, n = doc.stream.Item(doc.ix)\n\t\t\tif n < 2 {\n\t\t\t\tbreak\n\t\t\t}\n\n\t\t\tif ((hrow && row == 0) || (hcol && col == 0)) && n == 2 {\n\t\t\t\tdoc.ix++\n\t\t\t\ttext, n = doc.stream.Item(doc.ix)\n\t\t\t} else if n == 3 {\n\t\t\t\tdoc.ix++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\ttable[row] = append(table[row], text)\n\t\t\tcol++\n\t\t\tdoc.ix++\n\t\t}\n\t\tif row == 0 {\n\t\t\tncols = col\n\t\t}\n\t\trow++\n\t}\n\n\tif hrow && !hcol {\n\t\t// Header is the first row, and makes up the keys\n\t\tfor i := 0; i < ncols; i++ {\n\t\t\teh.Add(table[0][i])\n\t\t\teh.Inc()\n\t\t\tfor j := 1; j < nrows; j++ {\n\t\t\t\teh.Add(table[j][i])\n\t\t\t}\n\t\t\teh.Dec()\n\t\t}\n\t} else if !hrow && hcol {\n\t\t// Header is the first columns, and makes up the keys\n\t\tfor i := 0; i < nrows; i++ {\n\t\t\teh.Add(table[i][0])\n\t\t\teh.Inc()\n\t\t\tfor j := 1; j < ncols; j++ {\n\t\t\t\teh.Add(table[i][j])\n\t\t\t}\n\t\t\teh.Dec()\n\t\t}\n\t} else {\n\t\t// Keys are in first row and first column\n\t\t// row 0, col 0 is main key\n\t\teh.Add(table[0][0])\n\t\teh.Inc()\n\n\t\tfor i := 1; i < nrows; i++ {\n\t\t\teh.Add(table[i][0])\n\t\t\teh.Inc()\n\t\t\tfor j := 1; j < ncols; j++ {\n\t\t\t\teh.Add(table[0][j])\n\t\t\t\teh.Inc()\n\t\t\t\teh.Add(table[i][j])\n\t\t\t\teh.Dec()\n\t\t\t}\n\t\t\teh.Dec()\n\t\t}\n\n\t\teh.Dec()\n\t}\n}", "title": "" }, { "docid": "4a635d824adde15750c9c48f52bc981e", "score": "0.4947139", "text": "func model2csv(m *pgmetrics.Model, w *csv.Writer) (err error) {\n\tdefer func() {\n\t\t// return panic(error) as our error value\n\t\tif r := recover(); r != nil {\n\t\t\tif e, ok := r.(error); ok {\n\t\t\t\terr = e\n\t\t\t}\n\t\t}\n\t}()\n\n\t// meta data\n\tstruct2csv(\"pgmetrics.meta.\", m.Metadata, w)\n\n\t// top-level fields\n\tstruct2csv(\"pgmetrics.\", *m, w)\n\n\t// wal archiving\n\tstruct2csv(\"pgmetrics.wal_archiving.\", m.WALArchiving, w)\n\n\t// replication out\n\trec2csv(\"pgmetrics.repl_out.count\", strconv.Itoa(len(m.ReplicationOutgoing)), w)\n\tfor i, rout := range m.ReplicationOutgoing {\n\t\thead := fmt.Sprintf(\"pgmetrics.repl_out.%d.\", i)\n\t\tstruct2csv(head, rout, w)\n\t}\n\n\t// replication in\n\tif m.ReplicationIncoming != nil {\n\t\tstruct2csv(\"pgmetrics.repl_in.\", *m.ReplicationIncoming, w)\n\t}\n\n\t// replication slots\n\trec2csv(\"pgmetrics.repl_slot.count\", strconv.Itoa(len(m.ReplicationSlots)), w)\n\tfor _, rs := range m.ReplicationSlots {\n\t\thead := fmt.Sprintf(\"pgmetrics.repl_slot.%s.\", rs.SlotName)\n\t\tstruct2csv(head, rs, w)\n\t}\n\n\t// bgwriter\n\tstruct2csv(\"pgmetrics.bg_writer.\", m.BGWriter, w)\n\n\t// backends\n\trec2csv(\"pgmetrics.backends.count\", strconv.Itoa(len(m.Backends)), w)\n\tfor i, be := range m.Backends {\n\t\thead := fmt.Sprintf(\"pgmetrics.backends.%d.\", i)\n\t\tstruct2csv(head, be, w)\n\t}\n\n\t// vacuum progress\n\trec2csv(\"pgmetrics.vacuum.count\", strconv.Itoa(len(m.VacuumProgress)), w)\n\tfor i, vp := range m.VacuumProgress {\n\t\thead := fmt.Sprintf(\"pgmetrics.vacuum.%d.\", i)\n\t\tstruct2csv(head, vp, w)\n\t}\n\n\t// databases\n\trec2csv(\"pgmetrics.databases.count\", strconv.Itoa(len(m.Databases)), w)\n\tfor _, db := range m.Databases {\n\t\thead := fmt.Sprintf(\"pgmetrics.databases.%s.\", db.Name)\n\t\tstruct2csv(head, db, w)\n\t}\n\n\t// tablespaces\n\trec2csv(\"pgmetrics.tablespaces.count\", strconv.Itoa(len(m.Tablespaces)), w)\n\tfor _, ts := range m.Tablespaces {\n\t\thead := fmt.Sprintf(\"pgmetrics.tablespaces.%s.\", ts.Name)\n\t\tstruct2csv(head, ts, w)\n\t}\n\n\t// tables\n\trec2csv(\"pgmetrics.tables.count\", strconv.Itoa(len(m.Tables)), w)\n\tfor _, t := range m.Tables {\n\t\thead := fmt.Sprintf(\"pgmetrics.tables.%s.%s.%s.\", t.DBName, t.SchemaName, t.Name)\n\t\tstruct2csv(head, t, w)\n\t}\n\n\t// indexes\n\trec2csv(\"pgmetrics.indexes.count\", strconv.Itoa(len(m.Indexes)), w)\n\tfor _, idx := range m.Indexes {\n\t\thead := fmt.Sprintf(\"pgmetrics.indexes.%s.%s.%s.\", idx.DBName, idx.SchemaName, idx.Name)\n\t\tstruct2csv(head, idx, w)\n\t}\n\n\t// locks\n\trec2csv(\"pgmetrics.locks.count\", strconv.Itoa(len(m.Locks)), w)\n\tfor i, l := range m.Locks {\n\t\thead := fmt.Sprintf(\"pgmetrics.locks.%d.\", i)\n\t\tstruct2csv(head, l, w)\n\t}\n\n\t// system metrics\n\tif m.System != nil {\n\t\tstruct2csv(\"pgmetrics.system.\", *(m.System), w)\n\t}\n\n\t// note: sequences, user functions, extensions, disabled triggers, statements,\n\t// roles, blocking pids, publications, subscriptions and settings are not\n\t// written to the csv as of now inorder to keep csv size small.\n\treturn\n}", "title": "" }, { "docid": "f8f3d67fb0379326f7ba01e4df6f9a5a", "score": "0.49446273", "text": "func (fctx *forwardContext) getMetricsData(ctx context.Context, query []*Query) error {\n\tsvc := fctx.forwarder.cloudwatch()\n\tmetricQuery, defaults, err := ToMetricDataQuery(query)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpaginator := cloudwatch.NewGetMetricDataPaginator(svc, &cloudwatch.GetMetricDataInput{\n\t\tStartTime: aws.Time(fctx.start),\n\t\tEndTime: aws.Time(fctx.end),\n\t\tMetricDataQueries: metricQuery,\n\t})\n\tseen := make(map[string]struct{}, len(query))\n\tfor paginator.HasMorePages() {\n\t\tpage, err := paginator.NextPage(ctx)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tfor _, result := range page.MetricDataResults {\n\t\t\trawLabel := aws.ToString(result.Label)\n\t\t\tif len(result.Values) > 0 {\n\t\t\t\tseen[rawLabel] = struct{}{}\n\t\t\t}\n\t\t\tlabel, err := ParseLabel(rawLabel)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor i := range result.Timestamps {\n\t\t\t\tt := result.Timestamps[i]\n\t\t\t\tv := result.Values[i]\n\t\t\t\tif label.Service != \"\" {\n\t\t\t\t\tfctx.serviceMetrics.Append(label.Service, ServiceMetricValue{\n\t\t\t\t\t\tName: label.MetricName,\n\t\t\t\t\t\tTime: t.Unix(),\n\t\t\t\t\t\tValue: v,\n\t\t\t\t\t})\n\t\t\t\t} else if label.HostID != \"\" {\n\t\t\t\t\tfctx.hostMetrics.Append(HostMetricValue{\n\t\t\t\t\t\tHostID: label.HostID,\n\t\t\t\t\t\tName: label.MetricName,\n\t\t\t\t\t\tTime: t.Unix(),\n\t\t\t\t\t\tValue: v,\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\tfor l, v := range defaults {\n\t\tif _, ok := seen[l]; ok {\n\t\t\tcontinue\n\t\t}\n\t\tlabel, err := ParseLabel(l)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif label.Service != \"\" {\n\t\t\tfctx.serviceMetrics.Append(label.Service, ServiceMetricValue{\n\t\t\t\tName: label.MetricName,\n\t\t\t\tTime: fctx.start.Unix(),\n\t\t\t\tValue: v,\n\t\t\t})\n\t\t} else if label.HostID != \"\" {\n\t\t\tfctx.hostMetrics.Append(HostMetricValue{\n\t\t\t\tHostID: label.HostID,\n\t\t\t\tName: label.MetricName,\n\t\t\t\tTime: fctx.start.Unix(),\n\t\t\t\tValue: v,\n\t\t\t})\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c0f6f3c77050d82879a69fcb0bb7cd83", "score": "0.49285042", "text": "func mapMetric(metric string) string {\n\tm, ok := mappingMetrics[metric]\n\tif !ok {\n\t\treturn strings.TrimSpace(metric)\n\t}\n\n\treturn strings.TrimSpace(m)\n}", "title": "" }, { "docid": "8d2e949d35c8cbd06964e3c0963354fa", "score": "0.49028814", "text": "func (e *Exporter) processMetrics(data []*Datum, ch chan<- prometheus.Metric) error {\n\n\t// APIMetrics - range through the data slice\n\tfor _, d := range data {\n\t\tfor _, i := range d.Items {\n\t\t\tif _, ok := e.APIMetrics[i.Name]; !ok {\n\t\t\t\tlogrus.Errorf(\"Ignoring metric '%s' as it was not in my list of supported metrics\", i.Name)\n\t\t\t}\n\t\t\tch <- prometheus.MustNewConstMetric(e.APIMetrics[i.Name], prometheus.GaugeValue, float64(i.Usage), d.SpaceID, d.EnvironmentID)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4931b62a87c2984272478e3be1d0747b", "score": "0.49017826", "text": "func trValueMetric(cfEv *events.Envelope, hnyEv *libhoney.Event) {\n\t// example:\n\t// name:\"total_tcp_routes\" value:0 unit:\"gauge\"\n\tvm := cfEv.ValueMetric\n\tprefix := \"valuem\"\n\tif vm.Name != nil {\n\t\thnyEv.AddField(prefix+\"Name\", vm.GetName())\n\t}\n\tif vm.Value != nil {\n\t\thnyEv.AddField(prefix+\"Value\", vm.GetValue())\n\t}\n\tif vm.Unit != nil {\n\t\thnyEv.AddField(prefix+\"Unit\", vm.GetUnit())\n\t}\n}", "title": "" }, { "docid": "8a7a8ef176bc768d60bd10cfd33fba51", "score": "0.48932865", "text": "func (sink *monascaSink) ExportData(dataBatch *core.DataBatch) {\n\tsink.Lock()\n\tdefer sink.Unlock()\n\n\tmetrics := sink.processMetrics(dataBatch)\n\tcode, response, err := sink.client.SendRequest(\"POST\", \"/metrics\", metrics)\n\tif err != nil {\n\t\tglog.Errorf(\"%s\", err)\n\t\tsink.numberOfFailures++\n\t\treturn\n\t}\n\tif code != http.StatusNoContent {\n\t\tglog.Error(response)\n\t\tsink.numberOfFailures++\n\t}\n}", "title": "" }, { "docid": "4786ab9039c6e7ccc2ebeff973361f59", "score": "0.48917246", "text": "func (m *EventMetrics) updateMetric(ev []*Event, mx *metric) error {\n\tv, err := mx.agg(ev)\n\tif err != nil {\n\t\treturn err\n\t}\n\tmetrics2.GetFloat64Metric(mx.measurement, mx.tags).Update(v)\n\treturn nil\n}", "title": "" }, { "docid": "5fe16fc0c50a1b6e250812e52f00006a", "score": "0.4891058", "text": "func populateCustomMetrics(instanceEntity *integration.Entity, connection *connection.SQLConnection, query customQuery) {\n\tvar prefix string\n\tif len(query.Database) > 0 {\n\t\tprefix = \"USE \" + query.Database + \"; \"\n\t}\n\n\tlog.Debug(\"Running custom query: %+v\", query)\n\n\trows, err := connection.Queryx(prefix + query.Query)\n\tif err != nil {\n\t\tlog.Error(\"Could not execute custom query: %s\", err)\n\t\treturn\n\t}\n\n\tdefer func() {\n\t\t_ = rows.Close()\n\t}()\n\n\tvar rowCount = 0\n\tfor rows.Next() {\n\t\trowCount++\n\t\trow := make(map[string]interface{})\n\t\terr := rows.MapScan(row)\n\t\tif err != nil {\n\t\t\tlog.Error(\"Failed to scan custom query row: %s\", err)\n\t\t\treturn\n\t\t}\n\n\t\tnameInterface, ok := row[\"metric_name\"]\n\t\tvar name string\n\t\tif !ok {\n\t\t\tif len(query.Name) > 0 {\n\t\t\t\tname = query.Name\n\t\t\t}\n\t\t} else {\n\t\t\tname, ok = nameInterface.(string)\n\t\t\tif !ok {\n\t\t\t\tlog.Error(\"Non-string type %T for custom query 'metric_name' column\", nameInterface)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tvalue, ok := row[\"metric_value\"]\n\t\tvar valueString string\n\t\tif !ok {\n\t\t\tif len(name) > 0 {\n\t\t\t\tlog.Error(\"Missing 'metric_value' for %s in custom query\", name)\n\t\t\t\treturn\n\t\t\t}\n\t\t} else {\n\t\t\tvalueString = fmt.Sprintf(\"%v\", value)\n\t\t\tif len(name) == 0 {\n\t\t\t\tlog.Error(\"Missing 'metric_name' for %s in custom query\", valueString)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tif len(query.Prefix) > 0 {\n\t\t\tname = query.Prefix + name\n\t\t}\n\n\t\tvar metricType metric.SourceType\n\t\tmetricTypeInterface, ok := row[\"metric_type\"]\n\t\tif !ok {\n\t\t\tif len(query.Type) > 0 {\n\t\t\t\tmetricType, err = metric.SourceTypeForName(query.Type)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Error(\"Invalid metric type %s in YAML: %s\", query.Type, err)\n\t\t\t\t\treturn\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tmetricType = detectMetricType(valueString)\n\t\t\t}\n\t\t} else {\n\t\t\t// metric type was specified\n\t\t\tmetricTypeString, ok := metricTypeInterface.(string)\n\t\t\tif !ok {\n\t\t\t\tlog.Error(\"Non-string type %T for custom query 'metric_type' column\", metricTypeInterface)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tmetricType, err = metric.SourceTypeForName(metricTypeString)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"Invalid metric type %s in query 'metric_type' column: %s\", metricTypeString, err)\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\n\t\tattributes := []attribute.Attribute{\n\t\t\t{Key: \"displayName\", Value: instanceEntity.Metadata.Name},\n\t\t\t{Key: \"entityName\", Value: instanceEntity.Metadata.Namespace + \":\" + instanceEntity.Metadata.Name},\n\t\t\t{Key: \"host\", Value: connection.Host},\n\t\t\t{Key: \"instance\", Value: instanceEntity.Metadata.Name},\n\t\t}\n\t\tif len(query.Database) > 0 {\n\t\t\tattributes = append(attributes, attribute.Attribute{Key: \"database\", Value: query.Database})\n\t\t}\n\t\tms := instanceEntity.NewMetricSet(\"MssqlCustomQuerySample\", attributes...)\n\n\t\tfor k, v := range row {\n\t\t\tif k == \"metric_name\" || k == \"metric_type\" || k == \"metric_value\" {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tvString := fmt.Sprintf(\"%v\", v)\n\n\t\t\tif len(query.Prefix) > 0 {\n\t\t\t\tk = query.Prefix + k\n\t\t\t}\n\n\t\t\terr = ms.SetMetric(k, vString, detectMetricType(vString))\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"Failed to set metric: %s\", err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\n\t\tif len(valueString) > 0 {\n\t\t\terr = ms.SetMetric(name, valueString, metricType)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"Failed to set metric: %s\", err)\n\t\t\t}\n\t\t}\n\t}\n\tif rowCount == 0 {\n\t\tlog.Warn(\"No result set found for custom query: %+v\", query)\n\t} else {\n\t\tlog.Debug(\"%v Rows returned for custom query: %+v\", rowCount, query)\n\t}\n\n\tif err := rows.Err(); err != nil {\n\t\tlog.Error(\"Error iterating rows: %s\", err)\n\t}\n}", "title": "" }, { "docid": "f13356891216ad3a8acda127fa8bcc99", "score": "0.48696736", "text": "func samplePairToMetric(chart string, metric promModels.Metric, sp promModels.SamplePair) *graphx.Metric {\n\tName := string(metric[NameTag])\n\tm := &graphx.Metric{\n\t\tChart: chart,\n\t\tName: Name,\n\t\tTimeStamp: sp.Timestamp.Unix(),\n\t\tValue: sp.Value.String(),\n\t}\n\treturn m\n}", "title": "" }, { "docid": "3b645f3b6dfdafba5833a965ec2e91bd", "score": "0.48266512", "text": "func makemetric(\n\tmeasurement string,\n\tfields map[string]interface{},\n\ttags map[string]string,\n\tnameOverride string,\n\tnamePrefix string,\n\tnameSuffix string,\n\tpluginTags map[string]string,\n\tdaemonTags map[string]string,\n\tfilter Filter,\n\tapplyFilter bool,\n\tmType telegraf.ValueType,\n\tt time.Time,\n) telegraf.Metric {\n\tif len(fields) == 0 || len(measurement) == 0 {\n\t\treturn nil\n\t}\n\tif tags == nil {\n\t\ttags = make(map[string]string)\n\t}\n\n\t// Override measurement name if set\n\tif len(nameOverride) != 0 {\n\t\tmeasurement = nameOverride\n\t}\n\t// Apply measurement prefix and suffix if set\n\tif len(namePrefix) != 0 {\n\t\tmeasurement = namePrefix + measurement\n\t}\n\tif len(nameSuffix) != 0 {\n\t\tmeasurement = measurement + nameSuffix\n\t}\n\n\t// Apply plugin-wide tags if set\n\tfor k, v := range pluginTags {\n\t\tif _, ok := tags[k]; !ok {\n\t\t\ttags[k] = v\n\t\t}\n\t}\n\t// Apply daemon-wide tags if set\n\tfor k, v := range daemonTags {\n\t\tif _, ok := tags[k]; !ok {\n\t\t\ttags[k] = v\n\t\t}\n\t}\n\n\t// Apply the metric filter(s)\n\t// for aggregators, the filter does not get applied when the metric is made.\n\t// instead, the filter is applied to metric incoming into the plugin.\n\t// ie, it gets applied in the RunningAggregator.Apply function.\n\tif applyFilter {\n\t\tif ok := filter.Apply(measurement, fields, tags); !ok {\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tm, err := metric.New(measurement, tags, fields, t, mType)\n\tif err != nil {\n\t\tlog.Printf(\"Error adding point [%s]: %s\\n\", measurement, err.Error())\n\t\treturn nil\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "41e0fb6a9c45880e2c5ca587a1188841", "score": "0.4800545", "text": "func (w *Watcher) distributeDataToHandler(data *action.SyncData) {\n\thandlerKey := w.writer.GetHandlerKeyBySyncData(data)\n\tif handlerKey == \"\" {\n\t\tglog.Errorf(\"get handler key failed, resource: %s, namespace: %s, name: %s\", data.Kind, data.Namespace, data.Name)\n\t\treturn\n\t}\n\n\tif handler, ok := w.writer.Handlers[handlerKey]; ok {\n\t\thandler.HandleWithTimeout(data, defaultQueueTimeout)\n\t} else {\n\t\tglog.Errorf(\"can't distribute the normal metadata, unknown DataType[%+v]\", data.Kind)\n\t}\n}", "title": "" }, { "docid": "8225ad76372f68f19901a5bfc1dd2cef", "score": "0.4784575", "text": "func (ts *timeSeries) addMetric(name, stags, metricType string, value float64, interval time.Duration) {\n\thostname, tags := types.ExtractSourceFromTags(stags)\n\tif hostname == \"\" {\n\t\thostname = ts.Hostname\n\t}\n\tts.Series = append(ts.Series, metric{\n\t\tHost: hostname,\n\t\tInterval: interval.Seconds(),\n\t\tMetric: name,\n\t\tPoints: [1]point{{float64(ts.Timestamp), value}},\n\t\tTags: tags.Normalise(),\n\t\tType: metricType,\n\t})\n}", "title": "" }, { "docid": "d3dabb8334c97d37b5e89c306c027702", "score": "0.47506315", "text": "func ChartData() (map[string]interface{}, error) {\n\t// set thresholds for today and the RANGE-1 days preceding\n\ttimes := [RANGE]time.Time{}\n\tdates := [RANGE]string{}\n\tnow := time.Now()\n\ttoday := time.Date(now.Year(), now.Month(), now.Day(), 0, 0, 0, 0, time.UTC)\n\n\tips := [RANGE]map[string]struct{}{}\n\tfor i := range ips {\n\t\tips[i] = make(map[string]struct{})\n\t}\n\n\ttotal := [RANGE]int{}\n\tunique := [RANGE]int{}\n\n\tfor i := range times {\n\t\t// subtract 24 * i hours to make days prior\n\t\tdur := time.Duration(24 * i * -1)\n\t\tday := today.Add(time.Hour * dur)\n\n\t\t// day threshold is [...n-1-i, n-1, n]\n\t\ttimes[len(times)-1-i] = day\n\t\tdates[len(times)-1-i] = day.Format(\"01/02\")\n\t}\n\n\t// get api request analytics and metrics from db\n\tvar requests = []apiRequest{}\n\tcurrentMetrics := make(map[string]apiMetric)\n\n\terr := store.Update(func(tx *bolt.Tx) error {\n\t\tm := tx.Bucket([]byte(\"__metrics\"))\n\t\tb := tx.Bucket([]byte(\"__requests\"))\n\n\t\terr := m.ForEach(func(k, v []byte) error {\n\t\t\tvar metric apiMetric\n\t\t\terr := json.Unmarshal(v, &metric)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(\"Error decoding api metric json from analytics db:\", err)\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// add metric to currentMetrics map\n\t\t\tcurrentMetrics[metric.Date] = metric\n\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\terr = b.ForEach(func(k, v []byte) error {\n\t\t\tvar r apiRequest\n\t\t\terr := json.Unmarshal(v, &r)\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(\"Error decoding api request json from analytics db:\", err)\n\t\t\t\treturn nil\n\t\t\t}\n\n\t\t\t// append request to requests for analysis if its timestamp is today\n\t\t\t// or if its day is not already in cache, otherwise delete it\n\t\t\td := time.Unix(r.Timestamp/1000, 0)\n\t\t\t_, inCache := currentMetrics[d.Format(\"01/02\")]\n\t\t\tif !d.Before(today) || !inCache {\n\t\t\t\trequests = append(requests, r)\n\t\t\t} else {\n\t\t\t\terr := b.Delete(k)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn nil\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\nCHECK_REQUEST:\n\tfor i := range requests {\n\t\tts := time.Unix(requests[i].Timestamp/1000, 0)\n\n\t\tfor j := range times {\n\t\t\t// if on today, there will be no next iteration to set values for\n\t\t\t// day prior so all valid requests belong to today\n\t\t\tif j == len(times)-1 {\n\t\t\t\tif ts.After(times[j]) || ts.Equal(times[j]) {\n\t\t\t\t\t// do all record keeping\n\t\t\t\t\ttotal[j]++\n\n\t\t\t\t\tif _, ok := ips[j][requests[i].RemoteAddr]; !ok {\n\t\t\t\t\t\tunique[j]++\n\t\t\t\t\t\tips[j][requests[i].RemoteAddr] = struct{}{}\n\t\t\t\t\t}\n\n\t\t\t\t\tcontinue CHECK_REQUEST\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif ts.Equal(times[j]) {\n\t\t\t\t// increment total count for current time threshold (day)\n\t\t\t\ttotal[j]++\n\n\t\t\t\t// if no IP found for current threshold, increment unique and record IP\n\t\t\t\tif _, ok := ips[j][requests[i].RemoteAddr]; !ok {\n\t\t\t\t\tunique[j]++\n\t\t\t\t\tips[j][requests[i].RemoteAddr] = struct{}{}\n\t\t\t\t}\n\n\t\t\t\tcontinue CHECK_REQUEST\n\t\t\t}\n\n\t\t\tif ts.Before(times[j]) {\n\t\t\t\t// check if older than earliest threshold\n\t\t\t\tif j == 0 {\n\t\t\t\t\tcontinue CHECK_REQUEST\n\t\t\t\t}\n\n\t\t\t\t// increment total count for previous time threshold (day)\n\t\t\t\ttotal[j-1]++\n\n\t\t\t\t// if no IP found for day prior, increment unique and record IP\n\t\t\t\tif _, ok := ips[j-1][requests[i].RemoteAddr]; !ok {\n\t\t\t\t\tunique[j-1]++\n\t\t\t\t\tips[j-1][requests[i].RemoteAddr] = struct{}{}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\n\t// add data to currentMetrics from total and unique\n\tfor i := range dates {\n\t\t_, ok := currentMetrics[dates[i]]\n\t\tif !ok {\n\t\t\tm := apiMetric{\n\t\t\t\tDate: dates[i],\n\t\t\t\tTotal: total[i],\n\t\t\t\tUnique: unique[i],\n\t\t\t}\n\n\t\t\tcurrentMetrics[dates[i]] = m\n\t\t}\n\t}\n\n\t// loop through total and unique to see which dates are accounted for and\n\t// insert data from metrics array where dates are not\n\terr = store.Update(func(tx *bolt.Tx) error {\n\t\tb := tx.Bucket([]byte(\"__metrics\"))\n\n\t\tfor i := range dates {\n\t\t\t// populate total and unique with cached data if needed\n\t\t\tif total[i] == 0 {\n\t\t\t\ttotal[i] = currentMetrics[dates[i]].Total\n\t\t\t}\n\n\t\t\tif unique[i] == 0 {\n\t\t\t\tunique[i] = currentMetrics[dates[i]].Unique\n\t\t\t}\n\n\t\t\t// check if we need to insert old data into cache - as long as it\n\t\t\t// is not today's data\n\t\t\tif dates[i] != today.Format(\"01/02\") {\n\t\t\t\tk := []byte(dates[i])\n\t\t\t\tif b.Get(k) == nil {\n\t\t\t\t\t// keep zero counts out of cache in case data is added from\n\t\t\t\t\t// other sources\n\t\t\t\t\tif currentMetrics[dates[i]].Total != 0 {\n\t\t\t\t\t\tv, err := json.Marshal(currentMetrics[dates[i]])\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn err\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\terr = b.Put(k, v)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn err\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\treturn nil\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// marshal array counts to js arrays for output to chart\n\tjsUnique, err := json.Marshal(unique)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tjsTotal, err := json.Marshal(total)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn map[string]interface{}{\n\t\t\"dates\": dates,\n\t\t\"unique\": string(jsUnique),\n\t\t\"total\": string(jsTotal),\n\t\t\"from\": dates[0],\n\t\t\"to\": dates[len(dates)-1],\n\t}, nil\n}", "title": "" }, { "docid": "9c76b720dff16c408dc71e38fbefabd9", "score": "0.4736684", "text": "func getMetric(gaData *analytics.RealtimeData) (metricName string){\n\tlastHeaderIndex := len(gaData.ColumnHeaders) - 1\n\tlastHeader := gaData.ColumnHeaders[lastHeaderIndex]\n\tlogp.Debug(logSelector, \"metricName: %s\", lastHeader.Name)\n\treturn lastHeader.Name\n}", "title": "" }, { "docid": "ef1e92d708aef53589ee269b445d80a7", "score": "0.4730543", "text": "func tagsFromMetric(m model.Metric) map[string]string {\n\ttags := make(map[string]string, len(m)-1)\n\tfor l, v := range m {\n\t\tif l != model.MetricNameLabel {\n\t\t\ttags[string(l)] = string(v)\n\t\t}\n\t}\n\treturn tags\n}", "title": "" }, { "docid": "ef1e92d708aef53589ee269b445d80a7", "score": "0.4730543", "text": "func tagsFromMetric(m model.Metric) map[string]string {\n\ttags := make(map[string]string, len(m)-1)\n\tfor l, v := range m {\n\t\tif l != model.MetricNameLabel {\n\t\t\ttags[string(l)] = string(v)\n\t\t}\n\t}\n\treturn tags\n}", "title": "" }, { "docid": "71d35d3ec404c728ebcfc3025e4cfca2", "score": "0.47276118", "text": "func (e *TableMapEvent) decodeMeta(data []byte) error {\n\tpos := 0\n\te.ColumnMeta = make([]uint16, e.ColumnCount)\n\tfor i, t := range e.ColumnType {\n\t\tswitch t {\n\t\tcase MYSQL_TYPE_STRING:\n\t\t\tvar x uint16 = uint16(data[pos]) << 8 //real type\n\t\t\tx += uint16(data[pos+1]) //pack or field length\n\t\t\te.ColumnMeta[i] = x\n\t\t\tpos += 2\n\t\tcase MYSQL_TYPE_NEWDECIMAL:\n\t\t\tvar x uint16 = uint16(data[pos]) << 8 //precision\n\t\t\tx += uint16(data[pos+1]) //decimals\n\t\t\te.ColumnMeta[i] = x\n\t\t\tpos += 2\n\t\tcase MYSQL_TYPE_VAR_STRING,\n\t\t\tMYSQL_TYPE_VARCHAR,\n\t\t\tMYSQL_TYPE_BIT:\n\t\t\te.ColumnMeta[i] = binary.LittleEndian.Uint16(data[pos:])\n\t\t\tpos += 2\n\t\tcase MYSQL_TYPE_BLOB,\n\t\t\tMYSQL_TYPE_DOUBLE,\n\t\t\tMYSQL_TYPE_FLOAT,\n\t\t\tMYSQL_TYPE_GEOMETRY:\n\t\t\te.ColumnMeta[i] = uint16(data[pos])\n\t\t\tpos++\n\t\tcase MYSQL_TYPE_TIME2,\n\t\t\tMYSQL_TYPE_DATETIME2,\n\t\t\tMYSQL_TYPE_TIMESTAMP2:\n\t\t\te.ColumnMeta[i] = uint16(data[pos])\n\t\t\tpos++\n\t\tcase MYSQL_TYPE_NEWDATE,\n\t\t\tMYSQL_TYPE_ENUM,\n\t\t\tMYSQL_TYPE_SET,\n\t\t\tMYSQL_TYPE_TINY_BLOB,\n\t\t\tMYSQL_TYPE_MEDIUM_BLOB,\n\t\t\tMYSQL_TYPE_LONG_BLOB:\n\t\t\treturn fmt.Errorf(\"unsupport type in binlog %d\", t)\n\t\tdefault:\n\t\t\te.ColumnMeta[i] = 0\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "68ab2d3166f990d04f34646967996cb5", "score": "0.47250113", "text": "func (d *DeviceManager) WriteMetrics(u uuid.UUID, b []byte) error {\n\t// make sure it is not nil\n\tif len(b) < 1 {\n\t\treturn nil\n\t}\n\t// check that the device actually exists\n\tdev, ok := d.devices[u]\n\tif !ok {\n\t\treturn fmt.Errorf(\"device not found: %s\", u)\n\t}\n\treturn dev.AddMetrics(b)\n}", "title": "" }, { "docid": "613eacebff0f0ca12c5fbb9fffc5bde8", "score": "0.47235274", "text": "func (e *Exporter) generatePrometheusMetrics(db *sql.DB, parse func(row map[string]string) error, query string) error {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Duration(e.config.QueryTimeout)*time.Second)\n\tdefer cancel()\n\trows, err := db.QueryContext(ctx, query)\n\n\tif ctx.Err() == context.DeadlineExceeded {\n\t\treturn errors.New(\"Oracle query timed out\")\n\t}\n\n\tif err != nil {\n\t\treturn err\n\t}\n\tcols, err := rows.Columns()\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\t// Create a slice of interface{}'s to represent each column,\n\t\t// and a second slice to contain pointers to each item in the columns slice.\n\t\tcolumns := make([]interface{}, len(cols))\n\t\tcolumnPointers := make([]interface{}, len(cols))\n\t\tfor i := range columns {\n\t\t\tcolumnPointers[i] = &columns[i]\n\t\t}\n\n\t\t// Scan the result into the column pointers...\n\t\tif err := rows.Scan(columnPointers...); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Create our map, and retrieve the value for each column from the pointers slice,\n\t\t// storing it in the map with the name of the column as the key.\n\t\tm := make(map[string]string)\n\t\tfor i, colName := range cols {\n\t\t\tval := columnPointers[i].(*interface{})\n\t\t\tm[strings.ToLower(colName)] = fmt.Sprintf(\"%v\", *val)\n\t\t}\n\t\t// Call function to parse row\n\t\tif err := parse(m); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d37b82088b8f937acc5655be5106b526", "score": "0.47107676", "text": "func (le *LogEntry) Metric(msg string) {\n\tle.Payload[\"isMetric\"] = true\n\tle.Log(INFO, msg)\n}", "title": "" }, { "docid": "ad6abc455a0355db6acfd2b24ff821ea", "score": "0.46977034", "text": "func FormatData(s Sampler, a ...interface{}) Sampler {\n\treturn formatDataSampler{\n\t\tSampler: s,\n\t\tdata: a,\n\t}\n}", "title": "" }, { "docid": "666eab73e7a8534c708e64be1e987163", "score": "0.46927166", "text": "func (self *hawkularSink) pointToMetricHeader(t *sink_api.Timeseries) (*metrics.MetricHeader, error) {\n\n\tp := t.Point\n\tname := self.idName(p)\n\n\tvalue, err := metrics.ConvertToFloat64(p.Value)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tm := metrics.Datapoint{\n\t\tValue: value,\n\t\tTimestamp: metrics.UnixMilli(p.End),\n\t}\n\n\t// At the moment all the values are converted to gauges.\n\tmh := &metrics.MetricHeader{\n\t\tId: name,\n\t\tData: []metrics.Datapoint{m},\n\t\tType: metrics.Gauge,\n\t}\n\treturn mh, nil\n}", "title": "" }, { "docid": "e625e08ed969e427e5e8e10ad01a58d3", "score": "0.46916008", "text": "func (Metrics) MetricStruct() {}", "title": "" }, { "docid": "3b397bb15b0ee5f96739b3d09b24cb6e", "score": "0.46881643", "text": "func GetMetricData(ctx context.Context, api client, options *CMAPIListOptions) (*MetricData, error) {\n\n\t// -------------\n\t// Bootstrap URL\n\t// -------------\n\n\tbaseURL, err := url.Parse(api.BaseURL)\n\tif err != nil {\n\t\tfmt.Println(\"GetMetricData malformed URL: \", err.Error())\n\t\treturn nil, err\n\t}\n\tbaseURL.Path += MetricPathV3\n\n\t// --------------\n\t// URL parameters\n\t// --------------\n\n\tparams := url.Values{}\n\n\tparams.Add(\"metrics\", options.Metrics)\n\n\tif options.Start != \"\" {\n\t\tparams.Add(\"start\", options.Start)\n\t}\n\n\tif options.End != \"\" {\n\t\tparams.Add(\"end\", options.End)\n\t}\n\n\tbaseURL.RawQuery = params.Encode()\n\n\treq, err := http.NewRequest(\"GET\", baseURL.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// -----------------\n\t// Request execution\n\t// -----------------\n\n\treq = req.WithContext(ctx)\n\n\tres := MetricData{}\n\n\tif err := api.SendRequest(req, &res); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &res, nil\n}", "title": "" }, { "docid": "2468ccbcb9d6232b13e0b2b67add85a4", "score": "0.46872914", "text": "func marshalDatadog(log *log.Logger, data map[string]any) ([]byte, error) {\n\t/*\n\t\t{ \"series\" : [\n\t\t\t\t{\n\t\t\t\t\t\"metric\":\"test.metric\",\n\t\t\t\t\t\"points\": [\n\t\t\t\t\t\t[\n\t\t\t\t\t\t\t$currenttime,\n\t\t\t\t\t\t\t20\n\t\t\t\t\t\t]\n\t\t\t\t\t],\n\t\t\t\t\t\"type\":\"gauge\",\n\t\t\t\t\t\"host\":\"test.example.com\",\n\t\t\t\t\t\"tags\": [\n\t\t\t\t\t\t\"environment:test\"\n\t\t\t\t\t]\n\t\t\t\t}\n\t\t\t]\n\t\t}\n\t*/\n\n\t// Extract the base keys/values.\n\tmType := \"gauge\"\n\thost, ok := data[\"host\"].(string)\n\tif !ok {\n\t\thost = \"unknown\"\n\t}\n\tenv := \"dev\"\n\tif host != \"localhost\" {\n\t\tenv = \"prod\"\n\t}\n\tenvTag := \"environment:\" + env\n\n\t// Define the Datadog data format.\n\ttype series struct {\n\t\tMetric string `json:\"metric\"`\n\t\tPoints [][]any `json:\"points\"`\n\t\tType string `json:\"type\"`\n\t\tHost string `json:\"host\"`\n\t\tTags []string `json:\"tags\"`\n\t}\n\n\t// Populate the data into the data structure.\n\tvar doc struct {\n\t\tSeries []series `json:\"series\"`\n\t}\n\tfor key, value := range data {\n\t\tswitch value.(type) {\n\t\tcase int, float64:\n\t\t\tdoc.Series = append(doc.Series, series{\n\t\t\t\tMetric: env + \".\" + key,\n\t\t\t\tPoints: [][]any{{\"$currenttime\", value}},\n\t\t\t\tType: mType,\n\t\t\t\tHost: host,\n\t\t\t\tTags: []string{envTag},\n\t\t\t})\n\t\t}\n\t}\n\n\t// Convert the data into JSON.\n\tout, err := json.MarshalIndent(doc, \"\", \" \")\n\tif err != nil {\n\t\tlog.Println(\"datadog.publish : marshaling :\", err)\n\t\treturn nil, err\n\t}\n\n\treturn out, nil\n}", "title": "" }, { "docid": "3f93c7fa9f2d99be72c7786ef7bd5082", "score": "0.4686691", "text": "func changeDBdataToJSON(sqlString string) ([]map[string]interface{}, error) {\n\tsqlConnString := getConnectionString()\n\tdb, err := sql.Open(\"mysql\", sqlConnString) //\n\tif err != nil {\n\t\treturn nil, err // return error if present\n\t}\n\n\tdefer db.Close() // close database connection if error occurs\n\trows, err := db.Query(sqlString) // typically returns rows querying the database\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcolumns, err := rows.Columns() // returns the column name and returns errors if rows are closed\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tcount := len(columns) // number of columns from where rows are rendered.\n\ttableData := make([]map[string]interface{}, 0)\n\tvalues := make([]interface{}, count)\n\tvaluePtrs := make([]interface{}, count)\n\t// JSON format builder\n\tfor rows.Next() { // for each row\n\t\tfor i := 0; i < count; i++ {\n\t\t\tvaluePtrs[i] = &values[i] // find value pointers\n\t\t}\n\t\trows.Scan(valuePtrs...)\n\t\tentry := make(map[string]interface{})\n\t\tfor i, col := range columns { // for each data in row buld a json data (with key and value4)\n\t\t\tvar v interface{}\n\t\t\tval := values[i]\n\t\t\tb, ok := val.([]byte)\n\t\t\tif ok {\n\t\t\t\tv = string(b)\n\t\t\t} else {\n\t\t\t\tv = val\n\t\t\t}\n\t\t\tentry[col] = v // assign data as entry[\"key\"] = value\n\t\t}\n\t\ttableData = append(tableData, entry) // append the data object map[string]interface{} to array []map[string]interface{}\n\t}\n\t// for marshalling (i.e. serializing)\n\t// jsonData, err := json.Marshal(tableData)\n\t// if err != nil {\n\t// \treturn jsonData, err\n\t// }\n\n\treturn tableData, nil\n}", "title": "" }, { "docid": "c24d89ef275d484a6c559bba9dc86ec2", "score": "0.4681703", "text": "func (acc *metricDataAccumulator) getMetricsData(containerStatsMap map[string]ContainerStats, metadata TaskMetadata) {\n\n\ttaskMetrics := ECSMetrics{}\n\ttimestamp := timestampProto(time.Now())\n\ttaskResource := taskResource(metadata)\n\n\tfor _, containerMetadata := range metadata.Containers {\n\t\tstats := containerStatsMap[containerMetadata.DockerID]\n\t\tcontainerMetrics := getContainerMetrics(stats)\n\t\tcontainerMetrics.MemoryReserved = *containerMetadata.Limits.Memory\n\t\tcontainerMetrics.CPUReserved = *containerMetadata.Limits.CPU\n\n\t\tif containerMetrics.CPUReserved > 0 {\n\t\t\tcontainerMetrics.CPUUtilized = (containerMetrics.CPUUtilized / containerMetrics.CPUReserved)\n\t\t}\n\n\t\tcontainerResource := containerResource(containerMetadata)\n\t\tfor k, v := range taskResource.Labels {\n\t\t\tcontainerResource.Labels[k] = v\n\t\t}\n\n\t\tacc.accumulate(\n\t\t\tcontainerResource,\n\t\t\tconvertToOCMetrics(ContainerPrefix, containerMetrics, nil, nil, timestamp),\n\t\t)\n\n\t\taggregateTaskMetrics(&taskMetrics, containerMetrics)\n\t}\n\n\t// Overwrite Memory limit with task level limit\n\tif metadata.Limits.Memory != nil {\n\t\ttaskMetrics.MemoryReserved = *metadata.Limits.Memory\n\t}\n\n\ttaskMetrics.CPUReserved = taskMetrics.CPUReserved / CPUsInVCpu\n\n\t// Overwrite CPU limit with task level limit\n\tif metadata.Limits.CPU != nil {\n\t\ttaskMetrics.CPUReserved = *metadata.Limits.CPU\n\t}\n\n\t// taskMetrics.CPUReserved cannot be zero. In ECS, user needs to set CPU limit\n\t// at least in one place (either in task level or in container level). If the\n\t// task level CPULimit is not present, we calculate it from the summation of\n\t// all container CPU limits.\n\ttaskMetrics.CPUUtilized = ((taskMetrics.CPUUsageInVCPU / taskMetrics.CPUReserved) * 100)\n\n\tacc.accumulate(\n\t\ttaskResource,\n\t\tconvertToOCMetrics(TaskPrefix, taskMetrics, nil, nil, timestamp),\n\t)\n}", "title": "" }, { "docid": "fb29ece0aecf6288840451f4282ea0e5", "score": "0.46806172", "text": "func buildMetricsForRecord(record Record, prefix string, valueCols []string, tagCols []string) ([]metric, error) {\n\tmetrics := []metric{}\n\n\tfor _, vc := range valueCols {\n\t\t// The value of record is a string for general purpose,\n\t\t// so we parse and convert it to float64 here.\n\t\tvalue, err := strconv.ParseFloat(record[vc], 64)\n\t\tif err != nil {\n\t\t\treturn metrics, xerrors.Errorf(\"failed to ParseFloat: col = %s, type = %T(%v): %w\", vc, record[vc], record[vc], err)\n\t\t}\n\n\t\t// build metric.\n\t\tm := metric{\n\t\t\tname: prefix + \".\" + vc, // prefix is Rule.Name\n\t\t\tvalue: value,\n\t\t\ttags: buildTags(record, tagCols),\n\t\t}\n\t\tmetrics = append(metrics, m)\n\t}\n\n\treturn metrics, nil\n}", "title": "" }, { "docid": "899b51b43437f94dc768ffff028bd219", "score": "0.46594852", "text": "func (EngineMetrics) MetricStruct() {}", "title": "" }, { "docid": "071a806f159f99ce5cd6e90f0c020bf4", "score": "0.4645152", "text": "func Test_CsvTable_DataColumnsInfo(t *testing.T) {\n\tdata := \"#constant,measurement,cpu\\n\" +\n\t\t\"#constant,tag,xpu,xpu1\\n\" +\n\t\t\"#constant,tag,cpu,cpu1\\n\" +\n\t\t\"#constant,long,of,100\\n\" +\n\t\t\"#constant,dateTime,2\\n\" +\n\t\t\"x,y\\n\"\n\ttable := CsvTable{}\n\tfor _, row := range readCsv(t, data) {\n\t\trequire.False(t, table.AddRow(row))\n\t}\n\ttable.computeLineProtocolColumns()\n\t// expected result is something like this:\n\t// \"CsvTable{ dataColumns: 2 constantColumns: 5\\n\" +\n\t// \t\" measurement: &{Label:#constant measurement DataType:measurement DataFormat: LinePart:2 DefaultValue:cpu Index:-1 TimeZone:UTC ParseF:<nil> escapedLabel:}\\n\" +\n\t// \t\" tag: {Label:cpu DataType:tag DataFormat: LinePart:3 DefaultValue:cpu1 Index:-1 TimeZone:UTC ParseF:<nil> escapedLabel:cpu}\\n\" +\n\t// \t\" tag: {Label:xpu DataType:tag DataFormat: LinePart:3 DefaultValue:xpu1 Index:-1 TimeZone:UTC ParseF:<nil> escapedLabel:xpu}\\n\" +\n\t// \t\" field: {Label:x DataType: DataFormat: LinePart:0 DefaultValue: Index:0 TimeZone:UTC ParseF:<nil> escapedLabel:x}\\n\" +\n\t// \t\" field: {Label:y DataType: DataFormat: LinePart:0 DefaultValue: Index:1 TimeZone:UTC ParseF:<nil> escapedLabel:y}\\n\" +\n\t// \t\" field: {Label:of DataType:long DataFormat: LinePart:0 DefaultValue:100 Index:-1 TimeZone:UTC ParseF:<nil> escapedLabel:of}\\n\" +\n\t// \t\" time: &{Label:#constant dateTime DataType:dateTime DataFormat: LinePart:5 DefaultValue:2 Index:-1 TimeZone:UTC ParseF:<nil> escapedLabel:}\" +\n\t// \t\"\\n}\"\n\tresult := table.DataColumnsInfo()\n\trequire.Equal(t, 1, strings.Count(result, \"measurement:\"))\n\trequire.Equal(t, 2, strings.Count(result, \"tag:\"))\n\trequire.Equal(t, 3, strings.Count(result, \"field:\"))\n\trequire.Equal(t, 1, strings.Count(result, \"time:\"))\n\n\tvar table2 *CsvTable\n\trequire.Equal(t, \"<nil>\", table2.DataColumnsInfo())\n}", "title": "" }, { "docid": "b7e70b09ed8984ecbbb6529b59d887b1", "score": "0.46394956", "text": "func metric(s string) float64 {\n\tvar d []byte\n\tif len(s) < 4 {\n\t\td = append([]byte(s), make([]byte, 4-len(s))...)\n\t} else {\n\t\td = []byte(s)[:4]\n\t}\n\treturn float64(uint(d[0])<<24 | uint(d[1])<<16 | uint(d[2])<<8 | uint(d[3]))\n}", "title": "" }, { "docid": "0df3e5f8a9cb6df6995a6cd64466599d", "score": "0.46381286", "text": "func SensuData(token *jwt.Token, data *structs.Data) *structs.Data {\n\treturn data\n}", "title": "" }, { "docid": "1b51feb567bb4287c0172d8db542d694", "score": "0.4631287", "text": "func (dc *DataCollector) SyncMetrics(obj interface{}) {\n\tvar md pmetric.Metrics\n\n\tswitch o := obj.(type) {\n\tcase *corev1.Pod:\n\t\tmd = pod.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *corev1.Node:\n\t\tmd = node.GetMetrics(dc.settings, dc.metricsBuilderConfig, o, dc.nodeConditionsToReport, dc.allocatableTypesToReport)\n\tcase *corev1.Namespace:\n\t\tmd = namespace.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *corev1.ReplicationController:\n\t\tmd = replicationcontroller.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *corev1.ResourceQuota:\n\t\tmd = resourcequota.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *appsv1.Deployment:\n\t\tmd = deployment.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *appsv1.ReplicaSet:\n\t\tmd = replicaset.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *appsv1.DaemonSet:\n\t\tmd = demonset.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *appsv1.StatefulSet:\n\t\tmd = statefulset.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *batchv1.Job:\n\t\tmd = jobs.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *batchv1.CronJob:\n\t\tmd = cronjob.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *batchv1beta1.CronJob:\n\t\tmd = cronjob.GetMetricsBeta(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *autoscalingv2.HorizontalPodAutoscaler:\n\t\tmd = hpa.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *autoscalingv2beta2.HorizontalPodAutoscaler:\n\t\tmd = hpa.GetMetricsBeta(dc.settings, dc.metricsBuilderConfig, o)\n\tcase *quotav1.ClusterResourceQuota:\n\t\tmd = clusterresourcequota.GetMetrics(dc.settings, dc.metricsBuilderConfig, o)\n\tdefault:\n\t\treturn\n\t}\n\n\tif md.DataPointCount() == 0 {\n\t\treturn\n\t}\n\n\tdc.UpdateMetricsStore(obj, md)\n}", "title": "" }, { "docid": "b7640bebcee3051b0a47ab82aad91f41", "score": "0.46306884", "text": "func TestAppender_MultipleMetrics(t *testing.T) {\n\tvar app testappender.Appender\n\n\tapp.UpdateMetadata(0, labels.FromStrings(\"__name__\", \"example_metric_a\"), metadata.Metadata{\n\t\tType: textparse.MetricTypeCounter,\n\t})\n\tapp.UpdateMetadata(0, labels.FromStrings(\"__name__\", \"example_metric_b\"), metadata.Metadata{\n\t\tType: textparse.MetricTypeGauge,\n\t})\n\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_a\", \"foo\", \"bar\"), 10, 10)\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_a\", \"foo\", \"rab\"), 10, 20)\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_b\", \"fizz\", \"buzz\"), 10, 30)\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_b\", \"fizz\", \"zzub\"), 10, 40)\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_c\", \"hello\", \"world\"), 10, 50)\n\tapp.Append(0, labels.FromStrings(\"__name__\", \"example_metric_c\", \"hello\", \"dlrow\"), 10, 60)\n\n\texpect := `\n\t\t# TYPE example_metric_a counter\n\t\texample_metric_a{foo=\"bar\"} 10 10\n\t\texample_metric_a{foo=\"rab\"} 20 10\n\t\t# TYPE example_metric_b gauge\n\t\texample_metric_b{fizz=\"buzz\"} 30 10\n\t\texample_metric_b{fizz=\"zzub\"} 40 10\n\t\t# TYPE example_metric_c untyped\n\t\texample_metric_c{hello=\"dlrow\"} 60 10\n\t\texample_metric_c{hello=\"world\"} 50 10\n\t`\n\trequireAppenderData(t, &app, expect, false)\n}", "title": "" }, { "docid": "4ec46a4c32a5c90d43499f75bdc48050", "score": "0.46260065", "text": "func (m *metricsLoader) addPercentFields(data map[string]float64) map[string]float64 {\n\tdisk := (1 - (data[sonm.MetricsKeyDiskFree] / data[sonm.MetricsKeyDiskTotal])) * 100\n\tif math.IsInf(disk, 0) || math.IsNaN(disk) {\n\t\tdisk = 0\n\t}\n\n\tram := (1 - (data[sonm.MetricsKeyRAMFree] / data[sonm.MetricsKeyRAMTotal])) * 100\n\tif math.IsInf(ram, 0) || math.IsNaN(ram) {\n\t\tdisk = 0\n\t}\n\n\tdata[sonm.MetricsKeyDiskFreePercent] = disk\n\tdata[sonm.MetricsKeyRAMFreePercent] = ram\n\treturn data\n}", "title": "" }, { "docid": "2890f17cc3a1dfa1c2b7f6675319bf12", "score": "0.46230498", "text": "func describeConfigMapData(cm *corev1.ConfigMap) (*component.Table, error) {\n\tif cm == nil {\n\t\treturn nil, errors.New(\"config map is nil\")\n\t}\n\n\tcols := component.NewTableCols(\"Key\", \"Value\")\n\ttbl := component.NewTable(\"Data\", \"No data has been configured for this config map!\", cols)\n\n\trows, err := describeConfigMapDataRows(cm)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tfor _, row := range rows {\n\t\ttbl.Add(row)\n\t}\n\n\treturn tbl, nil\n}", "title": "" }, { "docid": "e0350cfed9369bb611f59e87e30c2dc6", "score": "0.46220312", "text": "func generateTableFieldsData(config bool, tableName string, jsonNode *jsonquery.Node,\nparent *xmlquery.Node) CVLRetCode {\n\n\t//Traverse fields\n\tfor jsonFieldNode := jsonNode.FirstChild; jsonFieldNode!= nil;\n\tjsonFieldNode = jsonFieldNode.NextSibling {\n\t\t//Add fields as leaf to the list\n\t\tif (jsonFieldNode.Type == jsonquery.ElementNode &&\n\t\tjsonFieldNode.FirstChild.Type == jsonquery.TextNode) {\n\n\t\t\tif (len(modelInfo.tableInfo[tableName].mapLeaf) == 2) {//mapping should have two leaf always\n\t\t\t\t//Values should be stored inside another list as map table\n\t\t\t\txmlNode := &xmlquery.Node{\n\t\t\t\t\tData: tableName,\n\t\t\t\t\tType: xmlquery.ElementNode,\n\t\t\t\t}\n\t\t\t\taddChildNode(parent, xmlNode)\n\n\t\t\t\taddChildLeaf(config, tableName,\n\t\t\t\txmlNode, modelInfo.tableInfo[tableName].mapLeaf[0],\n\t\t\t\tjsonFieldNode.Data)\n\n\t\t\t\taddChildLeaf(config, tableName,\n\t\t\t\txmlNode, modelInfo.tableInfo[tableName].mapLeaf[1],\n\t\t\t\tjsonFieldNode.FirstChild.Data)\n\n\t\t\t} else {\n\t\t\t\t//check if it is hash-ref, then need to add only key from \"TABLE|k1\"\n\t\t\t\tre := regexp.MustCompile(`\\[(.*)\\|(.*)\\]`)\n\t\t\t\thasRefMatch := re.FindStringSubmatch(jsonFieldNode.FirstChild.Data)\n\n\t\t\t\tif (hasRefMatch != nil && len(hasRefMatch) == 3) {\n\t\t\t\t\taddChildLeaf(config, tableName,\n\t\t\t\t\tparent, jsonFieldNode.Data,\n\t\t\t\t\thasRefMatch[2]) //take hashref key value\n\t\t\t\t} else {\n\t\t\t\t\taddChildLeaf(config, tableName,\n\t\t\t\t\tparent, jsonFieldNode.Data,\n\t\t\t\t\tjsonFieldNode.FirstChild.Data)\n\t\t\t\t}\n\t\t\t}\n\n\t\t} else if (jsonFieldNode.Type == jsonquery.ElementNode &&\n\t\tjsonFieldNode.FirstChild.Type == jsonquery.ElementNode) {\n\t\t\t//Array data e.g. VLAN members\n\t\t\tfor arrayNode:=jsonFieldNode.FirstChild; arrayNode != nil;\n\n\t\t\tarrayNode = arrayNode.NextSibling {\n\t\t\t\taddChildLeaf(config, tableName,\n\t\t\t\tparent, jsonFieldNode.Data,\n\t\t\t\tarrayNode.FirstChild.Data)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn CVL_SUCCESS\n}", "title": "" }, { "docid": "f6eaa8abbabd0a7c11752f09b14b19a4", "score": "0.46207264", "text": "func CsvMeasurementFormatter(topics, headers []string, data [][]float64) (string, error) {\n\tb := bytes.NewBufferString(\"\")\n\tw := csv.NewWriter(b)\n\th := []string{\"Topic\"}\n\th = append(h, headers...)\n\tw.Write(h)\n\tfor j := range data[0] {\n\t\trecord := make([]string, len(data)+1)\n\t\trecord[0] = topics[j]\n\t\tfor i := range data {\n\t\t\trecord[i+1] = strconv.FormatFloat(data[i][j], 'f', -1, 64)\n\t\t}\n\t\tw.Write(record)\n\t}\n\tw.Flush()\n\treturn b.String(), nil\n}", "title": "" }, { "docid": "de021526566d3893620ec2bab5cddcbf", "score": "0.4619909", "text": "func (u *User) Putmetricdata() error {\n\treturn u.Doer.PutMetricData(&cloudwatch.PutMetricDataInput{\n\t\tNamespace: aws.String(\"Site/Traffic\"),\n\t\tMetricData: []*cloudwatch.MetricDatum{\n\t\t\t&cloudwatch.MetricDatum{\n\t\t\t\tMetricName: aws.String(\"UniqueVisits\"),\n\t\t\t\tUnit: aws.String(\"Count\"),\n\t\t\t\tValue: aws.Float64(18.90),\n\t\t\t\tDimensions: []*cloudwatch.Dimension{\n\t\t\t\t\t&cloudwatch.Dimension{\n\t\t\t\t\t\tName: aws.String(\"keyoftest\"),\n\t\t\t\t\t\tValue: aws.String(\"valueoftest\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t})\n\n}", "title": "" }, { "docid": "40805d4b47fa87778ccbeef1693f881f", "score": "0.46167207", "text": "func toText(t *Table) []*textRow {\n\tvar textRows []*textRow\n\tswitch len(t.Configs) {\n\tcase 1:\n\t\ttextRows = append(textRows, newTextRow(\"name\", t.Metric))\n\tcase 2:\n\t\ttextRows = append(textRows, newTextRow(\"name\", \"old \"+t.Metric, \"new \"+t.Metric, \"delta\"))\n\tdefault:\n\t\trow := newTextRow(\"name \\\\ \" + t.Metric)\n\t\trow.cols = append(row.cols, t.Configs...) // TODO Should this also trim common path prefix? (see toCSV)\n\t\ttextRows = append(textRows, row)\n\t}\n\n\tvar group string\n\n\tfor _, row := range t.Rows {\n\t\tif row.Group != group {\n\t\t\tgroup = row.Group\n\t\t\ttextRows = append(textRows, newTextRow(group))\n\t\t}\n\t\ttext := newTextRow(row.Benchmark)\n\t\tfor _, m := range row.Metrics {\n\t\t\ttext.cols = append(text.cols, m.Format(row.Scaler))\n\t\t}\n\t\tif len(t.Configs) == 2 {\n\t\t\tdelta := row.Delta\n\t\t\tif delta == \"~\" {\n\t\t\t\tdelta = \"~ \"\n\t\t\t}\n\t\t\ttext.cols = append(text.cols, delta)\n\t\t\ttext.cols = append(text.cols, row.Note)\n\t\t}\n\t\ttextRows = append(textRows, text)\n\t}\n\tfor _, r := range textRows {\n\t\tr.trim()\n\t}\n\treturn textRows\n}", "title": "" }, { "docid": "dc57775971ee5efb90cf1ff21264c3ad", "score": "0.46154314", "text": "func (table *Table) writeLoadValue(buf *bytes.Buffer, value *reflect.Value) error {\n\tif err := buf.WriteByte('['); err != nil {\n\t\treturn err\n\t}\n\tvalueType := value.Type()\n\tneedsDelimiter := false\n\tfor i := 0; i < valueType.NumField(); i++ {\n\t\tfield := valueType.Field(i)\n\t\ttag := field.Tag.Get(\"grngo\")\n\t\tif tag == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tif needsDelimiter {\n\t\t\tif err := buf.WriteByte(','); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tneedsDelimiter = true\n\t\t}\n\t\tfieldValue := value.Field(i)\n\t\tswitch fieldValue.Kind() {\n\t\tcase reflect.Bool:\n\t\t\tif _, err := fmt.Fprint(buf, fieldValue.Bool()); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\tcase reflect.Int64:\n\t\t\tif _, err := fmt.Fprint(buf, fieldValue.Int()); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\tcase reflect.Float64:\n\t\t\tif _, err := fmt.Fprint(buf, fieldValue.Float()); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\tcase reflect.String:\n\t\t\tstr := fieldValue.String()\n\t\t\tstr = strings.Replace(str, \"\\\\\", \"\\\\\\\\\", -1)\n\t\t\tstr = strings.Replace(str, \"\\\"\", \"\\\\\\\"\", -1)\n\t\t\tif _, err := fmt.Fprintf(buf, \"\\\"%s\\\"\", str); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\tcase reflect.Slice:\n\t\t\tswitch field.Type.Elem().Kind() {\n\t\t\tcase reflect.Uint8:\n\t\t\t\tstr := string(fieldValue.Bytes())\n\t\t\t\tstr = strings.Replace(str, \"\\\\\", \"\\\\\\\\\", -1)\n\t\t\t\tstr = strings.Replace(str, \"\\\"\", \"\\\\\\\"\", -1)\n\t\t\t\tif _, err := fmt.Fprintf(buf, \"\\\"%s\\\"\", str); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\t// TODO: Support other types!\n\t\t\t\treturn fmt.Errorf(\"unsupported data kind\")\n\t\t\t}\n\t\tdefault:\n\t\t\t// TODO: Support other types!\n\t\t\treturn fmt.Errorf(\"unsupported data kind\")\n\t\t}\n\t}\n\tif err := buf.WriteByte(']'); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b68baa1bf98d328a43687ad9d1a1818e", "score": "0.45992368", "text": "func (p *profiler) writeMetrics() error {\n\tvar memStats runtime.MemStats\n\truntime.ReadMemStats(&memStats)\n\n\tp.metricWriter.ProfilingMetric(&gatekeeper.ProfilingMetric{\n\t\tTimestamp: time.Now(),\n\t\tMemStats: memStats,\n\t})\n\n\treturn nil\n}", "title": "" }, { "docid": "6870a5a88ca16004428a53146ae44a90", "score": "0.45852757", "text": "func PostMetric(m string, t int64, c string) (int, []byte, error) {\n\tddParams := ddParams{Series: []ddParam{\n\t\t{\n\t\t\tMetric: m,\n\t\t\tPoints: [1][2]int64{\n\t\t\t\t{t, int64(1)},\n\t\t\t},\n\t\t\tType: \"count\",\n\t\t\tHost: os.Getenv(\"DD_HOST\"),\n\t\t\tTags: []string{\n\t\t\t\tTag(\"company\", c),\n\t\t\t},\n\t\t},\n\t}}\n\tjsonValue, _ := json.Marshal(ddParams)\n\turl := fmt.Sprintf(\"https://api.datadoghq.com/api/v1/series?api_key=%s\",\n\t\tos.Getenv(\"DD_API_KEY\"))\n\treq, _ := http.NewRequest(\"POST\", url, bytes.NewBuffer(jsonValue))\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tclient := &http.Client{}\n\tresp, errClient := client.Do(req)\n\tif errClient != nil {\n\t\treturn 500, nil, errClient\n\t}\n\tdefer resp.Body.Close()\n\n\tbody, errReadAll := ioutil.ReadAll(resp.Body)\n\tif errReadAll != errReadAll {\n\t\treturn 500, nil, errReadAll\n\t}\n\n\treturn resp.StatusCode, body, nil\n}", "title": "" }, { "docid": "32511c43fb76f614efa053a58b2ffdf3", "score": "0.45814183", "text": "func (m *metricSaphanaColumnMemoryUsed) emit(metrics pmetric.MetricSlice) {\n\tif m.config.Enabled && m.data.Sum().DataPoints().Len() > 0 {\n\t\tm.updateCapacity()\n\t\tm.data.MoveTo(metrics.AppendEmpty())\n\t\tm.init()\n\t}\n}", "title": "" }, { "docid": "fbd14af06cf85bcb1f1bc2488e3bd8f2", "score": "0.4576216", "text": "func parseMetric(b []byte) (*Metric, error) {\n\t// Remove any whitespace characters\n\tb = bytes.TrimSpace(b)\n\n\t// Find positions of the various separators\n\ti := bytes.Index(b, []byte(\":\"))\n\tj := bytes.Index(b, []byte(\"|\"))\n\tk := bytes.Index(b, []byte(\"@\"))\n\tv := b[i+1 : j]\n\n\t// End position of the metric type is the end of the byte slice\n\t// if no sample rate was sent.\n\ttEnd := len(b)\n\tvar sampleRate float64 = 1\n\n\t// Indicates that a sample rate was sent as part of the metric\n\tif k > -1 {\n\t\ttEnd = k - 1 // Use -1 because of the | before the @\n\t\tsr := b[(k + 1):len(b)]\n\t\tvar err error\n\t\tsampleRate, err = strconv.ParseFloat(string(sr), 64)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\tm := &Metric{\n\t\tBucket: string(b[0:i]),\n\t\tType: string(b[j+1 : tEnd]),\n\t}\n\n\tswitch m.Type {\n\tcase Counter:\n\t\tval, err := strconv.ParseInt(string(v), 10, 64)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tm.Value = int64(float64(val) / sampleRate)\n\n\tcase Gauge, Timer:\n\t\tval, err := strconv.ParseFloat(string(v), 64)\n\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tm.Value = val\n\n\tdefault:\n\t\terr := fmt.Errorf(\"unable to create metric for type %q\", m.Type)\n\n\t\treturn nil, err\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "850c0b8d4ccd12c4e9b53ca603de8665", "score": "0.45740178", "text": "func ExportMetrics(metrics []models.Metric) error {\r\n\ttotal := len(metrics)\r\n\tif (total < 1) {\r\n\t\treturn nil\r\n\t}\r\n\r\n\tlog.Info(fmt.Sprintf(\"Found %d metrics to export...\", total));\r\n\r\n\tvar err = _db.Ping()\r\n\tif (err != nil) {\r\n\t\treturn err\r\n\t}\r\n\r\n\tok := 0\r\n\tfor _, currMetric := range metrics {\r\n\t\tcurrMetric.Adjust()\r\n\t\tresult, err := _db.Query(\"select insertMetric($1, $2, $3, $4, $5, $6)\", currMetric.DriverId, currMetric.Name, currMetric.Timestamp, currMetric.Longitude, currMetric.Latitude, currMetric.Value)\r\n\t\tif (err != nil) {\r\n\t\t\tlog.Warn(fmt.Sprintf(\"Couldn't add metric: <%s>\\n\\terror: %s\", currMetric.ToString(), err.Error()))\r\n\t\t} else {\r\n\t\t\tresult.Close();\r\n\t\t\tok += 1;\r\n\t\t\tlog.Info(fmt.Sprintf(\"%d/%d (%3.2f) metrics inserted...\", ok, total, float32(ok)/float32(total) * 100));\r\n\t\t}\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "65102751c04e20a78a45f38aa8c6d342", "score": "0.4565358", "text": "func recordMetrics(tableType TableType, operation string, err error, latency float64) {\n\tlabels := []string{string(tableType), operation}\n\tapiRequestsTotal.WithLabelValues(labels...).Inc()\n\tapiRequestLatencies.WithLabelValues(labels...).Observe(latency)\n\n\tresult := \"success\"\n\tif err != nil {\n\t\tresult = \"error\"\n\t}\n\tapiRequests.WithLabelValues(append(labels, result)...).Inc()\n}", "title": "" }, { "docid": "dabed2156c5a885a6ddb405b1a6f4401", "score": "0.45635742", "text": "func (r *Resource) AddMetric(envelope *events.Envelope, logger *gosteno.Logger) {\n\tvar metrics []*Metric\n\n\ttimestamp := envelope.GetTimestamp()\n\n\tswitch envelope.GetEventType() {\n\tcase events.Envelope_ValueMetric:\n\t\tvalueMetric := envelope.GetValueMetric()\n\t\tr.mutext.Lock()\n\n\t\tmetrics = r.getMetrics(r.valueMetrics, valueMetric.GetName())\n\t\tvar metric = &Metric{}\n\t\tmetric.update(valueMetric.GetValue(), timestamp, GetInstance().TTL)\n\t\tmetrics = append(metrics, metric)\n\t\tr.valueMetrics[valueMetric.GetName()] = metrics\n\t\tr.mutext.Unlock()\n\t\tlogger.Debugf(\"Adding Value Event Name %s, Value %d\", valueMetric.GetName(), valueMetric.GetValue())\n\tcase events.Envelope_CounterEvent:\n\t\tcounterEvent := envelope.GetCounterEvent()\n\t\tr.mutext.Lock()\n\n\t\tmetrics = r.getMetrics(r.counterMetrics, counterEvent.GetName())\n\t\tvar metric = &Metric{}\n\t\tmetric.update(float64(counterEvent.GetTotal()), timestamp, GetInstance().TTL)\n\t\tmetrics = append(metrics, metric)\n\t\tr.counterMetrics[counterEvent.GetName()] = metrics\n\t\tr.mutext.Unlock()\n\t\tlogger.Debugf(\"Adding Counter Event Name %s, Value %d\", counterEvent.GetName(), counterEvent.GetTotal())\n\tcase events.Envelope_ContainerMetric:\n\t\t// ignored message type\n\tcase events.Envelope_LogMessage:\n\t\t// ignored message type\n\tcase events.Envelope_HttpStartStop:\n\t\t// ignored message type\n\tcase events.Envelope_Error:\n\t\t// ignored message type\n\tdefault:\n\t\tlogger.Warnf(\"Unknown event type %s\", envelope.GetEventType())\n\t}\n}", "title": "" }, { "docid": "bbb2beab907d61c43c9be4eb98b7cca3", "score": "0.45541313", "text": "func mutateMetric(raw []byte, regexes []regex) ([]byte, error) {\n\tidx := bytes.Index(raw, []byte(\":\"))\n\tif idx == -1 {\n\t\t// TODO debug only, due to large random data\n\t\treturn nil, fmt.Errorf(\"WARN/DEBUG/TODO: '%s' not a valid statsd metric\", raw)\n\t}\n\n\t// extract the metric name from the statsd message so that we can mutate it\n\t// ex: \"foo.bar.baz:100|c\"\n\tname := raw[0:idx] // foo.bar.baz\n\tremainder := raw[idx:] // :100|c\n\n\t// attempt to apply all of the regexes to the metric name\n\tfor _, r := range regexes {\n\t\tname = r.re.ReplaceAll(name, r.repl)\n\t}\n\n\t// re-construct and overwrite the original metric, then return\n\traw = append(name, remainder...)\n\treturn raw, nil\n}", "title": "" }, { "docid": "3c7c948bd418f60950a323afde86b1db", "score": "0.4548049", "text": "func InitializeMetric(\n\tmetric pdata.Metric,\n\tvals []win_perf_counters.CounterValue,\n\tinstanceNameLabel string,\n) pdata.Metric {\n\tddps := metric.DoubleDataPoints()\n\tddps.Resize(len(vals))\n\n\tfor i, val := range vals {\n\t\tddp := ddps.At(i)\n\n\t\tif len(vals) > 1 || (val.InstanceName != \"\" && val.InstanceName != totalInstanceName) {\n\t\t\tlabels := ddp.LabelsMap()\n\t\t\tlabels.Insert(instanceNameLabel, val.InstanceName)\n\t\t}\n\n\t\tddp.SetTimestamp(pdata.TimestampUnixNano(uint64(time.Now().UnixNano())))\n\t\tddp.SetValue(val.Value)\n\t}\n\n\treturn metric\n}", "title": "" }, { "docid": "720ceab45c6a747f18e07e501f54f5e8", "score": "0.454363", "text": "func dataMessage(data interface{}, message string) map[string]interface{} {\n\treturn map[string]interface{}{\"message\": message, \"data\": data}\n}", "title": "" }, { "docid": "720ceab45c6a747f18e07e501f54f5e8", "score": "0.454363", "text": "func dataMessage(data interface{}, message string) map[string]interface{} {\n\treturn map[string]interface{}{\"message\": message, \"data\": data}\n}", "title": "" }, { "docid": "82d1e23830d58fea7e7747f2156242a0", "score": "0.4541413", "text": "func (scrapper MetricsForwader) GetMetric() (val interface{}, err error) {\n\tgetFordwadedMetrics := func() (data []byte, err error) {\n\t\tsuccessResponse := false\n\t\tdefer func(startTime time.Time) {\n\t\t\tduration := time.Since(startTime).Seconds()\n\t\t\tlabels := []string{scrapper.GetJobName(), scrapper.GetInstanceName()}\n\t\t\tif successResponse {\n\t\t\t\tscrapper.defFordwaderMetrics.FordwaderScrapeDurationSeconds.WithLabelValues(labels...).Set(duration)\n\t\t\t}\n\t\t}(time.Now().UTC())\n\t\tgeneralScopeErr := \"Error getting data for metrics fordwader\"\n\t\trecorder := httptest.NewRecorder()\n\t\tvar cl client.FordwaderClient\n\t\tif cl, err = scrapper.clientFactory.CreateClient(); err != nil {\n\t\t\terrCause := \"can not create client\"\n\t\t\treturn data, util.ErrorFromThisScope(errCause, generalScopeErr)\n\t\t}\n\t\tvar exposedMetricsData []byte\n\t\tif exposedMetricsData, err = cl.GetData(); err != nil {\n\t\t\tlog.WithError(err).Error(\"error getting metrics from service \" + scrapper.GetJobName())\n\t\t\terrCause := \"can not get the data\"\n\t\t\treturn data, util.ErrorFromThisScope(errCause, generalScopeErr)\n\t\t}\n\t\tjob := config.KeyLabelJob\n\t\tinstance := config.KeyLabelInstance\n\t\tprefixed, err := mutil.AppendLables(\n\t\t\tnil,\n\t\t\texposedMetricsData,\n\t\t\t[]*io_prometheus_client.LabelPair{\n\t\t\t\t&io_prometheus_client.LabelPair{\n\t\t\t\t\tName: &job,\n\t\t\t\t\tValue: &scrapper.jobName,\n\t\t\t\t},\n\t\t\t\t&io_prometheus_client.LabelPair{\n\t\t\t\t\tName: &instance,\n\t\t\t\t\tValue: &scrapper.instanceName,\n\t\t\t\t},\n\t\t\t},\n\t\t)\n\t\tif err != nil {\n\t\t\tlog.WithError(err).Errorln(\"Can not append default labels for self metric inside rextporter\")\n\t\t\treturn nil, config.ErrKeyDecodingFile\n\t\t}\n\t\tif count, err := recorder.Write(prefixed); err != nil || count != len(prefixed) {\n\t\t\tif err != nil {\n\t\t\t\tlog.WithError(err).Errorln(\"error writing prefixed content\")\n\t\t\t}\n\t\t\tif count != len(prefixed) {\n\t\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\t\"wrote\": count,\n\t\t\t\t\t\"required\": len(prefixed),\n\t\t\t\t}).Errorln(\"no enough content wrote\")\n\t\t\t\treturn nil, errors.New(\"no enough content wrote\")\n\t\t\t}\n\t\t}\n\t\tif data, err = ioutil.ReadAll(recorder.Body); err != nil {\n\t\t\tlog.WithError(err).Errorln(\"can not read recorded custom data\")\n\t\t\treturn nil, err\n\t\t}\n\t\tsuccessResponse = true\n\t\treturn data, nil\n\t}\n\tif fordwadedMetrics, err := getFordwadedMetrics(); err == nil {\n\t\tval = fordwadedMetrics\n\t} else {\n\t\tlog.WithError(err).Errorln(\"error getting fordwaded metrics\")\n\t}\n\treturn val, nil\n}", "title": "" }, { "docid": "031a192ee35b3932bacc546f98138d8e", "score": "0.45409027", "text": "func (t *TestProvider) StoreMetricsData(metrics *entities.MetricsData, extraTags map[string]string) derrors.Error {\n\tt.LastMetrics = metrics\n\tt.LastTags = extraTags\n\treturn nil\n}", "title": "" }, { "docid": "561f0e9931ec7f0095d81a965eded717", "score": "0.45343637", "text": "func (td *TableData) DataForTable() [][]string {\n\tvar tableRows [][]string\n\ttableRows = append(tableRows, td.header)\n\treturn append(tableRows, td.data...)\n}", "title": "" }, { "docid": "ca19dd03bbd3e3f3eb9aae90e1087ec0", "score": "0.45266682", "text": "func (se *statsExporter) protoMetricToTimeSeries(ctx context.Context, node *commonpb.Node, rsc *resourcepb.Resource, metric *metricspb.Metric, additionalLabels map[string]labelValue) ([]*monitoringpb.TimeSeries, error) {\n\tif metric == nil {\n\t\treturn nil, errNilMetric\n\t}\n\n\tvar resource = rsc\n\tif metric.Resource != nil {\n\t\tresource = metric.Resource\n\t}\n\n\tmappedRes := se.o.MapResource(resourcepbToResource(resource))\n\n\tmetricName, _, _, err := metricProseFromProto(metric)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tmetricType, _ := se.metricTypeFromProto(metricName)\n\tmetricLabelKeys := metric.GetMetricDescriptor().GetLabelKeys()\n\tmetricKind, _ := protoMetricDescriptorTypeToMetricKind(metric)\n\n\ttimeSeries := make([]*monitoringpb.TimeSeries, 0, len(metric.Timeseries))\n\tfor _, protoTimeSeries := range metric.Timeseries {\n\t\tsdPoints, err := se.protoTimeSeriesToMonitoringPoints(protoTimeSeries, metricKind)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\t// Each TimeSeries has labelValues which MUST be correlated\n\t\t// with that from the MetricDescriptor\n\t\tlabels, err := labelsPerTimeSeries(additionalLabels, metricLabelKeys, protoTimeSeries.GetLabelValues())\n\t\tif err != nil {\n\t\t\t// TODO: (@odeke-em) perhaps log this error from labels extraction, if non-nil.\n\t\t\tcontinue\n\t\t}\n\t\ttimeSeries = append(timeSeries, &monitoringpb.TimeSeries{\n\t\t\tMetric: &googlemetricpb.Metric{\n\t\t\t\tType: metricType,\n\t\t\t\tLabels: labels,\n\t\t\t},\n\t\t\tResource: mappedRes,\n\t\t\tPoints: sdPoints,\n\t\t})\n\t}\n\n\treturn timeSeries, nil\n}", "title": "" }, { "docid": "ad0dee3081b1b0cdc9790e76c41a916c", "score": "0.45228165", "text": "func addDataForHighPriorityEvictionTest(s *store.Store) {\n\taMetric := metrics.SimpleList{\n\t\t{\n\t\t\tPath: \"/foo\",\n\t\t\tDescription: \"A description\",\n\t\t},\n\t\t{\n\t\t\tPath: \"/bar\",\n\t\t\tDescription: \"A description\",\n\t\t},\n\t\t{\n\t\t\tPath: \"/baz\",\n\t\t\tDescription: \"A description\",\n\t\t},\n\t}\n\taMetric[0].Value = int64(2)\n\taMetric[1].Value = int64(4)\n\taMetric[2].Value = int64(5)\n\ts.AddBatch(kEndpoint0, 100, aMetric[:].Sorted())\n\taMetric[0].Value = int64(12)\n\taMetric[1].Value = int64(14)\n\taMetric[2].Value = int64(15)\n\ts.AddBatch(kEndpoint0, 110, aMetric[:].Sorted())\n\taMetric[0].Value = int64(22)\n\taMetric[1].Value = int64(24)\n\ts.AddBatch(kEndpoint0, 120, aMetric[:2].Sorted())\n\taMetric[0].Value = int64(32)\n\taMetric[1].Value = int64(34)\n\ts.AddBatch(kEndpoint0, 130, aMetric[:2].Sorted())\n}", "title": "" }, { "docid": "b20dd800720f0ac2e573022a5d633582", "score": "0.45176658", "text": "func (se *statsExporter) metricToMpbTs(ctx context.Context, metric *metricdata.Metric) ([]*monitoringpb.TimeSeries, error) {\n\tif metric == nil {\n\t\treturn nil, errNilMetricOrMetricDescriptor\n\t}\n\n\tresource := se.metricRscToMpbRsc(metric.Resource)\n\n\tmetricName := metric.Descriptor.Name\n\tmetricType := se.metricTypeFromProto(metricName)\n\tmetricLabelKeys := metric.Descriptor.LabelKeys\n\tmetricKind, _ := metricDescriptorTypeToMetricKind(metric)\n\n\tif metricKind == googlemetricpb.MetricDescriptor_METRIC_KIND_UNSPECIFIED {\n\t\t// ignore these Timeserieses. TODO [rghetia] log errors.\n\t\treturn nil, nil\n\t}\n\n\ttimeSeries := make([]*monitoringpb.TimeSeries, 0, len(metric.TimeSeries))\n\tfor _, ts := range metric.TimeSeries {\n\t\tsdPoints, err := se.metricTsToMpbPoint(ts, metricKind)\n\t\tif err != nil {\n\t\t\t// TODO(@rghetia): record error metrics\n\t\t\tcontinue\n\t\t}\n\n\t\t// Each TimeSeries has labelValues which MUST be correlated\n\t\t// with that from the MetricDescriptor\n\t\tlabels, err := metricLabelsToTsLabels(se.defaultLabels, metricLabelKeys, ts.LabelValues)\n\t\tif err != nil {\n\t\t\t// TODO: (@rghetia) perhaps log this error from labels extraction, if non-nil.\n\t\t\tcontinue\n\t\t}\n\n\t\tvar rsc *monitoredrespb.MonitoredResource\n\t\tvar mr monitoredresource.Interface\n\t\tif se.o.ResourceByDescriptor != nil {\n\t\t\tlabels, mr = se.o.ResourceByDescriptor(&metric.Descriptor, labels)\n\t\t\t// TODO(rghetia): optimize this. It is inefficient to convert this for all metrics.\n\t\t\trsc = convertMonitoredResourceToPB(mr)\n\t\t\tif rsc.Type == \"\" {\n\t\t\t\trsc.Type = \"global\"\n\t\t\t\trsc.Labels = nil\n\t\t\t}\n\t\t} else {\n\t\t\trsc = resource\n\t\t}\n\t\ttimeSeries = append(timeSeries, &monitoringpb.TimeSeries{\n\t\t\tMetric: &googlemetricpb.Metric{\n\t\t\t\tType: metricType,\n\t\t\t\tLabels: labels,\n\t\t\t},\n\t\t\tResource: rsc,\n\t\t\tPoints: sdPoints,\n\t\t})\n\t}\n\n\treturn timeSeries, nil\n}", "title": "" }, { "docid": "1f3145554b4f6bc30f14ab4978d88f48", "score": "0.4517422", "text": "func (manager *Manager) createData(confirmedCases, recoveredCases, deathCases data.Series) []dataRow {\n counter := 0\n\n dataRows := make([]dataRow, 0)\n for _, r := range confirmedCases.Records {\n counter++\n row := dataRow{records: make([]interface{}, 0)}\n location := Location{\n Country: r.Country,\n State: r.State,\n Long: r.Longitude,\n Lat: r.Latitude,\n }\n row.location = location\n\n for _, d := range r.Data {\n record := Record{\n Date: d.Date,\n Confirmed: d.Value,\n Recovered: recoveredCases.GetValueOfDate(r.Country, r.State, d.Date),\n Deaths: deathCases.GetValueOfDate(r.Country, r.State, d.Date),\n LocationID: uint(counter),\n }\n row.records = append(row.records, record)\n }\n\n dataRows = append(dataRows, row)\n }\n\n return dataRows\n}", "title": "" }, { "docid": "0862d58180fd833d87d881860163a1d0", "score": "0.45170912", "text": "func (mc *StaticMetricCollector) getMetricData() ([]blockdevice.BlockDevice, error) {\n\tbdList, err := mc.Client.ListBlockDevice()\n\tif err != nil {\n\t\tglog.Error(\"error listing BDs for metrics collection. \", err)\n\t\treturn nil, err\n\t}\n\n\tglog.V(4).Infof(\"No. of BlockDevices fetched from etcd: %d\", len(bdList))\n\n\t// convert the BD api to BlockDevice struct used by NDM internally\n\tblockDevices := make([]blockdevice.BlockDevice, 0)\n\tfor _, bd := range bdList {\n\t\t// metrics will not be exposed for sparse block devices\n\t\tif bd.Spec.Details.DeviceType == blockdevice.SparseBlockDeviceType {\n\t\t\tcontinue\n\t\t}\n\t\tblockDevice := blockdevice.BlockDevice{\n\t\t\tNodeAttributes: make(blockdevice.NodeAttribute, 0),\n\t\t}\n\t\t// copy values from api to BlockDevice struct\n\t\tblockDevice.UUID = bd.Name\n\t\tblockDevice.NodeAttributes[blockdevice.HostName] = bd.Labels[controller.KubernetesHostNameLabel]\n\t\tblockDevice.NodeAttributes[blockdevice.NodeName] = bd.Spec.NodeAttributes.NodeName\n\t\tblockDevice.Path = bd.Spec.Path\n\t\t// setting the block device status\n\t\tblockDevice.Status.State = string(bd.Status.State)\n\t\tblockDevices = append(blockDevices, blockDevice)\n\t\tglog.V(4).Infof(\"BlockDevice %+v processed\", blockDevice)\n\t}\n\treturn blockDevices, nil\n}", "title": "" }, { "docid": "420f5bff33f772bff28d81a3a2e7d95d", "score": "0.45155007", "text": "func decodeMetric(ptr unsafe.Pointer, iter *jsoniter.Iterator) {\n\tmapPtr := (*model.Metric)(ptr)\n\t*mapPtr = make(model.Metric, 10)\n\titer.ReadMapCB(func(iter *jsoniter.Iterator, key string) bool {\n\t\tvalue := iter.ReadString()\n\t\t(*mapPtr)[model.LabelName(key)] = model.LabelValue(value)\n\t\treturn true\n\t})\n}", "title": "" }, { "docid": "1f3f7db54e0c8ab8a4717bc959128093", "score": "0.45154676", "text": "func addMemoryUnits(data *map[string]interface{}, memory uint64) error {\n\tunits := map[string]string{\n\t\t\"GB\": \"gb\",\n\t\t\"MB\": \"mb\",\n\t\t\"B\": \"bytes\",\n\t}\n\n\tfor unit, unitLabel := range units {\n\t\tconvertedMemory, _, err := common.ConvertBytesTo(memory, unit)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t(*data)[unitLabel] = fmt.Sprintf(\"%.2f\", convertedMemory)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "44b4755ffaaa0a4c04e226e65de958d0", "score": "0.45136672", "text": "func mapMetrics(m []string) []*ga.Metric {\n\tgam := make([]*ga.Metric, len(m))\n\n\tfor k, v := range m {\n\t\tgam[k] = &ga.Metric{Expression: strings.TrimSpace(mapMetric(v))}\n\t}\n\n\treturn gam\n}", "title": "" }, { "docid": "de5e7926bfdf51eb0341815a0725196a", "score": "0.45114142", "text": "func MetricsHandler(w http.ResponseWriter, r *http.Request) {\n\tlog.Printf(\"Request received : %v\", r.URL.Path)\n\tbytes, err := json.Marshal(metrics)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tlog.Printf(\"Payload > %s\", string(bytes))\n\tw.Write(bytes)\n}", "title": "" }, { "docid": "15e3cb68a1ac4f6cc90af9b47e487eef", "score": "0.45026326", "text": "func (pnid *PRINTER_NOTIFY_INFO_DATA) ToNotifyInfoData() *NotifyInfoData {\n\tp := &NotifyInfoData{\n\t\tType: pnid.Type,\n\t\tField: pnid.Field,\n\t\tID: pnid.ID,\n\t}\n\n\tif pnid.Type == JOB_NOTIFY_TYPE {\n\t\tswitch pnid.Field {\n\t\tcase JOB_NOTIFY_FIELD_PRINTER_NAME,\n\t\t\tJOB_NOTIFY_FIELD_MACHINE_NAME,\n\t\t\tJOB_NOTIFY_FIELD_PORT_NAME,\n\t\t\tJOB_NOTIFY_FIELD_USER_NAME,\n\t\t\tJOB_NOTIFY_FIELD_NOTIFY_NAME,\n\t\t\tJOB_NOTIFY_FIELD_DATATYPE,\n\t\t\tJOB_NOTIFY_FIELD_PRINT_PROCESSOR,\n\t\t\tJOB_NOTIFY_FIELD_PARAMETERS,\n\t\t\tJOB_NOTIFY_FIELD_DRIVER_NAME,\n\t\t\tJOB_NOTIFY_FIELD_STATUS_STRING,\n\t\t\tJOB_NOTIFY_FIELD_DOCUMENT:\n\t\t\tchars := pnid.NotifyData.Datasz / 2\n\t\t\tps := ((*[0xffff]uint16)(pnid.NotifyData.Dataptr))[:chars:chars]\n\t\t\tp.Value = syscall.UTF16ToString(ps)\n\t\tcase JOB_NOTIFY_FIELD_STATUS,\n\t\t\tJOB_NOTIFY_FIELD_PRIORITY,\n\t\t\tJOB_NOTIFY_FIELD_POSITION,\n\t\t\tJOB_NOTIFY_FIELD_START_TIME,\n\t\t\tJOB_NOTIFY_FIELD_UNTIL_TIME,\n\t\t\tJOB_NOTIFY_FIELD_TIME,\n\t\t\tJOB_NOTIFY_FIELD_TOTAL_PAGES,\n\t\t\tJOB_NOTIFY_FIELD_PAGES_PRINTED,\n\t\t\tJOB_NOTIFY_FIELD_TOTAL_BYTES,\n\t\t\tJOB_NOTIFY_FIELD_BYTES_PRINTED:\n\t\t\tp.Value = uint32(pnid.NotifyData.Datasz)\n\t\tcase JOB_NOTIFY_FIELD_DEVMODE:\n\t\t\t// TODO pnid.NotifyData.Dataptr is a pointer to a DEVMODE structure that contains device-initialization and environment data for the printer driver.\n\t\tcase JOB_NOTIFY_FIELD_SECURITY_DESCRIPTOR:\n\t\t\t// TODO Not supported according to https://docs.microsoft.com/en-us/windows/desktop/printdocs/printer-notify-info-data , though does seem to be something there\n\t\tcase JOB_NOTIFY_FIELD_SUBMITTED:\n\t\t\tp.Value = systemTimeToTime((*syscall.Systemtime)(pnid.NotifyData.Dataptr), true)\n\t\tdefault:\n\t\t}\n\t}\n\n\treturn p\n}", "title": "" }, { "docid": "675b98711daf67a427e3a09e91952b9b", "score": "0.45021394", "text": "func ReportCustomMetric(applicationContext, metricPath string, value int64) {\n\tapplicationContext_s := C.CString(applicationContext)\n\tdefer C.free(unsafe.Pointer(applicationContext_s))\n\n\tmetricPath_s := C.CString(metricPath)\n\tdefer C.free(unsafe.Pointer(metricPath_s))\n\n\tC.appd_custom_metric_report(applicationContext_s, metricPath_s, C.long(value))\n}", "title": "" }, { "docid": "7001ae937cec8b9812620f01dec5b7cd", "score": "0.4492029", "text": "func GetStatisticsOnData(originalRecord [][]string, currentRecord [][]string) map[string]interface{} {\n\n\tcolumnNumbers := len(originalRecord[0])\n\tcolNames := make([]string, columnNumbers)\n\ttotalNumberofRecordsInOriginal := float64(len(originalRecord) - 1)\n\ttotalNumberofRecordsInCurrent := float64(len(originalRecord) - 1)\n\tdataSummaryAndStatistics := make(map[string]interface{}, 0)\n\n\t/*\n\t\tcolDatacollectionStructOriginalChannel := make(chan map[string]dataStatistics)\n\t\tcolDatacollectionStructCurrentChannel := make(chan map[string]dataStatistics)\n\t*/\n\n\tfor i := 0; i < columnNumbers; i++ {\n\t\tcolNames[i] = originalRecord[0][i]\n\t}\n\n\tcolDatacollectionStructOriginal = processAndCollectStatsOnData(colNames, originalRecord, true)\n\tcolDatacollectionStructCurrent = processAndCollectStatsOnData(colNames, currentRecord, false)\n\n\t/*\n\t\tgo processAndCollectStatsOnDataThroughChannels(colNames, originalRecord, true, colDatacollectionStructOriginalChannel)\n\t\tgo processAndCollectStatsOnDataThroughChannels(colNames, originalRecord, false, colDatacollectionStructCurrentChannel)\n\n\t\tcolDatacollectionStructOriginal = <-colDatacollectionStructOriginalChannel\n\t\tcolDatacollectionStructCurrent = <-colDatacollectionStructCurrentChannel\n\t*/\n\n\tstabilityIndexValues := calculateOverallStabilityIndex(colNames, totalNumberofRecordsInOriginal, totalNumberofRecordsInCurrent)\n\n\tdataSummaryAndStatistics[\"OriginalData\"] = colDatacollectionStructOriginal\n\tdataSummaryAndStatistics[\"CurrentData\"] = colDatacollectionStructCurrent\n\tdataSummaryAndStatistics[\"StabilityIndexValues\"] = stabilityIndexValues\n\n\treturn dataSummaryAndStatistics\n}", "title": "" }, { "docid": "481e8e77c2936ec8c2ee2e188873d6d1", "score": "0.4490488", "text": "func (table *Table) writeLoadColumns(buf *bytes.Buffer, valueType reflect.Type) error {\n\tif err := buf.WriteByte('['); err != nil {\n\t\treturn err\n\t}\n\tneedsDelimiter := false\n\tfor i := 0; i < valueType.NumField(); i++ {\n\t\tfield := valueType.Field(i)\n\t\tcolumnName := field.Tag.Get(\"grngo\")\n\t\tif columnName == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tif needsDelimiter {\n\t\t\tif err := buf.WriteByte(','); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t} else {\n\t\t\tneedsDelimiter = true\n\t\t}\n\t\tif _, err := fmt.Fprintf(buf, \"\\\"%s\\\"\", columnName); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif err := buf.WriteByte(']'); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2a9a2efe53f51c5bc9a88e3351ebe074", "score": "0.44897044", "text": "func (a *MetricsApiService) PostPagesPageIdMetricsData(ctx _context.Context, pageId string) ApiPostPagesPageIdMetricsDataRequest {\n\treturn ApiPostPagesPageIdMetricsDataRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tpageId: pageId,\n\t}\n}", "title": "" }, { "docid": "7569d53ff4fcb65365168e39fb075fe5", "score": "0.44854838", "text": "func (client *Client) DescribeMetricDataWithOptions(request *DescribeMetricDataRequest, runtime *util.RuntimeOptions) (_result *DescribeMetricDataResponse, _err error) {\n\t_err = util.ValidateModel(request)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\tquery := map[string]interface{}{}\n\tif !tea.BoolValue(util.IsUnset(request.Dimensions)) {\n\t\tquery[\"Dimensions\"] = request.Dimensions\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.EndTime)) {\n\t\tquery[\"EndTime\"] = request.EndTime\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Express)) {\n\t\tquery[\"Express\"] = request.Express\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Length)) {\n\t\tquery[\"Length\"] = request.Length\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.MetricName)) {\n\t\tquery[\"MetricName\"] = request.MetricName\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Namespace)) {\n\t\tquery[\"Namespace\"] = request.Namespace\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.Period)) {\n\t\tquery[\"Period\"] = request.Period\n\t}\n\n\tif !tea.BoolValue(util.IsUnset(request.StartTime)) {\n\t\tquery[\"StartTime\"] = request.StartTime\n\t}\n\n\treq := &openapi.OpenApiRequest{\n\t\tQuery: openapiutil.Query(query),\n\t}\n\tparams := &openapi.Params{\n\t\tAction: tea.String(\"DescribeMetricData\"),\n\t\tVersion: tea.String(\"2019-01-01\"),\n\t\tProtocol: tea.String(\"HTTPS\"),\n\t\tPathname: tea.String(\"/\"),\n\t\tMethod: tea.String(\"POST\"),\n\t\tAuthType: tea.String(\"AK\"),\n\t\tStyle: tea.String(\"RPC\"),\n\t\tReqBodyType: tea.String(\"formData\"),\n\t\tBodyType: tea.String(\"json\"),\n\t}\n\t_result = &DescribeMetricDataResponse{}\n\t_body, _err := client.CallApi(params, req, runtime)\n\tif _err != nil {\n\t\treturn _result, _err\n\t}\n\t_err = tea.Convert(_body, &_result)\n\treturn _result, _err\n}", "title": "" }, { "docid": "5f36cbc232e50f3760b542c5833caf64", "score": "0.44849354", "text": "func (e *Exporter) scrapeGenericValues(db *sql.DB, ch chan<- prometheus.Metric, context string, labels []string,\n\tmetricsDesc map[string]string, metricsType map[string]string, metricsBuckets map[string]map[string]string, fieldToAppend string, ignoreZeroResult bool, request string) error {\n\tmetricsCount := 0\n\tgenericParser := func(row map[string]string) error {\n\t\t// Construct labels value\n\t\tlabelsValues := []string{}\n\t\tfor _, label := range labels {\n\t\t\tlabelsValues = append(labelsValues, row[label])\n\t\t}\n\t\t// Construct Prometheus values to sent back\n\t\tfor metric, metricHelp := range metricsDesc {\n\t\t\tvalue, err := strconv.ParseFloat(strings.TrimSpace(row[metric]), 64)\n\t\t\t// If not a float, skip current metric\n\t\t\tif err != nil {\n\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert current value to float (metric=\" + metric +\n\t\t\t\t\t\",metricHelp=\" + metricHelp + \",value=<\" + row[metric] + \">)\")\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tlevel.Debug(e.logger).Log(\"Query result looks like: \", value)\n\t\t\t// If metric do not use a field content in metric's name\n\t\t\tif strings.Compare(fieldToAppend, \"\") == 0 {\n\t\t\t\tdesc := prometheus.NewDesc(\n\t\t\t\t\tprometheus.BuildFQName(namespace, context, metric),\n\t\t\t\t\tmetricHelp,\n\t\t\t\t\tlabels, nil,\n\t\t\t\t)\n\t\t\t\tif metricsType[strings.ToLower(metric)] == \"histogram\" {\n\t\t\t\t\tcount, err := strconv.ParseUint(strings.TrimSpace(row[\"count\"]), 10, 64)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert count value to int (metric=\" + metric +\n\t\t\t\t\t\t\t\",metricHelp=\" + metricHelp + \",value=<\" + row[\"count\"] + \">)\")\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tbuckets := make(map[float64]uint64)\n\t\t\t\t\tfor field, le := range metricsBuckets[metric] {\n\t\t\t\t\t\tlelimit, err := strconv.ParseFloat(strings.TrimSpace(le), 64)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert bucket limit value to float (metric=\" + metric +\n\t\t\t\t\t\t\t\t\",metricHelp=\" + metricHelp + \",bucketlimit=<\" + le + \">)\")\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tcounter, err := strconv.ParseUint(strings.TrimSpace(row[field]), 10, 64)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert \", field, \" value to int (metric=\"+metric+\n\t\t\t\t\t\t\t\t\",metricHelp=\"+metricHelp+\",value=<\"+row[field]+\">)\")\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tbuckets[lelimit] = counter\n\t\t\t\t\t}\n\t\t\t\t\tch <- prometheus.MustNewConstHistogram(desc, count, value, buckets, labelsValues...)\n\t\t\t\t} else {\n\t\t\t\t\tch <- prometheus.MustNewConstMetric(desc, getMetricType(metric, metricsType), value, labelsValues...)\n\t\t\t\t}\n\t\t\t\t// If no labels, use metric name\n\t\t\t} else {\n\t\t\t\tdesc := prometheus.NewDesc(\n\t\t\t\t\tprometheus.BuildFQName(namespace, context, cleanName(row[fieldToAppend])),\n\t\t\t\t\tmetricHelp,\n\t\t\t\t\tnil, nil,\n\t\t\t\t)\n\t\t\t\tif metricsType[strings.ToLower(metric)] == \"histogram\" {\n\t\t\t\t\tcount, err := strconv.ParseUint(strings.TrimSpace(row[\"count\"]), 10, 64)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert count value to int (metric=\" + metric +\n\t\t\t\t\t\t\t\",metricHelp=\" + metricHelp + \",value=<\" + row[\"count\"] + \">)\")\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t\tbuckets := make(map[float64]uint64)\n\t\t\t\t\tfor field, le := range metricsBuckets[metric] {\n\t\t\t\t\t\tlelimit, err := strconv.ParseFloat(strings.TrimSpace(le), 64)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert bucket limit value to float (metric=\" + metric +\n\t\t\t\t\t\t\t\t\",metricHelp=\" + metricHelp + \",bucketlimit=<\" + le + \">)\")\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tcounter, err := strconv.ParseUint(strings.TrimSpace(row[field]), 10, 64)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tlevel.Error(e.logger).Log(\"Unable to convert \", field, \" value to int (metric=\"+metric+\n\t\t\t\t\t\t\t\t\",metricHelp=\"+metricHelp+\",value=<\"+row[field]+\">)\")\n\t\t\t\t\t\t\tcontinue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tbuckets[lelimit] = counter\n\t\t\t\t\t}\n\t\t\t\t\tch <- prometheus.MustNewConstHistogram(desc, count, value, buckets)\n\t\t\t\t} else {\n\t\t\t\t\tch <- prometheus.MustNewConstMetric(desc, getMetricType(metric, metricsType), value)\n\t\t\t\t}\n\t\t\t}\n\t\t\tmetricsCount++\n\t\t}\n\t\treturn nil\n\t}\n\tlevel.Debug(e.logger).Log(\"Calling function GeneratePrometheusMetrics()\")\n\terr := e.generatePrometheusMetrics(db, genericParser, request)\n\tlevel.Debug(e.logger).Log(\"ScrapeGenericValues() - metricsCount: \", metricsCount)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !ignoreZeroResult && metricsCount == 0 {\n\t\treturn errors.New(\"No metrics found while parsing\")\n\t}\n\treturn err\n}", "title": "" }, { "docid": "605ebc6964a1be0217668bab017a513f", "score": "0.44800445", "text": "func ParseCustomMetric(value, metric string) (*Metric, error) {\n\tsample, err := strconv.ParseFloat(value, 64)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to parse value: %v\", err)\n\t}\n\tnameUnit := strings.Split(metric, \".\")\n\tif len(nameUnit) != 2 {\n\t\treturn nil, fmt.Errorf(\"failed to parse metric: %s\", metric)\n\t}\n\treturn &Metric{Name: nameUnit[0], Unit: nameUnit[1], Sample: sample}, nil\n}", "title": "" } ]
23955fefe25e9482d2f5840b7467c785
ConfigGui configures the GoGi gui interface for this simulation,
[ { "docid": "af62cc61bee8723b6b0628cab68fd6a5", "score": "0.71823406", "text": "func (ss *Sim) ConfigGui() *gi.Window {\n\twidth := 1600\n\theight := 1200\n\n\t// gi.WinEventTrace = true\n\n\tgi.SetAppName(\"distplot\")\n\tgi.SetAppAbout(`This plots histograms of random distributions. See <a href=\"https://github.com/emer/emergent\">emergent on GitHub</a>.</p>`)\n\n\twin := gi.NewMainWindow(\"distplot\", \"Plotting Random Distributions\", width, height)\n\tss.Win = win\n\n\tvp := win.WinViewport2D()\n\tupdt := vp.UpdateStart()\n\n\tmfr := win.SetMainFrame()\n\n\ttbar := gi.AddNewToolBar(mfr, \"tbar\")\n\ttbar.SetStretchMaxWidth()\n\tss.ToolBar = tbar\n\n\tsplit := gi.AddNewSplitView(mfr, \"split\")\n\tsplit.Dim = mat32.X\n\tsplit.SetStretchMax()\n\n\tsv := giv.AddNewStructView(split, \"sv\")\n\tsv.SetStruct(ss)\n\n\ttv := gi.AddNewTabView(split, \"tv\")\n\n\tplt := tv.AddNewTab(eplot.KiT_Plot2D, \"Histogram\").(*eplot.Plot2D)\n\tss.Plot = ss.ConfigPlot(plt, ss.Hist)\n\n\tsplit.SetSplits(.3, .7)\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Run\", Icon: \"update\", Tooltip: \"Generate data and plot histogram.\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tss.Run()\n\t\tvp.SetNeedsFullRender()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"README\", Icon: \"file-markdown\", Tooltip: \"Opens your browser on the README file that contains instructions for how to run this model.\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tgi.OpenURL(\"https://github.com/emer/emergent/blob/master/erand/distplot/README.md\")\n\t\t})\n\n\tvp.UpdateEndNoSig(updt)\n\n\t// main menu\n\tappnm := gi.AppName()\n\tmmen := win.MainMenu\n\tmmen.ConfigMenus([]string{appnm, \"File\", \"Edit\", \"Window\"})\n\n\tamen := win.MainMenu.ChildByName(appnm, 0).(*gi.Action)\n\tamen.Menu.AddAppMenu(win)\n\n\temen := win.MainMenu.ChildByName(\"Edit\", 1).(*gi.Action)\n\temen.Menu.AddCopyCutPaste(win)\n\n\twin.MainMenuUpdated()\n\treturn win\n}", "title": "" } ]
[ { "docid": "c0a018df3e038d9753522a490ad2923f", "score": "0.7577933", "text": "func (ss *Sim) ConfigGui() *gi.Window {\n\twidth := 1600\n\theight := 1200\n\n\tgi.SetAppName(\"dyslex\")\n\tgi.SetAppAbout(`Simulates normal and disordered (dyslexic) reading performance in terms of a distributed representation of word-level knowledge across Orthography, Semantics, and Phonology. It is based on a model by Plaut and Shallice (1993). Note that this form of dyslexia is *aquired* (via brain lesions such as stroke) and not the more prevalent developmental variety. See <a href=\"https://github.com/CompCogNeuro/sims/blob/master/ch9/dyslex/README.md\">README.md on GitHub</a>.</p>`)\n\n\twin := gi.NewMainWindow(\"dyslex\", \"Dyslex\", width, height)\n\tss.Win = win\n\n\tvp := win.WinViewport2D()\n\tupdt := vp.UpdateStart()\n\n\tmfr := win.SetMainFrame()\n\n\ttbar := gi.AddNewToolBar(mfr, \"tbar\")\n\ttbar.SetStretchMaxWidth()\n\tss.ToolBar = tbar\n\n\tsplit := gi.AddNewSplitView(mfr, \"split\")\n\tsplit.Dim = mat32.X\n\tsplit.SetStretchMax()\n\n\tsv := giv.AddNewStructView(split, \"sv\")\n\tsv.SetStruct(ss)\n\n\ttv := gi.AddNewTabView(split, \"tv\")\n\n\tnv := tv.AddNewTab(netview.KiT_NetView, \"NetView\").(*netview.NetView)\n\tnv.Var = \"Act\"\n\tnv.SetNet(ss.Net)\n\tss.NetView = nv\n\tss.ConfigNetView(nv)\n\n\tplt := tv.AddNewTab(eplot.KiT_Plot2D, \"TrnEpcPlot\").(*eplot.Plot2D)\n\tss.TrnEpcPlot = ss.ConfigTrnEpcPlot(plt, ss.TrnEpcLog)\n\n\tplt = tv.AddNewTab(eplot.KiT_Plot2D, \"TstTrlPlot\").(*eplot.Plot2D)\n\tss.TstTrlPlot = ss.ConfigTstTrlPlot(plt, ss.TstTrlLog)\n\n\tplt = tv.AddNewTab(eplot.KiT_Plot2D, \"TstEpcPlot\").(*eplot.Plot2D)\n\tss.TstEpcPlot = ss.ConfigTstEpcPlot(plt, ss.TstEpcLog)\n\n\tplt = tv.AddNewTab(eplot.KiT_Plot2D, \"RunPlot\").(*eplot.Plot2D)\n\tss.RunPlot = ss.ConfigRunPlot(plt, ss.RunLog)\n\n\tsplit.SetSplits(.2, .8)\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Init\", Icon: \"update\", Tooltip: \"Initialize everything including network weights, and start over. Also applies current params.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tss.Init()\n\t\tvp.SetNeedsFullRender()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Train\", Icon: \"run\", Tooltip: \"Starts the network training, picking up from wherever it may have left off. If not stopped, training will complete the specified number of Runs through the full number of Epochs of training, with testing automatically occuring at the specified interval.\",\n\t\tUpdateFunc: func(act *gi.Action) {\n\t\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\ttbar.UpdateActions()\n\t\t\t// ss.Train()\n\t\t\tgo ss.Train()\n\t\t}\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Stop\", Icon: \"stop\", Tooltip: \"Interrupts running. Hitting Train again will pick back up where it left off.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tss.Stop()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Step Trial\", Icon: \"step-fwd\", Tooltip: \"Advances one training trial at a time.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\tss.TrainTrial()\n\t\t\tss.IsRunning = false\n\t\t\tvp.SetNeedsFullRender()\n\t\t}\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Step Epoch\", Icon: \"fast-fwd\", Tooltip: \"Advances one epoch (complete set of training patterns) at a time.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\ttbar.UpdateActions()\n\t\t\tgo ss.TrainEpoch()\n\t\t}\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Step Run\", Icon: \"fast-fwd\", Tooltip: \"Advances one full training Run at a time.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\ttbar.UpdateActions()\n\t\t\tgo ss.TrainRun()\n\t\t}\n\t})\n\n\ttbar.AddSeparator(\"test\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Test Trial\", Icon: \"step-fwd\", Tooltip: \"Runs the next testing trial.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\tss.TestTrial(false) // don't break on chg\n\t\t\tss.IsRunning = false\n\t\t\tvp.SetNeedsFullRender()\n\t\t}\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Test Item\", Icon: \"step-fwd\", Tooltip: \"Prompts for a specific input pattern name to run, and runs it in testing mode.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgi.StringPromptDialog(vp, \"\", \"Test Item\",\n\t\t\tgi.DlgOpts{Title: \"Test Item\", Prompt: \"Enter the Name of a given input pattern to test (case insensitive, contains given string.\"},\n\t\t\twin.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tdlg := send.(*gi.Dialog)\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tval := gi.StringPromptDialogValue(dlg)\n\t\t\t\t\tidxs := ss.TestEnv.Table.RowsByString(\"Name\", val, etable.Contains, etable.IgnoreCase)\n\t\t\t\t\tif len(idxs) == 0 {\n\t\t\t\t\t\tgi.PromptDialog(nil, gi.DlgOpts{Title: \"Name Not Found\", Prompt: \"No patterns found containing: \" + val}, gi.AddOk, gi.NoCancel, nil, nil)\n\t\t\t\t\t} else {\n\t\t\t\t\t\tif !ss.IsRunning {\n\t\t\t\t\t\t\tss.IsRunning = true\n\t\t\t\t\t\t\tfmt.Printf(\"testing index: %v\\n\", idxs[0])\n\t\t\t\t\t\t\tss.TestItem(idxs[0])\n\t\t\t\t\t\t\tss.IsRunning = false\n\t\t\t\t\t\t\tvp.SetNeedsFullRender()\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Test All\", Icon: \"fast-fwd\", Tooltip: \"Tests all of the testing trials.\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif !ss.IsRunning {\n\t\t\tss.IsRunning = true\n\t\t\ttbar.UpdateActions()\n\t\t\tgo ss.RunTestAll()\n\t\t}\n\t})\n\n\ttbar.AddSeparator(\"log\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Open Trained Wts\", Icon: \"update\", Tooltip: \"open weights trained for 250 epochs with default params\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!ss.IsRunning)\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tss.OpenTrainedWts()\n\t\tvp.SetNeedsFullRender()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Lesion\", Icon: \"cut\", Tooltip: \"Lesion network\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tgiv.CallMethod(ss, \"LesionNet\", vp)\n\t\t\tvp.SetNeedsFullRender()\n\t\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Reset RunLog\", Icon: \"update\", Tooltip: \"Reset the accumulated log of all Runs, which are tagged with the ParamSet used\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tss.RunLog.SetNumRows(0)\n\t\t\tss.RunPlot.Update()\n\t\t})\n\n\ttbar.AddSeparator(\"anal\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Cluster Plot\", Icon: \"file-image\", Tooltip: \"run cluster plot on input patterns.\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tss.ClustPlots()\n\t\t\tvp.SetNeedsFullRender()\n\t\t})\n\n\ttbar.AddSeparator(\"misc\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"New Seed\", Icon: \"new\", Tooltip: \"Generate a new initial random seed to get different results. By default, Init re-establishes the same initial seed every time.\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tss.NewRndSeed()\n\t\t\tvp.SetNeedsFullRender()\n\t\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"README\", Icon: \"file-markdown\", Tooltip: \"Opens your browser on the README file that contains instructions for how to run this model.\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tgi.OpenURL(\"https://github.com/CompCogNeuro/sims/blob/master/ch9/dyslex/README.md\")\n\t\t})\n\n\tvp.UpdateEndNoSig(updt)\n\n\t// main menu\n\tappnm := gi.AppName()\n\tmmen := win.MainMenu\n\tmmen.ConfigMenus([]string{appnm, \"File\", \"Edit\", \"Window\"})\n\n\tamen := win.MainMenu.ChildByName(appnm, 0).(*gi.Action)\n\tamen.Menu.AddAppMenu(win)\n\n\temen := win.MainMenu.ChildByName(\"Edit\", 1).(*gi.Action)\n\temen.Menu.AddCopyCutPaste(win)\n\n\t// note: Command in shortcuts is automatically translated into Control for\n\t// Linux, Windows or Meta for MacOS\n\t// fmen := win.MainMenu.ChildByName(\"File\", 0).(*gi.Action)\n\t// fmen.Menu.AddAction(gi.ActOpts{Label: \"Open\", Shortcut: \"Command+O\"},\n\t// \twin.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t// \t\tFileViewOpenSVG(vp)\n\t// \t})\n\t// fmen.Menu.AddSeparator(\"csep\")\n\t// fmen.Menu.AddAction(gi.ActOpts{Label: \"Close Window\", Shortcut: \"Command+W\"},\n\t// \twin.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t// \t\twin.Close()\n\t// \t})\n\n\tinQuitPrompt := false\n\tgi.SetQuitReqFunc(func() {\n\t\tif inQuitPrompt {\n\t\t\treturn\n\t\t}\n\t\tinQuitPrompt = true\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Really Quit?\",\n\t\t\tPrompt: \"Are you <i>sure</i> you want to quit and lose any unsaved params, weights, logs, etc?\"}, gi.AddOk, gi.AddCancel,\n\t\t\twin.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgi.Quit()\n\t\t\t\t} else {\n\t\t\t\t\tinQuitPrompt = false\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\t// gi.SetQuitCleanFunc(func() {\n\t// \tfmt.Printf(\"Doing final Quit cleanup here..\\n\")\n\t// })\n\n\tinClosePrompt := false\n\twin.SetCloseReqFunc(func(w *gi.Window) {\n\t\tif inClosePrompt {\n\t\t\treturn\n\t\t}\n\t\tinClosePrompt = true\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Really Close Window?\",\n\t\t\tPrompt: \"Are you <i>sure</i> you want to close the window? This will Quit the App as well, losing all unsaved params, weights, logs, etc\"}, gi.AddOk, gi.AddCancel,\n\t\t\twin.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgi.Quit()\n\t\t\t\t} else {\n\t\t\t\t\tinClosePrompt = false\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\twin.SetCloseCleanFunc(func(w *gi.Window) {\n\t\tgo gi.Quit() // once main window is closed, quit\n\t})\n\n\twin.MainMenuUpdated()\n\treturn win\n}", "title": "" }, { "docid": "be6ba58fa4e62ee3277852914f5473d5", "score": "0.5877673", "text": "func NewGui(\n\tcmn *common.Common,\n\tconfig config.AppConfigurer,\n\tgitVersion *git_commands.GitVersion,\n\tupdater *updates.Updater,\n\tshowRecentRepos bool,\n\tinitialDir string,\n) (*Gui, error) {\n\tgui := &Gui{\n\t\tCommon: cmn,\n\t\tgitVersion: gitVersion,\n\t\tConfig: config,\n\t\tUpdater: updater,\n\t\tstatusManager: status.NewStatusManager(),\n\t\tviewBufferManagerMap: map[string]*tasks.ViewBufferManager{},\n\t\tviewPtmxMap: map[string]*os.File{},\n\t\tshowRecentRepos: showRecentRepos,\n\t\tRepoPathStack: &utils.StringStack{},\n\t\tRepoStateMap: map[Repo]*GuiRepoState{},\n\t\tGuiLog: []string{},\n\n\t\t// originally we could only hide the command log permanently via the config\n\t\t// but now we do it via state. So we need to still support the config for the\n\t\t// sake of backwards compatibility. We're making use of short circuiting here\n\t\tShowExtrasWindow: cmn.UserConfig.Gui.ShowCommandLog && !config.GetAppState().HideCommandLog,\n\t\tMutexes: types.Mutexes{\n\t\t\tRefreshingFilesMutex: &deadlock.Mutex{},\n\t\t\tRefreshingBranchesMutex: &deadlock.Mutex{},\n\t\t\tRefreshingStatusMutex: &deadlock.Mutex{},\n\t\t\tSyncMutex: &deadlock.Mutex{},\n\t\t\tLocalCommitsMutex: &deadlock.Mutex{},\n\t\t\tSubCommitsMutex: &deadlock.Mutex{},\n\t\t\tAuthorsMutex: &deadlock.Mutex{},\n\t\t\tSubprocessMutex: &deadlock.Mutex{},\n\t\t\tPopupMutex: &deadlock.Mutex{},\n\t\t\tPtyMutex: &deadlock.Mutex{},\n\t\t},\n\t\tInitialDir: initialDir,\n\t\tafterLayoutFuncs: make(chan func() error, 1000),\n\t}\n\n\tgui.PopupHandler = popup.NewPopupHandler(\n\t\tcmn,\n\t\tfunc(ctx goContext.Context, opts types.CreatePopupPanelOpts) error {\n\t\t\treturn gui.helpers.Confirmation.CreatePopupPanel(ctx, opts)\n\t\t},\n\t\tfunc() error { return gui.c.Refresh(types.RefreshOptions{Mode: types.ASYNC}) },\n\t\tfunc() error { return gui.State.ContextMgr.Pop() },\n\t\tfunc() types.Context { return gui.State.ContextMgr.Current() },\n\t\tgui.createMenu,\n\t\tfunc(message string, f func(gocui.Task) error) { gui.helpers.AppStatus.WithWaitingStatus(message, f) },\n\t\tfunc(message string) { gui.helpers.AppStatus.Toast(message) },\n\t\tfunc() string { return gui.Views.Confirmation.TextArea.GetContent() },\n\t\tfunc(f func(gocui.Task)) { gui.c.OnWorker(f) },\n\t\tfunc() bool { return gui.c.InDemo() },\n\t)\n\n\tguiCommon := &guiCommon{gui: gui, IPopupHandler: gui.PopupHandler}\n\thelperCommon := &helpers.HelperCommon{IGuiCommon: guiCommon, Common: cmn, IGetContexts: gui}\n\n\tcredentialsHelper := helpers.NewCredentialsHelper(helperCommon)\n\n\tguiIO := oscommands.NewGuiIO(\n\t\tcmn.Log,\n\t\tgui.LogCommand,\n\t\tgui.getCmdWriter,\n\t\tcredentialsHelper.PromptUserForCredential,\n\t)\n\n\tosCommand := oscommands.NewOSCommand(cmn, config, oscommands.GetPlatform(), guiIO)\n\n\tgui.os = osCommand\n\n\t// storing this stuff on the gui for now to ease refactoring\n\t// TODO: reset these controllers upon changing repos due to state changing\n\tgui.c = helperCommon\n\n\tauthors.SetCustomAuthors(gui.UserConfig.Gui.AuthorColors)\n\tif gui.UserConfig.Gui.NerdFontsVersion != \"\" {\n\t\ticons.SetNerdFontsVersion(gui.UserConfig.Gui.NerdFontsVersion)\n\t} else if gui.UserConfig.Gui.ShowIcons {\n\t\ticons.SetNerdFontsVersion(\"2\")\n\t}\n\tpresentation.SetCustomBranches(gui.UserConfig.Gui.BranchColors)\n\n\tgui.BackgroundRoutineMgr = &BackgroundRoutineMgr{gui: gui}\n\tgui.stateAccessor = &StateAccessor{gui: gui}\n\n\treturn gui, nil\n}", "title": "" }, { "docid": "a1387d460a1c42cc1348579aeca5873f", "score": "0.58055836", "text": "func (gr *Grunt) Config() *gi.Window {\n\tgr.New()\n\tgr.RunGruntCmd(\"jobs\", nil)\n\tgr.OpenServer()\n\tgr.OpenJobs()\n\tcwd, _ := os.Getwd()\n\tgr.DirName = giv.DirAndFile(cwd)\n\n\twidth := 1600\n\theight := 1200\n\n\tgi.SetAppName(\"grunti\")\n\tgi.SetAppAbout(`grunti provides an interface to the git-based run tool, grunt. See <a href=\"https://github.com/emer/grunt\">grunt on GitHub</a>.</p>`)\n\n\twin := gi.NewMainWindow(\"grunti\", \"Grunti \"+gr.DirName, width, height)\n\tgr.Win = win\n\n\tvp := win.WinViewport2D()\n\tupdt := vp.UpdateStart()\n\n\tmfr := win.SetMainFrame()\n\n\ttbar := gi.AddNewToolBar(mfr, \"tbar\")\n\ttbar.SetStretchMaxWidth()\n\tgr.ToolBar = tbar\n\n\ttv := gi.AddNewTabView(mfr, \"tv\")\n\tgr.TabView = tv\n\ttv.NoDeleteTabs = true\n\n\tgr.StatLabel = gi.AddNewLabel(mfr, \"status\", \"Status...\")\n\tgr.StatLabel.SetStretchMaxWidth()\n\tgr.StatLabel.Redrawable = true\n\n\tfor i, tb := range gr.Tables {\n\t\ttb.View = tv.AddNewTab(etview.KiT_TableView, Tables(i).String()).(*etview.TableView)\n\t\tgr.ConfigTableView(tb.View)\n\t\ttb.View.SetTable(tb.Table, nil)\n\t}\n\n\tprv := tv.AddNewTab(giv.KiT_StructView, \"Params\").(*giv.StructView)\n\tprv.SetStretchMax()\n\tprv.Viewport = vp\n\tprv.SetStruct(&gr.Params)\n\n\ttb := &giv.TextBuf{}\n\ttb.InitName(tb, \"out-buf\")\n\ttb.Hi.Style = gi.Prefs.Colors.HiStyle\n\ttb.Opts.LineNos = false\n\ttb.Stat() // update markup\n\tgr.OutBuf = tb\n\n\ttlv := tv.AddNewTab(gi.KiT_Layout, \"Output\").(*gi.Layout)\n\ttlv.SetStretchMax()\n\ttxv := giv.AddNewTextView(tlv, \"text-view\")\n\ttxv.Viewport = vp\n\ttxv.SetInactive()\n\ttxv.SetProp(\"font-family\", gi.Prefs.MonoFont)\n\ttxv.SetBuf(tb)\n\tgr.OutView = txv\n\n\trsv := tv.AddNewTab(giv.KiT_TableView, \"Results\").(*giv.TableView)\n\trsv.SetStretchMax()\n\trsv.Viewport = vp\n\trsv.SetSlice(&gr.ResList)\n\tgr.ResView = rsv\n\n\trsv.WidgetSig.ConnectOnly(tv.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif sig != int64(gi.WidgetSelected) {\n\t\t\treturn\n\t\t}\n\t\tsels := gr.SelectedJobs(false)\n\t\tif len(sels) == 0 {\n\t\t\tgr.StatusMsg(\"no jobs selected\")\n\t\t} else {\n\t\t\tseltxt := strings.Join(sels, \" \")\n\t\t\tgr.StatusMsg(\"jobs selected: \" + seltxt)\n\t\t}\n\t})\n\n\tplt := tv.AddNewTab(eplot.KiT_Plot2D, \"Plot\").(*eplot.Plot2D)\n\tplt.SetStretchMax()\n\tgr.Plot = plt\n\tgr.Plot.Params.CopyFrom(&gr.Params.Plot)\n\n\t// toolbar\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Pull\", Icon: \"update\", Tooltip: \"pull updates that might have been pushed from the server, for both results and jobs\", UpdateFunc: func(act *gi.Action) {\n\t\tact.SetActiveStateUpdt(!gr.InAutoUpdt())\n\t}}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Pull()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Status\", Icon: \"file-exe\", Tooltip: \"ping server for updated status of all Active jobs (regardless of current selection), or selected jobs if Done tab is selected\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Status()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddSeparator(\"res-sep\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Results\", Icon: \"file-upload\", Tooltip: \"tell server to commit latest results from all Active jobs (regardless of current selection), or selected jobs if Done tab selected\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Results()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Open...\", Icon: \"file-open\", Tooltip: \"open results from selected job(s), according to file names containing given string -- results must be linked into gresults (auto by Results, see Link cmd)\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgiv.CallMethod(gr, \"OpenResults\", vp)\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Plot\", Icon: \"image\", Tooltip: \"plot selected (or all if none selected) opened Results in Results tab -- if multiple selected, they are merged into a single table and plotted by JobId\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.PlotResults()\n\t})\n\n\ttbar.AddSeparator(\"job-sep\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Submit...\", Icon: \"plus\", Tooltip: \"Submit a new job for running on server\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgiv.CallMethod(gr, \"Submit\", vp)\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Cancel\", Icon: \"cancel\", Tooltip: \"cancel selected jobs\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tsels := gr.SelectedJobs(false)\n\t\tseltxt := strings.Join(sels, \" \")\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Cancel: Confirm\", Prompt: \"Are you <i>sure</i> you want to cancel these job(s): \" + seltxt}, gi.AddOk, gi.AddCancel,\n\t\t\tvp.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgr.Cancel()\n\t\t\t\t\ttbar.UpdateActions()\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddSeparator(\"file-sep\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Open Dir\", Icon: \"folder\", Tooltip: \"open job directory in default OS app (Finder / File Manger)\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.OpenDir()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Out\", Icon: \"info\", Tooltip: \"show output of selected job in Output tab\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Output()\n\t\tgr.ShowOutput()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"List\", Icon: \"file-text\", Tooltip: \"shows list of files associated with job(s) in Output tab\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.List()\n\t\tgr.ShowOutput()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Files\", Icon: \"file-download\", Tooltip: \"gets specific files as listed (space separated) into results, for files that are not automatically copied by grunter.py script -- use List to see list of files on server\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgiv.CallMethod(gr, \"Files\", vp)\n\t})\n\n\ttbar.AddSeparator(\"misc-sep\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Message\", Icon: \"edit\", Tooltip: \"edit the job message for one selected job\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Message()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Diff\", Icon: \"file-text\", Tooltip: \"displays the diffs between either given job and current directory, or between two jobs dirs in Output tab\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Diff()\n\t\tgr.ShowOutput()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Link\", Icon: \"folder\", Tooltip: \"make symbolic links into local gresults/jobid for job results -- this makes it easier to access the results -- this happens automatically in Results cmd\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.Link()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Misc\", Icon: \"run\", Tooltip: \"run a misc command that is supported by local grunter.py file\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgiv.CallMethod(gr, \"MiscCmd\", vp)\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Queue\", Icon: \"info\", Tooltip: \"gets job queue information from the server -- queue command in grunter.py\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.ShowOutput()\n\t\tgr.Queue()\n\t\ttbar.UpdateActions()\n\t})\n\n\ttbar.AddSeparator(\"del-sep\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Nuke!\", Icon: \"cancel\", Tooltip: \"deletes given job directory (jobs and results) -- use carefully: could result in permanent loss of non-comitted data! useful for mistakes etc -- better to use delete for no-longer-relevant but valid jobs\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Nuke: Confirm\", Prompt: \"Are you <i>sure</i> you want to nuke job(s) -- this could result in permanent deletion of non-committed files!\"}, gi.AddOk, gi.AddCancel,\n\t\t\tvp.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgr.Nuke()\n\t\t\t\t\ttbar.UpdateActions()\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Delete\", Icon: \"cut\", Tooltip: \"moves job directory from active to delete subdir, deletes results -- useful for removing clutter of no-longer-relevant jobs, while retaining a record just in case\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Delete: Confirm\", Prompt: \"Are you <i>sure</i> you want to delete job(s)?\"}, gi.AddOk, gi.AddCancel,\n\t\t\tvp.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgr.DeleteJob()\n\t\t\t\t\ttbar.UpdateActions()\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Archive\", Icon: \"file-archive\", Tooltip: \"moves job directory from active to archive subdir -- useful for removing clutter from active, and preserving important but non-current results\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Archive: Confirm\", Prompt: \"Are you <i>sure</i> you want to archive job(s)?\"}, gi.AddOk, gi.AddCancel,\n\t\t\tvp.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgr.ArchiveJob()\n\t\t\t\t\ttbar.UpdateActions()\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Clean\", Icon: \"close\", Tooltip: \"cleans the job git directory -- if any strange ghost jobs appear in listing, do this -- it deletes any files that are present locally but not remotely -- should be safe for jobs except if in the process of running a command, so just wait until all current activity is done\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgi.PromptDialog(vp, gi.DlgOpts{Title: \"Clean: Confirm\", Prompt: \"Are you <i>sure</i> you want to clean job git directory (should be safe but better to make sure all current command activity done)?\"}, gi.AddOk, gi.AddCancel,\n\t\t\tvp.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\t\tif sig == int64(gi.DialogAccepted) {\n\t\t\t\t\tgr.CleanJobs()\n\t\t\t\t\ttbar.UpdateActions()\n\t\t\t\t}\n\t\t\t})\n\t})\n\n\ttbar.AddSeparator(\"help\")\n\n\ttbar.AddAction(gi.ActOpts{Label: \"README\", Icon: \"file-markdown\", Tooltip: \"Opens your browser on the README file that contains help info.\"}, win.This(),\n\t\tfunc(recv, send ki.Ki, sig int64, data interface{}) {\n\t\t\tgi.OpenURL(\"https://github.com/emer/grunt/blob/master/grunti/README.md\")\n\t\t})\n\n\ttbar.AddAction(gi.ActOpts{Label: \"Server:\", Icon: \"file-save\", Tooltip: \"set the server to value shown to right, used for submitting new jobs and polling for updates -- other servers are not accessed directly unless their jobs are manipulated\"}, win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tgr.SetServer()\n\t\ttbar.UpdateActions()\n\t})\n\n\tgr.SrvField = gi.AddNewTextField(tbar, \"server\")\n\tgr.SrvField.SetProp(\"width\", units.NewEm(10))\n\tgr.SrvField.SetText(gr.Server)\n\tgr.SrvField.Tooltip = \"name of default server used for submitting new jobs and polling for updates -- other servers are not accessed directly unless their jobs are manipulated -- to set after changing, click SetServer or just hit return in this field\"\n\tgr.SrvField.TextFieldSig.Connect(win.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif sig == int64(gi.TextFieldDone) {\n\t\t\tgr.SetServer()\n\t\t\ttbar.UpdateActions()\n\t\t}\n\t})\n\n\tvp.UpdateEndNoSig(updt)\n\n\t// main menu\n\tappnm := gi.AppName()\n\tmmen := win.MainMenu\n\tmmen.ConfigMenus([]string{appnm, \"File\", \"Edit\", \"Window\"})\n\n\tamen := win.MainMenu.ChildByName(appnm, 0).(*gi.Action)\n\tamen.Menu.AddAppMenu(win)\n\n\temen := win.MainMenu.ChildByName(\"Edit\", 1).(*gi.Action)\n\temen.Menu.AddCopyCutPaste(win)\n\n\twin.MainMenuUpdated()\n\n\treturn win\n}", "title": "" }, { "docid": "c976e48b40f04f236be23ec1eadc766f", "score": "0.5729501", "text": "func (gui *Gui) Run(startArgs appTypes.StartArgs) error {\n\tg, err := gui.initGocui(Headless(), startArgs.IntegrationTest)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer gui.checkForDeprecatedEditConfigs()\n\n\tgui.g = g\n\tdefer gui.g.Close()\n\n\t// if the deadlock package wants to report a deadlock, we first need to\n\t// close the gui so that we can actually read what it prints.\n\tdeadlock.Opts.LogBuf = utils.NewOnceWriter(os.Stderr, func() {\n\t\tgui.g.Close()\n\t})\n\tdeadlock.Opts.Disable = !gui.Debug\n\n\tif err := gui.Config.ReloadUserConfig(); err != nil {\n\t\treturn nil\n\t}\n\tuserConfig := gui.UserConfig\n\n\tgui.g.OnSearchEscape = func() error { gui.helpers.Search.Cancel(); return nil }\n\tgui.g.SearchEscapeKey = keybindings.GetKey(userConfig.Keybinding.Universal.Return)\n\tgui.g.NextSearchMatchKey = keybindings.GetKey(userConfig.Keybinding.Universal.NextMatch)\n\tgui.g.PrevSearchMatchKey = keybindings.GetKey(userConfig.Keybinding.Universal.PrevMatch)\n\n\tgui.g.ShowListFooter = userConfig.Gui.ShowListFooter\n\n\tif userConfig.Gui.MouseEvents {\n\t\tgui.g.Mouse = true\n\t}\n\n\tif err := gui.setColorScheme(); err != nil {\n\t\treturn err\n\t}\n\n\tgui.g.SetManager(gocui.ManagerFunc(gui.layout), gocui.ManagerFunc(gui.getFocusLayout()))\n\n\tif err := gui.createAllViews(); err != nil {\n\t\treturn err\n\t}\n\n\t// onNewRepo must be called after g.SetManager because SetManager deletes keybindings\n\tif err := gui.onNewRepo(startArgs, context.NO_CONTEXT); err != nil {\n\t\treturn err\n\t}\n\n\tgui.waitForIntro.Add(1)\n\n\tgui.BackgroundRoutineMgr.startBackgroundRoutines()\n\n\tgui.c.Log.Info(\"starting main loop\")\n\n\t// setting here so we can use it in layout.go\n\tgui.integrationTest = startArgs.IntegrationTest\n\n\treturn gui.g.MainLoop()\n}", "title": "" }, { "docid": "09d1fd77b89349eced710995a83f9a01", "score": "0.56407773", "text": "func GuiEnabled() bool {\n\treturn guiEnabled\n}", "title": "" }, { "docid": "88a30f9a7b2e626d3ac877a3f51258fc", "score": "0.56280035", "text": "func (v Vehicle) GuiSettings() (*GuiSettings, error) {\n\tstateRequest, err := v.c.fetchState(\"gui_settings\", v.ID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn stateRequest.Response.GuiSettings, nil\n}", "title": "" }, { "docid": "76fd3154885fd9714bb0d817e0b7c7c3", "score": "0.53441346", "text": "func CreateGui(cmd interface{}, manual_path string) (*gocui.Gui, error) {\n\tis_full_node := true\n\tswitch cmd.(type) {\n\tcase chan commands.Command:\n\t\tis_full_node = true\n\tcase chan commands.ClientCommand:\n\t\tis_full_node = false\n\tdefault:\n\t\tlog.Fatalln(\"invalid command channel\")\n\t}\n\n\tg, err := gocui.NewGui(gocui.OutputNormal)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tg.Cursor = true\n\n\tpc := &PastCmd{name: \"pastcommand\"}\n\tl := &Logger{name: \"logger\"}\n\tm := &Manual{name: \"manual\", path: manual_path}\n\tfocus := gocui.ManagerFunc(SetFocus(\"input\"))\n\tif is_full_node {\n\t\tinput := &FullNodeInput{name: \"input\", cmd: cmd.(chan commands.Command)}\n\t\tg.SetManager(pc, input, l, m, focus)\n\t} else {\n\t\tinput := &WalletInput{name: \"input\", cmd: cmd.(chan commands.ClientCommand)}\n\t\tg.SetManager(pc, input, l, m, focus)\n\t}\n\n\tif err := g.SetKeybinding(\"\", gocui.KeyCtrlC, gocui.ModNone, quit); err != nil {\n\t\tlog.Panicln(err)\n\t}\n\n\treturn g, err\n}", "title": "" }, { "docid": "f9e03c527ebdd9685c4503f11623941e", "score": "0.529344", "text": "func GuiEnable() {\n\tC.GuiEnable()\n\tguiEnabled = true\n}", "title": "" }, { "docid": "405be5163fdc26ed6f8183f81eb034c5", "score": "0.52111864", "text": "func StartGUI(path, port string) {\n\tp, _ := os.Getwd()\n\tvar a *astilectron.Astilectron\n\tvar err error\n\tif a, err = astilectron.New(astilectron.Options{\n\t\tAppName: \"Static File Server\",\n\t\tAppIconDefaultPath: filepath.Join(p, \"assets\", \"icon.png\"),\n\t\tBaseDirectoryPath: p,\n\t}); err != nil {\n\t\tlog.Fatalf(\"Failed to create new astillectron. Error: %v\", err.Error())\n\t}\n\tdefer a.Close()\n\ta.HandleSignals()\n\n\tif err = a.Start(); err != nil {\n\t\tlog.Fatalf(\"Failed to start. Error: %v\", err.Error())\n\t}\n\n\tvar w *astilectron.Window\n\tif w, err = a.NewWindow(filepath.Join(p, \"assets\", \"html\", \"gui.html\"), &astilectron.WindowOptions{\n\t\tCenter: astilectron.PtrBool(true),\n\t\tHeight: astilectron.PtrInt(600),\n\t\tWidth: astilectron.PtrInt(800),\n\t}); err != nil {\n\t\tlog.Fatalf(\"Failed to create new window. Error: %v\", err.Error())\n\t}\n\tif err = w.Create(); err != nil {\n\t\tlog.Fatalf(\"Failed at window.Create(). Error: %v\", err.Error())\n\t}\n\n\tmsg := []string{path, port}\n\tw.SendMessage(msg)\n\n\tw.OnMessage(func(e *astilectron.EventMessage) interface{} {\n\t\tvar m string\n\t\tif err = e.Unmarshal(&m); err != nil {\n\t\t\tlog.Fatalf(\"Recieved improper message from gui. Error: %v\", err.Error())\n\t\t}\n\t\tpathport := strings.Split(m, \"<a-o>\")\n\t\tpath = pathport[0]\n\t\tport = pathport[1]\n\t\tconfiguration.UpdateConfig(path, port)\n\t\tserver.ChangeRoot(path, port)\n\t\treturn nil\n\t})\n\n\ta.Wait()\n}", "title": "" }, { "docid": "8aa03298196802a2fc502efa32d68a33", "score": "0.51599234", "text": "func NewGui(console IConsole) *Gui {\n\treturn &Gui{\n\t\tcon: console,\n\t\twidgetVector: []IWidget{},\n\t\trbs: NewRadioButtonGroups(),\n\t}\n}", "title": "" }, { "docid": "727f5002aef53269906bcd62df8981fa", "score": "0.5129585", "text": "func configureUI() {\n\tif options.GetB(OPT_NO_COLOR) {\n\t\tfmtc.DisableColors = true\n\t}\n}", "title": "" }, { "docid": "5daae4fe60ea8503b565d5852ac39cb5", "score": "0.506482", "text": "func setSimulationConfig(appHome string) (string, error) {\n\t// generate random server ports and servers list.\n\tports, err := availableport.Find(5)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tgenAddr := func(port int) string {\n\t\treturn fmt.Sprintf(\"localhost:%d\", port)\n\t}\n\n\t// updating app toml\n\tappPath := filepath.Join(appHome, \"config/app.toml\")\n\tconfig, err := toml.LoadFile(appPath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tconfig.Set(\"api.enable\", true)\n\tconfig.Set(\"api.enabled-unsafe-cors\", true)\n\tconfig.Set(\"rpc.cors_allowed_origins\", []string{\"*\"})\n\tconfig.Set(\"api.address\", xurl.TCP(genAddr(ports[0])))\n\tconfig.Set(\"grpc.address\", genAddr(ports[1]))\n\tfile, err := os.OpenFile(appPath, os.O_RDWR|os.O_TRUNC, 0644)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer file.Close()\n\t_, err = config.WriteTo(file)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// updating config toml\n\tconfigPath := filepath.Join(appHome, \"config/config.toml\")\n\tconfig, err = toml.LoadFile(configPath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tconfig.Set(\"rpc.cors_allowed_origins\", []string{\"*\"})\n\tconfig.Set(\"consensus.timeout_commit\", \"1s\")\n\tconfig.Set(\"consensus.timeout_propose\", \"1s\")\n\tconfig.Set(\"rpc.laddr\", xurl.TCP(genAddr(ports[2])))\n\tconfig.Set(\"p2p.laddr\", xurl.TCP(genAddr(ports[3])))\n\tconfig.Set(\"rpc.pprof_laddr\", genAddr(ports[4]))\n\tfile, err = os.OpenFile(configPath, os.O_RDWR|os.O_TRUNC, 0644)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer file.Close()\n\t_, err = config.WriteTo(file)\n\n\treturn genAddr(ports[0]), err\n}", "title": "" }, { "docid": "c00cd3dc52337043b45e868e31d6cb1f", "score": "0.5021333", "text": "func (gui *GUI) SaveConfig(config Config) error {\n\tconfigBytes, err := json.MarshalIndent(&config, \"\", \" \")\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = ioutil.WriteFile(\n\t\tfilepath.Join(gui.workingDir, \"config.json\"),\n\t\tconfigBytes,\n\t\t0644)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ac5957166d4221bfc75964c0d013d321", "score": "0.49894336", "text": "func (ss *Sim) Config() {\n\tss.Dist.Defaults()\n\tss.Dist.Dist = erand.Gaussian\n\tss.Dist.Mean = 0.5\n\tss.Dist.Var = 0.15\n\tss.NSamp = 1000000\n\tss.NBins = 100\n\tss.Range.Set(0, 1)\n\tss.Update()\n\tss.Table = &etable.Table{}\n\tss.Hist = &etable.Table{}\n\tss.ConfigTable(ss.Table)\n\tss.Run()\n}", "title": "" }, { "docid": "a81f5f063fff8df70d0cbb723af61223", "score": "0.49224305", "text": "func GuiRun(link, format, country, imagesFormat string, all, last, imagesOnly bool) {\n\tAppStatus <- true\n\tdownload(link, format, country, all, last, true, imagesOnly, imagesFormat)\n\tAppStatus <- false\n}", "title": "" }, { "docid": "f48015fa1a4aada932c2f3b0c033a8a8", "score": "0.49212748", "text": "func (gui *Gui) Run() error {\n\tdefer gui.g.Close()\n\n\tgui.g.Highlight = true\n\tgui.g.Cursor = true\n\tgui.g.SelFgColor = gocui.ColorGreen\n\n\tgui.g.SetManagerFunc(gui.layout)\n\n\tif err := gui.keybindings(); err != nil {\n\t\treturn err\n\t}\n\n\tif err := gui.g.MainLoop(); err != nil && err != gocui.ErrQuit {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "489155b4a015eef35831468c9a6e16f5", "score": "0.48270953", "text": "func (ss *Sim) Config() {\n\tss.OpenPats()\n\tss.ConfigEnv()\n\tss.ConfigNet(ss.Net)\n\tss.ConfigTrnEpcLog(ss.TrnEpcLog)\n\tss.ConfigTstEpcLog(ss.TstEpcLog)\n\tss.ConfigTstTrlLog(ss.TstTrlLog)\n\tss.ConfigRunLog(ss.RunLog)\n}", "title": "" }, { "docid": "7f80c9b7a7816e6e897935fcb398ce3a", "score": "0.47084165", "text": "func (opt Opts) RunConfig() {\n\tvar choice int\n\n\terr := survey.AskOne(&survey.Select{\n\t\tMessage: \"Select configuration:\",\n\t\tOptions: []string{\n\t\t\t\"Login to codeforces\",\n\t\t\t\"Add new code template\",\n\t\t\t\"Remove code template\",\n\t\t\t\"Other misc preferences\",\n\t\t},\n\t}, &choice, survey.WithValidator(survey.Required))\n\tpkg.PrintError(err, \"\")\n\n\tswitch choice {\n\tcase 0:\n\t\tlogin()\n\tcase 1:\n\t\taddTmplt()\n\tcase 2:\n\t\tremTmplt()\n\tcase 3:\n\t\tmiscPrefs()\n\t}\n\treturn\n}", "title": "" }, { "docid": "d778e444454cb2d4e4e9eccfe18c4179", "score": "0.46854362", "text": "func (x *Controller) UIConfigHandler(c echo.Context) error {\n\tcfg, err := x.uiConfig(c.Request().Context())\n\tif err != nil {\n\t\treturn err\n\t}\n\tcfg[\"user\"] = User(c)\n\treturn x.sendJSONSuccess(c, Map{\"result\": cfg})\n}", "title": "" }, { "docid": "794d3987738fce6d9324c37764a570ed", "score": "0.46746153", "text": "func (c *configuration) Init() error {\n\tc.Viper = viper.New()\n\t//set defaults\n\tc.SetDefault(\"web.listen.port\", \"8080\")\n\tc.SetDefault(\"web.listen.host\", \"0.0.0.0\")\n\tc.SetDefault(\"web.src.frontend.path\", \"/scrutiny/web\")\n\tc.SetDefault(\"web.database.location\", \"/scrutiny/config/scrutiny.db\")\n\n\tc.SetDefault(\"log.level\", \"INFO\")\n\tc.SetDefault(\"log.file\", \"\")\n\n\t//c.SetDefault(\"disks.include\", []string{})\n\t//c.SetDefault(\"disks.exclude\", []string{})\n\n\t//c.SetDefault(\"notify.metric.script\", \"/scrutiny/config/notify-metrics.sh\")\n\t//c.SetDefault(\"notify.long.script\", \"/scrutiny/config/notify-long-test.sh\")\n\t//c.SetDefault(\"notify.short.script\", \"/scrutiny/config/notify-short-test.sh\")\n\n\t//c.SetDefault(\"collect.metric.enable\", true)\n\t//c.SetDefault(\"collect.metric.command\", \"-a -o on -S on\")\n\t//c.SetDefault(\"collect.long.enable\", true)\n\t//c.SetDefault(\"collect.long.command\", \"-a -o on -S on\")\n\t//c.SetDefault(\"collect.short.enable\", true)\n\t//c.SetDefault(\"collect.short.command\", \"-a -o on -S on\")\n\n\t//if you want to load a non-standard location system config file (~/drawbridge.yml), use ReadConfig\n\tc.SetConfigType(\"yaml\")\n\t//c.SetConfigName(\"drawbridge\")\n\t//c.AddConfigPath(\"$HOME/\")\n\n\t//CLI options will be added via the `Set()` function\n\treturn nil\n}", "title": "" }, { "docid": "8312afbdb19734a401e6d3d0d882d207", "score": "0.4669004", "text": "func (gv *g3nView) buildGui() error {\n\n\tgui.Manager().Set(gv.scene)\n\n\t// Adds menu bar\n\tmb := gui.NewMenuBar()\n\tmb.SetLayoutParams(&gui.VBoxLayoutParams{Expand: 0, AlignH: gui.AlignWidth})\n\tgv.scene.Add(mb)\n\n\t// Create \"File\" menu and adds it to the menu bar\n\tm1 := gui.NewMenu()\n\tm1.AddOption(\"Open model\").Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.fs.Show(true)\n\t})\n\tm1.AddOption(\"Remove models\").Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.removeModels()\n\t})\n\tm1.AddOption(\"Reset camera\").Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.cam.SetPositionVec(&gv.camPos)\n\t\tgv.cam.LookAt(&math32.Vector3{0, 0, 0}, &math32.Vector3{0, 1, 0})\n\t\tgv.orbit.Reset()\n\t})\n\tm1.AddSeparator()\n\tm1.AddOption(\"Quit\").SetId(\"quit\").Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.Exit()\n\t})\n\tmb.AddMenu(\"File\", m1)\n\n\t// Create \"View\" menu and adds it to the menu bar\n\tm2 := gui.NewMenu()\n\tvAxis := m2.AddOption(\"View axis helper\").SetIcon(checkOFF)\n\tvAxis.SetIcon(getIcon(gv.viewAxes))\n\tvAxis.Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.viewAxes = !gv.viewAxes\n\t\tvAxis.SetIcon(getIcon(gv.viewAxes))\n\t\tgv.axes.SetVisible(gv.viewAxes)\n\t})\n\n\tvGrid := m2.AddOption(\"View grid helper\").SetIcon(checkOFF)\n\tvGrid.SetIcon(getIcon(gv.viewGrid))\n\tvGrid.Subscribe(gui.OnClick, func(evname string, ev interface{}) {\n\t\tgv.viewGrid = !gv.viewGrid\n\t\tvGrid.SetIcon(getIcon(gv.viewGrid))\n\t\tgv.grid.SetVisible(gv.viewGrid)\n\t})\n\tmb.AddMenu(\"View\", m2)\n\n\t// Creates file selection dialog\n\tfs, err := NewFileSelect(400, 300)\n\tif err != nil {\n\t\treturn err\n\t}\n\tgv.fs = fs\n\tgv.fs.SetVisible(false)\n\tgv.fs.Subscribe(\"OnOK\", func(evname string, ev interface{}) {\n\t\tfpath := gv.fs.Selected()\n\t\tif fpath == \"\" {\n\t\t\tgv.ed.Show(\"File not selected\")\n\t\t\treturn\n\t\t}\n\t\terr := gv.openModel(fpath)\n\t\tif err != nil {\n\t\t\tgv.ed.Show(err.Error())\n\t\t\treturn\n\t\t}\n\t\tgv.fs.SetVisible(false)\n\n\t})\n\tgv.fs.Subscribe(\"OnCancel\", func(evname string, ev interface{}) {\n\t\tgv.fs.Show(false)\n\t})\n\tgv.scene.Add(gv.fs)\n\n\t// Creates error dialog\n\tgv.ed = NewErrorDialog(600, 100)\n\tgv.scene.Add(gv.ed)\n\n\treturn nil\n}", "title": "" }, { "docid": "83a4a8b6429db87189d60e53e44c1062", "score": "0.46387368", "text": "func GetGui() []byte {\n\n\tvpy := []byte(`\nimport builtins\nfrom json import load\nfrom keyword import iskeyword\nfrom os import rename, environ\nfrom os.path import realpath, basename, isfile\nfrom sys import stdout, modules\nfrom threading import Thread\nfrom time import sleep\nfrom tkinter import Tk, Menu, Label, Spinbox, Entry, LEFT, CENTER\nfrom tkinter import Button, Listbox, Text, FLAT, SUNKEN\nfrom tkinter import PhotoImage, Scrollbar, Scale, Toplevel\nfrom tkinter import E, W, END, HORIZONTAL, NORMAL, DISABLED\nfrom tkinter.messagebox import askyesno\nfrom tkinter.filedialog import askopenfilename\nfrom tkinter.filedialog import asksaveasfilename\nfrom tkinter.font import names\nfrom tkinter.ttk import Style\n\n\nclass VisiPy:\n\tdef __init__(self, master):\n\t\tself.dark = '#404040'\n\t\tself.light = '#CCCCCC'\n\t\tself.bold = 'TkHeadingFont 10'\n\t\tself.normal = 'TkTextFont 8'\n\t\tself.small = 'TkSmallCaptionFont 8'\n\t\trpath = realpath(__file__)[:-len(basename(__file__))]\n\t\tself.data_path = '%sproject.json' % rpath\n\t\tself.code_path = '%sproject.py' % rpath\n\n\t\tself.available_widgets = [\n\t\t\t'Button', 'Checkbutton', 'Entry', 'Image', 'Label',\n\t\t\t'Listbox', 'Radiobutton', 'Scale', 'Spinbox', 'Text'\n\t\t]\n\t\tself.valid_colors = [\n\t\t\t'white', 'black', 'red', 'green',\n\t\t\t'blue', 'cyan', 'yellow', 'magenta'\n\t\t]\n\t\tself.reserved = [\n\t\t\t'REMOVE', 'THEME', 'WRITE', 'TITLE', 'QUIT',\n\t\t\t'APPCOLOR', 'GUI', 'DIMENSIONS', 'BUILD'\n\t\t\t'LOADUSERPROJ', 'MENU', 'MENUCOLOR', 'exit'\n\t\t]\n\t\tself.reserved += [module for module in dir(modules[__name__])]\n\t\tself.reserved += [name for name in dir(builtins) if name.islower()]\n\n\t\tself.master = master\n\t\tself.master.title('VisiPy')\n\t\tself.master.configure(bg='black')\n\n\t\tself.icon, self.sel, self.popup, self.theme, self.code, self.title = (\n\t\t\tNone for _ in range(6))\n\t\tself.project, self.theme_layout, self.menu_layout, self.menu_color, \\\n\t\t\tself.color, self.xydim, self.font = ({} for _ in range(7))\n\t\tself.is_existing = False\n\t\tself.updated = True\n\n\t\tself.chars = tuple([str(hex(index)[-1:]) for index in range(16)])\n\n\t\tdesktop = environ.get('DESKTOP_SESSION')\n\t\tenvs = {\n\t\t\t'plasma': '1085x905',\n\t\t\t'ubuntu': '1130x905'\n\t\t}\n\t\tif desktop is None or desktop == 'ubuntu' or desktop not in envs:\n\t\t\tself.master.geometry(envs['ubuntu'])\n\t\t\tself.listbox_width = 35\n\t\t\tself.master.maxsize('1160', '905')\n\t\t\tself.master.minsize('1130', '750')\n\t\telif desktop == 'plasma':\n\t\t\tself.master.geometry(envs['plasma'])\n\t\t\tself.listbox_width = 30\n\t\t\tself.master.maxsize('1115', '905')\n\t\t\tself.master.minsize('1085', '750')\n\n\t\tself.icon = PhotoImage(file=rpath + 'icon.png')\n\t\tmaster.iconphoto(False, self.icon)\n\n\t\tmenu = Menu(self.master)\n\t\tmenu.config(background=self.light, borderwidth=0, fg=self.dark)\n\t\tself.master.config(menu=menu)\n\t\tfile_menu = Menu(menu)\n\t\tfile_menu.add_command(\n\t\t\tlabel='Available Fonts',\n\t\t\tcommand=self.available_fonts\n\t\t)\n\t\tfile_menu.add_command(\n\t\t\tlabel='Load Existing',\n\t\t\tcommand=self.load_user_project\n\t\t)\n\t\tfile_menu.add_command(\n\t\t\tlabel='Write To File',\n\t\t\tcommand=self.write_file\n\t\t)\n\t\tfile_menu.add_command(\n\t\t\tlabel='Reset All',\n\t\t\tcommand=self.reset\n\t\t)\n\t\tfile_menu.add_command(\n\t\t\tlabel='Exit', command=self.quit)\n\t\tmenu.add_cascade(label='File', menu=file_menu)\n\n\t\tedit_menu = Menu(menu)\n\t\tedit_menu.add_command(\n\t\t\tlabel='App Title',\n\t\t\tcommand=self.app_title\n\t\t)\n\t\tedit_menu.add_command(\n\t\t\tlabel='App Color',\n\t\t\tcommand=self.app_color\n\t\t)\n\t\tedit_menu.add_command(\n\t\t\tlabel='Window Menu Color',\n\t\t\tcommand=self.window_menu_color\n\t\t)\n\t\tedit_menu.add_command(\n\t\t\tlabel='Overall Dimensions',\n\t\t\tcommand=self.display_overall_dimensions\n\t\t)\n\t\tedit_menu.add_command(\n\t\t\tlabel='App Theme',\n\t\t\tcommand=self.app_theme\n\t\t)\n\t\tmenu.add_cascade(label='Edit', menu=edit_menu)\n\n\t\textras_menu = Menu(menu)\n\t\textras_menu.add_command(\n\t\t\tlabel='Add 16x16 icon.png',\n\t\t\tcommand=self.add_icon)\n\t\textras_menu.add_command(\n\t\t\tlabel='Add Window Menu',\n\t\t\tcommand=self.add_menu\n\t\t)\n\t\tmenu.add_cascade(label='Extras', menu=extras_menu)\n\n\t\tself.image_path = PhotoImage(file=rpath + 'icon.gif')\n\t\tself.image = Label(\n\t\t\tmaster,\n\t\t\timage=self.image_path,\n\t\t\tborderwidth=0,\n\t\t\tbg='black'\n\t\t)\n\t\tself.image.grid(row=0, column=0, sticky=W)\n\n\t\tself.overall_dim_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tanchor=E,\n\t\t\tfont=self.bold,\n\t\t\ttext='Overall Dimensions:',\n\t\t\twidth=20\n\t\t)\n\t\tself.overall_dim_label.grid(row=0, column=0, sticky=E, padx=5)\n\n\t\tself.xdim = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tfont=self.small,\n\t\t\ttext='L :',\n\t\t\twidth=20\n\t\t)\n\t\tself.xdim.grid(row=0, column=1, sticky=W, padx=5, pady=5)\n\n\t\tself.ydim = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tfont=self.small,\n\t\t\ttext='W :',\n\t\t\twidth=20\n\t\t)\n\t\tself.ydim.grid(row=0, column=1, sticky=E, padx=5, pady=5)\n\n\t\tself.current_build_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tanchor=CENTER,\n\t\t\tjustify=CENTER,\n\t\t\tfont=self.bold,\n\t\t\ttext='Current Build',\n\t\t\twidth=20\n\t\t)\n\t\tself.current_build_label.grid(\n\t\t\trow=0,\n\t\t\tcolumn=2,\n\t\t\tcolumnspan=2,\n\t\t\tsticky=E+W,\n\t\t\tpadx=5\n\t\t)\n\n\t\tscrollbar_build = Scrollbar(master, activebackground=self.light)\n\t\tself.build_box = Listbox(\n\t\t\tmaster,\n\t\t\tfg='#79ff4d',\n\t\t\tactivestyle='none',\n\t\t\tbg='black',\n\t\t\tborderwidth=0,\n\t\t\twidth=self.listbox_width * 2,\n\t\t\tyscrollcommand=scrollbar_build.set,\n\t\t\theight=47,\n\t\t\thighlightthickness=0,\n\t\t\tselectmode='extended'\n\t\t)\n\t\tscrollbar_build.config(command=self.build_box.yview)\n\t\tscrollbar_build.grid(\n\t\t\trow=0,\n\t\t\tcolumn=2,\n\t\t\tcolumnspan=2,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.build_box.grid(row=1, rowspan=20, column=2, padx=5)\n\n\t\tself.widget_selection = ''\n\t\tself.select_new_widget_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tanchor=W,\n\t\t\tfont=self.bold,\n\t\t\ttext='Add New Widgets:',\n\t\t\twidth=24\n\t\t)\n\t\tself.select_new_widget_label.grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5\n\t\t)\n\n\t\tself.select_existing_widget_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\tanchor=W,\n\t\t\tfont=self.bold,\n\t\t\ttext='Edit Existing Widgets:',\n\t\t\twidth=24\n\t\t)\n\t\tself.select_existing_widget_label.grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tsticky=W,\n\t\t\tpadx=5\n\t\t)\n\n\t\tscrollbar_right = Scrollbar(master, activebackground=self.light)\n\t\tself.new_box = Listbox(\n\t\t\tmaster,\n\t\t\tfg='cyan',\n\t\t\tactivestyle='none',\n\t\t\tbg='black',\n\t\t\tborderwidth=0,\n\t\t\twidth=self.listbox_width,\n\t\t\theight=10,\n\t\t\thighlightthickness=0,\n\t\t\tselectmode='single'\n\t\t)\n\t\tself.existing_box = Listbox(\n\t\t\tmaster,\n\t\t\tfg='cyan',\n\t\t\tactivestyle='none',\n\t\t\tbg='black',\n\t\t\tborderwidth=0,\n\t\t\twidth=self.listbox_width,\n\t\t\tyscrollcommand=scrollbar_right.set,\n\t\t\theight=10,\n\t\t\thighlightthickness=0,\n\t\t\tselectmode='single'\n\t\t)\n\n\t\tself.new_box.grid(row=2, column=0, padx=5, sticky=W)\n\t\tself.existing_box.grid(row=2, column=1, padx=5, sticky=E)\n\t\tscrollbar_right.config(command=self.existing_box.yview)\n\t\tscrollbar_right.grid(row=1, column=1, sticky=E, padx=5, pady=5)\n\n\t\tself.widget_attributes_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Widget Attributes',\n\t\t\tfont=self.small,\n\t\t\twidth=16,\n\t\t\thighlightbackground='black',\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.set_current_widget\n\t\t)\n\t\tself.widget_attributes_button.grid(\n\t\t\trow=3,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.existing_attributes_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Widget Attributes',\n\t\t\tfont=self.small,\n\t\t\twidth=16,\n\t\t\thighlightbackground='black',\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.set_existing_widget\n\t\t)\n\t\tself.existing_attributes_button.grid(\n\t\t\trow=3,\n\t\t\tcolumn=1,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.remove_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Remove Widget',\n\t\t\tfont=self.small,\n\t\t\tactiveforeground='#FF0000',\n\t\t\thighlightbackground='black',\n\t\t\twidth=16,\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.remove)\n\t\tself.remove_button.grid(row=3, column=1, sticky=E, padx=5, pady=5)\n\n\t\tself.widget_type_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\ttext='Type:',\n\t\t\tbg='black',\n\t\t\tanchor=W,\n\t\t\twidth=16,\n\t\t\theight=1,\n\t\t\tfont=self.bold\n\t\t)\n\t\tself.widget_type_label.grid(\n\t\t\trow=4,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5)\n\n\t\tself.widget_type = Text(\n\t\t\tmaster,\n\t\t\tfg='cyan',\n\t\t\tbg='black',\n\t\t\twidth=23,\n\t\t\theight=1,\n\t\t\tinsertontime=600,\n\t\t\tinsertbackground='#33CC00',\n\t\t\tinsertofftime=100,\n\t\t\tfont=self.bold\n\t\t)\n\t\tself.widget_type.grid(\n\t\t\trow=4,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=15\n\t\t)\n\n\t\tself.widget_name_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\ttext='Name:',\n\t\t\tbg='black',\n\t\t\tanchor=W,\n\t\t\twidth=16,\n\t\t\theight=1,\n\t\t\tfont=self.bold\n\t\t)\n\t\tself.widget_name_label.grid(\n\t\t\trow=4,\n\t\t\tcolumn=1,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.widget_name = Entry(\n\t\t\tmaster,\n\t\t\tfg='cyan',\n\t\t\tbg='black',\n\t\t\twidth=23,\n\t\t\tinsertontime=600,\n\t\t\tinsertbackground='#33CC00',\n\t\t\tinsertofftime=100,\n\t\t\tfont=self.bold,\n\t\t\tdisabledforeground='cyan',\n\t\t\tdisabledbackground='black'\n\t\t)\n\t\tself.widget_name.grid(\n\t\t\trow=4,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=15\n\t\t)\n\n\t\tself.layout = {}\n\t\tself.set_layout()\n\t\tself.blackout()\n\n\t\tfor index in range(1, int(len(self.layout) / 4) + 1):\n\t\t\tname = 'v%d_label' % index\n\t\t\tself.layout[name].grid(\n\t\t\t\trow=index + 5, column=0, sticky=W, padx=5, pady=5)\n\t\t\tself.layout[name[:-6]].grid(\n\t\t\t\trow=index + 5, column=0, sticky=E, padx=30, pady=5)\n\t\t\tname = 'v%d_label' % (index + 11)\n\t\t\tself.layout[name].grid(\n\t\t\t\trow=index + 5, column=1, sticky=W, padx=5, pady=5)\n\t\t\tself.layout[name[:-6]].grid(\n\t\t\t\trow=index + 5, column=1, sticky=E, padx=30, pady=5)\n\n\t\tself.blank1 = Label(\n\t\t\tmaster,\n\t\t\tfg='black',\n\t\t\tbg='black',\n\t\t\ttext='',\n\t\t\twidth=18,\n\t\t\theight=1\n\t\t)\n\t\tself.blank1.grid(row=17, column=0, columnspan=2, padx=5)\n\n\t\tself.clear_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Clear',\n\t\t\tfont=self.small,\n\t\t\twidth=22,\n\t\t\thighlightbackground='black',\n\t\t\tactiveforeground='yellow',\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.clear\n\t\t)\n\t\tself.clear_button.grid(\n\t\t\trow=18,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=20,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.build_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Run',\n\t\t\tfont=self.small,\n\t\t\twidth=22,\n\t\t\thighlightbackground='black',\n\t\t\tactiveforeground=self.light,\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.build\n\t\t)\n\t\tself.build_button.grid(\n\t\t\trow=18,\n\t\t\tcolumn=0,\n\t\t\tcolumnspan=2,\n\t\t\tpadx=20,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.update_button = Button(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg=self.dark,\n\t\t\ttext='Update',\n\t\t\tfont=self.small,\n\t\t\twidth=22,\n\t\t\thighlightbackground='black',\n\t\t\tactiveforeground='#33CC00',\n\t\t\thighlightthickness=2,\n\t\t\tcommand=self.add_new_widget\n\t\t)\n\t\tself.update_button.grid(\n\t\t\trow=18,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=20,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.blank2 = Label(\n\t\t\tmaster,\n\t\t\tfg='black',\n\t\t\tbg='black',\n\t\t\ttext='',\n\t\t\twidth=18,\n\t\t\theight=1\n\t\t)\n\t\tself.blank2.grid(row=19, column=0, padx=5)\n\n\t\tself.status_label = Label(\n\t\t\tmaster,\n\t\t\tfg=self.light,\n\t\t\tbg='black',\n\t\t\twidth=36,\n\t\t\tpady=15,\n\t\t\tfont=self.normal\n\t\t)\n\t\tself.status_label.grid(\n\t\t\trow=20,\n\t\t\tcolumn=0,\n\t\t\tcolumnspan=2,\n\t\t\tsticky=E+W,\n\t\t\tpady=5\n\t\t)\n\n\t\tself.master.grid_columnconfigure(1, weight=1)\n\t\tself.master.grid_columnconfigure(2, weight=1)\n\t\tself.master.grid_rowconfigure(1, weight=1)\n\t\tself.master.grid_rowconfigure(2, weight=1)\n\t\tself.master.grid_rowconfigure(16, weight=1)\n\t\tself.master.grid_rowconfigure(17, weight=1)\n\t\tself.master.grid_rowconfigure(19, weight=1)\n\n\t\tself.populate_add_widgets()\n\t\tself.populate_existing_widgets()\n\t\tself.populate_code()\n\t\tmsg = 'Existing widgets found: %d'\n\t\tself.set_status(msg % self.existing_box.size())\n\n\tdef set_layout(self):\n\t\tself.layout = {\n\t\t\t'v1': Scale(\n\t\t\t\tself.master,\n\t\t\t\tfrom_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0,\n\t\t\t\ttroughcolor='black', showvalue=100,\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v1_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v2': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v2_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v3': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6,\n\t\t\t\tlength=113, borderwidth=0, highlightthickness=0,\n\t\t\t\ttroughcolor='black', bg='black', fg='cyan',\n\t\t\t\torient=HORIZONTAL, command=self.check_rowspan),\n\t\t\t'v3_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v4': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6,\n\t\t\t\tlength=113, borderwidth=0, highlightthickness=0,\n\t\t\t\ttroughcolor='black', bg='black', fg='cyan',\n\t\t\t\torient=HORIZONTAL, command=self.check_columnspan),\n\t\t\t'v4_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v5': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v5_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v6': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v6_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v7': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v7_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v8': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v8_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v9': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v9_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v10': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v10_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v11': Scale(\n\t\t\t\tself.master, from_=-1, to=100, width=6, length=113,\n\t\t\t\tborderwidth=0, highlightthickness=0, troughcolor='black',\n\t\t\t\tbg='black', fg='cyan', orient=HORIZONTAL),\n\t\t\t'v11_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v12': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v12_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v13': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v13_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v14': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v14_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v15': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v15_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v16': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v16_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v17': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v17_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v18': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v18_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v19': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v19_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v20': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v20_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v21': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v21_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t\t'v22': Text(\n\t\t\t\tself.master, fg='cyan', bg='black', borderwidth=0,\n\t\t\t\thighlightbackground='#012230', width=16, height=1,\n\t\t\t\tfont=self.normal, insertontime=600,\n\t\t\t\tinsertbackground='#33CC00', insertofftime=100),\n\t\t\t'v22_label': Label(\n\t\t\t\tself.master, fg=self.light, text='', anchor=W,\n\t\t\t\tdisabledforeground='black', font=self.small,\n\t\t\t\tpadx=21, bg='black', width=12, height=1),\n\t\t}\n\t\t[self.layout[k].set(-1) for k, v in self.layout.items()\n\t\t\tif 'scale' in str(v)]\n\n\tdef display_button(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'highlightthickness': -1,\n\t\t\t\t'1': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'text': '',\n\t\t\t\t'activeforeground': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'anchor': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'command': '',\n\t\t\t\t'1': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_checkbutton(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'highlightthickness': -1,\n\t\t\t\t'1': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'text': '',\n\t\t\t\t'activeforeground': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'indicatoron': '',\n\t\t\t\t'selectcolor': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'command': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_entry(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'insertontime': -1,\n\t\t\t\t'insertofftime': -1,\n\t\t\t\t'1': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'show': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'insertbackground': '',\n\t\t\t\t'selectforeground': '',\n\t\t\t\t'selectbackground': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'justify': '',\n\t\t\t\t'1': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_image(self):\n\t\tself.blackout()\n\t\tself.refresh()\n\t\timg_details = {\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'borderwidth': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'image': '',\n\t\t\t\t'background': '',\n\t\t\t\t'sticky': ''\n\t\t\t}\n\t\t}\n\n\t\tfor index in range(1, 5):\n\t\t\timg_details['left'][str(index)] = -1\n\t\tfor index in range(1, 9):\n\t\t\timg_details['right'][str(index)] = ''\n\n\t\tself.fill_layout(img_details)\n\t\tself.disable_remaining()\n\t\tif not self.is_existing:\n\t\t\tphoto = askopenfilename(\n\t\t\t\ttitle='Choose a GIF Image',\n\t\t\t\tinitialdir='/',\n\t\t\t\tfiletypes=(('.gif files', '*.gif'),))\n\n\t\t\tif not photo or not isfile(photo):\n\t\t\t\tself.message_thread('Enter a valid image')\n\t\t\telse:\n\t\t\t\tfor k, v in self.layout.items():\n\t\t\t\t\tif 'label' in k and self.layout[k].cget('text') == 'image':\n\t\t\t\t\t\tself.layout[k.split('_')[0]].delete('1.0', END)\n\t\t\t\t\t\tself.layout[k.split('_')[0]].insert(END, photo)\n\t\t\t\t\t\tbreak\n\n\tdef display_label(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'highlightthickness': -1,\n\t\t\t\t'1': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'text': '',\n\t\t\t\t'activeforeground': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'anchor': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'1': '',\n\t\t\t\t'2': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_listbox(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'selectborderwidth': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'highlightthickness': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'selectmode': '',\n\t\t\t\t'font': '',\n\t\t\t\t'activestyle': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'selectforeground': '',\n\t\t\t\t'selectbackground': '',\n\t\t\t\t'justify': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'1': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_radiobutton(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'highlightthickness': -1,\n\t\t\t\t'1': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'text': '',\n\t\t\t\t'activeforeground': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'indicatoron': '',\n\t\t\t\t'selectcolor': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'command': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_scale(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'length': -1,\n\t\t\t\t'from': -1,\n\t\t\t\t'to': -1,\n\t\t\t\t'tickinterval': -1,\n\t\t\t\t'sliderlength': -1,\n\t\t\t\t'borderwidth': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'troughcolor': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'orient': '',\n\t\t\t\t'sliderrelief': '',\n\t\t\t\t'relief': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'command': '',\n\t\t\t\t'1': ''\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_spinbox(self):\n\t\tself.refresh()\n\t\tspinbox_layout = {\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'insertontime': -1,\n\t\t\t\t'insertofftime': -1,\n\t\t\t\t'highlightthickness': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'activebackground': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'selectforeground': '',\n\t\t\t\t'selectbackground': '',\n\t\t\t\t'values': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'command': '',\n\t\t\t\t'1': ''\n\t\t\t}\n\t\t}\n\t\tself.fill_layout(spinbox_layout)\n\t\tself.disable_remaining()\n\n\tdef display_text(self):\n\t\tself.refresh()\n\t\tself.fill_layout({\n\t\t\t'left': {\n\t\t\t\t'row': -1,\n\t\t\t\t'column': -1,\n\t\t\t\t'rowspan': -1,\n\t\t\t\t'columnspan': -1,\n\t\t\t\t'padx': -1,\n\t\t\t\t'pady': -1,\n\t\t\t\t'width': -1,\n\t\t\t\t'height': -1,\n\t\t\t\t'borderwidth': -1,\n\t\t\t\t'insertontime': -1,\n\t\t\t\t'insertofftime': -1\n\t\t\t},\n\t\t\t'right': {\n\t\t\t\t'foreground': '',\n\t\t\t\t'background': '',\n\t\t\t\t'font': '',\n\t\t\t\t'highlightcolor': '',\n\t\t\t\t'insertbackground': '',\n\t\t\t\t'selectforeground': '',\n\t\t\t\t'selectbackground': '',\n\t\t\t\t'wrap': '',\n\t\t\t\t'relief': '',\n\t\t\t\t'sticky': '',\n\t\t\t\t'1': '',\n\t\t\t}\n\t\t})\n\t\tself.disable_remaining()\n\n\tdef display_overall_dimensions(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Overall Dimensions')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.xydim = {\n\t\t\t'xdimlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='x-dimensions:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'xdim': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ydimlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='y-dimensions:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'ydim': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_dimensions\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpadx=5,\n\t\t\t\tpady=5\n\t\t\t)\n\t\t}\n\n\t\tself.xydim['xdimlabel'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.xydim['xdim'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.xydim['ydimlabel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.xydim['ydim'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.xydim['ok'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5)\n\t\tself.xydim['cancel'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.xydim['warnlabel'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef app_theme(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.theme = ''\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Application Style')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.theme_layout = {\n\t\t\t'theme_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Select TTK Theme:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'theme': Spinbox(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\tvalues=('', 'clam', 'alt', 'classic', 'default'),\n\t\t\t\thighlightbackground=self.dark,\n\t\t\t\tcommand=self.set_theme\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_style\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.destroy_theme_box\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t)\n\t\t}\n\n\t\tself.theme_layout['theme_label'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.theme_layout['theme'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.theme_layout['ok'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.theme_layout['cancel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.theme_layout['warnlabel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef app_title(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Application Title')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.title = {\n\t\t\t'title_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Enter Title:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'title': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_title\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t)\n\t\t}\n\n\t\tself.title['title_label'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.title['title'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.title['ok'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.title['cancel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.title['warnlabel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef app_color(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Application Color')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.color = {\n\t\t\t'color_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='App Color:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'color': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_color\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t)\n\t\t}\n\n\t\tself.color['color_label'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.color['color'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.color['ok'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.color['cancel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.color['warnlabel'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef add_menu(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Add Menu')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.menu_layout = {\n\t\t\t'menu_title_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Menu Title:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'menu_title': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'submenus_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Comma-separated\\nSubmenus:',\n\t\t\t\tanchor=W,\n\t\t\t\tjustify=LEFT,\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'submenus': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_menu_item\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t)\n\t\t}\n\n\t\tself.menu_layout['menu_title_label'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['menu_title'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['submenus_label'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['submenus'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['ok'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['cancel'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_layout['warnlabel'].grid(\n\t\t\trow=3,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef window_menu_color(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Window Menu Color')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tself.menu_color = {\n\t\t\t'fg_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Foreground Color:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\tjustify=LEFT,\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'fg': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'bg_label': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='white',\n\t\t\t\ttext='Background Color:',\n\t\t\t\tanchor=W,\n\t\t\t\tbg='black',\n\t\t\t\tjustify=LEFT,\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.normal,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'bg': Text(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tinsertontime=600,\n\t\t\t\tinsertbackground='#33CC00',\n\t\t\t\tinsertofftime=100,\n\t\t\t\tfont=self.normal\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_menu_color\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'warnlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t)\n\t\t}\n\n\t\tself.menu_color['fg_label'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['fg'].grid(\n\t\t\trow=0,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['bg_label'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['bg'].grid(\n\t\t\trow=1,\n\t\t\tcolumn=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['ok'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['cancel'].grid(\n\t\t\trow=2,\n\t\t\tcolumn=0,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.menu_color['warnlabel'].grid(\n\t\t\trow=3,\n\t\t\tcolumn=1,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\n\tdef available_fonts(self):\n\t\tself.popup = Toplevel()\n\t\tself.popup.title('Available Fonts')\n\t\tself.popup.geometry(\n\t\t\t\"+%d+%d\" % (\n\t\t\t\tself.master.winfo_x() + 100,\n\t\t\t\tself.master.winfo_y() + 100\n\t\t\t)\n\t\t)\n\t\tself.popup.configure(bg='black')\n\n\t\tdirections = '<FontName> <FontSize>\\n\\n'\n\t\tdirections += 'FontSize is an even integer between 8 & 64.\\n'\n\t\tdirections += '\\nExamples:\\nTkTextFont 8\\nTkHeadingFont 24'\n\t\tscrollbar = Scrollbar(self.popup, activebackground=self.light)\n\n\t\tself.font = {\n\t\t\t'font_directions': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg=self.light,\n\t\t\t\ttext=directions,\n\t\t\t\tbg='black',\n\t\t\t\twidth=24,\n\t\t\t\theight=8,\n\t\t\t\tjustify=LEFT,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=15\n\t\t\t),\n\t\t\t'fontbox': Listbox(\n\t\t\t\tself.popup,\n\t\t\t\tfg='cyan',\n\t\t\t\tactivestyle='none',\n\t\t\t\tbg='black',\n\t\t\t\tborderwidth=0,\n\t\t\t\twidth=30,\n\t\t\t\tyscrollcommand=scrollbar.set,\n\t\t\t\theight=8,\n\t\t\t\thighlightcolor='black',\n\t\t\t\tselectmode='single'\n\t\t\t),\n\t\t\t'ok': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='green',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Ok',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.add_current_font\n\t\t\t),\n\t\t\t'cancel': Button(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\tbg='black',\n\t\t\t\ttext='Cancel',\n\t\t\t\tfont=self.small,\n\t\t\t\twidth=5,\n\t\t\t\tcommand=self.popup.destroy\n\t\t\t),\n\t\t\t'fontsize': Scale(\n\t\t\t\tself.popup,\n\t\t\t\tfrom_=8,\n\t\t\t\tto=64,\n\t\t\t\twidth=6,\n\t\t\t\tlength=113,\n\t\t\t\tborderwidth=0,\n\t\t\t\tresolution=2,\n\t\t\t\thighlightthickness=0,\n\t\t\t\ttroughcolor='black',\n\t\t\t\tbg='black',\n\t\t\t\tfg='cyan',\n\t\t\t\torient=HORIZONTAL,\n\t\t\t\tcommand=self.set_font\n\t\t\t),\n\t\t\t'fontlabel': Label(\n\t\t\t\tself.popup,\n\t\t\t\tfg='red',\n\t\t\t\ttext='Font Size:',\n\t\t\t\tbg='black',\n\t\t\t\twidth=18,\n\t\t\t\theight=1,\n\t\t\t\tfont=self.small,\n\t\t\t\tpady=10\n\t\t\t),\n\t\t\t'font': ''\n\t\t}\n\n\t\tscrollbar.config(command=self.font['fontbox'].yview)\n\n\t\tself.font['font_directions'].grid(\n\t\t\trow=0,\n\t\t\tsticky=E + W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tscrollbar.grid(\n\t\t\trow=1,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.font['fontbox'].grid(\n\t\t\trow=2,\n\t\t\tpadx=5,\n\t\t\tpady=5,\n\t\t\tsticky=E + W\n\t\t)\n\n\t\tself.font['fontbox'].delete(0, END)\n\t\t[self.font['fontbox'].insert(END, font) for font in sorted(names())]\n\n\t\tself.font['fontsize'].grid(\n\t\t\trow=3,\n\t\t\tpadx=5,\n\t\t\tpady=5,\n\t\t\tsticky=E\n\t\t)\n\t\tself.font['fontlabel'].grid(\n\t\t\trow=3,\n\t\t\tpadx=5,\n\t\t\tpady=5,\n\t\t\tsticky=W\n\t\t)\n\t\tself.font['ok'].grid(\n\t\t\trow=4,\n\t\t\tsticky=W,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.font['cancel'].grid(\n\t\t\trow=4,\n\t\t\tsticky=E,\n\t\t\tpadx=5,\n\t\t\tpady=5\n\t\t)\n\t\tself.font['fontbox'].select_set(0)\n\n\tdef message_thread(self, message):\n\t\tth = Thread(target=self.status, args=[message])\n\t\tth.start()\n\n\tdef status(self, msg):\n\t\tself.set_status(msg)\n\t\tself.status_label.update_idletasks()\n\t\tsleep(4)\n\t\tself.set_status('')\n\n\tdef warn_thread(self, message, attribute):\n\t\tth = Thread(target=self.warn, args=[attribute, message])\n\t\tth.start()\n\n\tdef warn(self, attr, msg):\n\t\tif attr != 'name':\n\t\t\tself.set_status(msg)\n\t\t\tfor k, v in self.layout.items():\n\t\t\t\tif 'label' in k and self.layout[k].cget('text') == attr:\n\t\t\t\t\tself.layout[k].configure(fg='red')\n\t\t\t\t\tself.layout[k].update_idletasks()\n\t\t\t\t\tbreak\n\t\t\tsleep(2)\n\t\t\tself.layout[k].configure(fg=self.light)\n\t\telse:\n\t\t\tself.set_status(msg)\n\t\t\tself.widget_name_label.configure(fg='red')\n\t\t\tself.widget_name_label.update_idletasks()\n\t\t\tsleep(2)\n\t\t\tself.widget_name_label.configure(fg=self.light)\n\t\tsleep(2)\n\t\tself.set_status('')\n\n\tdef poll_update(self):\n\t\tpoll_count = 0\n\t\tproject_json = self.data_path + '.update'\n\t\twhile not isfile(project_json):\n\t\t\tsleep(.02)\n\t\t\tif poll_count > 250:\n\t\t\t\tself.updated = False\n\t\t\t\tbreak\n\t\t\tpoll_count += 1\n\n\tdef add_new_widget(self):\n\t\tself.update('ADD')\n\n\tdef update(self, action, changes=None):\n\t\tpiped = True\n\t\tif action == 'ADD':\n\t\t\toutput_vals = self.review()\n\t\t\tif 'ERROR' in output_vals:\n\t\t\t\t[(attr, allowable)] = output_vals['ERROR'].items()\n\t\t\t\tif isinstance(allowable, list):\n\t\t\t\t\tmsg = 'Error, Allowable values: '\n\t\t\t\t\tmsg += ', '.join(allowable)\n\t\t\t\telse:\n\t\t\t\t\tmsg = 'Error: '\n\t\t\t\t\tmsg += allowable\n\t\t\t\tpiped = False\n\t\t\t\tself.warn_thread(msg, attr)\n\t\t\telif 'row' not in output_vals:\n\t\t\t\tpiped = False\n\t\t\t\tself.warn_thread('row attributes required', 'row')\n\t\t\telif 'column' not in output_vals:\n\t\t\t\tpiped = False\n\t\t\t\tself.warn_thread('column attributes required', 'column')\n\t\t\telse:\n\t\t\t\tstdout.write('%s|$|%s|$|%s\\n' % (action, self.sel, '|:|'.join(\n\t\t\t\t\t['%s|@|%s' % (k, v) for k, v in output_vals.items()])))\n\t\t\t\tstdout.flush()\n\t\telif action == 'EXIT':\n\t\t\tpiped = False\n\t\t\tstdout.write('%s\\n' % action)\n\t\t\tstdout.flush()\n\t\telif action in ('RESET', 'BUILD'):\n\t\t\tstdout.write('%s\\n' % action)\n\t\t\tstdout.flush()\n\t\telse:\n\t\t\t# REMOVE, THEME, WRITE, TITLE, APPCOLOR\n\t\t\t# ICON, DIMENSIONS, LOADUSERPROJ, MENU, MENUCOLOR\n\t\t\tstdout.write('%s|$|%s\\n' % (action, changes))\n\t\t\tstdout.flush()\n\t\tif piped:\n\t\t\tpoll = Thread(target=self.poll_update)\n\t\t\tpoll.start()\n\t\t\tpoll.join()\n\t\t\tif not self.updated:\n\t\t\t\tself.warn('ERROR', 'Error writing')\n\t\t\t\texit(1)\n\t\t\trename(self.data_path + '.update', self.data_path)\n\t\t\trename(self.code_path + '.update', self.code_path)\n\t\t\tself.populate_existing_widgets()\n\t\t\tself.populate_code()\n\t\t\tself.refresh()\n\t\t\tself.blackout()\n\n\tdef valid_color(self, color):\n\t\tcolor = color.lower()\n\t\tif color in self.valid_colors:\n\t\t\treturn True\n\t\treturn all([c in self.chars for c in color]) and len(color) == 6\n\n\tdef review(self):\n\t\tint_vals = (\n\t\t\t'row', 'column', 'padx', 'pady', 'width', 'height',\n\t\t\t'borderwidth', 'highlightthickness', 'insertontime',\n\t\t\t'insertofftime', 'selectborderwidth', 'to', 'from',\n\t\t\t'tickinterval', 'sliderlength', 'length'\n\t\t)\n\t\tcolor_types = [\n\t\t\t'activeforeground', 'insertbackground', 'activebackground',\n\t\t\t'highlightcolor', 'selectcolor', 'background', 'foreground',\n\t\t\t'selectbackground', 'selectforeground', 'troughcolor'\n\t\t]\n\n\t\tcolor_list = self.valid_colors + ['or 6-digit vex value']\n\n\t\tvalid = {\n\t\t\t'activeforeground': color_list,\n\t\t\t'insertbackground': color_list,\n\t\t\t'activebackground': color_list,\n\t\t\t'highlightcolor': color_list,\n\t\t\t'selectcolor': color_list,\n\t\t\t'background': color_list,\n\t\t\t'foreground': color_list,\n\t\t\t'selectbackground': color_list,\n\t\t\t'selectforeground': color_list,\n\t\t\t'troughcolor': color_list,\n\t\t\t'selectmode': ['BROWSE', 'SINGLE', 'MULTIPLE', 'EXTENDED'],\n\t\t\t'relief': ['FLAT', 'RAISED', 'GROOVE', 'SUNKEN', 'RIDGE'],\n\t\t\t'sliderrelief': ['FLAT', 'RAISED', 'GROOVE', 'SUNKEN', 'RIDGE'],\n\t\t\t'anchor': ['N', 'NE', 'E', 'SE', 'S', 'SW', 'W', 'NW', 'CENTER'],\n\t\t\t'activestyle': ['DOTBOX', 'NONE', 'UNDERLINE'],\n\t\t\t'indicatoron': ['True', 'False'],\n\t\t\t'orient': ['HORIZONTAL', 'VERTICAL'],\n\t\t\t'wrap': ['CHAR', 'WORD'],\n\t\t\t'font': \"see 'Available Fonts' in File menu\",\n\t\t\t'sticky': [\n\t\t\t\t'E', 'W', 'N', 'S', 'E+W', 'N+S',\n\t\t\t\t'N+W', 'S+W', 'S+E', 'N+E', 'W+E+N+S'\n\t\t\t]\n\t\t}\n\n\t\twidget_dict = {}\n\t\tfor index, (k, v) in enumerate(self.layout.items()):\n\n\t\t\tif 'label' not in k:\n\t\t\t\tcontinue\n\t\t\tkey = self.layout[k].cget('text')\n\t\t\tif key.isdigit():\n\t\t\t\tcontinue\n\t\t\ttry:\n\t\t\t\tvalue = self.layout[k.split('_')[0]].get()\n\t\t\texcept Exception:\n\t\t\t\tvalue = self.layout[k.split('_')[0]].get('1.0', END).strip()\n\n\t\t\tif value == -1 or (not value and isinstance(value, str)):\n\t\t\t\tcontinue\n\n\t\t\tif key == 'text' or key in int_vals:\n\t\t\t\twidget_dict[key] = value\n\t\t\t\tcontinue\n\n\t\t\tif key in ('rowspan', 'columnspan'):\n\t\t\t\tif value > 0:\n\t\t\t\t\twidget_dict[key] = value\n\t\t\t\tcontinue\n\n\t\t\tif key == 'values':\n\t\t\t\tif ',' not in value:\n\t\t\t\t\treturn {'ERROR': {key: 'Use a comma-separated list'}}\n\t\t\t\twidget_dict[key] = ', '.join(\n\t\t\t\t\t['\\'%s\\'' % i.strip() for i in value.split(',') if i])\n\t\t\t\tcontinue\n\n\t\t\tif key == 'justify':\n\t\t\t\tval = value.upper()\n\t\t\t\tif val not in ('LEFT', 'CENTER', 'RIGHT'):\n\t\t\t\t\treturn {'ERROR': {key: 'Use LEFT, CENTER, or RIGHT'}}\n\t\t\t\twidget_dict[key] = val\n\t\t\t\tcontinue\n\n\t\t\tif key == 'command':\n\t\t\t\tif value in self.reserved or value in self.available_widgets:\n\t\t\t\t\tmsg = 'Invalid Name, %s is reserved' % value\n\t\t\t\t\treturn {'ERROR': {key: msg}}\n\t\t\t\tif not value.isidentifier() or iskeyword(value):\n\t\t\t\t\tmsg = 'Only use valid Python naming conventions'\n\t\t\t\t\treturn {'ERROR': {key: msg}}\n\t\t\t\twidget_dict[key] = value\n\t\t\t\tcontinue\n\n\t\t\tif key == 'font':\n\t\t\t\ttry:\n\t\t\t\t\tfont_type, font_size = value.split()\n\t\t\t\texcept Exception:\n\t\t\t\t\treturn {'ERROR': {key: valid[key]}}\n\t\t\t\tsizes = [str(i) for i in range(8, 65, 2)]\n\t\t\t\tif font_type not in names() or font_size not in sizes:\n\t\t\t\t\treturn {'ERROR': {key: valid['font']}}\n\t\t\t\twidget_dict[key] = value\n\t\t\t\tcontinue\n\n\t\t\tif key == 'image':\n\t\t\t\tif isfile(value):\n\t\t\t\t\twidget_dict[key] = value\n\t\t\t\t\tcontinue\n\t\t\t\treturn {'ERROR': {key: 'Invalid image file'}}\n\n\t\t\tif key == 'show':\n\t\t\t\tif value != '*':\n\t\t\t\t\tmsg = 'Leave this field blank, or use * for password entry'\n\t\t\t\t\treturn {'ERROR': {key: msg}}\n\t\t\t\twidget_dict[key] = value\n\t\t\t\tcontinue\n\n\t\t\tfor sep in '|:|', '|$|', '|@|':\n\t\t\t\tif not isinstance(value, int) and sep in value:\n\t\t\t\t\treturn {'ERROR': {key: 'Chars not allowed: %s' % value}}\n\n\t\t\tcheck = {\n\t\t\t\t'activeforeground': self.valid_color(value),\n\t\t\t\t'insertbackground': self.valid_color(value),\n\t\t\t\t'activebackground': self.valid_color(value),\n\t\t\t\t'highlightcolor': self.valid_color(value),\n\t\t\t\t'selectcolor': self.valid_color(value),\n\t\t\t\t'background': self.valid_color(value),\n\t\t\t\t'foreground': self.valid_color(value),\n\t\t\t\t'selectbackground': self.valid_color(value),\n\t\t\t\t'selectforeground': self.valid_color(value),\n\t\t\t\t'troughcolor': self.valid_color(value),\n\t\t\t\t'relief': value in valid[key],\n\t\t\t\t'sliderrelief': value in valid[key],\n\t\t\t\t'selectmode': value in valid[key],\n\t\t\t\t'anchor': value in valid[key],\n\t\t\t\t'activestyle': value in valid[key],\n\t\t\t\t'indicatoron': value in valid[key],\n\t\t\t\t'orient': value in valid[key],\n\t\t\t\t'wrap': value in valid[key],\n\t\t\t\t'sticky': value in valid[key]\n\t\t\t}\n\n\t\t\tif not check[key]:\n\t\t\t\treturn {'ERROR': {key: valid[key]}}\n\t\t\twidget_dict[key] = value\n\n\t\tname = self.widget_name.get().strip()\n\t\tif name in self.reserved or name in self.available_widgets:\n\t\t\tmsg = 'Invalid Name %s is reserved' % name\n\t\t\treturn {'ERROR': {'name': msg}}\n\t\tif not name or not name.isidentifier() or iskeyword(name):\n\t\t\tmsg = 'Invalid Name, use Python naming conventions'\n\t\t\treturn {'ERROR': {'name': msg}}\n\t\tif not self.is_existing and name in self.project:\n\t\t\tmsg = 'Invalid Name, name already exists'\n\t\t\treturn {'ERROR': {'name': msg}}\n\t\twidget_dict['name'] = name\n\n\t\tfor k, v in widget_dict.items():\n\t\t\tif k in color_types and v not in self.valid_colors:\n\t\t\t\twidget_dict[k] = '#%s' % v\n\t\treturn widget_dict\n\n\tdef add_icon(self):\n\t\tself.refresh()\n\t\tself.blackout()\n\t\tself.icon = askopenfilename(\n\t\t\ttitle='16x16 .png',\n\t\t\tfiletypes=((\"png files\", \"*.png\"),)\n\t\t)\n\t\tif not self.icon:\n\t\t\tself.message_thread('No icon path entered')\n\t\telif not isfile(self.icon):\n\t\t\tself.icon = ''\n\t\t\tself.message_thread('Invalid icon path entered')\n\t\telse:\n\t\t\tself.message_thread(self.icon)\n\t\t\tself.update('ICON', changes=self.icon)\n\n\tdef add_dimensions(self):\n\t\ttry:\n\t\t\txdim = int(self.xydim['xdim'].get('1.0', END).strip())\n\t\t\tydim = int(self.xydim['ydim'].get('1.0', END).strip())\n\t\texcept Exception:\n\t\t\tself.xydim['warnlabel'].configure(text='Integers only')\n\t\telse:\n\t\t\tif not all([xdim < 2000, ydim < 2000, xdim > 0, ydim > 0]):\n\t\t\t\tself.xydim['warnlabel'].configure(text='0 - 2000 only')\n\t\t\telse:\n\t\t\t\tself.popup.destroy()\n\t\t\t\tself.update('DIMENSIONS', changes='%sx%s' % (xdim, ydim))\n\t\t\t\tself.popup.destroy()\n\n\tdef remove(self):\n\t\ttry:\n\t\t\tname = self.existing_box.get(self.existing_box.curselection())\n\t\texcept Exception:\n\t\t\tself.message_thread('Select an existing widget')\n\t\telse:\n\t\t\tself.update('REMOVE', name)\n\n\tdef add_style(self):\n\t\tif not self.theme:\n\t\t\tself.theme_layout['warnlabel'].configure(text='Select a theme')\n\t\telse:\n\t\t\tself.popup.destroy()\n\t\t\tself.update('THEME', self.theme)\n\t\t\tself.theme = ''\n\n\tdef add_title(self):\n\t\ttitle = self.title['title'].get('1.0', END).strip()\n\t\tif not title:\n\t\t\tself.title['warnlabel'].configure(text='Enter a title')\n\t\telif not title.isidentifier() or iskeyword(title):\n\t\t\tmsg = 'Use valid Python\\nnaming conventions'\n\t\t\tself.title['warnlabel'].configure(text=msg)\n\t\telse:\n\t\t\tself.popup.destroy()\n\t\t\tself.update('TITLE', changes=title)\n\t\t\tself.title = None\n\n\tdef add_menu_item(self):\n\t\tmenu = self.menu_layout['menu_title'].get('1.0', END).strip()\n\t\tsubs = self.menu_layout['submenus'].get('1.0', END).strip()\n\n\t\tif not menu:\n\t\t\tself.menu_layout['warnlabel'].configure(text='Missing menu title')\n\t\telif not subs:\n\t\t\tself.menu_layout['warnlabel'].configure(text='Missing submenus')\n\t\telse:\n\t\t\tmsg = '%s,%%s' % menu\n\t\t\tmsg = msg % ','.join([sm.strip() for sm in subs.split(',') if sm])\n\t\t\tself.popup.destroy()\n\t\t\tself.update('MENU', changes=msg)\n\t\t\tself.menu_layout = {}\n\n\tdef add_color(self):\n\t\tcolor = self.color['color'].get('1.0', END).strip()\n\n\t\tif self.valid_color(color):\n\t\t\tif color not in self.valid_colors:\n\t\t\t\tcolor = '#%s' % color\n\t\t\tself.popup.destroy()\n\t\t\tself.update('APPCOLOR', changes=color)\n\t\t\tself.color = {}\n\t\telse:\n\t\t\tself.color['warnlabel'].configure(text='Invalid app color')\n\t\t\tself.color['color'].delete('1.0', END)\n\n\tdef add_menu_color(self):\n\t\tfg = self.menu_color['fg'].get('1.0', END).strip()\n\t\tbg = self.menu_color['bg'].get('1.0', END).strip()\n\t\tif not self.valid_color(fg):\n\t\t\tself.menu_color['warnlabel'].configure(text='Invalid foreground')\n\t\telif not self.valid_color(bg):\n\t\t\tself.menu_color['warnlabel'].configure(text='Invalid background')\n\t\telse:\n\t\t\tif fg not in self.valid_colors:\n\t\t\t\tfg = '#%s' % fg\n\t\t\tif bg not in self.valid_colors:\n\t\t\t\tbg = '#%s' % bg\n\t\t\tself.popup.destroy()\n\t\t\tself.update('MENUCOLOR', changes='%s|:|%s' % (fg, bg))\n\t\t\tself.menu_color = {}\n\n\tdef set_font(self, current_font):\n\t\tself.font['font'] = current_font\n\n\tdef add_current_font(self):\n\t\tfont = self.font['fontbox'].get(self.font['fontbox'].curselection())\n\t\tfont_size = self.font['font']\n\t\tif not font_size:\n\t\t\tfont_size = '8'\n\t\tfor k, v in self.layout.items():\n\t\t\tif 'label' in k and self.layout[k].cget('text') == 'font':\n\t\t\t\ttext_box = k.split('_')[0]\n\t\t\t\tself.layout[text_box].delete('1.0', END)\n\t\t\t\tself.layout[text_box].insert(END, '%s %s' % (font, font_size))\n\t\tself.popup.destroy()\n\n\tdef build(self):\n\t\tself.message_thread('Executing current build...')\n\t\tself.update('BUILD')\n\n\tdef fill_current_widget(self):\n\t\tif not self.sel:\n\t\t\tself.message_thread('Please select a widget')\n\t\telif self.sel == 'Button':\n\t\t\tself.set_name_txt('Button')\n\t\t\tself.display_button()\n\t\telif self.sel == 'Checkbutton':\n\t\t\tself.set_name_txt('Checkbutton')\n\t\t\tself.display_checkbutton()\n\t\telif self.sel == 'Entry':\n\t\t\tself.set_name_txt('Entry')\n\t\t\tself.display_entry()\n\t\telif self.sel == 'Image':\n\t\t\tself.set_name_txt('Image')\n\t\t\tself.display_image()\n\t\telif self.sel == 'Label':\n\t\t\tself.set_name_txt('Label')\n\t\t\tself.display_label()\n\t\telif self.sel == 'Listbox':\n\t\t\tself.set_name_txt('Listbox')\n\t\t\tself.display_listbox()\n\t\telif self.sel == 'Radiobutton':\n\t\t\tself.set_name_txt('Radiobutton')\n\t\t\tself.display_radiobutton()\n\t\telif self.sel == 'Scale':\n\t\t\tself.set_name_txt('Scale')\n\t\t\tself.display_scale()\n\t\telif self.sel == 'Spinbox':\n\t\t\tself.set_name_txt('Spinbox')\n\t\t\tself.display_spinbox()\n\t\telif self.sel == 'Text':\n\t\t\tself.set_name_txt('Text')\n\t\t\tself.display_text()\n\n\tdef set_current_widget(self):\n\t\tself.is_existing = False\n\t\ttry:\n\t\t\tself.sel = self.new_box.get(self.new_box.curselection())\n\t\texcept Exception:\n\t\t\tself.sel = ''\n\t\telse:\n\t\t\tself.widget_name.configure(state=NORMAL)\n\t\t\tself.fill_current_widget()\n\n\tdef set_existing_widget(self):\n\t\tself.widget_name.configure(state=NORMAL)\n\t\tself.is_existing = True\n\t\ttry:\n\t\t\tname = self.existing_box.get(self.existing_box.curselection())\n\t\texcept Exception:\n\t\t\tself.message_thread('Select a widget')\n\t\telse:\n\t\t\tself.load_project_json()\n\t\t\ttry:\n\t\t\t\tself.sel = self.project[name]['widget']\n\t\t\t\tif self.sel == 'Spinbox' and 'values' in self.project[name]:\n\t\t\t\t\ttmp = self.project[name]['values'].replace('\\'', '')\n\t\t\t\t\tself.project[name]['values'] = tmp\n\n\t\t\t\tfor attr, value in self.project[name].items():\n\t\t\t\t\tif isinstance(value, str) and value[:1] == '#':\n\t\t\t\t\t\tself.project[name][attr] = value[1:]\n\n\t\t\t\tself.fill_current_widget()\n\t\t\t\tself.fill_existing_widget(name)\n\t\t\texcept Exception:\n\t\t\t\tself.sel = self.project[name]\n\t\t\t\tif name != 'ICON':\n\t\t\t\t\tself.add_menu()\n\t\t\t\t\tself.menu_layout['menu_title'].delete('1.0', END)\n\t\t\t\t\tself.menu_layout['menu_title'].insert(END, name)\n\t\t\t\t\tsubs = ','.join([v for k, v in self.sel.items()])\n\t\t\t\t\tself.menu_layout['submenus'].delete('1.0', END)\n\t\t\t\t\tself.menu_layout['submenus'].insert(END, subs)\n\t\t\t\telse:\n\t\t\t\t\tself.add_icon()\n\t\t\tself.widget_name.configure(state=DISABLED)\n\n\tdef fill_existing_widget(self, name):\n\t\tself.widget_name.delete(0, END)\n\t\tself.widget_name.insert(0, name)\n\t\tfor k, v in self.layout.items():\n\t\t\tif 'label' in k and not self.layout[k].cget('text').isnumeric():\n\t\t\t\tlabel = self.layout[k].cget('text')\n\t\t\t\tvx = k.split('_')[0]\n\t\t\t\tif label in self.project[name]:\n\t\t\t\t\tif int(str(vx[1:])) < 12:\n\t\t\t\t\t\tself.layout[vx].set(self.project[name][label])\n\t\t\t\t\telse:\n\t\t\t\t\t\tself.layout[vx].delete('1.0', END)\n\t\t\t\t\t\tself.layout[vx].insert(END, self.project[name][label])\n\n\tdef fill_layout(self, layout):\n\t\tindex = 1\n\t\tfor side in 'left', 'right':\n\t\t\tfor k, v in layout[side].items():\n\t\t\t\tlabel = 'v%d_label' % index\n\t\t\t\tself.layout[label].configure(text=k)\n\t\t\t\tif side != 'left':\n\t\t\t\t\tself.layout[label[:-6]].delete('1.0', END)\n\t\t\t\t\tself.layout[label[:-6]].insert(END, v)\n\t\t\t\tindex += 1\n\n\tdef disable(self, key):\n\t\tself.layout[key].configure(state=DISABLED)\n\t\ttarget = key.split('_')[0]\n\t\tself.layout[target].config(\n\t\t\tfg='black',\n\t\t\thighlightthickness=0,\n\t\t\tstate=DISABLED\n\t\t)\n\t\tif int(target[1:]) < 12:\n\t\t\tself.layout[target].config(sliderrelief=FLAT)\n\n\tdef blackout(self):\n\t\tfor k, _ in self.layout.items():\n\t\t\tif 'label' in k:\n\t\t\t\tself.disable(k)\n\n\tdef disable_remaining(self):\n\t\tfor k, _ in self.layout.items():\n\t\t\tif 'label' in k and self.layout[k].cget('text').isnumeric():\n\t\t\t\tself.disable(k)\n\n\tdef destroy_theme_box(self):\n\t\tself.theme = ''\n\t\tself.popup.destroy()\n\n\tdef quit(self):\n\t\tif askyesno('Exit', 'Exit Visipy?'):\n\t\t\tself.set_status('Exiting')\n\t\t\tself.update('EXIT')\n\t\t\tTk().quit()\n\n\tdef reset(self):\n\t\tif askyesno('Reset Project', 'Clear entire project?'):\n\t\t\tself.set_status('Resetting')\n\t\t\tself.update('RESET')\n\n\tdef set_theme(self):\n\t\tself.theme = self.theme_layout['theme'].get()\n\n\tdef populate_add_widgets(self):\n\t\t[self.new_box.insert(END, w) for w in self.available_widgets]\n\n\tdef populate_existing_widgets(self):\n\t\tself.load_project_json()\n\t\twidgets = [key for key in self.project if key not in self.reserved]\n\t\tself.existing_box.delete(0, END)\n\t\t_ = [self.existing_box.insert(END, widget) for widget in widgets]\n\t\tdim = self.project['DIMENSIONS'].get('dimensions').strip().split('x')\n\t\tself.xdim.config(text='L : %s' % dim[0])\n\t\tself.ydim.config(text='W : %s' % dim[1])\n\n\tdef populate_code(self):\n\t\tself.load_project_code()\n\t\tself.build_box.delete(0, 'end')\n\t\tself.build_box.insert('end', *self.code.split('\\n'))\n\n\tdef write_file(self):\n\t\tfile_path = asksaveasfilename(\n\t\t\ttitle='Write Current Build',\n\t\t\tfiletypes=(('all files', '*.*'),)\n\t\t)\n\t\tif file_path:\n\t\t\tself.message_thread('creating project files')\n\t\t\tself.update('WRITE', file_path)\n\n\tdef load_user_project(self):\n\t\tuser_path = askopenfilename()\n\t\tif not user_path or not isfile(user_path):\n\t\t\tself.message_thread('Invalid file chosen')\n\t\telse:\n\t\t\tself.update('LOADUSERPROJ', changes=user_path)\n\n\tdef load_project_json(self):\n\t\twith open(self.data_path) as file_in:\n\t\t\tself.project = load(file_in)\n\n\tdef load_project_code(self):\n\t\twith open(self.code_path) as code_in:\n\t\t\tself.code = code_in.read()\n\n\tdef set_status(self, incoming):\n\t\tself.status_label.config(text=incoming)\n\t\tself.status_label.update_idletasks()\n\n\tdef set_name_txt(self, incoming):\n\t\tif self.widget_type['state'] != 'normal':\n\t\t\tself.widget_type.config(state=NORMAL)\n\t\tself.message_thread('Edit %s' % incoming)\n\t\tself.widget_type.delete('1.0', END)\n\t\tself.widget_type.insert(END, incoming)\n\t\tif self.sel in self.available_widgets:\n\t\t\tself.widget_type.config(state=DISABLED)\n\n\tdef check_rowspan(self, current):\n\t\tif current == '0' and self.layout['v3'].get() == 0:\n\t\t\tself.set_status('0 is not allowed for rowspan')\n\t\t\tself.layout['v3_label'].configure(fg='red')\n\t\telse:\n\t\t\tself.layout['v3_label'].configure(fg=self.light)\n\t\t\tself.set_status('')\n\n\tdef check_columnspan(self, current):\n\t\tif current == '0' and self.layout['v4'].get() == 0:\n\t\t\tself.set_status('0 is not allowed for columnspan')\n\t\t\tself.layout['v4_label'].configure(fg='red')\n\t\telse:\n\t\t\tself.layout['v4_label'].configure(fg=self.light)\n\t\t\tself.set_status('')\n\n\tdef refresh(self):\n\t\tself.clear()\n\t\tfor _, v in self.layout.items():\n\t\t\tif v['state'] != 'disabled':\n\t\t\t\tcontinue\n\t\t\twidget_type = str(v)\n\t\t\tif 'label' in widget_type:\n\t\t\t\tv.config(\n\t\t\t\t\tfg=self.light,\n\t\t\t\t\tstate=NORMAL\n\t\t\t\t)\n\t\t\telif 'text' in widget_type:\n\t\t\t\tv.config(\n\t\t\t\t\tfg='cyan',\n\t\t\t\t\thighlightthickness=1,\n\t\t\t\t\tstate=NORMAL\n\t\t\t\t)\n\t\t\telif 'scale' in widget_type:\n\t\t\t\tv.config(\n\t\t\t\t\tsliderrelief=SUNKEN,\n\t\t\t\t\tfg='cyan',\n\t\t\t\t\tstate=NORMAL\n\t\t\t\t)\n\n\tdef clear(self):\n\t\tself.widget_name.delete(0, END)\n\t\tfor k, v in self.layout.items():\n\t\t\tif 'label' not in k:\n\t\t\t\ttry:\n\t\t\t\t\tself.layout[k].set(-1)\n\t\t\t\texcept Exception:\n\t\t\t\t\tself.layout[k].delete('1.0', END)\n\n\nif __name__ == \"__main__\":\n\troot = Tk()\n\troot.style = Style()\n\troot.style.theme_use('clam')\n\tVisiPy(root)\n\troot.mainloop()\n`)\n\treturn bytes.ReplaceAll(vpy, []byte{0x09}, []byte{0x20, 0x20, 0x20, 0x20})\n}", "title": "" }, { "docid": "1fbf4e3e4042d4775c4e13354583ce73", "score": "0.46264082", "text": "func (sc *Scene) ConfigRender() {\n\tsc.ConfigFrame()\n\toswin.TheApp.RunOnMain(func() {\n\t\tsc.ConfigLights()\n\t\tsc.ConfigMeshesTextures()\n\t})\n}", "title": "" }, { "docid": "336f7085891e5db3642e7ce0aa470a89", "score": "0.46051547", "text": "func (o EnterpriseCrmFrontendsEventbusProtoTaskEntityOutput) UiConfig() EnterpriseCrmEventbusProtoTaskUiConfigPtrOutput {\n\treturn o.ApplyT(func(v EnterpriseCrmFrontendsEventbusProtoTaskEntity) *EnterpriseCrmEventbusProtoTaskUiConfig {\n\t\treturn v.UiConfig\n\t}).(EnterpriseCrmEventbusProtoTaskUiConfigPtrOutput)\n}", "title": "" }, { "docid": "3a34b351150347955548673ee9ab8121", "score": "0.45643893", "text": "func (client *Client) startGUI() {\n\tg, err := gocui.NewGui(gocui.OutputNormal)\n\tif err != nil {\n\t\t//handle error\n\t\tlog.Fatal(err)\n\t}\n\tdefer g.Close()\n\n\t//set the main func\n\tg.SetManagerFunc(client.layout)\n\n\t//set key binding\n\tif err := client.keybindings(g); err != nil {\n\t\tlog.Panicln(err)\n\t}\n\n\t//main loop but we need to code above this line\n\tif err := g.MainLoop(); err != nil && err != gocui.ErrQuit {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "e6961a9fba879d499172b75aca08d74c", "score": "0.44911277", "text": "func GuiLocked() bool {\n\treturn guiLocked\n}", "title": "" }, { "docid": "ede54026827e585c6eff1943bb29fedb", "score": "0.4489624", "text": "func (gr *Grunt) ConfigTableView(tv *etview.TableView) {\n\ttv.SetProp(\"inactive\", true)\n\ttv.SetInactive()\n\ttv.InactMultiSel = true\n\ttv.WidgetSig.ConnectOnly(tv.This(), func(recv, send ki.Ki, sig int64, data interface{}) {\n\t\tif sig != int64(gi.WidgetSelected) {\n\t\t\treturn\n\t\t}\n\t\tsels := gr.SelectedJobs(false)\n\t\tif len(sels) == 0 {\n\t\t\tgr.StatusMsg(\"no jobs selected\")\n\t\t} else {\n\t\t\tseltxt := strings.Join(sels, \" \")\n\t\t\tgr.StatusMsg(\"jobs selected: \" + seltxt)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "7429b01c2b3347ebb99bb42b7878c809", "score": "0.44882488", "text": "func (bt *Govarbeat) Config(b *beat.Beat) error {\n\n\t// Load beater configuration\n\terr := cfgfile.Read(&bt.Configuration, \"\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error reading config file: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "74d3e269f14b4445be96e550d975d146", "score": "0.4480345", "text": "func New(g *gocui.Gui, c *client.Client) *Gui {\n\treturn &Gui{\n\t\tg: g,\n\t\tc: c,\n\t}\n}", "title": "" }, { "docid": "081e7061f3e30cf8626ccbb7dc1e9f40", "score": "0.44712558", "text": "func NewUI(game *Gokoban) *UI {\n\tui := new(UI)\n\tui.game = game\n\n\tvar err error\n\n\tui.Panel.Initialize(ui, 1280, 920)\n\tui.SetEnabled(false)\n\tui.inMenu = true\n\n\tui.loadingLabel = gui.NewLabel(\"Loading...\")\n\tui.loadingLabel.SetColor(&math32.Color{1, 1, 1})\n\tui.loadingLabel.SetFontSize(42)\n\tui.loadingLabel.SetPositionX(((ui.ContentWidth() - ui.loadingLabel.ContentWidth()) / 2)+ 0.5)\n\tui.loadingLabel.SetPositionY(((ui.ContentHeight() - ui.loadingLabel.ContentHeight()) / 2)+ 0.5)\n\tui.Add(ui.loadingLabel)\n\n\t// Title\n\tui.titleImage, err = gui.NewImageButton(\"./gui/title3.png\")\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tui.titleImage.SetImage(gui.ButtonDisabled, \"./gui/title3.png\")\n\tui.titleImage.SetEnabled(false)\n\tui.titleImage.SetZLayerDelta(1)\n\tui.titleImage.SetPositionX((ui.ContentWidth() - ui.titleImage.ContentWidth()) / 2)\n\tui.Add(ui.titleImage)\n\n\treturn ui\n}", "title": "" }, { "docid": "a630a754c61bc714668743013709807e", "score": "0.44618976", "text": "func (o EnterpriseCrmFrontendsEventbusProtoTaskEntityPtrOutput) UiConfig() EnterpriseCrmEventbusProtoTaskUiConfigPtrOutput {\n\treturn o.ApplyT(func(v *EnterpriseCrmFrontendsEventbusProtoTaskEntity) *EnterpriseCrmEventbusProtoTaskUiConfig {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.UiConfig\n\t}).(EnterpriseCrmEventbusProtoTaskUiConfigPtrOutput)\n}", "title": "" }, { "docid": "eb9e7d33d8d83a885439fe75610c4535", "score": "0.44449997", "text": "func Config() {\n\tmg.Deps(shortConfig, referenceConfig, dockerConfig, createDirModulesD)\n}", "title": "" }, { "docid": "1fc66fbf115ba5e3121fd1a4ff8f0372", "score": "0.4438186", "text": "func ConfigureDOM(path string) {\n\tvar token string\n\tvar region string\n\tvar imageid string\n\tvar size string\n\n\tfmt.Println(\"\\nYou need to obtain Personal Access Token from DigitalOcean\")\n\tfmt.Printf(\"This can be generated from https://cloud.digitalocean.com/settings/applications \\n\\n\")\n\tfmt.Printf(\"Token: \")\n\tfmt.Scan(&token)\n\tfmt.Printf(\"Token entered: %s\\n\", token)\n\n\tfmt.Println(\"Please enter 0 for default setting\")\n\tfmt.Printf(\"Enter your default region ID (0 for default to New York(nyc3)): \")\n\tfmt.Scan(&region)\n\tfmt.Printf(\"Enter your default image ID (0 for default to 11836690 (Ubuntu 14.04 x64)): \")\n\tfmt.Scan(&imageid)\n\tfmt.Printf(\"Enter your default size ID (0 for default to 512MB): \")\n\tfmt.Scan(&size)\n\n\tif region == \"0\" {\n\t\tregion = \"nyc3\"\n\t}\n\tif imageid == \"0\" {\n\t\timageid = \"11836690\"\n\t}\n\tif size == \"0\" {\n\t\tsize = \"512MB\"\n\t}\n\n\tconfig := Configuration{token, region, size, imageid}\n\tconfigB, _ := json.MarshalIndent(config, \" \", \" \")\n\tfmt.Printf(\"%s\\n\", configB)\n\tioutil.WriteFile(path, configB, 0644)\n\n}", "title": "" }, { "docid": "3cb39e4cb65cfbc59e7050a2fca936d0", "score": "0.44365203", "text": "func (w *Window) Init(firstScene string, configOptions ...ConfigOption) error {\n\n\tvar err error\n\tw.config, err = NewConfig(configOptions...)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to create config: %w\", err)\n\t}\n\n\t// if c.config.Screen.TargetWidth != 0 && c.config.Screen.TargetHeight != 0 {\n\t// \tw, h := driver.MonitorSize()\n\t// \tif w != 0 || h != 0 {\n\t// \t\t// Todo: Modify conf.Screen.Scale\n\t// \t}\n\t// }\n\n\tlvl, err := dlog.ParseDebugLevel(w.config.Debug.Level)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"failed to parse debug config: %w\", err)\n\t}\n\tdlog.SetFilter(func(msg string) bool {\n\t\treturn strings.Contains(msg, w.config.Debug.Filter)\n\t})\n\terr = dlog.SetLogLevel(lvl)\n\tif err != nil {\n\t\treturn err\n\t}\n\terr = oakerr.SetLanguageString(w.config.Language)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// TODO: languages\n\n\tw.ScreenWidth = w.config.Screen.Width\n\tw.ScreenHeight = w.config.Screen.Height\n\tw.FrameRate = w.config.FrameRate\n\tw.DrawFrameRate = w.config.DrawFrameRate\n\tw.IdleDrawFrameRate = w.config.IdleDrawFrameRate\n\t// assume we are in focus on window creation\n\tw.inFocus = true\n\n\tw.DrawTicker = time.NewTicker(timing.FPSToFrameDelay(w.DrawFrameRate))\n\n\twd, _ := os.Getwd()\n\n\trender.SetFontDefaults(wd, w.config.Assets.AssetPath, w.config.Assets.FontPath,\n\t\tw.config.Font.Hinting, w.config.Font.Color, w.config.Font.File, w.config.Font.Size,\n\t\tw.config.Font.DPI)\n\n\tif w.config.TrackInputChanges {\n\t\ttrackJoystickChanges(w.logicHandler)\n\t}\n\tif w.config.EventRefreshRate != 0 {\n\t\tw.logicHandler.SetRefreshRate(time.Duration(w.config.EventRefreshRate))\n\t}\n\n\tif !w.config.SkipRNGSeed {\n\t\t// seed math/rand with time.Now, useful for minimal examples\n\t\t//that would tend to forget to do this.\n\t\trand.Seed(time.Now().UTC().UnixNano())\n\t}\n\n\timageDir := filepath.Join(wd,\n\t\tw.config.Assets.AssetPath,\n\t\tw.config.Assets.ImagePath)\n\taudioDir := filepath.Join(wd,\n\t\tw.config.Assets.AssetPath,\n\t\tw.config.Assets.AudioPath)\n\n\t// TODO: languages\n\tgo w.sceneLoop(firstScene, w.config.TrackInputChanges)\n\trender.SetAssetPaths(imageDir)\n\tgo w.loadAssets(imageDir, audioDir)\n\tif w.config.EnableDebugConsole {\n\t\tgo w.debugConsole(os.Stdin, os.Stdout)\n\t}\n\tw.Driver(w.lifecycleLoop)\n\treturn w.exitError\n}", "title": "" }, { "docid": "037b668ead23eedcce36bc557b19cf84", "score": "0.44048703", "text": "func configureWaterInterface(waterInterface *water.Interface, cliConfig *VpnConfig) error {\n\tcommandList := []string{\n\t\tfmt.Sprintf(cmdAddAddr, waterInterface.Name(), cliConfig.Ip),\n\t\tfmt.Sprintf(cmdSetUp, waterInterface.Name()),\n\t\tfmt.Sprintf(cmdSetMtu, waterInterface.Name(), cliConfig.Mtu),\n\t}\n\tfor _, cmd := range commandList {\n\t\tif stdout, err := exec.Command(\"sh\", \"-c\", cmd).CombinedOutput(); err != nil {\n\t\t\treturn errors.New(fmt.Sprintf(\"configureInterface: '%v' failed: '%v'\", cmd, stdout))\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "606af136a0fe7daa7d4824e8123bfb9e", "score": "0.43907765", "text": "func InitConfig(cfgFile string) {\n\tprompt := promptui.Prompt{\n\t\tLabel: \"Your DONE list ID\",\n\t\tValidate: validateEmpty,\n\t}\n\tlistDoneID, err := prompt.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tprompt = promptui.Prompt{\n\t\tLabel: \"Your TODO list ID\",\n\t\tValidate: validateEmpty,\n\t}\n\tlistTodoID, err := prompt.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tprompt = promptui.Prompt{\n\t\tLabel: \"Key\",\n\t\tValidate: validateEmpty,\n\t\tMask: '*',\n\t}\n\tkey, err := prompt.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tprompt = promptui.Prompt{\n\t\tLabel: \"Token\",\n\t\tValidate: validateEmpty,\n\t\tMask: '*',\n\t}\n\ttoken, err := prompt.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tprompt = promptui.Prompt{\n\t\tLabel: \"Output folder\",\n\t}\n\toutputFolder, err := prompt.Run()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tcfgContent := []byte(fmt.Sprintf(`%s: %s\n%s: %s\n%s: %s\n%s: %s\n%s: %s`,\n\t\tlistDoneIDKey, listDoneID,\n\t\tlistTodoIDKey, listTodoID,\n\t\tkeyKey, key,\n\t\ttokenKey, token,\n\t\toutputFolderKey, outputFolder,\n\t))\n\terr = ioutil.WriteFile(cfgFile, cfgContent, 0644)\n\n\tif err != nil {\n\t\tlog.Fatalf(\"%v\", err)\n\t}\n}", "title": "" }, { "docid": "e99a55d4b3f538a5c402d41604731aeb", "score": "0.43854392", "text": "func (global *GlobalConfig) PromptUserForConfig() error {\n\tvar c GlobalConfig\n\tif err := prompt.Dialog(&c, \"Insert the\"); err != nil {\n\t\treturn err\n\t}\n\n\t*global = c\n\treturn nil\n}", "title": "" }, { "docid": "0ae19f98904a3e94f2ea5cad6d424c16", "score": "0.43845767", "text": "func (pb *Packet) Config() error {\n\n\t// CLI flags over-riding config\n\tif *pb.CmdLineArgs.TopSpeed {\n\t\tpb.PbConfig.Interfaces.TopSpeed = true\n\t}\n\n\tif len(*pb.CmdLineArgs.File) > 0 {\n\t\tpb.PbConfig.Interfaces.File = *pb.CmdLineArgs.File\n\t}\n\n\tpb.PbConfig.Interfaces.Loop = *pb.CmdLineArgs.Loop\n\tpb.PbConfig.Interfaces.OneAtATime = *pb.CmdLineArgs.OneAtAtime\n\n\tif len(*pb.CmdLineArgs.Dumpfile) > 0 {\n\t\tpb.PbConfig.Interfaces.Dumpfile = *pb.CmdLineArgs.Dumpfile\n\t}\n\n\tfilters, err := filter.New(pb.PbConfig.Filter)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error initializing filters: %v\", err)\n\t} else {\n\t\tpb.filters = filters\n\t}\n\n\t// assign global singleton as it is used in protocols\n\t// TODO: Refactor\n\tsettings.SettingSingleton = pb.PbConfig\n\n\treturn nil\n}", "title": "" }, { "docid": "0626475f13456c3561d29c42334c9b6a", "score": "0.4381991", "text": "func SetUIOption(name string, value interface{}) {\n\tname(nvim_ui_set_option)\n}", "title": "" }, { "docid": "aa12786e0309bcf108faea462ab6fc41", "score": "0.43760312", "text": "func runConfig() {\n\tif opts.Query == \"\" {\n\t\t// force default order if there's no query\n\t\twf.Configure(aw.SuppressUIDs(true))\n\t}\n\n\tswitch opts.ConfigChoice {\n\tcase \"font\":\n\t\trunFonts()\n\t\treturn\n\tcase \"text-colour\", \"background-colour\":\n\t\trunColour()\n\t\treturn\n\tcase \"formatters\":\n\t\trunFormatters()\n\t\treturn\n\t}\n\n\t// update status\n\tvar (\n\t\ttitle = \"Workflow Is Up To Date\"\n\t\tsub = \"↩ to check for update now\"\n\t\ticon = iconUpdateOK\n\t)\n\tif wf.UpdateAvailable() {\n\t\ttitle = \"Update Available!\"\n\t\tsub = \"↩ to download and install\"\n\t\ticon = iconUpdateAvailable\n\t}\n\n\twf.NewItem(title).\n\t\tSubtitle(sub).\n\t\tAutocomplete(\"workflow:update\").\n\t\tUID(\"update\").\n\t\tIcon(icon).\n\t\tValid(false)\n\n\t// formatters\n\twf.NewItem(\"Formatters\").\n\t\tSubtitle(\"Edit active formatters\").\n\t\tArg(\"formatters\").\n\t\tUID(\"formatters\").\n\t\tValid(true).\n\t\tIcon(aw.IconWorkflow).\n\t\tVar(\"action\", \"\").\n\t\tVar(\"hide_alfred\", \"\").\n\t\tVar(\"trigger\", \"choose\").\n\t\tVar(\"trigger_query\", \"formatters\")\n\n\t// ES6 mode\n\ticon = iconToggleOff\n\targ := \"true\"\n\tif opts.ES6Mode {\n\t\ticon = iconToggleOn\n\t\targ = \"\"\n\t}\n\twf.NewItem(\"ES6 Mode\").\n\t\tSubtitle(\"Use ES6-style escapes for codepoints over 0xFFFF\").\n\t\tArg(arg).\n\t\tUID(\"es6mode\").\n\t\tValid(true).\n\t\tIcon(icon).\n\t\tVar(\"action\", \"setconfig\").\n\t\tVar(\"varname\", \"ES6_MODE\").\n\t\tVar(\"trigger\", \"config\").\n\t\tVar(\"trigger_query\", \"\")\n\n\t// font\n\ttitle = \"Font: \" + opts.FontName\n\tif opts.FontIsDefault() {\n\t\ttitle += \" (default)\"\n\t}\n\tit := wf.NewItem(title).\n\t\tSubtitle(\"Change the font used for search result icons\").\n\t\tArg(\"font\").\n\t\tUID(\"font\").\n\t\tValid(true).\n\t\tIcon(iconFont).\n\t\tVar(\"action\", \"\").\n\t\tVar(\"hide_alfred\", \"\").\n\t\tVar(\"trigger\", \"choose\").\n\t\tVar(\"trigger_query\", \"font\")\n\n\tif !opts.FontIsDefault() {\n\t\tit.NewModifier(aw.ModCmd).\n\t\t\tSubtitle(\"Reset\").\n\t\t\tIcon(iconTrash).\n\t\t\tArg(\"\").\n\t\t\tVar(\"action\", \"setconfig\").\n\t\t\tVar(\"varname\", \"FONT_NAME\").\n\t\t\tVar(\"trigger\", \"config\").\n\t\t\tVar(\"trigger_query\", \"\")\n\t}\n\n\t// text colour\n\ttitle = \"Text Colour: #\" + opts.TextColour\n\tif opts.TextColourIsDefault() {\n\t\ttitle += \" (default)\"\n\t}\n\tit = wf.NewItem(title).\n\t\tSubtitle(\"Change the text colour used for search result icons\").\n\t\tArg(\"text-colour\").\n\t\tUID(\"text-colour\").\n\t\tValid(true).\n\t\tIcon(iconColour).\n\t\tVar(\"action\", \"\").\n\t\tVar(\"hide_alfred\", \"\").\n\t\tVar(\"trigger\", \"choose\").\n\t\tVar(\"trigger_query\", \"text-colour\")\n\n\tif !opts.TextColourIsDefault() {\n\t\tit.NewModifier(aw.ModCmd).\n\t\t\tSubtitle(\"Reset\").\n\t\t\tIcon(iconTrash).\n\t\t\tArg(\"\").\n\t\t\tVar(\"action\", \"setconfig\").\n\t\t\tVar(\"varname\", \"TEXT_COLOUR\").\n\t\t\tVar(\"trigger\", \"config\").\n\t\t\tVar(\"trigger_query\", \"\")\n\t}\n\n\t// background colour\n\ttitle = \"Background Colour: #\" + opts.BackgroundColour\n\tif opts.BackgroundColourIsDefault() {\n\t\ttitle = \"Background Colour: transparent (default)\"\n\t}\n\tit = wf.NewItem(title).\n\t\tSubtitle(\"Change the background colour used for search result icons\").\n\t\tArg(\"background-colour\").\n\t\tUID(\"background-colour\").\n\t\tValid(true).\n\t\tIcon(iconColour).\n\t\tVar(\"action\", \"\").\n\t\tVar(\"hide_alfred\", \"\").\n\t\tVar(\"trigger\", \"choose\").\n\t\tVar(\"trigger_query\", \"background-colour\")\n\n\tif !opts.BackgroundColourIsDefault() {\n\t\tit.NewModifier(aw.ModCmd).\n\t\t\tSubtitle(\"Reset\").\n\t\t\tIcon(iconTrash).\n\t\t\tArg(\"\").\n\t\t\tVar(\"action\", \"setconfig\").\n\t\t\tVar(\"varname\", \"BACKGROUND_COLOUR\").\n\t\t\tVar(\"trigger\", \"config\").\n\t\t\tVar(\"trigger_query\", \"\")\n\t}\n\n\t// link to docs\n\twf.NewItem(\"Documentation\").\n\t\tSubtitle(\"Open workflow help file in your browser\").\n\t\tArg(helpFile).\n\t\tUID(\"documentation\").\n\t\tValid(true).\n\t\tIcon(iconDocs).\n\t\tVar(\"action\", \"open\").\n\t\tVar(\"hide_alfred\", \"true\")\n\n\t// link to issue tracker\n\twf.NewItem(\"Report Bug\").\n\t\tSubtitle(\"Open workflow issue tracker in your browser\").\n\t\tArg(helpURL).\n\t\tUID(\"issue\").\n\t\tValid(true).\n\t\tIcon(iconIssue).\n\t\tVar(\"action\", \"open\").\n\t\tVar(\"hide_alfred\", \"true\")\n\n\t\t// link to website\n\twf.NewItem(\"Website\").\n\t\tSubtitle(\"Open workflow website in your browser\").\n\t\tArg(website).\n\t\tUID(\"website\").\n\t\tValid(true).\n\t\tIcon(iconWebsite).\n\t\tVar(\"action\", \"open\").\n\t\tVar(\"hide_alfred\", \"true\")\n\n\t// clear cache\n\twf.NewItem(\"Delete Cached Data\").\n\t\tSubtitle(\"Force update of Unicode database and preview images\").\n\t\tUID(\"cache\").\n\t\tAutocomplete(\"workflow:delcache\").\n\t\tValid(false).\n\t\tIcon(iconTrash)\n\n\tif opts.Query != \"\" {\n\t\twf.Filter(opts.Query)\n\t}\n\n\taddNavigationItems(\"config\")\n\n\twf.WarnEmpty(\"No Matching Items\", \"Try a different query?\")\n\twf.SendFeedback()\n}", "title": "" }, { "docid": "2fc6c2169f93b89cad7951fda1bb57a2", "score": "0.43618914", "text": "func (global *GlobalConfig) PromptUserForConfig() error {\n\tvar c GlobalConfig\n\tif err := prompt.Dialog(&c, \"Insert your\"); err != nil {\n\t\treturn err\n\t}\n\n\t*global = c\n\treturn nil\n}", "title": "" }, { "docid": "2bfc8c06f19a9883052b224a56a85654", "score": "0.43574655", "text": "func (c Config) EditConfig() {\n\topenEditor(c.Path, -1)\n}", "title": "" }, { "docid": "8bfcdec5f1fd9a082aee9e249ae25293", "score": "0.43488514", "text": "func initBot(cpath, epath string) {\n\t// Initialize current config with an empty struct (to be loaded)\n\tcurrentCfg.configuration = &configuration{}\n\n\tvar err error\n\thomePath, err = os.Getwd()\n\tif err != nil {\n\t\tLog(robot.Warn, \"Unable to get cwd\")\n\t}\n\th := handler{}\n\tif err := h.GetDirectory(cpath); err != nil {\n\t\tLog(robot.Fatal, \"Unable to get/create config path: %s\", cpath)\n\t}\n\tconfigPath = cpath\n\tif filepath.IsAbs(cpath) {\n\t\tconfigFull = cpath\n\t} else {\n\t\tconfigFull = filepath.Join(homePath, cpath)\n\t}\n\tinstallPath = epath\n\n\tstate.shuttingDown = false\n\n\tif cliOp {\n\t\tsetLogLevel(robot.Warn)\n\t}\n\n\tencryptionInitialized := initCrypt()\n\tif encryptionInitialized {\n\t\tos.Setenv(\"GOPHER_ENCRYPTION_INITIALIZED\", \"initialized\")\n\t}\n\n\t// The pre-connect load is for initial configuration that doesn't\n\t// run external scripts. External plugin configuration isn't loaded and plugins\n\t// aren't initialized.\n\tif err := loadConfig(true); err != nil {\n\t\tLog(robot.Fatal, \"Loading initial configuration: %v\", err)\n\t}\n\n\tif cliOp {\n\t\tif fileLog {\n\t\t\tsetLogLevel(robot.Debug)\n\t\t} else {\n\t\t\tsetLogLevel(robot.Warn)\n\t\t}\n\t}\n\n\t// All pluggables registered, ok to stop registrations\n\tstopRegistrations = true\n\n\tif len(currentCfg.brainProvider) > 0 {\n\t\tif bprovider, ok := brains[currentCfg.brainProvider]; !ok {\n\t\t\tLog(robot.Fatal, \"No provider registered for brain: \\\"%s\\\"\", currentCfg.brainProvider)\n\t\t} else {\n\t\t\tbrain := bprovider(handle)\n\t\t\tinterfaces.brain = brain\n\t\t\tLog(robot.Info, \"Initialized brain provider '%s'\", currentCfg.brainProvider)\n\t\t}\n\t} else {\n\t\tbprovider := brains[\"mem\"]\n\t\tinterfaces.brain = bprovider(handle)\n\t\tLog(robot.Error, \"No brain configured, falling back to default 'mem' brain - no memories will persist\")\n\t}\n\tif !encryptionInitialized && len(currentCfg.encryptionKey) > 0 {\n\t\tif initializeEncryptionFromBrain(currentCfg.encryptionKey) {\n\t\t\tLog(robot.Info, \"Successfully initialized encryption from configured key\")\n\t\t\tencryptionInitialized = true\n\t\t} else {\n\t\t\tLog(robot.Error, \"Failed to initialize brain encryption with configured EncryptionKey\")\n\t\t}\n\t}\n\tif encryptBrain && !encryptionInitialized {\n\t\tLog(robot.Warn, \"Brain encryption specified but not initialized; use 'initialize brain <key>' to initialize the encrypted brain interactively\")\n\t}\n\n\t// cli commands don't need an http listener\n\tif cliOp {\n\t\treturn\n\t}\n\n\tif !listening {\n\t\tlistening = true\n\t\tlistener, err := net.Listen(\"tcp4\", fmt.Sprintf(\"127.0.0.1:%s\", currentCfg.port))\n\t\tif err != nil {\n\t\t\tLog(robot.Fatal, \"Listening on tcp4 port 127.0.0.1:%s: %v\", currentCfg.port, err)\n\t\t}\n\t\tlistenPort = listener.Addr().String()\n\t\tgo func() {\n\t\t\traiseThreadPriv(\"http handler\")\n\t\t\tapiServer := http.NewServeMux()\n\t\t\tapiServer.Handle(\"/json\", handle)\n\t\t\tLog(robot.Info, \"Listening for external plugin connections on http://%s\", listenPort)\n\t\t\tLog(robot.Fatal, \"Error serving '/json': %s\", http.Serve(listener, apiServer))\n\t\t}()\n\t}\n}", "title": "" }, { "docid": "cc913f15055da0f142e6eb0bb909176f", "score": "0.43438983", "text": "func (driver *IPVSDriver) Config(config config.Config) error {\n\t// routes\n\troutes, err := configRoutes(config.Routes)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// services\n\tservices, err := configServices(config.Services, routes, driver.options)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn driver.update(routes, services)\n}", "title": "" }, { "docid": "6310b0e8ced17d7c2857cc931e2aeeb7", "score": "0.433522", "text": "func NewUI(c Config) (UI, error) {\n\ttranslateFunc, err := GetTranslationFunc(c)\n\tif err != nil {\n\t\treturn UI{}, err\n\t}\n\n\treturn UI{\n\t\tOut: color.Output,\n\t\tcolorEnabled: c.ColorEnabled(),\n\t\ttranslate: translateFunc,\n\t}, nil\n}", "title": "" }, { "docid": "b9e3aaa793b4b26fa700e8e4f91d277e", "score": "0.43159094", "text": "func ConfigureGitBot() {\n\tconfigureGitBotIn(\".\")\n}", "title": "" }, { "docid": "a757197fc437caac3737bd71b50ef33b", "score": "0.43152887", "text": "func (gnp gnparser) ChangeConfig(opts ...Option) GNparser {\n\tfor i := range opts {\n\t\topts[i](&gnp.cfg)\n\t}\n\treturn gnp\n}", "title": "" }, { "docid": "e0824f713922e53afbc1340ccaa4df70", "score": "0.43066472", "text": "func NewConfig() Config {\n\tjsonBlob := json.RawMessage(`{\n\t\t\"path\": \"\",\n\t\t\"font\": \"\",\n\t\t\"file\": \"\",\n\t\t\"embeddedbitmap\": false,\n\t\t\"preferoutline\": true,\n\t\t\"dosubstitutions\": true,\n\t\t\"bitmapmonospace\": false,\n\t\t\"forceautohint\": false,\n\t\t\"qtusesubpixelpositioning\": false,\n\t\t\"dpi\": 96\n\t}`)\n\n\tvar jsontype Config\n\terr := json.Unmarshal(jsonBlob, &jsontype)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\treturn jsontype\n}", "title": "" }, { "docid": "330720d8d3e1290b90a2afbff44af74f", "score": "0.42942607", "text": "func (sc *Scene) ConfigFrameImpl(gpu *vgpu.GPU, dev *vgpu.Device) bool {\n\twasConfig := false\n\tif sc.Frame == nil {\n\t\twasConfig = true\n\t\toswin.TheApp.RunOnMain(func() {\n\t\t\tsz := sc.Geom.Size\n\t\t\tif sz == (image.Point{}) {\n\t\t\t\tsz = image.Point{480, 320}\n\t\t\t}\n\t\t\tsc.Frame = vgpu.NewRenderFrame(gpu, dev, sz)\n\t\t\tsc.Frame.Format.SetMultisample(sc.MultiSample)\n\t\t\tsy := &sc.Phong.Sys\n\t\t\tsy.InitGraphics(gpu, \"vphong.Phong\", dev)\n\t\t\tsy.ConfigRenderNonSurface(&sc.Frame.Format, vgpu.Depth32)\n\t\t\tsc.Frame.SetRender(&sy.Render)\n\t\t\tsc.Phong.ConfigSys()\n\t\t\tif sc.Wireframe {\n\t\t\t\tsy.SetRasterization(vk.PolygonModeLine, vk.CullModeNone, vk.FrontFaceCounterClockwise, 1.0)\n\t\t\t} else {\n\t\t\t\tsy.SetRasterization(vk.PolygonModeFill, vk.CullModeNone, vk.FrontFaceCounterClockwise, 1.0)\n\t\t\t}\n\t\t})\n\t} else {\n\t\tsc.Frame.SetSize(sc.Geom.Size) // nop if same\n\t}\n\tsc.Camera.CamMu.Lock()\n\tsc.Camera.Aspect = float32(sc.Geom.Size.X) / float32(sc.Geom.Size.Y)\n\tsc.Camera.CamMu.Unlock()\n\tclr := mat32.NewVec3Color(sc.BackgroundColor).SRGBToLinear()\n\tsc.Frame.Render.SetClearColor(clr.X, clr.Y, clr.Z, 1)\n\t// gpu.Draw.Wireframe(sc.Wireframe)\n\treturn wasConfig\n}", "title": "" }, { "docid": "1cd83d73d81b5782bdc85ffa53165791", "score": "0.4288726", "text": "func (bt *Wmibeat) Config(b *beat.Beat) error {\n\n\t// Load beater beatConfig\n\terr := cfgfile.Read(&bt.beatConfig, \"\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error reading config file: %v\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "12d826ab2093c31909fce93d4667553d", "score": "0.42878437", "text": "func showPgConfig(db *postgres.DB, uiExit chan int) func(g *gocui.Gui, _ *gocui.View) error {\n\treturn func(g *gocui.Gui, _ *gocui.View) error {\n\t\tres, err := stat.NewPGresult(db, query.GetAllSettings)\n\t\tif err != nil {\n\t\t\tprintCmdline(g, err.Error())\n\t\t\treturn nil\n\t\t}\n\n\t\tvar buf bytes.Buffer\n\t\tif _, err := fmt.Fprintf(&buf, \"PostgreSQL configuration:\\n\"); err != nil {\n\t\t\tprintCmdline(g, \"print string to buffer failed: %s\", err)\n\t\t\treturn nil\n\t\t}\n\n\t\tif err := res.Fprint(&buf); err != nil {\n\t\t\tprintCmdline(g, \"print string to buffer failed: %s\", err)\n\t\t\treturn nil\n\t\t}\n\n\t\tvar pager string\n\t\tif pager = os.Getenv(\"PAGER\"); pager == \"\" {\n\t\t\tpager = \"less\"\n\t\t}\n\n\t\t// Exit from UI and stats loop... will restore it after $PAGER is closed.\n\t\tuiExit <- 1\n\t\tg.Close()\n\n\t\tcmd := exec.Command(pager) // #nosec G204\n\t\tcmd.Stdin = strings.NewReader(buf.String())\n\t\tcmd.Stdout = os.Stdout\n\n\t\tif err := cmd.Run(); err != nil {\n\t\t\treturn fmt.Errorf(\"run pager failed: %s\", err)\n\t\t}\n\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "e2d68adaf519261446c66c6dd8a03e7a", "score": "0.42825913", "text": "func (w *Worker) SetConfig(cfg *hydroctl.Config) {\n\tw.cfgChan <- cfg\n}", "title": "" }, { "docid": "f3fb97aa6922841c9da4ea1d33c5ac5b", "score": "0.42816043", "text": "func (o EnterpriseCrmFrontendsEventbusProtoTaskEntityResponseOutput) UiConfig() EnterpriseCrmEventbusProtoTaskUiConfigResponseOutput {\n\treturn o.ApplyT(func(v EnterpriseCrmFrontendsEventbusProtoTaskEntityResponse) EnterpriseCrmEventbusProtoTaskUiConfigResponse {\n\t\treturn v.UiConfig\n\t}).(EnterpriseCrmEventbusProtoTaskUiConfigResponseOutput)\n}", "title": "" }, { "docid": "8f6baac27f48a6444b1dd5503d16f69e", "score": "0.4277367", "text": "func Start(c *configuration.Config, g *gocui.Gui) {\n\tconfig = c\n\tgui = g\n\n\tcreateStore()\n\tgetCoinList()\n\tcreateCoinData()\n\tgo startUpdater(int64(c.IntervalSeconds * 1000))\n\tui.ReDraw()\n}", "title": "" }, { "docid": "6fbd69a6125d5c6194cf152ff4b61566", "score": "0.42613503", "text": "func (ctx *DevModelRpi) Config() map[string]interface{} {\n\tcfg := make(map[string]interface{})\n\tcfg[\"eve.serial\"] = \"*\"\n\tcfg[\"eve.remote\"] = true\n\tcfg[\"eve.remote-addr\"] = \"\"\n\tcfg[\"eve.arch\"] = \"arm64\"\n\tcfg[\"eve.hostfwd\"] = map[string]string{}\n\tcfg[\"eve.devmodel\"] = ctx.DevModelType()\n\treturn cfg\n}", "title": "" }, { "docid": "4dccb64605ed111d2811b2f60a2cd8a6", "score": "0.42610765", "text": "func (vim *VirtletImageMapping) ConfigName() string { return vim.Name }", "title": "" }, { "docid": "d447537f2f5576de0f68a1b65da7e037", "score": "0.42473805", "text": "func NewConfig() *Config {\n\tcfg := &Config{}\n\tcfg.Operator.Logdir = \"~/termlog/\"\n\tcfg.Operator.DateBasedLogFormat = \"Jan_2006\"\n\tcfg.Operator.SpotExpiration = 900\n\tcfg.Operator.GitPushAfterCommit = true\n\tcfg.Operator.GitPullOnStartup = true\n\tcfg.Operator.GitKey = \"~/.ssh/id_rsa\"\n\tcfg.Operator.GitUsername = \"git\"\n\tcfg.Operator.Commands = append(cfg.Operator.Commands, ui.Command{\n\t\tName: \"Create Empty File\",\n\t\tCommand: \"touch /tmp/command_executed.txt\",\n\t})\n\tcfg.Operator.CustomFields = append(cfg.Operator.CustomFields, ui.CustomField{\n\t\tLabel: \"SOTA\",\n\t\tName: \"sota_ref\",\n\t\tDefault: \"\",\n\t\tWidth: 8,\n\t})\n\t// find tqsl on the user's path\n\ttqslPath, err := exec.LookPath(\"tqsl\")\n\tif err != nil {\n\t\ttqslPath = \"/usr/local/bin/tqsl\"\n\t}\n\n\tcfg.Operator.LOTWtqslPath = tqslPath\n\tcfg.WSJTX.Address = \"127.0.0.1:2237\"\n\tcfg.FLLog.Address = \"127.0.0.1:8421\"\n\tcfg.JS8Call.Address = \"127.0.0.1:2242\"\n\n\tcfg.Theme.StatusBg = 40 // light blue\n\tcfg.Theme.StatusFg = 1\n\n\tcfg.Theme.TextEditBg = 16\n\tcfg.Theme.TextEditFg = 1 // black\n\n\tcfg.Theme.ComboBoxBg = 16\n\tcfg.Theme.ComboBoxFg = 1 // black\n\n\tcfg.Theme.QSOListHeaderBG = 40\n\tcfg.Theme.QSOListHeaderFG = 1\n\n\tcfg.Lookup = map[string]callsigns.LookupConfig{}\n\tcfg.Lookup[\"callook\"] = callsigns.LookupConfig{}\n\tcfg.Lookup[\"dxcc\"] = callsigns.LookupConfig{}\n\n\tcfg.DXCluster.ZoneLookup = true\n\n\t// POTA\n\tcfg.POTASpot.Enabled = true\n\tcfg.POTASpot.URL = spotting.POTAURL\n\n\tcfg.SOTASpot.Enabled = true\n\tcfg.SOTASpot.URL = spotting.SOTAURL\n\n\t// 160 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G/Data/Phone\",\n\t\tStart: 1.8,\n\t\tEnd: 2,\n\t})\n\n\t// 80 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E\",\n\t\tStart: 3.5,\n\t\tEnd: 4,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A\",\n\t\tStart: 3.7,\n\t\tEnd: 4,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"G\",\n\t\tStart: 3.8,\n\t\tEnd: 4,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 3.5,\n\t\tEnd: 3.6,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"CW\",\n\t\tStart: 3.525,\n\t\tEnd: 3.6,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 3.6,\n\t\tEnd: 4,\n\t})\n\n\t// 40 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E\",\n\t\tStart: 7,\n\t\tEnd: 7.3,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A\",\n\t\tStart: 7.025,\n\t\tEnd: 7.3,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"G\",\n\t\tStart: 7.025,\n\t\tEnd: 7.125,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"G\",\n\t\tStart: 7.175,\n\t\tEnd: 7.3,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 7,\n\t\tEnd: 7.125,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"CW\",\n\t\tStart: 7.025,\n\t\tEnd: 7.125,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 7.125,\n\t\tEnd: 7.3,\n\t})\n\n\t// 30 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G/Data\",\n\t\tStart: 10.1,\n\t\tEnd: 10.150,\n\t})\n\n\t// 20 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E\",\n\t\tStart: 14,\n\t\tEnd: 14.350,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A\",\n\t\tStart: 14.025,\n\t\tEnd: 14.150,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A\",\n\t\tStart: 14.175,\n\t\tEnd: 14.350,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"G\",\n\t\tStart: 14.225,\n\t\tEnd: 14.350,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 14,\n\t\tEnd: 14.150,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 14.150,\n\t\tEnd: 14.350,\n\t})\n\n\t// 17 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G\",\n\t\tStart: 18.068,\n\t\tEnd: 18.168,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 18.068,\n\t\tEnd: 18.110,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 18.110,\n\t\tEnd: 18.160,\n\t})\n\n\t// 15 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E\",\n\t\tStart: 21,\n\t\tEnd: 21.45,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A/G\",\n\t\tStart: 21,\n\t\tEnd: 21.2,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"A\",\n\t\tStart: 21.225,\n\t\tEnd: 21.45,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"G\",\n\t\tStart: 21.275,\n\t\tEnd: 21.45,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 21,\n\t\tEnd: 21.2,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"CW\",\n\t\tStart: 21.025,\n\t\tEnd: 21.2,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 21.2,\n\t\tEnd: 21.45,\n\t})\n\n\t// 12 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G\",\n\t\tStart: 24.890,\n\t\tEnd: 24.990,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 24.890,\n\t\tEnd: 24.930,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 24.930,\n\t\tEnd: 24.990,\n\t})\n\n\t// 10 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G\",\n\t\tStart: 28,\n\t\tEnd: 29.7,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"N/T\",\n\t\tStart: 28,\n\t\tEnd: 28.5,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Data\",\n\t\tStart: 28,\n\t\tEnd: 28.3,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone\",\n\t\tStart: 28.3,\n\t\tEnd: 29.7,\n\t})\n\n\t// 6 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G/T\",\n\t\tStart: 50,\n\t\tEnd: 54,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"CW\",\n\t\tStart: 50,\n\t\tEnd: 50.1,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone/Data\",\n\t\tStart: 50.1,\n\t\tEnd: 54,\n\t})\n\n\t// 2 meters\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G/T\",\n\t\tStart: 144,\n\t\tEnd: 148,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"CW\",\n\t\tStart: 144,\n\t\tEnd: 144.1,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone/Data\",\n\t\tStart: 144.1,\n\t\tEnd: 148.4,\n\t})\n\n\t// 70 cm\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"E/A/G/T\",\n\t\tStart: 420,\n\t\tEnd: 450,\n\t})\n\tcfg.Label = append(cfg.Label, Label{\n\t\tName: \"Phone/Data\",\n\t\tStart: 420,\n\t\tEnd: 450,\n\t})\n\treturn cfg\n}", "title": "" }, { "docid": "4eee6b50dc8e2b4c3267b10f5be2556c", "score": "0.4241305", "text": "func Configure(bot *models.Bot) {\n\tlog.Info(\"Configuring bot...\")\n\n\tinitLogger(bot)\n\n\tvalidateRemoteSetup(bot)\n\n\tconfigureChatApplication(bot)\n\n\tbot.Log.Infof(\"Configured bot '%s'!\", bot.Name)\n}", "title": "" }, { "docid": "d6bfbe8a66b7e9b790064d7641d605af", "score": "0.42342293", "text": "func (b *BGP) Configuration() ([]string, error) {\n\tcfg, err := b.vty.Command(\"write terminal\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn strings.Split(cfg, \"\\n\"), nil\n}", "title": "" }, { "docid": "a27807a5c6d898964b3425d85578fb45", "score": "0.4233342", "text": "func (cfg *configBuffer) GenerateConfig(kind string, numInstances int) error {\n\treturn nil\n}", "title": "" }, { "docid": "00f571deb56f8205770d55f8d1b2f103", "score": "0.4231816", "text": "func (m *MySql) ConfigSurvey(config Config, machineName string) error {\n\tfmt.Println(\"---- MySql Driver Configuration ----\")\n\n\thost := \"\"\n\tprompt := &survey.Input{\n\t\tMessage: \"Database Host:\",\n\t\tHelp: \"The host of the MySql database.\",\n\t}\n\tsurvey.AskOne(prompt, &host, nil)\n\tconfig[\"databaseHost\"] = host\n\n\tport := \"\"\n\tprompt = &survey.Input{\n\t\tMessage: \"Database Port:\",\n\t\tDefault: \"3306\",\n\t\tHelp: \"The port of the MySql database.\",\n\t}\n\tsurvey.AskOne(prompt, &port, nil)\n\tconfig[\"databasePort\"] = port\n\n\tusername := \"\"\n\tprompt = &survey.Input{\n\t\tMessage: \"Username:\",\n\t\tHelp: \"The MySql database username.\",\n\t}\n\tsurvey.AskOne(prompt, &username, nil)\n\tconfig[\"username\"] = username\n\n\tcredentials := false\n\tpromptBool := &survey.Confirm{\n\t\tMessage: \"Does this MySql database require login password?\",\n\t}\n\tsurvey.AskOne(promptBool, &credentials, nil)\n\n\tif credentials == true {\n\t\tcredentialConfig := Config{}\n\n\t\tpassword := \"\"\n\t\tprompt = &survey.Input{\n\t\t\tMessage: \"Password:\",\n\t\t\tHelp: \"The MySql database password.\",\n\t\t}\n\t\tsurvey.AskOne(prompt, &password, nil)\n\t\tcredentialConfig[\"password\"] = password\n\n\t\tconfig[\"credentials\"] = credentialConfig\n\t}\n\n\tdbName := \"\"\n\tprompt = &survey.Input{\n\t\tMessage: \"Database Name:\",\n\t\tHelp: \"The MySql database name to query against.\",\n\t}\n\tsurvey.AskOne(prompt, &dbName, nil)\n\tconfig[\"databaseName\"] = dbName\n\n\treturn nil\n}", "title": "" }, { "docid": "88ef4e3032dee31bb950127a589169a7", "score": "0.42265904", "text": "func (g *GitCLI) Config(dir string, args ...string) error {\n\tif args == nil {\n\t\targs = []string{\"config\"}\n\t} else {\n\t\targs = append([]string{\"config\"}, args...)\n\t}\n\treturn g.gitCmd(dir, args...)\n}", "title": "" }, { "docid": "8470d4b44db8f0665c37c2ed291a85ca", "score": "0.42253712", "text": "func AskSaveConfig(qh *questionModel.QuestionModelHelper) (string, error) {\n\tquestion := \"Do you want to save the configuration above as a JSON file that can be used in non-interactive mode and as question defaults? \"\n\tanswer, err := questionModel.AskYesNoQuestion(qh, question, false)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn answer, nil\n}", "title": "" }, { "docid": "d027bf57498b05f74aa3c4d17f9babbb", "score": "0.42175186", "text": "func (sc *Scene) ConfigFrame() bool {\n\tif sc.Win == nil {\n\t\treturn false\n\t}\n\tdrw := sc.Win.OSWin.Drawer()\n\tsf := drw.Surf\n\tnewFrame := sc.ConfigFrameImpl(sf.GPU, &sf.Device)\n\tif newFrame {\n\t\tsc.Win.Phongs = append(sc.Win.Phongs, &sc.Phong) // for destroying in sequence\n\t\tsc.Win.Frames = append(sc.Win.Frames, sc.Frame) // for destroying in sequence\n\t}\n\treturn true\n}", "title": "" }, { "docid": "86a855ff304d783e2d8b7bc45b3adc74", "score": "0.4204576", "text": "func NewConfigCLI(binaryPath, clientconfig, user string) *ConfigCLI {\n\treturn &ConfigCLI{clientconfig, user, binaryPath}\n}", "title": "" }, { "docid": "3acd987811cd9ad095e5e607d350ae26", "score": "0.4192397", "text": "func (app *IsyApp) HandleConfigCommand(nodeHWID string, config types.NodeAttrMap) {\n\tlogrus.Infof(\"IsyApp.HandleConfigCommand for node HWID '%s'\", nodeHWID)\n\t// at this moment no ISY configuration is changed so just pass it on\n\tapp.pub.UpdateNodeConfigValues(nodeHWID, config)\n}", "title": "" }, { "docid": "a560c2076fff71bc0aebfb425531aa2b", "score": "0.41734177", "text": "func (t *GuiWindow) Start(a *app.App) {\n\n\t// Show and enable demo panel\n\ta.DemoPanel().SetRenderable(true)\n\ta.DemoPanel().SetEnabled(true)\n\n\tw1 := gui.NewWindow(300, 100)\n\tw1.SetPosition(10, 10)\n\tw1.SetResizable(true)\n\tw1.SetLayout(gui.NewFillLayout(true, true))\n\tc1 := gui.NewImageLabel(\n\t\t\"This is the client area of the Window 1\\n\" +\n\t\t\t\"This window does not have a title\\n\" +\n\t\t\t\"It is resizable\\n\",\n\t)\n\tc1.SetColor(math32.NewColor(\"black\"))\n\tc1.SetBgColor(math32.NewColor(\"white\"))\n\tw1.Add(c1)\n\ta.DemoPanel().Add(w1)\n\n\tw2 := gui.NewWindow(300, 100)\n\tw2.SetTitle(\"Window2\")\n\tw2.SetPosition(w1.Position().X+w1.Width()+50, 10)\n\tw2.SetResizable(true)\n\tw2.SetLayout(gui.NewFillLayout(true, true))\n\tc2 := gui.NewImageLabel(\n\t\t\"This is the client area of the Window 2\\n\" +\n\t\t\t\"This window has a title and a close button\\n\" +\n\t\t\t\"It is resizable\\n\" +\n\t\t\t\"It is movable by dragging its title\",\n\t)\n\tc2.SetColor(math32.NewColor(\"black\"))\n\tc2.SetBgColor(&math32.Color{0.7, 0.8, 0.9})\n\tw2.Add(c2)\n\ta.DemoPanel().Add(w2)\n\n\tw3 := gui.NewWindow(300, 100)\n\tw3.SetTitle(\"Window3\")\n\tw3.SetCloseButton(false)\n\tw3.SetPosition(10, w1.Position().Y+w1.Height()+50)\n\tw3.SetResizable(true)\n\tw3.SetLayout(gui.NewFillLayout(true, true))\n\tc3 := gui.NewImageLabel(\n\t\t\"This is the client area of the Window 3\\n\" +\n\t\t\t\"This window has a title but no close button\\n\" +\n\t\t\t\"It is resizable\\n\" +\n\t\t\t\"It is movable by dragging its title\",\n\t)\n\tc3.SetColor(math32.NewColor(\"black\"))\n\tc3.SetBgColor(&math32.Color{0.8, 0.9, 0.9})\n\tw3.Add(c3)\n\ta.DemoPanel().Add(w3)\n}", "title": "" }, { "docid": "2c9095f8465bcca68c72c5a370f7e70e", "score": "0.4172728", "text": "func (t *T) Config(cfg string) {\n\tt.Helper()\n\n\tif t.servProc != nil {\n\t\tpanic(\"tests: Config called after Run\")\n\t}\n\n\tt.cfg = cfg\n}", "title": "" }, { "docid": "bae68c370910905b594b814cf4aa7ac3", "score": "0.41671383", "text": "func Configure(config Config) { cfg = config }", "title": "" }, { "docid": "30c9b33bbbaaf146cfc2b4f8f703c66b", "score": "0.41603193", "text": "func (s *SignalFx) configDebugging(cfg plugin.Config) {\n\tfileName, err := cfg.GetString(\"debug_file\")\n\tif err != nil {\n\t\t// No debug_file defined, moving on\n\t\treturn\n\t}\n\n\t// Open the output file\n\tf, err := os.OpenFile(fileName, os.O_RDWR|os.O_CREATE|os.O_APPEND, 0666)\n\tif err != nil {\n\t\tfmt.Fprintf(os.Stderr, \"%s\", err.Error())\n\t\treturn\n\t}\n\n\t// Set logging output for debugging\n\tlog.SetOutput(f)\n}", "title": "" }, { "docid": "cba2dbec24dee4369a57364297dbcd91", "score": "0.4150946", "text": "func (c *ServicedCli) initConfig() {\n\tc.app.Commands = append(c.app.Commands, cli.Command{\n\t\tName: \"config\",\n\t\tUsage: \"Reports on serviced configuration\",\n\t\tDescription: \"serviced config\",\n\t\tAction: c.cmdConfig,\n\t})\n}", "title": "" }, { "docid": "713382bf39650578d08ca6dffe77a058", "score": "0.41469285", "text": "func onosNetcfg(body io.Reader) error {\n\thttpClient := &http.Client{}\n\treq, err := http.NewRequest(\"POST\", \"http://\"+ONOS_GUI_ENDPOINT+\"/onos/v1/network/configuration\", body)\n\tif err != nil {\n\t\treturn err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.SetBasicAuth(ONOS_USERNAME, ONOS_PASSWORD)\n\tresp, err := httpClient.Do(req)\n\n\tif resp.StatusCode != http.StatusOK {\n\t\tdefer resp.Body.Close()\n\t\tbuf, _ := ioutil.ReadAll(resp.Body)\n\t\terr := fmt.Errorf(\"HTTPStatus: %s, ResponseBody: %s\", resp.Status, string(buf))\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "63d49fe46da69c858ecd72a9829c97c2", "score": "0.4140324", "text": "func (c *Client) sendGUIShowing(isGUIShowing bool) error {\n\tvar addr string\n\tif isGUIShowing {\n\t\taddr = AddressClientGUIShowing\n\t} else {\n\t\taddr = AddressClientGUIHidden\n\t}\n\treturn c.Send(osc.Message{Address: addr}) // Will get wrapped by caller\n}", "title": "" }, { "docid": "752e6ccc8a7174bbbb3f86a6de25d026", "score": "0.41401035", "text": "func setConfiguration(_ string) error {\n\tcmd := exec.Command(\"/proc/self/exe\", \"config\", \"global\", \"--set\", \"image driver\", driverName)\n\tif err := cmd.Run(); err != nil {\n\t\treturn fmt.Errorf(\"could not set 'image driver = %s' in singularity.conf\", driverName)\n\t}\n\tcmd = exec.Command(\"/proc/self/exe\", \"config\", \"global\", \"--set\", \"enable overlay\", \"driver\")\n\tif err := cmd.Run(); err != nil {\n\t\treturn fmt.Errorf(\"could not set 'enable overlay = driver' in singularity.conf\")\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11c6f3fab0211f4bc59d5afb642915f7", "score": "0.41400927", "text": "func LoadConfig() {\n\n\tConfig = GetDefaultOps()\n\n\tcliConf := readCliParams()\n\n\tyamlConf, err := loadBBSimConf(cliConf.BBSim.ConfigFile)\n\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"file\": cliConf.BBSim.ConfigFile,\n\t\t\t\"err\": err,\n\t\t}).Fatal(\"Can't read config file\")\n\t}\n\n\t// merging Yaml and Default Values\n\tif err := mergo.Merge(Config, yamlConf, mergo.WithOverride); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err,\n\t\t}).Fatal(\"Can't merge YAML and Config\")\n\t}\n\n\t// merging CLI values on top of the yaml ones\n\tif err := mergo.Merge(Config, cliConf, mergo.WithOverride); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"err\": err,\n\t\t}).Fatal(\"Can't merge CLI and Config\")\n\t}\n\n\tservices, err := loadBBSimServices(Config.BBSim.ServiceConfigFile)\n\n\tif err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"file\": Config.BBSim.ServiceConfigFile,\n\t\t\t\"err\": err,\n\t\t}).Fatal(\"Can't read services file\")\n\t}\n\n\tServices = services\n\n\t//A blank filename means we should fall back to bbsim defaults\n\tif Config.BBSim.PonsConfigFile == \"\" {\n\t\tPonsConfig, err = getDefaultPonsConfig()\n\t\tif err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"err\": err,\n\t\t\t}).Fatal(\"Can't load Pon interfaces defaults.\")\n\t\t}\n\t} else {\n\t\tPonsConfig, err = loadBBSimPons(Config.BBSim.PonsConfigFile)\n\n\t\tif err != nil {\n\t\t\tlog.WithFields(log.Fields{\n\t\t\t\t\"file\": Config.BBSim.PonsConfigFile,\n\t\t\t\t\"err\": err,\n\t\t\t}).Fatal(\"Can't read services file\")\n\t\t}\n\t}\n\n\tif err := validatePonsConfig(PonsConfig); err != nil {\n\t\tlog.WithFields(log.Fields{\n\t\t\t\"file\": Config.BBSim.PonsConfigFile,\n\t\t\t\"err\": err,\n\t\t}).Fatal(\"Invalid Pon interfaces configuration\")\n\t}\n}", "title": "" }, { "docid": "34497ba5c83d2d393c87074e0cb72b5e", "score": "0.41329712", "text": "func initConfig(cmd *cobra.Command) error {\n\tif err := app.InitInterfaces(cmd); err != nil {\n\t\treturn err\n\t}\n\n\tpasswordFile, _ := cmd.Flags().GetString(\"password\")\n\tif passwordFile != \"\" {\n\t\tif err := app.BasicAuthFromFile(passwordFile); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tsave, _ := cmd.Flags().GetString(\"save\")\n\tintrvl, err := time.ParseDuration(save)\n\tif err != nil {\n\t\treturn err\n\t}\n\tapp.Config.SaveInterval = intrvl\n\n\tif !utils.IsDir(app.Config.DatabaseDir) {\n\t\tif err := os.Mkdir(app.Config.DatabaseDir, 0755); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ee773a8420e4673092cc2a7b0655cf2f", "score": "0.41304606", "text": "func Config(key, value string) func(*types.Cmd) {\n\treturn func(g *types.Cmd) {\n\t\tg.AddOptions(\"--config\")\n\t\tg.AddOptions(fmt.Sprintf(\"%s=%s\", key, value))\n\t}\n}", "title": "" }, { "docid": "a28ccd0fa65bf19421ee90c4aaf82673", "score": "0.41259804", "text": "func gui() {\n\ttime.Sleep(time.Second * 5)\n\tfor {\n\t\tfileStats, _ := file.Stat()\n\t\tcmd := exec.Command(\"cmd\", \"/c\", \"cls\")\n\t\tcmd.Stdout = os.Stdout\n\t\tcmd.Run()\n\t\t// fmt.Println(\"~Jack Newman Dataserver\\nSize of Convert Queue: \", len(incomingData), \"\\nSize of Writing Queue: \", len(convertedData), \"\\nSize of Log File: \", fileStats.Size()/1000000, \"MB\", \"\\nNumber of threads: \", runtime.NumGoroutine())\n\t\tfmt.Println(\"~~Jack Newman Datacollector~~\\n\", \"\\nSize of Writing Queue: \", len(convertedData), \"\\nSize of Log File: \", float64(fileStats.Size()/1000000), \"MB\", \"\\nNumber of threads: \", runtime.NumGoroutine())\n\t\tfmt.Println(\"\\nSuccessful Transmissions: \", correctTransmission, \"\\nFailed Transmissions: \", failedTransmission, \"\\nFailed Data Conversions: \", incorrectDataFormat, \"\\nNoise Workers: \", numNoiseWorkers)\n\t\tprintCurrentNoiseMakers()\n\t\tprintcurrentdevices()\n\t\ttime.Sleep(time.Second / 3)\n\t}\n}", "title": "" }, { "docid": "66a1b38ed447482be75c1a85ccdae203", "score": "0.41233754", "text": "func (e *Configurer) Configure(c *config.Config) error {\r\n\t// initalize all the pointers in the struct\r\n\tt := reflect.TypeOf(config.Config{})\r\n\tv := reflect.New(t)\r\n\treflect.ValueOf(c).Elem().Set(v.Elem())\r\n\r\n\t// Put default values in the config\r\n\tc.AppName = \"talaria\"\r\n\tc.Readers.Presto = &config.Presto{Port: 8042}\r\n\tc.Writers.GRPC = &config.GRPC{Port: 8080}\r\n\tc.Tables = make(map[string]config.Table, 1)\r\n\r\n\t// Default statsD agent\r\n\tc.Statsd = &config.StatsD{\r\n\t\tHost: \"localhost\",\r\n\t\tPort: 8125,\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "8efea67bf1248af5c556cc9093aac42f", "score": "0.41213572", "text": "func (c *daemonInitCmd) UI() clui.UI {\n\treturn c.ui\n}", "title": "" }, { "docid": "30c4eba2f06a33a845c92afb88787a24", "score": "0.41211668", "text": "func Init(scene string, configOptions ...ConfigOption) error {\n\tinitDefaultWindow()\n\tdefaultWindow.DrawStack = render.GlobalDrawStack\n\tdefaultWindow.eventHandler = event.DefaultBus\n\treturn defaultWindow.Init(scene, configOptions...)\n}", "title": "" }, { "docid": "b3c0fa54acc9743ce7316cef111cb0e2", "score": "0.4117456", "text": "func (self *Services) ConfigEvent(event config.Event) {\n if self.driver == nil {\n panic(\"ConfigEvent before driver sync\")\n }\n\n self.config(event.Action, event.Config)\n}", "title": "" }, { "docid": "6e2a2c2fd3c2f733945b8ea6753fcfde", "score": "0.41126558", "text": "func ShowConfig(w io.Writer) error {\n\tvar cfg *Config\n\tvar err error\n\tvar data []byte\n\n\tcfg, err = getConfig()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tformat := viper.GetString(KeyShowConfig)\n\n\tlog.Debug().Str(\"format\", format).Msg(\"show-config\")\n\n\tswitch format {\n\tcase \"json\":\n\t\tdata, err = json.MarshalIndent(cfg, \" \", \" \")\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"formatting config (json): %w\", err)\n\t\t}\n\tcase \"yaml\":\n\t\tdata, err = yaml.Marshal(cfg)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"formatting config (yaml): %w\", err)\n\t\t}\n\tcase \"toml\":\n\t\tdata, err = toml.Marshal(*cfg)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"formatting config (toml): %w\", err)\n\t\t}\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown config format '%s'\", format)\n\t}\n\n\tfmt.Fprintf(w, \"%s v%s running config:\\n%s\\n\", release.NAME, release.VERSION, data)\n\treturn nil\n}", "title": "" }, { "docid": "16b35aa85e2424f8263bd57bbbe5fef6", "score": "0.41111842", "text": "func SetConfig(m Menu) {\n\tmenu = m\n}", "title": "" }, { "docid": "67380a2414d1936e3db2fbefcf271194", "score": "0.41102642", "text": "func (t *Tunnel) Configure(cfg Config) error {\n\tfor _, command := range setCommands {\n\t\ttmpl := template.Must(template.New(\"set\").Parse(command))\n\n\t\tbuilder := new(strings.Builder)\n\t\terr := tmpl.Execute(builder, config{\n\t\t\tIface: t.Name,\n\t\t\tConfig: cfg,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tfmt.Printf(\"Command: %s\\n\", builder.String())\n\n\t\targs := strings.Split(builder.String(), \" \")\n\n\t\tcmd := exec.Command(args[0], args[1:]...)\n\t\terr = cmd.Run()\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4ec581e1157c67d328886e48c366673e", "score": "0.41096726", "text": "func runTUI() error {\n\n\t// Set function to manage all views and keybindings\n\tclientGui.SetManagerFunc(layout)\n\n\t// Bind keys with functions\n\tclientGui.SetKeybinding(\"\", gocui.KeyCtrlC, gocui.ModNone, quit)\n\tclientGui.SetKeybinding(\"input\", gocui.KeyEnter, gocui.ModNone, send)\n\n\t// Start main event loop of the TUI\n\treturn clientGui.MainLoop()\n}", "title": "" }, { "docid": "fb58ec1f621143e1c8146ae28ff9b7e9", "score": "0.41065642", "text": "func Configuration(names test.ResourceNames, fopt ...rtesting.ConfigOption) *v1.Configuration {\n\tconfig := &v1.Configuration{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: names.Config,\n\t\t},\n\t\tSpec: *ConfigurationSpec(pkgTest.ImagePath(names.Image)),\n\t}\n\n\tfor _, opt := range fopt {\n\t\topt(config)\n\t}\n\n\treturn config\n}", "title": "" }, { "docid": "e368ec4d81c43a8ed4685fb913970e6d", "score": "0.4105821", "text": "func GenerateConfig(c *config.Config) (string, error) {\n\tvar b bytes.Buffer\n\n\tdata := struct {\n\t\tSSID string\n\t\tWlanInterface string\n\t\tPassphrase string\n\t\tBridgeName string\n\t\tHostapdDriver string\n\t}{\n\t\tSSID: c.Network.Wireless.SSID,\n\t\tWlanInterface: c.Network.Wireless.Interface,\n\t\tPassphrase: c.Network.Wireless.Password,\n\t\tBridgeName: \"br\" + c.Network.InterfaceIdent,\n\t\tHostapdDriver: c.Network.Wireless.HostapdDriver,\n\t}\n\n\tif err := baseConfigTmpl.Execute(&b, &data); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn b.String(), nil\n}", "title": "" }, { "docid": "49f5926f4a9073fd567d85c8050d7c9b", "score": "0.41007358", "text": "func (c *Commander) Init(driver gxui.Driver, theme *basic.Theme, font gxui.Font) {\n\tc.LinearLayout.Init(c, theme)\n\tc.bindings = make(map[gxui.KeyboardEvent]commands.Command)\n\tc.driver = driver\n\tc.theme = theme\n\tc.font = font\n\tc.SetDirection(gxui.BottomToTop)\n\tc.SetSize(math.MaxSize)\n\n\tc.controller = controller.New(c.driver, c.theme, c.font)\n\tc.box = NewCommandBox(c.theme, c.controller)\n\n\tc.AddChild(c.box)\n\tc.AddChild(c.controller)\n\n\t// TODO: Store these in a config file or something\n\topenFile := commands.NewFileOpener(c.driver, c.theme)\n\tc.commands = append(c.commands, openFile)\n\tctrlO := gxui.KeyboardEvent{\n\t\tKey: gxui.KeyO,\n\t\tModifier: gxui.ModControl,\n\t}\n\tsupO := gxui.KeyboardEvent{\n\t\tKey: gxui.KeyO,\n\t\tModifier: gxui.ModSuper,\n\t}\n\tc.bindings[ctrlO] = openFile\n\tc.bindings[supO] = openFile\n\n\taddProject := commands.NewProjectAdder(c.driver, c.theme)\n\tc.commands = append(c.commands, addProject)\n\tctrlShiftN := gxui.KeyboardEvent{\n\t\tKey: gxui.KeyN,\n\t\tModifier: gxui.ModControl | gxui.ModShift,\n\t}\n\tsupShiftN := gxui.KeyboardEvent{\n\t\tKey: gxui.KeyN,\n\t\tModifier: gxui.ModSuper | gxui.ModShift,\n\t}\n\tc.bindings[ctrlShiftN] = addProject\n\tc.bindings[supShiftN] = addProject\n}", "title": "" }, { "docid": "a500e0045f6715009cd0b7f4ed49bd3f", "score": "0.4099187", "text": "func generateGPUInfoConfig() error {\n\tif ret := nvml.Init(); ret != nvml.SUCCESS {\n\t\treturn fmt.Errorf(\"Failed to initialize NVML, got ret %v\", ret)\n\t}\n\tdefer nvml.Shutdown()\n\tversion, ret := nvml.SystemGetDriverVersion()\n\tif ret != nvml.SUCCESS {\n\t\treturn fmt.Errorf(\"Failed to get version, got ret %v\", ret)\n\t}\n\tgpuIDs, err := getGPUDeviceIDs()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn writeGPUInfo(version, gpuIDs)\n}", "title": "" }, { "docid": "0928ce33f6ad6357daebdc7b4de629b3", "score": "0.40989935", "text": "func Launch() error {\n\tg := gocui.NewGui()\n\terr := g.Init()\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer g.Close()\n\n\tg.SetLayout(layout)\n\terr = keybindings(g)\n\tif err != nil {\n\t\treturn err\n\t}\n\tg.SelBgColor = gocui.ColorGreen\n\tg.SelFgColor = gocui.ColorBlack\n\tg.Cursor = true\n\n\terr = g.MainLoop()\n\tif err != nil && err != gocui.ErrQuit {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0eacc3fbbbe3eff388d496e4c9f59fcf", "score": "0.4086626", "text": "func CmdShowConfig() int {\n\tx, _ := json.MarshalIndent(GlobalConfigVar, \"\", \" \")\n\tutils.WriteStdout(x)\n\tutils.WriteStdout([]byte(\"\\n\"))\n\treturn 0\n}", "title": "" }, { "docid": "d01ef0239b325ce4bf9d9ae28ee46c3c", "score": "0.40795678", "text": "func (n *Network) generateConfig(nodeIndex int, walletPath string) (string, error) {\n\tnode := n.nodes[nodeIndex]\n\n\t// Load config profile from the global parameter profileList\n\tprofileFunc, ok := profileList[node.ConfigProfileID]\n\tif !ok {\n\t\treturn \"\", fmt.Errorf(\"invalid config profile for node index %d\", nodeIndex)\n\t}\n\n\t// profileFunc mutates the configuration for a node, so inject the\n\t// parameters which depend on its sandbox\n\tprofileFunc(nodeIndex, node, walletPath)\n\n\t// setting the root directory for node's sandbox\n\tconfigPath := node.Dir + \"/dusk.toml\"\n\tif err := viper.WriteConfigAs(configPath); err != nil {\n\t\treturn \"\", fmt.Errorf(\"config profile err '%s' for node index %d\", err.Error(), nodeIndex)\n\t}\n\n\t// Finally load sandbox configuration and setting it in the node\n\tvar err error\n\n\tnode.Cfg, err = config.LoadFromFile(configPath)\n\tif err != nil {\n\t\treturn \"\", fmt.Errorf(\"LoadFromFile %s failed with err %s\", configPath, err.Error())\n\t}\n\n\treturn configPath, nil\n}", "title": "" }, { "docid": "0f278405f8ab7fae8f799b2781e5f5c8", "score": "0.4076601", "text": "func Config(name ...string) *gcfg.Config {\n\treturn gcfg.Instance(name...)\n}", "title": "" }, { "docid": "67d44182308ae07707e34f9d08d21907", "score": "0.40736693", "text": "func Config(ePath string, options *dockervol.Options) (err error) {\n\tdvp, err = dockervol.NewDockerVolumePlugin(options)\n\tcreateVolumes = options.CreateVolumes\n\texecPath = ePath\n\treturn err\n}", "title": "" }, { "docid": "6f454d1eda55784d61b2313a809ed73d", "score": "0.40724605", "text": "func (o *RootOptions) Config() *config.Config {\n\thome := os.Getenv(\"MVM\")\n\tif home == \"\" {\n\t\tuserHome, err := os.UserHomeDir()\n\t\tif err != nil {\n\t\t\tpanic(\"user home directory not available\")\n\t\t}\n\n\t\thome = filepath.Join(userHome, \".mvm\")\n\t}\n\n\treturn &config.Config{\n\t\tHome: home,\n\t}\n}", "title": "" }, { "docid": "1c947caf15bbbbeb15dd3684d4f1734b", "score": "0.40658823", "text": "func (h hook) botConfig(dutID string, workDir string) bot.Config {\n\tconst botIDPrefix = \"crossk-\"\n\tbotID := botIDPrefix + dutID\n\treturn bot.Config{\n\t\tSwarmingURL: h.a.SwarmingURL,\n\t\tBotID: botID,\n\t\tWorkDirectory: workDir,\n\t}\n}", "title": "" }, { "docid": "2f4ac0552facaaf83d9649e81074275b", "score": "0.40656066", "text": "func (m *PyMonitor) Configure(conf PyConfig) error {\n\t// get the python config from the supplied config\n\tpyconf := conf.PythonConfig()\n\tif len(pyconf.TypesDBPaths) == 0 {\n\t\tpyconf.TypesDBPaths = append(pyconf.TypesDBPaths, collectd.DefaultTypesDBPath())\n\t}\n\n\tfor k := range pyconf.PluginConfig {\n\t\tif v, ok := pyconf.PluginConfig[k].(string); ok {\n\t\t\tif v == \"\" {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\ttemplate, err := template.New(\"nested\").Parse(v)\n\t\t\tif err != nil {\n\t\t\t\tm.Logger().WithError(err).Errorf(\"Could not parse value '%s' as template\", v)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tout := bytes.Buffer{}\n\t\t\t// fill in any templates with the whole config struct passed into this method\n\t\t\terr = template.Option(\"missingkey=error\").Execute(&out, conf)\n\t\t\tif err != nil {\n\t\t\t\tm.Logger().WithFields(log.Fields{\n\t\t\t\t\t\"template\": v,\n\t\t\t\t\t\"error\": err,\n\t\t\t\t\t\"context\": spew.Sdump(conf),\n\t\t\t\t}).Error(\"Could not render nested config template\")\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tvar result interface{} = out.String()\n\t\t\tif i, err := strconv.Atoi(result.(string)); err == nil {\n\t\t\t\tresult = i\n\t\t\t}\n\n\t\t\tpyconf.PluginConfig[k] = result\n\t\t}\n\t}\n\n\truntimeConf := subproc.DefaultPythonRuntimeConfig(\"sfxcollectd\")\n\tpyBin := conf.PythonConfig().PythonBinary\n\tif pyBin != \"\" {\n\t\targs := strings.Fields(pyBin)\n\t\truntimeConf.Binary = args[0]\n\t\truntimeConf.Env = os.Environ()\n\t\truntimeConf.Args = append(runtimeConf.Args, args[1:]...)\n\t}\n\n\treturn m.MonitorCore.ConfigureInSubproc(pyconf, runtimeConf, m)\n}", "title": "" }, { "docid": "2b573a66c9c8f2e2055361843bfdac68", "score": "0.40647292", "text": "func (e *Env) ConfigureInterface(ctx context.Context, ifname string, addr net.IP, subnet *net.IPNet) error {\n\tif err := e.RunWithoutChroot(ctx, \"ip\", \"addr\", \"add\", addr.String(), \"dev\", ifname); err != nil {\n\t\treturn errors.Wrapf(err, \"failed to install address %s on %s\", addr.String(), ifname)\n\t}\n\tif err := e.RunWithoutChroot(ctx, \"ip\", \"route\", \"add\", subnet.String(), \"dev\", ifname); err != nil {\n\t\treturn errors.Wrapf(err, \"failed to install route %s on %s\", subnet.String(), ifname)\n\t}\n\ttesting.ContextLogf(ctx, \"Installed %s with subnet %s on interface %s in netns %s\", addr.String(), subnet.String(), ifname, e.NetNSName)\n\treturn nil\n}", "title": "" }, { "docid": "c0749305d6618d51fbfecd7ff230a243", "score": "0.40610886", "text": "func (sv *SliceView) ConfigSliceGrid(forceUpdt bool) {\n\tif kit.IfaceIsNil(sv.Slice) {\n\t\treturn\n\t}\n\tmv := reflect.ValueOf(sv.Slice)\n\tmvnp := kit.NonPtrValue(mv)\n\tsz := mvnp.Len()\n\n\tif !forceUpdt && sv.BuiltSlice == sv.Slice && sv.BuiltSize == sz {\n\t\treturn\n\t}\n\tsv.BuiltSlice = sv.Slice\n\tsv.BuiltSize = sz\n\n\tsg, _ := sv.SliceGrid()\n\tif sg == nil {\n\t\treturn\n\t}\n\tupdt := sg.UpdateStart()\n\tsg.SetFullReRender()\n\tdefer sg.UpdateEnd(updt)\n\n\tnWidgPerRow, _ := sv.RowWidgetNs()\n\n\tsg.Lay = gi.LayoutGrid\n\tsg.SetProp(\"columns\", nWidgPerRow)\n\t// setting a pref here is key for giving it a scrollbar in larger context\n\tsg.SetMinPrefHeight(units.NewValue(10, units.Em))\n\tsg.SetMinPrefWidth(units.NewValue(10, units.Em))\n\tsg.SetStretchMaxHeight() // for this to work, ALL layers above need it too\n\tsg.SetStretchMaxWidth() // for this to work, ALL layers above need it too\n\n\tsv.Values = make([]ValueView, sz)\n\n\tsg.DeleteChildren(true)\n\tsg.Kids = make(ki.Slice, nWidgPerRow*sz)\n\n\tsv.ConfigSliceGridRows()\n}", "title": "" } ]
00410598bacaf9316b2c6b889aa96480
GoString returns the string representation. API parameter values that are decorated as "sensitive" in the API will not be included in the string output. The member name will be present, but the value will be replaced with "sensitive".
[ { "docid": "9456d9ac2952dbc7d5facf3f47cb4aab", "score": "0.0", "text": "func (s SemanticEntityType) GoString() string {\n\treturn s.String()\n}", "title": "" } ]
[ { "docid": "4ef987fe3192563c6dca972fb1a50812", "score": "0.6264239", "text": "func (v *ParamsStruct) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [1]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"UserUUID: %v\", v.UserUUID)\n\ti++\n\n\treturn fmt.Sprintf(\"ParamsStruct{%v}\", strings.Join(fields[:i], \", \"))\n}", "title": "" }, { "docid": "eaeb58a79f8ef47f37d143a9e12ceaea", "score": "0.6223128", "text": "func String(v interface{}) (string, error) {\n\tfields, err := extractFields(nil, v)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tvar s strings.Builder\n\tfor i, fld := range fields {\n\t\tif !fld.options.noprint {\n\t\t\ts.WriteString(flagUsage(fld))\n\t\t\ts.WriteString(\"=\")\n\t\t\ts.WriteString(fmt.Sprintf(\"%v\", fld.field.Interface()))\n\t\t\tif i < len(fields)-1 {\n\t\t\t\ts.WriteString(\"\\n\")\n\t\t\t}\n\t\t}\n\t}\n\n\treturn s.String(), nil\n}", "title": "" }, { "docid": "043b8a0b9d5d1a906547c2275588b9e8", "score": "0.6189073", "text": "func (p Param) String() string {\n\tjp, _ := json.Marshal(p)\n\treturn string(jp)\n}", "title": "" }, { "docid": "0d37436bdc92770c00a49991307eaffe", "score": "0.5911454", "text": "func (this ApiLevel) String() string {\n\treturn this.value\n}", "title": "" }, { "docid": "94c45dad0cbd6dc6a82d7aca9eab1da2", "score": "0.58610946", "text": "func (p Params) String() string {\n\tjp, _ := json.Marshal(p)\n\treturn string(jp)\n}", "title": "" }, { "docid": "7422e92ddcee98e4ae227fd7e12e513f", "score": "0.58572596", "text": "func (s GroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7422e92ddcee98e4ae227fd7e12e513f", "score": "0.58563596", "text": "func (s GroupMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "7358f35155cdc3916d6c7b63efefbf06", "score": "0.5852876", "text": "func (o VserverAggrInfoType) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "310d5d40e335fdc7a93c98cac63b9d31", "score": "0.5834359", "text": "func (p *Param) String() string {\n\treturn fmt.Sprintf(\"%v\", p.Val)\n}", "title": "" }, { "docid": "b1d6b5994a29dcc33e36e994f65e26fb", "score": "0.5801103", "text": "func (s EnvironmentMember) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "46c2001dbd67e783a57ed9852ca71501", "score": "0.580063", "text": "func (m *Member) String() string {\n\tvar builder strings.Builder\n\tbuilder.WriteString(\"Member(\")\n\tbuilder.WriteString(fmt.Sprintf(\"id=%v\", m.ID))\n\tbuilder.WriteString(\", member_email=\")\n\tbuilder.WriteString(m.MemberEmail)\n\tbuilder.WriteString(\", member_name=\")\n\tbuilder.WriteString(m.MemberName)\n\tbuilder.WriteString(\", member_password=\")\n\tbuilder.WriteString(m.MemberPassword)\n\tbuilder.WriteByte(')')\n\treturn builder.String()\n}", "title": "" }, { "docid": "4b1f28615644fea2c3b408ac935bfd54", "score": "0.5799672", "text": "func (fp *FunctionParam) String() string {\n\treturn fmt.Sprintf(\"%v %v\", fp.wtype, fp.name)\n}", "title": "" }, { "docid": "2e6daaa750bb307921f4b0e7a3989155", "score": "0.5786204", "text": "func (p *Parameter) String() string {\n\treturn fmt.Sprintf(\"%v\", p.value)\n}", "title": "" }, { "docid": "753a1ebc168f836c3755404e8ca8865c", "score": "0.57039726", "text": "func (v *Echo_EchoStructMap_Args) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [1]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"Arg: %v\", v.Arg)\n\ti++\n\n\treturn fmt.Sprintf(\"Echo_EchoStructMap_Args{%v}\", strings.Join(fields[:i], \", \"))\n}", "title": "" }, { "docid": "e988010bbe0a9e1db934209b8b5bcc6f", "score": "0.567947", "text": "func (v *QueryParamsOptsStruct) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [4]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"Name: %v\", v.Name)\n\ti++\n\tif v.UserUUID != nil {\n\t\tfields[i] = fmt.Sprintf(\"UserUUID: %v\", *(v.UserUUID))\n\t\ti++\n\t}\n\tif v.AuthUUID != nil {\n\t\tfields[i] = fmt.Sprintf(\"AuthUUID: %v\", *(v.AuthUUID))\n\t\ti++\n\t}\n\tif v.AuthUUID2 != nil {\n\t\tfields[i] = fmt.Sprintf(\"AuthUUID2: %v\", *(v.AuthUUID2))\n\t\ti++\n\t}\n\n\treturn fmt.Sprintf(\"QueryParamsOptsStruct{%v}\", strings.Join(fields[:i], \", \"))\n}", "title": "" }, { "docid": "64a4291dd4348f585fd7a6f0091ab3cd", "score": "0.563443", "text": "func (p Params) String() string {\n\treturn fmt.Sprintf(`Params:\n Partner validator min-self-delegation: %s\n Consensus validator min-self-delegation: %s\n Partner validator min-delegation: \t %s\n Consensus validator min-delegation: %s\n Consensus validator commission rate: %s\n Partner validator commission rate: %s\n Supply Coin Denom: %s`,\n\t\tp.PartnerValidatorMinSelfDelegation, p.ConsensusValidatorMinSelfDelegation,\n\t\tp.PartnerValidatorMinDelegation, p.ConsensusValidatorMinDelegation,\n\t\tp.ConsensusValidatorFixedCommissionRate, p.PartnerValidatorFixedCommissionRate, p.SupplyDenom)\n}", "title": "" }, { "docid": "433974782504c0247a4eed38b693bc8d", "score": "0.56344277", "text": "func (m Member) String() string {\n\treturn m.Name\n}", "title": "" }, { "docid": "1050fda86d17f688f12ea9cf1ca474f4", "score": "0.5626281", "text": "func (s StringParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "1050fda86d17f688f12ea9cf1ca474f4", "score": "0.5626281", "text": "func (s StringParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "947af2e687894d6d29a03e631290b565", "score": "0.561751", "text": "func (s CognitoMemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "956aefa1bd2d41ff35f228d4f764a1ae", "score": "0.55769485", "text": "func (f *ParameterField) String() string {\n\treturn fmt.Sprintf(\"parameterOptions %s typeCode %s mode %s fraction %d length %d name %s\",\n\t\tf.parameterOptions,\n\t\tf.tc,\n\t\tf.mode,\n\t\tf.fraction,\n\t\tf.length,\n\t\tf.Name(),\n\t)\n}", "title": "" }, { "docid": "583380e127f4dba18cda6324b85ffb0f", "score": "0.5576497", "text": "func (nvp NameValuePair) String() string {\n\treturn fmt.Sprintf(\"(Name:%s,Value:%s,Type:%s)\", nvp.VarName, nvp.value(), nvp.Type)\n}", "title": "" }, { "docid": "e8ec90c7d3803454fa26a1609fe712fe", "score": "0.5574367", "text": "func (s ConformancePackInputParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "cdbf7509ef8d41cb9a5406ad3a14a3af", "score": "0.55650645", "text": "func (d *gsObjectInfo) String() string {\n\tsrc, err := json.Marshal(d.Info)\n\tif err != nil {\n\t\treturn fmt.Sprintf(\"%+v\", d.Info)\n\t}\n\treturn string(src)\n}", "title": "" }, { "docid": "2fd2874d221bf3b88cfdab9b589cac77", "score": "0.55598235", "text": "func (t Type) String() string {\n\treturn TypeToGRPCField(t).String()\n}", "title": "" }, { "docid": "0815da3599a45529b5c823ddbc76dc70", "score": "0.5559223", "text": "func (gp Params) String() string {\n\treturn gp.VotingParams.String() + \"\\n\" +\n\t\tgp.TallyParams.String() + \"\\n\" + gp.DepositParams.String()\n}", "title": "" }, { "docid": "0d34031c513158ff6fe20f3e7ebd3f66", "score": "0.5522846", "text": "func (s MappedDataSetParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.5522052", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.5522052", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3ffc25a4edc5ca7652c4750de89130eb", "score": "0.5522052", "text": "func (s Parameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "24f0bfea8419e1d9c7653157a829aa39", "score": "0.55216116", "text": "func (op PipelineOp) String() string {\n\ts := make([]byte, 0, 32)\n\ts = append(s, \"get field \"...)\n\ts = strconv.AppendInt(s, int64(op.Field), 10)\n\tif op.DefaultValue == nil {\n\t\treturn string(s)\n\t}\n\ts = append(s, \" with default\"...)\n\treturn string(s)\n}", "title": "" }, { "docid": "2537643a4d071d1910ad417707ce36dd", "score": "0.5486904", "text": "func (s DecimalParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2537643a4d071d1910ad417707ce36dd", "score": "0.5486904", "text": "func (s DecimalParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "09b6703358d5028baa3775665603a54e", "score": "0.5476082", "text": "func (s JSONMappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "09b6703358d5028baa3775665603a54e", "score": "0.5476082", "text": "func (s JSONMappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "95c26f59688abacfcb4ed1f105b419b1", "score": "0.54714805", "text": "func (s *VirtualInput) String() string {\n\treturn fmt.Sprintf(\"%+v\", *s)\n}", "title": "" }, { "docid": "64398c6eed3f49936dbd9aade80b76a9", "score": "0.5461902", "text": "func (s MemberDetail) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "b6af83497814306805b3f888238bb744", "score": "0.54596865", "text": "func (me TxsdMethodparamRep) String() string { return xsdt.Token(me).String() }", "title": "" }, { "docid": "3604a1d12813ce519872a998508d98c7", "score": "0.5449386", "text": "func (s GetMembersOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "9e3f1500f300e00cb99b759b6cf8770c", "score": "0.5446846", "text": "func (s ScmProvider) String() string {\n\tjs, _ := json.Marshal(s)\n\treturn string(js)\n}", "title": "" }, { "docid": "34d38eab17e3420f214ad03a8ffc6359", "score": "0.5435329", "text": "func (field Field) String() string {\n\treturn field.Name + \"=\" + stringValue(field, false)\n}", "title": "" }, { "docid": "a102628683574cfd3b9b626c5ef060f3", "score": "0.54287386", "text": "func (v *QueryParamsStruct) String() string {\n\tif v == nil {\n\t\treturn \"<nil>\"\n\t}\n\n\tvar fields [5]string\n\ti := 0\n\tfields[i] = fmt.Sprintf(\"Name: %v\", v.Name)\n\ti++\n\tif v.UserUUID != nil {\n\t\tfields[i] = fmt.Sprintf(\"UserUUID: %v\", *(v.UserUUID))\n\t\ti++\n\t}\n\tif v.AuthUUID != nil {\n\t\tfields[i] = fmt.Sprintf(\"AuthUUID: %v\", *(v.AuthUUID))\n\t\ti++\n\t}\n\tif v.AuthUUID2 != nil {\n\t\tfields[i] = fmt.Sprintf(\"AuthUUID2: %v\", *(v.AuthUUID2))\n\t\ti++\n\t}\n\tfields[i] = fmt.Sprintf(\"Foo: %v\", v.Foo)\n\ti++\n\n\treturn fmt.Sprintf(\"QueryParamsStruct{%v}\", strings.Join(fields[:i], \", \"))\n}", "title": "" }, { "docid": "62ee10d923b49807859b3bd764f81e15", "score": "0.54285294", "text": "func (s ParameterObject) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "11f92eb230675327e183270a7f53023f", "score": "0.54221255", "text": "func (f *Field) String() string {\n\treturn fmt.Sprintf(\"%s.%s\", f.Struct, f.Name)\n}", "title": "" }, { "docid": "3564e810a8580c6c92411a90aa6d60a1", "score": "0.542205", "text": "func (t *Struct) String() string {\n\treturn fmt.Sprintf(\"%s.%s\", t.Pkg.Name, t.Name)\n}", "title": "" }, { "docid": "252b578b02445495faf7c8a1d0cc0396", "score": "0.5392762", "text": "func (s HITLayoutParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "a4c54cbfb5ec72f8261aaed18092a6bb", "score": "0.53917444", "text": "func (i *GPUInfo) JSONString(indent bool) string {\n\treturn safeJSON(gpuPrinter{i}, indent)\n}", "title": "" }, { "docid": "7810f5262bc9faa785879a38fa9b775d", "score": "0.5389633", "text": "func (s MemberDefinition) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "9c66cccdde8c717e9a130db2918369c1", "score": "0.5387474", "text": "func (s ParameterStringFilter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0937fecf24664785bc9484de4c85dcaf", "score": "0.5386834", "text": "func String(name, value, usage string) *string {\n\tp := Param{\n\t\tParamType: ParamTypeString,\n\t\tName: name,\n\t\tDefault: value,\n\t\tUsage: usage,\n\t}\n\tptr := new(string)\n\treturn newParam(p, ptr).(*string)\n}", "title": "" }, { "docid": "107d9ae25b5bb5f0efc1b21eb657e2e8", "score": "0.53807145", "text": "func (s ServiceNowParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "107d9ae25b5bb5f0efc1b21eb657e2e8", "score": "0.53807145", "text": "func (s ServiceNowParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "c29d600c62e6f51acbe98998ffc8a1c1", "score": "0.5378591", "text": "func (c *Criterion) String() string {\n\tstr, _ := c.MarshalJSON()\n\treturn string(str)\n}", "title": "" }, { "docid": "73bd066e28eeff7b75dcd1008d93e4cf", "score": "0.53734565", "text": "func (params Params) String() string {\n\tout, _ := yaml.Marshal(params)\n\treturn string(out)\n}", "title": "" }, { "docid": "b9d97878d151e4ecce328096f2855449", "score": "0.5372647", "text": "func (s TemplateParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "dbade7ee1753eb1fdd72af772e529075", "score": "0.5366653", "text": "func (s ParameterMapEntry) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "cd6fe60da2bb297ea1daa97e3ee383f5", "score": "0.5364029", "text": "func (s ComponentParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "11a4e7851f5e03cc5470dce5aef81d39", "score": "0.53605855", "text": "func (s GetMembersInput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0e6890d3a0204c7a1bce386acb72d903", "score": "0.5346103", "text": "func (s CSVMappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "0e6890d3a0204c7a1bce386acb72d903", "score": "0.5346103", "text": "func (s CSVMappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "105fac700204ede2246a8a98a8d47b43", "score": "0.53390586", "text": "func (s PolicyParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2982946683bb0e094591a99296aea725", "score": "0.5322016", "text": "func String(value interface{}) string {\n\treturn fmt.Sprintf(\"%v\", value)\n}", "title": "" }, { "docid": "62132f69fac5eea623282741c0a0cce3", "score": "0.5322011", "text": "func (c Params) String() string {\n\tdefer FuncEnding(FuncStarting())\n\tnameFmt := \"%10s: \"\n\tlines := []string{\n\t\tfmt.Sprintf(nameFmt+\"%t\", \"Debug\", debug),\n\t\tfmt.Sprintf(nameFmt+\"%t\", \"Verbose\", c.Verbose),\n\t\tfmt.Sprintf(nameFmt+\"%d\", \"Errors\", len(c.Errors)),\n\t\tfmt.Sprintf(nameFmt+\"%d\", \"Count\", c.Count),\n\t\tfmt.Sprintf(nameFmt+\"%s\", \"Input File\", c.InputFile),\n\t\tfmt.Sprintf(nameFmt+\"%d lines\", \"Input\", len(c.Input)),\n\t\tfmt.Sprintf(nameFmt+\"%d lines\", \"Custom\", len(c.Custom)),\n\t}\n\tif len(c.Errors) > 0 {\n\t\tlines = append(lines, fmt.Sprintf(\"Errors (%d):\", len(c.Errors)))\n\t\terrors := make([]string, len(c.Errors))\n\t\tfor i, err := range c.Errors {\n\t\t\terrors[i] = err.Error()\n\t\t}\n\t\tlines = append(lines, AddLineNumbers(errors, 1)...)\n\t}\n\tif len(c.Input) > 0 {\n\t\tlines = append(lines, fmt.Sprintf(\"Input (%d):\", len(c.Input)))\n\t\tlines = append(lines, AddLineNumbers(c.Input, 0)...)\n\t}\n\tif len(c.Custom) > 0 {\n\t\tlines = append(lines, fmt.Sprintf(\"Custom Input (%d):\", len(c.Custom)))\n\t\tlines = append(lines, AddLineNumbers(c.Custom, 0)...)\n\t}\n\treturn strings.Join(lines, \"\\n\")\n}", "title": "" }, { "docid": "2a5dddaf0899c0f7e51a50091b7a40ef", "score": "0.5316514", "text": "func (o SnapmirrorUpdateRequest) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "5bc0664256e6e8fd580c5161059d7c29", "score": "0.5316048", "text": "func (v *Voca) String() string {\n\tvar builder strings.Builder\n\tbuilder.WriteString(\"Voca(\")\n\tbuilder.WriteString(fmt.Sprintf(\"id=%v\", v.ID))\n\tbuilder.WriteString(\", key=\")\n\tbuilder.WriteString(v.Key)\n\tbuilder.WriteString(\", value=\")\n\tbuilder.WriteString(v.Value)\n\tif v := v.Example; v != nil {\n\t\tbuilder.WriteString(\", example=\")\n\t\tbuilder.WriteString(*v)\n\t}\n\tbuilder.WriteString(\", created_at=\")\n\tbuilder.WriteString(v.CreatedAt.Format(time.ANSIC))\n\tbuilder.WriteByte(')')\n\treturn builder.String()\n}", "title": "" }, { "docid": "f29b23f1b131dd94a2fc5373e8a0a277", "score": "0.5314912", "text": "func (a Attribute) String() string {\n\treturn fmt.Sprintf(\"\\t%s %s `json:\\\"%s\\\" dynamo:\\\"%s\\\"`\", a.Ident.Pascalize(), a.GoType, a.Ident.Underscore(), a.Ident.Underscore())\n}", "title": "" }, { "docid": "619f91c872b1bac6a6d507944a962fcc", "score": "0.53133047", "text": "func (o LunInfoType) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "c635c83e9b07fb603c326a6878f831b7", "score": "0.5312883", "text": "func (dp Service) String() string {\n\tout, err := json.Marshal(dp)\n\tif err != nil {\n\t\treturn err.Error()\n\t}\n\n\treturn string(out)\n}", "title": "" }, { "docid": "55a28d15ad9e8a75756df0d81bf05189", "score": "0.5312249", "text": "func (o NvmeSubsystemMapRemoveRequest) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "1d4e7d34766971f14676e1ed1bb0333d", "score": "0.5308925", "text": "func (s DocumentParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "1d4e7d34766971f14676e1ed1bb0333d", "score": "0.5308925", "text": "func (s DocumentParameter) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "ad064b89c683e8c10416461fa7825d0b", "score": "0.5302616", "text": "func (s SuperuserParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "93c0d5d23f2068450a6c0f5084645da1", "score": "0.5302495", "text": "func (s VirtualObject) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "920ad16961bdc8adf5d75ab107eae1a0", "score": "0.529565", "text": "func (s ServiceFlags) String() string {\n\tvar str []string\n\n\tstr = append(str, string(s.SVCType()))\n\tif s&serviceFlagLocalScope != 0 {\n\t\tstr = append(str, string(SVCTrafficPolicyLocal))\n\t}\n\tif s&serviceFlagSessionAffinity != 0 {\n\t\tstr = append(str, \"sessionAffinity\")\n\t}\n\tif s&serviceFlagRoutable == 0 {\n\t\tstr = append(str, \"non-routable\")\n\t}\n\tif s&serviceFlagSourceRange != 0 {\n\t\tstr = append(str, \"check source-range\")\n\t}\n\n\treturn strings.Join(str, \", \")\n}", "title": "" }, { "docid": "9a84e8c3b2f0d30f9bb1d8ed78ed0599", "score": "0.5290413", "text": "func (st DetectionFlags) String() string {\n\tret := getValueOrEmpty(st.Bestface, \"bestface,\") +\n\t\tgetValueOrEmpty(st.Basicpoints, \"basicpoints,\") +\n\t\tgetValueOrEmpty(st.Propoints, \"propoints,\") +\n\t\tgetValueOrEmpty(st.Classifiers, \"classifiers\") +\n\t\tgetValueOrEmpty(st.Extended, \"extended,\") +\n\t\t\"content\"\n\n\treturn ret\n}", "title": "" }, { "docid": "77b987e44636fdda049baa7cd0039edc", "score": "0.5286009", "text": "func (s PermissionGroupParams) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "24840a1ef3be00166611c4c788935816", "score": "0.52813804", "text": "func (o LunMapRequest) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "f94e9a71c6e92cd52044faa4da2c8f59", "score": "0.527597", "text": "func (s ParameterValue) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "3f9b199981a4e1345a0566bee40b0dc9", "score": "0.5274579", "text": "func (g Feature) String() string {\n\treturn g.JSON()\n}", "title": "" }, { "docid": "8a050b5c8d8af92ab0d999a24ba8b324", "score": "0.52694976", "text": "func JSONString(v interface{}) string {\n\treturn marshalString(json.MarshalIndent(v, \"\", \" \"))\n}", "title": "" }, { "docid": "80c6316aa005b21888c64775f655189d", "score": "0.5258605", "text": "func (msg *message) String() string {\n\tif len(msg.params) > 0 {\n\t\treturn fmt.Sprintf(\"%s - %v\", msg.message, msg.params)\n\t}\n\treturn fmt.Sprintf(\"%s\", msg.message)\n}", "title": "" }, { "docid": "f22d9114d24746c8de07c97a5a480a3f", "score": "0.5258158", "text": "func (s MariaDbParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "6e6e105e8809846ee34eb462299b2036", "score": "0.5257236", "text": "func (v String) String() string {\n\tb, _ := json.Marshal(v.Value())\n\treturn string(b)\n}", "title": "" }, { "docid": "f22d9114d24746c8de07c97a5a480a3f", "score": "0.52570957", "text": "func (s MariaDbParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "5cc1f76fbd35bc1a3cdba30e9de8fea5", "score": "0.52565295", "text": "func (s MappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "5cc1f76fbd35bc1a3cdba30e9de8fea5", "score": "0.52565295", "text": "func (s MappingParameters) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "79b571b636deac89245b3c09fef3c6b3", "score": "0.5254819", "text": "func (p AssetParam) String() string {\n\tout, _ := yaml.Marshal(p)\n\treturn string(out)\n}", "title": "" }, { "docid": "b30303dca846f470eb2efe6e9ecb18bb", "score": "0.5248988", "text": "func (s FieldInfo) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "eddc413eecf078a2d20ca3cd8fb78889", "score": "0.52487046", "text": "func (f Flag) String() string {\n\tjf, _ := json.Marshal(f)\n\treturn string(jf)\n}", "title": "" }, { "docid": "61f38bff17ce0c57709f071aecaaf379", "score": "0.5248105", "text": "func (s StringParameterDeclaration) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "2bd92fee4c643989fbf729c048a5e54f", "score": "0.52439094", "text": "func (request *ChargeRequest) String() string {\n\tjsonifiedRequest, err := json.Marshal(request)\n\n\tif err != nil {\n\t\tlog.Errorf(\"Got error while marshaling request %v\", err)\n\t\treturn \"\"\n\t}\n\n\treturn string(jsonifiedRequest)\n}", "title": "" }, { "docid": "2b86b8c6420eb971496ecd9490d6bfac", "score": "0.524053", "text": "func (m method) String() string {\n\te := m.Serialize()\n\t// Method serialization is custom because of different spacing.\n\treturn fmt.Sprintf(\"%v %v%v\", e.Kind, e.Name, e.Decl)\n}", "title": "" }, { "docid": "2eddc9f51f6b73ff8ba0d0f0f09ce6ff", "score": "0.5240068", "text": "func (vp VertexProperty) String() string {\n\treturn fmt.Sprintf(\"vp[%s->%v]\", vp.Key, vp.Value)\n}", "title": "" }, { "docid": "79f79cadd28fa45a671401aa7685c540", "score": "0.52380306", "text": "func (s GetParameterOutput) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "669d6d05248d32c96e2631243438f273", "score": "0.523777", "text": "func (s EnvironmentMember) GoString() string {\n\treturn s.String()\n}", "title": "" }, { "docid": "bfc42822336be896e444d831ea8b700b", "score": "0.5235532", "text": "func (flag *MapFlag[K, V]) String() string {\n\treturn cli.FlagStringer(flag)\n}", "title": "" }, { "docid": "7aa9725ba483ff95901c718a2096f3e3", "score": "0.52346087", "text": "func (o AggrGetIterRequestDesiredAttributes) String() string {\n\treturn ToString(reflect.ValueOf(o))\n}", "title": "" }, { "docid": "d98b354f882484be7c9167e50644a6d0", "score": "0.5231971", "text": "func (flag *mapValue[K, V]) String() string {\n\tif flag.values == nil {\n\t\treturn \"\"\n\t}\n\treturn collections.MapJoin(*flag.values, flag.argSep, flag.valSep)\n}", "title": "" }, { "docid": "e03733f177bf21ef1d2c26ae306400cd", "score": "0.52319294", "text": "func (t MatchType) String() string {\n\treturn MatchTypeToGRPCField(t).String()\n}", "title": "" }, { "docid": "f14bf1da8cb7aafcd921efa19d21c006", "score": "0.523171", "text": "func (s StructValue) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" }, { "docid": "8dd132e703b8d75b5577b3291c034635", "score": "0.5230301", "text": "func (s ComponentParameterDetail) String() string {\n\treturn awsutil.Prettify(s)\n}", "title": "" } ]
cbd4e8f5082b8b5ddc224a90e46ac6d3
Priority returns from Interface_RoutedVlan_Ipv4_Address_VrrpGroupPath the path struct for its child "priority".
[ { "docid": "9562bcab6fa7ffc1a615e3a50603822b", "score": "0.8563764", "text": "func (n *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPath) Priority() *Interface_RoutedVlan_Ipv4_Address_VrrpGroup_PriorityPath {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroup_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" } ]
[ { "docid": "456bed1b04328efb2ef2261599b015c6", "score": "0.8528278", "text": "func (n *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPath) Priority() *Interface_RoutedVlan_Ipv6_Address_VrrpGroup_PriorityPath {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroup_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c84e75aafa48ac85faa9d7d622ae450b", "score": "0.84013885", "text": "func (n *Interface_Subinterface_Ipv4_Address_VrrpGroupPath) Priority() *Interface_Subinterface_Ipv4_Address_VrrpGroup_PriorityPath {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroup_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e77e89c8c1ad2f431d76c952adb24298", "score": "0.8327031", "text": "func (n *Interface_Subinterface_Ipv6_Address_VrrpGroupPath) Priority() *Interface_Subinterface_Ipv6_Address_VrrpGroup_PriorityPath {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroup_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5eec84e32f072585a97f6fc642a781df", "score": "0.7893147", "text": "func (n *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPathAny) Priority() *Interface_RoutedVlan_Ipv4_Address_VrrpGroup_PriorityPathAny {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroup_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "1e92af0880b24394cc7141ec096bdf87", "score": "0.7852278", "text": "func (n *Interface_Subinterface_Ipv4_Address_VrrpGroupPathAny) Priority() *Interface_Subinterface_Ipv4_Address_VrrpGroup_PriorityPathAny {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroup_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "62defe30343961b517321933bd8581d5", "score": "0.78434485", "text": "func (n *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPathAny) Priority() *Interface_RoutedVlan_Ipv6_Address_VrrpGroup_PriorityPathAny {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroup_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0384869475e4d8acb0139fd6894f420d", "score": "0.77747005", "text": "func (n *Interface_Subinterface_Ipv6_Address_VrrpGroupPathAny) Priority() *Interface_Subinterface_Ipv6_Address_VrrpGroup_PriorityPathAny {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroup_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "57b30e841f037c053d727418c7d38181", "score": "0.73621845", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_VirtualLinkPath) Priority() *NetworkInstance_Protocol_Ospfv2_Area_VirtualLink_PriorityPath {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_VirtualLink_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "050c3bdd0c3dc3e429a0418078e844b4", "score": "0.7348637", "text": "func (n *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPath) CurrentPriority() *Interface_RoutedVlan_Ipv6_Address_VrrpGroup_CurrentPriorityPath {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroup_CurrentPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7a3d00e7421bb4aa007d9f0909f18317", "score": "0.7303628", "text": "func (n *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPath) CurrentPriority() *Interface_RoutedVlan_Ipv4_Address_VrrpGroup_CurrentPriorityPath {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroup_CurrentPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "6fb30d47921a6631990637137a2f83d1", "score": "0.7224635", "text": "func (n *Interface_Subinterface_Ipv6_Address_VrrpGroupPath) CurrentPriority() *Interface_Subinterface_Ipv6_Address_VrrpGroup_CurrentPriorityPath {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroup_CurrentPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0413d795fa9a8d9992b43f811c73218b", "score": "0.7201699", "text": "func (n *Interface_Subinterface_Ipv4_Address_VrrpGroupPath) CurrentPriority() *Interface_Subinterface_Ipv4_Address_VrrpGroup_CurrentPriorityPath {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroup_CurrentPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5e6504199c0d03c8c9d5316667789517", "score": "0.71129286", "text": "func (n *NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservationPath) Priority() *NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservation_PriorityPath {\n\treturn &NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservation_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "3add38bbcff20b55f3a4f4f5686cb1fe", "score": "0.70722646", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_LevelPath) Priority() *NetworkInstance_Protocol_Isis_Interface_Level_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "cde36bf463b40915aaf6876c942ff246", "score": "0.7028087", "text": "func (n *NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPathPath) Priority() *NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPath_PriorityPath {\n\treturn &NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPath_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "022096412c7623be98f3857b93267a24", "score": "0.69655216", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_AdjacencyPath) Priority() *NetworkInstance_Protocol_Isis_Interface_Level_Adjacency_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_Adjacency_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a862f61170ba75d4e3337fee2082021b", "score": "0.6955005", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_InterfacePath) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Interface_PriorityPath {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Interface_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "0c60d6e900e89f1c2c0827a1afc16c37", "score": "0.6944497", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_Interface_NeighborPath) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Interface_Neighbor_PriorityPath {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Interface_Neighbor_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "3acf9b6816797c96e54d3f003c1438cd", "score": "0.684587", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidthPath) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidth_PriorityPath {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidth_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "fb1e7f11b50db3355de82b72dcd65fab", "score": "0.678462", "text": "func (n *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPathAny) CurrentPriority() *Interface_RoutedVlan_Ipv6_Address_VrrpGroup_CurrentPriorityPathAny {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroup_CurrentPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5bcd1fa9d4a03f29c133e4b51896c37c", "score": "0.67690927", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriorityPath) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c4e9b087d61cc5b2df595c28e81d1bf1", "score": "0.6756256", "text": "func (n *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPathAny) CurrentPriority() *Interface_RoutedVlan_Ipv4_Address_VrrpGroup_CurrentPriorityPathAny {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroup_CurrentPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a60fcc5f5b7e7f10b266dfb60da8a892", "score": "0.6729866", "text": "func (n *Interface_Subinterface_Ipv6_Address_VrrpGroupPathAny) CurrentPriority() *Interface_Subinterface_Ipv6_Address_VrrpGroup_CurrentPriorityPathAny {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroup_CurrentPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2fb1d5d179a0b840672ca0cc1574ab49", "score": "0.67181337", "text": "func (n *Interface_Subinterface_Ipv4_Address_VrrpGroupPathAny) CurrentPriority() *Interface_Subinterface_Ipv4_Address_VrrpGroup_CurrentPriorityPathAny {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroup_CurrentPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"current-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7bf74c4f8e3c587f3d9a84634e627348", "score": "0.6717571", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriorityPath) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c16c57539145e44f10b1266df98f4d76", "score": "0.6714185", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriorityPath) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "15f9c4d76eb9dfc570b6a560d6de7354", "score": "0.6711461", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriorityPath) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriority_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "361c00db29653d18ea345a3f39dc12f1", "score": "0.6708017", "text": "func (n *NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPathPathAny) Priority() *NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPath_PriorityPathAny {\n\treturn &NetworkInstance_Mpls_Lsps_ConstrainedPath_Tunnel_P2PTunnelAttributes_P2PPrimaryPath_CandidateSecondaryPath_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8188944d8307c65da39c9f692e4f2b82", "score": "0.66473", "text": "func (n *System_Messages_MessagePath) Priority() *System_Messages_Message_PriorityPath {\n\treturn &System_Messages_Message_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "64c1abdfb17a1dc642e248560ac8f699", "score": "0.6622297", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_LevelPathAny) Priority() *NetworkInstance_Protocol_Isis_Interface_Level_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2e7608280ad44d200012d7563e61d891", "score": "0.66134584", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_VirtualLinkPathAny) Priority() *NetworkInstance_Protocol_Ospfv2_Area_VirtualLink_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_VirtualLink_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "3436b3ec437edf78acef9499d9e2f1fe", "score": "0.65730155", "text": "func (n *Messages_MessagePath) Priority() *Messages_Message_PriorityPath {\n\treturn &Messages_Message_PriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "ad6586488185d77697e7c4846a2fb87a", "score": "0.64386386", "text": "func (n *NetworkInstance_Protocol_Isis_Interface_Level_AdjacencyPathAny) Priority() *NetworkInstance_Protocol_Isis_Interface_Level_Adjacency_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Interface_Level_Adjacency_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "5eb90e1d9a66c38bbedfeb7103a5295c", "score": "0.6428462", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidthPathAny) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidth_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Lsdb_LsaType_Lsa_OpaqueLsa_TrafficEngineering_Tlv_Link_SubTlv_UnreservedBandwidth_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "df46948d43b9759ee35ad79248c706e6", "score": "0.6395368", "text": "func (n *NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservationPathAny) Priority() *NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservation_PriorityPathAny {\n\treturn &NetworkInstance_Mpls_SignalingProtocols_RsvpTe_Interface_BandwidthReservation_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e7f636f323ac15ebeafe0a4e511d0361", "score": "0.63189393", "text": "func (n *Stp_Mstp_MstInstance_InterfacePath) PortPriority() *Stp_Mstp_MstInstance_Interface_PortPriorityPath {\n\treturn &Stp_Mstp_MstInstance_Interface_PortPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "65ca39a1d4e45d45d52e9b5735507b10", "score": "0.6305086", "text": "func (n *Stp_Vlan_InterfacePath) PortPriority() *Stp_Vlan_Interface_PortPriorityPath {\n\treturn &Stp_Vlan_Interface_PortPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "70ab71552a1bf2218527491a6104d2a0", "score": "0.63004106", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_InterfacePathAny) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Interface_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Interface_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e1d051c53d248fd241e3eaa37da0e3f0", "score": "0.62951154", "text": "func (n *Interface_Subinterface_Ipv4_AddressPath) VrrpGroup(VirtualRouterId uint8) *Interface_Subinterface_Ipv4_Address_VrrpGroupPath {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroupPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7594816f71aeee37808e6b4924b7932d", "score": "0.62925756", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriorityPathAny) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_IsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "55039866178331c9638229e4c1b4039b", "score": "0.6290548", "text": "func (n *Stp_Rstp_InterfacePath) PortPriority() *Stp_Rstp_Interface_PortPriorityPath {\n\treturn &Stp_Rstp_Interface_PortPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "a52fa3f89ef95f58893ab77999a4a130", "score": "0.62722874", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriorityPathAny) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_ExtendedIsReachability_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "be4b3c11f3a767aecbc6510c088d266d", "score": "0.62315273", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriorityPathAny) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsisNeighborAttribute_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "e336100d0c0c0469cc6fbcfeb45ddf63", "score": "0.623048", "text": "func (n *Interface_Subinterface_Ipv6_AddressPath) VrrpGroup(VirtualRouterId uint8) *Interface_Subinterface_Ipv6_Address_VrrpGroupPath {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroupPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "1b14d6252cf4f47b0943223252b9e773", "score": "0.62300146", "text": "func (n *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriorityPathAny) Priority() *NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Isis_Level_Lsp_Tlv_MtIsn_Neighbor_Instance_Subtlv_SetupPriority_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "77d3aa96ca5bf054231d43d897d00fdf", "score": "0.6222963", "text": "func (n *Stp_VlanPath) BridgePriority() *Stp_Vlan_BridgePriorityPath {\n\treturn &Stp_Vlan_BridgePriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"bridge-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7759d13c758f48d02bb94536fcc4eabd", "score": "0.6219975", "text": "func (n *Interface_RoutedVlan_Ipv4_AddressPath) VrrpGroup(VirtualRouterId uint8) *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPath {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroupPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "38e2c697d204a2f133b9fbd87dc75665", "score": "0.62100786", "text": "func (n *NetworkInstance_Protocol_Ospfv2_Area_Interface_NeighborPathAny) Priority() *NetworkInstance_Protocol_Ospfv2_Area_Interface_Neighbor_PriorityPathAny {\n\treturn &NetworkInstance_Protocol_Ospfv2_Area_Interface_Neighbor_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"state\", \"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8a1b14c1e412bb3099d8b134a6d91647", "score": "0.6201642", "text": "func (n *Interface_Subinterface_Ipv4_AddressPathAny) VrrpGroup(VirtualRouterId uint8) *Interface_Subinterface_Ipv4_Address_VrrpGroupPathAny {\n\treturn &Interface_Subinterface_Ipv4_Address_VrrpGroupPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "99a39b022b25fd3d7eb79332e38d626e", "score": "0.6197693", "text": "func (n *NetworkInstance_Protocol_Pim_InterfacePath) DrPriority() *NetworkInstance_Protocol_Pim_Interface_DrPriorityPath {\n\treturn &NetworkInstance_Protocol_Pim_Interface_DrPriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"dr-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "021605e714ad1f42ebcd9a192c34f214", "score": "0.61840487", "text": "func (n *Interface_RoutedVlan_Ipv6_AddressPath) VrrpGroup(VirtualRouterId uint8) *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPath {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroupPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "edea07311d5cd381e99361aec20184ff", "score": "0.617965", "text": "func (n *System_Messages_MessagePathAny) Priority() *System_Messages_Message_PriorityPathAny {\n\treturn &System_Messages_Message_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8054ecdb1f9c92325d346dab2bf5819d", "score": "0.6178986", "text": "func (n *Messages_MessagePathAny) Priority() *Messages_Message_PriorityPathAny {\n\treturn &Messages_Message_PriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "627527ae116fa7df1da507ed3521fb1c", "score": "0.6139407", "text": "func (n *Interface_Subinterface_Ipv6_AddressPathAny) VrrpGroup(VirtualRouterId uint8) *Interface_Subinterface_Ipv6_Address_VrrpGroupPathAny {\n\treturn &Interface_Subinterface_Ipv6_Address_VrrpGroupPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "41dc5539420cde5a2398c7d44145dcdc", "score": "0.6120415", "text": "func (n *Stp_Mstp_MstInstancePath) BridgePriority() *Stp_Mstp_MstInstance_BridgePriorityPath {\n\treturn &Stp_Mstp_MstInstance_BridgePriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"bridge-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7eaf6a5f2952a8342651167f80bfa94f", "score": "0.61142117", "text": "func (n *Interface_RoutedVlan_Ipv4_AddressPathAny) VrrpGroup(VirtualRouterId uint8) *Interface_RoutedVlan_Ipv4_Address_VrrpGroupPathAny {\n\treturn &Interface_RoutedVlan_Ipv4_Address_VrrpGroupPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7c23a600c3455a6704a388fa9f3d4392", "score": "0.6072345", "text": "func (n *Interface_RoutedVlan_Ipv6_AddressPathAny) VrrpGroup(VirtualRouterId uint8) *Interface_RoutedVlan_Ipv6_Address_VrrpGroupPathAny {\n\treturn &Interface_RoutedVlan_Ipv6_Address_VrrpGroupPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"vrrp\", \"vrrp-group\"},\n\t\t\tmap[string]interface{}{\"virtual-router-id\": VirtualRouterId},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "aac94823075dd9a7da48284e896eae5c", "score": "0.60437715", "text": "func (n *Stp_RstpPath) BridgePriority() *Stp_Rstp_BridgePriorityPath {\n\treturn &Stp_Rstp_BridgePriorityPath{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"bridge-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "c3344fa67d8432ef52505adc56e2c384", "score": "0.6031715", "text": "func (l Level) Priority() int {\n\tswitch l {\n\tcase Debug:\n\t\treturn 1\n\tcase Info:\n\t\treturn 2\n\tcase Warn:\n\t\treturn 3\n\tcase Error:\n\t\treturn 4\n\tdefault:\n\t\treturn 9999\n\t}\n}", "title": "" }, { "docid": "b346a946901b164e539309ae33d2aca6", "score": "0.6025214", "text": "func (n *NetworkInstance_Protocol_Pim_InterfacePathAny) DrPriority() *NetworkInstance_Protocol_Pim_Interface_DrPriorityPathAny {\n\treturn &NetworkInstance_Protocol_Pim_Interface_DrPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"dr-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "2603e846776955e255781e697fb70faf", "score": "0.59652954", "text": "func (n *Stp_Rstp_InterfacePathAny) PortPriority() *Stp_Rstp_Interface_PortPriorityPathAny {\n\treturn &Stp_Rstp_Interface_PortPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "61e73316978aa02c47aba011ff956269", "score": "0.5956291", "text": "func (n *Stp_Vlan_InterfacePathAny) PortPriority() *Stp_Vlan_Interface_PortPriorityPathAny {\n\treturn &Stp_Vlan_Interface_PortPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "863ed6730f17e42d79866c3946ff5994", "score": "0.5926422", "text": "func (g *GroupComposer) Priority() level.Priority {\n\tvar highest level.Priority\n\n\tg.mutex.RLock()\n\tdefer g.mutex.RUnlock()\n\n\tfor _, m := range g.messages {\n\t\tif m == nil {\n\t\t\tcontinue\n\t\t}\n\t\tpri := m.Priority()\n\t\tif pri > highest {\n\t\t\thighest = pri\n\t\t}\n\t}\n\n\treturn highest\n}", "title": "" }, { "docid": "10ee4d1c777bda1df31ea84b7b4b1655", "score": "0.59263957", "text": "func (n *Stp_Mstp_MstInstance_InterfacePathAny) PortPriority() *Stp_Mstp_MstInstance_Interface_PortPriorityPathAny {\n\treturn &Stp_Mstp_MstInstance_Interface_PortPriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"port-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "7e5cbd72deebff2ab91c618ea22e31ff", "score": "0.5898859", "text": "func (o WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "a53b02f054f779c4df7593ec863b28bf", "score": "0.58968836", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "551311c45b20f58a47e660c1455cf7e1", "score": "0.5893908", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "2b783810ece0f0c1300242c1e13dc8da", "score": "0.58921057", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "fff5fd89aa31846926077b65ca545283", "score": "0.5887209", "text": "func (n *Stp_VlanPathAny) BridgePriority() *Stp_Vlan_BridgePriorityPathAny {\n\treturn &Stp_Vlan_BridgePriorityPathAny{\n\t\tNodePath: ygot.NewNodePath(\n\t\t\t[]string{\"config\", \"bridge-priority\"},\n\t\t\tmap[string]interface{}{},\n\t\t\tn,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "8453ecb3548e8224614cb60feb2fa88c", "score": "0.5885959", "text": "func (o *TasksIdJsonTodoItem1) GetPriority() string {\n\tif o == nil || o.Priority == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.Priority\n}", "title": "" }, { "docid": "e01136ede6935eb5a6c0ef97b265dbf6", "score": "0.58772874", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "ccf56d055bef9a797e68cf44ed6e7d72", "score": "0.5876073", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "9bfb2280c536f9a27d9522e6dd55d041", "score": "0.58737326", "text": "func (o WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "926c77bf7140f2014a6a6d22249a2d41", "score": "0.58727604", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "6e9719bfccd99597826d3a8390110d5c", "score": "0.587268", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "abaeef5db71c9aa83aeed68c8a79b30f", "score": "0.5867436", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementSqliMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementSqliMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "1d34dcb91adb3c95710110131927d6fc", "score": "0.58667904", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementSqliMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementSqliMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "78863c9b075ca7e8cc8d56e41bfcac66", "score": "0.5865968", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "743a4624d2b617c1fde77ff486b460e4", "score": "0.58620626", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "71dfe19d4257bd457f85ba1604f26687", "score": "0.58587515", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "69348ff51ecf1d35f93da4f26c9667df", "score": "0.5858472", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementByteMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementByteMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "b226e445880c7a2148d022a90d4ad3f7", "score": "0.58555084", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "f0359c895b9c0b66bfabcb0c574ee124", "score": "0.58544", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "6165c9792914ea2692a0ae6f7c20d271", "score": "0.58535844", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementSqliMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementSqliMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "d704e1b24096a9343d6f0cefee64a1bd", "score": "0.5849313", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "de1a7838ecb829c51717a11f9c454d23", "score": "0.58480656", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "24dc5af55ef7a3c7a1f5868743643ef6", "score": "0.5846885", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "ed12e08e271d276b77da4d35fc72246a", "score": "0.58446336", "text": "func (mb *monitorBase) Priority() int {\n\treturn mb.priority\n}", "title": "" }, { "docid": "3a7b352511a883084291f609a8087926", "score": "0.58445734", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "81668929653cde45e19e15f99d1687d5", "score": "0.584354", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "e998e263b24bdd4a4adfa713084bdaa5", "score": "0.58406997", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementXssMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementNotStatementStatementXssMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "79ef75c0f0f07a2fe34309e7bb94c87b", "score": "0.5839303", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "8e9416733efdb330e8df6481bf18ec47", "score": "0.58385336", "text": "func (o WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementByteMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementNotStatementStatementAndStatementStatementByteMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "72bfac8ddc4ccf0649d070f92bcfa59b", "score": "0.5838343", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementSqliMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementSqliMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "84da99bae3180f2f7b5005e82a4fe6fd", "score": "0.58358103", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementAndStatementStatementRegexPatternSetReferenceStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "80963658a680cf2773c82a82457117b0", "score": "0.58357686", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementByteMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementByteMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "446a4458f638d561ae65f8ac24877817", "score": "0.58351725", "text": "func (o WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementSqliMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementOrStatementStatementAndStatementStatementOrStatementStatementSqliMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "42ac080e8919d3ace8361035ce875201", "score": "0.583412", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementRegexMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementOrStatementStatementRegexMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "6d6b900e0dcbfc2ca94893b9a1739776", "score": "0.58327895", "text": "func (o WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementByteMatchStatementTextTransformationOutput) Priority() pulumi.IntOutput {\n\treturn o.ApplyT(func(v WebAclRuleStatementRateBasedStatementScopeDownStatementOrStatementStatementNotStatementStatementByteMatchStatementTextTransformation) int {\n\t\treturn v.Priority\n\t}).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "bf3d834bcf20e3d1e007c1f1cc2e4203", "score": "0.5829648", "text": "func (b *Base) Priority() int {\n\tb.mutex.RLock()\n\tdefer b.mutex.RUnlock()\n\n\treturn b.priority\n}", "title": "" } ]
936f0d32b8ac74e7ba644574109885aa
NewCapture returns a new Capture instance
[ { "docid": "5cfc44921b34aebcc68d9a8b39c35642", "score": "0.7289048", "text": "func NewCapture(\n\tctx context.Context,\n\tpdEndpoints []string,\n\tpdCli pd.Client,\n\tcredential *security.Credential,\n\tadvertiseAddr string,\n\topts *processorOpts,\n) (c *Capture, err error) {\n\ttlsConfig, err := credential.ToTLSConfig()\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\tgrpcTLSOption, err := credential.ToGRPCDialOption()\n\tif err != nil {\n\t\treturn nil, errors.Trace(err)\n\t}\n\tlogConfig := logutil.DefaultZapLoggerConfig\n\tlogConfig.Level = zap.NewAtomicLevelAt(zapcore.ErrorLevel)\n\tetcdCli, err := clientv3.New(clientv3.Config{\n\t\tEndpoints: pdEndpoints,\n\t\tTLS: tlsConfig,\n\t\tContext: ctx,\n\t\tLogConfig: &logConfig,\n\t\tDialTimeout: 5 * time.Second,\n\t\tDialOptions: []grpc.DialOption{\n\t\t\tgrpcTLSOption,\n\t\t\tgrpc.WithBlock(),\n\t\t\tgrpc.WithConnectParams(grpc.ConnectParams{\n\t\t\t\tBackoff: backoff.Config{\n\t\t\t\t\tBaseDelay: time.Second,\n\t\t\t\t\tMultiplier: 1.1,\n\t\t\t\t\tJitter: 0.1,\n\t\t\t\t\tMaxDelay: 3 * time.Second,\n\t\t\t\t},\n\t\t\t\tMinConnectTimeout: 3 * time.Second,\n\t\t\t}),\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, errors.Annotate(cerror.WrapError(cerror.ErrNewCaptureFailed, err), \"new etcd client\")\n\t}\n\tsess, err := concurrency.NewSession(etcdCli,\n\t\tconcurrency.WithTTL(captureSessionTTL))\n\tif err != nil {\n\t\treturn nil, errors.Annotate(cerror.WrapError(cerror.ErrNewCaptureFailed, err), \"create capture session\")\n\t}\n\telec := concurrency.NewElection(sess, kv.CaptureOwnerKey)\n\tcli := kv.NewCDCEtcdClient(ctx, etcdCli)\n\tid := uuid.New().String()\n\tinfo := &model.CaptureInfo{\n\t\tID: id,\n\t\tAdvertiseAddr: advertiseAddr,\n\t}\n\tlog.Info(\"creating capture\", zap.String(\"capture-id\", id), util.ZapFieldCapture(ctx))\n\n\tc = &Capture{\n\t\tprocessors: make(map[string]*processor),\n\t\tetcdClient: cli,\n\t\tcredential: credential,\n\t\tsession: sess,\n\t\telection: elec,\n\t\tinfo: info,\n\t\topts: opts,\n\t\tpdCli: pdCli,\n\t}\n\n\treturn\n}", "title": "" } ]
[ { "docid": "e01bc7dcbb6285b929016cf596e05898", "score": "0.8348591", "text": "func NewCapture(id id.ID) *Capture {\n\treturn &Capture{Id: NewID(id)}\n}", "title": "" }, { "docid": "36ace9c279efd702bc17bdfa4f21b60c", "score": "0.7249435", "text": "func NewCapture(hub *Hub) *Capture {\n\tdev, err := gocv.OpenVideoCapture(0)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn &Capture{\n\t\tdev: dev,\n\t\tframe: gocv.NewMat(),\n\t\thub: hub,\n\t}\n}", "title": "" }, { "docid": "1b8ec8704aff4fba5cfcb29fb66d3237", "score": "0.71439403", "text": "func NewCapture(input string, deviceID int, delay *float64) (*gocv.VideoCapture, error) {\n\tif input != \"\" {\n\t\t// open video file\n\t\tvc, err := gocv.VideoCaptureFile(input)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tfps := vc.Get(gocv.VideoCaptureFPS)\n\t\t*delay = 1000 / fps\n\n\t\treturn vc, nil\n\t}\n\n\t// open camera device\n\tvc, err := gocv.VideoCaptureDevice(deviceID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn vc, nil\n}", "title": "" }, { "docid": "9e2e1339d147c9a39c0971618da96b5b", "score": "0.71429616", "text": "func NewCaptureCommand(index int, rawArgs string) (*CaptureCommand, error) {\n\trunCmd, err := NewRunCommand(index, rawArgs)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"CAPTURE: %v\", err)\n\t}\n\trunCmd.name = CmdCapture\n\n\treturn &CaptureCommand{runCmd}, nil\n}", "title": "" }, { "docid": "f88e4797f4b047971d44d40edaf047e1", "score": "0.66120785", "text": "func newCaptureFilter(opts FilterOptions) (*captureFilter, error) {\n\tif opts == nil {\n\t\treturn &captureFilter{CaptureFilterOptions: DefaultCaptureFilterOptions()}, nil\n\t}\n\n\tvar capOpts *CaptureFilterOptions\n\tswitch opts.(type) {\n\tcase *CaptureFilterOptions:\n\t\tcapOpts = opts.(*CaptureFilterOptions)\n\t\tbreak\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"Need CaptureFilterOptions\")\n\t}\n\n\treturn &captureFilter{CaptureFilterOptions: capOpts}, nil\n}", "title": "" }, { "docid": "e25e41888bfb7e70d9f56c2c1ff8b324", "score": "0.6456142", "text": "func NewPacketCapture(ctx *pulumi.Context,\n\tname string, args *PacketCaptureArgs, opts ...pulumi.ResourceOption) (*PacketCapture, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.NetworkWatcherId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'NetworkWatcherId'\")\n\t}\n\tif args.StorageLocation == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'StorageLocation'\")\n\t}\n\tif args.VirtualMachineId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'VirtualMachineId'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource PacketCapture\n\terr := ctx.RegisterResource(\"azure:compute/packetCapture:PacketCapture\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "b654982a070f7f944b02cf43a5916a07", "score": "0.6404044", "text": "func New(name string) (*Captain, error) {\n state, err := dockercntrl.New()\n if err != nil {return nil, err}\n return &Captain{\n state: state,\n storage: false,\n name: name,\n }, nil\n}", "title": "" }, { "docid": "667410ba2dd51fd0be4493d723010c83", "score": "0.6357492", "text": "func NewLogCapture() *LogCapture {\n\tc := &LogCapture{\n\t\t//entries: make([]*LogEntry, 0),\n\t\tentries: make([]string, 0),\n\t}\n\tzerologger.Logger = zerologger.Logger.Hook(c)\n\treturn c\n}", "title": "" }, { "docid": "2d14f1a8488db08f2b78995060f23b14", "score": "0.61966294", "text": "func New() *Captor {\n\tcaptor := &Captor{}\n\tcaptor.Reset()\n\n\treturn captor\n}", "title": "" }, { "docid": "5757ed97d0ca8b52c4b7f996d43abaf3", "score": "0.61111206", "text": "func CaptureLog() *capture {\n\treader, writer, _ := os.Pipe()\n\tc := &capture{\n\t\tlogFlags: log.Flags(),\n\t\treader: reader,\n\t\twriter: writer,\n\t\tdone: make(chan struct{}),\n\t}\n\tlog.SetOutput(writer)\n\tlog.SetFlags(0)\n\tgo c.read()\n\treturn c\n}", "title": "" }, { "docid": "4a47cd93aff09db3c150e0806b69b305", "score": "0.5881824", "text": "func Capture(area image.Rectangle) (*img.File, error) {\n\tcapture, err := captureArea(area)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcaptureTime := time.Now()\n\tfileName := fmt.Sprintf(\"%dx%d_%s_%s_%d.png\",\n\t\tcapture.Rect.Dx(), capture.Rect.Dy(), area.Min, area.Max, captureTime.Unix())\n\n\tfmt.Printf(\"Captured screen area: %v\\n\\tTimestamp: %s\\n\\tFilename: %q\\n\\n\", area, captureTime, fileName)\n\n\treturn &img.File{\n\t\tName: fileName,\n\t\tTimestamp: img.Timestamp(captureTime.Unix()),\n\t\tImage: capture,\n\t}, nil\n}", "title": "" }, { "docid": "2a368c7da9c1e11c7bf1979ee263dde7", "score": "0.58318275", "text": "func Capture(rxs ...Rx) Rx {\n\treturn groupedForm{\n\t\trxs: rxs,\n\t\tcapture: true,\n\t\tname: nil,\n\t}\n}", "title": "" }, { "docid": "2b6c7f1973ff889a73ce1402892e5a6a", "score": "0.57873917", "text": "func NewCaptureService(s CaptureStore) CaptureService {\n\treturn &captureService{s: s}\n}", "title": "" }, { "docid": "7fd673e1079ae9b795a6c1a60c57ca30", "score": "0.57826245", "text": "func (c *ChargeClient) Capture(id string, params *ChargeParams) (*Charge, error) {\n\tcharge := Charge{}\n\tvalues := url.Values{}\n\tparseChargeParams(params, &values)\n\terr := c.client.post(\"/charges/\"+id+\"/capture\", values, &charge)\n\treturn &charge, err\n}", "title": "" }, { "docid": "d85287c91339077b4b7230ed52eced6c", "score": "0.576281", "text": "func (s *Service) Capture(ctx context.Context, capture *domain.Capture) (*domain.Transaction, error) {\n\tconst errLogMsg = \"unable to capture payment\"\n\tctx = logging.WithFields(ctx,\n\t\tzap.Stringer(logging.RequestID, capture.RequestID),\n\t\tzap.Stringer(logging.AuthorizationID, capture.AuthorizationID),\n\t\tzap.Stringer(logging.PaymentAction, domain.PaymentActionTypeCapture))\n\n\ttransaction, err := s.store.GetTransaction(ctx, capture.AuthorizationID)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"unable to get transaction from store\")\n\t\tlogging.Error(ctx, errLogMsg, zap.Error(err))\n\t\treturn nil, err\n\t}\n\n\tif transaction.IsRequestIDIdempotent(domain.PaymentActionTypeCapture, capture.RequestID) {\n\t\tlogging.Print(ctx, \"request is idempotent hence no op\")\n\t\treturn transaction, nil\n\t}\n\n\tif err = transaction.ValidateCapture(capture.Amount); err != nil {\n\t\terr = errors.Wrap(domain.ErrUnprocessable, err.Error())\n\t\tlogging.Error(ctx, errLogMsg, zap.Error(err))\n\t\treturn nil, err\n\t}\n\n\terr = s.store.CreatePaymentAction(ctx, transaction.ID, capture.RequestID, domain.PaymentActionTypeCapture, &capture.Amount, s.clock.Now())\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"unable to create capture payment action in store\")\n\t\tlogging.Error(ctx, errLogMsg, zap.Error(err))\n\t\treturn nil, err\n\t}\n\n\ttransaction, err = s.store.GetTransaction(ctx, capture.AuthorizationID)\n\tif err != nil {\n\t\terr = errors.Wrap(err, \"unable to get transaction with capture from store\")\n\t\tlogging.Error(ctx, errLogMsg, zap.Error(err))\n\t\treturn nil, err\n\t}\n\n\treturn transaction, nil\n}", "title": "" }, { "docid": "ad1fa7ff8320abcd68e0a24fd550aafb", "score": "0.57624364", "text": "func (client *BraintreeClient) Capture(request *sleet.CaptureRequest) (*sleet.CaptureResponse, error) {\n\treturn client.CaptureWithContext(context.TODO(), request)\n}", "title": "" }, { "docid": "2e3fda046d2bfc154f8af806d91b99f8", "score": "0.5749809", "text": "func createCaptureMove(from int, to int) move {\n\tm := createQuietMove(from, to)\n\n\tm |= Capture\n\n\treturn m\n}", "title": "" }, { "docid": "bd2e3fab0b8e74edd361600b9708d613", "score": "0.5746865", "text": "func New(opts camera.Options) (c *Camera, err error) {\n\tc = &Camera{\n\t\topts: opts,\n\t}\n\tmat := gocv.NewMat()\n\tc.frame = &mat\n\tc.device, err = gocv.VideoCaptureDevice(opts.Index)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tc.SetProperty(PropFrameWidth, opts.Width)\n\tc.SetProperty(PropFrameHeight, opts.Height)\n\treturn c, nil\n}", "title": "" }, { "docid": "f70a016eea506c29ed127e052adbe8de", "score": "0.5663467", "text": "func (self RenderWindow) Capture() Image {\n\treturn Image{C.sfRenderWindow_capture(self.Cref)}\n}", "title": "" }, { "docid": "2d93535843737107c0a2e3e7db185a88", "score": "0.5652088", "text": "func (client *AdyenClient) Capture(request *sleet.CaptureRequest) (*sleet.CaptureResponse, error) {\n\treturn client.CaptureWithContext(context.TODO(), request)\n}", "title": "" }, { "docid": "6a3516f6315553d2944cb067ec59913b", "score": "0.56250817", "text": "func MakeCaptureMove(source, dest Square) Move {\n\tmov := MakeQuietMove(source, dest)\n\tmov |= captureBit\n\treturn mov\n}", "title": "" }, { "docid": "85ec032356fe4c548b49d570fb0183db", "score": "0.5617567", "text": "func (client *FirstdataClient) Capture(request *sleet.CaptureRequest) (*sleet.CaptureResponse, error) {\n\treturn client.CaptureWithContext(context.TODO(), request)\n}", "title": "" }, { "docid": "9cb2b1730b7ce02907a53faad326d243", "score": "0.55553454", "text": "func Capture(svc *psql.PSQL) func(w http.ResponseWriter, r *http.Request) {\n\treturn func(w http.ResponseWriter, r *http.Request) {\n\n\t\tvar capture model.Capture\n\n\t\tunmarshalErr := UnmarshalBody(r, &capture)\n\t\tif unmarshalErr != nil {\n\t\t\tHandleError(w, unmarshalErr)\n\t\t\treturn\n\t\t}\n\n\t\terr := middleware.Capture(svc, &capture)\n\t\tif err != nil {\n\t\t\tHandleError(w, err)\n\t\t\treturn\n\t\t}\n\n\t\tCreatedResponse(w)\n\n\t\treturn\n\n\t}\n}", "title": "" }, { "docid": "e67469d1b40441874844b7138b9cf9d0", "score": "0.5552477", "text": "func (c *Cmd) Capture(stdin io.Reader) (output string, err error) {\n\tc.Stdin = stdin\n\tout := strings.Builder{}\n\tc.Stdout = &out\n\terr = c.Run()\n\toutput = out.String()\n\treturn\n}", "title": "" }, { "docid": "70b4ba7fddf48751a4d24948b5e06cc0", "score": "0.5547903", "text": "func NewCaptureConn(conn net.Conn, frames *[]Frame) *CaptureConn {\n\treturn &CaptureConn{conn, frames}\n}", "title": "" }, { "docid": "34d6ff62b653da5a9a580471aa16379c", "score": "0.55415773", "text": "func NewLiveRecording(t mockConstructorTestingTNewLiveRecording) *LiveRecording {\n\tmock := &LiveRecording{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "a738a3a5a315a1f12d9dc18855e54af5", "score": "0.5529637", "text": "func (b *Bridge) Capture(fname string, config ...CaptureConfig) (int, error) {\n\tbridgeLock.Lock()\n\tdefer bridgeLock.Unlock()\n\n\ttap, err := b.addMirror()\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\tid, err := b.captureTap(tap, fname, config...)\n\tif err != nil {\n\t\tif err := b.removeMirror(tap); err != nil {\n\t\t\t// Welp, we're boned\n\t\t\tlog.Error(\"zombie mirror -- %v:%v %v\", b.Name, tap, err)\n\t\t}\n\n\t\treturn 0, err\n\t}\n\n\treturn id, nil\n}", "title": "" }, { "docid": "e69381b0a11e7aa4aedf104f3517aeb6", "score": "0.5483154", "text": "func NewSelfieCapture(imageUrl NullableString, videoUrl NullableString) *SelfieCapture {\n\tthis := SelfieCapture{}\n\tthis.ImageUrl = imageUrl\n\tthis.VideoUrl = videoUrl\n\treturn &this\n}", "title": "" }, { "docid": "dd1c9e1df12adb2f037e551e04102170", "score": "0.5470227", "text": "func (d *Client) CaptureScreenshot() *CaptureScreenshotRequest {\n\treturn &CaptureScreenshotRequest{opts: make(map[string]interface{}), client: d.Client}\n}", "title": "" }, { "docid": "9fe9e249e483a07291d37360b2a8926f", "score": "0.5458935", "text": "func NewCameraIdentity() Camera { return Camera{} }", "title": "" }, { "docid": "da5fc6341a9b731ea27a491065339bc5", "score": "0.54516715", "text": "func Capture(name string, arg ...string) (output []byte, err error) {\n\tcmd := exec.Command(name, arg...)\n\tvar outputBuffer bytes.Buffer\n\tcmd.Stdout = &outputBuffer\n\tcmd.Stderr = os.Stderr\n\tif err = cmd.Run(); err != nil {\n\t\treturn\n\t}\n\toutput = outputBuffer.Bytes()\n\treturn\n}", "title": "" }, { "docid": "0eb7d125b512bc2b0a53b161adde699f", "score": "0.54447067", "text": "func (r Rave) Capture(data map[string]interface{}) ([]byte, error) {\n\terr := checkRequiredParameters(data, []string{\"flwRef\"})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata[\"SECKEY\"] = r.GetSecretKey()\n\tURL := r.getBaseURL() + \"/flwv3-pug/getpaidx/api/capture\"\n\n\tresponse, err := MakePostRequest(URL, data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response, nil\n}", "title": "" }, { "docid": "5f15c711196a67fe5c4be45b9e994cf7", "score": "0.543305", "text": "func New(matches []Match, reader io.Reader, writer io.Writer) Matcher {\n\treturn Matcher{\n\t\tmatches: matches,\n\t\treader: reader,\n\t\twriter: writer,\n\t}\n}", "title": "" }, { "docid": "f8d0c1e283b652dc310058ff435d6426", "score": "0.54235464", "text": "func NewFrame() *Frame {\n\treturn framePool.Get().(*Frame)\n}", "title": "" }, { "docid": "74c2a0fc95ab5f9e769acb5ac22a8dbb", "score": "0.5402106", "text": "func (ctx *Context) NewRecorder(req *http.Request) *httptest.ResponseRecorder {\n\trr := httptest.NewRecorder()\n\tctx.SetReq(req)\n\tctx.SetResp(rr)\n\treturn rr\n}", "title": "" }, { "docid": "654690b76477effeb26edafaf32e2c4e", "score": "0.5389282", "text": "func Capture() func() (string, error) {\n\tr, w, err := os.Pipe()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tdone := make(chan error, 1)\n\n\tsave := os.Stdout\n\tos.Stdout = w\n\n\tvar buf strings.Builder\n\n\tgo func() {\n\t\t_, err := io.Copy(&buf, r)\n\t\t_ = r.Close()\n\t\tdone <- err\n\t}()\n\n\treturn func() (string, error) {\n\t\tos.Stdout = save\n\t\t_ = w.Close()\n\t\terr := <-done\n\t\tif err == nil {\n\t\t\treturn buf.String(), nil\n\t\t} else {\n\t\t\treturn \"\", &kfapis.KfError{\n\t\t\t\tCode: int(kfapis.INVALID_ARGUMENT),\n\t\t\t\tMessage: err.Error(),\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "93d3879a3ec690c393d3af4f6e229846", "score": "0.53881884", "text": "func New(monitorID string, liveAPI api.LiveAPI) *Record {\n\trecord := Record{\n\t\tMonitorID: monitorID,\n\t\tLiveAPI: liveAPI,\n\t\twaitGroup: &sync.WaitGroup{},\n\t}\n\n\treturn &record\n}", "title": "" }, { "docid": "3e04ee851ee067ff31f3248d9b8ab66f", "score": "0.5379869", "text": "func New() *trace {\n\treturn new(trace)\n}", "title": "" }, { "docid": "30ed2ca6ad1e2771032ca75a36a59cb8", "score": "0.53725064", "text": "func NewRecorder(filename string, initial interface{}) (*Recorder, error) {\n\tp, err := proxy.ForRecording(filename, 0)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tp.Initial = initial\n\treturn &Recorder{proxy: p}, nil\n}", "title": "" }, { "docid": "0ada56a69016c935308d3ea0f302cb5f", "score": "0.53689516", "text": "func (s *cameraService) Capture() ([]byte, error) {\n\t//TODO compare https://github.com/dhowden/raspicam/blob/master/raspicam.go\n\twidth := 1600\n\theight := 1200\n\tcameraParams := map[string]interface{}{\n\t\t\"--timeout\": 1,\n\t\t\"--brightness\": 50,\n\t\t\"--quality\": 90,\n\t}\n\n\treturn s.CaptureRaspiStill(width, height, cameraParams)\n}", "title": "" }, { "docid": "a1bdb70f71f9d9f24edcd3b60d138eb6", "score": "0.5366401", "text": "func NewLogCaptureLogger(underlineLogger Logger,\n\tcaptureMaxBytes int,\n\tstdType string,\n\tprocName string,\n\tgroupName string) *LogCaptureLogger {\n\tr, w := io.Pipe()\n\teventCapture := events.NewProcCommEventCapture(r,\n\t\tcaptureMaxBytes,\n\t\tstdType,\n\t\tprocName,\n\t\tgroupName)\n\treturn &LogCaptureLogger{underlineLogger: underlineLogger,\n\t\tprocCommEventCapWriter: w,\n\t\tprocCommEventCapture: eventCapture}\n}", "title": "" }, { "docid": "b39964bd877868b59b53c44a915a9eb5", "score": "0.53442377", "text": "func (obj *StateBlock) Capture() Error {\n\tret, _, _ := syscall.Syscall(\n\t\tobj.vtbl.Capture,\n\t\t1,\n\t\tuintptr(unsafe.Pointer(obj)),\n\t\t0,\n\t\t0,\n\t)\n\treturn toErr(ret)\n}", "title": "" }, { "docid": "c60320073d203dce68863928ff580fdd", "score": "0.5329442", "text": "func Capture(ctx context.Context, r *http.Request) context.Context {\n\tvar tid string\n\tif tid = r.Header.Get(HeaderWPATID); tid == \"\" {\n\t\ttid = genTID()\n\t}\n\n\treturn context.WithValue(ctx, ContextKeyRequestTID, tid)\n}", "title": "" }, { "docid": "cc6a57a07c55f2b4f81e8a5abd73317e", "score": "0.5318629", "text": "func Capture(skip int) Stacktrace {\n\tvar pcs [depth]uintptr\n\tn := runtime.Callers(2+skip, pcs[:])\n\n\tvar trace Stacktrace\n\tfor _, pc := range pcs[0:n] {\n\t\tframe := Frame(pc)\n\t\tif !frame.IsValid() {\n\t\t\tcontinue\n\t\t}\n\t\ttrace = append(trace, frame)\n\t}\n\treturn trace\n}", "title": "" }, { "docid": "330079da53675ae6d84ccefd591a2119", "score": "0.53173506", "text": "func Capture(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n\turl, err := capture.NewURL(r.URL.Query().Get(\"url\"))\n\tif err != nil {\n\t\twriteError(w, http.StatusInternalServerError, fmt.Errorf(\"%s: %s\", capture.ErrURLInvalid, err))\n\t\treturn\n\t}\n\n\td := &browser.Dimensions{\n\t\tWidth: r.URL.Query().Get(\"width\"),\n\t\tHeight: r.URL.Query().Get(\"height\"),\n\t}\n\n\timg, err := browser.Screenshot(url, d, browser.Device(r.URL.Query().Get(\"device\")))\n\tif err != nil {\n\t\twriteError(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif compress := r.URL.Query().Get(\"compress\"); compress == \"true\" {\n\t\timg.Compression = &capture.Compression{}\n\t}\n\n\tif err := image.Compress(img); err != nil && err != image.ErrNoCompression {\n\t\twriteError(w, http.StatusInternalServerError, err)\n\t\treturn\n\t}\n\n\tif strings.Contains(r.Header.Get(\"Accept\"), AcceptJson) {\n\t\twriteSuccess(w, img)\n\t} else {\n\t\tdecoded, err := img.Encoded.Decode()\n\t\tif err != nil {\n\t\t\twriteError(w, http.StatusInternalServerError, err)\n\t\t\treturn\n\t\t}\n\t\tw.Header().Set(\"Content-Type\", img.Mime.String())\n\t\tfmt.Fprint(w, decoded)\n\t}\n}", "title": "" }, { "docid": "c25aae3cc66d1218bfc933748b33b3d2", "score": "0.5310316", "text": "func Capture(ctx context.Context, path string) error {\n\tcmd := testexec.CommandContext(ctx, \"screenshot\", path)\n\tif err := cmd.Run(testexec.DumpLogOnError); err != nil {\n\t\treturn errors.Errorf(\"failed running %q\", strings.Join(cmd.Args, \" \"))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "36cbd5892160eb83d71c33f237051954", "score": "0.5279115", "text": "func New() *Match {\n\treturn &Match{tree: &branch{}}\n}", "title": "" }, { "docid": "97ab02280ba32adb7d8d1ed54c465d7a", "score": "0.525706", "text": "func NewCamera(log *logrus.Logger) *Camera {\n\treturn &Camera{log: log}\n}", "title": "" }, { "docid": "647562faff66366818e605fd914edf8d", "score": "0.5253181", "text": "func newCamera() *camera {\n\tc := &camera{depth: true}\n\tc.vt = VP\n\tc.at = lin.NewT()\n\tc.vm = &lin.M4{}\n\tc.ivm = (&lin.M4{}).Set(lin.M4I)\n\tc.pm = &lin.M4{}\n\tc.ipm = &lin.M4{}\n\tc.q0 = &lin.Q{}\n\tc.xrot = lin.NewQ().SetAa(1, 0, 0, 0)\n\tc.yrot = lin.NewQ().SetAa(0, 1, 0, 0)\n\tc.v0 = &lin.V4{}\n\tc.ray = &lin.V3{}\n\treturn c\n}", "title": "" }, { "docid": "bd651cf32ebc907fefc64a7e916c8a59", "score": "0.5240622", "text": "func (g *dependencyGraph) Capture() *capture.GraphicsCapture {\n\treturn g.capture\n}", "title": "" }, { "docid": "89e5789fba094c9292c1834576fffaf0", "score": "0.5224667", "text": "func NewRecorder(w dns.ResponseWriter) *Recorder { return &Recorder{ResponseWriter: w} }", "title": "" }, { "docid": "d5937d4a367ffe8166f58dbde8eb7d30", "score": "0.51959467", "text": "func execCapture(arg ...string) *exec.Cmd {\n\n\tvar stdout, stderr bytes.Buffer\n\tcmd := exec.Command(arg[0], arg[1:]...)\n\tcmd.Stdout = &stdout\n\tcmd.Stderr = &stderr\n\n\terr := cmd.Run()\n\n\tif err != nil {\n\t\tlog.Fatalf(\"cmd.Run() failed with %s\\n\", err)\n\t}\n\n\treturn cmd\n}", "title": "" }, { "docid": "406391639149eade11b20cc7acf251f2", "score": "0.51956403", "text": "func NewCameraDriver(name string, source interface{}, v ...time.Duration) *CameraDriver {\n\tc := &CameraDriver{\n\t\tname: name,\n\t\tEventer: gobot.NewEventer(),\n\t\tSource: source,\n\t\tinterval: 10 * time.Millisecond,\n\t\tstart: func(c *CameraDriver) (err error) {\n\t\t\tswitch v := c.Source.(type) {\n\t\t\tcase string:\n\t\t\t\tc.camera = cv.NewFileCapture(v)\n\t\t\tcase int:\n\t\t\t\tc.camera = cv.NewCameraCapture(v)\n\t\t\tdefault:\n\t\t\t\treturn errors.New(\"Unknown camera source\")\n\t\t\t}\n\t\t\treturn\n\t\t},\n\t}\n\n\tif len(v) > 0 {\n\t\tc.interval = v[0]\n\t}\n\n\tc.AddEvent(Frame)\n\n\treturn c\n}", "title": "" }, { "docid": "6ab9e443aec9c9cd0eb56c09521a7c65", "score": "0.518321", "text": "func startCapturePcap(v string, ifnum int, fname string) error {\n\t// Ensure that relative paths are always relative to /files/\n\tif !filepath.IsAbs(fname) {\n\t\tfname = filepath.Join(*f_iomBase, fname)\n\t}\n\n\t// get the vm\n\tvm := vms.FindVM(v)\n\tif vm == nil {\n\t\treturn vmNotFound(v)\n\t}\n\n\tnics := vm.GetNetworks()\n\n\tif len(nics) <= ifnum {\n\t\treturn fmt.Errorf(\"no such interface %v\", ifnum)\n\t}\n\n\t// create the bridge if necessary\n\tbr, err := getBridge(nics[ifnum].Bridge)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tid, err := br.CaptureTap(nics[ifnum].Tap, fname, bridge.CaptureConfig{\n\t\tSnapLen: uint32(captureConfig.SnapLen),\n\t\tFilter: captureConfig.Filter,\n\t})\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tcaptureEntries[captureID.Next()] = &capture{\n\t\tType: \"pcap\",\n\t\tBridge: nics[ifnum].Bridge,\n\t\tVM: vm,\n\t\tInterface: ifnum,\n\t\tPath: fname,\n\t\tMode: \"N/A\",\n\t\tID: id,\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "d41bb3170879b0738ce198e8a0269b8e", "score": "0.5181915", "text": "func Capture(log ui.Logger, args ...string) ([]byte, error) {\n\tlog.Debugf(\"%s\", shellquote.Join(args...))\n\tcmd := exec.Command(args[0], args[1:]...)\n\tout, err := cmd.CombinedOutput()\n\tif err != nil {\n\t\treturn out, errors.Wrapf(err, \"%s: %s\", shellquote.Join(args...), strings.TrimSpace(string(out)))\n\t}\n\t_, _ = log.Write(out)\n\treturn out, nil\n}", "title": "" }, { "docid": "a4d05904105daa549287b440f72a7529", "score": "0.5145005", "text": "func Capture(conf *AgentConf) {\n\tcloseAll = make(chan struct{})\n\n\tdatabase := startUDPServer(conf)\n\tsendCollectedData(conf, database)\n\tL.Info(\"CloudWatch agent started...\")\n}", "title": "" }, { "docid": "31513f9dfb65855142090c7aa7c6d956", "score": "0.5140427", "text": "func Capture(logger kitlog.Logger) kithttp.RequestFunc {\n\tvar transactionInfoLogger = logging.Info(logger)\n\treturn func(ctx context.Context, r *http.Request) (nctx context.Context) {\n\t\tvar tid string\n\n\t\tif tid = r.Header.Get(HeaderWPATID); tid == \"\" {\n\t\t\ttid = genTID()\n\t\t}\n\n\t\tnctx = context.WithValue(ctx, ContextKeyRequestTID, tid)\n\n\t\tvar satClientID = \"N/A\"\n\n\t\t// retrieve satClientID from request context\n\t\tif auth, ok := bascule.FromContext(r.Context()); ok {\n\t\t\tsatClientID = auth.Token.Principal()\n\t\t}\n\n\t\tlogKVs := []interface{}{logging.MessageKey(), \"record\",\n\t\t\t\"request\", transactionRequest{\n\t\t\t\tAddress: r.RemoteAddr,\n\t\t\t\tPath: r.URL.Path,\n\t\t\t\tQuery: r.URL.RawQuery,\n\t\t\t\tMethod: r.Method,\n\t\t\t},\n\t\t\t\"tid\", tid,\n\t\t\t\"satClientID\", satClientID,\n\t\t}\n\n\t\tlogKVs, _ = candlelight.AppendTraceInfo(ctx, logKVs)\n\t\ttransactionInfoLogger := kitlog.WithPrefix(transactionInfoLogger, logKVs...)\n\t\treturn context.WithValue(nctx, ContextKeyTransactionInfoLogger, transactionInfoLogger)\n\t}\n}", "title": "" }, { "docid": "13d3d96353496a2e254b6e2aa5261cd4", "score": "0.5139474", "text": "func createPromotionCaptureMove(from int, to int, pieceType byte) move {\n\tm := createPromotionMove(from, to, pieceType)\n\n\tm = m | Capture\n\n\treturn m\n}", "title": "" }, { "docid": "f728eaa7b2e52879d23f4aeac4253299", "score": "0.5115595", "text": "func NewMatch(reporter Reporter, submatches []string, names []string) *Match {\n\treturn newMatch(newChainWithDefaults(\"Match()\", reporter), submatches, names)\n}", "title": "" }, { "docid": "bb8523b9689470937eb129acfde72f3f", "score": "0.5109662", "text": "func New(grm GrabRequest) (Grabber, error) {\n\n\tif grm.Target.Port < 1 && grm.Target.Port > 65535 {\n\t\tpanic(fmt.Sprintf(\"[Error] port %v is out of range\", grm.Target.Port))\n\t}\n\n\tgrm.Target.Host = strings.ReplaceAll(grm.Target.Host, \"http://\", \"\")\n\tgrm.Target.Host = strings.ReplaceAll(grm.Target.Host, \"https://\", \"\")\n\n\tswitch grm.Type {\n\tcase \"http\":\n\t\tif grm.Target.Port <= 0 {\n\t\t\tgrm.Target.Port = 80\n\t\t}\n\t\treturn Grabber(\n\t\t\t&HTTPGrabber{\n\t\t\t\tGrabRequest: grm,\n\t\t\t},\n\t\t), nil\n\tcase \"https\":\n\t\tif grm.Target.Port <= 0 {\n\t\t\tgrm.Target.Port = 443\n\t\t}\n\t\treturn Grabber(\n\t\t\t&HTTPGrabber{\n\t\t\t\tGrabRequest: grm,\n\t\t\t},\n\t\t), nil\n\tcase \"ftp\":\n\t\tif grm.Target.Port <= 0 {\n\t\t\tgrm.Target.Port = 21\n\t\t}\n\t\treturn Grabber(\n\t\t\t&FTPGrabber{\n\t\t\t\tGrabRequest: grm,\n\t\t\t},\n\t\t), nil\n\n\tdefault:\n\t\treturn Grabber(\n\t\t\t&HTTPGrabber{\n\t\t\t\tGrabRequest: grm,\n\t\t\t},\n\t\t), nil\n\t}\n}", "title": "" }, { "docid": "2983c40a7c24c5ec78bebbfac3b7365b", "score": "0.5090834", "text": "func NewCaptureFilterOptions(collector string, start time.Time, end time.Time) *CaptureFilterOptions {\n\tcfo := &CaptureFilterOptions{\n\t\tcollector: collector,\n\t\tspan: util.Timespan{Start: start, End: end},\n\t\thasExtraFilter: false,\n\t\torigin: -1,\n\t\tadvPrefs: nil,\n\t}\n\treturn cfo\n}", "title": "" }, { "docid": "28ca9c323e22208d00da69e46309730c", "score": "0.50783944", "text": "func NewRecorder() *httptest.ResponseRecorder", "title": "" }, { "docid": "a1a65ad73301d50d61f7e5e75c4649d7", "score": "0.50779784", "text": "func CaptureResponse(w http.ResponseWriter) *ResponseCapture {\n\treturn &ResponseCapture{ResponseWriter: w}\n}", "title": "" }, { "docid": "752b3b94ffff14a40320f43555b2215c", "score": "0.50624955", "text": "func NewMatch(player1 player.Player, player2 player.Player) Match {\n\tvar match = Match{}\n\n\t// record start time\n\tmatch.startTime = time.Now().UTC()\n\n\t// Players\n\tmatch.player1 = player1\n\tmatch.player2 = player2\n\n\t// create first round\n\tmatch.activeRound = round.NewRound(player1, player2)\n\n\treturn match\n}", "title": "" }, { "docid": "af040dd9a61a8f970330d39f8b718170", "score": "0.506117", "text": "func (h *httpHandler) Capture(w http.ResponseWriter, r *http.Request) {\n\tctx := r.Context()\n\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\terrMsg := \"error reading request body\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeBadRequest)\n\t\treturn\n\t}\n\n\tif len(body) == 0 {\n\t\terrMsg := \"missing request body\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeBadRequest)\n\t\treturn\n\t}\n\n\tvar req CaptureRequest\n\terr = json.Unmarshal(body, &req)\n\tif err != nil {\n\t\terrMsg := \"failed to unmarshal request body\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeBadRequest)\n\t\treturn\n\t}\n\n\tif req.RequestID == uuid.Nil {\n\t\terrMsg := \"request id is not provided\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeBadRequest)\n\t\treturn\n\t}\n\n\tif req.AuthorizationID == uuid.Nil {\n\t\terrMsg := \"authorization id is not provided\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeBadRequest)\n\t\treturn\n\t}\n\n\tcapture := &domain.Capture{\n\t\tRequestID: req.RequestID,\n\t\tAuthorizationID: req.AuthorizationID,\n\t\tAmount: domain.Amount{\n\t\t\tMinorUnits: req.Amount.MinorUnits,\n\t\t\tCurrency: req.Amount.Currency,\n\t\t\tExponent: req.Amount.Exponent,\n\t\t},\n\t}\n\n\tt, err := h.service.Capture(ctx, capture)\n\tif err != nil {\n\t\tswitch {\n\t\tcase errors.Is(err, domain.ErrTransactionNotFound):\n\t\t\terrMsg := \"unable to find the transaction with the authorization ID\"\n\t\t\t_ = WriteError(w, errMsg, CodeNotFound)\n\t\t\treturn\n\t\tcase errors.Is(err, domain.ErrUnprocessable):\n\t\t\t_ = WriteError(w, err.Error(), CodeUnprocessable)\n\t\t\treturn\n\t\tdefault:\n\t\t\terrMsg := \"failed to capture transaction in service\"\n\t\t\t_ = WriteError(w, errMsg, CodeUnknownFailure)\n\t\t\treturn\n\t\t}\n\t}\n\n\tw.Header().Add(ContentType, ApplicationJSON)\n\terr = json.NewEncoder(w).Encode(mapToTransactionResp(t))\n\tif err != nil {\n\t\terrMsg := \"error encoding json response\"\n\t\tlogging.Error(ctx, errMsg, zap.Error(err))\n\t\t_ = WriteError(w, errMsg, CodeUnknownFailure)\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "3a5c95f0e48e69ed256a231fa3c50d0e", "score": "0.5058029", "text": "func NewRecorder(ctx context.Context) (*Recorder, error) {\n\tonce.Do(func() {\n\t\tr = &Recorder{\n\t\t\tinitialized: true,\n\t\t\t// Default to reporting metrics every 60s.\n\t\t\tReportingPeriod: 60 * time.Second,\n\t\t}\n\n\t\trecorderErr = viewRegister()\n\t\tif recorderErr != nil {\n\t\t\tr.initialized = false\n\t\t\treturn\n\t\t}\n\t})\n\n\treturn r, recorderErr\n}", "title": "" }, { "docid": "d1287310b4578ce9d546eb5faddc42f9", "score": "0.5046067", "text": "func New() (*Grok, error) {\n\treturn NewWithConfig(&Config{})\n}", "title": "" }, { "docid": "c7c81c93cca0a1ddb9a6b4fc1fc544ad", "score": "0.50305486", "text": "func New(traderequestid field.TradeRequestIDField, traderequesttype field.TradeRequestTypeField) (m TradeCaptureReportRequest) {\n\tm.Message = quickfix.NewMessage()\n\tm.Header = fix43.NewHeader(&m.Message.Header)\n\tm.Body = &m.Message.Body\n\tm.Trailer.Trailer = &m.Message.Trailer\n\n\tm.Header.Set(field.NewMsgType(\"AD\"))\n\tm.Set(traderequestid)\n\tm.Set(traderequesttype)\n\n\treturn\n}", "title": "" }, { "docid": "f9801eaa0570a38203c59be05e5e7b9b", "score": "0.50290394", "text": "func NewForwardRecorder(cfg ForwardRecorderConfig) (*ForwardRecorder, error) {\n\tif err := cfg.CheckAndSetDefaults(); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\t// Always write sessions to local disk first, then forward them to the Auth\n\t// Server later.\n\tauditLog, err := NewForwarder(ForwarderConfig{\n\t\tSessionID: cfg.SessionID,\n\t\tServerID: teleport.ComponentUpload,\n\t\tDataDir: cfg.DataDir,\n\t\tRecordSessions: cfg.RecordSessions,\n\t\tNamespace: cfg.Namespace,\n\t\tForwardTo: cfg.ForwardTo,\n\t})\n\tif err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\n\tsr := &ForwardRecorder{\n\t\tForwardRecorderConfig: cfg,\n\t\tEntry: logrus.WithFields(logrus.Fields{\n\t\t\ttrace.Component: cfg.Component,\n\t\t}),\n\t\tAuditLog: auditLog,\n\t}\n\treturn sr, nil\n}", "title": "" }, { "docid": "31e4f4af3a64a2089e9a531809d277f1", "score": "0.5021071", "text": "func New(duration time.Duration, handler func()) *Goat {\n\treturn &Goat{\n\t\tduration: duration,\n\t\thandler: handler,\n\t\texit: make(chan bool),\n\t}\n}", "title": "" }, { "docid": "e6fec7501375d03e52ca9ab6749a9ce2", "score": "0.5019046", "text": "func (r *Router) StartCapture(ctx context.Context, name string, ch int, freqOps []iw.SetFreqOption, pcapOps ...pcap.Option) (ret *pcap.Capturer, retErr error) {\n\tctx, st := timing.Start(ctx, \"router.StartCapture\")\n\tdefer st.End()\n\n\tfreq, err := hostapd.ChannelToFrequency(ch)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tnd, err := r.netDev(ctx, ch, iw.IfTypeMonitor)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tiface := nd.IfName\n\tshared := r.im.IsPhyBusyAny(nd.PhyNum)\n\n\tr.im.SetBusy(iface)\n\tdefer func() {\n\t\tif retErr != nil {\n\t\t\tr.im.SetAvailable(iface)\n\t\t}\n\t}()\n\n\tif err := r.ipr.SetLinkUp(ctx, iface); err != nil {\n\t\treturn nil, err\n\t}\n\tdefer func() {\n\t\tif retErr != nil {\n\t\t\tif err := r.ipr.SetLinkDown(ctx, iface); err != nil {\n\t\t\t\ttesting.ContextLogf(ctx, \"Failed to set %s down, err=%s\", iface, err.Error())\n\t\t\t}\n\t\t}\n\t}()\n\n\tif !shared {\n\t\t// The interface is not shared, set up frequency and bandwidth.\n\t\tif err := r.iwr.SetFreq(ctx, iface, freq, freqOps...); err != nil {\n\t\t\treturn nil, errors.Wrapf(err, \"failed to set frequency for interface %s\", iface)\n\t\t}\n\t} else {\n\t\ttesting.ContextLogf(ctx, \"Skip configuring of the shared interface %s\", iface)\n\t}\n\n\tc, err := pcap.StartCapturer(ctx, r.host, name, iface, r.workDir(), pcapOps...)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to start a packet capturer\")\n\t}\n\treturn c, nil\n}", "title": "" }, { "docid": "ae5d1ba7aa8b3123810c4af285d69200", "score": "0.5014426", "text": "func New(capabilities ...string) *Capability {\n\treturn &Capability{\n\t\tCapabilities: capabilities,\n\t}\n}", "title": "" }, { "docid": "27166b5c784c081ab66e1bc1943b6774", "score": "0.5000308", "text": "func NewCamera() (*Camera, error) {\n\tcam := &Camera{}\n\n\tif ret := C.gp_camera_new(&cam.Ref); ret != 0 {\n\t\treturn nil, AsPortResult(ret).Error()\n\t}\n\n\treturn cam, nil\n}", "title": "" }, { "docid": "f1ddc39a4c61f0b61a749ff457f05a7f", "score": "0.49885148", "text": "func (m *mrtReader) GetCapture() (*monpb.BGPCapture, error) {\n\treturn m.lastTok, m.lastTokErr\n}", "title": "" }, { "docid": "9696c282b5bce0b950b3621fb9e0e10e", "score": "0.49749798", "text": "func cliCapturePcap(ns *Namespace, c *minicli.Command, resp *minicli.Response) error {\n\tb := c.StringArgs[\"bridge\"]\n\tfname := c.StringArgs[\"filename\"]\n\n\tif c.BoolArgs[\"delete\"] {\n\t\treturn ns.captures.StopBridge(b, \"pcap\")\n\t}\n\n\treturn ns.captures.CaptureBridge(b, fname)\n}", "title": "" }, { "docid": "802680a7e4648265f959882eb25854d2", "score": "0.49592555", "text": "func New() Gache {\n\treturn newGache()\n}", "title": "" }, { "docid": "7e17f84617f3889158caa676a9cf7238", "score": "0.4956674", "text": "func (p *Process) Capture(ctx context.Context, start task.Signal, stop task.Signal, ready task.Task, w io.Writer, written *int64) (int64, error) {\n\ttmp, err := file.Temp()\n\tif err != nil {\n\t\treturn 0, log.Err(ctx, err, \"Failed to create a temp file\")\n\t}\n\n\t// Signal that we are ready to start.\n\tatomic.StoreInt64(written, 1)\n\n\tif p.deferred && !start.Wait(ctx) {\n\t\treturn 0, log.Err(ctx, nil, \"Cancelled\")\n\t}\n\n\tif err := p.device.StartPerfettoTrace(ctx, p.config, perfettoTraceFile, stop, ready); err != nil {\n\t\treturn 0, err\n\t}\n\n\tif err := p.device.Pull(ctx, perfettoTraceFile, tmp.System()); err != nil {\n\t\treturn 0, err\n\t}\n\n\tif err := p.device.RemoveFile(ctx, perfettoTraceFile); err != nil {\n\t\tlog.E(ctx, \"Failed to delete perfetto trace file %v\", err)\n\t}\n\n\tsize := tmp.Info().Size()\n\tatomic.StoreInt64(written, size)\n\tfh, err := os.Open(tmp.System())\n\tif err != nil {\n\t\treturn 0, log.Err(ctx, err, fmt.Sprintf(\"Failed to open %s\", tmp))\n\t}\n\treturn io.Copy(w, fh)\n}", "title": "" }, { "docid": "239305f9dd1f6e664cf89366508e0a83", "score": "0.49425974", "text": "func New() *Stack {\n\treturn &Stack{\n\t\tFrames: make([]PersistentFrame, 0),\n\t\tName: uuid.New().String(),\n\t}\n}", "title": "" }, { "docid": "8ba52de6dec2829989c61c83755b0126", "score": "0.49307027", "text": "func NewMatch(demoFileName string, pb *pb.ProgressBar) (*Match, error) {\n\tdemo, err := os.Open(demoFileName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// demo is closed by parser.Close()\n\n\tparser := dem.NewParser(demo)\n\tdefer func() {\n\t\terr = parser.Close()\n\t\tif err != nil {\n\t\t\tlog.Fatalln(err)\n\t\t}\n\t}()\n\theader, err := parser.ParseHeader()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmatch := &Match{\n\t\tHalfStarts: make([]int, 0),\n\t\tRoundStarts: make([]int, 0),\n\t\tEffects: make(map[int][]common.Effect),\n\t\tKillfeed: make(map[int][]common.Kill),\n\t\tShots: make(map[int][]common.Shot),\n\t\tcurrentPhase: common.PhaseRegular,\n\t\ttakeNthFrame: 1,\n\t}\n\n\tmatch.MapName = header.MapName\n\tmatch.MapPZero = common.Point{\n\t\tX: float32(meta.MapNameToMap[match.MapName].PZero.X),\n\t\tY: float32(meta.MapNameToMap[match.MapName].PZero.Y),\n\t}\n\tmatch.MapScale = float32(meta.MapNameToMap[match.MapName].Scale)\n\n\tregisterEventHandlers(parser, match)\n\tmatch.States = parseGameStates(parser, match, pb)\n\n\treturn match, nil\n}", "title": "" }, { "docid": "a8c18c75e432735a24e92eb8420891a9", "score": "0.49225023", "text": "func New(\n\trtspAddress string,\n\tprotocols map[conf.Protocol]struct{},\n\tvisualID string,\n\tss *gortsplib.ServerSession,\n\tsc *gortsplib.ServerConn,\n\tpathMan PathMan,\n\tparent Parent) *Session {\n\ts := &Session{\n\t\trtspAddress: rtspAddress,\n\t\tprotocols: protocols,\n\t\tvisualID: visualID,\n\t\tss: ss,\n\t\tpathMan: pathMan,\n\t\tparent: parent,\n\t}\n\n\ts.log(logger.Info, \"opened by %v\", sc.NetConn().RemoteAddr())\n\n\treturn s\n}", "title": "" }, { "docid": "f76c3bf31b76cbd57d04ec352fbbf2c6", "score": "0.49210775", "text": "func Capture(r image.Rectangle, pt image.Point) image.Rectangle {\n\tif pt.X < r.Min.X {\n\t\tr.Min.X = pt.X\n\t}\n\tif pt.X > r.Max.X {\n\t\tr.Max.X = pt.X\n\t}\n\tif pt.Y < r.Min.Y {\n\t\tr.Min.Y = pt.Y\n\t}\n\tif pt.Y > r.Max.Y {\n\t\tr.Max.Y = pt.Y\n\t}\n\treturn r\n}", "title": "" }, { "docid": "ee0b7b73b90cca887802b5205f66a3ab", "score": "0.49081692", "text": "func New(width, height int, format Format) (*Camera, error) {\n\targs := []string{\n\t\t\"--burst\",\n\t\t\"--width\", strconv.Itoa(width),\n\t\t\"--height\", strconv.Itoa(height),\n\t\t\"--timeout\", \"0\",\n\t\t\"--timelapse\", \"0\",\n\t\t\"--nopreview\",\n\t}\n\n\tvar img []uint8\n\tswitch format {\n\tcase RGB:\n\t\targs = append(args, \"--rgb\")\n\t\timg = make([]uint8, width*height*3)\n\tcase Gray:\n\t\targs = append(args, \"--luma\")\n\t\timg = make([]uint8, width*height)\n\tdefault:\n\t\tw, h := roundUp(width, 32), roundUp(height, 16)\n\t\timg = make([]uint8, w*h+w*h/2)\n\t}\n\n\targs = append(args, []string{\"--output\", \"-\"}...)\n\n\tcmd := exec.Command(\"raspiyuv\", args...)\n\n\tout, err := cmd.StdoutPipe()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"picam: cannot create out pipe: %w\", err)\n\t}\n\n\terr = cmd.Start()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"picam: unable to start picam: %w\", err)\n\t}\n\n\tframe := make(chan []uint8)\n\tdone := make(chan struct{})\n\tvar ws sync.WaitGroup\n\tws.Add(1)\n\tgo func() {\n\t\tdefer ws.Done()\n\t\tdefer close(frame)\n\t\tdefer cmd.Process.Kill()\n\t\tr := bufio.NewReader(out)\n\t\tfor {\n\t\t\t_, _ = io.ReadFull(r, img)\n\t\t\tselect {\n\t\t\tcase <-done:\n\t\t\t\treturn\n\t\t\tcase frame <- img:\n\t\t\tdefault:\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn &Camera{\n\t\tWidth: width,\n\t\tHeight: height,\n\t\tcmd: cmd,\n\t\tframe: frame,\n\t\tformat: format,\n\t\tdone: done,\n\t\tws: &ws,\n\t}, nil\n}", "title": "" }, { "docid": "a06698efaa67cc40771d0d2f868c1228", "score": "0.4908028", "text": "func CaptureMessage(message string) Message {\n\treturn Message{\n\t\tMessage: message,\n\t\tTags: make(map[string]string),\n\t\tContexts: make(map[string]interface{}),\n\t}\n}", "title": "" }, { "docid": "10914f4330e163e3ac19d358679fc413", "score": "0.48996273", "text": "func NewSelfieCaptureWithDefaults() *SelfieCapture {\n\tthis := SelfieCapture{}\n\treturn &this\n}", "title": "" }, { "docid": "b2a0f29f19b7d570df42255305f6bc01", "score": "0.48985872", "text": "func New() Stack {\n\treturn stack{}\n}", "title": "" }, { "docid": "12ce6a0ca90be68463d30b4b0c4a8266", "score": "0.48918584", "text": "func newRequestRecorder(req *http.Request, method string, path string, handler func(w http.ResponseWriter, r *http.Request, param httprouter.Params)) *httptest.ResponseRecorder {\n\trouter := httprouter.New()\n\trouter.Handle(method, path, handler)\n\trr := httptest.NewRecorder()\n\trouter.ServeHTTP(rr, req)\n\treturn rr\n}", "title": "" }, { "docid": "b6a3920c7cc0881c8e7ef2e178807bba", "score": "0.487925", "text": "func New(obj *gfx.Object, keyFrames map[int]*KeyFrame) *Object {\n\t// Scan the map of key frames for the maximum frame number.\n\tmaxFrame := 0\n\tfor frameNumber := range keyFrames {\n\t\tif frameNumber > maxFrame {\n\t\t\tmaxFrame = frameNumber\n\t\t}\n\t}\n\n\to := &Object{\n\t\tobj: obj,\n\t\tdirty: true,\n\t\tplaying: true,\n\t\tmaxFrame: maxFrame,\n\t\tframeRate: 24,\n\t\tkeyFrames: keyFrames,\n\t}\n\treturn o\n}", "title": "" }, { "docid": "2eb4c550200c7a198d961db8aecdacb0", "score": "0.48778236", "text": "func NewRecorder() *Recorder {\n\treturn &Recorder{inumber: 2}\n}", "title": "" }, { "docid": "401f5c8b54b2265acf4e8bbae75addc2", "score": "0.48749506", "text": "func NewRecordedTrace(opName string, callback func(sp basictracer.RawSpan)) opentracing.Span {\n\ttr := basictracer.New(CallbackRecorder(callback))\n\topentracing.SetGlobalTracer(tr)\n\tsp := tr.StartSpan(opName)\n\tsp.SetBaggageItem(TiDBTrace, \"1\")\n\treturn sp\n}", "title": "" }, { "docid": "5b8fe8a95ea306c73819774f9c624292", "score": "0.48746112", "text": "func NewRecorder() Recorder {\n\treturn &recorder{}\n}", "title": "" }, { "docid": "a60ef56d71b8941794b9f14f9e8e7ac7", "score": "0.48716697", "text": "func (mb *MessageBus) NewRecorder(ctx context.Context) (core.MessageBus, error) {\n\tpulse, err := mb.Ledger.GetPulseManager().Current(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttape, err := NewTape(mb.Ledger.GetLocalStorage(), pulse.PulseNumber)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\trec := newRecorder(mb, tape, mb.Ledger.GetPulseManager(), mb.PlatformCryptographyScheme)\n\treturn rec, nil\n}", "title": "" }, { "docid": "85eecba28de2c00c5851b32181e23a02", "score": "0.48713443", "text": "func NewRecord() (cli.Command, error) {\n\treturn RecordCmd{}, nil\n}", "title": "" }, { "docid": "d598038252057c0189209c0af0001f70", "score": "0.48700115", "text": "func NamedCapture(name string, rxs ...Rx) Rx {\n\treturn &groupedForm{\n\t\trxs: rxs,\n\t\tcapture: true,\n\t\tname: &name,\n\t}\n}", "title": "" }, { "docid": "67cb40068e7559ec45217caad4db2a9b", "score": "0.48640782", "text": "func cliCapturePcap(c *minicli.Command, resp *minicli.Response) error {\n\tif c.BoolArgs[\"delete\"] {\n\t\t// Stop a capture\n\t\treturn clearCapture(\"pcap\", c.StringArgs[\"id\"])\n\t} else if c.StringArgs[\"bridge\"] != \"\" {\n\t\t// Capture bridge -> pcap\n\t\treturn startBridgeCapturePcap(c.StringArgs[\"bridge\"], c.StringArgs[\"filename\"])\n\t} else if c.StringArgs[\"vm\"] != \"\" {\n\t\t// Capture VM:interface -> pcap\n\t\tiface, err := strconv.Atoi(c.StringArgs[\"interface\"])\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"invalid interface: `%v`\", c.StringArgs[\"interface\"])\n\t\t}\n\n\t\treturn startCapturePcap(c.StringArgs[\"vm\"], iface, c.StringArgs[\"filename\"])\n\t}\n\n\t// List captures\n\tresp.Header = []string{\"ID\", \"Bridge\", \"VM/interface\", \"Path\"}\n\n\tresp.Tabular = [][]string{}\n\tfor _, v := range captureEntries {\n\t\tif v.Type == \"pcap\" {\n\t\t\tiface := fmt.Sprintf(\"%v/%v\", v.VM, v.Interface)\n\t\t\trow := []string{\n\t\t\t\tstrconv.Itoa(v.ID),\n\t\t\t\tv.Bridge,\n\t\t\t\tiface,\n\t\t\t\tv.Path,\n\t\t\t}\n\t\t\tresp.Tabular = append(resp.Tabular, row)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "66600bc8eaaadcace1f5bd3254fb9623", "score": "0.4861273", "text": "func ChromeWindowCapture() testing.Precondition { return chromeWindowCapturePre }", "title": "" }, { "docid": "57be73fbd3165c59839d6080edeb7498", "score": "0.48520854", "text": "func newFrame(b *bufio.Reader) (*frame, error) {\n\t// Create frame instance.\n\tf := &frame{}\n\n\treads := []func(*bufio.Reader) error{\n\t\tf.readInitial,\n\t\tf.readLength,\n\t\tf.readMaskKey,\n\t\tf.readPayload,\n\t}\n\n\tfor _, read := range reads {\n\t\tif err := read(b); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn f, nil\n}", "title": "" }, { "docid": "7352fb16bac4307a59ea1253fb9377b6", "score": "0.4839647", "text": "func capture(deviceID string, frames chan []byte) {\n\tcam, err := gocv.OpenVideoCapture(deviceID)\n\tif err != nil {\n\t\tlog.Fatal(\"failed reading cam\")\n\t}\n\tdefer cam.Close()\n\n\tframe := gocv.NewMat()\n\tdefer frame.Close()\n\n\tfor {\n\t\tif ok := cam.Read(&frame); !ok {\n\t\t\tlog.Fatal(\"failed reading cam\")\n\t\t}\n\n\t\t// Resize the Mat in place.\n\t\tgocv.Resize(frame, &frame, image.Point{X: W, Y: H}, 0.0, 0.0, gocv.InterpolationNearestNeighbor)\n\n\t\t// Encode Mat as a bmp (uncompressed)\n\t\tbuf, err := gocv.IMEncode(\".bmp\", frame)\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Error encoding frame: %v\", err)\n\t\t}\n\n\t\t// Push the frame to the channel\n\t\tframes <- buf\n\t}\n}", "title": "" }, { "docid": "5651a03e5865bfd264515115231daa06", "score": "0.4839231", "text": "func New(routerGroup *gin.RouterGroup, handler handler.HandlerInterface) router {\n\treturn router{\n\t\trouterGroup,\n\t\thandler,\n\t}\n}", "title": "" }, { "docid": "e27ab2666e1b674a6df454d70cf07d68", "score": "0.48388883", "text": "func NewCapturingCollector() *CapturingCollector {\n\tc := &CapturingCollector{}\n\tc.cond = sync.NewCond(&c.mu)\n\treturn c\n}", "title": "" }, { "docid": "2f4b275b17bdcc98235fd4587042abf7", "score": "0.4833108", "text": "func newMatch(b *tb.Bot, cardsNumber int) (match *Match) {\n\tmatch = &Match{Bot: b, CardsNumber: cardsNumber}\n\n\tfor ii := 0; ii < cardsNumber; ii++ {\n\t\tmatch.Cards = append(match.Cards, newCard())\n\t}\n\n\treturn\n}", "title": "" } ]
9647b873210526979d097a3177472b54
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be nonnil.
[ { "docid": "90f7275fd44dea7bd035597c3e3c2abe", "score": "0.0", "text": "func (in *NetworkInterfaceIPConfigurationSpecProperties) DeepCopyInto(out *NetworkInterfaceIPConfigurationSpecProperties) {\n\t*out = *in\n\tif in.PublicIPAddressRef != nil {\n\t\tin, out := &in.PublicIPAddressRef, &out.PublicIPAddressRef\n\t\t*out = new(corev1.KnownTypeReference)\n\t\t**out = **in\n\t}\n\tif in.SubnetRef != nil {\n\t\tin, out := &in.SubnetRef, &out.SubnetRef\n\t\t*out = new(corev1.KnownTypeReference)\n\t\t**out = **in\n\t}\n}", "title": "" } ]
[ { "docid": "1f57ffc651711a9d4e3c2aaf2c3fe0af", "score": "0.8229078", "text": "func (in *Result) DeepCopyInto(out *Result) {\n\t*out = *in\n}", "title": "" }, { "docid": "ad305ab191366a9506e5a265e8f598f7", "score": "0.8199774", "text": "func (in *Alibaba) DeepCopyInto(out *Alibaba) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "a42f3277ccfd7290dba1d5fd8d6526a4", "score": "0.819786", "text": "func (in *Memory) DeepCopyInto(out *Memory) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "da106d983b586b057f03d7a4a40c0ad7", "score": "0.8174683", "text": "func (in *Info) DeepCopyInto(out *Info) {\n\t*out = *in\n}", "title": "" }, { "docid": "c49029c90a1c585ff59e9b461126fd3a", "score": "0.8164637", "text": "func (in *ExtractResults) DeepCopyInto(out *ExtractResults) {\n\t*out = *in\n}", "title": "" }, { "docid": "e0815fd5cf43267b351cded80677d403", "score": "0.81575364", "text": "func (in *MongosNode) DeepCopyInto(out *MongosNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "e0815fd5cf43267b351cded80677d403", "score": "0.81575364", "text": "func (in *MongosNode) DeepCopyInto(out *MongosNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "dc68efae3bbd1db624ff48f44f17a2a9", "score": "0.8115434", "text": "func (in *Oss) DeepCopyInto(out *Oss) {\n\t*out = *in\n}", "title": "" }, { "docid": "c956ce3bd090743986ccc6cc2f33bdfd", "score": "0.8106299", "text": "func (in *Cerebro) DeepCopyInto(out *Cerebro) {\n\t*out = *in\n}", "title": "" }, { "docid": "294d32b697fb9265d694200a92e867f9", "score": "0.81015116", "text": "func (in *Swift) DeepCopyInto(out *Swift) {\n\t*out = *in\n}", "title": "" }, { "docid": "43bb5416c56822147844c8d692c5ce59", "score": "0.8100474", "text": "func (in *Arg) DeepCopyInto(out *Arg) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "02b911176a8121b528f5a1355f4f7b15", "score": "0.8083599", "text": "func (in *Step) DeepCopyInto(out *Step) {\n\t*out = *in\n\tif in.Args != nil {\n\t\tin, out := &in.Args, &out.Args\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Env != nil {\n\t\tin, out := &in.Env, &out.Env\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.SecretEnv != nil {\n\t\tin, out := &in.SecretEnv, &out.SecretEnv\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Volumes != nil {\n\t\tin, out := &in.Volumes, &out.Volumes\n\t\t*out = make([]Volumes, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.WaitFor != nil {\n\t\tin, out := &in.WaitFor, &out.WaitFor\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "3c45d4691bffdd429c620d809132e9c6", "score": "0.8077705", "text": "func (in *MemNode) DeepCopyInto(out *MemNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9880d223d20120d641e38948a479e267", "score": "0.80616087", "text": "func (in *Curator) DeepCopyInto(out *Curator) {\n\t*out = *in\n}", "title": "" }, { "docid": "d86cd832a6b2a900f25a9926245ddc0c", "score": "0.8059706", "text": "func (in *CockroachDBNode) DeepCopyInto(out *CockroachDBNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "41475496763ae4276f7015dae332c81a", "score": "0.8057409", "text": "func (in *MX) DeepCopyInto(out *MX) {\n\t*out = *in\n}", "title": "" }, { "docid": "a4140474dca433b376cb006f53ce01b8", "score": "0.80534923", "text": "func (in *FlavorNode) DeepCopyInto(out *FlavorNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "d4907b7e87f96cc9f592e887afb9927d", "score": "0.8050007", "text": "func (in *Node) DeepCopyInto(out *Node) {\n\t*out = *in\n}", "title": "" }, { "docid": "9b47e574bb5be9efb098214692f31714", "score": "0.80489606", "text": "func (in *FilesystemInfo) DeepCopyInto(out *FilesystemInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "675bd2d929e6a218a6d73beb70c865e1", "score": "0.8046706", "text": "func (in *ExistPvc) DeepCopyInto(out *ExistPvc) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "8efd0808623d9b730fb7e61f70087c8f", "score": "0.8046156", "text": "func (in *Container) DeepCopyInto(out *Container) {\n\t*out = *in\n}", "title": "" }, { "docid": "8bde41186e7e61e4e7741184e3d389ed", "score": "0.8038192", "text": "func (in *ResultRef) DeepCopyInto(out *ResultRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "58f001a58f43a3e8e30a09873185f4d3", "score": "0.8035031", "text": "func (in *Results) DeepCopyInto(out *Results) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7e85ead0c8c714d276f5fb9452635d0d", "score": "0.80339473", "text": "func (in *Fake) DeepCopyInto(out *Fake) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9f8b8a23dcf73e6ba1910cae5ae70043", "score": "0.80332786", "text": "func (in *Value) DeepCopyInto(out *Value) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "12aba946684ce7a45759b3de900e843d", "score": "0.80323786", "text": "func (d *Date) DeepCopyInto(out *Date) {\n\t*out = *d\n}", "title": "" }, { "docid": "bb11c9a990e7f490126a74be357aff79", "score": "0.8030024", "text": "func (in *ValueSelection) DeepCopyInto(out *ValueSelection) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "685326535d53e4ba6971d394916fb76a", "score": "0.8027301", "text": "func (in *OutputRef) DeepCopyInto(out *OutputRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "f484f0844458e8a703a8694a29b0e407", "score": "0.8018507", "text": "func (in *Var) DeepCopyInto(out *Var) {\n\t*out = *in\n}", "title": "" }, { "docid": "e9cb500ebbcbb1ec1b2276e4a6ad7c35", "score": "0.80149305", "text": "func (in *FileSystemInfo) DeepCopyInto(out *FileSystemInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "071025652c9144e1aceac0a90f385353", "score": "0.8014886", "text": "func (in *ACPI) DeepCopyInto(out *ACPI) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "81b3fe61ed28b4b0fdd14116c4b2d1f5", "score": "0.80117", "text": "func (in *PandaproxyAPITLS) DeepCopyInto(out *PandaproxyAPITLS) {\n\t*out = *in\n}", "title": "" }, { "docid": "95970938421b1288bad93724e6d86347", "score": "0.8011439", "text": "func (in *HiddenNode) DeepCopyInto(out *HiddenNode) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "e79a12a89d645ee17265ac1e9220920d", "score": "0.8009815", "text": "func (in *KeystoneDebug) DeepCopyInto(out *KeystoneDebug) {\n\t*out = *in\n}", "title": "" }, { "docid": "30324ad038726659a523150f3368d0f5", "score": "0.80082846", "text": "func (in *Container) DeepCopyInto(out *Container) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7c8c47fb388e239b1f56b93f3c3fcd75", "score": "0.80049545", "text": "func (in *FilesystemTarget) DeepCopyInto(out *FilesystemTarget) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "24891879c3796e85357de6b6d3986a17", "score": "0.80004734", "text": "func (in *Empty) DeepCopyInto(out *Empty) {\n\t*out = *in\n}", "title": "" }, { "docid": "0e55f7e85b58f091b4c56d054b1a0f01", "score": "0.8000177", "text": "func (in *BIOS) DeepCopyInto(out *BIOS) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "afb583f9d5ea7e3b6b4ab0c26a4563bd", "score": "0.79916644", "text": "func (in *KubeovnCfg) DeepCopyInto(out *KubeovnCfg) {\n\t*out = *in\n}", "title": "" }, { "docid": "bd76d0c812c11347dc0586c794e13bbb", "score": "0.7989392", "text": "func (in *ObjectID) DeepCopyInto(out *ObjectID) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "87cf7c6678a506b2791e1c30d1d4540c", "score": "0.7985694", "text": "func (in *ObjectRef) DeepCopyInto(out *ObjectRef) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "b484ecb198d3d15da23105d7d1e0fce9", "score": "0.7980506", "text": "func (in *HostMemory) DeepCopyInto(out *HostMemory) {\n\t*out = *in\n}", "title": "" }, { "docid": "ac7c801f87efa15912e469730d600335", "score": "0.79794407", "text": "func (in *NUMACell) DeepCopyInto(out *NUMACell) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "992d147304d6bad233da2be02fc7619d", "score": "0.7978128", "text": "func (in *Struct_ObjectAndObject) DeepCopyInto(out *Struct_ObjectAndObject) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "083852392c5e9f16679610351c913068", "score": "0.7976461", "text": "func (in *Entry) DeepCopyInto(out *Entry) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "55c1000e8c0cd2b29bcfd858b2050c26", "score": "0.7974009", "text": "func (in *ContainerInfo) DeepCopyInto(out *ContainerInfo) {\n\t*out = *in\n}", "title": "" }, { "docid": "308c47eab2a45025e0d70b6f63a70745", "score": "0.79694444", "text": "func (in *View) DeepCopyInto(out *View) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "dc25f670b9ab6635efd1a7f707841646", "score": "0.7968461", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n}", "title": "" }, { "docid": "dc25f670b9ab6635efd1a7f707841646", "score": "0.7968461", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n}", "title": "" }, { "docid": "1f29957ddd8a3d29eefd9952908cbb3a", "score": "0.796482", "text": "func (in *CleanupOptions) DeepCopyInto(out *CleanupOptions) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "cc4346b3e9aec199385bc90140def4e1", "score": "0.79634804", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n}", "title": "" }, { "docid": "cc4346b3e9aec199385bc90140def4e1", "score": "0.79634804", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n}", "title": "" }, { "docid": "a7b378d1a6bd8758e11892764d752257", "score": "0.7962079", "text": "func (in *AccessRule) DeepCopyInto(out *AccessRule) {\n\t*out = *in\n\tif in.Services != nil {\n\t\tin, out := &in.Services, &out.Services\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Methods != nil {\n\t\tin, out := &in.Methods, &out.Methods\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Paths != nil {\n\t\tin, out := &in.Paths, &out.Paths\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "b6a38c245c68cf0a952d8cd3035f414b", "score": "0.796049", "text": "func (in *Filesystem) DeepCopyInto(out *Filesystem) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "cecf0e759895b3677c7ac21129d95d32", "score": "0.79576224", "text": "func (in *FederatedIdentity) DeepCopyInto(out *FederatedIdentity) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "fcd61e82f34db96b76efba6276644908", "score": "0.795558", "text": "func (in *ObjectSelector) DeepCopyInto(out *ObjectSelector) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "fcd61e82f34db96b76efba6276644908", "score": "0.795558", "text": "func (in *ObjectSelector) DeepCopyInto(out *ObjectSelector) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4cc4474c2a1333bf5f947b2294d0b027", "score": "0.7951703", "text": "func (in *Interface) DeepCopyInto(out *Interface) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "39a471f5aadbdab5d9516ba227972d8a", "score": "0.795005", "text": "func (in *Kubevirt) DeepCopyInto(out *Kubevirt) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "2e969070a96b8b6d99bd7c0c3b07add8", "score": "0.7949547", "text": "func (in *K8sNode) DeepCopyInto(out *K8sNode) {\n\t*out = *in\n}", "title": "" }, { "docid": "3a50ec1b7050b7c2c74ee0d6b2e48f87", "score": "0.7944735", "text": "func (in *Kustomize) DeepCopyInto(out *Kustomize) {\n\t*out = *in\n}", "title": "" }, { "docid": "3c51337658fc0e9d2966273bd3459022", "score": "0.79445887", "text": "func (in *ObjectReference) DeepCopyInto(out *ObjectReference) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7dba8e650f835283d56250f2cdab85d5", "score": "0.79443127", "text": "func (in *Nats) DeepCopyInto(out *Nats) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "62fdf0e0bb9afa2bdeb473e8512e55b9", "score": "0.7944251", "text": "func (in *MemoryBackingSource) DeepCopyInto(out *MemoryBackingSource) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "98b9c2ac35cd52c9ce36fa4ac31a3620", "score": "0.79431826", "text": "func (in *Struct_Empty) DeepCopyInto(out *Struct_Empty) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "1d3bd808397fc4e42919ba414a38653f", "score": "0.79421985", "text": "func (in *ExpectedNICS) DeepCopyInto(out *ExpectedNICS) {\n\t*out = *in\n}", "title": "" }, { "docid": "ef3955bb9c23ccc542ce27babb3ea911", "score": "0.79416853", "text": "func (in *Hetzner) DeepCopyInto(out *Hetzner) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "c46e3263bd358d3ca2901f5e8dd6924d", "score": "0.79400164", "text": "func (in *InstancetemplateNodeAffinities) DeepCopyInto(out *InstancetemplateNodeAffinities) {\n\t*out = *in\n\tif in.Value != nil {\n\t\tin, out := &in.Value, &out.Value\n\t\t*out = new(InstancetemplateValue)\n\t\t**out = **in\n\t}\n\treturn\n}", "title": "" }, { "docid": "d138525ab73c7f982261d224991bb588", "score": "0.7939188", "text": "func (in *TestingSpec) DeepCopyInto(out *TestingSpec) {\n\t*out = *in\n}", "title": "" }, { "docid": "a62d2491925276d66a89576351b7bdb4", "score": "0.7938972", "text": "func (in *Replicas) DeepCopyInto(out *Replicas) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "49f50463535cd497282b2d6d54eb1245", "score": "0.7935617", "text": "func (in *Notary) DeepCopyInto(out *Notary) {\n\t*out = *in\n}", "title": "" }, { "docid": "6ea8837cf2211c399b0e39da6ff0bb57", "score": "0.793435", "text": "func (in *StepOutputConfig) DeepCopyInto(out *StepOutputConfig) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9823e89e5f174980848afc03c8a265ae", "score": "0.7934061", "text": "func (in *Reprovision) DeepCopyInto(out *Reprovision) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "bf95c140cc2b3cece4116f02fe1e5066", "score": "0.79310906", "text": "func (in *ActionInfo) DeepCopyInto(out *ActionInfo) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "6b8379fb1e79e083218be9b00ee3baf3", "score": "0.7930447", "text": "func (in *TaskResult) DeepCopyInto(out *TaskResult) {\n\t*out = *in\n\tif in.Properties != nil {\n\t\tin, out := &in.Properties, &out.Properties\n\t\t*out = make(map[string]PropertySpec, len(*in))\n\t\tfor key, val := range *in {\n\t\t\t(*out)[key] = val\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "cd8c19e9524321e2465ead0ebac86284", "score": "0.79298997", "text": "func (in *FilesFrom) DeepCopyInto(out *FilesFrom) {\n\t*out = *in\n}", "title": "" }, { "docid": "cd8c19e9524321e2465ead0ebac86284", "score": "0.79298997", "text": "func (in *FilesFrom) DeepCopyInto(out *FilesFrom) {\n\t*out = *in\n}", "title": "" }, { "docid": "59f6a3f0b5460ec14888a0e8c4a79965", "score": "0.7927188", "text": "func (in *FilesystemBinaryCache) DeepCopyInto(out *FilesystemBinaryCache) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4b6d2bbc6df0bd972bb04594e79b6919", "score": "0.79188627", "text": "func (in *Dependency) DeepCopyInto(out *Dependency) {\n\t*out = *in\n\tout.Locator = in.Locator\n\treturn\n}", "title": "" }, { "docid": "08470e00ca7aec496a2eb8d78ea93dc5", "score": "0.79168147", "text": "func (in *Struct_NonPointerExplicitObject) DeepCopyInto(out *Struct_NonPointerExplicitObject) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "7cedeb486714dca831a785712c66168d", "score": "0.7916406", "text": "func (in *HugePage) DeepCopyInto(out *HugePage) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "b60094f2df75404ce1882420fe3681dd", "score": "0.79155517", "text": "func (in *Buildpack) DeepCopyInto(out *Buildpack) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "5d6676976741906b273edf03cf097f8d", "score": "0.7912325", "text": "func (in *Identity) DeepCopyInto(out *Identity) {\n\t*out = *in\n}", "title": "" }, { "docid": "e0bb2ad74bf9d1068a03f6f414650b67", "score": "0.7911209", "text": "func (in *ConfigFile) DeepCopyInto(out *ConfigFile) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "a22fa5fa094406e0db8b6a0f3a49d59b", "score": "0.79085296", "text": "func (in *Flavor) DeepCopyInto(out *Flavor) {\n\t*out = *in\n\tif in.Nodes != nil {\n\t\tin, out := &in.Nodes, &out.Nodes\n\t\t*out = make([]FlavorNode, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f9ad912684ce7e3a3c56efaef710a7c5", "score": "0.7907625", "text": "func (in *Cleanup) DeepCopyInto(out *Cleanup) {\n\t*out = *in\n}", "title": "" }, { "docid": "fa4eb90516f66dd6b17c28b9f3cab1cf", "score": "0.7907622", "text": "func (in *Openshift) DeepCopyInto(out *Openshift) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "353e8c0b6635af77f678a667b1cbf124", "score": "0.7907562", "text": "func (in *MemoryBackingAccess) DeepCopyInto(out *MemoryBackingAccess) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "faa35b0f75770678ed636bddaa5d5721", "score": "0.79074615", "text": "func (in *NumaTuneMemory) DeepCopyInto(out *NumaTuneMemory) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "4c1282e68f39e312cb76684584edbb7f", "score": "0.7906021", "text": "func (in *Step) DeepCopyInto(out *Step) {\n\t*out = *in\n\tif in.Command != nil {\n\t\tin, out := &in.Command, &out.Command\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.Args != nil {\n\t\tin, out := &in.Args, &out.Args\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.DeprecatedPorts != nil {\n\t\tin, out := &in.DeprecatedPorts, &out.DeprecatedPorts\n\t\t*out = make([]corev1.ContainerPort, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.EnvFrom != nil {\n\t\tin, out := &in.EnvFrom, &out.EnvFrom\n\t\t*out = make([]corev1.EnvFromSource, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.Env != nil {\n\t\tin, out := &in.Env, &out.Env\n\t\t*out = make([]corev1.EnvVar, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tin.Resources.DeepCopyInto(&out.Resources)\n\tif in.VolumeMounts != nil {\n\t\tin, out := &in.VolumeMounts, &out.VolumeMounts\n\t\t*out = make([]corev1.VolumeMount, len(*in))\n\t\tfor i := range *in {\n\t\t\t(*in)[i].DeepCopyInto(&(*out)[i])\n\t\t}\n\t}\n\tif in.VolumeDevices != nil {\n\t\tin, out := &in.VolumeDevices, &out.VolumeDevices\n\t\t*out = make([]corev1.VolumeDevice, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.DeprecatedLivenessProbe != nil {\n\t\tin, out := &in.DeprecatedLivenessProbe, &out.DeprecatedLivenessProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedReadinessProbe != nil {\n\t\tin, out := &in.DeprecatedReadinessProbe, &out.DeprecatedReadinessProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedStartupProbe != nil {\n\t\tin, out := &in.DeprecatedStartupProbe, &out.DeprecatedStartupProbe\n\t\t*out = new(corev1.Probe)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.DeprecatedLifecycle != nil {\n\t\tin, out := &in.DeprecatedLifecycle, &out.DeprecatedLifecycle\n\t\t*out = new(corev1.Lifecycle)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.SecurityContext != nil {\n\t\tin, out := &in.SecurityContext, &out.SecurityContext\n\t\t*out = new(corev1.SecurityContext)\n\t\t(*in).DeepCopyInto(*out)\n\t}\n\tif in.Timeout != nil {\n\t\tin, out := &in.Timeout, &out.Timeout\n\t\t*out = new(v1.Duration)\n\t\t**out = **in\n\t}\n\tif in.Workspaces != nil {\n\t\tin, out := &in.Workspaces, &out.Workspaces\n\t\t*out = make([]WorkspaceUsage, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.StdoutConfig != nil {\n\t\tin, out := &in.StdoutConfig, &out.StdoutConfig\n\t\t*out = new(StepOutputConfig)\n\t\t**out = **in\n\t}\n\tif in.StderrConfig != nil {\n\t\tin, out := &in.StderrConfig, &out.StderrConfig\n\t\t*out = new(StepOutputConfig)\n\t\t**out = **in\n\t}\n\treturn\n}", "title": "" }, { "docid": "d2390e63ffae78df49dbee0849af5c53", "score": "0.7904408", "text": "func (in *ImageBuild) DeepCopyInto(out *ImageBuild) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "3e72237bf229a54bf5fbc6a3bdab658f", "score": "0.7903823", "text": "func (in *MatchEntry) DeepCopyInto(out *MatchEntry) {\n\t*out = *in\n\tif in.Processes != nil {\n\t\tin, out := &in.Processes, &out.Processes\n\t\t*out = make([]string, len(*in))\n\t\tcopy(*out, *in)\n\t}\n\tif in.ExcludedNamespaces != nil {\n\t\tin, out := &in.ExcludedNamespaces, &out.ExcludedNamespaces\n\t\t*out = make([]wildcard.Wildcard, len(*in))\n\t\tcopy(*out, *in)\n\t}\n}", "title": "" }, { "docid": "bcf09a71293c9cee0c34c2fa367e656b", "score": "0.790343", "text": "func (in *Path) DeepCopyInto(out *Path) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "a2c3ef4679aaffcf7bbbc9eca2211d29", "score": "0.7902903", "text": "func (in *Grafana) DeepCopyInto(out *Grafana) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "9b20ecbd2e5206a3078e0160815c4797", "score": "0.79023695", "text": "func (in *CASpec) DeepCopyInto(out *CASpec) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "846892e66bde8639901c45cc7e147cf9", "score": "0.79012656", "text": "func (in *Runtime) DeepCopyInto(out *Runtime) {\n\t*out = *in\n\tout.Locator = in.Locator\n\treturn\n}", "title": "" }, { "docid": "b969c40ddd2a12fda1ad0bcb52dedb0c", "score": "0.7898567", "text": "func (in *Db) DeepCopyInto(out *Db) {\n\t*out = *in\n\treturn\n}", "title": "" }, { "docid": "776b0984cdaf45a4f28e7a136be20e7a", "score": "0.7896414", "text": "func (u *ULID) DeepCopyInto(out *ULID) {\n\t*out = *u\n}", "title": "" }, { "docid": "6eedbcd9f73915f1ee6c8e6061a288dd", "score": "0.7895089", "text": "func (in *DataCleanStrategy) DeepCopyInto(out *DataCleanStrategy) {\n\t*out = *in\n\tvar fields []Fields\n\tfor _, v := range in.Fields {\n\t\tfields = append(fields, v)\n\t}\n\tout.Fields = fields\n}", "title": "" }, { "docid": "8c510e4af6c6902777e1353712eb8de8", "score": "0.7894", "text": "func (in *ComputevpntunnelValueFrom) DeepCopyInto(out *ComputevpntunnelValueFrom) {\n\t*out = *in\n\tout.SecretKeyRef = in.SecretKeyRef\n\treturn\n}", "title": "" }, { "docid": "564805f323fbadde55f67e46f75ac865", "score": "0.7893854", "text": "func (in *Destination) DeepCopyInto(out *Destination) {\n\t*out = *in\n}", "title": "" } ]
77af9cadf52cc642bd830df05288d8f5
FormatFloatPercent converts f to percentages string
[ { "docid": "171e0e56c7c642f194fb02891198c47a", "score": "0.8672998", "text": "func FormatFloatPercent(f float64) string {\n\treturn strconv.FormatFloat(f*100, 'f', 2, 64) + \"%\"\n}", "title": "" } ]
[ { "docid": "3ddbfe6676a49e23712e866d27a287ea", "score": "0.7437814", "text": "func FormatPercent(numerator uint64, denominator uint64) string {\n\tif denominator == 0 {\n\t\treturn \"\"\n\t}\n\n\tpercent := 100.0 * float64(numerator) / float64(denominator)\n\n\tif percent > 100 {\n\t\tpercent = 100\n\t}\n\n\tdiv := 5\n\tdone := strings.Repeat(\"=\", Round(percent/5))\n\trest := strings.Repeat(\" \", (100/div)-len(done))\n\treturn fmt.Sprintf(\"%6.2f%% [%s%s]\", percent, done, rest)\n}", "title": "" }, { "docid": "5c1f5983dee0caba15679012ad5ffb7c", "score": "0.7305644", "text": "func floatToPercent(rat float64) string {\n\trat *= 100\n\tstr := fmt.Sprintf(\"%.1f%%\", rat)\n\treturn str\n}", "title": "" }, { "docid": "e940f230f1d7d31f7c546e18c48d8d21", "score": "0.7037973", "text": "func ParseFloatPercent(s string, bitSize int) (f float64, norm string, err error) {\n\ti := strings.Index(s, \"%\")\n\tif i >= 0 {\n\t\ts = s[:i]\n\t}\n\n\tf, err = strconv.ParseFloat(s, bitSize)\n\tif err != nil {\n\t\treturn 0, \"\", fmt.Errorf(\"ParseFloatPercent %q: percent sign not found and not a number\", s)\n\t}\n\t// normalization\n\ts += \"%\"\n\n\treturn f / 100, s, nil\n}", "title": "" }, { "docid": "930e4023d35bec8bd4126b13107c975a", "score": "0.700471", "text": "func FormatPct(pct float64) string {\n\tvar s string\n\tif pct < 0.0001 {\n\t\ts = \" \"\n\t} else if pct > 999.9 {\n\t\ts = \"+++.+%\" // too large to fit! (probably a bug as we don't expect this value to be > 100.00)\n\t} else {\n\t\ts = fmt.Sprintf(\"%5.1f\", 100.0*pct) + \"%\"\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "1f6cc597368edacca96c78c048fecab8", "score": "0.69653857", "text": "func formatFloat(f float64) float64 {\n\tswitch {\n\tcase f > 500:\n\t\treturn mathutil.Round(f, 0)\n\tcase f > 50:\n\t\treturn mathutil.Round(f, 1)\n\tcase f > 0.3:\n\t\treturn mathutil.Round(f, 2)\n\t}\n\n\treturn f\n}", "title": "" }, { "docid": "1dd550bcaec9b60720406a3af3563ea1", "score": "0.687992", "text": "func formatPct(f float64, div float64) float64 {\n\t// avoid division by 0\n\tif div == 0 {\n\t\tdiv = 1\n\t}\n\trounded := math.Floor((f / div * 10000) + .5)\n\treturn math.Max(rounded/100, 0)\n}", "title": "" }, { "docid": "03f0eb4bf7b9282c0807953a78b0ed12", "score": "0.67837036", "text": "func FormatFloat(f float64, fmt byte, prec, bitSize int) string", "title": "" }, { "docid": "1b5ca0fb594b93aa9c8d91211c145b1d", "score": "0.6638815", "text": "func (t *Totals) Percent(f string) float32 {\n\treturn float32(t.coveredF[f]) / float32(t.totalF[f]) * 100\n}", "title": "" }, { "docid": "06cdab7f6770e35868b7392e3f1436f2", "score": "0.656934", "text": "func (d Delta) Percent() string {\n\treturn fmt.Sprintf(\"%+.2f%%\", 100*d.Float64()-100)\n}", "title": "" }, { "docid": "d3c1d2b4953983f9d5704b970d811a0c", "score": "0.64893776", "text": "func FormatFloat(f float64) string {\n\treturn strconv.FormatFloat(f, 'f', -1, 64)\n}", "title": "" }, { "docid": "941310e42f2c34646a29404166c75ed8", "score": "0.64233565", "text": "func (bf *Bitfield) Percent() string {\n\tfl := float64(bf.CountSet())\n\tfl /= float64(bf.Length)\n\treturn fmt.Sprintf(\"%.2f%%\", fl*100)\n}", "title": "" }, { "docid": "c6b3f90a41fa19cc774e2813b4141743", "score": "0.6278384", "text": "func (node *TFloat) Format(buf *bytes.Buffer, f lex.EncodeFlags) {\n\tbuf.WriteString(node.Name)\n\tif node.Prec > 0 {\n\t\tfmt.Fprintf(buf, \"(%d)\", node.Prec)\n\t}\n}", "title": "" }, { "docid": "cb1187c75c24187c3c4b6a3ec03135da", "score": "0.62750995", "text": "func PercentageString(part, total uint64) string {\n\tif total == 0 {\n\t\treturn \"N/A\"\n\t}\n\tif part == 0 {\n\t\treturn fmt.Sprintf(\"%v %%\", 0)\n\t}\n\n\treturn fmt.Sprintf(\"%v %%\",\n\t\tint((float64(part)/float64(total))*float64(100)))\n}", "title": "" }, { "docid": "482716b96077597e3d22ebd3dfebbc28", "score": "0.6197396", "text": "func FormatProgress(diff float32) string {\n\treturn fmt.Sprintf(\"%.15f%%\", 100.0-((diff/maxImageDiff)*100))\n}", "title": "" }, { "docid": "c1e907afe58c785e40dd6f7c0b1e9ef3", "score": "0.6121726", "text": "func (v *VAT) PercentageString() string {\n\t// percentage should be 4 numerical letters, format: xxyy where y is numbers after decimal point\n\tper := strconv.FormatFloat(v.Percentage, 'f', 2, 64)\n\tper = strings.Replace(per, \".\", \"\", 1)\n\tfor len(per) < 4 {\n\t\tper = \" \" + per\n\t}\n\n\treturn per\n}", "title": "" }, { "docid": "b18721f37e9f97b7cf39b5805afa31ad", "score": "0.6106029", "text": "func Percentage(value, total int64) string {\n\tvar ratio float64\n\tif total != 0 {\n\t\tratio = math.Abs(float64(value)/float64(total)) * 100\n\t}\n\tswitch {\n\tcase math.Abs(ratio) >= 99.95 && math.Abs(ratio) <= 100.05:\n\t\treturn \" 100%\"\n\tcase math.Abs(ratio) >= 1.0:\n\t\treturn fmt.Sprintf(\"%5.2f%%\", ratio)\n\tdefault:\n\t\treturn fmt.Sprintf(\"%5.2g%%\", ratio)\n\t}\n}", "title": "" }, { "docid": "5a89688e12f935e72811f67cecc24e71", "score": "0.6100886", "text": "func (v Value) Format(f fmt.State, c rune) {\n\tvar cust, quot bool\n\tswitch c {\n\tcase 'q':\n\t\tquot = true\n\t\tfallthrough\n\tcase 'S', 'v':\n\t\tcust = true\n\t}\n\n\tvar (\n\t\tfs = \"%\"\n\t\tbin = true\n\t)\n\n\tfor _, fl := range \"+-# 0\" {\n\t\tif !f.Flag(int(fl)) {\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch fl {\n\t\tcase '#':\n\t\t\tif cust {\n\t\t\t\tbin = false\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tfallthrough\n\n\t\tdefault:\n\t\t\tfs += string(fl)\n\t\t}\n\t}\n\n\tvar wp bool\n\n\tif w, ok := f.Width(); ok {\n\t\tfs += fmt.Sprintf(\"%d\", w)\n\t\twp = true\n\t}\n\n\tif p, ok := f.Precision(); ok {\n\t\tfs += fmt.Sprintf(\".%d\", p)\n\t\twp = true\n\t}\n\n\tif !cust {\n\t\tcs := string(c)\n\t\tif strings.IndexAny(cs, \"eEfFgG\") == -1 {\n\t\t\tfmt.Fprintf(f, fs+cs, int64(v))\n\t\t} else {\n\t\t\tfmt.Fprintf(f, fs+cs, float64(v))\n\t\t}\n\t\treturn\n\t}\n\n\tfs += \"f\"\n\n\tpv, ps := v.parts(bin).factor()\n\n\tvar rv string\n\tif wp {\n\t\trv = fmt.Sprintf(fs+ps, pv)\n\t} else {\n\t\trv = strings.TrimRight(fmt.Sprintf(fs, pv), \"0\")\n\t\tif li := len(rv) - 1; rv[li] == '.' {\n\t\t\trv = rv[:li]\n\t\t}\n\t\trv += ps\n\t}\n\n\tif quot {\n\t\trv = strconv.Quote(rv)\n\t}\n\n\tfmt.Fprint(f, rv)\n}", "title": "" }, { "docid": "bc78e28ceca552644281a1c4a5567c5a", "score": "0.6088936", "text": "func optiSprintf(format string, a ...interface{}) string {\n\tchunks := strings.Split(format, \"%\")\n\tnewChunks := make([]string, len(chunks))\n\tfor i, chunk := range chunks {\n\t\tif i != 0 {\n\t\t\tverb := chunk[0]\n\t\t\tif verb == 'f' || verb == 'F' {\n\t\t\t\tnum := a[i-1].(float64)\n\t\t\t\tp := strconv.Itoa(getPrec(num, verb == 'F'))\n\t\t\t\tchunk = strings.Replace(chunk, string(verb), \".\"+p+\"f\", 1)\n\t\t\t}\n\t\t}\n\t\tnewChunks[i] = chunk\n\t}\n\tformat = strings.Join(newChunks, \"%\")\n\treturn fmt.Sprintf(format, a...)\n}", "title": "" }, { "docid": "5423ddb7a16b2c91521d096430d8f826", "score": "0.59379053", "text": "func StringF(f float64) string {\n\treturn strconv.FormatFloat(f, 'f', -1, 64)\n}", "title": "" }, { "docid": "e64d1c7197df73affa8e3fa970563857", "score": "0.59373677", "text": "func ratToPercent(rat *big.Rat) string {\n\treal, _ := rat.Float64()\n\treturn floatToPercent(real)\n}", "title": "" }, { "docid": "75a49a79ad11da77af1b0cd6fd96ac1e", "score": "0.5892344", "text": "func (e *Formatter) Fprintf(w io.Writer, format string, a ...interface{}) {\n\t_, err := fmt.Fprintf(w, format, a...)\n\tcontract.IgnoreError(err)\n}", "title": "" }, { "docid": "36078766bf1ceea0a2937a640e3b9ad8", "score": "0.58567244", "text": "func Sprintf(v semver.Version, format string) string {\n\tout := &bytes.Buffer{}\n\n\tinFormat := false\n\tfor _, r := range format {\n\n\t\tif r == '%' && !inFormat {\n\t\t\tinFormat = true\n\t\t\tcontinue\n\t\t}\n\n\t\tif !inFormat {\n\t\t\tout.WriteRune(r)\n\t\t\tcontinue\n\t\t}\n\n\t\tswitch r {\n\n\t\t// a literal percent rune\n\t\tcase '%':\n\t\t\tout.WriteRune('%')\n\n\t\t// the major version\n\t\tcase 'M':\n\t\t\tout.WriteString(strconv.FormatUint(v.Major, 10))\n\n\t\t// the minor version\n\t\tcase 'm':\n\t\t\tout.WriteString(strconv.FormatUint(v.Minor, 10))\n\n\t\t// the patch version\n\t\tcase 'p':\n\t\t\tout.WriteString(strconv.FormatUint(v.Patch, 10))\n\n\t\t}\n\n\t\tinFormat = false\n\t}\n\n\treturn out.String()\n}", "title": "" }, { "docid": "b308aad20d585c2fdde891f95db03562", "score": "0.5804818", "text": "func (p *Point) Stringf() string {\n\treturn fmt.Sprintf(\"(%.3f, %.3f)\", p.x.Float64(), p.y.Float64())\n}", "title": "" }, { "docid": "05ba5681fc89e160a9f73cdaf5d1f8ad", "score": "0.5801869", "text": "func floatStr(val float64) string {\n\treturn fmt.Sprintf(\"%0.3f\", val)\n}", "title": "" }, { "docid": "26ca439382ab8c235e229b2cf596694c", "score": "0.57853967", "text": "func formatNumber(s string) string {\n\tf, _ := strconv.ParseFloat(s, 64)\n\t// fmt.Printf(\"%.2f\", f)\n\tf = f / 100\n\treturn fmt.Sprintf(\"%.2f\", f)\n}", "title": "" }, { "docid": "1fe59fb5a0f204726610e7710af36079", "score": "0.5771004", "text": "func (b *formatBuffer) Writef(format string, args ...interface{}) (int, error) {\n\treturn b.Buffer.WriteString(fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "fbef52982ffedda2ecee200b25eb0a7f", "score": "0.57583946", "text": "func (b Byte) fmt(unit Byte) string {\n\tf := \"%.0f\"\n\tif b < 10*unit {\n\t\tf = \"%.2f\"\n\t} else if b < 100*unit {\n\t\tf = \"%.1f\"\n\t}\n\treturn fmt.Sprintf(f, float64(b)/float64(unit))\n}", "title": "" }, { "docid": "1ff243587f357ebfb03a02eb39f2d292", "score": "0.57533926", "text": "func Colorf(format string, a ...interface{}) string {\n\tvar (\n\t\tmodifier int\n\t\tcolor int\n\t\tend = len(format)\n\t\targ = 0\n\t\tbuf = &bytes.Buffer{}\n\t)\n\n\tfor i := 0; i < end; i++ {\n\t\tprev := i\n\t\tfor i < end && format[i] != '%' {\n\t\t\ti++\n\t\t}\n\t\tif i > prev {\n\t\t\tbuf.WriteString(format[prev:i])\n\t\t}\n\t\tif i >= end {\n\t\t\tbreak\n\t\t}\n\n\t\ti++\n\t\tchr := format[i]\n\n\t\tswitch chr {\n\t\tcase '%': // if %% is in the format\n\t\t\tbuf.WriteByte('%')\n\t\t\tcontinue\n\t\tcase '!':\n\t\t\tmodifier = Bold\n\t\tcase '.':\n\t\t\tmodifier = Faint\n\t\tcase '\\'':\n\t\t\tmodifier = Italic\n\t\tcase '_':\n\t\t\tmodifier = Underlined\n\t\tcase '*':\n\t\t\tmodifier = BlinkSlow\n\t\t\tif format[i+1] == '*' {\n\t\t\t\tmodifier = BlinkFast\n\t\t\t\ti++\n\t\t\t}\n\t\tcase '?':\n\t\t\tmodifier = Inverted\n\t\tcase ' ':\n\t\t\tmodifier = Hidden\n\t\tcase '-':\n\t\t\tmodifier = CrossedOut\n\t\t}\n\t\tif modifier != 0 {\n\t\t\ti++\n\t\t}\n\t\tcolor = getForground(format[i])\n\n\t\tif modifier != 0 {\n\t\t\tfmt.Fprintf(buf, \"%s[%d;%dm\", escape, color, modifier)\n\t\t} else {\n\t\t\tfmt.Fprintf(buf, \"%s[%dm\", escape, color)\n\t\t}\n\t\tbuf.WriteString(fmt.Sprintf(\"%v\", a[arg]))\n\t\tfmt.Fprintf(buf, \"%s[0m\", escape)\n\t\targ++\n\t}\n\treturn buf.String()\n}", "title": "" }, { "docid": "d65293c9a2f2c7d2d361963c61cbf2ba", "score": "0.5745225", "text": "func (f Float) String() string {\n\treturn fmt.Sprintf(\"%f\", f)\n}", "title": "" }, { "docid": "a80ec6eff5d3759f37b872b74dd2e26b", "score": "0.5645817", "text": "func ratioString(vals ...uint) string {\n\tvar total uint\n\tfor _, val := range vals {\n\t\ttotal += val\n\t}\n\ts := \"\"\n\tfor _, val := range vals {\n\t\tif s != \"\" {\n\t\t\ts += \", \"\n\t\t}\n\t\tpct := 100 * float64(val) / float64(total)\n\t\ts += fmt.Sprintf(\"%d/%d (%0.1f%%)\", val, total, pct)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "5352f85c864354ea787d616a6c1aaa8e", "score": "0.5644247", "text": "func humanFloat(value float64) float64 {\n\thumanFloat := fmt.Sprintf(\"%f\", value)\n\trealFloat, _ := strconv.ParseFloat(humanFloat, 64)\n\n\treturn realFloat\n}", "title": "" }, { "docid": "4351bc659743343f8d98ef8e17302f47", "score": "0.56420964", "text": "func substitutePercentVs(s *S, fmt string, vals []*codegen.Value) (string, []*codegen.Value) {\n\tinRunes := ([]rune)(fmt)\n\toutRunes := make([]rune, 0, len(inRunes))\n\toutVals := make([]*codegen.Value, 0, len(vals))\n\tfor i, c := 0, len(inRunes); i < c; i++ {\n\t\tr := inRunes[i]\n\t\tif r == '%' && i <= len(inRunes)-1 {\n\t\t\tn := inRunes[i+1]\n\t\t\tswitch n {\n\t\t\tcase 'v':\n\t\t\t\tf, v := s.PrintfSpecifier(vals[0])\n\t\t\t\tvals = vals[1:]\n\t\t\t\toutRunes = append(outRunes, ([]rune)(f)...)\n\t\t\t\toutVals = append(outVals, v...)\n\t\t\tcase '%':\n\t\t\t\toutRunes = append(outRunes, '%', '%')\n\t\t\tdefault:\n\t\t\t\toutRunes = append(outRunes, '%', n)\n\t\t\t\toutVals = append(outVals, vals[0])\n\t\t\t\tvals = vals[1:]\n\t\t\t}\n\t\t\ti++ // Skip the consumed character following the %\n\t\t} else {\n\t\t\toutRunes = append(outRunes, r)\n\t\t}\n\t}\n\tif len(vals) != 0 {\n\t\tfail(\"Log message has %v unconsumed values. Message: '%v'\", len(vals), fmt)\n\t}\n\treturn string(outRunes), outVals\n}", "title": "" }, { "docid": "d74ebe74e275a78820f9f13cbfe133ce", "score": "0.5631686", "text": "func Stringf(l string, format string, args ...interface{}) *Value {\n\treturn &Value{\n\t\tLabel: l,\n\t\tValue: fmt.Sprintf(format, args...),\n\t}\n}", "title": "" }, { "docid": "40ac57a84ffcac6bec9dfad48e1dbf96", "score": "0.5630102", "text": "func Fprintf(w io.Writer, format string, a ...interface{}) (int, error) {\n\treturn fmt.Fprint(w, compile(fmt.Sprintf(format, a...)))\n}", "title": "" }, { "docid": "31025ee4bcd3556e878bfc4fd6bae1de", "score": "0.56249565", "text": "func floatToHumanizedValueFormatter(v interface{}) string {\n\tif typed, isTyped := v.(float64); isTyped {\n\t\tif math.Abs(typed) < 1000 { //nolint\n\t\t\treturn fmt.Sprintf(\"%.f\", typed)\n\t\t}\n\t\thumanized, postfix := humanize.ComputeSI(typed)\n\t\treturn fmt.Sprintf(\"%.2f %s\", humanized, strings.ToUpper(postfix))\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "6f59e93ca9327ce8128cd21fd0db7d16", "score": "0.56002015", "text": "func percent(n, size float64) float64 {\r\n\tif n == 0 {\r\n\t\treturn 0\r\n\t}\r\n\tif n >= size {\r\n\t\treturn 100\r\n\t}\r\n\treturn 100.0 * (n / size)\r\n}", "title": "" }, { "docid": "980fa88e54cd5c8233f8a34d1900e160", "score": "0.5599387", "text": "func (this *Logger) Pf(format string, v ...interface{}) {\n\tthis.output(fmt.Sprintf(format+\"\\n\", v...))\n}", "title": "" }, { "docid": "97deb379512950eeae7b95c2aae26c7a", "score": "0.5548331", "text": "func (wp *WatchPoint) Printf(format string, params ...interface{}) *WatchPoint {\n\tif wp.disabled {\n\t\treturn wp\n\t}\n\n\twp.offset += 1\n\tvar content string\n\tif len(params) == 0 {\n\t\tcontent = format\n\t} else {\n\t\tcontent = fmt.Sprintf(format, params...)\n\t}\n\treturn wp.printcontent(content)\n}", "title": "" }, { "docid": "d9a348cf8122c034b244f7b9495542ec", "score": "0.55428165", "text": "func FormatFP(number int32) string {\n\treturn fmt.Sprint(fpToBaseTen(splitFP(intToTwos(int(number), 32))))\n}", "title": "" }, { "docid": "afcaedfc6bb3e93a90e6c12922bd7dde", "score": "0.55081916", "text": "func (l *State) PushFString(format string, args ...interface{}) string {\n\tn, i := 0, 0\n\tfor {\n\t\te := strings.IndexRune(format, '%')\n\t\tif e < 0 {\n\t\t\tbreak\n\t\t}\n\t\tl.checkStack(2) // format + item\n\t\tl.push(format[:e])\n\t\tswitch format[e+1] {\n\t\tcase 's':\n\t\t\tif args[i] == nil {\n\t\t\t\tl.push(\"(null)\")\n\t\t\t} else {\n\t\t\t\tl.push(args[i].(string))\n\t\t\t}\n\t\t\ti++\n\t\tcase 'c':\n\t\t\tl.push(string(args[i].(rune)))\n\t\t\ti++\n\t\tcase 'd':\n\t\t\tl.push(float64(args[i].(int)))\n\t\t\ti++\n\t\tcase 'f':\n\t\t\tl.push(args[i].(float64))\n\t\t\ti++\n\t\tcase 'p':\n\t\t\tl.push(fmt.Sprintf(\"%p\", args[i]))\n\t\t\ti++\n\t\tcase '%':\n\t\t\tl.push(\"%\")\n\t\tdefault:\n\t\t\tl.runtimeError(\"invalid option \" + format[e:e+2] + \" to 'lua_pushfstring'\")\n\t\t}\n\t\tn += 2\n\t\tformat = format[e+2:]\n\t}\n\tl.checkStack(1)\n\tl.push(format)\n\tif n > 0 {\n\t\tl.concat(n + 1)\n\t}\n\treturn l.stack[l.top-1].(string)\n}", "title": "" }, { "docid": "56276ff704f999d3ca53ed4abfaa4de4", "score": "0.54730713", "text": "func (b *StringBuilder) SafeFloat(s i.SafeFloat) {\n\tb.SetMode(ib.SafeEscaped)\n\t_, _ = ifmt.Fprintf(&b.Buffer, \"%v\", s)\n}", "title": "" }, { "docid": "35f6a486daef74e3b35fc30f83f9b655", "score": "0.5456116", "text": "func ReplacePercentages(text string) string {\n\ttext = PositivePercentageRegexp.ReplaceAllString(text, \" xpositivepercentx \")\n\ttext = NegativePercentageRegexp.ReplaceAllString(text, \" xnegativepercentx \")\n\n\treturn text\n}", "title": "" }, { "docid": "de90fbc923b69316c249a8177cf326b9", "score": "0.54534703", "text": "func f(value float64, precision int, envvar string, fixed bool) string {\n\tparts := strings.Split(strconv.FormatFloat(value, 'f', -1, 64), \".\")\n\tif !fixed && len(parts) > 1 {\n\t\tfor ; precision < len(parts[1]); precision += 1 {\n\t\t\tif parts[1][precision] == '0' {\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\n\tenvlang, ok := os.LookupEnv(envvar)\n\tif !ok {\n\t\tenvlang = \"en\"\n\t}\n\tlang := language.Make(envlang)\n\n\tformat := fmt.Sprintf(\"%%.%df\", precision)\n\treturn message.NewPrinter(lang).Sprintf(format, value)\n}", "title": "" }, { "docid": "c3f63798c8ef6b4f2ac4ba79a5c97b0f", "score": "0.5448763", "text": "func Greenf(format string, a ...interface{}) string {\n\treturn colType(Green(fmt.Sprintf(format, a...)))\n}", "title": "" }, { "docid": "f21cd865e5500ff7d0bf86bcfc81a21f", "score": "0.5433602", "text": "func FormatLog(f interface{}, v ...interface{}) string {\n\tvar msg string\n\tswitch f.(type) {\n\tcase string:\n\t\tmsg = f.(string)\n\t\tif len(v) == 0 {\n\t\t\treturn msg\n\t\t}\n\t\tif strings.Contains(msg, \"%\") && !strings.Contains(msg, \"%%\") {\n\t\t\t//format string\n\t\t} else {\n\t\t\t//do not contain format char\n\t\t\tmsg += strings.Repeat(\" %v\", len(v))\n\t\t}\n\tdefault:\n\t\tmsg = fmt.Sprint(f)\n\t\tif len(v) == 0 {\n\t\t\treturn msg\n\t\t}\n\t\tmsg += strings.Repeat(\" %v\", len(v))\n\t}\n\treturn fmt.Sprintf(msg, v...)\n}", "title": "" }, { "docid": "49896d1c9f130d29c3481d57226a8657", "score": "0.54286057", "text": "func (c *Configuration) Printf(format string, values ...interface{}) {\n\tout := c.Sprintf(format, values...)\n\tfmt.Print(out)\n}", "title": "" }, { "docid": "dcc13d7a8ef9b1835ce950f4e8823634", "score": "0.5413683", "text": "func Fprintf(w io.Writer, format string, a ...interface{}) (n int, err error) {\n\treturn fmt.Fprintf(w, format, a...)\n}", "title": "" }, { "docid": "d163d968c0b47cef2a3b417ca0d22843", "score": "0.5412443", "text": "func (node *FloatColType) Format(buf *bytes.Buffer, f FmtFlags) {\n\tbuf.WriteString(node.Name)\n\tif node.Prec > 0 {\n\t\tfmt.Fprintf(buf, \"(%d)\", node.Prec)\n\t}\n}", "title": "" }, { "docid": "6d5f8bf6ea8c7611cb31e6df0ff046be", "score": "0.54114485", "text": "func (sf *SliderFloatWidget) Labelf(format string, args ...any) *SliderFloatWidget {\n\treturn sf.Label(fmt.Sprintf(format, args...))\n}", "title": "" }, { "docid": "b611208f9857c4c38d5538b95fc17bfd", "score": "0.54044616", "text": "func (g *Glg) Printf(format string, val ...interface{}) error {\n\treturn g.out(PRINT, format, val...)\n}", "title": "" }, { "docid": "609e2e14ceffffbc6d9f03e85f8edf71", "score": "0.5385257", "text": "func myround(f float64, width, decimals int) string {\n\tformat := \"%\" + fmt.Sprintf(\"%d\", width) + \".\" + fmt.Sprintf(\"%d\", decimals) + \"f\"\n\treturn fmt.Sprintf(format, f)\n}", "title": "" }, { "docid": "e34697a2f8f91444a283da90402e425f", "score": "0.53818434", "text": "func str(f float32) string {\n\treturn strconv.FormatFloat(float64(f), 'g', -1, 32)\n}", "title": "" }, { "docid": "b5b679fe2e4f14c4e70cd1de3ed1b7bb", "score": "0.5379826", "text": "func (tp *TextPrinter) Fprintf(writer io.Writer, format string, args ...interface{}) (n int, err error) {\n\treturn fmt.Fprintf(writer, format, args...)\n}", "title": "" }, { "docid": "ef18c6e057cce2224ecb29a839194f8e", "score": "0.53662217", "text": "func Printf(str string, vars ...interface{}) string {\n\tif len(vars) > 0 {\n\t\treturn fmt.Sprintf(str, vars...)\n\t}\n\n\treturn str\n}", "title": "" }, { "docid": "12fb4817e9de13e426aea1576651d8a9", "score": "0.536377", "text": "func (f *Formatter) InitPercent(t language.Tag) {\n\tf.init(t, tagToPercent)\n}", "title": "" }, { "docid": "841045b1e1b66ec5288c2ce56c118e20", "score": "0.53614694", "text": "func Printf(format string, a ...interface{}) (int, error) {\n\treturn fmt.Print(compile(fmt.Sprintf(format, a...)))\n}", "title": "" }, { "docid": "7b64b45b4074efd4e9614970b72e48f4", "score": "0.5351835", "text": "func F(str string, arg ...interface{}) string {\r\n\treturn fmt.Sprintf(str, arg...)\r\n}", "title": "" }, { "docid": "e547b086840ee199082c507e99d3d4e4", "score": "0.5350528", "text": "func (p *Progress) Percentage() float64 {\n\tp.m.Lock()\n\tdefer p.m.Unlock()\n\treturn 100.0 * float64(p.current) / float64(p.total)\n}", "title": "" }, { "docid": "401ec4646f1e75c9a0de977ad48f8392", "score": "0.5342263", "text": "func (p *Progress) Percentage() float64 {\n\treturn float64(p.Status) / float64(p.Total)\n\n}", "title": "" }, { "docid": "19118404fc64b7333ee5188121090425", "score": "0.53418416", "text": "func Printf(format string, val ...interface{}) error {\n\treturn glg.out(PRINT, format, val...)\n}", "title": "" }, { "docid": "afaa17eb826b1d9310fcb51cc6bb0473", "score": "0.53331065", "text": "func Printf(format string, a ...interface{}) (int, error) {\n\treturn DefaultOutput.Print(fmt.Sprintf(format, a...))\n}", "title": "" }, { "docid": "fa4a962f41221b4a7047804528892d37", "score": "0.5308053", "text": "func (c *Cell) SetFloatWithFormat(n float64, format string) {\n\t// beauty the output when the float is small enough\n\tif n != 0 && n < 0.00001 {\n\t\tc.Value = strconv.FormatFloat(n, 'e', -1, 64)\n\t} else {\n\t\tc.Value = strconv.FormatFloat(n, 'f', -1, 64)\n\t}\n\tc.NumFmt = format\n\tc.formula = \"\"\n\tc.cellType = CellTypeNumeric\n}", "title": "" }, { "docid": "ff52e9433b59f3c06210b96c852546a2", "score": "0.53075224", "text": "func Greenf(format string, a ...interface{}) {\n\ts := fmt.Sprintf(format, a...)\n\tlog.Printf(\"%s%s%s%s\", bold, green, s, reset)\n}", "title": "" }, { "docid": "979354d350376cb2fad8e4427ea94fa0", "score": "0.5302415", "text": "func Printf(s string, i ...interface{}) {\n\tsingleton.Info(fmt.Sprintf(s, i...))\n}", "title": "" }, { "docid": "61d31000739c9569c12329951969d7cd", "score": "0.53000116", "text": "func (me *PrintfStyleFormatter) Format(s string) string {\n\tformatted := fmt.Sprintf(me.format, s)\n\n\treturn formatted\n}", "title": "" }, { "docid": "dbf955d4104119b07c77817f3df4e783", "score": "0.52946866", "text": "func Fprintf(w io.Writer, format string, a ...interface{}) {\n\tstr := fmt.Sprintf(format, a...)\n\t_, err := fmt.Fprint(w, ReplaceTag(str))\n\tsaveInternalError(err)\n\n\t// if isLikeInCmd {\n\t// \trenderColorCodeOnCmd(func() {\n\t// \t\t_, _ = fmt.Fprint(w, ReplaceTag(str))\n\t// \t})\n\t// } else {\n\t// \t_, _ = fmt.Fprint(w, ReplaceTag(str))\n\t// }\n}", "title": "" }, { "docid": "37da33c58a8bfc741fabf9abe0daafe5", "score": "0.5278926", "text": "func StrfTime(format string, t time.Time) string {\n\tlayout := \"\"\n\tlength := len(format)\n\tfor i := 0; i < length; i++ {\n\t\tif format[i] == '%' && i <= length-2 {\n\t\t\tif layoutCmd, ok := conversion[format[i+1:i+2]]; ok {\n\t\t\t\tlayout = layout + layoutCmd\n\t\t\t\ti++\n\t\t\t\tcontinue\n\t\t\t}\n\t\t}\n\t\tlayout = layout + format[i:i+1]\n\t}\n\treturn t.Format(layout)\n}", "title": "" }, { "docid": "fbd3efc9594434a20c84e3344d99f8a2", "score": "0.52771467", "text": "func CalculateTrackingPercent(totalHours string) (percentUtilization string, err error) {\n\tconvertedHours, convertErr := strconv.ParseFloat(totalHours, 64)\n\tif convertErr != nil {\n\t\tlog.Errorf(\"Cannot convert string to float64: %v\", convertErr)\n\t}\n\n\tif convertedHours < 0 {\n\t\thoursValueErr := errors.New(\"Total hours should be a positive number\")\n\t\tlog.Errorf(\"Total hours should be a positive number, provided %v\", convertedHours)\n\t\treturn \"\", hoursValueErr\n\t}\n\n\tvar fullFte float64 = 160\n\n\t// Calculate remaining percent to fullFte\n\tpercentUtil := (convertedHours) / (fullFte) * 100\n\tfmtTrackingPercent := fmt.Sprintf(\"%.2f%%\", percentUtil)\n\n\treturn fmtTrackingPercent, nil\n}", "title": "" }, { "docid": "1cceaf58cbb203c3e17cb212cbb3b22c", "score": "0.5271897", "text": "func (b Bitrate) Percent(n int) Bitrate {\n\t// operate on bits to keep precision\n\tb.BPS = b.BPS * (100 + n) / 100\n\treturn b\n}", "title": "" }, { "docid": "8d8c8eaf4ccfe33ff26a15857fe83b4d", "score": "0.527121", "text": "func (context *Context) Stringf(format string, args ...interface{}) string {\n\treturn strings.Join([]string{context.FieldsString(), fmt.Sprintf(format, args...)}, \" - \")\n}", "title": "" }, { "docid": "1720c0ecf8e770415390888422d1236f", "score": "0.5267501", "text": "func (hist *Strings) PrintWithPercent(width int) error {\n\tconst extra = 7 + 3 // len(percent), plus space between key and count, space between count and perc, space between perc and histogram, plus 1 to keep from final column\n\n\thist.finalize()\n\n\tif len(hist.items) > 0 {\n\t\tkeyLength := hist.widestKey\n\t\tif l := len(\"Key\"); keyLength < l {\n\t\t\tkeyLength = l\n\t\t}\n\t\tcountLength := len(strconv.FormatInt(int64(hist.widthCountMax), 10)) // width of the largest number\n\t\tif l := len(\"Count\"); countLength < l { // ensure long enough for \"Count\"\n\t\t\tcountLength = l\n\t\t}\n\t\tadjustedWidth := width - keyLength - countLength - extra\n\t\tif adjustedWidth < 1 {\n\t\t\treturn fmt.Errorf(\"cannot print with fewer than %d columns\", 1+width-adjustedWidth)\n\t\t}\n\t\tperc := 100 / float64(hist.addsTotal)\n\t\tfmt.Printf(\"%-*s %*s Percent (~%.3g per *)\\n\", keyLength, \"Key\", countLength, \"Count\", float64(hist.widthCountMax)/float64(adjustedWidth))\n\t\tfor _, i := range hist.items {\n\t\t\tw := adjustedWidth * i.count / hist.widthCountMax\n\t\t\tfmt.Printf(\"%-*s %*d % 7.2f %s\\n\", keyLength, i.key, countLength, i.count, (float64(i.count) * perc), strings.Repeat(\"*\", w))\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "0d93d92421421ec14cc449bb93bc6363", "score": "0.52608615", "text": "func sluggingPercent(singles float64, doubles float64, triples float64, homeRuns float64, atBats float64) float64 {\r\n\tvar temp float64 =float64((singles+2*doubles+3*triples+4*homeRuns)/atBats)\t\t\r\n\treturn(temp)\t\t//returns float so that the decimal is there and not thrown away\r\n}", "title": "" }, { "docid": "62be03f61e61adf003662d0a54d65638", "score": "0.5246444", "text": "func (e Err) Printf(format string, args ...interface{}) Err {\n\te.Message = fmt.Sprintf(format, args...)\n\treturn e\n}", "title": "" }, { "docid": "8c2849981852f136336789dfdb1f83b4", "score": "0.52441704", "text": "func (f Fmt) Printf(format string, a ...interface{}) (int, error) {\n\treturn fmt.Fprintf(f.w, format, a...)\n}", "title": "" }, { "docid": "b0db4edd47f47a6d3f56da176d2e70a6", "score": "0.52395636", "text": "func Finestf(format string, v ...interface{}) {\n\tif level <= FINEST {\n\t\tmsg := LogFormat{Level: FINEST, Msg: fmt.Sprintf(format, v...)}\n\t\tpublish(msg)\n\t}\n}", "title": "" }, { "docid": "3ec6a550746c67c27d21b7d7e6a78e81", "score": "0.5237888", "text": "func (rpw *ResourcePrinterWrapper) Fprintf(writer io.Writer, format string, args ...interface{}) (n int, err error) {\n\treturn 0, nil\n}", "title": "" }, { "docid": "8d93a4295cc5a9f05390fd6bb7258757", "score": "0.52334666", "text": "func (w *writer) Printf(format string, args ...interface{}) { fmt.Fprintf(w, format, args...) }", "title": "" }, { "docid": "0597cbd1893ec8d25faa77248c19cc94", "score": "0.5232305", "text": "func Printf(format string, v ...interface{}) {\n\tglobal.intLog(INFO, fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "96fec41f42e8b3c61248d4ba429a477c", "score": "0.52281404", "text": "func formatOpenMetricsFloat(f float64) string {\n\t// A few common cases hardcoded.\n\tswitch {\n\tcase f == 1:\n\t\treturn \"1.0\"\n\tcase f == 0:\n\t\treturn \"0.0\"\n\tcase f == -1:\n\t\treturn \"-1.0\"\n\tcase math.IsNaN(f):\n\t\treturn \"NaN\"\n\tcase math.IsInf(f, +1):\n\t\treturn \"+Inf\"\n\tcase math.IsInf(f, -1):\n\t\treturn \"-Inf\"\n\t}\n\ts := fmt.Sprint(f)\n\tif strings.ContainsAny(s, \"e.\") {\n\t\treturn s\n\t}\n\treturn s + \".0\"\n}", "title": "" }, { "docid": "10624c2b2b4564485a1316fade307b59", "score": "0.5222321", "text": "func (t *Output) Printf(msg string, a ...interface{}) {\n\tt.WriteString(fmt.Sprintf(msg, a...))\n}", "title": "" }, { "docid": "4edf2206898bee676cc451fd834c1f1a", "score": "0.5220809", "text": "func Textf(format string, v ...interface{}) {\n\tText(fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "5ffc1ca76c5fa3c5ce9611525a888ce6", "score": "0.5218868", "text": "func (speed Speed) Format(f fmt.State, c rune) { formatUnit(f, c, \"m/s\", speed, float64(speed)) }", "title": "" }, { "docid": "d3dcb70e99990ae977385a23c4c83311", "score": "0.52090883", "text": "func Warnf(format string, args ...interface{}) {\n\touter := fmt.Sprintf(format, args...)\n\twarning.Print(getCallerString(), outer)\n}", "title": "" }, { "docid": "456d24d9b35d6a8aa7bc6621bf1ab3b5", "score": "0.52012604", "text": "func Sgreenf(format string, a ...interface{}) string {\n\ts := fmt.Sprintf(format, a...)\n\treturn fmt.Sprintf(\"%s%s%s%s\", bold, green, s, reset)\n}", "title": "" }, { "docid": "8642408dcb89b2919e0a76be41284a6b", "score": "0.52002823", "text": "func (p *Peer) printStepf(format string, args ...interface{}) {\n\tevent := dispatcher.Event{Progress: &ops.ProgressEntry{Message: fmt.Sprintf(format, args...)}}\n\tp.dispatcher.Send(event)\n}", "title": "" }, { "docid": "7f18abecfc33e6c84efdbb4f6574fd9d", "score": "0.52002627", "text": "func (ctx *Context) SetStatFloat(name string) {\n\tctx.Table.SetCellFloat(ctx.Item.Name, ctx.Row, ctx.Stats.Float(name))\n}", "title": "" }, { "docid": "55f389d06be237c20b8489b82c4b0081", "score": "0.5191888", "text": "func Printf(format string, v ...interface{}) {\n\tjotter.Printf(format, v...)\n}", "title": "" }, { "docid": "3509e33e2bcba7559aad6e1359aee0f3", "score": "0.5190458", "text": "func (r *Response) Writef(format string, params ...interface{}) {\n\tr.Write(fmt.Sprintf(format, params...))\n}", "title": "" }, { "docid": "bf31bbd2552515f3faee6c85d21d9dad", "score": "0.5185246", "text": "func (f Float) String() string {\n\tsign := \"+\"\n\tif !f.sign {\n\t\tsign = \"-\"\n\t}\n\n\tvar whole *mathx.Int\n\tvar fraction *mathx.Int\n\n\tif f.exp <= 0 {\n\t\twhole = f.mantissa.Rsh(uint(-f.exp))\n\t\tfraction = f.mantissa.Sub(whole.Lsh(uint(-f.exp)))\n\t} else {\n\t\twhole = mathx.NewInt(0)\n\t\tfraction = f.mantissa\n\t}\n\n\twhole = f.mantissa.Rsh(uint(-f.exp))\n\tfraction = f.mantissa.Sub(whole.Lsh(uint(-f.exp)))\n\n\tdigits := \"\"\n\tfor fraction.Sign() != 0 {\n\t\tfraction = fraction.Mul64(10)\n\t\tdigit := fraction.Rsh(uint(-f.exp))\n\t\tfraction = fraction.Sub(digit.Lsh(uint(-f.exp)))\n\t\tdigits += digit.String()\n\t}\n\tif digits == \"\" {\n\t\tdigits = \"0\"\n\t}\n\treturn fmt.Sprintf(\"%s%s.%s\", sign, whole.String(), digits)\n}", "title": "" }, { "docid": "4b9e6728d42a4f9f8a14928cbb91e84f", "score": "0.517015", "text": "func sanitizeFormat(format string) string {\n\n\tprocessed_format := strings.Replace(strings.Replace(format, \"%\", \"%%\", -1), \"%%s\", \"%s\", -1)\n\t\n\treturn processed_format\n}", "title": "" }, { "docid": "99a3e2ea494999bd42eaa1892997d56b", "score": "0.5169096", "text": "func (r *Log) Printf(format string, a ...interface{}) {\n\tmsg := fmt.Sprintf(format, a...)\n\tr.Write([]byte(msg))\n}", "title": "" }, { "docid": "d9c21cf76b96c1ef3a2f1c4cf9c2df7e", "score": "0.516903", "text": "func (pass *Pass) Reportf(pos *ast.Position, format string, args ...interface{}) {\n\tmsg := fmt.Sprintf(format, args...)\n\tpass.Report(&Diagnostic{Pos: pos, Message: msg})\n}", "title": "" }, { "docid": "93fff2d4ced3b37fc197a2f01eb3af08", "score": "0.5164163", "text": "func (cf *CommonFunctions) GetPercentOfCompletion(current int, length int) float64 {\n\treturn float64(current) / float64(length) * 100\n}", "title": "" }, { "docid": "3ef7ffe60fb3d190548ea75f9d706be1", "score": "0.5161696", "text": "func (logger *Logger) Printf(format string, v ...interface{}) {\n\tlogger.Output(2, fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "ac338ce5482b21cdfce1ab6c23f20245", "score": "0.5148238", "text": "func beautyUsage(a, b float64) (float64, string) {\n\tif b == 0 {\n\t\treturn 0, \"-\"\n\t}\n\tres := a / b\n\treturn res, fmt.Sprintf(\"%.1f%%\", res*100)\n}", "title": "" }, { "docid": "889aee5ca8219575e6e6f7e6ea54717f", "score": "0.5145735", "text": "func (r Rate) Format(thousandsSep, decimalSep rune, precision int) string {\n\treturn float.Format(float64(r), thousandsSep, decimalSep, precision, true)\n}", "title": "" }, { "docid": "28db96068b79d4efc1310ab12c47f43c", "score": "0.5145309", "text": "func drawFloat(ctx *canvas.Context, f, x, y float64, s string) {\n\tctx.Push()\n\n\tctx.InvertY() //flip y value to draw string\n\tctx.DrawString(s+\": \"+strconv.FormatFloat(f, 'f', 2, 64), x, y)\n\n\tctx.Pop()\n}", "title": "" }, { "docid": "50d1698b769d2c6fd272e2afd1b0a7ff", "score": "0.51435155", "text": "func Printf(format string, values ...interface{}) {\n\tif Quiet {\n\t\tlogBuffer = append(logBuffer, fmt.Sprintf(format, values...))\n\t\treturn\n\t}\n\tlog.Printf(format, values...)\n}", "title": "" }, { "docid": "2897903ad016412452cbb11db0ff7a62", "score": "0.513649", "text": "func Neverf(format string, v ...interface{}) {\n\tFunc(2, fmt.Sprintf(format, v...))\n}", "title": "" }, { "docid": "aff71427e72223b59b11f641aa36941a", "score": "0.51171494", "text": "func floatToString(nFloat float64) string {\r\n\treturn strconv.FormatFloat(nFloat, 'f', -1, 64)\r\n}", "title": "" } ]
6a3fa80670bf6869f14d8d974fb4ad0b
BatchV1beta1 mocks base method
[ { "docid": "aa54711b4afa5f76c56883286d9c47cf", "score": "0.6870301", "text": "func (m *MockInterface) BatchV1beta1() v1beta13.BatchV1beta1Interface {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BatchV1beta1\")\n\tret0, _ := ret[0].(v1beta13.BatchV1beta1Interface)\n\treturn ret0\n}", "title": "" } ]
[ { "docid": "acf179c5a0a658dfab0a5251ce3f7f3d", "score": "0.76533556", "text": "func (m *MockInterface) Batch() v13.BatchV1Interface {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Batch\")\n\tret0, _ := ret[0].(v13.BatchV1Interface)\n\treturn ret0\n}", "title": "" }, { "docid": "a87730b2f07450d70195f03480049934", "score": "0.74535996", "text": "func (m *MockInterface) BatchV1() v13.BatchV1Interface {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BatchV1\")\n\tret0, _ := ret[0].(v13.BatchV1Interface)\n\treturn ret0\n}", "title": "" }, { "docid": "1288bbcb404de657d2b6b8e336a99028", "score": "0.7233021", "text": "func (m *MockInterface) BatchV2alpha1() v2alpha1.BatchV2alpha1Interface {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BatchV2alpha1\")\n\tret0, _ := ret[0].(v2alpha1.BatchV2alpha1Interface)\n\treturn ret0\n}", "title": "" }, { "docid": "13dd6ebec8b413020f6f0740f710cc5a", "score": "0.6400216", "text": "func (m *MockSessionManager) SetBatch(n int) {\n\tm.ctrl.Call(m, \"SetBatch\", n)\n}", "title": "" }, { "docid": "0a9f42a49552a61f3686a19406094a48", "score": "0.63671803", "text": "func mockBatchTRCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = TRC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = TRC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "cb70c7a5aea7fae3ed28cf45cbb05ab4", "score": "0.6337376", "text": "func mockBatchRCK(t testing.TB) *BatchRCK {\n\tmockBatch := NewBatchRCK(mockBatchRCKHeader())\n\tmockBatch.AddEntry(mockRCKEntryDetail())\n\trequire.NoError(t, mockBatch.Create())\n\treturn mockBatch\n}", "title": "" }, { "docid": "de0ebfd4b3ad2ce0115e1798c1e1eb32", "score": "0.6335666", "text": "func (m *MockKeyDAO) BatchCreate(arg0 int) (int, *business.Error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BatchCreate\", arg0)\n\tret0, _ := ret[0].(int)\n\tret1, _ := ret[1].(*business.Error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f384d64b593e0fa2def7d0f41aa076c1", "score": "0.6263759", "text": "func mockBatchBOCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = BOC\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = BOC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "c739c02dc8910b6f085c8b0ebf2bc443", "score": "0.62425184", "text": "func (m *MockClient) SendBatch(arg0 context.Context, arg1 []hrpc.Call) ([]hrpc.RPCResult, bool) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendBatch\", arg0, arg1)\n\tret0, _ := ret[0].([]hrpc.RPCResult)\n\tret1, _ := ret[1].(bool)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "c7c2d67a12166f552c710e3147f513a7", "score": "0.6176472", "text": "func mockBatchTRC(t testing.TB) *BatchTRC {\n\tmockBatch := NewBatchTRC(mockBatchTRCHeader())\n\tmockBatch.AddEntry(mockTRCEntryDetail())\n\trequire.NoError(t, mockBatch.Create())\n\treturn mockBatch\n}", "title": "" }, { "docid": "f17f872a2a7aabb9404231aead062d95", "score": "0.6172971", "text": "func (a *MocksAndTestsApiService) MockBatchUpdate(ctx context.Context, body MockBatchUpdateParams) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Post\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\t\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/api/v1/tests/mockBatchUpdate\"\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = &body\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v ErrorMessage\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 401 {\n\t\t\tvar v BadCredentialsError\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 403 {\n\t\t\tvar v ErrorMessage\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v ErrorMessage\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 422 {\n\t\t\tvar v ErrorMessage\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 500 {\n\t\t\tvar v ErrorMessage\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "title": "" }, { "docid": "10aa4bb4ff88096d37371b15f1dc2dee", "score": "0.61628693", "text": "func mockBatchARCHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = ARC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = ARC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "81747f057aa5b6c7ea391de052d3b803", "score": "0.61608946", "text": "func testBatchTRCCreate(t testing.TB) {\n\tmockBatch := mockBatchTRC(t)\n\tif err := mockBatch.Create(); err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "91f551543f1e172f8b66337cd2de2752", "score": "0.6158396", "text": "func testBatchRCKCreate(t testing.TB) {\n\tmockBatch := mockBatchRCK(t)\n\tif err := mockBatch.Create(); err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "c49cf8e7d12f427814c31ee3582513b3", "score": "0.61200213", "text": "func testBatchBOCCreate(t testing.TB) {\n\tmockBatch := mockBatchBOC(t)\n\tif err := mockBatch.Create(); err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "c93794a4302ece75f22d1b1c6ae6514b", "score": "0.61158365", "text": "func (m *MockTransactionalStore) Multi(arg0 *state.TransactionalStateRequest) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Multi\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "62d8d79b51e0ccc1759f6bf6bb354e15", "score": "0.60839206", "text": "func (m *mockInternalClient) Batch(\n\tctx context.Context, in *roachpb.BatchRequest, opts ...grpc.CallOption,\n) (*roachpb.BatchResponse, error) {\n\tsp := m.tr.StartSpan(\"mock\", tracing.WithForceRealSpan())\n\tdefer sp.Finish()\n\tsp.SetVerbose(true)\n\tctx = tracing.ContextWithSpan(ctx, sp)\n\n\tlog.Eventf(ctx, \"mockInternalClient processing batch\")\n\tbr := &roachpb.BatchResponse{}\n\tbr.Error = m.pErr\n\tif rec := sp.GetRecording(); rec != nil {\n\t\tbr.CollectedSpans = append(br.CollectedSpans, rec...)\n\t}\n\treturn br, nil\n}", "title": "" }, { "docid": "dbaab1ca3cac4770d13059f0b476d0c6", "score": "0.6075489", "text": "func (m *MockDatabase) Multiple(ctx context.Context, query string, args ...interface{}) (database.Rows, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, query}\n\tfor _, a := range args {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"Multiple\", varargs...)\n\tret0, _ := ret[0].(database.Rows)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "268aa909f9f08437e3bc1d6e9f862c18", "score": "0.60140413", "text": "func TestBatchBOCHeader(t *testing.T) {\n\ttestBatchBOCHeader(t)\n}", "title": "" }, { "docid": "5a1209b978101a82eefdfd91aae7e955", "score": "0.59835774", "text": "func testIATBatchBuild(t testing.TB) {\n\tmockBatch := IATBatch{}\n\tmockBatch.SetHeader(mockIATBatchHeaderFF())\n\n\terr := mockBatch.build()\n\tif !base.Match(err, ErrBatchNoEntries) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "1178805d49fe2a9550f7fd91f04c14b0", "score": "0.5970651", "text": "func mockBatchBOC(t testing.TB) *BatchBOC {\n\tmockBatch := NewBatchBOC(mockBatchBOCHeader())\n\tmockBatch.AddEntry(mockBOCEntryDetail())\n\trequire.NoError(t, mockBatch.Create())\n\treturn mockBatch\n}", "title": "" }, { "docid": "0143515df18fad871f9faa6a1f5e3103", "score": "0.5929077", "text": "func mockBatchRCKHeader() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = RCK\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "5f99c68f5a95c2dfadbe54b52c45bbb6", "score": "0.5922876", "text": "func (_m *MockAdminOptions) FetchBatchOpPoolSize() int {\n\tret := _m.ctrl.Call(_m, \"FetchBatchOpPoolSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "2d6ba90cc63fc4bf15d5b4480dadba34", "score": "0.5840062", "text": "func (_m *MockOptions) FetchBatchOpPoolSize() int {\n\tret := _m.ctrl.Call(_m, \"FetchBatchOpPoolSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "dbf2152733b73ba45a8e3d7bb3ecfe52", "score": "0.5835427", "text": "func (m *MockManager) QueryAll() ([]Instance, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"QueryAll\")\n\tret0, _ := ret[0].([]Instance)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "dd39e76362786ced51892118f2d83766", "score": "0.58267146", "text": "func (_m *MockAdminOptions) FetchBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"FetchBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "76cddc5c52b5578bf5a68c6b48e0f73d", "score": "0.581611", "text": "func TestBatch(t *testing.T) {\n\ttests := 32\n\tsize := 32768\n\tsum := \"e11360251d1173650cdcd20f111d8f1ca2e412f572e8b36a4dc067121c1799b8\"\n\tsumb, _ := hex.DecodeString(sum)\n\n\t// test with 4 workers and with one per request\n\tfor _, workerCount := range []int{4, 0} {\n\t\t// create requests\n\t\tdone := make(chan *Response, 0)\n\t\treqs := make([]*Request, tests)\n\t\tfor i := 0; i < len(reqs); i++ {\n\t\t\treqs[i], _ = NewRequest(ts.URL + fmt.Sprintf(\"/request_%d?size=%d&sleep=10\", i, size))\n\t\t\treqs[i].Label = fmt.Sprintf(\"Test %d\", i+1)\n\t\t\treqs[i].Filename = fmt.Sprintf(\".testBatch.%d\", i+1)\n\t\t\treqs[i].NotifyOnClose = done\n\t\t\tif err := reqs[i].SetChecksum(\"sha256\", sumb); err != nil {\n\t\t\t\tt.Fatal(err.Error())\n\t\t\t}\n\t\t}\n\n\t\t// batch run\n\t\tresponses := DefaultClient.DoBatch(workerCount, reqs...)\n\n\t\t// listen for responses\n\t\tfor i := 0; i < len(reqs); {\n\t\t\tselect {\n\t\t\tcase <-responses:\n\t\t\t\t// swallow responses channel for newly initiated responses\n\n\t\t\tcase resp := <-done:\n\t\t\t\ttestComplete(t, resp)\n\n\t\t\t\t// handle errors\n\t\t\t\tif resp.Error != nil {\n\t\t\t\t\tt.Errorf(\"%s: %v\", resp.Filename, resp.Error)\n\t\t\t\t}\n\n\t\t\t\t// remove test file\n\t\t\t\tif resp.IsComplete() && resp.Error == nil {\n\t\t\t\t\tos.Remove(resp.Filename)\n\t\t\t\t}\n\t\t\t\ti++\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "3193758f6f949bc54f7c7d71255178ed", "score": "0.5793902", "text": "func testBatchPayments(t *testing.T, c *TestContext) {\n\tbatchContent, err := ioutil.ReadFile(\"../assets/payment_batch.json\")\n\tif err != nil {\n\t\tt.Errorf(\"Impossible de lire le ficher de batch\")\n\t\treturn\n\t}\n\ttcc := []TestCase{\n\t\t*c.AdminCheckTestCase, // 0 : user unauthorized\n\t\t{\n\t\t\tToken: c.Config.Users.Admin.Token,\n\t\t\tSent: []byte(`{\"Payment\":[{\"CommitmentYear\":2012,\"CommitmentCode\":\"IRIS \"}]}`),\n\t\t\tRespContains: []string{\"Batch de Paiements, requête : \"},\n\t\t\tStatusCode: http.StatusInternalServerError}, // 1 : validation error\n\t\t{\n\t\t\tToken: c.Config.Users.Admin.Token,\n\t\t\tSent: batchContent,\n\t\t\tRespContains: []string{\"Batch de Paiements importé\"},\n\t\t\tStatusCode: http.StatusOK}, // 2 : ok\n\t}\n\tf := func(tc TestCase) *httpexpect.Response {\n\t\treturn c.E.POST(\"/api/payments\").WithBytes(tc.Sent).\n\t\t\tWithHeader(\"Authorization\", \"Bearer \"+tc.Token).Expect()\n\t}\n\tfor _, r := range chkFactory(tcc, f, \"BatchPayment\") {\n\t\tt.Error(r)\n\t}\n\t// GelAllTest checks if data are correctly analyzed\n}", "title": "" }, { "docid": "1999031d552964969aa5c0d3191dc359", "score": "0.57802796", "text": "func (_m *MockConfig) TcertBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"TcertBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "8ea1f5962688ddaab254af096e66b3ca", "score": "0.57398987", "text": "func (_m *MockOptions) FetchBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"FetchBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "45d7b042afadebc64e2e359d80db6b84", "score": "0.5699549", "text": "func (_m *MockAdminOptions) FetchSeriesBlocksBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"FetchSeriesBlocksBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "0f87c15e288fa3af7fc52411801d953e", "score": "0.5696016", "text": "func (m *MockHistoryManager) ReadHistoryBranchByBatch(request *ReadHistoryBranchRequest) (*ReadHistoryBranchByBatchResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ReadHistoryBranchByBatch\", request)\n\tret0, _ := ret[0].(*ReadHistoryBranchByBatchResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "304858c574d6e887c9873ae1d52598a9", "score": "0.5681077", "text": "func testBatchBOCAmount(t testing.TB) {\n\tmockBatch := mockBatchBOC(t)\n\tmockBatch.Entries[0].Amount = 2500001\n\terr := mockBatch.Create()\n\tif !base.Match(err, NewErrBatchAmount(2500001, 2500000)) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "dc2a148787371c90a1f82abf63c2f904", "score": "0.5680221", "text": "func (_m *MockAdminOptions) FetchSeriesBlocksBatchTimeout() time.Duration {\n\tret := _m.ctrl.Call(_m, \"FetchSeriesBlocksBatchTimeout\")\n\tret0, _ := ret[0].(time.Duration)\n\treturn ret0\n}", "title": "" }, { "docid": "c5752bf0ca9d30be34c8cafd62c97b80", "score": "0.5676772", "text": "func (m *MockQuery) All(result interface{}) error {\n\tret := m.ctrl.Call(m, \"All\", result)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "835deac6d89aa3f6d8a0020866d82e9e", "score": "0.5658789", "text": "func TestManyBatches(t *testing.T) {\n\tinput := CreateTestEnv(t)\n\tctx := input.Context\n\tvar (\n\t\tnow = time.Now().UTC()\n\t\tmySender, _ = sdk.AccAddressFromBech32(\"cosmos1ahx7f8wyertuus9r20284ej0asrs085case3kn\")\n\t\tmyReceiver = \"0xd041c41EA1bf0F006ADBb6d2c9ef9D425dE5eaD7\"\n\t\ttokenContractAddr1 = \"0x429881672B9AE42b8EbA0E26cD9C73711b891Ca5\"\n\t\ttokenContractAddr2 = \"0xF815240800ddf3E0be80e0d848B13ecaa504BF37\"\n\t\ttokenContractAddr3 = \"0xd086dDA7BccEB70e35064f540d07E4baED142cB3\"\n\t\ttokenContractAddr4 = \"0x384981B9d133701c4bD445F77bF61C3d80e79D46\"\n\t\ttotalCoins, _ = sdk.NewIntFromString(\"1500000000000000000000000\")\n\t\toneEth, _ = sdk.NewIntFromString(\"1000000000000000000\")\n\t\ttoken1, err1 = types.NewInternalERC20Token(totalCoins, tokenContractAddr1)\n\t\ttoken2, err2 = types.NewInternalERC20Token(totalCoins, tokenContractAddr2)\n\t\ttoken3, err3 = types.NewInternalERC20Token(totalCoins, tokenContractAddr3)\n\t\ttoken4, err4 = types.NewInternalERC20Token(totalCoins, tokenContractAddr4)\n\t\tallVouchers = sdk.NewCoins(\n\t\t\ttoken1.GravityCoin(),\n\t\t\ttoken2.GravityCoin(),\n\t\t\ttoken3.GravityCoin(),\n\t\t\ttoken4.GravityCoin(),\n\t\t)\n\t)\n\trequire.NoError(t, err1)\n\trequire.NoError(t, err2)\n\trequire.NoError(t, err3)\n\trequire.NoError(t, err4)\n\treceiver, err := types.NewEthAddress(myReceiver)\n\trequire.NoError(t, err)\n\n\t// mint vouchers first\n\trequire.NoError(t, input.BankKeeper.MintCoins(ctx, types.ModuleName, allVouchers))\n\t// set senders balance\n\tinput.AccountKeeper.NewAccountWithAddress(ctx, mySender)\n\trequire.NoError(t, input.BankKeeper.SetBalances(ctx, mySender, allVouchers))\n\n\t// CREATE FIRST BATCH\n\t// ==================\n\n\ttokens := [4]string{tokenContractAddr1, tokenContractAddr2, tokenContractAddr3, tokenContractAddr4}\n\n\tfor _, contract := range tokens {\n\t\tfor v := 1; v < 500; v++ {\n\t\t\tvAsSDKInt := sdk.NewIntFromUint64(uint64(v))\n\t\t\tamountToken, err := types.NewInternalERC20Token(oneEth.Mul(vAsSDKInt), contract)\n\t\t\trequire.NoError(t, err)\n\t\t\tamount := amountToken.GravityCoin()\n\t\t\tfeeToken, err := types.NewInternalERC20Token(oneEth.Mul(vAsSDKInt), contract)\n\t\t\trequire.NoError(t, err)\n\t\t\tfee := feeToken.GravityCoin()\n\n\t\t\t_, err = input.GravityKeeper.AddToOutgoingPool(ctx, mySender, *receiver, amount, fee)\n\t\t\trequire.NoError(t, err)\n\t\t}\n\t}\n\n\t// when\n\tctx = ctx.WithBlockTime(now)\n\n\tvar batches []types.OutgoingTxBatch\n\tfor _, contract := range tokens {\n\t\tcontractAddr, err := types.NewEthAddress(contract)\n\t\trequire.NoError(t, err)\n\t\tfor v := 1; v < 5; v++ {\n\t\t\tbatch, err := input.GravityKeeper.BuildOutgoingTXBatch(ctx, *contractAddr, 100)\n\t\t\tbatches = append(batches, *batch.ToExternal())\n\t\t\trequire.NoError(t, err)\n\t\t}\n\t}\n\tfor _, batch := range batches {\n\t\t// then batch is persisted\n\t\tcontractAddr, err := types.NewEthAddress(batch.TokenContract)\n\t\trequire.NoError(t, err)\n\t\tgotBatch := input.GravityKeeper.GetOutgoingTXBatch(ctx, *contractAddr, batch.BatchNonce)\n\t\trequire.NotNil(t, gotBatch)\n\t}\n\n\t// EXECUTE BOTH BATCHES\n\t// =================================\n\n\t// shuffle batches to simulate out of order execution on Ethereum\n\trand.Seed(time.Now().UnixNano())\n\trand.Shuffle(len(batches), func(i, j int) { batches[i], batches[j] = batches[j], batches[i] })\n\n\t// Execute the batches, if there are any problems OutgoingTxBatchExecuted will panic\n\tfor _, batch := range batches {\n\t\tcontractAddr, err := types.NewEthAddress(batch.TokenContract)\n\t\trequire.NoError(t, err)\n\t\tgotBatch := input.GravityKeeper.GetOutgoingTXBatch(ctx, *contractAddr, batch.BatchNonce)\n\t\t// we may have already deleted some of the batches in this list by executing later ones\n\t\tif gotBatch != nil {\n\t\t\tinput.GravityKeeper.OutgoingTxBatchExecuted(ctx, *contractAddr, batch.BatchNonce)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "e838a8954dbd7c913b7fa1b50997ac71", "score": "0.56512505", "text": "func (m *MockOFEntryOperations) ModifyAll(arg0 []openflow.Flow) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"ModifyAll\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7b4e90f67fa920c06534982ee94dbbb3", "score": "0.5645178", "text": "func TestIATBatchCreate(t *testing.T) {\n\ttestIATBatchCreate(t)\n}", "title": "" }, { "docid": "a5a042f7e1c494d0a03667b830a89c26", "score": "0.5638887", "text": "func (m *MockMeshGroupClient) BaseClient() clients.ResourceClient {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BaseClient\")\n\tret0, _ := ret[0].(clients.ResourceClient)\n\treturn ret0\n}", "title": "" }, { "docid": "8f8a39003a84d75c3df6024c483ac1b9", "score": "0.5616575", "text": "func TestBatchRCKCreate(t *testing.T) {\n\ttestBatchRCKCreate(t)\n}", "title": "" }, { "docid": "512f6ebf344d8f39f29184108ddedc53", "score": "0.5614576", "text": "func TestIATBatchBuild(t *testing.T) {\n\ttestIATBatchBuild(t)\n}", "title": "" }, { "docid": "985721c083ed75557ff8ea9d47ea575b", "score": "0.56087756", "text": "func (m *MockCacherClient) All(arg0 context.Context, arg1 *cacher.Empty, arg2 ...grpc.CallOption) (cacher.Cacher_AllClient, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0, arg1}\n\tfor _, a := range arg2 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"All\", varargs...)\n\tret0, _ := ret[0].(cacher.Cacher_AllClient)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "d3d7eb2bb3a9f62008879f7728e87365", "score": "0.560731", "text": "func (m *MockIndexer) List() []interface{} {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"List\")\n\tret0, _ := ret[0].([]interface{})\n\treturn ret0\n}", "title": "" }, { "docid": "5d0c7d126eed5b278bb22c82d1c9a064", "score": "0.5604463", "text": "func TestBatchBOCCreate(t *testing.T) {\n\ttestBatchBOCCreate(t)\n}", "title": "" }, { "docid": "caca9302f3fc22812cea809c0645323f", "score": "0.56006026", "text": "func (m *MockPipelineServiceServer) PipelineBatchCreate(arg0 context.Context, arg1 *pb.PipelineBatchCreateRequest) (*pb.PipelineBatchCreateResponse, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"PipelineBatchCreate\", arg0, arg1)\n\tret0, _ := ret[0].(*pb.PipelineBatchCreateResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "02eceb839412d17ea4293bd7b235bee8", "score": "0.56000984", "text": "func mockBatchARCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = ARC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = ARC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "f34fa4eb7859ebe9dfc239b3b69bc2b8", "score": "0.5599938", "text": "func (m *MockManager) Query(instanceIDs []string) ([]Instance, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Query\", instanceIDs)\n\tret0, _ := ret[0].([]Instance)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5924fcfc4d4b8f6e30ebe1f6ca70953b", "score": "0.55955744", "text": "func TestSendBatch(t *testing.T) {\n\thttpmock.Activate()\n\tdefer httpmock.DeactivateAndReset()\n\n\tt.Log(\"a fake batch of slack messages\")\n\tmsgs := []slackMessage{\n\t\tslackMessage{\n\t\t\tChannel: \"#channelA\",\n\t\t\tIcon: \":fire:\",\n\t\t\tUsername: \"fire\",\n\t\t\tText: \"All your schools are belong to us\",\n\t\t},\n\t\tslackMessage{\n\t\t\tChannel: \"#channelB\",\n\t\t\tIcon: \":fire:\",\n\t\t\tUsername: \":fire:\",\n\t\t\tText: \"All your apps are belong to us\",\n\t\t},\n\t\tslackMessage{\n\t\t\tChannel: \"#notification-catcher\",\n\t\t\tIcon: \":fire:\",\n\t\t\tUsername: \":fire:\",\n\t\t\tText: \"All your monies are belong to us\",\n\t\t},\n\t}\n\tmsgBatches := [][]slackMessage{\n\t\t[]slackMessage{msgs[0], msgs[1]},\n\t\t[]slackMessage{msgs[2]},\n\t}\n\n\tbatch := [][]byte{}\n\tfor _, msg := range msgBatches {\n\t\tenc, err := json.Marshal(msg)\n\t\tassert.NoError(t, err)\n\n\t\tbatch = append(batch, enc)\n\t}\n\n\tmessagesReceived := 0\n\thttpmock.RegisterResponder(\"POST\", mockURL,\n\t\tfunc(req *http.Request) (*http.Response, error) {\n\t\t\tt.Log(\"Verify expected headers\")\n\t\t\tassert.Equal(t, \"application/json\", req.Header[\"Content-Type\"][0])\n\n\t\t\tt.Log(\"Verify expected JSON body\")\n\t\t\tdecoder := json.NewDecoder(req.Body)\n\t\t\tvar msg slackMessage\n\t\t\terr := decoder.Decode(&msg)\n\t\t\tassert.NoError(t, err)\n\n\t\t\toriMsg := msgs[messagesReceived]\n\t\t\tassert.Equal(t, oriMsg.Text, msg.Text)\n\t\t\tassert.Equal(t, oriMsg.Channel, msg.Channel)\n\t\t\tassert.Equal(t, oriMsg.Icon, msg.Icon)\n\t\t\tassert.Equal(t, oriMsg.Username, msg.Username)\n\t\t\tassert.Equal(t, \"\", msg.Parse)\n\n\t\t\tresp, err := httpmock.NewJsonResponse(200, nil)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err) // failure in test mocks\n\t\t\t}\n\t\t\tmessagesReceived++\n\t\t\treturn resp, nil\n\t\t},\n\t)\n\n\tsender := newSlackOutput(\"test\", mockURL, 1, 1)\n\tsender.retryLimit = 3\n\terr := sender.SendBatch(batch, \"all\")\n\tassert.NoError(t, err)\n\tassert.Equal(t, 3, messagesReceived)\n}", "title": "" }, { "docid": "5b916866f3cb0c790c3d0b36acbda363", "score": "0.5592771", "text": "func TestBatchTRCHeader(t *testing.T) {\n\ttestBatchTRCHeader(t)\n}", "title": "" }, { "docid": "f17ce1e994529158954948ff4c4bf97b", "score": "0.5587765", "text": "func (m *MockIMarket) DealsBatchImportData(arg0 context.Context, arg1 market.ImportDataRefs) ([]*market.ImportDataResult, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"DealsBatchImportData\", arg0, arg1)\n\tret0, _ := ret[0].([]*market.ImportDataResult)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5a0e9a42f251cc65cce647bd189323d8", "score": "0.5584817", "text": "func mockBatchBOCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = BOC\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "0544c7046b0a789e6c73414c934bef19", "score": "0.5580558", "text": "func (m *MockProcessingQueueCollection) Merge(arg0 []ProcessingQueue) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Merge\", arg0)\n}", "title": "" }, { "docid": "a2623e748df31d0935b7472dc25fc336", "score": "0.55797714", "text": "func mockBatchTRCHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = TRC\n\tbh.CompanyName = \"Payee Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = TRC\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "2da86296ed6ae1f16dd59b64a1c25576", "score": "0.557325", "text": "func (m *MockBeerRepository) List(arg0 context.Context) ([]bshop.Beer, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"List\", arg0)\n\tret0, _ := ret[0].([]bshop.Beer)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "641afd1ed1523777d43d24eded9343e5", "score": "0.55732197", "text": "func testBatchBOCHeader(t testing.TB) {\n\tbatch, _ := NewBatch(mockBatchBOCHeader())\n\terr, ok := batch.(*BatchBOC)\n\tif !ok {\n\t\tt.Errorf(\"Expecting BatchBOC got %T\", err)\n\t}\n}", "title": "" }, { "docid": "5030012902baae1fcbde8c144184e9db", "score": "0.5569194", "text": "func (_m *MockAdminOptions) FetchSeriesBlocksBatchConcurrency() int {\n\tret := _m.ctrl.Call(_m, \"FetchSeriesBlocksBatchConcurrency\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "219c8406710f9034fbb40e5fc18102d3", "score": "0.5547336", "text": "func (m *MockInterface) StorageV1beta1() v1beta111.StorageV1beta1Interface {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"StorageV1beta1\")\n\tret0, _ := ret[0].(v1beta111.StorageV1beta1Interface)\n\treturn ret0\n}", "title": "" }, { "docid": "69c3ce7f47013cabc374523b58f596ce", "score": "0.5542013", "text": "func TestBatchBOCAmount(t *testing.T) {\n\ttestBatchBOCAmount(t)\n}", "title": "" }, { "docid": "34e317b2d1b74406f3506dad14ecbd1c", "score": "0.5526508", "text": "func (b batcherTestCase) Batcher() *Batcher {\n\tbatcher := NewBatcher(b.BatchSize)\n\tfor i := 0; i < b.ItemCount; i++ {\n\t\tbatcher.Add(&Downloadable{})\n\t}\n\n\tif b.ShouldExit {\n\t\tbatcher.Exit()\n\t}\n\n\treturn batcher\n}", "title": "" }, { "docid": "89a64f56c4b7298c408bfc2c862fcf27", "score": "0.55162996", "text": "func testBatchARCCreate(t testing.TB) {\n\tmockBatch := mockBatchARC(t)\n\tif err := mockBatch.Create(); err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "ee94eec5d0760865c4daefc685c8d2f2", "score": "0.55134", "text": "func (m *MockMultiReaderIteratorArrayPool) Put(iters []MultiReaderIterator) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Put\", iters)\n}", "title": "" }, { "docid": "520dfecfd33bc3dd755d43e0a4586a08", "score": "0.5509426", "text": "func testBatchRCKAmount(t testing.TB) {\n\tmockBatch := mockBatchRCK(t)\n\tmockBatch.Entries[0].Amount = 250001\n\terr := mockBatch.Create()\n\tif !base.Match(err, NewErrBatchAmount(250001, 250000)) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "5fcee6ba2ae9de0967b7038d36024414", "score": "0.55031574", "text": "func (m *MockStatsClient) GetAll(ctx context.Context, in *GetAllReq, opts ...grpc.CallOption) (*GetAllResp, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"GetAll\", varargs...)\n\tret0, _ := ret[0].(*GetAllResp)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9ea7f1964e39199da469091eff41eac1", "score": "0.54964495", "text": "func (m *MockClient) UpdateAlertGrouping(data *Data) error {\n m.ctrl.T.Helper()\n ret := m.ctrl.Call(m, \"UpdateAlertGrouping\", data)\n ret0, _ := ret[0].(error)\n return ret0\n}", "title": "" }, { "docid": "ba2ebf421c9d55f086f57cf2dca57fa4", "score": "0.5494972", "text": "func (_m *MockAdminOptions) WriteBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"WriteBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "83819b9b774ffc8f39f47ca1a998ebbe", "score": "0.5492958", "text": "func (m *MockMeshWorkloadClient) DeleteAllOfMeshWorkload(arg0 context.Context, arg1 ...client.DeleteAllOfOption) error {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0}\n\tfor _, a := range arg1 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"DeleteAllOfMeshWorkload\", varargs...)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "bab023a32067d45ac45ace5704797cd3", "score": "0.5486351", "text": "func testBatchTRCHeader(t testing.TB) {\n\tbatch, _ := NewBatch(mockBatchTRCHeader())\n\terr, ok := batch.(*BatchTRC)\n\tif !ok {\n\t\tt.Errorf(\"Expecting BatchTRC got %T\", err)\n\t}\n}", "title": "" }, { "docid": "135f6f5de4824df92679fa4b36589672", "score": "0.5484335", "text": "func (m *MockPipelineServiceClient) PipelineBatchCreate(ctx context.Context, in *pb.PipelineBatchCreateRequest, opts ...grpc.CallOption) (*pb.PipelineBatchCreateResponse, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"PipelineBatchCreate\", varargs...)\n\tret0, _ := ret[0].(*pb.PipelineBatchCreateResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "6637bf8f943f9ada36694ff47ac9fe07", "score": "0.5482567", "text": "func mockBatchRCKHeaderCredit() *BatchHeader {\n\tbh := NewBatchHeader()\n\tbh.ServiceClassCode = DebitsOnly\n\tbh.StandardEntryClassCode = RCK\n\tbh.CompanyName = \"Company Name\"\n\tbh.CompanyIdentification = \"121042882\"\n\tbh.CompanyEntryDescription = \"REDEPCHECK\"\n\tbh.ODFIIdentification = \"12104288\"\n\treturn bh\n}", "title": "" }, { "docid": "8faf6be30b95cdd5e39329b3e94467ed", "score": "0.54822147", "text": "func (m *MockMultiReaderIteratorArrayPool) Init() {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Init\")\n}", "title": "" }, { "docid": "4e2898c90d499b2069c83995f0982883", "score": "0.54816145", "text": "func (m *MockTrafficSplitClient) BaseClient() clients.ResourceClient {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BaseClient\")\n\tret0, _ := ret[0].(clients.ResourceClient)\n\treturn ret0\n}", "title": "" }, { "docid": "15a26f29c009e3694744191465bb4b07", "score": "0.54752505", "text": "func (_m *MockAdminOptions) FetchSeriesBlocksMetadataBatchTimeout() time.Duration {\n\tret := _m.ctrl.Call(_m, \"FetchSeriesBlocksMetadataBatchTimeout\")\n\tret0, _ := ret[0].(time.Duration)\n\treturn ret0\n}", "title": "" }, { "docid": "6920f1a63fdda2677d05c4a98f18011a", "score": "0.5470182", "text": "func (m *MockPutRecordBatcher) PutRecordBatch(arg0 *firehose.PutRecordBatchInput) (*firehose.PutRecordBatchOutput, error) {\n\tret := m.ctrl.Call(m, \"PutRecordBatch\", arg0)\n\tret0, _ := ret[0].(*firehose.PutRecordBatchOutput)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "f21325faf65e8698528cf52e84c9e909", "score": "0.5466512", "text": "func testBatchRCKMixedDebitsAndCreditsServiceClassCode(t testing.TB) {\n\tmockBatch := mockBatchRCK(t)\n\tmockBatch.GetControl().ServiceClassCode = MixedDebitsAndCredits\n\tmockBatch.Header.ServiceClassCode = MixedDebitsAndCredits\n\terr := mockBatch.Validate()\n\tif err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "eeb694194589b59d6e298615b117fe6a", "score": "0.5457477", "text": "func (m *MockRepository) GetAll(arg0 context.Context) ([]post.Post, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAll\", arg0)\n\tret0, _ := ret[0].([]post.Post)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "1ca0d16abcd791ed45eea3b0db658326", "score": "0.5455166", "text": "func (m *MockStorager) List(arg0 string, arg1 ...*types.Pair) error {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0}\n\tfor _, a := range arg1 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"List\", varargs...)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d9efd3fa427603ac88a120b2d60ea482", "score": "0.54514176", "text": "func mockBatchARC(t testing.TB) *BatchARC {\n\tmockBatch := NewBatchARC(mockBatchARCHeader())\n\tmockBatch.AddEntry(mockARCEntryDetail())\n\trequire.NoError(t, mockBatch.Create())\n\treturn mockBatch\n}", "title": "" }, { "docid": "500b6d6a9b194b2b7da27997703d93ec", "score": "0.5446954", "text": "func (_m *MockOptions) WriteBatchSize() int {\n\tret := _m.ctrl.Call(_m, \"WriteBatchSize\")\n\tret0, _ := ret[0].(int)\n\treturn ret0\n}", "title": "" }, { "docid": "f87d5e8406046e4dbd8889bc8ce90d16", "score": "0.54448223", "text": "func (_m *KV) BatchCreate(ctx context.Context, data map[string]string, opts ...clientv3.OpOption) (*clientv3.TxnResponse, error) {\n\t_va := make([]interface{}, len(opts))\n\tfor _i := range opts {\n\t\t_va[_i] = opts[_i]\n\t}\n\tvar _ca []interface{}\n\t_ca = append(_ca, ctx, data)\n\t_ca = append(_ca, _va...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 *clientv3.TxnResponse\n\tif rf, ok := ret.Get(0).(func(context.Context, map[string]string, ...clientv3.OpOption) *clientv3.TxnResponse); ok {\n\t\tr0 = rf(ctx, data, opts...)\n\t} else {\n\t\tif ret.Get(0) != nil {\n\t\t\tr0 = ret.Get(0).(*clientv3.TxnResponse)\n\t\t}\n\t}\n\n\tvar r1 error\n\tif rf, ok := ret.Get(1).(func(context.Context, map[string]string, ...clientv3.OpOption) error); ok {\n\t\tr1 = rf(ctx, data, opts...)\n\t} else {\n\t\tr1 = ret.Error(1)\n\t}\n\n\treturn r0, r1\n}", "title": "" }, { "docid": "ded85c364f84b8d96ef57ba70f7112a3", "score": "0.5440317", "text": "func (m *MockService) GetAll(ctx context.Context, masterTx repository.MasterTx) (entity.BoardSlice, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAll\", ctx, masterTx)\n\tret0, _ := ret[0].(entity.BoardSlice)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "92f4e745772b97d9887ee14464afc7fb", "score": "0.54366016", "text": "func testBatchCommitments(t *testing.T, c *TestContext) {\n\tcorrectBatch, err := ioutil.ReadFile(\"../assets/commitment_batch.json\")\n\tif err != nil {\n\t\tt.Errorf(\"Impossible de lire le fichier commitment_batch.json\")\n\t}\n\ttcc := []TestCase{\n\t\t*c.AdminCheckTestCase, // 0 : user unauthorized\n\t\t{\n\t\t\tToken: c.Config.Users.Admin.Token,\n\t\t\tSent: []byte(`{\"Commitment\":[{\"Year\":2010}]}`),\n\t\t\tRespContains: []string{\"Batch de Engagements, requête : Ligne 1 : champs incorrects\"},\n\t\t\tStatusCode: http.StatusInternalServerError}, // 1 : validation error\n\t\t{\n\t\t\tToken: c.Config.Users.Admin.Token,\n\t\t\tSent: correctBatch,\n\t\t\tRespContains: []string{\"Batch de Engagements importé\"},\n\t\t\tStatusCode: http.StatusOK}, // 2 : ok\n\t}\n\tf := func(tc TestCase) *httpexpect.Response {\n\t\treturn c.E.POST(\"/api/commitments\").WithBytes(tc.Sent).\n\t\t\tWithHeader(\"Authorization\", \"Bearer \"+tc.Token).Expect()\n\t}\n\tfor _, r := range chkFactory(tcc, f, \"BatchCommitment\") {\n\t\tt.Error(r)\n\t}\n\t// the testGetCommitments is used to check datas have been correctly imported\n}", "title": "" }, { "docid": "745258f457bea2aebfa193ba512893af", "score": "0.54359686", "text": "func (m *MockServicer) List(arg0 ...*types.Pair) error {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{}\n\tfor _, a := range arg0 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"List\", varargs...)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "b0350d4abd5ce4ae6a3dee30b6c05f5b", "score": "0.5431842", "text": "func TestBatchWebCreate(t *testing.T) {\n\ttestBatchWebCreate(t)\n}", "title": "" }, { "docid": "3f44c6b54f3e48cd8097e6acfcf7635c", "score": "0.54308695", "text": "func (m *MockRedisSet) GetAll(arg0 string) ([]string, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAll\", arg0)\n\tret0, _ := ret[0].([]string)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "085a0c27460e5b256606ce82da3b43e7", "score": "0.54307365", "text": "func testBatchWebCreate(t testing.TB) {\n\tmockBatch := mockBatchWEB(t)\n\t// Must have valid batch header to create a batch\n\tmockBatch.GetHeader().ServiceClassCode = 63\n\terr := mockBatch.Create()\n\tif !base.Match(err, ErrServiceClass) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "2a35e099a69e893e849f936d7d1d0d27", "score": "0.5429938", "text": "func testTestBatchReservationFees(t *testing.T, c *TestContext) {\n\tbatchContent, err := ioutil.ReadFile(\"../assets/reservation_fee.json\")\n\tif err != nil {\n\t\tt.Errorf(\"Impossible de lire le ficher de batch\")\n\t\treturn\n\t}\n\ttcc := []TestCase{\n\t\t*c.ReservationFeeCheckTestCase, // 0 : user unauthorized\n\t\t{\n\t\t\tToken: c.Config.Users.ReservationFeeUser.Token,\n\t\t\tSent: []byte(`{\"ReservationFee\":[}`),\n\t\t\tRespContains: []string{\"Test batch de réservation de logement, décodage : \"},\n\t\t\tStatusCode: http.StatusBadRequest}, // 1 : validation error\n\t\t{\n\t\t\tToken: c.Config.Users.ReservationFeeUser.Token,\n\t\t\tSent: batchContent,\n\t\t\tRespContains: []string{`\"AddedItems\":0`, `\"MissingCities\":[]`,\n\t\t\t\t// cSpell: disable\n\t\t\t\t`\"MissingBeneficiaries\":[\"OSICA\"]`},\n\t\t\t//cSpell: enable\n\t\t\tStatusCode: http.StatusOK}, // 2 : ok\n\t}\n\tf := func(tc TestCase) *httpexpect.Response {\n\t\treturn c.E.POST(\"/api/reservation_fee/batch/test\").WithBytes(tc.Sent).\n\t\t\tWithHeader(\"Authorization\", \"Bearer \"+tc.Token).Expect()\n\t}\n\tfor _, r := range chkFactory(tcc, f, \"TestBatchReservationFee\") {\n\t\tt.Error(r)\n\t}\n\t// GetPaginatedReservationFees checks if data have been correctly analyzed\n}", "title": "" }, { "docid": "5042c62afd0a08978056af17d768d3d0", "score": "0.54296786", "text": "func testBatchBOCMixedDebitsAndCreditsWithCreditTransCode(t testing.TB) {\n\tmockBatch := mockBatchBOC(t)\n\tmockBatch.Header.ServiceClassCode = MixedDebitsAndCredits\n\tmockBatch.Batch.Control.ServiceClassCode = MixedDebitsAndCredits\n\terr := mockBatch.Validate()\n\tif err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "8a3d8e77dfa07d579723a3fb5c77e8fb", "score": "0.5423361", "text": "func testBatchReservationFees(t *testing.T, c *TestContext) {\n\tbatchContent, err := ioutil.ReadFile(\"../assets/reservation_fee.json\")\n\tif err != nil {\n\t\tt.Errorf(\"Impossible de lire le ficher de batch\")\n\t\treturn\n\t}\n\ttcc := []TestCase{\n\t\t*c.ReservationFeeCheckTestCase, // 0 : user unauthorized\n\t\t{\n\t\t\tToken: c.Config.Users.ReservationFeeUser.Token,\n\t\t\tSent: []byte(`{\"ReservationFee\":[}`),\n\t\t\tRespContains: []string{\"Batch de réservation de logement, décodage : \"},\n\t\t\tStatusCode: http.StatusBadRequest}, // 1 : validation error\n\t\t{\n\t\t\tToken: c.Config.Users.ReservationFeeUser.Token,\n\t\t\tSent: batchContent,\n\t\t\tRespContains: []string{`\"AddedItems\":3`, `\"MissingCities\":[]`,\n\t\t\t\t// cSpell: disable\n\t\t\t\t`\"MissingBeneficiaries\":[\"OSICA\"]`},\n\t\t\t//cSpell: enable\n\t\t\tStatusCode: http.StatusOK}, // 2 : ok\n\t}\n\tf := func(tc TestCase) *httpexpect.Response {\n\t\treturn c.E.POST(\"/api/reservation_fee/batch\").WithBytes(tc.Sent).\n\t\t\tWithHeader(\"Authorization\", \"Bearer \"+tc.Token).Expect()\n\t}\n\tfor _, r := range chkFactory(tcc, f, \"BatchReservationFee\") {\n\t\tt.Error(r)\n\t}\n\t// GetPaginatedReservationFees checks if data have been correctly analyzed\n}", "title": "" }, { "docid": "4b1685e202693ddff8ddbe82b878bdff", "score": "0.54218286", "text": "func (m *MockElastic) MultiSearch(arg0 context.Context, arg1 []*elasticsearch.SearchRequest) ([][]interface{}, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"MultiSearch\", arg0, arg1)\n\tret0, _ := ret[0].([][]interface{})\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "bf34d37dae9c05a87a54ba9a862d6fda", "score": "0.5417322", "text": "func mockBatchRCKCredit() *BatchRCK {\n\tmockBatch := NewBatchRCK(mockBatchRCKHeaderCredit())\n\tmockBatch.AddEntry(mockRCKEntryDetailCredit())\n\treturn mockBatch\n}", "title": "" }, { "docid": "d6c1be36737eec2b977b50529d668bac", "score": "0.5416282", "text": "func (m *MockClient) BatchDeleteBucketObjects(bucketName *string) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"BatchDeleteBucketObjects\", bucketName)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5b0e353897eaf749bd269a0291eed677", "score": "0.54153526", "text": "func (m *MockStatsServer) GetAll(arg0 context.Context, arg1 *GetAllReq) (*GetAllResp, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"GetAll\", arg0, arg1)\n\tret0, _ := ret[0].(*GetAllResp)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "8ea67f1e4aca6ec74c3d789a6d163630", "score": "0.54101634", "text": "func TestBatchRCKAmount(t *testing.T) {\n\ttestBatchRCKAmount(t)\n}", "title": "" }, { "docid": "d08b73b19b6ae36fd2c936f05ba92b67", "score": "0.5406469", "text": "func testIATBatchValidate(t testing.TB) {\n\tfile := NewFile().SetHeader(mockFileHeader())\n\tmockBatch := mockIATBatch(t)\n\tmockBatch.GetHeader().ServiceClassCode = DebitsOnly\n\n\terr := mockBatch.verify()\n\tif !base.Match(err, NewErrBatchHeaderControlEquality(DebitsOnly, CreditsOnly)) {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n\n\tfile.AddIATBatch(mockBatch)\n}", "title": "" }, { "docid": "30f8494fcf971908b0b4f401fafdf2da", "score": "0.5405141", "text": "func (m *MockMultiReaderIteratorPool) Put(iter MultiReaderIterator) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Put\", iter)\n}", "title": "" }, { "docid": "51ecc0d790d86d6b538f2388fbc82fb9", "score": "0.5400431", "text": "func (m *MockMultiReaderIteratorArrayPool) Get(size int) []MultiReaderIterator {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Get\", size)\n\tret0, _ := ret[0].([]MultiReaderIterator)\n\treturn ret0\n}", "title": "" }, { "docid": "57e8c8c7a14e4494262d78b7e1beaab2", "score": "0.53958726", "text": "func testBatchTRCMixedDebitsAndCreditsServiceClassCode(t testing.TB) {\n\tmockBatch := mockBatchTRC(t)\n\tmockBatch.GetControl().ServiceClassCode = MixedDebitsAndCredits\n\tmockBatch.Header.ServiceClassCode = MixedDebitsAndCredits\n\terr := mockBatch.Validate()\n\tif err != nil {\n\t\tt.Errorf(\"%T: %s\", err, err)\n\t}\n}", "title": "" }, { "docid": "f3d7b93cfffdecd391e86e18e9228573", "score": "0.539512", "text": "func (m *MockRequester) Merge(arg0 fosite.Requester) {\n\tm.ctrl.Call(m, \"Merge\", arg0)\n}", "title": "" }, { "docid": "9bdfe6267b2280548da8b70ba8da88cd", "score": "0.53948975", "text": "func (m *MockMultiReaderIteratorPool) Init(alloc ReaderIteratorAllocate) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"Init\", alloc)\n}", "title": "" }, { "docid": "2681dc9d219dbc510bee61d99ea36734", "score": "0.5390448", "text": "func (m *MockServiceClient) Version(arg0 context.Context, arg1 *version.Request, arg2 ...grpc.CallOption) (*version.Response, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{arg0, arg1}\n\tfor _, a := range arg2 {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"Version\", varargs...)\n\tret0, _ := ret[0].(*version.Response)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" } ]
6e16eb6ee344aafcb3a7dedb55991d42
push a comment; action permit: comment, review, display
[ { "docid": "ca6dd79beb5296c3b02e968a4f690136", "score": "0.669178", "text": "func (e *Engine) Push(authToken string, tp string, attr map[string]string) (*LabelComment, error) {\n\tact, ok := e.ActivityByToken(authToken)\n\tif !ok {\n\t\treturn nil, NotExistError\n\t}\n\n\tif !IsOneOf(authToken, act.CommentToken, act.ReviewToken, act.DisplayToken) {\n\t\treturn nil, NotAuthorizedError\n\t}\n\n\tc, ok := NewComment(tp, attr)\n\tif !ok {\n\t\treturn nil, IllFormatError\n\t}\n\n\tlc := act.Add(c)\n\n\tif !act.ReviewOn {\n\t\tact.Approve(act.Review())\n\t}\n\n\treturn lc, nil\n}", "title": "" } ]
[ { "docid": "89067a98f562880a7368b8f1dd69f58d", "score": "0.7086694", "text": "func (self *Post) PushComment(c string, user_id bson.ObjectId) *Comment {\n\n\tc = html.EscapeString(c)\n\tif len(c) > 3000 {\n\t\tc = c[:3000] + \"...\"\n\t}\n\n\tpos := self.GetCommentCount()\n\n\tcomment := &Comment{\n\t\tId: bson.NewObjectId(),\n\t\tPostId: self.Id,\n\t\tUserId: user_id,\n\t\tContent: c,\n\t\tPosition: pos,\n\t\tCreated: time.Now(),\n\t}\n\n\tcomment.SetDI(self)\n\n\t// Use content module to run processors chain\n\tcontent := self.di.Content\n\tcontent.Parse(comment)\n\n\t// Publish comment\n\tdatabase := deps.Container.Mgo()\n\terr := database.C(\"comments\").Insert(comment)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\terr = database.C(\"posts\").Update(bson.M{\"_id\": self.Id}, bson.M{\"$set\": bson.M{\"updated_at\": time.Now()}, \"$inc\": bson.M{\"comments.count\": 1}})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Ensure user is participating\n\tself.PushUser(user_id)\n\n\t// Finally parse tags in content for runtime usage\n\tcontent.ParseTags(comment)\n\n\treturn comment\n}", "title": "" }, { "docid": "9c738bb57cd26a5bca6b44d2caf10eaf", "score": "0.60824865", "text": "func (th *TasksHandler) addComment(w http.ResponseWriter, r *http.Request) {\n\tif r.Method != http.MethodPost {\n\t\tmsg := http.StatusText(http.StatusNotFound)\n\t\tErrJSON(w, httpErr{err: fmt.Errorf(msg), msg: msg}, http.StatusNotFound)\n\t\treturn\n\t}\n\tcr := commentRequest{}\n\tif err := json.NewDecoder(r.Body).Decode(&cr); err != nil {\n\t\tErrJSON(w, httpErr{err: err, msg: \"bad request\"}, http.StatusBadRequest)\n\t\treturn\n\t}\n\tth.mu.Lock()\n\tdefer th.mu.Unlock()\n\ttask, ok := th.data[cr.TaskID]\n\tif !ok {\n\t\tErrJSON(w, httpErr{err: fmt.Errorf(\"invalid task\"), msg: \"not found\"}, http.StatusNotFound)\n\t\treturn\n\t}\n\n\ttask.Comments = append(task.Comments, Comment{\n\t\tBody: cr.Body,\n\t\tUsername: \"ADMIN\",\n\t\tTsp: time.Now(),\n\t})\n\n\tth.data[cr.TaskID] = task\n\tw.Header().Set(\"Location\", fmt.Sprintf(\"/api/task/%s\", task.ID))\n\tw.Header().Set(\"X-ViewLocation\", fmt.Sprintf(\"/view/%s\", task.ID))\n\tJSON(w, task, http.StatusOK)\n}", "title": "" }, { "docid": "ef8474f90ca827dec313bd19ac5de553", "score": "0.60774374", "text": "func (g *GitLabMergeRequestDiscussionCommenter) Post(_ context.Context, c *Comment) error {\n\tc.Path = filepath.Join(g.wd, c.Path)\n\tg.muComments.Lock()\n\tdefer g.muComments.Unlock()\n\tg.postComments = append(g.postComments, c)\n\treturn nil\n}", "title": "" }, { "docid": "cb931e420078c8c38ab8f5afbefd2ae1", "score": "0.60179144", "text": "func (h *handler) Comment(w http.ResponseWriter, r *http.Request) {\n\ttoken := strings.Replace(r.Header.Get(\"Authorization\"), \"Bearer \", \"\", -1)\n\tusername, err := h.userSvc.Auth.ValidateToken(token)\n\tif err != nil {\n\t\thttp.Error(w, \"Invalid token. Header 'Authorization' must have value: 'Bearer <token>'\", http.StatusUnauthorized)\n\t\treturn\n\t}\n\n\tvar c comment\n\terr = json.NewDecoder(r.Body).Decode(&c)\n\tif err != nil {\n\t\thttp.Error(w, `Request body must be in the format: {\"postID\": \"123\", \"text\": \"hello goodbye hello goodbye\"}`, http.StatusBadRequest)\n\t\treturn\n\t}\n\n\terr = h.postSvc.Comment.Create(username, c.PostID, c.Text)\n\tif err != nil {\n\t\tserverError(w, err)\n\t\treturn\n\t}\n\n\th.r.JSON(w, http.StatusCreated, http.StatusText(http.StatusCreated))\n}", "title": "" }, { "docid": "0f97f33c324e5d05aa8adbdb5a19588b", "score": "0.60178447", "text": "func (cc CommentsAPIController) AddComment(c echo.Context) error {\n\n\tif !c.Get(\"IsLoggedIn\").(bool) {\n\t\treturn c.JSON(http.StatusUnauthorized, map[string]interface{}{\n\t\t\t\t\"success\": false,\n\t\t\t\t\"message\": \"You are not logged in\",\n\t\t})\n\t}\n\n\tchannelId := c.FormValue(\"channelId\")\n\ttext := c.FormValue(\"text\")\n\n\tif text == \"\" {\n\t\treturn c.JSON(http.StatusOK, map[string]interface{}{\n\t\t\t\"success\": false,\n\t\t\t\"message\": \"Empty comment\",\n\t\t})\n\t}\n\n\tu := c.Get(\"User\").(entities.User)\n\n\tif channelId == \"\" {\n\t\treturn c.JSON(http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"success\": false,\n\t\t\t\"message\": \"Invalid channel ID or user\",\n\t\t})\n\t}\n\n\tsaved := comments.AddComment(channelId, u, text)\n\n\tif !saved {\n\t\treturn c.JSON(http.StatusInternalServerError, map[string]interface{}{\n\t\t\t\"success\": false,\n\t\t\t\"message\": \"Error while saving comment\",\n\t\t})\n\t}\n\n\treturn c.JSON(http.StatusOK, map[string]interface{}{\n\t\t\t\"success\": true,\n\t\t\t\"message\": \"Comment saved\",\n\t})\n\n}", "title": "" }, { "docid": "0b421e14b18747a9996d1c0ea9581642", "score": "0.5937743", "text": "func (i *Issue) Comment(comment string) {\n\tc := NewComment(\n\t\ttime.Now().Unix(),\n\t\tcomment,\n\t)\n\n\ti.Comments = append(i.Comments, *c)\n}", "title": "" }, { "docid": "873df2dbf6cd2eea63158bfd8e121006", "score": "0.593607", "text": "func (r *Reddit) Comment(parent string, text string) (err error) {\n\tform := url.Values{\n\t\t\"api_type\": {\"json\"},\n\t\t\"text\": {text},\n\t\t\"thing_id\": {parent},\n\t}\n\trequest, err := r.Request(\"POST\", \"/api/comment\", form)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t_, err = r.JsonResponse(request)\n\treturn\n}", "title": "" }, { "docid": "79fa6acca31610e9c7bbb9df258bb06c", "score": "0.5895448", "text": "func (c pivClient) AddComment(id int, project int, comment string) error {\n\tp := url.Values{\n\t\t\"text\": []string{comment},\n\t}\n\t_, err := c.request(\"POST\", fmt.Sprintf(\"projects/%d/stories/%d/comments\", project, id), p)\n\treturn err\n}", "title": "" }, { "docid": "9a4f89e27aad233e915d2ad07fe28c14", "score": "0.58916163", "text": "func (cs *CommentStore) Create(username, postID, text string) error {\n\tui := socialnet.UserItem{Username: username}\n\tc := socialnet.Comment{PostID: postID, UserItem: ui, Text: text}\n\tcs.comments = append(cs.comments, c)\n\n\treturn nil\n}", "title": "" }, { "docid": "682fd34518c353852ad39266cc3b9903", "score": "0.587749", "text": "func (gh *githubHookApi) handleComment(ctx context.Context, event *github.IssueCommentEvent) error {\n\tif !event.Issue.IsPullRequest() {\n\t\treturn nil\n\t}\n\n\tcommentBody := event.Comment.GetBody()\n\tcommentAction := event.GetAction()\n\tif commentAction == \"deleted\" {\n\t\treturn nil\n\t}\n\tif triggersCommitQueue(event.Comment.GetBody()) {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, \"commit queue triggered\"))\n\n\t\t_, err := data.EnqueuePRToCommitQueue(ctx, evergreen.GetEnvironment(), gh.sc, createEnqueuePRInfo(event))\n\t\tif err != nil {\n\t\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event, \"can't enqueue on commit queue\")))\n\t\t\treturn errors.Wrap(err, \"enqueueing in commit queue\")\n\t\t}\n\n\t\treturn nil\n\t}\n\n\tif triggerPatch, callerType := triggersPatch(commentBody); triggerPatch {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, fmt.Sprintf(\"'%s' triggered\", commentBody)))\n\n\t\terr := gh.createPRPatch(ctx, event.Repo.Owner.GetLogin(), event.Repo.GetName(), callerType, event.Issue.GetNumber())\n\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event,\n\t\t\tfmt.Sprintf(\"can't create PR for '%s'\", commentBody))))\n\t\treturn errors.Wrap(err, \"creating patch\")\n\t}\n\n\tif triggersStatusRefresh(commentBody) {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, fmt.Sprintf(\"'%s' triggered\", commentBody)))\n\n\t\terr := gh.refreshPatchStatus(ctx, event.Repo.Owner.GetLogin(), event.Repo.GetName(), event.Issue.GetNumber())\n\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event,\n\t\t\t\"problem triggering status refresh\")))\n\t\treturn errors.Wrap(err, \"triggering status refresh\")\n\t}\n\n\tif triggersHelpText(commentBody) {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, fmt.Sprintf(\"'%s' triggered\", commentBody)))\n\t\terr := gh.displayHelpText(ctx, event.Repo.Owner.GetLogin(), event.Repo.GetName(), event.Issue.GetNumber())\n\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event,\n\t\t\t\"problem sending help comment\")))\n\t\treturn errors.Wrap(err, \"sending help comment\")\n\t}\n\n\tif isKeepDefinitionsComment(commentBody) {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, fmt.Sprintf(\"'%s' triggered\", commentBody)))\n\n\t\terr := keepPRPatchDefinition(event.Repo.Owner.GetLogin(), event.Repo.GetName(), event.Issue.GetNumber())\n\n\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event,\n\t\t\t\"problem keeping pr patch definitions\")))\n\n\t\treturn errors.Wrap(err, \"keeping pr patch definition\")\n\n\t}\n\n\tif isResetDefinitionsComment(commentBody) {\n\t\tgrip.Info(gh.getCommentLogWithMessage(event, fmt.Sprintf(\"'%s' triggered\", commentBody)))\n\n\t\terr := resetPRPatchDefinition(event.Repo.Owner.GetLogin(), event.Repo.GetName(), event.Issue.GetNumber())\n\n\t\tgrip.Error(message.WrapError(err, gh.getCommentLogWithMessage(event,\n\t\t\t\"problem resetting pr patch definitions\")))\n\n\t\treturn errors.Wrap(err, \"resetting pr patch definition\")\n\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "62d22512966ef87871f42dff4d874510", "score": "0.5862725", "text": "func (s BitbucketCloudSource) CreateComment(ctx context.Context, cs *Changeset, comment string) error {\n\trepo := cs.TargetRepo.Metadata.(*bitbucketcloud.Repo)\n\tpr := cs.Metadata.(*bbcs.AnnotatedPullRequest)\n\n\t_, err := s.client.CreatePullRequestComment(ctx, repo, pr.ID, bitbucketcloud.CommentInput{\n\t\tContent: comment,\n\t})\n\treturn err\n}", "title": "" }, { "docid": "d02f4faa646446c3aabe39fa8c409021", "score": "0.5861689", "text": "func PostComment(w http.ResponseWriter, r *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"application/json; charset=UTF-8\")\n\n\tuserId, success := getUserTokenFromRequest(w, r)\n\n\tif(!success){\n\t\treturn;\n\t}\n\n\n\n\tb, err := ioutil.ReadAll(r.Body)\n\tdefer r.Body.Close()\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tpp := parseUrl(r.URL)\n\n\tnAnswerIds := paramCount(pp.queryParams, \"answerId\")\n\tif(nAnswerIds != 1){\n\t\thttp.Error(w, fmt.Sprintf(\"Only one answer is allowed. %d given\", nAnswerIds), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tanswerId := pp.queryParams.Get(\"answerId\")\n\tif(!bson.IsObjectIdHex(answerId)){\n\t\thttp.Error(w, fmt.Sprintf(\"Invalid answerId: %s\", answerId), http.StatusBadRequest)\n\t\treturn\n\t}\n\n\tvar newC NewComment\n\n\terr = json.Unmarshal(b, &newC)\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tanswer := getAnswers([]string{}, []string{answerId}, 0)\n\n\tif(answer == nil){\n\t\thttp.Error(w, fmt.Sprintf(\"Invalid answerId: %s\", answerId), http.StatusNotFound)\n\t\treturn\n\t}\n\n\n\tcomment := postComment(bson.ObjectIdHex(answerId), newC, userId);\n\n\tjsonVal, err := json.MarshalIndent(comment, \"\", \" \");\n\n\tif err != nil {\n\t\thttp.Error(w, err.Error(), 500)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\",\"application/json\")\n\tw.Header().Set(\"Access-Control-Allow-Origin\", \"*\")\n\tw.WriteHeader(http.StatusOK)\n\tw.Write(jsonVal);\n\n}", "title": "" }, { "docid": "41fcda4121f38833ddc380abf6bcbeb3", "score": "0.5847411", "text": "func (client *Client) CommentNew(username, authorname, ppermlink, body string, opt *PCOptionsNew) (*OperResp, error) {\n\tvar trx []types.Operation\n\n\ttimes, _ := strconv.Unquote(time.Now().Add(30 * time.Second).UTC().Format(fdt))\n\tpermlink := \"re-\" + authorname + \"-\" + ppermlink + \"-\" + times\n\tpermlink = strings.Replace(permlink, \".\", \"-\", -1)\n\tif opt != nil && opt.Permlink != \"\" {\n\t\tpermlink = opt.Permlink\n\t}\n\n\tjsonMeta := &types.ContentMetadata{\"lib\": \"golos-go\"}\n\n\ttx := &types.CommentOperation{\n\t\tParentAuthor: authorname,\n\t\tParentPermlink: ppermlink,\n\t\tAuthor: username,\n\t\tPermlink: permlink,\n\t\tTitle: \"\",\n\t\tBody: body,\n\t\tJSONMetadata: jsonMeta,\n\t}\n\ttrx = append(trx, tx)\n\n\tif opt.CommentOption != nil {\n\t\ttrx = append(trx, GetCommentOptionsOperationNew(username, permlink, *opt.CommentOption))\n\t}\n\n\tresp, err := client.SendTrx(username, trx)\n\treturn &OperResp{NameOper: \"Comment\", PermLink: permlink, Bresp: resp}, err\n}", "title": "" }, { "docid": "13f77f717d6a7f771ea49e5f53cebe75", "score": "0.5847386", "text": "func (s *private) createCommentCtrl(w http.ResponseWriter, r *http.Request) {\n\tcomment := store.Comment{}\n\tif err := render.DecodeJSON(http.MaxBytesReader(w, r.Body, hardBodyLimit), &comment); err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusBadRequest, err, \"can't bind comment\", rest.ErrDecode)\n\t\treturn\n\t}\n\n\tuser := rest.MustGetUserInfo(r)\n\tif user.ID != \"admin\" && user.SiteID != comment.Locator.SiteID {\n\t\trest.SendErrorJSON(w, r, http.StatusForbidden,\n\t\t\tfmt.Errorf(\"site mismatch, %q not allowed to post to %s\", user.SiteID, comment.Locator.SiteID), \"invalid site\",\n\t\t\trest.ErrCommentValidation)\n\t\treturn\n\t}\n\n\tcomment.PrepareUntrusted() // clean all fields user not supposed to set\n\tcomment.User = user\n\tcomment.User.IP = strings.Split(r.RemoteAddr, \":\")[0]\n\n\tcomment.Orig = comment.Text // original comment text, prior to md render\n\tif err := s.dataService.ValidateComment(&comment); err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusBadRequest, err, \"invalid comment\", rest.ErrCommentValidation)\n\t\treturn\n\t}\n\tcomment = s.commentFormatter.Format(comment)\n\n\t// check if images are valid, omit proxied images as they are lazy-loaded\n\tfor _, id := range s.imageService.ExtractNonProxiedPictures(comment.Text) {\n\t\t_, err := s.imageService.Load(id)\n\t\tif err != nil {\n\t\t\trest.SendErrorJSON(w, r, http.StatusBadRequest, err, \"can't load picture from the comment\", rest.ErrImgNotFound)\n\t\t\treturn\n\t\t}\n\t}\n\n\t// check if user blocked\n\tif s.dataService.IsBlocked(comment.Locator.SiteID, comment.User.ID) {\n\t\trest.SendErrorJSON(w, r, http.StatusForbidden, fmt.Errorf(\"rejected\"), \"user blocked\", rest.ErrUserBlocked)\n\t\treturn\n\t}\n\n\tif s.isReadOnly(comment.Locator) {\n\t\trest.SendErrorJSON(w, r, http.StatusForbidden, fmt.Errorf(\"rejected\"), \"old post, read-only\", rest.ErrReadOnly)\n\t\treturn\n\t}\n\n\tid, err := s.dataService.Create(comment)\n\tif err == service.ErrRestrictedWordsFound {\n\t\trest.SendErrorJSON(w, r, http.StatusBadRequest, err, \"invalid comment\", rest.ErrCommentRestrictWords)\n\t\treturn\n\t}\n\tif err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusInternalServerError, err, \"can't save comment\", rest.ErrInternal)\n\t\treturn\n\t}\n\n\t// dataService modifies comment\n\tfinalComment, err := s.dataService.Get(comment.Locator, id, rest.GetUserOrEmpty(r))\n\tif err != nil {\n\t\trest.SendErrorJSON(w, r, http.StatusInternalServerError, err, \"can't load created comment\", rest.ErrInternal)\n\t\treturn\n\t}\n\ts.cache.Flush(cache.Flusher(comment.Locator.SiteID).\n\t\tScopes(comment.Locator.URL, lastCommentsScope, comment.User.ID, comment.Locator.SiteID))\n\n\tif s.notifyService != nil {\n\t\ts.notifyService.Submit(notify.Request{Comment: finalComment})\n\t}\n\n\tlog.Printf(\"[DEBUG] created comment %+v\", finalComment)\n\n\trender.Status(r, http.StatusCreated)\n\trender.JSON(w, r, &finalComment)\n}", "title": "" }, { "docid": "c62742e318937df4dff500bc799ca837", "score": "0.58202636", "text": "func (c *Commenter) Post(ctx context.Context, file string, position int, body string) error {\n\tnewComment := &github.PullRequestComment{\n\t\tBody: github.String(body),\n\t\tPath: github.String(file),\n\t\tCommitID: github.String(c.sha),\n\t\tPosition: github.Int(position),\n\t}\n\n\tfor _, comment := range c.comments {\n\t\tif comment.Body != nil && *newComment.Body == *comment.Body &&\n\t\t\tcomment.Path != nil && *newComment.Path == *comment.Path &&\n\t\t\tcomment.Position != nil && *newComment.Position == *comment.Position {\n\t\t\t// Comment already exists\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tnewComment, _, err := c.gh.PullRequests.CreateComment(ctx, c.owner, c.repo, c.prNumber, newComment)\n\tc.comments = append(c.comments, newComment)\n\n\treturn err\n}", "title": "" }, { "docid": "832c4058971c6eefa9290d55203f9e6f", "score": "0.57612884", "text": "func (g *GiteaLocalUploader) CreateComments(comments ...*base.Comment) error {\n\tcms := make([]*issues_model.Comment, 0, len(comments))\n\tfor _, comment := range comments {\n\t\tvar issue *issues_model.Issue\n\t\tissue, ok := g.issues[comment.IssueIndex]\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"comment references non existent IssueIndex %d\", comment.IssueIndex)\n\t\t}\n\n\t\tif comment.Created.IsZero() {\n\t\t\tcomment.Created = time.Unix(int64(issue.CreatedUnix), 0)\n\t\t}\n\t\tif comment.Updated.IsZero() {\n\t\t\tcomment.Updated = comment.Created\n\t\t}\n\t\tif comment.CommentType == \"\" {\n\t\t\t// if type field is missing, then assume a normal comment\n\t\t\tcomment.CommentType = issues_model.CommentTypeComment.String()\n\t\t}\n\t\tcm := issues_model.Comment{\n\t\t\tIssueID: issue.ID,\n\t\t\tType: issues_model.AsCommentType(comment.CommentType),\n\t\t\tContent: comment.Content,\n\t\t\tCreatedUnix: timeutil.TimeStamp(comment.Created.Unix()),\n\t\t\tUpdatedUnix: timeutil.TimeStamp(comment.Updated.Unix()),\n\t\t}\n\n\t\tswitch cm.Type {\n\t\tcase issues_model.CommentTypeAssignees:\n\t\t\tif assigneeID, ok := comment.Meta[\"AssigneeID\"].(int); ok {\n\t\t\t\tcm.AssigneeID = int64(assigneeID)\n\t\t\t}\n\t\t\tif comment.Meta[\"RemovedAssigneeID\"] != nil {\n\t\t\t\tcm.RemovedAssignee = true\n\t\t\t}\n\t\tcase issues_model.CommentTypeChangeTitle:\n\t\t\tif comment.Meta[\"OldTitle\"] != nil {\n\t\t\t\tcm.OldTitle = fmt.Sprintf(\"%s\", comment.Meta[\"OldTitle\"])\n\t\t\t}\n\t\t\tif comment.Meta[\"NewTitle\"] != nil {\n\t\t\t\tcm.NewTitle = fmt.Sprintf(\"%s\", comment.Meta[\"NewTitle\"])\n\t\t\t}\n\t\tdefault:\n\t\t}\n\n\t\tif err := g.remapUser(comment, &cm); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// add reactions\n\t\tfor _, reaction := range comment.Reactions {\n\t\t\tres := issues_model.Reaction{\n\t\t\t\tType: reaction.Content,\n\t\t\t\tCreatedUnix: timeutil.TimeStampNow(),\n\t\t\t}\n\t\t\tif err := g.remapUser(reaction, &res); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tcm.Reactions = append(cm.Reactions, &res)\n\t\t}\n\n\t\tcms = append(cms, &cm)\n\t}\n\n\tif len(cms) == 0 {\n\t\treturn nil\n\t}\n\treturn models.InsertIssueComments(cms)\n}", "title": "" }, { "docid": "5bda93806569cb812121aec72daa375e", "score": "0.57445437", "text": "func addComment(con *sql.DB, ctx *lib.Ctx, args ...interface{}) (err error) {\n\tif len(args) != 10 {\n\t\terr = fmt.Errorf(\"addComment: expects 10 variadic parameters\")\n\t\treturn\n\t}\n\n\t// New args\n\tnewArgs := lib.AnyArray{\n\t\targs[0], // id\n\t\targs[1], // event_id\n\t\targs[2], // body\n\t\targs[3], // created_at\n\t\ttime.Now(), // updated_at\n\t\targs[4], // user_id\n\t\tnil, // commit_id\n\t\tnil, // original_commit_id\n\t\tnil, // diff_hunk\n\t\tnil, // position\n\t\tnil, // original_position\n\t\tnil, // path\n\t\tnil, // pull_request_review_ai\n\t\tnil, // line\n\t\targs[7], // actor_id\n\t\targs[8], // actor_login\n\t\targs[5], // repo_id\n\t\targs[6], // repo_name\n\t\targs[9], // type\n\t\targs[3], // dup_created_at\n\t\targs[6], // dup_user_login\n\t}\n\t_, err = lib.ExecSQL(\n\t\tcon,\n\t\tctx,\n\t\t\"insert into gha_comments(\"+\n\t\t\t\"id, event_id, body, created_at, updated_at, user_id, \"+\n\t\t\t\"commit_id, original_commit_id, diff_hunk, position, \"+\n\t\t\t\"original_position, path, pull_request_review_id, line, \"+\n\t\t\t\"dup_actor_id, dup_actor_login, dup_repo_id, dup_repo_name, dup_type, dup_created_at, \"+\n\t\t\t\"dup_user_login) \"+lib.NValues(21),\n\t\tnewArgs...,\n\t)\n\treturn\n}", "title": "" }, { "docid": "0339ed73cbe79895f074f575177fddbe", "score": "0.57398033", "text": "func (client *bitbucketcloudClient) PullRequestComment(ctx context.Context, repo string, prRequest sdk.VCSPullRequestCommentRequest) error {\n\tif client.DisableStatus {\n\t\tlog.Warn(ctx, \"bitbucketcloud.PullRequestComment> ⚠ bitbucketcloud statuses are disabled\")\n\t\treturn nil\n\t}\n\n\tpath := fmt.Sprintf(\"/repositories/%s/pullrequests/%d/comments\", repo, prRequest.ID)\n\tpayload := BitbucketCloudPullRequestComment{}\n\tpayload.Content.Raw = prRequest.Message\n\n\tvalues, _ := json.Marshal(payload)\n\tres, err := client.post(ctx, path, \"application/json\", bytes.NewReader(values), &postOptions{skipDefaultBaseURL: false, asUser: true})\n\tif err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to post comment\")\n\t}\n\n\tdefer res.Body.Close()\n\n\tbody, err := io.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to read body\")\n\t}\n\n\tlog.Debug(ctx, \"%v\", string(body))\n\n\tif res.StatusCode != 201 {\n\t\treturn sdk.WrapError(err, \"Unable to add comment. Status code : %d - Body: %s\", res.StatusCode, body)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "b36d24c4680e34ab3ca34d8ad1cf97db", "score": "0.57188314", "text": "func CreateComment(w http.ResponseWriter, req *http.Request, app *App) {\n\tcomment := models.NewComment(\n\t\treq.FormValue(\"email\"),\n\t\treq.FormValue(\"name\"),\n\t\treq.FormValue(\"title\"),\n\t\treq.FormValue(\"body\"),\n\t\treq.FormValue(\"url\"),\n\t\treq.RemoteAddr)\n\tcomment.Created = time.Now().Unix()\n\n\tip, err := relevantIpBytes(req.RemoteAddr)\n\tif err != nil {\n\t\tip = req.RemoteAddr\n\t}\n\tcomment.ClientIp = ip\n\n\tvalid, valErrors := comment.Validate()\n\tif valid {\n\t\terr := comment.Save(app.Db)\n\t\tif err != nil {\n\t\t\tw.WriteHeader(500)\n\t\t} else {\n\t\t\tsession, _ := app.SessionStore.Get(req, SessionName)\n\t\t\tsession.Values[\"email\"] = comment.Email\n\t\t\tsession.Values[\"name\"] = comment.Name\n\t\t\tsession.Save(req, w)\n\t\t\trenderComment(w, \"partial/comment\", comment, app)\n\t\t}\n\t} else {\n\t\trenderErrors(w, valErrors, 422)\n\t}\n\n\tgo app.Notifier.CommentCreated(&comment)\n}", "title": "" }, { "docid": "6969d129259f2b9d6d67d286cb2a47f4", "score": "0.5716541", "text": "func (commtRepo *CommentGormRepo) StoreComment(comment *models.Comment) (*models.Comment, []error) {\r\n\tcommt := comment\r\n\terrs := commtRepo.conn.Create(commt).GetErrors()\r\n\tif len(errs) > 0 {\r\n\t\treturn nil, errs\r\n\t}\r\n\treturn commt, errs\r\n}", "title": "" }, { "docid": "a3dcb3e6261714bd1df00cc138895843", "score": "0.57060623", "text": "func PostComments(c echo.Context) error {\n\tvar incomingComment *incommingComment\n\n\tif err := c.Bind(&incomingComment); err != nil {\n\t\tfmt.Println(err.Error())\n\n\t\treturn c.JSON(http.StatusBadRequest,\n\t\t\tmap[string]string{\"result\": \"fail\", \"message\": err.Error()})\n\t}\n\n\tcomments.Text = append(comments.Text, incomingComment.Text)\n\n\tfmt.Println(\"New comment added\")\n\n\treturn c.JSON(http.StatusOK,\n\t\tmap[string]string{\"result\": \"success\", \"message\": \"New comment added\"})\n}", "title": "" }, { "docid": "426ab4975d61fe6592c3d415dbc7716c", "score": "0.57003045", "text": "func (j *JiraClient) Comment(branchName, comment string) error {\n\tissueID := GetIssueID(branchName)\n\n\tjiraComment := &jira.Comment{\n\t\tBody: comment,\n\t}\n\t_, _, err := j.client.Issue.AddComment(issueID, jiraComment)\n\n\treturn err\n}", "title": "" }, { "docid": "d033d923bb79b045a15a83976d7b7522", "score": "0.56961596", "text": "func CreateComment(userId, repoId, issueId, commitId, line int64, cmtType CommentType, content string, attachments []int64) (*Comment, error) {\n\tsess := x.NewSession()\n\tdefer sessionRelease(sess)\n\tif err := sess.Begin(); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcomment := &Comment{PosterId: userId, Type: cmtType, IssueId: issueId,\n\t\tCommitId: commitId, Line: line, Content: content}\n\n\tif _, err := sess.Insert(comment); err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Check comment type.\n\tswitch cmtType {\n\tcase COMMENT_TYPE_COMMENT:\n\t\trawSql := \"UPDATE `issue` SET num_comments = num_comments + 1 WHERE id = ?\"\n\t\tif _, err := sess.Exec(rawSql, issueId); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif len(attachments) > 0 {\n\t\t\trawSql = \"UPDATE `attachment` SET comment_id = ? WHERE id IN (?)\"\n\n\t\t\tastrs := make([]string, 0, len(attachments))\n\n\t\t\tfor _, a := range attachments {\n\t\t\t\tastrs = append(astrs, strconv.FormatInt(a, 10))\n\t\t\t}\n\n\t\t\tif _, err := sess.Exec(rawSql, comment.Id, strings.Join(astrs, \",\")); err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t}\n\tcase COMMENT_TYPE_REOPEN:\n\t\trawSql := \"UPDATE `repository` SET num_closed_issues = num_closed_issues - 1 WHERE id = ?\"\n\t\tif _, err := sess.Exec(rawSql, repoId); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\tcase COMMENT_TYPE_CLOSE:\n\t\trawSql := \"UPDATE `repository` SET num_closed_issues = num_closed_issues + 1 WHERE id = ?\"\n\t\tif _, err := sess.Exec(rawSql, repoId); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn comment, sess.Commit()\n}", "title": "" }, { "docid": "b1af3325da6f6cf7427c8abac2c41cb1", "score": "0.5673111", "text": "func (m *mchCGI) postComment(threadKey, name, mail, body, passwd, tag string) error {\n\tstamp := time.Now().Unix()\n\trecbody := make(map[string]string)\n\trecbody[\"body\"] = html.EscapeString(body)\n\trecbody[\"name\"] = html.EscapeString(name)\n\trecbody[\"mail\"] = html.EscapeString(mail)\n\n\tc := thread.NewCache(threadKey)\n\trec := record.New(c.Datfile, \"\", 0)\n\trec.Build(stamp, recbody, passwd)\n\tif rec.IsSpam() {\n\t\treturn errSpamM\n\t}\n\trec.Sync()\n\tif tag != \"\" {\n\t\tuser.Set(c.Datfile, []string{tag})\n\t}\n\tgo updateque.UpdateNodes(rec, nil)\n\treturn nil\n}", "title": "" }, { "docid": "49349ee04eba94d9ef118db38b595903", "score": "0.5651926", "text": "func createComment(w http.ResponseWriter, r *http.Request, url, name, res, uid, comment, latlon string, parent int) error {\n\t//c := appengine.NewContext(r)\n c, cancel := context.WithCancel(context.Background())\n defer cancel()\n //D0086\n datastoreClient := createClientDS()\n\t//D0040\n\t//get SID\n\tTARGET := \"\"\n\tdocID := 0\n\t\n\tSID, sidOk := getRefDoc(w,r,url)\n\tif sidOk == false {\n\t\t////log.Printf(\"No SID found!\")\n\t\treturn fmt.Errorf(\"No SID found!\")\n\t\t\n\t} \n\tif SID == \"\" {\n\t\tSID = r.FormValue(\"SID\")\n\t\tif SID == \"\" {\n\t\t\t////log.Printf(\"No SID found2!\")\n\t\t\treturn fmt.Errorf(\"No SID found!\")\n\t\t}\n\t}\n\t\n\tFL_INITIAL := false\n\tif SID != \"\" {\n\t\tSPL := strings.Split(SID,\"-\")\n\t\tTARGET = SPL[0]\n\t\tif len(SPL) > 1 {\n\t\t\tDOC_ID := SPL[1]\n\t\t\tdocID = str2int(DOC_ID)\n\t\t}\n\t\t//limit comments to a certain number\n\t\tq := datastore.NewQuery(\"TDSCOMMENT\").Filter(\"SID =\", SID)\n\t\trecCount,_ := datastoreClient.Count(c,q)\n\t\tif recCount <= 0 {\n\t\t\tFL_INITIAL = true\n\t\t}\n\t\tif recCount > SYS_MAX_SOC_COMMENTS {\n\t\t\treturn fmt.Errorf(\"Maximum number comments has been reached!\")\t\n\t\t} else {\n\t\t\t//update num comments field\n\t\t\t//D0040\n\t\t\ttime.AfterFunc(5*time.Second, func() {\n laterIncNumLikesSocial(c, uid, SID, \"SO_INC_NUM_LIKES\", \"C\")\n\t\t\t})\n //also send an email\n\t\t\tsubject := \"\"\n\t\t\tsubject = fmt.Sprintf(\"[%v] [%v] [%v] New Discussion Comment\", name, uid, SID)\n time.AfterFunc(5*time.Second, func() {\n laterQueueCloudTask(c, \"/ulapph-router?RTR_FUNC=queue-generic-send-email\", map[string]string{\"SUBJECT\": subject, \"TO\": ADMMAIL, \"FROM\": uid, \"MESSAGE\": comment})\n })\n\t\t\t//broadcast event in chat world\n\t\t\tmsgDtl := fmt.Sprintf(\"New comment posted on: %v at %v by %v. LINK: %v\", SID, SYS_SERVER_NAME, uid, ShortenUrl(w,r,fmt.Sprintf(\"https://www.ulapph.com/captcha?CC_FUNC=DISP&R=COMMENT&SID=%v&TITLE=%v\", SID, \"\")))\n\t\t\tdata := fmt.Sprintf(\"@888@ULAPPH-CHAT@888@%v@888@%v\", \"USER-COMMENT\", msgDtl)\n\t\t\tulapphChatSender(w,r,\"CH_MSG_NOTIFY_CHATS_WORLD\", data, \"\")\n\t\t\t//signal sites server to refresh the recent discussions page\n\t\t\tIS_SEARCH_SERVER, SEARCH_SERVER, _ := getSitesServer(w,r)\n\t\t\tif IS_SEARCH_SERVER == \"N\" {\n\t\t\t\turlStr := fmt.Sprintf(\"%v/social?SO_FUNC=flag-recent-refresh\", SEARCH_SERVER)\n\t\t\t\t//client := urlfetch.Client(c)\n\t\t\t\tif err := r.ParseForm(); err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t\t\n\t\t\t\t_, err := http.Get(urlStr)\n\t\t\t\tif err != nil {\n\t\t\t\t\tpanic(err)\n\t\t\t\t}\n\t\t\t}\n\t\t\t\n\t\t}\n\t}\n\n\tq := datastore.NewQuery(\"TDSCOMMENT\").Filter(\"CID =\", parent)\n\trecCount,_ := datastoreClient.Count(c,q)\n\t////log.Printf(\"recCount: %v\", recCount)\n\tcmts := make([]TDSCOMMENT, 0, recCount)\n\tif _, err := datastoreClient.GetAll(c,q, &cmts); err != nil {\n\t\t panic(err)\n\t}\n\t//log.Printf(\"datastoreClient.Get() [88651]\")\n\tif recCount > 0 {\n\t//exists\n\t\tfor _, p := range cmts{\n\t\t\tif p.DEPTH+1 > 5 {\n\t\t\t\tparent = p.PARENT\n\t\t\t\t////log.Printf(\"parent: %v\", parent)\n\t\t\t}\n\t\t\t\n\t\t\tthisCID := 0\n\t\t\tq2 := datastore.NewQuery(\"TDSCOMMENT\").Order(\"-CID\")\n\t\t\trecCount,_ := datastoreClient.Count(c,q2)\n\t\t\tif recCount > 0 {\n\t\t\t\tthisCID = recCount + 1\n\t\t\t} else {\n\t\t\t\tthisCID = 1\n\t\t\t}\n\t\t\tg := TDSCOMMENT{\n\t\t\t\tCID: thisCID,\n\t\t\t\tSID: SID,\n\t\t\t\tURL: url,\n\t\t\t\tNAME: name,\n\t\t\t\tUID: uid,\n\t\t\t\tCOMMENT: comment,\n\t\t\t\tDEPTH: p.DEPTH+1,\n\t\t\t\tTIMESTAMP: time.Now(),\n\t\t\t\t//D0042\n\t\t\t\t//DT_UPDATE: getTimestamp(),\n\t\t\t\tLATLON: latlon,\n\t\t\t\tPARENT: parent,\n\t\t\t\t//D0061\n\t\t\t\tSVAL: res,\n\t\t\t}\n\t\t\t////log.Printf(\"TDSCOMMENT: %v\", g)\n\t\t\t\n\t\t\t//thisKey := fmt.Sprintf(\"%d\", g.CID)\n\t\t\tthisKey := fmt.Sprintf(\"%v-%v-%d\", SID, time.Now(), g.CID)\n\t\t\t////log.Printf(\"thisKey: %v\", thisKey)\n\t\t\t\n\t\t\tkey := datastore.NameKey(\"TDSCOMMENT\", thisKey, nil)\n _, err := datastoreClient.Put(c, key, &g)\n //log.Printf(\"datastoreClient.Put() [88692]\")\n\t\t\tif err != nil {\n\t\t\t\t\t panic(err)\n\t\t\t}\n\t\t\t\n\t\t\t//clear cache\n\t\t\tcKeyC := fmt.Sprintf(\"JSON_COMMENTS_%v\", SID)\n\t\t\tputBytesToMemcacheWithoutExp(w,r,cKeyC,[]byte(\"\"))\t\t\t\n\t\t\t//return nil\n\t\t\n\t\t}\t\t\n\t} else {\n\t//not exists\n\t\tthisCID := 0\n\t\tq2 := datastore.NewQuery(\"TDSCOMMENT\").Order(\"-CID\")\n\t\trecCount,_ := datastoreClient.Count(c,q2)\n\t\tif recCount > 0 {\n\t\t\tthisCID = recCount + 1\n\t\t} else {\n\t\t\tthisCID = 1\n\t\t}\n\t\n\t\tg := TDSCOMMENT{\n\t\t\tCID: thisCID,\n\t\t\tSID: SID,\n\t\t\tURL: url,\n\t\t\tNAME: name,\n\t\t\tUID: uid,\n\t\t\tCOMMENT: comment,\n\t\t\tDEPTH: 1,\n\t\t\tTIMESTAMP: time.Now(),\n\t\t\t//D0042\n\t\t\t//DT_UPDATE: getTimestamp(),\n\t\t\tLATLON: latlon,\n\t\t\tPARENT: parent,\n\t\t\t//D0061\n\t\t\tSVAL: res,\n\t\t}\n\t\t////log.Printf(\"TDSCOMMENT: %v\", g)\n\t\t\n\t\t//thisKey := fmt.Sprintf(\"%d\", g.CID)\n\t\t//thisKey := fmt.Sprintf(\"%v-%v-%d\", SID, uid, g.CID)\n\t\tthisKey := fmt.Sprintf(\"%v-%v-%d\", SID, time.Now(), g.CID)\n\t\t////log.Printf(\"thisKey: %v\", thisKey)\n\t\t\n\t\tkey := datastore.NameKey(\"TDSCOMMENT\", thisKey, nil)\n _, err := datastoreClient.Put(c, key, &g)\n //log.Printf(\"datastoreClient.Put() [88739]\")\n\t\tif err != nil {\n\t\t\t\t panic(err)\n\t\t}\n\t\t\n\t\t//clear cache\n\t\tcKeyC := fmt.Sprintf(\"JSON_COMMENTS_%v\", SID)\n\t\tputBytesToMemcacheWithoutExp(w,r,cKeyC,[]byte(\"\"))\t\n\t\t\t\n\t\t//return nil\t\t\n\t}\t\t\t\n\t//D0042\n\t//for query of latest TDS contents discussions\n\t////log.Printf(\"FL_INITIAL: %v\", FL_INITIAL)\n\tif FL_INITIAL == true {\n\t//cidx not exist\n\t\tcTags := removeDuplicates(get_words_from(comment))\n\t\tif len(cTags) >= 1500 {\n\t\t\tcTags = nil\n\t\t}\n\t\th := TDSCOMIDX{\n\t\t\tIID: SID,\n\t\t\tSID: SID,\n\t\t\tDT_UPDATE: getTimestamp(),\n\t\t\tDT_FIRST: getTimestamp(),\n\t\t\tUSERS: []string{uid},\n\t\t\tNUM_COMMENTS: 1,\n\t\t\tTAGS: cTags,\n\t\t}\n\t\t////log.Printf(\"TDSCOMIDX: %v\", h)\n\t\t\n\t\tthisKey := fmt.Sprintf(\"%v\", h.SID)\n\t\t////log.Printf(\"thisKey: %v\", thisKey)\n\t\t\n\t\tkey := datastore.NameKey(\"TDSCOMIDX\", thisKey, nil)\n _, err := datastoreClient.Put(c, key, &h)\n //log.Printf(\"datastoreClient.Put() [88775]\")\n\t\tif err != nil {\n\t\t\t\t panic(err)\n\t\t}\t\n\t} else {\n\t//cidx exists\n\t\t//D0042\n\t\t//for query of latest TDS contents via sites server\n\t\t//get existing record for this SID\n\t\tthisKey := fmt.Sprintf(\"%v\", SID)\n\t\tkey := datastore.NameKey(\"TDSCOMIDX\", thisKey, nil)\n\t\tq := datastore.NewQuery(\"TDSCOMIDX\").Filter(\"__key__ =\", key)\n\t\t//log.Panicf(\"[S0614]\")\n\t\tcidx := make([]TDSCOMIDX, 0, 1)\n\t\tif _, err := datastoreClient.GetAll(c,q, &cidx); err != nil {\n\t\t\t panic(err)\n\t\t\t//return\n\t\t }\n\t\t//log.Printf(\"datastoreClient.Get() [88793]\")\n\t\tfor _, p := range cidx {\n\t\t\t\n\t\t\tcTagsOld := p.TAGS\n\t\t\tcTags := removeDuplicates(get_words_from(fmt.Sprintf(\"%v %v\", strings.Join(p.TAGS,\" \"), comment)))\n\t\t\tif len(cTags) >= 1500 {\n\t\t\t\tcTags = cTagsOld\n\t\t\t}\n\t\t\tcu := p.USERS\n\t\t\tcu = append(cu, uid)\n\t\t\th := TDSCOMIDX{\n\t\t\t\tIID: p.IID,\n\t\t\t\tSID: p.SID,\n\t\t\t\tDT_UPDATE: getTimestamp(),\n\t\t\t\tDT_FIRST: p.DT_FIRST,\n\t\t\t\tUSERS: removeDuplicates(cu),\n\t\t\t\tNUM_COMMENTS: p.NUM_COMMENTS+1,\n\t\t\t\tTAGS: cTags,\n\t\t\t}\n\t\t\t////log.Printf(\"TDSCOMIDX: %v\", h)\n _, err := datastoreClient.Put(c, key, &h)\n //log.Printf(\"datastoreClient.Put() [88814]\")\n\t\t\tif err != nil {\n\t\t\t\t\t panic(err)\n\t\t\t}\t\t\t\n\t\t\n\t\t}\n\t}\n\t\n\t//clear slide/article cache\n\tswitch TARGET {\n\t\tcase \"TDSSLIDE\":\n\t\t\tblobkey, _, _, _, _, _, _, _, _, _ := getTDSSLIDEBlobKey(w, r, docID)\n\t\t\tSLIDES_CACHE_KEY := fmt.Sprintf(\"SLIDES_CACHE_%v\", blobkey)\n\t\t\tputStrToMemcacheWithoutExp(w,r,SLIDES_CACHE_KEY,\"\")\n\t\t\t\n\t\tcase \"TDSARTL\":\n\t\t\tblobkey, _, _, _, _, _, _, _, _ := getTDSARTLBlobKey(w, r, docID)\n\t\t\tARTICLES_CACHE_KEY := fmt.Sprintf(\"ARTICLES_CACHE_%v\", blobkey)\n\t\t\tputStrToMemcacheWithoutExp(w,r,ARTICLES_CACHE_KEY,\"\")\n\t}\n\t\n\treturn nil\n}", "title": "" }, { "docid": "8c2cd3e2375e0ebd74a103a865259ef4", "score": "0.5613463", "text": "func (cr *CommentGormRepo) StoreComment(comment *entity.Comment) (*entity.Comment, []error) {\n\tcmt := comment\n\n\terrs := cr.conn.Create(cmt).GetErrors()\n\n\tif len(errs) > 0 {\n\t\treturn nil, errs\n\t}\n\n\treturn cmt, nil\n}", "title": "" }, { "docid": "45f796201ed3fdb305380d96a5ea4327", "score": "0.5601984", "text": "func (cs *CommentService) StoreComment(feedback *entity.feedback) (*entity.feedback, []error) {\n\tcmnt, errs := cs.commentRepo.StoreComment(feedback)\n\tif len(errs) > 0 {\n\t\treturn nil, errs\n\t}\n\treturn cmnt, errs\n}", "title": "" }, { "docid": "3a2f367972632a7d4b018d4696c9bb81", "score": "0.5600507", "text": "func (ach *AdminCommentHandler) PostComment(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\tl := r.ContentLength\n\tbody := make([]byte, l)\n\tr.Body.Read(body)\n\tcomment := &entity.Comment{}\n\n\terr := json.Unmarshal(body, comment)\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tcomment, errs := ach.commentService.StoreComment(comment)\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tp := fmt.Sprintf(\"/v1/admin/comments/%d\", comment.ID)\n\tw.Header().Set(\"Location\", p)\n\tw.WriteHeader(http.StatusCreated)\n\treturn\n}", "title": "" }, { "docid": "ec4f2484f14e21edc5234da14ee3b192", "score": "0.5578077", "text": "func (c *Client) CreateComment(owner, repo string, number int, pr bool, comment string) error {\n\tfullName := c.repositoryName(owner, repo)\n\tcommentInput := scm.CommentInput{\n\t\tBody: comment,\n\t}\n\tctx := context.Background()\n\tif pr {\n\t\t_, response, err := c.client.PullRequests.CreateComment(ctx, fullName, number, &commentInput)\n\t\tif err != nil {\n\t\t\treturn connectErrorHandle(response, err)\n\t\t}\n\n\t} else {\n\t\t_, response, err := c.client.Issues.CreateComment(ctx, fullName, number, &commentInput)\n\t\tif err != nil {\n\t\t\treturn connectErrorHandle(response, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "ef3af61bff6f2ec745d70345d21c37c9", "score": "0.5568133", "text": "func (c *GistCommentsService) Create(uri *Hyperlink, uriParams M, requestParams interface{}) (comment *GistComment, result *Result) {\n\turl, err := ExpandWithDefault(uri, &GistCommentsURL, uriParams)\n\tif err != nil {\n\t\treturn nil, &Result{Err: err}\n\t}\n\n\tresult = c.client.post(url, requestParams, &comment)\n\treturn\n}", "title": "" }, { "docid": "825366cb1f2ff077343f21d04255fd47", "score": "0.55389684", "text": "func (c *gitlabClient) PullRequestComment(context.Context, string, int, string) error {\n\treturn nil\n}", "title": "" }, { "docid": "49651032d91e593da31f92acf2a994ee", "score": "0.55358887", "text": "func (c *CRSImpl) CommentOn(ctx context.Context, clID, message string) error {\n\tsklog.Infof(\"Commenting on Gerrit CL %s with message %q\", clID, message)\n\tcl, err := c.getGerritCL(ctx, clID)\n\tif err != nil {\n\t\tif err == gerrit.ErrNotFound || strings.Contains(err.Error(), \"404 Not Found\") {\n\t\t\treturn code_review.ErrNotFound\n\t\t}\n\t\treturn skerr.Wrap(err)\n\t}\n\terr = c.gClient.AddComment(ctx, cl, message)\n\tif err != nil {\n\t\tif err == gerrit.ErrNotFound || strings.Contains(err.Error(), \"404 Not Found\") {\n\t\t\treturn code_review.ErrNotFound\n\t\t}\n\t\treturn skerr.Wrap(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ba60ff3006d15e7feaa9404863ea9e9", "score": "0.55236197", "text": "func (m *ChatMessage) Push(c Content) {\n\tm.Contents = append(m.Contents, c)\n}", "title": "" }, { "docid": "ae88ca1ff5725407cb17e95f77d1ed1c", "score": "0.5522338", "text": "func (t task) CreateComment(username string, data []byte) (int, error) {\n\tcommentInfo := structures.CommentInfo{}\n\n\terr := json.Unmarshal(data, &commentInfo)\n\tif err != nil {\n\t\tlog.Printf(\"Error while unmarshalling the comment . Error : %s\", err.Error())\n\t\treturn 0, errors.New(\"could not add comment. Make sure structure of the json provided is correct\")\n\t}\n\n\tcommentInfo.SenderUsername = username\n\terr = validateCommentInfo(commentInfo)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\t//log.Printf(\"comment is : %+v \\n\", commentInfo)\n\tid, err := database.Action.InsertComment(commentInfo)\n\tif err != nil {\n\t\treturn 0, errors.New(\"could not insert comment to database. check receiver_username is valid username.Also check if parent_comment_id is valid if you are doing subcomment\")\n\t}\n\treturn id, nil\n}", "title": "" }, { "docid": "751b9383559eded6fcbd1adc4be80d08", "score": "0.5499859", "text": "func (g *githubClient) PullRequestComment(ctx context.Context, repo string, prReq sdk.VCSPullRequestCommentRequest) error {\n\tif g.DisableStatus {\n\t\tlog.Warn(ctx, \"github.PullRequestComment> ⚠ Github statuses are disabled\")\n\t\treturn nil\n\t}\n\n\tcanWrite, err := g.UserHasWritePermission(ctx, repo)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !canWrite {\n\t\tif err := g.GrantWritePermission(ctx, repo); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tpath := fmt.Sprintf(\"/repos/%s/issues/%d/comments\", repo, prReq.ID)\n\tpayload := map[string]string{\n\t\t\"body\": prReq.Message,\n\t}\n\tvalues, _ := json.Marshal(payload)\n\tres, err := g.post(ctx, path, \"application/json\", bytes.NewReader(values), nil, &postOptions{skipDefaultBaseURL: false, asUser: true})\n\tif err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to post status\")\n\t}\n\n\tdefer res.Body.Close()\n\n\tbody, err := io.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn sdk.WrapError(err, \"Unable to read body\")\n\t}\n\n\tlog.Debug(ctx, \"%v\", string(body))\n\n\tif res.StatusCode != 201 {\n\t\treturn sdk.WrapError(err, \"Unable to create status on github. Status code : %d - Body: %s\", res.StatusCode, body)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2707c8c5a943a43e54f25e59d02aee94", "score": "0.54844856", "text": "func AddComment(comments []simpletask.Comment, commentText string) []simpletask.Comment {\n\tif commentText != \"\" {\n\t\tvar comment simpletask.Comment\n\t\tcomment.Text = commentText\n\t\tcomment.Created = time.Now()\n\t\tcomments = append([]simpletask.Comment{comment}, comments...)\n\t}\n\treturn comments\n}", "title": "" }, { "docid": "79e2e8fbcd4a4f2b8afcf5670e875744", "score": "0.546692", "text": "func (f *FeishuPayload) IssueComment(p *api.IssueCommentPayload) (api.Payloader, error) {\n\ttitle, link, by, operator := getIssuesCommentInfo(p)\n\treturn newFeishuTextPayload(fmt.Sprintf(\"%s\\n%s\\n%s\\n%s\\n\\n%s\", title, link, by, operator, p.Comment.Body)), nil\n}", "title": "" }, { "docid": "27ec2287b638dee1076945db0a20969b", "score": "0.5444842", "text": "func CreateComment(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\tpostID := params[\"postID\"]\n\tvar (\n\tcomment models.Comment\n\t)\n\tjson.NewDecoder(r.Body).Decode(&comment)\n\ttemp, err := strconv.ParseUint(postID, 10, 64)\n\tif err != nil {\n\t\tjson.NewEncoder(w).Encode(\"Invalid Post ID!\")\n\t}\n\tif temp == uint64(comment.PostID) {\n\t\tdb.Create(&comment)\n\t\tw.WriteHeader(http.StatusCreated)\n\t\tjson.NewEncoder(w).Encode(&comment)\n\t} else {\n\t\tjson.NewEncoder(w).Encode(models.ErrorResponse{Err : \"Mismatch Post ID!\"})\n\t}\n}", "title": "" }, { "docid": "40fdddb06b02e9eaec937b2ca6c98d2c", "score": "0.5433706", "text": "func (s BitbucketServerSource) CreateComment(ctx context.Context, c *Changeset, text string) error {\n\tpr, ok := c.Changeset.Metadata.(*bitbucketserver.PullRequest)\n\tif !ok {\n\t\treturn errors.New(\"Changeset is not a Bitbucket Server pull request\")\n\t}\n\n\treturn s.client.CreatePullRequestComment(ctx, pr, text)\n}", "title": "" }, { "docid": "afd3c05e1341d2d732e72c7f61a862c2", "score": "0.54208416", "text": "func (client *Client) CommentCreate(project_id, key_id string, params *CommentParams) (*Comment, error) {\n\tretVal := new(Comment)\n\terr := func() error {\n\n\t\turl := fmt.Sprintf(\"/v2/projects/%s/keys/%s/comments\", url.QueryEscape(project_id), url.QueryEscape(key_id))\n\n\t\tparamsBuf := bytes.NewBuffer(nil)\n\t\terr := json.NewEncoder(paramsBuf).Encode(&params)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\trc, err := client.sendRequest(\"POST\", url, \"application/json\", paramsBuf, 201)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdefer rc.Close()\n\n\t\tvar reader io.Reader\n\t\tif client.debug {\n\t\t\treader = io.TeeReader(rc, os.Stderr)\n\t\t} else {\n\t\t\treader = rc\n\t\t}\n\n\t\treturn json.NewDecoder(reader).Decode(&retVal)\n\n\t}()\n\treturn retVal, err\n}", "title": "" }, { "docid": "84a0b39d29226027746614ba1ddaebdf", "score": "0.5420741", "text": "func Create(ctx context.Context, author user.User, comment Comment) error {\n\tvar (\n\t\ttx, err = storage.DB.BeginTxx(ctx, nil)\n\t\tl = log.Fork().With(\"fn\", \"create\", \"author\", author.ID, \"story\", comment.StoryID)\n\t)\n\tif err != nil {\n\t\tl.Log(\"err\", err, \"desc\", \"can't begin transaction\")\n\t\treturn errInternal\n\t}\n\tdefer tx.Rollback()\n\n\t// Check the story really exists.\n\t{\n\t\tvar id uuid.UUID\n\t\tconst q = `SELECT id FROM story WHERE id = $1`\n\t\tif err = tx.QueryRowxContext(ctx, q, comment.StoryID).Scan(&id); err != nil && err != sql.ErrNoRows {\n\t\t\tl.Log(\"err\", err, \"sql\", q, \"desc\", \"db select failed\")\n\t\t\treturn errInternal\n\t\t}\n\t\tif err == sql.ErrNoRows {\n\t\t\treturn errors.New(\"story not found\")\n\t\t}\n\t}\n\n\t// Prepare comment for keeping.\n\t{\n\t\tcomment.ID = uuid.New()\n\t\tcomment.Author = author\n\t\tcomment.CreatedAt = time.Now()\n\t}\n\n\t// Save into a storage.\n\t{\n\t\tconst q = `INSERT INTO comment (id, story_id, body, created_by, created_at) VALUES ($1, $2, $3, $4, $5)`\n\t\tif _, err = tx.ExecContext(ctx, q, comment.ID, comment.StoryID, comment.Comment, comment.Author.ID, comment.CreatedAt); err != nil {\n\t\t\tl.Log(\"err\", err, \"sql\", q, \"desc\", \"new comment creation failed\")\n\t\t\treturn errInternal\n\t\t}\n\t}\n\n\treturn tx.Commit()\n}", "title": "" }, { "docid": "ae633053bc41a3b640f3a4c33a44d1cd", "score": "0.54204506", "text": "func (ach *AdminCommentHandler) PutComment(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\n\tid, err := strconv.Atoi(ps.ByName(\"id\"))\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tcomment, errs := ach.commentService.Comment(uint(id))\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tl := r.ContentLength\n\n\tbody := make([]byte, l)\n\n\tr.Body.Read(body)\n\n\tjson.Unmarshal(body, &comment)\n\n\tcomment, errs = ach.commentService.UpdateComment(comment)\n\n\tif len(errs) > 0 {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\toutput, err := json.MarshalIndent(comment, \"\", \"\\t\\t\")\n\n\tif err != nil {\n\t\tw.Header().Set(\"Content-Type\", \"application/json\")\n\t\thttp.Error(w, http.StatusText(http.StatusNotFound), http.StatusNotFound)\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.Write(output)\n\treturn\n}", "title": "" }, { "docid": "ae87a597b88fac049da22ecc370da2b0", "score": "0.5415971", "text": "func (c *Client) Post(privateKeys [][]byte, authorname, title, body, permlink, ptag, postImage string, tags []string) (bool, error) {\n\top := CreateCommentOperation(authorname, title, body, permlink, ptag, postImage, tags)\n\t_, err := c.SendTrx(privateKeys, op)\n\n\treturn err == nil, err\n\n}", "title": "" }, { "docid": "4e4f88b7cfd6f32a61698b57beb38e51", "score": "0.54061216", "text": "func GitHubIssueCommentHandler(payload interface{}, header webhooks.Header) {\n\tpl := payload.(github.IssueCommentPayload)\n\tif pl.Action == \"created\" && isPullRequestComment(pl.Issue.HTMLURL) {\n\t\tswitch pl.Comment.Body {\n\t\tcase \"/ok-to-test\":\n\t\t\towner := isOwner(&pl)\n\t\t\tif owner {\n\t\t\t\trepo := config.GetRepository(pl.Repository.Name)\n\t\t\t\tutils.GitClone(repo.Path, pl.Repository.CloneURL)\n\t\t\t\tutils.GitAddRemote(repo.Path, repo.RemoteName, repo.Remote)\n\t\t\t\tutils.GitFetch(repo.Path, repo.OriginName, pl.Issue.Number)\n\t\t\t\tutils.GitPushAndDelete(repo.Path, repo.RemoteName, pl.Issue.Number)\n\t\t\t}\n\t\tdefault:\n\t\t\tlog.Print(\"Other Event trigger\")\n\t\t}\n\t}\n}", "title": "" }, { "docid": "64f31ab84f2bfe233fcebd327d5722e3", "score": "0.5404993", "text": "func (c *CommentService) Create(projectID string, keyID int64, comments []NewComment) (r ListCommentsResponse, err error) {\n\tresp, err := c.post(c.Ctx(), pathCommentsByKey(projectID, keyID), &r, map[string]interface{}{\"comments\": comments})\n\n\tif err != nil {\n\t\treturn\n\t}\n\tapplyPaged(resp, &r.Paged)\n\treturn r, apiError(resp)\n}", "title": "" }, { "docid": "4d80167e9967c8f6818b0bb57908bffb", "score": "0.5398726", "text": "func (r *Router) CreateComment(c *gin.Context) {\n\tvar createCommentBody model.CreateCommentBody\n\terr := c.BindJSON(&createCommentBody)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\tc.AbortWithStatusJSON(400, global.ErrBadRequest.Error())\n\t\treturn\n\t}\n\t// uuid validation\n\tvar uid *uuid.UUID\n\tif createCommentBody.ReplyTo != nil {\n\t\tuid, err = global.ParseUUIDFromString(*createCommentBody.ReplyTo)\n\t\tif err != nil {\n\t\t\tc.AbortWithStatusJSON(400, global.ErrBadRequest.Error())\n\t\t\treturn\n\t\t}\n\t}\n\n\t// length validation\n\tif r.config.Moderation.MaxCommentLength != nil {\n\t\tif len(createCommentBody.Body) > *r.config.Moderation.MaxCommentLength {\n\t\t\tc.AbortWithStatusJSON(400, global.ErrBadRequest.Error())\n\t\t\treturn\n\t\t}\n\t}\n\n\t// author length validation\n\tif len(createCommentBody.Author) == 0 {\n\t\tc.AbortWithStatusJSON(400, global.ErrBadRequest.Error())\n\t\treturn\n\t}\n\tmaxAuthorLength := global.DefaultAuthorLengthLimit\n\tif r.config.Moderation.MaxAuthorLength != nil {\n\t\tmaxAuthorLength = *r.config.Moderation.MaxAuthorLength\n\t}\n\tcreateCommentBody.Author = ShortenAuthor(createCommentBody.Author, maxAuthorLength)\n\n\t// body length validation\n\tcreateCommentBody.Body = global.ParseAndSaniziteMarkdown(createCommentBody.Body)\n\tif len(createCommentBody.Body) == 0 {\n\t\tc.AbortWithStatusJSON(400, global.ErrBadRequest.Error())\n\t\treturn\n\t}\n\n\tcreateCommentBody.Path = NormalizePath(createCommentBody.Path)\n\tif r.config.Honeypot && createCommentBody.Email != nil {\n\t\tc.AbortWithStatusJSON(200, model.CreateCommentResponse{\n\t\t\tId: uuid.Must(uuid.NewV4()).String(),\n\t\t\tPath: createCommentBody.Path,\n\t\t\tBody: createCommentBody.Body,\n\t\t\tAuthor: createCommentBody.Author,\n\t\t\tEmail: createCommentBody.Email,\n\t\t\tReplyTo: createCommentBody.ReplyTo,\n\t\t})\n\t\treturn\n\t}\n\n\tdb := *r.db\n\tconfirmed := !r.config.Moderation.Enabled\n\tcommentUID, err := db.CreateComment(createCommentBody.Body, createCommentBody.Author, createCommentBody.Path, confirmed, uid)\n\tif err != nil {\n\t\tif err == global.ErrWrongReplyTo {\n\t\t\tc.AbortWithStatusJSON(400, global.ErrWrongReplyTo.Error())\n\t\t\treturn\n\t\t}\n\t\tlog.Println(err)\n\t\tc.AbortWithStatusJSON(500, global.ErrInternalServerError.Error())\n\t\treturn\n\t}\n\n\tif r.config.Notification.Webhook.Enabled {\n\t\turl := *r.config.Notification.Webhook.URL\n\n\t\tgo func() {\n\t\t\t_, err := http.Post(\n\t\t\t\turl,\n\t\t\t\t\"application/json\",\n\t\t\t\tbytes.NewBufferString(fmt.Sprintf(`{\"message\":\"%s\"}`, \"Comment received\")),\n\t\t\t)\n\n\t\t\tif err != nil {\n\t\t\t\tlog.Println(err)\n\t\t\t}\n\t\t}()\n\t}\n\n\tc.AbortWithStatusJSON(200, model.CreateCommentResponse{\n\t\tId: commentUID.String(),\n\t\tPath: createCommentBody.Path,\n\t\tBody: createCommentBody.Body,\n\t\tAuthor: createCommentBody.Author,\n\t\tEmail: createCommentBody.Email,\n\t\tReplyTo: createCommentBody.ReplyTo,\n\t})\n}", "title": "" }, { "docid": "c592765637650626f7201a21324c4da6", "score": "0.53874683", "text": "func (service *DiscussionCommandService) CreateComment(ctx context.Context, data types.CreateComment) (entity.Comment, error) {\n\tvar comment repositoryTypes.CreateComment\n\n\tcomment.PostID = data.PostID\n\tcomment.AuthorID = data.AuthorID\n\tcomment.Content = data.Content\n\n\tres, err := service.DiscussionCommandRepositoryInterface.InsertComment(comment)\n\tif err != nil {\n\t\treturn res, err\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "f85250ff8c4f59817e71e272f44b1fd8", "score": "0.5384676", "text": "func (b *Bilibili) SendComment(oid int, message string) (int, error) {\n\tret := new(util.AddComment)\n\n\t// Build request parameters\n\tdata := url.Values{}\n\tdata.Add(\"jsonp\", \"jsonp\")\n\tdata.Add(\"message\", message)\n\tdata.Add(\"type\", \"1\")\n\tdata.Add(\"plat\", \"1\")\n\tdata.Add(\"oid\", strconv.Itoa(oid))\n\n\treq, err := util.Network(util.COMMENT_URL, \"POST\", data.Encode())\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\treq.Header.Add(\"Origin\", util.MAIN_HOST)\n\treq.Header.Add(\"Referer\", util.BuildVideoReferer(oid))\n\tresp, err := b.Client.Do(req)\n\tif err != nil {\n\t\treturn -1, err\n\t}\n\tdefer resp.Body.Close()\n\tif err = util.JsonProc(resp, ret); err != nil {\n\t\treturn -1, err\n\t}\n\tif ret.Code != 0 {\n\t\treturn ret.Code, fmt.Errorf(\"Unknown error! Server returned %d with message %s.\", ret.Code, ret.Message)\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "e5fb1adf04aeeca0dd4bded1066806ff", "score": "0.5361796", "text": "func (c *WorkItemCommentsController) Create(ctx *app.CreateWorkItemCommentsContext) error {\n\treturn application.Transactional(c.db, func(appl application.Application) error {\n\t\t_, err := appl.WorkItems().Load(ctx, ctx.ID)\n\t\tif err != nil {\n\t\t\tjerrors, _ := jsonapi.ErrorToJSONAPIErrors(goa.ErrUnauthorized(err.Error()))\n\t\t\treturn ctx.NotFound(jerrors)\n\t\t}\n\n\t\tcurrentUser, err := login.ContextIdentity(ctx)\n\t\tif err != nil {\n\t\t\tjerrors, _ := jsonapi.ErrorToJSONAPIErrors(goa.ErrUnauthorized(err.Error()))\n\t\t\treturn ctx.Unauthorized(jerrors)\n\t\t}\n\n\t\tcurrentUserID, err := uuid.FromString(currentUser)\n\t\tif err != nil {\n\t\t\tjerrors, _ := jsonapi.ErrorToJSONAPIErrors(goa.ErrUnauthorized(err.Error()))\n\t\t\treturn ctx.Unauthorized(jerrors)\n\t\t}\n\n\t\treqComment := ctx.Payload.Data\n\n\t\tnewComment := comment.Comment{\n\t\t\tParentID: ctx.ID,\n\t\t\tBody: reqComment.Attributes.Body,\n\t\t\tCreatedBy: currentUserID,\n\t\t}\n\n\t\terr = appl.WorkItemComments().Create(ctx, &newComment)\n\t\tif err != nil {\n\t\t\tjerrors, _ := jsonapi.ErrorToJSONAPIErrors(goa.ErrUnauthorized(err.Error()))\n\t\t\treturn ctx.InternalServerError(jerrors)\n\t\t}\n\n\t\tres := &app.CommentSingle{\n\t\t\tData: toAPI(&newComment),\n\t\t}\n\t\treturn ctx.OK(res)\n\t})\n}", "title": "" }, { "docid": "6b4dfaee1d5abf52ff49cf19c21f642f", "score": "0.5353912", "text": "func (h *Handler) CreateComment(w http.ResponseWriter, r *http.Request) {\n\treqBody, _ := ioutil.ReadAll(r.Body)\n\tfmt.Println(\"Comment created!\")\n\tfmt.Println(reqBody)\n\th.App.CreateComment(reqBody)\n\tw.Header().Set(\"Content-Type\", \"application/json\")\n\tw.WriteHeader(http.StatusOK)\n}", "title": "" }, { "docid": "1b77b24292802944d15dcedc9f02dde7", "score": "0.5351387", "text": "func (server *Server) UploadComment(c *gin.Context) {\n\teventID := c.Param(\"id\")\n\n\teid, err := strconv.ParseUint(eventID, 10, 64)\n\tif err != nil {\n\t\tc.JSON(http.StatusBadRequest, gin.H{\n\t\t\t\"status\": http.StatusBadRequest,\n\t\t\t\"message\": \"Unable to handle request\",\n\t\t})\n\t\treturn\n\t}\n\n\t// Check the legitimacy of the token\n\tuid, err := auth.ExtractTokenID(c.Request)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"status\": http.StatusUnauthorized,\n\t\t\t\"message\": \"User Unauthorized\",\n\t\t})\n\t\treturn\n\t}\n\n\t// Check if user exists\n\tuser := models.User{}\n\terr = server.DB.Debug().Model(models.User{}).Where(\"id = ?\", uid).Take(&user).Error\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"status\": http.StatusUnauthorized,\n\t\t\t\"message\": \"User not Found\",\n\t\t})\n\t\treturn\n\t}\n\n\t// Check if event exists\n\tevent := models.Events{}\n\terr = server.DB.Debug().Model(models.Events{}).Where(\"id = ?\", eid).Take(&event).Error\n\tif err != nil {\n\t\tc.JSON(http.StatusUnauthorized, gin.H{\n\t\t\t\"status\": http.StatusUnauthorized,\n\t\t\t\"message\": \"Event not Found\",\n\t\t})\n\t\treturn\n\t}\n\n\teventComment := models.Event_Comment{}\n\n\tbody, err := ioutil.ReadAll(c.Request.Body)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnprocessableEntity, gin.H{\n\t\t\t\"status\": http.StatusUnprocessableEntity,\n\t\t\t\"message\": \"Unprocessable Entity\",\n\t\t})\n\t\treturn\n\t}\n\n\terr = json.Unmarshal(body, &eventComment)\n\tif err != nil {\n\t\tc.JSON(http.StatusUnprocessableEntity, gin.H{\n\t\t\t\"status\": http.StatusUnprocessableEntity,\n\t\t\t\"message\": \"Cannot Unmarshal Body\",\n\t\t})\n\t\treturn\n\t}\n\n\teventComment.UserID = uid\n\teventComment.EventID = eid\n\n\teventComment.Prepare()\n\n\tcommentCreated, err := eventComment.SaveEventComment(server.DB)\n\tif err != nil {\n\t\tc.JSON(http.StatusNotFound, gin.H{\n\t\t\t\"status\": http.StatusNotFound,\n\t\t\t\"message\": \"Error while creating comment\",\n\t\t})\n\t\treturn\n\t}\n\n\tc.JSON(http.StatusCreated, gin.H{\n\t\t\"status\": http.StatusCreated,\n\t\t\"message\": commentCreated,\n\t})\n}", "title": "" }, { "docid": "b8781c0126ba2e08615464d930247670", "score": "0.53444713", "text": "func (ts *TicketStore) SaveComment(c models.Comment) error {\n\t_, err := ts.db.Exec(`UPDATE comments \n SET (body, updated_date, author_id) = ($1, $2, $3)\n WHERE id = $4`,\n\t\tc.Body, time.Now(), c.Author.ID, c.ID)\n\n\treturn handlePqErr(err)\n}", "title": "" }, { "docid": "412c1b528c7df9b2f3e95577898eea7e", "score": "0.5343972", "text": "func (client *Client) PostNew(authorname, title, body string, opt *PCOptionsNew) (*OperResp, error) {\n\tpermlink := \"\"\n\tptag := \"\"\n\ttag := []string{}\n\n\tif opt != nil && opt.Permlink != \"\" {\n\t\tpermlink = translit.EncodeTitle(opt.Permlink)\n\t} else {\n\t\tpermlink = translit.EncodeTitle(title)\n\t}\n\n\tif opt != nil && opt.Tags != nil {\n\t\ttag = translit.EncodeTags(opt.Tags)\n\t}\n\n\tif opt != nil && opt.Ptag != \"\" {\n\t\tptag = translit.EncodeTag(opt.Ptag)\n\t} else {\n\t\tptag = translit.EncodeTag(opt.Tags[0])\n\t}\n\n\tjsonMeta := &types.ContentMetadata{\n\t\t\"tags\": tag,\n\t\t\"image\": []string{opt.PostImage},\n\t\t\"lib\": \"golos-go\",\n\t}\n\n\tvar trx []types.Operation\n\ttxp := &types.CommentOperation{\n\t\tParentAuthor: \"\",\n\t\tParentPermlink: ptag,\n\t\tAuthor: authorname,\n\t\tPermlink: permlink,\n\t\tTitle: title,\n\t\tBody: body,\n\t\tJSONMetadata: jsonMeta,\n\t}\n\ttrx = append(trx, txp)\n\n\tif opt.CommentOption != nil {\n\t\ttrx = append(trx, GetCommentOptionsOperationNew(authorname, permlink, *opt.CommentOption))\n\t}\n\n\tresp, err := client.SendTrx(authorname, trx)\n\treturn &OperResp{NameOper: \"Post\", PermLink: permlink, Bresp: resp}, err\n}", "title": "" }, { "docid": "0cc0ceeb3c182c40fa2bd65f42cab1eb", "score": "0.5341985", "text": "func Comment(w http.ResponseWriter, r *http.Request) {\n\n\tID := r.Context().Value(\"loggedInUserId\").(string)\n\tif !bson.IsObjectIdHex(ID) {\n\t\trenderJSON(w, http.StatusBadRequest, \"Not a valid user ID\")\n\t\treturn\n\t}\n\tuserID := bson.ObjectIdHex(ID)\n\tlog.Printf(\"LoggedIn UserID %s\", userID)\n\n\tdb := dbCon.CopyMongoDB()\n\tdefer db.Session.Close()\n\n\te := appErr{}\n\t//User is present or n't\n\tuserIns := models.User{}\n\terr := db.C(\"users\").FindId(userID).One(&userIns)\n\tif err != nil {\n\t\te = appErr{Message: \"User not found\", Error: err.Error()}\n\t\trenderJSON(w, http.StatusNotFound, e)\n\t\treturn\n\t}\n\n\tparams := r.Context().Value(\"params\").(httprouter.Params)\n\tif !bson.IsObjectIdHex(params.ByName(\"id\")) {\n\t\trenderJSON(w, http.StatusBadRequest, \"Not a valid content ID\")\n\t\treturn\n\t}\n\tcontentID := bson.ObjectIdHex(params.ByName(\"id\"))\n\tlog.Printf(\"Content ID %s\", contentID)\n\n\ttype commentDesc struct {\n\t\tText string `json:\"text\" bson:\"text\"`\n\t}\n\n\tcommentIns := commentDesc{}\n\tif !parseJSON(w, r.Body, &commentIns) {\n\t\treturn\n\t}\n\n\tcomment := &models.Comment{}\n\tcomment.ID = bson.NewObjectId()\n\tcomment.ContentID = contentID\n\tcomment.UserID = userID\n\tcomment.Text = commentIns.Text\n\terr = db.C(\"comments\").Insert(comment)\n\tif err != nil {\n\t\te = appErr{Message: \"Could n't insert user comment!\", Error: err.Error()}\n\t\trenderJSON(w, http.StatusBadRequest, e)\n\t\treturn\n\t}\n\trenderJSON(w, http.StatusOK, \"Comment posted successfully\")\n\treturn\n}", "title": "" }, { "docid": "4ff3e71753acfad1e03ced6480124f2d", "score": "0.5337983", "text": "func (c *Client) AddComment(repo Repo, number, body string) (comment Comment, err error) {\n\tpath := fmt.Sprintf(\"repos/%s/issues/%s/comments\", repo, number)\n\toptions := &Options{Params: map[string]string{\"body\": body}}\n\n\terr = c.jsonPost(path, options, &comment)\n\treturn\n}", "title": "" }, { "docid": "d91aa0dcc0edb8c4cfea46925a23e600", "score": "0.5326613", "text": "func (s *TeamsService) CreateComment(ctx context.Context, teamID int64, discsusionNumber int, comment DiscussionComment) (*DiscussionComment, *Response, error) {\n\tu := fmt.Sprintf(\"teams/%v/discussions/%v/comments\", teamID, discsusionNumber)\n\treq, err := s.client.NewRequest(\"POST\", u, comment)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\t// TODO: remove custom Accept header when this API fully launches.\n\treq.Header.Set(\"Accept\", mediaTypeTeamDiscussionsPreview)\n\n\tdiscussionComment := &DiscussionComment{}\n\tresp, err := s.client.Do(ctx, req, discussionComment)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn discussionComment, resp, nil\n}", "title": "" }, { "docid": "0ab55020c36ce02a48135490c077340e", "score": "0.5324116", "text": "func createMissionComment(cm *Comment) {\n\tc := dbms.Pool.Get()\n\tdefer c.Close()\n\tcm.Id, _ = redis.Int(c.Do(\"INCR\", \"autoIncrComment\"))\n\tcm.Pid = base.HashedCommentId(cm.Id)\n\t//go func() {\n\tmid := dbms.ReadMissionId(cm.MissionPid)\n\tlua := `\n\t\t\tlocal cmid = KEYS[2]\n\t\t\tredis.call(\"HMSET\", \"comment:\"..cmid,\n\t\t\t\t\t KEYS[1], cmid, KEYS[3], KEYS[4], KEYS[5], KEYS[6],\n\t\t\t\t\t KEYS[7], KEYS[8], KEYS[9], KEYS[10])\n\t\t\t`\n\tka := []interface{}{\n\t\t//comment models\n\t\tCId, cm.Id,\n\t\tCPid, cm.Pid,\n\t\tCCreateTime, time.Now().Unix(),\n\t\tCCriticPid, cm.CriticPid,\n\t\tCCriticName, cm.CriticName,\n\t}\n\tscript := redis.NewScript(len(ka), lua)\n\t_, err := script.Do(c, ka...)\n\tif err != nil {\n\t\tlog.Error(\"Error create comment:\", err)\n\t}\n\tc.Do(\"RPUSH\", fmt.Sprintf(missionCommentsList, mid), cm.Id)\n\t//}()\n}", "title": "" }, { "docid": "30269fd6ddd046b34c3631774b05ab4e", "score": "0.53148544", "text": "func (c *gitlabClient) PullRequestComment(context.Context, string, sdk.VCSPullRequestCommentRequest) error {\n\treturn nil\n}", "title": "" }, { "docid": "2b86f482fa2df804759a6d0efa36ef11", "score": "0.5309032", "text": "func (s *IssuesService) CreateComment(issueKey string, comment string) (*IssueComment, *Response, error) {\n\tu := \"issues/\" + issueKey + \"/comments\"\n\tv := url.Values{}\n\tv.Set(\"content\", comment)\n\n\treq, err := s.client.NewRequest(\"POST\", u, &v)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tissueComment := new(IssueComment)\n\tresp, err := s.client.Do(req, &issueComment)\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\treturn issueComment, resp, nil\n}", "title": "" }, { "docid": "aa2054d0761a900068044ccf377d6919", "score": "0.5299621", "text": "func CreateComment(form CommentForm) {\n\tc := Comment{}\n\tc.Username = form.Username\n\tintCommentID, _ := strconv.Atoi(form.SuggestionID)\n\tc.SuggestionID = intCommentID\n\tc.Description = form.Description\n\tc.Rank = 0\n\tdb.Create(&c)\n}", "title": "" }, { "docid": "e722654a220d8d93a95d20dd7745dfff", "score": "0.5292435", "text": "func CreateNewComment(w http.ResponseWriter, r *http.Request) {\n\tfmt.Println(\"Create Comment Handle Recieved your request!\")\n\n\t//Get user posting\n\tusername := authenticateUserHandler(w, r)\n\n\tvars := mux.Vars(r)\n\tcategoryName := vars[\"category\"]\n\ttopicID := vars[\"topicID\"]\n\n\tsessPtr, err := Server.Database.CreateSessionPtr()\n\tdefer sessPtr.Close()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\n\t//validate existance of topic in category with ID = topicID, simple pipe with lookup and match...\n\tvar topicInCategory TopicAndCategory\n\terr = Server.Database.GetTopic(categoryName, topicID, &topicInCategory, sessPtr)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprintf(w, \"Something bad happened 😮\\n\")\n\t\treturn\n\t}\n\n\t//TODO: Unmarshal json body into Comment structure, modify if neccessary...\n\tvar comment database.Comment\n\trBody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Printf(\"unable to read, err: %v\\n\", err)\n\t\treturn\n\t}\n\terr = json.Unmarshal(rBody, &comment)\n\tif err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Printf(\"unable to unmarshal, err: %v\\n\", err)\n\t\treturn\n\t}\n\tcomment.Username = username\n\n\tif valid, err := validator.ValidateStruct(comment); !valid {\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\t\tfmt.Printf(\"unable to validate comment: %+v\\n\", err)\n\t\t\tfmt.Printf(\"request body: %+v\", string(rBody))\n\t\t\treturn\n\t\t}\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tfmt.Fprint(w, \"Comment contains disallowed letters\")\n\t\treturn\n\t}\n\n\t// Update topic with new comment\n\tif err = Server.Database.PushTopicComment(topicID, comment, sessPtr); err != nil {\n\t\tw.WriteHeader(http.StatusInternalServerError)\n\t\tfmt.Fprintf(w, \"Something bad happened 😮\\n\")\n\t\tfmt.Println(err)\n\t\treturn\n\t}\n\tw.WriteHeader(http.StatusCreated)\n}", "title": "" }, { "docid": "c3b59546b6f1f8ec9c4f7427caa6d641", "score": "0.5288825", "text": "func (bot *Bot) PullRequestCommented(w http.ResponseWriter, r *http.Request) {\n\tlogrus.Println(\"PR Commented!\")\n\tdecoder := json.NewDecoder(r.Body)\n\tvar pr bitbucket.PullRequestCommentCreatedPayload\n\terr := decoder.Decode(&pr)\n\tif err != nil {\n\t\tlogrus.Errorf(\"Decode failed: %v\", err)\n\t}\n\t// if comment is created, bot will send a message with a link to a comment.\n\ttext := fmt.Sprintf(\"%s написал [комментарий](%v) к пул реквесту [#%v](%v): %v.\", pr.Actor.DisplayName, pr.Comment.Links.HTML.Href, pr.PullRequest.ID, pr.PullRequest.Links.HTML.Href, pr.Comment.Content.Raw)\n\tlogrus.Println(text)\n\tif pr.Actor.DisplayName != \"\" && pr.PullRequest.ID != 0 && pr.PullRequest.Links.HTML.Href != \"\" && pr.Comment.Content.HTML != \"\" {\n\t\tbot.SendUpdate(text)\n\t}\n\n}", "title": "" }, { "docid": "d8ebd76cfa6b212ec537721f01b0ad17", "score": "0.5281658", "text": "func createIssueComment(\n\tis *github.IssueCommentEvent,\n\tclient *issueClient,\n\tmessage string,\n) error {\n\tcomment := &github.IssueComment{Body: &message}\n\t_, _, err := client.client.CreateComment(\n\t\tclient.ctx,\n\t\t*is.Repo.Owner.Login,\n\t\tis.Repo.GetName(),\n\t\tis.Issue.GetNumber(),\n\t\tcomment,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8aa5bcd116de97922977e755d67713a3", "score": "0.52800435", "text": "func (agc *AuthenticatedGithubClient) CreateComment(owner string, repo string, issueNumber int, body string) (*gh.IssueComment, error) {\n\tcomment := gh.IssueComment{Body: &body}\n\tissueComment, _, error := agc.Client.Issues.CreateComment(agc.ctx, owner, repo, issueNumber, &comment)\n\treturn issueComment, error\n}", "title": "" }, { "docid": "075570fba817666e78f5114f9d798d40", "score": "0.5278137", "text": "func (cr *commentsRepository) Create(userID uint64, comment Comment) (Comment, error) {\n\tcomment.UserID = userID\n\terr := db.Create(&comment).Error\n\treturn comment, err\n}", "title": "" }, { "docid": "68cccb7d3309361cb647e802b39af8f0", "score": "0.5271487", "text": "func (ts *TicketStore) NewComment(t models.Ticket, c *models.Comment) error {\n\t_, err := ts.db.Exec(`UPDATE tickets SET (updated_date) = ($1) \n WHERE id = $2;`, time.Now(), t.ID)\n\tif err != nil {\n\t\treturn handlePqErr(err)\n\t}\n\n\terr = ts.db.QueryRow(`INSERT INTO comments \n (body, ticket_id, author_id) VALUES ($1, $2, $3)\n RETURNING id;`, c.Body, t.ID, c.Author.ID).\n\t\tScan(&c.ID)\n\n\treturn handlePqErr(err)\n}", "title": "" }, { "docid": "3ca89998e4b6a823738b0b48d3ff346b", "score": "0.52539027", "text": "func Comment(client Client, branchName, comment string) error {\n\treturn client.Comment(branchName, comment)\n}", "title": "" }, { "docid": "7da1b8e0032f435f1169df3c942e2050", "score": "0.5253356", "text": "func commentUpdate(c *macaron.Context, comment Comment) {\n\tvar task Task\n\n\tcid := comment.ID\n\tlog.Printf(\"%+v\", comment)\n\n\tempty := (len(comment.Body) == 0 || comment.Body == \"<p><br></p>\")\n\tDB.Where(\"ID = ?\", comment.TaskID).Find(&task)\n\n\tif cid == 0 && empty == true {\n\t\t// Empty, do not create or update comment\n\t\tc.PlainText(200, []byte(\"OK\"))\n\t\treturn\n\t} else if cid > 0 && empty == true {\n\t\t// Delete existing comment\n\t\tDB.Delete(&comment)\n\t} else {\n\t\tif cid == 0 {\n\t\t\t// Update existing comment\n\t\t\tvar test Comment\n\t\t\tDB.Where(\"task_id = ?\", comment.TaskID).First(&test)\n\t\t\tif test.ID > 0 {\n\t\t\t\tcomment.ID = test.ID\n\t\t\t}\n\t\t}\n\t\t// Create or update comment\n\t\tDB.Save(&comment)\n\t\ttask.Comment = comment\n\t}\n\ttask.Sync(false, true, true)\n\tc.PlainText(200, []byte(\"OK\"))\n}", "title": "" }, { "docid": "0cf974f52d1db404bb4af0736c6293ac", "score": "0.5245184", "text": "func createNewCommentHandlerBack(content []byte) Response {\n\t// fmt.Println(\"create\")\n\t// content is a marshal type, but need to convert to json\n\tvar frontComment struct {\n\t\tNodeID string\n\t\tAuthor string\n\t\tNewcomment Comment\n\t}\n\n\tjson.Unmarshal(content, &frontComment)\n\n\tnodeID := frontComment.NodeID\n\tnewComment := frontComment.Newcomment\n\t// authorID := frontComment.Author\n\n\t// add to user's comment\n\t// var currUser *User\n\n\tsuccessLog := false\n\ttableLock.Lock()\n\tfor _, node := range globalNode {\n\t\tif node.Id == nodeID {\n\t\t\tnode.Comments = append(node.Comments, newComment.Id)\n\t\t\tsuccessLog = true\n\t\t}\n\t}\n\n\t// add to global comments list\n\tpointer := &frontComment.Newcomment\n\tglobalComment = append(globalComment, pointer)\n\ttableLock.Unlock()\n\n\tvar res Response\n\tif successLog {\n\t\tres = Response{\n\t\t\tResponseType: \"success\",\n\t\t}\n\t} else {\n\t\tres = Response{\n\t\t\tResponseType: \"fail\",\n\t\t}\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "ccbccdb0ace7b8e7a3989f81dfe2bb7b", "score": "0.5238464", "text": "func (cm *CommentsDBMock) Create(userID uint64, comment models.Comment) (models.Comment, error) {\n\tcomment.UserID = userID\n\tcm.Comments = append(cm.Comments, comment)\n\treturn comment, nil\n}", "title": "" }, { "docid": "d44b5775bedacc73fcf17339165bd458", "score": "0.52111834", "text": "func (c *Client) CreateComment(ctx context.Context, resourceID string, comment Comment) (*Comment, error) {\n\tmsg, err := c.DoCustomRequest(ctx, \"POST\", \"/comments/resource/\"+resourceID+\".json\", \"v2\", comment, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = json.Unmarshal(msg.Body, &comment)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &comment, nil\n}", "title": "" }, { "docid": "0f79b23b94d8ec366788e3ca3ee742ce", "score": "0.5210109", "text": "func (c *Comments) AddComment(comment *Comment) {\n\tif c.primary {\n\t\tif !c.wasLineBreak {\n\t\t\tc.Comments = append(c.Comments, comment)\n\t\t} else {\n\t\t\tc.future = append(c.future, comment)\n\t\t}\n\t} else {\n\t\tif !c.wasLineBreak || (c.Current == nil && !c.afterBlock) {\n\t\t\tc.Comments = append(c.Comments, comment)\n\t\t} else {\n\t\t\tc.future = append(c.future, comment)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "13e87e0711c6bcbf5a445c5c3f591774", "score": "0.52097076", "text": "func (comment *JiraComment) CreateComment(userMaps []userMap) ClubHouseCreateComment {\n\tcommentText := sanitize.HTML(comment.Comment)\n\tif commentText == \"\\n\" {\n\t\tcommentText = \"(empty)\"\n\t}\n\tauthor := MapUser(userMaps, comment.Author)\n\tif author == \"\" {\n\t\t// since we MUST have a comment author, make it me and prepend the actual username to the comment body\n\t\tauthor = MapUser(userMaps, \"ted\")\n\t\tcommentText = comment.Author + \": \" + commentText\n\t}\n\n\treturn ClubHouseCreateComment{\n\t\tText:\t\tcommentText,\n\t\tCreatedAt:\tParseJiraTimeStamp(comment.CreatedAtString),\n\t\tAuthor: \tauthor,\n\t}\n}", "title": "" }, { "docid": "05675d04b34e2bad89dcc8a543f8c779", "score": "0.51939833", "text": "func create_comment(store session.Store) fiber.Handler {\n\treturn func(c *fiber.Ctx) error {\n\t\t// Get request\n\t\trequest := new(CreateCommentRequest)\n\n\t\tif err := c.BodyParser(request); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Not enough values given\n\t\tif request.PostId == \"\" || request.Comment == \"\" {\n\t\t\treturn c.Status(fiber.StatusPartialContent).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid credentials\",\n\t\t\t})\n\t\t}\n\n\t\t// Get token in header\n\t\ttoken := c.Get(\"access_token\")\n\n\t\t// If there's no token return\n\t\tif token == \"\" {\n\t\t\treturn c.Status(fiber.StatusPartialContent).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid token\",\n\t\t\t})\n\t\t}\n\n\t\t// Connect to database\n\t\tDBengine, err := data.CreateDBEngine()\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\n\t\t// Search the user in the \"user\" table\n\t\tuserModel := new(models.User)\n\t\thasUser, err := DBengine.Table(\"user\").Where(\"access_token = ?\", token).Desc(\"id\").Get(userModel)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\n\t\t// User not found (probably token is not valid)\n\t\tif !hasUser {\n\t\t\treturn c.Status(fiber.StatusUnauthorized).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid user or token\",\n\t\t\t})\n\t\t}\n\n\t\t// Transform post id in int64\n\t\tpostId, err := strconv.ParseInt(request.PostId, 10, 64)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusBadRequest).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid post id\",\n\t\t\t})\n\t\t}\n\n\t\t// Check if post exists\n\t\thasPost, _, DBengine, err := utils.GetPost(postId)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\t\tif !hasPost {\n\t\t\treturn c.Status(fiber.StatusBadRequest).JSON(fiber.Map{\n\t\t\t\t\"error\": \"post not found\",\n\t\t\t})\n\t\t}\n\n\t\t// Create post model\n\t\tnewComment := &models.PostComments{\n\t\t\tPostId: postId,\n\t\t\tOwnerUsername: userModel.Username,\n\t\t\tComment: request.Comment,\n\t\t}\n\n\t\t// Put post in database\n\t\t_, err = DBengine.Insert(newComment)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\n\t\treturn c.Status(fiber.StatusOK).JSON(fiber.Map{\n\t\t\t\"comment\": newComment,\n\t\t})\n\t}\n}", "title": "" }, { "docid": "24a932168da12b980b3b1299b8d93fb8", "score": "0.5191525", "text": "func (pr *PullRequest) CreateReview(msg string, approve bool) error {\n\tclient := NewGithubClient()\n\tevent := \"REQUEST_CHANGES\"\n\tif approve {\n\t\tevent = \"APPROVE\"\n\t}\n\tnewComment := &github.PullRequestReviewRequest{\n\t\tBody: &msg,\n\t\tCommitID: &pr.SHA,\n\t\tEvent: &event,\n\t}\n\t// TODO: there is a limit to create review on github need to handle this.\n\t_, _, err := client.PullRequests.CreateReview(context.Background(), pr.Owner, pr.Repo, pr.Number, newComment)\n\tif err != nil {\n\t\tif er, ok := err.(*github.ErrorResponse); ok {\n\t\t\tlog.Printf(\"%#v\\n\", er.Message)\n\t\t}\n\t\treturn fmt.Errorf(\"counld not comment on pull request (%d): %s\", pr.Number, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f7283164811d1ffe0afa891f8b5eb96e", "score": "0.51908433", "text": "func AddComment(username string, hash string, commentStr string) *Comment {\n\tcurrentComments := *GetAllCommentsByUser(username)\n\n\tcurrentTime := time.Now()\n\ttimeFormatted := currentTime.Format(\"2006.01.02 15:04:05\")\n\n\tcomment := Comment{\n\t\tComment: commentStr,\n\t\tHash: hash,\n\t\tDate: timeFormatted,\n\t}\n\n\tcurrentComments = append(currentComments, comment)\n\n\tsaveComments(username, &currentComments)\n\n\treturn &comment\n}", "title": "" }, { "docid": "a3639001909c26bb78d3055bf087e602", "score": "0.5177732", "text": "func (client *Client) CreateComment(handle, message string) (*Comment, error) {\n\tvar out reqComment\n\tcomment := Comment{Message: String(message)}\n\tif len(handle) > 0 {\n\t\tcomment.Handle = String(handle)\n\t}\n\tif err := client.doJsonRequest(\"POST\", \"/v1/comments\", &comment, &out); err != nil {\n\t\treturn nil, err\n\t}\n\treturn out.Comment, nil\n}", "title": "" }, { "docid": "f159bba4c029226fc2dcf96e19c1b1d8", "score": "0.5152455", "text": "func (s *BaserobotwarListener) EnterComment(ctx *CommentContext) {}", "title": "" }, { "docid": "88aae7c68b7157678ccdc74bd67ecc12", "score": "0.51368415", "text": "func (s *ObjectService) CreateComment(ctx context.Context, id string, new CommentRequest) (Comment, *http.Response, error) {\n\tresource := Comment{} // new(Object)\n\n\treq, err := s.client.NewRequest(ctx, http.MethodPost, \"comments/\"+objectBasePath+\"/\"+id, new)\n\tif err != nil {\n\t\treturn resource, nil, err\n\t}\n\n\tresp, _, err := s.client.Do(ctx, req, &resource, false)\n\tif err != nil {\n\t\treturn resource, nil, err\n\t}\n\n\treturn resource, resp, nil\n}", "title": "" }, { "docid": "e075efc36b1528e3ee0485f9ec61a39b", "score": "0.51359206", "text": "func Comment(comment tables.Comment) error {\n\tstmt, err := mysqlBus.DB.Prepare(\"INSERT INTO Comment VALUES(?, ?, ?, ?)\")\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Println(\"Inserting a comment with ID \" + string(comment.ID))\n\t_, err = stmt.Exec(comment.ID, comment.Username, comment.Timestamp, comment.CommentText)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "29500150c7e99d90b97942242cafa26c", "score": "0.5133055", "text": "func (h *Engine) prComments(ctx context.Context, org string, project string, num int, newerThan time.Time) ([]*Comment, time.Time, error) {\n\tstart := time.Now()\n\n\tvar comments []*Comment\n\tcs, _, err := h.cachedIssueComments(ctx, org, project, num, newerThan)\n\tif err != nil {\n\t\tklog.Errorf(\"pr comments: %v\", err)\n\t}\n\tfor _, c := range cs {\n\t\tcomments = append(comments, NewComment(c))\n\t}\n\n\trc, _, err := h.cachedReviewComments(ctx, org, project, num, newerThan)\n\tif err != nil {\n\t\tklog.Errorf(\"comments: %v\", err)\n\t}\n\tfor _, c := range rc {\n\t\th.updateMtimeLong(org, project, num, c.GetUpdatedAt())\n\n\t\tnc := NewComment(c)\n\t\tnc.ReviewID = c.GetPullRequestReviewID()\n\t\tcomments = append(comments, nc)\n\t}\n\n\t// Re-sort the mixture of review and issue comments in ascending time order\n\tsort.Slice(comments, func(i, j int) bool { return comments[j].Created.After(comments[i].Created) })\n\n\tif num == h.debugNumber {\n\t\tklog.Errorf(\"debug comments: %s\", formatStruct(comments))\n\t}\n\n\treturn comments, start, err\n}", "title": "" }, { "docid": "ffe418c20861ef9bb378345e2e576378", "score": "0.51277155", "text": "func (r PostCommentForPullRequestRequest) Send() (*PostCommentForPullRequestOutput, error) {\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn r.Request.Data.(*PostCommentForPullRequestOutput), nil\n}", "title": "" }, { "docid": "3a69314ac2177a227d062abaafb05782", "score": "0.51268864", "text": "func (r *CommentsService) Create(fileId string, comment *Comment) *CommentsCreateCall {\n\tc := &CommentsCreateCall{s: r.s, urlParams_: make(gensupport.URLParams)}\n\tc.fileId = fileId\n\tc.comment = comment\n\treturn c\n}", "title": "" }, { "docid": "18ab24aa367c2cfb0dfb16b61c31dadb", "score": "0.51178277", "text": "func (controller *Controller) InsertComment(c echo.Context) error {\n\tvar comment Comment\n\t// bind request to comment struct\n\tif err := c.Bind(&comment); err != nil {\n\t\tc.Logger().Error(\"Bind: \", err)\n\t\treturn c.String(http.StatusBadRequest, \"Bind: \"+err.Error())\n\t}\n\t// validate request\n\tif err := c.Validate(&comment); err != nil {\n\t\tc.Logger().Error(\"Validate: \", err)\n\t\treturn c.JSON(http.StatusBadRequest, &Error{Error: err.Error()})\n\t}\n\t// insert record\n\tif err := controller.dbmap.Insert(&comment); err != nil {\n\t\tc.Logger().Error(\"Insert: \", err)\n\t\treturn c.String(http.StatusBadRequest, \"Insert: \"+err.Error())\n\t}\n\tc.Logger().Infof(\"inserted comment: %v\", comment.Id)\n\treturn c.NoContent(http.StatusCreated)\n}", "title": "" }, { "docid": "75574a11d6840102aac9d88d1b7f19e2", "score": "0.5106982", "text": "func Create(w http.ResponseWriter, r *http.Request) {\n\tvar deliveryServiceRequestComment tc.DeliveryServiceRequestCommentV5\n\n\tinf, userErr, sysErr, errCode := api.NewInfo(r, nil, nil)\n\tif userErr != nil || sysErr != nil {\n\t\tapi.HandleErr(w, r, inf.Tx.Tx, errCode, userErr, sysErr)\n\t\treturn\n\t}\n\tdefer inf.Close()\n\n\ttx := inf.Tx.Tx\n\n\tif err := json.NewDecoder(r.Body).Decode(&deliveryServiceRequestComment); err != nil {\n\t\tapi.HandleErr(w, r, tx, http.StatusBadRequest, err, nil)\n\t\treturn\n\t}\n\n\tif err := Validate(deliveryServiceRequestComment); err != nil {\n\t\tapi.HandleErr(w, r, tx, http.StatusBadRequest, err, nil)\n\t\treturn\n\t}\n\n\tau := tc.IDNoMod(inf.User.ID)\n\tdeliveryServiceRequestComment.AuthorID = au\n\n\tresultRows, err := inf.Tx.NamedQuery(insertQuery(), deliveryServiceRequestComment)\n\tif err != nil {\n\t\tuserErr, sysErr, errCode := api.ParseDBError(err)\n\t\tapi.HandleErr(w, r, tx, errCode, userErr, sysErr)\n\t\treturn\n\t}\n\tdefer resultRows.Close()\n\n\trowsAffected := 0\n\tfor resultRows.Next() {\n\t\trowsAffected++\n\t\tif err := resultRows.Scan(&deliveryServiceRequestComment.ID, &deliveryServiceRequestComment.LastUpdated); err != nil {\n\t\t\tapi.HandleErr(w, r, tx, http.StatusInternalServerError, nil, errors.New(\"deliveryservice_request_comment create: scanning comment: \"+err.Error()))\n\t\t\treturn\n\t\t}\n\t}\n\tif rowsAffected == 0 {\n\t\tapi.HandleErr(w, r, tx, http.StatusInternalServerError, nil, errors.New(\"deliveryservice_request_comment create: comment couldn't be created\"))\n\t\treturn\n\t} else if rowsAffected > 1 {\n\t\tapi.HandleErr(w, r, tx, http.StatusInternalServerError, nil, errors.New(\"deliveryservice_request_comment create: comment couldn't be created: too many ids returned from insert\"))\n\t\treturn\n\t}\n\n\talerts := tc.CreateAlerts(tc.SuccessLevel, \"deliveryservice_request_comment was created.\")\n\tapi.WriteAlertsObj(w, r, http.StatusOK, alerts, deliveryServiceRequestComment)\n\tchangeLogMsg := fmt.Sprintf(\"DELIVERYSERVICE_REQUEST_COMMENT: %d, ID: %d, ACTION: Created deliveryservice_request_comment\", deliveryServiceRequestComment.ID, deliveryServiceRequestComment.ID)\n\tapi.CreateChangeLogRawTx(api.ApiChange, changeLogMsg, inf.User, tx)\n}", "title": "" }, { "docid": "4523b037e84089c3f22b44e7f117e4b8", "score": "0.51068574", "text": "func submit(t *testing.T, jirix *jiri.X, originPath string, gerritPath string, review *review) {\n\tcwd, err := os.Getwd()\n\tif err != nil {\n\t\tt.Fatalf(\"Getwd() failed: %v\", err)\n\t}\n\tchdir(t, jirix, originPath)\n\texpectedRef := gerrit.Reference(review.CLOpts)\n\tif err := gitutil.New(jirix.NewSeq()).Pull(gerritPath, expectedRef); err != nil {\n\t\tt.Fatalf(\"Pull gerrit to origin failed: %v\", err)\n\t}\n\tchdir(t, jirix, cwd)\n}", "title": "" }, { "docid": "59a4526164b562c33d303b2f62f02a66", "score": "0.5104369", "text": "func (h *Handler) saveComment(c *gin.Context) {\n\thandler.HandleRequest(c, func(c *gin.Context) *handler.Response {\n\t\tlogger := logging.FromContext(c)\n\t\t// bind\n\t\ttype RequestUri struct {\n\t\t\tSlug string `uri:\"slug\" binding:\"required\"`\n\t\t}\n\t\ttype RequestBody struct {\n\t\t\tComment struct {\n\t\t\t\tBody string `json:\"body\" binding:\"required\"`\n\t\t\t} `json:\"comment\" binding:\"required\"`\n\t\t}\n\t\tvar (\n\t\t\turi RequestUri\n\t\t\tbody RequestBody\n\t\t)\n\t\tif err := c.ShouldBindUri(&uri); err != nil {\n\t\t\tlogger.Errorw(\"article.handler.saveComment failed to bind\", \"err\", err)\n\t\t\tvar details []*validate.ValidationErrDetail\n\t\t\tif vErrs, ok := err.(validator.ValidationErrors); ok {\n\t\t\t\tdetails = validate.ValidationErrorDetails(&uri, \"uri\", vErrs)\n\t\t\t}\n\t\t\treturn handler.NewErrorResponse(http.StatusBadRequest, handler.InvalidUriValue, \"invalid article comment request in uri\", details)\n\t\t}\n\t\tif err := c.ShouldBindJSON(&body); err != nil {\n\t\t\tlogger.Errorw(\"article.handler.saveComment failed to bind\", \"err\", err)\n\t\t\tvar details []*validate.ValidationErrDetail\n\t\t\tif vErrs, ok := err.(validator.ValidationErrors); ok {\n\t\t\t\tdetails = validate.ValidationErrorDetails(&uri, \"json\", vErrs)\n\t\t\t}\n\t\t\treturn handler.NewErrorResponse(http.StatusBadRequest, handler.InvalidUriValue, \"invalid article comment request in body\", details)\n\t\t}\n\n\t\tcurrentUser := account.MustCurrentUser(c)\n\t\tcomment := model.Comment{\n\t\t\tBody: body.Comment.Body,\n\t\t\tAuthor: *currentUser,\n\t\t}\n\t\tif err := h.articleDB.SaveComment(c, uri.Slug, &comment); err != nil {\n\t\t\tif database.IsRecordNotFoundErr(err) {\n\t\t\t\treturn handler.NewErrorResponse(http.StatusNotFound, handler.NotFoundEntity, \"not found article\", nil)\n\t\t\t}\n\t\t\treturn handler.NewInternalErrorResponse(err)\n\t\t}\n\t\treturn handler.NewSuccessResponse(http.StatusCreated, NewCommentResponse(&comment))\n\t})\n}", "title": "" }, { "docid": "4a3b18eb968509e5c6f3ba76cddaa123", "score": "0.5103594", "text": "func genericCommentAction(action string) github.GenericCommentEventAction {\n\tswitch action {\n\tcase \"created\", \"opened\", \"submitted\":\n\t\treturn github.GenericCommentActionCreated\n\tcase \"edited\":\n\t\treturn github.GenericCommentActionEdited\n\tcase \"deleted\", \"dismissed\":\n\t\treturn github.GenericCommentActionDeleted\n\t}\n\t// The action is not related to the text body.\n\treturn \"\"\n}", "title": "" }, { "docid": "cc73843c417a2d6f70f5fdda5b7e6e25", "score": "0.5093483", "text": "func (e *Example) PutComment(ctx context.Context, req *example.Request, rsp *example.Response) error {\n\tfmt.Println(\"更新用户评价订单信息\tPUT\tapi/v1.0/orders/:id/comment \tPutComment\")\n\n\t//初始化返回值\n\trsp.Errno = utils.RECODE_OK\n\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\n\t//sessionid\n\tsessionid := req.Sessionid\n\n\t//拼接key\n\tkey := sessionid + \"user_id\"\n\n\t//链接redis\n\tbm, err := utils.RedisOpen(utils.G_server_name, utils.G_redis_addr, utils.G_redis_port, utils.G_redis_dbnum)\n\tif err != nil {\n\t\tfmt.Println(\"链接redis错误,err :\", err)\n\t\trsp.Errno = utils.RECODE_DBERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//获取userid\n\tvalue_id := bm.Get(key)\n\tuserid, _ := redis.Int(value_id, nil)\n\tfmt.Println(\"userid :\", userid)\n\n\t//获取订单id\n\torderid, _ := strconv.Atoi(req.OrderId)\n\n\t//获取评论数据\n\tcomment := req.Comment\n\n\t//校验数据,判断comment是否为空\n\tif comment == \"\" {\n\t\tfmt.Println(\"评论内容为空,不合法!\")\n\t\trsp.Errno = utils.RECODE_PARAMERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//根据orderid找到所关联的房源信息\n\t//查询数据库,订单必须存在,订单状态必须为WAIT_COMMENT待评价状态\n\t//创建mysql操作句柄\n\to := orm.NewOrm()\n\n\t//定义承载订单数据的容器\n\torder := models.OrderHouse{}\n\n\t//查询订单表,确认订单表存在\n\tqs := o.QueryTable(\"OrderHouse\").Filter(\"Id\", orderid)\n\tif err := qs.Filter(\"Status\", models.ORDER_STATUS_WAIT_COMMENT).One(&order); err != nil {\n\t\tfmt.Println(\"订单数据查询失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//关联查询用户表\n\tif _, err = o.LoadRelated(&order, \"User\"); err != nil {\n\t\tfmt.Println(\"订单表关联用户表查询失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//将用户id与当前用户id进行对比,确认评论人与下单人是同一人\n\tif order.User.Id != userid {\n\t\tfmt.Println(\"订单用户id与当前用户id不同,数据错误!\")\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//更新订单表数据信息\n\torder.Comment = comment\n\torder.Status = models.ORDER_STATUS_COMPLETE\n\n\t//关联查询order订单所关联的House信息\n\tif _, err = o.LoadRelated(&order, \"House\"); err != nil {\n\t\tfmt.Println(\"订单表关联房屋表查询失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//房屋信息更新\n\thouse := order.House\n\t//房屋订单成交量加一\n\thouse.Order_count++\n\n\t//将order和house表数据更新到mysql数据库\n\tif _, err = o.Update(&order, \"Comment\", \"Status\"); err != nil {\n\t\tfmt.Println(\"更新订单表数据库失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\tif _, err = o.Update(&house, \"Order_count\"); err != nil {\n\t\tfmt.Println(\"更新房屋表数据库失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\t//将缓存中的房屋信息删掉,已经不正确了\n\thouse_info_key := \"house_info_\" + strconv.Itoa(house.Id)\n\tif err = bm.Delete(house_info_key); err != nil {\n\t\tfmt.Println(\"删除redis数据库中的房屋信息缓存失败,err:\", err)\n\t\trsp.Errno = utils.RECODE_DATAERR\n\t\trsp.Errmsg = utils.RecodeText(rsp.Errno)\n\t\treturn nil\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a172aad9b4af17a33bb12f36cc671681", "score": "0.50922066", "text": "func (svc *service) Push(rq *contract.BaseRequest, remote string, auth *contract.Credentials) error {\n\n\terr := svc.validateBaseRQWithoutBranch(rq)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = svc.setSettings(rq.User, rq.Repository, rq.Branch)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif remote == \"\" {\n\t\tremote = \"origin\"\n\t}\n\n\topts := &git.PushOptions{RemoteName: remote}\n\n\tif auth != nil {\n\t\topts.Auth = &http.BasicAuth{Username: auth.Name, Password: auth.Password}\n\t}\n\n\treturn svc.git.repo.Push(opts)\n}", "title": "" }, { "docid": "793f71cb68bd1d90615bbaa816851e26", "score": "0.50880885", "text": "func (gh GeckoboardPusher) Push(ctx context.Context, recs ...map[string]interface{}) error {\n\tswitch strings.ToLower(gh.Config.Op) {\n\tcase \"push\":\n\t\treturn gh.Add(ctx, recs...)\n\tcase \"update\":\n\t\treturn gh.Update(ctx, recs...)\n\tdefault:\n\t\treturn errors.New(\"unknown operation type\")\n\t}\n}", "title": "" }, { "docid": "b538102fc11d9eb1ce1352721824da55", "score": "0.5081432", "text": "func (s *BaseuseragentListener) EnterComment(ctx *CommentContext) {}", "title": "" }, { "docid": "506736bb9b705ecd44d52e158d2ee771", "score": "0.5080627", "text": "func AddComment(userName string, subject string, content string, uid bson.ObjectId) error {\n\tvar err error\n\tCol = Session.DB(\"test\").C(\"Comment\")\n\terr = Col.Insert(&Comment{UserName: userName, UserID: uid.Hex(), Subject: subject, Content: content, Timestamp: time.Now()})\n\treturn err\n}", "title": "" }, { "docid": "aadfa4c42a8748a50598d3fb3487ba0c", "score": "0.50739425", "text": "func (r PostCommentForPullRequestRequest) Send(ctx context.Context) (*PostCommentForPullRequestResponse, error) {\n\tr.Request.SetContext(ctx)\n\terr := r.Request.Send()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &PostCommentForPullRequestResponse{\n\t\tPostCommentForPullRequestOutput: r.Request.Data.(*PostCommentForPullRequestOutput),\n\t\tresponse: &aws.Response{Request: r.Request},\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "06de75eec20beb4fbc99e439acdf88c8", "score": "0.5061982", "text": "func (d *decred) newComment(db *gorm.DB, c Comment) error {\n\treturn db.Create(&c).Error\n}", "title": "" }, { "docid": "aa709351ac13f6e6fd74bcbcd41415dd", "score": "0.50600046", "text": "func (cmd Command) Comment(state *State) error {\n\t// does nothing\n\treturn nil\n}", "title": "" }, { "docid": "674f9b16e1da604487e4fb2e9a7f0015", "score": "0.5052523", "text": "func change_comment(store session.Store) fiber.Handler {\n\treturn func(c *fiber.Ctx) error {\n\t\t// Get request\n\t\trequest := new(ChangeCommentRequest)\n\n\t\tif err := c.BodyParser(request); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Not enough values given\n\t\tif request.CommentId == \"\" || request.NewComment == \"\" {\n\t\t\treturn c.Status(fiber.StatusPartialContent).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid credentials\",\n\t\t\t})\n\t\t}\n\n\t\t// Get token in header\n\t\ttoken := c.Get(\"access_token\")\n\n\t\t// If there's no token return\n\t\tif token == \"\" {\n\t\t\treturn c.Status(fiber.StatusPartialContent).JSON(fiber.Map{\n\t\t\t\t\"error\": \"no token\",\n\t\t\t})\n\t\t}\n\n\t\t// Check if user exists and token is correct\n\t\thasUser, userModel, _, err := utils.GetUserByToken(token)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\t\tif !hasUser {\n\t\t\treturn c.Status(fiber.StatusUnauthorized).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid user or token\",\n\t\t\t})\n\t\t}\n\n\t\t// Transform comment id in int64\n\t\tcommentId, err := strconv.ParseInt(request.CommentId, 10, 64)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusBadRequest).JSON(fiber.Map{\n\t\t\t\t\"error\": \"invalid post id\",\n\t\t\t})\n\t\t}\n\n\t\t// Check if comment exists\n\t\thasPost, commentRequest, DBengine, err := utils.GetComment(commentId)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\t\tif !hasPost {\n\t\t\treturn c.Status(fiber.StatusBadRequest).JSON(fiber.Map{\n\t\t\t\t\"error\": \"comment not found\",\n\t\t\t})\n\t\t}\n\n\t\t// Check if user id is equal to the owner\n\t\tif commentRequest.OwnerId != userModel.Id {\n\t\t\treturn c.Status(fiber.StatusUnauthorized).JSON(fiber.Map{\n\t\t\t\t\"error\": \"not the owner\",\n\t\t\t})\n\t\t}\n\n\t\t// Put post in database\n\t\tcommentRequest.Comment = request.NewComment\n\t\t_, err = DBengine.ID(commentId).Cols(\"comment\").Update(commentRequest)\n\t\tif err != nil {\n\t\t\treturn c.Status(fiber.StatusInternalServerError).JSON(fiber.Map{\n\t\t\t\t\"error\": \"database error\",\n\t\t\t})\n\t\t}\n\n\t\treturn c.Status(fiber.StatusOK).JSON(fiber.Map{\n\t\t\t\"comment\": commentRequest,\n\t\t})\n\t}\n}", "title": "" }, { "docid": "415919c8ed93a4aa466d50fb3f60c4c3", "score": "0.5050203", "text": "func (r *crudUsecase) Comment_on_Post_of_Page(ctx context.Context, flow map[string]interface{}) ([]byte, error) {\n\tpage_postId := fmt.Sprintf(\"%v\", flow[\"page_post_id\"])\n\tmessage := fmt.Sprintf(\"%v\", flow[\"message\"])\n\taccess_token := fmt.Sprintf(\"%v\", flow[\"access_token\"])\n\treturn r.repository.Comment_on_Post_of_Page(ctx, page_postId, message, access_token)\n}", "title": "" }, { "docid": "478a3649fba209347f1e48cd51b18129", "score": "0.50469464", "text": "func (q *queue) Push(com cmd) {\n\t*q = append(*q, com)\n}", "title": "" }, { "docid": "12e91b4abcef5274a059d11cb818685c", "score": "0.5044701", "text": "func (b *bot) syncGerritCommentsToGitHub(ctx context.Context, pr *github.PullRequest, cl *maintner.GerritCL) error {\n\trepo := pr.GetBase().GetRepo()\n\tfor _, m := range cl.Messages {\n\t\tid, err := gerritMessageAuthorID(m)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"gerritMessageAuthorID: %v\", err)\n\t\t}\n\t\tif id == cl.OwnerID() {\n\t\t\tcontinue\n\t\t}\n\t\tauthorName, err := b.gerritMessageAuthorName(ctx, m)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"b.gerritMessageAuthorName: %v\", err)\n\t\t}\n\t\theader := fmt.Sprintf(\"Message from %s:\\n\", authorName)\n\t\tmsg := fmt.Sprintf(`\n%s\n\n---\nPlease don’t reply on this GitHub thread. Visit [golang.org/cl/%d](https://go-review.googlesource.com/c/%s/+/%d#message-%s).\nAfter addressing review feedback, remember to [publish your drafts](https://github.com/golang/go/wiki/GerritBot#i-left-a-reply-to-a-comment-in-gerrit-but-no-one-but-me-can-see-it)!`,\n\t\t\tm.Message, cl.Number, cl.Project.Project(), cl.Number, m.Meta.Hash.String())\n\t\tif err := b.postGitHubMessageNoDup(ctx, repo.GetOwner().GetLogin(), repo.GetName(), pr.GetNumber(), header, msg); err != nil {\n\t\t\treturn fmt.Errorf(\"postGitHubMessageNoDup: %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" } ]
85c23e296b867bf0bb7b7d536cdecd69
NewConfigMapVolume creates a ConfigMap volume object
[ { "docid": "82efd93a270f67ad06558d33c0954870", "score": "0.7965702", "text": "func NewConfigMapVolume(config api.ConfigMapOrSecretVolumeConfig) *Volume {\n\titems := generateKeyToPath(config.Items)\n\n\tv := v1.Volume{\n\t\tName: config.VolumeName,\n\t\tVolumeSource: v1.VolumeSource{\n\t\t\tConfigMap: &v1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: v1.LocalObjectReference{\n\t\t\t\t\tName: config.MapOrSecretName,\n\t\t\t\t},\n\t\t\t\tItems: items,\n\t\t\t\tDefaultMode: config.DefaultMode,\n\t\t\t\tOptional: config.Optional,\n\t\t\t},\n\t\t},\n\t}\n\n\treturn &Volume{&v}\n}", "title": "" } ]
[ { "docid": "fe8165f70aa472963de77e787ee87092", "score": "0.81296355", "text": "func newVolumeWithConfigMap(volumeName, configMapName, configMapKey, configMapPath string) corev1.Volume {\n\treturn corev1.Volume{\n\t\tName: volumeName,\n\t\tVolumeSource: corev1.VolumeSource{\n\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{Name: configMapName},\n\t\t\t\tItems: []corev1.KeyToPath{\n\t\t\t\t\t{\n\t\t\t\t\t\tKey: configMapKey,\n\t\t\t\t\t\tPath: configMapPath,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "ca843495c2e1c5c62ae7087e4d44c412", "score": "0.78684443", "text": "func createVolumeForConfigMap(name string) corev1.Volume {\n\treturn corev1.Volume{\n\t\tName: name,\n\t\tVolumeSource: corev1.VolumeSource{\n\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{\n\t\t\t\t\tName: name,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "141eaacbcd33886b200b9a539cfa5435", "score": "0.7621727", "text": "func VolumeConfigMap(name, configmap string) corev1.Volume {\n\tmode := corev1.ConfigMapVolumeSourceDefaultMode\n\n\treturn corev1.Volume{\n\t\tName: name,\n\t\tVolumeSource: corev1.VolumeSource{\n\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\tDefaultMode: &mode,\n\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{\n\t\t\t\t\tName: configmap,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "3c86d2b3a4c1eb83cd296599320a83ae", "score": "0.6913554", "text": "func newConfigMap(cr *v1alpha1.CatalogSourceConfig, data map[string]string) *corev1.ConfigMap {\n\tname := v1alpha1.ConfigMapPrefix + cr.Name\n\treturn &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: cr.Spec.TargetNamespace,\n\t\t\tOwnerReferences: []metav1.OwnerReference{\n\t\t\t\t*metav1.NewControllerRef(cr, cr.GroupVersionKind()),\n\t\t\t},\n\t\t},\n\t\tData: data,\n\t}\n}", "title": "" }, { "docid": "89376af2288612e4e0b258f4c19f2102", "score": "0.67366594", "text": "func NewConfigMap(name, key, data string) *corev1.ConfigMap {\n\treturn &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t\tData: map[string]string{key: data},\n\t}\n}", "title": "" }, { "docid": "940e98762adf9283bef4a2bd8431ce47", "score": "0.673622", "text": "func (o StandaloneSpecVolumesOutput) ConfigMap() StandaloneSpecVolumesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v StandaloneSpecVolumes) *StandaloneSpecVolumesConfigMap { return v.ConfigMap }).(StandaloneSpecVolumesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "fd3d568d9918b58ec043dfce6a1c7564", "score": "0.6733778", "text": "func (o VolumeOutput) ConfigMap() ConfigMapVolumeSourcePtrOutput {\n\treturn o.ApplyT(func(v Volume) *ConfigMapVolumeSource { return v.ConfigMap }).(ConfigMapVolumeSourcePtrOutput)\n}", "title": "" }, { "docid": "67ae5e07babf3ceaf4b28d3008281a1b", "score": "0.67165905", "text": "func makeConfigMapVolumes(vspecs ...configmapVolumeSpec) ([]corev1.Volume, []corev1.VolumeMount) {\n\tvols := make([]corev1.Volume, len(vspecs))\n\tvmounts := make([]corev1.VolumeMount, len(vspecs))\n\n\tfor i, vspec := range vspecs {\n\t\tvols[i] = corev1.Volume{\n\t\t\tName: vspec.name,\n\t\t\tVolumeSource: corev1.VolumeSource{\n\t\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\t\tDefaultMode: proto.Int32(defaultFileMode),\n\t\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{\n\t\t\t\t\t\tName: vspec.cmap,\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\n\t\tvmounts[i] = corev1.VolumeMount{\n\t\t\tName: vspec.name,\n\t\t\tMountPath: vspec.path,\n\t\t}\n\t}\n\n\treturn vols, vmounts\n}", "title": "" }, { "docid": "a28b28acbfccbd05b53821c2d2404b53", "score": "0.6674058", "text": "func (o IndexerClusterSpecVolumesOutput) ConfigMap() IndexerClusterSpecVolumesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v IndexerClusterSpecVolumes) *IndexerClusterSpecVolumesConfigMap { return v.ConfigMap }).(IndexerClusterSpecVolumesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "75ae6ec6c1a67c6647b2167721d9e146", "score": "0.6646768", "text": "func (o LicenseMasterSpecVolumesOutput) ConfigMap() LicenseMasterSpecVolumesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v LicenseMasterSpecVolumes) *LicenseMasterSpecVolumesConfigMap { return v.ConfigMap }).(LicenseMasterSpecVolumesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "86b88fbe7b3a0d200f1efd273ba53627", "score": "0.6641548", "text": "func NewConfigMap(ctx context.Context, path string, key [32]byte, prefix []byte, db *badger.DB, writeElementsChan chan *transaction.Transaction) map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t\"path\": path,\n\t\t\"config\": NewConfig(\n\t\t\tctx,\n\t\t\tkey,\n\t\t\tprefix,\n\t\t\tdb,\n\t\t\twriteElementsChan,\n\t\t),\n\t}\n}", "title": "" }, { "docid": "f0edd039ea3b2936d8c749d7b4f60fc9", "score": "0.66333985", "text": "func (o *ConfigMapOptions) createConfigMap() (*corev1.ConfigMap, error) {\n\tnamespace := \"\"\n\tif o.EnforceNamespace {\n\t\tnamespace = o.Namespace\n\t}\n\n\tconfigMap := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: corev1.SchemeGroupVersion.String(),\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: o.Name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t}\n\tconfigMap.Name = o.Name\n\tconfigMap.Data = map[string]string{}\n\tconfigMap.BinaryData = map[string][]byte{}\n\n\tif len(o.FileSources) > 0 {\n\t\tif err := handleConfigMapFromFileSources(configMap, o.FileSources); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif len(o.LiteralSources) > 0 {\n\t\tif err := handleConfigMapFromLiteralSources(configMap, o.LiteralSources); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif len(o.EnvFileSources) > 0 {\n\t\tif err := handleConfigMapFromEnvFileSources(configMap, o.EnvFileSources); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif o.AppendHash {\n\t\thash, err := hash.ConfigMapHash(configMap)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tconfigMap.Name = fmt.Sprintf(\"%s-%s\", configMap.Name, hash)\n\t}\n\n\treturn configMap, nil\n}", "title": "" }, { "docid": "202e7045f40f2a79b653d8aabeca6ef7", "score": "0.66284996", "text": "func NewConfigMap(name, namespace, fileContent, filename string, labels map[string]string) *corev1.ConfigMap {\n\treturn &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tData: map[string]string{\n\t\t\tfilename: fileContent,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "e17525a68803166f2c312d46a0e1ff91", "score": "0.65589595", "text": "func createCMVolumes(configMapName string, mountPath string) (volume corev1.Volume, volumeMount corev1.VolumeMount) {\n\tvolume = corev1.Volume{\n\t\tName: configMapName,\n\t\tVolumeSource: corev1.VolumeSource{\n\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{\n\t\t\t\t\tName: configMapName,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tvolumeMount = corev1.VolumeMount{\n\t\tName: configMapName,\n\t\tMountPath: mountPath,\n\t}\n\treturn\n}", "title": "" }, { "docid": "b5595ead77d5a57ba00960bb3edfddba", "score": "0.6530764", "text": "func newConfigMap(csc *v1alpha1.CatalogSourceConfig, data map[string]string) *corev1.ConfigMap {\n\treturn new(ConfigMapBuilder).\n\t\tWithMeta(v1alpha1.ConfigMapPrefix+csc.Name, csc.Spec.TargetNamespace).\n\t\tWithOwner(csc).\n\t\tWithData(data).\n\t\tConfigMap()\n}", "title": "" }, { "docid": "f42af497300b6eff5860323e080aa59b", "score": "0.65217406", "text": "func (o VolumePatchOutput) ConfigMap() ConfigMapVolumeSourcePatchPtrOutput {\n\treturn o.ApplyT(func(v VolumePatch) *ConfigMapVolumeSourcePatch { return v.ConfigMap }).(ConfigMapVolumeSourcePatchPtrOutput)\n}", "title": "" }, { "docid": "42d88309690c269dbb52222818f15809", "score": "0.6514659", "text": "func NewConfigMap() (*Config, error) {\n\tc := &Config{}\n\tif err := c.Load(); err != nil {\n\t\treturn c, err\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "ad2bd1504d28adeda5ce897897ce968c", "score": "0.6398813", "text": "func NewCmdCreateConfigMap(f cmdutil.Factory, ioStreams genericiooptions.IOStreams) *cobra.Command {\n\to := NewConfigMapOptions(ioStreams)\n\n\tcmd := &cobra.Command{\n\t\tUse: \"configmap NAME [--from-file=[key=]source] [--from-literal=key1=value1] [--dry-run=server|client|none]\",\n\t\tDisableFlagsInUseLine: true,\n\t\tAliases: []string{\"cm\"},\n\t\tShort: i18n.T(\"Create a config map from a local file, directory or literal value\"),\n\t\tLong: configMapLong,\n\t\tExample: configMapExample,\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tcmdutil.CheckErr(o.Complete(f, cmd, args))\n\t\t\tcmdutil.CheckErr(o.Validate())\n\t\t\tcmdutil.CheckErr(o.Run())\n\t\t},\n\t}\n\to.PrintFlags.AddFlags(cmd)\n\n\tcmdutil.AddApplyAnnotationFlags(cmd)\n\tcmdutil.AddValidateFlags(cmd)\n\tcmdutil.AddDryRunFlag(cmd)\n\n\tcmd.Flags().StringSliceVar(&o.FileSources, \"from-file\", o.FileSources, \"Key file can be specified using its file path, in which case file basename will be used as configmap key, or optionally with a key and file path, in which case the given key will be used. Specifying a directory will iterate each named file in the directory whose basename is a valid configmap key.\")\n\tcmd.Flags().StringArrayVar(&o.LiteralSources, \"from-literal\", o.LiteralSources, \"Specify a key and literal value to insert in configmap (i.e. mykey=somevalue)\")\n\tcmd.Flags().StringSliceVar(&o.EnvFileSources, \"from-env-file\", o.EnvFileSources, \"Specify the path to a file to read lines of key=val pairs to create a configmap.\")\n\tcmd.Flags().BoolVar(&o.AppendHash, \"append-hash\", o.AppendHash, \"Append a hash of the configmap to its name.\")\n\n\tcmdutil.AddFieldManagerFlagVar(cmd, &o.FieldManager, \"kubectl-create\")\n\n\treturn cmd\n}", "title": "" }, { "docid": "4665a10fe7e2cf7261fa43a720a7f83a", "score": "0.6381669", "text": "func NewVolumeMap() *VolumeMap {\n\tm := &VolumeMap{\n\t\tm: make(map[string]*server.Volume),\n\t}\n\n\treturn m\n}", "title": "" }, { "docid": "2dbcadb51c27206fb81b77b89e176009", "score": "0.6308275", "text": "func (o SearchHeadClusterSpecVolumesOutput) ConfigMap() SearchHeadClusterSpecVolumesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v SearchHeadClusterSpecVolumes) *SearchHeadClusterSpecVolumesConfigMap { return v.ConfigMap }).(SearchHeadClusterSpecVolumesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "f7f236cbdab439f5de3af74aa30724e7", "score": "0.62745607", "text": "func CreateConfigMap(ctx context.Context, cli kubernetes.Interface, namespace string, spec string) (*v1.ConfigMap, error) {\n\tcm := &v1.ConfigMap{}\n\td := serializer.NewCodecFactory(runtime.NewScheme()).UniversalDeserializer()\n\tif _, _, err := d.Decode([]byte(spec), nil, cm); err != nil {\n\t\treturn nil, err\n\t}\n\treturn cli.CoreV1().ConfigMaps(namespace).Create(ctx, cm, metav1.CreateOptions{})\n}", "title": "" }, { "docid": "ad36631e97eb6e0925d111aeb3782432", "score": "0.6263861", "text": "func configMap(configMapName string, namespace string) *v1.ConfigMap {\n\treturn &v1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: configMapName,\n\t\t\tNamespace: namespace,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "24f1cdb2362863d0015988dc7a03f95a", "score": "0.61427855", "text": "func (reconcileSiddhiProcess *ReconcileSiddhiProcess) createConfigMap(siddhiProcess *siddhiv1alpha1.SiddhiProcess, dataMap map[string]string, configMapName string) *corev1.ConfigMap{\t\n\tconfigMap := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: configMapName,\n\t\t\tNamespace: siddhiProcess.Namespace,\n\t\t},\n\t\tData: dataMap,\n\t}\n\tcontrollerutil.SetControllerReference(siddhiProcess, configMap, reconcileSiddhiProcess.scheme)\n\treturn configMap\n}", "title": "" }, { "docid": "5bcf69f1049104e50a2409dc3463aec9", "score": "0.6138773", "text": "func (a *Agent) CreateConfigMap(name string, namespace string, configMap map[string]string) (*v1.ConfigMap, error) {\n\treturn a.Clientset.CoreV1().ConfigMaps(namespace).Create(\n\t\tcontext.TODO(),\n\t\t&v1.ConfigMap{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: name,\n\t\t\t\tNamespace: namespace,\n\t\t\t\tLabels: map[string]string{\n\t\t\t\t\t\"porter\": \"true\",\n\t\t\t\t},\n\t\t\t},\n\t\t\tData: configMap,\n\t\t},\n\t\tmetav1.CreateOptions{},\n\t)\n}", "title": "" }, { "docid": "54c8be97112cf9c0e5fff6645dfb5b11", "score": "0.6053308", "text": "func (kc *KubeCtl) CreateConfigMap(configMap *corev1.ConfigMap, namespace string) (*corev1.ConfigMap, error) {\n\treturn kc.Clientset.CoreV1().ConfigMaps(namespace).Create(configMap)\n}", "title": "" }, { "docid": "07d1c8409fcf5cf7a3efe32dfd5f0212", "score": "0.60386246", "text": "func CreateConfigMapObject(namespace string, configData map[string]string) *v1.ConfigMap {\n\treturn &v1.ConfigMap{\n\t\tObjectMeta: meta_v1.ObjectMeta{\n\t\t\tName: constants.XPOSER_CONFIGMAP,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tData: configData,\n\t}\n}", "title": "" }, { "docid": "5cfe689ce4f184dba0c1442d42a9fdf5", "score": "0.6019787", "text": "func (c *Client) CreateConfigMap(ig *corev1.ConfigMap) (*corev1.ConfigMap, error) {\n\treturn c.CoreV1().ConfigMaps(ig.GetNamespace()).Create(context.TODO(), ig, metav1.CreateOptions{})\n}", "title": "" }, { "docid": "a0995f7546a34c1bab832bc4e5522e0b", "score": "0.6015162", "text": "func (o VolumeProjectionOutput) ConfigMap() ConfigMapProjectionPtrOutput {\n\treturn o.ApplyT(func(v VolumeProjection) *ConfigMapProjection { return v.ConfigMap }).(ConfigMapProjectionPtrOutput)\n}", "title": "" }, { "docid": "8d3cb30884171244b608ee47e265812e", "score": "0.6011991", "text": "func (k *Kubernetes) CreateConfigMap(clusterName, namespace string, cm *corev1.ConfigMap) error {\n\tif cm == nil {\n\t\treturn fmt.Errorf(\"configmap entity can't be nil\")\n\t}\n\tclient, err := k.getK8sClient(clusterName)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"get cluster %s clientset error, %v\", clusterName, err)\n\t}\n\n\t_, err = client.ClientSet.CoreV1().ConfigMaps(namespace).Create(context.Background(), cm, v1.CreateOptions{})\n\tif err != nil {\n\t\treturn fmt.Errorf(\"cluster %s create configmap(namespace: %s) %s error, %v\", clusterName, namespace, cm.Name, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1c2fc10097044d0f33d76eb68f4052e6", "score": "0.60114443", "text": "func (r *Reconciler) createConfigMap(ctx context.Context, cm *corev1.ConfigMap) error {\n\tif err := r.Client.Create(ctx, cm); err != nil {\n\t\treturn fmt.Errorf(\"failed to create configmap %s/%s: %w\", cm.Namespace, cm.Name, err)\n\t}\n\tr.Log.Info(\"created configmap\", \"namespace\", cm.Namespace, \"name\", cm.Name)\n\n\treturn nil\n}", "title": "" }, { "docid": "3508e8a9d0fb41d58784c06d007ed45f", "score": "0.60084546", "text": "func NewConfigMapController(informerFactory informers.SharedInformerFactory) *ConfigMapController {\n\tconfigMapInformer := informerFactory.Core().V1().ConfigMaps()\n\n\tc := &ConfigMapController{\n\t\tinformerFactory: informerFactory,\n\t\tconfigMapInformer: configMapInformer,\n\t}\n\tconfigMapInformer.Informer().AddEventHandler(\n\t\t// Your custom resource event handlers.\n\t\tcache.ResourceEventHandlerFuncs{\n\t\t\t// Called on creation\n\t\t\tAddFunc: c.configMapAdd,\n\t\t\t// Called on resource update and every resyncPeriod on existing resources.\n\t\t\tUpdateFunc: c.configMapUpdate,\n\t\t\t// Called on resource deletion.\n\t\t\tDeleteFunc: c.configMapDelete,\n\t\t},\n\t)\n\treturn c\n}", "title": "" }, { "docid": "5868461c7ec490e0aaae14fd1ff1bb00", "score": "0.600571", "text": "func newConfigMapForMultusConfig(cr *k8sv1alpha1.Multus, cmName string) (*corev1.ConfigMap, error) {\n\tcniConf := CniConf{Name: \"multus-cni-network\", Type: \"multus\", Delegates: cr.Spec.Delegates}\n\tdata, err := json.Marshal(cniConf)\n\tif err != nil {\n\t\tlog.Error(err, \"failed to marshal multus config to write to configmap resource\")\n\t\treturn nil, err\n\t}\n\tlog.Info(\"newConfigMapForMultusConfig\", \"data\", string(data))\n\treturn &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cmName,\n\t\t\tNamespace: cr.Namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"70-multus-flannel.conf\": string(data),\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "b1f465202288e80bdad43067d4911ce0", "score": "0.6004494", "text": "func (r *Reconciler) setupConfigMapVolumes(statefulSetObject *apps.StatefulSet, replica *chiv1.ChiReplica) {\n\tconfigMapMacrosName := CreateConfigMapPodName(replica)\n\tconfigMapCommonName := CreateConfigMapCommonName(r.chi)\n\tconfigMapCommonUsersName := CreateConfigMapCommonUsersName(r.chi)\n\n\t// Add all ConfigMap objects as Volume objects of type ConfigMap\n\tstatefulSetObject.Spec.Template.Spec.Volumes = append(\n\t\tstatefulSetObject.Spec.Template.Spec.Volumes,\n\t\tcreateVolumeForConfigMap(configMapCommonName),\n\t\tcreateVolumeForConfigMap(configMapCommonUsersName),\n\t\tcreateVolumeForConfigMap(configMapMacrosName),\n\t)\n\n\t// And reference these Volumes in each Container via VolumeMount\n\t// So Pod will have ConfigMaps mounted as Volumes\n\tfor i := range statefulSetObject.Spec.Template.Spec.Containers {\n\t\t// Convenience wrapper\n\t\tcontainer := &statefulSetObject.Spec.Template.Spec.Containers[i]\n\t\t// Append to each Container current VolumeMount's to VolumeMount's declared in template\n\t\tcontainer.VolumeMounts = append(\n\t\t\tcontainer.VolumeMounts,\n\t\t\tcreateVolumeMount(configMapCommonName, dirPathConfigd),\n\t\t\tcreateVolumeMount(configMapCommonUsersName, dirPathUsersd),\n\t\t\tcreateVolumeMount(configMapMacrosName, dirPathConfd),\n\t\t)\n\t}\n}", "title": "" }, { "docid": "2d2e14b1c9e4adba634210c48f62b31a", "score": "0.59978825", "text": "func (c *Client) CreateConfigMap(namespace, name string, data map[string]string, updateIfExists bool) (*corev1.ConfigMap, error) {\n\tsecret, err := c.clientset.CoreV1().ConfigMaps(namespace).Create(&corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t\tData: data,\n\t})\n\tif err != nil && apierrors.IsAlreadyExists(err) && updateIfExists {\n\t\treturn c.UpdateConfigMap(namespace, name, data)\n\t}\n\treturn secret, err\n}", "title": "" }, { "docid": "d0de83bc9f5d7a363882df9c74025c4d", "score": "0.59970766", "text": "func (o VolumeProjectionPatchOutput) ConfigMap() ConfigMapProjectionPatchPtrOutput {\n\treturn o.ApplyT(func(v VolumeProjectionPatch) *ConfigMapProjectionPatch { return v.ConfigMap }).(ConfigMapProjectionPatchPtrOutput)\n}", "title": "" }, { "docid": "d7033daa5d76ef91bff9efe930c3703c", "score": "0.59745044", "text": "func createConfigMap(f *framework.Framework, kubeCfg *componentconfig.KubeletConfiguration) (*api.ConfigMap, error) {\n\tkubeCfgExt := v1alpha1.KubeletConfiguration{}\n\tapi.Scheme.Convert(kubeCfg, &kubeCfgExt, nil)\n\n\tbytes, err := json.Marshal(kubeCfgExt)\n\tframework.ExpectNoError(err)\n\n\tcmap, err := f.Client.ConfigMaps(\"kube-system\").Create(&api.ConfigMap{\n\t\tObjectMeta: api.ObjectMeta{\n\t\t\tName: fmt.Sprintf(\"kubelet-%s\", framework.TestContext.NodeName),\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"kubelet.config\": string(bytes),\n\t\t},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn cmap, nil\n}", "title": "" }, { "docid": "0308fbf740a01f2546f7e88c762b80a2", "score": "0.59343916", "text": "func (codeEngine *CodeEngineV2) CreateConfigMap(createConfigMapOptions *CreateConfigMapOptions) (result *ConfigMap, response *core.DetailedResponse, err error) {\n\treturn codeEngine.CreateConfigMapWithContext(context.Background(), createConfigMapOptions)\n}", "title": "" }, { "docid": "9ffa9ccf5df906b2d72e8047b5dfba7e", "score": "0.5928834", "text": "func (f *Framework) CreateConfigMap(name string, data map[string]string) {\n\t_, err := f.KubeClientSet.CoreV1().ConfigMaps(f.Namespace).Create(context.TODO(), &v1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: f.Namespace,\n\t\t},\n\t\tData: data,\n\t}, metav1.CreateOptions{})\n\tassert.Nil(ginkgo.GinkgoT(), err, \"creating configMap\")\n}", "title": "" }, { "docid": "17c0da921f0a2bdc3b2d04b7d617f2fb", "score": "0.59283566", "text": "func CreateConfigMap(clientset *kubernetes.Clientset, namespace string, configMap *corev1.ConfigMap) (*corev1.ConfigMap, error) {\n\n\tclient := clientset.CoreV1().ConfigMaps(getValidNameSpace(namespace))\n\treturn client.Create(configMap)\n}", "title": "" }, { "docid": "03ec0e2b9fe022997fc987ab219666b9", "score": "0.58895594", "text": "func SetPodTemplateConfigMapVolumeFunc(volume string, configmapName string, keyToPaths []corev1.KeyToPath) transform.TransformFunc {\n\treturn func(obj *kyaml.RNode) error {\n\t\t// Construct the configmap volume source RNode.\n\t\tconfigMap, err := createConfigMapVolumeSource(configmapName, keyToPaths)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttf := SetPodTemplateVolumeFunc(volume, volSrcConfigMap, configMap)\n\t\treturn tf(obj)\n\t}\n}", "title": "" }, { "docid": "954e888d0e98d5ad9c97532c328ea93f", "score": "0.58854806", "text": "func GenerateConfigMap(name string, namespace string, fromFile []string, fromLiteral []string) (*v1.ConfigMap, error) {\n\tif name == \"\" {\n\t\treturn nil, trace.BadParameter(\"missing parameter Name\")\n\t}\n\tconfigMap := &v1.ConfigMap{}\n\tconfigMap.Name = name\n\tconfigMap.Kind = KindConfigMap\n\tconfigMap.APIVersion = v1.SchemeGroupVersion.String()\n\tconfigMap.Namespace = namespace\n\tconfigMap.Data = map[string]string{}\n\tif err := handleConfigMapFromFileSources(configMap, fromFile); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\tif err := handleConfigMapFromLiteralSources(configMap, fromLiteral); err != nil {\n\t\treturn nil, trace.Wrap(err)\n\t}\n\treturn configMap, nil\n}", "title": "" }, { "docid": "a8d5b7475f9936a5be9e0c2c69b65f85", "score": "0.5873456", "text": "func buildConfigMapComponents(cluster *myspec.M3DBCluster) (corev1.Volume, corev1.VolumeMount, error) {\n\tvm := corev1.VolumeMount{\n\t\tName: _configurationName,\n\t\tMountPath: _configurationDirectory,\n\t}\n\n\tcmName := defaultConfigMapName(cluster.Name)\n\tif cluster.Spec.ConfigMapName != nil {\n\t\tcmName = *cluster.Spec.ConfigMapName\n\t}\n\n\tif cmName == \"\" {\n\t\treturn corev1.Volume{}, corev1.VolumeMount{}, errEmptyConfigMapName\n\t}\n\n\tvol := corev1.Volume{\n\t\tName: _configurationName,\n\t\tVolumeSource: corev1.VolumeSource{\n\t\t\tConfigMap: &corev1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: corev1.LocalObjectReference{\n\t\t\t\t\tName: cmName,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\treturn vol, vm, nil\n}", "title": "" }, { "docid": "7bc7c938b9d13213e16c830e1d42cbde", "score": "0.5871186", "text": "func ConstructConfigMap(svc models.Service) (*corev1.ConfigMap, error) {\n\t// var configmaps []corev1.ConfigMap\n\t// for i, k := range svc.KService.Specs.Containers {\n\tconfigmaps := corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{},\n\t\tObjectMeta: metav1.ObjectMeta{Name: svc.Name, Namespace: svc.Namespace},\n\t\tData: svc.ConfigMap.Data,\n\t}\n\n\treturn &configmaps, nil\n}", "title": "" }, { "docid": "b965bd35fc0c6b7866c317e1ac4749b6", "score": "0.586536", "text": "func CreateConfigMap(cr *appv1alpha1.PodSet) *corev1.ConfigMap {\n\treturn &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: \"podset-logger-config\",\n\t\t\tNamespace: cr.Spec.Namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"podset-logger-config.yaml\": generateConfig(cr),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "c8ef15f064a2f7afc1f334147d63da79", "score": "0.5846327", "text": "func (c *Client) CreateConfigMap(ctx context.Context, newConfigMap ConfigMapOptions) (*ConfigMap, error) {\n\treturn apiPost[ConfigMap](ctx, c, configmapAPIPath, newConfigMap)\n}", "title": "" }, { "docid": "27f3e6448ba847d10a5db505aafeb45e", "score": "0.58212084", "text": "func createConfigMap(clientset kubernetes.Interface, newServiceObject *v1.Service, ingressHost string, namespace string) {\n\tconfigData := make(map[string]string)\n\tconfigData[newServiceObject.Name+\"-\"+newServiceObject.Namespace] = ingressHost\n\n\tconfigMap := CreateConfigMapObject(newServiceObject.Namespace, configData)\n\n\t_, err := clientset.CoreV1().ConfigMaps(namespace).Create(configMap)\n\n\tif err != nil {\n\t\tlogrus.Errorf(\"Config-map not created in namespace:%v, with error %v\", namespace, err)\n\t}\n\n\tlogrus.Infof(\"Configmap created in namespace: %v\", namespace)\n}", "title": "" }, { "docid": "2eb2bb940319c75abf11f1ffb424711a", "score": "0.5811413", "text": "func New(kubeconfig *rest.Config, opa opa.Policies, matcher func(*v1.ConfigMap) bool) *ConfigMapSync {\n\tcpy := *kubeconfig\n\tcpy.GroupVersion = &schema.GroupVersion{\n\t\tVersion: \"v1\",\n\t}\n\tcpy.APIPath = \"/api\"\n\tcpy.ContentType = runtime.ContentTypeJSON\n\tcpy.NegotiatedSerializer = serializer.DirectCodecFactory{CodecFactory: api.Codecs}\n\tbuilder := runtime.NewSchemeBuilder(func(scheme *runtime.Scheme) error {\n\t\tscheme.AddKnownTypes(\n\t\t\t*cpy.GroupVersion,\n\t\t\t&api.ListOptions{},\n\t\t\t&v1.ConfigMapList{},\n\t\t\t&v1.ConfigMap{})\n\t\treturn nil\n\t})\n\tbuilder.AddToScheme(api.Scheme)\n\treturn &ConfigMapSync{\n\t\tkubeconfig: &cpy,\n\t\topa: opa,\n\t\tmatcher: matcher,\n\t}\n}", "title": "" }, { "docid": "3d1f0989c393a9337f1bc25e8361d59a", "score": "0.58070564", "text": "func ConfigMap(cr *comv1.KeystoneAPI, cmName string) *corev1.ConfigMap {\n\topts := keystoneConfigOptions{cr.Spec.DatabasePassword, cr.Spec.DatabaseHostname, cr.Spec.AdminPassword}\n\n\tcm := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cmName,\n\t\t\tNamespace: cr.Namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"keystone.conf\": util.ExecuteTemplateFile(\"keystone.conf\", &opts),\n\t\t\t\"httpd.conf\": util.ExecuteTemplateFile(\"httpd.conf\", nil),\n\t\t\t\"config.json\": util.ExecuteTemplateFile(\"kolla_config.json\", nil),\n\t\t\t\"logging.conf\": util.ExecuteTemplateFile(\"logging.conf\", nil),\n\t\t},\n\t}\n\n\treturn cm\n}", "title": "" }, { "docid": "5d515ebe1d3e9e6d3991ce72ca44972c", "score": "0.5775038", "text": "func AddConfigMapVolumeToPod(configMapVolumeName string, configMapName string, pod *apiv1.Pod) string {\n\tvolume := apiv1.Volume{\n\t\tName: configMapVolumeName,\n\t\tVolumeSource: apiv1.VolumeSource{\n\t\t\tConfigMap: &apiv1.ConfigMapVolumeSource{\n\t\t\t\tLocalObjectReference: apiv1.LocalObjectReference{\n\t\t\t\t\tName: configMapName,\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tpod.Spec.Volumes = append(pod.Spec.Volumes, volume)\n\treturn volume.Name\n}", "title": "" }, { "docid": "e8556e1a7a0e7910626c16c4e8f8e1d0", "score": "0.5747695", "text": "func (m *Machine) CreateConfigMap(namespace string, configMap corev1.ConfigMap) (TearDownFunc, error) {\n\tclient := m.Clientset.CoreV1().ConfigMaps(namespace)\n\t_, err := client.Create(&configMap)\n\treturn func() error {\n\t\terr := client.Delete(configMap.GetName(), &metav1.DeleteOptions{})\n\t\tif err != nil && !apierrors.IsNotFound(err) {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t}, err\n}", "title": "" }, { "docid": "4e88f57310ffee3c509e3b9ca020d28a", "score": "0.57454884", "text": "func (cc *Chaincode) CreateConfigMap() {\n\tname := cc.GetName()\n\n\tconfigMap := &apiv1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name + \"-env\",\n\t\t},\n\t\tData:\tmap[string]string{\n\t\t\t\"WHISPER\": \"Marx bless, no bugs\",\n\t\t\t\"CHAINCODE_ADDRESS\": \"0.0.0.0:9999\",\n\t\t\t\"CHAINCODE_CCID\": cc.PackageID,\n\t\t},\n\t}\n\n\t_, err := global.K8sClientset.CoreV1().\n\t\tConfigMaps(apiv1.NamespaceDefault).\n\t\tCreate(context.TODO(), configMap, metav1.CreateOptions{})\n\n\tif err != nil {\n\t\tglobal.Logger.Error(\"Create chaincode config map error\", zap.Error(err))\n\t}\n}", "title": "" }, { "docid": "c98b29a43df97dd8889d76e996cc3cf8", "score": "0.5731403", "text": "func newConfigMapForCR(cr *riotv1alphav1.Riot) *corev1.ConfigMap {\n\tlabels := map[string]string{\n\t\t\"app\": cr.Name,\n\t}\n\treturn &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cr.GetConfigMapName(),\n\t\t\tNamespace: cr.Namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tData: cr.GetExpectedConfigmapData(),\n\t}\n}", "title": "" }, { "docid": "b64f5d9be6f713cb3da0b7449ccde6c6", "score": "0.5727457", "text": "func (def *CapabilityBaseDefinition) CreateOrUpdateConfigMap(ctx context.Context, k8sClient client.Client, namespace,\n\tdefinitionName string, jsonSchema []byte, ownerReferences []metav1.OwnerReference) (string, error) {\n\tcmName := fmt.Sprintf(\"%s%s\", types.CapabilityConfigMapNamePrefix, definitionName)\n\tvar cm v1.ConfigMap\n\tvar data = map[string]string{\n\t\ttypes.OpenapiV3JSONSchema: string(jsonSchema),\n\t}\n\t// No need to check the existence of namespace, if it doesn't exist, API server will return the error message\n\t// before it's to be reconciled by ComponentDefinition/TraitDefinition controller.\n\terr := k8sClient.Get(ctx, client.ObjectKey{Namespace: namespace, Name: cmName}, &cm)\n\tif err != nil && apierrors.IsNotFound(err) {\n\t\tcm = v1.ConfigMap{\n\t\t\tTypeMeta: metav1.TypeMeta{\n\t\t\t\tAPIVersion: \"v1\",\n\t\t\t\tKind: \"ConfigMap\",\n\t\t\t},\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: cmName,\n\t\t\t\tNamespace: namespace,\n\t\t\t\tOwnerReferences: ownerReferences,\n\t\t\t\tLabels: map[string]string{\n\t\t\t\t\t\"definition.oam.dev\": \"schema\",\n\t\t\t\t\t\"definition.oam.dev/name\": definitionName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tData: data,\n\t\t}\n\t\terr = k8sClient.Create(ctx, &cm)\n\t\tif err != nil {\n\t\t\treturn cmName, fmt.Errorf(util.ErrUpdateCapabilityInConfigMap, definitionName, err)\n\t\t}\n\t\treturn cmName, nil\n\t}\n\n\tcm.Data = data\n\tif err = k8sClient.Update(ctx, &cm); err != nil {\n\t\treturn cmName, fmt.Errorf(util.ErrUpdateCapabilityInConfigMap, definitionName, err)\n\t}\n\treturn cmName, nil\n}", "title": "" }, { "docid": "6b45e8846886a05f185ecc2ea0964cd0", "score": "0.5696972", "text": "func CreateConfigMap(experimentsDetails *experimentTypes.ExperimentDetails, clients clients.ClientSets, runID string) error {\n\n\tdata := map[string]string{}\n\n\t// It will store all the details inside a string in well formated way\n\tpolicy := GetConfigMapData(experimentsDetails)\n\n\tdata[\"policy\"] = policy\n\tconfigMap := &apiv1.ConfigMap{\n\t\tObjectMeta: v1.ObjectMeta{\n\t\t\tName: \"policy-\" + runID,\n\t\t\tNamespace: experimentsDetails.ChaosNamespace,\n\t\t\tLabels: map[string]string{\n\t\t\t\t\"name\": \"policy-\" + runID,\n\t\t\t},\n\t\t},\n\t\tData: data,\n\t}\n\n\t_, err := clients.KubeClient.CoreV1().ConfigMaps(experimentsDetails.ChaosNamespace).Create(configMap)\n\n\treturn err\n}", "title": "" }, { "docid": "766b5f544a7af9e02d348ecb27d1f772", "score": "0.5682449", "text": "func NewConfigMapConfigController(kubeClient kubernetes.Interface, recorder record.EventRecorder, configMapNamespace, configMapName string) *ConfigMapConfigController {\n\tcurrentConfig := NewConfig()\n\tcm, err := kubeClient.CoreV1().ConfigMaps(configMapNamespace).Get(context.TODO(), configMapName, metav1.GetOptions{})\n\tif err != nil {\n\t\tif errors.IsNotFound(err) {\n\t\t\tklog.Infof(\"ConfigMapConfigController: Not found the configmap based config, using default config: %v\", currentConfig)\n\t\t} else {\n\t\t\tklog.Warningf(\"ConfigMapConfigController failed to load config from api server, using the default config. Error: %v\", err)\n\t\t}\n\t} else {\n\t\tif err := currentConfig.LoadValue(cm.Data); err != nil {\n\t\t\tif recorder != nil {\n\t\t\t\trecorder.Event(cm, \"Warning\", \"LoadValueError\", err.Error())\n\t\t\t}\n\t\t\tklog.Warningf(\"LoadValue error: %s\", err.Error())\n\t\t}\n\t\tklog.Infof(\"ConfigMapConfigController: loaded config from configmap, config %v\", currentConfig)\n\t}\n\n\tc := &ConfigMapConfigController{\n\t\tconfigMapNamespace: configMapNamespace,\n\t\tconfigMapName: configMapName,\n\t\tcurrentConfig: &currentConfig,\n\t\tkubeClient: kubeClient,\n\t\trecorder: recorder,\n\t\tcurrentConfigMapObject: cm,\n\t}\n\treturn c\n}", "title": "" }, { "docid": "0584a8939e52bc4407da421876237f8d", "score": "0.56822115", "text": "func ConfigMap(api *placementv1beta1.PlacementAPI, scheme *runtime.Scheme) *corev1.ConfigMap {\n\topts := placementConfigOptions{\"FIXME\"}\n\n\t// get templates base path, either running local or deployed as container\n\ttemplatesPath := util.GetTemplatesPath()\n\n\t// get all scripts templates which are in ../templesPath/api.Kind/config\n\ttemplatesFiles := util.GetAllTemplates(templatesPath, api.Kind, \"config\")\n\n\tdata := make(map[string]string)\n\t// render all template files\n\tfor _, file := range templatesFiles {\n\t\tdata[filepath.Base(file)] = util.ExecuteTemplate(file, opts)\n\t}\n\n\tcm := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: api.Name + \"-config-data\",\n\t\t\tNamespace: api.Namespace,\n\t\t\tLabels: GetLabels(api.Name),\n\t\t},\n\t\tData: data,\n\t}\n\tcontrollerutil.SetControllerReference(api, cm, scheme)\n\n\treturn cm\n}", "title": "" }, { "docid": "3c95d0dd62e2b33f049a83ee524611a9", "score": "0.56697506", "text": "func CreateStandaloneConfigMap(f *framework.Framework, ctx *framework.Context, ns string, name string, key string, file []byte) error {\n\tconfigMap := &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: ns,\n\t\t\tName: name,\n\t\t\tAnnotations: map[string]string{},\n\t\t},\n\t\tBinaryData: map[string][]byte{\n\t\t\tkey: file,\n\t\t},\n\t}\n\treturn f.Client.Create(goctx.TODO(), configMap, &framework.CleanupOptions{TestContext: ctx, Timeout: cleanupTimeout, RetryInterval: cleanupRetryInterval})\n}", "title": "" }, { "docid": "0f2dff037c3f11abda50e90590f60a1b", "score": "0.56619537", "text": "func createConfigMap(chartPath string, data *appmgrcommon.AppInstanceData) error {\n\tlogrus.Debug(\"Creating configmap\")\n\n\tconfigPath := filepath.Join(chartPath, \"resources/configs\")\n\tif err := os.MkdirAll(configPath, 0755); err != nil {\n\t\treturn err\n\t}\n\n\tfor k, v := range data.AppConfigs {\n\t\tif err := ioutil.WriteFile(filepath.Join(configPath, k), []byte(v), 0644); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bc41bf35950be6acea4b0b1e79be828e", "score": "0.56523573", "text": "func CreateConfigMap(namespace string, clientset kubernetes.Interface) error {\n\tconfigMap := new(corev1.ConfigMap)\n\terr := util.ObjectFromFile(\"artifacts/cluster-configmap.yaml\", configMap)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = clientset.CoreV1().ConfigMaps(namespace).Create(configMap)\n\tif err != nil && apierrors.IsAlreadyExists(err) {\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "ac8ab90c41573ac33a1700569564afa3", "score": "0.5651911", "text": "func (c *Cassandra) CreateConfigMap(configMapName string,\n\tclient client.Client,\n\tscheme *runtime.Scheme,\n\trequest reconcile.Request) (*corev1.ConfigMap, error) {\n\treturn CreateConfigMap(configMapName,\n\t\tclient,\n\t\tscheme,\n\t\trequest,\n\t\t\"cassandra\",\n\t\tc)\n}", "title": "" }, { "docid": "0230d3885a54ada375694f532c58f0f8", "score": "0.56394917", "text": "func (o StandaloneSpecVolumesProjectedSourcesOutput) ConfigMap() StandaloneSpecVolumesProjectedSourcesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v StandaloneSpecVolumesProjectedSources) *StandaloneSpecVolumesProjectedSourcesConfigMap {\n\t\treturn v.ConfigMap\n\t}).(StandaloneSpecVolumesProjectedSourcesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "39eb78f27c2d3dac66a2e89fc56424f9", "score": "0.56393504", "text": "func NewConfigMapService(kubeClient kubernetes.Interface, logger log.Logger, metricsRecorder metrics.Recorder) *ConfigMapService {\n\tlogger = logger.With(\"service\", \"k8s.configMap\")\n\treturn &ConfigMapService{\n\t\tkubeClient: kubeClient,\n\t\tlogger: logger,\n\t\tmetricsRecorder: metricsRecorder,\n\t}\n}", "title": "" }, { "docid": "95aacbe9b097c353f09aa9eb3591bb75", "score": "0.5632643", "text": "func MakeConfigMap(namespace, name string) (*corev1.ConfigMap, error) {\n\t// Add annotations\n\tcm := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"___config.json\": \"{}\",\n\t\t},\n\t}\n\n\treturn cm, nil\n}", "title": "" }, { "docid": "a26e1db63d6a392dd6230833db1ce603", "score": "0.5623426", "text": "func NewSecretVolume(config api.ConfigMapOrSecretVolumeConfig) *Volume {\n\titems := generateKeyToPath(config.Items)\n\n\tv := v1.Volume{\n\t\tName: config.VolumeName,\n\t\tVolumeSource: v1.VolumeSource{\n\t\t\tSecret: &v1.SecretVolumeSource{\n\t\t\t\tSecretName: config.MapOrSecretName,\n\t\t\t\tItems: items,\n\t\t\t\tDefaultMode: config.DefaultMode,\n\t\t\t\tOptional: config.Optional,\n\t\t\t},\n\t\t},\n\t}\n\n\treturn &Volume{&v}\n}", "title": "" }, { "docid": "44ac05fc1daf00dc532af1e5a8aa98b9", "score": "0.55927813", "text": "func (o IndexerClusterSpecVolumesProjectedSourcesOutput) ConfigMap() IndexerClusterSpecVolumesProjectedSourcesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v IndexerClusterSpecVolumesProjectedSources) *IndexerClusterSpecVolumesProjectedSourcesConfigMap {\n\t\treturn v.ConfigMap\n\t}).(IndexerClusterSpecVolumesProjectedSourcesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "ac22c24422bdc820e0bdf24d4d3dc583", "score": "0.55630153", "text": "func NewVolume(id uint32, storeFile *os.File, mapFilePath string, threshold float32) (*Volume, error) {\n\tm, err := NewLevelDBMapping(mapFilePath) // TODO: this needs to be changed\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tv := &Volume{\n\t\tID: id,\n\t\tStoreFile: storeFile,\n\t\tmappingName: mapFilePath,\n\t\tmapping: m,\n\t\tgarbageThreshold: threshold,\n\t\treadOnly: false,\n\t\tisCleaning: false,\n\t\tisTmp: false,\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "904cbe428742849fa6c40fe4f608e3ca", "score": "0.5561841", "text": "func (o LicenseMasterSpecVolumesProjectedSourcesOutput) ConfigMap() LicenseMasterSpecVolumesProjectedSourcesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v LicenseMasterSpecVolumesProjectedSources) *LicenseMasterSpecVolumesProjectedSourcesConfigMap {\n\t\treturn v.ConfigMap\n\t}).(LicenseMasterSpecVolumesProjectedSourcesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "5709c24cd63b6709ffa8d5f19f32ea33", "score": "0.5554352", "text": "func (opts CreateOpts) ToVolumeCreateMap() (map[string]interface{}, error) {\n\treturn gophercloud.BuildRequestBody(opts, \"volume\")\n}", "title": "" }, { "docid": "3df72d14dc54a4ac02ddf969c3eb27e3", "score": "0.5505007", "text": "func injectConfigMaps(configMaps []buildapiv1.ConfigMapBuildSource) []s2iapi.VolumeSpec {\n\tvols := make([]s2iapi.VolumeSpec, len(configMaps))\n\tfor i, c := range configMaps {\n\t\tvols[i] = makeVolumeSpec(configMapSource(c), configMapBuildSourceBaseMountPath)\n\t}\n\treturn vols\n}", "title": "" }, { "docid": "4bd41aebd03a36078c8d26688683f9fb", "score": "0.5502659", "text": "func testPDConfigMap() *corev1.ConfigMap {\n\tcm := &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tNamespace: testNamespace,\n\t\t\tName: testClusterName + config.ConfigMapPostfix,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"INTEGRATION_ID\": testIntegrationID,\n\t\t\t\"SERVICE_ID\": testServiceID,\n\t\t},\n\t}\n\treturn cm\n}", "title": "" }, { "docid": "65bdbf3b48b02fe798745a48f9578d6a", "score": "0.54864657", "text": "func newVolume(runtime *Runtime) (*Volume, error) {\n\tvolume := new(Volume)\n\tvolume.config = new(VolumeConfig)\n\tvolume.runtime = runtime\n\tvolume.config.Labels = make(map[string]string)\n\tvolume.config.Options = make(map[string]string)\n\n\treturn volume, nil\n}", "title": "" }, { "docid": "08b7c6fa2ae71250d11ed23ebe5de98c", "score": "0.54815066", "text": "func NewConfigMapOptions(ioStreams genericiooptions.IOStreams) *ConfigMapOptions {\n\treturn &ConfigMapOptions{\n\t\tPrintFlags: genericclioptions.NewPrintFlags(\"created\").WithTypeSetter(scheme.Scheme),\n\t\tIOStreams: ioStreams,\n\t}\n}", "title": "" }, { "docid": "d1a08c4c2a4abdce5e6d6a9bb97068b6", "score": "0.54777265", "text": "func CreateConfigMap(key types.NamespacedName, accessKey string, secretKey string, ws *terraformv1.Workspace) *corev1.ConfigMap {\n\tscipianBucket := os.Getenv(\"SCIPIAN_STATE_BUCKET\")\n\tscipianStateLocking := os.Getenv(\"SCIPIAN_STATE_LOCKING\")\n\t//TODO(NL): Add error handling here if ENV's are empty\n\n\tbackendVariableMap := map[string]string{\n\t\t\"network_workspace_namespace\": ws.Namespace,\n\t\t\"state_bucket_name\": scipianBucket,\n\t\t\"access_key\": accessKey,\n\t\t\"secret_key\": secretKey,\n\t}\n\n\tbackendTF := formatBackendTerraform(scipianBucket, scipianStateLocking, accessKey, secretKey, ws)\n\ttfVars := formatTerraformVars(backendVariableMap, ws)\n\n\tconfigMapData := make(map[string]string)\n\tconfigMapData[\"backend-tf\"] = backendTF\n\tconfigMapData[\"terraform-tfvars\"] = tfVars\n\n\treturn &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: key.Name,\n\t\t\tNamespace: key.Namespace,\n\t\t\tLabels: make(map[string]string),\n\t\t},\n\t\tData: configMapData,\n\t}\n}", "title": "" }, { "docid": "025521a1ed06d914bfc112f417c8fb4d", "score": "0.5472654", "text": "func (f *ConfigMapFactory) MakeConfigMap(\n\targs *types.ConfigMapArgs, options *types.GeneratorOptions) (*corev1.ConfigMap, error) {\n\tvar all []kvPair\n\tvar err error\n\tcm := f.makeFreshConfigMap(args)\n\n\tpairs, err := keyValuesFromEnvFile(f.ldr, args.EnvSource)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\n\t\t\t\"env source file: %s\",\n\t\t\targs.EnvSource))\n\t}\n\tall = append(all, pairs...)\n\n\tpairs, err = keyValuesFromLiteralSources(args.LiteralSources)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\n\t\t\t\"literal sources %v\", args.LiteralSources))\n\t}\n\tall = append(all, pairs...)\n\n\tpairs, err = keyValuesFromFileSources(f.ldr, args.FileSources)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, fmt.Sprintf(\n\t\t\t\"file sources: %v\", args.FileSources))\n\t}\n\tall = append(all, pairs...)\n\n\tfor _, kv := range all {\n\t\terr = addKvToConfigMap(cm, kv.key, kv.value)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tif options != nil {\n\t\tcm.SetLabels(options.Labels)\n\t\tcm.SetAnnotations(options.Annotations)\n\t}\n\treturn cm, nil\n}", "title": "" }, { "docid": "5a23e8b82bb50dc8aa99b80d5d963f80", "score": "0.54569566", "text": "func (m MayaAnyK8s) GenerateConfigMap() (*api_core_v1.ConfigMap, error) {\n\tif !m.isConfigMap() {\n\t\treturn nil, fmt.Errorf(\"Invalid operation; ConfigMap kind is required\")\n\t}\n\n\tb, err := m.ExecuteTemplate()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tcm := NewMayaConfigMapByByte(b)\n\terr = cm.Load()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn cm.ConfigMap, nil\n}", "title": "" }, { "docid": "be50f084c8b4ca27c77923106ad605d1", "score": "0.5456785", "text": "func CreateConsoleConfigMap(cr *v1alpha1.Console, rt *routev1.Route) (*corev1.ConfigMap, error) {\n\tconfigMap := newConsoleConfigMap(cr, rt)\n\tif err := sdk.Create(configMap); err != nil && !errors.IsAlreadyExists(err) {\n\t\tlogrus.Errorf(\"failed to create console configmap : %v\", err)\n\t\treturn nil, err\n\t}\n\tlogrus.Infof(\"created console configmap '%s'\", configMap.ObjectMeta.Name)\n\treturn configMap, nil\n}", "title": "" }, { "docid": "c4b948e46a0329b6643432e4c40cd3a2", "score": "0.54540354", "text": "func makeCmdbConfigMap(z *bkcmdbv1.Bkcmdb, rendered *RenderedContent) *v1.ConfigMap {\n\treturn &v1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: z.GetName() + \"-configures\",\n\t\t\tNamespace: z.Namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"apiserver.conf\": rendered.ApiserverConf,\n\t\t\t\"auditcontroller.conf\": rendered.AuditCtrlConf,\n\t\t\t\"coreservice.conf\": rendered.CoreConf,\n\t\t\t\"datacollection.conf\": rendered.DataCollectionConf,\n\t\t\t\"eventserver.conf\": rendered.EventServerConf,\n\t\t\t\"host.conf\": rendered.HostConf,\n\t\t\t\"hostcontroller.conf\": rendered.HostCtrlConf,\n\t\t\t\"migrate.conf\": rendered.MigrateConf,\n\t\t\t\"objectcontroller.conf\": rendered.ObjectCtrlConf,\n\t\t\t\"proc.conf\": rendered.ProcConf,\n\t\t\t\"proccontroller.conf\": rendered.ProcCtrlConf,\n\t\t\t\"topo.conf\": rendered.TopoConf,\n\t\t\t\"txc.conf\": rendered.TxcConf,\n\t\t\t\"webserver.conf\": rendered.WebserverConf,\n\t\t\t\"task.conf\": rendered.TaskConf,\n\t\t\t\"operation.conf\": rendered.OperationConf,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "e2e2886ab8ea20a65c82690a46757bae", "score": "0.5450568", "text": "func NewConfigMapStore(name string) (Store, error) {\n\t// Lookup the current pod's service account details.\n\tconfig, err := rest.InClusterConfig()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Lookup the current pod's namespace.\n\tnamespace, err := inClusterNamespace()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create a set of Kubernetes clients.\n\tclientSet, err := kubernetes.NewForConfig(config)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// We're only interested in the ConfigMaps client.\n\tclient := clientSet.CoreV1().ConfigMaps(namespace)\n\n\treturn &configMapStore{\n\t\tclient: client,\n\t\tname: name,\n\t}, nil\n}", "title": "" }, { "docid": "83b470e8d7484f3b3a79eb37d87ff9f4", "score": "0.5445832", "text": "func generateVolumeMountConfigs(instanceCr *syncthingv1.Instance, volumes []corev1.Volume) map[string]corev1.VolumeMount {\n\tmounts := map[string]corev1.VolumeMount{}\n\tfor _, volume := range volumes {\n\t\ttemplateMount := corev1.VolumeMount{\n\t\t\tName: volume.Name,\n\t\t\tMountPath: instanceCr.Spec.DataPath + volume.Name + \"/\",\n\t\t}\n\n\t\tif volume.Name == \"config-root\" {\n\t\t\ttemplateMount.MountPath = instanceCr.Spec.ConfigPath\n\t\t}\n\t\tif volume.Name == \"data-root\" {\n\t\t\ttemplateMount.MountPath = instanceCr.Spec.DataPath\n\t\t}\n\t\tmounts[volume.Name] = templateMount\n\t}\n\n\treturn mounts\n}", "title": "" }, { "docid": "c2fa5cc1ee8516eeb65039e63b5df03a", "score": "0.5437694", "text": "func GenConfigMap(name string, namespace string, CAData []byte) *corev1.ConfigMap {\n\tconfigMap := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"ca.crt\": string(CAData),\n\t\t},\n\t}\n\n\treturn configMap\n}", "title": "" }, { "docid": "8e2f33dd8e5e4269622e809f2742986b", "score": "0.54254115", "text": "func newKubeConfig(apiVersion, kind string, name string, modifiers ...helm.NodeModifier) *helm.Mapping {\n\tmapping := newTypeMeta(apiVersion, kind, modifiers...)\n\tmapping.Add(\"metadata\", newObjectMeta(name))\n\treturn mapping\n}", "title": "" }, { "docid": "8c498018cea3478111c85eb921ce7e93", "score": "0.5416004", "text": "func NewConfigMapWatcher(client kube.Client, namespace, name, key string, multiWatch bool, stop <-chan struct{}) *mesh.MultiWatcher {\n\tw := mesh.NewMultiWatcher(mesh.DefaultMeshConfig())\n\tc := configmapwatcher.NewController(client, namespace, name, func(cm *v1.ConfigMap) {\n\t\tmeshNetworks, err := ReadNetworksConfigMap(cm, \"meshNetworks\")\n\t\tif err != nil {\n\t\t\t// Keep the last known config in case there's a misconfiguration issue.\n\t\t\tlog.Warnf(\"failed to read mesh config from ConfigMap: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tif meshNetworks != nil {\n\t\t\tw.SetNetworks(meshNetworks)\n\t\t}\n\t\tif multiWatch {\n\t\t\tmeshConfig := meshConfigMapData(cm, key)\n\t\t\tw.HandleMeshConfigData(meshConfig)\n\t\t\treturn\n\t\t}\n\t\t// Original behavior - just per-revision config\n\t\tmeshConfig, err := ReadConfigMap(cm, key)\n\t\tif err != nil {\n\t\t\t// Keep the last known config in case there's a misconfiguration issue.\n\t\t\tlog.Warnf(\"failed to read mesh config from ConfigMap: %v\", err)\n\t\t\treturn\n\t\t}\n\t\tw.HandleMeshConfig(meshConfig)\n\t})\n\n\tgo c.Run(stop)\n\n\t// Ensure the ConfigMap is initially loaded if present.\n\tif !client.WaitForCacheSync(\"configmap watcher\", stop, c.HasSynced) {\n\t\tlog.Error(\"failed to wait for cache sync\")\n\t}\n\treturn w\n}", "title": "" }, { "docid": "d4035e06e60fc9d5330a01d32fc79966", "score": "0.54103065", "text": "func NewConfigFromConfigMap(config *corev1.ConfigMap) (*Config, error) {\n\tc := Config{}\n\tif config == nil {\n\t\treturn &c, nil\n\t}\n\tif v, ok := config.Data[\"allowed-namespaces\"]; ok {\n\t\tif v == \"\" {\n\t\t\tc.AllowedNamespaces = sets.NewString()\n\t\t} else {\n\t\t\tc.AllowedNamespaces = sets.NewString(strings.Split(v, \",\")...)\n\t\t}\n\t}\n\treturn &c, nil\n}", "title": "" }, { "docid": "b4e46abcd3ab2fddd88cd04f51557f15", "score": "0.5406429", "text": "func (o SearchHeadClusterSpecVolumesProjectedSourcesOutput) ConfigMap() SearchHeadClusterSpecVolumesProjectedSourcesConfigMapPtrOutput {\n\treturn o.ApplyT(func(v SearchHeadClusterSpecVolumesProjectedSources) *SearchHeadClusterSpecVolumesProjectedSourcesConfigMap {\n\t\treturn v.ConfigMap\n\t}).(SearchHeadClusterSpecVolumesProjectedSourcesConfigMapPtrOutput)\n}", "title": "" }, { "docid": "dbd4ac5eb2241b06ac42807fe32c11a7", "score": "0.537689", "text": "func newVolume(comp resource.Compute, cfg *config.Volume, p *dataCenterProvider) (resource.ProviderVolume, error) {\n\tlog.Info(\"Initializing AWS volume %q\", cfg.Device())\n\n\tc, ok := comp.ProviderCompute().(*compute)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"AWS newVolume: Unable to obtain compute\")\n\t}\n\n\t// Build the parameters that will be used by the instance\n\tparams := &ec2.BlockDeviceMapping{\n\t\tDeviceName: aws.String(cfg.Device()),\n\t\tEbs: &ec2.EbsBlockDevice{\n\t\t\tDeleteOnTermination: aws.Bool(!cfg.Keep()),\n\t\t\tVolumeSize: aws.Int64(cfg.Size()),\n\t\t\tVolumeType: aws.String(cfg.Type()),\n\t\t},\n\t}\n\tif !cfg.Boot() {\n\t\tparams.Ebs.Encrypted = aws.Bool(true)\n\t}\n\n\tv := &volume{\n\t\tVolume: cfg,\n\t\tec2: p.ec2,\n\t\tcompute: c,\n\t\tvolumeParams: params,\n\t}\n\treturn v, nil\n}", "title": "" }, { "docid": "4f09faefe2278bc349ca69a10ab9e1d2", "score": "0.53536445", "text": "func configMap(netConf bytes.Buffer) *corev1.ConfigMap {\n\treturn &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: \"canal-config\",\n\t\t\tNamespace: metav1.NamespaceSystem,\n\t\t},\n\t\tData: map[string]string{\n\t\t\t// Typha is disabled.\n\t\t\t\"typha_service_name\": \"none\",\n\n\t\t\t// The interface used by canal for host <-> host communication.\n\t\t\t// If left blank, then the interface is chosen using the node's\n\t\t\t// default route\n\t\t\t\"canal_iface\": \"\",\n\n\t\t\t// Whether or not to masquerade traffic to destinations not within\n\t\t\t// the pod network\n\t\t\t\"masquerade\": \"true\",\n\n\t\t\t// The CNI network configuration to install on each node. The special\n\t\t\t// values in this config will be automatically populated.\n\t\t\t\"cni_network_config\": cniNetworkConfig,\n\n\t\t\t// Flannel network configuration. Mounted into the flannel container\n\t\t\t\"net-conf.json\": netConf.String(),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "9c06c8ea725c1c72e4839e65d0852217", "score": "0.53462195", "text": "func (a *Actions) CreatePlacementDecisionConfigMap(configMapName string) *Actions {\n\ta.context.t.Helper()\n\n\tfixtureClient := utils.GetE2EFixtureK8sClient()\n\n\t_, err := fixtureClient.KubeClientset.CoreV1().ConfigMaps(utils.ArgoCDNamespace).Get(context.Background(), configMapName, metav1.GetOptions{})\n\n\t// Don't do anything if it exists\n\tif err == nil {\n\t\treturn a\n\t}\n\n\t_, err = fixtureClient.KubeClientset.CoreV1().ConfigMaps(utils.ArgoCDNamespace).Create(context.Background(),\n\t\t&corev1.ConfigMap{\n\t\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\t\tName: configMapName,\n\t\t\t},\n\t\t\tData: map[string]string{\n\t\t\t\t\"apiVersion\": \"cluster.open-cluster-management.io/v1alpha1\",\n\t\t\t\t\"kind\": \"placementdecisions\",\n\t\t\t\t\"statusListKey\": \"decisions\",\n\t\t\t\t\"matchKey\": \"clusterName\",\n\t\t\t},\n\t\t}, metav1.CreateOptions{})\n\n\ta.describeAction = fmt.Sprintf(\"creating configmap '%s'\", configMapName)\n\ta.lastOutput, a.lastError = \"\", err\n\ta.verifyAction()\n\n\treturn a\n}", "title": "" }, { "docid": "3f6c99e5e4bb7f2185f092ee67662143", "score": "0.53456384", "text": "func New() *Config { return &Config{root: make(Map)} }", "title": "" }, { "docid": "df3cebf5ed47747f4b6be0b5f4e68fce", "score": "0.53437287", "text": "func CreateConfigMapFromFile(name string, key, fileName string, namespace string) (err error) {\n\tif _, err = os.Stat(fileName); os.IsNotExist(err) {\n\t\treturn err\n\t}\n\n\targs := []string{\"create\", \"configmap\", name,\n\t\t\"--namespace\", namespace,\n\t\tfmt.Sprintf(\"--from-file=%s=%s\", key, fileName)}\n\n\tout, err := kubectl(args)\n\tlog.V(1).Info(\"exec: \", \"cmd\", args)\n\tlog.V(1).Info(fmt.Sprintf(\"result: %s\", string(out)))\n\tif err != nil {\n\t\tlog.Error(err, fmt.Sprintf(\"Failed to execute %v\", args))\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6013de72278f0e07e57ecf1ab9285fa4", "score": "0.5332114", "text": "func NewVolumeCfg(xc *XMLCfg, fn string) (*VolumeCfg, error) {\n\titm := new(VolumeCfg)\n\tvar f *os.File\n\t_, err := os.Stat(fn)\n\titm.fn = fn\n\n\tif os.IsNotExist(err) {\n\t\terr := itm.GenerateNewVolumeLabel(xc)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t} else {\n\t\tf, err = os.Open(fn)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error opening NewVolumeCfg file:%s::%w\", fn, err)\n\t\t}\n\t\tdefer f.Close()\n\n\t\tbyteValue, err := ioutil.ReadAll(f)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"error loading NewVolumeCfg file:%s::%w\", fn, err)\n\n\t\t}\n\t\terr = itm.FromXML(byteValue)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"unable to unmarshal config NewVolumeCfg file:%s::%w\", fn, err)\n\t\t}\n\t}\n\t// We don't care if the label is there already or not\n\t_ = xc.AddLabel(itm.Label)\n\treturn itm, nil\n}", "title": "" }, { "docid": "4bba4c64fb6fe51a0adbc1ad3c2f916e", "score": "0.5329665", "text": "func desiredConfigMap(contour *operatorv1alpha1.Contour) (*corev1.ConfigMap, error) {\n\tcfgFile := new(bytes.Buffer)\n\n\taccessLogFormat := \"envoy\"\n\tcfgFileParameters := struct {\n\t\tAccessLogFormat string\n\t}{\n\t\tAccessLogFormat: accessLogFormat,\n\t}\n\n\tif err := contourCfgTemplate.Execute(cfgFile, cfgFileParameters); err != nil {\n\t\treturn nil, err\n\t}\n\n\tcm := &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: contourCfgMapName,\n\t\t\tNamespace: contour.Spec.Namespace.Name,\n\t\t\tLabels: map[string]string{\n\t\t\t\toperatorv1alpha1.OwningContourNameLabel: contour.Name,\n\t\t\t\toperatorv1alpha1.OwningContourNsLabel: contour.Namespace,\n\t\t\t},\n\t\t},\n\t\tData: map[string]string{\n\t\t\t\"contour.yaml\": cfgFile.String(),\n\t\t},\n\t}\n\n\treturn cm, nil\n}", "title": "" }, { "docid": "6f0500df1a00a06f5f0eb40786a7075d", "score": "0.53283286", "text": "func NewConfigFromMap(data map[string]string) (*Config, error) {\n\tnc := defaultConfig()\n\n\tif err := cm.Parse(data,\n\t\t// Legacy keys\n\t\tcm.AsString(\"ingress.class\", &nc.DefaultIngressClass),\n\t\tcm.AsString(\"certificate.class\", &nc.DefaultCertificateClass),\n\t\tcm.AsString(\"domainTemplate\", &nc.DomainTemplate),\n\t\tcm.AsString(\"tagTemplate\", &nc.TagTemplate),\n\t\tcm.AsInt(\"rolloutDuration\", &nc.RolloutDurationSecs),\n\t\tcm.AsBool(\"autocreateClusterDomainClaims\", &nc.AutocreateClusterDomainClaims),\n\t\tcm.AsString(\"defaultExternalScheme\", &nc.DefaultExternalScheme),\n\n\t\t// New key takes precedence.\n\t\tcm.AsString(DefaultIngressClassKey, &nc.DefaultIngressClass),\n\t\tcm.AsString(DefaultCertificateClassKey, &nc.DefaultCertificateClass),\n\t\tcm.AsString(DomainTemplateKey, &nc.DomainTemplate),\n\t\tcm.AsString(TagTemplateKey, &nc.TagTemplate),\n\t\tcm.AsInt(RolloutDurationKey, &nc.RolloutDurationSecs),\n\t\tcm.AsBool(AutocreateClusterDomainClaimsKey, &nc.AutocreateClusterDomainClaims),\n\t\tcm.AsBool(EnableMeshPodAddressabilityKey, &nc.EnableMeshPodAddressability),\n\t\tcm.AsString(DefaultExternalSchemeKey, &nc.DefaultExternalScheme),\n\t\tcm.AsBool(InternalEncryptionKey, &nc.InternalEncryption),\n\t\tasMode(MeshCompatibilityModeKey, &nc.MeshCompatibilityMode),\n\t\tasLabelSelector(NamespaceWildcardCertSelectorKey, &nc.NamespaceWildcardCertSelector),\n\t); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif nc.RolloutDurationSecs < 0 {\n\t\treturn nil, fmt.Errorf(\"%s must be a positive integer, but was %d\", RolloutDurationKey, nc.RolloutDurationSecs)\n\t}\n\t// Verify domain-template and add to the cache.\n\tt, err := template.New(\"domain-template\").Parse(nc.DomainTemplate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := checkDomainTemplate(t); err != nil {\n\t\treturn nil, err\n\t}\n\ttemplateCache.Add(nc.DomainTemplate, t)\n\n\t// Verify tag-template and add to the cache.\n\tt, err = template.New(\"tag-template\").Parse(nc.TagTemplate)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif err := checkTagTemplate(t); err != nil {\n\t\treturn nil, err\n\t}\n\ttemplateCache.Add(nc.TagTemplate, t)\n\n\tif val, ok := data[\"autoTLS\"]; ok {\n\t\tnc.AutoTLS = strings.EqualFold(val, \"enabled\")\n\t}\n\tif val, ok := data[AutoTLSKey]; ok {\n\t\tnc.AutoTLS = strings.EqualFold(val, \"enabled\")\n\t}\n\n\tvar httpProtocol string\n\tif val, ok := data[\"httpProtocol\"]; ok {\n\t\thttpProtocol = val\n\t}\n\tif val, ok := data[HTTPProtocolKey]; ok {\n\t\thttpProtocol = val\n\t}\n\n\tswitch strings.ToLower(httpProtocol) {\n\tcase \"\", string(HTTPEnabled):\n\t\t// If HTTPProtocol is not set in the config-network, default is already\n\t\t// set to HTTPEnabled.\n\tcase string(HTTPDisabled):\n\t\tnc.HTTPProtocol = HTTPDisabled\n\tcase string(HTTPRedirected):\n\t\tnc.HTTPProtocol = HTTPRedirected\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"httpProtocol %s in config-network ConfigMap is not supported\", data[HTTPProtocolKey])\n\t}\n\n\tswitch strings.ToLower(data[DataplaneTrustKey]) {\n\tcase \"\", string(TrustDisabled):\n\t\t// If DataplaneTrus is not set in the config-network, default is already\n\t\t// set to TrustDisabled.\n\t\tif nc.InternalEncryption {\n\t\t\t// Backward compatibility\n\t\t\tnc.DataplaneTrust = TrustMinimal\n\t\t}\n\tcase string(TrustMinimal):\n\t\tnc.DataplaneTrust = TrustMinimal\n\tcase string(TrustEnabled):\n\t\tnc.DataplaneTrust = TrustEnabled\n\tcase string(TrustMutual):\n\t\tnc.DataplaneTrust = TrustMutual\n\tcase string(TrustIdentity):\n\t\tnc.DataplaneTrust = TrustIdentity\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"DataplaneTrust %q in config-network ConfigMap is not supported\", data[DataplaneTrustKey])\n\t}\n\n\tswitch strings.ToLower(data[ControlplaneTrustKey]) {\n\tcase \"\", string(TrustDisabled):\n\t\t// If ControlplaneTrust is not set in the config-network, default is already\n\t\t// set to TrustDisabled.\n\tcase string(TrustEnabled):\n\t\tnc.ControlplaneTrust = TrustEnabled\n\tcase string(TrustMutual):\n\t\tnc.ControlplaneTrust = TrustMutual\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"ControlplaneTrust %q in config-network ConfigMap is not supported\", data[ControlplaneTrustKey])\n\t}\n\n\treturn nc, nil\n}", "title": "" }, { "docid": "3a7be080b6a96f5b207dafb797cfa0cd", "score": "0.53252554", "text": "func generateConfigMap(name string, fileName string, fileContents string, log logr.Logger) (*corev1.ConfigMap, error) {\n\tcm := &corev1.ConfigMap{}\n\tcm.Name = name\n\tcm.Data = map[string]string{}\n\n\tcm.Data[fileName] = fileContents\n\th, err := hash.ConfigMapHash(cm)\n\tif err != nil {\n\t\tlog.V(0).Info(\"Error hashing config map!\", \"error\", err)\n\t\treturn cm, err\n\t}\n\tcm.Name = fmt.Sprintf(\"%s-%s\", cm.Name, h)\n\n\treturn cm, nil\n}", "title": "" }, { "docid": "1c5642854248454f4878fb39f342d515", "score": "0.5315546", "text": "func NewFileConfigMap(cfgName, filename, content string) (*coreV1.ConfigMap, error) {\n\tif strings.TrimSpace(cfgName) == \"\" {\n\t\treturn nil, errors.New(\"empty config name\")\n\t}\n\n\tif strings.TrimSpace(filename) == \"\" {\n\t\treturn nil, fmt.Errorf(\"invalid name for configmap %s\", cfgName)\n\t}\n\n\tif strings.TrimSpace(content) == \"\" {\n\t\treturn nil, fmt.Errorf(\"invalid file %s for configmap %s, empty content\", filename, cfgName)\n\t}\n\n\treturn &coreV1.ConfigMap{\n\t\tObjectMeta: metaV1.ObjectMeta{\n\t\t\tName: cfgName,\n\t\t},\n\t\tData: map[string]string{\n\t\t\tfilename: content,\n\t\t},\n\t}, nil\n}", "title": "" }, { "docid": "38047f11f017bbcc71e0642bb889dd9d", "score": "0.5310811", "text": "func generateVolumeConfig() []kapi.Volume {\n\t// The keepalived container needs access to the kernel modules\n\t// directory in order to load the module.\n\thostPath := &kapi.HostPathVolumeSource{Path: libModulesPath}\n\tsrc := kapi.VolumeSource{HostPath: hostPath}\n\n\tvol := kapi.Volume{Name: libModulesVolumeName, VolumeSource: src}\n\treturn []kapi.Volume{vol}\n}", "title": "" }, { "docid": "312da06fab067c2bb1a50fbe878dc996", "score": "0.5306809", "text": "func NewConfigMapStorage() *ConfigMap {\n\treturn &ConfigMap{}\n}", "title": "" }, { "docid": "7e60e85397de3c5b704ec55c3ea85ad5", "score": "0.5304452", "text": "func (v *VirtualIPPool) GetConfigMap() *corev1.ConfigMap {\n\treturn &corev1.ConfigMap{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: v.GetName(),\n\t\t\tNamespace: v.GetNamespace(),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "94236c49fceff0aeea331f130eaa18f1", "score": "0.52849805", "text": "func CustomConfigMap(api *placementv1beta1.PlacementAPI, scheme *runtime.Scheme) *corev1.ConfigMap {\n\n\tcm := &corev1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"ConfigMap\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: api.Name + \"-config-data-custom\",\n\t\t\tNamespace: api.Namespace,\n\t\t\tLabels: GetLabels(api.Name),\n\t\t},\n\t\tData: map[string]string{},\n\t}\n\tcontrollerutil.SetControllerReference(api, cm, scheme)\n\treturn cm\n}", "title": "" }, { "docid": "7feaff85ba27278ec6b5eee7cdcacbaa", "score": "0.5263468", "text": "func toConfigMap(stackName, name, key string, content []byte) *apiv1.ConfigMap {\n\treturn &apiv1.ConfigMap{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ConfigMap\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tLabels: map[string]string{\n\t\t\t\tlabels.ForStackName: stackName,\n\t\t\t},\n\t\t},\n\t\tData: map[string]string{\n\t\t\tkey: string(content),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "2f288758c384503cd5257d74702061f6", "score": "0.5253903", "text": "func (c *Controller) ensureConfigMap(cluster *myspec.M3DBCluster) error {\n\tif cluster.Spec.ConfigMapName != nil {\n\t\tif *cluster.Spec.ConfigMapName == \"\" {\n\t\t\treturn errEmptyConfigMap\n\t\t}\n\t\t// Nothing to do if user specified config map.\n\t\treturn nil\n\t}\n\n\tcm, err := k8sops.GenerateDefaultConfigMap(cluster)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = c.kubeClient.CoreV1().ConfigMaps(cluster.Namespace).Create(cm)\n\tif kerrors.IsAlreadyExists(err) {\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" } ]
3e776a6f002febfbf2118b980ded0680
CutFromLeft acts like cut but removes from the left hand side rather than the right
[ { "docid": "40c279eaa5fd3b625a6d6d32c0b4ccac", "score": "0.75641334", "text": "func CutFromLeft(newWidth, newHeight int) Modification {\n\treturn CutFn(\n\t\tfunc(w int) int { return w - newWidth },\n\t\tfunc(h int) int { return h - newHeight },\n\t\tfunc(int) int { return newWidth },\n\t\tfunc(int) int { return newHeight })\n}", "title": "" } ]
[ { "docid": "b2342d40557f74a10fdc26b665df3a3c", "score": "0.649309", "text": "func Cut(slc []string, start int, stop int) []string {\n\n\tif copyRequested := (start == 0 && stop == -1); copyRequested {\n\t\treturn Copy(slc)\n\t}\n\n\tif goToEnd := (stop == -1); goToEnd {\n\t\treturn slc[start:]\n\t}\n\n\treturn slc[start:stop]\n}", "title": "" }, { "docid": "dd91c6d5388ec607e1d5221e78506bc1", "score": "0.62077373", "text": "func Cut(newWidth, newHeight int) Modification {\n\treturn CutFn(func(int) int { return 0 },\n\t\tfunc(int) int { return 0 },\n\t\tfunc(int) int { return newWidth },\n\t\tfunc(int) int { return newHeight })\n}", "title": "" }, { "docid": "c5e989bd53ca0b426e930e629431d9e7", "score": "0.62014437", "text": "func cutLeft(input string, options map[string]interface{}) string {\n\toptionString, found := options[\"length\"]\n\tif found {\n\t\tlength, err := strconv.Atoi(fmt.Sprintf(\"%v\", optionString))\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"the '%s' option value '%s' for the '%s' function is not a valid integer\", \"length\", fmt.Sprintf(\"%v\", optionString), \"cutLeft\")\n\t\t\treturn input\n\t\t}\n\t\tif length < 0 {\n\t\t\tlog.Errorf(\"the '%s' option value '%s' for the '%s' function cannot be negative\", \"length\", fmt.Sprintf(\"%v\", optionString), \"cutLeft\")\n\t\t\treturn input\n\t\t}\n\t\tif len(input) > length {\n\t\t\treturn input[len(input)-length : len(input)]\n\t\t} else {\n\t\t\treturn input\n\t\t}\n\t} else {\n\t\treturn input\n\t}\n}", "title": "" }, { "docid": "cd7840dfc23949a04cd5ddd7a5eb0e88", "score": "0.6164529", "text": "func TrimLeft(s string, cutSet ...string) string {\n\tif ln := len(cutSet); ln > 0 && cutSet[0] != \"\" {\n\t\tif ln == 1 {\n\t\t\treturn strings.TrimLeft(s, cutSet[0])\n\t\t}\n\n\t\treturn strings.TrimLeft(s, strings.Join(cutSet, \"\"))\n\t}\n\n\treturn strings.TrimLeft(s, \" \")\n}", "title": "" }, { "docid": "5eccce879ed76d4753ad7e16afb60aef", "score": "0.6159865", "text": "func TrimLeft(s string, cutSet ...string) string {\n\tif len(cutSet) > 0 {\n\t\treturn strings.TrimLeft(s, cutSet[0])\n\t}\n\n\treturn strings.TrimLeft(s, \" \")\n}", "title": "" }, { "docid": "60569119f67bab6688102e00ed98a017", "score": "0.60732824", "text": "func (b *Buffer) Cut(toBytes int) error {\n\tif toBytes < 0 {\n\t\treturn errors.New(\"Cut to negative position\")\n\t}\n\tif toBytes > len(b.buf) {\n\t\treturn errors.New(\"Cut to unexisted position\")\n\t}\n\tb.buf = b.buf[:toBytes]\n\treturn nil\n}", "title": "" }, { "docid": "b580e15f77b233478ef193fa5be02dc9", "score": "0.59052956", "text": "func ClearLeft(digest []byte, size uint64) []byte {\n\treturn filter(digest, size, true)\n}", "title": "" }, { "docid": "69c37aa30d4c07510da4ae70af9d1476", "score": "0.5899393", "text": "func (c *ImmutableFloat32) Cut(i, j int) []float32 {\n\td := c.Copy()\n\treturn append(d.items[:i], d.items[j:]...)\n}", "title": "" }, { "docid": "d6acbc84f48a19f070e00d42fb531fea", "score": "0.58817273", "text": "func (b *Board) Cut(w, h int) *Board {\n\tif w > b.width || h > b.height {\n\t\tlog.Fatal(\"cannot cat larger board from smaller\")\n\t}\n\n\tresult := NewBoard(w, h, b.chainLen)\n\tfor i := range result.board {\n\t\tresult.SetIndexState(i, b.GetIndexState(b.ConvertIndex(w, h, i)))\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "ef59184158e80ff604c0d102cd8c25eb", "score": "0.5840977", "text": "func (o *TextEdit) Cut() {\n\t//log.Println(\"Calling TextEdit.Cut()\")\n\n\t// Build out the method's arguments\n\tptrArguments := make([]gdnative.Pointer, 0, 0)\n\n\t// Get the method bind\n\tmethodBind := gdnative.NewMethodBind(\"TextEdit\", \"cut\")\n\n\t// Call the parent method.\n\t// void\n\tretPtr := gdnative.NewEmptyVoid()\n\tgdnative.MethodBindPtrCall(methodBind, o.GetBaseObject(), ptrArguments, retPtr)\n\n}", "title": "" }, { "docid": "e3360fe931acefd316fb936fffe2b267", "score": "0.57872576", "text": "func Cut() Parser {\n\treturn func(ps *State, node *Result) {\n\t\tps.Cut = ps.Pos\n\t}\n}", "title": "" }, { "docid": "56441bf764514f2f7f5e32b64991c999", "score": "0.5743112", "text": "func (f *fit) shiftLeft() {\n\tif cs := commonSuffix(f.equality1, f.edit); cs != \"\" {\n\t\tn := len(cs)\n\t\tf.equality1 = f.equality1[:len(f.equality1)-n]\n\t\tf.edit = cs + f.edit[:len(f.edit)-n]\n\t\tf.equality2 = cs + f.equality2\n\t}\n}", "title": "" }, { "docid": "1d840e49c3a6fd83110e358f5a01e3d9", "score": "0.5637928", "text": "func (mbc *Receiver) Cut() []*cb.Envelope {\n\tmbc.mutex.Lock()\n\tdefer mbc.mutex.Unlock()\n\tlogger.Debugf(\"Cutting batch\")\n\tres := mbc.curBatch\n\tmbc.curBatch = nil\n\treturn res\n}", "title": "" }, { "docid": "0d0e8c344fb9f7486b7d1262706b9eb5", "score": "0.55815685", "text": "func (seg *Segmenter) Cut(str string, hmm ...bool) []string {\n\tif len(hmm) <= 0 {\n\t\treturn seg.Slice(str)\n\t\t// return seg.cutDAGNoHMM(str)\n\t}\n\n\tif len(hmm) > 0 && !hmm[0] {\n\t\treturn seg.cutDAGNoHMM(str)\n\t}\n\n\treturn seg.cutDAG(str)\n}", "title": "" }, { "docid": "a3a4f2e7806c7b5482eca68623d1da9f", "score": "0.55673134", "text": "func flushLeft(graph *Graph) {\n\tnode := graph.Nodes[0]\n\tminleft := node.Center.X - node.Radius.X\n\tfor _, node := range graph.Nodes[1:] {\n\t\tif node.Center.X-node.Radius.X < minleft {\n\t\t\tminleft = node.Center.X - node.Radius.X\n\t\t}\n\t}\n\n\tfor _, node := range graph.Nodes {\n\t\tnode.Center.X -= minleft\n\t}\n}", "title": "" }, { "docid": "4c3ee6f6305b783e88ed198b7e3b964f", "score": "0.55661076", "text": "func (t *Tetromino) ShiftLeft() {\n\tt.move(t.bounds[0].X-20, t.bounds[0].Y)\n}", "title": "" }, { "docid": "d0f92cfff222261f1c338b5a81488d4a", "score": "0.55572075", "text": "func leftChop(position int) *sync.Mutex {\n\tif position == 0 {\n\t\treturn &Chopsticks[PhilosopherCount-1]\n\t}\n\n\treturn &Chopsticks[position-1]\n}", "title": "" }, { "docid": "3b9da337b9b08c49fae5535c1ef51da7", "score": "0.555486", "text": "func SetLeft(digest []byte, size uint64) []byte {\n\treturn filter(digest, size, false)\n}", "title": "" }, { "docid": "f5c58788d47ad801aa2f58bc231936d3", "score": "0.54992545", "text": "func (r *BatchCutter) Cut(force bool) ([]*batch.OperationInfo, uint, Committer, error) {\n\tpending := r.pendingBatch.Len()\n\n\tmaxOperationsPerBatch := r.client.Current().MaxOperationsPerBatch\n\tif !force && pending < maxOperationsPerBatch {\n\t\treturn nil, pending, nil, nil\n\t}\n\n\tbatchSize := min(pending, maxOperationsPerBatch)\n\tops, err := r.pendingBatch.Peek(batchSize)\n\tif err != nil {\n\t\treturn nil, pending, nil, err\n\t}\n\n\tpending -= batchSize\n\n\tlogger.Infof(\"Pending Size: %d, MaxOperationsPerBatch: %d, Batch Size: %d\", pending, maxOperationsPerBatch, batchSize)\n\n\tcommitter := func() (uint, error) {\n\t\tlogger.Infof(\"Removing %d operations from the queue\", batchSize)\n\n\t\t_, p, err := r.pendingBatch.Remove(batchSize)\n\t\treturn p, err\n\t}\n\n\treturn ops, pending, committer, nil\n}", "title": "" }, { "docid": "d3e5fe5c94bd7c63007d6349cfd0f2df", "score": "0.5480909", "text": "func (nlp *NLP) Cut() []string {\n\treturn nlp.Seg.Cut(nlp.Docs)\n}", "title": "" }, { "docid": "502c29ac91576f637d8fc64afde79d7f", "score": "0.5439303", "text": "func cutout(s1, s2 string) string {\n\tsplit_s1 := strings.Split(\" \"+s1, s2)\n\tif len(split_s1) < 2 {\n\t\treturn \"\"\n\t}\n\tsub_part := split_s1[1] + \" \"\n\treturn sub_part[:strings.Index(sub_part, \" \")]\n}", "title": "" }, { "docid": "2b9a2510319d01929f83f2c987374f46", "score": "0.5421209", "text": "func (t *ipTree) trimLeft(top *ipTree) *ipTree {\n\tif t == nil {\n\t\treturn nil\n\t}\n\n\tif ContainsNet(top.net, t.net) {\n\t\treturn t.left.trimLeft(top)\n\t}\n\tt.setRight(t.right.trimLeft(top))\n\treturn t\n}", "title": "" }, { "docid": "59082c693d848b1a709f76ad4090a1d6", "score": "0.54042757", "text": "func cut(length int) int {\n\tif length%2 == 0 {\n\t\treturn length / 2\n\t}\n\treturn length/2 + 1\n}", "title": "" }, { "docid": "991c03c1054c10833a2146c841f5d7ba", "score": "0.5370988", "text": "func (workspace *Workspace) MoveLeft(wid uint32) {\n\tidx := workspace.right.IndexById(wid)\n\tif idx > -1 && workspace.right.Len() > 1 {\n\t\twin := workspace.right.WindowByIndex(idx)\n\t\tworkspace.right.Remove(win)\n\t\tworkspace.left.Add(win)\n\t}\n}", "title": "" }, { "docid": "3edf216321ec276cd9945209fff67bcf", "score": "0.53692204", "text": "func Ltrim(s string, cutSet ...string) string { return TrimLeft(s, cutSet...) }", "title": "" }, { "docid": "b7110d32d840b3f275e3499c7facc95c", "score": "0.53602993", "text": "func (_this *SVGElement) OnCut() domcore.EventHandlerFunc {\n\tvar ret domcore.EventHandlerFunc\n\tvalue := _this.Value_JS.Get(\"oncut\")\n\tif value.Type() != js.TypeNull && value.Type() != js.TypeUndefined {\n\t\tret = domcore.EventHandlerFromJS(value)\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "b614d2af639a1dfa9cf518becf4f0395", "score": "0.5345438", "text": "func WrapLeft(separator string, text string) string {\n\tresult := strings.TrimLeft(text, separator)\n\tif strings.Index(result, separator) != 0 {\n\t\tresult = Cat(separator, result)\n\t}\n\treturn result\n}", "title": "" }, { "docid": "ae002a5ad5ede916d88749b21e41b479", "score": "0.5320191", "text": "func LTrim(s string, cutSet ...string) string { return TrimLeft(s, cutSet...) }", "title": "" }, { "docid": "0d49bdd6b3a2c8525120df839326ddb2", "score": "0.53175694", "text": "func (q BitfieldQueue) Cut(toCut bitfield.BitField) error {\n\tvar epochsToRemove []uint64\n\tif err := q.ForEach(func(epoch abi.ChainEpoch, bf bitfield.BitField) error {\n\t\tbf, err := bitfield.CutBitField(bf, toCut)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif empty, err := bf.IsEmpty(); err != nil {\n\t\t\treturn err\n\t\t} else if !empty {\n\t\t\treturn q.Set(uint64(epoch), bf)\n\t\t}\n\t\tepochsToRemove = append(epochsToRemove, uint64(epoch))\n\t\treturn nil\n\t}); err != nil {\n\t\treturn xerrors.Errorf(\"failed to cut from bitfield queue: %w\", err)\n\t}\n\tif err := q.BatchDelete(epochsToRemove, true); err != nil {\n\t\treturn xerrors.Errorf(\"failed to remove empty epochs from bitfield queue: %w\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "4c11723fdea0808d09ca1ccabce8008f", "score": "0.52772063", "text": "func TestTrimLeft(t *testing.T) {\n\tassert.Equal(t, NewTextWrap().TrimLeft(\" trim me\"), \"trim me\")\n}", "title": "" }, { "docid": "d22a0fee28eb5ff16f70c83779f258bd", "score": "0.52698725", "text": "func (kcp *KCP) remove_front(q []segment, n int) []segment {\n\tif n > cap(q)/2 {\n\t\tnewn := copy(q, q[n:])\n\t\treturn q[:newn]\n\t}\n\treturn q[n:]\n}", "title": "" }, { "docid": "3fc611d9dbdf724a1a982462104aca60", "score": "0.5260814", "text": "func (e *Escpos) Cut() {\n\te.Write(\"\\x1DVA0\")\n}", "title": "" }, { "docid": "e3a1fd6dbc86f6b9078a0dad38ee0596", "score": "0.5259479", "text": "func (ed *editor) killWordLeft() {\n\tif ed.dot == 0 {\n\t\treturn\n\t}\n\tspace := strings.LastIndexFunc(\n\t\tstrings.TrimRightFunc(ed.buffer[:ed.dot], unicode.IsSpace),\n\t\tunicode.IsSpace) + 1\n\ted.buffer = ed.buffer[:space] + ed.buffer[ed.dot:]\n\ted.dot = space\n}", "title": "" }, { "docid": "949149a76cfdd8701d114935aaf1b158", "score": "0.52533567", "text": "func WReapLeft(separator string, text ...string) string {\n\tfor i, t := range text {\n\t\ttext[i] = strings.Trim(t, separator)\n\t}\n\treturn WrapLeft(Wrapper(separator, text...), separator)\n}", "title": "" }, { "docid": "a8525e681e0ed669ae380db7796ee76c", "score": "0.5228374", "text": "func cutSpaces(first, last *ast.Text) {\n\tvar firstCut int\n\tif first != nil {\n\t\t// So that spaces can be cut, first.Text must only contain '', '\\t' and '\\r',\n\t\t// or after the last '\\n' must only contain '', '\\t' and '\\r'.\n\t\ttxt := first.Text\n\t\tfor i := len(txt) - 1; i >= 0; i-- {\n\t\t\tc := txt[i]\n\t\t\tif c == '\\n' {\n\t\t\t\tfirstCut = i + 1\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif c != ' ' && c != '\\t' && c != '\\r' {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t}\n\tif last != nil {\n\t\t// So that the spaces can be cut, last.Text must contain only '', '\\t' and '\\r',\n\t\t// or before the first '\\n' must only contain '', '\\t' and '\\r'.\n\t\ttxt := last.Text\n\t\tvar lastCut = len(txt)\n\t\tfor i := 0; i < len(txt); i++ {\n\t\t\tc := txt[i]\n\t\t\tif c == '\\n' {\n\t\t\t\tlastCut = i + 1\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tif c != ' ' && c != '\\t' && c != '\\r' {\n\t\t\t\treturn\n\t\t\t}\n\t\t}\n\t\tlast.Cut.Left = lastCut\n\t}\n\tif first != nil {\n\t\tfirst.Cut.Right = len(first.Text) - firstCut\n\t}\n}", "title": "" }, { "docid": "d4138cdd0d0dc93f4312e319004e8f83", "score": "0.52120125", "text": "func (p Point) Left() Point {\n\treturn Point{-p.Y, p.X}\n}", "title": "" }, { "docid": "35c26e70eb5e97a9e6ed491c4747d859", "score": "0.52043587", "text": "func (v *Vector) ShiftLeft(w *Vector, r uint) *Vector {\n\t//body, lenLast := makeVector(w.Len())\n\tstart := int(r / WordSize)\n\tl := r % WordSize\n\tmask := MaxInteger << (WordSize - l)\n\ttmpv := New().allocate(w.Len())\n\tfor i := start; i < len(w.body); i++ {\n\t\ttmpv.body[i-start] = w.body[i] << l\n\t\tif i < len(w.body)-1 {\n\t\t\ttmpv.body[i-start] ^= (w.body[i+1] & mask) >> (WordSize - l)\n\t\t}\n\t}\n\tv.body, v.lenLast = tmpv.body, tmpv.lenLast\n\treturn v\n}", "title": "" }, { "docid": "ca2d097d97bee68e3d950669fb11afc5", "score": "0.51866", "text": "func strTrimLeft(L *LState) int {\n\tstr := L.CheckString(1)\n\tcutset := L.CheckString(2)\n\tL.Push(LString(strings.TrimLeft(str, cutset)))\n\treturn 1\n}", "title": "" }, { "docid": "81d2cfa1345d3f9868e87ca0b5ebcce5", "score": "0.51829344", "text": "func Left(text string, width int) []string {\n\treturn LeftSlice([]string{text}, width)\n}", "title": "" }, { "docid": "3ec9b2726c3d993d3a6f69207d1ddf1c", "score": "0.5141233", "text": "func (txt *text_buffer) cut_from_line(line_n, from, to int) (out []byte) {\n\tvector := index_of_utf8(string(txt.array[line_n]))\n\tout = append(out, txt.array[line_n][vector[from]:vector[to]]...)\n\ttxt.array[line_n] = append(txt.array[line_n][:from], txt.array[line_n][to:]...)\n\treturn\n}", "title": "" }, { "docid": "a829d41ecfcf7cb2b3846d73a6e4118e", "score": "0.5139073", "text": "func CutRel(relWidth, relHeight float64) Modification {\n\treturn CutFn(func(int) int { return 0 },\n\t\tfunc(int) int { return 0 },\n\t\tfunc(w int) int { return alg.RoundF64(float64(w) * relWidth) },\n\t\tfunc(h int) int { return alg.RoundF64(float64(h) * relHeight) })\n}", "title": "" }, { "docid": "b9a830641719aa28e8f1763883d2aa1e", "score": "0.51380944", "text": "func (ed *editor) killSmallWordLeft() {\n\tleft := strings.TrimRightFunc(ed.buffer[:ed.dot], unicode.IsSpace)\n\t// The case of left == \"\" is handled as well.\n\tr, _ := utf8.DecodeLastRuneInString(left)\n\tif isAlnum(r) {\n\t\tleft = strings.TrimRightFunc(left, isAlnum)\n\t} else {\n\t\tleft = strings.TrimRightFunc(\n\t\t\tleft, func(r rune) bool { return !isAlnum(r) })\n\t}\n\ted.buffer = left + ed.buffer[ed.dot:]\n\ted.dot = len(left)\n}", "title": "" }, { "docid": "5d0ac63c84514b36c97c650c6e6be76a", "score": "0.51272595", "text": "func (f *Format) CutPathSource() {\n\tf.CutPathWith(NewSource(1), 0)\n}", "title": "" }, { "docid": "371ab3d869d432351af77b08b9b79dea", "score": "0.51255786", "text": "func TestTrimLeftWithTrail(t *testing.T) {\n\tassert.Equal(t, NewTextWrap().TrimLeft(\" trim me \"), \"trim me \")\n}", "title": "" }, { "docid": "5df917a0bee8c8fa67ff1b2ad685b00b", "score": "0.5098625", "text": "func cutRight(input string, options map[string]interface{}) string {\n\toptionString, found := options[\"length\"]\n\tif found {\n\t\tlength, err := strconv.Atoi(fmt.Sprintf(\"%v\", optionString))\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"the '%s' option value '%s' for the '%s' function is not a valid integer\", \"length\", fmt.Sprintf(\"%v\", optionString), \"cutRight\")\n\t\t\treturn input\n\t\t}\n\t\tif length < 0 {\n\t\t\tlog.Errorf(\"the '%s' option value '%s' for the '%s' function cannot be negative\", \"length\", fmt.Sprintf(\"%v\", optionString), \"cutRight\")\n\t\t\treturn input\n\t\t}\n\t\tif len(input) > length {\n\t\t\treturn input[0:length]\n\t\t} else {\n\t\t\treturn input\n\t\t}\n\t} else {\n\t\treturn input\n\t}\n}", "title": "" }, { "docid": "e28746a24777a238c02ab6a6854a9047", "score": "0.5096118", "text": "func (gl *Glitch) ChannelShiftLeft() {\n\tb := gl.Bounds\n\n\tfor y := b.Min.Y; y < b.Max.Y; y++ {\n\t\tfor x := b.Min.X; x < b.Max.X; x++ {\n\t\t\tr, g, b, a := gl.Output.At(x, y).RGBA()\n\t\t\tsc := color.RGBA{\n\t\t\t\tR: uint8(g),\n\t\t\t\tG: uint8(b),\n\t\t\t\tB: uint8(r),\n\t\t\t\tA: uint8(a),\n\t\t\t}\n\t\t\tgl.Output.Set(x, y, sc)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0f1521bb1c3abd5a0dfb5b8e5aba50ed", "score": "0.5076729", "text": "func BarTrimLeft() BarOption {\n\treturn func(s *bState) {\n\t\ts.trimLeftSpace = true\n\t}\n}", "title": "" }, { "docid": "759324d15f9e1ae08bf7a29bfd6724ac", "score": "0.50636107", "text": "func (pwd WithDistance) sortCut(radius int) WithDistance {\n\n\t// sort the list\n\tsort.SliceStable(pwd, pwd.less)\n\n\t// cut off all points that are too far away\n\tk := len(pwd)\n\tfor i := 0; i < k; i++ {\n\t\tif pwd[i].Distance > radius {\n\t\t\treturn pwd[:i]\n\t\t}\n\t}\n\n\treturn pwd\n}", "title": "" }, { "docid": "3f3f8c88993a8e04a57a1071b4c1e98e", "score": "0.50600654", "text": "func (m *Model) deleteWordLeft() {\n\tif m.col == 0 || len(m.value[m.row]) == 0 {\n\t\treturn\n\t}\n\n\t// Linter note: it's critical that we acquire the initial cursor position\n\t// here prior to altering it via SetCursor() below. As such, moving this\n\t// call into the corresponding if clause does not apply here.\n\toldCol := m.col //nolint:ifshort\n\n\tm.SetCursor(m.col - 1)\n\tfor unicode.IsSpace(m.value[m.row][m.col]) {\n\t\tif m.col <= 0 {\n\t\t\tbreak\n\t\t}\n\t\t// ignore series of whitespace before cursor\n\t\tm.SetCursor(m.col - 1)\n\t}\n\n\tfor m.col > 0 {\n\t\tif !unicode.IsSpace(m.value[m.row][m.col]) {\n\t\t\tm.SetCursor(m.col - 1)\n\t\t} else {\n\t\t\tif m.col > 0 {\n\t\t\t\t// keep the previous space\n\t\t\t\tm.SetCursor(m.col + 1)\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\n\tif oldCol > len(m.value[m.row]) {\n\t\tm.value[m.row] = m.value[m.row][:m.col]\n\t} else {\n\t\tm.value[m.row] = append(m.value[m.row][:m.col], m.value[m.row][oldCol:]...)\n\t}\n}", "title": "" }, { "docid": "20db21bba35b1b7edf4748362d4a94bf", "score": "0.5052714", "text": "func (rect *Rectangle) Left() float64 {\n\n\treturn rect.X //- float64(rect.w/2)\n\n}", "title": "" }, { "docid": "ff353f29b2838c4cf445cd9fc59ef4f9", "score": "0.5023606", "text": "func TrimRight(s string, cutSet ...string) string {\n\tif ln := len(cutSet); ln > 0 && cutSet[0] != \"\" {\n\t\tif ln == 1 {\n\t\t\treturn strings.TrimRight(s, cutSet[0])\n\t\t}\n\t\treturn strings.TrimRight(s, strings.Join(cutSet, \"\"))\n\t}\n\n\treturn strings.TrimRight(s, \" \")\n}", "title": "" }, { "docid": "777bc34d813fb5b11a7096b65e4f02f6", "score": "0.50183284", "text": "func (goat *Goat) Left() error {\n\tangle := goat.Rad + RSTEP\n\treturn goat.Orientate(angle)\n}", "title": "" }, { "docid": "2314b8c8993b8e64637308358be651ba", "score": "0.5014668", "text": "func (r RectangleCut) Cutting(reader io.Reader, filename string, condition ...interface{}) (*MetaCuttedImage, error) {\n\text := strings.ToLower(filepath.Ext(filename))\n\tsrc, err := imaging.Decode(reader)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trect := src.Bounds()\n\tx := rect.Max.X - rect.Min.X\n\ty := rect.Max.Y - rect.Min.X\n\t// step of x\n\tstepX := x / r.partitionX\n\t// step of y\n\tstepY := y / r.partitionY\n\timages := make([]CuttedImage, r.partitionX*r.partitionY)\n\tk := 0\n\t// goroutine save splice image\n\twg := new(sync.WaitGroup)\n\twg.Add(r.partitionX * r.partitionY)\n\tfor row := 0; row < r.partitionY; row++ {\n\t\tfor col := 0; col < r.partitionX; col++ {\n\t\t\timages[k] = CuttedImage{ID: k}\n\t\t\tp1 := Point{}\n\t\t\tp2 := Point{}\n\t\t\tif col > 0 {\n\t\t\t\tp1.X = images[k-1].Points[1].X\n\t\t\t}\n\t\t\tif row > 0 {\n\t\t\t\tp1.Y = images[k-r.partitionX].Points[1].Y\n\t\t\t}\n\t\t\tif col == r.partitionX-1 {\n\t\t\t\tp2.X = x\n\t\t\t} else {\n\t\t\t\tp2.X = p1.X + stepX\n\t\t\t}\n\t\t\tif row == r.partitionY-1 {\n\t\t\t\tp2.Y = y\n\t\t\t} else {\n\t\t\t\tp2.Y = p1.Y + stepY\n\t\t\t}\n\t\t\timages[k].Points = []Point{p1, p2}\n\t\t\tretangle := image.Rect(p1.X, p1.Y, p2.X, p2.Y)\n\t\t\tsubImg := imaging.Crop(src, retangle)\n\t\t\timg := rotate(subImg, &images[k])\n\t\t\tgo r.storage.Save(&images[k], img, strconv.Itoa(k)+filename, wg, ext)\n\t\t\tk++\n\t\t}\n\t}\n\twg.Wait()\n\tmetaImage := MetaCuttedImage{images, x, y, Rectangle, ext}\n\tr.meta.Save(metaImage, condition...)\n\treturn &metaImage, nil\n}", "title": "" }, { "docid": "804cea7bef0c81a832525eae142250a6", "score": "0.50081766", "text": "func Cut(HTML *html.HTML) string {\n\tvar scripts = make([]string, 0)\n\n\tHTML.Query().Find(\"body script\").Each(func(index int, script *goquery.Selection) {\n\t\tsrc, hasSrc := script.Attr(\"src\")\n\t\tcontent := script.Text()\n\n\t\tscriptAssets := src\n\t\tif !hasSrc {\n\t\t\tscriptAssets = content\n\t\t}\n\n\t\tscripts = append(scripts, createScript(hasSrc, scriptAssets))\n\n\t\tscript.Remove()\n\t})\n\n\treturn strings.Join(scripts[:], \"\\n\")\n}", "title": "" }, { "docid": "aa55f61264e67ee96c57c65a030a0a1f", "score": "0.50023365", "text": "func remove(from int) int {\n\tptower := pickTower(from)\n\ttower := *ptower\n\n\tif len(tower) == 0 {\n\t\tpanic(fmt.Sprintf(\"'tower%d' is empty\", from))\n\t}\n\n\tdisc := tower[len(tower)-1]\n\t*ptower = tower[:len(tower)-1]\n\treturn disc\n}", "title": "" }, { "docid": "46217706b3967af282afc06c7be13845", "score": "0.49737102", "text": "func (f *Format) CutPathSourceParent(n int) {\n\tf.CutPathWith(NewSource(1), n)\n}", "title": "" }, { "docid": "dce20bb140eb3a713d569964e2290840", "score": "0.49721843", "text": "func leftShift(a *decimal, k uint) {\n\tdelta := leftcheats[k].delta\n\tif prefixIsLessThan(a.d[0:a.nd], leftcheats[k].cutoff) {\n\t\tdelta--\n\t}\n\n\tr := a.nd // read index\n\tw := a.nd + delta // write index\n\n\t// Pick up a digit, put down a digit.\n\tvar n uint\n\tfor r--; r >= 0; r-- {\n\t\tn += (uint(a.d[r]) - '0') << k\n\t\tquo := n / 10\n\t\trem := n - 10*quo\n\t\tw--\n\t\tif w < len(a.d) {\n\t\t\ta.d[w] = byte(rem + '0')\n\t\t} else if rem != 0 {\n\t\t\ta.trunc = true\n\t\t}\n\t\tn = quo\n\t}\n\n\t// Put down extra digits.\n\tfor n > 0 {\n\t\tquo := n / 10\n\t\trem := n - 10*quo\n\t\tw--\n\t\tif w < len(a.d) {\n\t\t\ta.d[w] = byte(rem + '0')\n\t\t} else if rem != 0 {\n\t\t\ta.trunc = true\n\t\t}\n\t\tn = quo\n\t}\n\n\ta.nd += delta\n\tif a.nd >= len(a.d) {\n\t\ta.nd = len(a.d)\n\t}\n\ta.dp += delta\n\ttrim(a)\n}", "title": "" }, { "docid": "9cd62e9db7bf42d45c93793c9c6780f5", "score": "0.4959682", "text": "func cutItem(c router.Context, itemIDStr string) (item QueueItem, err error) {\n\titem, err = readQueueItemByID(c, itemIDStr)\n\tif err != nil {\n\t\treturn item, errors.Wrapf(err, \"failed load item ID '%s'\", itemIDStr)\n\t}\n\n\t// check if item is a Head, so we need to replace HeadPointer\n\tif isHeadPointsTo(c, item) {\n\t\t// move head pointer to next item (list=X[head]<->Y => list=Y[Head], cut=X)\n\t\tsetHeadPointerTo(c, item.NextKey) // TODO: handle error\n\t\t// headItem2, _ := getHeadItem(c) // TODO: handle error\n\t\t// fmt.Printf(\"***NEW HeadID=%s\\n\", headItem2.ID.String())\n\t}\n\n\t// check if item is a Tail, so we need to replace TailPointer\n\n\tif isTailPointsTo(c, item) {\n\t\t// set tail pointer to prevous item (list=X->Y[Tail] => list=X[Tail], cut=Y)\n\t\tsetTailPointerTo(c, item.PrevKey) // TODO: handle error\n\t\t// tailItem2, _ := getTailItem(c)\n\t\t// fmt.Printf(\"--> NEW TailID=%s\\n\", tailItem2.ID.String())\n\t}\n\n\t// prev <- item -> next\n\tvar prevItem, nextItem QueueItem\n\t// update PrevID of an item after targetItem if present\n\t// fmt.Printf(\"\\n *** item_TO_CUT ***\\n%+v\\n\\n\", item)\n\tif item.hasPrev() {\n\t\t// fmt.Println(\"***HAS PREV\")\n\t\tprevItem, err = readQueueItem(c, item.PrevKey)\n\t\tif err != nil {\n\t\t\treturn item, errors.Wrapf(err, \"failed load prev item for ID '%s'\", itemIDStr)\n\t\t}\n\t\t// fmt.Printf(\"*** prevItem.OLD=%+v\\n\", prevItem)\n\t\tprevItem.NextKey = item.NextKey\n\t\t// save updated prevItem\n\t\tc.State().Put(prevItem) // TODO: handle error\n\t\t// fmt.Printf(\"--> prevItem.NEW=%+v\\n\", prevItem)\n\t}\n\t// update NextID of an item before targetItem if present\n\tif item.hasNext() {\n\t\t// fmt.Println(\"***HAS NEXT\")\n\t\tnextItem, err = readQueueItem(c, item.NextKey)\n\t\tif err != nil {\n\t\t\treturn item, errors.Wrapf(err, \"failed load next item for ID '%s'\", itemIDStr)\n\t\t}\n\t\t// fmt.Printf(\"*** nextItem.OLD=%+v\\n\", nextItem)\n\t\tnextItem.PrevKey = item.PrevKey\n\t\t// save updated nextItem\n\t\tc.State().Put(nextItem) // TODO: handle error\n\n\t\t// fmt.Printf(\"*** nextItem.NEW=%+v\\n\", nextItem)\n\t}\n\treturn item, nil\n}", "title": "" }, { "docid": "549fc3ba64e32ef21a23b17954cb3f5b", "score": "0.49575794", "text": "func (s *Space) LeftOf(other *Space) float64 {\n\treturn other.X() - s.X()\n}", "title": "" }, { "docid": "021460ff72ab8acbfe8f923cb9bdea00", "score": "0.4954571", "text": "func (bs BlockSpace) CornerLeftDown(origin Vec3) Vec {\n\treturn blockCorner(bs.LeftDown, origin)\n}", "title": "" }, { "docid": "620e09aab24145903cb26052b21de7a4", "score": "0.4951398", "text": "func (s *CommandSet) TrimToLen(length int) {\n\ts.mut.Lock()\n\tdefer s.mut.Unlock()\n\n\te := s.order.Front()\n\tfor length < len(s.set) {\n\t\tif e == nil {\n\t\t\tbreak\n\t\t}\n\t\tn := e.Next()\n\t\tc := e.Value.(*cmdElement)\n\t\tif c.proposed {\n\t\t\ts.order.Remove(e)\n\t\t\tdelete(s.set, c.cmd)\n\t\t}\n\t\te = n\n\t}\n}", "title": "" }, { "docid": "bb6080cccf660aa465d7ca492bce5644", "score": "0.4943824", "text": "func LeftShift(data []byte, shift uint64) []byte {\n\tif shift == 0 {\n\t\treturn data\n\t}\n\tvar dataLength = len(data)\n\tresult := make([]byte, dataLength)\n\tif shift > byteLength {\n\t\tvar shiftedData = append(make([]byte, 1), data[:dataLength-1]...)\n\t\tresult = LeftShift(shiftedData, shift-byteLength)\n\t} else {\n\t\tfor i := 0; i < dataLength; i++ {\n\t\t\tif i < dataLength-1 {\n\t\t\t\tresult[i+1] = data[i] << (byteLength - shift)\n\t\t\t}\n\t\t\tresult[i] = result[i] | (data[i] >> shift)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "5997a55a61fdfedceec04dff12cb5f0b", "score": "0.49390295", "text": "func (w *WindowType) Left() *Line {\n\t_, height := w.Size()\n\tleft := Line{P1: Point{X: 0, Y: 0}, P2: Point{X: 0, Y: height - 1}}\n\tleft.Orientation = Vertical\n\treturn &left\n}", "title": "" }, { "docid": "3bf30aee4bca84d7616bef25700b5717", "score": "0.4915134", "text": "func TrimRight(s string, cutSet ...string) string {\n\tif len(cutSet) > 0 {\n\t\treturn strings.TrimRight(s, cutSet[0])\n\t}\n\n\treturn strings.TrimRight(s, \" \")\n}", "title": "" }, { "docid": "a331afb24be9b9c2e63170bab23672c3", "score": "0.4913547", "text": "func (l *Log) TruncateFront(index uint64) error {\n\tl.mu.Lock()\n\tdefer l.mu.Unlock()\n\tif l.corrupt {\n\t\treturn ErrCorrupt\n\t} else if l.closed {\n\t\treturn ErrClosed\n\t}\n\treturn l.truncateFront(index)\n}", "title": "" }, { "docid": "483f53377ff18018dbcdc5878874c247", "score": "0.48987374", "text": "func (_this *SVGElement) AddEventCut(listener func(event *clipboard.ClipboardEvent, currentTarget *SVGElement)) js.Func {\n\tcb := eventFuncSVGElement_clipboard_ClipboardEvent(listener)\n\t_this.Value_JS.Call(\"addEventListener\", \"cut\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "20a074502e421e94d0670c5e29a32718", "score": "0.48981944", "text": "func (_this *SVGElement) SetOnCut(listener func(event *clipboard.ClipboardEvent, currentTarget *SVGElement)) js.Func {\n\tcb := eventFuncSVGElement_clipboard_ClipboardEvent(listener)\n\t_this.Value_JS.Set(\"oncut\", cb)\n\treturn cb\n}", "title": "" }, { "docid": "ddc8108e18a613dab3709071ed3c109a", "score": "0.48847407", "text": "func (s *Bits) UnsetBefore(index uint) {\n\t*s &= ^(1<<index - 1)\n}", "title": "" }, { "docid": "6d3a6ebf6649ee3a4d9727bad3e099a0", "score": "0.48776567", "text": "func (t *PieceTree) insertLeft(newPiece *PieceDescriptor_Tree, x *Node) {\n\n\tnewNode := NewNode(newPiece)\n\n\tif x.Left == nil {\n\t\tx.Left = newNode\n\t\tnewNode.Parent = x\n\t} else {\n\t\tprevNode := t.prev(x)\n\t\tif prevNode != nil {\n\t\t\tprevNode.Right = newNode\n\t\t\tnewNode.Parent = prevNode\n\t\t} else {\n\t\t\tfmt.Println(\"Error: fail to find the prev\")\n\t\t}\n\t}\n\t//t.fixSize(newNode.Parent)\n\tt.splay(newNode)\n}", "title": "" }, { "docid": "b5d1dc116fe63637441da06e86e49a0b", "score": "0.48612964", "text": "func (workspace *Workspace) ResizeLeft(wid uint32) {\n\tidx := workspace.right.IndexById(wid)\n\tif idx > -1 && workspace.layout == LayoutLeftWide {\n\t\tworkspace.layout = LayoutEqual\n\t\tworkspace.Reshape()\n\t\treturn\n\t}\n\n\tidx = workspace.left.IndexById(wid)\n\tif idx > -1 && workspace.layout == LayoutLeftWide {\n\t\tworkspace.layout = LayoutEqual\n\t\tworkspace.Reshape()\n\t}\n}", "title": "" }, { "docid": "9372eee3c41d34de3b173881f56648d6", "score": "0.48538783", "text": "func Left(wfn WidthFn, cw int, s string) string {\n\treturn s + spaces(padSpaceNum(wfn, cw, s))\n}", "title": "" }, { "docid": "dd64a85c63be6b2dd74d015fd8cc1713", "score": "0.48523661", "text": "func sbuf_cut(sb []sbuf, len_ int32) {\n\tif sb[0].s_n > len_ {\n\t\tsb[0].s_n = len_\n\t}\n}", "title": "" }, { "docid": "84b54680b2923eba0cff065ef78a8900", "score": "0.48514947", "text": "func (i Uint128) LeftShift() Uint128 {\n\tj := Uint128{low: i.low << 1}\n\n\tj.high = i.high << 1\n\tif i.low&0x8000000000000000 > 0 {\n\t\tj.high |= 1\n\t}\n\n\treturn j\n}", "title": "" }, { "docid": "88ed6093e864f3aded890d897923c063", "score": "0.48476195", "text": "func (sp Span) Left() D3 {\n\treturn sp.Lesser(0).(D3)\n}", "title": "" }, { "docid": "2259ab07a6d0a649413bc24a18981ff1", "score": "0.4839896", "text": "func (tello *Tello) Left(pct int) {\n\tvar speed int16\n\tif pct > 0 {\n\t\tspeed = int16(pct) * 327 // /100 * 32767\n\t}\n\ttello.UpdateSticks(StickMessage{Rx: -speed, Ry: 0, Lx: 0, Ly: 0})\n}", "title": "" }, { "docid": "ad2e5f2405d96cbe0b9b59f2331d13c1", "score": "0.48377183", "text": "func (a *Adjuster) LeftOf(o Shape, space ...int) {\n\tnext := o\n\tfor _, s := range a.shapes {\n\t\tx, y := next.Position()\n\t\ts.SetX(x - (next.Width() + a.space(space)))\n\t\ts.SetY(y)\n\t\tnext = s\n\t}\n}", "title": "" }, { "docid": "23fe33361aafc443ef114281d0bcfef3", "score": "0.4825587", "text": "func Trim(cutset string, s string) string {\n return strings.Trim(s, cutset)\n}", "title": "" }, { "docid": "5ef42fd8a37edbb4b04c6b01bab0d12e", "score": "0.48174965", "text": "func (u Uint128) LeftShift(n uint) Uint128 {\n\tswitch {\n\tcase n == 0:\n\tcase n > 64:\n\t\tu.hi = u.lo << (n - 64)\n\t\tu.lo = 0\n\tcase n < 64:\n\t\tu.hi = (u.hi << n) | (u.lo >> (64 - n))\n\t\tu.lo <<= n\n\tdefault:\n\t\tu.hi = u.lo\n\t\tu.lo = 0\n\t}\n\treturn u\n}", "title": "" }, { "docid": "51e941e151ff18f7220f20d7cfd2e1d1", "score": "0.4816534", "text": "func (e *Escpos) FeedAndCut(params map[string]string) {\n\tif t, ok := params[\"type\"]; ok && t == \"feed\" {\n\t\te.Formfeed()\n\t}\n\n\te.Cut()\n}", "title": "" }, { "docid": "d3cafa0cc23e48dd5ae15a6046f60bff", "score": "0.48139986", "text": "func RotateToTheLeft(slice []int, times int) {\n\tsliceSize := len(slice)\n\ttimes %= sliceSize\n\tif times <= 0 || sliceSize < 2 {\n\t\treturn\n\t}\n\n\tfor row := 0; row < gcd(sliceSize, times); row++ {\n\t\titemToPutAtTheFinalStep := slice[row]\n\t\tpreviousMovedIndex := row\n\t\tfor true {\n\t\t\tnextIndexToMoveNtimesLeft := previousMovedIndex + times\n\t\t\tif nextIndexToMoveNtimesLeft >= sliceSize {\n\t\t\t\tnextIndexToMoveNtimesLeft -= sliceSize\n\t\t\t}\n\t\t\tif nextIndexToMoveNtimesLeft == row {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tslice[previousMovedIndex] = slice[nextIndexToMoveNtimesLeft]\n\t\t\tpreviousMovedIndex = nextIndexToMoveNtimesLeft\n\t\t}\n\t\tslice[previousMovedIndex] = itemToPutAtTheFinalStep\n\t}\n}", "title": "" }, { "docid": "3e3a78f4ac17add9e1e826dab8fbce98", "score": "0.48078924", "text": "func (rf *Raft) truncateLogBefore(logIndex int) {\n\tif logIndex >= rf.getLastLogIndex() {\n\t\trf.Log = make([]LogEntry, 0)\n\t\treturn\n\t}\n\tvar sliceIndex = len(rf.Log) - 1\n\tfor sliceIndex >= 0 && rf.Log[sliceIndex].Index != logIndex {\n\t\tsliceIndex--\n\t}\n\tif sliceIndex < 0 {\n\t\treturn\n\t} else if sliceIndex == len(rf.Log) - 1 {\n\t\trf.Log = make([]LogEntry, 0)\n\t} else {\n\t\trf.Log = rf.Log[sliceIndex+1:]\n\t}\n}", "title": "" }, { "docid": "a362dbb32784860136b3ff5069aab4e6", "score": "0.4798236", "text": "func (e *Escpos) CutPartial() {\n\te.WriteRaw([]byte{GS, 0x56, 1})\n}", "title": "" }, { "docid": "85a7ec374c97e4d2c91b8aa8589cb200", "score": "0.47847378", "text": "func Rtrim(s string, cutSet ...string) string { return TrimRight(s, cutSet...) }", "title": "" }, { "docid": "9bf2a20e3cb9fd0c21db7b98f9a31a12", "score": "0.47818437", "text": "func (r Rock1) moveLeft() RockBlock {\n\tr.position.x--\n\treturn r\n}", "title": "" }, { "docid": "b867387210390bab387dec9600413201", "score": "0.47769833", "text": "func (s *RandomDataset) Left() int {\n\treturn int(s.n - (s.ind + 1))\n}", "title": "" }, { "docid": "10dacf290260daa1b536fef8e6b06fe0", "score": "0.47735703", "text": "func (f *Format) CutPathWith(source *Source, parentno int) {\n\tfilePath, _ := cast.SplitPath(source.File())\n\tfor i := 0; cast.Contains(filePath, \"/\") && i <= parentno; i++ {\n\t\tfilePath = filePath[:cast.LastIndex(filePath, \"/\")]\n\t}\n\tf.PathCut = append(f.PathCut, filePath)\n\tcast.SortSlice(f.PathCut, func(i, j int) bool {\n\t\treturn f.PathCut[i] > f.PathCut[j]\n\t})\n}", "title": "" }, { "docid": "1330df73c5113f632365a45ff47480c6", "score": "0.47444662", "text": "func moveLeft(field [][]int, g *Entity) [][]int {\n\tmergeRow := func(row []int) {\n\t\tfor i, v := range row {\n\t\t\tif i+1 >= len(row) {\n\t\t\t\treturn\n\t\t\t}\n\t\t\tif row[i+1] == v {\n\t\t\t\trow[i] += row[i+1]\n\t\t\t\tstart := i+1\n\t\t\t\t// move fields behind from right to left\n\t\t\t\tfor ;start + 1 < len(row); start++{\n\t\t\t\t\trow[start] = row[start+1]\n\t\t\t\t}\n\t\t\t\t// fill zero value to the last value\n\t\t\t\trow[start] = 0\n\t\t\t\tif g != nil {\n\t\t\t\t\tg.addScore(v << 1)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\tcompressedField := Compress(field)\n\tfor _, row := range compressedField {\n\t\tmergeRow(row)\n\t}\n\treturn compressedField\n}", "title": "" }, { "docid": "da6faf620c761b99559362caa19501d1", "score": "0.47315788", "text": "func Left(s ListBoxState) int {\n\treturn horizontal(s.Selected, s.Items.Len(), -s.Height)\n}", "title": "" }, { "docid": "b90a5b38a6c2f338c3271985f3ffe9bf", "score": "0.47155184", "text": "func justLeft(s string, width int, pad int, sty *Style) string {\n\tcontentLen := len(s)\n\tonRight := width - contentLen\n\tif onRight < 0 {\n\t\tonRight = 0\n\t}\n\tswitch {\n\tcase sty == nil:\n\t\treturn fmt.Sprintf(\"%s%s%s\", spaces(pad), s, spaces(onRight+pad))\n\tdefault:\n\t\treturn fmt.Sprintf(\"%s%s%s\", spaces(pad), sty.ApplyTo(s), spaces(onRight+pad))\n\t}\n}", "title": "" }, { "docid": "88c9309bef194809e00ec4fb5b15a7c6", "score": "0.47012326", "text": "func RTrim(s string, cutSet ...string) string { return TrimRight(s, cutSet...) }", "title": "" }, { "docid": "0790f7606c1d5e32639ea37b1c4303e2", "score": "0.46978703", "text": "func trimLeftSpace(s []byte) []byte {\n\tfor i, ch := range s {\n\t\tif ch != '\\t' && ch != ' ' {\n\t\t\treturn s[i:]\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e7e5b2680cd3044d403537690cb0753e", "score": "0.46953335", "text": "func (d Direction) Left() Direction {\n\tnewDirection := int(d) - 1\n\tif newDirection < 0 {\n\t\tnewDirection = 3\n\t}\n\treturn Direction(newDirection)\n}", "title": "" }, { "docid": "c699482398cc134e616f310e9dbb810d", "score": "0.46944952", "text": "func (ts TouchScreen) SwipeLeft(count int) error {\n\tw, h, err := ts.disp.GetDisplaySize()\n\tif err != nil {\n\t\treturn err\n\t}\n\tx2 := w / 4\n\tx1 := x2 * 3\n\ty2 := h / 2\n\ty1 := y2\n\tfor i := 0; i < count; i++ {\n\t\terr := ts.Swipe(x1, y1, x2, y2, 1000)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5a95897a72c38dd5d0fe7dd604581453", "score": "0.46841815", "text": "func Left(n int) string {\n\tif n <= 0 {\n\t\tpanic(\"invalid argument\")\n\t}\n\treturn escape(strconv.Itoa(n) + \"D\")\n}", "title": "" }, { "docid": "f1bc6c5a78b732bfa67da9f070ebba36", "score": "0.46835008", "text": "func (p *Pool) Left() int {\n\treturn p.Cap() - p.Running()\n}", "title": "" }, { "docid": "0e783dfd80f674e9297a371050645f95", "score": "0.46730497", "text": "func leftShift(d *internalDecimal, shiftPos uint) {\n\tdelta := leftShiftLookup[shiftPos].additionalDigits\n\tif prefixIsLessThan(d.digits[0:d.usedDigits], leftShiftLookup[shiftPos].limit) {\n\t\tdelta--\n\t}\n\n\tr := d.usedDigits // read position\n\tw := d.usedDigits + delta // write position\n\n\t// Pick up a digit, put down a digit.\n\tvar n uint\n\tfor r--; r >= 0; r-- {\n\t\tn += (uint(d.digits[r]) - '0') << shiftPos\n\t\tquo := n / 10\n\t\trem := n - 10*quo\n\t\tw--\n\t\tif w < len(d.digits) {\n\t\t\td.digits[w] = byte(rem + '0')\n\t\t} else if rem != 0 {\n\t\t\td.truncInd = true\n\t\t}\n\t\tn = quo\n\t}\n\n\t// Put down extra digits.\n\tfor n > 0 {\n\t\tquo := n / 10\n\t\trem := n - 10*quo\n\t\tw--\n\t\tif w < len(d.digits) {\n\t\t\td.digits[w] = byte(rem + '0')\n\t\t} else if rem != 0 {\n\t\t\td.truncInd = true\n\t\t}\n\t\tn = quo\n\t}\n\n\td.usedDigits += delta\n\tif d.usedDigits >= len(d.digits) {\n\t\td.usedDigits = len(d.digits)\n\t}\n\td.decPoint += delta\n\ttrim(d)\n}", "title": "" }, { "docid": "61857611e1d52a496a0cbb2fade74e23", "score": "0.4668848", "text": "func LeftIndex(i int) int {\n\treturn (2 * i) + 1\n}", "title": "" }, { "docid": "e32174c9234a39091db84214d409635f", "score": "0.46670753", "text": "func ToTheLeft(d Direction) Direction {\n\tswitch d {\n\tcase DIRECTIONNORTH:\n\t\treturn DIRECTIONWEST\n\tcase DIRECTIONWEST:\n\t\treturn DIRECTIONSOUTH\n\tcase DIRECTIONSOUTH:\n\t\treturn DIRECTIONEAST\n\tcase DIRECTIONEAST:\n\t\treturn DIRECTIONNORTH\n\t}\n\n\treturn DIRECTIONNORTH\n}", "title": "" }, { "docid": "b765453aae8f2c383626f9f184f64b69", "score": "0.4638636", "text": "func (receiverCaret Caret) ShiftCaret(senderCaret Caret, delta Delta) Caret {\n\tvar rangeStart, rangeEnd int\n\tif senderCaret.Start != senderCaret.End {\n\t\trangeStart = senderCaret.Start\n\t\trangeEnd = senderCaret.End\n\t} else if *delta.Doc > 0 {\n\t\trangeStart = senderCaret.Start\n\t\trangeEnd = senderCaret.Start + *delta.CaretStart\n\t} else if *delta.CaretStart == 0 {\n\t\trangeStart = senderCaret.Start\n\t\trangeEnd = senderCaret.Start - *delta.Doc\n\t} else {\n\t\trangeStart = senderCaret.Start + *delta.CaretStart\n\t\trangeEnd = senderCaret.Start\n\t}\n\n\tif *delta.Doc > 0 && senderCaret.Start == senderCaret.End {\n\t\treturn receiverCaret.processAdd(senderCaret, *delta.Doc)\n\t}\n\n\trangeDelta := rangeStart - rangeEnd\n\n\tif rangeEnd < receiverCaret.End {\n\t\treceiverCaret.End += rangeDelta\n\t\tif rangeEnd <= receiverCaret.Start {\n\t\t\treceiverCaret.Start += rangeDelta\n\t\t} else if rangeStart < receiverCaret.Start {\n\t\t\treceiverCaret.Start = rangeStart\n\t\t}\n\t} else if rangeEnd == receiverCaret.End {\n\t\treceiverCaret.Start = rangeEnd + rangeDelta\n\t\treceiverCaret.End = rangeEnd + rangeDelta\n\t} else if rangeStart < receiverCaret.End {\n\t\treceiverCaret.End = rangeStart\n\t\tif rangeStart < receiverCaret.Start {\n\t\t\treceiverCaret.Start = rangeStart\n\t\t}\n\t}\n\n\tif *delta.CaretStart > 0 {\n\t\ttmpSenderCaret := Caret{\n\t\t\tStart: senderCaret.Start,\n\t\t\tEnd: senderCaret.Start,\n\t\t}\n\t\treturn receiverCaret.processAdd(tmpSenderCaret, *delta.CaretStart)\n\t}\n\treturn receiverCaret\n}", "title": "" }, { "docid": "7de21a9ffe0c2ab789fc1e0152914ab8", "score": "0.46236348", "text": "func (seg *Segmenter) CutAll(str string) []string {\n\treturn seg.cutAll(str)\n}", "title": "" } ]
2f1460d7776351dce845844789a2b763
decodeTableMapColumnMeta generates the column_meta_def to uint16 slices. ref:
[ { "docid": "77df3e6299a3da5f6122005c210b592b", "score": "0.8093407", "text": "func decodeTableMapColumnMeta(data []byte, columnType []byte) ([]uint16, error) {\n\tpos := 0\n\tcolumnMeta := make([]uint16, len(columnType))\n\tfor i, t := range columnType {\n\t\tswitch t {\n\t\tcase gmysql.MYSQL_TYPE_STRING:\n\t\t\tx := uint16(data[pos]) << 8 // real type\n\t\t\tx += uint16(data[pos+1]) // pack or field length\n\t\t\tcolumnMeta[i] = x\n\t\t\tpos += 2\n\t\tcase gmysql.MYSQL_TYPE_NEWDECIMAL:\n\t\t\tx := uint16(data[pos]) << 8 // precision\n\t\t\tx += uint16(data[pos+1]) // decimals\n\t\t\tcolumnMeta[i] = x\n\t\t\tpos += 2\n\t\tcase gmysql.MYSQL_TYPE_VAR_STRING, gmysql.MYSQL_TYPE_VARCHAR, gmysql.MYSQL_TYPE_BIT:\n\t\t\tcolumnMeta[i] = binary.LittleEndian.Uint16(data[pos:])\n\t\t\tpos += 2\n\t\tcase gmysql.MYSQL_TYPE_BLOB, gmysql.MYSQL_TYPE_DOUBLE, gmysql.MYSQL_TYPE_FLOAT, gmysql.MYSQL_TYPE_GEOMETRY, gmysql.MYSQL_TYPE_JSON,\n\t\t\tgmysql.MYSQL_TYPE_TIME2, gmysql.MYSQL_TYPE_DATETIME2, gmysql.MYSQL_TYPE_TIMESTAMP2:\n\t\t\tcolumnMeta[i] = uint16(data[pos])\n\t\t\tpos++\n\t\tcase gmysql.MYSQL_TYPE_NEWDATE, gmysql.MYSQL_TYPE_ENUM, gmysql.MYSQL_TYPE_SET, gmysql.MYSQL_TYPE_TINY_BLOB, gmysql.MYSQL_TYPE_MEDIUM_BLOB, gmysql.MYSQL_TYPE_LONG_BLOB:\n\t\t\treturn nil, terror.ErrBinlogColumnTypeNotSupport.Generate(t)\n\t\tdefault:\n\t\t\tcolumnMeta[i] = 0\n\t\t}\n\t}\n\n\treturn columnMeta, nil\n}", "title": "" } ]
[ { "docid": "89ac192c32aed056bbc0447d30b4c0b5", "score": "0.62703747", "text": "func encodeTableMapColumnMeta(columnType []byte) ([]byte, error) {\n\tbuf := new(bytes.Buffer)\n\tfor _, t := range columnType {\n\t\tswitch t {\n\t\tcase gmysql.MYSQL_TYPE_STRING:\n\t\t\tbuf.WriteByte(0xfe) // real type\n\t\t\tbuf.WriteByte(0xff) // pack or field length\n\t\tcase gmysql.MYSQL_TYPE_NEWDECIMAL:\n\t\t\tbuf.WriteByte(0x12) // precision, 18\n\t\t\tbuf.WriteByte(0x09) // decimals, 9\n\t\tcase gmysql.MYSQL_TYPE_VAR_STRING, gmysql.MYSQL_TYPE_VARCHAR, gmysql.MYSQL_TYPE_BIT:\n\t\t\tbuf.WriteByte(0xff)\n\t\t\tbuf.WriteByte(0xff)\n\t\tcase gmysql.MYSQL_TYPE_BLOB, gmysql.MYSQL_TYPE_DOUBLE, gmysql.MYSQL_TYPE_FLOAT, gmysql.MYSQL_TYPE_GEOMETRY, gmysql.MYSQL_TYPE_JSON,\n\t\t\tgmysql.MYSQL_TYPE_TIME2, gmysql.MYSQL_TYPE_DATETIME2, gmysql.MYSQL_TYPE_TIMESTAMP2:\n\t\t\tbuf.WriteByte(0xff)\n\t\tcase gmysql.MYSQL_TYPE_NEWDATE, gmysql.MYSQL_TYPE_ENUM, gmysql.MYSQL_TYPE_SET, gmysql.MYSQL_TYPE_TINY_BLOB, gmysql.MYSQL_TYPE_MEDIUM_BLOB, gmysql.MYSQL_TYPE_LONG_BLOB:\n\t\t\treturn nil, terror.ErrBinlogColumnTypeNotSupport.Generate(t)\n\t\t}\n\t}\n\treturn gmysql.PutLengthEncodedString(buf.Bytes()), nil\n}", "title": "" }, { "docid": "f770ead583fbd8694388c65b80e49cae", "score": "0.61686814", "text": "func (tsr *Uint16) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "101473f0b706fa9f0d9ea0945523f738", "score": "0.5962346", "text": "func (tsr *Uint8) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "f9bbbaeb4afea0e01a53d522710b3f15", "score": "0.5704044", "text": "func (tsr *Uint64) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "60a56157bd5b1361aba9e9020178c22c", "score": "0.56760603", "text": "func (tsr *Int16) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "9efb3bfee86b68f548aca998e656fc70", "score": "0.5609077", "text": "func (tsr *Uint32) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "09a313bdc23c5c57607548b93507519d", "score": "0.5448542", "text": "func (m *SqlData) UnmarshalTableMap(valueByCol map[string]interface{}) error {\n\tfor col, val := range valueByCol {\n\t\tswitch col {\n\t\tcase m.MapColumnId():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.Id)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.Id)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.MapColumnCreatedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.CreatedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.CreatedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.MapColumnUpdatedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.UpdatedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.UpdatedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.MapColumnIsDeleted():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.IsDeleted)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.IsDeleted)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.MapColumnDeletedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.DeletedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.DeletedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.MapColumnVersion():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.Version)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.Version)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "6df488fe8bf9111445c2bb51995e2ed4", "score": "0.5397987", "text": "func (tsr *Uint16) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" }, { "docid": "9de4cd03afe94dacf3ea481a291effde", "score": "0.53806484", "text": "func (tsr *Int8) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "d66d77f9fb9c9263bea9da91929c7631", "score": "0.52201", "text": "func (MapStringToInt64) DecodeSlice() {}", "title": "" }, { "docid": "241b8bf4da62d8159e1e2f523f2e064d", "score": "0.5179365", "text": "func (a *Uint16FullColumn) Type() int8 { return a.typE }", "title": "" }, { "docid": "d5dce8cc6aa283f4c7bcee12253e274a", "score": "0.51316833", "text": "func map0x88ToPiecemap(index int, direction int) uint {\n\trank := index / 16\n\tfile := index % 16\n\n\tif direction == 1 {\n\t\trank = 7 - rank\n\t}\n\n\treturn uint(rank*8 + file)\n}", "title": "" }, { "docid": "0be703f57a59394bf09157c855a17f84", "score": "0.5129648", "text": "func (a *Uint16Column) Length() int { return int(a.length) }", "title": "" }, { "docid": "c4b7c046e8c338c98ce39dea6bbe98c2", "score": "0.5120278", "text": "func (t *Table2Struct) getColumns(table ...string) (tableColumns map[string][]column, err error) {\n\ttableColumns = make(map[string][]column)\n\t// sql\n\tvar sqlStr = `SELECT COLUMN_NAME,DATA_TYPE,IS_NULLABLE,TABLE_NAME,COLUMN_COMMENT\n\t\tFROM information_schema.COLUMNS\n\t\tWHERE table_schema = DATABASE()`\n\t// 是否指定了具体的table\n\tif t.table != \"\" {\n\t\tsqlStr += fmt.Sprintf(\" AND TABLE_NAME = '%s'\", t.prefix+t.table)\n\t}\n\t// sql排序\n\tsqlStr += \" order by TABLE_NAME asc, ORDINAL_POSITION asc\"\n\n\trows, err := t.db.Query(sqlStr)\n\tif err != nil {\n\t\tfmt.Println(\"Error reading table information: \", err.Error())\n\t\treturn\n\t}\n\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tcol := column{}\n\t\terr = rows.Scan(&col.ColumnName, &col.Type, &col.Nullable, &col.TableName, &col.ColumnComment)\n\n\t\tif err != nil {\n\t\t\tfmt.Println(err.Error())\n\t\t\treturn\n\t\t}\n\n\t\t//col.Json = strings.ToLower(col.ColumnName)\n\t\tcol.Tag = col.ColumnName\n\t\tcol.ColumnComment = col.ColumnComment\n\t\tcol.ColumnName = t.camelCase(col.ColumnName)\n\t\tcol.Type = typeForMysqlToGo[col.Type]\n\t\t// 字段首字母本身大写, 是否需要删除tag\n\t\tif t.config.RmTagIfUcFirsted &&\n\t\t\tcol.ColumnName[0:1] == strings.ToUpper(col.ColumnName[0:1]) {\n\t\t\tcol.Tag = \"-\"\n\t\t} else {\n\t\t\t// 是否需要将tag转换成小写\n\t\t\tif t.config.TagToLower {\n\t\t\t\tcol.Tag = strings.ToLower(col.Tag)\n\t\t\t}\n\t\t\t//if col.Nullable == \"YES\" {\n\t\t\t//\tcol.Json = fmt.Sprintf(\"`json:\\\"%s,omitempty\\\"`\", col.Json)\n\t\t\t//} else {\n\t\t\t//}\n\t\t}\n\n\t\t//json 模块 转化为驼峰\n\t\t//j := strings.ToLower(col.ColumnName[0:1]) + col.ColumnName[1:]\n\n\t\tj := col.Tag\n\n\t\tif t.enableJsonTag {\n\t\t\t//col.Json = fmt.Sprintf(\"`json:\\\"%s\\\" %s:\\\"%s\\\"`\", col.Json, t.config.TagKey, col.Json)\n\t\t\tif col.Type == \"int\" || col.Type == \"int32\" || col.Type == \"int64\" {\n\t\t\t\tcol.Tag = fmt.Sprintf(\"`%s:\\\"%s,omitempty\\\" json:\\\"%s,omitempty\\\"`\", t.tagKey, col.Tag, j)\n\t\t\t} else if col.Type == \"string\" {\n\t\t\t\tcol.Tag = fmt.Sprintf(\"`%s:\\\"%s,omitempty\\\" json:\\\"%s,omitempty\\\"`\", t.tagKey, col.Tag, j)\n\t\t\t} else {\n\t\t\t\tcol.Tag = fmt.Sprintf(\"`%s:\\\"%s,omitempty\\\" json:\\\"%s\\\"`\", t.tagKey, col.Tag, j)\n\t\t\t}\n\t\t} else {\n\t\t\tcol.Tag = fmt.Sprintf(\"`%s:\\\"%s\\\"`\", t.tagKey, col.Tag)\n\t\t}\n\t\t//columns = append(columns, col)\n\t\tif _, ok := tableColumns[col.TableName]; !ok {\n\t\t\ttableColumns[col.TableName] = []column{}\n\t\t}\n\t\ttableColumns[col.TableName] = append(tableColumns[col.TableName], col)\n\t}\n\treturn\n}", "title": "" }, { "docid": "f02fa32cda70fafb201d507f1f8459ab", "score": "0.5114119", "text": "func (a *Uint16Column) Type() int8 { return a.typE }", "title": "" }, { "docid": "9b732fff740986c925fca47de0bc7e54", "score": "0.5108", "text": "func (frame *LIDAR_frame) get_uint16(ofs int) uint16 {\n\treturn uint16(frame.data[ofs]) + (uint16(frame.data[ofs+1]) << 8)\n}", "title": "" }, { "docid": "bd387ae0580bedd6c28aeb3f2aaa0b10", "score": "0.5102396", "text": "func (tsr *Int16) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" }, { "docid": "b374fc47e33accd5f7921cf2f8aa3fb0", "score": "0.5097468", "text": "func (a *Uint16FullColumn) Length() int { return int(a.length) }", "title": "" }, { "docid": "9c181aa9eab3beea41d235b020877175", "score": "0.50752413", "text": "func DecodeChunkColumn(mask int32, data []byte) (*Chunk, error) {\n\tvar c Chunk\n\tr := bytes.NewReader(data)\n\tfor sectionY := 0; sectionY < 16; sectionY++ {\n\t\t// If the section's bit set in the mask\n\t\tif (mask & (1 << uint(sectionY))) != 0 {\n\t\t\t// read section\n\t\t\tsec, err := readSection(r)\n\t\t\tif err != nil {\n\t\t\t\treturn &c, fmt.Errorf(\"read section[%d] error: %w\", sectionY, err)\n\t\t\t}\n\t\t\tc.Sections[sectionY] = sec\n\t\t}\n\t}\n\treturn &c, nil\n}", "title": "" }, { "docid": "cc82693a37e0a043466f5e2519cdcca8", "score": "0.5069743", "text": "func (m SqlData) MarshalTableMap(valueByCol map[string]interface{}) map[string]interface{} {\n\tif valueByCol == nil {\n\t\tvalueByCol = map[string]interface{}{}\n\t}\n\tvalueByCol[m.TableColumnId()] = m.Id\n\tvalueByCol[m.TableColumnCreatedAt()] = m.CreatedAt\n\tvalueByCol[m.TableColumnUpdatedAt()] = m.UpdatedAt\n\tvalueByCol[m.TableColumnIsDeleted()] = m.IsDeleted\n\tvalueByCol[m.TableColumnDeletedAt()] = m.DeletedAt\n\tvalueByCol[m.TableColumnVersion()] = m.Version\n\treturn valueByCol\n}", "title": "" }, { "docid": "4a159dc8a57584bb688d0d4d69034b19", "score": "0.50600183", "text": "func (r *Root) SliceUint16(field string) *SliceUint16 {\r\n\treturn (*SliceUint16)(r.Field(strings.Split(field, \".\")...))\r\n}", "title": "" }, { "docid": "b1aca41198d6e86404c1eb2b0a625894", "score": "0.5026034", "text": "func (tsr *Int64) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "744447e62069cf58a11e03c7b701df8e", "score": "0.5018335", "text": "func (PieceStyleMap) DecodeSlice() {}", "title": "" }, { "docid": "0164c9af933fe1e45b92503f6e626343", "score": "0.50031805", "text": "func (tsr *Uint8) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" }, { "docid": "09f97e8953c6f40e6fa6f64d9ae8878f", "score": "0.50004596", "text": "func unpackUint16(msg []byte, off int) (uint16, int) {\n return uint16(msg[off])<<8 | uint16(msg[off+1]), off + 2\n}", "title": "" }, { "docid": "7fbf94f2b22be5a7919c804082928ce8", "score": "0.49962252", "text": "func BitMapLen(m []byte) int {\n\treturn len(m) * 8\n\t//return len(m) * 8 * 2 //Because the map was converted from hex, we have 2 characters per byte\n}", "title": "" }, { "docid": "5eee56fb0fa03686559c45fd41b03a4a", "score": "0.49896252", "text": "func UInt16_decodeBinary(dst []UA_UInt16, type_ []UA_DataType, ctx []Ctx) status {\n\tif (*(*[1000000000]u8)(unsafe.Pointer(uintptr(unsafe.Pointer(&ctx[0].pos[0])) + (uintptr)(int(2))*unsafe.Sizeof(ctx[0].pos[0]))))[:] > ctx[0].end {\n\t\treturn status((UA_StatusCode((uint32_t((uint32((uint32(2147942400)))))))))\n\t}\n\tmemcpy(dst, ctx[0].pos, 2)\n\tctx.pos = (*(*[1000000000]u8)(unsafe.Pointer(uintptr(unsafe.Pointer(&ctx[0].pos[0])) + (uintptr)(2)*unsafe.Sizeof(ctx[0].pos[0]))))[:]\n\treturn 0\n}", "title": "" }, { "docid": "648a80326fee005dd581f01b475d56f7", "score": "0.49629235", "text": "func Uint16Map(src map[string]*uint16) map[string]uint16 {\n\tdst := make(map[string]uint16)\n\tfor k, val := range src {\n\t\tif val != nil {\n\t\t\tdst[k] = *val\n\t\t}\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "285421f3e33492ddb81951158abbbc4d", "score": "0.4958869", "text": "func (uint16Traits) CastFromBytes(b []byte) []uint16 {\n\th := (*reflect.SliceHeader)(unsafe.Pointer(&b))\n\n\treturn unsafe.Slice((*uint16)(unsafe.Pointer(h.Data)), cap(b)/Uint16SizeBytes)[:len(b)/Uint16SizeBytes]\n}", "title": "" }, { "docid": "f0e95e8132c1f977a697e8c6f914c552", "score": "0.49584144", "text": "func makePlanToStreamColMap(numCols int) []int {\n\tm := make([]int, numCols)\n\tfor i := 0; i < numCols; i++ {\n\t\tm[i] = -1\n\t}\n\treturn m\n}", "title": "" }, { "docid": "0c5be9234cbe14538e5337e1e03366a6", "score": "0.49476284", "text": "func Uint16Map(src map[string]uint16) map[string]*uint16 {\n\tdst := make(map[string]*uint16)\n\tfor k, val := range src {\n\t\tv := val\n\t\tdst[k] = &v\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "14074e6ed4a067630e8fd82b2c0bbacc", "score": "0.49446896", "text": "func MapUint16(m map[string]interface{}, key string) (v uint16, err error) {\n\t_v, err := CheckMapType(m, key, \"uint16\")\n\tif err == nil {\n\t\tv = _v.(uint16)\n\t}\n\treturn\n}", "title": "" }, { "docid": "268a87f7d8dc74013387f991e6189866", "score": "0.4928824", "text": "func (h *tagmapHeader) decode(buf []byte) error {\n\tvar err = errors.For(\"tagmapHeader.decode\")\n\tif len(buf) < tagmapHeaderSize {\n\t\treturn err.InvalidArg(\"len(buf):%d < %d\", len(buf), tagmapHeaderSize)\n\t}\n\t*h = *(*tagmapHeader)(unsafe.Pointer(&buf[0]))\n\n\t/// verify //////////////////////////////////////////////////////\n\n\tif h.ftype != mmap_tagmap_ftype {\n\t\treturn err.Bug(\"ftype:%x - expect: %x\", h.ftype, mmap_tagmap_ftype)\n\t}\n\tcrc64 := digest.Checksum64(buf[16:tagmapHeaderSize])\n\tif crc64 != h.crc64 {\n\t\treturn err.Bug(\"checksum:%d - expect: %d\", h.crc64, crc64)\n\t}\n\tif h.created == 0 {\n\t\treturn err.Bug(\"created:%d\", h.created)\n\t}\n\tif h.updated < h.created {\n\t\treturn err.Bug(\"updated: %d < created:%d\", h.updated, h.created)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "2765c68f40f0f717455ecd93d5c2831c", "score": "0.4904719", "text": "func (m *Mapper) lineCol16(offset int) (int, int) {\n\tline, start, cr := m.line(offset)\n\tvar col16 int\n\tif m.nonASCII {\n\t\tcol16 = UTF16Len(m.Content[start:offset])\n\t} else {\n\t\tcol16 = offset - start\n\t}\n\tif cr {\n\t\tcol16-- // retreat from \\r at line end\n\t}\n\treturn line, col16\n}", "title": "" }, { "docid": "5a4533d4bb7f05c1ff7a258d9518b562", "score": "0.4894265", "text": "func Uint16PMap(src map[string]uint16) map[string]*uint16 {\n\tdst := make(map[string]*uint16)\n\tfor k, val := range src {\n\t\tv := val\n\t\tdst[k] = &v\n\t}\n\treturn dst\n}", "title": "" }, { "docid": "6e23cd9f70b5b650e15fbcc0e0bda854", "score": "0.48846126", "text": "func (sh *StateHelper) McGetUint16s(key string) []uint16 {\n\treturn *sh.McGetEx(key, new([]uint16)).(*[]uint16)\n}", "title": "" }, { "docid": "a8cbe13854c61887ba908a4389cffe02", "score": "0.48583904", "text": "func (a *ArgStack) Uint16() uint16 { return uint16(a.Vals[a.Top-1]) }", "title": "" }, { "docid": "1dd9200a8a1661789907b49ac01589f0", "score": "0.4845851", "text": "func NewUint16Column(src *Source, vals *fbs.PrimitiveArray, name string) *Uint16Column {\n\t// TODO: typecheck for col.Values().TypE to match Uint16\n\tif vals.TypE() != fbs.TypEUINT16 {\n\t\tpanic(\"Expected type uint16, but found something else...\")\n\t}\n\treturn &Uint16Column{\n\t\tname: name,\n\t\tvalues: vals,\n\t\tnNull: vals.NullCount(),\n\t\tsrc: src,\n\t\ttypE: vals.TypE(),\n\t\toffset: vals.Offset(),\n\t\tlength: vals.Length(),\n\t}\n}", "title": "" }, { "docid": "6bc095eb7ac5a9071dc605aa30a4b54b", "score": "0.48427355", "text": "func Uint16s(key string, vals []uint16) zap.Field {\n\treturn zap.Uint16s(key, vals)\n}", "title": "" }, { "docid": "0855a21aea461f3a3e71158268dcf91b", "score": "0.48412484", "text": "func NewMapUint8ToUint16(size int) *MapUint8ToUint16 {\n\tshift := nextShiftPowerOfTwo(size)\n\treturn &MapUint8ToUint16{\n\t\tmask: ^(^0 << shift),\n\t\tmax: maxFill(1 << shift),\n\t\tslots: make([]*entryUint8ToUint16, 1<<shift),\n\t}\n}", "title": "" }, { "docid": "7b0bd82ab65ce1d8ff044c5b7320a27c", "score": "0.48300406", "text": "func MatrixU16(t *Dense) (retVal [][]uint16, err error) {\n\tif err = checkNativeIterable(t, 2, Uint16); err != nil {\n\t\treturn nil, err\n\t}\n\n\tdata := t.Uint16s()\n\tshape := t.Shape()\n\tstrides := t.Strides()\n\n\trows := shape[0]\n\tcols := shape[1]\n\trowStride := strides[0]\n\tretVal = make([][]uint16, rows)\n\tfor i := range retVal {\n\t\tstart := i * rowStride\n\t\tretVal[i] = make([]uint16, 0)\n\t\thdr := (*reflect.SliceHeader)(unsafe.Pointer(&retVal[i]))\n\t\thdr.Data = uintptr(unsafe.Pointer(&data[start]))\n\t\thdr.Cap = cols\n\t\thdr.Len = cols\n\t}\n\treturn\n}", "title": "" }, { "docid": "a6d2383a84d41f13b8965f9d382cde01", "score": "0.48277903", "text": "func Uint16(key string, val uint16) zap.Field {\n\treturn zap.Uint16(key, val)\n}", "title": "" }, { "docid": "6ef64903d5503054b341de2706178810", "score": "0.48148027", "text": "func (tsr *Int32) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "bdebb6bf8ebdbad6412b914fd5a0805b", "score": "0.48084864", "text": "func Reflect_maplen(m unsafe.Pointer) int", "title": "" }, { "docid": "f4558f74f592ca6407a23e94a2068b12", "score": "0.48054305", "text": "func Uint16(key string, val uint16) Field {\n\treturn Field{Key: key, Type: zapcore.Uint16Type, Integer: int64(val)}\n}", "title": "" }, { "docid": "ec3557a9cfd112494134b6bd62d6636f", "score": "0.47808", "text": "func (m IndexBufferMemory) GetUint16s(offsetInBytes int, data []uint16) {\n\tif len(data) > 0 {\n\t\tC.memcpy(\n\t\t\tunsafe.Pointer(&data[0]),\n\t\t\tunsafe.Pointer(uintptr(int(uintptr(m.Memory))+offsetInBytes)),\n\t\t\tC.size_t(len(data)*2),\n\t\t)\n\t}\n}", "title": "" }, { "docid": "25a35e1141a293580f6d7612828224aa", "score": "0.47804207", "text": "func Uints16(k string, v []uint16) Field {\n\treturn Field{Key: k, Type: FieldTypeRawBytesToUints16, Bytes: *(*[]byte)(unsafe.Pointer(&v))}\n}", "title": "" }, { "docid": "f89de3b5d55d4bc6c613c93a774dac5a", "score": "0.4777878", "text": "func TestUnpackGenericMap(t *testing.T) {\n\tvar x map[interface{}]interface{}\n\terr := Unpack([]byte(\"\\x83t\\x00\\x00\\x00\\x01m\\x00\\x00\\x00\\x01aa\\x01\"), &x)\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\tr, ok := x[\"a\"].(uint8)\n\tif !ok {\n\t\tt.Fatal(\"not ok\")\n\t}\n\tif r != 1 {\n\t\tt.Fatal(\"not 1\")\n\t}\n}", "title": "" }, { "docid": "e50ce5d8870ea4e3c28ea7273ab6e769", "score": "0.47718555", "text": "func TestUnpackMapRawData(t *testing.T) {\n\tvar r RawData\n\terr := Unpack([]byte(\"\\x83t\\x00\\x00\\x00\\x01m\\x00\\x00\\x00\\x01aa\\x01\"), &r)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\terr = bytesAssert([]byte(\"t\\x00\\x00\\x00\\x01m\\x00\\x00\\x00\\x01aa\\x01\"), r)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\tvar x map[string]int\n\terr = r.Cast(&x)\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\ti, ok := x[\"a\"]\n\tif !ok {\n\t\tt.Fatal(\"not ok\")\n\t}\n\tif i != 1 {\n\t\tt.Fatal(\"not 1\")\n\t}\n}", "title": "" }, { "docid": "22145460a756c8cb40f0b89c6ca3b45d", "score": "0.4768754", "text": "func (a *Uint16Column) Name() string { return a.name }", "title": "" }, { "docid": "e6e3d89e42c3b43f96d10f34c05cea75", "score": "0.4766578", "text": "func (tsr *Float32) MetaDataMap() map[string]string {\n\treturn tsr.Meta\n}", "title": "" }, { "docid": "8114a8e21911d0dcbf089938657d2a4d", "score": "0.47545436", "text": "func UnpackMap(r io.Reader, ptr interface{}) error {\n\tvar err error\n\tvar head byte\n\n\tmapTyp := reflect.TypeOf(ptr).Elem()\n\tmapVal := reflect.ValueOf(ptr).Elem()\n\n\tif err = binary.Read(r, binary.BigEndian, &head); err != nil {\n\t\treturn err\n\t}\n\n\tif head == 0xc0 { // nil\n\t\treflect.ValueOf(ptr).Elem().Set(reflect.Zero(reflect.TypeOf(ptr).Elem()))\n\t\treturn nil\n\t}\n\n\tvar srcLen = 0\n\tif head&0xf0 == 0x80 { // map\n\t\tsrcLen = int(head & 0x0f)\n\t} else if head == 0xde {\n\t\tvar temp uint16\n\t\tif err = binary.Read(r, binary.BigEndian, &temp); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsrcLen = int(temp)\n\t} else if head == 0xdf {\n\t\tvar temp uint32\n\t\tif err = binary.Read(r, binary.BigEndian, &temp); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tsrcLen = int(temp)\n\t} else {\n\t\treturn fmt.Errorf(\"msgp: unpacked value is not a map\")\n\t}\n\n\tmapVal.Set(reflect.MakeMap(reflect.MapOf(mapTyp.Key(), mapTyp.Elem()))) // map 생성.\n\tfor inx := 0; inx < srcLen; inx++ {\n\t\tkeyPtr := reflect.New(mapTyp.Key())\n\t\tif err = Unpack(r, keyPtr.Interface()); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tvalPtr := reflect.New(mapTyp.Elem())\n\t\tif err = Unpack(r, valPtr.Interface()); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tmapVal.SetMapIndex(keyPtr.Elem(), valPtr.Elem())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60314e879e8ee25a794548251682530c", "score": "0.47410318", "text": "func (f *MetaFooter) Map(offset int) map[string]interface{} {\n\treturn map[string]interface{}{\n\t\t\"_offset\": offset,\n\t\t\"size\": f.Size,\n\t\t\"magic\": f.Magic,\n\t\t\"version\": f.Version,\n\t}\n}", "title": "" }, { "docid": "444dcac5236e507d7ea8a3cdf5959b9a", "score": "0.47339907", "text": "func OutputMetadataFromBytes(bytes []byte) (outputMetadata *OutputMetadata, consumedBytes int, err error) {\n\tmarshalUtil := marshalutil.New(bytes)\n\tif outputMetadata, err = OutputMetadataFromMarshalUtil(marshalUtil); err != nil {\n\t\terr = errors.Errorf(\"failed to parse OutputMetadata from MarshalUtil: %w\", err)\n\t\treturn\n\t}\n\tconsumedBytes = marshalUtil.ReadOffset()\n\n\treturn\n}", "title": "" }, { "docid": "519a56fa7d7475365c90ea0ac5c2a0e2", "score": "0.4729972", "text": "func toUint16(a *arena, s string) *uint16 {\n\tif len(s) == 0 {\n\t\treturn nil\n\t}\n\n\tn := windows.StringToUTF16(s)\n\tret := a.Alloc(2 * uintptr(len(n)))\n\n\tvar sl []uint16\n\tsh := (*reflect.SliceHeader)(unsafe.Pointer(&sl))\n\tsh.Cap = len(s)\n\tsh.Len = len(s)\n\tsh.Data = uintptr(ret)\n\n\tcopy(sl, n)\n\treturn (*uint16)(ret)\n}", "title": "" }, { "docid": "1b7d6c02ff1f33b666eb8c5dc7e2b22a", "score": "0.47212783", "text": "func (tbl LUserTable) SliceU16(req require.Requirement, wh where.Expression, qc where.QueryConstraint) ([]uint16, error) {\n\treturn support.SliceUint16List(tbl, req, \"u16\", wh, qc)\n}", "title": "" }, { "docid": "6caa33cc8cd8feeb91fc4f22ab120e78", "score": "0.4720282", "text": "func (mf TMMFile) ColHasNextSubUint16(offset uint64, bitstart, bitend uint8, pos, last uint64, search uint16) (bool, uint64) {\n\tcpos := C.uint64_t(pos)\n\tret := bool(C.col_has_next_sub_uint16_t((*C.uint16_t)(unsafe.Pointer(uintptr(mf.Src)+uintptr(offset))), C.uint8_t(bitstart), C.uint8_t(bitend), &cpos, C.uint64_t(last), C.uint16_t(search)))\n\treturn ret, uint64(cpos)\n}", "title": "" }, { "docid": "e0eb8672785ce91afccad75c0f2618e5", "score": "0.4719908", "text": "func (m SqlData) MapColumnVersion() string {\n\t// avoid runtime cost of fmt.Sprintf\n\t// return fmt.Sprintf(\"%s_%s\", m.TableName(), m.ColumnSqlData())\n\t// return \"sql_data_version\"\n\treturn sql_.CompliantName(m.TableColumnVersion())\n}", "title": "" }, { "docid": "3ffe038261c4afe64ccb58a31c418a15", "score": "0.47157753", "text": "func NewUint16MemoTable(num int64) *Uint16MemoTable {\n\treturn &Uint16MemoTable{tbl: NewUint16HashTable(uint64(num)), nullIdx: KeyNotFound}\n}", "title": "" }, { "docid": "582a8c77e5b3a71806d7f9b8764ff65f", "score": "0.47126225", "text": "func (b *tableBuf) mapFields(cfg *Config, rv reflect.Value) ([]*tableBuf, error) {\n\t// Marshal and sort the keys first.\n\tvar keys = rv.MapKeys()\n\tvar keylist = make(mapKeyList, len(keys))\n\tfor i, key := range keys {\n\t\tvar err error\n\t\tkeylist[i].key, err = encodeMapKey(key)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tkeylist[i].value = rv.MapIndex(key)\n\t}\n\tsort.Sort(keylist)\n\n\tvar newTables []*tableBuf\n\tvar index int\n\tfor _, kv := range keylist {\n\t\t// If the current table is inline, add separators.\n\t\tif b.typ == ast.TableTypeInline && index > 0 {\n\t\t\tb.body = append(b.body, \", \"...)\n\t\t}\n\t\t// Write the key/value pair.\n\t\ttables, err := b.field(cfg, kv.key, kv.value)\n\t\tif err != nil {\n\t\t\treturn newTables, err\n\t\t}\n\t\tnewTables = append(newTables, tables...)\n\t\tindex++\n\t}\n\treturn newTables, nil\n}", "title": "" }, { "docid": "28403ea456cc9b1c113866a11939603b", "score": "0.4702558", "text": "func (p *serializer) parseUint16(f reflect.Value, d Packet) error {\n\tval, err := d.Uint16()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to parse int8: %v\", err)\n\t}\n\tf.SetUint(uint64(val))\n\treturn nil\n}", "title": "" }, { "docid": "57d2c314a39360aa3a6ec5f1b23fdb28", "score": "0.4701099", "text": "func (a *Uint16FullColumn) Name() string { return a.name }", "title": "" }, { "docid": "7630ece95408f52b91af5f11d00b7573", "score": "0.4687022", "text": "func (mf TMMFile) ColFindLastSubUint16(offset uint64, bitstart, bitend uint8, first, last uint64, search uint16) (uint64, uint64, uint64) {\n\tcfirst := C.uint64_t(first)\n\tclast := C.uint64_t(last)\n\tret := uint64(C.col_find_last_sub_uint16_t((*C.uint16_t)(unsafe.Pointer(uintptr(mf.Src)+uintptr(offset))), C.uint8_t(bitstart), C.uint8_t(bitend), &cfirst, &clast, C.uint16_t(search)))\n\treturn ret, uint64(cfirst), uint64(clast)\n}", "title": "" }, { "docid": "a572735be82aaf2bddf1bf7eef94d130", "score": "0.46840608", "text": "func parseUint16Chunk(data []byte) ([]byte, []byte, bool) {\n\tif len(data) < 2 {\n\t\treturn nil, nil, false\n\t}\n\tlength := int(data[0])<<8 | int(data[1])\n\tif len(data) < 2+length {\n\t\treturn nil, nil, false\n\t}\n\tchunk := data[2 : 2+length]\n\treturn chunk, data[2+length:], true\n}", "title": "" }, { "docid": "a572735be82aaf2bddf1bf7eef94d130", "score": "0.46840608", "text": "func parseUint16Chunk(data []byte) ([]byte, []byte, bool) {\n\tif len(data) < 2 {\n\t\treturn nil, nil, false\n\t}\n\tlength := int(data[0])<<8 | int(data[1])\n\tif len(data) < 2+length {\n\t\treturn nil, nil, false\n\t}\n\tchunk := data[2 : 2+length]\n\treturn chunk, data[2+length:], true\n}", "title": "" }, { "docid": "bda8c7bad2e29afa0619ddc5306f299d", "score": "0.46838433", "text": "func (tsr *Uint16) SetMetaData(key, val string) {\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\ttsr.Meta[key] = val\n}", "title": "" }, { "docid": "342bc52df401ac9ab88dbbdcc59151dd", "score": "0.46828958", "text": "func MetaByteToStruct(bb [][]byte) ([]Metadata, error) {\n\tvar metas []Metadata\n\n\tfor _, v := range bb {\n\t\tbytes := []byte(v)\n\t\tvar meta Metadata\n\t\terr := json.Unmarshal(bytes, &meta)\n\t\tif err != nil {\n\t\t\treturn []Metadata{}, xerrors.Errorf(\"MetaByteToStruct Error: %w\", err)\n\t\t}\n\t\tmetas = append(metas, meta)\n\t}\n\n\treturn metas, nil\n}", "title": "" }, { "docid": "36b67752f594ee231f1e60d5cf22aad4", "score": "0.4676848", "text": "func (m MySQL) MapField(descriptor types.FieldDescriptor) types.Field {\n\tfield := strings.ToLower(descriptor.Type)\n\t// String types\n\tif strings.HasPrefix(field, \"varchar\") {\n\t\treturn types.Field{Type: types.String, Length: int16(descriptor.Length.Int)}\n\t}\n\tif strings.HasPrefix(field, \"char\") {\n\t\treturn types.Field{Type: types.String, Length: int16(descriptor.Length.Int)}\n\t}\n\tif strings.HasPrefix(field, \"varbinary\") {\n\t\treturn types.Field{Type: types.String, Length: int16(descriptor.Length.Int)}\n\t}\n\tif strings.HasPrefix(field, \"binary\") {\n\t\treturn types.Field{Type: types.String, Length: int16(descriptor.Length.Int)}\n\t}\n\n\t// Numeric types\n\tif strings.HasPrefix(field, \"tinyint\") {\n\t\treturn types.Field{Type: types.Bool, Length: -1}\n\t}\n\tif strings.HasPrefix(field, \"smallint\") {\n\t\treturn types.Field{Type: types.Int16, Length: -1}\n\t}\n\tif strings.HasPrefix(field, \"mediumint\") {\n\t\treturn types.Field{Type: types.Int16, Length: -1}\n\t}\n\tif strings.HasPrefix(field, \"int\") || strings.HasPrefix(field, \"bigint\") {\n\t\treturn types.Field{Type: types.Int32, Length: -1}\n\t}\n\n\t// Float types\n\tif strings.HasPrefix(field, \"decimal\") {\n\t\treturn types.Field{Type: types.Float, Length: int16(descriptor.Length.Int)}\n\t}\n\tif strings.HasPrefix(field, \"float\") {\n\t\treturn types.Field{Type: types.Float, Length: int16(descriptor.Length.Int)}\n\t}\n\tif strings.HasPrefix(field, \"double\") {\n\t\treturn types.Field{Type: types.Float, Length: int16(descriptor.Length.Int)}\n\t}\n\n\t// Blob\n\tif strings.HasPrefix(field, \"blob\") || strings.HasPrefix(field, \"tinyblob\") ||\n\t\tstrings.HasPrefix(field, \"mediumblob\") || strings.HasPrefix(field, \"longblob\") {\n\t\treturn types.Field{Type: types.Blob, Length: -1}\n\t}\n\n\t// Text\n\tif strings.HasPrefix(field, \"text\") || strings.HasPrefix(field, \"tinytext\") ||\n\t\tstrings.HasPrefix(field, \"mediumtext\") || strings.HasPrefix(field, \"longtext\") {\n\t\treturn types.Field{Type: types.Text, Length: -1}\n\t}\n\n\t// Json\n\tif strings.HasPrefix(field, \"json\") {\n\t\treturn types.Field{Type: types.Json, Length: -1}\n\t}\n\n\t// Year\n\tif strings.HasPrefix(field, \"year\") {\n\t\treturn types.Field{Type: types.Year, Length: 4}\n\t}\n\n\t// Time\n\t// Date\n\t// Timestamp\n\t// Datetime\n\tif strings.HasPrefix(field, \"datetime\") || strings.HasPrefix(field, \"date\") ||\n\t\tstrings.HasPrefix(field, \"timestamp\") || strings.HasPrefix(field, \"time\") {\n\t\treturn types.Field{Type: types.Time, Length: -1}\n\t}\n\n\t// Enum\n\t// TODO deal with enums\n\tif strings.HasPrefix(field, \"enum\") {\n\t\tf := strings.ReplaceAll(field, \"enum(\", \"\")\n\t\tf = strings.ReplaceAll(f, \")\", \"\")\n\t\tf = strings.ReplaceAll(f, \"'\", \"\")\n\t\tf = strings.ReplaceAll(f, \" \", \"\")\n\t\treturn types.Field{Type: types.Enum, Length: -1, Enum: strings.Split(f, \",\")}\n\t}\n\n\treturn types.Field{Type: types.Unknown, Length: -1}\n}", "title": "" }, { "docid": "7c1a45675c85618d488285d387211086", "score": "0.46749565", "text": "func ParseBs2Uint16(bs *[]byte, offset int) (uint16, error) {\n\t// error handling\n\tif len(*bs) < offset+2 {\n\t\treturn 0, fmt.Errorf(\"ParseBs2Uint16 invalid length of slice %#x , slice len %v , want %v\", (*bs), len(*bs), offset+2)\n\t}\n\tvar sum uint16\n\tvar order uint32\n\t// convert hex byte slice to Uint64\n\tfor i := offset + 1; i >= offset; i-- {\n\t\t// shift to the left by 8 bits every cycle\n\t\tsum += uint16((*bs)[i]) << order\n\t\torder += 8\n\t}\n\treturn sum, nil\n}", "title": "" }, { "docid": "72aeceba436ffd98d3c8298924c17993", "score": "0.46735066", "text": "func UnmarshalByteArrayMapSlice(m map[string]interface{}, propertyName string) (slice []map[string][]byte, err error) {\n\tvar v interface{}\n\tv, foundIt := m[propertyName]\n\tif foundIt && v != nil {\n\t\tvSlice, ok := v.([]interface{})\n\t\tif !ok {\n\t\t\terr = fmt.Errorf(errorNotAnArray, propertyName, reflect.TypeOf(v).String())\n\t\t\treturn\n\t\t}\n\t\tfor _, element := range vSlice {\n\t\t\telementAsMap, localErr := assertMapOfByteArray(element)\n\t\t\tif localErr != nil {\n\t\t\t\terr = fmt.Errorf(errorPropertyValue, propertyName, localErr.Error())\n\t\t\t\treturn\n\t\t\t}\n\t\t\tslice = append(slice, elementAsMap)\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "35b5ba5c420ff3b5148fbcd8179c6332", "score": "0.4672364", "text": "func Uint16(key string, val uint16) zapcore.Field {\n\treturn zapcore.Field{Key: key, Type: zapcore.Uint16Type, Integer: int64(val)}\n}", "title": "" }, { "docid": "a5c90138296f977928e0214a87496717", "score": "0.46675014", "text": "func MapToStruct(data interface{}, m map[string]interface{}) error {\n\tv := reflect.ValueOf(data)\n\tt := v.Type()\n\tif v.Kind() != reflect.Ptr {\n\t\treturn errors.New(\"scrud: map to struct need pointer\")\n\t}\n\tif v.IsNil() {\n\t\treturn errors.New(\"scrud: map to struct nil\")\n\t}\n\tv = v.Elem()\n\tt = v.Type()\n\n\tx, err := table.TableOf(t)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, c := range x.Columns {\n\t\tif c.IsManyRelation() {\n\t\t\tcontinue\n\t\t}\n\n\t\tif i, ok := m[c.Name]; !ok {\n\t\t\tcontinue\n\t\t} else {\n\t\t\tvar err error\n\t\t\tif c.HasEncoding() {\n\t\t\t\terr = c.Set(v, i)\n\t\t\t} else {\n\t\t\t\terr = c.SetValue(v, i)\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f96cf0ccfdd093b16517a108eedc6746", "score": "0.46666497", "text": "func (mf TMMFile) ColFindLastUint16(offset, first, last uint64, search uint16) (uint64, uint64, uint64) {\n\tcfirst := C.uint64_t(first)\n\tclast := C.uint64_t(last)\n\tret := uint64(C.col_find_last_uint16_t((*C.uint16_t)(unsafe.Pointer(uintptr(mf.Src)+uintptr(offset))), &cfirst, &clast, C.uint16_t(search)))\n\treturn ret, uint64(cfirst), uint64(clast)\n}", "title": "" }, { "docid": "c5229ee724c1295b3ba47c0db73feed6", "score": "0.46656018", "text": "func (sh *StateHelper) McGetUint16(key string) uint16 {\n\treturn *sh.McGetEx(key, new(uint16)).(*uint16)\n}", "title": "" }, { "docid": "86342e10b9c7f0a9fce6ddc5f1c3f57c", "score": "0.4663171", "text": "func (tsr *Int8) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" }, { "docid": "0c2fd1ac2fed66fe9754cd258bd4294d", "score": "0.4661917", "text": "func Uint16(key string, val uint16) Field {\n\treturn Field{Key: key, Type: Uint16Type, Integer: int64(val)}\n}", "title": "" }, { "docid": "976b7f226cc6056af66cccc7e05dc683", "score": "0.46497518", "text": "func (tsr *Uint64) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" }, { "docid": "9f656c024c5343cc375b1fd04ee53e7c", "score": "0.46496776", "text": "func Uint16s(key string, nums []uint16) zapcore.Field {\n\treturn Array(key, uint16s(nums))\n}", "title": "" }, { "docid": "33b19350304bafd55d8f9f308954ce71", "score": "0.46474817", "text": "func (m *SqlData) UnmarshalMap(valueByCol map[string]interface{}) error {\n\tfor col, val := range valueByCol {\n\t\tswitch col {\n\t\tcase m.ColumnId():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.Id)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.Id)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.ColumnCreatedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.CreatedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.CreatedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.ColumnUpdatedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.UpdatedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.UpdatedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.ColumnIsDeleted():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.IsDeleted)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.IsDeleted)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.ColumnDeletedAt():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.DeletedAt)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.DeletedAt)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\tcase m.ColumnVersion():\n\t\t\t// for sql.Scanner\n\t\t\tv := reflect.ValueOf(&m.Version)\n\t\t\tif v.Type().NumMethod() > 0 && v.CanInterface() {\n\t\t\t\tif u, ok := v.Interface().(sql.Scanner); ok {\n\t\t\t\t\tif err := u.Scan(val); err != nil {\n\t\t\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t\t\t}\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tdata, err := json.Marshal(val)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"marshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t\terr = json.Unmarshal(data, &m.Version)\n\t\t\tif err != nil {\n\t\t\t\treturn fmt.Errorf(\"unmarshal col %q, got %w\", col, err)\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e1d0c560a8d6f8fc93225bafd98cf4a9", "score": "0.46435678", "text": "func (int16Traits) CastFromBytes(b []byte) []int16 {\n\th := (*reflect.SliceHeader)(unsafe.Pointer(&b))\n\n\treturn unsafe.Slice((*int16)(unsafe.Pointer(h.Data)), cap(b)/Int16SizeBytes)[:len(b)/Int16SizeBytes]\n}", "title": "" }, { "docid": "aa762be32d0c5b391f5986b7b5055294", "score": "0.46425223", "text": "func (m *Meta) Map(endOffset int) map[string]interface{} {\n\toffsets := m.Offsets()\n\tstartOffset := endOffset - int(m.Footer.Size)\n\n\ttlvs := []map[string]interface{}{}\n\tfor i, t := range m.Tlvs {\n\t\ttlv := t.Map(i, startOffset+offsets.Tlvs[i])\n\t\ttlvs = append(tlvs, tlv)\n\t}\n\n\tftr := m.Footer.Map(startOffset + offsets.Footer)\n\n\treturn map[string]interface{}{\n\t\t\"_offset\": startOffset,\n\t\t\"_end_offset\": endOffset,\n\t\t\"_size\": m.Footer.Size,\n\t\t\"tlvs\": tlvs,\n\t\t\"footer\": ftr,\n\t}\n}", "title": "" }, { "docid": "0f47c18cdca391e03a4fbcae3ac065d1", "score": "0.4640234", "text": "func byteSliceArithmeticUint16(m *mutator, b []byte) []byte {\n\tif len(b) < 2 {\n\t\treturn nil\n\t}\n\tv := uint16(m.rand(35) + 1)\n\tif m.r.bool() {\n\t\tv = 0 - v\n\t}\n\tpos := m.rand(len(b) - 1)\n\tenc := m.randByteOrder()\n\tenc.PutUint16(b[pos:], enc.Uint16(b[pos:])+v)\n\treturn b\n}", "title": "" }, { "docid": "6b168da2ad5cabedd563f902d0f738f8", "score": "0.464003", "text": "func (dbu *PGSqlDBUtil) getColMap(rslt pgx.Rows) map[int]string {\n\n\tcolMap := make(map[int]string)\n\tfor pos, fd := range rslt.FieldDescriptions() {\n\t\tcolMap[pos] = string(fd.Name)\n\t\tif string(fd.Name) == \"id\" {\n\t\t\tcolMap[pos] = \"_id\"\n\t\t}\n\t}\n\treturn colMap\n}", "title": "" }, { "docid": "1364c7b9e00109897d7c17b8fe17bf9a", "score": "0.46274722", "text": "func UA_UInt16_decodeBinary(src []UA_ByteString, offset []uint, dst []UA_UInt16) UA_StatusCode {\n\treturn UA_decodeBinary(src, offset, dst, (*[100000000]UA_DataType)(unsafe.Pointer(&UA_TYPES[4]))[:], 0, nil)\n}", "title": "" }, { "docid": "46fd06f6b8bb9f32c938e70473dc0449", "score": "0.46215102", "text": "func (l ListData) ListUint16() ListUint16 {\n\tif l.tagType != TagUint16 {\n\t\treturn nil\n\t}\n\ts := make(ListUint16, len(l.data))\n\tfor n, v := range l.data {\n\t\ts[n] = v.(Uint16)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "6cd1d35f3401e67f37a847926fc931d0", "score": "0.46112233", "text": "func (packet *PacketHandler) parseColumns() error {\n\tpacket.columnCount = int(binary.BigEndian.Uint16(packet.descriptionBuf.Bytes()[:2]))\n\n\tif packet.columnCount == 0 {\n\t\treturn nil\n\t}\n\tcolumnReader := bytes.NewReader(packet.descriptionBuf.Bytes()[2:])\n\tvar columns []*ColumnData\n\tfor i := 0; i < packet.columnCount; i++ {\n\t\tcolumn := &ColumnData{}\n\t\tif err := column.ReadLength(columnReader); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tif err := column.readData(columnReader); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tcolumns = append(columns, column)\n\t}\n\tpacket.Columns = columns\n\treturn nil\n}", "title": "" }, { "docid": "8f6e024e07b0421e930b8999fd71f709", "score": "0.46055982", "text": "func (fm *FinalModelEnumUInt16) FBEShift(size int) { fm.offset += size }", "title": "" }, { "docid": "9e9d4edbbaa5d9d054d3c0fa7a622b62", "score": "0.46028903", "text": "func (uint16Traits) CastToBytes(b []uint16) []byte {\n\th := (*reflect.SliceHeader)(unsafe.Pointer(&b))\n\n\treturn unsafe.Slice((*byte)(unsafe.Pointer(h.Data)), cap(b)*Uint16SizeBytes)[:len(b)*Uint16SizeBytes]\n}", "title": "" }, { "docid": "38b049f90d9a58619c5bd2310fde0131", "score": "0.45990935", "text": "func Uint16(k string, v uint16) Field {\n\treturn Field{Key: k, Type: FieldTypeUint16, Int: int64(v)}\n}", "title": "" }, { "docid": "4cf03ba0f793c0bfa51e2a36ffae9751", "score": "0.459396", "text": "func NewUint16FullColumn(src *Source, vals *fbs.PrimitiveArray, name string) *Uint16FullColumn {\n\t// TODO: typecheck for col.Values().TypE to match Uint16\n\tif vals.TypE() != fbs.TypEUINT16 {\n\t\tpanic(\"Expected type uint16, but found something else...\")\n\t}\n\treturn &Uint16FullColumn{\n\t\tname: name,\n\t\tvalues: vals,\n\t\tsrc: src,\n\t\ttypE: vals.TypE(),\n\t\toffset: vals.Offset(),\n\t\tlength: vals.Length(),\n\t}\n}", "title": "" }, { "docid": "0e088e2f6adac9873b2af9624e1e6f98", "score": "0.45920596", "text": "func (*MetadataLocations_CellsColumnMap) Descriptor() ([]byte, []int) {\n\treturn file_fds_protobuf_stach_table_MetadataLocations_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "bd703def4f49774d7ba4f04d4eb6985c", "score": "0.45912743", "text": "func (sr *sliceReader) getUint16() (r uint16) {\n\tr, sr.pos = binary.LittleEndian.Uint16(sr.b[sr.pos:]), sr.pos+2\n\treturn\n}", "title": "" }, { "docid": "6a85af059070d010c72b30420df573c8", "score": "0.45816213", "text": "func (*MetadataLocations_CellsColumnMap) Descriptor() ([]byte, []int) {\n\treturn file_fds_protobuf_stach_v2_table_MetadataLocations_proto_rawDescGZIP(), []int{0, 0}\n}", "title": "" }, { "docid": "da9bf60fdbe453fc0839f8d8ffc0136c", "score": "0.4579352", "text": "func (a *Int16FullColumn) Length() int { return int(a.length) }", "title": "" }, { "docid": "1bcc5d4abeed578843ac243a0141251b", "score": "0.4578994", "text": "func getLE16(blob []byte, i int) uint {\n return uint(blob[i]) | (uint(blob[i + 1]) << 8)\n}", "title": "" }, { "docid": "035cb9a72b6ce6167a431d4c99afb46c", "score": "0.45771003", "text": "func (m SqlData) NonzeroMapColumnVersion() string {\n\tif m.IsVersionZero() {\n\t\treturn \"\"\n\t}\n\treturn m.MapColumnVersion()\n}", "title": "" }, { "docid": "90e92be0c75a01e85d437f2a253d67c5", "score": "0.45721632", "text": "func MetadataTableIndextToString(k int) string {\n\tmetadataTablesMap := map[int]string{\n\t\tModule: \"Module\",\n\t\tTypeRef: \"TypeRef\",\n\t\tTypeDef: \"TypeDef\",\n\t\tFieldPtr: \"FieldPtr\",\n\t\tField: \"Field\",\n\t\tMethodPtr: \"MethodPtr\",\n\t\tMethod: \"Method\",\n\t\tParamPtr: \"ParamPtr\",\n\t\tParam: \"Param\",\n\t\tInterfaceImpl: \"InterfaceImpl\",\n\t\tMemberRef: \"MemberRef\",\n\t\tConstant: \"Constant\",\n\t\tCustomAttribute: \"CustomAttribute\",\n\t\tFieldMarshal: \"FieldMarshal\",\n\t\tDeclSecurity: \"DeclSecurity\",\n\t\tClassLayout: \"ClassLayout\",\n\t\tFieldLayout: \"FieldLayout\",\n\t\tStandAloneSig: \"StandAloneSig\",\n\t\tEventMap: \"EventMap\",\n\t\tEventPtr: \"EventPtr\",\n\t\tEvent: \"Event\",\n\t\tPropertyMap: \"PropertyMap\",\n\t\tPropertyPtr: \"PropertyPtr\",\n\t\tProperty: \"Property\",\n\t\tMethodSemantics: \"MethodSemantics\",\n\t\tMethodImpl: \"MethodImpl\",\n\t\tModuleRef: \"ModuleRef\",\n\t\tTypeSpec: \"TypeSpec\",\n\t\tImplMap: \"ImplMap\",\n\t\tFieldRVA: \"FieldRVA\",\n\t\tENCLog: \"ENCLog\",\n\t\tENCMap: \"ENCMap\",\n\t\tAssembly: \"Assembly\",\n\t\tAssemblyProcessor: \"AssemblyProcessor\",\n\t\tAssemblyOS: \"AssemblyOS\",\n\t\tAssemblyRef: \"AssemblyRef\",\n\t\tAssemblyRefProcessor: \"AssemblyRefProcessor\",\n\t\tAssemblyRefOS: \"AssemblyRefOS\",\n\t\tFileMD: \"File\",\n\t\tExportedType: \"ExportedType\",\n\t\tManifestResource: \"ManifestResource\",\n\t\tNestedClass: \"NestedClass\",\n\t\tGenericParam: \"GenericParam\",\n\t\tMethodSpec: \"MethodSpec\",\n\t\tGenericParamConstraint: \"GenericParamConstraint\",\n\t}\n\n\tif value, ok := metadataTablesMap[k]; ok {\n\t\treturn value\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "fbfd095801e44d25192bcbbbb45d805b", "score": "0.4571842", "text": "func NewUint16ChunkIterator(col *array.Column) *Uint16ChunkIterator {\n\tcol.Retain()\n\n\t// Chunked is not using the correct type to keep track of length so we have to recalculate it.\n\tcolumnChunks := col.Data().Chunks()\n\tchunks := make([]*array.Uint16, len(columnChunks))\n\tvar length int64\n\tvar nulls int64\n\n\tfor i, chunk := range columnChunks {\n\t\t// Keep our own refs to chunks\n\t\tchunks[i] = chunk.(*array.Uint16)\n\t\t// Retain the chunk\n\t\tchunks[i].Retain()\n\n\t\t// Keep our own counters instead of Chunked's\n\t\tlength += int64(chunk.Len())\n\t\tnulls += int64(chunk.NullN())\n\t}\n\n\treturn &Uint16ChunkIterator{\n\t\trefCount: 1,\n\t\tcol: col,\n\n\t\tchunks: chunks,\n\t\tlength: length,\n\t\tnulls: nulls,\n\t\tdtype: col.DataType(),\n\n\t\tcurrentIndex: 0,\n\t\tcurrentChunk: nil,\n\t}\n}", "title": "" }, { "docid": "ff1a14fe78d2b7bc2b1cbfe04a3ec959", "score": "0.45712683", "text": "func (t *Table) GetUint16(off UOffsetT) uint16 {\n\treturn GetUint16(t.Bytes[off:])\n}", "title": "" }, { "docid": "441e7c21941f21f93ed49dd8050f40fd", "score": "0.45700184", "text": "func (tsr *Uint32) CopyMetaData(frm Tensor) {\n\tfmap := frm.MetaDataMap()\n\tif len(fmap) == 0 {\n\t\treturn\n\t}\n\tif tsr.Meta == nil {\n\t\ttsr.Meta = make(map[string]string)\n\t}\n\tfor k, v := range fmap {\n\t\ttsr.Meta[k] = v\n\t}\n}", "title": "" } ]
c399c3cbd068e78b4dd9c1b87705d15d
Parses the result of the detection event and returns the aircraft flight ids.
[ { "docid": "5d262e1f5934925159b14503cfe6e89b", "score": "0.58704287", "text": "func (rb RadarBounds) parseFlightIDs(body *[]byte) (*[]FlightID, error) {\n\tflightIDs := []FlightID{}\n\tvar radarData []interface{}\n\t_ = json.Unmarshal(*body, &radarData)\n\n\t// parsing failed\n\tif len(radarData) == 0 {\n\t\treturn &flightIDs, errors.New(\"radar data returned nothing\")\n\t}\n\n\t// Get all the planes within radius. Will be under the first element in\n\t// returned list of values.\n\tplanes, ok := radarData[0].(map[string]interface{})\n\tif !ok {\n\t\treturn &flightIDs, errors.New(\"unable to get fids from radar data\")\n\t}\n\n\tfor fid, _ := range planes {\n\t\tflightIDs = append(flightIDs, FlightID{fid})\n\t}\n\n\treturn &flightIDs, nil\n}", "title": "" } ]
[ { "docid": "15d942ce7bd4765a870beb14f72afb92", "score": "0.5772628", "text": "func (rb RadarBounds) DetectFlights() (*[]FlightID, error) {\n\tqueryArgs := rb.detectUrlQuery()\n\tendpoint := fmt.Sprintf(\"%s/%s?%s\", apiDomainName, scannerRoute, queryArgs.Encode())\n\treq, err := http.NewRequest(\"GET\", endpoint, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tclient := &http.Client{}\n\treq.Header = headers\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t} else {\n\t\tdefer resp.Body.Close()\n\t}\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tflightIDs, err := rb.parseFlightIDs(&body)\n\n\treturn flightIDs, err\n}", "title": "" }, { "docid": "6c466fa55ee848dbfbe503b3fbd79239", "score": "0.49281427", "text": "func GetFlightInfo(id int) ([]FlightInfo, error) {\n\t// Open/Close database:\n\tdatabase, _ := sql.Open(\"sqlite3\", \"./pilotInfo.db\")\n\tdefer database.Close()\n\t// Initialise results:\n\tflightInfoList := make([]FlightInfo, 0)\n\t// Query flights:\n\tstatement, _ := database.Prepare(\"SELECT * FROM flights WHERE pilotID = $1\")\n\trows, err := statement.Query(id)\n\tif err != nil {\n\t\treturn flightInfoList, err\n\t}\n\tfor rows.Next() {\n\t\tvar flightInfo FlightInfo\n\t\tvar rowID int\n\t\terr := rows.Scan(&rowID, &flightInfo.PilotID, &flightInfo.DepDateTime, &flightInfo.ReturnDateTime) // scan contents of the current row into the instance\n\t\tif err != nil {\n\t\t\treturn flightInfoList, err\n\t\t}\n\t\tflightInfoList = append(flightInfoList, flightInfo)\n\t}\n\treturn flightInfoList, err\n}", "title": "" }, { "docid": "d8595d87677587b9861953402d0a4218", "score": "0.46547043", "text": "func Parse(ctx context.Context, response []byte, tgu string) {\n\n\t// file, err := os.Open(\"result.xml\")\n\t// if err != nil {\n\t// \tlog.Fatal(err.Error())\n\t// }\n\n\t// data, err := ioutil.ReadAll(response)\n\t// if err != nil {\n\t// \tlog.Fatal(err.Error())\n\t// }\n\n\t// var elementi XMLResponse\n\t// errxml := xml.Unmarshal(response, &elementi)\n\t// if errxml != nil {\n\t// \tlog.Fatal(errxml.Error())\n\t// }\n\n\t// fields := elementi.Body.GetTimVisionTrapsResponseResponse.Return.DeviceRows.Item.TrapsFields\n\t// fieldsSlice := strings.Split(fields, \",\")\n\t// for n, field := range fieldsSlice {\n\t// \tfmt.Println(n, field)\n\t// }\n\t// time.Sleep(5*time.Second)\n\t/*\n\t 0 creation_time\n\t 1 deviceId\n\t 2 deviceType\n\t 3 mode\n\t 4 modelName\n\t 5 originIPAddress\n\t 6 trap.orig_timestamp\n\t 7 trap.bitRateKbps\n\t 8 trap.body.averageBitrate\n\t 9 trap.body.avgSSKbps\n\t 10 trap.body.bufferingDuration\n\t 11 trap.body.callerClass\n\t 12 trap.body.callErrorCode\n\t 13 trap.body.callErrorMessage\n\t 14 trap.body.callErrorType\n\t 15 trap.body.callUrl\n\t 16 trap.body.errorDesc\n\t 17 trap.body.errorReason\n\t 18 trap.body.eventName\n\t 19 trap.body.fwUpgradeVersion\n\t 20 trap.body.levelBitrates\n\t 21 trap.body.lineSpeedKbps\n\t 22 trap.body.loUpgradeVersion\n\t 23 trap.body.maxSSChunkKbps\n\t 24 trap.body.maxSSKbps\n\t 25 trap.body.minSSKbps\n\t 26 trap.body.playingInterval\n\t 27 trap.body.raUpgradeVersion\n\t 28 trap.body.resType\n\t 29 trap.body.streamingType\n\t 30 trap.body.timeValue\n\t 31 trap.body.videoDuration\n\t 32 trap.body.videoPosition\n\t 33 trap.body.videoTitle\n\t 34 trap.body.videoType\n\t 35 trap.body.videoUrl\n\t 36 trap.eventType\n\t 37 trap.fwVersion\n\t 38 trap.loVersion\n\t 39 trap.networkType\n\t 40 trap.raVersion\n\t 41 trap.SNR\n\t 42 trap.timestamp\n\t 43 provider\n\n\t*/\n\n\tvar fruizioni = make(map[string]Output)\n\n\tvar archivio []string\n\tvar indiceVideoTitle, indiceEventName, indiceNetworkType, indiceEventType, indiceProvider, indiceVideoURL, indiceStreamingType int\n\tvar fieldsSlice []string\n\n\tscanner := bufio.NewScanner(bytes.NewReader(response))\n\tfor scanner.Scan() {\n\t\tline := scanner.Text()\n\t\t// fmt.Println(line) // debug\n\n\t\t// Se la linea è di tipo item\n\t\t// la mette in archivio\n\t\tif strings.HasPrefix(line, \"<item>\") {\n\n\t\t\t// elimina il tag iniziale\n\t\t\ttrap := strings.ReplaceAll(line, \"<item>\", \"\")\n\t\t\t// TODO: @Nahum gestire eventuale tag di chiusura\n\t\t\t// fmt.Println(trap)\n\n\t\t\t// Metti trap in archivio\n\t\t\tarchivio = append(archivio, trap)\n\t\t\t// for n, v := range archivio {\n\t\t\t// \tfmt.Println(n, v)\n\t\t\t// }\n\n\t\t}\n\n\t\t// Se la linea è di tipo traps_fields\n\t\t// bisogna elaborare i nomi campi e le traps raccolte\n\t\t// finora in archivio salvando gli elaborati in fruzioni.\n\t\tif strings.HasPrefix(line, \"<traps_fields>\") {\n\t\t\tfieldsSlice = strings.Split(line, \",\")\n\n\t\t\t// Trovo numero campo associato a quelli di interesse\n\t\t\tindiceVideoTitle = trovaIndice(fieldsSlice, \"trap.body.videoTitle\")\n\t\t\tindiceEventName = trovaIndice(fieldsSlice, \"trap.body.eventName\")\n\t\t\tindiceNetworkType = trovaIndice(fieldsSlice, \"trap.networkType\")\n\t\t\tindiceEventType = trovaIndice(fieldsSlice, \"trap.eventType\")\n\t\t\tindiceProvider = trovaIndice(fieldsSlice, \"provider\")\n\t\t\tindiceVideoURL = trovaIndice(fieldsSlice, \"trap.body.videoUrl\")\n\t\t\tindiceStreamingType = trovaIndice(fieldsSlice, \"trap.body.streamingType\")\n\n\t\t\tt := new(TrapRAW)\n\t\t\tt.Indici = fieldsSlice\n\t\t\tt.Traps = archivio\n\n\t\t\traw = append(raw, *t)\n\n\t\t\t// aggiungere altri se servono\n\n\t\t\t// Tratto le traps\n\t\t\tfor _, trap := range archivio {\n\n\t\t\t\t// Crea un Out vuoto nuovo per ogni trap\n\t\t\t\tvar out Output\n\n\t\t\t\t// Splitta la trap nei suoi elementi creando una slice\n\t\t\t\ttrapSlice := strings.Split(trap, \",\")\n\t\t\t\t// for n, v := range trapSlice {\n\t\t\t\t// \tfmt.Println(n, v)\n\t\t\t\t// }\n\n\t\t\t\t//Salta le trap vuote\n\t\t\t\tif len(trapSlice) < 2 {\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\n\t\t\t\t// Creo hash per archiaviare le fruizioni\n\t\t\t\thash := md5.New()\n\t\t\t\t// Come valori per l'hash aggiungo cpeid e videotitle\n\t\t\t\thash.Write([]byte(trapSlice[1] + trapSlice[2] + trapSlice[indiceVideoTitle])) // magari togliere il secondo\n\t\t\t\t// nomehash è l'has in versione esadecimale\n\t\t\t\tnomehash := fmt.Sprintf(\"%x\", hash.Sum(nil))\n\n\t\t\t\t// TODO: @Nahum implementare gestione inizio e fine fruizione\n\n\t\t\t\t// Se l'hash esiste già recupera il valore val dalla mappa\n\t\t\t\t// e lo assegna ad out.\n\t\t\t\tif val, ok := fruizioni[nomehash]; ok {\n\t\t\t\t\tout = val\n\t\t\t\t}\n\n\t\t\t\tout.CpeID = trapSlice[1]\n\t\t\t\tout.Mode = trapSlice[3]\n\t\t\t\tout.ModelName = trapSlice[4]\n\t\t\t\tout.VideoTitle = trapSlice[indiceVideoTitle]\n\t\t\t\tout.NetworkType = trapSlice[indiceNetworkType]\n\t\t\t\tout.IsAlice = trapSlice[indiceProvider]\n\t\t\t\tout.TGU = tgu\n\t\t\t\tout.StreamingType = trapSlice[indiceStreamingType]\n\n\t\t\t\t// elabora il campo url\n\t\t\t\tu, err := url.Parse(trapSlice[indiceVideoURL])\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(err)\n\t\t\t\t}\n\n\t\t\t\tout.FQDN = u.Hostname()\n\n\t\t\t\t// Trova la location per trattare correttamente il passaggio\n\t\t\t\t// del fuso orario da UTC e per gestire l'ora solare/legale.\n\t\t\t\tromebytes, err := base64.StdEncoding.DecodeString(rome)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"impossibile decodificare roma\")\n\t\t\t\t}\n\n\t\t\t\tlocation, err := time.LoadLocationFromTZData(\"Europe/Rome\", romebytes)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Println(\"errore con la location per i fusiorari\")\n\t\t\t\t}\n\n\t\t\t\t// Elabora Inzio e fine fruizione\n\t\t\t\tswitch trapSlice[indiceEventName] {\n\t\t\t\tcase \"PLAY\":\n\t\t\t\t\tstarTS, err := time.Parse(\"2006-01-02T15:04:05Z\", trapSlice[0])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(err.Error())\n\t\t\t\t\t}\n\t\t\t\t\tout.StartTS = starTS.In(location).Format(\"2006-01-02T15:04:05-0700\")\n\t\t\t\tcase \"STOP\":\n\t\t\t\t\tendTS, err := time.Parse(\"2006-01-02T15:04:05Z\", trapSlice[0])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\tlog.Println(err.Error())\n\t\t\t\t\t}\n\t\t\t\t\tout.EndTS = endTS.In(location).Format(\"2006-01-02T15:04:05-0700\")\n\t\t\t\t}\n\n\t\t\t\t// Conto buffering ed errori\n\t\t\t\tswitch trapSlice[indiceEventType] {\n\t\t\t\tcase \"buffering\":\n\t\t\t\t\tout.Buffering++\n\n\t\t\t\t\t//TODO: gestire longbuffering\n\t\t\t\tcase \"playerError\":\n\t\t\t\t\tout.PlayerError++\n\t\t\t\t}\n\n\t\t\t\t// Salva out modificato nella mappa fruizioni\n\t\t\t\tfruizioni[nomehash] = out\n\n\t\t\t}\n\n\t\t\t// Finita l'elaborazione delle trap in archivio\n\t\t\t// si può ripulire l'archivio e i nomi campi\n\t\t\t// per prepararli a un nuovo ciclo.\n\t\t\t// Le trap elaborate sono archiviate in fruizioni.\n\n\t\t\tarchivio = []string{}\n\t\t\tfieldsSlice = []string{}\n\t\t}\n\t\t// Riprende il ciclo iniziale alla ricerca di altre\n\t\t// linee con tag iniziale <item>\n\t}\n\n\t// Costruisce una lista delle chiavi hash della mappa fruizioni.\n\tchiaviFruizioni := make([]string, 0, len(fruizioni))\n\tfor key := range fruizioni {\n\t\tchiaviFruizioni = append(chiaviFruizioni, key)\n\t}\n\n\t// fmt.Println(len(fruizioni))\n\t// fmt.Println(fruizioni)\n\n\tfor _, key := range chiaviFruizioni {\n\n\t\t// Non mostra le fruizioni senza titolo\n\t\tif fruizioni[key].VideoTitle == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\tfmt.Println(fruizioni[key])\n\n\t}\n\n\t// for _, e := range archivio {\n\t// \tfmt.Println(e)\n\t// }\n\n\t// Avvia il salvataggio su file delle fruizioni.\n\tsalvaXLSX(ctx, tgu, fruizioni, raw) // TODO: gestire errore\n\treturn\n}", "title": "" }, { "docid": "c951fcd010c8325391af38589b9c3a3c", "score": "0.4653675", "text": "func GetAllFlightsInfo() ([]FlightInfo, error) {\n\t// Open/Close database:\n\tdatabase, _ := sql.Open(\"sqlite3\", \"./pilotInfo.db\")\n\tdefer database.Close()\n\t// Initialise results:\n\tflightsInfo := make([]FlightInfo, 0)\n\t// Query flights:\n\tstatement, _ := database.Prepare(\"SELECT * FROM flights\")\n\trows, err := statement.Query()\n\tif err != nil {\n\t\treturn flightsInfo, err\n\t}\n\tfor rows.Next() {\n\t\tvar flightInfo FlightInfo\n\t\tvar rowID int\n\t\terr := rows.Scan(&rowID, &flightInfo.PilotID, &flightInfo.DepDateTime, &flightInfo.ReturnDateTime) // scan contents of the current row into the instance\n\t\tif err != nil {\n\t\t\treturn flightsInfo, err\n\t\t}\n\t\tflightsInfo = append(flightsInfo, flightInfo)\n\t}\n\treturn flightsInfo, err\n}", "title": "" }, { "docid": "a3b4dd2f22b278154f4100b251e432e4", "score": "0.4600903", "text": "func parseSSHResult(lines []string) ([]Bot, error) {\n\tbots := []Bot{}\n\tfor _, l := range lines {\n\t\tif matches := edgeswitchLine.FindStringSubmatch(l); matches != nil {\n\t\t\tport, err := strconv.ParseInt(matches[2], 10, 0)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"Unexpected formatting error. %s is not an int: %s\", matches[2], err)\n\t\t\t}\n\t\t\tbots = append(bots, Bot{MACAddress: strings.ToUpper(matches[1]), Port: int(port)})\n\t\t}\n\t}\n\treturn bots, nil\n}", "title": "" }, { "docid": "1bb965aaa0ba836eb59fe1c223f5e1df", "score": "0.4426089", "text": "func handleFlightLogEventsRequest(args []string, w http.ResponseWriter, r *http.Request) {\n\t\n\tdb, err := openDatabase()\n\tif (err != nil) {\n \thttp.Error(w, err.Error(), http.StatusInternalServerError)\n \treturn\n\t}\n\tdefer db.Close()\n\t\n\tif (len(args) < 1) {\n\t\thttp.Error(w, \"/flightlog/events requires a flight id parameter\", http.StatusBadRequest)\n \treturn\n\t}\n\t\n\tflight, err := strconv.Atoi(args[0])\n\tif (err != nil) {\n\t\thttp.Error(w, \"Invalid flight ID value\", http.StatusBadRequest)\n \treturn\n\t}\n\t\t\n\tvar count int64 \n\tcount = getCount(fmt.Sprintf(\"SELECT COUNT(*) FROM events WHERE startup_id = %d;\", flight), db)\n\t\n\tsql := fmt.Sprintf(\"SELECT * FROM events WHERE startup_id = %d ORDER BY timestamp_id ASC LIMIT 1000;\", flight);\n m, err := gosqljson.QueryDbToMapJSON(db, \"any\", sql)\n if err != nil {\n \thttp.Error(w, err.Error(), http.StatusBadRequest)\n \treturn\n }\n\n\tret := fmt.Sprintf(\"{\\\"count\\\": %d, \\\"data\\\": %s}\", count, m)\n\tsetNoCache(w)\n\tsetJSONHeaders(w)\n\tfmt.Fprintf(w, \"%s\\n\", ret)\n}", "title": "" }, { "docid": "4c85cb84c7cb66d785d1a187e355c4cc", "score": "0.44251624", "text": "func (conn *dbconn) GetDetectionsInfoForDevice(_DeviceID string) ([]domain.DetectionInfo, error) {\n\tvar err error\n\tvar retDetectionInfo = make([]domain.DetectionInfo, 0)\n\n\tconn.Read(&connection.Procedure{\n\t\tProc: \"GetDetectionsInfoForDevice\",\n\t\tParameters: []interface{}{_DeviceID},\n\t\tCallback: func(results interface{}, dberr error) {\n\t\t\terr = dberr\n\n\t\t\tif err == nil {\n\n\t\t\t\terr = conn.getRows(results,\n\t\t\t\t\tfunc(rows *sql.Rows) (err error) {\n\t\t\t\t\t\tif err = rows.Err(); err == nil {\n\n\t\t\t\t\t\t\tvar myID string\n\t\t\t\t\t\t\tvar myOrganizationID string\n\t\t\t\t\t\t\tvar mySourceID string\n\t\t\t\t\t\t\tvar myDeviceID string\n\t\t\t\t\t\t\tvar myVulnerabilityID string\n\t\t\t\t\t\t\tvar myIgnoreID *string\n\t\t\t\t\t\t\tvar myAlertDate time.Time\n\t\t\t\t\t\t\tvar myLastFound *time.Time\n\t\t\t\t\t\t\tvar myLastUpdated *time.Time\n\t\t\t\t\t\t\tvar myProof string\n\t\t\t\t\t\t\tvar myPort int\n\t\t\t\t\t\t\tvar myProtocol string\n\t\t\t\t\t\t\tvar myActiveKernel *int\n\t\t\t\t\t\t\tvar myDetectionStatusID int\n\t\t\t\t\t\t\tvar myTimesSeen int\n\t\t\t\t\t\t\tvar myUpdated time.Time\n\n\t\t\t\t\t\t\tif err = rows.Scan(\n\n\t\t\t\t\t\t\t\t&myID,\n\t\t\t\t\t\t\t\t&myOrganizationID,\n\t\t\t\t\t\t\t\t&mySourceID,\n\t\t\t\t\t\t\t\t&myDeviceID,\n\t\t\t\t\t\t\t\t&myVulnerabilityID,\n\t\t\t\t\t\t\t\t&myIgnoreID,\n\t\t\t\t\t\t\t\t&myAlertDate,\n\t\t\t\t\t\t\t\t&myLastFound,\n\t\t\t\t\t\t\t\t&myLastUpdated,\n\t\t\t\t\t\t\t\t&myProof,\n\t\t\t\t\t\t\t\t&myPort,\n\t\t\t\t\t\t\t\t&myProtocol,\n\t\t\t\t\t\t\t\t&myActiveKernel,\n\t\t\t\t\t\t\t\t&myDetectionStatusID,\n\t\t\t\t\t\t\t\t&myTimesSeen,\n\t\t\t\t\t\t\t\t&myUpdated,\n\t\t\t\t\t\t\t); err == nil {\n\n\t\t\t\t\t\t\t\tnewDetectionInfo := &dal.DetectionInfo{\n\t\t\t\t\t\t\t\t\tIDvar: myID,\n\t\t\t\t\t\t\t\t\tOrganizationIDvar: myOrganizationID,\n\t\t\t\t\t\t\t\t\tSourceIDvar: mySourceID,\n\t\t\t\t\t\t\t\t\tDeviceIDvar: myDeviceID,\n\t\t\t\t\t\t\t\t\tVulnerabilityIDvar: myVulnerabilityID,\n\t\t\t\t\t\t\t\t\tIgnoreIDvar: myIgnoreID,\n\t\t\t\t\t\t\t\t\tAlertDatevar: myAlertDate,\n\t\t\t\t\t\t\t\t\tLastFoundvar: myLastFound,\n\t\t\t\t\t\t\t\t\tLastUpdatedvar: myLastUpdated,\n\t\t\t\t\t\t\t\t\tProofvar: myProof,\n\t\t\t\t\t\t\t\t\tPortvar: myPort,\n\t\t\t\t\t\t\t\t\tProtocolvar: myProtocol,\n\t\t\t\t\t\t\t\t\tActiveKernelvar: myActiveKernel,\n\t\t\t\t\t\t\t\t\tDetectionStatusIDvar: myDetectionStatusID,\n\t\t\t\t\t\t\t\t\tTimesSeenvar: myTimesSeen,\n\t\t\t\t\t\t\t\t\tUpdatedvar: myUpdated,\n\t\t\t\t\t\t\t\t}\n\n\t\t\t\t\t\t\t\tretDetectionInfo = append(retDetectionInfo, newDetectionInfo)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\n\t\t\t\t\t\treturn err\n\t\t\t\t\t})\n\t\t\t}\n\t\t},\n\t})\n\n\treturn retDetectionInfo, err\n}", "title": "" }, { "docid": "f614a60c124220fe5ce58297af837a6d", "score": "0.4418239", "text": "func parseAFDOVersion(ver string) ([AFDO_VERSION_LENGTH]int, error) {\n\tmatches := AFDO_VERSION_REGEX.FindStringSubmatch(ver)\n\tvar matchInts [AFDO_VERSION_LENGTH]int\n\tif len(matches) == AFDO_VERSION_REGEX_EXPECT_MATCHES {\n\t\tfor idx, a := range matches[1:] {\n\t\t\ti, err := strconv.Atoi(a)\n\t\t\tif err != nil {\n\t\t\t\treturn matchInts, fmt.Errorf(\"Failed to parse int from regex match string; is the regex incorrect?\")\n\t\t\t}\n\t\t\tmatchInts[idx] = i\n\t\t}\n\t\treturn matchInts, nil\n\t} else {\n\t\treturn matchInts, errInvalidVersion\n\t}\n}", "title": "" }, { "docid": "6e7adb12377c1b4e7c76abe32c1fd6ea", "score": "0.44041264", "text": "func processNasaResponse(nasaResponse model.NasaClientResponse) []string {\n\timageUrls := make([]string, 0)\n\n\t// If Photos do not exist\n\tif len(nasaResponse.Photos) == 0 {\n\t\t// Return the empty imageUrls\n\t\treturn imageUrls\n\t}\n\n\t// For every Photo in the response from nasa\n\tfor _, p := range nasaResponse.Photos {\n\t\t// Append the imgSrc to the imageUrls\n\t\timageUrls = append(imageUrls, p.ImgSrc)\n\t\t// If imageUrls is 3 photos full\n\t\tif len(imageUrls) == 3 {\n\t\t\t// Return imageUrls\n\t\t\treturn imageUrls\n\t\t}\n\t}\n\n\treturn imageUrls\n}", "title": "" }, { "docid": "a4a44fd51c2066347624003231488e71", "score": "0.43846163", "text": "func InitialIDsFilter(filename string) IDsFilter {\n\tvar EventDataDict map[int]EventsWithCountID\n\tvar InfectEventDataDict map[int]InfectEventData\n\tEventDataDict = make(map[int]EventsWithCountID)\n\tInfectEventDataDict = make(map[int]InfectEventData)\n\n\tfile, err := os.Open(\"../output/\" + filename + \"Data/\" + filename + \"Events.txt\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdefer file.Close()\n\n\tscanner := bufio.NewScanner(file)\n\tfor scanner.Scan() {\n\t\tparams := strings.Split(scanner.Text(), \"#\")\n\n\t\tattributes := strings.Split(params[0], \",\")\n\t\tcount, _ := strconv.Atoi(attributes[1])\n\t\trid, _ := strconv.Atoi(attributes[0])\n\t\t// l, _ := strconv.ParseFloat(attributes[2], 32)\n\n\t\tEventsStr := strings.Split(params[1], \",\")\n\t\tEvents := []int{}\n\t\tfor _, t := range EventsStr {\n\t\t\tit, _ := strconv.Atoi(t)\n\t\t\tEvents = append(Events, it)\n\t\t}\n\n\t\tEventDataDict[rid] = EventsWithCountID{count, rid, Events}\n\t\tInfectEventDataDict[rid] = GetInfectEvent(Events, 1)\n\t}\n\tvar AverageEventDataDict AverageEventDataDict\n\tvar outputFileName string\n\tif filename == \"air\"{\n\t\toutputFileName = \"../output/airData/airEventsAverages.json\"\n\t} else if filename == \"congestion\" || filename == \"congestion2\"{\n\t\toutputFileName = \"../output/congestion2Data/congestion2Averages.json\"\n\t} else if filename == \"flow\" {\n\t\toutputFileName = \"../output/flowData/flowAverages.json\"\n\t}\n\tfileAve, errAve := os.Open(outputFileName)\n\tif errAve != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer fileAve.Close()\n\tbyteValue, _ := ioutil.ReadAll(fileAve)\n\tjson.Unmarshal(byteValue, &AverageEventDataDict)\n\tmyIDsFilter := IDsFilter{EventDataDict, InfectEventDataDict, AverageEventDataDict}\n\treturn myIDsFilter\n}", "title": "" }, { "docid": "7596cf8dfcd6117422f99ec2a957d6e1", "score": "0.43800494", "text": "func UnmarshalAcdCartridges(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(AcdCartridges)\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"status\", &obj.Status)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"statusCode\", &obj.StatusCode)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"statusLocation\", &obj.StatusLocation)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"startTime\", &obj.StartTime)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"endTime\", &obj.EndTime)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"duration\", &obj.Duration)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"correlationId\", &obj.CorrelationID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"artifactResponseCode\", &obj.ArtifactResponseCode)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"artifactResponse\", &obj.ArtifactResponse, UnmarshalServiceError)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "a6a5206e9bf711a5a3fb31b488a81a4f", "score": "0.4321872", "text": "func getAs4(rip []string) []string {\n\tvar ases []string\n\tvar ip string\n\tvar i int\n\n\tfor i = len(rip) - 1; i >= 0; i-- {\n\t\tip += rip[i] + \".\"\n\t}\n\tfor i = len(rip); i < 4; i++ {\n\t\tip += \"0.\"\n\t}\n\tip = ip[:len(ip)-1]\n\tif debug {\n\t\tLog.Debug(\"IPv4 request received: \" + ip + \"/32\")\n\t}\n\tif _, _, err := net.ParseCIDR(ip + \"/32\"); err != nil {\n\t\tLog.Warning(\"Invalid IPv4\")\n\t\treturn nil\n\t}\n\tASList.s.RLock()\n\tdefer ASList.s.RUnlock()\n\tfor s, v, ok := ASList.RPfx.LongestPrefix(table.CidrToRadixkey(ip + \"/32\")); ok == true && len(s) > 0; s, v, ok = ASList.RPfx.LongestPrefix(s[:len(s)-1]) {\n\t\tdata := v.([]string)\n\t\tif len(data[0][2:]) > 2 {\n\t\t\t_, ok = ASList.As[data[0]]\n\t\t\tif ok {\n\t\t\t\tGetAsn(data[0][2:])\n\t\t\t}\n\n\t\t\tres := data[0][2:] + \" | \" + data[1]\n\t\t\t_, ok = ASList.DelegAs[data[0][2:]]\n\t\t\tif ok {\n\t\t\t\tres += \" | \" + ASList.DelegAs[data[0][2:]].CC + \" | \" + ASList.DelegAs[data[0][2:]].Rir + \" | \" + ASList.DelegAs[data[0][2:]].Date\n\t\t\t} else {\n\t\t\t\tres += \" | | |\"\n\t\t\t}\n\t\t\tres += \" | \" + ASList.As[data[0]].ASName\n\t\t\tases = append(ases, res)\n\t\t}\n\t}\n\treturn ases\n}", "title": "" }, { "docid": "93d985251b9698677d8df50e66d2b093", "score": "0.43194872", "text": "func validateResult(ctx context.Context, d *androidui.Device, expectations []Expectation) error {\n\ttesting.ContextLog(ctx, \"Validating result in ArcFileReaderTest\")\n\n\tfor _, e := range expectations {\n\t\tif err := validateLabel(ctx, d, e); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4bcc091d6b3933fb3dabb75183bea7e2", "score": "0.42989805", "text": "func convertInterfaceStatusesFromAgentJSON(agentResult []Interface) []api.InterfaceStatus {\n\tinterfaceStatuses := []api.InterfaceStatus{}\n\tfor _, ifc := range agentResult {\n\t\tif ifc.Name == \"lo\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tinterfaceIP, interfaceIPs := extractIPs(ifc.IPs)\n\t\tinterfaceStatuses = append(interfaceStatuses, api.InterfaceStatus{\n\t\t\tMac: ifc.MAC,\n\t\t\tIp: interfaceIP,\n\t\t\tIPs: interfaceIPs,\n\t\t\tInterfaceName: ifc.Name,\n\t\t})\n\t}\n\treturn interfaceStatuses\n}", "title": "" }, { "docid": "9bc5f6dbafb79169bc58f9af1c22dac1", "score": "0.42570892", "text": "func (g *Gateway) processDiscovery(data string) {\n\tdevIDs := make([]string, 0)\n\terr := json.Unmarshal([]byte(data), &devIDs)\n\tif err != nil {\n\t\tLOGGER.Error(\"Failed to get device list: %s\", err.Error())\n\t\treturn\n\t}\n\n\tfor _, v := range devIDs {\n\t\tg.commandWithSid(cmdGetDeviceState, map[string]interface{}{}, v)\n\t}\n}", "title": "" }, { "docid": "be5a3d3ca5e928d7fc7314aa57351ada", "score": "0.42417917", "text": "func GetAllFlights() ([]*FlightModel, error) {\n rows, err := common.GetRows(\"flights\")\n if err != nil {\n return nil, err\n }\n\n defer rows.Close()\n\n var flights []*FlightModel\n for rows.Next() {\n flight, err := scanFlights(rows)\n if err != nil {\n return nil, fmt.Errorf(\"ERROR --> mysql: could not read row: %v\", err)\n }\n\n flights = append(flights, flight)\n }\n\n return flights, nil\n}", "title": "" }, { "docid": "f1207572edf7a09ef29f8aa0a300d14c", "score": "0.42352208", "text": "func (cg *goCachegrind) parseEvents(line string) {\n\tevents = strings.Split(line, \" \")\n}", "title": "" }, { "docid": "667dd7a4a40261f1cf3ff86475e78cc7", "score": "0.42276895", "text": "func VacancyDetect(xbiz *XBusiness, d1, d2 *time.Time, r *Rentable) []VacancyMarker {\n\tvar m []VacancyMarker\n\tvar state int64\n\n\t//==================================================================\n\t// Whether it's vacant or not depends on its state. For example,\n\t// if it is OwnerOccupied, no rent is collected and it is not\n\t// considered vacant. So, the first thing to do is cache the\n\t// Rentable state over the period\n\t//==================================================================\n\trsa := GetRentableStatusByRange(r.RID, d1, d2)\n\n\t//=====================================================================================\n\t// In the loop below, we don't want to read the database every iteration\n\t// for the RTID associated with the rentable as it would result in excessive database\n\t// reatds. In most cases, the RTID will not change, especially over short periods like\n\t// a month. So, read all the RTIDs for the period that the loop will process first.\n\t// then select from them as needed.\n\t//=====================================================================================\n\trta := GetRentableTypeRefsByRange(r.RID, d1, d2) // get the list\n\tif len(rta) == 0 {\n\t\tUlog(\"VacancyDetect: No valid RTID for rentable R%08d during period %s to %s\\n\",\n\t\t\tr.RID, d1.Format(RRDATEINPFMT), d2.Format(RRDATEINPFMT))\n\t\treturn m // this is bad! No RTID for the supplied time range\n\t}\n\t// rtidMulti := len(rta) > 1 // flag to indicate we need to look for a change in rtid in every pass\n\trtid := rta[0].RTID // initialize to the first RTID\n\n\t// We may not need to do anything if this rentable is not being managed to budget. We didn't\n\t// check it earlier because the code to load the rentable type is here. If there's an issue,\n\t// just move the code to grabe the RTIDs to the caller and pass the array into this func.\n\tif xbiz.RT[rtid].ManageToBudget == 0 { // if this rentable is not managing to budget...\n\t\treturn m // return an empty list now and it will essentially be ignored.\n\t}\n\n\tperiod := CycleDuration(xbiz.RT[rtid].Proration, *d1)\n\tt := GetAgreementsForRentable(r.RID, d1, d2) // t is an array of RentalAgreementRentables\n\n\t//========================================================\n\t// Mark vacancy for each time interval between d1 & d2\n\t//========================================================\n\tvar dtNext time.Time\n\tk := 0 // number of members of m\n\tfor dt := *d1; dt.Before(*d2); dt = dtNext {\n\t\tdtNext = dt.Add(period)\n\t\tvacant := true // assume it's vacant and reset if we find it's rented\n\n\t\t// fmt.Printf(\"VacancyDetect: %s (%d), period %s - %s\\n\", r.Name, r.RID, dt.Format(RRDATEINPFMT), dtNext.Format(RRDATEINPFMT))\n\n\t\trs := SelectRentableStatusForPeriod(&rsa, dt, dtNext)\n\t\tstate = RENTABLESTATUSONLINE // if there is no state info, we'll assume online\n\t\tif len(rs) > 0 {\n\t\t\tstate = rs[0].Status // If this turns out to be a problem, maybe we'll choose the state with the greatest percentage of time\n\t\t}\n\n\t\tswitch state {\n\t\tcase RENTABLESTATUSONLINE:\n\t\t\t// fmt.Printf(\"\\tonline... \")\n\t\t\tfor i := 0; i < len(t); i++ {\n\t\t\t\tif DateRangeOverlap(&t[i].RARDtStart, &t[i].RARDtStop, &dt, &dtNext) {\n\t\t\t\t\t// fmt.Printf(\"covered, RAID = %d\\n\", t[i].RAID)\n\t\t\t\t\tvacant = false // not vacant\n\t\t\t\t}\n\t\t\t}\n\t\tcase RENTABLESTATUSADMIN:\n\t\t\tfallthrough\n\t\tcase RENTABLESTATUSEMPLOYEE:\n\t\t\tfallthrough\n\t\tcase RENTABLESTATUSOWNEROCC:\n\t\t\tfallthrough\n\t\tcase RENTABLESTATUSOFFLINE:\n\t\t\t// fmt.Printf(\"\\t{admin|employee|ownerocc|offline}...\\n\")\n\t\t}\n\n\t\t// fmt.Printf(\"VacancyDetect: vacant = %v\\n\", vacant)\n\n\t\tif !vacant {\n\t\t\tcontinue\n\t\t}\n\n\t\trsa, err := GetRentableSpecialtyTypesForRentableByRange(r, &dt, &dtNext) // this gets an array of rentable specialties that overlap this time period\n\t\tif err != nil {\n\t\t\tUlog(\"VacancyDetect: Error retrieving rentable specialties for rentable R%08d during period %s to %s\\n\",\n\t\t\t\tr.RID, dt.Format(RRDATEINPFMT), dtNext.Format(RRDATEINPFMT))\n\t\t\treturn m // this is bad! No RTID for the supplied time range\n\n\t\t}\n\n\t\t// fmt.Printf(\"dt = %s, dtNext = %s, r = %s(%d), len(rta) = %d, len(rsa) = %d\\n\",\n\t\t// \tdt.Format(\"Jan 2\"), dtNext.Format(\"Jan 2\"), r.Name, r.RID, len(rta), len(rsa))\n\t\t// for iq := 0; iq < len(rta); iq++ {\n\t\t// \tfmt.Printf(\"rta[%d] = (%s - %s) RTID = %d\\n\", iq, rta[iq].DtStart.Format(\"1/2/06\"), rta[iq].DtStop.Format(\"1/2/06\"), rta[iq].RTID)\n\t\t// }\n\n\t\trentThisPeriod := CalculateGSR(dt, dtNext, r, &rta, rsa, xbiz)\n\t\t// fmt.Printf(\"rentThisPeriod = %8.2f\\n\", rentThisPeriod)\n\n\t\t//------------------------------------------------\n\t\t// optimization to compress consecutive days...\n\t\t//------------------------------------------------\n\t\tif k > 0 { // If the last entry's DtStop is the same time this one's DtStart...\n\t\t\tif m[k-1].DtStop.Equal(dt) && m[k-1].State == state { // and the umr is at the same rate...\n\t\t\t\t// m[k-1].Amount += umr * pf // add another increment to the amount\n\t\t\t\tm[k-1].DtStop = dtNext // then we'll just adjust the end of that range to include this range too.\n\t\t\t\tm[k-1].Amount += rentThisPeriod // add the rent for this time increment\n\t\t\t\tm[k-1].Comment = fmt.Sprintf(\"vacant %s - %s\", m[k-1].DtStart.Format(\"Jan 2\"), m[k-1].DtStop.Format(\"Jan 2\"))\n\t\t\t\tcontinue // Range extended. Next!\n\t\t\t}\n\t\t}\n\n\t\tvar v VacancyMarker // ok, this is either the first entry or\n\t\tv.DtStart = dt // it is disjoint from the last range\n\t\tv.DtStop = dtNext // fill it out and\n\t\tv.State = state // note the cause of the vacancy\n\t\tv.Amount = rentThisPeriod // save the rate so we don't need to look it up later\n\t\t// v.Amount = umr * pf // save the rate so we don't need to look it up later\n\t\tv.Comment = fmt.Sprintf(\"vacant %s - %s\", v.DtStart.Format(\"Jan 2\"), v.DtStop.Format(\"Jan 2\"))\n\t\tm = append(m, v) // add the new VacancyMarker to the list\n\t\tk++\n\t}\n\treturn m\n}", "title": "" }, { "docid": "bf7b59d6b6ebcccc635868edb7667450", "score": "0.42049775", "text": "func parseOperationDevicesGetAirlinkProxyAirlinkbeResult(resp0 *devices.GetAirlinkProxyAirlinkbeOK, respErr error) (string, error) {\n\tif respErr != nil {\n\n\t\tvar iResp0 interface{} = respErr\n\t\tresp0, ok := iResp0.(*devices.GetAirlinkProxyAirlinkbeOK)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp0) && !swag.IsZero(resp0.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp0.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\tvar iResp1 interface{} = respErr\n\t\tresp1, ok := iResp1.(*devices.GetAirlinkProxyAirlinkbeBadRequest)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp1) && !swag.IsZero(resp1.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp1.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\tvar iResp2 interface{} = respErr\n\t\tresp2, ok := iResp2.(*devices.GetAirlinkProxyAirlinkbeUnauthorized)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp2) && !swag.IsZero(resp2.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp2.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\tvar iResp3 interface{} = respErr\n\t\tresp3, ok := iResp3.(*devices.GetAirlinkProxyAirlinkbeForbidden)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp3) && !swag.IsZero(resp3.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp3.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\tvar iResp4 interface{} = respErr\n\t\tresp4, ok := iResp4.(*devices.GetAirlinkProxyAirlinkbeInternalServerError)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp4) && !swag.IsZero(resp4.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp4.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\tvar iResp5 interface{} = respErr\n\t\tresp5, ok := iResp5.(*devices.GetAirlinkProxyAirlinkbeBadGateway)\n\t\tif ok {\n\t\t\tif !swag.IsZero(resp5) && !swag.IsZero(resp5.Payload) {\n\t\t\t\tmsgStr, err := json.Marshal(resp5.Payload)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn \"\", err\n\t\t\t\t}\n\t\t\t\treturn string(msgStr), nil\n\t\t\t}\n\t\t}\n\n\t\treturn \"\", respErr\n\t}\n\n\tif !swag.IsZero(resp0) && !swag.IsZero(resp0.Payload) {\n\t\tmsgStr, err := json.Marshal(resp0.Payload)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\treturn string(msgStr), nil\n\t}\n\n\treturn \"\", nil\n}", "title": "" }, { "docid": "e44410a1bffc9163a00a39474445f4d4", "score": "0.4184457", "text": "func Json2Flights(jsonStr string) []Flight {\n\tsMsg := Ns5MessageCollectionSingleMessage{}\n\tmMsg := Ns5MessageCollectionMultiMessage{}\n\n\t// We need to try both single and multi, as they are incompatible in what type they\n\t// assign to the `message` JSON field. Do multi first, as they're most common.\n\tif err := json.Unmarshal([]byte(jsonStr), &mMsg); err == nil {\n\t\tflights := []Flight{}\n\t\tfor _,m := range mMsg.Ns5MessageCollection.Message {\n\t\t\tflights = append(flights, m.Flight)\n\t\t}\n\t\treturn flights\n\n\t} else if err2 := json.Unmarshal([]byte(jsonStr), &sMsg); err2 == nil {\n\t\treturn []Flight{sMsg.Ns5MessageCollection.Message.Flight}\n\n\t} else {\n\t\t// If you start to care about the per-field error handling,\n\t\t// https://www.alexedwards.net/blog/how-to-properly-parse-a-json-request-body\n\t\t// https://golang.org/src/encoding/json/decode.go\n\t\t// fmt.Errorf(\"ParseFlightMessage: not multi or single: <%v>, <%v>\", err, err2)\n\t\treturn []Flight{}\n\t}\n}", "title": "" }, { "docid": "13b2da87005b7aec5b966e8dac128525", "score": "0.4179794", "text": "func FuzzResultsFormatDetection(fuzz []byte) int {\n\tdecoder := DecoderFor(bytes.NewReader(fuzz))\n\tif decoder == nil {\n\t\treturn 0\n\t}\n\tok := readAllResults(decoder)\n\tif !ok {\n\t\treturn 0\n\t}\n\treturn 1\n}", "title": "" }, { "docid": "c376e77e1987fddf714e3b43aeffec5e", "score": "0.4144215", "text": "func (_WizardNFT *WizardNFTFilterer) ParseWizardAffinityAssigned(log types.Log) (*WizardNFTWizardAffinityAssigned, error) {\n\tevent := new(WizardNFTWizardAffinityAssigned)\n\tif err := _WizardNFT.contract.UnpackLog(event, \"WizardAffinityAssigned\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "45c0eb60a93973513b822cfe7d21455f", "score": "0.41366664", "text": "func parseInterfaces(agentReply string) ([]api.InterfaceStatus, error) {\n\tinterfaces := []Interface{}\n\tresponse := stripAgentResponse(agentReply)\n\n\terr := json.Unmarshal([]byte(response), &interfaces)\n\tif err != nil {\n\t\treturn []api.InterfaceStatus{}, err\n\t}\n\n\tresultInterfaces := convertInterfaceStatusesFromAgentJSON(interfaces)\n\n\treturn resultInterfaces, nil\n}", "title": "" }, { "docid": "36832824ba0ffd964823c5f73c225c46", "score": "0.41318664", "text": "func parseNagLine(line string) (*CheckResult, error) {\n lineBits := strings.Split(line, \"\\t\")\n\n if len(lineBits) <= 8 {\n return nil, fmt.Errorf(\"Line doesn't split into at least 9 tab-separated strings: [%s]\", line)\n }\n\n if lineBits[0] != \"[HOSTPERFDATA]\" && lineBits[0] != \"[SERVICEPERFDATA]\" {\n return nil, fmt.Errorf(\"rejecting this line as first string is neither '[HOSTPERFDATA]' nor '[SERVICEPERFDATA]': [%s]\", line)\n }\n \n timestamp, err := strconv.Atoi(lineBits[1])\n if err != nil {\n return nil, fmt.Errorf(\"rejecting this line as second string doesn't look like a timestamp: [%s]\", line)\n }\n \n entity := lineBits[2] // $HOSTNAME$\n check := lineBits[3] // $SERVICEDESC$, \"HOST\"\n state := lineBits[4] // $SERVICESTATE$, $HOSTSTATE$\n // checkTime := lineBits[5] // $SERVICEEXECUTIONTIME$, $HOSTEXECUTIONTIME$\n // checkLatency := lineBits[6] // $SERVICELATENCY$, $HOSTLATENCY$\n checkOutput := lineBits[7] // $SERVICEOUTPUT$, $HOSTOUTPUT$\n checkPerfdata := lineBits[8] // $SERVICEPERFDATA$, $HOSTPERFDATA$\n \n checkLongOutput := \"\"\n if len(lineBits) >= 10 {\n checkLongOutput = strings.Replace(lineBits[9], \"\\\\n\", \"\\n\", -1)\n }\n\n if strings.ToLower(state) == \"up\" {\n state = \"ok\"\n }\n\n if strings.ToLower(state) == \"down\" {\n state = \"critical\"\n }\n \n details := \"\"\n if len(checkLongOutput) > 0 {\n details = checkLongOutput\n }\n\n return &CheckResult{\n \"service\", // Type\n state, // State\n entity, // Entity\n check, // Check\n checkOutput, // Summary\n timestamp, // Time\n details, // Details\n checkPerfdata, // Perfdata\n }, nil;\n}", "title": "" }, { "docid": "0e3dac027487a85450796eac1f13e7aa", "score": "0.4130861", "text": "func (_L1ERC721Bridge *L1ERC721BridgeFilterer) ParseERC721BridgeInitiated(log types.Log) (*L1ERC721BridgeERC721BridgeInitiated, error) {\n\tevent := new(L1ERC721BridgeERC721BridgeInitiated)\n\tif err := _L1ERC721Bridge.contract.UnpackLog(event, \"ERC721BridgeInitiated\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "title": "" }, { "docid": "3a723e0bf2d694f85a23a038e2c43d12", "score": "0.41271833", "text": "func aplayList() (map[string]int32, error) {\n\toutput, err := exec.Command(\"aplay\", \"-l\").Output()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr := regexp.MustCompile(`^card (\\d+): [A-Za-z0-9_ ]+ \\[([A-Za-z0-9_ ]+)]`)\n\tcards := map[string]int32{}\n\tfor _, line := range strings.Split(string(output), \"\\n\") {\n\t\tbits := r.FindStringSubmatch(line)\n\t\tif len(bits) == 3 {\n\t\t\tcardNum, err := strconv.Atoi(bits[1])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tname := bits[2]\n\t\t\tcards[name] = int32(cardNum)\n\t\t}\n\t}\n\treturn cards, nil\n}", "title": "" }, { "docid": "ac828b81840caf6a2f6f984855a747cf", "score": "0.4120335", "text": "func (srv *FTServer) processFoodTruck(list []*common.Location) []*common.TruckData {\n\ttds := []*common.TruckData{}\n\tfor _, loc := range list {\n\t\ttds = append(tds, &common.TruckData{\n\t\t\tUID: loc.ID,\n\t\t\tLat: loc.Lat,\n\t\t\tLon: loc.Lon,\n\t\t\tCuisine: srv.uDbMgr.CuisineType(loc.ID),\n\t\t})\n\t}\n\treturn tds\n}", "title": "" }, { "docid": "089016c007a3879b1aad3fc13c0f1a76", "score": "0.41133875", "text": "func ExtractEvent(res *protocol.RunTestsResponse) (protocol.Event, bool) {\n\tswitch res := res.GetType().(type) {\n\tcase *protocol.RunTestsResponse_RunLog:\n\t\treturn res.RunLog, true\n\tcase *protocol.RunTestsResponse_EntityStart:\n\t\treturn res.EntityStart, true\n\tcase *protocol.RunTestsResponse_EntityLog:\n\t\treturn res.EntityLog, true\n\tcase *protocol.RunTestsResponse_EntityError:\n\t\treturn res.EntityError, true\n\tcase *protocol.RunTestsResponse_EntityEnd:\n\t\treturn res.EntityEnd, true\n\tdefault:\n\t\treturn nil, false\n\t}\n}", "title": "" }, { "docid": "503570602378e490a0db6eee5d4e8e47", "score": "0.41098928", "text": "func parseBoardResponse(response []byte) interface{} {\n\tcode := removeGarbage(response)\n\tswitch {\n\tcase code == FSM_GARBAGE:\n\t\treturn customError.GarbageDataError\n\tcase code == FSM_BUSY:\n\t\treturn customError.BoardBusyError\n\tcase code >= FSM_OK_MIN && code < FSM_OK_MAX:\n\t\treturn code\n\tdefault:\n\t\tfmt.Printf(\"Unknown return code: %d\\n\", code)\n\t\treturn fmt.Errorf(\"Unknown board error\")\n\t}\n}", "title": "" }, { "docid": "ff91cc4c436678cabb650e8399335066", "score": "0.41023666", "text": "func (_WizardGuild *WizardGuildFilterer) ParseCFOTransferred(log types.Log) (*WizardGuildCFOTransferred, error) {\n\tevent := new(WizardGuildCFOTransferred)\n\tif err := _WizardGuild.contract.UnpackLog(event, \"CFOTransferred\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "eb5a14a672b20c6f9063dcd0075b33d7", "score": "0.40833697", "text": "func TestParseResult(t *testing.T) {\n\n\tr, err := os.ReadFile(\"tests/av.virus\")\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tresults := ParseAviraOutput(string(r), nil)\n\n\tif true {\n\t\tt.Log(\"results: \", results.Result)\n\t}\n\n}", "title": "" }, { "docid": "7bd073e7e88dff56cd8acdbd54b685c9", "score": "0.4073985", "text": "func decodeScanResults(results []byte) ([]nmap.PortStatus, error) {\n\tvar ports []nmap.PortStatus\n\terr := json.Unmarshal(results, &ports)\n\treturn ports, err\n}", "title": "" }, { "docid": "e1d2940f6ba5bb59cb35487726aa2329", "score": "0.407025", "text": "func getAs6(rip []string) []string {\n\tvar ases []string\n\tvar ip string\n\tvar i int\n\n\tlrip := len(rip)\n\tsubnet := strconv.Itoa(lrip * 4)\n\tfor i = lrip - 1; i >= 0; i-- {\n\t\tip += rip[i]\n\t\tif (lrip-i)%4 == 0 {\n\t\t\tip += \":\"\n\t\t}\n\t}\n\tfor i = lrip; i%4 != 0; i++ {\n\t\tip += \"0\"\n\t}\n\tif lrip < 32 {\n\t\tip += \":\"\n\t\tif lrip%4 != 0 {\n\t\t\tip += \":\"\n\t\t}\n\t} else {\n\t\tip = ip[:len(ip)-1]\n\t}\n\tif debug {\n\t\tLog.Debug(\"IPv6 received: \" + ip + \"/\" + subnet)\n\t}\n\tif _, _, err := net.ParseCIDR(ip + \"/\" + subnet); err != nil {\n\t\tLog.Warning(\"Invalid IPv6\")\n\t\treturn nil\n\t}\n\tASList.s.RLock()\n\tdefer ASList.s.RUnlock()\n\tfor s, v, ok := ASList.RPfx6.LongestPrefix(table.CidrToRadixkey(ip + \"/\" + subnet)); ok == true && len(s) > 0; s, v, ok = ASList.RPfx6.LongestPrefix(s[:len(s)-1]) {\n\t\tdata := v.([]string)\n\t\tif len(data[0][2:]) > 2 {\n\t\t\t_, ok = ASList.As[data[0]]\n\t\t\tif ok {\n\t\t\t\tGetAsn(data[0][2:])\n\t\t\t}\n\n\t\t\tres := data[0][2:] + \" | \" + data[1]\n\t\t\t_, ok = ASList.DelegAs[data[0][2:]]\n\t\t\tif ok {\n\t\t\t\tres += \" | \" + ASList.DelegAs[data[0][2:]].CC + \" | \" + ASList.DelegAs[data[0][2:]].Rir + \" | \" + ASList.DelegAs[data[0][2:]].Date\n\t\t\t} else {\n\t\t\t\tres += \" | | |\"\n\t\t\t}\n\t\t\tres += \" | \" + ASList.As[data[0]].ASName\n\t\t\tases = append(ases, res)\n\t\t}\n\t}\n\treturn ases\n}", "title": "" }, { "docid": "f8bdc9fafcd96f9f64377bca5be2b0ec", "score": "0.4068731", "text": "func (_TFCManager *TFCManagerFilterer) ParseClaimTFC(log types.Log) (*TFCManagerClaimTFC, error) {\n\tevent := new(TFCManagerClaimTFC)\n\tif err := _TFCManager.contract.UnpackLog(event, \"ClaimTFC\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "b80e0aeaceb0b2caaeeecd64a13739b4", "score": "0.40562078", "text": "func (m *TriageResultMutation) TriageResultToPatientIDs() (ids []int) {\n\tif id := m.triageResultToPatient; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c56e0e2ac36541013db810d673bcd0a7", "score": "0.40528682", "text": "func ParseEventFilter(v string) []EventFilter {\n\t// No filter translates to stream all\n\tif v == \"\" {\n\t\tv = \"*\"\n\t}\n\n\tevents := strings.Split(v, \",\")\n\tresults := make([]EventFilter, 0, len(events))\n\tfor _, event := range events {\n\t\tvar result EventFilter\n\t\tvar name string\n\n\t\tif strings.HasPrefix(event, \"user:\") {\n\t\t\tname = event[len(\"user:\"):]\n\t\t\tevent = \"user\"\n\t\t} else if strings.HasPrefix(event, \"query:\") {\n\t\t\tname = event[len(\"query:\"):]\n\t\t\tevent = \"query\"\n\t\t}\n\n\t\tresult.Event = event\n\t\tresult.Name = name\n\t\tresults = append(results, result)\n\t}\n\n\treturn results\n}", "title": "" }, { "docid": "5b54bae11d3ed2944ff22dbcff36013b", "score": "0.40525156", "text": "func TestParseResult(t *testing.T) {\n\n\tr, err := ioutil.ReadFile(\"tests/av_scan.out\")\n\tif err != nil {\n\t\tfmt.Print(err)\n\t}\n\n\tresults := ParseClamAvOutput(string(r), nil)\n\n\tif true {\n\t\tt.Log(\"Result: \", results.Result)\n\t\tt.Log(\"Engine: \", results.Engine)\n\t}\n}", "title": "" }, { "docid": "51743dee931e17094583e15621cd6b5e", "score": "0.40417862", "text": "func (na *EpNetworkAdapter) discoverRemotePhase1() {\n\trpath := na.OdataID\n\turl := na.epRF.FQDN + rpath\n\turlJSON, err := na.epRF.GETRelative(rpath)\n\tif err != nil || urlJSON == nil {\n\t\tna.LastStatus = HTTPsGetFailed\n\t\treturn\n\t}\n\tna.networkAdapterRaw = &urlJSON\n\tna.LastStatus = HTTPsGetOk\n\n\tif rfDebug > 0 {\n\t\terrlog.Printf(\"%s: %s\\n\", url, urlJSON)\n\t}\n\t// Decode JSON into Drive structure containing Redfish data\n\tif err := json.Unmarshal(urlJSON, &na.NetworkAdapterRF); err != nil {\n\t\tif IsUnmarshalTypeError(err) {\n\t\t\terrlog.Printf(\"bad field(s) skipped: %s: %s\\n\", url, err)\n\t\t} else {\n\t\t\terrlog.Printf(\"ERROR: json decode failed: %s: %s\\n\", url, err)\n\t\t\tna.LastStatus = EPResponseFailedDecode\n\t\t\treturn\n\t\t}\n\t}\n\tna.RedfishSubtype = NetworkAdapterType\n\n\tif rfVerbose > 0 {\n\t\tjout, _ := json.MarshalIndent(na, \"\", \" \")\n\t\terrlog.Printf(\"%s: %s\\n\", url, jout)\n\t}\n\n\tna.LastStatus = VerifyingData\n}", "title": "" }, { "docid": "65dfe524f4e1f510b2caaad77f591918", "score": "0.404092", "text": "func (p *Plane) CalculateCoords(env models.Datastore, aircraft string) Position {\n\tvuelos := identifyOnGoingFlights(env)\n\tfor _, vuelo := range vuelos.F {\n\t\tif vuelo.Avion == aircraft {\n\t\t\tp.updateAirport(vuelo.ArrPlace)\n\t\t\treturn getFlightCoords(vuelo)\n\t\t}\n\t}\n\treturn p.LastAirport\n}", "title": "" }, { "docid": "af05a564ab26cbf1178454cdc9a0b2b0", "score": "0.40406275", "text": "func (pkts CapturePackets) GetArrivalTimes() []float64 {\n\tarrivalTimes := make([]float64, len(pkts))\n\n\tfor i := 0; i < len(pkts); i++ {\n\t\tarrivalTimes[i] = pkts[i].ArrivalTime\n\t}\n\n\treturn arrivalTimes\n}", "title": "" }, { "docid": "8023979698a555654556520602b85229", "score": "0.40355974", "text": "func (_CZRX *CZRXFilterer) ParseAccrueInterest(log types.Log) (*CZRXAccrueInterest, error) {\n\tevent := new(CZRXAccrueInterest)\n\tif err := _CZRX.contract.UnpackLog(event, \"AccrueInterest\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "dd4fc6a516bbe3f0ff34d68dcf1a4d6e", "score": "0.4023844", "text": "func (annotatorForClinicalDataAcd *AnnotatorForClinicalDataAcdV1) GetFlowsByID(getFlowsByIdOptions *GetFlowsByIdOptions) (result *AcdFlow, response *core.DetailedResponse, err error) {\n\terr = core.ValidateNotNil(getFlowsByIdOptions, \"getFlowsByIdOptions cannot be nil\")\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.ValidateStruct(getFlowsByIdOptions, \"getFlowsByIdOptions\")\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpathSegments := []string{\"v1/flows\"}\n\tpathParameters := []string{*getFlowsByIdOptions.ID}\n\n\tbuilder := core.NewRequestBuilder(core.GET)\n\t_, err = builder.ConstructHTTPURL(annotatorForClinicalDataAcd.Service.Options.URL, pathSegments, pathParameters)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tfor headerName, headerValue := range getFlowsByIdOptions.Headers {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\n\tsdkHeaders := common.GetSdkHeaders(\"annotator_for_clinical_data_acd\", \"V1\", \"GetFlowsByID\")\n\tfor headerName, headerValue := range sdkHeaders {\n\t\tbuilder.AddHeader(headerName, headerValue)\n\t}\n\tbuilder.AddHeader(\"Accept\", \"application/json\")\n\n\tbuilder.AddQuery(\"version\", fmt.Sprint(*annotatorForClinicalDataAcd.Version))\n\n\trequest, err := builder.Build()\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar rawResponse map[string]json.RawMessage\n\tresponse, err = annotatorForClinicalDataAcd.Service.Request(request, &rawResponse)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(rawResponse, \"\", &result, UnmarshalAcdFlow)\n\tif err != nil {\n\t\treturn\n\t}\n\tresponse.Result = result\n\n\treturn\n}", "title": "" }, { "docid": "89ac068363fbbee00e5cea8a3cc23613", "score": "0.40230104", "text": "func (c *MainController) GetScheduledAircraft() {\n\tlayout := \"2006-01-02T15:04:05.000Z\"\n\traw := c.Ctx.Input.Param(\":hangar\")\n\tparams := strings.Split(raw, \"$\")\n\tif len(params) < 3 {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Incorrect request\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\thangarId := params[0]\n\tstarttimestring := params[1]\n\tendtimestring := params[2]\n\ti, err := strconv.ParseInt(hangarId, 10, 64)\n\tif err != nil {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Incorrect request\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tfmt.Println(\"hangar to check is\", i)\n\tuser, err := c.VerifyHangar(i)\n\tif err != nil {\n\t\tutilities.Papertrail(\"Unauthorized attempt to access: \"+user.Email, \"Warn\")\n\t\ttoReturn := errorReturn{Code: 500, English: \"This hangar does not belong to you\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tviewstarttime, err := time.Parse(layout, starttimestring)\n\tif err != nil {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Invalid time format\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tviewendtime, err := time.Parse(layout, endtimestring)\n\tif err != nil {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Invalid time format\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tfmt.Println(hangarId, viewstarttime, viewendtime)\n\to := orm.NewOrm()\n\t//get the instances and add them\n\tvar instances []*models.ACInstance\n\t_, err = o.QueryTable(\"a_c_instance\").Filter(\"OwningHangar\", hangarId).\n\t\tExclude(\"EndTime__lte\", viewstarttime).Exclude(\"StartTime__gte\", viewendtime).Distinct().RelatedSel().All(\n\t\t&instances)\n\tif err != nil {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Database error finding instances\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tvar schedules []schedule\n\tfor _, v := range instances {\n\t\tvar temp = schedule{Id: v.Id, Content: v.Registration.Nnumber,\n\t\t\tStart: v.StartTime, End: v.EndTime, Type: \"background\", Group: v.Registration.Nnumber}\n\t\t//strange bug where id 0 is inserted\n\t\tif temp.Id != 0 {\n\t\t\tschedules = append(schedules, temp)\n\t\t}\n\t\t//get the aclines and add them\n\t\tvar saves []*models.ACLine\n\t\t_, err = o.QueryTable(\"a_c_line\").Filter(\"Instance\", v).\n\t\t\tExclude(\"EndTime__lte\", v.StartTime).Exclude(\"StartTime__gte\", v.EndTime).Distinct().RelatedSel().All(\n\t\t\t&saves)\n\t\tif err != nil {\n\t\t\ttoReturn := errorReturn{Code: 500, English: \"Database error finding saves\"}\n\t\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\t\tc.ServeJSON()\n\t\t}\n\n\t\tfor _, s := range saves {\n\t\t\tfmt.Println(s.Id)\n\t\t\tvar temp = schedule{Id: s.Id, Content: \"\",\n\t\t\t\tStart: s.StartTime, End: s.EndTime, Type: \"\", Group: v.Registration.Nnumber}\n\t\t\tif temp.Id != 0 {\n\t\t\t\tschedules = append(schedules, temp)\n\t\t\t}\n\t\t}\n\t}\n\n\tfinishedJSON, err := json.Marshal(schedules)\n\tfmt.Println(\"finished json\", string(finishedJSON))\n\tif err != nil {\n\t\ttoReturn := errorReturn{Code: 500, English: \"Error marshaling JSON\"}\n\t\tfinishedJSON, _ := json.Marshal(toReturn)\n\t\tc.Data[\"json\"] = string(finishedJSON)\n\t\tc.ServeJSON()\n\t}\n\tc.Data[\"json\"] = string(finishedJSON)\n\tc.ServeJSON()\n}", "title": "" }, { "docid": "99e5038bf5bcea0365fd87d8895db7d7", "score": "0.4013427", "text": "func (ah *APIHandler) GetIntensityForDay(date time.Time) ([]*Intensity, error) {\n\tyear, month, day := date.Date()\n\n\tresponseBytes, err := ah.getAPIResponse(fmt.Sprintf(\"/intensity/date/%04d-%02d-%02d\", year, month, day))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse := intensityResponse{}\n\tif err := json.Unmarshal(responseBytes, &response); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn response.entries, nil\n}", "title": "" }, { "docid": "37d0db731001b865f7cd1fd45245865d", "score": "0.39944905", "text": "func (md *GetMatchDetails) ParseMatch() (*dota.Match, error) {\n\tvar victor string\n\tif md.Result.RadiantWin {\n\t\tvictor = \"radiant\"\n\t} else {\n\t\tvictor = \"dire\"\n\t}\n\n\tvar engine string\n\tif md.Result.Engine == 0 {\n\t\tengine = \"Source 1\"\n\t} else if md.Result.Engine == 1 {\n\t\tengine = \"Source 2\"\n\t} else {\n\t\treturn nil, fmt.Errorf(\"unknown engine %d\", md.Result.Engine)\n\t}\n\n\tradiantPlayers, direPlayers, err := md.findPlayers()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgm, err := md.findGameMode()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tregion, err := md.findRegion()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tl, err := md.findLobbyType()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdur, err := md.parseDuration()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tfbt, err := md.parseFirstBloodTime()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdraft, err := md.getDraft()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmatch := &dota.Match{\n\t\tMatchID: md.Result.MatchID,\n\t\tDire: direPlayers,\n\t\tDireBuildings: md.getBuildingStatus(true),\n\t\tRadiant: radiantPlayers,\n\t\tRadiantBuildings: md.getBuildingStatus(false),\n\t\tVictor: victor,\n\t\tDraft: draft,\n\t\tStartTime: time.Unix(md.Result.StartTime, 0),\n\t\tDuration: dur,\n\t\tGameMode: *gm,\n\t\tLobby: *l,\n\t\tFirstBlood: fbt,\n\t\tEngine: engine,\n\t\tRegion: *region,\n\t\tLeagueID: md.Result.LeagueID,\n\t}\n\n\treturn match, nil\n}", "title": "" }, { "docid": "e4eb48e3608b2fdd9789680e9eaa4426", "score": "0.39838254", "text": "func UnmarshalAcdFlow(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(AcdFlow)\n\terr = core.UnmarshalPrimitive(m, \"id\", &obj.ID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"description\", &obj.Description)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"publishedDate\", &obj.PublishedDate)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"publish\", &obj.Publish)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"version\", &obj.Version)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"cartridgeId\", &obj.CartridgeID)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalModel(m, \"annotatorFlows\", &obj.AnnotatorFlows, UnmarshalAnnotatorFlow)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "474383a67a1486411bfc96f4b159f110", "score": "0.3980125", "text": "func arrival(array []proc, running []proc, i int, file2 *os.File) ([]proc){\n\tfor j := 0; j < len(array); j++ {\n\t\tif array[j].arrival == i {\n\t\t\tfmt.Fprintf(file2, \"Time %3d : %s arrived\\n\", i, array[j].name)\n\t\t\ttempHold := array[j]\n\t\t\ttempHold.arrival = i\n\t\t\trunning = append(running, tempHold)\n\t\t}\n\t}\n\treturn running\n}", "title": "" }, { "docid": "35255fdf59d9a708d676c2b7cf7ed972", "score": "0.3972879", "text": "func Discover() ([]*Yeelight, error) {\n\tvar err error\n\n\tssdp, err := net.ResolveUDPAddr(\"udp4\", ssdpAddr)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tc, err := net.ListenPacket(\"udp4\", \":0\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer c.Close()\n\n\tsocket := c.(*net.UDPConn)\n\t_, err = socket.WriteToUDP([]byte(discoverMSG), ssdp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsocket.SetReadDeadline(time.Now().Add(timeout))\n\n\tresult := make([]*Yeelight, 0)\n\trsBuf := make([]byte, 1024)\n\tundup := make(map[string]struct{})\n\tfor {\n\t\tsize, _, err := socket.ReadFromUDP(rsBuf)\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\n\t\trs := rsBuf[0:size]\n\t\ty := parseDevice(string(rs))\n\t\tif y == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tlog.Printf(\"Device [%+v] found\", y)\n\t\tif _, ok := undup[y.Addr]; ok {\n\t\t\tcontinue\n\t\t}\n\t\tundup[y.Addr] = struct{}{}\n\t\tresult = append(result, y)\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "5efdf08e00a4cab5c10cf06cd49e44eb", "score": "0.39725167", "text": "func GetFaceIDByImage(ImgBytes []byte, ch chan interface{}) error {\n\tvar res faceAttr\n\treq, _ := http.NewRequest(\"POST\", uriDetect, bytes.NewBuffer(ImgBytes))\n\treq.Header.Set(\"Content-Type\", \"application/octet-stream\")\n\treq.Header.Set(\"Ocp-Apim-Subscription-Key\", apiKey)\n\tclient := &http.Client{}\n\tresp, errDo := client.Do(req)\n\tif errDo != nil {\n\t\tfmt.Println(\"ERROR DO\")\n\t\treturn errors.New(\"fail to reach Azure Face Detection API, may caused by client policy or network connectivity problem\")\n\t}\n\tdefer resp.Body.Close()\n\terrDecode := json.NewDecoder(resp.Body).Decode(&res)\n\tif errDecode != nil {\n\t\tfmt.Println(\"ERROR DECODE\", resp.Body)\n\t\treturn errDecode\n\t}\n\n\tfmt.Println(\"DIBAWAH INI REPOSNSE\")\n\tfmt.Println(resp)\n\n\tch <- res[0].FaceID\n\n\treturn nil\n}", "title": "" }, { "docid": "6fe83d6a20c8e891737d42e65e7f98de", "score": "0.39671487", "text": "func (m *AppointmentResultsMutation) AppointmentResultsToPatientIDs() (ids []int) {\n\tif id := m.appointmentResultsToPatient; id != nil {\n\t\tids = append(ids, *id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "c1c59722223c493cc250d7ad195ec39c", "score": "0.39630747", "text": "func (m *PatientMutation) PatientToAppointmentResultsIDs() (ids []int) {\n\tfor id := range m._PatientToAppointmentResults {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "39139cc6e34a7f9ade45062cdb2f45c8", "score": "0.39560026", "text": "func FaceID(source string) (string, error) {\n\tvar res faceAttr\n\treq, _ := http.NewRequest(\"POST\", uriDetect, strings.NewReader(source))\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"Ocp-Apim-Subscription-Key\", apiKey)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"fail to reach Azure Face Detection API, may caused by client policy or network connectivity problem\")\n\t}\n\tdefer resp.Body.Close()\n\tif err = json.NewDecoder(resp.Body).Decode(&res); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn res[0].FaceID, nil\n}", "title": "" }, { "docid": "5a33a14e5fac19e15c16bfa8882928b2", "score": "0.39435893", "text": "func (s *ServiceImpl) GetFlightInformation() (*GetFlightInformationResponse, error) {\n\trequest := &GetFlightInformationRequest{}\n\tctx := context.Background()\n\tresponse, err := s.Client.GetFlightInformation(ctx, request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn response, nil\n\n}", "title": "" }, { "docid": "f486d2bfcbc2d72d853e593d893310aa", "score": "0.39397207", "text": "func startFifaListener(targetIP string, targetPort int) {\n\t// fucks the BroadcastIP:9999 to localIP:4987\n\tlistenPort := 4987\n\tlocalIP := GetLocalIP()\n\tfmt.Println(\"Fucked the FIFA Broadcast packets to local service\", localIP, \":\", listenPort, \"...\")\n\tgo FuckSourceSocketOfPacket(\"udp.DstPort == 9999 and ip.DstAddr == 255.255.255.255\", \"\", 0, localIP, 4987)\n\tfmt.Println(\"Starting listening for redirected FIFA packets (\", listenPort, \":\", listenPort, \")\")\n\tresultChannel := make(chan ListenerResult)\n\tgo StartListener(listenPort, resultChannel)\n\t// for every channel entry send a package to the target ip\n\tfor elem := range resultChannel {\n\t\tjsonData, err := json.Marshal(Data{SrcIP: localIP, DestIP: \"1.1.1.1\", DestPort: 9999, Message: elem.resultBytes})\n\t\tCheckErrorInternal(err)\n\t\tmsgJSONStr := string(jsonData)\n\t\tsendResult := make(chan Result)\n\t\tgo SendMessage(targetIP, targetPort, msgJSONStr, sendResult)\n\t\tclose(sendResult)\n\t}\n}", "title": "" }, { "docid": "84d4c0d27970b9e23bcdc01e869b35b9", "score": "0.3937577", "text": "func (mgr *FSIntfMgr) listenForAsicdEvents() {\n\tfor {\n\t\tmgr.logger.Info(\"Read on Asicd subscriber socket...\")\n\t\trxBuf, err := mgr.asicdL3IntfSubSocket.Recv(0)\n\t\tif err != nil {\n\t\t\tmgr.logger.Info(fmt.Sprintln(\"Error in receiving Asicd events\", err))\n\t\t\treturn\n\t\t}\n\n\t\tmgr.logger.Info(fmt.Sprintln(\"Asicd subscriber recv returned\", rxBuf))\n\t\tevent := asicdCommonDefs.AsicdNotification{}\n\t\terr = json.Unmarshal(rxBuf, &event)\n\t\tif err != nil {\n\t\t\tmgr.logger.Err(fmt.Sprintf(\"Unmarshal Asicd event failed with err %s\", err))\n\t\t\treturn\n\t\t}\n\n\t\tswitch event.MsgType {\n\t\tcase asicdCommonDefs.NOTIFY_L3INTF_STATE_CHANGE:\n\t\t\tvar msg asicdCommonDefs.L3IntfStateNotifyMsg\n\t\t\terr = json.Unmarshal(event.Msg, &msg)\n\t\t\tif err != nil {\n\t\t\t\tmgr.logger.Err(fmt.Sprintf(\"Unmarshal Asicd L3INTF\",\n\t\t\t\t\t\"event failed with err %s\", err))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tmgr.logger.Info(fmt.Sprintf(\"Asicd L3INTF event idx %d ip %s state %d\\n\", msg.IfIndex, msg.IpAddr,\n\t\t\t\tmsg.IfState))\n\t\t\tif msg.IfState == asicdCommonDefs.INTF_STATE_DOWN {\n\t\t\t\tapi.SendIntfNotification(msg.IfIndex, msg.IpAddr, config.INTF_STATE_DOWN)\n\t\t\t} else {\n\t\t\t\tapi.SendIntfNotification(msg.IfIndex, msg.IpAddr, config.INTF_STATE_UP)\n\t\t\t}\n\n\t\tcase asicdCommonDefs.NOTIFY_IPV4INTF_CREATE, asicdCommonDefs.NOTIFY_IPV4INTF_DELETE:\n\t\t\tvar msg asicdCommonDefs.IPv4IntfNotifyMsg\n\t\t\terr = json.Unmarshal(event.Msg, &msg)\n\t\t\tif err != nil {\n\t\t\t\tmgr.logger.Err(fmt.Sprintf(\"Unmarshal Asicd IPV4INTF event failed with err %s\", err))\n\t\t\t\treturn\n\t\t\t}\n\n\t\t\tmgr.logger.Info(fmt.Sprintf(\"Asicd IPV4INTF event idx %d ip %s\\n\", msg.IfIndex, msg.IpAddr))\n\t\t\tif event.MsgType == asicdCommonDefs.NOTIFY_IPV4INTF_CREATE {\n\t\t\t\tapi.SendIntfNotification(msg.IfIndex, msg.IpAddr, config.INTF_CREATED)\n\t\t\t} else {\n\t\t\t\tapi.SendIntfNotification(msg.IfIndex, msg.IpAddr, config.INTF_DELETED)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "97f09efff1ee6d48e33ab68f29efa16e", "score": "0.3922169", "text": "func extractPlate(payload string) error {\n\n\t/**\n\t * --------------------------------------------\n\t * NOTE : inisialisasi client untuk open alpr\n\t * --------------------------------------------\n\t */\n\treq, _ := http.NewRequest(\"POST\", payload, nil)\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\treq.Header.Set(\"Accept\", \"application/json\")\n\n\tresp, err := http.DefaultClient.Do(req)\n\n\t/**\n\t * -------------------------------------\n\t * NOTE : cetak log saat terjadi error\n\t * -------------------------------------\n\t */\n\tif err != nil {\n\t\tprintLog(\"ERROR\", fmt.Sprintf(\"PROCESS EXTRACT PLATE = %v\", err))\n\t\treturn err\n\t}\n\n\tdefer resp.Body.Close()\n\n\tprintLog(\"INFO\", fmt.Sprintf(\"BODY = %s\", resp.Body))\n\n\t/**\n\t * -----------------------------------------\n\t * NOTE : ubah response body menjadi []byte\n\t * -----------------------------------------\n\t */\n\trespData, err := ioutil.ReadAll(resp.Body)\n\n\t/**\n\t * ------------------------------------\n\t * NOTE : cetak log saat terjadi error\n\t * ------------------------------------\n\t */\n\tif err != nil {\n\t\tprintLog(\"ERROR\", fmt.Sprintf(\"PROCESS IOUTIL READ ALL RESPONSE BODY = %v\", err))\n\t\treturn err\n\t}\n\n\t/**\n\t * -----------------------------------------\n\t * NOTE : decode json kedalam struct ALPR\n\t * -----------------------------------------\n\t */\n\tif err := json.Unmarshal(respData, &ALPR); err != nil {\n\t\tprintLog(\"ERROR\", fmt.Sprintf(\"UNMARSHAL ALPR = %v\", err))\n\t\treturn err\n\t}\n\n\t/**\n\t * ------------------------------\n\t * NOTE : pretty print JSON ALPR\n\t * ------------------------------\n\t */\n\tfmt.Println(string(respData))\n\tfmt.Println(ALPR)\n\n\treturn nil\n\n}", "title": "" }, { "docid": "153924b6fbda3a76ad58bb13222ac338", "score": "0.3921056", "text": "func extractTrack(reader *bufio.Reader, useId bool, id byte) (Track, error) {\n\ttrack := Track{}\n\t// Check for duplicate header\n\tif b, _ := reader.Peek(6); string(b) == Header {\n\t\treturn track, ErrorDuplicateHeader\n\t}\n\tif useId {\n\t\ttrack.Id = id\n\t} else {\n\t\t// If id is not supplied, read id\n\t\tid, err := reader.ReadByte()\n\t\tif err != nil {\n\t\t\treturn track, err\n\t\t}\n\t\ttrack.Id = id\n\t\t// Skip till the name of the track\n\t\tif n, err := reader.Read(make([]byte, 4)); n != 4 || err != nil {\n\t\t\treturn track, ErrorInvalidData\n\t\t}\n\t}\n\n\t// Extract track name.\n\t// Peek and append next byte until a 1 or 0 is encountered.\n\tvar name []byte\n\tfor b, err := reader.Peek(1); ; b, err = reader.Peek(1) {\n\t\tif err != nil {\n\t\t\treturn track, err\n\t\t}\n\t\tif len(b) < 1 {\n\t\t\treturn track, ErrorInvalidData\n\t\t}\n\t\tif b[0] == byte(0) || b[0] == byte(1) {\n\t\t\tbreak\n\t\t} else {\n\t\t\tc, err := reader.ReadByte()\n\t\t\tif err != nil {\n\t\t\t\treturn track, err\n\t\t\t}\n\t\t\tname = append(name, c)\n\t\t}\n\t}\n\ttrack.Name = string(name)\n\t// read the 16 steps\n\tfor i := 0; i < 16; i++ {\n\t\tc, err := reader.ReadByte()\n\t\tif err != nil {\n\t\t\treturn track, err\n\t\t}\n\t\ttrack.Steps[i] = c > byte(0)\n\t}\n\treturn track, nil\n}", "title": "" }, { "docid": "a3b4581baa82068e2fa69729a22648a7", "score": "0.39157274", "text": "func CreateDetiAF(dabSrvPtr *DabSrv) (aFrame []byte) {\n\taFrame = append(aFrame, []byte(\"AF\")...)\n\n\tvar afPayLoad []byte\n\n\tdabSrvPtr.ficReset()\n\n\tfor {\n\t\tdetiTag := recreateDetiTag(dabSrvPtr)\n\t\tif detiTag != nil {\n\t\t\tafPayLoad = append(afPayLoad, detiTag...)\n\t\t} else {\n\t\t\tbreak\n\t\t}\n\t}\n\n\tvar afPayloadLen = (uint32)(len(afPayLoad))\n\ttagLen := make([]byte, 4)\n\tbinary.BigEndian.PutUint32(tagLen, afPayloadLen)\n\n\taFrame = append(aFrame, tagLen[:]...)\n\taFrame = append(aFrame, []byte{0x00, 0x00}...)\n\n\taFrame = append(aFrame, 0x90) //CF 1 bit, MAJ 3 bits, MIN 4 bits - CRC present\n\taFrame = append(aFrame, 0x54) // T (PT Protocoltype, for TAG Packets, the value shall be the ASCII representation of \"T\")\n\n\taFrame = append(aFrame, afPayLoad[:]...)\n\n\tafCrc := crc16.ChecksumCCITTFalse(aFrame) ^ 0xFFFF\n\tafCrcBytes := make([]byte, 2)\n\tbinary.BigEndian.PutUint16(afCrcBytes, afCrc)\n\n\taFrame = append(aFrame, afCrcBytes[:]...)\n\n\treturn\n}", "title": "" }, { "docid": "c46404afc90588aadb6724274767b6c1", "score": "0.39147633", "text": "func (_Vai *VaiFilterer) ParseTransfer(log types.Log) (*VaiTransfer, error) {\n\tevent := new(VaiTransfer)\n\tif err := _Vai.contract.UnpackLog(event, \"Transfer\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "title": "" }, { "docid": "2c59ef8374e51babf87e1f2bac66f614", "score": "0.39136457", "text": "func parseFilesystem(agentReply string) ([]api.Filesystem, error) {\n\tresult := []Filesystem{}\n\tresponse := stripAgentResponse(agentReply)\n\n\terr := json.Unmarshal([]byte(response), &result)\n\tif err != nil {\n\t\treturn []api.Filesystem{}, err\n\t}\n\n\tconvertedResult := []api.Filesystem{}\n\n\tfor _, fs := range result {\n\t\tconvertedResult = append(convertedResult, api.Filesystem{\n\t\t\tName: fs.Name,\n\t\t\tMountpoint: fs.Mountpoint,\n\t\t\tType: fs.Type,\n\t\t\tTotalBytes: fs.TotalBytes,\n\t\t\tUsedBytes: fs.UsedBytes,\n\t\t})\n\t}\n\n\treturn convertedResult, nil\n}", "title": "" }, { "docid": "72edb304cd39a5d548ab42d4da1c361c", "score": "0.3903307", "text": "func (p *PCE) GetTrafficAnalysis(q TrafficQuery) ([]TrafficAnalysis, APIResponse, error) {\n\tvar api APIResponse\n\n\t// Initialize arrays using \"make\" so JSON is marshaled with empty arrays and not null values to meet Illumio API spec\n\tsourceInc := make([]Include, 0)\n\tdestInc := make([]Include, 0)\n\n\tsourceExcl := make([]Exclude, 0)\n\tdestExcl := make([]Exclude, 0)\n\n\t// Process source include, destination include, source exclude, and destination exclude\n\tqueryLists := [][]string{q.SourcesInclude, q.DestinationsInclude, q.SourcesExclude, q.DestinationsExclude}\n\n\t// Start counter\n\ti := 0\n\n\t// For each list there are 4 possibilities: empty, label, workload, ipaddress\n\tfor _, queryList := range queryLists {\n\n\t\t// Labels\n\t\tif len(queryList) > 0 {\n\t\t\tif strings.Contains(queryList[0], \"label\") == true {\n\t\t\t\tfor _, label := range queryLists[i] {\n\t\t\t\t\tqueryLabel := Label{Href: label}\n\t\t\t\t\tswitch i {\n\t\t\t\t\tcase 0:\n\t\t\t\t\t\tsourceInc = append(sourceInc, Include{Label: &queryLabel})\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tdestInc = append(destInc, Include{Label: &queryLabel})\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\tsourceExcl = append(sourceExcl, Exclude{Label: &queryLabel})\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\tdestExcl = append(destExcl, Exclude{Label: &queryLabel})\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\t// Workloads\n\t\t\t} else if strings.Contains(queryList[0], \"workload\") == true {\n\t\t\t\tfor _, workload := range queryLists[i] {\n\t\t\t\t\tqueryWorkload := Workload{Href: workload}\n\t\t\t\t\tswitch i {\n\t\t\t\t\tcase 0:\n\t\t\t\t\t\tsourceInc = append(sourceInc, Include{Workload: &queryWorkload})\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tdestInc = append(destInc, Include{Workload: &queryWorkload})\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\tsourceExcl = append(sourceExcl, Exclude{Workload: &queryWorkload})\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\tdestExcl = append(destExcl, Exclude{Workload: &queryWorkload})\n\t\t\t\t\t}\n\n\t\t\t\t}\n\n\t\t\t\t// Assume all else are IP addresses (API will error when needed)\n\t\t\t} else if len(queryList[0]) > 0 {\n\t\t\t\tfor _, ipAddress := range queryLists[i] {\n\t\t\t\t\tqueryIPAddress := IPAddress{Value: ipAddress}\n\t\t\t\t\tswitch i {\n\t\t\t\t\tcase 0:\n\t\t\t\t\t\tsourceInc = append(sourceInc, Include{IPAddress: &queryIPAddress})\n\t\t\t\t\tcase 1:\n\t\t\t\t\t\tdestInc = append(destInc, Include{IPAddress: &queryIPAddress})\n\t\t\t\t\tcase 2:\n\t\t\t\t\t\tsourceExcl = append(sourceExcl, Exclude{IPAddress: &queryIPAddress})\n\t\t\t\t\tcase 3:\n\t\t\t\t\t\tdestExcl = append(destExcl, Exclude{IPAddress: &queryIPAddress})\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\ti++\n\t}\n\n\t// Get the service data ready\n\tserviceInclude := make([]Include, 0)\n\tserviceExclude := make([]Exclude, 0)\n\n\t// Port and protocol - include\n\tfor _, portProto := range q.PortProtoInclude {\n\t\tserviceInclude = append(serviceInclude, Include{Port: portProto[0], Proto: portProto[1]})\n\t}\n\n\t// Port and protocol - exclude\n\tfor _, portProto := range q.PortProtoExclude {\n\t\tserviceExclude = append(serviceExclude, Exclude{Port: portProto[0], Proto: portProto[1]})\n\t}\n\n\t// Port Range - include\n\tfor _, portRange := range q.PortRangeInclude {\n\t\tserviceInclude = append(serviceInclude, Include{Port: portRange[0], ToPort: portRange[1], Proto: portRange[2]})\n\t}\n\n\t// Port Range - exclude\n\tfor _, portRange := range q.PortRangeExclude {\n\t\tserviceExclude = append(serviceExclude, Exclude{Port: portRange[0], ToPort: portRange[1], Proto: portRange[2]})\n\t}\n\n\t// Process - include\n\tfor _, process := range q.ProcessInclude {\n\t\tserviceInclude = append(serviceInclude, Include{Process: process})\n\t}\n\n\t// Process - exclude\n\tfor _, process := range q.ProcessExclude {\n\t\tserviceExclude = append(serviceExclude, Exclude{Process: process})\n\t}\n\n\t// Windows Service - include\n\tfor _, winSrv := range q.WindowsServiceInclude {\n\t\tserviceInclude = append(serviceInclude, Include{WindowsService: winSrv})\n\t}\n\n\t// Windows Service - exclude\n\tfor _, winSrv := range q.WindowsServiceExclude {\n\t\tserviceExclude = append(serviceExclude, Exclude{WindowsService: winSrv})\n\t}\n\n\t// Build the TrafficAnalysisRequest struct\n\ttraffic := TrafficAnalysisRequest{\n\t\tSources: Sources{\n\t\t\tInclude: [][]Include{sourceInc},\n\t\t\tExclude: sourceExcl},\n\t\tDestinations: Destinations{\n\t\t\tInclude: [][]Include{destInc},\n\t\t\tExclude: destExcl},\n\t\tExplorerServices: ExplorerServices{\n\t\t\tInclude: serviceInclude,\n\t\t\tExclude: serviceExclude},\n\t\tPolicyDecisions: q.PolicyStatuses,\n\t\tStartDate: q.StartTime,\n\t\tEndDate: q.EndTime,\n\t\tMaxResults: q.MaxFLows}\n\n\t// Create JSON Payload\n\tjsonPayload, err := json.Marshal(traffic)\n\tif err != nil {\n\t\treturn nil, api, fmt.Errorf(\"get traffic analysis - %s\", err)\n\t}\n\n\tvar trafficResponses []TrafficAnalysis\n\n\t// Build the API URL\n\tapiURL, err := url.Parse(\"https://\" + pceSanitization(p.FQDN) + \":\" + strconv.Itoa(p.Port) + \"/api/v2/orgs/\" + strconv.Itoa(p.Org) + \"/traffic_flows/traffic_analysis_queries\")\n\tif err != nil {\n\t\treturn nil, api, fmt.Errorf(\"get traffic analysis - %s\", err)\n\t}\n\n\t// Call the API\n\tapi, err = apicall(\"POST\", apiURL.String(), *p, jsonPayload, false)\n\tif err != nil {\n\t\treturn nil, api, fmt.Errorf(\"get traffic analysis - %s\", err)\n\t}\n\n\t// Unmarshal response to struct\n\tjson.Unmarshal([]byte(api.RespBody), &trafficResponses)\n\n\treturn trafficResponses, api, nil\n\n}", "title": "" }, { "docid": "9ff953f5013f7a37ab5eec0bbb67744a", "score": "0.38945615", "text": "func (s *SessionResults) NormaliseCarIDs() {\n\tvar carIDsNeedNormalising bool\n\nresultCarIDCheck:\n\tfor _, result := range s.Result {\n\t\tfor _, car := range s.Cars {\n\t\t\tif car.Driver.GUID == result.DriverGUID && car.Model == result.CarModel && car.CarID != result.CarID {\n\t\t\t\tcarIDsNeedNormalising = true\n\t\t\t\tbreak resultCarIDCheck\n\t\t\t}\n\t\t}\n\n\t\tfor _, lap := range s.Laps {\n\t\t\tif lap.DriverGUID == result.DriverGUID && lap.CarModel == result.CarModel && lap.CarID != result.CarID {\n\t\t\t\tcarIDsNeedNormalising = true\n\t\t\t\tbreak resultCarIDCheck\n\t\t\t}\n\t\t}\n\t}\n\n\tif !carIDsNeedNormalising {\n\t\treturn\n\t}\n\n\tlogrus.Infof(\"CarIDs in event results do not match, attempting automatic fix.\")\n\n\tfor i, result := range s.Result {\n\t\tresult.CarID = i\n\t}\n\n\tfor _, result := range s.Result {\n\t\tfor _, car := range s.Cars {\n\t\t\tif car.Driver.GUID == result.DriverGUID && car.Model == result.CarModel {\n\t\t\t\tcar.CarID = result.CarID\n\t\t\t}\n\t\t}\n\n\t\t// events might get mixed up, not a lot we can do\n\t\tfor _, event := range s.Events {\n\t\t\tif event.Driver.GUID == result.DriverGUID {\n\t\t\t\tevent.CarID = result.CarID\n\t\t\t}\n\n\t\t\tif event.OtherDriver.GUID == result.DriverGUID {\n\t\t\t\tevent.OtherCarID = result.CarID\n\t\t\t}\n\t\t}\n\n\t\tfor _, lap := range s.Laps {\n\t\t\tif lap.DriverGUID == result.DriverGUID && lap.CarModel == result.CarModel {\n\t\t\t\tlap.CarID = result.CarID\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "fcb69a3e98951f2ca90a8c17f930931c", "score": "0.38934073", "text": "func (_L1StandardBridge *L1StandardBridgeFilterer) ParseERC20DepositInitiated(log types.Log) (*L1StandardBridgeERC20DepositInitiated, error) {\n\tevent := new(L1StandardBridgeERC20DepositInitiated)\n\tif err := _L1StandardBridge.contract.UnpackLog(event, \"ERC20DepositInitiated\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "title": "" }, { "docid": "5260708d885b56d54dcab6c6ba8ca76d", "score": "0.38920513", "text": "func (bridge *Bridge) Search() ([]Result, error) {\n\tresponse, err := bridge.post(\"/lights\", nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer response.Body.Close()\n\n\tvar results []Result\n\terr = json.NewDecoder(response.Body).Decode(&results)\n\treturn results, err\n}", "title": "" }, { "docid": "2d933c1b1859580f7c3ac20ce730a736", "score": "0.38887936", "text": "func extractFlightLevel(in string) (int, error) {\n\tfl, err := strconv.Atoi(in[1:])\n\n\tif err != nil {\n\t\tlog.Errorf(\"flight level %v cannot be parsed\", fl)\n\t\treturn -1, fmt.Errorf(\"flight level %v cannot be parsed\", fl)\n\t}\n\n\treturn fl, err\n}", "title": "" }, { "docid": "84a7438a9fc1bb60771fa4a7f8e1ea32", "score": "0.38865325", "text": "func getEvents(index warp.Pid, data *warp.LocalData) {\n\tfor i := 0; i < n_events; i++ {\n\t\tif warp.Pid(initEv[i].Type.From/(entitynum/lpnum)) == index {\n\t\t\tdata.FutureEvents.Insert(&initEv[i])\n\t\t}\n\t}\n}", "title": "" }, { "docid": "15fb7b606e142269a2ffb4ee46cf5081", "score": "0.38786325", "text": "func (_IERC721 *IERC721Filterer) ParseApprovalForAll(log types.Log) (*IERC721ApprovalForAll, error) {\n\tevent := new(IERC721ApprovalForAll)\n\tif err := _IERC721.contract.UnpackLog(event, \"ApprovalForAll\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "e7840bace0e547f424599c4d3616e019", "score": "0.38781035", "text": "func performDetection(results *gocv.Mat, nbRows, nbCols int) *[]*events.Object {\n\tobjects := make([]*events.Object, 0, results.Total())\n\n\tfor i := 0; i < results.Total(); i += 7 {\n\t\tconfidence := results.GetFloatAt(0, i+2)\n\t\tif confidence > 0.25 {\n\t\t\tlog.Debugf(\"classId: %v\\n\", results.GetFloatAt(0, i+1))\n\n\t\t\tobjects = append(objects, &events.Object{\n\t\t\t\tType: events.TypeObject_ANY,\n\t\t\t\tLeft: int32(results.GetFloatAt(0, i+3) * float32(nbCols)),\n\t\t\t\tTop: int32(results.GetFloatAt(0, i+4) * float32(nbRows)),\n\t\t\t\tRight: int32(results.GetFloatAt(0, i+5) * float32(nbCols)),\n\t\t\t\tBottom: int32(results.GetFloatAt(0, i+6) * float32(nbRows)),\n\t\t\t\tConfidence: confidence,\n\t\t\t})\n\t\t}\n\t}\n\treturn &objects\n}", "title": "" }, { "docid": "427b1a15cff3eedde75574106d6c29a7", "score": "0.387804", "text": "func scrapTOEFL(baseCollector colly.Collector, id string) ([]riwayatTOEFL, error) {\n\ttoeflCollector := baseCollector.Clone()\n\n\ttoeflCollector.AllowedDomains = []string{\n\t\t\"cdc.unpar.ac.id\",\n\t}\n\n\tvar err error\n\tvar result []riwayatTOEFL\n\n\ttoeflCollector.OnHTML(\"table tbody\", func(e *colly.HTMLElement) {\n\t\te.ForEach(\"tr\", func(idx int, el *colly.HTMLElement) {\n\t\t\tif idx > 0 {\n\t\t\t\tlistening, errL := strconv.Atoi(el.ChildText(\"td:nth-child(2)\"))\n\t\t\t\tstructure, _ := strconv.Atoi(el.ChildText(\"td:nth-child(3)\"))\n\t\t\t\treading, _ := strconv.Atoi(el.ChildText(\"td:nth-child(4)\"))\n\t\t\t\ttotal, _ := strconv.Atoi(el.ChildText(\"td:nth-child(5)\"))\n\t\t\t\tdate, _ := time.Parse(\"2 January 2006\", el.ChildText(\"td:nth-child(6)\"))\n\n\t\t\t\tif errL == nil {\n\t\t\t\t\tresult = append(\n\t\t\t\t\t\tresult,\n\t\t\t\t\t\triwayatTOEFL{\n\t\t\t\t\t\t\tlistening,\n\t\t\t\t\t\t\tstructure,\n\t\t\t\t\t\t\treading,\n\t\t\t\t\t\t\ttotal,\n\t\t\t\t\t\t\tdate,\n\t\t\t\t\t\t},\n\t\t\t\t\t)\n\t\t\t\t}\n\t\t\t}\n\t\t})\n\t})\n\n\terr = toeflCollector.Post(\n\t\t\"http://cdc.unpar.ac.id/old/cek-nilai-toefl/\",\n\t\tmap[string]string{\n\t\t\t\"npm\": id,\n\t\t\t\"act\": \"Cek Nilai\",\n\t\t},\n\t)\n\n\treturn result, err\n}", "title": "" }, { "docid": "6a2c72cf3982b6b37772c6f11dae839f", "score": "0.3877984", "text": "func (a *AviasalesApi) DataAirlines() (airlines []Airline, err error) {\n\terr = a.getJson(\"data/airlines.json\", map[string]string{}, &airlines)\n\treturn\n}", "title": "" }, { "docid": "b73a6a497e498e5224cbeac079b07889", "score": "0.38763607", "text": "func (_IERC721Metadata *IERC721MetadataFilterer) ParseApprovalForAll(log types.Log) (*IERC721MetadataApprovalForAll, error) {\n\tevent := new(IERC721MetadataApprovalForAll)\n\tif err := _IERC721Metadata.contract.UnpackLog(event, \"ApprovalForAll\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "a1a2fc16028289a1aca2e4b21fa98bd1", "score": "0.38708135", "text": "func parseNeighbours(vtyshRes string) ([]*Neighbor, error) {\n\ttoParse := map[string]FRRNeighbor{}\n\terr := json.Unmarshal([]byte(vtyshRes), &toParse)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to parse vtysh response\")\n\t}\n\n\tres := make([]*Neighbor, 0)\n\tfor k, n := range toParse {\n\t\tip := net.ParseIP(k)\n\t\tif ip == nil {\n\t\t\treturn nil, fmt.Errorf(\"failed to parse %s as ip\", ip)\n\t\t}\n\t\tconnected := true\n\t\tif n.BgpState != bgpConnected {\n\t\t\tconnected = false\n\t\t}\n\t\tres = append(res, &Neighbor{\n\t\t\tip: ip,\n\t\t\tconnected: connected,\n\t\t\tlocalAS: strconv.Itoa(n.LocalAs),\n\t\t\tremoteAS: strconv.Itoa(n.RemoteAs),\n\t\t})\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "cbaee9b4b33e57c0a94ed1a983dc87d1", "score": "0.3869784", "text": "func getFegServedIds(ctx context.Context, networkId string) ([]string, error) {\n\tif len(networkId) == 0 {\n\t\treturn []string{}, fmt.Errorf(\"Empty networkID provided.\")\n\t}\n\tfegCfg, err := configurator.LoadNetworkConfig(ctx, networkId, feg.FegNetworkType, serdes.Network)\n\tif err != nil || fegCfg == nil {\n\t\treturn []string{}, fmt.Errorf(\"unable to retrieve config for federation network: %s\", networkId)\n\t}\n\tnetworkFegConfigs, ok := fegCfg.(*models.NetworkFederationConfigs)\n\tif !ok || networkFegConfigs == nil {\n\t\treturn []string{}, fmt.Errorf(\"invalid federation network config found for network: %s\", networkId)\n\t}\n\t// getFegServedIds will always return ServedNetworkIds of the given FeG networkId, but if the given FeG Network\n\t// is also serving Neutral Host Network, getFegServedIds would append all ServedNetworkIds of this\n\t// Neutral Host Network to the result\n\tif len(networkFegConfigs.ServedNhIds) == 0 {\n\t\treturn networkFegConfigs.ServedNetworkIds, nil\n\t}\n\t// If this is a NH FeG Network, add served networks from ServedNhIds FeG networks\n\tnids := networkFegConfigs.ServedNetworkIds // prepend 'local' ServedNhIds to the combined result\n\tglog.V(2).Infof(\"getFegServedIds: nonempty Served NH Networks list for network: %s\", networkId)\n\tfor _, nhNetworkId := range networkFegConfigs.ServedNhIds {\n\t\tif len(nhNetworkId) > 0 {\n\t\t\tnhFegCfg, err := configurator.LoadNetworkConfig(ctx, nhNetworkId, feg.FegNetworkType, serdes.Network)\n\t\t\tif err != nil || nhFegCfg == nil {\n\t\t\t\tglog.Errorf(\"unable to retrieve config for NH federation network '%s': %v\", nhNetworkId, err)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tnhNetworkFegConfigs, ok := nhFegCfg.(*models.NetworkFederationConfigs)\n\t\t\tif !ok || nhNetworkFegConfigs == nil {\n\t\t\t\tglog.Errorf(\"invalid FeG network config found for NH network '%s': %T\", nhNetworkId, nhFegCfg)\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tnids = append(nids, nhNetworkFegConfigs.ServedNetworkIds...)\n\t\t}\n\t}\n\treturn nids, nil\n}", "title": "" }, { "docid": "84d342ebd8c8f8305c95675bd6cab95f", "score": "0.38634345", "text": "func Parse(r io.Reader, f func(Event)) {\n\tscanner := bufio.NewScanner(r)\n\tscanner.Split(scanSSELines)\n\n\tcheckBOM := true\n\tev := Event{}\n\tfor scanner.Scan() {\n\t\tb := scanner.Bytes()\n\t\t// discard the leading BOM from first line, if present.\n\t\tif checkBOM {\n\t\t\tif len(b) >= 3 && bytes.Equal(b[:3], bom) {\n\t\t\t\tb = b[3:]\n\t\t\t}\n\t\t\tcheckBOM = false\n\t\t}\n\n\t\t// if blank, dispatch the event\n\t\tif len(b) == 0 {\n\t\t\tif len(ev.Data) > 0 {\n\t\t\t\tf(ev)\n\t\t\t}\n\t\t\tev = Event{}\n\t\t\tcontinue\n\t\t}\n\n\t\t// if starts with colon, then skip\n\t\tif bytes.HasPrefix(b, colon) {\n\t\t\t// lines starting with colons are comments. Skip.\n\t\t\tcontinue\n\t\t}\n\n\t\tfield, value := splitLine(b)\n\n\t\tif bytes.Equal(field, fieldEvent) {\n\t\t\tev.Event = string(value)\n\t\t\tcontinue\n\t\t}\n\n\t\tif bytes.Equal(field, fieldData) {\n\t\t\tif len(ev.Data) > 0 {\n\t\t\t\tev.Data = append(ev.Data, newLine...)\n\t\t\t}\n\t\t\tev.Data = append(ev.Data, value...)\n\t\t\tcontinue\n\t\t}\n\n\t\tif bytes.Equal(field, fieldID) {\n\t\t\tev.ID = string(value)\n\t\t\tcontinue\n\t\t}\n\n\t\tif bytes.Equal(field, fieldRetry) {\n\t\t\tretry, err := parseRetry(value)\n\t\t\tif err != nil {\n\t\t\t\t// malformed retry values should be skipped\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tev.Retry = retry\n\t\t\tcontinue\n\t\t}\n\t}\n}", "title": "" }, { "docid": "13a089b2a00c8eb68895dd5245416703", "score": "0.38582858", "text": "func parseAgent(agentReply string) (AgentInfo, error) {\n\tgaInfo := AgentInfo{}\n\tresponse := stripAgentResponse(agentReply)\n\n\terr := json.Unmarshal([]byte(response), &gaInfo)\n\tif err != nil {\n\t\treturn AgentInfo{}, err\n\t}\n\n\tlog.Log.V(3).Infof(\"guest agent info: %v\", gaInfo)\n\n\treturn gaInfo, nil\n}", "title": "" }, { "docid": "8d357bb1065d31e49f9067fafe19c2cf", "score": "0.38559145", "text": "func (m *RoomMutation) RoomToAppointmentResultsIDs() (ids []int) {\n\tfor id := range m._RoomToAppointmentResults {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "bec8229ceea72768c186cef44b071f21", "score": "0.3854556", "text": "func (ec *executionContext) field_Fighter_fightResults_args(ctx context.Context, rawArgs map[string]interface{}) (map[string]interface{}, error) {\n\tvar err error\n\targs := map[string]interface{}{}\n\tvar arg0 int\n\tif tmp, ok := rawArgs[\"first\"]; ok {\n\t\targ0, err = ec.unmarshalNInt2int(ctx, tmp)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\targs[\"first\"] = arg0\n\treturn args, nil\n}", "title": "" }, { "docid": "d249f90b992459c889e5fc0d1eaf86fd", "score": "0.38539678", "text": "func (s *SingleRuntime) parseACLS(output string) models.ACLFiles {\n\tif output == \"\" {\n\t\treturn nil\n\t}\n\tacls := models.ACLFiles{}\n\n\tlines := strings.Split(strings.TrimSpace(output), \"\\n\")\n\tfor _, line := range lines {\n\t\tm := s.parseACL(line)\n\t\tif m != nil {\n\t\t\tacls = append(acls, m)\n\t\t}\n\t}\n\treturn acls\n}", "title": "" }, { "docid": "8e22282cf616455d4148efbe66cbe807", "score": "0.38536048", "text": "func (m *PatientMutation) PatientToTriageResultIDs() (ids []int) {\n\tfor id := range m.patientToTriageResult {\n\t\tids = append(ids, id)\n\t}\n\treturn\n}", "title": "" }, { "docid": "061feebba855cc11769f3419e8049400", "score": "0.3847454", "text": "func buildTracklist(JSON historyResponse) (trackList []extractor.Track, err error) {\n\tfor _, v := range JSON.Data.TimelineCursor.Edges {\n\t\tvar track = extractor.Track{\n\t\t\tTitle: v.Node.Title,\n\t\t\tArtist: v.Node.Artist,\n\t\t\tAlbum: v.Node.Album,\n\t\t}\n\t\ttrackList = append(trackList, track)\n\t}\n\n\tif len(trackList) == 0 {\n\t\terrMsg := fmt.Sprintf(\"empty playlist. Unmarshalled reponse: %v\", JSON)\n\t\tlogger.Error.Print(errMsg)\n\t\treturn trackList, errors.New(errMsg)\n\t}\n\treturn trackList, err\n}", "title": "" }, { "docid": "728f4fe80edc22eb3258b9c0e868bdcc", "score": "0.38427815", "text": "func (wa *WebAPI) GetPlayerMatchIDs(playerID int, since time.Time) ([]int, error) {\n\turl := &url.URL{\n\t\tScheme: \"https\",\n\t\tPath: \"api.steampowered.com/IDOTA2Match_570/GetMatchHistory/V001/\",\n\t}\n\tquery := url.Query()\n\tquery.Set(\"key\", wa.key)\n\tquery.Set(\"account_id\", strconv.Itoa(playerID))\n\turl.RawQuery = query.Encode()\n\n\tresp, err := http.Get(url.String())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\tdata, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar mh request.GetMatchHistory\n\terr = json.Unmarshal(data, &mh)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar ids []int\n\tfor _, m := range mh.Result.Matches {\n\t\tif time.Unix(m.StartTime, 0).Before(since) {\n\t\t\treturn ids, nil\n\t\t}\n\t\tids = append(ids, m.MatchID)\n\t}\n\t// continue getting matches until we've reached the end, or since\n\tfor {\n\t\tquery := url.Query()\n\t\tquery.Set(\"key\", wa.key)\n\t\tquery.Set(\"account_id\", strconv.Itoa(playerID))\n\t\tquery.Set(\"start_at_match_id\", strconv.Itoa(ids[len(ids)-1]))\n\t\turl.RawQuery = query.Encode()\n\n\t\tresp, err := http.Get(url.String())\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tdefer resp.Body.Close()\n\n\t\tdata, err := ioutil.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tvar mh request.GetMatchHistory\n\t\terr = json.Unmarshal(data, &mh)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif mh.Result.ResultsRemaining == 0 {\n\t\t\treturn ids, nil\n\t\t}\n\n\t\tfor _, m := range mh.Result.Matches {\n\t\t\tif time.Unix(m.StartTime, 0).Before(since) {\n\t\t\t\treturn ids, nil\n\t\t\t}\n\t\t\tids = append(ids, m.MatchID)\n\t\t}\n\n\t\tlog.Println(len(ids))\n\t}\n}", "title": "" }, { "docid": "aeffc8594c701e6fb29acf7ba39f07c8", "score": "0.38426936", "text": "func (_L1ERC721Bridge *L1ERC721BridgeFilterer) ParseERC721BridgeFinalized(log types.Log) (*L1ERC721BridgeERC721BridgeFinalized, error) {\n\tevent := new(L1ERC721BridgeERC721BridgeFinalized)\n\tif err := _L1ERC721Bridge.contract.UnpackLog(event, \"ERC721BridgeFinalized\", log); err != nil {\n\t\treturn nil, err\n\t}\n\tevent.Raw = log\n\treturn event, nil\n}", "title": "" }, { "docid": "4949b6111b9d36aa5ba2e7a864c22413", "score": "0.38404134", "text": "func NewFlight(cffly crossfeed.CF_Flight) *Flight{\n \tfly := new(Flight)\n fly.Callsign = cffly.Callsign\n fly.Model = cffly.Model\n aero := filepath.Base(cffly.Model)\n if strings.HasSuffix(aero, \".xml\") {\n \tfly.Aero = aero[0:len(aero)-4]\n }else{\n \tfly.Aero = aero\n }\n \n fly.Positions = make([]*Pos,0, HISTORY_MAX_POSITIONS)\n\treturn fly\n}", "title": "" }, { "docid": "5566bca7e9c8469dd32b74ed35c5910f", "score": "0.38374594", "text": "func (this *RavenReceiver) GetInFlightRavens() map[string]string {\n\tholder := make(map[string]string, len(this.msgReceivers))\n\tfor _, r := range this.msgReceivers {\n\t\tvar val string\n\t\tcc, err := r.getInFlightRavens()\n\t\tif err != nil {\n\t\t\tval = err.Error()\n\t\t} else {\n\t\t\tval = strconv.Itoa(cc)\n\t\t}\n\t\tholder[r.id] = val\n\t}\n\treturn holder\n}", "title": "" }, { "docid": "087ab51fe81eceaae96465d3eeefbb3d", "score": "0.3836498", "text": "func (kr *KnockoffResult) FDR() []float64 {\n\treturn kr.fdr\n}", "title": "" }, { "docid": "422afc2ccac5c57213b8e3815e4b9bc5", "score": "0.38260406", "text": "func main() {\n\tcfg := avaclient.NewConfiguration()\n\tapi := avaclient.NewAPIClient(cfg)\n\n\tstatus, _, err := api.StatusApi.StatusGetStatus(context.Background()).Execute()\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tfmt.Println(\"Healthy:\", status.IsHealthy, \"; Version:\", *status.Version)\n\n\ttoken, err := avaclient.NewToken(\"the-client-id\", \"super-secret-client-secret\")\n\n\tif err != nil {\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tfmt.Println(token.Token())\n\n\tauthCtx := context.WithValue(context.Background(), avaclient.ContextOAuth2, token)\n\n\tgaeb, _, err := api.AvaConversionApi.AvaConversionConvertToGaeb(authCtx).\n\t\tAvaProject(avaclient.ProjectDto{\n\t\t\tServiceSpecifications: []avaclient.ServiceSpecificationDto{{\n\t\t\t\tElements: []avaclient.IElementDtoHolder{{\n\t\t\t\t\tHolder: avaclient.PositionDto{\n\t\t\t\t\t\tIElementDto: avaclient.IElementDto{\n\t\t\t\t\t\t\tElementTypeDiscriminator: \"Position\",\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t}},\n\t\t\t}},\n\t\t\tGaebXmlId: nil,\n\t\t}).\n\t\tDestinationGaebType(string(avaclient.DESTINATIONGAEBTYPE_GAEB_XML_V3_3_COMMERCE)).\n\t\tExecute()\n\tif err != nil {\n\t\tfmt.Println(string(err.(*avaclient.GenericOpenAPIError).Body()))\n\t\tfmt.Println(err)\n\t\tos.Exit(1)\n\t}\n\n\tfi, err := gaeb.Stat()\n\tfmt.Println(\"GAEB Size:\", fi.Size())\n\tvar buffer = make([]byte, fi.Size())\n\tgaeb.Read(buffer)\n\tgaeb.Close()\n\tfmt.Println(string(buffer))\n}", "title": "" }, { "docid": "dffd01b02dbbc66f5a5566143f6c6391", "score": "0.38238055", "text": "func ParseResultsFromFile(file *os.File) (*vegeta.Results, error) {\n\tdecoder := vegeta.NewDecoder(file)\n\n\tresults := &vegeta.Results{}\n\n\tfor {\n\t\tvar r vegeta.Result\n\t\tif err := decoder.Decode(&r); err != nil {\n\t\t\tif err == io.EOF {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\treturn nil, err\n\t\t}\n\t\tresults.Add(&r)\n\t}\n\n\tresults.Close()\n\n\treturn results, nil\n}", "title": "" }, { "docid": "8aa23057cd4500836ef79f043db934da", "score": "0.38212934", "text": "func getFederationResolvers(tx *sql.Tx, fedIDs []int) (map[int][]FedResolverInfo, error) {\n\tfeds := map[int][]FedResolverInfo{}\n\tqry := `\nSELECT\n ffr.federation,\n frt.name as resolver_type,\n fr.ip_address\nFROM\n federation_federation_resolver ffr\n JOIN federation_resolver fr ON ffr.federation_resolver = fr.id\n JOIN type frt on fr.type = frt.id\nWHERE\n ffr.federation = ANY($1)\n`\n\trows, err := tx.Query(qry, pq.Array(fedIDs))\n\tif err != nil {\n\t\treturn nil, errors.New(\"all federations resolvers querying: \" + err.Error())\n\t}\n\tdefer rows.Close()\n\n\tfor rows.Next() {\n\t\tfedID := 0\n\t\tf := FedResolverInfo{}\n\t\tfType := \"\"\n\t\tif err := rows.Scan(&fedID, &fType, &f.IP); err != nil {\n\t\t\treturn nil, errors.New(\"all federations resolvers scanning: \" + err.Error())\n\t\t}\n\t\tf.Type = tc.FederationResolverTypeFromString(fType)\n\t\tfeds[fedID] = append(feds[fedID], f)\n\t}\n\treturn feds, nil\n}", "title": "" }, { "docid": "ec2aaa1577cba1c72395a1e04bc22563", "score": "0.38173124", "text": "func TestInstantAppEventParsing(t *testing.T) {\n\ttests := []struct {\n\t\tdesc string\n\t\tinputHistory string\n\t\tinputCheckin string\n\t\tpkgList []*usagepb.PackageInfo\n\t\twantCSV string\n\t\twantErrors []error\n\t}{\n\t\t{\n\t\t\tdesc: \"Test simple parsing\",\n\t\t\tinputHistory: strings.Join([]string{\n\t\t\t\t`9,hsp,3,10028,\"com.googlecode.eyesfree.brailleback\"`,\n\t\t\t\t`9,hsp,4,10139,\"com.google.android.apps.interactiveevents\"`,\n\t\t\t\t`9,hsp,6,1234,\"com.google.android.apps.chromecast.app\"`, // The \"UID\" section for Epi is actually just the version code of the app.\n\t\t\t\t`9,hsp,7,81,\"com.google.android.apps.blogger\"`, // The \"UID\" section for Epu is actually just the version code of the app.\n\t\t\t\t`9,hsp,8,10070,\"\"`, // The log won't include the application name, just the UID.\n\t\t\t\t`9,h,0:RESET:TIME:1432964300000`,\n\t\t\t\t`9,h,1000,Eaa=3`,\n\t\t\t\t`9,h,2000,Eai=4`,\n\t\t\t\t`9,h,3000,Epi=6`,\n\t\t\t\t`9,h,4000,Epu=7`,\n\t\t\t\t`9,h,5000,Ewa=8`,\n\t\t\t}, \"\\n\"),\n\t\t\tinputCheckin: `9,10061,l,apk,1,com.google.android.apps.chromecast.app,...`, // Test that epi=6 outputs the proper UID via checkin output matching.\n\t\t\tpkgList: []*usagepb.PackageInfo{ // Test that Epu=7 outputs the proper UID via pkg list matching.\n\t\t\t\t{\n\t\t\t\t\tPkgName: proto.String(\"com.google.android.apps.blogger\"),\n\t\t\t\t\tUid: proto.Int32(10070),\n\t\t\t\t\tVersionCode: proto.Int32(81),\n\t\t\t\t},\n\t\t\t},\n\t\t\twantCSV: strings.Join([]string{\n\t\t\t\tcsv.FileHeader,\n\t\t\t\t`Package active,service,1432964301000,1432964301000,com.googlecode.eyesfree.brailleback,10028`,\n\t\t\t\t`Package inactive,service,1432964303000,1432964303000,com.google.android.apps.interactiveevents,10139`,\n\t\t\t\t`Package install,service,1432964306000,1432964306000,com.google.android.apps.chromecast.app,10061`,\n\t\t\t\t`Package uninstall,service,1432964310000,1432964310000,com.google.android.apps.blogger,10070`,\n\t\t\t\t`App Processor wakeup,service,1432964315000,1432964315000,com.google.android.apps.blogger,10070`,\n\t\t\t}, \"\\n\"),\n\t\t},\n\t\t{\n\t\t\tdesc: \"Test missing entries\",\n\t\t\tinputHistory: strings.Join([]string{\n\t\t\t\t`9,h,0:RESET:TIME:1432964300000`,\n\t\t\t\t`9,h,1000,Eaa=3`,\n\t\t\t\t`9,h,2000,Eai=4`,\n\t\t\t\t`9,h,3000,Epi=6`,\n\t\t\t\t`9,h,4000,Epu=7`,\n\t\t\t}, \"\\n\"),\n\t\t\twantCSV: strings.Join([]string{\n\t\t\t\tcsv.FileHeader,\n\t\t\t}, \"\\n\"),\n\t\t\twantErrors: []error{\n\t\t\t\terrors.New(`** Error in 9,h,1000,Eaa=3 with Eaa=3 : unable to find index \"3\" in idxMap for \"Package active\"`),\n\t\t\t\terrors.New(`** Error in 9,h,2000,Eai=4 with Eai=4 : unable to find index \"4\" in idxMap for \"Package inactive\"`),\n\t\t\t\terrors.New(`** Error in 9,h,3000,Epi=6 with Epi=6 : unable to find index \"6\" in idxMap for \"Package install\"`),\n\t\t\t\terrors.New(`** Error in 9,h,4000,Epu=7 with Epu=7 : unable to find index \"7\" in idxMap for \"Package uninstall\"`),\n\t\t\t},\n\t\t},\n\t}\n\n\tfor _, test := range tests {\n\t\tupm, errs := UIDAndPackageNameMapping(test.inputCheckin, test.pkgList)\n\t\tif len(errs) > 0 {\n\t\t\tt.Errorf(\"%v: UIDAndPackageMatching(%v, %v) generated unexpected errors:\\n %v\", test.desc, test.inputCheckin, test.pkgList, errs)\n\t\t}\n\n\t\tvar b bytes.Buffer\n\t\tresult := AnalyzeHistory(&b, test.inputHistory, FormatTotalTime, upm, true)\n\t\tvalidateHistory(test.inputHistory, t, result, len(test.wantErrors), 1)\n\n\t\tgot := normalizeCSV(b.String())\n\t\twant := normalizeCSV(test.wantCSV)\n\t\tif !reflect.DeepEqual(got, want) {\n\t\t\tt.Errorf(\"%v: AnalyzeHistory(%v, %v) generated incorrect csv:\\n got: %q\\n want: %q\", test.desc, test.inputHistory, upm, got, want)\n\t\t}\n\t\tif !reflect.DeepEqual(result.Errs, test.wantErrors) {\n\t\t\tt.Errorf(\"%v: AnalyzeHistory(%v, %v) generated unexpected errors:\\n got: %v\\n want: %v\", test.desc, test.inputHistory, upm, result.Errs, test.wantErrors)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d28b679c7a64d0113418efafbfe4d2df", "score": "0.38156798", "text": "func handleFlightLogFlightsRequest(args []string, w http.ResponseWriter, r *http.Request) {\n\t\n\tdb, err := openDatabase()\n\tif (err != nil) {\n \thttp.Error(w, err.Error(), http.StatusInternalServerError)\n \treturn\n\t}\n\tdefer db.Close()\n\t\n\tvar offset int\n\tif (len(args) > 0) {\n\t\toffset, err = strconv.Atoi(args[0])\n\t\tif (err != nil) {\n\t\t\thttp.Error(w, \"Invalid page value\", http.StatusBadRequest)\n\t\t\treturn\n\t\t}\n\t\t// page size is 10 records\n\t\toffset = (offset - 1) * 10\n\t}\n\t\n\tvar count int64 \n\tcount = getCount(\"SELECT COUNT(*) FROM startup WHERE duration > 1 AND distance > 1 AND ((max_alt - start_alt) > 350);\", db)\n\t\n\tsql := fmt.Sprintf(\"SELECT * FROM startup WHERE duration > 1 AND distance > 1 AND ((max_alt - start_alt) > 350) ORDER BY id DESC LIMIT 10 OFFSET %d;\", offset);\n m, err := gosqljson.QueryDbToMapJSON(db, \"any\", sql)\n if err != nil {\n \thttp.Error(w, err.Error(), http.StatusBadRequest)\n \treturn\n }\n\n\tret := fmt.Sprintf(\"{\\\"count\\\": %d, \\\"limit\\\": 10, \\\"offset\\\": %d, \\\"data\\\": %s}\", count, offset, m)\n\t\n\tsetNoCache(w)\n\tsetJSONHeaders(w)\n\tfmt.Fprintf(w, \"%s\\n\", ret)\n}", "title": "" }, { "docid": "4421fa87fe95e50c3b0110f6b930ee05", "score": "0.3814216", "text": "func TractorResultsByEventID(db XODB, eventID string) ([]*TractorResult, error) {\n\tvar err error\n\n\t// sql query\n\tconst sqlstr = `SELECT ` +\n\t\t`\"id\", \"json_headers\", \"flow\", \"event\", \"event_id\", \"parent_event_id\", \"started_at\", \"input\", \"finished_at\", \"output\", \"node\", \"err\" ` +\n\t\t`FROM \"tractor_result\" ` +\n\t\t`WHERE \"event_id\" = $1`\n\n\t// run query\n\tXOLog(sqlstr, eventID)\n\tq, err := db.Query(sqlstr, eventID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer q.Close()\n\n\t// load results\n\tres := []*TractorResult{}\n\tfor q.Next() {\n\t\ttr := TractorResult{\n\t\t\t_exists: true,\n\t\t}\n\n\t\t// scan\n\t\terr = q.Scan(&tr.ID, &tr.JSONHeaders, &tr.Flow, &tr.Event, &tr.EventID, &tr.ParentEventID, &tr.StartedAt, &tr.Input, &tr.FinishedAt, &tr.Output, &tr.Node, &tr.Err)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tres = append(res, &tr)\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "1bb388c5f80deb22fed03228f0081dd5", "score": "0.38127032", "text": "func NewFlight(from Airport,start EpochTime,to Airport,end EpochTime) (*Flight,error) {\n\tif start <= 0 {\n\t\treturn nil, EINVALIDARGUMENT\n\t}\n\tif end <= start {\n\t\treturn nil,EINVALIDARGUMENT\n\t}\n\tflight := new(Flight)\n\tflight.Start=start\n\tflight.End=end\n\tflight.FromAirport=from.Code\n\tflight.ToAirport=to.Code\n\n\tvar err error\n\tflight.Distance,err = from.Loc.Distance(to.Loc)\n\treturn flight,err\n}", "title": "" }, { "docid": "d32efafd957a133a18820143f1051280", "score": "0.38116026", "text": "func stickerCodeExtractor(inputHtml string) ([]DataPreview, error) {\n\tvar rgx = regexp.MustCompile(`(data-preview='.*?')`)\n\ttmpExtracted := rgx.FindAllStringSubmatch(inputHtml, -1)\n\n\toutput := make([]DataPreview, len(tmpExtracted))\n\n\tfor i := 0; i < len(tmpExtracted); i++ {\n\t\tres := tmpExtracted[i][1]\n\n\t\t// Remove data-preview=' ... '\n\t\tres = strings.Split(res, \"'\")[1]\n\t\tres = strings.ReplaceAll(res, \"&quot;\", \"\\\"\")\n\t\tres = strings.ReplaceAll(res, \" \", \"\")\n\n\t\tvar dp DataPreview\n\t\terr := json.Unmarshal([]byte(res), &dp); if err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\toutput[i] = dp\n\t}\n\n\treturn output, nil\n}", "title": "" }, { "docid": "93a15effb0d20a1a4c483957341ab23e", "score": "0.38046658", "text": "func ProcessListResults(result map[string]interface{}) []MovieList {\n\n\tvar movielist []MovieList\n\tif result[\"Response\"].(string) == \"False\" {\n\t\treturn movielist\n\t}\n\tlength, err := strconv.Atoi(result[\"totalResults\"].(string))\n\tif length > 10 && err != nil {\n\t\tlength = 10\n\t}\n\tmovielist = make([]MovieList, length)\n\n\t//fmt.Println(result)\n\tmovieArray := result[\"Search\"].([]interface{})\n\tfor key, value := range movieArray {\n\t\tmovielist[key].Title = value.(map[string]interface{})[\"Title\"].(string)\n\t\tmovielist[key].Type = value.(map[string]interface{})[\"Type\"].(string)\n\t\tmovielist[key].Year = value.(map[string]interface{})[\"Year\"].(string)\n\t}\n\treturn movielist\n}", "title": "" }, { "docid": "3125673003d8205098b8d252c34104f7", "score": "0.3803912", "text": "func extractPeerdata(res *PathMetadata, asEntry *seg.ASEntry,\n\tpeerIfID common.IFIDType, includePeer bool) {\n\n\tia := asEntry.IA()\n\tstaticInfo := asEntry.Exts.StaticInfo\n\tfor i := 0; i < len(staticInfo.Latency.Peerlatencies); i++ {\n\t\tif staticInfo.Latency.Peerlatencies[i].IfID == peerIfID {\n\t\t\tif includePeer {\n\t\t\t\tres.ASLatencies[ia] = ASLatency{\n\t\t\t\t\tIntraLatency: staticInfo.Latency.Peerlatencies[i].IntraDelay,\n\t\t\t\t\tInterLatency: staticInfo.Latency.Egresslatency,\n\t\t\t\t\tPeerLatency: staticInfo.Latency.Peerlatencies[i].Interdelay,\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tres.ASLatencies[ia] = ASLatency{\n\t\t\t\t\tIntraLatency: staticInfo.Latency.Peerlatencies[i].IntraDelay,\n\t\t\t\t\tInterLatency: staticInfo.Latency.Egresslatency,\n\t\t\t\t}\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tfor i := 0; i < len(staticInfo.Linktype.Peerlinks); i++ {\n\t\tif staticInfo.Linktype.Peerlinks[i].IfID == peerIfID {\n\t\t\tif includePeer {\n\t\t\t\tres.Links[ia] = ASLink{\n\t\t\t\t\tInterLinkType: staticInfo.Linktype.EgressLinkType,\n\t\t\t\t\tPeerLinkType: staticInfo.Linktype.Peerlinks[i].LinkType,\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tres.Links[ia] = ASLink{\n\t\t\t\t\tInterLinkType: staticInfo.Linktype.EgressLinkType,\n\t\t\t\t}\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tfor i := 0; i < len(staticInfo.Bandwidth.Bandwidths); i++ {\n\t\tif staticInfo.Bandwidth.Bandwidths[i].IfID == peerIfID {\n\t\t\tres.ASBandwidths[ia] = ASBandwidth{\n\t\t\t\tIntraBW: staticInfo.Bandwidth.Bandwidths[i].BW,\n\t\t\t\tInterBW: staticInfo.Bandwidth.EgressBW,\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tfor i := 0; i < len(staticInfo.Hops.InterfaceHops); i++ {\n\t\tif staticInfo.Hops.InterfaceHops[i].IfID == peerIfID {\n\t\t\tres.ASHops[ia] = ASHops{\n\t\t\t\tHops: staticInfo.Hops.InterfaceHops[i].Hops,\n\t\t\t}\n\t\t\tbreak\n\t\t}\n\t}\n\tres.Geo[ia] = getGeo(asEntry)\n\tres.Notes[ia] = ASnote{\n\t\tNote: staticInfo.Note,\n\t}\n}", "title": "" }, { "docid": "0d58ccd2cdbe4a6fe970ff611527d38e", "score": "0.380052", "text": "func GetAnnotationIDs(annotationList string) ([]*Annotation, error) {\n\tannotationIDs, err := client.LRange(annotationList, 0, -1).Result()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tannotationsArray := make([]*Annotation, len(annotationIDs))\n\tfor i, idString := range annotationIDs {\n\t\tid, err := strconv.ParseInt(idString, 10, 64)\n\t\tif err != nil {\n\t\t\t// TODO:parse error probably\n\t\t\treturn nil, err\n\t\t}\n\t\tannotationsArray[i] = &Annotation{id}\n\t}\n\n\treturn annotationsArray, nil\n}", "title": "" }, { "docid": "f937471aeb065571fedab2c47bda0e28", "score": "0.37909144", "text": "func (_WizardGuild *WizardGuildFilterer) ParseWizardAffinityAssigned(log types.Log) (*WizardGuildWizardAffinityAssigned, error) {\n\tevent := new(WizardGuildWizardAffinityAssigned)\n\tif err := _WizardGuild.contract.UnpackLog(event, \"WizardAffinityAssigned\", log); err != nil {\n\t\treturn nil, err\n\t}\n\treturn event, nil\n}", "title": "" }, { "docid": "8a9616fbdd25e26734fdacb86cc8d7e2", "score": "0.37897605", "text": "func toAgentAfi(a gobgp.Family_Afi) agent.Afi {\n\tswitch a {\n\tcase gobgp.Family_AFI_UNKNOWN:\n\t\treturn agent.AfiUnknown\n\tcase gobgp.Family_AFI_IP:\n\t\treturn agent.AfiIPv4\n\tcase gobgp.Family_AFI_IP6:\n\t\treturn agent.AfiIPv6\n\tcase gobgp.Family_AFI_L2VPN:\n\t\treturn agent.AfiL2VPN\n\tcase gobgp.Family_AFI_LS:\n\t\treturn agent.AfiLS\n\tcase gobgp.Family_AFI_OPAQUE:\n\t\treturn agent.AfiOpaque\n\tdefault:\n\t\treturn agent.AfiUnknown\n\t}\n}", "title": "" }, { "docid": "ae7608025507356a5d0830a217eb8ba8", "score": "0.37855864", "text": "func FaceIDByImage(ImgBytes []byte) (string, error) {\n\tvar res faceAttr\n\treq, _ := http.NewRequest(\"POST\", uriDetect, bytes.NewBuffer(ImgBytes))\n\treq.Header.Set(\"Content-Type\", \"application/octet-stream\")\n\treq.Header.Set(\"Ocp-Apim-Subscription-Key\", apiKey)\n\tclient := &http.Client{}\n\tresp, err := client.Do(req)\n\tif err != nil {\n\t\treturn \"\", errors.New(\"fail to reach Azure Face Detection API, may caused by client policy or network connectivity problem\")\n\t}\n\tdefer resp.Body.Close()\n\tif err = json.NewDecoder(resp.Body).Decode(&res); err != nil {\n\t\treturn \"\", err\n\t}\n\tfmt.Println(\"DIBAWAH INI REPOSNSE FaceIDByImage\")\n\tfmt.Println(res[0])\n\treturn res[0].FaceID, nil\n}", "title": "" }, { "docid": "bf1b2b47fa68941e766bbaa2d8b70887", "score": "0.37799942", "text": "func aids(c *bm.Context) {\n\tvar (\n\t\tmid int64\n\t)\n\tif midInter, ok := c.Get(\"mid\"); ok {\n\t\tmid = midInter.(int64)\n\t}\n\tif mid <= 0 {\n\t\tc.JSON(nil, ecode.RequestErr)\n\t\treturn\n\t}\n\tlist, err := hisSvc.AVHistories(c, mid)\n\tif err != nil {\n\t\tc.JSON(nil, err)\n\t\treturn\n\t}\n\tc.JSON(list, nil)\n}", "title": "" } ]