id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
listlengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
listlengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
144,100
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
NewSdkRoleManager
func NewSdkRoleManager(kv kvdb.Kvdb) (*SdkRoleManager, error) { s := &SdkRoleManager{ kv: kv, } // Load all default roles for k, v := range defaultRoles { role := &api.SdkRole{ Name: k, Rules: v, } if _, err := kv.Put(prefixWithName(k), role, 0); err != nil { return nil, err } } return s, nil }
go
func NewSdkRoleManager(kv kvdb.Kvdb) (*SdkRoleManager, error) { s := &SdkRoleManager{ kv: kv, } // Load all default roles for k, v := range defaultRoles { role := &api.SdkRole{ Name: k, Rules: v, } if _, err := kv.Put(prefixWithName(k), role, 0); err != nil { return nil, err } } return s, nil }
[ "func", "NewSdkRoleManager", "(", "kv", "kvdb", ".", "Kvdb", ")", "(", "*", "SdkRoleManager", ",", "error", ")", "{", "s", ":=", "&", "SdkRoleManager", "{", "kv", ":", "kv", ",", "}", "\n\n", "// Load all default roles", "for", "k", ",", "v", ":=", "range", "defaultRoles", "{", "role", ":=", "&", "api", ".", "SdkRole", "{", "Name", ":", "k", ",", "Rules", ":", "v", ",", "}", "\n", "if", "_", ",", "err", ":=", "kv", ".", "Put", "(", "prefixWithName", "(", "k", ")", ",", "role", ",", "0", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "s", ",", "nil", "\n", "}" ]
// NewSdkRoleManager returns a new SDK role manager
[ "NewSdkRoleManager", "returns", "a", "new", "SDK", "role", "manager" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L152-L169
144,101
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Create
func (r *SdkRoleManager) Create( ctx context.Context, req *api.SdkRoleCreateRequest, ) (*api.SdkRoleCreateResponse, error) { if req.GetRole() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply a role") } else if len(req.GetRole().GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for the role") } else if err := r.validateRole(req.GetRole()); err != nil { return nil, err } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetRole().GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "Name %s already used by system role", req.GetRole().GetName()) } // Save value in kvdb _, err := r.kv.Create(prefixWithName(req.GetRole().GetName()), req.GetRole(), 0) if err == kvdb.ErrExist { // Idempotency check. // Check that the new rules are the same. oldrole, err := r.Inspect(ctx, &api.SdkRoleInspectRequest{ Name: req.GetRole().GetName(), }) if err != nil { return nil, err } if !reflect.DeepEqual(oldrole.GetRole(), req.GetRole()) { return nil, status.Error( codes.AlreadyExists, "Existing role differs from requested role") } } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to save role: %v", err) } return &api.SdkRoleCreateResponse{ Role: req.GetRole(), }, nil }
go
func (r *SdkRoleManager) Create( ctx context.Context, req *api.SdkRoleCreateRequest, ) (*api.SdkRoleCreateResponse, error) { if req.GetRole() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply a role") } else if len(req.GetRole().GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for the role") } else if err := r.validateRole(req.GetRole()); err != nil { return nil, err } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetRole().GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "Name %s already used by system role", req.GetRole().GetName()) } // Save value in kvdb _, err := r.kv.Create(prefixWithName(req.GetRole().GetName()), req.GetRole(), 0) if err == kvdb.ErrExist { // Idempotency check. // Check that the new rules are the same. oldrole, err := r.Inspect(ctx, &api.SdkRoleInspectRequest{ Name: req.GetRole().GetName(), }) if err != nil { return nil, err } if !reflect.DeepEqual(oldrole.GetRole(), req.GetRole()) { return nil, status.Error( codes.AlreadyExists, "Existing role differs from requested role") } } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to save role: %v", err) } return &api.SdkRoleCreateResponse{ Role: req.GetRole(), }, nil }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Create", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkRoleCreateRequest", ",", ")", "(", "*", "api", ".", "SdkRoleCreateResponse", ",", "error", ")", "{", "if", "req", ".", "GetRole", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "else", "if", "len", "(", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "else", "if", "err", ":=", "r", ".", "validateRole", "(", "req", ".", "GetRole", "(", ")", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Determine if there is collision with default roles", "if", "_", ",", "ok", ":=", "defaultRoles", "[", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", "]", ";", "ok", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ",", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "// Save value in kvdb", "_", ",", "err", ":=", "r", ".", "kv", ".", "Create", "(", "prefixWithName", "(", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ")", ",", "req", ".", "GetRole", "(", ")", ",", "0", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrExist", "{", "// Idempotency check.", "// Check that the new rules are the same.", "oldrole", ",", "err", ":=", "r", ".", "Inspect", "(", "ctx", ",", "&", "api", ".", "SdkRoleInspectRequest", "{", "Name", ":", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "if", "!", "reflect", ".", "DeepEqual", "(", "oldrole", ".", "GetRole", "(", ")", ",", "req", ".", "GetRole", "(", ")", ")", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "AlreadyExists", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkRoleCreateResponse", "{", "Role", ":", "req", ".", "GetRole", "(", ")", ",", "}", ",", "nil", "\n", "}" ]
// Create saves a role in Kvdb
[ "Create", "saves", "a", "role", "in", "Kvdb" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L172-L214
144,102
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Enumerate
func (r *SdkRoleManager) Enumerate( ctx context.Context, req *api.SdkRoleEnumerateRequest, ) (*api.SdkRoleEnumerateResponse, error) { keys, err := r.kv.Keys(rolePrefix, "/") if err != nil { return nil, status.Errorf(codes.Internal, "Failed to access roles from database: %v", err) } names := make([]string, len(keys)) for i, key := range keys { names[i] = strings.TrimPrefix(key, rolePrefix+"/") } return &api.SdkRoleEnumerateResponse{ Names: names, }, nil }
go
func (r *SdkRoleManager) Enumerate( ctx context.Context, req *api.SdkRoleEnumerateRequest, ) (*api.SdkRoleEnumerateResponse, error) { keys, err := r.kv.Keys(rolePrefix, "/") if err != nil { return nil, status.Errorf(codes.Internal, "Failed to access roles from database: %v", err) } names := make([]string, len(keys)) for i, key := range keys { names[i] = strings.TrimPrefix(key, rolePrefix+"/") } return &api.SdkRoleEnumerateResponse{ Names: names, }, nil }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Enumerate", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkRoleEnumerateRequest", ",", ")", "(", "*", "api", ".", "SdkRoleEnumerateResponse", ",", "error", ")", "{", "keys", ",", "err", ":=", "r", ".", "kv", ".", "Keys", "(", "rolePrefix", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "names", ":=", "make", "(", "[", "]", "string", ",", "len", "(", "keys", ")", ")", "\n", "for", "i", ",", "key", ":=", "range", "keys", "{", "names", "[", "i", "]", "=", "strings", ".", "TrimPrefix", "(", "key", ",", "rolePrefix", "+", "\"", "\"", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkRoleEnumerateResponse", "{", "Names", ":", "names", ",", "}", ",", "nil", "\n", "}" ]
// Enumerate returns a list of role names
[ "Enumerate", "returns", "a", "list", "of", "role", "names" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L217-L234
144,103
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Inspect
func (r *SdkRoleManager) Inspect( ctx context.Context, req *api.SdkRoleInspectRequest, ) (*api.SdkRoleInspectResponse, error) { if len(req.GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for role") } elem := &api.SdkRole{} _, err := r.kv.GetVal(prefixWithName(req.GetName()), elem) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Role %s not found", req.GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get role %s information: %v", req.GetName(), err) } return &api.SdkRoleInspectResponse{ Role: elem, }, nil }
go
func (r *SdkRoleManager) Inspect( ctx context.Context, req *api.SdkRoleInspectRequest, ) (*api.SdkRoleInspectResponse, error) { if len(req.GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for role") } elem := &api.SdkRole{} _, err := r.kv.GetVal(prefixWithName(req.GetName()), elem) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Role %s not found", req.GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get role %s information: %v", req.GetName(), err) } return &api.SdkRoleInspectResponse{ Role: elem, }, nil }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Inspect", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkRoleInspectRequest", ",", ")", "(", "*", "api", ".", "SdkRoleInspectResponse", ",", "error", ")", "{", "if", "len", "(", "req", ".", "GetName", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "elem", ":=", "&", "api", ".", "SdkRole", "{", "}", "\n", "_", ",", "err", ":=", "r", ".", "kv", ".", "GetVal", "(", "prefixWithName", "(", "req", ".", "GetName", "(", ")", ")", ",", "elem", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkRoleInspectResponse", "{", "Role", ":", "elem", ",", "}", ",", "nil", "\n", "}" ]
// Inspect returns a role object
[ "Inspect", "returns", "a", "role", "object" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L237-L256
144,104
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Delete
func (r *SdkRoleManager) Delete( ctx context.Context, req *api.SdkRoleDeleteRequest, ) (*api.SdkRoleDeleteResponse, error) { if len(req.GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for role") } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "Cannot delete system role %s", req.GetName()) } _, err := r.kv.Delete(prefixWithName(req.GetName())) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Failed to delete role %s: %v", req.GetName(), err) } return &api.SdkRoleDeleteResponse{}, nil }
go
func (r *SdkRoleManager) Delete( ctx context.Context, req *api.SdkRoleDeleteRequest, ) (*api.SdkRoleDeleteResponse, error) { if len(req.GetName()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply a name for role") } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "Cannot delete system role %s", req.GetName()) } _, err := r.kv.Delete(prefixWithName(req.GetName())) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Failed to delete role %s: %v", req.GetName(), err) } return &api.SdkRoleDeleteResponse{}, nil }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Delete", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkRoleDeleteRequest", ",", ")", "(", "*", "api", ".", "SdkRoleDeleteResponse", ",", "error", ")", "{", "if", "len", "(", "req", ".", "GetName", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// Determine if there is collision with default roles", "if", "_", ",", "ok", ":=", "defaultRoles", "[", "req", ".", "GetName", "(", ")", "]", ";", "ok", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "_", ",", "err", ":=", "r", ".", "kv", ".", "Delete", "(", "prefixWithName", "(", "req", ".", "GetName", "(", ")", ")", ")", "\n", "if", "err", "!=", "kvdb", ".", "ErrNotFound", "&&", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkRoleDeleteResponse", "{", "}", ",", "nil", "\n", "}" ]
// Delete removes a role from Kvdb
[ "Delete", "removes", "a", "role", "from", "Kvdb" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L259-L280
144,105
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Update
func (r *SdkRoleManager) Update( ctx context.Context, req *api.SdkRoleUpdateRequest, ) (*api.SdkRoleUpdateResponse, error) { if req.GetRole() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply a role") } if err := r.validateRole(req.GetRole()); err != nil { return nil, err } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetRole().GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "System role %s cannot be updated", req.GetRole().GetName()) } _, err := r.kv.Update(prefixWithName(req.GetRole().GetName()), req.GetRole(), 0) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Role %s not found", req.GetRole()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get role %s information: %v", req.GetRole().GetName(), err) } return &api.SdkRoleUpdateResponse{ Role: req.GetRole(), }, nil }
go
func (r *SdkRoleManager) Update( ctx context.Context, req *api.SdkRoleUpdateRequest, ) (*api.SdkRoleUpdateResponse, error) { if req.GetRole() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply a role") } if err := r.validateRole(req.GetRole()); err != nil { return nil, err } // Determine if there is collision with default roles if _, ok := defaultRoles[req.GetRole().GetName()]; ok { return nil, status.Errorf( codes.InvalidArgument, "System role %s cannot be updated", req.GetRole().GetName()) } _, err := r.kv.Update(prefixWithName(req.GetRole().GetName()), req.GetRole(), 0) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Role %s not found", req.GetRole()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get role %s information: %v", req.GetRole().GetName(), err) } return &api.SdkRoleUpdateResponse{ Role: req.GetRole(), }, nil }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Update", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkRoleUpdateRequest", ",", ")", "(", "*", "api", ".", "SdkRoleUpdateResponse", ",", "error", ")", "{", "if", "req", ".", "GetRole", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "r", ".", "validateRole", "(", "req", ".", "GetRole", "(", ")", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Determine if there is collision with default roles", "if", "_", ",", "ok", ":=", "defaultRoles", "[", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", "]", ";", "ok", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ",", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "_", ",", "err", ":=", "r", ".", "kv", ".", "Update", "(", "prefixWithName", "(", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ")", ",", "req", ".", "GetRole", "(", ")", ",", "0", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetRole", "(", ")", ")", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetRole", "(", ")", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkRoleUpdateResponse", "{", "Role", ":", "req", ".", "GetRole", "(", ")", ",", "}", ",", "nil", "\n", "}" ]
// Update replaces an existing role.
[ "Update", "replaces", "an", "existing", "role", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L283-L311
144,106
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
Verify
func (r *SdkRoleManager) Verify(ctx context.Context, roles []string, fullmethod string) error { // Check all roles for _, role := range roles { // Get the role rules resp, err := r.Inspect(ctx, &api.SdkRoleInspectRequest{ Name: role, }) if err != nil || resp == nil || resp.GetRole() == nil { continue } if err := r.verifyRules(resp.GetRole().GetRules(), fullmethod); err == nil { return nil } } return status.Errorf(codes.PermissionDenied, "Access denied to roles: %+s", roles) }
go
func (r *SdkRoleManager) Verify(ctx context.Context, roles []string, fullmethod string) error { // Check all roles for _, role := range roles { // Get the role rules resp, err := r.Inspect(ctx, &api.SdkRoleInspectRequest{ Name: role, }) if err != nil || resp == nil || resp.GetRole() == nil { continue } if err := r.verifyRules(resp.GetRole().GetRules(), fullmethod); err == nil { return nil } } return status.Errorf(codes.PermissionDenied, "Access denied to roles: %+s", roles) }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "Verify", "(", "ctx", "context", ".", "Context", ",", "roles", "[", "]", "string", ",", "fullmethod", "string", ")", "error", "{", "// Check all roles", "for", "_", ",", "role", ":=", "range", "roles", "{", "// Get the role rules", "resp", ",", "err", ":=", "r", ".", "Inspect", "(", "ctx", ",", "&", "api", ".", "SdkRoleInspectRequest", "{", "Name", ":", "role", ",", "}", ")", "\n", "if", "err", "!=", "nil", "||", "resp", "==", "nil", "||", "resp", ".", "GetRole", "(", ")", "==", "nil", "{", "continue", "\n", "}", "\n\n", "if", "err", ":=", "r", ".", "verifyRules", "(", "resp", ".", "GetRole", "(", ")", ".", "GetRules", "(", ")", ",", "fullmethod", ")", ";", "err", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "}", "\n\n", "return", "status", ".", "Errorf", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ",", "roles", ")", "\n", "}" ]
// Verify determines if the role has access to `fullmethod`
[ "Verify", "determines", "if", "the", "role", "has", "access", "to", "fullmethod" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L314-L332
144,107
libopenstorage/openstorage
pkg/role/sdkserviceapi.go
verifyRules
func (r *SdkRoleManager) verifyRules(rules []*api.SdkRule, fullmethod string) error { var reqService, reqApi string // String: "/openstorage.api.OpenStorage<service>/<method>" parts := strings.Split(fullmethod, "/") if len(parts) > 1 { reqService = strings.TrimPrefix(strings.ToLower(parts[1]), "openstorage.api.openstorage") } if len(parts) > 2 { reqApi = strings.ToLower(parts[2]) } // Go through each rule until a match is found for _, rule := range rules { for _, service := range rule.Services { if matchRule(service, reqService) { for _, api := range rule.Apis { if matchRule(api, reqApi) { return nil } } } } } return fmt.Errorf("no accessable rule to authorize access found") }
go
func (r *SdkRoleManager) verifyRules(rules []*api.SdkRule, fullmethod string) error { var reqService, reqApi string // String: "/openstorage.api.OpenStorage<service>/<method>" parts := strings.Split(fullmethod, "/") if len(parts) > 1 { reqService = strings.TrimPrefix(strings.ToLower(parts[1]), "openstorage.api.openstorage") } if len(parts) > 2 { reqApi = strings.ToLower(parts[2]) } // Go through each rule until a match is found for _, rule := range rules { for _, service := range rule.Services { if matchRule(service, reqService) { for _, api := range rule.Apis { if matchRule(api, reqApi) { return nil } } } } } return fmt.Errorf("no accessable rule to authorize access found") }
[ "func", "(", "r", "*", "SdkRoleManager", ")", "verifyRules", "(", "rules", "[", "]", "*", "api", ".", "SdkRule", ",", "fullmethod", "string", ")", "error", "{", "var", "reqService", ",", "reqApi", "string", "\n\n", "// String: \"/openstorage.api.OpenStorage<service>/<method>\"", "parts", ":=", "strings", ".", "Split", "(", "fullmethod", ",", "\"", "\"", ")", "\n\n", "if", "len", "(", "parts", ")", ">", "1", "{", "reqService", "=", "strings", ".", "TrimPrefix", "(", "strings", ".", "ToLower", "(", "parts", "[", "1", "]", ")", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "len", "(", "parts", ")", ">", "2", "{", "reqApi", "=", "strings", ".", "ToLower", "(", "parts", "[", "2", "]", ")", "\n", "}", "\n\n", "// Go through each rule until a match is found", "for", "_", ",", "rule", ":=", "range", "rules", "{", "for", "_", ",", "service", ":=", "range", "rule", ".", "Services", "{", "if", "matchRule", "(", "service", ",", "reqService", ")", "{", "for", "_", ",", "api", ":=", "range", "rule", ".", "Apis", "{", "if", "matchRule", "(", "api", ",", "reqApi", ")", "{", "return", "nil", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n\n", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}" ]
// verifyRules checks if the rules authorize use of the API called `fullmethod`
[ "verifyRules", "checks", "if", "the", "rules", "authorize", "use", "of", "the", "API", "called", "fullmethod" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/role/sdkserviceapi.go#L335-L363
144,108
libopenstorage/openstorage
pkg/seed/seed.go
New
func New(uri string, options map[string]string) (Source, error) { u, err := url.Parse(uri) if err != nil { return nil, err } switch u.Scheme { case "github": return NewGitSource(uri, options) } return nil, ErrUnsupported }
go
func New(uri string, options map[string]string) (Source, error) { u, err := url.Parse(uri) if err != nil { return nil, err } switch u.Scheme { case "github": return NewGitSource(uri, options) } return nil, ErrUnsupported }
[ "func", "New", "(", "uri", "string", ",", "options", "map", "[", "string", "]", "string", ")", "(", "Source", ",", "error", ")", "{", "u", ",", "err", ":=", "url", ".", "Parse", "(", "uri", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "switch", "u", ".", "Scheme", "{", "case", "\"", "\"", ":", "return", "NewGitSource", "(", "uri", ",", "options", ")", "\n", "}", "\n", "return", "nil", ",", "ErrUnsupported", "\n", "}" ]
// New returns a new instance of Source
[ "New", "returns", "a", "new", "instance", "of", "Source" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/seed/seed.go#L26-L36
144,109
libopenstorage/openstorage
api/server/sdk/objectstore.go
Inspect
func (s *ObjectstoreServer) Inspect( ctx context.Context, req *api.SdkObjectstoreInspectRequest, ) (*api.SdkObjectstoreInspectResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } objResp, err := s.cluster().ObjectStoreInspect(req.GetObjectstoreId()) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf( codes.NotFound, "Id %s not found", req.GetObjectstoreId()) } return nil, status.Errorf( codes.Internal, "Failed to inspect objectstore: %v", err.Error()) } return &api.SdkObjectstoreInspectResponse{ObjectstoreStatus: objResp}, nil }
go
func (s *ObjectstoreServer) Inspect( ctx context.Context, req *api.SdkObjectstoreInspectRequest, ) (*api.SdkObjectstoreInspectResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } objResp, err := s.cluster().ObjectStoreInspect(req.GetObjectstoreId()) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf( codes.NotFound, "Id %s not found", req.GetObjectstoreId()) } return nil, status.Errorf( codes.Internal, "Failed to inspect objectstore: %v", err.Error()) } return &api.SdkObjectstoreInspectResponse{ObjectstoreStatus: objResp}, nil }
[ "func", "(", "s", "*", "ObjectstoreServer", ")", "Inspect", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkObjectstoreInspectRequest", ",", ")", "(", "*", "api", ".", "SdkObjectstoreInspectResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "objResp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "ObjectStoreInspect", "(", "req", ".", "GetObjectstoreId", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetObjectstoreId", "(", ")", ")", "\n", "}", "\n", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkObjectstoreInspectResponse", "{", "ObjectstoreStatus", ":", "objResp", "}", ",", "nil", "\n", "}" ]
// Inspect Objectstore return status of provided objectstore
[ "Inspect", "Objectstore", "return", "status", "of", "provided", "objectstore" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/objectstore.go#L40-L63
144,110
libopenstorage/openstorage
api/server/sdk/objectstore.go
Create
func (s *ObjectstoreServer) Create( ctx context.Context, req *api.SdkObjectstoreCreateRequest, ) (*api.SdkObjectstoreCreateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetVolumeId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must provide volume ID") } objResp, err := s.cluster().ObjectStoreCreate(req.GetVolumeId()) if err != nil { return nil, status.Errorf( codes.Internal, "Failed to create objectstore: %v", err.Error()) } return &api.SdkObjectstoreCreateResponse{ObjectstoreStatus: objResp}, nil }
go
func (s *ObjectstoreServer) Create( ctx context.Context, req *api.SdkObjectstoreCreateRequest, ) (*api.SdkObjectstoreCreateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetVolumeId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must provide volume ID") } objResp, err := s.cluster().ObjectStoreCreate(req.GetVolumeId()) if err != nil { return nil, status.Errorf( codes.Internal, "Failed to create objectstore: %v", err.Error()) } return &api.SdkObjectstoreCreateResponse{ObjectstoreStatus: objResp}, nil }
[ "func", "(", "s", "*", "ObjectstoreServer", ")", "Create", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkObjectstoreCreateRequest", ",", ")", "(", "*", "api", ".", "SdkObjectstoreCreateResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "len", "(", "req", ".", "GetVolumeId", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n", "objResp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "ObjectStoreCreate", "(", "req", ".", "GetVolumeId", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkObjectstoreCreateResponse", "{", "ObjectstoreStatus", ":", "objResp", "}", ",", "nil", "\n", "}" ]
// CreateObjectstore creates objectstore for given volume
[ "CreateObjectstore", "creates", "objectstore", "for", "given", "volume" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/objectstore.go#L66-L86
144,111
libopenstorage/openstorage
api/server/sdk/objectstore.go
Update
func (s *ObjectstoreServer) Update( ctx context.Context, req *api.SdkObjectstoreUpdateRequest, ) (*api.SdkObjectstoreUpdateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } err := s.cluster().ObjectStoreUpdate(req.GetObjectstoreId(), req.GetEnable()) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf( codes.NotFound, "Id %s not found", req.GetObjectstoreId()) } return nil, status.Errorf( codes.Internal, "Failed to update objectstore: %v", err.Error()) } return &api.SdkObjectstoreUpdateResponse{}, nil }
go
func (s *ObjectstoreServer) Update( ctx context.Context, req *api.SdkObjectstoreUpdateRequest, ) (*api.SdkObjectstoreUpdateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } err := s.cluster().ObjectStoreUpdate(req.GetObjectstoreId(), req.GetEnable()) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf( codes.NotFound, "Id %s not found", req.GetObjectstoreId()) } return nil, status.Errorf( codes.Internal, "Failed to update objectstore: %v", err.Error()) } return &api.SdkObjectstoreUpdateResponse{}, nil }
[ "func", "(", "s", "*", "ObjectstoreServer", ")", "Update", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkObjectstoreUpdateRequest", ",", ")", "(", "*", "api", ".", "SdkObjectstoreUpdateResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "err", ":=", "s", ".", "cluster", "(", ")", ".", "ObjectStoreUpdate", "(", "req", ".", "GetObjectstoreId", "(", ")", ",", "req", ".", "GetEnable", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetObjectstoreId", "(", ")", ")", "\n", "}", "\n", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkObjectstoreUpdateResponse", "{", "}", ",", "nil", "\n", "}" ]
// UpdateObjectstore updates given objectstore state
[ "UpdateObjectstore", "updates", "given", "objectstore", "state" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/objectstore.go#L89-L112
144,112
libopenstorage/openstorage
api/server/sdk/objectstore.go
Delete
func (s *ObjectstoreServer) Delete( ctx context.Context, req *api.SdkObjectstoreDeleteRequest, ) (*api.SdkObjectstoreDeleteResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } err := s.cluster().ObjectStoreDelete(req.GetObjectstoreId()) if err != nil && err != kvdb.ErrNotFound { return nil, status.Errorf( codes.Internal, "Failed to delete objectstore: %v", err.Error()) } return &api.SdkObjectstoreDeleteResponse{}, nil }
go
func (s *ObjectstoreServer) Delete( ctx context.Context, req *api.SdkObjectstoreDeleteRequest, ) (*api.SdkObjectstoreDeleteResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } err := s.cluster().ObjectStoreDelete(req.GetObjectstoreId()) if err != nil && err != kvdb.ErrNotFound { return nil, status.Errorf( codes.Internal, "Failed to delete objectstore: %v", err.Error()) } return &api.SdkObjectstoreDeleteResponse{}, nil }
[ "func", "(", "s", "*", "ObjectstoreServer", ")", "Delete", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkObjectstoreDeleteRequest", ",", ")", "(", "*", "api", ".", "SdkObjectstoreDeleteResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "err", ":=", "s", ".", "cluster", "(", ")", ".", "ObjectStoreDelete", "(", "req", ".", "GetObjectstoreId", "(", ")", ")", "\n", "if", "err", "!=", "nil", "&&", "err", "!=", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkObjectstoreDeleteResponse", "{", "}", ",", "nil", "\n", "}" ]
// DeleteObjectstore delete objectstore from cluster
[ "DeleteObjectstore", "delete", "objectstore", "from", "cluster" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/objectstore.go#L115-L132
144,113
libopenstorage/openstorage
csi/csi.go
NewOsdCsiServer
func NewOsdCsiServer(config *OsdCsiServerConfig) (grpcserver.Server, error) { if nil == config { return nil, fmt.Errorf("Must supply configuration") } if len(config.SdkUds) == 0 { return nil, fmt.Errorf("SdkUds must be provided") } if len(config.DriverName) == 0 { return nil, fmt.Errorf("OSD Driver name must be provided") } // Save the driver for future calls d, err := volumedrivers.Get(config.DriverName) if err != nil { return nil, fmt.Errorf("Unable to get driver %s info: %s", config.DriverName, err.Error()) } // Create server gServer, err := grpcserver.New(&grpcserver.GrpcServerConfig{ Name: "CSI 1.1", Net: config.Net, Address: config.Address, }) if err != nil { return nil, fmt.Errorf("Failed to create CSI server: %v", err) } return &OsdCsiServer{ specHandler: spec.NewSpecHandler(), GrpcServer: gServer, driver: d, cluster: config.Cluster, sdkUds: config.SdkUds, }, nil }
go
func NewOsdCsiServer(config *OsdCsiServerConfig) (grpcserver.Server, error) { if nil == config { return nil, fmt.Errorf("Must supply configuration") } if len(config.SdkUds) == 0 { return nil, fmt.Errorf("SdkUds must be provided") } if len(config.DriverName) == 0 { return nil, fmt.Errorf("OSD Driver name must be provided") } // Save the driver for future calls d, err := volumedrivers.Get(config.DriverName) if err != nil { return nil, fmt.Errorf("Unable to get driver %s info: %s", config.DriverName, err.Error()) } // Create server gServer, err := grpcserver.New(&grpcserver.GrpcServerConfig{ Name: "CSI 1.1", Net: config.Net, Address: config.Address, }) if err != nil { return nil, fmt.Errorf("Failed to create CSI server: %v", err) } return &OsdCsiServer{ specHandler: spec.NewSpecHandler(), GrpcServer: gServer, driver: d, cluster: config.Cluster, sdkUds: config.SdkUds, }, nil }
[ "func", "NewOsdCsiServer", "(", "config", "*", "OsdCsiServerConfig", ")", "(", "grpcserver", ".", "Server", ",", "error", ")", "{", "if", "nil", "==", "config", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "config", ".", "SdkUds", ")", "==", "0", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "config", ".", "DriverName", ")", "==", "0", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "// Save the driver for future calls", "d", ",", "err", ":=", "volumedrivers", ".", "Get", "(", "config", ".", "DriverName", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "config", ".", "DriverName", ",", "err", ".", "Error", "(", ")", ")", "\n", "}", "\n\n", "// Create server", "gServer", ",", "err", ":=", "grpcserver", ".", "New", "(", "&", "grpcserver", ".", "GrpcServerConfig", "{", "Name", ":", "\"", "\"", ",", "Net", ":", "config", ".", "Net", ",", "Address", ":", "config", ".", "Address", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "OsdCsiServer", "{", "specHandler", ":", "spec", ".", "NewSpecHandler", "(", ")", ",", "GrpcServer", ":", "gServer", ",", "driver", ":", "d", ",", "cluster", ":", "config", ".", "Cluster", ",", "sdkUds", ":", "config", ".", "SdkUds", ",", "}", ",", "nil", "\n", "}" ]
// NewOsdCsiServer creates a gRPC CSI complient server on the // specified port and transport.
[ "NewOsdCsiServer", "creates", "a", "gRPC", "CSI", "complient", "server", "on", "the", "specified", "port", "and", "transport", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/csi/csi.go#L64-L97
144,114
libopenstorage/openstorage
csi/csi.go
setupContextWithToken
func (s *OsdCsiServer) setupContextWithToken(ctx context.Context, csiSecrets map[string]string) context.Context { if token, ok := csiSecrets[authsecrets.SecretTokenKey]; ok { md := metadata.New(map[string]string{ "authorization": "bearer " + token, }) return metadata.NewOutgoingContext(ctx, md) } return ctx }
go
func (s *OsdCsiServer) setupContextWithToken(ctx context.Context, csiSecrets map[string]string) context.Context { if token, ok := csiSecrets[authsecrets.SecretTokenKey]; ok { md := metadata.New(map[string]string{ "authorization": "bearer " + token, }) return metadata.NewOutgoingContext(ctx, md) } return ctx }
[ "func", "(", "s", "*", "OsdCsiServer", ")", "setupContextWithToken", "(", "ctx", "context", ".", "Context", ",", "csiSecrets", "map", "[", "string", "]", "string", ")", "context", ".", "Context", "{", "if", "token", ",", "ok", ":=", "csiSecrets", "[", "authsecrets", ".", "SecretTokenKey", "]", ";", "ok", "{", "md", ":=", "metadata", ".", "New", "(", "map", "[", "string", "]", "string", "{", "\"", "\"", ":", "\"", "\"", "+", "token", ",", "}", ")", "\n", "return", "metadata", ".", "NewOutgoingContext", "(", "ctx", ",", "md", ")", "\n", "}", "\n", "return", "ctx", "\n", "}" ]
// Gets token from the secrets. In Kubernetes, the side car containers copy // the contents of a K8S Secret map into the Secrets section of the CSI call.
[ "Gets", "token", "from", "the", "secrets", ".", "In", "Kubernetes", "the", "side", "car", "containers", "copy", "the", "contents", "of", "a", "K8S", "Secret", "map", "into", "the", "Secrets", "section", "of", "the", "CSI", "call", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/csi/csi.go#L117-L125
144,115
libopenstorage/openstorage
pkg/storageops/storageops.go
NewStorageError
func NewStorageError(code int, msg string, instance string) error { return &StorageError{Code: code, Msg: msg, Instance: instance} }
go
func NewStorageError(code int, msg string, instance string) error { return &StorageError{Code: code, Msg: msg, Instance: instance} }
[ "func", "NewStorageError", "(", "code", "int", ",", "msg", "string", ",", "instance", "string", ")", "error", "{", "return", "&", "StorageError", "{", "Code", ":", "code", ",", "Msg", ":", "msg", ",", "Instance", ":", "instance", "}", "\n", "}" ]
// NewStorageError creates a new custom storage error instance
[ "NewStorageError", "creates", "a", "new", "custom", "storage", "error", "instance" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/storageops.go#L93-L95
144,116
libopenstorage/openstorage
api/api.go
DriverTypeSimpleValueOf
func DriverTypeSimpleValueOf(s string) (DriverType, error) { obj, err := simpleValueOf("driver_type", DriverType_value, s) return DriverType(obj), err }
go
func DriverTypeSimpleValueOf(s string) (DriverType, error) { obj, err := simpleValueOf("driver_type", DriverType_value, s) return DriverType(obj), err }
[ "func", "DriverTypeSimpleValueOf", "(", "s", "string", ")", "(", "DriverType", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "DriverType_value", ",", "s", ")", "\n", "return", "DriverType", "(", "obj", ")", ",", "err", "\n", "}" ]
// // DriverTypeSimpleValueOf returns the string format of DriverType
[ "DriverTypeSimpleValueOf", "returns", "the", "string", "format", "of", "DriverType" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L580-L583
144,117
libopenstorage/openstorage
api/api.go
FSTypeSimpleValueOf
func FSTypeSimpleValueOf(s string) (FSType, error) { obj, err := simpleValueOf("fs_type", FSType_value, s) return FSType(obj), err }
go
func FSTypeSimpleValueOf(s string) (FSType, error) { obj, err := simpleValueOf("fs_type", FSType_value, s) return FSType(obj), err }
[ "func", "FSTypeSimpleValueOf", "(", "s", "string", ")", "(", "FSType", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "FSType_value", ",", "s", ")", "\n", "return", "FSType", "(", "obj", ")", ",", "err", "\n", "}" ]
// FSTypeSimpleValueOf returns the string format of FSType
[ "FSTypeSimpleValueOf", "returns", "the", "string", "format", "of", "FSType" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L591-L594
144,118
libopenstorage/openstorage
api/api.go
CosTypeSimpleValueOf
func CosTypeSimpleValueOf(s string) (CosType, error) { obj, exists := CosType_value[strings.ToUpper(s)] if !exists { return -1, fmt.Errorf("Invalid cos value: %s", s) } return CosType(obj), nil }
go
func CosTypeSimpleValueOf(s string) (CosType, error) { obj, exists := CosType_value[strings.ToUpper(s)] if !exists { return -1, fmt.Errorf("Invalid cos value: %s", s) } return CosType(obj), nil }
[ "func", "CosTypeSimpleValueOf", "(", "s", "string", ")", "(", "CosType", ",", "error", ")", "{", "obj", ",", "exists", ":=", "CosType_value", "[", "strings", ".", "ToUpper", "(", "s", ")", "]", "\n", "if", "!", "exists", "{", "return", "-", "1", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "s", ")", "\n", "}", "\n", "return", "CosType", "(", "obj", ")", ",", "nil", "\n", "}" ]
// CosTypeSimpleValueOf returns the string format of CosType
[ "CosTypeSimpleValueOf", "returns", "the", "string", "format", "of", "CosType" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L602-L608
144,119
libopenstorage/openstorage
api/api.go
GraphDriverChangeTypeSimpleValueOf
func GraphDriverChangeTypeSimpleValueOf(s string) (GraphDriverChangeType, error) { obj, err := simpleValueOf("graph_driver_change_type", GraphDriverChangeType_value, s) return GraphDriverChangeType(obj), err }
go
func GraphDriverChangeTypeSimpleValueOf(s string) (GraphDriverChangeType, error) { obj, err := simpleValueOf("graph_driver_change_type", GraphDriverChangeType_value, s) return GraphDriverChangeType(obj), err }
[ "func", "GraphDriverChangeTypeSimpleValueOf", "(", "s", "string", ")", "(", "GraphDriverChangeType", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "GraphDriverChangeType_value", ",", "s", ")", "\n", "return", "GraphDriverChangeType", "(", "obj", ")", ",", "err", "\n", "}" ]
// GraphDriverChangeTypeSimpleValueOf returns the string format of GraphDriverChangeType
[ "GraphDriverChangeTypeSimpleValueOf", "returns", "the", "string", "format", "of", "GraphDriverChangeType" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L616-L619
144,120
libopenstorage/openstorage
api/api.go
VolumeActionParamSimpleValueOf
func VolumeActionParamSimpleValueOf(s string) (VolumeActionParam, error) { obj, err := simpleValueOf("volume_action_param", VolumeActionParam_value, s) return VolumeActionParam(obj), err }
go
func VolumeActionParamSimpleValueOf(s string) (VolumeActionParam, error) { obj, err := simpleValueOf("volume_action_param", VolumeActionParam_value, s) return VolumeActionParam(obj), err }
[ "func", "VolumeActionParamSimpleValueOf", "(", "s", "string", ")", "(", "VolumeActionParam", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "VolumeActionParam_value", ",", "s", ")", "\n", "return", "VolumeActionParam", "(", "obj", ")", ",", "err", "\n", "}" ]
// VolumeActionParamSimpleValueOf returns the string format of VolumeAction
[ "VolumeActionParamSimpleValueOf", "returns", "the", "string", "format", "of", "VolumeAction" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L627-L630
144,121
libopenstorage/openstorage
api/api.go
VolumeStateSimpleValueOf
func VolumeStateSimpleValueOf(s string) (VolumeState, error) { obj, err := simpleValueOf("volume_state", VolumeState_value, s) return VolumeState(obj), err }
go
func VolumeStateSimpleValueOf(s string) (VolumeState, error) { obj, err := simpleValueOf("volume_state", VolumeState_value, s) return VolumeState(obj), err }
[ "func", "VolumeStateSimpleValueOf", "(", "s", "string", ")", "(", "VolumeState", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "VolumeState_value", ",", "s", ")", "\n", "return", "VolumeState", "(", "obj", ")", ",", "err", "\n", "}" ]
// VolumeStateSimpleValueOf returns the string format of VolumeState
[ "VolumeStateSimpleValueOf", "returns", "the", "string", "format", "of", "VolumeState" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L638-L641
144,122
libopenstorage/openstorage
api/api.go
VolumeStatusSimpleValueOf
func VolumeStatusSimpleValueOf(s string) (VolumeStatus, error) { obj, err := simpleValueOf("volume_status", VolumeStatus_value, s) return VolumeStatus(obj), err }
go
func VolumeStatusSimpleValueOf(s string) (VolumeStatus, error) { obj, err := simpleValueOf("volume_status", VolumeStatus_value, s) return VolumeStatus(obj), err }
[ "func", "VolumeStatusSimpleValueOf", "(", "s", "string", ")", "(", "VolumeStatus", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "VolumeStatus_value", ",", "s", ")", "\n", "return", "VolumeStatus", "(", "obj", ")", ",", "err", "\n", "}" ]
// VolumeStatusSimpleValueOf returns the string format of VolumeStatus
[ "VolumeStatusSimpleValueOf", "returns", "the", "string", "format", "of", "VolumeStatus" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L649-L652
144,123
libopenstorage/openstorage
api/api.go
IoProfileSimpleValueOf
func IoProfileSimpleValueOf(s string) (IoProfile, error) { obj, err := simpleValueOf("io_profile", IoProfile_value, s) return IoProfile(obj), err }
go
func IoProfileSimpleValueOf(s string) (IoProfile, error) { obj, err := simpleValueOf("io_profile", IoProfile_value, s) return IoProfile(obj), err }
[ "func", "IoProfileSimpleValueOf", "(", "s", "string", ")", "(", "IoProfile", ",", "error", ")", "{", "obj", ",", "err", ":=", "simpleValueOf", "(", "\"", "\"", ",", "IoProfile_value", ",", "s", ")", "\n", "return", "IoProfile", "(", "obj", ")", ",", "err", "\n", "}" ]
// IoProfileSimpleValueOf returns the string format of IoProfile
[ "IoProfileSimpleValueOf", "returns", "the", "string", "format", "of", "IoProfile" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L660-L663
144,124
libopenstorage/openstorage
api/api.go
WriteThroughput
func (v *Stats) WriteThroughput() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.WriteBytes) / intv }
go
func (v *Stats) WriteThroughput() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.WriteBytes) / intv }
[ "func", "(", "v", "*", "Stats", ")", "WriteThroughput", "(", ")", "uint64", "{", "intv", ":=", "toSec", "(", "v", ".", "IntervalMs", ")", "\n", "if", "intv", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "v", ".", "WriteBytes", ")", "/", "intv", "\n", "}" ]
// WriteThroughput returns the write throughput
[ "WriteThroughput", "returns", "the", "write", "throughput" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L691-L697
144,125
libopenstorage/openstorage
api/api.go
ReadThroughput
func (v *Stats) ReadThroughput() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.ReadBytes) / intv }
go
func (v *Stats) ReadThroughput() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.ReadBytes) / intv }
[ "func", "(", "v", "*", "Stats", ")", "ReadThroughput", "(", ")", "uint64", "{", "intv", ":=", "toSec", "(", "v", ".", "IntervalMs", ")", "\n", "if", "intv", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "v", ".", "ReadBytes", ")", "/", "intv", "\n", "}" ]
// ReadThroughput returns the read throughput
[ "ReadThroughput", "returns", "the", "read", "throughput" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L700-L706
144,126
libopenstorage/openstorage
api/api.go
Latency
func (v *Stats) Latency() uint64 { ops := v.Writes + v.Reads if ops == 0 { return 0 } return (uint64)((v.IoMs * 1000) / ops) }
go
func (v *Stats) Latency() uint64 { ops := v.Writes + v.Reads if ops == 0 { return 0 } return (uint64)((v.IoMs * 1000) / ops) }
[ "func", "(", "v", "*", "Stats", ")", "Latency", "(", ")", "uint64", "{", "ops", ":=", "v", ".", "Writes", "+", "v", ".", "Reads", "\n", "if", "ops", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "uint64", ")", "(", "(", "v", ".", "IoMs", "*", "1000", ")", "/", "ops", ")", "\n", "}" ]
// Latency returns latency
[ "Latency", "returns", "latency" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L709-L715
144,127
libopenstorage/openstorage
api/api.go
ReadLatency
func (v *Stats) ReadLatency() uint64 { if v.Reads == 0 { return 0 } return (uint64)((v.ReadMs * 1000) / v.Reads) }
go
func (v *Stats) ReadLatency() uint64 { if v.Reads == 0 { return 0 } return (uint64)((v.ReadMs * 1000) / v.Reads) }
[ "func", "(", "v", "*", "Stats", ")", "ReadLatency", "(", ")", "uint64", "{", "if", "v", ".", "Reads", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "uint64", ")", "(", "(", "v", ".", "ReadMs", "*", "1000", ")", "/", "v", ".", "Reads", ")", "\n", "}" ]
// Read latency returns avg. time required for read operation to complete
[ "Read", "latency", "returns", "avg", ".", "time", "required", "for", "read", "operation", "to", "complete" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L718-L723
144,128
libopenstorage/openstorage
api/api.go
WriteLatency
func (v *Stats) WriteLatency() uint64 { if v.Writes == 0 { return 0 } return (uint64)((v.WriteMs * 1000) / v.Writes) }
go
func (v *Stats) WriteLatency() uint64 { if v.Writes == 0 { return 0 } return (uint64)((v.WriteMs * 1000) / v.Writes) }
[ "func", "(", "v", "*", "Stats", ")", "WriteLatency", "(", ")", "uint64", "{", "if", "v", ".", "Writes", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "uint64", ")", "(", "(", "v", ".", "WriteMs", "*", "1000", ")", "/", "v", ".", "Writes", ")", "\n", "}" ]
// Write latency returns avg. time required for write operation to complete
[ "Write", "latency", "returns", "avg", ".", "time", "required", "for", "write", "operation", "to", "complete" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L726-L731
144,129
libopenstorage/openstorage
api/api.go
Iops
func (v *Stats) Iops() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.Writes + v.Reads) / intv }
go
func (v *Stats) Iops() uint64 { intv := toSec(v.IntervalMs) if intv == 0 { return 0 } return (v.Writes + v.Reads) / intv }
[ "func", "(", "v", "*", "Stats", ")", "Iops", "(", ")", "uint64", "{", "intv", ":=", "toSec", "(", "v", ".", "IntervalMs", ")", "\n", "if", "intv", "==", "0", "{", "return", "0", "\n", "}", "\n", "return", "(", "v", ".", "Writes", "+", "v", ".", "Reads", ")", "/", "intv", "\n", "}" ]
// Iops returns iops
[ "Iops", "returns", "iops" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L734-L740
144,130
libopenstorage/openstorage
api/api.go
Contains
func (m *Volume) Contains(mid string) bool { rsets := m.GetReplicaSets() for _, rset := range rsets { for _, node := range rset.Nodes { if node == mid { return true } } } return false }
go
func (m *Volume) Contains(mid string) bool { rsets := m.GetReplicaSets() for _, rset := range rsets { for _, node := range rset.Nodes { if node == mid { return true } } } return false }
[ "func", "(", "m", "*", "Volume", ")", "Contains", "(", "mid", "string", ")", "bool", "{", "rsets", ":=", "m", ".", "GetReplicaSets", "(", ")", "\n", "for", "_", ",", "rset", ":=", "range", "rsets", "{", "for", "_", ",", "node", ":=", "range", "rset", ".", "Nodes", "{", "if", "node", "==", "mid", "{", "return", "true", "\n", "}", "\n", "}", "\n", "}", "\n", "return", "false", "\n", "}" ]
// Contains returns true if mid is a member of volume's replication set.
[ "Contains", "returns", "true", "if", "mid", "is", "a", "member", "of", "volume", "s", "replication", "set", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L748-L758
144,131
libopenstorage/openstorage
api/api.go
Copy
func (s *VolumeSpec) Copy() *VolumeSpec { spec := *s if s.ReplicaSet != nil { spec.ReplicaSet = &ReplicaSet{Nodes: make([]string, len(s.ReplicaSet.Nodes))} copy(spec.ReplicaSet.Nodes, s.ReplicaSet.Nodes) } return &spec }
go
func (s *VolumeSpec) Copy() *VolumeSpec { spec := *s if s.ReplicaSet != nil { spec.ReplicaSet = &ReplicaSet{Nodes: make([]string, len(s.ReplicaSet.Nodes))} copy(spec.ReplicaSet.Nodes, s.ReplicaSet.Nodes) } return &spec }
[ "func", "(", "s", "*", "VolumeSpec", ")", "Copy", "(", ")", "*", "VolumeSpec", "{", "spec", ":=", "*", "s", "\n", "if", "s", ".", "ReplicaSet", "!=", "nil", "{", "spec", ".", "ReplicaSet", "=", "&", "ReplicaSet", "{", "Nodes", ":", "make", "(", "[", "]", "string", ",", "len", "(", "s", ".", "ReplicaSet", ".", "Nodes", ")", ")", "}", "\n", "copy", "(", "spec", ".", "ReplicaSet", ".", "Nodes", ",", "s", ".", "ReplicaSet", ".", "Nodes", ")", "\n", "}", "\n", "return", "&", "spec", "\n", "}" ]
// Copy makes a deep copy of VolumeSpec
[ "Copy", "makes", "a", "deep", "copy", "of", "VolumeSpec" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L761-L768
144,132
libopenstorage/openstorage
api/api.go
Copy
func (s *Node) Copy() *Node { localCopy := deepcopy.Copy(*s) nodeCopy := localCopy.(Node) return &nodeCopy }
go
func (s *Node) Copy() *Node { localCopy := deepcopy.Copy(*s) nodeCopy := localCopy.(Node) return &nodeCopy }
[ "func", "(", "s", "*", "Node", ")", "Copy", "(", ")", "*", "Node", "{", "localCopy", ":=", "deepcopy", ".", "Copy", "(", "*", "s", ")", "\n", "nodeCopy", ":=", "localCopy", ".", "(", "Node", ")", "\n", "return", "&", "nodeCopy", "\n", "}" ]
// Copy makes a deep copy of Node
[ "Copy", "makes", "a", "deep", "copy", "of", "Node" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L771-L775
144,133
libopenstorage/openstorage
api/api.go
ToStorageNode
func (s *Node) ToStorageNode() *StorageNode { node := &StorageNode{ Id: s.Id, SchedulerNodeName: s.SchedulerNodeName, Cpu: s.Cpu, MemTotal: s.MemTotal, MemUsed: s.MemUsed, MemFree: s.MemFree, AvgLoad: int64(s.Avgload), Status: s.Status, MgmtIp: s.MgmtIp, DataIp: s.DataIp, Hostname: s.Hostname, } node.Disks = make(map[string]*StorageResource) for k, v := range s.Disks { node.Disks[k] = &v } node.NodeLabels = make(map[string]string) for k, v := range s.NodeLabels { node.NodeLabels[k] = v } node.Pools = make([]*StoragePool, len(s.Pools)) for i, v := range s.Pools { node.Pools[i] = &v } return node }
go
func (s *Node) ToStorageNode() *StorageNode { node := &StorageNode{ Id: s.Id, SchedulerNodeName: s.SchedulerNodeName, Cpu: s.Cpu, MemTotal: s.MemTotal, MemUsed: s.MemUsed, MemFree: s.MemFree, AvgLoad: int64(s.Avgload), Status: s.Status, MgmtIp: s.MgmtIp, DataIp: s.DataIp, Hostname: s.Hostname, } node.Disks = make(map[string]*StorageResource) for k, v := range s.Disks { node.Disks[k] = &v } node.NodeLabels = make(map[string]string) for k, v := range s.NodeLabels { node.NodeLabels[k] = v } node.Pools = make([]*StoragePool, len(s.Pools)) for i, v := range s.Pools { node.Pools[i] = &v } return node }
[ "func", "(", "s", "*", "Node", ")", "ToStorageNode", "(", ")", "*", "StorageNode", "{", "node", ":=", "&", "StorageNode", "{", "Id", ":", "s", ".", "Id", ",", "SchedulerNodeName", ":", "s", ".", "SchedulerNodeName", ",", "Cpu", ":", "s", ".", "Cpu", ",", "MemTotal", ":", "s", ".", "MemTotal", ",", "MemUsed", ":", "s", ".", "MemUsed", ",", "MemFree", ":", "s", ".", "MemFree", ",", "AvgLoad", ":", "int64", "(", "s", ".", "Avgload", ")", ",", "Status", ":", "s", ".", "Status", ",", "MgmtIp", ":", "s", ".", "MgmtIp", ",", "DataIp", ":", "s", ".", "DataIp", ",", "Hostname", ":", "s", ".", "Hostname", ",", "}", "\n\n", "node", ".", "Disks", "=", "make", "(", "map", "[", "string", "]", "*", "StorageResource", ")", "\n", "for", "k", ",", "v", ":=", "range", "s", ".", "Disks", "{", "node", ".", "Disks", "[", "k", "]", "=", "&", "v", "\n", "}", "\n\n", "node", ".", "NodeLabels", "=", "make", "(", "map", "[", "string", "]", "string", ")", "\n", "for", "k", ",", "v", ":=", "range", "s", ".", "NodeLabels", "{", "node", ".", "NodeLabels", "[", "k", "]", "=", "v", "\n", "}", "\n\n", "node", ".", "Pools", "=", "make", "(", "[", "]", "*", "StoragePool", ",", "len", "(", "s", ".", "Pools", ")", ")", "\n", "for", "i", ",", "v", ":=", "range", "s", ".", "Pools", "{", "node", ".", "Pools", "[", "i", "]", "=", "&", "v", "\n", "}", "\n\n", "return", "node", "\n", "}" ]
// ToStorageNode converts a Node structure to an exported gRPC StorageNode struct
[ "ToStorageNode", "converts", "a", "Node", "structure", "to", "an", "exported", "gRPC", "StorageNode", "struct" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L794-L825
144,134
libopenstorage/openstorage
api/api.go
ToStorageCluster
func (c *Cluster) ToStorageCluster() *StorageCluster { cluster := &StorageCluster{ Status: c.Status, // Due to history, the cluster ID is normally the name of the cluster, not the // unique identifier Name: c.Id, } return cluster }
go
func (c *Cluster) ToStorageCluster() *StorageCluster { cluster := &StorageCluster{ Status: c.Status, // Due to history, the cluster ID is normally the name of the cluster, not the // unique identifier Name: c.Id, } return cluster }
[ "func", "(", "c", "*", "Cluster", ")", "ToStorageCluster", "(", ")", "*", "StorageCluster", "{", "cluster", ":=", "&", "StorageCluster", "{", "Status", ":", "c", ".", "Status", ",", "// Due to history, the cluster ID is normally the name of the cluster, not the", "// unique identifier", "Name", ":", "c", ".", "Id", ",", "}", "\n\n", "return", "cluster", "\n", "}" ]
// ToStorageCluster converts a Cluster structure to an exported gRPC StorageCluster struct
[ "ToStorageCluster", "converts", "a", "Cluster", "structure", "to", "an", "exported", "gRPC", "StorageCluster", "struct" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L828-L838
144,135
libopenstorage/openstorage
api/api.go
GetCloneCreatorOwnership
func (v *VolumeSpec) GetCloneCreatorOwnership(ctx context.Context) (*Ownership, bool) { o := v.GetOwnership() // If there is user information, then auth is enabled if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check if the owner is the one who cloned it if o != nil && o.IsOwner(userinfo) { return o, false } // Not the same owner, we now need new ownership. // This works for public volumes also. return OwnershipSetUsernameFromContext(ctx, nil), true } return o, false }
go
func (v *VolumeSpec) GetCloneCreatorOwnership(ctx context.Context) (*Ownership, bool) { o := v.GetOwnership() // If there is user information, then auth is enabled if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check if the owner is the one who cloned it if o != nil && o.IsOwner(userinfo) { return o, false } // Not the same owner, we now need new ownership. // This works for public volumes also. return OwnershipSetUsernameFromContext(ctx, nil), true } return o, false }
[ "func", "(", "v", "*", "VolumeSpec", ")", "GetCloneCreatorOwnership", "(", "ctx", "context", ".", "Context", ")", "(", "*", "Ownership", ",", "bool", ")", "{", "o", ":=", "v", ".", "GetOwnership", "(", ")", "\n\n", "// If there is user information, then auth is enabled", "if", "userinfo", ",", "ok", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", ";", "ok", "{", "// Check if the owner is the one who cloned it", "if", "o", "!=", "nil", "&&", "o", ".", "IsOwner", "(", "userinfo", ")", "{", "return", "o", ",", "false", "\n", "}", "\n\n", "// Not the same owner, we now need new ownership.", "// This works for public volumes also.", "return", "OwnershipSetUsernameFromContext", "(", "ctx", ",", "nil", ")", ",", "true", "\n", "}", "\n\n", "return", "o", ",", "false", "\n", "}" ]
// GetCloneCreatorOwnership returns the appropriate ownership for the // new snapshot and if an update is required
[ "GetCloneCreatorOwnership", "returns", "the", "appropriate", "ownership", "for", "the", "new", "snapshot", "and", "if", "an", "update", "is", "required" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L1033-L1050
144,136
libopenstorage/openstorage
api/api.go
IsPermitted
func (s *SdkStoragePolicy) IsPermitted(ctx context.Context, accessType Ownership_AccessType) bool { if s.IsPublic() { return true } // Storage Policy is not public, check permission if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check Access return s.IsPermittedFromUserInfo(userinfo, accessType) } else { // There is no user information in the context so // authorization is not running return true } }
go
func (s *SdkStoragePolicy) IsPermitted(ctx context.Context, accessType Ownership_AccessType) bool { if s.IsPublic() { return true } // Storage Policy is not public, check permission if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check Access return s.IsPermittedFromUserInfo(userinfo, accessType) } else { // There is no user information in the context so // authorization is not running return true } }
[ "func", "(", "s", "*", "SdkStoragePolicy", ")", "IsPermitted", "(", "ctx", "context", ".", "Context", ",", "accessType", "Ownership_AccessType", ")", "bool", "{", "if", "s", ".", "IsPublic", "(", ")", "{", "return", "true", "\n", "}", "\n\n", "// Storage Policy is not public, check permission", "if", "userinfo", ",", "ok", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", ";", "ok", "{", "// Check Access", "return", "s", ".", "IsPermittedFromUserInfo", "(", "userinfo", ",", "accessType", ")", "\n", "}", "else", "{", "// There is no user information in the context so", "// authorization is not running", "return", "true", "\n", "}", "\n", "}" ]
// Check access permission of SdkStoragePolicy Objects
[ "Check", "access", "permission", "of", "SdkStoragePolicy", "Objects" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/api.go#L1054-L1068
144,137
libopenstorage/openstorage
pkg/auth/secrets/secrets.go
NewAuth
func NewAuth( authProviderType AuthTokenProviders, s osecrets.Secrets, ) (Auth, error) { if s == nil { return nil, ErrSecretsNotInitialized } switch authProviderType { case TypeK8s: return &k8sAuth{s}, nil case TypeDCOS: return &dcosAuth{s}, nil } return nil, fmt.Errorf("secrets type %v not supported", authProviderType) }
go
func NewAuth( authProviderType AuthTokenProviders, s osecrets.Secrets, ) (Auth, error) { if s == nil { return nil, ErrSecretsNotInitialized } switch authProviderType { case TypeK8s: return &k8sAuth{s}, nil case TypeDCOS: return &dcosAuth{s}, nil } return nil, fmt.Errorf("secrets type %v not supported", authProviderType) }
[ "func", "NewAuth", "(", "authProviderType", "AuthTokenProviders", ",", "s", "osecrets", ".", "Secrets", ",", ")", "(", "Auth", ",", "error", ")", "{", "if", "s", "==", "nil", "{", "return", "nil", ",", "ErrSecretsNotInitialized", "\n", "}", "\n", "switch", "authProviderType", "{", "case", "TypeK8s", ":", "return", "&", "k8sAuth", "{", "s", "}", ",", "nil", "\n", "case", "TypeDCOS", ":", "return", "&", "dcosAuth", "{", "s", "}", ",", "nil", "\n", "}", "\n", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "authProviderType", ")", "\n", "}" ]
// NewAuth returns a new instance of Auth implementation
[ "NewAuth", "returns", "a", "new", "instance", "of", "Auth", "implementation" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/auth/secrets/secrets.go#L55-L69
144,138
libopenstorage/openstorage
pkg/mount/custom_mount.go
NewCustomMounter
func NewCustomMounter( devPrefixes []string, mountImpl MountImpl, customMounter CustomMounter, allowedDirs []string, ) (*CustomMounterHandler, error) { m := &CustomMounterHandler{ Mounter: Mounter{ mountImpl: mountImpl, mounts: make(DeviceMap), paths: make(PathMap), allowedDirs: allowedDirs, kl: keylock.New(), }, } cl, cr := customMounter() m.cl = cl m.cr = cr err := m.Load(devPrefixes) if err != nil { return nil, err } return m, nil }
go
func NewCustomMounter( devPrefixes []string, mountImpl MountImpl, customMounter CustomMounter, allowedDirs []string, ) (*CustomMounterHandler, error) { m := &CustomMounterHandler{ Mounter: Mounter{ mountImpl: mountImpl, mounts: make(DeviceMap), paths: make(PathMap), allowedDirs: allowedDirs, kl: keylock.New(), }, } cl, cr := customMounter() m.cl = cl m.cr = cr err := m.Load(devPrefixes) if err != nil { return nil, err } return m, nil }
[ "func", "NewCustomMounter", "(", "devPrefixes", "[", "]", "string", ",", "mountImpl", "MountImpl", ",", "customMounter", "CustomMounter", ",", "allowedDirs", "[", "]", "string", ",", ")", "(", "*", "CustomMounterHandler", ",", "error", ")", "{", "m", ":=", "&", "CustomMounterHandler", "{", "Mounter", ":", "Mounter", "{", "mountImpl", ":", "mountImpl", ",", "mounts", ":", "make", "(", "DeviceMap", ")", ",", "paths", ":", "make", "(", "PathMap", ")", ",", "allowedDirs", ":", "allowedDirs", ",", "kl", ":", "keylock", ".", "New", "(", ")", ",", "}", ",", "}", "\n", "cl", ",", "cr", ":=", "customMounter", "(", ")", "\n", "m", ".", "cl", "=", "cl", "\n", "m", ".", "cr", "=", "cr", "\n", "err", ":=", "m", ".", "Load", "(", "devPrefixes", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "m", ",", "nil", "\n", "}" ]
// NewCustomMounter returns a new CustomMounter
[ "NewCustomMounter", "returns", "a", "new", "CustomMounter" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/mount/custom_mount.go#L22-L46
144,139
libopenstorage/openstorage
pkg/mount/custom_mount.go
Reload
func (c *CustomMounterHandler) Reload(device string) error { return c.cr(device, c.mounts, c.paths) }
go
func (c *CustomMounterHandler) Reload(device string) error { return c.cr(device, c.mounts, c.paths) }
[ "func", "(", "c", "*", "CustomMounterHandler", ")", "Reload", "(", "device", "string", ")", "error", "{", "return", "c", ".", "cr", "(", "device", ",", "c", ".", "mounts", ",", "c", ".", "paths", ")", "\n", "}" ]
// Reload mount table for a device
[ "Reload", "mount", "table", "for", "a", "device" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/mount/custom_mount.go#L54-L56
144,140
libopenstorage/openstorage
cli/volumes.go
BlockVolumeCommands
func BlockVolumeCommands(name string) []cli.Command { v := &volDriver{name: name} blockCommands := []cli.Command{ { Name: "attach", Aliases: []string{"a"}, Usage: "Attach volume to specified path", Action: v.volumeAttach, Flags: []cli.Flag{ cli.StringFlag{ Name: "path,p", Usage: "Path on local filesystem", }, }, }, { Name: "detach", Aliases: []string{"d"}, Usage: "Detach specified volume", Action: v.volumeDetach, }, } baseCommands := baseVolumeCommand(v) return append(baseCommands, blockCommands...) }
go
func BlockVolumeCommands(name string) []cli.Command { v := &volDriver{name: name} blockCommands := []cli.Command{ { Name: "attach", Aliases: []string{"a"}, Usage: "Attach volume to specified path", Action: v.volumeAttach, Flags: []cli.Flag{ cli.StringFlag{ Name: "path,p", Usage: "Path on local filesystem", }, }, }, { Name: "detach", Aliases: []string{"d"}, Usage: "Detach specified volume", Action: v.volumeDetach, }, } baseCommands := baseVolumeCommand(v) return append(baseCommands, blockCommands...) }
[ "func", "BlockVolumeCommands", "(", "name", "string", ")", "[", "]", "cli", ".", "Command", "{", "v", ":=", "&", "volDriver", "{", "name", ":", "name", "}", "\n\n", "blockCommands", ":=", "[", "]", "cli", ".", "Command", "{", "{", "Name", ":", "\"", "\"", ",", "Aliases", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "v", ".", "volumeAttach", ",", "Flags", ":", "[", "]", "cli", ".", "Flag", "{", "cli", ".", "StringFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "}", ",", "}", ",", "{", "Name", ":", "\"", "\"", ",", "Aliases", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "v", ".", "volumeDetach", ",", "}", ",", "}", "\n\n", "baseCommands", ":=", "baseVolumeCommand", "(", "v", ")", "\n\n", "return", "append", "(", "baseCommands", ",", "blockCommands", "...", ")", "\n", "}" ]
// BlockVolumeCommands exports CLI comamnds for a Block VolumeDriver.
[ "BlockVolumeCommands", "exports", "CLI", "comamnds", "for", "a", "Block", "VolumeDriver", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cli/volumes.go#L513-L540
144,141
libopenstorage/openstorage
cli/volumes.go
FileVolumeCommands
func FileVolumeCommands(name string) []cli.Command { v := &volDriver{name: name} return baseVolumeCommand(v) }
go
func FileVolumeCommands(name string) []cli.Command { v := &volDriver{name: name} return baseVolumeCommand(v) }
[ "func", "FileVolumeCommands", "(", "name", "string", ")", "[", "]", "cli", ".", "Command", "{", "v", ":=", "&", "volDriver", "{", "name", ":", "name", "}", "\n\n", "return", "baseVolumeCommand", "(", "v", ")", "\n", "}" ]
// FileVolumeCommands exports CLI comamnds for File VolumeDriver
[ "FileVolumeCommands", "exports", "CLI", "comamnds", "for", "File", "VolumeDriver" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cli/volumes.go#L543-L547
144,142
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
Lock
func (e *defaultStoreEnumerator) Lock(volumeID string) (interface{}, error) { return e.kvdb.Lock(e.lockKey(volumeID)) }
go
func (e *defaultStoreEnumerator) Lock(volumeID string) (interface{}, error) { return e.kvdb.Lock(e.lockKey(volumeID)) }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "Lock", "(", "volumeID", "string", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "return", "e", ".", "kvdb", ".", "Lock", "(", "e", ".", "lockKey", "(", "volumeID", ")", ")", "\n", "}" ]
// Lock volume specified by volumeID.
[ "Lock", "volume", "specified", "by", "volumeID", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L31-L33
144,143
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
Unlock
func (e *defaultStoreEnumerator) Unlock(token interface{}) error { v, ok := token.(*kvdb.KVPair) if !ok { return fmt.Errorf("Invalid token of type %T", token) } return e.kvdb.Unlock(v) }
go
func (e *defaultStoreEnumerator) Unlock(token interface{}) error { v, ok := token.(*kvdb.KVPair) if !ok { return fmt.Errorf("Invalid token of type %T", token) } return e.kvdb.Unlock(v) }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "Unlock", "(", "token", "interface", "{", "}", ")", "error", "{", "v", ",", "ok", ":=", "token", ".", "(", "*", "kvdb", ".", "KVPair", ")", "\n", "if", "!", "ok", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "token", ")", "\n", "}", "\n", "return", "e", ".", "kvdb", ".", "Unlock", "(", "v", ")", "\n", "}" ]
// Lock volume with token obtained from call to Lock.
[ "Lock", "volume", "with", "token", "obtained", "from", "call", "to", "Lock", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L36-L42
144,144
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
CreateVol
func (e *defaultStoreEnumerator) CreateVol(vol *api.Volume) error { _, err := e.kvdb.Create(e.volKey(vol.Id), vol, 0) return err }
go
func (e *defaultStoreEnumerator) CreateVol(vol *api.Volume) error { _, err := e.kvdb.Create(e.volKey(vol.Id), vol, 0) return err }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "CreateVol", "(", "vol", "*", "api", ".", "Volume", ")", "error", "{", "_", ",", "err", ":=", "e", ".", "kvdb", ".", "Create", "(", "e", ".", "volKey", "(", "vol", ".", "Id", ")", ",", "vol", ",", "0", ")", "\n", "return", "err", "\n", "}" ]
// CreateVol returns error if volume with the same ID already existe.
[ "CreateVol", "returns", "error", "if", "volume", "with", "the", "same", "ID", "already", "existe", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L45-L48
144,145
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
GetVol
func (e *defaultStoreEnumerator) GetVol(volumeID string) (*api.Volume, error) { var v api.Volume _, err := e.kvdb.GetVal(e.volKey(volumeID), &v) return &v, err }
go
func (e *defaultStoreEnumerator) GetVol(volumeID string) (*api.Volume, error) { var v api.Volume _, err := e.kvdb.GetVal(e.volKey(volumeID), &v) return &v, err }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "GetVol", "(", "volumeID", "string", ")", "(", "*", "api", ".", "Volume", ",", "error", ")", "{", "var", "v", "api", ".", "Volume", "\n", "_", ",", "err", ":=", "e", ".", "kvdb", ".", "GetVal", "(", "e", ".", "volKey", "(", "volumeID", ")", ",", "&", "v", ")", "\n", "return", "&", "v", ",", "err", "\n", "}" ]
// GetVol from volumeID.
[ "GetVol", "from", "volumeID", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L51-L55
144,146
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
UpdateVol
func (e *defaultStoreEnumerator) UpdateVol(vol *api.Volume) error { _, err := e.kvdb.Put(e.volKey(vol.Id), vol, 0) return err }
go
func (e *defaultStoreEnumerator) UpdateVol(vol *api.Volume) error { _, err := e.kvdb.Put(e.volKey(vol.Id), vol, 0) return err }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "UpdateVol", "(", "vol", "*", "api", ".", "Volume", ")", "error", "{", "_", ",", "err", ":=", "e", ".", "kvdb", ".", "Put", "(", "e", ".", "volKey", "(", "vol", ".", "Id", ")", ",", "vol", ",", "0", ")", "\n", "return", "err", "\n", "}" ]
// UpdateVol with vol
[ "UpdateVol", "with", "vol" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L58-L61
144,147
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
DeleteVol
func (e *defaultStoreEnumerator) DeleteVol(volumeID string) error { _, err := e.kvdb.Delete(e.volKey(volumeID)) return err }
go
func (e *defaultStoreEnumerator) DeleteVol(volumeID string) error { _, err := e.kvdb.Delete(e.volKey(volumeID)) return err }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "DeleteVol", "(", "volumeID", "string", ")", "error", "{", "_", ",", "err", ":=", "e", ".", "kvdb", ".", "Delete", "(", "e", ".", "volKey", "(", "volumeID", ")", ")", "\n", "return", "err", "\n", "}" ]
// DeleteVol. Returns error if volume does not exist.
[ "DeleteVol", ".", "Returns", "error", "if", "volume", "does", "not", "exist", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L64-L67
144,148
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
Inspect
func (e *defaultStoreEnumerator) Inspect(ids []string) ([]*api.Volume, error) { volumes := make([]*api.Volume, 0, len(ids)) for _, id := range ids { volume, err := e.GetVol(id) // XXX Distinguish between ENOENT and an internal error from KVDB if err != nil { continue } volumes = append(volumes, volume) } return volumes, nil }
go
func (e *defaultStoreEnumerator) Inspect(ids []string) ([]*api.Volume, error) { volumes := make([]*api.Volume, 0, len(ids)) for _, id := range ids { volume, err := e.GetVol(id) // XXX Distinguish between ENOENT and an internal error from KVDB if err != nil { continue } volumes = append(volumes, volume) } return volumes, nil }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "Inspect", "(", "ids", "[", "]", "string", ")", "(", "[", "]", "*", "api", ".", "Volume", ",", "error", ")", "{", "volumes", ":=", "make", "(", "[", "]", "*", "api", ".", "Volume", ",", "0", ",", "len", "(", "ids", ")", ")", "\n", "for", "_", ",", "id", ":=", "range", "ids", "{", "volume", ",", "err", ":=", "e", ".", "GetVol", "(", "id", ")", "\n", "// XXX Distinguish between ENOENT and an internal error from KVDB", "if", "err", "!=", "nil", "{", "continue", "\n", "}", "\n", "volumes", "=", "append", "(", "volumes", ",", "volume", ")", "\n", "}", "\n", "return", "volumes", ",", "nil", "\n", "}" ]
// Inspect specified volumes. // Returns slice of volumes that were found.
[ "Inspect", "specified", "volumes", ".", "Returns", "slice", "of", "volumes", "that", "were", "found", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L71-L82
144,149
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
Enumerate
func (e *defaultStoreEnumerator) Enumerate( locator *api.VolumeLocator, labels map[string]string, ) ([]*api.Volume, error) { kvp, err := e.kvdb.Enumerate(e.volKeyPrefix()) if err != nil { return nil, err } volumes := make([]*api.Volume, 0, len(kvp)) for _, v := range kvp { elem := &api.Volume{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } if match(elem, locator, labels) { volumes = append(volumes, elem) } } return volumes, nil }
go
func (e *defaultStoreEnumerator) Enumerate( locator *api.VolumeLocator, labels map[string]string, ) ([]*api.Volume, error) { kvp, err := e.kvdb.Enumerate(e.volKeyPrefix()) if err != nil { return nil, err } volumes := make([]*api.Volume, 0, len(kvp)) for _, v := range kvp { elem := &api.Volume{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } if match(elem, locator, labels) { volumes = append(volumes, elem) } } return volumes, nil }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "Enumerate", "(", "locator", "*", "api", ".", "VolumeLocator", ",", "labels", "map", "[", "string", "]", "string", ",", ")", "(", "[", "]", "*", "api", ".", "Volume", ",", "error", ")", "{", "kvp", ",", "err", ":=", "e", ".", "kvdb", ".", "Enumerate", "(", "e", ".", "volKeyPrefix", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "volumes", ":=", "make", "(", "[", "]", "*", "api", ".", "Volume", ",", "0", ",", "len", "(", "kvp", ")", ")", "\n", "for", "_", ",", "v", ":=", "range", "kvp", "{", "elem", ":=", "&", "api", ".", "Volume", "{", "}", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "v", ".", "Value", ",", "elem", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "if", "match", "(", "elem", ",", "locator", ",", "labels", ")", "{", "volumes", "=", "append", "(", "volumes", ",", "elem", ")", "\n", "}", "\n", "}", "\n", "return", "volumes", ",", "nil", "\n", "}" ]
// Enumerate volumes that map to the volumeLocator. Locator fields may be regexp. // If locator fields are left blank, this will return all volumee.
[ "Enumerate", "volumes", "that", "map", "to", "the", "volumeLocator", ".", "Locator", "fields", "may", "be", "regexp", ".", "If", "locator", "fields", "are", "left", "blank", "this", "will", "return", "all", "volumee", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L86-L106
144,150
libopenstorage/openstorage
volume/drivers/common/default_store_enumerator.go
SnapEnumerate
func (e *defaultStoreEnumerator) SnapEnumerate( volumeIDs []string, labels map[string]string, ) ([]*api.Volume, error) { kvp, err := e.kvdb.Enumerate(e.volKeyPrefix()) if err != nil { return nil, err } volumes := make([]*api.Volume, 0, len(kvp)) for _, v := range kvp { elem := &api.Volume{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } if elem.Source == nil || elem.Source.Parent == "" || (volumeIDs != nil && !contains(elem.Source.Parent, volumeIDs)) { continue } if hasSubset(elem.Locator.VolumeLabels, labels) { volumes = append(volumes, elem) } } return volumes, nil }
go
func (e *defaultStoreEnumerator) SnapEnumerate( volumeIDs []string, labels map[string]string, ) ([]*api.Volume, error) { kvp, err := e.kvdb.Enumerate(e.volKeyPrefix()) if err != nil { return nil, err } volumes := make([]*api.Volume, 0, len(kvp)) for _, v := range kvp { elem := &api.Volume{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } if elem.Source == nil || elem.Source.Parent == "" || (volumeIDs != nil && !contains(elem.Source.Parent, volumeIDs)) { continue } if hasSubset(elem.Locator.VolumeLabels, labels) { volumes = append(volumes, elem) } } return volumes, nil }
[ "func", "(", "e", "*", "defaultStoreEnumerator", ")", "SnapEnumerate", "(", "volumeIDs", "[", "]", "string", ",", "labels", "map", "[", "string", "]", "string", ",", ")", "(", "[", "]", "*", "api", ".", "Volume", ",", "error", ")", "{", "kvp", ",", "err", ":=", "e", ".", "kvdb", ".", "Enumerate", "(", "e", ".", "volKeyPrefix", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "volumes", ":=", "make", "(", "[", "]", "*", "api", ".", "Volume", ",", "0", ",", "len", "(", "kvp", ")", ")", "\n", "for", "_", ",", "v", ":=", "range", "kvp", "{", "elem", ":=", "&", "api", ".", "Volume", "{", "}", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "v", ".", "Value", ",", "elem", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "if", "elem", ".", "Source", "==", "nil", "||", "elem", ".", "Source", ".", "Parent", "==", "\"", "\"", "||", "(", "volumeIDs", "!=", "nil", "&&", "!", "contains", "(", "elem", ".", "Source", ".", "Parent", ",", "volumeIDs", ")", ")", "{", "continue", "\n", "}", "\n", "if", "hasSubset", "(", "elem", ".", "Locator", ".", "VolumeLabels", ",", "labels", ")", "{", "volumes", "=", "append", "(", "volumes", ",", "elem", ")", "\n", "}", "\n", "}", "\n", "return", "volumes", ",", "nil", "\n", "}" ]
// SnapEnumerate for specified volume
[ "SnapEnumerate", "for", "specified", "volume" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/common/default_store_enumerator.go#L109-L133
144,151
libopenstorage/openstorage
api/server/middleware_auth.go
NewAuthMiddleware
func NewAuthMiddleware( s osecrets.Secrets, authType secrets.AuthTokenProviders, ) (*authMiddleware, error) { provider, err := secrets.NewAuth( authType, s, ) if err != nil { return nil, err } return &authMiddleware{provider}, nil }
go
func NewAuthMiddleware( s osecrets.Secrets, authType secrets.AuthTokenProviders, ) (*authMiddleware, error) { provider, err := secrets.NewAuth( authType, s, ) if err != nil { return nil, err } return &authMiddleware{provider}, nil }
[ "func", "NewAuthMiddleware", "(", "s", "osecrets", ".", "Secrets", ",", "authType", "secrets", ".", "AuthTokenProviders", ",", ")", "(", "*", "authMiddleware", ",", "error", ")", "{", "provider", ",", "err", ":=", "secrets", ".", "NewAuth", "(", "authType", ",", "s", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "&", "authMiddleware", "{", "provider", "}", ",", "nil", "\n", "}" ]
// NewAuthMiddleware returns a negroni implementation of an http middleware // which will intercept the management APIs
[ "NewAuthMiddleware", "returns", "a", "negroni", "implementation", "of", "an", "http", "middleware", "which", "will", "intercept", "the", "management", "APIs" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/middleware_auth.go#L34-L46
144,152
libopenstorage/openstorage
api/ownership.go
OwnershipSetUsernameFromContext
func OwnershipSetUsernameFromContext(ctx context.Context, srcOwnership *Ownership) *Ownership { // Check if the context has information about the user. If not, // then security is not enabled. if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Merge the previous acls which may have been set by the user var acls *Ownership_AccessControl if srcOwnership != nil { acls = srcOwnership.GetAcls() } return &Ownership{ Owner: userinfo.Username, Acls: acls, } } return srcOwnership }
go
func OwnershipSetUsernameFromContext(ctx context.Context, srcOwnership *Ownership) *Ownership { // Check if the context has information about the user. If not, // then security is not enabled. if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Merge the previous acls which may have been set by the user var acls *Ownership_AccessControl if srcOwnership != nil { acls = srcOwnership.GetAcls() } return &Ownership{ Owner: userinfo.Username, Acls: acls, } } return srcOwnership }
[ "func", "OwnershipSetUsernameFromContext", "(", "ctx", "context", ".", "Context", ",", "srcOwnership", "*", "Ownership", ")", "*", "Ownership", "{", "// Check if the context has information about the user. If not,", "// then security is not enabled.", "if", "userinfo", ",", "ok", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", ";", "ok", "{", "// Merge the previous acls which may have been set by the user", "var", "acls", "*", "Ownership_AccessControl", "\n", "if", "srcOwnership", "!=", "nil", "{", "acls", "=", "srcOwnership", ".", "GetAcls", "(", ")", "\n", "}", "\n\n", "return", "&", "Ownership", "{", "Owner", ":", "userinfo", ".", "Username", ",", "Acls", ":", "acls", ",", "}", "\n", "}", "\n\n", "return", "srcOwnership", "\n", "}" ]
// OwnershipSetUsernameFromContext is used to create a new ownership object for // a volume. It takes an ownership value if passed in by the user, then // sets the `owner` value to the user name referred to in the user context
[ "OwnershipSetUsernameFromContext", "is", "used", "to", "create", "a", "new", "ownership", "object", "for", "a", "volume", ".", "It", "takes", "an", "ownership", "value", "if", "passed", "in", "by", "the", "user", "then", "sets", "the", "owner", "value", "to", "the", "user", "name", "referred", "to", "in", "the", "user", "context" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L36-L54
144,153
libopenstorage/openstorage
api/ownership.go
IsPermittedByContext
func (o *Ownership) IsPermittedByContext( ctx context.Context, accessType Ownership_AccessType) bool { // If no ownership is there then it is public if o == nil { return true } // Volume is not public, check permission if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check Access return o.IsPermitted(userinfo, accessType) } else { // There is no user information in the context so // authorization is not running return true } }
go
func (o *Ownership) IsPermittedByContext( ctx context.Context, accessType Ownership_AccessType) bool { // If no ownership is there then it is public if o == nil { return true } // Volume is not public, check permission if userinfo, ok := auth.NewUserInfoFromContext(ctx); ok { // Check Access return o.IsPermitted(userinfo, accessType) } else { // There is no user information in the context so // authorization is not running return true } }
[ "func", "(", "o", "*", "Ownership", ")", "IsPermittedByContext", "(", "ctx", "context", ".", "Context", ",", "accessType", "Ownership_AccessType", ")", "bool", "{", "// If no ownership is there then it is public", "if", "o", "==", "nil", "{", "return", "true", "\n", "}", "\n\n", "// Volume is not public, check permission", "if", "userinfo", ",", "ok", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", ";", "ok", "{", "// Check Access", "return", "o", ".", "IsPermitted", "(", "userinfo", ",", "accessType", ")", "\n", "}", "else", "{", "// There is no user information in the context so", "// authorization is not running", "return", "true", "\n", "}", "\n", "}" ]
// IsPermittedByContext returns true if the user captured in // the context has permission to access the resource
[ "IsPermittedByContext", "returns", "true", "if", "the", "user", "captured", "in", "the", "context", "has", "permission", "to", "access", "the", "resource" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L58-L76
144,154
libopenstorage/openstorage
api/ownership.go
IsPermitted
func (o *Ownership) IsPermitted( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { // There is no owner, so it is a public resource if o.IsPublic() { return true } // If we are missing user information then do not allow. // It is ok for the the user claims to have an empty Groups setting if user == nil || len(user.Username) == 0 { return false } if o.IsOwner(user) || o.IsUserAllowedByGroup(user, accessType) || o.IsUserAllowedByCollaborators(user, accessType) { return true } return false }
go
func (o *Ownership) IsPermitted( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { // There is no owner, so it is a public resource if o.IsPublic() { return true } // If we are missing user information then do not allow. // It is ok for the the user claims to have an empty Groups setting if user == nil || len(user.Username) == 0 { return false } if o.IsOwner(user) || o.IsUserAllowedByGroup(user, accessType) || o.IsUserAllowedByCollaborators(user, accessType) { return true } return false }
[ "func", "(", "o", "*", "Ownership", ")", "IsPermitted", "(", "user", "*", "auth", ".", "UserInfo", ",", "accessType", "Ownership_AccessType", ",", ")", "bool", "{", "// There is no owner, so it is a public resource", "if", "o", ".", "IsPublic", "(", ")", "{", "return", "true", "\n", "}", "\n\n", "// If we are missing user information then do not allow.", "// It is ok for the the user claims to have an empty Groups setting", "if", "user", "==", "nil", "||", "len", "(", "user", ".", "Username", ")", "==", "0", "{", "return", "false", "\n", "}", "\n\n", "if", "o", ".", "IsOwner", "(", "user", ")", "||", "o", ".", "IsUserAllowedByGroup", "(", "user", ",", "accessType", ")", "||", "o", ".", "IsUserAllowedByCollaborators", "(", "user", ",", "accessType", ")", "{", "return", "true", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// IsPermitted returns true if the user has access to the resource // according to the ownership. If there is no owner, then it is public
[ "IsPermitted", "returns", "true", "if", "the", "user", "has", "access", "to", "the", "resource", "according", "to", "the", "ownership", ".", "If", "there", "is", "no", "owner", "then", "it", "is", "public" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L80-L103
144,155
libopenstorage/openstorage
api/ownership.go
GetGroups
func (o *Ownership) GetGroups() map[string]Ownership_AccessType { if o.GetAcls() == nil { return nil } return o.GetAcls().GetGroups() }
go
func (o *Ownership) GetGroups() map[string]Ownership_AccessType { if o.GetAcls() == nil { return nil } return o.GetAcls().GetGroups() }
[ "func", "(", "o", "*", "Ownership", ")", "GetGroups", "(", ")", "map", "[", "string", "]", "Ownership_AccessType", "{", "if", "o", ".", "GetAcls", "(", ")", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "return", "o", ".", "GetAcls", "(", ")", ".", "GetGroups", "(", ")", "\n", "}" ]
// GetGroups returns the groups in the ownership
[ "GetGroups", "returns", "the", "groups", "in", "the", "ownership" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L106-L111
144,156
libopenstorage/openstorage
api/ownership.go
GetCollaborators
func (o *Ownership) GetCollaborators() map[string]Ownership_AccessType { if o.GetAcls() == nil { return nil } return o.GetAcls().GetCollaborators() }
go
func (o *Ownership) GetCollaborators() map[string]Ownership_AccessType { if o.GetAcls() == nil { return nil } return o.GetAcls().GetCollaborators() }
[ "func", "(", "o", "*", "Ownership", ")", "GetCollaborators", "(", ")", "map", "[", "string", "]", "Ownership_AccessType", "{", "if", "o", ".", "GetAcls", "(", ")", "==", "nil", "{", "return", "nil", "\n", "}", "\n", "return", "o", ".", "GetAcls", "(", ")", ".", "GetCollaborators", "(", ")", "\n", "}" ]
// GetCollaborators returns the collaborators in the ownership
[ "GetCollaborators", "returns", "the", "collaborators", "in", "the", "ownership" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L114-L119
144,157
libopenstorage/openstorage
api/ownership.go
IsUserAllowedByGroup
func (o *Ownership) IsUserAllowedByGroup( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { // Allow if it is the admin user for any group if o.IsAdminByUser(user) { return true } ownergroups := o.GetGroups() if len(ownergroups) == 0 { return false } // Check each of the groups from the user for _, group := range user.Claims.Groups { // Check if the user group has permission if a, ok := ownergroups[group]; ok { return a.isAccessPermitted(accessType) } } // Check if any group is allowed if a, ok := ownergroups["*"]; ok { return a.isAccessPermitted(accessType) } return false }
go
func (o *Ownership) IsUserAllowedByGroup( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { // Allow if it is the admin user for any group if o.IsAdminByUser(user) { return true } ownergroups := o.GetGroups() if len(ownergroups) == 0 { return false } // Check each of the groups from the user for _, group := range user.Claims.Groups { // Check if the user group has permission if a, ok := ownergroups[group]; ok { return a.isAccessPermitted(accessType) } } // Check if any group is allowed if a, ok := ownergroups["*"]; ok { return a.isAccessPermitted(accessType) } return false }
[ "func", "(", "o", "*", "Ownership", ")", "IsUserAllowedByGroup", "(", "user", "*", "auth", ".", "UserInfo", ",", "accessType", "Ownership_AccessType", ",", ")", "bool", "{", "// Allow if it is the admin user for any group", "if", "o", ".", "IsAdminByUser", "(", "user", ")", "{", "return", "true", "\n", "}", "\n\n", "ownergroups", ":=", "o", ".", "GetGroups", "(", ")", "\n", "if", "len", "(", "ownergroups", ")", "==", "0", "{", "return", "false", "\n", "}", "\n\n", "// Check each of the groups from the user", "for", "_", ",", "group", ":=", "range", "user", ".", "Claims", ".", "Groups", "{", "// Check if the user group has permission", "if", "a", ",", "ok", ":=", "ownergroups", "[", "group", "]", ";", "ok", "{", "return", "a", ".", "isAccessPermitted", "(", "accessType", ")", "\n", "}", "\n", "}", "\n\n", "// Check if any group is allowed", "if", "a", ",", "ok", ":=", "ownergroups", "[", "\"", "\"", "]", ";", "ok", "{", "return", "a", ".", "isAccessPermitted", "(", "accessType", ")", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// IsUserAllowedByGroup returns true if the user is allowed access // by belonging to the appropriate group
[ "IsUserAllowedByGroup", "returns", "true", "if", "the", "user", "is", "allowed", "access", "by", "belonging", "to", "the", "appropriate", "group" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L123-L152
144,158
libopenstorage/openstorage
api/ownership.go
IsUserAllowedByCollaborators
func (o *Ownership) IsUserAllowedByCollaborators( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { collaborators := o.GetCollaborators() if len(collaborators) == 0 { return false } // Check each of the groups from the user if a, ok := collaborators[user.Username]; ok { return a.isAccessPermitted(accessType) } // Check any user is allowed if a, ok := collaborators["*"]; ok { return a.isAccessPermitted(accessType) } return false }
go
func (o *Ownership) IsUserAllowedByCollaborators( user *auth.UserInfo, accessType Ownership_AccessType, ) bool { collaborators := o.GetCollaborators() if len(collaborators) == 0 { return false } // Check each of the groups from the user if a, ok := collaborators[user.Username]; ok { return a.isAccessPermitted(accessType) } // Check any user is allowed if a, ok := collaborators["*"]; ok { return a.isAccessPermitted(accessType) } return false }
[ "func", "(", "o", "*", "Ownership", ")", "IsUserAllowedByCollaborators", "(", "user", "*", "auth", ".", "UserInfo", ",", "accessType", "Ownership_AccessType", ",", ")", "bool", "{", "collaborators", ":=", "o", ".", "GetCollaborators", "(", ")", "\n", "if", "len", "(", "collaborators", ")", "==", "0", "{", "return", "false", "\n", "}", "\n\n", "// Check each of the groups from the user", "if", "a", ",", "ok", ":=", "collaborators", "[", "user", ".", "Username", "]", ";", "ok", "{", "return", "a", ".", "isAccessPermitted", "(", "accessType", ")", "\n", "}", "\n\n", "// Check any user is allowed", "if", "a", ",", "ok", ":=", "collaborators", "[", "\"", "\"", "]", ";", "ok", "{", "return", "a", ".", "isAccessPermitted", "(", "accessType", ")", "\n", "}", "\n\n", "return", "false", "\n", "}" ]
// IsUserAllowedByCollaborators returns true if the user is allowed access // because they are part of the collaborators list
[ "IsUserAllowedByCollaborators", "returns", "true", "if", "the", "user", "is", "allowed", "access", "because", "they", "are", "part", "of", "the", "collaborators", "list" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L156-L176
144,159
libopenstorage/openstorage
api/ownership.go
IsOwner
func (o *Ownership) IsOwner(user *auth.UserInfo) bool { return o.Owner == user.Username }
go
func (o *Ownership) IsOwner(user *auth.UserInfo) bool { return o.Owner == user.Username }
[ "func", "(", "o", "*", "Ownership", ")", "IsOwner", "(", "user", "*", "auth", ".", "UserInfo", ")", "bool", "{", "return", "o", ".", "Owner", "==", "user", ".", "Username", "\n", "}" ]
// IsOwner returns if the user is the owner of the resource
[ "IsOwner", "returns", "if", "the", "user", "is", "the", "owner", "of", "the", "resource" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L189-L191
144,160
libopenstorage/openstorage
api/ownership.go
Update
func (o *Ownership) Update(newownerInfo *Ownership, user *auth.UserInfo) error { if user == nil { // There is no auth, just copy the whole thing *o = *newownerInfo } else { // Auth is enabled // Only the owner, user with access type admin, // or admin can change the group if user.Username != o.Owner && !o.IsAdminByUser(user) && !o.IsPermitted(user, Ownership_Admin) { return status.Error(codes.PermissionDenied, "Only owner or those with admin access type can update volume acls") } // Only the admin can change the owner if newownerInfo.HasAnOwner() { if o.IsAdminByUser(user) { o.Owner = newownerInfo.Owner } else { return status.Error(codes.PermissionDenied, "Only the administrator can change the owner of the resource") } } o.Acls = newownerInfo.GetAcls() } return nil }
go
func (o *Ownership) Update(newownerInfo *Ownership, user *auth.UserInfo) error { if user == nil { // There is no auth, just copy the whole thing *o = *newownerInfo } else { // Auth is enabled // Only the owner, user with access type admin, // or admin can change the group if user.Username != o.Owner && !o.IsAdminByUser(user) && !o.IsPermitted(user, Ownership_Admin) { return status.Error(codes.PermissionDenied, "Only owner or those with admin access type can update volume acls") } // Only the admin can change the owner if newownerInfo.HasAnOwner() { if o.IsAdminByUser(user) { o.Owner = newownerInfo.Owner } else { return status.Error(codes.PermissionDenied, "Only the administrator can change the owner of the resource") } } o.Acls = newownerInfo.GetAcls() } return nil }
[ "func", "(", "o", "*", "Ownership", ")", "Update", "(", "newownerInfo", "*", "Ownership", ",", "user", "*", "auth", ".", "UserInfo", ")", "error", "{", "if", "user", "==", "nil", "{", "// There is no auth, just copy the whole thing", "*", "o", "=", "*", "newownerInfo", "\n", "}", "else", "{", "// Auth is enabled", "// Only the owner, user with access type admin,", "// or admin can change the group", "if", "user", ".", "Username", "!=", "o", ".", "Owner", "&&", "!", "o", ".", "IsAdminByUser", "(", "user", ")", "&&", "!", "o", ".", "IsPermitted", "(", "user", ",", "Ownership_Admin", ")", "{", "return", "status", ".", "Error", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// Only the admin can change the owner", "if", "newownerInfo", ".", "HasAnOwner", "(", ")", "{", "if", "o", ".", "IsAdminByUser", "(", "user", ")", "{", "o", ".", "Owner", "=", "newownerInfo", ".", "Owner", "\n", "}", "else", "{", "return", "status", ".", "Error", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n", "o", ".", "Acls", "=", "newownerInfo", ".", "GetAcls", "(", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Update can be used to update an ownership with new ownership information. It // takes into account who is trying to change the ownership values
[ "Update", "can", "be", "used", "to", "update", "an", "ownership", "with", "new", "ownership", "information", ".", "It", "takes", "into", "account", "who", "is", "trying", "to", "change", "the", "ownership", "values" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L201-L229
144,161
libopenstorage/openstorage
api/ownership.go
IsAdminByUser
func IsAdminByUser(user *auth.UserInfo) bool { // If there is a user, then auth is enabled if user != nil { return listContains(user.Claims.Groups, AdminGroup) } // No auth enabled, so everyone is an admin return true }
go
func IsAdminByUser(user *auth.UserInfo) bool { // If there is a user, then auth is enabled if user != nil { return listContains(user.Claims.Groups, AdminGroup) } // No auth enabled, so everyone is an admin return true }
[ "func", "IsAdminByUser", "(", "user", "*", "auth", ".", "UserInfo", ")", "bool", "{", "// If there is a user, then auth is enabled", "if", "user", "!=", "nil", "{", "return", "listContains", "(", "user", ".", "Claims", ".", "Groups", ",", "AdminGroup", ")", "\n", "}", "\n\n", "// No auth enabled, so everyone is an admin", "return", "true", "\n", "}" ]
// IsAdminByUser returns true if the user is an ownership admin, meaning, // that they belong to any group
[ "IsAdminByUser", "returns", "true", "if", "the", "user", "is", "an", "ownership", "admin", "meaning", "that", "they", "belong", "to", "any", "group" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/ownership.go#L278-L286
144,162
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
NewClient
func NewClient(cfg *VSphereConfig) (storageops.Ops, error) { vSphereConn := &vclib.VSphereConnection{ Username: cfg.User, Password: cfg.Password, Hostname: cfg.VCenterIP, Insecure: cfg.InsecureFlag, RoundTripperCount: cfg.RoundTripperCount, Port: cfg.VCenterPort, } ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := GetVMObject(ctx, vSphereConn, cfg.VMUUID) if err != nil { return nil, err } logrus.Debugf("Using following configuration for vsphere:") logrus.Debugf(" vCenter: %s:%s", cfg.VCenterIP, cfg.VCenterPort) logrus.Debugf(" Datacenter: %s", vmObj.Datacenter.Name()) logrus.Debugf(" VMUUID: %s", cfg.VMUUID) return &vsphereOps{ cfg: cfg, vm: vmObj, conn: vSphereConn, }, nil }
go
func NewClient(cfg *VSphereConfig) (storageops.Ops, error) { vSphereConn := &vclib.VSphereConnection{ Username: cfg.User, Password: cfg.Password, Hostname: cfg.VCenterIP, Insecure: cfg.InsecureFlag, RoundTripperCount: cfg.RoundTripperCount, Port: cfg.VCenterPort, } ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := GetVMObject(ctx, vSphereConn, cfg.VMUUID) if err != nil { return nil, err } logrus.Debugf("Using following configuration for vsphere:") logrus.Debugf(" vCenter: %s:%s", cfg.VCenterIP, cfg.VCenterPort) logrus.Debugf(" Datacenter: %s", vmObj.Datacenter.Name()) logrus.Debugf(" VMUUID: %s", cfg.VMUUID) return &vsphereOps{ cfg: cfg, vm: vmObj, conn: vSphereConn, }, nil }
[ "func", "NewClient", "(", "cfg", "*", "VSphereConfig", ")", "(", "storageops", ".", "Ops", ",", "error", ")", "{", "vSphereConn", ":=", "&", "vclib", ".", "VSphereConnection", "{", "Username", ":", "cfg", ".", "User", ",", "Password", ":", "cfg", ".", "Password", ",", "Hostname", ":", "cfg", ".", "VCenterIP", ",", "Insecure", ":", "cfg", ".", "InsecureFlag", ",", "RoundTripperCount", ":", "cfg", ".", "RoundTripperCount", ",", "Port", ":", "cfg", ".", "VCenterPort", ",", "}", "\n\n", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "context", ".", "Background", "(", ")", ")", "\n", "defer", "cancel", "(", ")", "\n", "vmObj", ",", "err", ":=", "GetVMObject", "(", "ctx", ",", "vSphereConn", ",", "cfg", ".", "VMUUID", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "logrus", ".", "Debugf", "(", "\"", "\"", ")", "\n", "logrus", ".", "Debugf", "(", "\"", "\"", ",", "cfg", ".", "VCenterIP", ",", "cfg", ".", "VCenterPort", ")", "\n", "logrus", ".", "Debugf", "(", "\"", "\"", ",", "vmObj", ".", "Datacenter", ".", "Name", "(", ")", ")", "\n", "logrus", ".", "Debugf", "(", "\"", "\"", ",", "cfg", ".", "VMUUID", ")", "\n\n", "return", "&", "vsphereOps", "{", "cfg", ":", "cfg", ",", "vm", ":", "vmObj", ",", "conn", ":", "vSphereConn", ",", "}", ",", "nil", "\n", "}" ]
// NewClient creates a new vsphere storageops instance
[ "NewClient", "creates", "a", "new", "vsphere", "storageops", "instance" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L44-L71
144,163
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
Attach
func (ops *vsphereOps) Attach(diskPath string) (string, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := ops.renewVM(ctx, ops.vm) if err != nil { return "", err } diskUUID, err := vmObj.AttachDisk(ctx, diskPath, &vclib.VolumeOptions{SCSIControllerType: vclib.PVSCSIControllerType}) if err != nil { logrus.Errorf("Failed to attach vsphere disk: %s for VM: %s. err: +%v", diskPath, vmObj.Name(), err) return "", err } return path.Join(diskByIDPath, diskSCSIPrefix+diskUUID), nil }
go
func (ops *vsphereOps) Attach(diskPath string) (string, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := ops.renewVM(ctx, ops.vm) if err != nil { return "", err } diskUUID, err := vmObj.AttachDisk(ctx, diskPath, &vclib.VolumeOptions{SCSIControllerType: vclib.PVSCSIControllerType}) if err != nil { logrus.Errorf("Failed to attach vsphere disk: %s for VM: %s. err: +%v", diskPath, vmObj.Name(), err) return "", err } return path.Join(diskByIDPath, diskSCSIPrefix+diskUUID), nil }
[ "func", "(", "ops", "*", "vsphereOps", ")", "Attach", "(", "diskPath", "string", ")", "(", "string", ",", "error", ")", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "context", ".", "Background", "(", ")", ")", "\n", "defer", "cancel", "(", ")", "\n\n", "vmObj", ",", "err", ":=", "ops", ".", "renewVM", "(", "ctx", ",", "ops", ".", "vm", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "diskUUID", ",", "err", ":=", "vmObj", ".", "AttachDisk", "(", "ctx", ",", "diskPath", ",", "&", "vclib", ".", "VolumeOptions", "{", "SCSIControllerType", ":", "vclib", ".", "PVSCSIControllerType", "}", ")", "\n", "if", "err", "!=", "nil", "{", "logrus", ".", "Errorf", "(", "\"", "\"", ",", "diskPath", ",", "vmObj", ".", "Name", "(", ")", ",", "err", ")", "\n", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "return", "path", ".", "Join", "(", "diskByIDPath", ",", "diskSCSIPrefix", "+", "diskUUID", ")", ",", "nil", "\n", "}" ]
// Attach takes in the path of the vmdk file and returns where it is attached inside the vm instance
[ "Attach", "takes", "in", "the", "path", "of", "the", "vmdk", "file", "and", "returns", "where", "it", "is", "attached", "inside", "the", "vm", "instance" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L174-L190
144,164
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
Delete
func (ops *vsphereOps) Delete(diskPath string) error { return ops.deleteInternal(diskPath, ops.cfg.VMUUID) }
go
func (ops *vsphereOps) Delete(diskPath string) error { return ops.deleteInternal(diskPath, ops.cfg.VMUUID) }
[ "func", "(", "ops", "*", "vsphereOps", ")", "Delete", "(", "diskPath", "string", ")", "error", "{", "return", "ops", ".", "deleteInternal", "(", "diskPath", ",", "ops", ".", "cfg", ".", "VMUUID", ")", "\n", "}" ]
// Delete virtual disk at given path
[ "Delete", "virtual", "disk", "at", "given", "path" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L227-L229
144,165
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
Describe
func (ops *vsphereOps) Describe() (interface{}, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() return ops.renewVM(ctx, ops.vm) }
go
func (ops *vsphereOps) Describe() (interface{}, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() return ops.renewVM(ctx, ops.vm) }
[ "func", "(", "ops", "*", "vsphereOps", ")", "Describe", "(", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "context", ".", "Background", "(", ")", ")", "\n", "defer", "cancel", "(", ")", "\n\n", "return", "ops", ".", "renewVM", "(", "ctx", ",", "ops", ".", "vm", ")", "\n", "}" ]
// Desribe an instance of the virtual machine object to which ops is connected to
[ "Desribe", "an", "instance", "of", "the", "virtual", "machine", "object", "to", "which", "ops", "is", "connected", "to" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L268-L273
144,166
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
FreeDevices
func (ops *vsphereOps) FreeDevices(blockDeviceMappings []interface{}, rootDeviceName string) ([]string, error) { return nil, storageops.ErrNotSupported }
go
func (ops *vsphereOps) FreeDevices(blockDeviceMappings []interface{}, rootDeviceName string) ([]string, error) { return nil, storageops.ErrNotSupported }
[ "func", "(", "ops", "*", "vsphereOps", ")", "FreeDevices", "(", "blockDeviceMappings", "[", "]", "interface", "{", "}", ",", "rootDeviceName", "string", ")", "(", "[", "]", "string", ",", "error", ")", "{", "return", "nil", ",", "storageops", ".", "ErrNotSupported", "\n", "}" ]
// FreeDevices is not supported by this provider
[ "FreeDevices", "is", "not", "supported", "by", "this", "provider" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L276-L278
144,167
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
DevicePath
func (ops *vsphereOps) DevicePath(diskPath string) (string, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := ops.renewVM(ctx, ops.vm) if err != nil { return "", err } attached, err := vmObj.IsDiskAttached(ctx, diskPath) if err != nil { return "", fmt.Errorf("failed to check if disk: %s is attached on vm: %s. err: %v", diskPath, vmObj.Name(), err) } if !attached { return "", fmt.Errorf("disk: %s is not attached on vm: %s", diskPath, vmObj.Name()) } diskUUID, err := vmObj.Datacenter.GetVirtualDiskPage83Data(ctx, diskPath) if err != nil { logrus.Errorf("failed to get device path for disk: %s on vm: %s", diskPath, vmObj.Name()) return "", err } return path.Join(diskByIDPath, diskSCSIPrefix+diskUUID), nil }
go
func (ops *vsphereOps) DevicePath(diskPath string) (string, error) { ctx, cancel := context.WithCancel(context.Background()) defer cancel() vmObj, err := ops.renewVM(ctx, ops.vm) if err != nil { return "", err } attached, err := vmObj.IsDiskAttached(ctx, diskPath) if err != nil { return "", fmt.Errorf("failed to check if disk: %s is attached on vm: %s. err: %v", diskPath, vmObj.Name(), err) } if !attached { return "", fmt.Errorf("disk: %s is not attached on vm: %s", diskPath, vmObj.Name()) } diskUUID, err := vmObj.Datacenter.GetVirtualDiskPage83Data(ctx, diskPath) if err != nil { logrus.Errorf("failed to get device path for disk: %s on vm: %s", diskPath, vmObj.Name()) return "", err } return path.Join(diskByIDPath, diskSCSIPrefix+diskUUID), nil }
[ "func", "(", "ops", "*", "vsphereOps", ")", "DevicePath", "(", "diskPath", "string", ")", "(", "string", ",", "error", ")", "{", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "context", ".", "Background", "(", ")", ")", "\n", "defer", "cancel", "(", ")", "\n\n", "vmObj", ",", "err", ":=", "ops", ".", "renewVM", "(", "ctx", ",", "ops", ".", "vm", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "attached", ",", "err", ":=", "vmObj", ".", "IsDiskAttached", "(", "ctx", ",", "diskPath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "diskPath", ",", "vmObj", ".", "Name", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "if", "!", "attached", "{", "return", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "diskPath", ",", "vmObj", ".", "Name", "(", ")", ")", "\n", "}", "\n\n", "diskUUID", ",", "err", ":=", "vmObj", ".", "Datacenter", ".", "GetVirtualDiskPage83Data", "(", "ctx", ",", "diskPath", ")", "\n", "if", "err", "!=", "nil", "{", "logrus", ".", "Errorf", "(", "\"", "\"", ",", "diskPath", ",", "vmObj", ".", "Name", "(", ")", ")", "\n", "return", "\"", "\"", ",", "err", "\n", "}", "\n\n", "return", "path", ".", "Join", "(", "diskByIDPath", ",", "diskSCSIPrefix", "+", "diskUUID", ")", ",", "nil", "\n", "}" ]
// DevicePath for the given volume i.e path where it's attached
[ "DevicePath", "for", "the", "given", "volume", "i", ".", "e", "path", "where", "it", "s", "attached" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L322-L348
144,168
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
Snapshot
func (ops *vsphereOps) Snapshot(volumeID string, readonly bool) (interface{}, error) { return nil, storageops.ErrNotSupported }
go
func (ops *vsphereOps) Snapshot(volumeID string, readonly bool) (interface{}, error) { return nil, storageops.ErrNotSupported }
[ "func", "(", "ops", "*", "vsphereOps", ")", "Snapshot", "(", "volumeID", "string", ",", "readonly", "bool", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "return", "nil", ",", "storageops", ".", "ErrNotSupported", "\n", "}" ]
// Snapshot the volume with given volumeID
[ "Snapshot", "the", "volume", "with", "given", "volumeID" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L358-L360
144,169
libopenstorage/openstorage
pkg/storageops/vsphere/vsphere.go
GetVMObject
func GetVMObject(ctx context.Context, conn *vclib.VSphereConnection, vmUUID string) (*vclib.VirtualMachine, error) { // TODO change impl below using multiple goroutines and sync.WaitGroup to make it faster ctx, cancel := context.WithCancel(context.Background()) defer cancel() if err := conn.Connect(ctx); err != nil { return nil, err } if len(vmUUID) == 0 { return nil, fmt.Errorf("virtual machine uuid is required") } datacenterObjs, err := vclib.GetAllDatacenter(ctx, conn) if err != nil { return nil, err } // Lookup in each vsphere datacenter for this virtual machine for _, dc := range datacenterObjs { vm, err := dc.GetVMByUUID(ctx, vmUUID) if err != nil { if err != vclib.ErrNoVMFound { logrus.Warnf("failed to find vm with uuid: %s in datacenter: %s due to err: %v", vmUUID, dc.Name(), err) // don't let one bad egg fail entire search. keep looking. } else { logrus.Debugf("did not find vm with uuid: %s in datacenter: %s", vmUUID, dc.Name()) } continue } if vm != nil { return vm, nil } } return nil, fmt.Errorf("failed to find vm with uuid: %s in any datacenter for vc: %s", vmUUID, conn.Hostname) }
go
func GetVMObject(ctx context.Context, conn *vclib.VSphereConnection, vmUUID string) (*vclib.VirtualMachine, error) { // TODO change impl below using multiple goroutines and sync.WaitGroup to make it faster ctx, cancel := context.WithCancel(context.Background()) defer cancel() if err := conn.Connect(ctx); err != nil { return nil, err } if len(vmUUID) == 0 { return nil, fmt.Errorf("virtual machine uuid is required") } datacenterObjs, err := vclib.GetAllDatacenter(ctx, conn) if err != nil { return nil, err } // Lookup in each vsphere datacenter for this virtual machine for _, dc := range datacenterObjs { vm, err := dc.GetVMByUUID(ctx, vmUUID) if err != nil { if err != vclib.ErrNoVMFound { logrus.Warnf("failed to find vm with uuid: %s in datacenter: %s due to err: %v", vmUUID, dc.Name(), err) // don't let one bad egg fail entire search. keep looking. } else { logrus.Debugf("did not find vm with uuid: %s in datacenter: %s", vmUUID, dc.Name()) } continue } if vm != nil { return vm, nil } } return nil, fmt.Errorf("failed to find vm with uuid: %s in any datacenter for vc: %s", vmUUID, conn.Hostname) }
[ "func", "GetVMObject", "(", "ctx", "context", ".", "Context", ",", "conn", "*", "vclib", ".", "VSphereConnection", ",", "vmUUID", "string", ")", "(", "*", "vclib", ".", "VirtualMachine", ",", "error", ")", "{", "// TODO change impl below using multiple goroutines and sync.WaitGroup to make it faster", "ctx", ",", "cancel", ":=", "context", ".", "WithCancel", "(", "context", ".", "Background", "(", ")", ")", "\n", "defer", "cancel", "(", ")", "\n", "if", "err", ":=", "conn", ".", "Connect", "(", "ctx", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "if", "len", "(", "vmUUID", ")", "==", "0", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "datacenterObjs", ",", "err", ":=", "vclib", ".", "GetAllDatacenter", "(", "ctx", ",", "conn", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Lookup in each vsphere datacenter for this virtual machine", "for", "_", ",", "dc", ":=", "range", "datacenterObjs", "{", "vm", ",", "err", ":=", "dc", ".", "GetVMByUUID", "(", "ctx", ",", "vmUUID", ")", "\n", "if", "err", "!=", "nil", "{", "if", "err", "!=", "vclib", ".", "ErrNoVMFound", "{", "logrus", ".", "Warnf", "(", "\"", "\"", ",", "vmUUID", ",", "dc", ".", "Name", "(", ")", ",", "err", ")", "\n", "// don't let one bad egg fail entire search. keep looking.", "}", "else", "{", "logrus", ".", "Debugf", "(", "\"", "\"", ",", "vmUUID", ",", "dc", ".", "Name", "(", ")", ")", "\n", "}", "\n", "continue", "\n", "}", "\n\n", "if", "vm", "!=", "nil", "{", "return", "vm", ",", "nil", "\n", "}", "\n", "}", "\n\n", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "vmUUID", ",", "conn", ".", "Hostname", ")", "\n", "}" ]
// GetVMObject fetches the VirtualMachine object corresponding to the given virtual machine uuid
[ "GetVMObject", "fetches", "the", "VirtualMachine", "object", "corresponding", "to", "the", "given", "virtual", "machine", "uuid" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storageops/vsphere/vsphere.go#L383-L419
144,170
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
Create
func (p *SdkPolicyManager) Create( ctx context.Context, req *api.SdkOpenStoragePolicyCreateRequest, ) (*api.SdkOpenStoragePolicyCreateResponse, error) { if req.GetStoragePolicy().GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } else if req.GetStoragePolicy().GetPolicy() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply Volume Specs") } // Add ownership details to storage policy // user who has RBAC access to storage policy can create one req.StoragePolicy.Ownership = api.OwnershipSetUsernameFromContext(ctx, req.GetStoragePolicy().GetOwnership()) // Since VolumeSpecPolicy has oneof method of proto, // we need to marshal sdkStoragePolicy into string using protobuf jsonpb m := jsonpb.Marshaler{OrigName: true} policyStr, err := m.MarshalToString(req.GetStoragePolicy()) if err != nil { return nil, status.Errorf(codes.Internal, "Json Marshal failed for policy %s: %v", req.GetStoragePolicy().GetName(), err) } _, err = p.kv.Create(prefixWithName(req.GetStoragePolicy().GetName()), policyStr, 0) if err == kvdb.ErrExist { return nil, status.Errorf(codes.AlreadyExists, "Storage Policy already exist : %v", req.GetStoragePolicy().GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to save storage policy: %v", err) } logrus.Infof("Storage Policy %v is created", req.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicyCreateResponse{}, nil }
go
func (p *SdkPolicyManager) Create( ctx context.Context, req *api.SdkOpenStoragePolicyCreateRequest, ) (*api.SdkOpenStoragePolicyCreateResponse, error) { if req.GetStoragePolicy().GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } else if req.GetStoragePolicy().GetPolicy() == nil { return nil, status.Error(codes.InvalidArgument, "Must supply Volume Specs") } // Add ownership details to storage policy // user who has RBAC access to storage policy can create one req.StoragePolicy.Ownership = api.OwnershipSetUsernameFromContext(ctx, req.GetStoragePolicy().GetOwnership()) // Since VolumeSpecPolicy has oneof method of proto, // we need to marshal sdkStoragePolicy into string using protobuf jsonpb m := jsonpb.Marshaler{OrigName: true} policyStr, err := m.MarshalToString(req.GetStoragePolicy()) if err != nil { return nil, status.Errorf(codes.Internal, "Json Marshal failed for policy %s: %v", req.GetStoragePolicy().GetName(), err) } _, err = p.kv.Create(prefixWithName(req.GetStoragePolicy().GetName()), policyStr, 0) if err == kvdb.ErrExist { return nil, status.Errorf(codes.AlreadyExists, "Storage Policy already exist : %v", req.GetStoragePolicy().GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to save storage policy: %v", err) } logrus.Infof("Storage Policy %v is created", req.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicyCreateResponse{}, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "Create", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyCreateRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyCreateResponse", ",", "error", ")", "{", "if", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", "==", "\"", "\"", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "else", "if", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetPolicy", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// Add ownership details to storage policy", "// user who has RBAC access to storage policy can create one", "req", ".", "StoragePolicy", ".", "Ownership", "=", "api", ".", "OwnershipSetUsernameFromContext", "(", "ctx", ",", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetOwnership", "(", ")", ")", "\n\n", "// Since VolumeSpecPolicy has oneof method of proto,", "// we need to marshal sdkStoragePolicy into string using protobuf jsonpb", "m", ":=", "jsonpb", ".", "Marshaler", "{", "OrigName", ":", "true", "}", "\n", "policyStr", ",", "err", ":=", "m", ".", "MarshalToString", "(", "req", ".", "GetStoragePolicy", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "_", ",", "err", "=", "p", ".", "kv", ".", "Create", "(", "prefixWithName", "(", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", ",", "policyStr", ",", "0", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrExist", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "AlreadyExists", ",", "\"", "\"", ",", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "logrus", ".", "Infof", "(", "\"", "\"", ",", "req", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", "\n", "return", "&", "api", ".", "SdkOpenStoragePolicyCreateResponse", "{", "}", ",", "nil", "\n", "}" ]
// Create Storage policy
[ "Create", "Storage", "policy" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L97-L128
144,171
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
Delete
func (p *SdkPolicyManager) Delete( ctx context.Context, req *api.SdkOpenStoragePolicyDeleteRequest, ) (*api.SdkOpenStoragePolicyDeleteResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } // retrive default storage policy details inspResp, err := p.Inspect(ctx, &api.SdkOpenStoragePolicyInspectRequest{ Name: req.GetName(), }, ) if err != nil { return &api.SdkOpenStoragePolicyDeleteResponse{}, nil } // Only the owner or the admin can delete if !inspResp.GetStoragePolicy().IsPermitted(ctx, api.Ownership_Admin) { return nil, status.Errorf(codes.PermissionDenied, "Cannot delete storage policy %v", req.GetName()) } // release default policy restriction before deleting policy policy, err := p.DefaultInspect(ctx, &api.SdkOpenStoragePolicyDefaultInspectRequest{}) if err != nil { return nil, err } if policy.GetStoragePolicy() != nil && policy.GetStoragePolicy().GetName() == req.GetName() { _, err := p.Release(ctx, &api.SdkOpenStoragePolicyReleaseRequest{}) if err != nil { return nil, status.Errorf(codes.Internal, "Removal of default policy failed with: %v", err) } } _, err = p.kv.Delete(prefixWithName(req.GetName())) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Failed to delete Storage Policy %s: %v", req.GetName(), err) } logrus.Infof("Storage Policy %v is deleted", req.GetName()) return &api.SdkOpenStoragePolicyDeleteResponse{}, nil }
go
func (p *SdkPolicyManager) Delete( ctx context.Context, req *api.SdkOpenStoragePolicyDeleteRequest, ) (*api.SdkOpenStoragePolicyDeleteResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } // retrive default storage policy details inspResp, err := p.Inspect(ctx, &api.SdkOpenStoragePolicyInspectRequest{ Name: req.GetName(), }, ) if err != nil { return &api.SdkOpenStoragePolicyDeleteResponse{}, nil } // Only the owner or the admin can delete if !inspResp.GetStoragePolicy().IsPermitted(ctx, api.Ownership_Admin) { return nil, status.Errorf(codes.PermissionDenied, "Cannot delete storage policy %v", req.GetName()) } // release default policy restriction before deleting policy policy, err := p.DefaultInspect(ctx, &api.SdkOpenStoragePolicyDefaultInspectRequest{}) if err != nil { return nil, err } if policy.GetStoragePolicy() != nil && policy.GetStoragePolicy().GetName() == req.GetName() { _, err := p.Release(ctx, &api.SdkOpenStoragePolicyReleaseRequest{}) if err != nil { return nil, status.Errorf(codes.Internal, "Removal of default policy failed with: %v", err) } } _, err = p.kv.Delete(prefixWithName(req.GetName())) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Failed to delete Storage Policy %s: %v", req.GetName(), err) } logrus.Infof("Storage Policy %v is deleted", req.GetName()) return &api.SdkOpenStoragePolicyDeleteResponse{}, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "Delete", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyDeleteRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyDeleteResponse", ",", "error", ")", "{", "if", "req", ".", "GetName", "(", ")", "==", "\"", "\"", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// retrive default storage policy details", "inspResp", ",", "err", ":=", "p", ".", "Inspect", "(", "ctx", ",", "&", "api", ".", "SdkOpenStoragePolicyInspectRequest", "{", "Name", ":", "req", ".", "GetName", "(", ")", ",", "}", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "&", "api", ".", "SdkOpenStoragePolicyDeleteResponse", "{", "}", ",", "nil", "\n", "}", "\n\n", "// Only the owner or the admin can delete", "if", "!", "inspResp", ".", "GetStoragePolicy", "(", ")", ".", "IsPermitted", "(", "ctx", ",", "api", ".", "Ownership_Admin", ")", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "// release default policy restriction before deleting policy", "policy", ",", "err", ":=", "p", ".", "DefaultInspect", "(", "ctx", ",", "&", "api", ".", "SdkOpenStoragePolicyDefaultInspectRequest", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "if", "policy", ".", "GetStoragePolicy", "(", ")", "!=", "nil", "&&", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", "==", "req", ".", "GetName", "(", ")", "{", "_", ",", "err", ":=", "p", ".", "Release", "(", "ctx", ",", "&", "api", ".", "SdkOpenStoragePolicyReleaseRequest", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "\n\n", "_", ",", "err", "=", "p", ".", "kv", ".", "Delete", "(", "prefixWithName", "(", "req", ".", "GetName", "(", ")", ")", ")", "\n", "if", "err", "!=", "kvdb", ".", "ErrNotFound", "&&", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "logrus", ".", "Infof", "(", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "return", "&", "api", ".", "SdkOpenStoragePolicyDeleteResponse", "{", "}", ",", "nil", "\n", "}" ]
// Delete storage policy specified by name
[ "Delete", "storage", "policy", "specified", "by", "name" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L190-L233
144,172
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
Inspect
func (p *SdkPolicyManager) Inspect( ctx context.Context, req *api.SdkOpenStoragePolicyInspectRequest, ) (*api.SdkOpenStoragePolicyInspectResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } kvp, err := p.kv.Get(prefixWithName(req.GetName())) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Policy %s not found", req.GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get policy %s information: %v", req.GetName(), err) } storPolicy := &api.SdkStoragePolicy{} err = jsonpb.UnmarshalString(string(kvp.Value), storPolicy) if err != nil { return nil, status.Errorf(codes.Internal, "Json Unmarshal failed for policy %s: %v", req.GetName(), err) } if !storPolicy.IsPermitted(ctx, api.Ownership_Read) { return nil, status.Errorf(codes.PermissionDenied, "Access denied to storage policy %s", storPolicy.GetName()) } return &api.SdkOpenStoragePolicyInspectResponse{ StoragePolicy: storPolicy, }, nil }
go
func (p *SdkPolicyManager) Inspect( ctx context.Context, req *api.SdkOpenStoragePolicyInspectRequest, ) (*api.SdkOpenStoragePolicyInspectResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } kvp, err := p.kv.Get(prefixWithName(req.GetName())) if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Policy %s not found", req.GetName()) } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get policy %s information: %v", req.GetName(), err) } storPolicy := &api.SdkStoragePolicy{} err = jsonpb.UnmarshalString(string(kvp.Value), storPolicy) if err != nil { return nil, status.Errorf(codes.Internal, "Json Unmarshal failed for policy %s: %v", req.GetName(), err) } if !storPolicy.IsPermitted(ctx, api.Ownership_Read) { return nil, status.Errorf(codes.PermissionDenied, "Access denied to storage policy %s", storPolicy.GetName()) } return &api.SdkOpenStoragePolicyInspectResponse{ StoragePolicy: storPolicy, }, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "Inspect", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyInspectRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyInspectResponse", ",", "error", ")", "{", "if", "req", ".", "GetName", "(", ")", "==", "\"", "\"", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "kvp", ",", "err", ":=", "p", ".", "kv", ".", "Get", "(", "prefixWithName", "(", "req", ".", "GetName", "(", ")", ")", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "storPolicy", ":=", "&", "api", ".", "SdkStoragePolicy", "{", "}", "\n", "err", "=", "jsonpb", ".", "UnmarshalString", "(", "string", "(", "kvp", ".", "Value", ")", ",", "storPolicy", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "if", "!", "storPolicy", ".", "IsPermitted", "(", "ctx", ",", "api", ".", "Ownership_Read", ")", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ",", "storPolicy", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkOpenStoragePolicyInspectResponse", "{", "StoragePolicy", ":", "storPolicy", ",", "}", ",", "nil", "\n", "}" ]
// Inspect storage policy specifed by name
[ "Inspect", "storage", "policy", "specifed", "by", "name" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L236-L264
144,173
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
Enumerate
func (p *SdkPolicyManager) Enumerate( ctx context.Context, req *api.SdkOpenStoragePolicyEnumerateRequest, ) (*api.SdkOpenStoragePolicyEnumerateResponse, error) { // get all keyValue pair at /storage/policy/policies kvp, err := p.kv.Enumerate(policyPrefix + policyPath) if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get policies from database: %v", err) } policies := make([]*api.SdkStoragePolicy, 0) for _, policy := range kvp { sdkPolicy := &api.SdkStoragePolicy{} err = jsonpb.UnmarshalString(string(policy.Value), sdkPolicy) if err != nil { return nil, status.Errorf(codes.Internal, "Json Unmarshal failed for policy %s: %v", policy.Key, err) } // only enum volumes, owner has read access to if sdkPolicy.IsPermitted(ctx, api.Ownership_Read) { policies = append(policies, sdkPolicy) } } return &api.SdkOpenStoragePolicyEnumerateResponse{ StoragePolicies: policies, }, nil }
go
func (p *SdkPolicyManager) Enumerate( ctx context.Context, req *api.SdkOpenStoragePolicyEnumerateRequest, ) (*api.SdkOpenStoragePolicyEnumerateResponse, error) { // get all keyValue pair at /storage/policy/policies kvp, err := p.kv.Enumerate(policyPrefix + policyPath) if err != nil { return nil, status.Errorf(codes.Internal, "Failed to get policies from database: %v", err) } policies := make([]*api.SdkStoragePolicy, 0) for _, policy := range kvp { sdkPolicy := &api.SdkStoragePolicy{} err = jsonpb.UnmarshalString(string(policy.Value), sdkPolicy) if err != nil { return nil, status.Errorf(codes.Internal, "Json Unmarshal failed for policy %s: %v", policy.Key, err) } // only enum volumes, owner has read access to if sdkPolicy.IsPermitted(ctx, api.Ownership_Read) { policies = append(policies, sdkPolicy) } } return &api.SdkOpenStoragePolicyEnumerateResponse{ StoragePolicies: policies, }, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "Enumerate", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyEnumerateRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyEnumerateResponse", ",", "error", ")", "{", "// get all keyValue pair at /storage/policy/policies", "kvp", ",", "err", ":=", "p", ".", "kv", ".", "Enumerate", "(", "policyPrefix", "+", "policyPath", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "policies", ":=", "make", "(", "[", "]", "*", "api", ".", "SdkStoragePolicy", ",", "0", ")", "\n", "for", "_", ",", "policy", ":=", "range", "kvp", "{", "sdkPolicy", ":=", "&", "api", ".", "SdkStoragePolicy", "{", "}", "\n", "err", "=", "jsonpb", ".", "UnmarshalString", "(", "string", "(", "policy", ".", "Value", ")", ",", "sdkPolicy", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "policy", ".", "Key", ",", "err", ")", "\n", "}", "\n", "// only enum volumes, owner has read access to", "if", "sdkPolicy", ".", "IsPermitted", "(", "ctx", ",", "api", ".", "Ownership_Read", ")", "{", "policies", "=", "append", "(", "policies", ",", "sdkPolicy", ")", "\n", "}", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkOpenStoragePolicyEnumerateResponse", "{", "StoragePolicies", ":", "policies", ",", "}", ",", "nil", "\n", "}" ]
// Enumerate all of storage policies
[ "Enumerate", "all", "of", "storage", "policies" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L267-L293
144,174
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
SetDefault
func (p *SdkPolicyManager) SetDefault( ctx context.Context, req *api.SdkOpenStoragePolicySetDefaultRequest, ) (*api.SdkOpenStoragePolicySetDefaultResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } // verify policy exists, before setting it as default policy, err := p.Inspect(ctx, &api.SdkOpenStoragePolicyInspectRequest{ Name: req.GetName(), }, ) if err != nil { return nil, err } // Only administrator can set policy as default storage // policy restriction user, _ := auth.NewUserInfoFromContext(ctx) if !policy.GetStoragePolicy().GetOwnership().IsAdminByUser(user) { return nil, status.Errorf(codes.PermissionDenied, "Only the storage system admin can set storage policy as default %v", req.GetName()) } policyStr, err := json.Marshal(policy.GetStoragePolicy().GetName()) if err != nil { return nil, status.Errorf(codes.Internal, "Json marshal failed for policy %s :%v", req.GetName(), err) } _, err = p.kv.Update(defaultPath, policyStr, 0) if err == kvdb.ErrNotFound { if _, err := p.kv.Create(defaultPath, policyStr, 0); err != nil { return nil, status.Errorf(codes.Internal, "Unable to save default policy details %v", err) } } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to set default policy: %v", err) } logrus.Infof("Storage Policy %v is set as default", policy.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicySetDefaultResponse{}, nil }
go
func (p *SdkPolicyManager) SetDefault( ctx context.Context, req *api.SdkOpenStoragePolicySetDefaultRequest, ) (*api.SdkOpenStoragePolicySetDefaultResponse, error) { if req.GetName() == "" { return nil, status.Error(codes.InvalidArgument, "Must supply a Storage Policy Name") } // verify policy exists, before setting it as default policy, err := p.Inspect(ctx, &api.SdkOpenStoragePolicyInspectRequest{ Name: req.GetName(), }, ) if err != nil { return nil, err } // Only administrator can set policy as default storage // policy restriction user, _ := auth.NewUserInfoFromContext(ctx) if !policy.GetStoragePolicy().GetOwnership().IsAdminByUser(user) { return nil, status.Errorf(codes.PermissionDenied, "Only the storage system admin can set storage policy as default %v", req.GetName()) } policyStr, err := json.Marshal(policy.GetStoragePolicy().GetName()) if err != nil { return nil, status.Errorf(codes.Internal, "Json marshal failed for policy %s :%v", req.GetName(), err) } _, err = p.kv.Update(defaultPath, policyStr, 0) if err == kvdb.ErrNotFound { if _, err := p.kv.Create(defaultPath, policyStr, 0); err != nil { return nil, status.Errorf(codes.Internal, "Unable to save default policy details %v", err) } } else if err != nil { return nil, status.Errorf(codes.Internal, "Failed to set default policy: %v", err) } logrus.Infof("Storage Policy %v is set as default", policy.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicySetDefaultResponse{}, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "SetDefault", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicySetDefaultRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicySetDefaultResponse", ",", "error", ")", "{", "if", "req", ".", "GetName", "(", ")", "==", "\"", "\"", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// verify policy exists, before setting it as default", "policy", ",", "err", ":=", "p", ".", "Inspect", "(", "ctx", ",", "&", "api", ".", "SdkOpenStoragePolicyInspectRequest", "{", "Name", ":", "req", ".", "GetName", "(", ")", ",", "}", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Only administrator can set policy as default storage", "// policy restriction", "user", ",", "_", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", "\n", "if", "!", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetOwnership", "(", ")", ".", "IsAdminByUser", "(", "user", ")", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ")", "\n", "}", "\n\n", "policyStr", ",", "err", ":=", "json", ".", "Marshal", "(", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetName", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "_", ",", "err", "=", "p", ".", "kv", ".", "Update", "(", "defaultPath", ",", "policyStr", ",", "0", ")", "\n", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "if", "_", ",", "err", ":=", "p", ".", "kv", ".", "Create", "(", "defaultPath", ",", "policyStr", ",", "0", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "logrus", ".", "Infof", "(", "\"", "\"", ",", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", "\n", "return", "&", "api", ".", "SdkOpenStoragePolicySetDefaultResponse", "{", "}", ",", "nil", "\n", "}" ]
// SetDefault storage policy
[ "SetDefault", "storage", "policy" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L296-L336
144,175
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
Release
func (p *SdkPolicyManager) Release( ctx context.Context, req *api.SdkOpenStoragePolicyReleaseRequest, ) (*api.SdkOpenStoragePolicyReleaseResponse, error) { policy, err := p.DefaultInspect(ctx, &api.SdkOpenStoragePolicyDefaultInspectRequest{}) if err != nil { return nil, err } // only administrator can remove storage policy restriction user, _ := auth.NewUserInfoFromContext(ctx) if !policy.GetStoragePolicy().GetOwnership().IsAdminByUser(user) { return nil, status.Errorf(codes.PermissionDenied, "Only the storage system admin can remove storage policy restriction") } // empty represents no policy is set as default strB, _ := json.Marshal("") _, err = p.kv.Update(defaultPath, strB, 0) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Remove storage policy restriction failed with: %v", err) } logrus.Infof("Storage Policy %v restriction is removed", policy.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicyReleaseResponse{}, nil }
go
func (p *SdkPolicyManager) Release( ctx context.Context, req *api.SdkOpenStoragePolicyReleaseRequest, ) (*api.SdkOpenStoragePolicyReleaseResponse, error) { policy, err := p.DefaultInspect(ctx, &api.SdkOpenStoragePolicyDefaultInspectRequest{}) if err != nil { return nil, err } // only administrator can remove storage policy restriction user, _ := auth.NewUserInfoFromContext(ctx) if !policy.GetStoragePolicy().GetOwnership().IsAdminByUser(user) { return nil, status.Errorf(codes.PermissionDenied, "Only the storage system admin can remove storage policy restriction") } // empty represents no policy is set as default strB, _ := json.Marshal("") _, err = p.kv.Update(defaultPath, strB, 0) if err != kvdb.ErrNotFound && err != nil { return nil, status.Errorf(codes.Internal, "Remove storage policy restriction failed with: %v", err) } logrus.Infof("Storage Policy %v restriction is removed", policy.GetStoragePolicy().GetName()) return &api.SdkOpenStoragePolicyReleaseResponse{}, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "Release", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyReleaseRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyReleaseResponse", ",", "error", ")", "{", "policy", ",", "err", ":=", "p", ".", "DefaultInspect", "(", "ctx", ",", "&", "api", ".", "SdkOpenStoragePolicyDefaultInspectRequest", "{", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// only administrator can remove storage policy restriction", "user", ",", "_", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", "\n", "if", "!", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetOwnership", "(", ")", ".", "IsAdminByUser", "(", "user", ")", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "PermissionDenied", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// empty represents no policy is set as default", "strB", ",", "_", ":=", "json", ".", "Marshal", "(", "\"", "\"", ")", "\n", "_", ",", "err", "=", "p", ".", "kv", ".", "Update", "(", "defaultPath", ",", "strB", ",", "0", ")", "\n", "if", "err", "!=", "kvdb", ".", "ErrNotFound", "&&", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "logrus", ".", "Infof", "(", "\"", "\"", ",", "policy", ".", "GetStoragePolicy", "(", ")", ".", "GetName", "(", ")", ")", "\n", "return", "&", "api", ".", "SdkOpenStoragePolicyReleaseResponse", "{", "}", ",", "nil", "\n", "}" ]
// Release storage policy if set as default
[ "Release", "storage", "policy", "if", "set", "as", "default" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L339-L364
144,176
libopenstorage/openstorage
pkg/storagepolicy/sdkstoragepolicy.go
DefaultInspect
func (p *SdkPolicyManager) DefaultInspect( ctx context.Context, req *api.SdkOpenStoragePolicyDefaultInspectRequest, ) (*api.SdkOpenStoragePolicyDefaultInspectResponse, error) { var policyName string defaultPolicy := &api.SdkOpenStoragePolicyDefaultInspectResponse{} _, err := p.kv.GetVal(defaultPath, &policyName) // defaultPath key is not created if err == kvdb.ErrNotFound { return defaultPolicy, nil } else if err != nil { return nil, status.Errorf(codes.Internal, "Unable to retrive default policy details: %v", err) } // no default policy found if policyName == "" { return defaultPolicy, nil } // retrive default storage policy details inspResp, err := p.Inspect(context.Background(), &api.SdkOpenStoragePolicyInspectRequest{ Name: policyName, }, ) if err != nil { return nil, err } return &api.SdkOpenStoragePolicyDefaultInspectResponse{ StoragePolicy: inspResp.GetStoragePolicy(), }, nil }
go
func (p *SdkPolicyManager) DefaultInspect( ctx context.Context, req *api.SdkOpenStoragePolicyDefaultInspectRequest, ) (*api.SdkOpenStoragePolicyDefaultInspectResponse, error) { var policyName string defaultPolicy := &api.SdkOpenStoragePolicyDefaultInspectResponse{} _, err := p.kv.GetVal(defaultPath, &policyName) // defaultPath key is not created if err == kvdb.ErrNotFound { return defaultPolicy, nil } else if err != nil { return nil, status.Errorf(codes.Internal, "Unable to retrive default policy details: %v", err) } // no default policy found if policyName == "" { return defaultPolicy, nil } // retrive default storage policy details inspResp, err := p.Inspect(context.Background(), &api.SdkOpenStoragePolicyInspectRequest{ Name: policyName, }, ) if err != nil { return nil, err } return &api.SdkOpenStoragePolicyDefaultInspectResponse{ StoragePolicy: inspResp.GetStoragePolicy(), }, nil }
[ "func", "(", "p", "*", "SdkPolicyManager", ")", "DefaultInspect", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkOpenStoragePolicyDefaultInspectRequest", ",", ")", "(", "*", "api", ".", "SdkOpenStoragePolicyDefaultInspectResponse", ",", "error", ")", "{", "var", "policyName", "string", "\n", "defaultPolicy", ":=", "&", "api", ".", "SdkOpenStoragePolicyDefaultInspectResponse", "{", "}", "\n\n", "_", ",", "err", ":=", "p", ".", "kv", ".", "GetVal", "(", "defaultPath", ",", "&", "policyName", ")", "\n", "// defaultPath key is not created", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "defaultPolicy", ",", "nil", "\n", "}", "else", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// no default policy found", "if", "policyName", "==", "\"", "\"", "{", "return", "defaultPolicy", ",", "nil", "\n", "}", "\n\n", "// retrive default storage policy details", "inspResp", ",", "err", ":=", "p", ".", "Inspect", "(", "context", ".", "Background", "(", ")", ",", "&", "api", ".", "SdkOpenStoragePolicyInspectRequest", "{", "Name", ":", "policyName", ",", "}", ",", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkOpenStoragePolicyDefaultInspectResponse", "{", "StoragePolicy", ":", "inspResp", ".", "GetStoragePolicy", "(", ")", ",", "}", ",", "nil", "\n", "}" ]
// DefaultInspect return default storeage policy details
[ "DefaultInspect", "return", "default", "storeage", "policy", "details" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/storagepolicy/sdkstoragepolicy.go#L367-L400
144,177
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
Create
func (s *ClusterPairServer) Create( ctx context.Context, req *api.SdkClusterPairCreateRequest, ) (*api.SdkClusterPairCreateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if req.GetRequest() == nil { return nil, status.Errorf(codes.InvalidArgument, "Must supply valid request") } resp, err := s.cluster().CreatePair(req.GetRequest()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot create cluster with remote pair %s : %v", req.GetRequest().GetRemoteClusterIp(), err) } return &api.SdkClusterPairCreateResponse{ Result: resp, }, nil }
go
func (s *ClusterPairServer) Create( ctx context.Context, req *api.SdkClusterPairCreateRequest, ) (*api.SdkClusterPairCreateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if req.GetRequest() == nil { return nil, status.Errorf(codes.InvalidArgument, "Must supply valid request") } resp, err := s.cluster().CreatePair(req.GetRequest()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot create cluster with remote pair %s : %v", req.GetRequest().GetRemoteClusterIp(), err) } return &api.SdkClusterPairCreateResponse{ Result: resp, }, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "Create", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairCreateRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairCreateResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "req", ".", "GetRequest", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "resp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "CreatePair", "(", "req", ".", "GetRequest", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetRequest", "(", ")", ".", "GetRemoteClusterIp", "(", ")", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "api", ".", "SdkClusterPairCreateResponse", "{", "Result", ":", "resp", ",", "}", ",", "nil", "\n", "}" ]
// Create a new cluster with remote pair
[ "Create", "a", "new", "cluster", "with", "remote", "pair" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L39-L60
144,178
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
Inspect
func (s *ClusterPairServer) Inspect( ctx context.Context, req *api.SdkClusterPairInspectRequest, ) (*api.SdkClusterPairInspectResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply cluster ID") } resp, err := s.cluster().GetPair(req.GetId()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot Get cluster information for %s : %v", req.GetId(), err) } return &api.SdkClusterPairInspectResponse{ Result: resp, }, nil }
go
func (s *ClusterPairServer) Inspect( ctx context.Context, req *api.SdkClusterPairInspectRequest, ) (*api.SdkClusterPairInspectResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply cluster ID") } resp, err := s.cluster().GetPair(req.GetId()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot Get cluster information for %s : %v", req.GetId(), err) } return &api.SdkClusterPairInspectResponse{ Result: resp, }, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "Inspect", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairInspectRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairInspectResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "len", "(", "req", ".", "GetId", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n", "resp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "GetPair", "(", "req", ".", "GetId", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetId", "(", ")", ",", "err", ")", "\n", "}", "\n", "return", "&", "api", ".", "SdkClusterPairInspectResponse", "{", "Result", ":", "resp", ",", "}", ",", "nil", "\n", "}" ]
// Inspect information about a cluster pair
[ "Inspect", "information", "about", "a", "cluster", "pair" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L63-L81
144,179
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
Enumerate
func (s *ClusterPairServer) Enumerate( ctx context.Context, req *api.SdkClusterPairEnumerateRequest, ) (*api.SdkClusterPairEnumerateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } resp, err := s.cluster().EnumeratePairs() if err != nil { return nil, status.Errorf(codes.Internal, "Cannot list cluster pairs : %v", err) } return &api.SdkClusterPairEnumerateResponse{ Result: resp, }, nil }
go
func (s *ClusterPairServer) Enumerate( ctx context.Context, req *api.SdkClusterPairEnumerateRequest, ) (*api.SdkClusterPairEnumerateResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } resp, err := s.cluster().EnumeratePairs() if err != nil { return nil, status.Errorf(codes.Internal, "Cannot list cluster pairs : %v", err) } return &api.SdkClusterPairEnumerateResponse{ Result: resp, }, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "Enumerate", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairEnumerateRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairEnumerateResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "resp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "EnumeratePairs", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "&", "api", ".", "SdkClusterPairEnumerateResponse", "{", "Result", ":", "resp", ",", "}", ",", "nil", "\n", "}" ]
// Enumerate returns list of cluster pairs
[ "Enumerate", "returns", "list", "of", "cluster", "pairs" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L84-L99
144,180
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
GetToken
func (s *ClusterPairServer) GetToken( ctx context.Context, req *api.SdkClusterPairGetTokenRequest, ) (*api.SdkClusterPairGetTokenResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } // Check if admin user - only system.admin can get cluster pair tokens if userInfo, ok := auth.NewUserInfoFromContext(ctx); ok { o := api.Ownership{} if !o.IsAdminByUser(userInfo) { return nil, status.Error(codes.Unauthenticated, "Must be system admin to get pair token") } } resp, err := s.cluster().GetPairToken(false) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot generate token: %v", err) } return &api.SdkClusterPairGetTokenResponse{ Result: resp, }, nil }
go
func (s *ClusterPairServer) GetToken( ctx context.Context, req *api.SdkClusterPairGetTokenRequest, ) (*api.SdkClusterPairGetTokenResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } // Check if admin user - only system.admin can get cluster pair tokens if userInfo, ok := auth.NewUserInfoFromContext(ctx); ok { o := api.Ownership{} if !o.IsAdminByUser(userInfo) { return nil, status.Error(codes.Unauthenticated, "Must be system admin to get pair token") } } resp, err := s.cluster().GetPairToken(false) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot generate token: %v", err) } return &api.SdkClusterPairGetTokenResponse{ Result: resp, }, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "GetToken", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairGetTokenRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairGetTokenResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// Check if admin user - only system.admin can get cluster pair tokens", "if", "userInfo", ",", "ok", ":=", "auth", ".", "NewUserInfoFromContext", "(", "ctx", ")", ";", "ok", "{", "o", ":=", "api", ".", "Ownership", "{", "}", "\n", "if", "!", "o", ".", "IsAdminByUser", "(", "userInfo", ")", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unauthenticated", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n\n", "resp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "GetPairToken", "(", "false", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "&", "api", ".", "SdkClusterPairGetTokenResponse", "{", "Result", ":", "resp", ",", "}", ",", "nil", "\n", "}" ]
// GetToken gets the authentication token for this cluster
[ "GetToken", "gets", "the", "authentication", "token", "for", "this", "cluster" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L102-L125
144,181
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
ResetToken
func (s *ClusterPairServer) ResetToken( ctx context.Context, req *api.SdkClusterPairResetTokenRequest, ) (*api.SdkClusterPairResetTokenResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } resp, err := s.cluster().GetPairToken(true) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot generate token: %v", err) } return &api.SdkClusterPairResetTokenResponse{ Result: resp, }, nil }
go
func (s *ClusterPairServer) ResetToken( ctx context.Context, req *api.SdkClusterPairResetTokenRequest, ) (*api.SdkClusterPairResetTokenResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } resp, err := s.cluster().GetPairToken(true) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot generate token: %v", err) } return &api.SdkClusterPairResetTokenResponse{ Result: resp, }, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "ResetToken", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairResetTokenRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairResetTokenResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "resp", ",", "err", ":=", "s", ".", "cluster", "(", ")", ".", "GetPairToken", "(", "true", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "&", "api", ".", "SdkClusterPairResetTokenResponse", "{", "Result", ":", "resp", ",", "}", ",", "nil", "\n", "}" ]
// ResetToken gets the authentication token for this cluster
[ "ResetToken", "gets", "the", "authentication", "token", "for", "this", "cluster" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L128-L143
144,182
libopenstorage/openstorage
api/server/sdk/cluster_pair.go
Delete
func (s *ClusterPairServer) Delete( ctx context.Context, req *api.SdkClusterPairDeleteRequest, ) (*api.SdkClusterPairDeleteResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetClusterId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply valid cluster ID") } err := s.cluster().DeletePair(req.GetClusterId()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot delete the cluster pair %s : %v", req.GetClusterId(), err) } return &api.SdkClusterPairDeleteResponse{}, nil }
go
func (s *ClusterPairServer) Delete( ctx context.Context, req *api.SdkClusterPairDeleteRequest, ) (*api.SdkClusterPairDeleteResponse, error) { if s.cluster() == nil { return nil, status.Error(codes.Unavailable, "Resource has not been initialized") } if len(req.GetClusterId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Must supply valid cluster ID") } err := s.cluster().DeletePair(req.GetClusterId()) if err != nil { return nil, status.Errorf(codes.Internal, "Cannot delete the cluster pair %s : %v", req.GetClusterId(), err) } return &api.SdkClusterPairDeleteResponse{}, nil }
[ "func", "(", "s", "*", "ClusterPairServer", ")", "Delete", "(", "ctx", "context", ".", "Context", ",", "req", "*", "api", ".", "SdkClusterPairDeleteRequest", ",", ")", "(", "*", "api", ".", "SdkClusterPairDeleteResponse", ",", "error", ")", "{", "if", "s", ".", "cluster", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "Unavailable", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "len", "(", "req", ".", "GetClusterId", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n", "err", ":=", "s", ".", "cluster", "(", ")", ".", "DeletePair", "(", "req", ".", "GetClusterId", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "req", ".", "GetClusterId", "(", ")", ",", "err", ")", "\n", "}", "\n", "return", "&", "api", ".", "SdkClusterPairDeleteResponse", "{", "}", ",", "nil", "\n", "}" ]
// Delete removes the cluster pairing
[ "Delete", "removes", "the", "cluster", "pairing" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/api/server/sdk/cluster_pair.go#L146-L162
144,183
libopenstorage/openstorage
cluster/cluster_not_supported.go
Inspect
func (m *NullClusterManager) Inspect(arg0 string) (api.Node, error) { return api.Node{}, ErrNotImplemented }
go
func (m *NullClusterManager) Inspect(arg0 string) (api.Node, error) { return api.Node{}, ErrNotImplemented }
[ "func", "(", "m", "*", "NullClusterManager", ")", "Inspect", "(", "arg0", "string", ")", "(", "api", ".", "Node", ",", "error", ")", "{", "return", "api", ".", "Node", "{", "}", ",", "ErrNotImplemented", "\n", "}" ]
// NullClusterManager implementations // Inspect
[ "NullClusterManager", "implementations", "Inspect" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cluster/cluster_not_supported.go#L78-L80
144,184
libopenstorage/openstorage
cluster/cluster_not_supported.go
Remove
func (m *NullClusterRemove) Remove(arg0 []api.Node, arg1 bool) error { return ErrNotImplemented }
go
func (m *NullClusterRemove) Remove(arg0 []api.Node, arg1 bool) error { return ErrNotImplemented }
[ "func", "(", "m", "*", "NullClusterRemove", ")", "Remove", "(", "arg0", "[", "]", "api", ".", "Node", ",", "arg1", "bool", ")", "error", "{", "return", "ErrNotImplemented", "\n", "}" ]
// NullClusterRemove implementations // Remove
[ "NullClusterRemove", "implementations", "Remove" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cluster/cluster_not_supported.go#L169-L171
144,185
libopenstorage/openstorage
cluster/cluster_not_supported.go
EnumerateAlerts
func (m *NullClusterAlerts) EnumerateAlerts(arg0, arg1 time.Time, arg2 api.ResourceType) (*api.Alerts, error) { return nil, ErrNotImplemented }
go
func (m *NullClusterAlerts) EnumerateAlerts(arg0, arg1 time.Time, arg2 api.ResourceType) (*api.Alerts, error) { return nil, ErrNotImplemented }
[ "func", "(", "m", "*", "NullClusterAlerts", ")", "EnumerateAlerts", "(", "arg0", ",", "arg1", "time", ".", "Time", ",", "arg2", "api", ".", "ResourceType", ")", "(", "*", "api", ".", "Alerts", ",", "error", ")", "{", "return", "nil", ",", "ErrNotImplemented", "\n", "}" ]
// NullClusterAlerts implementations // EnumerateAlerts
[ "NullClusterAlerts", "implementations", "EnumerateAlerts" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cluster/cluster_not_supported.go#L193-L195
144,186
libopenstorage/openstorage
cluster/cluster_not_supported.go
CreatePair
func (m *NullClusterPair) CreatePair(arg0 *api.ClusterPairCreateRequest) (*api.ClusterPairCreateResponse, error) { return nil, ErrNotImplemented }
go
func (m *NullClusterPair) CreatePair(arg0 *api.ClusterPairCreateRequest) (*api.ClusterPairCreateResponse, error) { return nil, ErrNotImplemented }
[ "func", "(", "m", "*", "NullClusterPair", ")", "CreatePair", "(", "arg0", "*", "api", ".", "ClusterPairCreateRequest", ")", "(", "*", "api", ".", "ClusterPairCreateResponse", ",", "error", ")", "{", "return", "nil", ",", "ErrNotImplemented", "\n", "}" ]
// NullClusterPair implementations // CreatePair
[ "NullClusterPair", "implementations", "CreatePair" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cluster/cluster_not_supported.go#L205-L207
144,187
libopenstorage/openstorage
csi/controller.go
ControllerExpandVolume
func (s *OsdCsiServer) ControllerExpandVolume( ctx context.Context, req *csi.ControllerExpandVolumeRequest, ) (*csi.ControllerExpandVolumeResponse, error) { if len(req.GetVolumeId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Volume id must be provided") } else if req.GetCapacityRange() == nil { return nil, status.Error(codes.InvalidArgument, "Capacity range must be provided") } else if req.GetCapacityRange().GetRequiredBytes() < 0 || req.GetCapacityRange().GetLimitBytes() < 0 { return nil, status.Error(codes.InvalidArgument, "Capacity ranges values cannot be negative") } // Get Size spec := &api.VolumeSpecUpdate{} newSize := uint64(req.GetCapacityRange().GetRequiredBytes()) spec.SizeOpt = &api.VolumeSpecUpdate_Size{ Size: newSize, } // Get grpc connection conn, err := s.getConn() if err != nil { return nil, status.Errorf( codes.Internal, "Unable to connect to SDK server: %v", err) } // Get secret if any was passed ctx = s.setupContextWithToken(ctx, req.GetSecrets()) // If the new size is greater than the current size, a volume update // should be issued. Otherwise, no operation should occur. volumes := api.NewOpenStorageVolumeClient(conn) // Update volume with new size _, err = volumes.Update(ctx, &api.SdkVolumeUpdateRequest{ VolumeId: req.GetVolumeId(), Spec: spec, }) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Volume id %s not found", req.GetVolumeId()) } return nil, status.Errorf(codes.Internal, "Failed to update volume size: %v", err) } return &csi.ControllerExpandVolumeResponse{ CapacityBytes: int64(newSize), NodeExpansionRequired: false, }, nil }
go
func (s *OsdCsiServer) ControllerExpandVolume( ctx context.Context, req *csi.ControllerExpandVolumeRequest, ) (*csi.ControllerExpandVolumeResponse, error) { if len(req.GetVolumeId()) == 0 { return nil, status.Error(codes.InvalidArgument, "Volume id must be provided") } else if req.GetCapacityRange() == nil { return nil, status.Error(codes.InvalidArgument, "Capacity range must be provided") } else if req.GetCapacityRange().GetRequiredBytes() < 0 || req.GetCapacityRange().GetLimitBytes() < 0 { return nil, status.Error(codes.InvalidArgument, "Capacity ranges values cannot be negative") } // Get Size spec := &api.VolumeSpecUpdate{} newSize := uint64(req.GetCapacityRange().GetRequiredBytes()) spec.SizeOpt = &api.VolumeSpecUpdate_Size{ Size: newSize, } // Get grpc connection conn, err := s.getConn() if err != nil { return nil, status.Errorf( codes.Internal, "Unable to connect to SDK server: %v", err) } // Get secret if any was passed ctx = s.setupContextWithToken(ctx, req.GetSecrets()) // If the new size is greater than the current size, a volume update // should be issued. Otherwise, no operation should occur. volumes := api.NewOpenStorageVolumeClient(conn) // Update volume with new size _, err = volumes.Update(ctx, &api.SdkVolumeUpdateRequest{ VolumeId: req.GetVolumeId(), Spec: spec, }) if err != nil { if err == kvdb.ErrNotFound { return nil, status.Errorf(codes.NotFound, "Volume id %s not found", req.GetVolumeId()) } return nil, status.Errorf(codes.Internal, "Failed to update volume size: %v", err) } return &csi.ControllerExpandVolumeResponse{ CapacityBytes: int64(newSize), NodeExpansionRequired: false, }, nil }
[ "func", "(", "s", "*", "OsdCsiServer", ")", "ControllerExpandVolume", "(", "ctx", "context", ".", "Context", ",", "req", "*", "csi", ".", "ControllerExpandVolumeRequest", ",", ")", "(", "*", "csi", ".", "ControllerExpandVolumeResponse", ",", "error", ")", "{", "if", "len", "(", "req", ".", "GetVolumeId", "(", ")", ")", "==", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "else", "if", "req", ".", "GetCapacityRange", "(", ")", "==", "nil", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "else", "if", "req", ".", "GetCapacityRange", "(", ")", ".", "GetRequiredBytes", "(", ")", "<", "0", "||", "req", ".", "GetCapacityRange", "(", ")", ".", "GetLimitBytes", "(", ")", "<", "0", "{", "return", "nil", ",", "status", ".", "Error", "(", "codes", ".", "InvalidArgument", ",", "\"", "\"", ")", "\n", "}", "\n\n", "// Get Size", "spec", ":=", "&", "api", ".", "VolumeSpecUpdate", "{", "}", "\n", "newSize", ":=", "uint64", "(", "req", ".", "GetCapacityRange", "(", ")", ".", "GetRequiredBytes", "(", ")", ")", "\n", "spec", ".", "SizeOpt", "=", "&", "api", ".", "VolumeSpecUpdate_Size", "{", "Size", ":", "newSize", ",", "}", "\n\n", "// Get grpc connection", "conn", ",", "err", ":=", "s", ".", "getConn", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// Get secret if any was passed", "ctx", "=", "s", ".", "setupContextWithToken", "(", "ctx", ",", "req", ".", "GetSecrets", "(", ")", ")", "\n\n", "// If the new size is greater than the current size, a volume update", "// should be issued. Otherwise, no operation should occur.", "volumes", ":=", "api", ".", "NewOpenStorageVolumeClient", "(", "conn", ")", "\n\n", "// Update volume with new size", "_", ",", "err", "=", "volumes", ".", "Update", "(", "ctx", ",", "&", "api", ".", "SdkVolumeUpdateRequest", "{", "VolumeId", ":", "req", ".", "GetVolumeId", "(", ")", ",", "Spec", ":", "spec", ",", "}", ")", "\n", "if", "err", "!=", "nil", "{", "if", "err", "==", "kvdb", ".", "ErrNotFound", "{", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "NotFound", ",", "\"", "\"", ",", "req", ".", "GetVolumeId", "(", ")", ")", "\n", "}", "\n", "return", "nil", ",", "status", ".", "Errorf", "(", "codes", ".", "Internal", ",", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "return", "&", "csi", ".", "ControllerExpandVolumeResponse", "{", "CapacityBytes", ":", "int64", "(", "newSize", ")", ",", "NodeExpansionRequired", ":", "false", ",", "}", ",", "nil", "\n", "}" ]
// ControllerExpandVolume is a CSI API which resizes a volume
[ "ControllerExpandVolume", "is", "a", "CSI", "API", "which", "resizes", "a", "volume" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/csi/controller.go#L396-L446
144,188
libopenstorage/openstorage
cli/drivers.go
DriverCommands
func DriverCommands() []cli.Command { commands := []cli.Command{ { Name: "add", Aliases: []string{"a"}, Usage: "add a new driver", Action: driverAdd, Flags: []cli.Flag{ cli.StringFlag{ Name: "name,n", Usage: "Driver Name", }, cli.StringFlag{ Name: "options,o", Usage: "Comma separated name=value pairs, e.g disk=/dev/xvdg,mount=/var/openstorage/btrfs", }, }, }, { Name: "list", Aliases: []string{"l"}, Usage: "List drivers", Action: driverList, }, } return commands }
go
func DriverCommands() []cli.Command { commands := []cli.Command{ { Name: "add", Aliases: []string{"a"}, Usage: "add a new driver", Action: driverAdd, Flags: []cli.Flag{ cli.StringFlag{ Name: "name,n", Usage: "Driver Name", }, cli.StringFlag{ Name: "options,o", Usage: "Comma separated name=value pairs, e.g disk=/dev/xvdg,mount=/var/openstorage/btrfs", }, }, }, { Name: "list", Aliases: []string{"l"}, Usage: "List drivers", Action: driverList, }, } return commands }
[ "func", "DriverCommands", "(", ")", "[", "]", "cli", ".", "Command", "{", "commands", ":=", "[", "]", "cli", ".", "Command", "{", "{", "Name", ":", "\"", "\"", ",", "Aliases", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "driverAdd", ",", "Flags", ":", "[", "]", "cli", ".", "Flag", "{", "cli", ".", "StringFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "cli", ".", "StringFlag", "{", "Name", ":", "\"", "\"", ",", "Usage", ":", "\"", "\"", ",", "}", ",", "}", ",", "}", ",", "{", "Name", ":", "\"", "\"", ",", "Aliases", ":", "[", "]", "string", "{", "\"", "\"", "}", ",", "Usage", ":", "\"", "\"", ",", "Action", ":", "driverList", ",", "}", ",", "}", "\n", "return", "commands", "\n", "}" ]
// DriverCommands exports the list of CLI driver subcommands.
[ "DriverCommands", "exports", "the", "list", "of", "CLI", "driver", "subcommands", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/cli/drivers.go#L14-L40
144,189
libopenstorage/openstorage
volume/drivers/buse/buse.go
Init
func Init(params map[string]string) (volume.VolumeDriver, error) { nbdInit() inst := &driver{ IODriver: volume.IONotSupported, StoreEnumerator: common.NewDefaultStoreEnumerator(Name, kvdb.Instance()), StatsDriver: volume.StatsNotSupported, QuiesceDriver: volume.QuiesceNotSupported, CredsDriver: volume.CredsNotSupported, CloudBackupDriver: volume.CloudBackupNotSupported, CloudMigrateDriver: volume.CloudMigrateNotSupported, } inst.buseDevices = make(map[string]*buseDev) if err := os.MkdirAll(BuseMountPath, 0744); err != nil { return nil, err } volumeInfo, err := inst.StoreEnumerator.Enumerate( &api.VolumeLocator{}, nil, ) if err == nil { for _, info := range volumeInfo { if info.Status == api.VolumeStatus_VOLUME_STATUS_NONE { info.Status = api.VolumeStatus_VOLUME_STATUS_UP inst.UpdateVol(info) } } } else { logrus.Println("Could not enumerate Volumes, ", err) } inst.cl = &clusterListener{} c, err := clustermanager.Inst() if err != nil { logrus.Println("BUSE initializing in single node mode") } else { logrus.Println("BUSE initializing in clustered mode") c.AddEventListener(inst.cl) } logrus.Println("BUSE initialized and driver mounted at: ", BuseMountPath) return inst, nil }
go
func Init(params map[string]string) (volume.VolumeDriver, error) { nbdInit() inst := &driver{ IODriver: volume.IONotSupported, StoreEnumerator: common.NewDefaultStoreEnumerator(Name, kvdb.Instance()), StatsDriver: volume.StatsNotSupported, QuiesceDriver: volume.QuiesceNotSupported, CredsDriver: volume.CredsNotSupported, CloudBackupDriver: volume.CloudBackupNotSupported, CloudMigrateDriver: volume.CloudMigrateNotSupported, } inst.buseDevices = make(map[string]*buseDev) if err := os.MkdirAll(BuseMountPath, 0744); err != nil { return nil, err } volumeInfo, err := inst.StoreEnumerator.Enumerate( &api.VolumeLocator{}, nil, ) if err == nil { for _, info := range volumeInfo { if info.Status == api.VolumeStatus_VOLUME_STATUS_NONE { info.Status = api.VolumeStatus_VOLUME_STATUS_UP inst.UpdateVol(info) } } } else { logrus.Println("Could not enumerate Volumes, ", err) } inst.cl = &clusterListener{} c, err := clustermanager.Inst() if err != nil { logrus.Println("BUSE initializing in single node mode") } else { logrus.Println("BUSE initializing in clustered mode") c.AddEventListener(inst.cl) } logrus.Println("BUSE initialized and driver mounted at: ", BuseMountPath) return inst, nil }
[ "func", "Init", "(", "params", "map", "[", "string", "]", "string", ")", "(", "volume", ".", "VolumeDriver", ",", "error", ")", "{", "nbdInit", "(", ")", "\n\n", "inst", ":=", "&", "driver", "{", "IODriver", ":", "volume", ".", "IONotSupported", ",", "StoreEnumerator", ":", "common", ".", "NewDefaultStoreEnumerator", "(", "Name", ",", "kvdb", ".", "Instance", "(", ")", ")", ",", "StatsDriver", ":", "volume", ".", "StatsNotSupported", ",", "QuiesceDriver", ":", "volume", ".", "QuiesceNotSupported", ",", "CredsDriver", ":", "volume", ".", "CredsNotSupported", ",", "CloudBackupDriver", ":", "volume", ".", "CloudBackupNotSupported", ",", "CloudMigrateDriver", ":", "volume", ".", "CloudMigrateNotSupported", ",", "}", "\n", "inst", ".", "buseDevices", "=", "make", "(", "map", "[", "string", "]", "*", "buseDev", ")", "\n", "if", "err", ":=", "os", ".", "MkdirAll", "(", "BuseMountPath", ",", "0744", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "volumeInfo", ",", "err", ":=", "inst", ".", "StoreEnumerator", ".", "Enumerate", "(", "&", "api", ".", "VolumeLocator", "{", "}", ",", "nil", ",", ")", "\n", "if", "err", "==", "nil", "{", "for", "_", ",", "info", ":=", "range", "volumeInfo", "{", "if", "info", ".", "Status", "==", "api", ".", "VolumeStatus_VOLUME_STATUS_NONE", "{", "info", ".", "Status", "=", "api", ".", "VolumeStatus_VOLUME_STATUS_UP", "\n", "inst", ".", "UpdateVol", "(", "info", ")", "\n", "}", "\n", "}", "\n", "}", "else", "{", "logrus", ".", "Println", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "inst", ".", "cl", "=", "&", "clusterListener", "{", "}", "\n", "c", ",", "err", ":=", "clustermanager", ".", "Inst", "(", ")", "\n", "if", "err", "!=", "nil", "{", "logrus", ".", "Println", "(", "\"", "\"", ")", "\n", "}", "else", "{", "logrus", ".", "Println", "(", "\"", "\"", ")", "\n", "c", ".", "AddEventListener", "(", "inst", ".", "cl", ")", "\n", "}", "\n\n", "logrus", ".", "Println", "(", "\"", "\"", ",", "BuseMountPath", ")", "\n", "return", "inst", ",", "nil", "\n", "}" ]
// Init intialized the buse driver
[ "Init", "intialized", "the", "buse", "driver" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/buse/buse.go#L94-L137
144,190
libopenstorage/openstorage
pkg/mount/deleted_mount.go
NewDeletedMounter
func NewDeletedMounter( rootSubstring string, mountImpl MountImpl, ) (*deletedMounter, error) { devMounter, err := NewDeviceMounter([]string{"/dev/"}, mountImpl, nil, "") if err != nil { return nil, err } deletedMounts := make(DeviceMap) for k, v := range devMounter.mounts { if matchDeleted(rootSubstring, k) { deletedMounts[k] = v } else { for _, p := range v.Mountpoint { if matchDeleted(rootSubstring, p.Root) { addMountpoint(deletedMounts, k, p) } } } } devMounter.mounts = deletedMounts return &deletedMounter{deviceMounter: devMounter}, nil }
go
func NewDeletedMounter( rootSubstring string, mountImpl MountImpl, ) (*deletedMounter, error) { devMounter, err := NewDeviceMounter([]string{"/dev/"}, mountImpl, nil, "") if err != nil { return nil, err } deletedMounts := make(DeviceMap) for k, v := range devMounter.mounts { if matchDeleted(rootSubstring, k) { deletedMounts[k] = v } else { for _, p := range v.Mountpoint { if matchDeleted(rootSubstring, p.Root) { addMountpoint(deletedMounts, k, p) } } } } devMounter.mounts = deletedMounts return &deletedMounter{deviceMounter: devMounter}, nil }
[ "func", "NewDeletedMounter", "(", "rootSubstring", "string", ",", "mountImpl", "MountImpl", ",", ")", "(", "*", "deletedMounter", ",", "error", ")", "{", "devMounter", ",", "err", ":=", "NewDeviceMounter", "(", "[", "]", "string", "{", "\"", "\"", "}", ",", "mountImpl", ",", "nil", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "deletedMounts", ":=", "make", "(", "DeviceMap", ")", "\n", "for", "k", ",", "v", ":=", "range", "devMounter", ".", "mounts", "{", "if", "matchDeleted", "(", "rootSubstring", ",", "k", ")", "{", "deletedMounts", "[", "k", "]", "=", "v", "\n", "}", "else", "{", "for", "_", ",", "p", ":=", "range", "v", ".", "Mountpoint", "{", "if", "matchDeleted", "(", "rootSubstring", ",", "p", ".", "Root", ")", "{", "addMountpoint", "(", "deletedMounts", ",", "k", ",", "p", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "}", "\n", "devMounter", ".", "mounts", "=", "deletedMounts", "\n", "return", "&", "deletedMounter", "{", "deviceMounter", ":", "devMounter", "}", ",", "nil", "\n", "}" ]
// NewDeletedMounter returns a new deletedMounter
[ "NewDeletedMounter", "returns", "a", "new", "deletedMounter" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/mount/deleted_mount.go#L23-L46
144,191
libopenstorage/openstorage
pkg/mount/deleted_mount.go
Unmount
func (m *deletedMounter) Unmount( sourcePath string, path string, flags int, timeout int, opts map[string]string, ) error { if sourcePath != AllDevices { return fmt.Errorf("DeletedMounter accepts only %v as sourcePath", AllDevices) } m.Lock() defer m.Unlock() failedUnmounts := make(DeviceMap) for k, v := range m.mounts { for _, p := range v.Mountpoint { logrus.Warnf("Unmounting deleted mount path %v->%v", k, p) if err := m.mountImpl.Unmount(p.Path, flags, timeout); err != nil { logrus.Warnf("Failed to unmount mount path %v->%v", k, p) addMountpoint(failedUnmounts, k, p) } } } m.mounts = failedUnmounts if len(m.mounts) > 0 { return fmt.Errorf("Not all paths could be unmounted") } return nil }
go
func (m *deletedMounter) Unmount( sourcePath string, path string, flags int, timeout int, opts map[string]string, ) error { if sourcePath != AllDevices { return fmt.Errorf("DeletedMounter accepts only %v as sourcePath", AllDevices) } m.Lock() defer m.Unlock() failedUnmounts := make(DeviceMap) for k, v := range m.mounts { for _, p := range v.Mountpoint { logrus.Warnf("Unmounting deleted mount path %v->%v", k, p) if err := m.mountImpl.Unmount(p.Path, flags, timeout); err != nil { logrus.Warnf("Failed to unmount mount path %v->%v", k, p) addMountpoint(failedUnmounts, k, p) } } } m.mounts = failedUnmounts if len(m.mounts) > 0 { return fmt.Errorf("Not all paths could be unmounted") } return nil }
[ "func", "(", "m", "*", "deletedMounter", ")", "Unmount", "(", "sourcePath", "string", ",", "path", "string", ",", "flags", "int", ",", "timeout", "int", ",", "opts", "map", "[", "string", "]", "string", ",", ")", "error", "{", "if", "sourcePath", "!=", "AllDevices", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "AllDevices", ")", "\n", "}", "\n\n", "m", ".", "Lock", "(", ")", "\n", "defer", "m", ".", "Unlock", "(", ")", "\n\n", "failedUnmounts", ":=", "make", "(", "DeviceMap", ")", "\n", "for", "k", ",", "v", ":=", "range", "m", ".", "mounts", "{", "for", "_", ",", "p", ":=", "range", "v", ".", "Mountpoint", "{", "logrus", ".", "Warnf", "(", "\"", "\"", ",", "k", ",", "p", ")", "\n", "if", "err", ":=", "m", ".", "mountImpl", ".", "Unmount", "(", "p", ".", "Path", ",", "flags", ",", "timeout", ")", ";", "err", "!=", "nil", "{", "logrus", ".", "Warnf", "(", "\"", "\"", ",", "k", ",", "p", ")", "\n", "addMountpoint", "(", "failedUnmounts", ",", "k", ",", "p", ")", "\n", "}", "\n", "}", "\n", "}", "\n", "m", ".", "mounts", "=", "failedUnmounts", "\n", "if", "len", "(", "m", ".", "mounts", ")", ">", "0", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// Unmount all deleted mounts.
[ "Unmount", "all", "deleted", "mounts", "." ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/pkg/mount/deleted_mount.go#L66-L97
144,192
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupCreate
func (d *driver) CloudBackupCreate( input *api.CloudBackupCreateRequest, ) (*api.CloudBackupCreateResponse, error) { name, _, err := d.cloudBackupCreate(input) if err == nil { resp := &api.CloudBackupCreateResponse{Name: name} return resp, err } return nil, err }
go
func (d *driver) CloudBackupCreate( input *api.CloudBackupCreateRequest, ) (*api.CloudBackupCreateResponse, error) { name, _, err := d.cloudBackupCreate(input) if err == nil { resp := &api.CloudBackupCreateResponse{Name: name} return resp, err } return nil, err }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupCreate", "(", "input", "*", "api", ".", "CloudBackupCreateRequest", ",", ")", "(", "*", "api", ".", "CloudBackupCreateResponse", ",", "error", ")", "{", "name", ",", "_", ",", "err", ":=", "d", ".", "cloudBackupCreate", "(", "input", ")", "\n", "if", "err", "==", "nil", "{", "resp", ":=", "&", "api", ".", "CloudBackupCreateResponse", "{", "Name", ":", "name", "}", "\n", "return", "resp", ",", "err", "\n", "}", "\n", "return", "nil", ",", "err", "\n", "}" ]
// CloudBackupCreate uploads snapshot of a volume to the cloud
[ "CloudBackupCreate", "uploads", "snapshot", "of", "a", "volume", "to", "the", "cloud" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L465-L474
144,193
libopenstorage/openstorage
volume/drivers/fake/fake.go
cloudBackupCreate
func (d *driver) cloudBackupCreate(input *api.CloudBackupCreateRequest) (string, string, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return "", "", err } // Get volume info vols, err := d.Inspect([]string{input.VolumeID}) if err != nil { return "", "", fmt.Errorf("Volume id not found") } if len(vols) < 1 { return "", "", fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return "", "", fmt.Errorf("Internal error. Volume has no specificiation") } taskId := uuid.New() // Save cloud backup cloudId := uuid.New() clusterInfo, err := d.thisCluster.Enumerate() if err != nil { return "", "", err } _, err = d.kv.Put(backupsKeyPrefix+"/"+taskId, &fakeBackups{ Volume: *vol, ClusterId: clusterInfo.Id, Status: api.CloudBackupStatus{ ID: cloudId, OpType: api.CloudBackupOp, Status: api.CloudBackupStatusDone, BytesDone: vol.GetSpec().GetSize(), StartTime: time.Now(), CompletedTime: time.Now().Local().Add(1 * time.Second), NodeID: clusterInfo.NodeId, CredentialUUID: input.CredentialUUID, SrcVolumeID: input.VolumeID, }, Info: api.CloudBackupInfo{ ID: cloudId, SrcVolumeID: input.VolumeID, SrcVolumeName: vol.GetLocator().GetName(), Timestamp: time.Now(), Metadata: map[string]string{ "fake": "backup", }, Status: string(api.CloudBackupStatusDone), }, }, 0) if err != nil { return "", "", err } return taskId, cloudId, nil }
go
func (d *driver) cloudBackupCreate(input *api.CloudBackupCreateRequest) (string, string, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return "", "", err } // Get volume info vols, err := d.Inspect([]string{input.VolumeID}) if err != nil { return "", "", fmt.Errorf("Volume id not found") } if len(vols) < 1 { return "", "", fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return "", "", fmt.Errorf("Internal error. Volume has no specificiation") } taskId := uuid.New() // Save cloud backup cloudId := uuid.New() clusterInfo, err := d.thisCluster.Enumerate() if err != nil { return "", "", err } _, err = d.kv.Put(backupsKeyPrefix+"/"+taskId, &fakeBackups{ Volume: *vol, ClusterId: clusterInfo.Id, Status: api.CloudBackupStatus{ ID: cloudId, OpType: api.CloudBackupOp, Status: api.CloudBackupStatusDone, BytesDone: vol.GetSpec().GetSize(), StartTime: time.Now(), CompletedTime: time.Now().Local().Add(1 * time.Second), NodeID: clusterInfo.NodeId, CredentialUUID: input.CredentialUUID, SrcVolumeID: input.VolumeID, }, Info: api.CloudBackupInfo{ ID: cloudId, SrcVolumeID: input.VolumeID, SrcVolumeName: vol.GetLocator().GetName(), Timestamp: time.Now(), Metadata: map[string]string{ "fake": "backup", }, Status: string(api.CloudBackupStatusDone), }, }, 0) if err != nil { return "", "", err } return taskId, cloudId, nil }
[ "func", "(", "d", "*", "driver", ")", "cloudBackupCreate", "(", "input", "*", "api", ".", "CloudBackupCreateRequest", ")", "(", "string", ",", "string", ",", "error", ")", "{", "// Confirm credential id", "if", "err", ":=", "d", ".", "CredsValidate", "(", "input", ".", "CredentialUUID", ")", ";", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "err", "\n", "}", "\n\n", "// Get volume info", "vols", ",", "err", ":=", "d", ".", "Inspect", "(", "[", "]", "string", "{", "input", ".", "VolumeID", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "vols", ")", "<", "1", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "vol", ":=", "vols", "[", "0", "]", "\n", "if", "vol", ".", "GetSpec", "(", ")", "==", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "taskId", ":=", "uuid", ".", "New", "(", ")", "\n", "// Save cloud backup", "cloudId", ":=", "uuid", ".", "New", "(", ")", "\n", "clusterInfo", ",", "err", ":=", "d", ".", "thisCluster", ".", "Enumerate", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "err", "\n", "}", "\n", "_", ",", "err", "=", "d", ".", "kv", ".", "Put", "(", "backupsKeyPrefix", "+", "\"", "\"", "+", "taskId", ",", "&", "fakeBackups", "{", "Volume", ":", "*", "vol", ",", "ClusterId", ":", "clusterInfo", ".", "Id", ",", "Status", ":", "api", ".", "CloudBackupStatus", "{", "ID", ":", "cloudId", ",", "OpType", ":", "api", ".", "CloudBackupOp", ",", "Status", ":", "api", ".", "CloudBackupStatusDone", ",", "BytesDone", ":", "vol", ".", "GetSpec", "(", ")", ".", "GetSize", "(", ")", ",", "StartTime", ":", "time", ".", "Now", "(", ")", ",", "CompletedTime", ":", "time", ".", "Now", "(", ")", ".", "Local", "(", ")", ".", "Add", "(", "1", "*", "time", ".", "Second", ")", ",", "NodeID", ":", "clusterInfo", ".", "NodeId", ",", "CredentialUUID", ":", "input", ".", "CredentialUUID", ",", "SrcVolumeID", ":", "input", ".", "VolumeID", ",", "}", ",", "Info", ":", "api", ".", "CloudBackupInfo", "{", "ID", ":", "cloudId", ",", "SrcVolumeID", ":", "input", ".", "VolumeID", ",", "SrcVolumeName", ":", "vol", ".", "GetLocator", "(", ")", ".", "GetName", "(", ")", ",", "Timestamp", ":", "time", ".", "Now", "(", ")", ",", "Metadata", ":", "map", "[", "string", "]", "string", "{", "\"", "\"", ":", "\"", "\"", ",", "}", ",", "Status", ":", "string", "(", "api", ".", "CloudBackupStatusDone", ")", ",", "}", ",", "}", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "err", "\n", "}", "\n", "return", "taskId", ",", "cloudId", ",", "nil", "\n", "}" ]
// cloudBackupCreate uploads snapshot of a volume to the cloud and returns the // backup task id
[ "cloudBackupCreate", "uploads", "snapshot", "of", "a", "volume", "to", "the", "cloud", "and", "returns", "the", "backup", "task", "id" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L478-L534
144,194
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupRestore
func (d *driver) CloudBackupRestore( input *api.CloudBackupRestoreRequest, ) (*api.CloudBackupRestoreResponse, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return nil, err } backup, _, err := d.backupEntry(input.ID, api.CloudBackupOp) if err != nil { return nil, err } volid, err := d.Create(&api.VolumeLocator{Name: input.RestoreVolumeName}, &api.Source{}, backup.Volume.GetSpec()) if err != nil { return nil, err } vols, err := d.Inspect([]string{volid}) if err != nil { return nil, fmt.Errorf("Volume id not found") } if len(vols) < 1 { return nil, fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return nil, fmt.Errorf("Internal error. Volume has no specificiation") } cloudId := uuid.New() clusterInfo, err := d.thisCluster.Enumerate() if err != nil { return nil, err } _, err = d.kv.Put(backupsKeyPrefix+"/"+cloudId, &fakeBackups{ Volume: *vol, ClusterId: clusterInfo.Id, Status: api.CloudBackupStatus{ ID: cloudId, OpType: api.CloudRestoreOp, Status: api.CloudBackupStatusDone, BytesDone: vol.GetSpec().GetSize(), StartTime: time.Now(), CompletedTime: time.Now().Local().Add(1 * time.Second), NodeID: clusterInfo.NodeId, CredentialUUID: input.CredentialUUID, SrcVolumeID: volid, }, }, 0) if err != nil { return nil, err } return &api.CloudBackupRestoreResponse{ RestoreVolumeID: volid, }, nil }
go
func (d *driver) CloudBackupRestore( input *api.CloudBackupRestoreRequest, ) (*api.CloudBackupRestoreResponse, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return nil, err } backup, _, err := d.backupEntry(input.ID, api.CloudBackupOp) if err != nil { return nil, err } volid, err := d.Create(&api.VolumeLocator{Name: input.RestoreVolumeName}, &api.Source{}, backup.Volume.GetSpec()) if err != nil { return nil, err } vols, err := d.Inspect([]string{volid}) if err != nil { return nil, fmt.Errorf("Volume id not found") } if len(vols) < 1 { return nil, fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return nil, fmt.Errorf("Internal error. Volume has no specificiation") } cloudId := uuid.New() clusterInfo, err := d.thisCluster.Enumerate() if err != nil { return nil, err } _, err = d.kv.Put(backupsKeyPrefix+"/"+cloudId, &fakeBackups{ Volume: *vol, ClusterId: clusterInfo.Id, Status: api.CloudBackupStatus{ ID: cloudId, OpType: api.CloudRestoreOp, Status: api.CloudBackupStatusDone, BytesDone: vol.GetSpec().GetSize(), StartTime: time.Now(), CompletedTime: time.Now().Local().Add(1 * time.Second), NodeID: clusterInfo.NodeId, CredentialUUID: input.CredentialUUID, SrcVolumeID: volid, }, }, 0) if err != nil { return nil, err } return &api.CloudBackupRestoreResponse{ RestoreVolumeID: volid, }, nil }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupRestore", "(", "input", "*", "api", ".", "CloudBackupRestoreRequest", ",", ")", "(", "*", "api", ".", "CloudBackupRestoreResponse", ",", "error", ")", "{", "// Confirm credential id", "if", "err", ":=", "d", ".", "CredsValidate", "(", "input", ".", "CredentialUUID", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "backup", ",", "_", ",", "err", ":=", "d", ".", "backupEntry", "(", "input", ".", "ID", ",", "api", ".", "CloudBackupOp", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "volid", ",", "err", ":=", "d", ".", "Create", "(", "&", "api", ".", "VolumeLocator", "{", "Name", ":", "input", ".", "RestoreVolumeName", "}", ",", "&", "api", ".", "Source", "{", "}", ",", "backup", ".", "Volume", ".", "GetSpec", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "vols", ",", "err", ":=", "d", ".", "Inspect", "(", "[", "]", "string", "{", "volid", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "vols", ")", "<", "1", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "vol", ":=", "vols", "[", "0", "]", "\n", "if", "vol", ".", "GetSpec", "(", ")", "==", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "cloudId", ":=", "uuid", ".", "New", "(", ")", "\n", "clusterInfo", ",", "err", ":=", "d", ".", "thisCluster", ".", "Enumerate", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "_", ",", "err", "=", "d", ".", "kv", ".", "Put", "(", "backupsKeyPrefix", "+", "\"", "\"", "+", "cloudId", ",", "&", "fakeBackups", "{", "Volume", ":", "*", "vol", ",", "ClusterId", ":", "clusterInfo", ".", "Id", ",", "Status", ":", "api", ".", "CloudBackupStatus", "{", "ID", ":", "cloudId", ",", "OpType", ":", "api", ".", "CloudRestoreOp", ",", "Status", ":", "api", ".", "CloudBackupStatusDone", ",", "BytesDone", ":", "vol", ".", "GetSpec", "(", ")", ".", "GetSize", "(", ")", ",", "StartTime", ":", "time", ".", "Now", "(", ")", ",", "CompletedTime", ":", "time", ".", "Now", "(", ")", ".", "Local", "(", ")", ".", "Add", "(", "1", "*", "time", ".", "Second", ")", ",", "NodeID", ":", "clusterInfo", ".", "NodeId", ",", "CredentialUUID", ":", "input", ".", "CredentialUUID", ",", "SrcVolumeID", ":", "volid", ",", "}", ",", "}", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "api", ".", "CloudBackupRestoreResponse", "{", "RestoreVolumeID", ":", "volid", ",", "}", ",", "nil", "\n\n", "}" ]
// CloudBackupRestore downloads a cloud backup and restores it to a volume
[ "CloudBackupRestore", "downloads", "a", "cloud", "backup", "and", "restores", "it", "to", "a", "volume" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L565-L622
144,195
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupDelete
func (d *driver) CloudBackupDelete(input *api.CloudBackupDeleteRequest) error { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return err } _, id, err := d.backupEntry(input.ID, api.CloudBackupOp) if err != nil { return err } //_, err := d.kv.Delete(backupsKeyPrefix + "/" + id) _, err = d.kv.Delete(id) return err }
go
func (d *driver) CloudBackupDelete(input *api.CloudBackupDeleteRequest) error { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return err } _, id, err := d.backupEntry(input.ID, api.CloudBackupOp) if err != nil { return err } //_, err := d.kv.Delete(backupsKeyPrefix + "/" + id) _, err = d.kv.Delete(id) return err }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupDelete", "(", "input", "*", "api", ".", "CloudBackupDeleteRequest", ")", "error", "{", "// Confirm credential id", "if", "err", ":=", "d", ".", "CredsValidate", "(", "input", ".", "CredentialUUID", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "_", ",", "id", ",", "err", ":=", "d", ".", "backupEntry", "(", "input", ".", "ID", ",", "api", ".", "CloudBackupOp", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "//_, err := d.kv.Delete(backupsKeyPrefix + \"/\" + id)", "_", ",", "err", "=", "d", ".", "kv", ".", "Delete", "(", "id", ")", "\n", "return", "err", "\n", "}" ]
// CloudBackupDelete deletes the specified backup in cloud
[ "CloudBackupDelete", "deletes", "the", "specified", "backup", "in", "cloud" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L625-L639
144,196
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupDeleteAll
func (d *driver) CloudBackupDeleteAll(input *api.CloudBackupDeleteAllRequest) error { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return err } // Get volume info if len(input.SrcVolumeID) != 0 { vols, err := d.Inspect([]string{input.SrcVolumeID}) if err != nil { return fmt.Errorf("Volume id not found") } if len(vols) < 1 { return fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return fmt.Errorf("Internal error. Volume has no specificiation") } } kvp, err := d.kv.Enumerate(backupsKeyPrefix) if err != nil { return err } for _, v := range kvp { elem := &fakeBackups{} if err := json.Unmarshal(v.Value, elem); err != nil { return err } if elem.Status.OpType == api.CloudRestoreOp { continue } if len(input.SrcVolumeID) == 0 && len(input.ClusterID) == 0 { _, err = d.kv.Delete(v.Key) } else if input.SrcVolumeID == elem.Volume.GetId() { _, err = d.kv.Delete(v.Key) } else if input.ClusterID == elem.ClusterId { _, err = d.kv.Delete(v.Key) } if err != nil { return err } } return nil }
go
func (d *driver) CloudBackupDeleteAll(input *api.CloudBackupDeleteAllRequest) error { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return err } // Get volume info if len(input.SrcVolumeID) != 0 { vols, err := d.Inspect([]string{input.SrcVolumeID}) if err != nil { return fmt.Errorf("Volume id not found") } if len(vols) < 1 { return fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return fmt.Errorf("Internal error. Volume has no specificiation") } } kvp, err := d.kv.Enumerate(backupsKeyPrefix) if err != nil { return err } for _, v := range kvp { elem := &fakeBackups{} if err := json.Unmarshal(v.Value, elem); err != nil { return err } if elem.Status.OpType == api.CloudRestoreOp { continue } if len(input.SrcVolumeID) == 0 && len(input.ClusterID) == 0 { _, err = d.kv.Delete(v.Key) } else if input.SrcVolumeID == elem.Volume.GetId() { _, err = d.kv.Delete(v.Key) } else if input.ClusterID == elem.ClusterId { _, err = d.kv.Delete(v.Key) } if err != nil { return err } } return nil }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupDeleteAll", "(", "input", "*", "api", ".", "CloudBackupDeleteAllRequest", ")", "error", "{", "// Confirm credential id", "if", "err", ":=", "d", ".", "CredsValidate", "(", "input", ".", "CredentialUUID", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// Get volume info", "if", "len", "(", "input", ".", "SrcVolumeID", ")", "!=", "0", "{", "vols", ",", "err", ":=", "d", ".", "Inspect", "(", "[", "]", "string", "{", "input", ".", "SrcVolumeID", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "vols", ")", "<", "1", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "vol", ":=", "vols", "[", "0", "]", "\n", "if", "vol", ".", "GetSpec", "(", ")", "==", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "}", "\n\n", "kvp", ",", "err", ":=", "d", ".", "kv", ".", "Enumerate", "(", "backupsKeyPrefix", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "for", "_", ",", "v", ":=", "range", "kvp", "{", "elem", ":=", "&", "fakeBackups", "{", "}", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "v", ".", "Value", ",", "elem", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "if", "elem", ".", "Status", ".", "OpType", "==", "api", ".", "CloudRestoreOp", "{", "continue", "\n", "}", "\n", "if", "len", "(", "input", ".", "SrcVolumeID", ")", "==", "0", "&&", "len", "(", "input", ".", "ClusterID", ")", "==", "0", "{", "_", ",", "err", "=", "d", ".", "kv", ".", "Delete", "(", "v", ".", "Key", ")", "\n", "}", "else", "if", "input", ".", "SrcVolumeID", "==", "elem", ".", "Volume", ".", "GetId", "(", ")", "{", "_", ",", "err", "=", "d", ".", "kv", ".", "Delete", "(", "v", ".", "Key", ")", "\n", "}", "else", "if", "input", ".", "ClusterID", "==", "elem", ".", "ClusterId", "{", "_", ",", "err", "=", "d", ".", "kv", ".", "Delete", "(", "v", ".", "Key", ")", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// CloudBackupDelete deletes all the backups for a given volume in cloud
[ "CloudBackupDelete", "deletes", "all", "the", "backups", "for", "a", "given", "volume", "in", "cloud" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L678-L724
144,197
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupSchedCreate
func (d *driver) CloudBackupSchedCreate( input *api.CloudBackupSchedCreateRequest, ) (*api.CloudBackupSchedCreateResponse, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return nil, err } // Check volume vols, err := d.Inspect([]string{input.SrcVolumeID}) if err != nil { return nil, fmt.Errorf("Volume id not found") } if len(vols) < 1 { return nil, fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return nil, fmt.Errorf("Internal error. Volume has no specificiation") } id := uuid.New() _, err = d.kv.Put(schedPrefix+"/"+id, &fakeSchedules{ Id: id, Info: api.CloudBackupScheduleInfo{ SrcVolumeID: input.SrcVolumeID, CredentialUUID: input.CredentialUUID, Schedule: input.Schedule, MaxBackups: input.MaxBackups, }, }, 0) if err != nil { return nil, err } return &api.CloudBackupSchedCreateResponse{ UUID: id, }, nil }
go
func (d *driver) CloudBackupSchedCreate( input *api.CloudBackupSchedCreateRequest, ) (*api.CloudBackupSchedCreateResponse, error) { // Confirm credential id if err := d.CredsValidate(input.CredentialUUID); err != nil { return nil, err } // Check volume vols, err := d.Inspect([]string{input.SrcVolumeID}) if err != nil { return nil, fmt.Errorf("Volume id not found") } if len(vols) < 1 { return nil, fmt.Errorf("Internal error. Volume found but no data returned") } vol := vols[0] if vol.GetSpec() == nil { return nil, fmt.Errorf("Internal error. Volume has no specificiation") } id := uuid.New() _, err = d.kv.Put(schedPrefix+"/"+id, &fakeSchedules{ Id: id, Info: api.CloudBackupScheduleInfo{ SrcVolumeID: input.SrcVolumeID, CredentialUUID: input.CredentialUUID, Schedule: input.Schedule, MaxBackups: input.MaxBackups, }, }, 0) if err != nil { return nil, err } return &api.CloudBackupSchedCreateResponse{ UUID: id, }, nil }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupSchedCreate", "(", "input", "*", "api", ".", "CloudBackupSchedCreateRequest", ",", ")", "(", "*", "api", ".", "CloudBackupSchedCreateResponse", ",", "error", ")", "{", "// Confirm credential id", "if", "err", ":=", "d", ".", "CredsValidate", "(", "input", ".", "CredentialUUID", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "// Check volume", "vols", ",", "err", ":=", "d", ".", "Inspect", "(", "[", "]", "string", "{", "input", ".", "SrcVolumeID", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "if", "len", "(", "vols", ")", "<", "1", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n", "vol", ":=", "vols", "[", "0", "]", "\n", "if", "vol", ".", "GetSpec", "(", ")", "==", "nil", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ")", "\n", "}", "\n\n", "id", ":=", "uuid", ".", "New", "(", ")", "\n", "_", ",", "err", "=", "d", ".", "kv", ".", "Put", "(", "schedPrefix", "+", "\"", "\"", "+", "id", ",", "&", "fakeSchedules", "{", "Id", ":", "id", ",", "Info", ":", "api", ".", "CloudBackupScheduleInfo", "{", "SrcVolumeID", ":", "input", ".", "SrcVolumeID", ",", "CredentialUUID", ":", "input", ".", "CredentialUUID", ",", "Schedule", ":", "input", ".", "Schedule", ",", "MaxBackups", ":", "input", ".", "MaxBackups", ",", "}", ",", "}", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "&", "api", ".", "CloudBackupSchedCreateResponse", "{", "UUID", ":", "id", ",", "}", ",", "nil", "\n", "}" ]
// CloudBackupSchedCreate creates a schedule backup volume to cloud
[ "CloudBackupSchedCreate", "creates", "a", "schedule", "backup", "volume", "to", "cloud" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L876-L915
144,198
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupSchedDelete
func (d *driver) CloudBackupSchedDelete(input *api.CloudBackupSchedDeleteRequest) error { d.kv.Delete(schedPrefix + "/" + input.UUID) return nil }
go
func (d *driver) CloudBackupSchedDelete(input *api.CloudBackupSchedDeleteRequest) error { d.kv.Delete(schedPrefix + "/" + input.UUID) return nil }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupSchedDelete", "(", "input", "*", "api", ".", "CloudBackupSchedDeleteRequest", ")", "error", "{", "d", ".", "kv", ".", "Delete", "(", "schedPrefix", "+", "\"", "\"", "+", "input", ".", "UUID", ")", "\n", "return", "nil", "\n", "}" ]
// CloudBackupSchedDelete delete a volume backup schedule to cloud
[ "CloudBackupSchedDelete", "delete", "a", "volume", "backup", "schedule", "to", "cloud" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L918-L921
144,199
libopenstorage/openstorage
volume/drivers/fake/fake.go
CloudBackupSchedEnumerate
func (d *driver) CloudBackupSchedEnumerate() (*api.CloudBackupSchedEnumerateResponse, error) { kvp, err := d.kv.Enumerate(schedPrefix) if err != nil { return nil, err } schedules := make(map[string]api.CloudBackupScheduleInfo, len(kvp)) for _, v := range kvp { elem := &fakeSchedules{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } schedules[elem.Id] = elem.Info } return &api.CloudBackupSchedEnumerateResponse{ Schedules: schedules, }, nil }
go
func (d *driver) CloudBackupSchedEnumerate() (*api.CloudBackupSchedEnumerateResponse, error) { kvp, err := d.kv.Enumerate(schedPrefix) if err != nil { return nil, err } schedules := make(map[string]api.CloudBackupScheduleInfo, len(kvp)) for _, v := range kvp { elem := &fakeSchedules{} if err := json.Unmarshal(v.Value, elem); err != nil { return nil, err } schedules[elem.Id] = elem.Info } return &api.CloudBackupSchedEnumerateResponse{ Schedules: schedules, }, nil }
[ "func", "(", "d", "*", "driver", ")", "CloudBackupSchedEnumerate", "(", ")", "(", "*", "api", ".", "CloudBackupSchedEnumerateResponse", ",", "error", ")", "{", "kvp", ",", "err", ":=", "d", ".", "kv", ".", "Enumerate", "(", "schedPrefix", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "schedules", ":=", "make", "(", "map", "[", "string", "]", "api", ".", "CloudBackupScheduleInfo", ",", "len", "(", "kvp", ")", ")", "\n", "for", "_", ",", "v", ":=", "range", "kvp", "{", "elem", ":=", "&", "fakeSchedules", "{", "}", "\n", "if", "err", ":=", "json", ".", "Unmarshal", "(", "v", ".", "Value", ",", "elem", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "schedules", "[", "elem", ".", "Id", "]", "=", "elem", ".", "Info", "\n", "}", "\n\n", "return", "&", "api", ".", "CloudBackupSchedEnumerateResponse", "{", "Schedules", ":", "schedules", ",", "}", ",", "nil", "\n", "}" ]
// CloudBackupSchedEnumerate enumerates the configured backup schedules in the cluster
[ "CloudBackupSchedEnumerate", "enumerates", "the", "configured", "backup", "schedules", "in", "the", "cluster" ]
71b7f37f99c70e697aa31ca57fa8fb1404629329
https://github.com/libopenstorage/openstorage/blob/71b7f37f99c70e697aa31ca57fa8fb1404629329/volume/drivers/fake/fake.go#L924-L941