id
int32
0
167k
repo
stringlengths
5
54
path
stringlengths
4
155
func_name
stringlengths
1
118
original_string
stringlengths
52
85.5k
language
stringclasses
1 value
code
stringlengths
52
85.5k
code_tokens
sequencelengths
21
1.41k
docstring
stringlengths
6
2.61k
docstring_tokens
sequencelengths
3
215
sha
stringlengths
40
40
url
stringlengths
85
252
164,400
nats-io/gnatsd
server/monitor.go
HandleRoutez
func (s *Server) HandleRoutez(w http.ResponseWriter, r *http.Request) { subs, err := decodeBool(w, r, "subs") if err != nil { return } var opts *RoutezOptions if subs { opts = &RoutezOptions{Subscriptions: true} } s.mu.Lock() s.httpReqStats[RoutezPath]++ s.mu.Unlock() // As of now, no error is ever returned. rs, _ := s.Routez(opts) b, err := json.MarshalIndent(rs, "", " ") if err != nil { s.Errorf("Error marshaling response to /routez request: %v", err) } // Handle response ResponseHandler(w, r, b) }
go
func (s *Server) HandleRoutez(w http.ResponseWriter, r *http.Request) { subs, err := decodeBool(w, r, "subs") if err != nil { return } var opts *RoutezOptions if subs { opts = &RoutezOptions{Subscriptions: true} } s.mu.Lock() s.httpReqStats[RoutezPath]++ s.mu.Unlock() // As of now, no error is ever returned. rs, _ := s.Routez(opts) b, err := json.MarshalIndent(rs, "", " ") if err != nil { s.Errorf("Error marshaling response to /routez request: %v", err) } // Handle response ResponseHandler(w, r, b) }
[ "func", "(", "s", "*", "Server", ")", "HandleRoutez", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "subs", ",", "err", ":=", "decodeBool", "(", "w", ",", "r", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "var", "opts", "*", "RoutezOptions", "\n", "if", "subs", "{", "opts", "=", "&", "RoutezOptions", "{", "Subscriptions", ":", "true", "}", "\n", "}", "\n\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "httpReqStats", "[", "RoutezPath", "]", "++", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "// As of now, no error is ever returned.", "rs", ",", "_", ":=", "s", ".", "Routez", "(", "opts", ")", "\n", "b", ",", "err", ":=", "json", ".", "MarshalIndent", "(", "rs", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "s", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// Handle response", "ResponseHandler", "(", "w", ",", "r", ",", "b", ")", "\n", "}" ]
// HandleRoutez process HTTP requests for route information.
[ "HandleRoutez", "process", "HTTP", "requests", "for", "route", "information", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L621-L644
164,401
nats-io/gnatsd
server/monitor.go
Subsz
func (s *Server) Subsz(opts *SubszOptions) (*Subsz, error) { var ( subdetail bool test bool offset int limit = DefaultSubListSize testSub = "" ) if opts != nil { subdetail = opts.Subscriptions offset = opts.Offset if offset < 0 { offset = 0 } limit = opts.Limit if limit <= 0 { limit = DefaultSubListSize } if opts.Test != "" { testSub = opts.Test test = true if !IsValidLiteralSubject(testSub) { return nil, fmt.Errorf("invalid test subject, must be valid publish subject: %s", testSub) } } } // FIXME(dlc) - Make account aware. sz := &Subsz{s.gacc.sl.Stats(), 0, offset, limit, nil} if subdetail { // Now add in subscription's details var raw [4096]*subscription subs := raw[:0] s.gacc.sl.localSubs(&subs) details := make([]SubDetail, len(subs)) i := 0 // TODO(dlc) - may be inefficient and could just do normal match when total subs is large and filtering. for _, sub := range subs { // Check for filter if test && !matchLiteral(testSub, string(sub.subject)) { continue } if sub.client == nil { continue } sub.client.mu.Lock() details[i] = SubDetail{ Subject: string(sub.subject), Queue: string(sub.queue), Sid: string(sub.sid), Msgs: sub.nm, Max: sub.max, Cid: sub.client.cid, } sub.client.mu.Unlock() i++ } minoff := sz.Offset maxoff := sz.Offset + sz.Limit maxIndex := i // Make sure these are sane. if minoff > maxIndex { minoff = maxIndex } if maxoff > maxIndex { maxoff = maxIndex } sz.Subs = details[minoff:maxoff] sz.Total = len(sz.Subs) } return sz, nil }
go
func (s *Server) Subsz(opts *SubszOptions) (*Subsz, error) { var ( subdetail bool test bool offset int limit = DefaultSubListSize testSub = "" ) if opts != nil { subdetail = opts.Subscriptions offset = opts.Offset if offset < 0 { offset = 0 } limit = opts.Limit if limit <= 0 { limit = DefaultSubListSize } if opts.Test != "" { testSub = opts.Test test = true if !IsValidLiteralSubject(testSub) { return nil, fmt.Errorf("invalid test subject, must be valid publish subject: %s", testSub) } } } // FIXME(dlc) - Make account aware. sz := &Subsz{s.gacc.sl.Stats(), 0, offset, limit, nil} if subdetail { // Now add in subscription's details var raw [4096]*subscription subs := raw[:0] s.gacc.sl.localSubs(&subs) details := make([]SubDetail, len(subs)) i := 0 // TODO(dlc) - may be inefficient and could just do normal match when total subs is large and filtering. for _, sub := range subs { // Check for filter if test && !matchLiteral(testSub, string(sub.subject)) { continue } if sub.client == nil { continue } sub.client.mu.Lock() details[i] = SubDetail{ Subject: string(sub.subject), Queue: string(sub.queue), Sid: string(sub.sid), Msgs: sub.nm, Max: sub.max, Cid: sub.client.cid, } sub.client.mu.Unlock() i++ } minoff := sz.Offset maxoff := sz.Offset + sz.Limit maxIndex := i // Make sure these are sane. if minoff > maxIndex { minoff = maxIndex } if maxoff > maxIndex { maxoff = maxIndex } sz.Subs = details[minoff:maxoff] sz.Total = len(sz.Subs) } return sz, nil }
[ "func", "(", "s", "*", "Server", ")", "Subsz", "(", "opts", "*", "SubszOptions", ")", "(", "*", "Subsz", ",", "error", ")", "{", "var", "(", "subdetail", "bool", "\n", "test", "bool", "\n", "offset", "int", "\n", "limit", "=", "DefaultSubListSize", "\n", "testSub", "=", "\"", "\"", "\n", ")", "\n\n", "if", "opts", "!=", "nil", "{", "subdetail", "=", "opts", ".", "Subscriptions", "\n", "offset", "=", "opts", ".", "Offset", "\n", "if", "offset", "<", "0", "{", "offset", "=", "0", "\n", "}", "\n", "limit", "=", "opts", ".", "Limit", "\n", "if", "limit", "<=", "0", "{", "limit", "=", "DefaultSubListSize", "\n", "}", "\n", "if", "opts", ".", "Test", "!=", "\"", "\"", "{", "testSub", "=", "opts", ".", "Test", "\n", "test", "=", "true", "\n", "if", "!", "IsValidLiteralSubject", "(", "testSub", ")", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "testSub", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// FIXME(dlc) - Make account aware.", "sz", ":=", "&", "Subsz", "{", "s", ".", "gacc", ".", "sl", ".", "Stats", "(", ")", ",", "0", ",", "offset", ",", "limit", ",", "nil", "}", "\n\n", "if", "subdetail", "{", "// Now add in subscription's details", "var", "raw", "[", "4096", "]", "*", "subscription", "\n", "subs", ":=", "raw", "[", ":", "0", "]", "\n\n", "s", ".", "gacc", ".", "sl", ".", "localSubs", "(", "&", "subs", ")", "\n", "details", ":=", "make", "(", "[", "]", "SubDetail", ",", "len", "(", "subs", ")", ")", "\n", "i", ":=", "0", "\n", "// TODO(dlc) - may be inefficient and could just do normal match when total subs is large and filtering.", "for", "_", ",", "sub", ":=", "range", "subs", "{", "// Check for filter", "if", "test", "&&", "!", "matchLiteral", "(", "testSub", ",", "string", "(", "sub", ".", "subject", ")", ")", "{", "continue", "\n", "}", "\n", "if", "sub", ".", "client", "==", "nil", "{", "continue", "\n", "}", "\n", "sub", ".", "client", ".", "mu", ".", "Lock", "(", ")", "\n", "details", "[", "i", "]", "=", "SubDetail", "{", "Subject", ":", "string", "(", "sub", ".", "subject", ")", ",", "Queue", ":", "string", "(", "sub", ".", "queue", ")", ",", "Sid", ":", "string", "(", "sub", ".", "sid", ")", ",", "Msgs", ":", "sub", ".", "nm", ",", "Max", ":", "sub", ".", "max", ",", "Cid", ":", "sub", ".", "client", ".", "cid", ",", "}", "\n", "sub", ".", "client", ".", "mu", ".", "Unlock", "(", ")", "\n", "i", "++", "\n", "}", "\n", "minoff", ":=", "sz", ".", "Offset", "\n", "maxoff", ":=", "sz", ".", "Offset", "+", "sz", ".", "Limit", "\n\n", "maxIndex", ":=", "i", "\n\n", "// Make sure these are sane.", "if", "minoff", ">", "maxIndex", "{", "minoff", "=", "maxIndex", "\n", "}", "\n", "if", "maxoff", ">", "maxIndex", "{", "maxoff", "=", "maxIndex", "\n", "}", "\n", "sz", ".", "Subs", "=", "details", "[", "minoff", ":", "maxoff", "]", "\n", "sz", ".", "Total", "=", "len", "(", "sz", ".", "Subs", ")", "\n", "}", "\n\n", "return", "sz", ",", "nil", "\n", "}" ]
// Subsz returns a Subsz struct containing subjects statistics
[ "Subsz", "returns", "a", "Subsz", "struct", "containing", "subjects", "statistics" ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L684-L761
164,402
nats-io/gnatsd
server/monitor.go
HandleSubsz
func (s *Server) HandleSubsz(w http.ResponseWriter, r *http.Request) { s.mu.Lock() s.httpReqStats[SubszPath]++ s.mu.Unlock() subs, err := decodeBool(w, r, "subs") if err != nil { return } offset, err := decodeInt(w, r, "offset") if err != nil { return } limit, err := decodeInt(w, r, "limit") if err != nil { return } testSub := r.URL.Query().Get("test") subszOpts := &SubszOptions{ Subscriptions: subs, Offset: offset, Limit: limit, Test: testSub, } st, err := s.Subsz(subszOpts) if err != nil { w.WriteHeader(http.StatusBadRequest) w.Write([]byte(err.Error())) return } var b []byte if len(st.Subs) == 0 { b, err = json.MarshalIndent(st.SublistStats, "", " ") } else { b, err = json.MarshalIndent(st, "", " ") } if err != nil { s.Errorf("Error marshaling response to /subscriptionsz request: %v", err) } // Handle response ResponseHandler(w, r, b) }
go
func (s *Server) HandleSubsz(w http.ResponseWriter, r *http.Request) { s.mu.Lock() s.httpReqStats[SubszPath]++ s.mu.Unlock() subs, err := decodeBool(w, r, "subs") if err != nil { return } offset, err := decodeInt(w, r, "offset") if err != nil { return } limit, err := decodeInt(w, r, "limit") if err != nil { return } testSub := r.URL.Query().Get("test") subszOpts := &SubszOptions{ Subscriptions: subs, Offset: offset, Limit: limit, Test: testSub, } st, err := s.Subsz(subszOpts) if err != nil { w.WriteHeader(http.StatusBadRequest) w.Write([]byte(err.Error())) return } var b []byte if len(st.Subs) == 0 { b, err = json.MarshalIndent(st.SublistStats, "", " ") } else { b, err = json.MarshalIndent(st, "", " ") } if err != nil { s.Errorf("Error marshaling response to /subscriptionsz request: %v", err) } // Handle response ResponseHandler(w, r, b) }
[ "func", "(", "s", "*", "Server", ")", "HandleSubsz", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "httpReqStats", "[", "SubszPath", "]", "++", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "subs", ",", "err", ":=", "decodeBool", "(", "w", ",", "r", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "offset", ",", "err", ":=", "decodeInt", "(", "w", ",", "r", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "limit", ",", "err", ":=", "decodeInt", "(", "w", ",", "r", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n", "testSub", ":=", "r", ".", "URL", ".", "Query", "(", ")", ".", "Get", "(", "\"", "\"", ")", "\n\n", "subszOpts", ":=", "&", "SubszOptions", "{", "Subscriptions", ":", "subs", ",", "Offset", ":", "offset", ",", "Limit", ":", "limit", ",", "Test", ":", "testSub", ",", "}", "\n\n", "st", ",", "err", ":=", "s", ".", "Subsz", "(", "subszOpts", ")", "\n", "if", "err", "!=", "nil", "{", "w", ".", "WriteHeader", "(", "http", ".", "StatusBadRequest", ")", "\n", "w", ".", "Write", "(", "[", "]", "byte", "(", "err", ".", "Error", "(", ")", ")", ")", "\n", "return", "\n", "}", "\n\n", "var", "b", "[", "]", "byte", "\n\n", "if", "len", "(", "st", ".", "Subs", ")", "==", "0", "{", "b", ",", "err", "=", "json", ".", "MarshalIndent", "(", "st", ".", "SublistStats", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "}", "else", "{", "b", ",", "err", "=", "json", ".", "MarshalIndent", "(", "st", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "s", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// Handle response", "ResponseHandler", "(", "w", ",", "r", ",", "b", ")", "\n", "}" ]
// HandleSubsz processes HTTP requests for subjects stats.
[ "HandleSubsz", "processes", "HTTP", "requests", "for", "subjects", "stats", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L764-L810
164,403
nats-io/gnatsd
server/monitor.go
HandleStacksz
func (s *Server) HandleStacksz(w http.ResponseWriter, r *http.Request) { // Do not get any lock here that would prevent getting the stacks // if we were to have a deadlock somewhere. var defaultBuf [defaultStackBufSize]byte size := defaultStackBufSize buf := defaultBuf[:size] n := 0 for { n = runtime.Stack(buf, true) if n < size { break } size *= 2 buf = make([]byte, size) } // Handle response ResponseHandler(w, r, buf[:n]) }
go
func (s *Server) HandleStacksz(w http.ResponseWriter, r *http.Request) { // Do not get any lock here that would prevent getting the stacks // if we were to have a deadlock somewhere. var defaultBuf [defaultStackBufSize]byte size := defaultStackBufSize buf := defaultBuf[:size] n := 0 for { n = runtime.Stack(buf, true) if n < size { break } size *= 2 buf = make([]byte, size) } // Handle response ResponseHandler(w, r, buf[:n]) }
[ "func", "(", "s", "*", "Server", ")", "HandleStacksz", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "// Do not get any lock here that would prevent getting the stacks", "// if we were to have a deadlock somewhere.", "var", "defaultBuf", "[", "defaultStackBufSize", "]", "byte", "\n", "size", ":=", "defaultStackBufSize", "\n", "buf", ":=", "defaultBuf", "[", ":", "size", "]", "\n", "n", ":=", "0", "\n", "for", "{", "n", "=", "runtime", ".", "Stack", "(", "buf", ",", "true", ")", "\n", "if", "n", "<", "size", "{", "break", "\n", "}", "\n", "size", "*=", "2", "\n", "buf", "=", "make", "(", "[", "]", "byte", ",", "size", ")", "\n", "}", "\n", "// Handle response", "ResponseHandler", "(", "w", ",", "r", ",", "buf", "[", ":", "n", "]", ")", "\n", "}" ]
// HandleStacksz processes HTTP requests for getting stacks
[ "HandleStacksz", "processes", "HTTP", "requests", "for", "getting", "stacks" ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L813-L830
164,404
nats-io/gnatsd
server/monitor.go
HandleRoot
func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) { // This feels dumb to me, but is required: https://code.google.com/p/go/issues/detail?id=4799 if r.URL.Path != "/" { http.NotFound(w, r) return } s.mu.Lock() s.httpReqStats[RootPath]++ s.mu.Unlock() fmt.Fprintf(w, `<html lang="en"> <head> <link rel="shortcut icon" href="http://nats.io/img/favicon.ico"> <style type="text/css"> body { font-family: "Century Gothic", CenturyGothic, AppleGothic, sans-serif; font-size: 22; } a { margin-left: 32px; } </style> </head> <body> <img src="http://nats.io/img/logo.png" alt="NATS"> <br/> <a href=/varz>varz</a><br/> <a href=/connz>connz</a><br/> <a href=/routez>routez</a><br/> <a href=/subsz>subsz</a><br/> <br/> <a href=http://nats.io/documentation/server/gnatsd-monitoring/>help</a> </body> </html>`) }
go
func (s *Server) HandleRoot(w http.ResponseWriter, r *http.Request) { // This feels dumb to me, but is required: https://code.google.com/p/go/issues/detail?id=4799 if r.URL.Path != "/" { http.NotFound(w, r) return } s.mu.Lock() s.httpReqStats[RootPath]++ s.mu.Unlock() fmt.Fprintf(w, `<html lang="en"> <head> <link rel="shortcut icon" href="http://nats.io/img/favicon.ico"> <style type="text/css"> body { font-family: "Century Gothic", CenturyGothic, AppleGothic, sans-serif; font-size: 22; } a { margin-left: 32px; } </style> </head> <body> <img src="http://nats.io/img/logo.png" alt="NATS"> <br/> <a href=/varz>varz</a><br/> <a href=/connz>connz</a><br/> <a href=/routez>routez</a><br/> <a href=/subsz>subsz</a><br/> <br/> <a href=http://nats.io/documentation/server/gnatsd-monitoring/>help</a> </body> </html>`) }
[ "func", "(", "s", "*", "Server", ")", "HandleRoot", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "// This feels dumb to me, but is required: https://code.google.com/p/go/issues/detail?id=4799", "if", "r", ".", "URL", ".", "Path", "!=", "\"", "\"", "{", "http", ".", "NotFound", "(", "w", ",", "r", ")", "\n", "return", "\n", "}", "\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "httpReqStats", "[", "RootPath", "]", "++", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "fmt", ".", "Fprintf", "(", "w", ",", "`<html lang=\"en\">\n <head>\n <link rel=\"shortcut icon\" href=\"http://nats.io/img/favicon.ico\">\n <style type=\"text/css\">\n body { font-family: \"Century Gothic\", CenturyGothic, AppleGothic, sans-serif; font-size: 22; }\n a { margin-left: 32px; }\n </style>\n </head>\n <body>\n <img src=\"http://nats.io/img/logo.png\" alt=\"NATS\">\n <br/>\n\t<a href=/varz>varz</a><br/>\n\t<a href=/connz>connz</a><br/>\n\t<a href=/routez>routez</a><br/>\n\t<a href=/subsz>subsz</a><br/>\n <br/>\n <a href=http://nats.io/documentation/server/gnatsd-monitoring/>help</a>\n </body>\n</html>`", ")", "\n", "}" ]
// HandleRoot will show basic info and links to others handlers.
[ "HandleRoot", "will", "show", "basic", "info", "and", "links", "to", "others", "handlers", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L888-L916
164,405
nats-io/gnatsd
server/monitor.go
Varz
func (s *Server) Varz(varzOpts *VarzOptions) (*Varz, error) { // Snapshot server options. opts := s.getOpts() v := &Varz{Info: &s.info, Options: opts, MaxPayload: int(opts.MaxPayload), Start: s.start} v.Now = time.Now() v.Uptime = myUptime(time.Since(s.start)) v.Port = v.Info.Port updateUsage(v) s.mu.Lock() v.Connections = len(s.clients) v.TotalConnections = s.totalClients v.Routes = len(s.routes) v.Remotes = len(s.remotes) v.InMsgs = atomic.LoadInt64(&s.inMsgs) v.InBytes = atomic.LoadInt64(&s.inBytes) v.OutMsgs = atomic.LoadInt64(&s.outMsgs) v.OutBytes = atomic.LoadInt64(&s.outBytes) v.SlowConsumers = atomic.LoadInt64(&s.slowConsumers) v.MaxPending = opts.MaxPending v.WriteDeadline = opts.WriteDeadline // FIXME(dlc) - make this multi-account aware. v.Subscriptions = s.gacc.sl.Count() v.ConfigLoadTime = s.configTime // Need a copy here since s.httpReqStats can change while doing // the marshaling down below. v.HTTPReqStats = make(map[string]uint64, len(s.httpReqStats)) for key, val := range s.httpReqStats { v.HTTPReqStats[key] = val } s.mu.Unlock() return v, nil }
go
func (s *Server) Varz(varzOpts *VarzOptions) (*Varz, error) { // Snapshot server options. opts := s.getOpts() v := &Varz{Info: &s.info, Options: opts, MaxPayload: int(opts.MaxPayload), Start: s.start} v.Now = time.Now() v.Uptime = myUptime(time.Since(s.start)) v.Port = v.Info.Port updateUsage(v) s.mu.Lock() v.Connections = len(s.clients) v.TotalConnections = s.totalClients v.Routes = len(s.routes) v.Remotes = len(s.remotes) v.InMsgs = atomic.LoadInt64(&s.inMsgs) v.InBytes = atomic.LoadInt64(&s.inBytes) v.OutMsgs = atomic.LoadInt64(&s.outMsgs) v.OutBytes = atomic.LoadInt64(&s.outBytes) v.SlowConsumers = atomic.LoadInt64(&s.slowConsumers) v.MaxPending = opts.MaxPending v.WriteDeadline = opts.WriteDeadline // FIXME(dlc) - make this multi-account aware. v.Subscriptions = s.gacc.sl.Count() v.ConfigLoadTime = s.configTime // Need a copy here since s.httpReqStats can change while doing // the marshaling down below. v.HTTPReqStats = make(map[string]uint64, len(s.httpReqStats)) for key, val := range s.httpReqStats { v.HTTPReqStats[key] = val } s.mu.Unlock() return v, nil }
[ "func", "(", "s", "*", "Server", ")", "Varz", "(", "varzOpts", "*", "VarzOptions", ")", "(", "*", "Varz", ",", "error", ")", "{", "// Snapshot server options.", "opts", ":=", "s", ".", "getOpts", "(", ")", "\n\n", "v", ":=", "&", "Varz", "{", "Info", ":", "&", "s", ".", "info", ",", "Options", ":", "opts", ",", "MaxPayload", ":", "int", "(", "opts", ".", "MaxPayload", ")", ",", "Start", ":", "s", ".", "start", "}", "\n", "v", ".", "Now", "=", "time", ".", "Now", "(", ")", "\n", "v", ".", "Uptime", "=", "myUptime", "(", "time", ".", "Since", "(", "s", ".", "start", ")", ")", "\n", "v", ".", "Port", "=", "v", ".", "Info", ".", "Port", "\n\n", "updateUsage", "(", "v", ")", "\n\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "v", ".", "Connections", "=", "len", "(", "s", ".", "clients", ")", "\n", "v", ".", "TotalConnections", "=", "s", ".", "totalClients", "\n", "v", ".", "Routes", "=", "len", "(", "s", ".", "routes", ")", "\n", "v", ".", "Remotes", "=", "len", "(", "s", ".", "remotes", ")", "\n", "v", ".", "InMsgs", "=", "atomic", ".", "LoadInt64", "(", "&", "s", ".", "inMsgs", ")", "\n", "v", ".", "InBytes", "=", "atomic", ".", "LoadInt64", "(", "&", "s", ".", "inBytes", ")", "\n", "v", ".", "OutMsgs", "=", "atomic", ".", "LoadInt64", "(", "&", "s", ".", "outMsgs", ")", "\n", "v", ".", "OutBytes", "=", "atomic", ".", "LoadInt64", "(", "&", "s", ".", "outBytes", ")", "\n", "v", ".", "SlowConsumers", "=", "atomic", ".", "LoadInt64", "(", "&", "s", ".", "slowConsumers", ")", "\n", "v", ".", "MaxPending", "=", "opts", ".", "MaxPending", "\n", "v", ".", "WriteDeadline", "=", "opts", ".", "WriteDeadline", "\n", "// FIXME(dlc) - make this multi-account aware.", "v", ".", "Subscriptions", "=", "s", ".", "gacc", ".", "sl", ".", "Count", "(", ")", "\n", "v", ".", "ConfigLoadTime", "=", "s", ".", "configTime", "\n", "// Need a copy here since s.httpReqStats can change while doing", "// the marshaling down below.", "v", ".", "HTTPReqStats", "=", "make", "(", "map", "[", "string", "]", "uint64", ",", "len", "(", "s", ".", "httpReqStats", ")", ")", "\n", "for", "key", ",", "val", ":=", "range", "s", ".", "httpReqStats", "{", "v", ".", "HTTPReqStats", "[", "key", "]", "=", "val", "\n", "}", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "return", "v", ",", "nil", "\n", "}" ]
// Varz returns a Varz struct containing the server information.
[ "Varz", "returns", "a", "Varz", "struct", "containing", "the", "server", "information", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L919-L954
164,406
nats-io/gnatsd
server/monitor.go
HandleVarz
func (s *Server) HandleVarz(w http.ResponseWriter, r *http.Request) { s.mu.Lock() s.httpReqStats[VarzPath]++ s.mu.Unlock() // As of now, no error is ever returned v, _ := s.Varz(nil) b, err := json.MarshalIndent(v, "", " ") if err != nil { s.Errorf("Error marshaling response to /varz request: %v", err) } // Handle response ResponseHandler(w, r, b) }
go
func (s *Server) HandleVarz(w http.ResponseWriter, r *http.Request) { s.mu.Lock() s.httpReqStats[VarzPath]++ s.mu.Unlock() // As of now, no error is ever returned v, _ := s.Varz(nil) b, err := json.MarshalIndent(v, "", " ") if err != nil { s.Errorf("Error marshaling response to /varz request: %v", err) } // Handle response ResponseHandler(w, r, b) }
[ "func", "(", "s", "*", "Server", ")", "HandleVarz", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ")", "{", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "httpReqStats", "[", "VarzPath", "]", "++", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "// As of now, no error is ever returned", "v", ",", "_", ":=", "s", ".", "Varz", "(", "nil", ")", "\n", "b", ",", "err", ":=", "json", ".", "MarshalIndent", "(", "v", ",", "\"", "\"", ",", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "s", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// Handle response", "ResponseHandler", "(", "w", ",", "r", ",", "b", ")", "\n", "}" ]
// HandleVarz will process HTTP requests for server information.
[ "HandleVarz", "will", "process", "HTTP", "requests", "for", "server", "information", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L957-L971
164,407
nats-io/gnatsd
server/monitor.go
ResponseHandler
func ResponseHandler(w http.ResponseWriter, r *http.Request, data []byte) { // Get callback from request callback := r.URL.Query().Get("callback") // If callback is not empty then if callback != "" { // Response for JSONP w.Header().Set("Content-Type", "application/javascript") fmt.Fprintf(w, "%s(%s)", callback, data) } else { // Otherwise JSON w.Header().Set("Content-Type", "application/json") w.Write(data) } }
go
func ResponseHandler(w http.ResponseWriter, r *http.Request, data []byte) { // Get callback from request callback := r.URL.Query().Get("callback") // If callback is not empty then if callback != "" { // Response for JSONP w.Header().Set("Content-Type", "application/javascript") fmt.Fprintf(w, "%s(%s)", callback, data) } else { // Otherwise JSON w.Header().Set("Content-Type", "application/json") w.Write(data) } }
[ "func", "ResponseHandler", "(", "w", "http", ".", "ResponseWriter", ",", "r", "*", "http", ".", "Request", ",", "data", "[", "]", "byte", ")", "{", "// Get callback from request", "callback", ":=", "r", ".", "URL", ".", "Query", "(", ")", ".", "Get", "(", "\"", "\"", ")", "\n", "// If callback is not empty then", "if", "callback", "!=", "\"", "\"", "{", "// Response for JSONP", "w", ".", "Header", "(", ")", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "fmt", ".", "Fprintf", "(", "w", ",", "\"", "\"", ",", "callback", ",", "data", ")", "\n", "}", "else", "{", "// Otherwise JSON", "w", ".", "Header", "(", ")", ".", "Set", "(", "\"", "\"", ",", "\"", "\"", ")", "\n", "w", ".", "Write", "(", "data", ")", "\n", "}", "\n", "}" ]
// ResponseHandler handles responses for monitoring routes
[ "ResponseHandler", "handles", "responses", "for", "monitoring", "routes" ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/monitor.go#L986-L999
164,408
nats-io/gnatsd
server/reload.go
Apply
func (t *tlsOption) Apply(server *Server) { server.mu.Lock() tlsRequired := t.newValue != nil server.info.TLSRequired = tlsRequired message := "disabled" if tlsRequired { server.info.TLSVerify = (t.newValue.ClientAuth == tls.RequireAndVerifyClientCert) message = "enabled" } server.mu.Unlock() server.Noticef("Reloaded: tls = %s", message) }
go
func (t *tlsOption) Apply(server *Server) { server.mu.Lock() tlsRequired := t.newValue != nil server.info.TLSRequired = tlsRequired message := "disabled" if tlsRequired { server.info.TLSVerify = (t.newValue.ClientAuth == tls.RequireAndVerifyClientCert) message = "enabled" } server.mu.Unlock() server.Noticef("Reloaded: tls = %s", message) }
[ "func", "(", "t", "*", "tlsOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "tlsRequired", ":=", "t", ".", "newValue", "!=", "nil", "\n", "server", ".", "info", ".", "TLSRequired", "=", "tlsRequired", "\n", "message", ":=", "\"", "\"", "\n", "if", "tlsRequired", "{", "server", ".", "info", ".", "TLSVerify", "=", "(", "t", ".", "newValue", ".", "ClientAuth", "==", "tls", ".", "RequireAndVerifyClientCert", ")", "\n", "message", "=", "\"", "\"", "\n", "}", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "message", ")", "\n", "}" ]
// Apply the tls change.
[ "Apply", "the", "tls", "change", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L150-L161
164,409
nats-io/gnatsd
server/reload.go
Apply
func (c *clusterOption) Apply(server *Server) { // TODO: support enabling/disabling clustering. server.mu.Lock() tlsRequired := c.newValue.TLSConfig != nil server.routeInfo.TLSRequired = tlsRequired server.routeInfo.TLSVerify = tlsRequired server.routeInfo.AuthRequired = c.newValue.Username != "" if c.newValue.NoAdvertise { server.routeInfo.ClientConnectURLs = nil } else { server.routeInfo.ClientConnectURLs = server.clientConnectURLs } server.setRouteInfoHostPortAndIP() server.mu.Unlock() server.Noticef("Reloaded: cluster") if tlsRequired && c.newValue.TLSConfig.InsecureSkipVerify { server.Warnf(clusterTLSInsecureWarning) } }
go
func (c *clusterOption) Apply(server *Server) { // TODO: support enabling/disabling clustering. server.mu.Lock() tlsRequired := c.newValue.TLSConfig != nil server.routeInfo.TLSRequired = tlsRequired server.routeInfo.TLSVerify = tlsRequired server.routeInfo.AuthRequired = c.newValue.Username != "" if c.newValue.NoAdvertise { server.routeInfo.ClientConnectURLs = nil } else { server.routeInfo.ClientConnectURLs = server.clientConnectURLs } server.setRouteInfoHostPortAndIP() server.mu.Unlock() server.Noticef("Reloaded: cluster") if tlsRequired && c.newValue.TLSConfig.InsecureSkipVerify { server.Warnf(clusterTLSInsecureWarning) } }
[ "func", "(", "c", "*", "clusterOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "// TODO: support enabling/disabling clustering.", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "tlsRequired", ":=", "c", ".", "newValue", ".", "TLSConfig", "!=", "nil", "\n", "server", ".", "routeInfo", ".", "TLSRequired", "=", "tlsRequired", "\n", "server", ".", "routeInfo", ".", "TLSVerify", "=", "tlsRequired", "\n", "server", ".", "routeInfo", ".", "AuthRequired", "=", "c", ".", "newValue", ".", "Username", "!=", "\"", "\"", "\n", "if", "c", ".", "newValue", ".", "NoAdvertise", "{", "server", ".", "routeInfo", ".", "ClientConnectURLs", "=", "nil", "\n", "}", "else", "{", "server", ".", "routeInfo", ".", "ClientConnectURLs", "=", "server", ".", "clientConnectURLs", "\n", "}", "\n", "server", ".", "setRouteInfoHostPortAndIP", "(", ")", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ")", "\n", "if", "tlsRequired", "&&", "c", ".", "newValue", ".", "TLSConfig", ".", "InsecureSkipVerify", "{", "server", ".", "Warnf", "(", "clusterTLSInsecureWarning", ")", "\n", "}", "\n", "}" ]
// Apply the cluster change.
[ "Apply", "the", "cluster", "change", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L268-L286
164,410
nats-io/gnatsd
server/reload.go
Apply
func (r *routesOption) Apply(server *Server) { server.mu.Lock() routes := make([]*client, len(server.routes)) i := 0 for _, client := range server.routes { routes[i] = client i++ } server.mu.Unlock() // Remove routes. for _, remove := range r.remove { for _, client := range routes { var url *url.URL client.mu.Lock() if client.route != nil { url = client.route.url } client.mu.Unlock() if url != nil && urlsAreEqual(url, remove) { // Do not attempt to reconnect when route is removed. client.setNoReconnect() client.closeConnection(RouteRemoved) server.Noticef("Removed route %v", remove) } } } // Add routes. server.solicitRoutes(r.add) server.Noticef("Reloaded: cluster routes") }
go
func (r *routesOption) Apply(server *Server) { server.mu.Lock() routes := make([]*client, len(server.routes)) i := 0 for _, client := range server.routes { routes[i] = client i++ } server.mu.Unlock() // Remove routes. for _, remove := range r.remove { for _, client := range routes { var url *url.URL client.mu.Lock() if client.route != nil { url = client.route.url } client.mu.Unlock() if url != nil && urlsAreEqual(url, remove) { // Do not attempt to reconnect when route is removed. client.setNoReconnect() client.closeConnection(RouteRemoved) server.Noticef("Removed route %v", remove) } } } // Add routes. server.solicitRoutes(r.add) server.Noticef("Reloaded: cluster routes") }
[ "func", "(", "r", "*", "routesOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "routes", ":=", "make", "(", "[", "]", "*", "client", ",", "len", "(", "server", ".", "routes", ")", ")", "\n", "i", ":=", "0", "\n", "for", "_", ",", "client", ":=", "range", "server", ".", "routes", "{", "routes", "[", "i", "]", "=", "client", "\n", "i", "++", "\n", "}", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "// Remove routes.", "for", "_", ",", "remove", ":=", "range", "r", ".", "remove", "{", "for", "_", ",", "client", ":=", "range", "routes", "{", "var", "url", "*", "url", ".", "URL", "\n", "client", ".", "mu", ".", "Lock", "(", ")", "\n", "if", "client", ".", "route", "!=", "nil", "{", "url", "=", "client", ".", "route", ".", "url", "\n", "}", "\n", "client", ".", "mu", ".", "Unlock", "(", ")", "\n", "if", "url", "!=", "nil", "&&", "urlsAreEqual", "(", "url", ",", "remove", ")", "{", "// Do not attempt to reconnect when route is removed.", "client", ".", "setNoReconnect", "(", ")", "\n", "client", ".", "closeConnection", "(", "RouteRemoved", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "remove", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "// Add routes.", "server", ".", "solicitRoutes", "(", "r", ".", "add", ")", "\n\n", "server", ".", "Noticef", "(", "\"", "\"", ")", "\n", "}" ]
// Apply the route changes by adding and removing the necessary routes.
[ "Apply", "the", "route", "changes", "by", "adding", "and", "removing", "the", "necessary", "routes", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L301-L333
164,411
nats-io/gnatsd
server/reload.go
Apply
func (m *maxConnOption) Apply(server *Server) { server.mu.Lock() var ( clients = make([]*client, len(server.clients)) i = 0 ) // Map iteration is random, which allows us to close random connections. for _, client := range server.clients { clients[i] = client i++ } server.mu.Unlock() if m.newValue > 0 && len(clients) > m.newValue { // Close connections til we are within the limit. var ( numClose = len(clients) - m.newValue closed = 0 ) for _, client := range clients { client.maxConnExceeded() closed++ if closed >= numClose { break } } server.Noticef("Closed %d connections to fall within max_connections", closed) } server.Noticef("Reloaded: max_connections = %v", m.newValue) }
go
func (m *maxConnOption) Apply(server *Server) { server.mu.Lock() var ( clients = make([]*client, len(server.clients)) i = 0 ) // Map iteration is random, which allows us to close random connections. for _, client := range server.clients { clients[i] = client i++ } server.mu.Unlock() if m.newValue > 0 && len(clients) > m.newValue { // Close connections til we are within the limit. var ( numClose = len(clients) - m.newValue closed = 0 ) for _, client := range clients { client.maxConnExceeded() closed++ if closed >= numClose { break } } server.Noticef("Closed %d connections to fall within max_connections", closed) } server.Noticef("Reloaded: max_connections = %v", m.newValue) }
[ "func", "(", "m", "*", "maxConnOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "var", "(", "clients", "=", "make", "(", "[", "]", "*", "client", ",", "len", "(", "server", ".", "clients", ")", ")", "\n", "i", "=", "0", "\n", ")", "\n", "// Map iteration is random, which allows us to close random connections.", "for", "_", ",", "client", ":=", "range", "server", ".", "clients", "{", "clients", "[", "i", "]", "=", "client", "\n", "i", "++", "\n", "}", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "if", "m", ".", "newValue", ">", "0", "&&", "len", "(", "clients", ")", ">", "m", ".", "newValue", "{", "// Close connections til we are within the limit.", "var", "(", "numClose", "=", "len", "(", "clients", ")", "-", "m", ".", "newValue", "\n", "closed", "=", "0", "\n", ")", "\n", "for", "_", ",", "client", ":=", "range", "clients", "{", "client", ".", "maxConnExceeded", "(", ")", "\n", "closed", "++", "\n", "if", "closed", ">=", "numClose", "{", "break", "\n", "}", "\n", "}", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "closed", ")", "\n", "}", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "m", ".", "newValue", ")", "\n", "}" ]
// Apply the max connections change by closing random connections til we are // below the limit if necessary.
[ "Apply", "the", "max", "connections", "change", "by", "closing", "random", "connections", "til", "we", "are", "below", "the", "limit", "if", "necessary", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L344-L373
164,412
nats-io/gnatsd
server/reload.go
Apply
func (p *pidFileOption) Apply(server *Server) { if p.newValue == "" { return } if err := server.logPid(); err != nil { server.Errorf("Failed to write pidfile: %v", err) } server.Noticef("Reloaded: pid_file = %v", p.newValue) }
go
func (p *pidFileOption) Apply(server *Server) { if p.newValue == "" { return } if err := server.logPid(); err != nil { server.Errorf("Failed to write pidfile: %v", err) } server.Noticef("Reloaded: pid_file = %v", p.newValue) }
[ "func", "(", "p", "*", "pidFileOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "if", "p", ".", "newValue", "==", "\"", "\"", "{", "return", "\n", "}", "\n", "if", "err", ":=", "server", ".", "logPid", "(", ")", ";", "err", "!=", "nil", "{", "server", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "p", ".", "newValue", ")", "\n", "}" ]
// Apply the setting by logging the pid to the new file.
[ "Apply", "the", "setting", "by", "logging", "the", "pid", "to", "the", "new", "file", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L382-L390
164,413
nats-io/gnatsd
server/reload.go
Apply
func (m *maxControlLineOption) Apply(server *Server) { mcl := int32(m.newValue) server.mu.Lock() for _, client := range server.clients { atomic.StoreInt32(&client.mcl, mcl) } server.mu.Unlock() server.Noticef("Reloaded: max_control_line = %d", mcl) }
go
func (m *maxControlLineOption) Apply(server *Server) { mcl := int32(m.newValue) server.mu.Lock() for _, client := range server.clients { atomic.StoreInt32(&client.mcl, mcl) } server.mu.Unlock() server.Noticef("Reloaded: max_control_line = %d", mcl) }
[ "func", "(", "m", "*", "maxControlLineOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "mcl", ":=", "int32", "(", "m", ".", "newValue", ")", "\n", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "for", "_", ",", "client", ":=", "range", "server", ".", "clients", "{", "atomic", ".", "StoreInt32", "(", "&", "client", ".", "mcl", ",", "mcl", ")", "\n", "}", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "mcl", ")", "\n", "}" ]
// Apply the setting by updating each client.
[ "Apply", "the", "setting", "by", "updating", "each", "client", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L413-L421
164,414
nats-io/gnatsd
server/reload.go
Apply
func (m *maxPayloadOption) Apply(server *Server) { server.mu.Lock() server.info.MaxPayload = m.newValue for _, client := range server.clients { atomic.StoreInt32(&client.mpay, int32(m.newValue)) } server.mu.Unlock() server.Noticef("Reloaded: max_payload = %d", m.newValue) }
go
func (m *maxPayloadOption) Apply(server *Server) { server.mu.Lock() server.info.MaxPayload = m.newValue for _, client := range server.clients { atomic.StoreInt32(&client.mpay, int32(m.newValue)) } server.mu.Unlock() server.Noticef("Reloaded: max_payload = %d", m.newValue) }
[ "func", "(", "m", "*", "maxPayloadOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "server", ".", "info", ".", "MaxPayload", "=", "m", ".", "newValue", "\n", "for", "_", ",", "client", ":=", "range", "server", ".", "clients", "{", "atomic", ".", "StoreInt32", "(", "&", "client", ".", "mpay", ",", "int32", "(", "m", ".", "newValue", ")", ")", "\n", "}", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "m", ".", "newValue", ")", "\n", "}" ]
// Apply the setting by updating the server info and each client.
[ "Apply", "the", "setting", "by", "updating", "the", "server", "info", "and", "each", "client", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L431-L439
164,415
nats-io/gnatsd
server/reload.go
Apply
func (c *clientAdvertiseOption) Apply(server *Server) { server.mu.Lock() server.setInfoHostPortAndGenerateJSON() server.mu.Unlock() server.Noticef("Reload: client_advertise = %s", c.newValue) }
go
func (c *clientAdvertiseOption) Apply(server *Server) { server.mu.Lock() server.setInfoHostPortAndGenerateJSON() server.mu.Unlock() server.Noticef("Reload: client_advertise = %s", c.newValue) }
[ "func", "(", "c", "*", "clientAdvertiseOption", ")", "Apply", "(", "server", "*", "Server", ")", "{", "server", ".", "mu", ".", "Lock", "(", ")", "\n", "server", ".", "setInfoHostPortAndGenerateJSON", "(", ")", "\n", "server", ".", "mu", ".", "Unlock", "(", ")", "\n", "server", ".", "Noticef", "(", "\"", "\"", ",", "c", ".", "newValue", ")", "\n", "}" ]
// Apply the setting by updating the server info and regenerate the infoJSON byte array.
[ "Apply", "the", "setting", "by", "updating", "the", "server", "info", "and", "regenerate", "the", "infoJSON", "byte", "array", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L487-L492
164,416
nats-io/gnatsd
server/reload.go
Reload
func (s *Server) Reload() error { s.mu.Lock() if s.configFile == "" { s.mu.Unlock() return errors.New("can only reload config when a file is provided using -c or --config") } newOpts, err := ProcessConfigFile(s.configFile) if err != nil { s.mu.Unlock() // TODO: Dump previous good config to a .bak file? return err } curOpts := s.getOpts() // Wipe trusted keys if needed when we have an operator. if len(curOpts.TrustedOperators) > 0 && len(curOpts.TrustedKeys) > 0 { curOpts.TrustedKeys = nil } clientOrgPort := curOpts.Port clusterOrgPort := curOpts.Cluster.Port gatewayOrgPort := curOpts.Gateway.Port leafnodesOrgPort := curOpts.LeafNode.Port s.mu.Unlock() // Apply flags over config file settings. newOpts = MergeOptions(newOpts, FlagSnapshot) // Need more processing for boolean flags... if FlagSnapshot != nil { applyBoolFlags(newOpts, FlagSnapshot) } setBaselineOptions(newOpts) // setBaselineOptions sets Port to 0 if set to -1 (RANDOM port) // If that's the case, set it to the saved value when the accept loop was // created. if newOpts.Port == 0 { newOpts.Port = clientOrgPort } // We don't do that for cluster, so check against -1. if newOpts.Cluster.Port == -1 { newOpts.Cluster.Port = clusterOrgPort } if newOpts.Gateway.Port == -1 { newOpts.Gateway.Port = gatewayOrgPort } if newOpts.LeafNode.Port == -1 { newOpts.LeafNode.Port = leafnodesOrgPort } if err := s.reloadOptions(curOpts, newOpts); err != nil { return err } s.mu.Lock() s.configTime = time.Now() s.mu.Unlock() return nil }
go
func (s *Server) Reload() error { s.mu.Lock() if s.configFile == "" { s.mu.Unlock() return errors.New("can only reload config when a file is provided using -c or --config") } newOpts, err := ProcessConfigFile(s.configFile) if err != nil { s.mu.Unlock() // TODO: Dump previous good config to a .bak file? return err } curOpts := s.getOpts() // Wipe trusted keys if needed when we have an operator. if len(curOpts.TrustedOperators) > 0 && len(curOpts.TrustedKeys) > 0 { curOpts.TrustedKeys = nil } clientOrgPort := curOpts.Port clusterOrgPort := curOpts.Cluster.Port gatewayOrgPort := curOpts.Gateway.Port leafnodesOrgPort := curOpts.LeafNode.Port s.mu.Unlock() // Apply flags over config file settings. newOpts = MergeOptions(newOpts, FlagSnapshot) // Need more processing for boolean flags... if FlagSnapshot != nil { applyBoolFlags(newOpts, FlagSnapshot) } setBaselineOptions(newOpts) // setBaselineOptions sets Port to 0 if set to -1 (RANDOM port) // If that's the case, set it to the saved value when the accept loop was // created. if newOpts.Port == 0 { newOpts.Port = clientOrgPort } // We don't do that for cluster, so check against -1. if newOpts.Cluster.Port == -1 { newOpts.Cluster.Port = clusterOrgPort } if newOpts.Gateway.Port == -1 { newOpts.Gateway.Port = gatewayOrgPort } if newOpts.LeafNode.Port == -1 { newOpts.LeafNode.Port = leafnodesOrgPort } if err := s.reloadOptions(curOpts, newOpts); err != nil { return err } s.mu.Lock() s.configTime = time.Now() s.mu.Unlock() return nil }
[ "func", "(", "s", "*", "Server", ")", "Reload", "(", ")", "error", "{", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "if", "s", ".", "configFile", "==", "\"", "\"", "{", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "errors", ".", "New", "(", "\"", "\"", ")", "\n", "}", "\n", "newOpts", ",", "err", ":=", "ProcessConfigFile", "(", "s", ".", "configFile", ")", "\n", "if", "err", "!=", "nil", "{", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "// TODO: Dump previous good config to a .bak file?", "return", "err", "\n", "}", "\n\n", "curOpts", ":=", "s", ".", "getOpts", "(", ")", "\n\n", "// Wipe trusted keys if needed when we have an operator.", "if", "len", "(", "curOpts", ".", "TrustedOperators", ")", ">", "0", "&&", "len", "(", "curOpts", ".", "TrustedKeys", ")", ">", "0", "{", "curOpts", ".", "TrustedKeys", "=", "nil", "\n", "}", "\n\n", "clientOrgPort", ":=", "curOpts", ".", "Port", "\n", "clusterOrgPort", ":=", "curOpts", ".", "Cluster", ".", "Port", "\n", "gatewayOrgPort", ":=", "curOpts", ".", "Gateway", ".", "Port", "\n", "leafnodesOrgPort", ":=", "curOpts", ".", "LeafNode", ".", "Port", "\n\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "// Apply flags over config file settings.", "newOpts", "=", "MergeOptions", "(", "newOpts", ",", "FlagSnapshot", ")", "\n\n", "// Need more processing for boolean flags...", "if", "FlagSnapshot", "!=", "nil", "{", "applyBoolFlags", "(", "newOpts", ",", "FlagSnapshot", ")", "\n", "}", "\n\n", "setBaselineOptions", "(", "newOpts", ")", "\n\n", "// setBaselineOptions sets Port to 0 if set to -1 (RANDOM port)", "// If that's the case, set it to the saved value when the accept loop was", "// created.", "if", "newOpts", ".", "Port", "==", "0", "{", "newOpts", ".", "Port", "=", "clientOrgPort", "\n", "}", "\n", "// We don't do that for cluster, so check against -1.", "if", "newOpts", ".", "Cluster", ".", "Port", "==", "-", "1", "{", "newOpts", ".", "Cluster", ".", "Port", "=", "clusterOrgPort", "\n", "}", "\n", "if", "newOpts", ".", "Gateway", ".", "Port", "==", "-", "1", "{", "newOpts", ".", "Gateway", ".", "Port", "=", "gatewayOrgPort", "\n", "}", "\n", "if", "newOpts", ".", "LeafNode", ".", "Port", "==", "-", "1", "{", "newOpts", ".", "LeafNode", ".", "Port", "=", "leafnodesOrgPort", "\n", "}", "\n\n", "if", "err", ":=", "s", ".", "reloadOptions", "(", "curOpts", ",", "newOpts", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "s", ".", "mu", ".", "Lock", "(", ")", "\n", "s", ".", "configTime", "=", "time", ".", "Now", "(", ")", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "nil", "\n", "}" ]
// Reload reads the current configuration file and applies any supported // changes. This returns an error if the server was not started with a config // file or an option which doesn't support hot-swapping was changed.
[ "Reload", "reads", "the", "current", "configuration", "file", "and", "applies", "any", "supported", "changes", ".", "This", "returns", "an", "error", "if", "the", "server", "was", "not", "started", "with", "a", "config", "file", "or", "an", "option", "which", "doesn", "t", "support", "hot", "-", "swapping", "was", "changed", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L508-L569
164,417
nats-io/gnatsd
server/reload.go
reloadOptions
func (s *Server) reloadOptions(curOpts, newOpts *Options) error { // Apply to the new options some of the options that may have been set // that can't be configured in the config file (this can happen in // applications starting NATS Server programmatically). newOpts.CustomClientAuthentication = curOpts.CustomClientAuthentication newOpts.CustomRouterAuthentication = curOpts.CustomRouterAuthentication changed, err := s.diffOptions(newOpts) if err != nil { return err } // Create a context that is used to pass special info that we may need // while applying the new options. ctx := reloadContext{oldClusterPerms: curOpts.Cluster.Permissions} s.setOpts(newOpts) s.applyOptions(&ctx, changed) return nil }
go
func (s *Server) reloadOptions(curOpts, newOpts *Options) error { // Apply to the new options some of the options that may have been set // that can't be configured in the config file (this can happen in // applications starting NATS Server programmatically). newOpts.CustomClientAuthentication = curOpts.CustomClientAuthentication newOpts.CustomRouterAuthentication = curOpts.CustomRouterAuthentication changed, err := s.diffOptions(newOpts) if err != nil { return err } // Create a context that is used to pass special info that we may need // while applying the new options. ctx := reloadContext{oldClusterPerms: curOpts.Cluster.Permissions} s.setOpts(newOpts) s.applyOptions(&ctx, changed) return nil }
[ "func", "(", "s", "*", "Server", ")", "reloadOptions", "(", "curOpts", ",", "newOpts", "*", "Options", ")", "error", "{", "// Apply to the new options some of the options that may have been set", "// that can't be configured in the config file (this can happen in", "// applications starting NATS Server programmatically).", "newOpts", ".", "CustomClientAuthentication", "=", "curOpts", ".", "CustomClientAuthentication", "\n", "newOpts", ".", "CustomRouterAuthentication", "=", "curOpts", ".", "CustomRouterAuthentication", "\n\n", "changed", ",", "err", ":=", "s", ".", "diffOptions", "(", "newOpts", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "// Create a context that is used to pass special info that we may need", "// while applying the new options.", "ctx", ":=", "reloadContext", "{", "oldClusterPerms", ":", "curOpts", ".", "Cluster", ".", "Permissions", "}", "\n", "s", ".", "setOpts", "(", "newOpts", ")", "\n", "s", ".", "applyOptions", "(", "&", "ctx", ",", "changed", ")", "\n", "return", "nil", "\n", "}" ]
// reloadOptions reloads the server config with the provided options. If an // option that doesn't support hot-swapping is changed, this returns an error.
[ "reloadOptions", "reloads", "the", "server", "config", "with", "the", "provided", "options", ".", "If", "an", "option", "that", "doesn", "t", "support", "hot", "-", "swapping", "is", "changed", "this", "returns", "an", "error", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L598-L615
164,418
nats-io/gnatsd
server/reload.go
reloadAuthorization
func (s *Server) reloadAuthorization() { s.mu.Lock() // We need to drain the old accounts here since we have something // new configured. We do not want s.accounts to change since that would // mean adding a lock to lookupAccount which is what we are trying to // optimize for with the change from a map to a sync.Map. oldAccounts := make(map[string]*Account) s.accounts.Range(func(k, v interface{}) bool { acc := v.(*Account) acc.mu.RLock() oldAccounts[acc.Name] = acc acc.mu.RUnlock() s.accounts.Delete(k) return true }) s.gacc = nil s.configureAccounts() s.configureAuthorization() // This map will contain the names of accounts that have their streams // import configuration changed. awcsti := make(map[string]struct{}) s.accounts.Range(func(k, v interface{}) bool { newAcc := v.(*Account) if acc, ok := oldAccounts[newAcc.Name]; ok { // If account exist in latest config, "transfer" the account's // sublist and client map to the new account. acc.mu.RLock() if len(acc.clients) > 0 { newAcc.clients = make(map[*client]*client, len(acc.clients)) for _, c := range acc.clients { newAcc.clients[c] = c } } newAcc.sl = acc.sl acc.mu.RUnlock() // Check if current and new config of this account are same // in term of stream imports. if !acc.checkStreamImportsEqual(newAcc) { awcsti[newAcc.Name] = struct{}{} } } return true }) // Gather clients that changed accounts. We will close them and they // will reconnect, doing the right thing. var ( cclientsa [64]*client cclients = cclientsa[:0] clientsa [64]*client clients = clientsa[:0] routesa [64]*client routes = routesa[:0] ) for _, client := range s.clients { if s.clientHasMovedToDifferentAccount(client) { cclients = append(cclients, client) } else { clients = append(clients, client) } } for _, route := range s.routes { routes = append(routes, route) } s.mu.Unlock() // Close clients that have moved accounts for _, client := range cclients { client.closeConnection(ClientClosed) } for _, client := range clients { // Disconnect any unauthorized clients. if !s.isClientAuthorized(client) { client.authViolation() continue } // Remove any unauthorized subscriptions and check for account imports. client.processSubsOnConfigReload(awcsti) } for _, route := range routes { // Disconnect any unauthorized routes. // Do this only for route that were accepted, not initiated // because in the later case, we don't have the user name/password // of the remote server. if !route.isSolicitedRoute() && !s.isRouterAuthorized(route) { route.setNoReconnect() route.authViolation() } } }
go
func (s *Server) reloadAuthorization() { s.mu.Lock() // We need to drain the old accounts here since we have something // new configured. We do not want s.accounts to change since that would // mean adding a lock to lookupAccount which is what we are trying to // optimize for with the change from a map to a sync.Map. oldAccounts := make(map[string]*Account) s.accounts.Range(func(k, v interface{}) bool { acc := v.(*Account) acc.mu.RLock() oldAccounts[acc.Name] = acc acc.mu.RUnlock() s.accounts.Delete(k) return true }) s.gacc = nil s.configureAccounts() s.configureAuthorization() // This map will contain the names of accounts that have their streams // import configuration changed. awcsti := make(map[string]struct{}) s.accounts.Range(func(k, v interface{}) bool { newAcc := v.(*Account) if acc, ok := oldAccounts[newAcc.Name]; ok { // If account exist in latest config, "transfer" the account's // sublist and client map to the new account. acc.mu.RLock() if len(acc.clients) > 0 { newAcc.clients = make(map[*client]*client, len(acc.clients)) for _, c := range acc.clients { newAcc.clients[c] = c } } newAcc.sl = acc.sl acc.mu.RUnlock() // Check if current and new config of this account are same // in term of stream imports. if !acc.checkStreamImportsEqual(newAcc) { awcsti[newAcc.Name] = struct{}{} } } return true }) // Gather clients that changed accounts. We will close them and they // will reconnect, doing the right thing. var ( cclientsa [64]*client cclients = cclientsa[:0] clientsa [64]*client clients = clientsa[:0] routesa [64]*client routes = routesa[:0] ) for _, client := range s.clients { if s.clientHasMovedToDifferentAccount(client) { cclients = append(cclients, client) } else { clients = append(clients, client) } } for _, route := range s.routes { routes = append(routes, route) } s.mu.Unlock() // Close clients that have moved accounts for _, client := range cclients { client.closeConnection(ClientClosed) } for _, client := range clients { // Disconnect any unauthorized clients. if !s.isClientAuthorized(client) { client.authViolation() continue } // Remove any unauthorized subscriptions and check for account imports. client.processSubsOnConfigReload(awcsti) } for _, route := range routes { // Disconnect any unauthorized routes. // Do this only for route that were accepted, not initiated // because in the later case, we don't have the user name/password // of the remote server. if !route.isSolicitedRoute() && !s.isRouterAuthorized(route) { route.setNoReconnect() route.authViolation() } } }
[ "func", "(", "s", "*", "Server", ")", "reloadAuthorization", "(", ")", "{", "s", ".", "mu", ".", "Lock", "(", ")", "\n\n", "// We need to drain the old accounts here since we have something", "// new configured. We do not want s.accounts to change since that would", "// mean adding a lock to lookupAccount which is what we are trying to", "// optimize for with the change from a map to a sync.Map.", "oldAccounts", ":=", "make", "(", "map", "[", "string", "]", "*", "Account", ")", "\n", "s", ".", "accounts", ".", "Range", "(", "func", "(", "k", ",", "v", "interface", "{", "}", ")", "bool", "{", "acc", ":=", "v", ".", "(", "*", "Account", ")", "\n", "acc", ".", "mu", ".", "RLock", "(", ")", "\n", "oldAccounts", "[", "acc", ".", "Name", "]", "=", "acc", "\n", "acc", ".", "mu", ".", "RUnlock", "(", ")", "\n", "s", ".", "accounts", ".", "Delete", "(", "k", ")", "\n", "return", "true", "\n", "}", ")", "\n", "s", ".", "gacc", "=", "nil", "\n", "s", ".", "configureAccounts", "(", ")", "\n\n", "s", ".", "configureAuthorization", "(", ")", "\n\n", "// This map will contain the names of accounts that have their streams", "// import configuration changed.", "awcsti", ":=", "make", "(", "map", "[", "string", "]", "struct", "{", "}", ")", "\n\n", "s", ".", "accounts", ".", "Range", "(", "func", "(", "k", ",", "v", "interface", "{", "}", ")", "bool", "{", "newAcc", ":=", "v", ".", "(", "*", "Account", ")", "\n", "if", "acc", ",", "ok", ":=", "oldAccounts", "[", "newAcc", ".", "Name", "]", ";", "ok", "{", "// If account exist in latest config, \"transfer\" the account's", "// sublist and client map to the new account.", "acc", ".", "mu", ".", "RLock", "(", ")", "\n", "if", "len", "(", "acc", ".", "clients", ")", ">", "0", "{", "newAcc", ".", "clients", "=", "make", "(", "map", "[", "*", "client", "]", "*", "client", ",", "len", "(", "acc", ".", "clients", ")", ")", "\n", "for", "_", ",", "c", ":=", "range", "acc", ".", "clients", "{", "newAcc", ".", "clients", "[", "c", "]", "=", "c", "\n", "}", "\n", "}", "\n", "newAcc", ".", "sl", "=", "acc", ".", "sl", "\n", "acc", ".", "mu", ".", "RUnlock", "(", ")", "\n\n", "// Check if current and new config of this account are same", "// in term of stream imports.", "if", "!", "acc", ".", "checkStreamImportsEqual", "(", "newAcc", ")", "{", "awcsti", "[", "newAcc", ".", "Name", "]", "=", "struct", "{", "}", "{", "}", "\n", "}", "\n", "}", "\n", "return", "true", "\n", "}", ")", "\n\n", "// Gather clients that changed accounts. We will close them and they", "// will reconnect, doing the right thing.", "var", "(", "cclientsa", "[", "64", "]", "*", "client", "\n", "cclients", "=", "cclientsa", "[", ":", "0", "]", "\n", "clientsa", "[", "64", "]", "*", "client", "\n", "clients", "=", "clientsa", "[", ":", "0", "]", "\n", "routesa", "[", "64", "]", "*", "client", "\n", "routes", "=", "routesa", "[", ":", "0", "]", "\n", ")", "\n", "for", "_", ",", "client", ":=", "range", "s", ".", "clients", "{", "if", "s", ".", "clientHasMovedToDifferentAccount", "(", "client", ")", "{", "cclients", "=", "append", "(", "cclients", ",", "client", ")", "\n", "}", "else", "{", "clients", "=", "append", "(", "clients", ",", "client", ")", "\n", "}", "\n", "}", "\n", "for", "_", ",", "route", ":=", "range", "s", ".", "routes", "{", "routes", "=", "append", "(", "routes", ",", "route", ")", "\n", "}", "\n", "s", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "// Close clients that have moved accounts", "for", "_", ",", "client", ":=", "range", "cclients", "{", "client", ".", "closeConnection", "(", "ClientClosed", ")", "\n", "}", "\n\n", "for", "_", ",", "client", ":=", "range", "clients", "{", "// Disconnect any unauthorized clients.", "if", "!", "s", ".", "isClientAuthorized", "(", "client", ")", "{", "client", ".", "authViolation", "(", ")", "\n", "continue", "\n", "}", "\n", "// Remove any unauthorized subscriptions and check for account imports.", "client", ".", "processSubsOnConfigReload", "(", "awcsti", ")", "\n", "}", "\n\n", "for", "_", ",", "route", ":=", "range", "routes", "{", "// Disconnect any unauthorized routes.", "// Do this only for route that were accepted, not initiated", "// because in the later case, we don't have the user name/password", "// of the remote server.", "if", "!", "route", ".", "isSolicitedRoute", "(", ")", "&&", "!", "s", ".", "isRouterAuthorized", "(", "route", ")", "{", "route", ".", "setNoReconnect", "(", ")", "\n", "route", ".", "authViolation", "(", ")", "\n", "}", "\n", "}", "\n", "}" ]
// reloadAuthorization reconfigures the server authorization settings, // disconnects any clients who are no longer authorized, and removes any // unauthorized subscriptions.
[ "reloadAuthorization", "reconfigures", "the", "server", "authorization", "settings", "disconnects", "any", "clients", "who", "are", "no", "longer", "authorized", "and", "removes", "any", "unauthorized", "subscriptions", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L799-L895
164,419
nats-io/gnatsd
server/reload.go
validateClusterOpts
func validateClusterOpts(old, new ClusterOpts) error { if old.Host != new.Host { return fmt.Errorf("config reload not supported for cluster host: old=%s, new=%s", old.Host, new.Host) } if old.Port != new.Port { return fmt.Errorf("config reload not supported for cluster port: old=%d, new=%d", old.Port, new.Port) } // Validate Cluster.Advertise syntax if new.Advertise != "" { if _, _, err := parseHostPort(new.Advertise, 0); err != nil { return fmt.Errorf("invalid Cluster.Advertise value of %s, err=%v", new.Advertise, err) } } return nil }
go
func validateClusterOpts(old, new ClusterOpts) error { if old.Host != new.Host { return fmt.Errorf("config reload not supported for cluster host: old=%s, new=%s", old.Host, new.Host) } if old.Port != new.Port { return fmt.Errorf("config reload not supported for cluster port: old=%d, new=%d", old.Port, new.Port) } // Validate Cluster.Advertise syntax if new.Advertise != "" { if _, _, err := parseHostPort(new.Advertise, 0); err != nil { return fmt.Errorf("invalid Cluster.Advertise value of %s, err=%v", new.Advertise, err) } } return nil }
[ "func", "validateClusterOpts", "(", "old", ",", "new", "ClusterOpts", ")", "error", "{", "if", "old", ".", "Host", "!=", "new", ".", "Host", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "old", ".", "Host", ",", "new", ".", "Host", ")", "\n", "}", "\n", "if", "old", ".", "Port", "!=", "new", ".", "Port", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "old", ".", "Port", ",", "new", ".", "Port", ")", "\n", "}", "\n", "// Validate Cluster.Advertise syntax", "if", "new", ".", "Advertise", "!=", "\"", "\"", "{", "if", "_", ",", "_", ",", "err", ":=", "parseHostPort", "(", "new", ".", "Advertise", ",", "0", ")", ";", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "new", ".", "Advertise", ",", "err", ")", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// validateClusterOpts ensures the new ClusterOpts does not change host or // port, which do not support reload.
[ "validateClusterOpts", "ensures", "the", "new", "ClusterOpts", "does", "not", "change", "host", "or", "port", "which", "do", "not", "support", "reload", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L1053-L1069
164,420
nats-io/gnatsd
server/reload.go
diffRoutes
func diffRoutes(old, new []*url.URL) (add, remove []*url.URL) { // Find routes to remove. removeLoop: for _, oldRoute := range old { for _, newRoute := range new { if urlsAreEqual(oldRoute, newRoute) { continue removeLoop } } remove = append(remove, oldRoute) } // Find routes to add. addLoop: for _, newRoute := range new { for _, oldRoute := range old { if urlsAreEqual(oldRoute, newRoute) { continue addLoop } } add = append(add, newRoute) } return add, remove }
go
func diffRoutes(old, new []*url.URL) (add, remove []*url.URL) { // Find routes to remove. removeLoop: for _, oldRoute := range old { for _, newRoute := range new { if urlsAreEqual(oldRoute, newRoute) { continue removeLoop } } remove = append(remove, oldRoute) } // Find routes to add. addLoop: for _, newRoute := range new { for _, oldRoute := range old { if urlsAreEqual(oldRoute, newRoute) { continue addLoop } } add = append(add, newRoute) } return add, remove }
[ "func", "diffRoutes", "(", "old", ",", "new", "[", "]", "*", "url", ".", "URL", ")", "(", "add", ",", "remove", "[", "]", "*", "url", ".", "URL", ")", "{", "// Find routes to remove.", "removeLoop", ":", "for", "_", ",", "oldRoute", ":=", "range", "old", "{", "for", "_", ",", "newRoute", ":=", "range", "new", "{", "if", "urlsAreEqual", "(", "oldRoute", ",", "newRoute", ")", "{", "continue", "removeLoop", "\n", "}", "\n", "}", "\n", "remove", "=", "append", "(", "remove", ",", "oldRoute", ")", "\n", "}", "\n\n", "// Find routes to add.", "addLoop", ":", "for", "_", ",", "newRoute", ":=", "range", "new", "{", "for", "_", ",", "oldRoute", ":=", "range", "old", "{", "if", "urlsAreEqual", "(", "oldRoute", ",", "newRoute", ")", "{", "continue", "addLoop", "\n", "}", "\n", "}", "\n", "add", "=", "append", "(", "add", ",", "newRoute", ")", "\n", "}", "\n\n", "return", "add", ",", "remove", "\n", "}" ]
// diffRoutes diffs the old routes and the new routes and returns the ones that // should be added and removed from the server.
[ "diffRoutes", "diffs", "the", "old", "routes", "and", "the", "new", "routes", "and", "returns", "the", "ones", "that", "should", "be", "added", "and", "removed", "from", "the", "server", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/reload.go#L1073-L1097
164,421
nats-io/gnatsd
server/util.go
parseSize
func parseSize(d []byte) (n int) { l := len(d) if l == 0 { return -1 } var ( i int dec byte ) // Note: Use `goto` here to avoid for loop in order // to have the function be inlined. // See: https://github.com/golang/go/issues/14768 loop: dec = d[i] if dec < asciiZero || dec > asciiNine { return -1 } n = n*10 + (int(dec) - asciiZero) i++ if i < l { goto loop } return n }
go
func parseSize(d []byte) (n int) { l := len(d) if l == 0 { return -1 } var ( i int dec byte ) // Note: Use `goto` here to avoid for loop in order // to have the function be inlined. // See: https://github.com/golang/go/issues/14768 loop: dec = d[i] if dec < asciiZero || dec > asciiNine { return -1 } n = n*10 + (int(dec) - asciiZero) i++ if i < l { goto loop } return n }
[ "func", "parseSize", "(", "d", "[", "]", "byte", ")", "(", "n", "int", ")", "{", "l", ":=", "len", "(", "d", ")", "\n", "if", "l", "==", "0", "{", "return", "-", "1", "\n", "}", "\n", "var", "(", "i", "int", "\n", "dec", "byte", "\n", ")", "\n\n", "// Note: Use `goto` here to avoid for loop in order", "// to have the function be inlined.", "// See: https://github.com/golang/go/issues/14768", "loop", ":", "dec", "=", "d", "[", "i", "]", "\n", "if", "dec", "<", "asciiZero", "||", "dec", ">", "asciiNine", "{", "return", "-", "1", "\n", "}", "\n", "n", "=", "n", "*", "10", "+", "(", "int", "(", "dec", ")", "-", "asciiZero", ")", "\n\n", "i", "++", "\n", "if", "i", "<", "l", "{", "goto", "loop", "\n", "}", "\n", "return", "n", "\n", "}" ]
// parseSize expects decimal positive numbers. We // return -1 to signal error.
[ "parseSize", "expects", "decimal", "positive", "numbers", ".", "We", "return", "-", "1", "to", "signal", "error", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/util.go#L35-L60
164,422
nats-io/gnatsd
server/util.go
secondsToDuration
func secondsToDuration(seconds float64) time.Duration { ttl := seconds * float64(time.Second) return time.Duration(ttl) }
go
func secondsToDuration(seconds float64) time.Duration { ttl := seconds * float64(time.Second) return time.Duration(ttl) }
[ "func", "secondsToDuration", "(", "seconds", "float64", ")", "time", ".", "Duration", "{", "ttl", ":=", "seconds", "*", "float64", "(", "time", ".", "Second", ")", "\n", "return", "time", ".", "Duration", "(", "ttl", ")", "\n", "}" ]
// Helper to move from float seconds to time.Duration
[ "Helper", "to", "move", "from", "float", "seconds", "to", "time", ".", "Duration" ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/util.go#L78-L81
164,423
nats-io/gnatsd
server/util.go
urlsAreEqual
func urlsAreEqual(u1, u2 *url.URL) bool { return reflect.DeepEqual(u1, u2) }
go
func urlsAreEqual(u1, u2 *url.URL) bool { return reflect.DeepEqual(u1, u2) }
[ "func", "urlsAreEqual", "(", "u1", ",", "u2", "*", "url", ".", "URL", ")", "bool", "{", "return", "reflect", ".", "DeepEqual", "(", "u1", ",", "u2", ")", "\n", "}" ]
// Returns true if URL u1 represents the same URL than u2, // false otherwise.
[ "Returns", "true", "if", "URL", "u1", "represents", "the", "same", "URL", "than", "u2", "false", "otherwise", "." ]
7ebe2836016a033f11d9da712ed6a1abb95c06dd
https://github.com/nats-io/gnatsd/blob/7ebe2836016a033f11d9da712ed6a1abb95c06dd/server/util.go#L110-L112
164,424
gomodule/redigo
redis/pool.go
Get
func (p *Pool) Get() Conn { pc, err := p.get(nil) if err != nil { return errorConn{err} } return &activeConn{p: p, pc: pc} }
go
func (p *Pool) Get() Conn { pc, err := p.get(nil) if err != nil { return errorConn{err} } return &activeConn{p: p, pc: pc} }
[ "func", "(", "p", "*", "Pool", ")", "Get", "(", ")", "Conn", "{", "pc", ",", "err", ":=", "p", ".", "get", "(", "nil", ")", "\n", "if", "err", "!=", "nil", "{", "return", "errorConn", "{", "err", "}", "\n", "}", "\n", "return", "&", "activeConn", "{", "p", ":", "p", ",", "pc", ":", "pc", "}", "\n", "}" ]
// Get gets a connection. The application must close the returned connection. // This method always returns a valid connection so that applications can defer // error handling to the first use of the connection. If there is an error // getting an underlying connection, then the connection Err, Do, Send, Flush // and Receive methods return that error.
[ "Get", "gets", "a", "connection", ".", "The", "application", "must", "close", "the", "returned", "connection", ".", "This", "method", "always", "returns", "a", "valid", "connection", "so", "that", "applications", "can", "defer", "error", "handling", "to", "the", "first", "use", "of", "the", "connection", ".", "If", "there", "is", "an", "error", "getting", "an", "underlying", "connection", "then", "the", "connection", "Err", "Do", "Send", "Flush", "and", "Receive", "methods", "return", "that", "error", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pool.go#L187-L193
164,425
gomodule/redigo
redis/pool.go
GetContext
func (p *Pool) GetContext(ctx context.Context) (Conn, error) { pc, err := p.get(ctx) if err != nil { return errorConn{err}, err } return &activeConn{p: p, pc: pc}, nil }
go
func (p *Pool) GetContext(ctx context.Context) (Conn, error) { pc, err := p.get(ctx) if err != nil { return errorConn{err}, err } return &activeConn{p: p, pc: pc}, nil }
[ "func", "(", "p", "*", "Pool", ")", "GetContext", "(", "ctx", "context", ".", "Context", ")", "(", "Conn", ",", "error", ")", "{", "pc", ",", "err", ":=", "p", ".", "get", "(", "ctx", ")", "\n", "if", "err", "!=", "nil", "{", "return", "errorConn", "{", "err", "}", ",", "err", "\n", "}", "\n", "return", "&", "activeConn", "{", "p", ":", "p", ",", "pc", ":", "pc", "}", ",", "nil", "\n", "}" ]
// GetContext gets a connection using the provided context. // // The provided Context must be non-nil. If the context expires before the // connection is complete, an error is returned. Any expiration on the context // will not affect the returned connection. // // If the function completes without error, then the application must close the // returned connection.
[ "GetContext", "gets", "a", "connection", "using", "the", "provided", "context", ".", "The", "provided", "Context", "must", "be", "non", "-", "nil", ".", "If", "the", "context", "expires", "before", "the", "connection", "is", "complete", "an", "error", "is", "returned", ".", "Any", "expiration", "on", "the", "context", "will", "not", "affect", "the", "returned", "connection", ".", "If", "the", "function", "completes", "without", "error", "then", "the", "application", "must", "close", "the", "returned", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pool.go#L203-L209
164,426
gomodule/redigo
redis/pool.go
Stats
func (p *Pool) Stats() PoolStats { p.mu.Lock() stats := PoolStats{ ActiveCount: p.active, IdleCount: p.idle.count, WaitCount: p.waitCount, WaitDuration: p.waitDuration, } p.mu.Unlock() return stats }
go
func (p *Pool) Stats() PoolStats { p.mu.Lock() stats := PoolStats{ ActiveCount: p.active, IdleCount: p.idle.count, WaitCount: p.waitCount, WaitDuration: p.waitDuration, } p.mu.Unlock() return stats }
[ "func", "(", "p", "*", "Pool", ")", "Stats", "(", ")", "PoolStats", "{", "p", ".", "mu", ".", "Lock", "(", ")", "\n", "stats", ":=", "PoolStats", "{", "ActiveCount", ":", "p", ".", "active", ",", "IdleCount", ":", "p", ".", "idle", ".", "count", ",", "WaitCount", ":", "p", ".", "waitCount", ",", "WaitDuration", ":", "p", ".", "waitDuration", ",", "}", "\n", "p", ".", "mu", ".", "Unlock", "(", ")", "\n\n", "return", "stats", "\n", "}" ]
// Stats returns pool's statistics.
[ "Stats", "returns", "pool", "s", "statistics", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pool.go#L229-L240
164,427
gomodule/redigo
redis/pool.go
ActiveCount
func (p *Pool) ActiveCount() int { p.mu.Lock() active := p.active p.mu.Unlock() return active }
go
func (p *Pool) ActiveCount() int { p.mu.Lock() active := p.active p.mu.Unlock() return active }
[ "func", "(", "p", "*", "Pool", ")", "ActiveCount", "(", ")", "int", "{", "p", ".", "mu", ".", "Lock", "(", ")", "\n", "active", ":=", "p", ".", "active", "\n", "p", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "active", "\n", "}" ]
// ActiveCount returns the number of connections in the pool. The count // includes idle connections and connections in use.
[ "ActiveCount", "returns", "the", "number", "of", "connections", "in", "the", "pool", ".", "The", "count", "includes", "idle", "connections", "and", "connections", "in", "use", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pool.go#L244-L249
164,428
gomodule/redigo
redis/pool.go
IdleCount
func (p *Pool) IdleCount() int { p.mu.Lock() idle := p.idle.count p.mu.Unlock() return idle }
go
func (p *Pool) IdleCount() int { p.mu.Lock() idle := p.idle.count p.mu.Unlock() return idle }
[ "func", "(", "p", "*", "Pool", ")", "IdleCount", "(", ")", "int", "{", "p", ".", "mu", ".", "Lock", "(", ")", "\n", "idle", ":=", "p", ".", "idle", ".", "count", "\n", "p", ".", "mu", ".", "Unlock", "(", ")", "\n", "return", "idle", "\n", "}" ]
// IdleCount returns the number of idle connections in the pool.
[ "IdleCount", "returns", "the", "number", "of", "idle", "connections", "in", "the", "pool", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pool.go#L252-L257
164,429
gomodule/redigo
redis/redis.go
DoWithTimeout
func DoWithTimeout(c Conn, timeout time.Duration, cmd string, args ...interface{}) (interface{}, error) { cwt, ok := c.(ConnWithTimeout) if !ok { return nil, errTimeoutNotSupported } return cwt.DoWithTimeout(timeout, cmd, args...) }
go
func DoWithTimeout(c Conn, timeout time.Duration, cmd string, args ...interface{}) (interface{}, error) { cwt, ok := c.(ConnWithTimeout) if !ok { return nil, errTimeoutNotSupported } return cwt.DoWithTimeout(timeout, cmd, args...) }
[ "func", "DoWithTimeout", "(", "c", "Conn", ",", "timeout", "time", ".", "Duration", ",", "cmd", "string", ",", "args", "...", "interface", "{", "}", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "cwt", ",", "ok", ":=", "c", ".", "(", "ConnWithTimeout", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "errTimeoutNotSupported", "\n", "}", "\n", "return", "cwt", ".", "DoWithTimeout", "(", "timeout", ",", "cmd", ",", "args", "...", ")", "\n", "}" ]
// DoWithTimeout executes a Redis command with the specified read timeout. If // the connection does not satisfy the ConnWithTimeout interface, then an error // is returned.
[ "DoWithTimeout", "executes", "a", "Redis", "command", "with", "the", "specified", "read", "timeout", ".", "If", "the", "connection", "does", "not", "satisfy", "the", "ConnWithTimeout", "interface", "then", "an", "error", "is", "returned", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/redis.go#L100-L106
164,430
gomodule/redigo
redis/redis.go
ReceiveWithTimeout
func ReceiveWithTimeout(c Conn, timeout time.Duration) (interface{}, error) { cwt, ok := c.(ConnWithTimeout) if !ok { return nil, errTimeoutNotSupported } return cwt.ReceiveWithTimeout(timeout) }
go
func ReceiveWithTimeout(c Conn, timeout time.Duration) (interface{}, error) { cwt, ok := c.(ConnWithTimeout) if !ok { return nil, errTimeoutNotSupported } return cwt.ReceiveWithTimeout(timeout) }
[ "func", "ReceiveWithTimeout", "(", "c", "Conn", ",", "timeout", "time", ".", "Duration", ")", "(", "interface", "{", "}", ",", "error", ")", "{", "cwt", ",", "ok", ":=", "c", ".", "(", "ConnWithTimeout", ")", "\n", "if", "!", "ok", "{", "return", "nil", ",", "errTimeoutNotSupported", "\n", "}", "\n", "return", "cwt", ".", "ReceiveWithTimeout", "(", "timeout", ")", "\n", "}" ]
// ReceiveWithTimeout receives a reply with the specified read timeout. If the // connection does not satisfy the ConnWithTimeout interface, then an error is // returned.
[ "ReceiveWithTimeout", "receives", "a", "reply", "with", "the", "specified", "read", "timeout", ".", "If", "the", "connection", "does", "not", "satisfy", "the", "ConnWithTimeout", "interface", "then", "an", "error", "is", "returned", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/redis.go#L111-L117
164,431
gomodule/redigo
redis/script.go
NewScript
func NewScript(keyCount int, src string) *Script { h := sha1.New() io.WriteString(h, src) return &Script{keyCount, src, hex.EncodeToString(h.Sum(nil))} }
go
func NewScript(keyCount int, src string) *Script { h := sha1.New() io.WriteString(h, src) return &Script{keyCount, src, hex.EncodeToString(h.Sum(nil))} }
[ "func", "NewScript", "(", "keyCount", "int", ",", "src", "string", ")", "*", "Script", "{", "h", ":=", "sha1", ".", "New", "(", ")", "\n", "io", ".", "WriteString", "(", "h", ",", "src", ")", "\n", "return", "&", "Script", "{", "keyCount", ",", "src", ",", "hex", ".", "EncodeToString", "(", "h", ".", "Sum", "(", "nil", ")", ")", "}", "\n", "}" ]
// NewScript returns a new script object. If keyCount is greater than or equal // to zero, then the count is automatically inserted in the EVAL command // argument list. If keyCount is less than zero, then the application supplies // the count as the first value in the keysAndArgs argument to the Do, Send and // SendHash methods.
[ "NewScript", "returns", "a", "new", "script", "object", ".", "If", "keyCount", "is", "greater", "than", "or", "equal", "to", "zero", "then", "the", "count", "is", "automatically", "inserted", "in", "the", "EVAL", "command", "argument", "list", ".", "If", "keyCount", "is", "less", "than", "zero", "then", "the", "application", "supplies", "the", "count", "as", "the", "first", "value", "in", "the", "keysAndArgs", "argument", "to", "the", "Do", "Send", "and", "SendHash", "methods", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/script.go#L37-L41
164,432
gomodule/redigo
redis/script.go
SendHash
func (s *Script) SendHash(c Conn, keysAndArgs ...interface{}) error { return c.Send("EVALSHA", s.args(s.hash, keysAndArgs)...) }
go
func (s *Script) SendHash(c Conn, keysAndArgs ...interface{}) error { return c.Send("EVALSHA", s.args(s.hash, keysAndArgs)...) }
[ "func", "(", "s", "*", "Script", ")", "SendHash", "(", "c", "Conn", ",", "keysAndArgs", "...", "interface", "{", "}", ")", "error", "{", "return", "c", ".", "Send", "(", "\"", "\"", ",", "s", ".", "args", "(", "s", ".", "hash", ",", "keysAndArgs", ")", "...", ")", "\n", "}" ]
// SendHash evaluates the script without waiting for the reply. The script is // evaluated with the EVALSHA command. The application must ensure that the // script is loaded by a previous call to Send, Do or Load methods.
[ "SendHash", "evaluates", "the", "script", "without", "waiting", "for", "the", "reply", ".", "The", "script", "is", "evaluated", "with", "the", "EVALSHA", "command", ".", "The", "application", "must", "ensure", "that", "the", "script", "is", "loaded", "by", "a", "previous", "call", "to", "Send", "Do", "or", "Load", "methods", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/script.go#L78-L80
164,433
gomodule/redigo
redis/script.go
Send
func (s *Script) Send(c Conn, keysAndArgs ...interface{}) error { return c.Send("EVAL", s.args(s.src, keysAndArgs)...) }
go
func (s *Script) Send(c Conn, keysAndArgs ...interface{}) error { return c.Send("EVAL", s.args(s.src, keysAndArgs)...) }
[ "func", "(", "s", "*", "Script", ")", "Send", "(", "c", "Conn", ",", "keysAndArgs", "...", "interface", "{", "}", ")", "error", "{", "return", "c", ".", "Send", "(", "\"", "\"", ",", "s", ".", "args", "(", "s", ".", "src", ",", "keysAndArgs", ")", "...", ")", "\n", "}" ]
// Send evaluates the script without waiting for the reply.
[ "Send", "evaluates", "the", "script", "without", "waiting", "for", "the", "reply", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/script.go#L83-L85
164,434
gomodule/redigo
redis/script.go
Load
func (s *Script) Load(c Conn) error { _, err := c.Do("SCRIPT", "LOAD", s.src) return err }
go
func (s *Script) Load(c Conn) error { _, err := c.Do("SCRIPT", "LOAD", s.src) return err }
[ "func", "(", "s", "*", "Script", ")", "Load", "(", "c", "Conn", ")", "error", "{", "_", ",", "err", ":=", "c", ".", "Do", "(", "\"", "\"", ",", "\"", "\"", ",", "s", ".", "src", ")", "\n", "return", "err", "\n", "}" ]
// Load loads the script without evaluating it.
[ "Load", "loads", "the", "script", "without", "evaluating", "it", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/script.go#L88-L91
164,435
gomodule/redigo
redis/conn.go
DialReadTimeout
func DialReadTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.readTimeout = d }} }
go
func DialReadTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.readTimeout = d }} }
[ "func", "DialReadTimeout", "(", "d", "time", ".", "Duration", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "readTimeout", "=", "d", "\n", "}", "}", "\n", "}" ]
// DialReadTimeout specifies the timeout for reading a single command reply.
[ "DialReadTimeout", "specifies", "the", "timeout", "for", "reading", "a", "single", "command", "reply", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L90-L94
164,436
gomodule/redigo
redis/conn.go
DialWriteTimeout
func DialWriteTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.writeTimeout = d }} }
go
func DialWriteTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.writeTimeout = d }} }
[ "func", "DialWriteTimeout", "(", "d", "time", ".", "Duration", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "writeTimeout", "=", "d", "\n", "}", "}", "\n", "}" ]
// DialWriteTimeout specifies the timeout for writing a single command.
[ "DialWriteTimeout", "specifies", "the", "timeout", "for", "writing", "a", "single", "command", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L97-L101
164,437
gomodule/redigo
redis/conn.go
DialConnectTimeout
func DialConnectTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.dialer.Timeout = d }} }
go
func DialConnectTimeout(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.dialer.Timeout = d }} }
[ "func", "DialConnectTimeout", "(", "d", "time", ".", "Duration", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "dialer", ".", "Timeout", "=", "d", "\n", "}", "}", "\n", "}" ]
// DialConnectTimeout specifies the timeout for connecting to the Redis server when // no DialNetDial option is specified.
[ "DialConnectTimeout", "specifies", "the", "timeout", "for", "connecting", "to", "the", "Redis", "server", "when", "no", "DialNetDial", "option", "is", "specified", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L105-L109
164,438
gomodule/redigo
redis/conn.go
DialKeepAlive
func DialKeepAlive(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.dialer.KeepAlive = d }} }
go
func DialKeepAlive(d time.Duration) DialOption { return DialOption{func(do *dialOptions) { do.dialer.KeepAlive = d }} }
[ "func", "DialKeepAlive", "(", "d", "time", ".", "Duration", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "dialer", ".", "KeepAlive", "=", "d", "\n", "}", "}", "\n", "}" ]
// DialKeepAlive specifies the keep-alive period for TCP connections to the Redis server // when no DialNetDial option is specified. // If zero, keep-alives are not enabled. If no DialKeepAlive option is specified then // the default of 5 minutes is used to ensure that half-closed TCP sessions are detected.
[ "DialKeepAlive", "specifies", "the", "keep", "-", "alive", "period", "for", "TCP", "connections", "to", "the", "Redis", "server", "when", "no", "DialNetDial", "option", "is", "specified", ".", "If", "zero", "keep", "-", "alives", "are", "not", "enabled", ".", "If", "no", "DialKeepAlive", "option", "is", "specified", "then", "the", "default", "of", "5", "minutes", "is", "used", "to", "ensure", "that", "half", "-", "closed", "TCP", "sessions", "are", "detected", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L115-L119
164,439
gomodule/redigo
redis/conn.go
DialNetDial
func DialNetDial(dial func(network, addr string) (net.Conn, error)) DialOption { return DialOption{func(do *dialOptions) { do.dial = dial }} }
go
func DialNetDial(dial func(network, addr string) (net.Conn, error)) DialOption { return DialOption{func(do *dialOptions) { do.dial = dial }} }
[ "func", "DialNetDial", "(", "dial", "func", "(", "network", ",", "addr", "string", ")", "(", "net", ".", "Conn", ",", "error", ")", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "dial", "=", "dial", "\n", "}", "}", "\n", "}" ]
// DialNetDial specifies a custom dial function for creating TCP // connections, otherwise a net.Dialer customized via the other options is used. // DialNetDial overrides DialConnectTimeout and DialKeepAlive.
[ "DialNetDial", "specifies", "a", "custom", "dial", "function", "for", "creating", "TCP", "connections", "otherwise", "a", "net", ".", "Dialer", "customized", "via", "the", "other", "options", "is", "used", ".", "DialNetDial", "overrides", "DialConnectTimeout", "and", "DialKeepAlive", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L124-L128
164,440
gomodule/redigo
redis/conn.go
DialDatabase
func DialDatabase(db int) DialOption { return DialOption{func(do *dialOptions) { do.db = db }} }
go
func DialDatabase(db int) DialOption { return DialOption{func(do *dialOptions) { do.db = db }} }
[ "func", "DialDatabase", "(", "db", "int", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "db", "=", "db", "\n", "}", "}", "\n", "}" ]
// DialDatabase specifies the database to select when dialing a connection.
[ "DialDatabase", "specifies", "the", "database", "to", "select", "when", "dialing", "a", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L131-L135
164,441
gomodule/redigo
redis/conn.go
DialPassword
func DialPassword(password string) DialOption { return DialOption{func(do *dialOptions) { do.password = password }} }
go
func DialPassword(password string) DialOption { return DialOption{func(do *dialOptions) { do.password = password }} }
[ "func", "DialPassword", "(", "password", "string", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "password", "=", "password", "\n", "}", "}", "\n", "}" ]
// DialPassword specifies the password to use when connecting to // the Redis server.
[ "DialPassword", "specifies", "the", "password", "to", "use", "when", "connecting", "to", "the", "Redis", "server", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L139-L143
164,442
gomodule/redigo
redis/conn.go
DialClientName
func DialClientName(name string) DialOption { return DialOption{func(do *dialOptions) { do.clientName = name }} }
go
func DialClientName(name string) DialOption { return DialOption{func(do *dialOptions) { do.clientName = name }} }
[ "func", "DialClientName", "(", "name", "string", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "clientName", "=", "name", "\n", "}", "}", "\n", "}" ]
// DialClientName specifies a client name to be used // by the Redis server connection.
[ "DialClientName", "specifies", "a", "client", "name", "to", "be", "used", "by", "the", "Redis", "server", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L147-L151
164,443
gomodule/redigo
redis/conn.go
DialTLSConfig
func DialTLSConfig(c *tls.Config) DialOption { return DialOption{func(do *dialOptions) { do.tlsConfig = c }} }
go
func DialTLSConfig(c *tls.Config) DialOption { return DialOption{func(do *dialOptions) { do.tlsConfig = c }} }
[ "func", "DialTLSConfig", "(", "c", "*", "tls", ".", "Config", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "tlsConfig", "=", "c", "\n", "}", "}", "\n", "}" ]
// DialTLSConfig specifies the config to use when a TLS connection is dialed. // Has no effect when not dialing a TLS connection.
[ "DialTLSConfig", "specifies", "the", "config", "to", "use", "when", "a", "TLS", "connection", "is", "dialed", ".", "Has", "no", "effect", "when", "not", "dialing", "a", "TLS", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L155-L159
164,444
gomodule/redigo
redis/conn.go
DialTLSSkipVerify
func DialTLSSkipVerify(skip bool) DialOption { return DialOption{func(do *dialOptions) { do.skipVerify = skip }} }
go
func DialTLSSkipVerify(skip bool) DialOption { return DialOption{func(do *dialOptions) { do.skipVerify = skip }} }
[ "func", "DialTLSSkipVerify", "(", "skip", "bool", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "skipVerify", "=", "skip", "\n", "}", "}", "\n", "}" ]
// DialTLSSkipVerify disables server name verification when connecting over // TLS. Has no effect when not dialing a TLS connection.
[ "DialTLSSkipVerify", "disables", "server", "name", "verification", "when", "connecting", "over", "TLS", ".", "Has", "no", "effect", "when", "not", "dialing", "a", "TLS", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L163-L167
164,445
gomodule/redigo
redis/conn.go
DialUseTLS
func DialUseTLS(useTLS bool) DialOption { return DialOption{func(do *dialOptions) { do.useTLS = useTLS }} }
go
func DialUseTLS(useTLS bool) DialOption { return DialOption{func(do *dialOptions) { do.useTLS = useTLS }} }
[ "func", "DialUseTLS", "(", "useTLS", "bool", ")", "DialOption", "{", "return", "DialOption", "{", "func", "(", "do", "*", "dialOptions", ")", "{", "do", ".", "useTLS", "=", "useTLS", "\n", "}", "}", "\n", "}" ]
// DialUseTLS specifies whether TLS should be used when connecting to the // server. This option is ignore by DialURL.
[ "DialUseTLS", "specifies", "whether", "TLS", "should", "be", "used", "when", "connecting", "to", "the", "server", ".", "This", "option", "is", "ignore", "by", "DialURL", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L171-L175
164,446
gomodule/redigo
redis/conn.go
Dial
func Dial(network, address string, options ...DialOption) (Conn, error) { do := dialOptions{ dialer: &net.Dialer{ KeepAlive: time.Minute * 5, }, } for _, option := range options { option.f(&do) } if do.dial == nil { do.dial = do.dialer.Dial } netConn, err := do.dial(network, address) if err != nil { return nil, err } if do.useTLS { var tlsConfig *tls.Config if do.tlsConfig == nil { tlsConfig = &tls.Config{InsecureSkipVerify: do.skipVerify} } else { tlsConfig = cloneTLSConfig(do.tlsConfig) } if tlsConfig.ServerName == "" { host, _, err := net.SplitHostPort(address) if err != nil { netConn.Close() return nil, err } tlsConfig.ServerName = host } tlsConn := tls.Client(netConn, tlsConfig) if err := tlsConn.Handshake(); err != nil { netConn.Close() return nil, err } netConn = tlsConn } c := &conn{ conn: netConn, bw: bufio.NewWriter(netConn), br: bufio.NewReader(netConn), readTimeout: do.readTimeout, writeTimeout: do.writeTimeout, } if do.password != "" { if _, err := c.Do("AUTH", do.password); err != nil { netConn.Close() return nil, err } } if do.clientName != "" { if _, err := c.Do("CLIENT", "SETNAME", do.clientName); err != nil { netConn.Close() return nil, err } } if do.db != 0 { if _, err := c.Do("SELECT", do.db); err != nil { netConn.Close() return nil, err } } return c, nil }
go
func Dial(network, address string, options ...DialOption) (Conn, error) { do := dialOptions{ dialer: &net.Dialer{ KeepAlive: time.Minute * 5, }, } for _, option := range options { option.f(&do) } if do.dial == nil { do.dial = do.dialer.Dial } netConn, err := do.dial(network, address) if err != nil { return nil, err } if do.useTLS { var tlsConfig *tls.Config if do.tlsConfig == nil { tlsConfig = &tls.Config{InsecureSkipVerify: do.skipVerify} } else { tlsConfig = cloneTLSConfig(do.tlsConfig) } if tlsConfig.ServerName == "" { host, _, err := net.SplitHostPort(address) if err != nil { netConn.Close() return nil, err } tlsConfig.ServerName = host } tlsConn := tls.Client(netConn, tlsConfig) if err := tlsConn.Handshake(); err != nil { netConn.Close() return nil, err } netConn = tlsConn } c := &conn{ conn: netConn, bw: bufio.NewWriter(netConn), br: bufio.NewReader(netConn), readTimeout: do.readTimeout, writeTimeout: do.writeTimeout, } if do.password != "" { if _, err := c.Do("AUTH", do.password); err != nil { netConn.Close() return nil, err } } if do.clientName != "" { if _, err := c.Do("CLIENT", "SETNAME", do.clientName); err != nil { netConn.Close() return nil, err } } if do.db != 0 { if _, err := c.Do("SELECT", do.db); err != nil { netConn.Close() return nil, err } } return c, nil }
[ "func", "Dial", "(", "network", ",", "address", "string", ",", "options", "...", "DialOption", ")", "(", "Conn", ",", "error", ")", "{", "do", ":=", "dialOptions", "{", "dialer", ":", "&", "net", ".", "Dialer", "{", "KeepAlive", ":", "time", ".", "Minute", "*", "5", ",", "}", ",", "}", "\n", "for", "_", ",", "option", ":=", "range", "options", "{", "option", ".", "f", "(", "&", "do", ")", "\n", "}", "\n", "if", "do", ".", "dial", "==", "nil", "{", "do", ".", "dial", "=", "do", ".", "dialer", ".", "Dial", "\n", "}", "\n\n", "netConn", ",", "err", ":=", "do", ".", "dial", "(", "network", ",", "address", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "if", "do", ".", "useTLS", "{", "var", "tlsConfig", "*", "tls", ".", "Config", "\n", "if", "do", ".", "tlsConfig", "==", "nil", "{", "tlsConfig", "=", "&", "tls", ".", "Config", "{", "InsecureSkipVerify", ":", "do", ".", "skipVerify", "}", "\n", "}", "else", "{", "tlsConfig", "=", "cloneTLSConfig", "(", "do", ".", "tlsConfig", ")", "\n", "}", "\n", "if", "tlsConfig", ".", "ServerName", "==", "\"", "\"", "{", "host", ",", "_", ",", "err", ":=", "net", ".", "SplitHostPort", "(", "address", ")", "\n", "if", "err", "!=", "nil", "{", "netConn", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "tlsConfig", ".", "ServerName", "=", "host", "\n", "}", "\n\n", "tlsConn", ":=", "tls", ".", "Client", "(", "netConn", ",", "tlsConfig", ")", "\n", "if", "err", ":=", "tlsConn", ".", "Handshake", "(", ")", ";", "err", "!=", "nil", "{", "netConn", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "netConn", "=", "tlsConn", "\n", "}", "\n\n", "c", ":=", "&", "conn", "{", "conn", ":", "netConn", ",", "bw", ":", "bufio", ".", "NewWriter", "(", "netConn", ")", ",", "br", ":", "bufio", ".", "NewReader", "(", "netConn", ")", ",", "readTimeout", ":", "do", ".", "readTimeout", ",", "writeTimeout", ":", "do", ".", "writeTimeout", ",", "}", "\n\n", "if", "do", ".", "password", "!=", "\"", "\"", "{", "if", "_", ",", "err", ":=", "c", ".", "Do", "(", "\"", "\"", ",", "do", ".", "password", ")", ";", "err", "!=", "nil", "{", "netConn", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "if", "do", ".", "clientName", "!=", "\"", "\"", "{", "if", "_", ",", "err", ":=", "c", ".", "Do", "(", "\"", "\"", ",", "\"", "\"", ",", "do", ".", "clientName", ")", ";", "err", "!=", "nil", "{", "netConn", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "if", "do", ".", "db", "!=", "0", "{", "if", "_", ",", "err", ":=", "c", ".", "Do", "(", "\"", "\"", ",", "do", ".", "db", ")", ";", "err", "!=", "nil", "{", "netConn", ".", "Close", "(", ")", "\n", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n\n", "return", "c", ",", "nil", "\n", "}" ]
// Dial connects to the Redis server at the given network and // address using the specified options.
[ "Dial", "connects", "to", "the", "Redis", "server", "at", "the", "given", "network", "and", "address", "using", "the", "specified", "options", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L179-L251
164,447
gomodule/redigo
redis/conn.go
NewConn
func NewConn(netConn net.Conn, readTimeout, writeTimeout time.Duration) Conn { return &conn{ conn: netConn, bw: bufio.NewWriter(netConn), br: bufio.NewReader(netConn), readTimeout: readTimeout, writeTimeout: writeTimeout, } }
go
func NewConn(netConn net.Conn, readTimeout, writeTimeout time.Duration) Conn { return &conn{ conn: netConn, bw: bufio.NewWriter(netConn), br: bufio.NewReader(netConn), readTimeout: readTimeout, writeTimeout: writeTimeout, } }
[ "func", "NewConn", "(", "netConn", "net", ".", "Conn", ",", "readTimeout", ",", "writeTimeout", "time", ".", "Duration", ")", "Conn", "{", "return", "&", "conn", "{", "conn", ":", "netConn", ",", "bw", ":", "bufio", ".", "NewWriter", "(", "netConn", ")", ",", "br", ":", "bufio", ".", "NewReader", "(", "netConn", ")", ",", "readTimeout", ":", "readTimeout", ",", "writeTimeout", ":", "writeTimeout", ",", "}", "\n", "}" ]
// NewConn returns a new Redigo connection for the given net connection.
[ "NewConn", "returns", "a", "new", "Redigo", "connection", "for", "the", "given", "net", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L310-L318
164,448
gomodule/redigo
redis/conn.go
readLine
func (c *conn) readLine() ([]byte, error) { // To avoid allocations, attempt to read the line using ReadSlice. This // call typically succeeds. The known case where the call fails is when // reading the output from the MONITOR command. p, err := c.br.ReadSlice('\n') if err == bufio.ErrBufferFull { // The line does not fit in the bufio.Reader's buffer. Fall back to // allocating a buffer for the line. buf := append([]byte{}, p...) for err == bufio.ErrBufferFull { p, err = c.br.ReadSlice('\n') buf = append(buf, p...) } p = buf } if err != nil { return nil, err } i := len(p) - 2 if i < 0 || p[i] != '\r' { return nil, protocolError("bad response line terminator") } return p[:i], nil }
go
func (c *conn) readLine() ([]byte, error) { // To avoid allocations, attempt to read the line using ReadSlice. This // call typically succeeds. The known case where the call fails is when // reading the output from the MONITOR command. p, err := c.br.ReadSlice('\n') if err == bufio.ErrBufferFull { // The line does not fit in the bufio.Reader's buffer. Fall back to // allocating a buffer for the line. buf := append([]byte{}, p...) for err == bufio.ErrBufferFull { p, err = c.br.ReadSlice('\n') buf = append(buf, p...) } p = buf } if err != nil { return nil, err } i := len(p) - 2 if i < 0 || p[i] != '\r' { return nil, protocolError("bad response line terminator") } return p[:i], nil }
[ "func", "(", "c", "*", "conn", ")", "readLine", "(", ")", "(", "[", "]", "byte", ",", "error", ")", "{", "// To avoid allocations, attempt to read the line using ReadSlice. This", "// call typically succeeds. The known case where the call fails is when", "// reading the output from the MONITOR command.", "p", ",", "err", ":=", "c", ".", "br", ".", "ReadSlice", "(", "'\\n'", ")", "\n", "if", "err", "==", "bufio", ".", "ErrBufferFull", "{", "// The line does not fit in the bufio.Reader's buffer. Fall back to", "// allocating a buffer for the line.", "buf", ":=", "append", "(", "[", "]", "byte", "{", "}", ",", "p", "...", ")", "\n", "for", "err", "==", "bufio", ".", "ErrBufferFull", "{", "p", ",", "err", "=", "c", ".", "br", ".", "ReadSlice", "(", "'\\n'", ")", "\n", "buf", "=", "append", "(", "buf", ",", "p", "...", ")", "\n", "}", "\n", "p", "=", "buf", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "i", ":=", "len", "(", "p", ")", "-", "2", "\n", "if", "i", "<", "0", "||", "p", "[", "i", "]", "!=", "'\\r'", "{", "return", "nil", ",", "protocolError", "(", "\"", "\"", ")", "\n", "}", "\n", "return", "p", "[", ":", "i", "]", ",", "nil", "\n", "}" ]
// readLine reads a line of input from the RESP stream.
[ "readLine", "reads", "a", "line", "of", "input", "from", "the", "RESP", "stream", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L447-L470
164,449
gomodule/redigo
redis/conn.go
parseLen
func parseLen(p []byte) (int, error) { if len(p) == 0 { return -1, protocolError("malformed length") } if p[0] == '-' && len(p) == 2 && p[1] == '1' { // handle $-1 and $-1 null replies. return -1, nil } var n int for _, b := range p { n *= 10 if b < '0' || b > '9' { return -1, protocolError("illegal bytes in length") } n += int(b - '0') } return n, nil }
go
func parseLen(p []byte) (int, error) { if len(p) == 0 { return -1, protocolError("malformed length") } if p[0] == '-' && len(p) == 2 && p[1] == '1' { // handle $-1 and $-1 null replies. return -1, nil } var n int for _, b := range p { n *= 10 if b < '0' || b > '9' { return -1, protocolError("illegal bytes in length") } n += int(b - '0') } return n, nil }
[ "func", "parseLen", "(", "p", "[", "]", "byte", ")", "(", "int", ",", "error", ")", "{", "if", "len", "(", "p", ")", "==", "0", "{", "return", "-", "1", ",", "protocolError", "(", "\"", "\"", ")", "\n", "}", "\n\n", "if", "p", "[", "0", "]", "==", "'-'", "&&", "len", "(", "p", ")", "==", "2", "&&", "p", "[", "1", "]", "==", "'1'", "{", "// handle $-1 and $-1 null replies.", "return", "-", "1", ",", "nil", "\n", "}", "\n\n", "var", "n", "int", "\n", "for", "_", ",", "b", ":=", "range", "p", "{", "n", "*=", "10", "\n", "if", "b", "<", "'0'", "||", "b", ">", "'9'", "{", "return", "-", "1", ",", "protocolError", "(", "\"", "\"", ")", "\n", "}", "\n", "n", "+=", "int", "(", "b", "-", "'0'", ")", "\n", "}", "\n\n", "return", "n", ",", "nil", "\n", "}" ]
// parseLen parses bulk string and array lengths.
[ "parseLen", "parses", "bulk", "string", "and", "array", "lengths", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/conn.go#L473-L493
164,450
gomodule/redigo
redisx/connmux.go
Get
func (p *ConnMux) Get() redis.Conn { c := &muxConn{p: p} c.ids = c.buf[:0] return c }
go
func (p *ConnMux) Get() redis.Conn { c := &muxConn{p: p} c.ids = c.buf[:0] return c }
[ "func", "(", "p", "*", "ConnMux", ")", "Get", "(", ")", "redis", ".", "Conn", "{", "c", ":=", "&", "muxConn", "{", "p", ":", "p", "}", "\n", "c", ".", "ids", "=", "c", ".", "buf", "[", ":", "0", "]", "\n", "return", "c", "\n", "}" ]
// Get gets a connection. The application must close the returned connection.
[ "Get", "gets", "a", "connection", ".", "The", "application", "must", "close", "the", "returned", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redisx/connmux.go#L44-L48
164,451
gomodule/redigo
redis/pubsub.go
Subscribe
func (c PubSubConn) Subscribe(channel ...interface{}) error { c.Conn.Send("SUBSCRIBE", channel...) return c.Conn.Flush() }
go
func (c PubSubConn) Subscribe(channel ...interface{}) error { c.Conn.Send("SUBSCRIBE", channel...) return c.Conn.Flush() }
[ "func", "(", "c", "PubSubConn", ")", "Subscribe", "(", "channel", "...", "interface", "{", "}", ")", "error", "{", "c", ".", "Conn", ".", "Send", "(", "\"", "\"", ",", "channel", "...", ")", "\n", "return", "c", ".", "Conn", ".", "Flush", "(", ")", "\n", "}" ]
// Subscribe subscribes the connection to the specified channels.
[ "Subscribe", "subscribes", "the", "connection", "to", "the", "specified", "channels", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L62-L65
164,452
gomodule/redigo
redis/pubsub.go
PSubscribe
func (c PubSubConn) PSubscribe(channel ...interface{}) error { c.Conn.Send("PSUBSCRIBE", channel...) return c.Conn.Flush() }
go
func (c PubSubConn) PSubscribe(channel ...interface{}) error { c.Conn.Send("PSUBSCRIBE", channel...) return c.Conn.Flush() }
[ "func", "(", "c", "PubSubConn", ")", "PSubscribe", "(", "channel", "...", "interface", "{", "}", ")", "error", "{", "c", ".", "Conn", ".", "Send", "(", "\"", "\"", ",", "channel", "...", ")", "\n", "return", "c", ".", "Conn", ".", "Flush", "(", ")", "\n", "}" ]
// PSubscribe subscribes the connection to the given patterns.
[ "PSubscribe", "subscribes", "the", "connection", "to", "the", "given", "patterns", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L68-L71
164,453
gomodule/redigo
redis/pubsub.go
Unsubscribe
func (c PubSubConn) Unsubscribe(channel ...interface{}) error { c.Conn.Send("UNSUBSCRIBE", channel...) return c.Conn.Flush() }
go
func (c PubSubConn) Unsubscribe(channel ...interface{}) error { c.Conn.Send("UNSUBSCRIBE", channel...) return c.Conn.Flush() }
[ "func", "(", "c", "PubSubConn", ")", "Unsubscribe", "(", "channel", "...", "interface", "{", "}", ")", "error", "{", "c", ".", "Conn", ".", "Send", "(", "\"", "\"", ",", "channel", "...", ")", "\n", "return", "c", ".", "Conn", ".", "Flush", "(", ")", "\n", "}" ]
// Unsubscribe unsubscribes the connection from the given channels, or from all // of them if none is given.
[ "Unsubscribe", "unsubscribes", "the", "connection", "from", "the", "given", "channels", "or", "from", "all", "of", "them", "if", "none", "is", "given", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L75-L78
164,454
gomodule/redigo
redis/pubsub.go
PUnsubscribe
func (c PubSubConn) PUnsubscribe(channel ...interface{}) error { c.Conn.Send("PUNSUBSCRIBE", channel...) return c.Conn.Flush() }
go
func (c PubSubConn) PUnsubscribe(channel ...interface{}) error { c.Conn.Send("PUNSUBSCRIBE", channel...) return c.Conn.Flush() }
[ "func", "(", "c", "PubSubConn", ")", "PUnsubscribe", "(", "channel", "...", "interface", "{", "}", ")", "error", "{", "c", ".", "Conn", ".", "Send", "(", "\"", "\"", ",", "channel", "...", ")", "\n", "return", "c", ".", "Conn", ".", "Flush", "(", ")", "\n", "}" ]
// PUnsubscribe unsubscribes the connection from the given patterns, or from all // of them if none is given.
[ "PUnsubscribe", "unsubscribes", "the", "connection", "from", "the", "given", "patterns", "or", "from", "all", "of", "them", "if", "none", "is", "given", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L82-L85
164,455
gomodule/redigo
redis/pubsub.go
Ping
func (c PubSubConn) Ping(data string) error { c.Conn.Send("PING", data) return c.Conn.Flush() }
go
func (c PubSubConn) Ping(data string) error { c.Conn.Send("PING", data) return c.Conn.Flush() }
[ "func", "(", "c", "PubSubConn", ")", "Ping", "(", "data", "string", ")", "error", "{", "c", ".", "Conn", ".", "Send", "(", "\"", "\"", ",", "data", ")", "\n", "return", "c", ".", "Conn", ".", "Flush", "(", ")", "\n", "}" ]
// Ping sends a PING to the server with the specified data. // // The connection must be subscribed to at least one channel or pattern when // calling this method.
[ "Ping", "sends", "a", "PING", "to", "the", "server", "with", "the", "specified", "data", ".", "The", "connection", "must", "be", "subscribed", "to", "at", "least", "one", "channel", "or", "pattern", "when", "calling", "this", "method", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L91-L94
164,456
gomodule/redigo
redis/pubsub.go
ReceiveWithTimeout
func (c PubSubConn) ReceiveWithTimeout(timeout time.Duration) interface{} { return c.receiveInternal(ReceiveWithTimeout(c.Conn, timeout)) }
go
func (c PubSubConn) ReceiveWithTimeout(timeout time.Duration) interface{} { return c.receiveInternal(ReceiveWithTimeout(c.Conn, timeout)) }
[ "func", "(", "c", "PubSubConn", ")", "ReceiveWithTimeout", "(", "timeout", "time", ".", "Duration", ")", "interface", "{", "}", "{", "return", "c", ".", "receiveInternal", "(", "ReceiveWithTimeout", "(", "c", ".", "Conn", ",", "timeout", ")", ")", "\n", "}" ]
// ReceiveWithTimeout is like Receive, but it allows the application to // override the connection's default timeout.
[ "ReceiveWithTimeout", "is", "like", "Receive", "but", "it", "allows", "the", "application", "to", "override", "the", "connection", "s", "default", "timeout", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/pubsub.go#L105-L107
164,457
gomodule/redigo
redis/scan.go
AddFlat
func (args Args) AddFlat(v interface{}) Args { rv := reflect.ValueOf(v) switch rv.Kind() { case reflect.Struct: args = flattenStruct(args, rv) case reflect.Slice: for i := 0; i < rv.Len(); i++ { args = append(args, rv.Index(i).Interface()) } case reflect.Map: for _, k := range rv.MapKeys() { args = append(args, k.Interface(), rv.MapIndex(k).Interface()) } case reflect.Ptr: if rv.Type().Elem().Kind() == reflect.Struct { if !rv.IsNil() { args = flattenStruct(args, rv.Elem()) } } else { args = append(args, v) } default: args = append(args, v) } return args }
go
func (args Args) AddFlat(v interface{}) Args { rv := reflect.ValueOf(v) switch rv.Kind() { case reflect.Struct: args = flattenStruct(args, rv) case reflect.Slice: for i := 0; i < rv.Len(); i++ { args = append(args, rv.Index(i).Interface()) } case reflect.Map: for _, k := range rv.MapKeys() { args = append(args, k.Interface(), rv.MapIndex(k).Interface()) } case reflect.Ptr: if rv.Type().Elem().Kind() == reflect.Struct { if !rv.IsNil() { args = flattenStruct(args, rv.Elem()) } } else { args = append(args, v) } default: args = append(args, v) } return args }
[ "func", "(", "args", "Args", ")", "AddFlat", "(", "v", "interface", "{", "}", ")", "Args", "{", "rv", ":=", "reflect", ".", "ValueOf", "(", "v", ")", "\n", "switch", "rv", ".", "Kind", "(", ")", "{", "case", "reflect", ".", "Struct", ":", "args", "=", "flattenStruct", "(", "args", ",", "rv", ")", "\n", "case", "reflect", ".", "Slice", ":", "for", "i", ":=", "0", ";", "i", "<", "rv", ".", "Len", "(", ")", ";", "i", "++", "{", "args", "=", "append", "(", "args", ",", "rv", ".", "Index", "(", "i", ")", ".", "Interface", "(", ")", ")", "\n", "}", "\n", "case", "reflect", ".", "Map", ":", "for", "_", ",", "k", ":=", "range", "rv", ".", "MapKeys", "(", ")", "{", "args", "=", "append", "(", "args", ",", "k", ".", "Interface", "(", ")", ",", "rv", ".", "MapIndex", "(", "k", ")", ".", "Interface", "(", ")", ")", "\n", "}", "\n", "case", "reflect", ".", "Ptr", ":", "if", "rv", ".", "Type", "(", ")", ".", "Elem", "(", ")", ".", "Kind", "(", ")", "==", "reflect", ".", "Struct", "{", "if", "!", "rv", ".", "IsNil", "(", ")", "{", "args", "=", "flattenStruct", "(", "args", ",", "rv", ".", "Elem", "(", ")", ")", "\n", "}", "\n", "}", "else", "{", "args", "=", "append", "(", "args", ",", "v", ")", "\n", "}", "\n", "default", ":", "args", "=", "append", "(", "args", ",", "v", ")", "\n", "}", "\n", "return", "args", "\n", "}" ]
// AddFlat returns the result of appending the flattened value of v to args. // // Maps are flattened by appending the alternating keys and map values to args. // // Slices are flattened by appending the slice elements to args. // // Structs are flattened by appending the alternating names and values of // exported fields to args. If v is a nil struct pointer, then nothing is // appended. The 'redis' field tag overrides struct field names. See ScanStruct // for more information on the use of the 'redis' field tag. // // Other types are appended to args as is.
[ "AddFlat", "returns", "the", "result", "of", "appending", "the", "flattened", "value", "of", "v", "to", "args", ".", "Maps", "are", "flattened", "by", "appending", "the", "alternating", "keys", "and", "map", "values", "to", "args", ".", "Slices", "are", "flattened", "by", "appending", "the", "slice", "elements", "to", "args", ".", "Structs", "are", "flattened", "by", "appending", "the", "alternating", "names", "and", "values", "of", "exported", "fields", "to", "args", ".", "If", "v", "is", "a", "nil", "struct", "pointer", "then", "nothing", "is", "appended", ".", "The", "redis", "field", "tag", "overrides", "struct", "field", "names", ".", "See", "ScanStruct", "for", "more", "information", "on", "the", "use", "of", "the", "redis", "field", "tag", ".", "Other", "types", "are", "appended", "to", "args", "as", "is", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/scan.go#L576-L601
164,458
gomodule/redigo
redis/log.go
NewLoggingConn
func NewLoggingConn(conn Conn, logger *log.Logger, prefix string) Conn { if prefix != "" { prefix = prefix + "." } return &loggingConn{conn, logger, prefix, nil} }
go
func NewLoggingConn(conn Conn, logger *log.Logger, prefix string) Conn { if prefix != "" { prefix = prefix + "." } return &loggingConn{conn, logger, prefix, nil} }
[ "func", "NewLoggingConn", "(", "conn", "Conn", ",", "logger", "*", "log", ".", "Logger", ",", "prefix", "string", ")", "Conn", "{", "if", "prefix", "!=", "\"", "\"", "{", "prefix", "=", "prefix", "+", "\"", "\"", "\n", "}", "\n", "return", "&", "loggingConn", "{", "conn", ",", "logger", ",", "prefix", ",", "nil", "}", "\n", "}" ]
// NewLoggingConn returns a logging wrapper around a connection.
[ "NewLoggingConn", "returns", "a", "logging", "wrapper", "around", "a", "connection", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/log.go#L29-L34
164,459
gomodule/redigo
redis/log.go
NewLoggingConnFilter
func NewLoggingConnFilter(conn Conn, logger *log.Logger, prefix string, skip func(cmdName string) bool) Conn { if prefix != "" { prefix = prefix + "." } return &loggingConn{conn, logger, prefix, skip} }
go
func NewLoggingConnFilter(conn Conn, logger *log.Logger, prefix string, skip func(cmdName string) bool) Conn { if prefix != "" { prefix = prefix + "." } return &loggingConn{conn, logger, prefix, skip} }
[ "func", "NewLoggingConnFilter", "(", "conn", "Conn", ",", "logger", "*", "log", ".", "Logger", ",", "prefix", "string", ",", "skip", "func", "(", "cmdName", "string", ")", "bool", ")", "Conn", "{", "if", "prefix", "!=", "\"", "\"", "{", "prefix", "=", "prefix", "+", "\"", "\"", "\n", "}", "\n", "return", "&", "loggingConn", "{", "conn", ",", "logger", ",", "prefix", ",", "skip", "}", "\n", "}" ]
//NewLoggingConnFilter returns a logging wrapper around a connection and a filter function.
[ "NewLoggingConnFilter", "returns", "a", "logging", "wrapper", "around", "a", "connection", "and", "a", "filter", "function", "." ]
39e2c31b7ca38b521ceb836620a269e62c895dc9
https://github.com/gomodule/redigo/blob/39e2c31b7ca38b521ceb836620a269e62c895dc9/redis/log.go#L37-L42
164,460
opencontainers/runc
tty.go
ClosePostStart
func (t *tty) ClosePostStart() error { for _, c := range t.postStart { c.Close() } return nil }
go
func (t *tty) ClosePostStart() error { for _, c := range t.postStart { c.Close() } return nil }
[ "func", "(", "t", "*", "tty", ")", "ClosePostStart", "(", ")", "error", "{", "for", "_", ",", "c", ":=", "range", "t", ".", "postStart", "{", "c", ".", "Close", "(", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// ClosePostStart closes any fds that are provided to the container and dup2'd // so that we no longer have copy in our process.
[ "ClosePostStart", "closes", "any", "fds", "that", "are", "provided", "to", "the", "container", "and", "dup2", "d", "so", "that", "we", "no", "longer", "have", "copy", "in", "our", "process", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/tty.go#L136-L141
164,461
opencontainers/runc
libcontainer/stacktrace/frame.go
NewFrame
func NewFrame(pc uintptr, file string, line int) Frame { fn := runtime.FuncForPC(pc) if fn == nil { return Frame{} } pack, name := parseFunctionName(fn.Name()) return Frame{ Line: line, File: filepath.Base(file), Package: pack, Function: name, } }
go
func NewFrame(pc uintptr, file string, line int) Frame { fn := runtime.FuncForPC(pc) if fn == nil { return Frame{} } pack, name := parseFunctionName(fn.Name()) return Frame{ Line: line, File: filepath.Base(file), Package: pack, Function: name, } }
[ "func", "NewFrame", "(", "pc", "uintptr", ",", "file", "string", ",", "line", "int", ")", "Frame", "{", "fn", ":=", "runtime", ".", "FuncForPC", "(", "pc", ")", "\n", "if", "fn", "==", "nil", "{", "return", "Frame", "{", "}", "\n", "}", "\n", "pack", ",", "name", ":=", "parseFunctionName", "(", "fn", ".", "Name", "(", ")", ")", "\n", "return", "Frame", "{", "Line", ":", "line", ",", "File", ":", "filepath", ".", "Base", "(", "file", ")", ",", "Package", ":", "pack", ",", "Function", ":", "name", ",", "}", "\n", "}" ]
// NewFrame returns a new stack frame for the provided information
[ "NewFrame", "returns", "a", "new", "stack", "frame", "for", "the", "provided", "information" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/stacktrace/frame.go#L10-L22
164,462
opencontainers/runc
libcontainer/cgroups/fs/cpuacct.go
getCpuUsageBreakdown
func getCpuUsageBreakdown(path string) (uint64, uint64, error) { userModeUsage := uint64(0) kernelModeUsage := uint64(0) const ( userField = "user" systemField = "system" ) // Expected format: // user <usage in ticks> // system <usage in ticks> data, err := ioutil.ReadFile(filepath.Join(path, cgroupCpuacctStat)) if err != nil { return 0, 0, err } fields := strings.Fields(string(data)) if len(fields) != 4 { return 0, 0, fmt.Errorf("failure - %s is expected to have 4 fields", filepath.Join(path, cgroupCpuacctStat)) } if fields[0] != userField { return 0, 0, fmt.Errorf("unexpected field %q in %q, expected %q", fields[0], cgroupCpuacctStat, userField) } if fields[2] != systemField { return 0, 0, fmt.Errorf("unexpected field %q in %q, expected %q", fields[2], cgroupCpuacctStat, systemField) } if userModeUsage, err = strconv.ParseUint(fields[1], 10, 64); err != nil { return 0, 0, err } if kernelModeUsage, err = strconv.ParseUint(fields[3], 10, 64); err != nil { return 0, 0, err } return (userModeUsage * nanosecondsInSecond) / clockTicks, (kernelModeUsage * nanosecondsInSecond) / clockTicks, nil }
go
func getCpuUsageBreakdown(path string) (uint64, uint64, error) { userModeUsage := uint64(0) kernelModeUsage := uint64(0) const ( userField = "user" systemField = "system" ) // Expected format: // user <usage in ticks> // system <usage in ticks> data, err := ioutil.ReadFile(filepath.Join(path, cgroupCpuacctStat)) if err != nil { return 0, 0, err } fields := strings.Fields(string(data)) if len(fields) != 4 { return 0, 0, fmt.Errorf("failure - %s is expected to have 4 fields", filepath.Join(path, cgroupCpuacctStat)) } if fields[0] != userField { return 0, 0, fmt.Errorf("unexpected field %q in %q, expected %q", fields[0], cgroupCpuacctStat, userField) } if fields[2] != systemField { return 0, 0, fmt.Errorf("unexpected field %q in %q, expected %q", fields[2], cgroupCpuacctStat, systemField) } if userModeUsage, err = strconv.ParseUint(fields[1], 10, 64); err != nil { return 0, 0, err } if kernelModeUsage, err = strconv.ParseUint(fields[3], 10, 64); err != nil { return 0, 0, err } return (userModeUsage * nanosecondsInSecond) / clockTicks, (kernelModeUsage * nanosecondsInSecond) / clockTicks, nil }
[ "func", "getCpuUsageBreakdown", "(", "path", "string", ")", "(", "uint64", ",", "uint64", ",", "error", ")", "{", "userModeUsage", ":=", "uint64", "(", "0", ")", "\n", "kernelModeUsage", ":=", "uint64", "(", "0", ")", "\n", "const", "(", "userField", "=", "\"", "\"", "\n", "systemField", "=", "\"", "\"", "\n", ")", "\n\n", "// Expected format:", "// user <usage in ticks>", "// system <usage in ticks>", "data", ",", "err", ":=", "ioutil", ".", "ReadFile", "(", "filepath", ".", "Join", "(", "path", ",", "cgroupCpuacctStat", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "0", ",", "0", ",", "err", "\n", "}", "\n", "fields", ":=", "strings", ".", "Fields", "(", "string", "(", "data", ")", ")", "\n", "if", "len", "(", "fields", ")", "!=", "4", "{", "return", "0", ",", "0", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "filepath", ".", "Join", "(", "path", ",", "cgroupCpuacctStat", ")", ")", "\n", "}", "\n", "if", "fields", "[", "0", "]", "!=", "userField", "{", "return", "0", ",", "0", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "fields", "[", "0", "]", ",", "cgroupCpuacctStat", ",", "userField", ")", "\n", "}", "\n", "if", "fields", "[", "2", "]", "!=", "systemField", "{", "return", "0", ",", "0", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "fields", "[", "2", "]", ",", "cgroupCpuacctStat", ",", "systemField", ")", "\n", "}", "\n", "if", "userModeUsage", ",", "err", "=", "strconv", ".", "ParseUint", "(", "fields", "[", "1", "]", ",", "10", ",", "64", ")", ";", "err", "!=", "nil", "{", "return", "0", ",", "0", ",", "err", "\n", "}", "\n", "if", "kernelModeUsage", ",", "err", "=", "strconv", ".", "ParseUint", "(", "fields", "[", "3", "]", ",", "10", ",", "64", ")", ";", "err", "!=", "nil", "{", "return", "0", ",", "0", ",", "err", "\n", "}", "\n\n", "return", "(", "userModeUsage", "*", "nanosecondsInSecond", ")", "/", "clockTicks", ",", "(", "kernelModeUsage", "*", "nanosecondsInSecond", ")", "/", "clockTicks", ",", "nil", "\n", "}" ]
// Returns user and kernel usage breakdown in nanoseconds.
[ "Returns", "user", "and", "kernel", "usage", "breakdown", "in", "nanoseconds", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/cgroups/fs/cpuacct.go#L72-L105
164,463
opencontainers/runc
libcontainer/capabilities_linux.go
ApplyBoundingSet
func (c *containerCapabilities) ApplyBoundingSet() error { c.pid.Clear(capability.BOUNDS) c.pid.Set(capability.BOUNDS, c.bounding...) return c.pid.Apply(capability.BOUNDS) }
go
func (c *containerCapabilities) ApplyBoundingSet() error { c.pid.Clear(capability.BOUNDS) c.pid.Set(capability.BOUNDS, c.bounding...) return c.pid.Apply(capability.BOUNDS) }
[ "func", "(", "c", "*", "containerCapabilities", ")", "ApplyBoundingSet", "(", ")", "error", "{", "c", ".", "pid", ".", "Clear", "(", "capability", ".", "BOUNDS", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "BOUNDS", ",", "c", ".", "bounding", "...", ")", "\n", "return", "c", ".", "pid", ".", "Apply", "(", "capability", ".", "BOUNDS", ")", "\n", "}" ]
// ApplyBoundingSet sets the capability bounding set to those specified in the whitelist.
[ "ApplyBoundingSet", "sets", "the", "capability", "bounding", "set", "to", "those", "specified", "in", "the", "whitelist", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/capabilities_linux.go#L98-L102
164,464
opencontainers/runc
libcontainer/capabilities_linux.go
ApplyCaps
func (c *containerCapabilities) ApplyCaps() error { c.pid.Clear(allCapabilityTypes) c.pid.Set(capability.BOUNDS, c.bounding...) c.pid.Set(capability.PERMITTED, c.permitted...) c.pid.Set(capability.INHERITABLE, c.inheritable...) c.pid.Set(capability.EFFECTIVE, c.effective...) c.pid.Set(capability.AMBIENT, c.ambient...) return c.pid.Apply(allCapabilityTypes) }
go
func (c *containerCapabilities) ApplyCaps() error { c.pid.Clear(allCapabilityTypes) c.pid.Set(capability.BOUNDS, c.bounding...) c.pid.Set(capability.PERMITTED, c.permitted...) c.pid.Set(capability.INHERITABLE, c.inheritable...) c.pid.Set(capability.EFFECTIVE, c.effective...) c.pid.Set(capability.AMBIENT, c.ambient...) return c.pid.Apply(allCapabilityTypes) }
[ "func", "(", "c", "*", "containerCapabilities", ")", "ApplyCaps", "(", ")", "error", "{", "c", ".", "pid", ".", "Clear", "(", "allCapabilityTypes", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "BOUNDS", ",", "c", ".", "bounding", "...", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "PERMITTED", ",", "c", ".", "permitted", "...", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "INHERITABLE", ",", "c", ".", "inheritable", "...", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "EFFECTIVE", ",", "c", ".", "effective", "...", ")", "\n", "c", ".", "pid", ".", "Set", "(", "capability", ".", "AMBIENT", ",", "c", ".", "ambient", "...", ")", "\n", "return", "c", ".", "pid", ".", "Apply", "(", "allCapabilityTypes", ")", "\n", "}" ]
// Apply sets all the capabilities for the current process in the config.
[ "Apply", "sets", "all", "the", "capabilities", "for", "the", "current", "process", "in", "the", "config", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/capabilities_linux.go#L105-L113
164,465
opencontainers/runc
libcontainer/generic_error.go
createSystemError
func createSystemError(err error, cause string) Error { gerr := &genericError{ Timestamp: time.Now(), Err: err, ECode: SystemError, Cause: cause, Stack: stacktrace.Capture(2), } if err != nil { gerr.Message = err.Error() } return gerr }
go
func createSystemError(err error, cause string) Error { gerr := &genericError{ Timestamp: time.Now(), Err: err, ECode: SystemError, Cause: cause, Stack: stacktrace.Capture(2), } if err != nil { gerr.Message = err.Error() } return gerr }
[ "func", "createSystemError", "(", "err", "error", ",", "cause", "string", ")", "Error", "{", "gerr", ":=", "&", "genericError", "{", "Timestamp", ":", "time", ".", "Now", "(", ")", ",", "Err", ":", "err", ",", "ECode", ":", "SystemError", ",", "Cause", ":", "cause", ",", "Stack", ":", "stacktrace", ".", "Capture", "(", "2", ")", ",", "}", "\n", "if", "err", "!=", "nil", "{", "gerr", ".", "Message", "=", "err", ".", "Error", "(", ")", "\n", "}", "\n", "return", "gerr", "\n", "}" ]
// createSystemError creates the specified error with the correct number of // stack frames skipped. This is only to be called by the other functions for // formatting the error.
[ "createSystemError", "creates", "the", "specified", "error", "with", "the", "correct", "number", "of", "stack", "frames", "skipped", ".", "This", "is", "only", "to", "be", "called", "by", "the", "other", "functions", "for", "formatting", "the", "error", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/generic_error.go#L55-L67
164,466
opencontainers/runc
libcontainer/system/linux.go
GetParentNSeuid
func GetParentNSeuid() int64 { euid := int64(os.Geteuid()) uidmap, err := user.CurrentProcessUIDMap() if err != nil { // This kernel-provided file only exists if user namespaces are supported return euid } for _, um := range uidmap { if um.ID <= euid && euid <= um.ID+um.Count-1 { return um.ParentID + euid - um.ID } } return euid }
go
func GetParentNSeuid() int64 { euid := int64(os.Geteuid()) uidmap, err := user.CurrentProcessUIDMap() if err != nil { // This kernel-provided file only exists if user namespaces are supported return euid } for _, um := range uidmap { if um.ID <= euid && euid <= um.ID+um.Count-1 { return um.ParentID + euid - um.ID } } return euid }
[ "func", "GetParentNSeuid", "(", ")", "int64", "{", "euid", ":=", "int64", "(", "os", ".", "Geteuid", "(", ")", ")", "\n", "uidmap", ",", "err", ":=", "user", ".", "CurrentProcessUIDMap", "(", ")", "\n", "if", "err", "!=", "nil", "{", "// This kernel-provided file only exists if user namespaces are supported", "return", "euid", "\n", "}", "\n", "for", "_", ",", "um", ":=", "range", "uidmap", "{", "if", "um", ".", "ID", "<=", "euid", "&&", "euid", "<=", "um", ".", "ID", "+", "um", ".", "Count", "-", "1", "{", "return", "um", ".", "ParentID", "+", "euid", "-", "um", ".", "ID", "\n", "}", "\n", "}", "\n", "return", "euid", "\n", "}" ]
// GetParentNSeuid returns the euid within the parent user namespace
[ "GetParentNSeuid", "returns", "the", "euid", "within", "the", "parent", "user", "namespace" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/system/linux.go#L126-L139
164,467
opencontainers/runc
libcontainer/rootfs_linux.go
prepareRootfs
func prepareRootfs(pipe io.ReadWriter, iConfig *initConfig) (err error) { config := iConfig.Config if err := prepareRoot(config); err != nil { return newSystemErrorWithCause(err, "preparing rootfs") } hasCgroupns := config.Namespaces.Contains(configs.NEWCGROUP) setupDev := needsSetupDev(config) for _, m := range config.Mounts { for _, precmd := range m.PremountCmds { if err := mountCmd(precmd); err != nil { return newSystemErrorWithCause(err, "running premount command") } } if err := mountToRootfs(m, config.Rootfs, config.MountLabel, hasCgroupns); err != nil { return newSystemErrorWithCausef(err, "mounting %q to rootfs %q at %q", m.Source, config.Rootfs, m.Destination) } for _, postcmd := range m.PostmountCmds { if err := mountCmd(postcmd); err != nil { return newSystemErrorWithCause(err, "running postmount command") } } } if setupDev { if err := createDevices(config); err != nil { return newSystemErrorWithCause(err, "creating device nodes") } if err := setupPtmx(config); err != nil { return newSystemErrorWithCause(err, "setting up ptmx") } if err := setupDevSymlinks(config.Rootfs); err != nil { return newSystemErrorWithCause(err, "setting up /dev symlinks") } } // Signal the parent to run the pre-start hooks. // The hooks are run after the mounts are setup, but before we switch to the new // root, so that the old root is still available in the hooks for any mount // manipulations. // Note that iConfig.Cwd is not guaranteed to exist here. if err := syncParentHooks(pipe); err != nil { return err } // The reason these operations are done here rather than in finalizeRootfs // is because the console-handling code gets quite sticky if we have to set // up the console before doing the pivot_root(2). This is because the // Console API has to also work with the ExecIn case, which means that the // API must be able to deal with being inside as well as outside the // container. It's just cleaner to do this here (at the expense of the // operation not being perfectly split). if err := unix.Chdir(config.Rootfs); err != nil { return newSystemErrorWithCausef(err, "changing dir to %q", config.Rootfs) } if config.NoPivotRoot { err = msMoveRoot(config.Rootfs) } else if config.Namespaces.Contains(configs.NEWNS) { err = pivotRoot(config.Rootfs) } else { err = chroot(config.Rootfs) } if err != nil { return newSystemErrorWithCause(err, "jailing process inside rootfs") } if setupDev { if err := reOpenDevNull(); err != nil { return newSystemErrorWithCause(err, "reopening /dev/null inside container") } } if cwd := iConfig.Cwd; cwd != "" { // Note that spec.Process.Cwd can contain unclean value like "../../../../foo/bar...". // However, we are safe to call MkDirAll directly because we are in the jail here. if err := os.MkdirAll(cwd, 0755); err != nil { return err } } return nil }
go
func prepareRootfs(pipe io.ReadWriter, iConfig *initConfig) (err error) { config := iConfig.Config if err := prepareRoot(config); err != nil { return newSystemErrorWithCause(err, "preparing rootfs") } hasCgroupns := config.Namespaces.Contains(configs.NEWCGROUP) setupDev := needsSetupDev(config) for _, m := range config.Mounts { for _, precmd := range m.PremountCmds { if err := mountCmd(precmd); err != nil { return newSystemErrorWithCause(err, "running premount command") } } if err := mountToRootfs(m, config.Rootfs, config.MountLabel, hasCgroupns); err != nil { return newSystemErrorWithCausef(err, "mounting %q to rootfs %q at %q", m.Source, config.Rootfs, m.Destination) } for _, postcmd := range m.PostmountCmds { if err := mountCmd(postcmd); err != nil { return newSystemErrorWithCause(err, "running postmount command") } } } if setupDev { if err := createDevices(config); err != nil { return newSystemErrorWithCause(err, "creating device nodes") } if err := setupPtmx(config); err != nil { return newSystemErrorWithCause(err, "setting up ptmx") } if err := setupDevSymlinks(config.Rootfs); err != nil { return newSystemErrorWithCause(err, "setting up /dev symlinks") } } // Signal the parent to run the pre-start hooks. // The hooks are run after the mounts are setup, but before we switch to the new // root, so that the old root is still available in the hooks for any mount // manipulations. // Note that iConfig.Cwd is not guaranteed to exist here. if err := syncParentHooks(pipe); err != nil { return err } // The reason these operations are done here rather than in finalizeRootfs // is because the console-handling code gets quite sticky if we have to set // up the console before doing the pivot_root(2). This is because the // Console API has to also work with the ExecIn case, which means that the // API must be able to deal with being inside as well as outside the // container. It's just cleaner to do this here (at the expense of the // operation not being perfectly split). if err := unix.Chdir(config.Rootfs); err != nil { return newSystemErrorWithCausef(err, "changing dir to %q", config.Rootfs) } if config.NoPivotRoot { err = msMoveRoot(config.Rootfs) } else if config.Namespaces.Contains(configs.NEWNS) { err = pivotRoot(config.Rootfs) } else { err = chroot(config.Rootfs) } if err != nil { return newSystemErrorWithCause(err, "jailing process inside rootfs") } if setupDev { if err := reOpenDevNull(); err != nil { return newSystemErrorWithCause(err, "reopening /dev/null inside container") } } if cwd := iConfig.Cwd; cwd != "" { // Note that spec.Process.Cwd can contain unclean value like "../../../../foo/bar...". // However, we are safe to call MkDirAll directly because we are in the jail here. if err := os.MkdirAll(cwd, 0755); err != nil { return err } } return nil }
[ "func", "prepareRootfs", "(", "pipe", "io", ".", "ReadWriter", ",", "iConfig", "*", "initConfig", ")", "(", "err", "error", ")", "{", "config", ":=", "iConfig", ".", "Config", "\n", "if", "err", ":=", "prepareRoot", "(", "config", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "hasCgroupns", ":=", "config", ".", "Namespaces", ".", "Contains", "(", "configs", ".", "NEWCGROUP", ")", "\n", "setupDev", ":=", "needsSetupDev", "(", "config", ")", "\n", "for", "_", ",", "m", ":=", "range", "config", ".", "Mounts", "{", "for", "_", ",", "precmd", ":=", "range", "m", ".", "PremountCmds", "{", "if", "err", ":=", "mountCmd", "(", "precmd", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n", "if", "err", ":=", "mountToRootfs", "(", "m", ",", "config", ".", "Rootfs", ",", "config", ".", "MountLabel", ",", "hasCgroupns", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCausef", "(", "err", ",", "\"", "\"", ",", "m", ".", "Source", ",", "config", ".", "Rootfs", ",", "m", ".", "Destination", ")", "\n", "}", "\n\n", "for", "_", ",", "postcmd", ":=", "range", "m", ".", "PostmountCmds", "{", "if", "err", ":=", "mountCmd", "(", "postcmd", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n", "}", "\n\n", "if", "setupDev", "{", "if", "err", ":=", "createDevices", "(", "config", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "setupPtmx", "(", "config", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "if", "err", ":=", "setupDevSymlinks", "(", "config", ".", "Rootfs", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n\n", "// Signal the parent to run the pre-start hooks.", "// The hooks are run after the mounts are setup, but before we switch to the new", "// root, so that the old root is still available in the hooks for any mount", "// manipulations.", "// Note that iConfig.Cwd is not guaranteed to exist here.", "if", "err", ":=", "syncParentHooks", "(", "pipe", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// The reason these operations are done here rather than in finalizeRootfs", "// is because the console-handling code gets quite sticky if we have to set", "// up the console before doing the pivot_root(2). This is because the", "// Console API has to also work with the ExecIn case, which means that the", "// API must be able to deal with being inside as well as outside the", "// container. It's just cleaner to do this here (at the expense of the", "// operation not being perfectly split).", "if", "err", ":=", "unix", ".", "Chdir", "(", "config", ".", "Rootfs", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCausef", "(", "err", ",", "\"", "\"", ",", "config", ".", "Rootfs", ")", "\n", "}", "\n\n", "if", "config", ".", "NoPivotRoot", "{", "err", "=", "msMoveRoot", "(", "config", ".", "Rootfs", ")", "\n", "}", "else", "if", "config", ".", "Namespaces", ".", "Contains", "(", "configs", ".", "NEWNS", ")", "{", "err", "=", "pivotRoot", "(", "config", ".", "Rootfs", ")", "\n", "}", "else", "{", "err", "=", "chroot", "(", "config", ".", "Rootfs", ")", "\n", "}", "\n", "if", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n\n", "if", "setupDev", "{", "if", "err", ":=", "reOpenDevNull", "(", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n\n", "if", "cwd", ":=", "iConfig", ".", "Cwd", ";", "cwd", "!=", "\"", "\"", "{", "// Note that spec.Process.Cwd can contain unclean value like \"../../../../foo/bar...\".", "// However, we are safe to call MkDirAll directly because we are in the jail here.", "if", "err", ":=", "os", ".", "MkdirAll", "(", "cwd", ",", "0755", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// prepareRootfs sets up the devices, mount points, and filesystems for use // inside a new mount namespace. It doesn't set anything as ro. You must call // finalizeRootfs after this function to finish setting up the rootfs.
[ "prepareRootfs", "sets", "up", "the", "devices", "mount", "points", "and", "filesystems", "for", "use", "inside", "a", "new", "mount", "namespace", ".", "It", "doesn", "t", "set", "anything", "as", "ro", ".", "You", "must", "call", "finalizeRootfs", "after", "this", "function", "to", "finish", "setting", "up", "the", "rootfs", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L43-L127
164,468
opencontainers/runc
libcontainer/rootfs_linux.go
finalizeRootfs
func finalizeRootfs(config *configs.Config) (err error) { // remount dev as ro if specified for _, m := range config.Mounts { if libcontainerUtils.CleanPath(m.Destination) == "/dev" { if m.Flags&unix.MS_RDONLY == unix.MS_RDONLY { if err := remountReadonly(m); err != nil { return newSystemErrorWithCausef(err, "remounting %q as readonly", m.Destination) } } break } } // set rootfs ( / ) as readonly if config.Readonlyfs { if err := setReadonly(); err != nil { return newSystemErrorWithCause(err, "setting rootfs as readonly") } } unix.Umask(0022) return nil }
go
func finalizeRootfs(config *configs.Config) (err error) { // remount dev as ro if specified for _, m := range config.Mounts { if libcontainerUtils.CleanPath(m.Destination) == "/dev" { if m.Flags&unix.MS_RDONLY == unix.MS_RDONLY { if err := remountReadonly(m); err != nil { return newSystemErrorWithCausef(err, "remounting %q as readonly", m.Destination) } } break } } // set rootfs ( / ) as readonly if config.Readonlyfs { if err := setReadonly(); err != nil { return newSystemErrorWithCause(err, "setting rootfs as readonly") } } unix.Umask(0022) return nil }
[ "func", "finalizeRootfs", "(", "config", "*", "configs", ".", "Config", ")", "(", "err", "error", ")", "{", "// remount dev as ro if specified", "for", "_", ",", "m", ":=", "range", "config", ".", "Mounts", "{", "if", "libcontainerUtils", ".", "CleanPath", "(", "m", ".", "Destination", ")", "==", "\"", "\"", "{", "if", "m", ".", "Flags", "&", "unix", ".", "MS_RDONLY", "==", "unix", ".", "MS_RDONLY", "{", "if", "err", ":=", "remountReadonly", "(", "m", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCausef", "(", "err", ",", "\"", "\"", ",", "m", ".", "Destination", ")", "\n", "}", "\n", "}", "\n", "break", "\n", "}", "\n", "}", "\n\n", "// set rootfs ( / ) as readonly", "if", "config", ".", "Readonlyfs", "{", "if", "err", ":=", "setReadonly", "(", ")", ";", "err", "!=", "nil", "{", "return", "newSystemErrorWithCause", "(", "err", ",", "\"", "\"", ")", "\n", "}", "\n", "}", "\n\n", "unix", ".", "Umask", "(", "0022", ")", "\n", "return", "nil", "\n", "}" ]
// finalizeRootfs sets anything to ro if necessary. You must call // prepareRootfs first.
[ "finalizeRootfs", "sets", "anything", "to", "ro", "if", "necessary", ".", "You", "must", "call", "prepareRootfs", "first", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L131-L153
164,469
opencontainers/runc
libcontainer/rootfs_linux.go
createDevices
func createDevices(config *configs.Config) error { useBindMount := system.RunningInUserNS() || config.Namespaces.Contains(configs.NEWUSER) oldMask := unix.Umask(0000) for _, node := range config.Devices { // containers running in a user namespace are not allowed to mknod // devices so we can just bind mount it from the host. if err := createDeviceNode(config.Rootfs, node, useBindMount); err != nil { unix.Umask(oldMask) return err } } unix.Umask(oldMask) return nil }
go
func createDevices(config *configs.Config) error { useBindMount := system.RunningInUserNS() || config.Namespaces.Contains(configs.NEWUSER) oldMask := unix.Umask(0000) for _, node := range config.Devices { // containers running in a user namespace are not allowed to mknod // devices so we can just bind mount it from the host. if err := createDeviceNode(config.Rootfs, node, useBindMount); err != nil { unix.Umask(oldMask) return err } } unix.Umask(oldMask) return nil }
[ "func", "createDevices", "(", "config", "*", "configs", ".", "Config", ")", "error", "{", "useBindMount", ":=", "system", ".", "RunningInUserNS", "(", ")", "||", "config", ".", "Namespaces", ".", "Contains", "(", "configs", ".", "NEWUSER", ")", "\n", "oldMask", ":=", "unix", ".", "Umask", "(", "0000", ")", "\n", "for", "_", ",", "node", ":=", "range", "config", ".", "Devices", "{", "// containers running in a user namespace are not allowed to mknod", "// devices so we can just bind mount it from the host.", "if", "err", ":=", "createDeviceNode", "(", "config", ".", "Rootfs", ",", "node", ",", "useBindMount", ")", ";", "err", "!=", "nil", "{", "unix", ".", "Umask", "(", "oldMask", ")", "\n", "return", "err", "\n", "}", "\n", "}", "\n", "unix", ".", "Umask", "(", "oldMask", ")", "\n", "return", "nil", "\n", "}" ]
// Create the device nodes in the container.
[ "Create", "the", "device", "nodes", "in", "the", "container", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L531-L544
164,470
opencontainers/runc
libcontainer/rootfs_linux.go
createDeviceNode
func createDeviceNode(rootfs string, node *configs.Device, bind bool) error { dest := filepath.Join(rootfs, node.Path) if err := os.MkdirAll(filepath.Dir(dest), 0755); err != nil { return err } if bind { return bindMountDeviceNode(dest, node) } if err := mknodDevice(dest, node); err != nil { if os.IsExist(err) { return nil } else if os.IsPermission(err) { return bindMountDeviceNode(dest, node) } return err } return nil }
go
func createDeviceNode(rootfs string, node *configs.Device, bind bool) error { dest := filepath.Join(rootfs, node.Path) if err := os.MkdirAll(filepath.Dir(dest), 0755); err != nil { return err } if bind { return bindMountDeviceNode(dest, node) } if err := mknodDevice(dest, node); err != nil { if os.IsExist(err) { return nil } else if os.IsPermission(err) { return bindMountDeviceNode(dest, node) } return err } return nil }
[ "func", "createDeviceNode", "(", "rootfs", "string", ",", "node", "*", "configs", ".", "Device", ",", "bind", "bool", ")", "error", "{", "dest", ":=", "filepath", ".", "Join", "(", "rootfs", ",", "node", ".", "Path", ")", "\n", "if", "err", ":=", "os", ".", "MkdirAll", "(", "filepath", ".", "Dir", "(", "dest", ")", ",", "0755", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "bind", "{", "return", "bindMountDeviceNode", "(", "dest", ",", "node", ")", "\n", "}", "\n", "if", "err", ":=", "mknodDevice", "(", "dest", ",", "node", ")", ";", "err", "!=", "nil", "{", "if", "os", ".", "IsExist", "(", "err", ")", "{", "return", "nil", "\n", "}", "else", "if", "os", ".", "IsPermission", "(", "err", ")", "{", "return", "bindMountDeviceNode", "(", "dest", ",", "node", ")", "\n", "}", "\n", "return", "err", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Creates the device node in the rootfs of the container.
[ "Creates", "the", "device", "node", "in", "the", "rootfs", "of", "the", "container", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L558-L576
164,471
opencontainers/runc
libcontainer/rootfs_linux.go
getParentMount
func getParentMount(rootfs string) (string, string, error) { var path string mountinfos, err := mount.GetMounts() if err != nil { return "", "", err } mountinfo := getMountInfo(mountinfos, rootfs) if mountinfo != nil { return rootfs, mountinfo.Optional, nil } path = rootfs for { path = filepath.Dir(path) mountinfo = getMountInfo(mountinfos, path) if mountinfo != nil { return path, mountinfo.Optional, nil } if path == "/" { break } } // If we are here, we did not find parent mount. Something is wrong. return "", "", fmt.Errorf("Could not find parent mount of %s", rootfs) }
go
func getParentMount(rootfs string) (string, string, error) { var path string mountinfos, err := mount.GetMounts() if err != nil { return "", "", err } mountinfo := getMountInfo(mountinfos, rootfs) if mountinfo != nil { return rootfs, mountinfo.Optional, nil } path = rootfs for { path = filepath.Dir(path) mountinfo = getMountInfo(mountinfos, path) if mountinfo != nil { return path, mountinfo.Optional, nil } if path == "/" { break } } // If we are here, we did not find parent mount. Something is wrong. return "", "", fmt.Errorf("Could not find parent mount of %s", rootfs) }
[ "func", "getParentMount", "(", "rootfs", "string", ")", "(", "string", ",", "string", ",", "error", ")", "{", "var", "path", "string", "\n\n", "mountinfos", ",", "err", ":=", "mount", ".", "GetMounts", "(", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "\"", "\"", ",", "err", "\n", "}", "\n\n", "mountinfo", ":=", "getMountInfo", "(", "mountinfos", ",", "rootfs", ")", "\n", "if", "mountinfo", "!=", "nil", "{", "return", "rootfs", ",", "mountinfo", ".", "Optional", ",", "nil", "\n", "}", "\n\n", "path", "=", "rootfs", "\n", "for", "{", "path", "=", "filepath", ".", "Dir", "(", "path", ")", "\n\n", "mountinfo", "=", "getMountInfo", "(", "mountinfos", ",", "path", ")", "\n", "if", "mountinfo", "!=", "nil", "{", "return", "path", ",", "mountinfo", ".", "Optional", ",", "nil", "\n", "}", "\n\n", "if", "path", "==", "\"", "\"", "{", "break", "\n", "}", "\n", "}", "\n\n", "// If we are here, we did not find parent mount. Something is wrong.", "return", "\"", "\"", ",", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "rootfs", ")", "\n", "}" ]
// Get the parent mount point of directory passed in as argument. Also return // optional fields.
[ "Get", "the", "parent", "mount", "point", "of", "directory", "passed", "in", "as", "argument", ".", "Also", "return", "optional", "fields", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L607-L636
164,472
opencontainers/runc
libcontainer/rootfs_linux.go
rootfsParentMountPrivate
func rootfsParentMountPrivate(rootfs string) error { sharedMount := false parentMount, optionalOpts, err := getParentMount(rootfs) if err != nil { return err } optsSplit := strings.Split(optionalOpts, " ") for _, opt := range optsSplit { if strings.HasPrefix(opt, "shared:") { sharedMount = true break } } // Make parent mount PRIVATE if it was shared. It is needed for two // reasons. First of all pivot_root() will fail if parent mount is // shared. Secondly when we bind mount rootfs it will propagate to // parent namespace and we don't want that to happen. if sharedMount { return unix.Mount("", parentMount, "", unix.MS_PRIVATE, "") } return nil }
go
func rootfsParentMountPrivate(rootfs string) error { sharedMount := false parentMount, optionalOpts, err := getParentMount(rootfs) if err != nil { return err } optsSplit := strings.Split(optionalOpts, " ") for _, opt := range optsSplit { if strings.HasPrefix(opt, "shared:") { sharedMount = true break } } // Make parent mount PRIVATE if it was shared. It is needed for two // reasons. First of all pivot_root() will fail if parent mount is // shared. Secondly when we bind mount rootfs it will propagate to // parent namespace and we don't want that to happen. if sharedMount { return unix.Mount("", parentMount, "", unix.MS_PRIVATE, "") } return nil }
[ "func", "rootfsParentMountPrivate", "(", "rootfs", "string", ")", "error", "{", "sharedMount", ":=", "false", "\n\n", "parentMount", ",", "optionalOpts", ",", "err", ":=", "getParentMount", "(", "rootfs", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "optsSplit", ":=", "strings", ".", "Split", "(", "optionalOpts", ",", "\"", "\"", ")", "\n", "for", "_", ",", "opt", ":=", "range", "optsSplit", "{", "if", "strings", ".", "HasPrefix", "(", "opt", ",", "\"", "\"", ")", "{", "sharedMount", "=", "true", "\n", "break", "\n", "}", "\n", "}", "\n\n", "// Make parent mount PRIVATE if it was shared. It is needed for two", "// reasons. First of all pivot_root() will fail if parent mount is", "// shared. Secondly when we bind mount rootfs it will propagate to", "// parent namespace and we don't want that to happen.", "if", "sharedMount", "{", "return", "unix", ".", "Mount", "(", "\"", "\"", ",", "parentMount", ",", "\"", "\"", ",", "unix", ".", "MS_PRIVATE", ",", "\"", "\"", ")", "\n", "}", "\n\n", "return", "nil", "\n", "}" ]
// Make parent mount private if it was shared
[ "Make", "parent", "mount", "private", "if", "it", "was", "shared" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L639-L664
164,473
opencontainers/runc
libcontainer/rootfs_linux.go
pivotRoot
func pivotRoot(rootfs string) error { // While the documentation may claim otherwise, pivot_root(".", ".") is // actually valid. What this results in is / being the new root but // /proc/self/cwd being the old root. Since we can play around with the cwd // with pivot_root this allows us to pivot without creating directories in // the rootfs. Shout-outs to the LXC developers for giving us this idea. oldroot, err := unix.Open("/", unix.O_DIRECTORY|unix.O_RDONLY, 0) if err != nil { return err } defer unix.Close(oldroot) newroot, err := unix.Open(rootfs, unix.O_DIRECTORY|unix.O_RDONLY, 0) if err != nil { return err } defer unix.Close(newroot) // Change to the new root so that the pivot_root actually acts on it. if err := unix.Fchdir(newroot); err != nil { return err } if err := unix.PivotRoot(".", "."); err != nil { return fmt.Errorf("pivot_root %s", err) } // Currently our "." is oldroot (according to the current kernel code). // However, purely for safety, we will fchdir(oldroot) since there isn't // really any guarantee from the kernel what /proc/self/cwd will be after a // pivot_root(2). if err := unix.Fchdir(oldroot); err != nil { return err } // Make oldroot rslave to make sure our unmounts don't propagate to the // host (and thus bork the machine). We don't use rprivate because this is // known to cause issues due to races where we still have a reference to a // mount while a process in the host namespace are trying to operate on // something they think has no mounts (devicemapper in particular). if err := unix.Mount("", ".", "", unix.MS_SLAVE|unix.MS_REC, ""); err != nil { return err } // Preform the unmount. MNT_DETACH allows us to unmount /proc/self/cwd. if err := unix.Unmount(".", unix.MNT_DETACH); err != nil { return err } // Switch back to our shiny new root. if err := unix.Chdir("/"); err != nil { return fmt.Errorf("chdir / %s", err) } return nil }
go
func pivotRoot(rootfs string) error { // While the documentation may claim otherwise, pivot_root(".", ".") is // actually valid. What this results in is / being the new root but // /proc/self/cwd being the old root. Since we can play around with the cwd // with pivot_root this allows us to pivot without creating directories in // the rootfs. Shout-outs to the LXC developers for giving us this idea. oldroot, err := unix.Open("/", unix.O_DIRECTORY|unix.O_RDONLY, 0) if err != nil { return err } defer unix.Close(oldroot) newroot, err := unix.Open(rootfs, unix.O_DIRECTORY|unix.O_RDONLY, 0) if err != nil { return err } defer unix.Close(newroot) // Change to the new root so that the pivot_root actually acts on it. if err := unix.Fchdir(newroot); err != nil { return err } if err := unix.PivotRoot(".", "."); err != nil { return fmt.Errorf("pivot_root %s", err) } // Currently our "." is oldroot (according to the current kernel code). // However, purely for safety, we will fchdir(oldroot) since there isn't // really any guarantee from the kernel what /proc/self/cwd will be after a // pivot_root(2). if err := unix.Fchdir(oldroot); err != nil { return err } // Make oldroot rslave to make sure our unmounts don't propagate to the // host (and thus bork the machine). We don't use rprivate because this is // known to cause issues due to races where we still have a reference to a // mount while a process in the host namespace are trying to operate on // something they think has no mounts (devicemapper in particular). if err := unix.Mount("", ".", "", unix.MS_SLAVE|unix.MS_REC, ""); err != nil { return err } // Preform the unmount. MNT_DETACH allows us to unmount /proc/self/cwd. if err := unix.Unmount(".", unix.MNT_DETACH); err != nil { return err } // Switch back to our shiny new root. if err := unix.Chdir("/"); err != nil { return fmt.Errorf("chdir / %s", err) } return nil }
[ "func", "pivotRoot", "(", "rootfs", "string", ")", "error", "{", "// While the documentation may claim otherwise, pivot_root(\".\", \".\") is", "// actually valid. What this results in is / being the new root but", "// /proc/self/cwd being the old root. Since we can play around with the cwd", "// with pivot_root this allows us to pivot without creating directories in", "// the rootfs. Shout-outs to the LXC developers for giving us this idea.", "oldroot", ",", "err", ":=", "unix", ".", "Open", "(", "\"", "\"", ",", "unix", ".", "O_DIRECTORY", "|", "unix", ".", "O_RDONLY", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "defer", "unix", ".", "Close", "(", "oldroot", ")", "\n\n", "newroot", ",", "err", ":=", "unix", ".", "Open", "(", "rootfs", ",", "unix", ".", "O_DIRECTORY", "|", "unix", ".", "O_RDONLY", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "defer", "unix", ".", "Close", "(", "newroot", ")", "\n\n", "// Change to the new root so that the pivot_root actually acts on it.", "if", "err", ":=", "unix", ".", "Fchdir", "(", "newroot", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "if", "err", ":=", "unix", ".", "PivotRoot", "(", "\"", "\"", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n\n", "// Currently our \".\" is oldroot (according to the current kernel code).", "// However, purely for safety, we will fchdir(oldroot) since there isn't", "// really any guarantee from the kernel what /proc/self/cwd will be after a", "// pivot_root(2).", "if", "err", ":=", "unix", ".", "Fchdir", "(", "oldroot", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// Make oldroot rslave to make sure our unmounts don't propagate to the", "// host (and thus bork the machine). We don't use rprivate because this is", "// known to cause issues due to races where we still have a reference to a", "// mount while a process in the host namespace are trying to operate on", "// something they think has no mounts (devicemapper in particular).", "if", "err", ":=", "unix", ".", "Mount", "(", "\"", "\"", ",", "\"", "\"", ",", "\"", "\"", ",", "unix", ".", "MS_SLAVE", "|", "unix", ".", "MS_REC", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "// Preform the unmount. MNT_DETACH allows us to unmount /proc/self/cwd.", "if", "err", ":=", "unix", ".", "Unmount", "(", "\"", "\"", ",", "unix", ".", "MNT_DETACH", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// Switch back to our shiny new root.", "if", "err", ":=", "unix", ".", "Chdir", "(", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "err", ")", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// pivotRoot will call pivot_root such that rootfs becomes the new root // filesystem, and everything else is cleaned up.
[ "pivotRoot", "will", "call", "pivot_root", "such", "that", "rootfs", "becomes", "the", "new", "root", "filesystem", "and", "everything", "else", "is", "cleaned", "up", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L702-L757
164,474
opencontainers/runc
libcontainer/rootfs_linux.go
readonlyPath
func readonlyPath(path string) error { if err := unix.Mount(path, path, "", unix.MS_BIND|unix.MS_REC, ""); err != nil { if os.IsNotExist(err) { return nil } return err } return unix.Mount(path, path, "", unix.MS_BIND|unix.MS_REMOUNT|unix.MS_RDONLY|unix.MS_REC, "") }
go
func readonlyPath(path string) error { if err := unix.Mount(path, path, "", unix.MS_BIND|unix.MS_REC, ""); err != nil { if os.IsNotExist(err) { return nil } return err } return unix.Mount(path, path, "", unix.MS_BIND|unix.MS_REMOUNT|unix.MS_RDONLY|unix.MS_REC, "") }
[ "func", "readonlyPath", "(", "path", "string", ")", "error", "{", "if", "err", ":=", "unix", ".", "Mount", "(", "path", ",", "path", ",", "\"", "\"", ",", "unix", ".", "MS_BIND", "|", "unix", ".", "MS_REC", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "if", "os", ".", "IsNotExist", "(", "err", ")", "{", "return", "nil", "\n", "}", "\n", "return", "err", "\n", "}", "\n", "return", "unix", ".", "Mount", "(", "path", ",", "path", ",", "\"", "\"", ",", "unix", ".", "MS_BIND", "|", "unix", ".", "MS_REMOUNT", "|", "unix", ".", "MS_RDONLY", "|", "unix", ".", "MS_REC", ",", "\"", "\"", ")", "\n", "}" ]
// readonlyPath will make a path read only.
[ "readonlyPath", "will", "make", "a", "path", "read", "only", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L829-L837
164,475
opencontainers/runc
libcontainer/rootfs_linux.go
remountReadonly
func remountReadonly(m *configs.Mount) error { var ( dest = m.Destination flags = m.Flags ) for i := 0; i < 5; i++ { // There is a special case in the kernel for // MS_REMOUNT | MS_BIND, which allows us to change only the // flags even as an unprivileged user (i.e. user namespace) // assuming we don't drop any security related flags (nodev, // nosuid, etc.). So, let's use that case so that we can do // this re-mount without failing in a userns. flags |= unix.MS_REMOUNT | unix.MS_BIND | unix.MS_RDONLY if err := unix.Mount("", dest, "", uintptr(flags), ""); err != nil { switch err { case unix.EBUSY: time.Sleep(100 * time.Millisecond) continue default: return err } } return nil } return fmt.Errorf("unable to mount %s as readonly max retries reached", dest) }
go
func remountReadonly(m *configs.Mount) error { var ( dest = m.Destination flags = m.Flags ) for i := 0; i < 5; i++ { // There is a special case in the kernel for // MS_REMOUNT | MS_BIND, which allows us to change only the // flags even as an unprivileged user (i.e. user namespace) // assuming we don't drop any security related flags (nodev, // nosuid, etc.). So, let's use that case so that we can do // this re-mount without failing in a userns. flags |= unix.MS_REMOUNT | unix.MS_BIND | unix.MS_RDONLY if err := unix.Mount("", dest, "", uintptr(flags), ""); err != nil { switch err { case unix.EBUSY: time.Sleep(100 * time.Millisecond) continue default: return err } } return nil } return fmt.Errorf("unable to mount %s as readonly max retries reached", dest) }
[ "func", "remountReadonly", "(", "m", "*", "configs", ".", "Mount", ")", "error", "{", "var", "(", "dest", "=", "m", ".", "Destination", "\n", "flags", "=", "m", ".", "Flags", "\n", ")", "\n", "for", "i", ":=", "0", ";", "i", "<", "5", ";", "i", "++", "{", "// There is a special case in the kernel for", "// MS_REMOUNT | MS_BIND, which allows us to change only the", "// flags even as an unprivileged user (i.e. user namespace)", "// assuming we don't drop any security related flags (nodev,", "// nosuid, etc.). So, let's use that case so that we can do", "// this re-mount without failing in a userns.", "flags", "|=", "unix", ".", "MS_REMOUNT", "|", "unix", ".", "MS_BIND", "|", "unix", ".", "MS_RDONLY", "\n", "if", "err", ":=", "unix", ".", "Mount", "(", "\"", "\"", ",", "dest", ",", "\"", "\"", ",", "uintptr", "(", "flags", ")", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "switch", "err", "{", "case", "unix", ".", "EBUSY", ":", "time", ".", "Sleep", "(", "100", "*", "time", ".", "Millisecond", ")", "\n", "continue", "\n", "default", ":", "return", "err", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}", "\n", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "dest", ")", "\n", "}" ]
// remountReadonly will remount an existing mount point and ensure that it is read-only.
[ "remountReadonly", "will", "remount", "an", "existing", "mount", "point", "and", "ensure", "that", "it", "is", "read", "-", "only", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L840-L865
164,476
opencontainers/runc
libcontainer/rootfs_linux.go
mountPropagate
func mountPropagate(m *configs.Mount, rootfs string, mountLabel string) error { var ( dest = m.Destination data = label.FormatMountLabel(m.Data, mountLabel) flags = m.Flags ) if libcontainerUtils.CleanPath(dest) == "/dev" { flags &= ^unix.MS_RDONLY } copyUp := m.Extensions&configs.EXT_COPYUP == configs.EXT_COPYUP if !(copyUp || strings.HasPrefix(dest, rootfs)) { dest = filepath.Join(rootfs, dest) } if err := unix.Mount(m.Source, dest, m.Device, uintptr(flags), data); err != nil { return err } for _, pflag := range m.PropagationFlags { if err := unix.Mount("", dest, "", uintptr(pflag), ""); err != nil { return err } } return nil }
go
func mountPropagate(m *configs.Mount, rootfs string, mountLabel string) error { var ( dest = m.Destination data = label.FormatMountLabel(m.Data, mountLabel) flags = m.Flags ) if libcontainerUtils.CleanPath(dest) == "/dev" { flags &= ^unix.MS_RDONLY } copyUp := m.Extensions&configs.EXT_COPYUP == configs.EXT_COPYUP if !(copyUp || strings.HasPrefix(dest, rootfs)) { dest = filepath.Join(rootfs, dest) } if err := unix.Mount(m.Source, dest, m.Device, uintptr(flags), data); err != nil { return err } for _, pflag := range m.PropagationFlags { if err := unix.Mount("", dest, "", uintptr(pflag), ""); err != nil { return err } } return nil }
[ "func", "mountPropagate", "(", "m", "*", "configs", ".", "Mount", ",", "rootfs", "string", ",", "mountLabel", "string", ")", "error", "{", "var", "(", "dest", "=", "m", ".", "Destination", "\n", "data", "=", "label", ".", "FormatMountLabel", "(", "m", ".", "Data", ",", "mountLabel", ")", "\n", "flags", "=", "m", ".", "Flags", "\n", ")", "\n", "if", "libcontainerUtils", ".", "CleanPath", "(", "dest", ")", "==", "\"", "\"", "{", "flags", "&=", "^", "unix", ".", "MS_RDONLY", "\n", "}", "\n\n", "copyUp", ":=", "m", ".", "Extensions", "&", "configs", ".", "EXT_COPYUP", "==", "configs", ".", "EXT_COPYUP", "\n", "if", "!", "(", "copyUp", "||", "strings", ".", "HasPrefix", "(", "dest", ",", "rootfs", ")", ")", "{", "dest", "=", "filepath", ".", "Join", "(", "rootfs", ",", "dest", ")", "\n", "}", "\n\n", "if", "err", ":=", "unix", ".", "Mount", "(", "m", ".", "Source", ",", "dest", ",", "m", ".", "Device", ",", "uintptr", "(", "flags", ")", ",", "data", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "for", "_", ",", "pflag", ":=", "range", "m", ".", "PropagationFlags", "{", "if", "err", ":=", "unix", ".", "Mount", "(", "\"", "\"", ",", "dest", ",", "\"", "\"", ",", "uintptr", "(", "pflag", ")", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Do the mount operation followed by additional mounts required to take care // of propagation flags.
[ "Do", "the", "mount", "operation", "followed", "by", "additional", "mounts", "required", "to", "take", "care", "of", "propagation", "flags", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/rootfs_linux.go#L901-L926
164,477
opencontainers/runc
libcontainer/factory_linux.go
InitArgs
func InitArgs(args ...string) func(*LinuxFactory) error { return func(l *LinuxFactory) (err error) { if len(args) > 0 { // Resolve relative paths to ensure that its available // after directory changes. if args[0], err = filepath.Abs(args[0]); err != nil { return newGenericError(err, ConfigInvalid) } } l.InitArgs = args return nil } }
go
func InitArgs(args ...string) func(*LinuxFactory) error { return func(l *LinuxFactory) (err error) { if len(args) > 0 { // Resolve relative paths to ensure that its available // after directory changes. if args[0], err = filepath.Abs(args[0]); err != nil { return newGenericError(err, ConfigInvalid) } } l.InitArgs = args return nil } }
[ "func", "InitArgs", "(", "args", "...", "string", ")", "func", "(", "*", "LinuxFactory", ")", "error", "{", "return", "func", "(", "l", "*", "LinuxFactory", ")", "(", "err", "error", ")", "{", "if", "len", "(", "args", ")", ">", "0", "{", "// Resolve relative paths to ensure that its available", "// after directory changes.", "if", "args", "[", "0", "]", ",", "err", "=", "filepath", ".", "Abs", "(", "args", "[", "0", "]", ")", ";", "err", "!=", "nil", "{", "return", "newGenericError", "(", "err", ",", "ConfigInvalid", ")", "\n", "}", "\n", "}", "\n\n", "l", ".", "InitArgs", "=", "args", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// InitArgs returns an options func to configure a LinuxFactory with the // provided init binary path and arguments.
[ "InitArgs", "returns", "an", "options", "func", "to", "configure", "a", "LinuxFactory", "with", "the", "provided", "init", "binary", "path", "and", "arguments", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L36-L49
164,478
opencontainers/runc
libcontainer/factory_linux.go
SystemdCgroups
func SystemdCgroups(l *LinuxFactory) error { l.NewCgroupsManager = func(config *configs.Cgroup, paths map[string]string) cgroups.Manager { return &systemd.Manager{ Cgroups: config, Paths: paths, } } return nil }
go
func SystemdCgroups(l *LinuxFactory) error { l.NewCgroupsManager = func(config *configs.Cgroup, paths map[string]string) cgroups.Manager { return &systemd.Manager{ Cgroups: config, Paths: paths, } } return nil }
[ "func", "SystemdCgroups", "(", "l", "*", "LinuxFactory", ")", "error", "{", "l", ".", "NewCgroupsManager", "=", "func", "(", "config", "*", "configs", ".", "Cgroup", ",", "paths", "map", "[", "string", "]", "string", ")", "cgroups", ".", "Manager", "{", "return", "&", "systemd", ".", "Manager", "{", "Cgroups", ":", "config", ",", "Paths", ":", "paths", ",", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// SystemdCgroups is an options func to configure a LinuxFactory to return // containers that use systemd to create and manage cgroups.
[ "SystemdCgroups", "is", "an", "options", "func", "to", "configure", "a", "LinuxFactory", "to", "return", "containers", "that", "use", "systemd", "to", "create", "and", "manage", "cgroups", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L53-L61
164,479
opencontainers/runc
libcontainer/factory_linux.go
Cgroupfs
func Cgroupfs(l *LinuxFactory) error { l.NewCgroupsManager = func(config *configs.Cgroup, paths map[string]string) cgroups.Manager { return &fs.Manager{ Cgroups: config, Paths: paths, } } return nil }
go
func Cgroupfs(l *LinuxFactory) error { l.NewCgroupsManager = func(config *configs.Cgroup, paths map[string]string) cgroups.Manager { return &fs.Manager{ Cgroups: config, Paths: paths, } } return nil }
[ "func", "Cgroupfs", "(", "l", "*", "LinuxFactory", ")", "error", "{", "l", ".", "NewCgroupsManager", "=", "func", "(", "config", "*", "configs", ".", "Cgroup", ",", "paths", "map", "[", "string", "]", "string", ")", "cgroups", ".", "Manager", "{", "return", "&", "fs", ".", "Manager", "{", "Cgroups", ":", "config", ",", "Paths", ":", "paths", ",", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// Cgroupfs is an options func to configure a LinuxFactory to return containers // that use the native cgroups filesystem implementation to create and manage // cgroups.
[ "Cgroupfs", "is", "an", "options", "func", "to", "configure", "a", "LinuxFactory", "to", "return", "containers", "that", "use", "the", "native", "cgroups", "filesystem", "implementation", "to", "create", "and", "manage", "cgroups", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L66-L74
164,480
opencontainers/runc
libcontainer/factory_linux.go
TmpfsRoot
func TmpfsRoot(l *LinuxFactory) error { mounted, err := mount.Mounted(l.Root) if err != nil { return err } if !mounted { if err := unix.Mount("tmpfs", l.Root, "tmpfs", 0, ""); err != nil { return err } } return nil }
go
func TmpfsRoot(l *LinuxFactory) error { mounted, err := mount.Mounted(l.Root) if err != nil { return err } if !mounted { if err := unix.Mount("tmpfs", l.Root, "tmpfs", 0, ""); err != nil { return err } } return nil }
[ "func", "TmpfsRoot", "(", "l", "*", "LinuxFactory", ")", "error", "{", "mounted", ",", "err", ":=", "mount", ".", "Mounted", "(", "l", ".", "Root", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "if", "!", "mounted", "{", "if", "err", ":=", "unix", ".", "Mount", "(", "\"", "\"", ",", "l", ".", "Root", ",", "\"", "\"", ",", "0", ",", "\"", "\"", ")", ";", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "}", "\n", "return", "nil", "\n", "}" ]
// TmpfsRoot is an option func to mount LinuxFactory.Root to tmpfs.
[ "TmpfsRoot", "is", "an", "option", "func", "to", "mount", "LinuxFactory", ".", "Root", "to", "tmpfs", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L108-L119
164,481
opencontainers/runc
libcontainer/factory_linux.go
CriuPath
func CriuPath(criupath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.CriuPath = criupath return nil } }
go
func CriuPath(criupath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.CriuPath = criupath return nil } }
[ "func", "CriuPath", "(", "criupath", "string", ")", "func", "(", "*", "LinuxFactory", ")", "error", "{", "return", "func", "(", "l", "*", "LinuxFactory", ")", "error", "{", "l", ".", "CriuPath", "=", "criupath", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// CriuPath returns an option func to configure a LinuxFactory with the // provided criupath
[ "CriuPath", "returns", "an", "option", "func", "to", "configure", "a", "LinuxFactory", "with", "the", "provided", "criupath" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L123-L128
164,482
opencontainers/runc
libcontainer/factory_linux.go
New
func New(root string, options ...func(*LinuxFactory) error) (Factory, error) { if root != "" { if err := os.MkdirAll(root, 0700); err != nil { return nil, newGenericError(err, SystemError) } } l := &LinuxFactory{ Root: root, InitPath: "/proc/self/exe", InitArgs: []string{os.Args[0], "init"}, Validator: validate.New(), CriuPath: "criu", } Cgroupfs(l) for _, opt := range options { if opt == nil { continue } if err := opt(l); err != nil { return nil, err } } return l, nil }
go
func New(root string, options ...func(*LinuxFactory) error) (Factory, error) { if root != "" { if err := os.MkdirAll(root, 0700); err != nil { return nil, newGenericError(err, SystemError) } } l := &LinuxFactory{ Root: root, InitPath: "/proc/self/exe", InitArgs: []string{os.Args[0], "init"}, Validator: validate.New(), CriuPath: "criu", } Cgroupfs(l) for _, opt := range options { if opt == nil { continue } if err := opt(l); err != nil { return nil, err } } return l, nil }
[ "func", "New", "(", "root", "string", ",", "options", "...", "func", "(", "*", "LinuxFactory", ")", "error", ")", "(", "Factory", ",", "error", ")", "{", "if", "root", "!=", "\"", "\"", "{", "if", "err", ":=", "os", ".", "MkdirAll", "(", "root", ",", "0700", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "newGenericError", "(", "err", ",", "SystemError", ")", "\n", "}", "\n", "}", "\n", "l", ":=", "&", "LinuxFactory", "{", "Root", ":", "root", ",", "InitPath", ":", "\"", "\"", ",", "InitArgs", ":", "[", "]", "string", "{", "os", ".", "Args", "[", "0", "]", ",", "\"", "\"", "}", ",", "Validator", ":", "validate", ".", "New", "(", ")", ",", "CriuPath", ":", "\"", "\"", ",", "}", "\n", "Cgroupfs", "(", "l", ")", "\n", "for", "_", ",", "opt", ":=", "range", "options", "{", "if", "opt", "==", "nil", "{", "continue", "\n", "}", "\n", "if", "err", ":=", "opt", "(", "l", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n", "return", "l", ",", "nil", "\n", "}" ]
// New returns a linux based container factory based in the root directory and // configures the factory with the provided option funcs.
[ "New", "returns", "a", "linux", "based", "container", "factory", "based", "in", "the", "root", "directory", "and", "configures", "the", "factory", "with", "the", "provided", "option", "funcs", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L132-L155
164,483
opencontainers/runc
libcontainer/factory_linux.go
StartInitialization
func (l *LinuxFactory) StartInitialization() (err error) { var ( pipefd, fifofd int consoleSocket *os.File envInitPipe = os.Getenv("_LIBCONTAINER_INITPIPE") envFifoFd = os.Getenv("_LIBCONTAINER_FIFOFD") envConsole = os.Getenv("_LIBCONTAINER_CONSOLE") ) // Get the INITPIPE. pipefd, err = strconv.Atoi(envInitPipe) if err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_INITPIPE=%s to int: %s", envInitPipe, err) } var ( pipe = os.NewFile(uintptr(pipefd), "pipe") it = initType(os.Getenv("_LIBCONTAINER_INITTYPE")) ) defer pipe.Close() // Only init processes have FIFOFD. fifofd = -1 if it == initStandard { if fifofd, err = strconv.Atoi(envFifoFd); err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_FIFOFD=%s to int: %s", envFifoFd, err) } } if envConsole != "" { console, err := strconv.Atoi(envConsole) if err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_CONSOLE=%s to int: %s", envConsole, err) } consoleSocket = os.NewFile(uintptr(console), "console-socket") defer consoleSocket.Close() } // clear the current process's environment to clean any libcontainer // specific env vars. os.Clearenv() defer func() { // We have an error during the initialization of the container's init, // send it back to the parent process in the form of an initError. if werr := utils.WriteJSON(pipe, syncT{procError}); werr != nil { fmt.Fprintln(os.Stderr, err) return } if werr := utils.WriteJSON(pipe, newSystemError(err)); werr != nil { fmt.Fprintln(os.Stderr, err) return } }() defer func() { if e := recover(); e != nil { err = fmt.Errorf("panic from initialization: %v, %v", e, string(debug.Stack())) } }() i, err := newContainerInit(it, pipe, consoleSocket, fifofd) if err != nil { return err } // If Init succeeds, syscall.Exec will not return, hence none of the defers will be called. return i.Init() }
go
func (l *LinuxFactory) StartInitialization() (err error) { var ( pipefd, fifofd int consoleSocket *os.File envInitPipe = os.Getenv("_LIBCONTAINER_INITPIPE") envFifoFd = os.Getenv("_LIBCONTAINER_FIFOFD") envConsole = os.Getenv("_LIBCONTAINER_CONSOLE") ) // Get the INITPIPE. pipefd, err = strconv.Atoi(envInitPipe) if err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_INITPIPE=%s to int: %s", envInitPipe, err) } var ( pipe = os.NewFile(uintptr(pipefd), "pipe") it = initType(os.Getenv("_LIBCONTAINER_INITTYPE")) ) defer pipe.Close() // Only init processes have FIFOFD. fifofd = -1 if it == initStandard { if fifofd, err = strconv.Atoi(envFifoFd); err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_FIFOFD=%s to int: %s", envFifoFd, err) } } if envConsole != "" { console, err := strconv.Atoi(envConsole) if err != nil { return fmt.Errorf("unable to convert _LIBCONTAINER_CONSOLE=%s to int: %s", envConsole, err) } consoleSocket = os.NewFile(uintptr(console), "console-socket") defer consoleSocket.Close() } // clear the current process's environment to clean any libcontainer // specific env vars. os.Clearenv() defer func() { // We have an error during the initialization of the container's init, // send it back to the parent process in the form of an initError. if werr := utils.WriteJSON(pipe, syncT{procError}); werr != nil { fmt.Fprintln(os.Stderr, err) return } if werr := utils.WriteJSON(pipe, newSystemError(err)); werr != nil { fmt.Fprintln(os.Stderr, err) return } }() defer func() { if e := recover(); e != nil { err = fmt.Errorf("panic from initialization: %v, %v", e, string(debug.Stack())) } }() i, err := newContainerInit(it, pipe, consoleSocket, fifofd) if err != nil { return err } // If Init succeeds, syscall.Exec will not return, hence none of the defers will be called. return i.Init() }
[ "func", "(", "l", "*", "LinuxFactory", ")", "StartInitialization", "(", ")", "(", "err", "error", ")", "{", "var", "(", "pipefd", ",", "fifofd", "int", "\n", "consoleSocket", "*", "os", ".", "File", "\n", "envInitPipe", "=", "os", ".", "Getenv", "(", "\"", "\"", ")", "\n", "envFifoFd", "=", "os", ".", "Getenv", "(", "\"", "\"", ")", "\n", "envConsole", "=", "os", ".", "Getenv", "(", "\"", "\"", ")", "\n", ")", "\n\n", "// Get the INITPIPE.", "pipefd", ",", "err", "=", "strconv", ".", "Atoi", "(", "envInitPipe", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "envInitPipe", ",", "err", ")", "\n", "}", "\n\n", "var", "(", "pipe", "=", "os", ".", "NewFile", "(", "uintptr", "(", "pipefd", ")", ",", "\"", "\"", ")", "\n", "it", "=", "initType", "(", "os", ".", "Getenv", "(", "\"", "\"", ")", ")", "\n", ")", "\n", "defer", "pipe", ".", "Close", "(", ")", "\n\n", "// Only init processes have FIFOFD.", "fifofd", "=", "-", "1", "\n", "if", "it", "==", "initStandard", "{", "if", "fifofd", ",", "err", "=", "strconv", ".", "Atoi", "(", "envFifoFd", ")", ";", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "envFifoFd", ",", "err", ")", "\n", "}", "\n", "}", "\n\n", "if", "envConsole", "!=", "\"", "\"", "{", "console", ",", "err", ":=", "strconv", ".", "Atoi", "(", "envConsole", ")", "\n", "if", "err", "!=", "nil", "{", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "envConsole", ",", "err", ")", "\n", "}", "\n", "consoleSocket", "=", "os", ".", "NewFile", "(", "uintptr", "(", "console", ")", ",", "\"", "\"", ")", "\n", "defer", "consoleSocket", ".", "Close", "(", ")", "\n", "}", "\n\n", "// clear the current process's environment to clean any libcontainer", "// specific env vars.", "os", ".", "Clearenv", "(", ")", "\n\n", "defer", "func", "(", ")", "{", "// We have an error during the initialization of the container's init,", "// send it back to the parent process in the form of an initError.", "if", "werr", ":=", "utils", ".", "WriteJSON", "(", "pipe", ",", "syncT", "{", "procError", "}", ")", ";", "werr", "!=", "nil", "{", "fmt", ".", "Fprintln", "(", "os", ".", "Stderr", ",", "err", ")", "\n", "return", "\n", "}", "\n", "if", "werr", ":=", "utils", ".", "WriteJSON", "(", "pipe", ",", "newSystemError", "(", "err", ")", ")", ";", "werr", "!=", "nil", "{", "fmt", ".", "Fprintln", "(", "os", ".", "Stderr", ",", "err", ")", "\n", "return", "\n", "}", "\n", "}", "(", ")", "\n", "defer", "func", "(", ")", "{", "if", "e", ":=", "recover", "(", ")", ";", "e", "!=", "nil", "{", "err", "=", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "e", ",", "string", "(", "debug", ".", "Stack", "(", ")", ")", ")", "\n", "}", "\n", "}", "(", ")", "\n\n", "i", ",", "err", ":=", "newContainerInit", "(", "it", ",", "pipe", ",", "consoleSocket", ",", "fifofd", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n\n", "// If Init succeeds, syscall.Exec will not return, hence none of the defers will be called.", "return", "i", ".", "Init", "(", ")", "\n", "}" ]
// StartInitialization loads a container by opening the pipe fd from the parent to read the configuration and state // This is a low level implementation detail of the reexec and should not be consumed externally
[ "StartInitialization", "loads", "a", "container", "by", "opening", "the", "pipe", "fd", "from", "the", "parent", "to", "read", "the", "configuration", "and", "state", "This", "is", "a", "low", "level", "implementation", "detail", "of", "the", "reexec", "and", "should", "not", "be", "consumed", "externally" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L283-L350
164,484
opencontainers/runc
libcontainer/factory_linux.go
NewuidmapPath
func NewuidmapPath(newuidmapPath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.NewuidmapPath = newuidmapPath return nil } }
go
func NewuidmapPath(newuidmapPath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.NewuidmapPath = newuidmapPath return nil } }
[ "func", "NewuidmapPath", "(", "newuidmapPath", "string", ")", "func", "(", "*", "LinuxFactory", ")", "error", "{", "return", "func", "(", "l", "*", "LinuxFactory", ")", "error", "{", "l", ".", "NewuidmapPath", "=", "newuidmapPath", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// NewuidmapPath returns an option func to configure a LinuxFactory with the // provided ..
[ "NewuidmapPath", "returns", "an", "option", "func", "to", "configure", "a", "LinuxFactory", "with", "the", "provided", ".." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L382-L387
164,485
opencontainers/runc
libcontainer/factory_linux.go
NewgidmapPath
func NewgidmapPath(newgidmapPath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.NewgidmapPath = newgidmapPath return nil } }
go
func NewgidmapPath(newgidmapPath string) func(*LinuxFactory) error { return func(l *LinuxFactory) error { l.NewgidmapPath = newgidmapPath return nil } }
[ "func", "NewgidmapPath", "(", "newgidmapPath", "string", ")", "func", "(", "*", "LinuxFactory", ")", "error", "{", "return", "func", "(", "l", "*", "LinuxFactory", ")", "error", "{", "l", ".", "NewgidmapPath", "=", "newgidmapPath", "\n", "return", "nil", "\n", "}", "\n", "}" ]
// NewgidmapPath returns an option func to configure a LinuxFactory with the // provided ..
[ "NewgidmapPath", "returns", "an", "option", "func", "to", "configure", "a", "LinuxFactory", "with", "the", "provided", ".." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/factory_linux.go#L391-L396
164,486
opencontainers/runc
utils.go
setupSpec
func setupSpec(context *cli.Context) (*specs.Spec, error) { bundle := context.String("bundle") if bundle != "" { if err := os.Chdir(bundle); err != nil { return nil, err } } spec, err := loadSpec(specConfig) if err != nil { return nil, err } return spec, nil }
go
func setupSpec(context *cli.Context) (*specs.Spec, error) { bundle := context.String("bundle") if bundle != "" { if err := os.Chdir(bundle); err != nil { return nil, err } } spec, err := loadSpec(specConfig) if err != nil { return nil, err } return spec, nil }
[ "func", "setupSpec", "(", "context", "*", "cli", ".", "Context", ")", "(", "*", "specs", ".", "Spec", ",", "error", ")", "{", "bundle", ":=", "context", ".", "String", "(", "\"", "\"", ")", "\n", "if", "bundle", "!=", "\"", "\"", "{", "if", "err", ":=", "os", ".", "Chdir", "(", "bundle", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "}", "\n", "spec", ",", "err", ":=", "loadSpec", "(", "specConfig", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "return", "spec", ",", "nil", "\n", "}" ]
// setupSpec performs initial setup based on the cli.Context for the container
[ "setupSpec", "performs", "initial", "setup", "based", "on", "the", "cli", ".", "Context", "for", "the", "container" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/utils.go#L58-L70
164,487
opencontainers/runc
libcontainer/utils/utils_unix.go
NewSockPair
func NewSockPair(name string) (parent *os.File, child *os.File, err error) { fds, err := unix.Socketpair(unix.AF_LOCAL, unix.SOCK_STREAM|unix.SOCK_CLOEXEC, 0) if err != nil { return nil, nil, err } return os.NewFile(uintptr(fds[1]), name+"-p"), os.NewFile(uintptr(fds[0]), name+"-c"), nil }
go
func NewSockPair(name string) (parent *os.File, child *os.File, err error) { fds, err := unix.Socketpair(unix.AF_LOCAL, unix.SOCK_STREAM|unix.SOCK_CLOEXEC, 0) if err != nil { return nil, nil, err } return os.NewFile(uintptr(fds[1]), name+"-p"), os.NewFile(uintptr(fds[0]), name+"-c"), nil }
[ "func", "NewSockPair", "(", "name", "string", ")", "(", "parent", "*", "os", ".", "File", ",", "child", "*", "os", ".", "File", ",", "err", "error", ")", "{", "fds", ",", "err", ":=", "unix", ".", "Socketpair", "(", "unix", ".", "AF_LOCAL", ",", "unix", ".", "SOCK_STREAM", "|", "unix", ".", "SOCK_CLOEXEC", ",", "0", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "nil", ",", "err", "\n", "}", "\n", "return", "os", ".", "NewFile", "(", "uintptr", "(", "fds", "[", "1", "]", ")", ",", "name", "+", "\"", "\"", ")", ",", "os", ".", "NewFile", "(", "uintptr", "(", "fds", "[", "0", "]", ")", ",", "name", "+", "\"", "\"", ")", ",", "nil", "\n", "}" ]
// NewSockPair returns a new unix socket pair
[ "NewSockPair", "returns", "a", "new", "unix", "socket", "pair" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/utils/utils_unix.go#L38-L44
164,488
opencontainers/runc
libcontainer/utils/utils.go
ResolveRootfs
func ResolveRootfs(uncleanRootfs string) (string, error) { rootfs, err := filepath.Abs(uncleanRootfs) if err != nil { return "", err } return filepath.EvalSymlinks(rootfs) }
go
func ResolveRootfs(uncleanRootfs string) (string, error) { rootfs, err := filepath.Abs(uncleanRootfs) if err != nil { return "", err } return filepath.EvalSymlinks(rootfs) }
[ "func", "ResolveRootfs", "(", "uncleanRootfs", "string", ")", "(", "string", ",", "error", ")", "{", "rootfs", ",", "err", ":=", "filepath", ".", "Abs", "(", "uncleanRootfs", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\"", "\"", ",", "err", "\n", "}", "\n", "return", "filepath", ".", "EvalSymlinks", "(", "rootfs", ")", "\n", "}" ]
// ResolveRootfs ensures that the current working directory is // not a symlink and returns the absolute path to the rootfs
[ "ResolveRootfs", "ensures", "that", "the", "current", "working", "directory", "is", "not", "a", "symlink", "and", "returns", "the", "absolute", "path", "to", "the", "rootfs" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/utils/utils.go#L20-L26
164,489
opencontainers/runc
libcontainer/utils/utils.go
WriteJSON
func WriteJSON(w io.Writer, v interface{}) error { data, err := json.Marshal(v) if err != nil { return err } _, err = w.Write(data) return err }
go
func WriteJSON(w io.Writer, v interface{}) error { data, err := json.Marshal(v) if err != nil { return err } _, err = w.Write(data) return err }
[ "func", "WriteJSON", "(", "w", "io", ".", "Writer", ",", "v", "interface", "{", "}", ")", "error", "{", "data", ",", "err", ":=", "json", ".", "Marshal", "(", "v", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "_", ",", "err", "=", "w", ".", "Write", "(", "data", ")", "\n", "return", "err", "\n", "}" ]
// WriteJSON writes the provided struct v to w using standard json marshaling
[ "WriteJSON", "writes", "the", "provided", "struct", "v", "to", "w", "using", "standard", "json", "marshaling" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/utils/utils.go#L38-L45
164,490
opencontainers/runc
libcontainer/utils/utils.go
SearchLabels
func SearchLabels(labels []string, query string) string { for _, l := range labels { parts := strings.SplitN(l, "=", 2) if len(parts) < 2 { continue } if parts[0] == query { return parts[1] } } return "" }
go
func SearchLabels(labels []string, query string) string { for _, l := range labels { parts := strings.SplitN(l, "=", 2) if len(parts) < 2 { continue } if parts[0] == query { return parts[1] } } return "" }
[ "func", "SearchLabels", "(", "labels", "[", "]", "string", ",", "query", "string", ")", "string", "{", "for", "_", ",", "l", ":=", "range", "labels", "{", "parts", ":=", "strings", ".", "SplitN", "(", "l", ",", "\"", "\"", ",", "2", ")", "\n", "if", "len", "(", "parts", ")", "<", "2", "{", "continue", "\n", "}", "\n", "if", "parts", "[", "0", "]", "==", "query", "{", "return", "parts", "[", "1", "]", "\n", "}", "\n", "}", "\n", "return", "\"", "\"", "\n", "}" ]
// SearchLabels searches a list of key-value pairs for the provided key and // returns the corresponding value. The pairs must be separated with '='.
[ "SearchLabels", "searches", "a", "list", "of", "key", "-", "value", "pairs", "for", "the", "provided", "key", "and", "returns", "the", "corresponding", "value", ".", "The", "pairs", "must", "be", "separated", "with", "=", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/utils/utils.go#L78-L89
164,491
opencontainers/runc
libcontainer/utils/utils.go
Annotations
func Annotations(labels []string) (bundle string, userAnnotations map[string]string) { userAnnotations = make(map[string]string) for _, l := range labels { parts := strings.SplitN(l, "=", 2) if len(parts) < 2 { continue } if parts[0] == "bundle" { bundle = parts[1] } else { userAnnotations[parts[0]] = parts[1] } } return }
go
func Annotations(labels []string) (bundle string, userAnnotations map[string]string) { userAnnotations = make(map[string]string) for _, l := range labels { parts := strings.SplitN(l, "=", 2) if len(parts) < 2 { continue } if parts[0] == "bundle" { bundle = parts[1] } else { userAnnotations[parts[0]] = parts[1] } } return }
[ "func", "Annotations", "(", "labels", "[", "]", "string", ")", "(", "bundle", "string", ",", "userAnnotations", "map", "[", "string", "]", "string", ")", "{", "userAnnotations", "=", "make", "(", "map", "[", "string", "]", "string", ")", "\n", "for", "_", ",", "l", ":=", "range", "labels", "{", "parts", ":=", "strings", ".", "SplitN", "(", "l", ",", "\"", "\"", ",", "2", ")", "\n", "if", "len", "(", "parts", ")", "<", "2", "{", "continue", "\n", "}", "\n", "if", "parts", "[", "0", "]", "==", "\"", "\"", "{", "bundle", "=", "parts", "[", "1", "]", "\n", "}", "else", "{", "userAnnotations", "[", "parts", "[", "0", "]", "]", "=", "parts", "[", "1", "]", "\n", "}", "\n", "}", "\n", "return", "\n", "}" ]
// Annotations returns the bundle path and user defined annotations from the // libcontainer state. We need to remove the bundle because that is a label // added by libcontainer.
[ "Annotations", "returns", "the", "bundle", "path", "and", "user", "defined", "annotations", "from", "the", "libcontainer", "state", ".", "We", "need", "to", "remove", "the", "bundle", "because", "that", "is", "a", "label", "added", "by", "libcontainer", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/utils/utils.go#L94-L108
164,492
opencontainers/runc
libcontainer/seccomp/config.go
ConvertStringToOperator
func ConvertStringToOperator(in string) (configs.Operator, error) { if op, ok := operators[in]; ok == true { return op, nil } return 0, fmt.Errorf("string %s is not a valid operator for seccomp", in) }
go
func ConvertStringToOperator(in string) (configs.Operator, error) { if op, ok := operators[in]; ok == true { return op, nil } return 0, fmt.Errorf("string %s is not a valid operator for seccomp", in) }
[ "func", "ConvertStringToOperator", "(", "in", "string", ")", "(", "configs", ".", "Operator", ",", "error", ")", "{", "if", "op", ",", "ok", ":=", "operators", "[", "in", "]", ";", "ok", "==", "true", "{", "return", "op", ",", "nil", "\n", "}", "\n", "return", "0", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "in", ")", "\n", "}" ]
// ConvertStringToOperator converts a string into a Seccomp comparison operator. // Comparison operators use the names they are assigned by Libseccomp's header. // Attempting to convert a string that is not a valid operator results in an // error.
[ "ConvertStringToOperator", "converts", "a", "string", "into", "a", "Seccomp", "comparison", "operator", ".", "Comparison", "operators", "use", "the", "names", "they", "are", "assigned", "by", "Libseccomp", "s", "header", ".", "Attempting", "to", "convert", "a", "string", "that", "is", "not", "a", "valid", "operator", "results", "in", "an", "error", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/seccomp/config.go#L50-L55
164,493
opencontainers/runc
libcontainer/seccomp/config.go
ConvertStringToArch
func ConvertStringToArch(in string) (string, error) { if arch, ok := archs[in]; ok == true { return arch, nil } return "", fmt.Errorf("string %s is not a valid arch for seccomp", in) }
go
func ConvertStringToArch(in string) (string, error) { if arch, ok := archs[in]; ok == true { return arch, nil } return "", fmt.Errorf("string %s is not a valid arch for seccomp", in) }
[ "func", "ConvertStringToArch", "(", "in", "string", ")", "(", "string", ",", "error", ")", "{", "if", "arch", ",", "ok", ":=", "archs", "[", "in", "]", ";", "ok", "==", "true", "{", "return", "arch", ",", "nil", "\n", "}", "\n", "return", "\"", "\"", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "in", ")", "\n", "}" ]
// ConvertStringToArch converts a string into a Seccomp comparison arch.
[ "ConvertStringToArch", "converts", "a", "string", "into", "a", "Seccomp", "comparison", "arch", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/seccomp/config.go#L71-L76
164,494
opencontainers/runc
notify_socket.go
setupSpec
func (s *notifySocket) setupSpec(context *cli.Context, spec *specs.Spec) { mount := specs.Mount{Destination: s.host, Source: s.socketPath, Options: []string{"bind"}} spec.Mounts = append(spec.Mounts, mount) spec.Process.Env = append(spec.Process.Env, fmt.Sprintf("NOTIFY_SOCKET=%s", s.host)) }
go
func (s *notifySocket) setupSpec(context *cli.Context, spec *specs.Spec) { mount := specs.Mount{Destination: s.host, Source: s.socketPath, Options: []string{"bind"}} spec.Mounts = append(spec.Mounts, mount) spec.Process.Env = append(spec.Process.Env, fmt.Sprintf("NOTIFY_SOCKET=%s", s.host)) }
[ "func", "(", "s", "*", "notifySocket", ")", "setupSpec", "(", "context", "*", "cli", ".", "Context", ",", "spec", "*", "specs", ".", "Spec", ")", "{", "mount", ":=", "specs", ".", "Mount", "{", "Destination", ":", "s", ".", "host", ",", "Source", ":", "s", ".", "socketPath", ",", "Options", ":", "[", "]", "string", "{", "\"", "\"", "}", "}", "\n", "spec", ".", "Mounts", "=", "append", "(", "spec", ".", "Mounts", ",", "mount", ")", "\n", "spec", ".", "Process", ".", "Env", "=", "append", "(", "spec", ".", "Process", ".", "Env", ",", "fmt", ".", "Sprintf", "(", "\"", "\"", ",", "s", ".", "host", ")", ")", "\n", "}" ]
// If systemd is supporting sd_notify protocol, this function will add support // for sd_notify protocol from within the container.
[ "If", "systemd", "is", "supporting", "sd_notify", "protocol", "this", "function", "will", "add", "support", "for", "sd_notify", "protocol", "from", "within", "the", "container", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/notify_socket.go#L46-L50
164,495
opencontainers/runc
notify_socket.go
run
func (s *notifySocket) run(pid1 int) { buf := make([]byte, 512) notifySocketHostAddr := net.UnixAddr{Name: s.host, Net: "unixgram"} client, err := net.DialUnix("unixgram", nil, &notifySocketHostAddr) if err != nil { logrus.Error(err) return } for { r, err := s.socket.Read(buf) if err != nil { break } var out bytes.Buffer for _, line := range bytes.Split(buf[0:r], []byte{'\n'}) { if bytes.HasPrefix(line, []byte("READY=")) { _, err = out.Write(line) if err != nil { return } _, err = out.Write([]byte{'\n'}) if err != nil { return } _, err = client.Write(out.Bytes()) if err != nil { return } // now we can inform systemd to use pid1 as the pid to monitor if pid1 > 0 { newPid := fmt.Sprintf("MAINPID=%d\n", pid1) client.Write([]byte(newPid)) } return } } } }
go
func (s *notifySocket) run(pid1 int) { buf := make([]byte, 512) notifySocketHostAddr := net.UnixAddr{Name: s.host, Net: "unixgram"} client, err := net.DialUnix("unixgram", nil, &notifySocketHostAddr) if err != nil { logrus.Error(err) return } for { r, err := s.socket.Read(buf) if err != nil { break } var out bytes.Buffer for _, line := range bytes.Split(buf[0:r], []byte{'\n'}) { if bytes.HasPrefix(line, []byte("READY=")) { _, err = out.Write(line) if err != nil { return } _, err = out.Write([]byte{'\n'}) if err != nil { return } _, err = client.Write(out.Bytes()) if err != nil { return } // now we can inform systemd to use pid1 as the pid to monitor if pid1 > 0 { newPid := fmt.Sprintf("MAINPID=%d\n", pid1) client.Write([]byte(newPid)) } return } } } }
[ "func", "(", "s", "*", "notifySocket", ")", "run", "(", "pid1", "int", ")", "{", "buf", ":=", "make", "(", "[", "]", "byte", ",", "512", ")", "\n", "notifySocketHostAddr", ":=", "net", ".", "UnixAddr", "{", "Name", ":", "s", ".", "host", ",", "Net", ":", "\"", "\"", "}", "\n", "client", ",", "err", ":=", "net", ".", "DialUnix", "(", "\"", "\"", ",", "nil", ",", "&", "notifySocketHostAddr", ")", "\n", "if", "err", "!=", "nil", "{", "logrus", ".", "Error", "(", "err", ")", "\n", "return", "\n", "}", "\n", "for", "{", "r", ",", "err", ":=", "s", ".", "socket", ".", "Read", "(", "buf", ")", "\n", "if", "err", "!=", "nil", "{", "break", "\n", "}", "\n", "var", "out", "bytes", ".", "Buffer", "\n", "for", "_", ",", "line", ":=", "range", "bytes", ".", "Split", "(", "buf", "[", "0", ":", "r", "]", ",", "[", "]", "byte", "{", "'\\n'", "}", ")", "{", "if", "bytes", ".", "HasPrefix", "(", "line", ",", "[", "]", "byte", "(", "\"", "\"", ")", ")", "{", "_", ",", "err", "=", "out", ".", "Write", "(", "line", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "_", ",", "err", "=", "out", ".", "Write", "(", "[", "]", "byte", "{", "'\\n'", "}", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "_", ",", "err", "=", "client", ".", "Write", "(", "out", ".", "Bytes", "(", ")", ")", "\n", "if", "err", "!=", "nil", "{", "return", "\n", "}", "\n\n", "// now we can inform systemd to use pid1 as the pid to monitor", "if", "pid1", ">", "0", "{", "newPid", ":=", "fmt", ".", "Sprintf", "(", "\"", "\\n", "\"", ",", "pid1", ")", "\n", "client", ".", "Write", "(", "[", "]", "byte", "(", "newPid", ")", ")", "\n", "}", "\n", "return", "\n", "}", "\n", "}", "\n", "}", "\n", "}" ]
// pid1 must be set only with -d, as it is used to set the new process as the main process // for the service in systemd
[ "pid1", "must", "be", "set", "only", "with", "-", "d", "as", "it", "is", "used", "to", "set", "the", "new", "process", "as", "the", "main", "process", "for", "the", "service", "in", "systemd" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/notify_socket.go#L69-L109
164,496
opencontainers/runc
libcontainer/cgroups/utils.go
GetCgroupMounts
func GetCgroupMounts(all bool) ([]Mount, error) { f, err := os.Open("/proc/self/mountinfo") if err != nil { return nil, err } defer f.Close() allSubsystems, err := ParseCgroupFile("/proc/self/cgroup") if err != nil { return nil, err } allMap := make(map[string]bool) for s := range allSubsystems { allMap[s] = false } return getCgroupMountsHelper(allMap, f, all) }
go
func GetCgroupMounts(all bool) ([]Mount, error) { f, err := os.Open("/proc/self/mountinfo") if err != nil { return nil, err } defer f.Close() allSubsystems, err := ParseCgroupFile("/proc/self/cgroup") if err != nil { return nil, err } allMap := make(map[string]bool) for s := range allSubsystems { allMap[s] = false } return getCgroupMountsHelper(allMap, f, all) }
[ "func", "GetCgroupMounts", "(", "all", "bool", ")", "(", "[", "]", "Mount", ",", "error", ")", "{", "f", ",", "err", ":=", "os", ".", "Open", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n", "defer", "f", ".", "Close", "(", ")", "\n\n", "allSubsystems", ",", "err", ":=", "ParseCgroupFile", "(", "\"", "\"", ")", "\n", "if", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "allMap", ":=", "make", "(", "map", "[", "string", "]", "bool", ")", "\n", "for", "s", ":=", "range", "allSubsystems", "{", "allMap", "[", "s", "]", "=", "false", "\n", "}", "\n", "return", "getCgroupMountsHelper", "(", "allMap", ",", "f", ",", "all", ")", "\n", "}" ]
// GetCgroupMounts returns the mounts for the cgroup subsystems. // all indicates whether to return just the first instance or all the mounts.
[ "GetCgroupMounts", "returns", "the", "mounts", "for", "the", "cgroup", "subsystems", ".", "all", "indicates", "whether", "to", "return", "just", "the", "first", "instance", "or", "all", "the", "mounts", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/cgroups/utils.go#L188-L205
164,497
opencontainers/runc
libcontainer/cgroups/utils.go
parseCgroupFromReader
func parseCgroupFromReader(r io.Reader) (map[string]string, error) { s := bufio.NewScanner(r) cgroups := make(map[string]string) for s.Scan() { text := s.Text() // from cgroups(7): // /proc/[pid]/cgroup // ... // For each cgroup hierarchy ... there is one entry // containing three colon-separated fields of the form: // hierarchy-ID:subsystem-list:cgroup-path parts := strings.SplitN(text, ":", 3) if len(parts) < 3 { return nil, fmt.Errorf("invalid cgroup entry: must contain at least two colons: %v", text) } for _, subs := range strings.Split(parts[1], ",") { cgroups[subs] = parts[2] } } if err := s.Err(); err != nil { return nil, err } return cgroups, nil }
go
func parseCgroupFromReader(r io.Reader) (map[string]string, error) { s := bufio.NewScanner(r) cgroups := make(map[string]string) for s.Scan() { text := s.Text() // from cgroups(7): // /proc/[pid]/cgroup // ... // For each cgroup hierarchy ... there is one entry // containing three colon-separated fields of the form: // hierarchy-ID:subsystem-list:cgroup-path parts := strings.SplitN(text, ":", 3) if len(parts) < 3 { return nil, fmt.Errorf("invalid cgroup entry: must contain at least two colons: %v", text) } for _, subs := range strings.Split(parts[1], ",") { cgroups[subs] = parts[2] } } if err := s.Err(); err != nil { return nil, err } return cgroups, nil }
[ "func", "parseCgroupFromReader", "(", "r", "io", ".", "Reader", ")", "(", "map", "[", "string", "]", "string", ",", "error", ")", "{", "s", ":=", "bufio", ".", "NewScanner", "(", "r", ")", "\n", "cgroups", ":=", "make", "(", "map", "[", "string", "]", "string", ")", "\n\n", "for", "s", ".", "Scan", "(", ")", "{", "text", ":=", "s", ".", "Text", "(", ")", "\n", "// from cgroups(7):", "// /proc/[pid]/cgroup", "// ...", "// For each cgroup hierarchy ... there is one entry", "// containing three colon-separated fields of the form:", "// hierarchy-ID:subsystem-list:cgroup-path", "parts", ":=", "strings", ".", "SplitN", "(", "text", ",", "\"", "\"", ",", "3", ")", "\n", "if", "len", "(", "parts", ")", "<", "3", "{", "return", "nil", ",", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "text", ")", "\n", "}", "\n\n", "for", "_", ",", "subs", ":=", "range", "strings", ".", "Split", "(", "parts", "[", "1", "]", ",", "\"", "\"", ")", "{", "cgroups", "[", "subs", "]", "=", "parts", "[", "2", "]", "\n", "}", "\n", "}", "\n", "if", "err", ":=", "s", ".", "Err", "(", ")", ";", "err", "!=", "nil", "{", "return", "nil", ",", "err", "\n", "}", "\n\n", "return", "cgroups", ",", "nil", "\n", "}" ]
// helper function for ParseCgroupFile to make testing easier
[ "helper", "function", "for", "ParseCgroupFile", "to", "make", "testing", "easier" ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/cgroups/utils.go#L323-L349
164,498
opencontainers/runc
libcontainer/cgroups/utils.go
RemovePaths
func RemovePaths(paths map[string]string) (err error) { delay := 10 * time.Millisecond for i := 0; i < 5; i++ { if i != 0 { time.Sleep(delay) delay *= 2 } for s, p := range paths { os.RemoveAll(p) // TODO: here probably should be logging _, err := os.Stat(p) // We need this strange way of checking cgroups existence because // RemoveAll almost always returns error, even on already removed // cgroups if os.IsNotExist(err) { delete(paths, s) } } if len(paths) == 0 { return nil } } return fmt.Errorf("Failed to remove paths: %v", paths) }
go
func RemovePaths(paths map[string]string) (err error) { delay := 10 * time.Millisecond for i := 0; i < 5; i++ { if i != 0 { time.Sleep(delay) delay *= 2 } for s, p := range paths { os.RemoveAll(p) // TODO: here probably should be logging _, err := os.Stat(p) // We need this strange way of checking cgroups existence because // RemoveAll almost always returns error, even on already removed // cgroups if os.IsNotExist(err) { delete(paths, s) } } if len(paths) == 0 { return nil } } return fmt.Errorf("Failed to remove paths: %v", paths) }
[ "func", "RemovePaths", "(", "paths", "map", "[", "string", "]", "string", ")", "(", "err", "error", ")", "{", "delay", ":=", "10", "*", "time", ".", "Millisecond", "\n", "for", "i", ":=", "0", ";", "i", "<", "5", ";", "i", "++", "{", "if", "i", "!=", "0", "{", "time", ".", "Sleep", "(", "delay", ")", "\n", "delay", "*=", "2", "\n", "}", "\n", "for", "s", ",", "p", ":=", "range", "paths", "{", "os", ".", "RemoveAll", "(", "p", ")", "\n", "// TODO: here probably should be logging", "_", ",", "err", ":=", "os", ".", "Stat", "(", "p", ")", "\n", "// We need this strange way of checking cgroups existence because", "// RemoveAll almost always returns error, even on already removed", "// cgroups", "if", "os", ".", "IsNotExist", "(", "err", ")", "{", "delete", "(", "paths", ",", "s", ")", "\n", "}", "\n", "}", "\n", "if", "len", "(", "paths", ")", "==", "0", "{", "return", "nil", "\n", "}", "\n", "}", "\n", "return", "fmt", ".", "Errorf", "(", "\"", "\"", ",", "paths", ")", "\n", "}" ]
// RemovePaths iterates over the provided paths removing them. // We trying to remove all paths five times with increasing delay between tries. // If after all there are not removed cgroups - appropriate error will be // returned.
[ "RemovePaths", "iterates", "over", "the", "provided", "paths", "removing", "them", ".", "We", "trying", "to", "remove", "all", "paths", "five", "times", "with", "increasing", "delay", "between", "tries", ".", "If", "after", "all", "there", "are", "not", "removed", "cgroups", "-", "appropriate", "error", "will", "be", "returned", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/cgroups/utils.go#L386-L409
164,499
opencontainers/runc
libcontainer/cgroups/utils.go
GetAllPids
func GetAllPids(path string) ([]int, error) { var pids []int // collect pids from all sub-cgroups err := filepath.Walk(path, func(p string, info os.FileInfo, iErr error) error { dir, file := filepath.Split(p) if file != CgroupProcesses { return nil } if iErr != nil { return iErr } cPids, err := readProcsFile(dir) if err != nil { return err } pids = append(pids, cPids...) return nil }) return pids, err }
go
func GetAllPids(path string) ([]int, error) { var pids []int // collect pids from all sub-cgroups err := filepath.Walk(path, func(p string, info os.FileInfo, iErr error) error { dir, file := filepath.Split(p) if file != CgroupProcesses { return nil } if iErr != nil { return iErr } cPids, err := readProcsFile(dir) if err != nil { return err } pids = append(pids, cPids...) return nil }) return pids, err }
[ "func", "GetAllPids", "(", "path", "string", ")", "(", "[", "]", "int", ",", "error", ")", "{", "var", "pids", "[", "]", "int", "\n", "// collect pids from all sub-cgroups", "err", ":=", "filepath", ".", "Walk", "(", "path", ",", "func", "(", "p", "string", ",", "info", "os", ".", "FileInfo", ",", "iErr", "error", ")", "error", "{", "dir", ",", "file", ":=", "filepath", ".", "Split", "(", "p", ")", "\n", "if", "file", "!=", "CgroupProcesses", "{", "return", "nil", "\n", "}", "\n", "if", "iErr", "!=", "nil", "{", "return", "iErr", "\n", "}", "\n", "cPids", ",", "err", ":=", "readProcsFile", "(", "dir", ")", "\n", "if", "err", "!=", "nil", "{", "return", "err", "\n", "}", "\n", "pids", "=", "append", "(", "pids", ",", "cPids", "...", ")", "\n", "return", "nil", "\n", "}", ")", "\n", "return", "pids", ",", "err", "\n", "}" ]
// GetAllPids returns all pids, that were added to cgroup at path and to all its // subcgroups.
[ "GetAllPids", "returns", "all", "pids", "that", "were", "added", "to", "cgroup", "at", "path", "and", "to", "all", "its", "subcgroups", "." ]
dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf
https://github.com/opencontainers/runc/blob/dae70e8efea4199c8ac3d8c80eb23e1f75e60ebf/libcontainer/cgroups/utils.go#L438-L457